2022-08-10 14:04:03 +03:00
|
|
|
// Copyright 2022 Cloudbase Solutions SRL
|
|
|
|
|
//
|
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
|
// not use this file except in compliance with the License. You may obtain
|
|
|
|
|
// a copy of the License at
|
|
|
|
|
//
|
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
//
|
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
|
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
|
// License for the specific language governing permissions and limitations
|
|
|
|
|
// under the License.
|
|
|
|
|
|
|
|
|
|
package runner
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"context"
|
|
|
|
|
"fmt"
|
2023-01-23 17:54:08 +01:00
|
|
|
"testing"
|
|
|
|
|
|
2024-04-16 17:05:18 +00:00
|
|
|
"github.com/pkg/errors"
|
2024-02-22 16:54:38 +01:00
|
|
|
"github.com/stretchr/testify/mock"
|
|
|
|
|
"github.com/stretchr/testify/suite"
|
|
|
|
|
|
2023-07-22 22:26:47 +00:00
|
|
|
runnerErrors "github.com/cloudbase/garm-provider-common/errors"
|
2023-03-12 16:01:49 +02:00
|
|
|
"github.com/cloudbase/garm/database"
|
|
|
|
|
dbCommon "github.com/cloudbase/garm/database/common"
|
2024-04-03 14:46:32 +00:00
|
|
|
"github.com/cloudbase/garm/database/watcher"
|
2023-03-12 16:01:49 +02:00
|
|
|
garmTesting "github.com/cloudbase/garm/internal/testing"
|
|
|
|
|
"github.com/cloudbase/garm/params"
|
|
|
|
|
"github.com/cloudbase/garm/runner/common"
|
|
|
|
|
runnerCommonMocks "github.com/cloudbase/garm/runner/common/mocks"
|
|
|
|
|
runnerMocks "github.com/cloudbase/garm/runner/mocks"
|
2022-08-10 14:04:03 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
type RepoTestFixtures struct {
|
2024-06-20 15:28:56 +00:00
|
|
|
AdminContext context.Context
|
|
|
|
|
Store dbCommon.Store
|
|
|
|
|
StoreRepos map[string]params.Repository
|
|
|
|
|
Providers map[string]common.Provider
|
|
|
|
|
Credentials map[string]params.GithubCredentials
|
|
|
|
|
CreateRepoParams params.CreateRepoParams
|
|
|
|
|
CreatePoolParams params.CreatePoolParams
|
|
|
|
|
CreateInstanceParams params.CreateInstanceParams
|
|
|
|
|
UpdateRepoParams params.UpdateEntityParams
|
|
|
|
|
UpdatePoolParams params.UpdatePoolParams
|
|
|
|
|
ErrMock error
|
|
|
|
|
ProviderMock *runnerCommonMocks.Provider
|
|
|
|
|
PoolMgrMock *runnerCommonMocks.PoolManager
|
|
|
|
|
PoolMgrCtrlMock *runnerMocks.PoolManagerController
|
2022-08-10 14:04:03 +03:00
|
|
|
}
|
|
|
|
|
|
2024-04-03 14:46:32 +00:00
|
|
|
func init() {
|
|
|
|
|
watcher.SetWatcher(&garmTesting.MockWatcher{})
|
|
|
|
|
}
|
|
|
|
|
|
2022-08-10 14:04:03 +03:00
|
|
|
type RepoTestSuite struct {
|
|
|
|
|
suite.Suite
|
|
|
|
|
Fixtures *RepoTestFixtures
|
|
|
|
|
Runner *Runner
|
2024-04-16 17:05:18 +00:00
|
|
|
|
|
|
|
|
testCreds params.GithubCredentials
|
|
|
|
|
secondaryTestCreds params.GithubCredentials
|
|
|
|
|
githubEndpoint params.GithubEndpoint
|
2022-08-10 14:04:03 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) SetupTest() {
|
|
|
|
|
// create testing sqlite database
|
2022-09-15 17:48:09 +03:00
|
|
|
dbCfg := garmTesting.GetTestSqliteDBConfig(s.T())
|
2024-04-16 17:05:18 +00:00
|
|
|
db, err := database.NewDatabase(context.Background(), dbCfg)
|
2022-08-10 14:04:03 +03:00
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("failed to create db connection: %s", err))
|
|
|
|
|
}
|
|
|
|
|
|
2024-04-16 17:05:18 +00:00
|
|
|
adminCtx := garmTesting.ImpersonateAdminContext(context.Background(), db, s.T())
|
|
|
|
|
s.githubEndpoint = garmTesting.CreateDefaultGithubEndpoint(adminCtx, db, s.T())
|
|
|
|
|
s.testCreds = garmTesting.CreateTestGithubCredentials(adminCtx, "new-creds", db, s.T(), s.githubEndpoint)
|
|
|
|
|
s.secondaryTestCreds = garmTesting.CreateTestGithubCredentials(adminCtx, "secondary-creds", db, s.T(), s.githubEndpoint)
|
|
|
|
|
|
2022-08-10 14:04:03 +03:00
|
|
|
// create some repository objects in the database, for testing purposes
|
|
|
|
|
repos := map[string]params.Repository{}
|
|
|
|
|
for i := 1; i <= 3; i++ {
|
|
|
|
|
name := fmt.Sprintf("test-repo-%v", i)
|
|
|
|
|
repo, err := db.CreateRepository(
|
|
|
|
|
adminCtx,
|
|
|
|
|
fmt.Sprintf("test-owner-%v", i),
|
|
|
|
|
name,
|
2024-04-16 17:05:18 +00:00
|
|
|
s.testCreds.Name,
|
2022-08-10 14:04:03 +03:00
|
|
|
fmt.Sprintf("test-webhook-secret-%v", i),
|
Add pool balancing strategy
This change adds the ability to specify the pool balancing strategy to
use when processing queued jobs. Before this change, GARM would round-robin
through all pools that matched the set of tags requested by queued jobs.
When round-robin (default) is used for an entity (repo, org or enterprise)
and you have 2 pools defined for that entity with a common set of tags that
match 10 jobs (for example), then those jobs would trigger the creation of
a new runner in each of the two pools in turn. Job 1 would go to pool 1,
job 2 would go to pool 2, job 3 to pool 1, job 4 to pool 2 and so on.
When "stack" is used, those same 10 jobs would trigger the creation of a
new runner in the pool with the highest priority, every time.
In both cases, if a pool is full, the next one would be tried automatically.
For the stack case, this would mean that if pool 2 had a priority of 10 and
pool 1 would have a priority of 5, pool 2 would be saturated first, then
pool 1.
Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>
2024-03-14 20:04:34 +00:00
|
|
|
params.PoolBalancerTypeRoundRobin,
|
2022-08-10 14:04:03 +03:00
|
|
|
)
|
|
|
|
|
if err != nil {
|
2024-04-15 08:32:19 +00:00
|
|
|
s.FailNow(fmt.Sprintf("failed to create database object (test-repo-%v): %q", i, err))
|
2022-08-10 14:04:03 +03:00
|
|
|
}
|
|
|
|
|
repos[name] = repo
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// setup test fixtures
|
2022-09-09 15:53:14 +03:00
|
|
|
var maxRunners uint = 40
|
|
|
|
|
var minIdleRunners uint = 20
|
2022-08-10 14:04:03 +03:00
|
|
|
providerMock := runnerCommonMocks.NewProvider(s.T())
|
|
|
|
|
fixtures := &RepoTestFixtures{
|
2024-04-29 09:47:26 +00:00
|
|
|
AdminContext: adminCtx,
|
2022-08-10 14:04:03 +03:00
|
|
|
Store: db,
|
|
|
|
|
StoreRepos: repos,
|
|
|
|
|
Providers: map[string]common.Provider{
|
|
|
|
|
"test-provider": providerMock,
|
|
|
|
|
},
|
2024-04-16 17:05:18 +00:00
|
|
|
Credentials: map[string]params.GithubCredentials{
|
|
|
|
|
s.testCreds.Name: s.testCreds,
|
|
|
|
|
s.secondaryTestCreds.Name: s.secondaryTestCreds,
|
2022-08-10 14:04:03 +03:00
|
|
|
},
|
|
|
|
|
CreateRepoParams: params.CreateRepoParams{
|
|
|
|
|
Owner: "test-owner-create",
|
|
|
|
|
Name: "test-repo-create",
|
2024-04-16 17:05:18 +00:00
|
|
|
CredentialsName: s.testCreds.Name,
|
2023-01-23 17:54:08 +01:00
|
|
|
WebhookSecret: "test-create-repo-webhook-secret",
|
2022-08-10 14:04:03 +03:00
|
|
|
},
|
2022-09-07 16:30:24 +03:00
|
|
|
CreatePoolParams: params.CreatePoolParams{
|
|
|
|
|
ProviderName: "test-provider",
|
|
|
|
|
MaxRunners: 4,
|
|
|
|
|
MinIdleRunners: 2,
|
|
|
|
|
Image: "test",
|
|
|
|
|
Flavor: "test",
|
|
|
|
|
OSType: "linux",
|
|
|
|
|
OSArch: "arm64",
|
2024-05-21 07:27:07 +02:00
|
|
|
Tags: []string{"arm64-linux-runner"},
|
2022-09-07 16:30:24 +03:00
|
|
|
RunnerBootstrapTimeout: 0,
|
|
|
|
|
},
|
2022-09-09 15:53:14 +03:00
|
|
|
CreateInstanceParams: params.CreateInstanceParams{
|
|
|
|
|
Name: "test-instance-name",
|
|
|
|
|
OSType: "linux",
|
|
|
|
|
},
|
2023-07-04 23:47:55 +00:00
|
|
|
UpdateRepoParams: params.UpdateEntityParams{
|
2024-04-16 17:05:18 +00:00
|
|
|
CredentialsName: s.testCreds.Name,
|
2022-09-07 16:30:24 +03:00
|
|
|
WebhookSecret: "test-update-repo-webhook-secret",
|
|
|
|
|
},
|
2022-09-09 15:53:14 +03:00
|
|
|
UpdatePoolParams: params.UpdatePoolParams{
|
|
|
|
|
MaxRunners: &maxRunners,
|
|
|
|
|
MinIdleRunners: &minIdleRunners,
|
|
|
|
|
Image: "test-images-updated",
|
|
|
|
|
Flavor: "test-flavor-updated",
|
|
|
|
|
},
|
2022-08-10 14:04:03 +03:00
|
|
|
ErrMock: fmt.Errorf("mock error"),
|
|
|
|
|
ProviderMock: providerMock,
|
|
|
|
|
PoolMgrMock: runnerCommonMocks.NewPoolManager(s.T()),
|
|
|
|
|
PoolMgrCtrlMock: runnerMocks.NewPoolManagerController(s.T()),
|
|
|
|
|
}
|
|
|
|
|
s.Fixtures = fixtures
|
|
|
|
|
|
|
|
|
|
// setup test runner
|
|
|
|
|
runner := &Runner{
|
|
|
|
|
providers: fixtures.Providers,
|
|
|
|
|
ctx: fixtures.AdminContext,
|
|
|
|
|
store: fixtures.Store,
|
|
|
|
|
poolManagerCtrl: fixtures.PoolMgrCtrlMock,
|
|
|
|
|
}
|
|
|
|
|
s.Runner = runner
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestCreateRepository() {
|
|
|
|
|
// setup mocks expectations
|
|
|
|
|
s.Fixtures.PoolMgrMock.On("Start").Return(nil)
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("CreateRepoPoolManager", s.Fixtures.AdminContext, mock.AnythingOfType("params.Repository"), s.Fixtures.Providers, s.Fixtures.Store).Return(s.Fixtures.PoolMgrMock, nil)
|
|
|
|
|
|
|
|
|
|
// call tested function
|
|
|
|
|
repo, err := s.Runner.CreateRepository(s.Fixtures.AdminContext, s.Fixtures.CreateRepoParams)
|
|
|
|
|
|
|
|
|
|
// assertions
|
|
|
|
|
s.Fixtures.PoolMgrMock.AssertExpectations(s.T())
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
2024-04-16 17:05:18 +00:00
|
|
|
|
2022-08-10 14:04:03 +03:00
|
|
|
s.Require().Nil(err)
|
|
|
|
|
s.Require().Equal(s.Fixtures.CreateRepoParams.Owner, repo.Owner)
|
|
|
|
|
s.Require().Equal(s.Fixtures.CreateRepoParams.Name, repo.Name)
|
2024-04-15 08:32:19 +00:00
|
|
|
s.Require().Equal(s.Fixtures.Credentials[s.Fixtures.CreateRepoParams.CredentialsName].Name, repo.Credentials.Name)
|
2024-03-15 15:48:53 +00:00
|
|
|
s.Require().Equal(params.PoolBalancerTypeRoundRobin, repo.PoolBalancerType)
|
|
|
|
|
}
|
|
|
|
|
|
2024-05-21 07:27:07 +02:00
|
|
|
func (s *RepoTestSuite) TestCreateRepositoryPoolBalancerTypePack() {
|
2024-03-15 15:48:53 +00:00
|
|
|
// setup mocks expectations
|
|
|
|
|
s.Fixtures.PoolMgrMock.On("Start").Return(nil)
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("CreateRepoPoolManager", s.Fixtures.AdminContext, mock.AnythingOfType("params.Repository"), s.Fixtures.Providers, s.Fixtures.Store).Return(s.Fixtures.PoolMgrMock, nil)
|
|
|
|
|
|
|
|
|
|
// call tested function
|
|
|
|
|
param := s.Fixtures.CreateRepoParams
|
|
|
|
|
param.PoolBalancerType = params.PoolBalancerTypePack
|
|
|
|
|
repo, err := s.Runner.CreateRepository(s.Fixtures.AdminContext, param)
|
|
|
|
|
|
|
|
|
|
// assertions
|
|
|
|
|
s.Fixtures.PoolMgrMock.AssertExpectations(s.T())
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
|
|
|
|
s.Require().Nil(err)
|
|
|
|
|
s.Require().Equal(param.Owner, repo.Owner)
|
|
|
|
|
s.Require().Equal(param.Name, repo.Name)
|
2024-04-15 08:32:19 +00:00
|
|
|
s.Require().Equal(s.Fixtures.Credentials[s.Fixtures.CreateRepoParams.CredentialsName].Name, repo.Credentials.Name)
|
2024-03-15 15:48:53 +00:00
|
|
|
s.Require().Equal(params.PoolBalancerTypePack, repo.PoolBalancerType)
|
2022-08-10 14:04:03 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestCreateRepositoryErrUnauthorized() {
|
|
|
|
|
_, err := s.Runner.CreateRepository(context.Background(), s.Fixtures.CreateRepoParams)
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestCreateRepositoryEmptyParams() {
|
|
|
|
|
_, err := s.Runner.CreateRepository(s.Fixtures.AdminContext, params.CreateRepoParams{})
|
|
|
|
|
|
|
|
|
|
s.Require().Regexp("validating params: missing owner", err.Error())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestCreateRepositoryMissingCredentials() {
|
2024-02-22 17:39:02 +01:00
|
|
|
s.Fixtures.CreateRepoParams.CredentialsName = notExistingCredentialsName
|
2022-08-10 14:04:03 +03:00
|
|
|
|
|
|
|
|
_, err := s.Runner.CreateRepository(s.Fixtures.AdminContext, s.Fixtures.CreateRepoParams)
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.NewBadRequestError("credentials %s not defined", s.Fixtures.CreateRepoParams.CredentialsName), err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestCreateRepositoryAlreadyExists() {
|
|
|
|
|
// this is already created in `SetupTest()`
|
|
|
|
|
s.Fixtures.CreateRepoParams.Owner = "test-owner-1"
|
|
|
|
|
s.Fixtures.CreateRepoParams.Name = "test-repo-1"
|
|
|
|
|
|
|
|
|
|
_, err := s.Runner.CreateRepository(s.Fixtures.AdminContext, s.Fixtures.CreateRepoParams)
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.NewConflictError("repository %s/%s already exists", s.Fixtures.CreateRepoParams.Owner, s.Fixtures.CreateRepoParams.Name), err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestCreateRepositoryPoolMgrFailed() {
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("CreateRepoPoolManager", s.Fixtures.AdminContext, mock.AnythingOfType("params.Repository"), s.Fixtures.Providers, s.Fixtures.Store).Return(s.Fixtures.PoolMgrMock, s.Fixtures.ErrMock)
|
|
|
|
|
|
|
|
|
|
_, err := s.Runner.CreateRepository(s.Fixtures.AdminContext, s.Fixtures.CreateRepoParams)
|
|
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrMock.AssertExpectations(s.T())
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
|
|
|
|
s.Require().Equal(fmt.Sprintf("creating repo pool manager: %s", s.Fixtures.ErrMock.Error()), err.Error())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestCreateRepositoryStartPoolMgrFailed() {
|
|
|
|
|
s.Fixtures.PoolMgrMock.On("Start").Return(s.Fixtures.ErrMock)
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("CreateRepoPoolManager", s.Fixtures.AdminContext, mock.AnythingOfType("params.Repository"), s.Fixtures.Providers, s.Fixtures.Store).Return(s.Fixtures.PoolMgrMock, nil)
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("DeleteRepoPoolManager", mock.AnythingOfType("params.Repository")).Return(s.Fixtures.ErrMock)
|
|
|
|
|
|
|
|
|
|
_, err := s.Runner.CreateRepository(s.Fixtures.AdminContext, s.Fixtures.CreateRepoParams)
|
|
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrMock.AssertExpectations(s.T())
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
|
|
|
|
s.Require().Equal(fmt.Sprintf("starting repo pool manager: %s", s.Fixtures.ErrMock.Error()), err.Error())
|
|
|
|
|
}
|
|
|
|
|
|
2022-09-07 16:30:24 +03:00
|
|
|
func (s *RepoTestSuite) TestListRepositories() {
|
2022-10-20 17:22:47 +03:00
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("GetRepoPoolManager", mock.AnythingOfType("params.Repository")).Return(s.Fixtures.PoolMgrMock, nil)
|
|
|
|
|
s.Fixtures.PoolMgrMock.On("Status").Return(params.PoolManagerStatus{IsRunning: true}, nil)
|
2022-09-07 16:30:24 +03:00
|
|
|
repos, err := s.Runner.ListRepositories(s.Fixtures.AdminContext)
|
|
|
|
|
|
|
|
|
|
s.Require().Nil(err)
|
2022-12-04 17:30:27 +00:00
|
|
|
garmTesting.EqualDBEntityByName(s.T(), garmTesting.DBEntityMapToSlice(s.Fixtures.StoreRepos), repos)
|
2022-09-07 16:30:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestListRepositoriesErrUnauthorized() {
|
|
|
|
|
_, err := s.Runner.ListRepositories(context.Background())
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestGetRepositoryByID() {
|
2022-10-20 17:22:47 +03:00
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("GetRepoPoolManager", mock.AnythingOfType("params.Repository")).Return(s.Fixtures.PoolMgrMock, nil)
|
|
|
|
|
s.Fixtures.PoolMgrMock.On("Status").Return(params.PoolManagerStatus{IsRunning: true}, nil)
|
2022-09-07 16:30:24 +03:00
|
|
|
repo, err := s.Runner.GetRepositoryByID(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID)
|
|
|
|
|
|
|
|
|
|
s.Require().Nil(err)
|
|
|
|
|
s.Require().Equal(s.Fixtures.StoreRepos["test-repo-1"].ID, repo.ID)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestGetRepositoryByIDErrUnauthorized() {
|
|
|
|
|
_, err := s.Runner.GetRepositoryByID(context.Background(), "dummy-repo-id")
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestDeleteRepository() {
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("DeleteRepoPoolManager", mock.AnythingOfType("params.Repository")).Return(nil)
|
|
|
|
|
|
2023-08-16 09:46:04 +00:00
|
|
|
err := s.Runner.DeleteRepository(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, true)
|
2022-09-07 16:30:24 +03:00
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
|
|
|
|
s.Require().Nil(err)
|
|
|
|
|
|
|
|
|
|
_, err = s.Fixtures.Store.GetRepositoryByID(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID)
|
|
|
|
|
s.Require().Equal("fetching repo: not found", err.Error())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestDeleteRepositoryErrUnauthorized() {
|
2023-08-16 09:46:04 +00:00
|
|
|
err := s.Runner.DeleteRepository(context.Background(), "dummy-repo-id", true)
|
2022-09-07 16:30:24 +03:00
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestDeleteRepositoryPoolDefinedFailed() {
|
2024-03-28 18:23:49 +00:00
|
|
|
entity := params.GithubEntity{
|
|
|
|
|
ID: s.Fixtures.StoreRepos["test-repo-1"].ID,
|
|
|
|
|
EntityType: params.GithubEntityTypeRepository,
|
|
|
|
|
}
|
|
|
|
|
pool, err := s.Fixtures.Store.CreateEntityPool(s.Fixtures.AdminContext, entity, s.Fixtures.CreatePoolParams)
|
2022-09-07 16:30:24 +03:00
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create store repositories pool: %v", err))
|
|
|
|
|
}
|
|
|
|
|
|
2023-08-16 09:46:04 +00:00
|
|
|
err = s.Runner.DeleteRepository(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, true)
|
2022-09-07 16:30:24 +03:00
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.NewBadRequestError("repo has pools defined (%s)", pool.ID), err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestDeleteRepositoryPoolMgrFailed() {
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("DeleteRepoPoolManager", mock.AnythingOfType("params.Repository")).Return(s.Fixtures.ErrMock)
|
|
|
|
|
|
2023-08-16 09:46:04 +00:00
|
|
|
err := s.Runner.DeleteRepository(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, true)
|
2022-09-07 16:30:24 +03:00
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
|
|
|
|
s.Require().Equal(fmt.Sprintf("deleting repo pool manager: %s", s.Fixtures.ErrMock.Error()), err.Error())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestUpdateRepository() {
|
2024-06-20 15:28:56 +00:00
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("GetRepoPoolManager", mock.AnythingOfType("params.Repository")).Return(s.Fixtures.PoolMgrMock, nil)
|
2023-07-05 09:46:19 +00:00
|
|
|
s.Fixtures.PoolMgrMock.On("Status").Return(params.PoolManagerStatus{IsRunning: true}, nil)
|
2022-09-07 16:30:24 +03:00
|
|
|
|
|
|
|
|
repo, err := s.Runner.UpdateRepository(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, s.Fixtures.UpdateRepoParams)
|
|
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
2023-07-05 09:46:19 +00:00
|
|
|
s.Fixtures.PoolMgrMock.AssertExpectations(s.T())
|
2022-09-07 16:30:24 +03:00
|
|
|
s.Require().Nil(err)
|
2024-04-15 08:32:19 +00:00
|
|
|
s.Require().Equal(s.Fixtures.UpdateRepoParams.CredentialsName, repo.Credentials.Name)
|
2022-09-07 16:30:24 +03:00
|
|
|
s.Require().Equal(s.Fixtures.UpdateRepoParams.WebhookSecret, repo.WebhookSecret)
|
2024-03-15 15:48:53 +00:00
|
|
|
s.Require().Equal(params.PoolBalancerTypeRoundRobin, repo.PoolBalancerType)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestUpdateRepositoryBalancingType() {
|
2024-06-20 15:28:56 +00:00
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("GetRepoPoolManager", mock.AnythingOfType("params.Repository")).Return(s.Fixtures.PoolMgrMock, nil)
|
2024-03-15 15:48:53 +00:00
|
|
|
s.Fixtures.PoolMgrMock.On("Status").Return(params.PoolManagerStatus{IsRunning: true}, nil)
|
|
|
|
|
|
|
|
|
|
updateRepoParams := s.Fixtures.UpdateRepoParams
|
|
|
|
|
updateRepoParams.PoolBalancerType = params.PoolBalancerTypePack
|
|
|
|
|
repo, err := s.Runner.UpdateRepository(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, updateRepoParams)
|
|
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
|
|
|
|
s.Fixtures.PoolMgrMock.AssertExpectations(s.T())
|
|
|
|
|
s.Require().Nil(err)
|
2024-04-15 08:32:19 +00:00
|
|
|
s.Require().Equal(updateRepoParams.CredentialsName, repo.Credentials.Name)
|
2024-03-15 15:48:53 +00:00
|
|
|
s.Require().Equal(updateRepoParams.WebhookSecret, repo.WebhookSecret)
|
|
|
|
|
s.Require().Equal(params.PoolBalancerTypePack, repo.PoolBalancerType)
|
2022-09-07 16:30:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestUpdateRepositoryErrUnauthorized() {
|
|
|
|
|
_, err := s.Runner.UpdateRepository(context.Background(), "dummy-repo-id", s.Fixtures.UpdateRepoParams)
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestUpdateRepositoryInvalidCreds() {
|
2024-02-22 17:39:02 +01:00
|
|
|
s.Fixtures.UpdateRepoParams.CredentialsName = invalidCredentialsName
|
2022-09-07 16:30:24 +03:00
|
|
|
|
|
|
|
|
_, err := s.Runner.UpdateRepository(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, s.Fixtures.UpdateRepoParams)
|
|
|
|
|
|
2024-04-16 17:05:18 +00:00
|
|
|
if !errors.Is(err, runnerErrors.ErrNotFound) {
|
|
|
|
|
s.FailNow(fmt.Sprintf("expected error: %v", runnerErrors.ErrNotFound))
|
|
|
|
|
}
|
2022-09-07 16:30:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestUpdateRepositoryPoolMgrFailed() {
|
2024-06-20 15:28:56 +00:00
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("GetRepoPoolManager", mock.AnythingOfType("params.Repository")).Return(s.Fixtures.PoolMgrMock, s.Fixtures.ErrMock)
|
2022-09-07 16:30:24 +03:00
|
|
|
|
|
|
|
|
_, err := s.Runner.UpdateRepository(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, s.Fixtures.UpdateRepoParams)
|
|
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
2024-06-20 15:28:56 +00:00
|
|
|
s.Require().Equal(fmt.Sprintf("failed to get pool manager: %s", s.Fixtures.ErrMock.Error()), err.Error())
|
2022-09-07 16:30:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestUpdateRepositoryCreateRepoPoolMgrFailed() {
|
2024-06-20 15:28:56 +00:00
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("GetRepoPoolManager", mock.AnythingOfType("params.Repository")).Return(s.Fixtures.PoolMgrMock, s.Fixtures.ErrMock)
|
2022-09-07 16:30:24 +03:00
|
|
|
|
|
|
|
|
_, err := s.Runner.UpdateRepository(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, s.Fixtures.UpdateRepoParams)
|
|
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
2024-06-20 15:28:56 +00:00
|
|
|
s.Require().Equal(fmt.Sprintf("failed to get pool manager: %s", s.Fixtures.ErrMock.Error()), err.Error())
|
2022-09-07 16:30:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestCreateRepoPool() {
|
|
|
|
|
pool, err := s.Runner.CreateRepoPool(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, s.Fixtures.CreatePoolParams)
|
|
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrMock.AssertExpectations(s.T())
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
|
|
|
|
s.Require().Nil(err)
|
|
|
|
|
|
|
|
|
|
repo, err := s.Fixtures.Store.GetRepositoryByID(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID)
|
|
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot get repo by ID: %v", err))
|
|
|
|
|
}
|
|
|
|
|
s.Require().Equal(1, len(repo.Pools))
|
|
|
|
|
s.Require().Equal(pool.ID, repo.Pools[0].ID)
|
|
|
|
|
s.Require().Equal(s.Fixtures.CreatePoolParams.ProviderName, repo.Pools[0].ProviderName)
|
|
|
|
|
s.Require().Equal(s.Fixtures.CreatePoolParams.MaxRunners, repo.Pools[0].MaxRunners)
|
|
|
|
|
s.Require().Equal(s.Fixtures.CreatePoolParams.MinIdleRunners, repo.Pools[0].MinIdleRunners)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestCreateRepoPoolErrUnauthorized() {
|
|
|
|
|
_, err := s.Runner.CreateRepoPool(context.Background(), "dummy-repo-id", s.Fixtures.CreatePoolParams)
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestCreateRepoPoolFetchPoolParamsFailed() {
|
2024-02-22 17:39:02 +01:00
|
|
|
s.Fixtures.CreatePoolParams.ProviderName = notExistingProviderName
|
2022-09-07 16:30:24 +03:00
|
|
|
_, err := s.Runner.CreateRepoPool(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, s.Fixtures.CreatePoolParams)
|
|
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrMock.AssertExpectations(s.T())
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
2024-03-28 18:23:49 +00:00
|
|
|
s.Require().Regexp("failed to append tags to create pool params: no such provider not-existent-provider-name", err.Error())
|
2022-09-07 16:30:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestGetRepoPoolByID() {
|
2024-03-28 18:23:49 +00:00
|
|
|
entity := params.GithubEntity{
|
|
|
|
|
ID: s.Fixtures.StoreRepos["test-repo-1"].ID,
|
|
|
|
|
EntityType: params.GithubEntityTypeRepository,
|
|
|
|
|
}
|
|
|
|
|
repoPool, err := s.Fixtures.Store.CreateEntityPool(s.Fixtures.AdminContext, entity, s.Fixtures.CreatePoolParams)
|
2022-09-07 16:30:24 +03:00
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create repo pool: %s", err))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pool, err := s.Runner.GetRepoPoolByID(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, repoPool.ID)
|
|
|
|
|
|
|
|
|
|
s.Require().Nil(err)
|
|
|
|
|
s.Require().Equal(repoPool.ID, pool.ID)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestGetRepoPoolByIDErrUnauthorized() {
|
|
|
|
|
_, err := s.Runner.GetRepoPoolByID(context.Background(), "dummy-repo-id", "dummy-pool-id")
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
2023-01-23 17:54:08 +01:00
|
|
|
|
2022-09-09 15:53:14 +03:00
|
|
|
func (s *RepoTestSuite) TestDeleteRepoPool() {
|
2024-03-28 18:23:49 +00:00
|
|
|
entity := params.GithubEntity{
|
|
|
|
|
ID: s.Fixtures.StoreRepos["test-repo-1"].ID,
|
|
|
|
|
EntityType: params.GithubEntityTypeRepository,
|
|
|
|
|
}
|
|
|
|
|
pool, err := s.Fixtures.Store.CreateEntityPool(s.Fixtures.AdminContext, entity, s.Fixtures.CreatePoolParams)
|
2022-09-09 15:53:14 +03:00
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create repo pool: %s", err))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = s.Runner.DeleteRepoPool(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, pool.ID)
|
|
|
|
|
|
|
|
|
|
s.Require().Nil(err)
|
|
|
|
|
|
2024-03-28 18:23:49 +00:00
|
|
|
_, err = s.Fixtures.Store.GetEntityPool(s.Fixtures.AdminContext, entity, pool.ID)
|
2023-01-30 00:40:01 +00:00
|
|
|
s.Require().Equal("fetching pool: finding pool: not found", err.Error())
|
2022-09-09 15:53:14 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestDeleteRepoPoolErrUnauthorized() {
|
|
|
|
|
err := s.Runner.DeleteRepoPool(context.Background(), "dummy-repo-id", "dummy-pool-id")
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestDeleteRepoPoolRunnersFailed() {
|
2024-03-28 18:23:49 +00:00
|
|
|
entity := params.GithubEntity{
|
|
|
|
|
ID: s.Fixtures.StoreRepos["test-repo-1"].ID,
|
|
|
|
|
EntityType: params.GithubEntityTypeRepository,
|
|
|
|
|
}
|
|
|
|
|
pool, err := s.Fixtures.Store.CreateEntityPool(s.Fixtures.AdminContext, entity, s.Fixtures.CreatePoolParams)
|
2022-09-09 15:53:14 +03:00
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create repo pool: %s", err))
|
|
|
|
|
}
|
|
|
|
|
instance, err := s.Fixtures.Store.CreateInstance(s.Fixtures.AdminContext, pool.ID, s.Fixtures.CreateInstanceParams)
|
|
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create instance: %s", err))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = s.Runner.DeleteRepoPool(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, pool.ID)
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.NewBadRequestError("pool has runners: %s", instance.ID), err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestListRepoPools() {
|
2024-03-28 18:23:49 +00:00
|
|
|
entity := params.GithubEntity{
|
|
|
|
|
ID: s.Fixtures.StoreRepos["test-repo-1"].ID,
|
|
|
|
|
EntityType: params.GithubEntityTypeRepository,
|
|
|
|
|
}
|
2022-09-09 15:53:14 +03:00
|
|
|
repoPools := []params.Pool{}
|
|
|
|
|
for i := 1; i <= 2; i++ {
|
|
|
|
|
s.Fixtures.CreatePoolParams.Image = fmt.Sprintf("test-repo-%v", i)
|
2024-03-28 18:23:49 +00:00
|
|
|
pool, err := s.Fixtures.Store.CreateEntityPool(s.Fixtures.AdminContext, entity, s.Fixtures.CreatePoolParams)
|
2022-09-09 15:53:14 +03:00
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create repo pool: %v", err))
|
|
|
|
|
}
|
|
|
|
|
repoPools = append(repoPools, pool)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pools, err := s.Runner.ListRepoPools(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID)
|
|
|
|
|
|
|
|
|
|
s.Require().Nil(err)
|
2022-12-04 17:30:27 +00:00
|
|
|
garmTesting.EqualDBEntityID(s.T(), repoPools, pools)
|
2022-09-09 15:53:14 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestListRepoPoolsErrUnauthorized() {
|
|
|
|
|
_, err := s.Runner.ListRepoPools(context.Background(), "dummy-repo-id")
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestListPoolInstances() {
|
2024-03-28 18:23:49 +00:00
|
|
|
entity := params.GithubEntity{
|
|
|
|
|
ID: s.Fixtures.StoreRepos["test-repo-1"].ID,
|
|
|
|
|
EntityType: params.GithubEntityTypeRepository,
|
|
|
|
|
}
|
|
|
|
|
pool, err := s.Fixtures.Store.CreateEntityPool(s.Fixtures.AdminContext, entity, s.Fixtures.CreatePoolParams)
|
2022-09-09 15:53:14 +03:00
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create repo pool: %v", err))
|
|
|
|
|
}
|
|
|
|
|
poolInstances := []params.Instance{}
|
|
|
|
|
for i := 1; i <= 3; i++ {
|
|
|
|
|
s.Fixtures.CreateInstanceParams.Name = fmt.Sprintf("test-repo-%v", i)
|
|
|
|
|
instance, err := s.Fixtures.Store.CreateInstance(s.Fixtures.AdminContext, pool.ID, s.Fixtures.CreateInstanceParams)
|
|
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create instance: %s", err))
|
|
|
|
|
}
|
|
|
|
|
poolInstances = append(poolInstances, instance)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
instances, err := s.Runner.ListPoolInstances(s.Fixtures.AdminContext, pool.ID)
|
|
|
|
|
|
|
|
|
|
s.Require().Nil(err)
|
2022-12-04 17:30:27 +00:00
|
|
|
garmTesting.EqualDBEntityID(s.T(), poolInstances, instances)
|
2022-09-09 15:53:14 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestListPoolInstancesErrUnauthorized() {
|
|
|
|
|
_, err := s.Runner.ListPoolInstances(context.Background(), "dummy-pool-id")
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestUpdateRepoPool() {
|
2024-03-28 18:23:49 +00:00
|
|
|
entity := params.GithubEntity{
|
|
|
|
|
ID: s.Fixtures.StoreRepos["test-repo-1"].ID,
|
|
|
|
|
EntityType: params.GithubEntityTypeRepository,
|
|
|
|
|
}
|
|
|
|
|
repoPool, err := s.Fixtures.Store.CreateEntityPool(s.Fixtures.AdminContext, entity, s.Fixtures.CreatePoolParams)
|
2022-09-09 15:53:14 +03:00
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create store repositories pool: %v", err))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pool, err := s.Runner.UpdateRepoPool(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, repoPool.ID, s.Fixtures.UpdatePoolParams)
|
|
|
|
|
|
|
|
|
|
s.Require().Nil(err)
|
|
|
|
|
s.Require().Equal(*s.Fixtures.UpdatePoolParams.MaxRunners, pool.MaxRunners)
|
|
|
|
|
s.Require().Equal(*s.Fixtures.UpdatePoolParams.MinIdleRunners, pool.MinIdleRunners)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestUpdateRepoPoolErrUnauthorized() {
|
|
|
|
|
_, err := s.Runner.UpdateRepoPool(context.Background(), "dummy-repo-id", "dummy-pool-id", s.Fixtures.UpdatePoolParams)
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestUpdateRepoPoolMinIdleGreaterThanMax() {
|
2024-03-28 18:23:49 +00:00
|
|
|
entity := params.GithubEntity{
|
|
|
|
|
ID: s.Fixtures.StoreRepos["test-repo-1"].ID,
|
|
|
|
|
EntityType: params.GithubEntityTypeRepository,
|
|
|
|
|
}
|
|
|
|
|
pool, err := s.Fixtures.Store.CreateEntityPool(s.Fixtures.AdminContext, entity, s.Fixtures.CreatePoolParams)
|
2022-09-09 15:53:14 +03:00
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create repo pool: %s", err))
|
|
|
|
|
}
|
|
|
|
|
var maxRunners uint = 10
|
|
|
|
|
var minIdleRunners uint = 11
|
|
|
|
|
s.Fixtures.UpdatePoolParams.MaxRunners = &maxRunners
|
|
|
|
|
s.Fixtures.UpdatePoolParams.MinIdleRunners = &minIdleRunners
|
|
|
|
|
|
|
|
|
|
_, err = s.Runner.UpdateRepoPool(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID, pool.ID, s.Fixtures.UpdatePoolParams)
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.NewBadRequestError("min_idle_runners cannot be larger than max_runners"), err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestListRepoInstances() {
|
2024-03-28 18:23:49 +00:00
|
|
|
entity := params.GithubEntity{
|
|
|
|
|
ID: s.Fixtures.StoreRepos["test-repo-1"].ID,
|
|
|
|
|
EntityType: params.GithubEntityTypeRepository,
|
|
|
|
|
}
|
|
|
|
|
pool, err := s.Fixtures.Store.CreateEntityPool(s.Fixtures.AdminContext, entity, s.Fixtures.CreatePoolParams)
|
2022-09-09 15:53:14 +03:00
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create repo pool: %v", err))
|
|
|
|
|
}
|
|
|
|
|
poolInstances := []params.Instance{}
|
|
|
|
|
for i := 1; i <= 3; i++ {
|
|
|
|
|
s.Fixtures.CreateInstanceParams.Name = fmt.Sprintf("test-repo-%v", i)
|
|
|
|
|
instance, err := s.Fixtures.Store.CreateInstance(s.Fixtures.AdminContext, pool.ID, s.Fixtures.CreateInstanceParams)
|
|
|
|
|
if err != nil {
|
|
|
|
|
s.FailNow(fmt.Sprintf("cannot create instance: %s", err))
|
|
|
|
|
}
|
|
|
|
|
poolInstances = append(poolInstances, instance)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
instances, err := s.Runner.ListRepoInstances(s.Fixtures.AdminContext, s.Fixtures.StoreRepos["test-repo-1"].ID)
|
|
|
|
|
|
|
|
|
|
s.Require().Nil(err)
|
2022-12-04 17:30:27 +00:00
|
|
|
garmTesting.EqualDBEntityID(s.T(), poolInstances, instances)
|
2022-09-09 15:53:14 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestListRepoInstancesErrUnauthorized() {
|
|
|
|
|
_, err := s.Runner.ListRepoInstances(context.Background(), "dummy-repo-id")
|
|
|
|
|
|
|
|
|
|
s.Require().Equal(runnerErrors.ErrUnauthorized, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestFindRepoPoolManager() {
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("GetRepoPoolManager", mock.AnythingOfType("params.Repository")).Return(s.Fixtures.PoolMgrMock, nil)
|
|
|
|
|
|
2024-07-29 17:35:57 +00:00
|
|
|
poolManager, err := s.Runner.findRepoPoolManager(s.Fixtures.StoreRepos["test-repo-1"].Owner, s.Fixtures.StoreRepos["test-repo-1"].Name, s.Fixtures.StoreRepos["test-repo-1"].Endpoint.Name)
|
2022-09-09 15:53:14 +03:00
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrMock.AssertExpectations(s.T())
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
|
|
|
|
s.Require().Nil(err)
|
|
|
|
|
s.Require().Equal(s.Fixtures.PoolMgrMock, poolManager)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *RepoTestSuite) TestFindRepoPoolManagerFetchPoolMgrFailed() {
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.On("GetRepoPoolManager", mock.AnythingOfType("params.Repository")).Return(s.Fixtures.PoolMgrMock, s.Fixtures.ErrMock)
|
|
|
|
|
|
2024-07-29 17:35:57 +00:00
|
|
|
_, err := s.Runner.findRepoPoolManager(s.Fixtures.StoreRepos["test-repo-1"].Owner, s.Fixtures.StoreRepos["test-repo-1"].Name, s.Fixtures.StoreRepos["test-repo-1"].Endpoint.Name)
|
2022-09-09 15:53:14 +03:00
|
|
|
|
|
|
|
|
s.Fixtures.PoolMgrMock.AssertExpectations(s.T())
|
|
|
|
|
s.Fixtures.PoolMgrCtrlMock.AssertExpectations(s.T())
|
|
|
|
|
s.Require().Regexp("fetching pool manager for repo", err.Error())
|
|
|
|
|
}
|
2022-09-07 16:30:24 +03:00
|
|
|
|
2022-08-10 14:04:03 +03:00
|
|
|
func TestRepoTestSuite(t *testing.T) {
|
2022-12-04 17:30:27 +00:00
|
|
|
t.Parallel()
|
2022-08-10 14:04:03 +03:00
|
|
|
suite.Run(t, new(RepoTestSuite))
|
|
|
|
|
}
|