diff options
Diffstat (limited to 'spec/requests/api/internal/error_tracking_spec.rb')
-rw-r--r-- | spec/requests/api/internal/error_tracking_spec.rb | 108 |
1 files changed, 108 insertions, 0 deletions
diff --git a/spec/requests/api/internal/error_tracking_spec.rb b/spec/requests/api/internal/error_tracking_spec.rb new file mode 100644 index 00000000000..69eb54d5ed2 --- /dev/null +++ b/spec/requests/api/internal/error_tracking_spec.rb @@ -0,0 +1,108 @@ +# frozen_string_literal: true + +require 'spec_helper' + +RSpec.describe API::Internal::ErrorTracking do + let(:secret_token) { Gitlab::CurrentSettings.error_tracking_access_token } + let(:headers) do + { ::API::Internal::ErrorTracking::GITLAB_ERROR_TRACKING_TOKEN_HEADER => Base64.encode64(secret_token) } + end + + describe 'GET /internal/error_tracking/allowed' do + let_it_be(:project) { create(:project) } + + let(:params) { { project_id: project.id, public_key: 'key' } } + + subject(:send_request) do + post api('/internal/error_tracking/allowed'), params: params, headers: headers + end + + before do + # Because the feature flag is disabled in specs we have to enable it explicitly. + stub_feature_flags(use_click_house_database_for_error_tracking: true) + stub_feature_flags(gitlab_error_tracking: true) + end + + context 'when the secret header is missing' do + let(:headers) { {} } + + it 'responds with unauthorized entity' do + send_request + + expect(response).to have_gitlab_http_status(:unauthorized) + end + end + + context 'when some params are missing' do + let(:params) { { project_id: project.id } } + + it 'responds with unprocessable entity' do + send_request + + expect(response).to have_gitlab_http_status(:unprocessable_entity) + end + end + + context 'when public_key is unknown' do + it 'returns enabled: false' do + send_request + + expect(response).to have_gitlab_http_status(:ok) + expect(json_response).to eq('enabled' => false) + end + end + + context 'when unknown project_id is unknown' do + it 'responds with 404 not found' do + params[:project_id] = non_existing_record_id + + send_request + + expect(response).to have_gitlab_http_status(:not_found) + end + end + + context 'when the error tracking is disabled' do + it 'returns enabled: false' do + create(:error_tracking_client_key, :disabled, project: project) + + send_request + + expect(response).to have_gitlab_http_status(:ok) + expect(json_response).to eq('enabled' => false) + end + end + + context 'when the error tracking is enabled' do + let_it_be(:client_key) { create(:error_tracking_client_key, project: project) } + + before do + params[:public_key] = client_key.public_key + + stub_application_setting(error_tracking_enabled: true) + stub_application_setting(error_tracking_api_url: 'https://localhost/error_tracking') + end + + it 'returns enabled: true' do + send_request + + expect(response).to have_gitlab_http_status(:ok) + expect(json_response).to eq('enabled' => true) + end + + context 'when feature flags use_click_house_database_for_error_tracking or gitlab_error_tracking are disabled' do + before do + stub_feature_flags(use_click_house_database_for_error_tracking: false) + stub_feature_flags(gitlab_error_tracking: false) + end + + it 'returns enabled: false' do + send_request + + expect(response).to have_gitlab_http_status(:ok) + expect(json_response).to eq('enabled' => false) + end + end + end + end +end |