summaryrefslogtreecommitdiff
path: root/tests/integration/concurrent.rs
diff options
context:
space:
mode:
authorDawid Rycerz <dawid@rycerz.xyz>2026-01-22 22:07:32 +0100
committerDawid Rycerz <dawid@rycerz.xyz>2026-02-10 18:44:26 +0100
commit064a1d01c5c14f5ecc032fa9b8346a4a88b893f6 (patch)
treea2023f9ccd297ed8a41a3a0cc5699c2add09244d /tests/integration/concurrent.rs
witryna 0.1.0 — initial releasev0.1.0
Minimalist Git-based static site deployment orchestrator. Webhook-triggered builds in Podman/Docker containers with atomic symlink publishing, SIGHUP hot-reload, and zero-downtime deploys. See README.md for usage, CHANGELOG.md for details.
Diffstat (limited to 'tests/integration/concurrent.rs')
-rw-r--r--tests/integration/concurrent.rs111
1 files changed, 111 insertions, 0 deletions
diff --git a/tests/integration/concurrent.rs b/tests/integration/concurrent.rs
new file mode 100644
index 0000000..e7f2b64
--- /dev/null
+++ b/tests/integration/concurrent.rs
@@ -0,0 +1,111 @@
+use crate::harness::{SiteBuilder, TestServer, test_config_with_site};
+
+#[tokio::test]
+async fn concurrent_build_gets_queued() {
+ let dir = tempfile::tempdir().unwrap().keep();
+ let site = SiteBuilder::new("my-site", "https://example.com/repo.git", "secret-token").build();
+ let server = TestServer::start(test_config_with_site(dir, site)).await;
+
+ // Pre-inject a build in progress via AppState
+ server
+ .state
+ .build_scheduler
+ .in_progress
+ .insert("my-site".to_owned());
+
+ let resp = TestServer::client()
+ .post(server.url("/my-site"))
+ .header("Authorization", "Bearer secret-token")
+ .send()
+ .await
+ .unwrap();
+
+ assert_eq!(resp.status().as_u16(), 202);
+ let body = resp.text().await.unwrap();
+ let json: serde_json::Value = serde_json::from_str(&body).unwrap();
+ assert_eq!(json["status"], "queued");
+}
+
+#[tokio::test]
+async fn concurrent_build_queue_collapse() {
+ let dir = tempfile::tempdir().unwrap().keep();
+ let site = SiteBuilder::new("my-site", "https://example.com/repo.git", "secret-token").build();
+ let server = TestServer::start(test_config_with_site(dir, site)).await;
+
+ // Pre-inject a build in progress and a queued rebuild
+ server
+ .state
+ .build_scheduler
+ .in_progress
+ .insert("my-site".to_owned());
+ server
+ .state
+ .build_scheduler
+ .queued
+ .insert("my-site".to_owned());
+
+ // Third request should collapse (202, no body)
+ let resp = TestServer::client()
+ .post(server.url("/my-site"))
+ .header("Authorization", "Bearer secret-token")
+ .send()
+ .await
+ .unwrap();
+
+ assert_eq!(resp.status().as_u16(), 202);
+ let body = resp.text().await.unwrap();
+ assert!(body.is_empty());
+}
+
+#[tokio::test]
+async fn concurrent_different_sites_both_accepted() {
+ let dir = tempfile::tempdir().unwrap().keep();
+ let sites = vec![
+ SiteBuilder::new("site-one", "https://example.com/one.git", "token-one").build(),
+ SiteBuilder::new("site-two", "https://example.com/two.git", "token-two").build(),
+ ];
+ let config = crate::harness::test_config_with_sites(dir, sites);
+ let server = TestServer::start(config).await;
+
+ // First site — accepted
+ let resp1 = TestServer::client()
+ .post(server.url("/site-one"))
+ .header("Authorization", "Bearer token-one")
+ .send()
+ .await
+ .unwrap();
+ assert_eq!(resp1.status().as_u16(), 202);
+
+ // Second site — also accepted (different build lock)
+ let resp2 = TestServer::client()
+ .post(server.url("/site-two"))
+ .header("Authorization", "Bearer token-two")
+ .send()
+ .await
+ .unwrap();
+ assert_eq!(resp2.status().as_u16(), 202);
+}
+
+#[tokio::test]
+async fn build_in_progress_checked_after_auth() {
+ let dir = tempfile::tempdir().unwrap().keep();
+ let site = SiteBuilder::new("my-site", "https://example.com/repo.git", "secret-token").build();
+ let server = TestServer::start(test_config_with_site(dir, site)).await;
+
+ // Pre-mark site as building
+ server
+ .state
+ .build_scheduler
+ .in_progress
+ .insert("my-site".to_owned());
+
+ // Request with wrong token should return 401 (auth checked before build status)
+ let resp = TestServer::client()
+ .post(server.url("/my-site"))
+ .header("Authorization", "Bearer wrong-token")
+ .send()
+ .await
+ .unwrap();
+
+ assert_eq!(resp.status().as_u16(), 401);
+}