Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
1af0af60
Commit
1af0af60
authored
May 26, 2021
by
Erick Bajao
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Sync coverage project approval rule to MR
parent
4cb0e362
Changes
4
Show whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
60 additions
and
58 deletions
+60
-58
ee/app/models/approval_merge_request_rule.rb
ee/app/models/approval_merge_request_rule.rb
+3
-1
ee/app/models/concerns/approval_rule_like.rb
ee/app/models/concerns/approval_rule_like.rb
+3
-1
ee/spec/factories/approval_rules.rb
ee/spec/factories/approval_rules.rb
+15
-0
ee/spec/services/merge_requests/sync_report_approver_approval_rules_spec.rb
...erge_requests/sync_report_approver_approval_rules_spec.rb
+39
-56
No files found.
ee/app/models/approval_merge_request_rule.rb
View file @
1af0af60
...
@@ -56,11 +56,13 @@ class ApprovalMergeRequestRule < ApplicationRecord
...
@@ -56,11 +56,13 @@ class ApprovalMergeRequestRule < ApplicationRecord
enum
report_type:
{
enum
report_type:
{
vulnerability:
1
,
vulnerability:
1
,
license_scanning:
2
license_scanning:
2
,
code_coverage:
3
}
}
scope
:vulnerability_report
,
->
{
report_approver
.
vulnerability
}
scope
:vulnerability_report
,
->
{
report_approver
.
vulnerability
}
scope
:license_compliance
,
->
{
report_approver
.
license_scanning
}
scope
:license_compliance
,
->
{
report_approver
.
license_scanning
}
scope
:coverage
,
->
{
report_approver
.
code_coverage
}
scope
:with_head_pipeline
,
->
{
includes
(
merge_request:
[
:head_pipeline
])
}
scope
:with_head_pipeline
,
->
{
includes
(
merge_request:
[
:head_pipeline
])
}
scope
:open_merge_requests
,
->
{
merge
(
MergeRequest
.
opened
)
}
scope
:open_merge_requests
,
->
{
merge
(
MergeRequest
.
opened
)
}
scope
:for_checks_that_can_be_refreshed
,
->
{
license_compliance
.
open_merge_requests
.
with_head_pipeline
}
scope
:for_checks_that_can_be_refreshed
,
->
{
license_compliance
.
open_merge_requests
.
with_head_pipeline
}
...
...
ee/app/models/concerns/approval_rule_like.rb
View file @
1af0af60
...
@@ -6,9 +6,11 @@ module ApprovalRuleLike
...
@@ -6,9 +6,11 @@ module ApprovalRuleLike
DEFAULT_NAME
=
'Default'
DEFAULT_NAME
=
'Default'
DEFAULT_NAME_FOR_LICENSE_REPORT
=
'License-Check'
DEFAULT_NAME_FOR_LICENSE_REPORT
=
'License-Check'
DEFAULT_NAME_FOR_VULNERABILITY_REPORT
=
'Vulnerability-Check'
DEFAULT_NAME_FOR_VULNERABILITY_REPORT
=
'Vulnerability-Check'
DEFAULT_NAME_FOR_COVERAGE
=
'Coverage-Check'
REPORT_TYPES_BY_DEFAULT_NAME
=
{
REPORT_TYPES_BY_DEFAULT_NAME
=
{
DEFAULT_NAME_FOR_LICENSE_REPORT
=>
:license_scanning
,
DEFAULT_NAME_FOR_LICENSE_REPORT
=>
:license_scanning
,
DEFAULT_NAME_FOR_VULNERABILITY_REPORT
=>
:vulnerability
DEFAULT_NAME_FOR_VULNERABILITY_REPORT
=>
:vulnerability
,
DEFAULT_NAME_FOR_COVERAGE
=>
:code_coverage
}.
freeze
}.
freeze
APPROVALS_REQUIRED_MAX
=
100
APPROVALS_REQUIRED_MAX
=
100
ALL_MEMBERS
=
'All Members'
ALL_MEMBERS
=
'All Members'
...
...
ee/spec/factories/approval_rules.rb
View file @
1af0af60
...
@@ -28,10 +28,20 @@ FactoryBot.define do
...
@@ -28,10 +28,20 @@ FactoryBot.define do
approvals_required
{
rand
(
1
..
ApprovalProjectRule
::
APPROVALS_REQUIRED_MAX
)
}
approvals_required
{
rand
(
1
..
ApprovalProjectRule
::
APPROVALS_REQUIRED_MAX
)
}
end
end
trait
:vulnerability
do
name
{
ApprovalRuleLike
::
DEFAULT_NAME_FOR_VULNERABILITY_REPORT
}
report_type
{
:vulnerability
}
end
trait
:license_scanning
do
trait
:license_scanning
do
name
{
ApprovalRuleLike
::
DEFAULT_NAME_FOR_LICENSE_REPORT
}
name
{
ApprovalRuleLike
::
DEFAULT_NAME_FOR_LICENSE_REPORT
}
report_type
{
:license_scanning
}
report_type
{
:license_scanning
}
end
end
trait
:code_coverage
do
name
{
ApprovalRuleLike
::
DEFAULT_NAME_FOR_COVERAGE
}
report_type
{
:code_coverage
}
end
end
end
factory
:any_approver_rule
,
parent: :approval_merge_request_rule
do
factory
:any_approver_rule
,
parent: :approval_merge_request_rule
do
...
@@ -61,5 +71,10 @@ FactoryBot.define do
...
@@ -61,5 +71,10 @@ FactoryBot.define do
name
{
ApprovalRuleLike
::
DEFAULT_NAME_FOR_LICENSE_REPORT
}
name
{
ApprovalRuleLike
::
DEFAULT_NAME_FOR_LICENSE_REPORT
}
rule_type
{
:report_approver
}
rule_type
{
:report_approver
}
end
end
trait
:code_coverage
do
name
{
ApprovalRuleLike
::
DEFAULT_NAME_FOR_COVERAGE
}
rule_type
{
:report_approver
}
end
end
end
end
end
ee/spec/services/merge_requests/sync_report_approver_approval_rules_spec.rb
View file @
1af0af60
...
@@ -12,87 +12,64 @@ RSpec.describe MergeRequests::SyncReportApproverApprovalRules do
...
@@ -12,87 +12,64 @@ RSpec.describe MergeRequests::SyncReportApproverApprovalRules do
stub_licensed_features
(
report_approver_rules:
true
)
stub_licensed_features
(
report_approver_rules:
true
)
end
end
context
"when a project has a single `
#{
ApprovalProjectRule
::
DEFAULT_NAME_FOR_VULNERABILITY_REPORT
}
` approval rule"
do
ApprovalRuleLike
::
REPORT_TYPES_BY_DEFAULT_NAME
.
keys
.
each
do
|
default_name
|
let!
(
:vulnerability_approval_project_rule
)
{
create
(
:approval_project_rule
,
:vulnerability_report
,
project:
merge_request
.
target_project
,
approvals_required:
2
)
}
context
"when a project has a single `
#{
default_name
}
` approval rule"
do
let
(
:report_type
)
{
ApprovalRuleLike
::
REPORT_TYPES_BY_DEFAULT_NAME
[
default_name
]
}
context
'when report_approver_rules are enabled'
do
let!
(
:report_approval_project_rule
)
{
create
(
:approval_project_rule
,
report_type
,
project:
merge_request
.
target_project
,
approvals_required:
2
)
}
let!
(
:regular_approval_project_rule
)
{
create
(
:approval_project_rule
,
project:
merge_request
.
target_project
)
}
let!
(
:regular_approval_project_rule
)
{
create
(
:approval_project_rule
,
project:
merge_request
.
target_project
)
}
context
'when report_approver_rules are enabled'
do
it
'creates rule for report approvers'
do
it
'creates rule for report approvers'
do
expect
{
service
.
execute
}
expect
{
service
.
execute
}
.
to
change
{
merge_request
.
approval_rules
.
vulnerability_report
.
count
}.
from
(
0
).
to
(
1
)
.
to
change
{
merge_request
.
approval_rules
.
where
(
name:
default_name
)
.
count
}.
from
(
0
).
to
(
1
)
rule
=
merge_request
.
approval_rules
.
vulnerability_report
.
first
rule
=
merge_request
.
approval_rules
.
find_by
(
name:
default_name
)
expect
(
rule
).
to
be_report_approver
expect
(
rule
).
to
be_report_approver
expect
(
rule
.
report_type
).
to
eq
'vulnerability'
expect
(
rule
.
report_type
).
to
eq
(
report_type
.
to_s
)
expect
(
rule
.
name
).
to
eq
(
vulnerability_approval_project_rule
.
name
)
expect
(
rule
.
name
).
to
eq
(
report_approval_project_rule
.
name
)
expect
(
rule
.
approval_project_rule
).
to
eq
(
vulnerability_approval_project_rule
)
expect
(
rule
.
approvals_required
).
to
eq
(
report_approval_project_rule
.
approvals_required
)
expect
(
rule
.
approval_project_rule
).
to
eq
(
report_approval_project_rule
)
end
end
it
'updates previous rules
if defined'
do
it
'updates previous report approval rule
if defined'
do
mr_rule
=
create
(
:report_approver_rul
e
,
merge_request:
merge_request
,
approvals_required:
0
)
previous_rule
=
create
(
:report_approver_rule
,
report_typ
e
,
merge_request:
merge_request
,
approvals_required:
0
)
expect
{
service
.
execute
}
expect
{
service
.
execute
}
.
not_to
change
{
merge_request
.
approval_rules
.
vulnerability_report
.
count
}
.
not_to
change
{
merge_request
.
approval_rules
.
where
(
name:
default_name
)
.
count
}
expect
(
mr_rule
.
reload
).
to
be_report_approver
expect
(
previous_rule
.
reload
).
to
be_report_approver
expect
(
mr_rule
.
report_type
).
to
eq
'vulnerability'
expect
(
previous_rule
.
report_type
).
to
eq
(
report_type
.
to_s
)
expect
(
mr_rule
.
name
).
to
eq
(
vulnerability_approval_project_rule
.
name
)
expect
(
previous_rule
.
name
).
to
eq
(
report_approval_project_rule
.
name
)
expect
(
mr_rule
.
approvals_required
).
to
eq
vulnerability_approval_project_rule
.
approvals_required
expect
(
previous_rule
.
approvals_required
).
to
eq
(
report_approval_project_rule
.
approvals_required
)
expect
(
mr_rule
.
approval_project_rule
).
to
eq
(
vulnerability_approval_project_rule
)
expect
(
previous_rule
.
approval_project_rule
).
to
eq
(
report_approval_project_rule
)
end
end
end
end
context
"when a project has a single `
#{
ApprovalProjectRule
::
DEFAULT_NAME_FOR_LICENSE_REPORT
}
` approval rule"
do
let!
(
:project_rule
)
{
create
(
:approval_project_rule
,
:license_scanning
,
project:
merge_request
.
target_project
)
}
context
"when the rule has not been synchronized to the merge request yet"
do
let
(
:result
)
{
merge_request
.
reload
.
approval_rules
.
last
}
before
do
service
.
execute
end
end
specify
{
expect
(
merge_request
.
reload
.
approval_rules
.
count
).
to
be
(
1
)
}
specify
{
expect
(
result
).
to
be_report_approver
}
specify
{
expect
(
result
.
report_type
).
to
eq
(
'license_scanning'
)
}
specify
{
expect
(
result
.
name
).
to
eq
(
project_rule
.
name
)
}
specify
{
expect
(
result
.
approval_project_rule
).
to
eq
(
project_rule
)
}
specify
{
expect
(
result
.
approvals_required
).
to
eql
(
project_rule
.
approvals_required
)
}
end
context
"when the rule had previously been synchronized"
do
let!
(
:previous_rule
)
{
create
(
:report_approver_rule
,
:license_scanning
,
merge_request:
merge_request
)
}
before
do
service
.
execute
end
specify
{
expect
(
merge_request
.
reload
.
approval_rules
.
count
).
to
be
(
1
)
}
specify
{
expect
(
merge_request
.
reload
.
approval_rules
[
0
]).
to
eql
(
previous_rule
)
}
end
end
end
end
context
"when a project has multiple report approval rules"
do
context
"when a project has multiple report approval rules"
do
let!
(
:vulnerability_project_rule
)
{
create
(
:approval_project_rule
,
:vulnerability_report
,
project:
merge_request
.
target_project
)
}
let!
(
:vulnerability_project_rule
)
{
create
(
:approval_project_rule
,
:vulnerability_report
,
project:
merge_request
.
target_project
)
}
let!
(
:license_compliance_project_rule
)
{
create
(
:approval_project_rule
,
:license_scanning
,
project:
merge_request
.
target_project
)
}
let!
(
:license_compliance_project_rule
)
{
create
(
:approval_project_rule
,
:license_scanning
,
project:
merge_request
.
target_project
)
}
let!
(
:coverage_project_rule
)
{
create
(
:approval_project_rule
,
:code_coverage
,
project:
merge_request
.
target_project
)
}
context
"when none of the rules have been synchronized to the merge request yet"
do
context
"when none of the rules have been synchronized to the merge request yet"
do
let
(
:vulnerability_check_rule
)
{
merge_request
.
reload
.
approval_rules
.
vulnerability_report
.
last
}
let
(
:vulnerability_check_rule
)
{
merge_request
.
reload
.
approval_rules
.
vulnerability_report
.
last
}
let
(
:license_check_rule
)
{
merge_request
.
reload
.
approval_rules
.
find_by
(
name:
ApprovalProjectRule
::
DEFAULT_NAME_FOR_LICENSE_REPORT
)
}
let
(
:license_check_rule
)
{
merge_request
.
reload
.
approval_rules
.
license_compliance
.
last
}
let
(
:coverage_check_rule
)
{
merge_request
.
reload
.
approval_rules
.
coverage
.
last
}
before
do
before
do
vulnerability_project_rule
.
users
<<
create
(
:user
)
vulnerability_project_rule
.
users
<<
create
(
:user
)
vulnerability_project_rule
.
groups
<<
create
(
:group
)
vulnerability_project_rule
.
groups
<<
create
(
:group
)
license_compliance_project_rule
.
users
<<
create
(
:user
)
license_compliance_project_rule
.
users
<<
create
(
:user
)
license_compliance_project_rule
.
groups
<<
create
(
:group
)
license_compliance_project_rule
.
groups
<<
create
(
:group
)
coverage_project_rule
.
users
<<
create
(
:user
)
coverage_project_rule
.
groups
<<
create
(
:group
)
service
.
execute
service
.
execute
end
end
specify
{
expect
(
merge_request
.
reload
.
approval_rules
.
count
).
to
be
(
2
)
}
specify
{
expect
(
merge_request
.
reload
.
approval_rules
.
count
).
to
be
(
3
)
}
specify
{
expect
(
vulnerability_check_rule
).
to
be_report_approver
}
specify
{
expect
(
vulnerability_check_rule
).
to
be_report_approver
}
specify
{
expect
(
vulnerability_check_rule
.
approvals_required
).
to
eql
(
vulnerability_project_rule
.
approvals_required
)
}
specify
{
expect
(
vulnerability_check_rule
.
approvals_required
).
to
eql
(
vulnerability_project_rule
.
approvals_required
)
}
specify
{
expect
(
vulnerability_check_rule
).
to
be_vulnerability
}
specify
{
expect
(
vulnerability_check_rule
).
to
be_vulnerability
}
...
@@ -103,6 +80,11 @@ RSpec.describe MergeRequests::SyncReportApproverApprovalRules do
...
@@ -103,6 +80,11 @@ RSpec.describe MergeRequests::SyncReportApproverApprovalRules do
specify
{
expect
(
license_check_rule
).
to
be_license_scanning
}
specify
{
expect
(
license_check_rule
).
to
be_license_scanning
}
specify
{
expect
(
license_check_rule
.
name
).
to
eq
(
license_compliance_project_rule
.
name
)
}
specify
{
expect
(
license_check_rule
.
name
).
to
eq
(
license_compliance_project_rule
.
name
)
}
specify
{
expect
(
license_check_rule
.
approval_project_rule
).
to
eq
(
license_compliance_project_rule
)
}
specify
{
expect
(
license_check_rule
.
approval_project_rule
).
to
eq
(
license_compliance_project_rule
)
}
specify
{
expect
(
coverage_check_rule
).
to
be_report_approver
}
specify
{
expect
(
coverage_check_rule
.
approvals_required
).
to
eql
(
coverage_project_rule
.
approvals_required
)
}
specify
{
expect
(
coverage_check_rule
).
to
be_code_coverage
}
specify
{
expect
(
coverage_check_rule
.
name
).
to
eq
(
coverage_project_rule
.
name
)
}
specify
{
expect
(
coverage_check_rule
.
approval_project_rule
).
to
eq
(
coverage_project_rule
)
}
end
end
context
"when some of the rules have been synchronized to the merge request"
do
context
"when some of the rules have been synchronized to the merge request"
do
...
@@ -112,9 +94,10 @@ RSpec.describe MergeRequests::SyncReportApproverApprovalRules do
...
@@ -112,9 +94,10 @@ RSpec.describe MergeRequests::SyncReportApproverApprovalRules do
service
.
execute
service
.
execute
end
end
specify
{
expect
(
merge_request
.
reload
.
approval_rules
.
count
).
to
be
(
2
)
}
specify
{
expect
(
merge_request
.
reload
.
approval_rules
.
count
).
to
be
(
3
)
}
specify
{
expect
(
merge_request
.
reload
.
approval_rules
.
vulnerability_report
.
count
).
to
be
(
1
)
}
specify
{
expect
(
merge_request
.
reload
.
approval_rules
.
vulnerability_report
.
count
).
to
be
(
1
)
}
specify
{
expect
(
merge_request
.
reload
.
approval_rules
.
where
(
report_type: :license_scanning
)).
to
match_array
([
previous_rule
])
}
specify
{
expect
(
merge_request
.
reload
.
approval_rules
.
coverage
.
count
).
to
be
(
1
)
}
specify
{
expect
(
merge_request
.
reload
.
approval_rules
.
license_compliance
).
to
match_array
([
previous_rule
])
}
end
end
end
end
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment