Skip to content
代码片段 群组 项目
提交 e6a93cc6 编辑于 作者: Shinya Maeda's avatar Shinya Maeda
浏览文件

Support Cluster Agent ID in Environment Update mutation

This commit allows users to set Cluster Agent ID to
an existing environment.

Changelog: added
上级 8cf6d634
No related branches found
No related tags found
无相关合并请求
...@@ -23,6 +23,11 @@ class Update < ::Mutations::BaseMutation ...@@ -23,6 +23,11 @@ class Update < ::Mutations::BaseMutation
required: false, required: false,
description: 'Tier of the environment.' description: 'Tier of the environment.'
argument :cluster_agent_id,
::Types::GlobalIDType[::Clusters::Agent],
required: false,
description: 'Cluster agent of the environment.'
field :environment, field :environment,
Types::EnvironmentType, Types::EnvironmentType,
null: true, null: true,
...@@ -31,6 +36,8 @@ class Update < ::Mutations::BaseMutation ...@@ -31,6 +36,8 @@ class Update < ::Mutations::BaseMutation
def resolve(id:, **kwargs) def resolve(id:, **kwargs)
environment = authorized_find!(id: id) environment = authorized_find!(id: id)
convert_cluster_agent_id(kwargs)
response = ::Environments::UpdateService.new(environment.project, current_user, kwargs).execute(environment) response = ::Environments::UpdateService.new(environment.project, current_user, kwargs).execute(environment)
if response.success? if response.success?
...@@ -39,6 +46,16 @@ def resolve(id:, **kwargs) ...@@ -39,6 +46,16 @@ def resolve(id:, **kwargs)
{ environment: response.payload[:environment], errors: response.errors } { environment: response.payload[:environment], errors: response.errors }
end end
end end
private
def convert_cluster_agent_id(kwargs)
return unless kwargs.key?(:cluster_agent_id)
kwargs[:cluster_agent] = if kwargs[:cluster_agent_id]
::Clusters::Agent.find_by_id(kwargs[:cluster_agent_id].model_id)
end
end
end end
end end
end end
...@@ -2,6 +2,8 @@ ...@@ -2,6 +2,8 @@
module Environments module Environments
class UpdateService < BaseService class UpdateService < BaseService
ALLOWED_ATTRIBUTES = %i[external_url tier cluster_agent].freeze
def execute(environment) def execute(environment)
unless can?(current_user, :update_environment, environment) unless can?(current_user, :update_environment, environment)
return ServiceResponse.error( return ServiceResponse.error(
...@@ -10,7 +12,13 @@ def execute(environment) ...@@ -10,7 +12,13 @@ def execute(environment)
) )
end end
if environment.update(**params) if unauthorized_cluster_agent?
return ServiceResponse.error(
message: _('Unauthorized to access the cluster agent in this project'),
payload: { environment: environment })
end
if environment.update(**params.slice(*ALLOWED_ATTRIBUTES))
ServiceResponse.success(payload: { environment: environment }) ServiceResponse.success(payload: { environment: environment })
else else
ServiceResponse.error( ServiceResponse.error(
...@@ -19,5 +27,16 @@ def execute(environment) ...@@ -19,5 +27,16 @@ def execute(environment)
) )
end end
end end
private
def unauthorized_cluster_agent?
return false unless params[:cluster_agent]
::Clusters::Agents::Authorizations::UserAccess::Finder
.new(current_user, agent: params[:cluster_agent], project: project)
.execute
.empty?
end
end end
end end
...@@ -3141,6 +3141,7 @@ Input type: `EnvironmentUpdateInput` ...@@ -3141,6 +3141,7 @@ Input type: `EnvironmentUpdateInput`
| Name | Type | Description | | Name | Type | Description |
| ---- | ---- | ----------- | | ---- | ---- | ----------- |
| <a id="mutationenvironmentupdateclientmutationid"></a>`clientMutationId` | [`String`](#string) | A unique identifier for the client performing the mutation. | | <a id="mutationenvironmentupdateclientmutationid"></a>`clientMutationId` | [`String`](#string) | A unique identifier for the client performing the mutation. |
| <a id="mutationenvironmentupdateclusteragentid"></a>`clusterAgentId` | [`ClustersAgentID`](#clustersagentid) | Cluster agent of the environment. |
| <a id="mutationenvironmentupdateexternalurl"></a>`externalUrl` | [`String`](#string) | External URL of the environment. | | <a id="mutationenvironmentupdateexternalurl"></a>`externalUrl` | [`String`](#string) | External URL of the environment. |
| <a id="mutationenvironmentupdateid"></a>`id` | [`EnvironmentID!`](#environmentid) | Global ID of the environment to update. | | <a id="mutationenvironmentupdateid"></a>`id` | [`EnvironmentID!`](#environmentid) | Global ID of the environment to update. |
| <a id="mutationenvironmentupdatetier"></a>`tier` | [`DeploymentTier`](#deploymenttier) | Tier of the environment. | | <a id="mutationenvironmentupdatetier"></a>`tier` | [`DeploymentTier`](#deploymenttier) | Tier of the environment. |
...@@ -47928,6 +47928,9 @@ msgstr "" ...@@ -47928,6 +47928,9 @@ msgstr ""
msgid "Unauthenticated web rate limit period in seconds" msgid "Unauthenticated web rate limit period in seconds"
msgstr "" msgstr ""
   
msgid "Unauthorized to access the cluster agent in this project"
msgstr ""
msgid "Unauthorized to create an environment" msgid "Unauthorized to create an environment"
msgstr "" msgstr ""
   
...@@ -18,10 +18,10 @@ ...@@ -18,10 +18,10 @@
end end
describe '#resolve' do describe '#resolve' do
subject { mutation.resolve(id: environment_id, external_url: external_url) } subject { mutation.resolve(id: environment_id, **kwargs) }
let(:environment_id) { environment.to_global_id } let(:environment_id) { environment.to_global_id }
let(:external_url) { 'https://gitlab.com/' } let(:kwargs) { { external_url: 'https://gitlab.com/' } }
context 'when service execution succeeded' do context 'when service execution succeeded' do
it 'returns no errors' do it 'returns no errors' do
...@@ -29,12 +29,12 @@ ...@@ -29,12 +29,12 @@
end end
it 'updates the environment' do it 'updates the environment' do
expect(subject[:environment][:external_url]).to eq(external_url) expect(subject[:environment][:external_url]).to eq('https://gitlab.com/')
end end
end end
context 'when service cannot update the attribute' do context 'when service cannot update the attribute' do
let(:external_url) { 'http://${URL}' } let(:kwargs) { { external_url: 'http://${URL}' } }
it 'returns an error' do it 'returns an error' do
expect(subject) expect(subject)
...@@ -45,6 +45,46 @@ ...@@ -45,6 +45,46 @@
end end
end end
context 'when setting cluster agent ID to the environment' do
let_it_be(:cluster_agent) { create(:cluster_agent, project: project) }
let!(:authorization) { create(:agent_user_access_project_authorization, project: project, agent: cluster_agent) }
let(:kwargs) { { cluster_agent_id: cluster_agent.to_global_id } }
it 'sets the cluster agent to the environment' do
expect(subject[:environment].cluster_agent).to eq(cluster_agent)
end
end
context 'when unsetting cluster agent ID to the environment' do
let_it_be(:cluster_agent) { create(:cluster_agent, project: project) }
let(:kwargs) { { cluster_agent_id: nil } }
before do
environment.update!(cluster_agent: cluster_agent)
end
it 'removes the cluster agent from the environment' do
expect(subject[:environment].cluster_agent).to be_nil
end
end
context 'when the cluster agent is not updated' do
let_it_be(:cluster_agent) { create(:cluster_agent, project: project) }
let(:kwargs) { { external_url: 'https://dev.gitlab.com/' } }
before do
environment.update!(cluster_agent: cluster_agent)
end
it 'does not change the environment cluster agent' do
expect(subject[:environment].cluster_agent).to eq(cluster_agent)
end
end
context 'when user is reporter who does not have permission to access the environment' do context 'when user is reporter who does not have permission to access the environment' do
let(:user) { reporter } let(:user) { reporter }
......
...@@ -28,6 +28,50 @@ ...@@ -28,6 +28,50 @@
expect(response.payload[:environment]).to eq(environment) expect(response.payload[:environment]).to eq(environment)
end end
context 'when setting a cluster agent to the environment' do
let_it_be(:agent_management_project) { create(:project) }
let_it_be(:cluster_agent) { create(:cluster_agent, project: agent_management_project) }
let!(:authorization) { create(:agent_user_access_project_authorization, project: project, agent: cluster_agent) }
let(:params) { { cluster_agent: cluster_agent } }
it 'returns successful response' do
response = subject
expect(response).to be_success
expect(response.payload[:environment].cluster_agent).to eq(cluster_agent)
end
context 'when user does not have permission to read the agent' do
let!(:authorization) { nil }
it 'returns an error' do
response = subject
expect(response).to be_error
expect(response.message).to eq('Unauthorized to access the cluster agent in this project')
expect(response.payload[:environment]).to eq(environment)
end
end
end
context 'when unsetting a cluster agent of the environment' do
let_it_be(:cluster_agent) { create(:cluster_agent, project: project) }
let(:params) { { cluster_agent: nil } }
before do
environment.update!(cluster_agent: cluster_agent)
end
it 'returns successful response' do
response = subject
expect(response).to be_success
expect(response.payload[:environment].cluster_agent).to be_nil
end
end
context 'when params contain invalid value' do context 'when params contain invalid value' do
let(:params) { { external_url: 'http://${URL}' } } let(:params) { { external_url: 'http://${URL}' } }
...@@ -40,6 +84,18 @@ ...@@ -40,6 +84,18 @@
end end
end end
context 'when disallowed parameter is passed' do
let(:params) { { external_url: 'https://gitlab.com/', slug: 'prod' } }
it 'ignores the parameter' do
response = subject
expect(response).to be_success
expect(response.payload[:environment].external_url).to eq('https://gitlab.com/')
expect(response.payload[:environment].slug).not_to eq('prod')
end
end
context 'when user is reporter' do context 'when user is reporter' do
let(:current_user) { reporter } let(:current_user) { reporter }
......
0% 加载中 .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册