2019-12-21 20:55:43 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe GrafanaIntegration do
|
|
|
|
describe 'associations' do
|
|
|
|
it { is_expected.to belong_to(:project) }
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'validations' do
|
|
|
|
it { is_expected.to validate_presence_of(:project) }
|
2020-02-01 01:16:34 +05:30
|
|
|
it { is_expected.to validate_presence_of(:encrypted_token) }
|
2019-12-21 20:55:43 +05:30
|
|
|
|
|
|
|
it 'disallows invalid urls for grafana_url' do
|
|
|
|
unsafe_url = %{https://replaceme.com/'><script>alert(document.cookie)</script>}
|
|
|
|
non_ascii_url = 'http://gitlab.com/api/0/projects/project1/something€'
|
|
|
|
blank_url = ''
|
|
|
|
excessively_long_url = 'https://grafan' + 'a' * 1024 + '.com'
|
|
|
|
|
|
|
|
is_expected.not_to allow_values(
|
|
|
|
unsafe_url,
|
|
|
|
non_ascii_url,
|
|
|
|
blank_url,
|
|
|
|
excessively_long_url
|
|
|
|
).for(:grafana_url)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'allows valid urls for grafana_url' do
|
|
|
|
external_url = 'http://grafana.com/'
|
|
|
|
internal_url = 'http://192.168.1.1'
|
|
|
|
|
|
|
|
is_expected.to allow_value(
|
|
|
|
external_url,
|
|
|
|
internal_url
|
|
|
|
).for(:grafana_url)
|
|
|
|
end
|
2019-12-26 22:10:19 +05:30
|
|
|
|
|
|
|
it 'disallows non-booleans in enabled column' do
|
|
|
|
is_expected.not_to allow_value(
|
|
|
|
nil
|
|
|
|
).for(:enabled)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'allows booleans in enabled column' do
|
|
|
|
is_expected.to allow_value(
|
|
|
|
true,
|
|
|
|
false
|
|
|
|
).for(:enabled)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '.client' do
|
|
|
|
subject(:grafana_integration) { create(:grafana_integration) }
|
|
|
|
|
|
|
|
context 'with grafana integration disabled' do
|
|
|
|
it 'returns a grafana client' do
|
|
|
|
expect(grafana_integration.client).to be_an_instance_of(::Grafana::Client)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with grafana integration enabled' do
|
|
|
|
it 'returns nil' do
|
|
|
|
grafana_integration.update(enabled: false)
|
|
|
|
|
|
|
|
expect(grafana_integration.client).to be(nil)
|
|
|
|
end
|
|
|
|
end
|
2019-12-21 20:55:43 +05:30
|
|
|
end
|
2020-02-01 01:16:34 +05:30
|
|
|
|
|
|
|
describe 'attribute encryption' do
|
|
|
|
subject(:grafana_integration) { create(:grafana_integration, token: 'super-secret') }
|
|
|
|
|
|
|
|
context 'token' do
|
|
|
|
it 'encrypts original value into encrypted_token attribute' do
|
|
|
|
expect(grafana_integration.encrypted_token).not_to be_nil
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'locks access to raw value in private method', :aggregate_failures do
|
|
|
|
expect { grafana_integration.token }.to raise_error(NoMethodError, /private method .token. called/)
|
|
|
|
expect(grafana_integration.send(:token)).to eql('super-secret')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'prevents overriding token value with its encrypted or masked version', :aggregate_failures do
|
|
|
|
expect { grafana_integration.update(token: grafana_integration.encrypted_token) }.not_to change { grafana_integration.reload.send(:token) }
|
|
|
|
expect { grafana_integration.update(token: grafana_integration.masked_token) }.not_to change { grafana_integration.reload.send(:token) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2019-12-21 20:55:43 +05:30
|
|
|
end
|