2016-09-29 09:46:39 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
# Integration test that exports a file using the Import/Export feature
|
|
|
|
# It looks up for any sensitive word inside the JSON, so if a sensitive word is found
|
|
|
|
# we''l have to either include it adding the model that includes it to the +safe_list+
|
|
|
|
# or make sure the attribute is blacklisted in the +import_export.yml+ configuration
|
|
|
|
feature 'Import/Export - project export integration test', feature: true, js: true do
|
|
|
|
include Select2Helper
|
|
|
|
include ExportFileHelper
|
|
|
|
|
|
|
|
let(:user) { create(:admin) }
|
|
|
|
let(:export_path) { "#{Dir::tmpdir}/import_file_spec" }
|
|
|
|
let(:config_hash) { YAML.load_file(Gitlab::ImportExport.config_file).deep_stringify_keys }
|
|
|
|
|
|
|
|
let(:sensitive_words) { %w[pass secret token key] }
|
|
|
|
let(:safe_list) do
|
|
|
|
{
|
|
|
|
token: [ProjectHook, Ci::Trigger, CommitStatus],
|
|
|
|
key: [Project, Ci::Variable, :yaml_variables]
|
|
|
|
}
|
|
|
|
end
|
|
|
|
let(:safe_hashes) { { yaml_variables: %w[key value public] } }
|
|
|
|
|
|
|
|
let(:project) { setup_project }
|
|
|
|
|
|
|
|
background do
|
|
|
|
allow_any_instance_of(Gitlab::ImportExport).to receive(:storage_path).and_return(export_path)
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
FileUtils.rm_rf(export_path, secure: true)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'admin user' do
|
|
|
|
before do
|
|
|
|
login_as(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
scenario 'exports a project successfully' do
|
|
|
|
visit edit_namespace_project_path(project.namespace, project)
|
|
|
|
|
|
|
|
expect(page).to have_content('Export project')
|
|
|
|
|
|
|
|
click_link 'Export project'
|
|
|
|
|
|
|
|
visit edit_namespace_project_path(project.namespace, project)
|
|
|
|
|
|
|
|
expect(page).to have_content('Download export')
|
|
|
|
|
2016-11-03 12:29:30 +05:30
|
|
|
expect(file_permissions(project.export_path)).to eq(0700)
|
|
|
|
|
2016-09-29 09:46:39 +05:30
|
|
|
in_directory_with_expanded_export(project) do |exit_status, tmpdir|
|
|
|
|
expect(exit_status).to eq(0)
|
|
|
|
|
|
|
|
project_json_path = File.join(tmpdir, 'project.json')
|
|
|
|
expect(File).to exist(project_json_path)
|
|
|
|
|
|
|
|
project_hash = JSON.parse(IO.read(project_json_path))
|
|
|
|
|
|
|
|
sensitive_words.each do |sensitive_word|
|
|
|
|
found = find_sensitive_attributes(sensitive_word, project_hash)
|
|
|
|
|
|
|
|
expect(found).to be_nil, failure_message(found.try(:key_found), found.try(:parent), sensitive_word)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def failure_message(key_found, parent, sensitive_word)
|
|
|
|
<<-MSG
|
|
|
|
Found a new sensitive word <#{key_found}>, which is part of the hash #{parent.inspect}
|
|
|
|
|
|
|
|
If you think this information shouldn't get exported, please exclude the model or attribute in IMPORT_EXPORT_CONFIG.
|
|
|
|
|
|
|
|
Otherwise, please add the exception to +safe_list+ in CURRENT_SPEC using #{sensitive_word} as the key and the
|
|
|
|
correspondent hash or model as the value.
|
|
|
|
|
|
|
|
IMPORT_EXPORT_CONFIG: #{Gitlab::ImportExport.config_file}
|
|
|
|
CURRENT_SPEC: #{__FILE__}
|
|
|
|
MSG
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|