Commit f0a64399 authored by Dmitriy Zaporozhets's avatar Dmitriy Zaporozhets

Refactor plugin execution method

Signed-off-by: default avatarDmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
parent 2150b2cd
......@@ -5,7 +5,5 @@ class PluginWorker
def perform(file_name, data)
Gitlab::Plugin.execute(file_name, data)
rescue => e
Rails.logger.error("#{self.class}: #{e.message}")
end
end
......@@ -13,11 +13,20 @@ module Gitlab
end
def self.execute(file, data)
_output, exit_status = Gitlab::Popen.popen([file]) do |stdin|
result = Gitlab::Popen.popen_with_detail([file]) do |stdin|
stdin.write(data.to_json)
end
exit_status = result.status&.exitstatus
unless exit_status.zero?
Rails.logger.error("Plugin Error => #{file}: #{result.stderr}")
end
exit_status.zero?
rescue => e
Rails.logger.error("Plugin Error => #{file}: #{e.message}")
false
end
end
end
......@@ -6,18 +6,33 @@ describe Gitlab::Plugin do
let(:plugin) { Rails.root.join('plugins', 'test.rb') }
let(:tmp_file) { Tempfile.new('plugin-dump') }
let(:plugin_source) do
<<~EOS
#!/usr/bin/env ruby
x = STDIN.read
File.write('#{tmp_file.path}', x)
EOS
end
before do
File.write(plugin, plugin_source)
File.chmod(0o777, plugin)
end
after do
FileUtils.rm(plugin)
tmp_file.close!
end
subject { described_class.execute(plugin.to_s, data) }
context 'successful execution' do
before do
File.chmod(0o777, plugin)
end
after do
tmp_file.close!
end
it { is_expected.to be true }
it 'ensures plugin received data via stdin' do
......@@ -27,13 +42,23 @@ describe Gitlab::Plugin do
end
end
private
context 'non-executable' do
it { is_expected.to be false }
end
def plugin_source
context 'non-zero exit' do
let(:plugin_source) do
<<~EOS
#!/usr/bin/env ruby
x = STDIN.read
File.write('#{tmp_file.path}', x)
exit 1
EOS
end
before do
File.chmod(0o777, plugin)
end
it { is_expected.to be false }
end
end
end
......@@ -15,13 +15,5 @@ describe PluginWorker do
expect(subject.perform(filename, data)).to be_truthy
end
it 'handles exception well' do
data = { 'event_name' => 'project_create' }
allow(Gitlab::Plugin).to receive(:execute).with(filename, data).and_raise('Permission denied')
expect { subject.perform(filename, data) }.not_to raise_error
end
end
end
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment