|
1 | 1 | import json
|
2 | 2 |
|
3 | 3 | import pytest
|
| 4 | +from django.core.exceptions import ImproperlyConfigured |
4 | 5 | from django.test import RequestFactory
|
5 | | -from gitlab_webhooks import __version__, views |
| 6 | +from gitlab_webhooks.views import WebhookView |
| 7 | +from gitlab_webhooks import constants |
6 | 8 |
|
7 | 9 |
|
8 | | -def test_health_check_view(rf: RequestFactory): |
9 | | - request = rf.get("/fake-url/") |
10 | | - response = views.HealthCheckView().get(request) |
| 10 | +class TestWebhookView: |
| 11 | + @pytest.mark.parametrize("event", constants.Events.values()) |
| 12 | + def test_success(self, rf: RequestFactory, settings, event: str): |
| 13 | + settings.DJANGO_GITLAB_WEBHOOKS = { |
| 14 | + "SECRET": "fake_token", |
| 15 | + "ALLOWED_EVENTS": [event], |
| 16 | + } |
| 17 | + headers = { |
| 18 | + constants.TOKEN_HEADER: "fake_token", |
| 19 | + constants.EVENT_HEADER: event, |
| 20 | + } |
| 21 | + request = rf.post("/fake-url/", **headers) |
| 22 | + request._body = '{"test": "ok"}'.encode() |
| 23 | + response = WebhookView().post(request) |
11 | 24 |
|
12 | | - assert response.status_code == 200 |
13 | | - assert json.loads(response.content) == {"detail": "ok"} |
| 25 | + assert response.status_code == 200 |
| 26 | + assert json.loads(response.content) == {"detail": "ok"} |
14 | 27 |
|
| 28 | + def test_get_secret(self, settings): |
| 29 | + settings.DJANGO_GITLAB_WEBHOOKS = {} |
15 | 30 |
|
16 | | -def test_app_version_view(rf: RequestFactory): |
17 | | - request = rf.get("/fake-url/") |
18 | | - response = views.AppVersionView().get(request) |
| 31 | + with pytest.raises(ImproperlyConfigured): |
| 32 | + WebhookView().get_secret() |
19 | 33 |
|
20 | | - assert response.status_code == 200 |
21 | | - assert json.loads(response.content) == {"detail": __version__} |
| 34 | + def test_invalid_token(self, rf: RequestFactory, settings): |
| 35 | + settings.DJANGO_GITLAB_WEBHOOKS = {"SECRET": "fake_token"} |
| 36 | + headers = {constants.TOKEN_HEADER: "invalid"} |
| 37 | + request = rf.post("/fake-url/", **headers) |
| 38 | + response = WebhookView().post(request) |
| 39 | + |
| 40 | + assert response.status_code == 400 |
| 41 | + assert json.loads(response.content.decode()) == { |
| 42 | + "detail": constants.INVALID_HTTP_X_GITLAB_TOKEN |
| 43 | + } |
| 44 | + |
| 45 | + def test_event_header_is_missing(self, rf: RequestFactory, settings): |
| 46 | + settings.DJANGO_GITLAB_WEBHOOKS = {"SECRET": "fake_token"} |
| 47 | + headers = {constants.TOKEN_HEADER: "fake_token"} |
| 48 | + request = rf.post("/fake-url/", **headers) |
| 49 | + response = WebhookView().post(request) |
| 50 | + |
| 51 | + assert response.status_code == 400 |
| 52 | + assert json.loads(response.content.decode()) == { |
| 53 | + "detail": constants.EVENT_HEADER_IS_MISSING |
| 54 | + } |
| 55 | + |
| 56 | + def test_event_is_not_allowed(self, rf: RequestFactory, settings): |
| 57 | + settings.DJANGO_GITLAB_WEBHOOKS = {"SECRET": "fake_token", "ALLOWED_EVENTS": []} |
| 58 | + headers = {constants.TOKEN_HEADER: "fake_token", constants.EVENT_HEADER: "test"} |
| 59 | + request = rf.post("/fake-url/", **headers) |
| 60 | + response = WebhookView().post(request) |
| 61 | + |
| 62 | + assert response.status_code == 400 |
| 63 | + assert json.loads(response.content.decode()) == { |
| 64 | + "detail": constants.EVENT_IS_NOT_ALLOWED.format(event="test") |
| 65 | + } |
0 commit comments