Add unit tests for scm_request_processor module
Add unit tests for verify_slas method and continue adding tests for create_new_repo method. Signed-off-by: Michal Konečný <mkonecny@redhat.com>
This commit is contained in:
parent
250ba012f0
commit
92497811d2
2 changed files with 459 additions and 46 deletions
|
@ -348,3 +348,421 @@ class TestProcessTicket:
|
|||
mock_new_branch.assert_called_with(
|
||||
issue, content,
|
||||
)
|
||||
|
||||
|
||||
class TestVerifySLAs:
|
||||
"""
|
||||
Test class for `toddlers.plugins.scm_request_processor.SCMRequestProcessor.verify_slas` method.
|
||||
"""
|
||||
|
||||
def setup(self):
|
||||
"""
|
||||
Initialize toddler.
|
||||
"""
|
||||
self.toddler = scm_request_processor.SCMRequestProcessor()
|
||||
self.toddler.pagure_io = Mock()
|
||||
self.toddler.dist_git = Mock()
|
||||
|
||||
def test_verify_slas_not_dict(self):
|
||||
"""
|
||||
Assert that SLA verification will fail if SLA isn't dict.
|
||||
"""
|
||||
sla = []
|
||||
|
||||
with pytest.raises(ValueError, match="The object provided is not a dict"):
|
||||
self.toddler.verify_slas("", sla)
|
||||
|
||||
def test_verify_slas_no_branch(self):
|
||||
"""
|
||||
Assert that the validation will not fail if no branch is provided.
|
||||
This will fail later in create method, but the verification passes.
|
||||
"""
|
||||
sla = {}
|
||||
branch = None
|
||||
|
||||
self.toddler.verify_slas(branch, sla)
|
||||
|
||||
def test_verify_slas_branch_sla_correct(self):
|
||||
"""
|
||||
Assert that the validation will not fail if provided branch SLAs are
|
||||
correct.
|
||||
"""
|
||||
branch = "branch"
|
||||
sla = { "rawhide": "2022-06-01"}
|
||||
|
||||
self.toddler.branch_slas = {
|
||||
branch: {
|
||||
"rawhide": "2022-06-01"
|
||||
}
|
||||
}
|
||||
|
||||
self.toddler.verify_slas(branch, sla)
|
||||
|
||||
def test_verify_slas_branch_sla_incorrect(self):
|
||||
"""
|
||||
Assert that the validation will fail if provided branch SLAs are
|
||||
incorrect.
|
||||
"""
|
||||
branch = "branch"
|
||||
sla = { "rawhide": "2022-01-01"}
|
||||
|
||||
self.toddler.branch_slas = {
|
||||
branch: {
|
||||
"rawhide": "2022-06-01"
|
||||
}
|
||||
}
|
||||
|
||||
error = 'The SLAs for the branch "{0}" are incorrect'.format(branch)
|
||||
|
||||
with pytest.raises(ValidationError, match=error):
|
||||
self.toddler.verify_slas(branch, sla)
|
||||
|
||||
def test_verify_slas_eol_not_string(self):
|
||||
"""
|
||||
Assert that the validation will fail if provided SLA EOL is
|
||||
not string.
|
||||
"""
|
||||
sla = { "rawhide": 100 }
|
||||
|
||||
error = 'The SL\'s EOL is not a string. It was type "{0}"'.format(type(100).__name__)
|
||||
|
||||
with pytest.raises(ValidationError, match=error):
|
||||
self.toddler.verify_slas("", sla)
|
||||
|
||||
def test_verify_slas_eol_invalid_format(self):
|
||||
"""
|
||||
Assert that the validation will fail if provided SLA EOL date is in invalid format.
|
||||
"""
|
||||
sla = { "rawhide": "01-01-2022" }
|
||||
|
||||
error = 'The EOL date "{0}" is in an invalid format'.format("01-01-2022")
|
||||
|
||||
with pytest.raises(ValidationError, match=error):
|
||||
self.toddler.verify_slas("", sla)
|
||||
|
||||
def test_verify_slas_eol_expired(self):
|
||||
"""
|
||||
Assert that the validation will fail if provided SLA EOL date is already expired.
|
||||
"""
|
||||
sla = { "rawhide": "2022-01-01" }
|
||||
|
||||
error = 'The SL "{0}" is already expired'.format("2022-01-01")
|
||||
|
||||
with pytest.raises(ValidationError, match=error):
|
||||
self.toddler.verify_slas("", sla)
|
||||
|
||||
def test_verify_slas_eol_date_invalid(self):
|
||||
"""
|
||||
Assert that the validation will fail if provided SLA EOL date is invalid.
|
||||
"""
|
||||
sla = { "rawhide": "2050-01-01" }
|
||||
|
||||
error = 'The SL "{0}" must expire on June 1st or December 1st'.format("2050-01-01")
|
||||
|
||||
with pytest.raises(ValidationError, match=error):
|
||||
self.toddler.verify_slas("", sla)
|
||||
|
||||
@patch('toddlers.utils.pdc.get_sla')
|
||||
def test_verify_slas_not_in_pdc(self, mock_pdc):
|
||||
"""
|
||||
Assert that the validation will fail if SLA is not in PDC.
|
||||
"""
|
||||
sla = { "rawhide": "2050-06-01" }
|
||||
|
||||
error = 'The SL "{0}" is not in PDC'.format("rawhide")
|
||||
|
||||
mock_pdc.return_value = None
|
||||
|
||||
with pytest.raises(ValidationError, match=error):
|
||||
self.toddler.verify_slas("", sla)
|
||||
|
||||
mock_pdc.assert_called_with("rawhide")
|
||||
|
||||
@patch('toddlers.utils.pdc.get_sla')
|
||||
def test_verify_slas_in_pdc(self, mock_pdc):
|
||||
"""
|
||||
Assert that the validation will pass if SLA is in PDC.
|
||||
"""
|
||||
sla = { "rawhide": "2050-06-01" }
|
||||
|
||||
mock_pdc.return_value = sla
|
||||
|
||||
self.toddler.verify_slas("", sla)
|
||||
|
||||
mock_pdc.assert_called_with("rawhide")
|
||||
|
||||
|
||||
class TestCreateNewRepo:
|
||||
"""
|
||||
Test class for `toddlers.plugins.scm_request_processor.SCMRequestProcessor.create_new_repo` method.
|
||||
"""
|
||||
|
||||
def setup(self):
|
||||
"""
|
||||
Initialize toddler.
|
||||
"""
|
||||
self.toddler = scm_request_processor.SCMRequestProcessor()
|
||||
self.toddler.pagure_io = Mock()
|
||||
self.toddler.dist_git = Mock()
|
||||
|
||||
def test_create_new_repo_missing_required_key(self):
|
||||
"""
|
||||
Assert that ticket will be closed if required key is missing in request.
|
||||
"""
|
||||
issue = {
|
||||
"id": 100,
|
||||
}
|
||||
self.toddler.create_new_repo(issue, {})
|
||||
|
||||
self.toddler.pagure_io.close_issue.assert_called_with(
|
||||
100, namespace=scm_request_processor.PROJECT_NAMESPACE,
|
||||
message="Invalid body, missing required field: repo",
|
||||
reason="Invalid"
|
||||
)
|
||||
|
||||
def test_create_new_repo_invalid_repo_name(self):
|
||||
"""
|
||||
Assert that ticket will be closed if provided repository name is invalid.
|
||||
"""
|
||||
issue = {
|
||||
"id": 100,
|
||||
"user": {
|
||||
"name": "zlopez"
|
||||
}
|
||||
}
|
||||
|
||||
json = {
|
||||
"repo": "+a",
|
||||
"branch": "rawhide",
|
||||
"namespace": "namespace",
|
||||
"bug_id": "123",
|
||||
"action": "new_repo",
|
||||
"sls": {
|
||||
"rawhide": "2050-06-01"
|
||||
},
|
||||
"monitor": "monitor"
|
||||
}
|
||||
|
||||
self.toddler.create_new_repo(issue, json)
|
||||
|
||||
error = ('The repository name is invalid. It must be at least two '
|
||||
'characters long with only letters, numbers, hyphens, '
|
||||
'underscores, plus signs, and/or periods. Please note that '
|
||||
'the project cannot start with a period or a plus sign.')
|
||||
|
||||
self.toddler.pagure_io.close_issue.assert_called_with(
|
||||
100, namespace=scm_request_processor.PROJECT_NAMESPACE,
|
||||
message=error,
|
||||
reason="Invalid"
|
||||
)
|
||||
|
||||
def test_create_new_repo_missing_bug_id(self):
|
||||
"""
|
||||
Assert that ticket will be closed if Bugzilla bug id is not provided.
|
||||
"""
|
||||
issue = {
|
||||
"id": 100,
|
||||
"user": {
|
||||
"name": "zlopez"
|
||||
}
|
||||
}
|
||||
|
||||
json = {
|
||||
"repo": "repo",
|
||||
"branch": "rawhide",
|
||||
"namespace": "namespace",
|
||||
"bug_id": "",
|
||||
"action": "new_repo",
|
||||
"sls": {
|
||||
"rawhide": "2050-06-01"
|
||||
},
|
||||
"monitor": "monitor"
|
||||
}
|
||||
|
||||
self.toddler.create_new_repo(issue, json)
|
||||
|
||||
self.toddler.pagure_io.close_issue.assert_called_with(
|
||||
100, namespace=scm_request_processor.PROJECT_NAMESPACE,
|
||||
message="An invalid Bugzilla bug was provided",
|
||||
reason="Invalid"
|
||||
)
|
||||
|
||||
@patch("toddlers.plugins.scm_request_processor.SCMRequestProcessor.validate_review_bug")
|
||||
def test_create_new_repo_invalid_review_bug(self, mock_validate_review_bug):
|
||||
"""
|
||||
Assert that ticket will be closed if Bugzilla bug is not valid.
|
||||
"""
|
||||
issue = {
|
||||
"id": 100,
|
||||
"user": {
|
||||
"name": "zlopez"
|
||||
}
|
||||
}
|
||||
|
||||
json = {
|
||||
"repo": "repo",
|
||||
"branch": "rawhide",
|
||||
"namespace": "namespace",
|
||||
"bug_id": "123",
|
||||
"action": "new_repo",
|
||||
"sls": {
|
||||
"rawhide": "2050-06-01"
|
||||
},
|
||||
"monitor": "monitor"
|
||||
}
|
||||
|
||||
mock_validate_review_bug.side_effect = ValidationError("error")
|
||||
|
||||
self.toddler.create_new_repo(issue, json)
|
||||
|
||||
mock_validate_review_bug.assert_called_with(
|
||||
"123", "repo", "rawhide",
|
||||
namespace="namespace", pagure_user="zlopez"
|
||||
)
|
||||
|
||||
self.toddler.pagure_io.close_issue.assert_called_with(
|
||||
100, namespace=scm_request_processor.PROJECT_NAMESPACE,
|
||||
message="error",
|
||||
reason="Invalid"
|
||||
)
|
||||
|
||||
@patch("toddlers.plugins.scm_request_processor.SCMRequestProcessor.valid_epel_package")
|
||||
def test_create_new_repo_invalid_epel(self, mock_valid_epel_package):
|
||||
"""
|
||||
Assert that ticket will be closed if repo is invalid EPEL repo.
|
||||
"""
|
||||
issue = {
|
||||
"id": 100,
|
||||
"user": {
|
||||
"name": "zlopez"
|
||||
}
|
||||
}
|
||||
|
||||
repo = "repo"
|
||||
branch = "epel8"
|
||||
namespace = "rpms"
|
||||
bug_id = "123"
|
||||
action = "new_repo"
|
||||
sls = {
|
||||
"rawhide": "2050-06-01"
|
||||
}
|
||||
monitor = "monitor"
|
||||
exception = True
|
||||
json = {
|
||||
"repo": repo,
|
||||
"branch": branch,
|
||||
"namespace": namespace,
|
||||
"bug_id": bug_id,
|
||||
"action": action,
|
||||
"sls": sls,
|
||||
"monitor": monitor,
|
||||
"exception": exception
|
||||
}
|
||||
|
||||
mock_valid_epel_package.return_value = False
|
||||
|
||||
self.toddler.create_new_repo(issue, json)
|
||||
|
||||
mock_valid_epel_package.assert_called_with(
|
||||
repo, branch
|
||||
)
|
||||
|
||||
self.toddler.pagure_io.close_issue.assert_called_with(
|
||||
100, namespace=scm_request_processor.PROJECT_NAMESPACE,
|
||||
message=scm_request_processor.INVALID_EPEL_ERROR,
|
||||
reason="Invalid"
|
||||
)
|
||||
|
||||
def test_create_new_repo_requester_not_in_dist_git(self):
|
||||
"""
|
||||
Assert that ticket will be commented on when requester doesn't have a valid dist git account.
|
||||
"""
|
||||
issue = {
|
||||
"id": 100,
|
||||
"user": {
|
||||
"name": "zlopez"
|
||||
}
|
||||
}
|
||||
|
||||
repo = "repo"
|
||||
branch = "rawhide"
|
||||
namespace = "rpms"
|
||||
bug_id = "123"
|
||||
action = "new_repo"
|
||||
sls = {
|
||||
"rawhide": "2050-06-01"
|
||||
}
|
||||
monitor = "monitor"
|
||||
exception = True
|
||||
json = {
|
||||
"repo": repo,
|
||||
"branch": branch,
|
||||
"namespace": namespace,
|
||||
"bug_id": bug_id,
|
||||
"action": action,
|
||||
"sls": sls,
|
||||
"monitor": monitor,
|
||||
"exception": exception
|
||||
}
|
||||
|
||||
self.toddler.dist_git.user_exists.return_value = False
|
||||
self.toddler.dist_git._pagure_url = "https://src.fedoraproject.org"
|
||||
|
||||
self.toddler.create_new_repo(issue, json)
|
||||
|
||||
self.toddler.dist_git.user_exists.assert_called_with(
|
||||
"zlopez"
|
||||
)
|
||||
|
||||
message = "@zlopez needs to login to {0} to sync accounts before we can proceed.".format(self.toddler.dist_git._pagure_url)
|
||||
|
||||
self.toddler.pagure_io.add_comment_to_issue.assert_called_with(
|
||||
100, namespace=scm_request_processor.PROJECT_NAMESPACE,
|
||||
comment=message,
|
||||
)
|
||||
|
||||
def test_create_new_repo_project_exists(self):
|
||||
"""
|
||||
Assert that ticket will be closed when repo already exists in dist git.
|
||||
"""
|
||||
issue = {
|
||||
"id": 100,
|
||||
"user": {
|
||||
"name": "zlopez"
|
||||
}
|
||||
}
|
||||
|
||||
repo = "repo"
|
||||
branch = "rawhide"
|
||||
namespace = "rpms"
|
||||
bug_id = "123"
|
||||
action = "new_repo"
|
||||
sls = {
|
||||
"rawhide": "2050-06-01"
|
||||
}
|
||||
monitor = "monitor"
|
||||
exception = True
|
||||
json = {
|
||||
"repo": repo,
|
||||
"branch": branch,
|
||||
"namespace": namespace,
|
||||
"bug_id": bug_id,
|
||||
"action": action,
|
||||
"sls": sls,
|
||||
"monitor": monitor,
|
||||
"exception": exception
|
||||
}
|
||||
|
||||
self.toddler.dist_git.get_project.return_value = "project"
|
||||
|
||||
self.toddler.create_new_repo(issue, json)
|
||||
|
||||
self.toddler.dist_git.get_project.assert_called_with(
|
||||
namespace, repo
|
||||
)
|
||||
|
||||
self.toddler.pagure_io.close_issue.assert_called_with(
|
||||
100, namespace=scm_request_processor.PROJECT_NAMESPACE,
|
||||
message="The Pagure project already exists",
|
||||
reason="Invalid"
|
||||
)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue