debian-mirror-gitlab/spec/features/admin/admin_settings_spec.rb

944 lines
36 KiB
Ruby
Raw Normal View History

2019-10-12 21:52:04 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
require 'spec_helper'
2015-04-26 12:48:37 +05:30
2021-02-22 17:27:13 +05:30
RSpec.describe 'Admin updates settings' do
2017-08-17 22:00:37 +05:30
include StubENV
2018-10-15 14:42:47 +05:30
include TermsHelper
2020-06-23 00:09:42 +05:30
include UsageDataHelpers
2018-10-15 14:42:47 +05:30
let(:admin) { create(:admin) }
2021-09-04 01:27:46 +05:30
let(:dot_com?) { false }
2017-08-17 22:00:37 +05:30
2021-04-29 21:17:54 +05:30
context 'application setting :admin_mode is enabled', :request_store do
2018-12-05 23:21:45 +05:30
before do
2021-09-04 01:27:46 +05:30
allow(Gitlab).to receive(:com?).and_return(dot_com?)
2019-12-21 20:55:43 +05:30
stub_env('IN_MEMORY_APPLICATION_SETTINGS', 'false')
sign_in(admin)
gitlab_enable_admin_mode_sign_in(admin)
2018-05-09 12:01:36 +05:30
end
2017-08-17 22:00:37 +05:30
2019-12-21 20:55:43 +05:30
context 'General page' do
before do
visit general_admin_application_settings_path
2018-12-05 23:21:45 +05:30
end
2017-08-17 22:00:37 +05:30
2021-02-22 17:27:13 +05:30
it 'change visibility settings' do
2019-12-21 20:55:43 +05:30
page.within('.as-visibility-access') do
choose "application_setting_default_project_visibility_20"
click_button 'Save changes'
end
2017-09-10 17:25:29 +05:30
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
2018-12-05 23:21:45 +05:30
end
2017-09-10 17:25:29 +05:30
2021-02-22 17:27:13 +05:30
it 'uncheck all restricted visibility levels' do
2019-12-21 20:55:43 +05:30
page.within('.as-visibility-access') do
2022-06-21 17:19:12 +05:30
find('#application_setting_restricted_visibility_levels_0').set(false)
find('#application_setting_restricted_visibility_levels_10').set(false)
find('#application_setting_restricted_visibility_levels_20').set(false)
2019-12-21 20:55:43 +05:30
click_button 'Save changes'
end
expect(page).to have_content "Application settings saved successfully"
2022-06-21 17:19:12 +05:30
expect(find('#application_setting_restricted_visibility_levels_0')).not_to be_checked
expect(find('#application_setting_restricted_visibility_levels_10')).not_to be_checked
expect(find('#application_setting_restricted_visibility_levels_20')).not_to be_checked
2019-12-21 20:55:43 +05:30
end
2018-05-09 12:01:36 +05:30
2021-02-22 17:27:13 +05:30
it 'modify import sources' do
2019-12-21 20:55:43 +05:30
expect(current_settings.import_sources).not_to be_empty
2018-12-05 23:21:45 +05:30
2019-12-21 20:55:43 +05:30
page.within('.as-visibility-access') do
Gitlab::ImportSources.options.map do |name, _|
uncheck name
end
click_button 'Save changes'
2018-12-05 23:21:45 +05:30
end
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.import_sources).to be_empty
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
page.within('.as-visibility-access') do
2022-07-23 23:45:48 +05:30
check "Repository by URL"
2019-12-21 20:55:43 +05:30
click_button 'Save changes'
end
2018-12-05 23:21:45 +05:30
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.import_sources).to eq(['git'])
2018-12-05 23:21:45 +05:30
end
2021-02-22 17:27:13 +05:30
it 'change Visibility and Access Controls' do
2019-12-21 20:55:43 +05:30
page.within('.as-visibility-access') do
2022-07-16 23:28:13 +05:30
uncheck 'Enabled'
2019-12-21 20:55:43 +05:30
click_button 'Save changes'
end
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
expect(current_settings.project_export_enabled).to be_falsey
expect(page).to have_content "Application settings saved successfully"
2018-12-05 23:21:45 +05:30
end
2018-05-09 12:01:36 +05:30
2021-02-22 17:27:13 +05:30
it 'change Keys settings' do
2019-12-21 20:55:43 +05:30
page.within('.as-visibility-access') do
select 'Are forbidden', from: 'RSA SSH keys'
select 'Are allowed', from: 'DSA SSH keys'
select 'Must be at least 384 bits', from: 'ECDSA SSH keys'
select 'Are forbidden', from: 'ED25519 SSH keys'
2022-04-04 11:22:00 +05:30
select 'Are forbidden', from: 'ECDSA_SK SSH keys'
select 'Are forbidden', from: 'ED25519_SK SSH keys'
2019-12-21 20:55:43 +05:30
click_on 'Save changes'
end
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
forbidden = ApplicationSetting::FORBIDDEN_KEY_VALUE.to_s
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
expect(page).to have_content 'Application settings saved successfully'
expect(find_field('RSA SSH keys').value).to eq(forbidden)
expect(find_field('DSA SSH keys').value).to eq('0')
expect(find_field('ECDSA SSH keys').value).to eq('384')
expect(find_field('ED25519 SSH keys').value).to eq(forbidden)
2022-04-04 11:22:00 +05:30
expect(find_field('ECDSA_SK SSH keys').value).to eq(forbidden)
expect(find_field('ED25519_SK SSH keys').value).to eq(forbidden)
2019-12-21 20:55:43 +05:30
end
2018-12-05 23:21:45 +05:30
2021-02-22 17:27:13 +05:30
it 'change Account and Limit Settings' do
2019-12-21 20:55:43 +05:30
page.within('.as-account-limit') do
uncheck 'Gravatar enabled'
click_button 'Save changes'
end
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
expect(current_settings.gravatar_enabled).to be_falsey
expect(page).to have_content "Application settings saved successfully"
2018-12-05 23:21:45 +05:30
end
2018-05-09 12:01:36 +05:30
2022-07-16 23:28:13 +05:30
it 'change Maximum export size' do
page.within('.as-account-limit') do
fill_in 'Maximum export size (MB)', with: 25
click_button 'Save changes'
end
expect(current_settings.max_export_size).to eq 25
expect(page).to have_content "Application settings saved successfully"
end
2021-02-22 17:27:13 +05:30
it 'change Maximum import size' do
2020-06-23 00:09:42 +05:30
page.within('.as-account-limit') do
fill_in 'Maximum import size (MB)', with: 15
click_button 'Save changes'
end
expect(current_settings.max_import_size).to eq 15
expect(page).to have_content "Application settings saved successfully"
end
2021-02-22 17:27:13 +05:30
it 'change New users set to external', :js do
2019-12-21 20:55:43 +05:30
user_internal_regex = find('#application_setting_user_default_internal_regex', visible: :all)
2015-04-26 12:48:37 +05:30
2019-12-21 20:55:43 +05:30
expect(user_internal_regex).to be_readonly
expect(user_internal_regex['placeholder']).to eq 'To define internal users, first enable new users set to external'
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
check 'application_setting_user_default_external'
2018-11-20 20:47:30 +05:30
2019-12-21 20:55:43 +05:30
expect(user_internal_regex).not_to be_readonly
expect(user_internal_regex['placeholder']).to eq 'Regex pattern'
end
2018-11-20 20:47:30 +05:30
2021-09-04 01:27:46 +05:30
context 'Dormant users' do
context 'when Gitlab.com' do
let(:dot_com?) { true }
it 'does not expose the setting' do
expect(page).to have_no_selector('#application_setting_deactivate_dormant_users')
end
end
context 'when not Gitlab.com' do
let(:dot_com?) { false }
it 'change Dormant users' do
expect(page).to have_unchecked_field('Deactivate dormant users after 90 days of inactivity')
expect(current_settings.deactivate_dormant_users).to be_falsey
page.within('.as-account-limit') do
check 'application_setting_deactivate_dormant_users'
click_button 'Save changes'
end
expect(page).to have_content "Application settings saved successfully"
page.refresh
expect(current_settings.deactivate_dormant_users).to be_truthy
expect(page).to have_checked_field('Deactivate dormant users after 90 days of inactivity')
end
end
end
2021-01-03 14:25:43 +05:30
context 'Change Sign-up restrictions' do
context 'Require Admin approval for new signup setting' do
2021-04-29 21:17:54 +05:30
it 'changes the setting', :js do
2021-01-29 00:20:46 +05:30
page.within('.as-signup') do
check 'Require admin approval for new sign-ups'
click_button 'Save changes'
2021-01-03 14:25:43 +05:30
end
2021-01-29 00:20:46 +05:30
expect(current_settings.require_admin_approval_after_user_signup).to be_truthy
expect(page).to have_content "Application settings saved successfully"
2021-01-03 14:25:43 +05:30
end
end
end
2021-02-22 17:27:13 +05:30
it 'change Sign-in restrictions' do
2019-12-21 20:55:43 +05:30
page.within('.as-signin') do
fill_in 'Home page URL', with: 'https://about.gitlab.com/'
click_button 'Save changes'
end
2018-11-20 20:47:30 +05:30
2019-12-21 20:55:43 +05:30
expect(current_settings.home_page_url).to eq "https://about.gitlab.com/"
expect(page).to have_content "Application settings saved successfully"
2018-12-05 23:21:45 +05:30
end
2018-11-20 20:47:30 +05:30
2021-02-22 17:27:13 +05:30
it 'terms of Service' do
2019-12-21 20:55:43 +05:30
# Already have the admin accept terms, so they don't need to accept in this spec.
_existing_terms = create(:term)
accept_terms(admin)
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
page.within('.as-terms') do
2021-10-27 15:23:28 +05:30
check 'All users must accept the Terms of Service and Privacy Policy to access GitLab'
2019-12-21 20:55:43 +05:30
fill_in 'Terms of Service Agreement', with: 'Be nice!'
click_button 'Save changes'
end
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
expect(current_settings.enforce_terms).to be(true)
expect(current_settings.terms).to eq 'Be nice!'
expect(page).to have_content 'Application settings saved successfully'
2018-12-05 23:21:45 +05:30
end
2018-10-15 14:42:47 +05:30
2021-02-22 17:27:13 +05:30
it 'modify oauth providers' do
2019-12-21 20:55:43 +05:30
expect(current_settings.disabled_oauth_sign_in_sources).to be_empty
2018-10-15 14:42:47 +05:30
2019-12-21 20:55:43 +05:30
page.within('.as-signin') do
uncheck 'Google'
click_button 'Save changes'
end
2018-10-15 14:42:47 +05:30
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.disabled_oauth_sign_in_sources).to include('google_oauth2')
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
page.within('.as-signin') do
check "Google"
click_button 'Save changes'
end
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.disabled_oauth_sign_in_sources).not_to include('google_oauth2')
2018-12-05 23:21:45 +05:30
end
2018-05-09 12:01:36 +05:30
2021-02-22 17:27:13 +05:30
it 'oauth providers do not raise validation errors when saving unrelated changes' do
2019-12-21 20:55:43 +05:30
expect(current_settings.disabled_oauth_sign_in_sources).to be_empty
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
page.within('.as-signin') do
uncheck 'Google'
click_button 'Save changes'
end
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.disabled_oauth_sign_in_sources).to include('google_oauth2')
2018-11-08 19:23:39 +05:30
2019-12-21 20:55:43 +05:30
# Remove google_oauth2 from the Omniauth strategies
allow(Devise).to receive(:omniauth_providers).and_return([])
2018-11-08 19:23:39 +05:30
2019-12-21 20:55:43 +05:30
# Save an unrelated setting
page.within('.as-terms') do
click_button 'Save changes'
end
2018-11-08 19:23:39 +05:30
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.disabled_oauth_sign_in_sources).to include('google_oauth2')
2018-12-05 23:21:45 +05:30
end
2018-11-08 19:23:39 +05:30
2021-02-22 17:27:13 +05:30
it 'configure web terminal' do
2019-12-21 20:55:43 +05:30
page.within('.as-terminal') do
fill_in 'Max session time', with: 15
click_button 'Save changes'
end
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.terminal_max_session_time).to eq(15)
end
2020-11-24 15:15:51 +05:30
context 'Configure Gitpod' do
2021-03-08 18:12:59 +05:30
it 'changes gitpod settings' do
page.within('#js-gitpod-settings') do
check 'Enable Gitpod integration'
fill_in 'Gitpod URL', with: 'https://gitpod.test/'
click_button 'Save changes'
2020-11-24 15:15:51 +05:30
end
2021-03-08 18:12:59 +05:30
expect(page).to have_content 'Application settings saved successfully'
expect(current_settings.gitpod_url).to eq('https://gitpod.test/')
expect(current_settings.gitpod_enabled).to be(true)
2020-11-24 15:15:51 +05:30
end
end
2022-07-23 23:45:48 +05:30
context 'GitLab for Jira App settings' do
it 'changes the setting' do
page.within('#js-jira_connect-settings') do
fill_in 'Jira Connect Application ID', with: '1234'
click_button 'Save changes'
end
expect(current_settings.jira_connect_application_key).to eq('1234')
expect(page).to have_content "Application settings saved successfully"
end
end
2018-11-08 19:23:39 +05:30
end
2019-12-21 20:55:43 +05:30
context 'Integrations page' do
before do
2020-10-24 23:57:45 +05:30
visit general_admin_application_settings_path
2018-12-05 23:21:45 +05:30
end
2018-11-08 19:23:39 +05:30
2021-02-22 17:27:13 +05:30
it 'enable hiding third party offers' do
2019-12-21 20:55:43 +05:30
page.within('.as-third-party-offers') do
2022-03-02 08:16:31 +05:30
check 'Do not display content for customer experience improvement and offers from third parties'
2019-12-21 20:55:43 +05:30
click_button 'Save changes'
end
2018-03-17 18:26:18 +05:30
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.hide_third_party_offers).to be true
end
2021-06-08 01:23:25 +05:30
2021-11-11 11:23:49 +05:30
it 'enabling Mailgun events', :aggregate_failures do
page.within('.as-mailgun') do
check 'Enable Mailgun event receiver'
fill_in 'Mailgun HTTP webhook signing key', with: 'MAILGUN_SIGNING_KEY'
click_button 'Save changes'
2021-06-08 01:23:25 +05:30
end
2019-12-21 20:55:43 +05:30
2021-11-11 11:23:49 +05:30
expect(page).to have_content 'Application settings saved successfully'
expect(current_settings.mailgun_events_enabled).to be true
expect(current_settings.mailgun_signing_key).to eq 'MAILGUN_SIGNING_KEY'
2019-12-21 20:55:43 +05:30
end
2018-05-09 12:01:36 +05:30
end
2018-03-17 18:26:18 +05:30
2020-04-22 19:07:51 +05:30
context 'Integration page', :js do
before do
visit integrations_admin_application_settings_path
end
2021-05-12 15:28:45 +05:30
it 'shows integrations table' do
expect(page).to have_selector '[data-testid="inactive-integrations-table"]'
end
2020-04-22 19:07:51 +05:30
end
2019-12-21 20:55:43 +05:30
context 'CI/CD page' do
2022-06-21 17:19:12 +05:30
let_it_be(:default_plan) { create(:default_plan) }
it 'changes CI/CD settings' do
2019-12-21 20:55:43 +05:30
visit ci_cd_admin_application_settings_path
page.within('.as-ci-cd') do
check 'Default to Auto DevOps pipeline for all projects'
fill_in 'application_setting_auto_devops_domain', with: 'domain.com'
2021-03-11 19:13:27 +05:30
uncheck 'Keep the latest artifacts for all jobs in the latest successful pipelines'
2021-11-18 22:05:49 +05:30
uncheck 'Enable pipeline suggestion banner'
2019-12-21 20:55:43 +05:30
click_button 'Save changes'
end
2015-04-26 12:48:37 +05:30
2019-12-21 20:55:43 +05:30
expect(current_settings.auto_devops_enabled?).to be true
expect(current_settings.auto_devops_domain).to eq('domain.com')
2021-03-11 19:13:27 +05:30
expect(current_settings.keep_latest_artifact).to be false
2021-11-18 22:05:49 +05:30
expect(current_settings.suggest_pipeline_enabled).to be false
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
end
2020-11-24 15:15:51 +05:30
2022-06-21 17:19:12 +05:30
it 'changes CI/CD limits', :aggregate_failures do
visit ci_cd_admin_application_settings_path
page.within('.as-ci-cd') do
fill_in 'plan_limits_ci_pipeline_size', with: 10
fill_in 'plan_limits_ci_active_jobs', with: 20
fill_in 'plan_limits_ci_active_pipelines', with: 25
fill_in 'plan_limits_ci_project_subscriptions', with: 30
fill_in 'plan_limits_ci_pipeline_schedules', with: 40
fill_in 'plan_limits_ci_needs_size_limit', with: 50
fill_in 'plan_limits_ci_registered_group_runners', with: 60
fill_in 'plan_limits_ci_registered_project_runners', with: 70
click_button 'Save Default limits'
end
limits = default_plan.reload.limits
expect(limits.ci_pipeline_size).to eq(10)
expect(limits.ci_active_jobs).to eq(20)
expect(limits.ci_active_pipelines).to eq(25)
expect(limits.ci_project_subscriptions).to eq(30)
expect(limits.ci_pipeline_schedules).to eq(40)
expect(limits.ci_needs_size_limit).to eq(50)
expect(limits.ci_registered_group_runners).to eq(60)
expect(limits.ci_registered_project_runners).to eq(70)
expect(page).to have_content 'Application limits saved successfully'
end
2021-09-30 23:02:18 +05:30
context 'Runner Registration' do
context 'when feature is enabled' do
before do
stub_feature_flags(runner_registration_control: true)
end
it 'allows admins to control who has access to register runners' do
visit ci_cd_admin_application_settings_path
expect(current_settings.valid_runner_registrars).to eq(ApplicationSetting::VALID_RUNNER_REGISTRAR_TYPES)
page.within('.as-runner') do
2022-07-16 23:28:13 +05:30
find_all('input[type="checkbox"]').each(&:click)
2021-09-30 23:02:18 +05:30
click_button 'Save changes'
end
expect(current_settings.valid_runner_registrars).to eq([])
expect(page).to have_content "Application settings saved successfully"
end
end
context 'when feature is disabled' do
before do
stub_feature_flags(runner_registration_control: false)
end
it 'does not allow admins to control who has access to register runners' do
visit ci_cd_admin_application_settings_path
expect(current_settings.valid_runner_registrars).to eq(ApplicationSetting::VALID_RUNNER_REGISTRAR_TYPES)
expect(page).not_to have_css('.as-runner')
end
end
end
2020-11-24 15:15:51 +05:30
context 'Container Registry' do
2021-03-11 19:13:27 +05:30
let(:client_support) { true }
let(:settings_titles) do
{
container_registry_delete_tags_service_timeout: 'Container Registry delete tags service execution timeout',
container_registry_expiration_policies_worker_capacity: 'Cleanup policy maximum workers running concurrently',
2022-05-07 20:08:51 +05:30
container_registry_cleanup_tags_service_max_list_size: 'Cleanup policy maximum number of tags to be deleted',
container_registry_expiration_policies_caching: 'Enable container expiration caching'
2021-03-11 19:13:27 +05:30
}
end
before do
stub_container_registry_config(enabled: true)
allow(ContainerRegistry::Client).to receive(:supports_tag_delete?).and_return(client_support)
end
2020-11-24 15:15:51 +05:30
2021-03-11 19:13:27 +05:30
%i[container_registry_delete_tags_service_timeout container_registry_expiration_policies_worker_capacity container_registry_cleanup_tags_service_max_list_size].each do |setting|
context "for container registry setting #{setting}" do
2022-05-07 20:08:51 +05:30
it 'changes the setting' do
visit ci_cd_admin_application_settings_path
2020-11-24 15:15:51 +05:30
2022-05-07 20:08:51 +05:30
page.within('.as-registry') do
fill_in "application_setting_#{setting}", with: 400
click_button 'Save changes'
2021-03-11 19:13:27 +05:30
end
2022-05-07 20:08:51 +05:30
expect(current_settings.public_send(setting)).to eq(400)
expect(page).to have_content "Application settings saved successfully"
2020-11-24 15:15:51 +05:30
end
end
end
2022-05-07 20:08:51 +05:30
context 'for container registry setting container_registry_expiration_policies_caching' do
it 'updates container_registry_expiration_policies_caching' do
old_value = current_settings.container_registry_expiration_policies_caching
visit ci_cd_admin_application_settings_path
page.within('.as-registry') do
2022-06-21 17:19:12 +05:30
find('#application_setting_container_registry_expiration_policies_caching').click
2022-05-07 20:08:51 +05:30
click_button 'Save changes'
end
expect(current_settings.container_registry_expiration_policies_caching).to eq(!old_value)
expect(page).to have_content "Application settings saved successfully"
end
end
2020-11-24 15:15:51 +05:30
end
2019-12-21 20:55:43 +05:30
end
2018-05-09 12:01:36 +05:30
2020-06-23 00:09:42 +05:30
context 'Repository page' do
2021-02-22 17:27:13 +05:30
it 'change Repository storage settings' do
2020-06-23 00:09:42 +05:30
visit repository_admin_application_settings_path
page.within('.as-repository-storage') do
fill_in 'application_setting_repository_storages_weighted_default', with: 50
click_button 'Save changes'
end
2021-04-17 20:07:23 +05:30
expect(current_settings.repository_storages_weighted).to eq('default' => 50)
end
it 'still saves when settings are outdated' do
current_settings.update_attribute :repository_storages_weighted, { 'default' => 100, 'outdated' => 100 }
visit repository_admin_application_settings_path
page.within('.as-repository-storage') do
fill_in 'application_setting_repository_storages_weighted_default', with: 50
click_button 'Save changes'
end
expect(current_settings.repository_storages_weighted).to eq('default' => 50)
2020-06-23 00:09:42 +05:30
end
2022-01-26 12:08:38 +05:30
context 'External storage for repository static objects' do
it 'changes Repository external storage settings' do
encrypted_token = Gitlab::CryptoHelper.aes256_gcm_encrypt('OldToken')
current_settings.update_attribute :static_objects_external_storage_auth_token_encrypted, encrypted_token
visit repository_admin_application_settings_path
page.within('.as-repository-static-objects') do
fill_in 'application_setting_static_objects_external_storage_url', with: 'http://example.com'
fill_in 'application_setting_static_objects_external_storage_auth_token', with: 'Token'
click_button 'Save changes'
end
expect(current_settings.static_objects_external_storage_url).to eq('http://example.com')
expect(current_settings.static_objects_external_storage_auth_token).to eq('Token')
end
end
2020-06-23 00:09:42 +05:30
end
2019-12-21 20:55:43 +05:30
context 'Reporting page' do
2021-02-22 17:27:13 +05:30
it 'change Spam settings' do
2019-12-21 20:55:43 +05:30
visit reporting_admin_application_settings_path
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
page.within('.as-spam') do
2021-11-18 22:05:49 +05:30
fill_in 'reCAPTCHA site key', with: 'key'
fill_in 'reCAPTCHA private key', with: 'key'
2022-06-21 17:19:12 +05:30
find('#application_setting_recaptcha_enabled').set(true)
find('#application_setting_login_recaptcha_protection_enabled').set(true)
2021-11-18 22:05:49 +05:30
fill_in 'IP addresses per user', with: 15
2020-06-23 00:09:42 +05:30
check 'Enable Spam Check via external API endpoint'
2021-06-08 01:23:25 +05:30
fill_in 'URL of the external Spam Check endpoint', with: 'grpc://www.example.com/spamcheck'
2021-11-18 22:05:49 +05:30
fill_in 'Spam Check API key', with: 'SPAM_CHECK_API_KEY'
2019-12-21 20:55:43 +05:30
click_button 'Save changes'
end
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.recaptcha_enabled).to be true
expect(current_settings.login_recaptcha_protection_enabled).to be true
expect(current_settings.unique_ips_limit_per_user).to eq(15)
2020-06-23 00:09:42 +05:30
expect(current_settings.spam_check_endpoint_enabled).to be true
2021-06-08 01:23:25 +05:30
expect(current_settings.spam_check_endpoint_url).to eq 'grpc://www.example.com/spamcheck'
2018-12-05 23:21:45 +05:30
end
end
2019-07-31 22:56:46 +05:30
2019-12-21 20:55:43 +05:30
context 'Metrics and profiling page' do
before do
visit metrics_and_profiling_admin_application_settings_path
end
2019-07-31 22:56:46 +05:30
2021-02-22 17:27:13 +05:30
it 'change Prometheus settings' do
2019-12-21 20:55:43 +05:30
page.within('.as-prometheus') do
2021-10-27 15:23:28 +05:30
check 'Enable health and performance metrics endpoint'
2019-12-21 20:55:43 +05:30
click_button 'Save changes'
end
2018-12-05 23:21:45 +05:30
2019-12-21 20:55:43 +05:30
expect(current_settings.prometheus_metrics_enabled?).to be true
expect(page).to have_content "Application settings saved successfully"
2018-12-05 23:21:45 +05:30
end
2018-05-09 12:01:36 +05:30
2021-02-22 17:27:13 +05:30
it 'change Performance bar settings' do
2019-12-21 20:55:43 +05:30
group = create(:group)
page.within('.as-performance-bar') do
2021-12-11 22:18:48 +05:30
check 'Allow non-administrators access to the performance bar'
2021-10-27 15:23:28 +05:30
fill_in 'Allow access to members of the following group', with: group.path
2019-12-21 20:55:43 +05:30
click_on 'Save changes'
end
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
2021-12-11 22:18:48 +05:30
expect(find_field('Allow non-administrators access to the performance bar')).to be_checked
2021-10-27 15:23:28 +05:30
expect(find_field('Allow access to members of the following group').value).to eq group.path
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
page.within('.as-performance-bar') do
2021-12-11 22:18:48 +05:30
uncheck 'Allow non-administrators access to the performance bar'
2019-12-21 20:55:43 +05:30
click_on 'Save changes'
end
expect(page).to have_content 'Application settings saved successfully'
2021-12-11 22:18:48 +05:30
expect(find_field('Allow non-administrators access to the performance bar')).not_to be_checked
2021-10-27 15:23:28 +05:30
expect(find_field('Allow access to members of the following group').value).to be_nil
2018-12-05 23:21:45 +05:30
end
2018-05-09 12:01:36 +05:30
2022-04-04 11:22:00 +05:30
it 'loads togglable usage ping payload on click', :js do
2020-06-23 00:09:42 +05:30
stub_usage_data_connections
2022-03-02 08:16:31 +05:30
stub_database_flavor_check
2020-03-13 15:44:24 +05:30
2020-04-22 19:07:51 +05:30
page.within('#js-usage-settings') do
expected_payload_content = /(?=.*"uuid")(?=.*"hostname")/m
2018-05-09 12:01:36 +05:30
2020-04-22 19:07:51 +05:30
expect(page).not_to have_content expected_payload_content
2018-05-09 12:01:36 +05:30
2020-04-22 19:07:51 +05:30
click_button('Preview payload')
wait_for_requests
2021-09-30 23:02:18 +05:30
expect(page).to have_selector '.js-service-ping-payload'
2020-04-22 19:07:51 +05:30
expect(page).to have_button 'Hide payload'
expect(page).to have_content expected_payload_content
2022-04-04 11:22:00 +05:30
click_button('Hide payload')
expect(page).not_to have_content expected_payload_content
2020-04-22 19:07:51 +05:30
end
2018-12-05 23:21:45 +05:30
end
2019-12-21 20:55:43 +05:30
end
context 'Network page' do
2021-02-22 17:27:13 +05:30
it 'changes Outbound requests settings' do
2019-12-21 20:55:43 +05:30
visit network_admin_application_settings_path
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
page.within('.as-outbound') do
check 'Allow requests to the local network from web hooks and services'
# Enabled by default
uncheck 'Allow requests to the local network from system hooks'
# Enabled by default
uncheck 'Enforce DNS rebinding attack protection'
click_button 'Save changes'
end
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.allow_local_requests_from_web_hooks_and_services).to be true
expect(current_settings.allow_local_requests_from_system_hooks).to be false
expect(current_settings.dns_rebinding_protection_enabled).to be false
end
2020-05-24 23:13:21 +05:30
2021-11-11 11:23:49 +05:30
it 'changes User and IP Rate Limits settings' do
visit network_admin_application_settings_path
page.within('.as-ip-limits') do
check 'Enable unauthenticated API request rate limit'
fill_in 'Maximum unauthenticated API requests per rate limit period per IP', with: 100
fill_in 'Unauthenticated API rate limit period in seconds', with: 200
check 'Enable unauthenticated web request rate limit'
fill_in 'Maximum unauthenticated web requests per rate limit period per IP', with: 300
fill_in 'Unauthenticated web rate limit period in seconds', with: 400
check 'Enable authenticated API request rate limit'
fill_in 'Maximum authenticated API requests per rate limit period per user', with: 500
fill_in 'Authenticated API rate limit period in seconds', with: 600
check 'Enable authenticated web request rate limit'
fill_in 'Maximum authenticated web requests per rate limit period per user', with: 700
fill_in 'Authenticated web rate limit period in seconds', with: 800
fill_in 'Plain-text response to send to clients that hit a rate limit', with: 'Custom message'
click_button 'Save changes'
end
expect(page).to have_content "Application settings saved successfully"
expect(current_settings).to have_attributes(
throttle_unauthenticated_api_enabled: true,
throttle_unauthenticated_api_requests_per_period: 100,
throttle_unauthenticated_api_period_in_seconds: 200,
throttle_unauthenticated_enabled: true,
throttle_unauthenticated_requests_per_period: 300,
throttle_unauthenticated_period_in_seconds: 400,
throttle_authenticated_api_enabled: true,
throttle_authenticated_api_requests_per_period: 500,
throttle_authenticated_api_period_in_seconds: 600,
throttle_authenticated_web_enabled: true,
throttle_authenticated_web_requests_per_period: 700,
throttle_authenticated_web_period_in_seconds: 800,
rate_limiting_response_text: 'Custom message'
)
end
2021-02-22 17:27:13 +05:30
it 'changes Issues rate limits settings' do
2020-05-24 23:13:21 +05:30
visit network_admin_application_settings_path
page.within('.as-issue-limits') do
2022-07-16 23:28:13 +05:30
fill_in 'Maximum number of requests per minute', with: 0
2020-05-24 23:13:21 +05:30
click_button 'Save changes'
end
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.issues_create_limit).to eq(0)
end
2021-11-11 11:23:49 +05:30
2022-07-16 23:28:13 +05:30
it 'changes Pipelines rate limits settings' do
visit network_admin_application_settings_path
page.within('.as-pipeline-limits') do
fill_in 'Maximum number of requests per minute', with: 10
click_button 'Save changes'
end
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.pipeline_limit_per_project_user_sha).to eq(10)
end
2022-04-04 11:22:00 +05:30
it 'changes Users API rate limits settings' do
visit network_admin_application_settings_path
page.within('.as-users-api-limits') do
fill_in 'Maximum requests per 10 minutes per user', with: 0
fill_in 'Users to exclude from the rate limit', with: 'someone, someone_else'
click_button 'Save changes'
end
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.users_get_by_id_limit).to eq(0)
expect(current_settings.users_get_by_id_limit_allowlist).to eq(%w[someone someone_else])
end
2021-11-18 22:05:49 +05:30
shared_examples 'regular throttle rate limit settings' do
it 'changes rate limit settings' do
visit network_admin_application_settings_path
2021-11-11 11:23:49 +05:30
2021-11-18 22:05:49 +05:30
page.within(".#{selector}") do
check 'Enable unauthenticated API request rate limit'
fill_in 'Maximum unauthenticated API requests per rate limit period per IP', with: 12
fill_in 'Unauthenticated API rate limit period in seconds', with: 34
check 'Enable authenticated API request rate limit'
fill_in 'Maximum authenticated API requests per rate limit period per user', with: 56
fill_in 'Authenticated API rate limit period in seconds', with: 78
click_button 'Save changes'
end
expect(page).to have_content "Application settings saved successfully"
expect(current_settings).to have_attributes(
"throttle_unauthenticated_#{fragment}_enabled" => true,
"throttle_unauthenticated_#{fragment}_requests_per_period" => 12,
"throttle_unauthenticated_#{fragment}_period_in_seconds" => 34,
"throttle_authenticated_#{fragment}_enabled" => true,
"throttle_authenticated_#{fragment}_requests_per_period" => 56,
"throttle_authenticated_#{fragment}_period_in_seconds" => 78
)
2021-11-11 11:23:49 +05:30
end
2021-11-18 22:05:49 +05:30
end
2021-11-11 11:23:49 +05:30
2021-11-18 22:05:49 +05:30
context 'Package Registry API rate limits' do
let(:selector) { 'as-packages-limits' }
let(:fragment) { :packages_api }
include_examples 'regular throttle rate limit settings'
end
context 'Files API rate limits' do
let(:selector) { 'as-files-limits' }
let(:fragment) { :files_api }
include_examples 'regular throttle rate limit settings'
end
context 'Deprecated API rate limits' do
let(:selector) { 'as-deprecated-limits' }
let(:fragment) { :deprecated_api }
include_examples 'regular throttle rate limit settings'
2021-11-11 11:23:49 +05:30
end
2022-05-07 20:08:51 +05:30
it 'changes search rate limits' do
visit network_admin_application_settings_path
page.within('.as-search-limits') do
fill_in 'Maximum number of requests per minute for an authenticated user', with: 98
fill_in 'Maximum number of requests per minute for an unauthenticated IP address', with: 76
click_button 'Save changes'
end
expect(page).to have_content "Application settings saved successfully"
expect(current_settings.search_rate_limit).to eq(98)
expect(current_settings.search_rate_limit_unauthenticated).to eq(76)
end
2018-05-09 12:01:36 +05:30
end
2019-12-21 20:55:43 +05:30
context 'Preferences page' do
before do
visit preferences_admin_application_settings_path
2018-12-05 23:21:45 +05:30
end
2018-05-09 12:01:36 +05:30
2021-02-22 17:27:13 +05:30
it 'change Help page' do
2019-12-21 20:55:43 +05:30
new_support_url = 'http://example.com/help'
2021-01-03 14:25:43 +05:30
new_documentation_url = 'https://docs.gitlab.com'
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
page.within('.as-help-page') do
2021-09-30 23:02:18 +05:30
fill_in 'Additional text to show on the Help page', with: 'Example text'
2021-10-27 15:23:28 +05:30
check 'Hide marketing-related entries from the Help page'
2019-12-21 20:55:43 +05:30
fill_in 'Support page URL', with: new_support_url
2021-01-03 14:25:43 +05:30
fill_in 'Documentation pages URL', with: new_documentation_url
2019-12-21 20:55:43 +05:30
click_button 'Save changes'
end
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
expect(current_settings.help_page_text).to eq "Example text"
expect(current_settings.help_page_hide_commercial_content).to be_truthy
expect(current_settings.help_page_support_url).to eq new_support_url
2021-01-03 14:25:43 +05:30
expect(current_settings.help_page_documentation_base_url).to eq new_documentation_url
2019-12-21 20:55:43 +05:30
expect(page).to have_content "Application settings saved successfully"
2018-12-05 23:21:45 +05:30
end
2018-05-09 12:01:36 +05:30
2021-02-22 17:27:13 +05:30
it 'change Pages settings' do
2019-12-21 20:55:43 +05:30
page.within('.as-pages') do
fill_in 'Maximum size of pages (MB)', with: 15
check 'Require users to prove ownership of custom domains'
click_button 'Save changes'
end
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
expect(current_settings.max_pages_size).to eq 15
expect(current_settings.pages_domain_verification_enabled?).to be_truthy
expect(page).to have_content "Application settings saved successfully"
2018-12-05 23:21:45 +05:30
end
2021-02-22 17:27:13 +05:30
it 'change Real-time features settings' do
2019-12-21 20:55:43 +05:30
page.within('.as-realtime') do
fill_in 'Polling interval multiplier', with: 5.0
click_button 'Save changes'
end
2018-11-08 19:23:39 +05:30
2019-12-21 20:55:43 +05:30
expect(current_settings.polling_interval_multiplier).to eq 5.0
expect(page).to have_content "Application settings saved successfully"
end
2018-11-08 19:23:39 +05:30
2019-12-21 20:55:43 +05:30
it 'shows an error when validation fails' do
page.within('.as-realtime') do
fill_in 'Polling interval multiplier', with: -1.0
click_button 'Save changes'
end
2017-08-17 22:00:37 +05:30
2019-12-21 20:55:43 +05:30
expect(current_settings.polling_interval_multiplier).not_to eq(-1.0)
expect(page)
.to have_content "The form contains the following error: Polling interval multiplier must be greater than or equal to 0"
end
2015-09-11 14:41:01 +05:30
2021-02-22 17:27:13 +05:30
it "change Pages Let's Encrypt settings" do
2019-12-21 20:55:43 +05:30
visit preferences_admin_application_settings_path
page.within('.as-pages') do
2021-10-27 15:23:28 +05:30
fill_in "Let's Encrypt email", with: 'my@test.example.com'
2019-12-21 20:55:43 +05:30
check "I have read and agree to the Let's Encrypt Terms of Service"
click_button 'Save changes'
end
2015-04-26 12:48:37 +05:30
2019-12-21 20:55:43 +05:30
expect(current_settings.lets_encrypt_notification_email).to eq 'my@test.example.com'
expect(current_settings.lets_encrypt_terms_of_service_accepted).to eq true
2018-12-05 23:21:45 +05:30
end
2015-04-26 12:48:37 +05:30
end
2017-08-17 22:00:37 +05:30
2019-12-21 20:55:43 +05:30
context 'Nav bar' do
2021-02-22 17:27:13 +05:30
it 'shows default help links in nav' do
2021-04-29 21:17:54 +05:30
default_support_url = "https://#{ApplicationHelper.promo_host}/getting-help/"
2018-03-17 18:26:18 +05:30
2019-12-21 20:55:43 +05:30
visit root_dashboard_path
2019-10-12 21:52:04 +05:30
2019-12-21 20:55:43 +05:30
find('.header-help-dropdown-toggle').click
page.within '.header-help' do
expect(page).to have_link(text: 'Help', href: help_path)
expect(page).to have_link(text: 'Support', href: default_support_url)
end
2018-12-05 23:21:45 +05:30
end
2018-03-17 18:26:18 +05:30
2021-02-22 17:27:13 +05:30
it 'shows custom support url in nav when set' do
2019-12-21 20:55:43 +05:30
new_support_url = 'http://example.com/help'
stub_application_setting(help_page_support_url: new_support_url)
2018-11-20 20:47:30 +05:30
2019-12-21 20:55:43 +05:30
visit root_dashboard_path
2018-11-20 20:47:30 +05:30
2019-12-21 20:55:43 +05:30
find('.header-help-dropdown-toggle').click
page.within '.header-help' do
expect(page).to have_link(text: 'Support', href: new_support_url)
end
end
2019-10-12 21:52:04 +05:30
end
2022-04-04 11:22:00 +05:30
context 'Service usage data page' do
before do
stub_usage_data_connections
stub_database_flavor_check
end
2022-07-16 23:28:13 +05:30
context 'when service data cached', :use_clean_rails_memory_store_caching do
2022-06-21 17:19:12 +05:30
before do
2022-07-16 23:28:13 +05:30
visit usage_data_admin_application_settings_path
2022-06-21 17:19:12 +05:30
visit service_usage_data_admin_application_settings_path
end
2022-04-04 11:22:00 +05:30
2022-06-21 17:19:12 +05:30
it 'loads usage ping payload on click', :js do
expected_payload_content = /(?=.*"uuid")(?=.*"hostname")/m
2022-04-04 11:22:00 +05:30
2022-06-21 17:19:12 +05:30
expect(page).not_to have_content expected_payload_content
2022-04-04 11:22:00 +05:30
2022-06-21 17:19:12 +05:30
click_button('Preview payload')
2022-04-04 11:22:00 +05:30
2022-06-21 17:19:12 +05:30
wait_for_requests
expect(page).to have_button 'Hide payload'
expect(page).to have_content expected_payload_content
end
it 'generates usage ping payload on button click', :js do
expect_next_instance_of(Admin::ApplicationSettingsController) do |instance|
expect(instance).to receive(:usage_data).and_call_original
end
click_button('Download payload')
wait_for_requests
2022-04-04 11:22:00 +05:30
end
2022-06-21 17:19:12 +05:30
end
2022-04-04 11:22:00 +05:30
2022-06-21 17:19:12 +05:30
context 'when service data not cached' do
it 'renders missing cache information' do
visit service_usage_data_admin_application_settings_path
2022-04-04 11:22:00 +05:30
2022-06-21 17:19:12 +05:30
expect(page).to have_text('Service Ping payload not found in the application cache')
end
2022-04-04 11:22:00 +05:30
end
end
2019-12-21 20:55:43 +05:30
end
2019-10-12 21:52:04 +05:30
2021-04-29 21:17:54 +05:30
context 'application setting :admin_mode is disabled' do
2019-12-21 20:55:43 +05:30
before do
2021-04-29 21:17:54 +05:30
stub_application_setting(admin_mode: false)
2019-10-12 21:52:04 +05:30
2019-12-21 20:55:43 +05:30
stub_env('IN_MEMORY_APPLICATION_SETTINGS', 'false')
2019-10-12 21:52:04 +05:30
2019-12-21 20:55:43 +05:30
sign_in(admin)
2020-03-13 15:44:24 +05:30
visit general_admin_application_settings_path
2019-12-21 20:55:43 +05:30
end
it 'loads admin settings page without redirect for reauthentication' do
2022-05-07 20:08:51 +05:30
expect(page).to have_current_path general_admin_application_settings_path, ignore_query: true
2019-10-12 21:52:04 +05:30
end
end
2017-08-17 22:00:37 +05:30
def check_all_events
2020-11-24 15:15:51 +05:30
page.check('Active')
2017-08-17 22:00:37 +05:30
page.check('Push')
page.check('Issue')
2020-05-24 23:13:21 +05:30
page.check('Confidential Issue')
page.check('Merge Request')
2019-07-31 22:56:46 +05:30
page.check('Note')
2020-05-24 23:13:21 +05:30
page.check('Confidential Note')
page.check('Tag Push')
2017-08-17 22:00:37 +05:30
page.check('Pipeline')
2020-05-24 23:13:21 +05:30
page.check('Wiki Page')
2019-07-31 22:56:46 +05:30
page.check('Deployment')
2017-08-17 22:00:37 +05:30
end
2019-09-30 21:07:59 +05:30
def current_settings
ApplicationSetting.current_without_cache
end
2015-04-26 12:48:37 +05:30
end