2020-11-24 15:15:51 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
RSpec.describe JiraConnect::EventsController do
|
2021-11-18 22:05:49 +05:30
|
|
|
shared_examples 'verifies asymmetric JWT token' do
|
|
|
|
context 'when token is valid' do
|
|
|
|
include_context 'valid JWT token'
|
|
|
|
|
|
|
|
it 'renders successful' do
|
|
|
|
send_request
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:success)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when token is invalid' do
|
|
|
|
include_context 'invalid JWT token'
|
|
|
|
|
|
|
|
it 'renders unauthorized' do
|
|
|
|
send_request
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
shared_context 'valid JWT token' do
|
|
|
|
before do
|
2022-07-16 23:28:13 +05:30
|
|
|
allow_next_instance_of(Atlassian::JiraConnect::Jwt::Asymmetric) do |asymmetric_jwt|
|
2021-11-18 22:05:49 +05:30
|
|
|
allow(asymmetric_jwt).to receive(:valid?).and_return(true)
|
|
|
|
allow(asymmetric_jwt).to receive(:iss_claim).and_return(client_key)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
shared_context 'invalid JWT token' do
|
|
|
|
before do
|
2022-07-16 23:28:13 +05:30
|
|
|
allow_next_instance_of(Atlassian::JiraConnect::Jwt::Asymmetric) do |asymmetric_jwt|
|
2021-11-18 22:05:49 +05:30
|
|
|
allow(asymmetric_jwt).to receive(:valid?).and_return(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-11-24 15:15:51 +05:30
|
|
|
describe '#installed' do
|
2022-05-07 20:08:51 +05:30
|
|
|
let_it_be(:client_key) { '1234' }
|
|
|
|
let_it_be(:shared_secret) { 'secret' }
|
|
|
|
let_it_be(:base_url) { 'https://test.atlassian.net' }
|
2021-11-18 22:05:49 +05:30
|
|
|
|
2021-01-03 14:25:43 +05:30
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
clientKey: client_key,
|
|
|
|
sharedSecret: shared_secret,
|
2022-05-07 20:08:51 +05:30
|
|
|
baseUrl: base_url
|
2020-11-24 15:15:51 +05:30
|
|
|
}
|
|
|
|
end
|
|
|
|
|
2021-11-18 22:05:49 +05:30
|
|
|
include_context 'valid JWT token'
|
|
|
|
|
2021-01-03 14:25:43 +05:30
|
|
|
subject do
|
|
|
|
post :installed, params: params
|
|
|
|
end
|
|
|
|
|
2021-11-18 22:05:49 +05:30
|
|
|
it_behaves_like 'verifies asymmetric JWT token' do
|
|
|
|
let(:send_request) { subject }
|
|
|
|
end
|
|
|
|
|
2020-11-24 15:15:51 +05:30
|
|
|
it 'saves the jira installation data' do
|
|
|
|
expect { subject }.to change { JiraConnectInstallation.count }.by(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'saves the correct values' do
|
|
|
|
subject
|
|
|
|
|
2021-01-03 14:25:43 +05:30
|
|
|
installation = JiraConnectInstallation.find_by_client_key(client_key)
|
2020-11-24 15:15:51 +05:30
|
|
|
|
2021-01-03 14:25:43 +05:30
|
|
|
expect(installation.shared_secret).to eq(shared_secret)
|
2020-11-24 15:15:51 +05:30
|
|
|
expect(installation.base_url).to eq('https://test.atlassian.net')
|
|
|
|
end
|
|
|
|
|
2022-05-07 20:08:51 +05:30
|
|
|
context 'when the shared_secret param is missing' do
|
2021-01-03 14:25:43 +05:30
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
clientKey: client_key,
|
2022-05-07 20:08:51 +05:30
|
|
|
baseUrl: base_url
|
2021-01-03 14:25:43 +05:30
|
|
|
}
|
|
|
|
end
|
|
|
|
|
2021-11-18 22:05:49 +05:30
|
|
|
it 'returns 422' do
|
|
|
|
subject
|
2021-01-03 14:25:43 +05:30
|
|
|
|
2021-11-18 22:05:49 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:unprocessable_entity)
|
2021-01-03 14:25:43 +05:30
|
|
|
end
|
2022-05-07 20:08:51 +05:30
|
|
|
end
|
2021-01-03 14:25:43 +05:30
|
|
|
|
2022-05-07 20:08:51 +05:30
|
|
|
context 'when an installation already exists' do
|
|
|
|
let_it_be(:installation) { create(:jira_connect_installation, base_url: base_url, client_key: client_key, shared_secret: shared_secret) }
|
|
|
|
|
|
|
|
it 'validates the JWT token in authorization header and returns 200 without creating a new installation', :aggregate_failures do
|
|
|
|
expect { subject }.not_to change { JiraConnectInstallation.count }
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
end
|
|
|
|
|
2023-03-04 22:38:38 +05:30
|
|
|
it 'uses the JiraConnectInstallations::UpdateService' do
|
|
|
|
expect_next_instance_of(JiraConnectInstallations::UpdateService, installation, anything) do |update_service|
|
|
|
|
expect(update_service).to receive(:execute).and_call_original
|
|
|
|
end
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
|
2022-05-07 20:08:51 +05:30
|
|
|
context 'when parameters include a new shared secret and base_url' do
|
|
|
|
let(:shared_secret) { 'new_secret' }
|
|
|
|
let(:base_url) { 'https://new_test.atlassian.net' }
|
|
|
|
|
|
|
|
it 'updates the installation', :aggregate_failures do
|
|
|
|
subject
|
2020-11-24 15:15:51 +05:30
|
|
|
|
2021-11-18 22:05:49 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2022-05-07 20:08:51 +05:30
|
|
|
expect(installation.reload).to have_attributes(
|
|
|
|
shared_secret: shared_secret,
|
|
|
|
base_url: base_url
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the new base_url is invalid' do
|
|
|
|
let(:base_url) { 'invalid' }
|
|
|
|
|
|
|
|
it 'renders 422', :aggregate_failures do
|
|
|
|
expect { subject }.not_to change { installation.reload.base_url }
|
|
|
|
expect(response).to have_gitlab_http_status(:unprocessable_entity)
|
2021-11-18 22:05:49 +05:30
|
|
|
end
|
2020-11-24 15:15:51 +05:30
|
|
|
end
|
2021-11-18 22:05:49 +05:30
|
|
|
end
|
2023-03-04 22:38:38 +05:30
|
|
|
|
|
|
|
shared_examples 'generates JWT validation claims' do
|
|
|
|
specify do
|
|
|
|
expect_next_instance_of(Atlassian::JiraConnect::Jwt::Asymmetric, anything, expected_claims) do |asymmetric_jwt|
|
|
|
|
allow(asymmetric_jwt).to receive(:valid?).and_return(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when enforce_jira_base_url_https' do
|
|
|
|
before do
|
|
|
|
allow(Gitlab.config.jira_connect).to receive(:enforce_jira_base_url_https).and_return(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:expected_claims) { { aud: "https://test.host/-/jira_connect", iss: anything, qsh: anything } }
|
|
|
|
|
|
|
|
it_behaves_like 'generates JWT validation claims'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when not enforce_jira_base_url_https' do
|
|
|
|
before do
|
|
|
|
allow(Gitlab.config.jira_connect).to receive(:enforce_jira_base_url_https).and_return(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:expected_claims) { { aud: "http://test.host/-/jira_connect", iss: anything, qsh: anything } }
|
|
|
|
|
|
|
|
it_behaves_like 'generates JWT validation claims'
|
|
|
|
end
|
2021-11-18 22:05:49 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
describe '#uninstalled' do
|
|
|
|
let_it_be(:installation) { create(:jira_connect_installation) }
|
|
|
|
|
|
|
|
let(:client_key) { installation.client_key }
|
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
clientKey: client_key,
|
|
|
|
baseUrl: 'https://test.atlassian.net'
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'verifies asymmetric JWT token' do
|
|
|
|
let(:send_request) { post :uninstalled, params: params }
|
|
|
|
end
|
|
|
|
|
|
|
|
subject(:post_uninstalled) { post :uninstalled, params: params }
|
2020-11-24 15:15:51 +05:30
|
|
|
|
2021-11-18 22:05:49 +05:30
|
|
|
context 'when JWT is invalid' do
|
|
|
|
include_context 'invalid JWT token'
|
2020-11-24 15:15:51 +05:30
|
|
|
|
2021-11-18 22:05:49 +05:30
|
|
|
it 'does not delete the installation' do
|
|
|
|
expect { post_uninstalled }.not_to change { JiraConnectInstallation.count }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when JWT is valid' do
|
|
|
|
include_context 'valid JWT token'
|
|
|
|
|
|
|
|
let(:jira_base_path) { '/-/jira_connect' }
|
|
|
|
let(:jira_event_path) { '/-/jira_connect/events/uninstalled' }
|
|
|
|
|
|
|
|
it 'calls the DestroyService and returns ok in case of success' do
|
|
|
|
expect_next_instance_of(JiraConnectInstallations::DestroyService, installation, jira_base_path, jira_event_path) do |destroy_service|
|
|
|
|
expect(destroy_service).to receive(:execute).and_return(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
post_uninstalled
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'calls the DestroyService and returns unprocessable_entity in case of failure' do
|
|
|
|
expect_next_instance_of(JiraConnectInstallations::DestroyService, installation, jira_base_path, jira_event_path) do |destroy_service|
|
|
|
|
expect(destroy_service).to receive(:execute).and_return(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
post_uninstalled
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:unprocessable_entity)
|
|
|
|
end
|
2020-11-24 15:15:51 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|