2019-04-15 06:17:05 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2017-04-07 06:27:15 -04:00
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe HealthController do
|
|
|
|
include StubENV
|
|
|
|
|
2018-02-02 13:39:55 -05:00
|
|
|
let(:token) { Gitlab::CurrentSettings.health_check_access_token }
|
2017-07-03 11:09:34 -04:00
|
|
|
let(:whitelisted_ip) { '127.0.0.1' }
|
|
|
|
let(:not_whitelisted_ip) { '127.0.0.2' }
|
2017-04-07 06:27:15 -04:00
|
|
|
|
|
|
|
before do
|
2017-07-04 18:12:21 -04:00
|
|
|
allow(Settings.monitoring).to receive(:ip_whitelist).and_return([whitelisted_ip])
|
2017-09-18 12:13:49 -04:00
|
|
|
stub_storage_settings({}) # Hide the broken storage
|
2017-04-07 06:27:15 -04:00
|
|
|
stub_env('IN_MEMORY_APPLICATION_SETTINGS', 'false')
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#readiness' do
|
2017-07-06 07:36:16 -04:00
|
|
|
shared_context 'endpoint responding with readiness data' do
|
2017-07-10 11:00:43 -04:00
|
|
|
let(:request_params) { {} }
|
|
|
|
|
2018-12-17 17:52:17 -05:00
|
|
|
subject { get :readiness, params: request_params }
|
2017-04-07 06:27:15 -04:00
|
|
|
|
2017-07-06 07:36:16 -04:00
|
|
|
it 'responds with readiness checks data' do
|
|
|
|
subject
|
2017-04-07 06:27:15 -04:00
|
|
|
|
|
|
|
expect(json_response['db_check']['status']).to eq('ok')
|
2017-07-10 23:35:47 -04:00
|
|
|
expect(json_response['cache_check']['status']).to eq('ok')
|
|
|
|
expect(json_response['queues_check']['status']).to eq('ok')
|
|
|
|
expect(json_response['shared_state_check']['status']).to eq('ok')
|
2018-06-20 04:21:59 -04:00
|
|
|
expect(json_response['gitaly_check']['status']).to eq('ok')
|
2017-04-07 06:27:15 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-07-06 07:36:16 -04:00
|
|
|
context 'accessed from whitelisted ip' do
|
|
|
|
before do
|
|
|
|
allow(Gitlab::RequestContext).to receive(:client_ip).and_return(whitelisted_ip)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'endpoint responding with readiness data'
|
|
|
|
end
|
|
|
|
|
2017-07-03 11:09:34 -04:00
|
|
|
context 'accessed from not whitelisted ip' do
|
|
|
|
before do
|
|
|
|
allow(Gitlab::RequestContext).to receive(:client_ip).and_return(not_whitelisted_ip)
|
|
|
|
end
|
|
|
|
|
2017-07-06 07:36:16 -04:00
|
|
|
it 'responds with resource not found' do
|
2017-04-07 06:27:15 -04:00
|
|
|
get :readiness
|
2017-07-04 18:12:21 -04:00
|
|
|
|
2017-04-07 06:27:15 -04:00
|
|
|
expect(response.status).to eq(404)
|
|
|
|
end
|
2017-07-06 07:36:16 -04:00
|
|
|
|
|
|
|
context 'accessed with valid token' do
|
|
|
|
context 'token passed in request header' do
|
|
|
|
before do
|
|
|
|
request.headers['TOKEN'] = token
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'endpoint responding with readiness data'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'token passed as URL param' do
|
|
|
|
it_behaves_like 'endpoint responding with readiness data' do
|
2017-07-10 11:00:43 -04:00
|
|
|
let(:request_params) { { token: token } }
|
2017-07-06 07:36:16 -04:00
|
|
|
end
|
|
|
|
end
|
2017-04-07 06:27:15 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#liveness' do
|
2017-07-06 07:36:16 -04:00
|
|
|
shared_context 'endpoint responding with liveness data' do
|
|
|
|
subject { get :liveness }
|
2017-04-07 06:27:15 -04:00
|
|
|
|
2017-07-06 07:36:16 -04:00
|
|
|
it 'responds with liveness checks data' do
|
|
|
|
subject
|
2017-04-07 06:27:15 -04:00
|
|
|
|
|
|
|
expect(json_response['db_check']['status']).to eq('ok')
|
2017-07-10 23:35:47 -04:00
|
|
|
expect(json_response['cache_check']['status']).to eq('ok')
|
|
|
|
expect(json_response['queues_check']['status']).to eq('ok')
|
|
|
|
expect(json_response['shared_state_check']['status']).to eq('ok')
|
2017-04-07 06:27:15 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-07-06 07:36:16 -04:00
|
|
|
context 'accessed from whitelisted ip' do
|
|
|
|
before do
|
|
|
|
allow(Gitlab::RequestContext).to receive(:client_ip).and_return(whitelisted_ip)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'endpoint responding with liveness data'
|
|
|
|
end
|
|
|
|
|
2017-07-03 11:09:34 -04:00
|
|
|
context 'accessed from not whitelisted ip' do
|
|
|
|
before do
|
|
|
|
allow(Gitlab::RequestContext).to receive(:client_ip).and_return(not_whitelisted_ip)
|
|
|
|
end
|
|
|
|
|
2017-07-06 07:36:16 -04:00
|
|
|
it 'responds with resource not found' do
|
2017-04-07 06:27:15 -04:00
|
|
|
get :liveness
|
2017-07-04 18:12:21 -04:00
|
|
|
|
2017-04-07 06:27:15 -04:00
|
|
|
expect(response.status).to eq(404)
|
|
|
|
end
|
2017-07-06 07:36:16 -04:00
|
|
|
|
|
|
|
context 'accessed with valid token' do
|
|
|
|
context 'token passed in request header' do
|
|
|
|
before do
|
|
|
|
request.headers['TOKEN'] = token
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'endpoint responding with liveness data'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'token passed as URL param' do
|
|
|
|
it_behaves_like 'endpoint responding with liveness data' do
|
2018-12-17 17:52:17 -05:00
|
|
|
subject { get :liveness, params: { token: token } }
|
2017-07-06 07:36:16 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2017-04-07 06:27:15 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|