debian-mirror-gitlab/spec/models/deploy_token_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

479 lines
14 KiB
Ruby
Raw Normal View History

2019-07-07 11:18:12 +05:30
# frozen_string_literal: true
2018-05-09 12:01:36 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe DeployToken do
2018-05-09 12:01:36 +05:30
subject(:deploy_token) { create(:deploy_token) }
it { is_expected.to have_many :project_deploy_tokens }
it { is_expected.to have_many(:projects).through(:project_deploy_tokens) }
2020-03-13 15:44:24 +05:30
it { is_expected.to have_many :group_deploy_tokens }
it { is_expected.to have_many(:groups).through(:group_deploy_tokens) }
2022-06-21 17:19:12 +05:30
it { is_expected.to belong_to(:user).with_foreign_key('creator_id') }
2020-03-13 15:44:24 +05:30
it_behaves_like 'having unique enum values'
2018-05-09 12:01:36 +05:30
2019-09-30 21:07:59 +05:30
describe 'validations' do
let(:username_format_message) { "can contain only letters, digits, '_', '-', '+', and '.'" }
it { is_expected.to validate_length_of(:username).is_at_most(255) }
it { is_expected.to allow_value('GitLab+deploy_token-3.14').for(:username) }
it { is_expected.not_to allow_value('<script>').for(:username).with_message(username_format_message) }
it { is_expected.not_to allow_value('').for(:username).with_message(username_format_message) }
2020-03-13 15:44:24 +05:30
it { is_expected.to validate_presence_of(:deploy_token_type) }
end
2021-10-27 15:23:28 +05:30
shared_examples 'invalid group deploy token' do
context 'revoked' do
before do
deploy_token.update_column(:revoked, true)
end
it { is_expected.to eq(false) }
end
context 'expired' do
before do
deploy_token.update!(expires_at: Date.today - 1.month)
end
it { is_expected.to eq(false) }
end
context 'project type' do
before do
deploy_token.update_column(:deploy_token_type, 2)
end
it { is_expected.to eq(false) }
end
end
2020-03-13 15:44:24 +05:30
describe 'deploy_token_type validations' do
context 'when a deploy token is associated to a group' do
it 'does not allow setting a project to it' do
group_token = create(:deploy_token, :group)
group_token.projects << build(:project)
expect(group_token).not_to be_valid
expect(group_token.errors.full_messages).to include('Deploy token cannot have projects assigned')
end
end
context 'when a deploy token is associated to a project' do
it 'does not allow setting a group to it' do
project_token = create(:deploy_token)
project_token.groups << build(:group)
expect(project_token).not_to be_valid
expect(project_token.errors.full_messages).to include('Deploy token cannot have groups assigned')
end
end
2019-09-30 21:07:59 +05:30
end
2018-05-09 12:01:36 +05:30
describe '#ensure_token' do
2019-07-07 11:18:12 +05:30
it 'ensures a token' do
2022-07-16 23:28:13 +05:30
deploy_token.token_encrypted = nil
2021-04-29 21:17:54 +05:30
deploy_token.save!
2018-05-09 12:01:36 +05:30
2022-07-16 23:28:13 +05:30
expect(deploy_token.token_encrypted).not_to be_empty
2018-05-09 12:01:36 +05:30
end
end
describe '#ensure_at_least_one_scope' do
context 'with at least one scope' do
2019-07-07 11:18:12 +05:30
it 'is valid' do
2018-05-09 12:01:36 +05:30
is_expected.to be_valid
end
end
context 'with no scopes' do
2019-07-07 11:18:12 +05:30
it 'is invalid' do
2020-04-22 19:07:51 +05:30
deploy_token = build(:deploy_token, read_repository: false, read_registry: false, write_registry: false)
2018-05-09 12:01:36 +05:30
expect(deploy_token).not_to be_valid
expect(deploy_token.errors[:base].first).to eq("Scopes can't be blank")
end
end
end
2021-10-27 15:23:28 +05:30
describe '#valid_for_dependency_proxy?' do
let_it_be_with_reload(:deploy_token) { create(:deploy_token, :group, :dependency_proxy_scopes) }
subject { deploy_token.valid_for_dependency_proxy? }
it { is_expected.to eq(true) }
it_behaves_like 'invalid group deploy token'
context 'insufficient scopes' do
before do
deploy_token.update_column(:write_registry, false)
end
it { is_expected.to eq(false) }
end
end
describe '#has_access_to_group?' do
let_it_be(:group) { create(:group) }
let_it_be_with_reload(:deploy_token) { create(:deploy_token, :group) }
let_it_be(:group_deploy_token) { create(:group_deploy_token, group: group, deploy_token: deploy_token) }
let(:test_group) { group }
subject { deploy_token.has_access_to_group?(test_group) }
it { is_expected.to eq(true) }
it_behaves_like 'invalid group deploy token'
context 'for a sub group' do
let(:test_group) { create(:group, parent: group) }
it { is_expected.to eq(true) }
end
context 'for a different group' do
let(:test_group) { create(:group) }
it { is_expected.to eq(false) }
end
end
2018-05-09 12:01:36 +05:30
describe '#scopes' do
context 'with all the scopes' do
2020-05-24 23:13:21 +05:30
let_it_be(:deploy_token) { create(:deploy_token, :all_scopes) }
2019-07-07 11:18:12 +05:30
it 'returns scopes assigned to DeployToken' do
2020-05-24 23:13:21 +05:30
expect(deploy_token.scopes).to eq(DeployToken::AVAILABLE_SCOPES)
2018-05-09 12:01:36 +05:30
end
end
context 'with only one scope' do
2019-07-07 11:18:12 +05:30
it 'returns scopes assigned to DeployToken' do
2020-04-22 19:07:51 +05:30
deploy_token = create(:deploy_token, read_registry: false, write_registry: false)
2018-05-09 12:01:36 +05:30
expect(deploy_token.scopes).to eq([:read_repository])
end
end
end
describe '#revoke!' do
2019-07-07 11:18:12 +05:30
it 'updates revoke attribute' do
2018-05-09 12:01:36 +05:30
deploy_token.revoke!
expect(deploy_token.revoked?).to be_truthy
end
end
describe "#active?" do
context "when it has been revoked" do
2019-07-07 11:18:12 +05:30
it 'returns false' do
2018-05-09 12:01:36 +05:30
deploy_token.revoke!
expect(deploy_token.active?).to be_falsy
end
end
2018-11-18 11:00:15 +05:30
context "when it hasn't been revoked and is not expired" do
2019-07-07 11:18:12 +05:30
it 'returns true' do
2018-11-18 11:00:15 +05:30
expect(deploy_token.active?).to be_truthy
end
end
context "when it hasn't been revoked and is expired" do
2019-07-07 11:18:12 +05:30
it 'returns true' do
2018-11-18 11:00:15 +05:30
deploy_token.update_attribute(:expires_at, Date.today - 5.days)
expect(deploy_token.active?).to be_falsy
end
end
context "when it hasn't been revoked and has no expiry" do
let(:deploy_token) { create(:deploy_token, expires_at: nil) }
2019-07-07 11:18:12 +05:30
it 'returns true' do
2018-05-09 12:01:36 +05:30
expect(deploy_token.active?).to be_truthy
end
end
end
2021-01-29 00:20:46 +05:30
# override the default PolicyActor implementation that always returns false
describe "#deactivated?" do
context "when it has been revoked" do
it 'returns true' do
deploy_token.revoke!
expect(deploy_token.deactivated?).to be_truthy
end
end
context "when it hasn't been revoked and is not expired" do
it 'returns false' do
expect(deploy_token.deactivated?).to be_falsy
end
end
context "when it hasn't been revoked and is expired" do
it 'returns false' do
deploy_token.update_attribute(:expires_at, Date.today - 5.days)
expect(deploy_token.deactivated?).to be_truthy
end
end
context "when it hasn't been revoked and has no expiry" do
let(:deploy_token) { create(:deploy_token, expires_at: nil) }
it 'returns false' do
expect(deploy_token.deactivated?).to be_falsy
end
end
end
2018-05-09 12:01:36 +05:30
describe '#username' do
2019-09-30 21:07:59 +05:30
context 'persisted records' do
it 'returns a default username if none is set' do
expect(deploy_token.username).to eq("gitlab+deploy-token-#{deploy_token.id}")
end
it 'returns the username provided if one is set' do
deploy_token = create(:deploy_token, username: 'deployer')
expect(deploy_token.username).to eq('deployer')
end
end
context 'new records' do
it 'returns nil if no username is set' do
deploy_token = build(:deploy_token)
expect(deploy_token.username).to be_nil
end
it 'returns the username provided if one is set' do
deploy_token = build(:deploy_token, username: 'deployer')
expect(deploy_token.username).to eq('deployer')
end
2018-05-09 12:01:36 +05:30
end
end
2020-03-13 15:44:24 +05:30
describe '#holder' do
subject { deploy_token.holder }
context 'when the token is of project type' do
it 'returns the relevant holder token' do
expect(subject).to eq(deploy_token.project_deploy_tokens.first)
end
end
context 'when the token is of group type' do
let(:group) { create(:group) }
let(:deploy_token) { create(:deploy_token, :group) }
it 'returns the relevant holder token' do
expect(subject).to eq(deploy_token.group_deploy_tokens.first)
end
end
end
2018-05-09 12:01:36 +05:30
describe '#has_access_to?' do
let(:project) { create(:project) }
subject { deploy_token.has_access_to?(project) }
2020-03-13 15:44:24 +05:30
context 'when a project is not passed in' do
let(:project) { nil }
2018-05-09 12:01:36 +05:30
2020-03-13 15:44:24 +05:30
it { is_expected.to be_falsy }
2018-05-09 12:01:36 +05:30
end
2020-03-13 15:44:24 +05:30
context 'when a project is passed in' do
context 'when deploy token is active and related to project' do
let(:deploy_token) { create(:deploy_token, projects: [project]) }
2018-05-09 12:01:36 +05:30
2020-03-13 15:44:24 +05:30
it { is_expected.to be_truthy }
end
2018-05-09 12:01:36 +05:30
2020-03-13 15:44:24 +05:30
context 'when deploy token is active but not related to project' do
let(:deploy_token) { create(:deploy_token) }
2018-05-09 12:01:36 +05:30
2020-03-13 15:44:24 +05:30
it { is_expected.to be_falsy }
end
2018-05-09 12:01:36 +05:30
2020-03-13 15:44:24 +05:30
context 'when deploy token is revoked and related to project' do
let(:deploy_token) { create(:deploy_token, :revoked, projects: [project]) }
2018-05-09 12:01:36 +05:30
2020-03-13 15:44:24 +05:30
it { is_expected.to be_falsy }
end
context 'when deploy token is revoked and not related to the project' do
let(:deploy_token) { create(:deploy_token, :revoked) }
it { is_expected.to be_falsy }
end
context 'and when the token is of group type' do
let_it_be(:group) { create(:group) }
2021-09-30 23:02:18 +05:30
2020-03-13 15:44:24 +05:30
let(:deploy_token) { create(:deploy_token, :group) }
before do
deploy_token.groups << group
end
2021-09-04 01:27:46 +05:30
context 'and the passed-in project does not belong to any group' do
it { is_expected.to be_falsy }
2020-03-13 15:44:24 +05:30
end
2021-09-04 01:27:46 +05:30
context 'and the passed-in project belongs to the token group' do
it 'is true' do
group.projects << project
2020-03-13 15:44:24 +05:30
2021-09-04 01:27:46 +05:30
is_expected.to be_truthy
2020-03-13 15:44:24 +05:30
end
2021-09-04 01:27:46 +05:30
end
2020-03-13 15:44:24 +05:30
2021-09-04 01:27:46 +05:30
context 'and the passed-in project belongs to a subgroup' do
let(:child_group) { create(:group, parent_id: group.id) }
let(:grandchild_group) { create(:group, parent_id: child_group.id) }
2020-03-13 15:44:24 +05:30
2021-09-04 01:27:46 +05:30
before do
grandchild_group.projects << project
2020-03-13 15:44:24 +05:30
end
2021-09-04 01:27:46 +05:30
context 'and the token group is an ancestor (grand-parent) of this group' do
it { is_expected.to be_truthy }
end
2020-03-13 15:44:24 +05:30
2021-09-04 01:27:46 +05:30
context 'and the token group is not ancestor of this group' do
let(:child2_group) { create(:group, parent_id: group.id) }
2020-03-13 15:44:24 +05:30
2021-09-04 01:27:46 +05:30
it 'is false' do
deploy_token.groups = [child2_group]
2020-03-13 15:44:24 +05:30
2021-09-04 01:27:46 +05:30
is_expected.to be_falsey
2020-03-13 15:44:24 +05:30
end
end
2021-09-04 01:27:46 +05:30
end
2020-03-13 15:44:24 +05:30
2021-09-04 01:27:46 +05:30
context 'and the passed-in project does not belong to the token group' do
it { is_expected.to be_falsy }
end
2020-03-13 15:44:24 +05:30
2021-09-04 01:27:46 +05:30
context 'and the project belongs to a group that is parent of the token group' do
let(:super_group) { create(:group) }
let(:deploy_token) { create(:deploy_token, :group) }
let(:group) { create(:group, parent_id: super_group.id) }
2020-03-13 15:44:24 +05:30
2021-09-04 01:27:46 +05:30
it 'is false' do
super_group.projects << project
2020-03-13 15:44:24 +05:30
2021-09-04 01:27:46 +05:30
is_expected.to be_falsey
2020-03-13 15:44:24 +05:30
end
end
end
context 'and the token is of project type' do
let(:deploy_token) { create(:deploy_token, projects: [project]) }
context 'and the passed-in project is the same as the token project' do
it { is_expected.to be_truthy }
end
context 'and the passed-in project is not the same as the token project' do
subject { deploy_token.has_access_to?(create(:project)) }
it { is_expected.to be_falsey }
end
end
2018-05-09 12:01:36 +05:30
end
end
describe '#expires_at' do
context 'when using Forever.date' do
let(:deploy_token) { create(:deploy_token, expires_at: nil) }
2019-07-07 11:18:12 +05:30
it 'returns nil' do
2018-05-09 12:01:36 +05:30
expect(deploy_token.expires_at).to be_nil
end
end
context 'when using a personalized date' do
let(:expires_at) { Date.today + 5.months }
let(:deploy_token) { create(:deploy_token, expires_at: expires_at) }
2019-07-07 11:18:12 +05:30
it 'returns the personalized date' do
2018-05-09 12:01:36 +05:30
expect(deploy_token.expires_at).to eq(expires_at)
end
end
end
describe '#expires_at=' do
context 'when passing nil' do
let(:deploy_token) { create(:deploy_token, expires_at: nil) }
2019-07-07 11:18:12 +05:30
it 'assigns Forever.date' do
2018-05-09 12:01:36 +05:30
expect(deploy_token.read_attribute(:expires_at)).to eq(Forever.date)
end
end
2020-03-13 15:44:24 +05:30
context 'when passing a value' do
2018-05-09 12:01:36 +05:30
let(:expires_at) { Date.today + 5.months }
let(:deploy_token) { create(:deploy_token, expires_at: expires_at) }
2019-07-07 11:18:12 +05:30
it 'respects the value' do
2018-05-09 12:01:36 +05:30
expect(deploy_token.read_attribute(:expires_at)).to eq(expires_at)
end
end
end
2018-10-15 14:42:47 +05:30
describe '.gitlab_deploy_token' do
let(:project) { create(:project ) }
subject { project.deploy_tokens.gitlab_deploy_token }
context 'with a gitlab deploy token associated' do
2019-07-07 11:18:12 +05:30
it 'returns the gitlab deploy token' do
2018-10-15 14:42:47 +05:30
deploy_token = create(:deploy_token, :gitlab_deploy_token, projects: [project])
is_expected.to eq(deploy_token)
end
end
context 'with no gitlab deploy token associated' do
2019-07-07 11:18:12 +05:30
it 'returns nil' do
2018-10-15 14:42:47 +05:30
is_expected.to be_nil
end
end
end
2021-01-03 14:25:43 +05:30
describe '#accessible_projects' do
subject { deploy_token.accessible_projects }
context 'when a deploy token is associated to a project' do
let_it_be(:deploy_token) { create(:deploy_token, :project) }
it 'returns only projects directly associated with the token' do
expect(deploy_token).to receive(:projects)
subject
end
end
context 'when a deploy token is associated to a group' do
let_it_be(:group) { create(:group) }
let_it_be(:deploy_token) { create(:deploy_token, :group, groups: [group]) }
it 'returns all projects from the group' do
expect(group).to receive(:all_projects)
subject
end
end
end
2022-07-16 23:28:13 +05:30
describe '.impersonated?' do
it 'returns false' do
expect(subject.impersonated?).to be(false)
end
end
2018-05-09 12:01:36 +05:30
end