2019-12-26 22:10:19 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
RSpec.describe Clusters::Aws::FetchCredentialsService do
|
2019-12-26 22:10:19 +05:30
|
|
|
describe '#execute' do
|
|
|
|
let(:user) { create(:user) }
|
2020-01-01 13:55:28 +05:30
|
|
|
let(:provider) { create(:cluster_provider_aws, region: 'ap-southeast-2') }
|
2019-12-26 22:10:19 +05:30
|
|
|
|
|
|
|
let(:gitlab_access_key_id) { 'gitlab-access-key-id' }
|
|
|
|
let(:gitlab_secret_access_key) { 'gitlab-secret-access-key' }
|
|
|
|
|
|
|
|
let(:gitlab_credentials) { Aws::Credentials.new(gitlab_access_key_id, gitlab_secret_access_key) }
|
|
|
|
let(:sts_client) { Aws::STS::Client.new(credentials: gitlab_credentials, region: region) }
|
|
|
|
let(:assumed_role) { instance_double(Aws::AssumeRoleCredentials, credentials: assumed_role_credentials) }
|
|
|
|
|
|
|
|
let(:assumed_role_credentials) { double }
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
subject { described_class.new(provision_role, provider: provider).execute }
|
2019-12-26 22:10:19 +05:30
|
|
|
|
|
|
|
context 'provision role is configured' do
|
2021-01-29 00:20:46 +05:30
|
|
|
let(:provision_role) { create(:aws_role, user: user, region: 'custom-region') }
|
2019-12-26 22:10:19 +05:30
|
|
|
|
|
|
|
before do
|
|
|
|
stub_application_setting(eks_access_key_id: gitlab_access_key_id)
|
|
|
|
stub_application_setting(eks_secret_access_key: gitlab_secret_access_key)
|
|
|
|
|
|
|
|
expect(Aws::Credentials).to receive(:new)
|
|
|
|
.with(gitlab_access_key_id, gitlab_secret_access_key)
|
|
|
|
.and_return(gitlab_credentials)
|
|
|
|
|
|
|
|
expect(Aws::STS::Client).to receive(:new)
|
|
|
|
.with(credentials: gitlab_credentials, region: region)
|
|
|
|
.and_return(sts_client)
|
|
|
|
|
|
|
|
expect(Aws::AssumeRoleCredentials).to receive(:new)
|
|
|
|
.with(
|
|
|
|
client: sts_client,
|
|
|
|
role_arn: provision_role.role_arn,
|
|
|
|
role_session_name: session_name,
|
2020-01-01 13:55:28 +05:30
|
|
|
external_id: provision_role.role_external_id,
|
|
|
|
policy: session_policy
|
2019-12-26 22:10:19 +05:30
|
|
|
).and_return(assumed_role)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'provider is specified' do
|
2020-01-01 13:55:28 +05:30
|
|
|
let(:region) { provider.region }
|
2019-12-26 22:10:19 +05:30
|
|
|
let(:session_name) { "gitlab-eks-cluster-#{provider.cluster_id}-user-#{user.id}" }
|
2020-01-01 13:55:28 +05:30
|
|
|
let(:session_policy) { nil }
|
2019-12-26 22:10:19 +05:30
|
|
|
|
|
|
|
it { is_expected.to eq assumed_role_credentials }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'provider is not specifed' do
|
|
|
|
let(:provider) { nil }
|
2021-01-29 00:20:46 +05:30
|
|
|
let(:region) { provision_role.region }
|
2019-12-26 22:10:19 +05:30
|
|
|
let(:session_name) { "gitlab-eks-autofill-user-#{user.id}" }
|
2020-01-01 13:55:28 +05:30
|
|
|
let(:session_policy) { 'policy-document' }
|
|
|
|
|
2021-01-29 00:20:46 +05:30
|
|
|
subject { described_class.new(provision_role, provider: provider).execute }
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
before do
|
|
|
|
allow(File).to receive(:read)
|
|
|
|
.with(Rails.root.join('vendor', 'aws', 'iam', 'eks_cluster_read_only_policy.json'))
|
|
|
|
.and_return(session_policy)
|
|
|
|
end
|
2019-12-26 22:10:19 +05:30
|
|
|
|
|
|
|
it { is_expected.to eq assumed_role_credentials }
|
2021-01-29 00:20:46 +05:30
|
|
|
|
|
|
|
context 'region is not specifed' do
|
|
|
|
let(:region) { Clusters::Providers::Aws::DEFAULT_REGION }
|
|
|
|
let(:provision_role) { create(:aws_role, user: user, region: nil) }
|
|
|
|
|
|
|
|
it { is_expected.to eq assumed_role_credentials }
|
|
|
|
end
|
2019-12-26 22:10:19 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'provision role is not configured' do
|
|
|
|
let(:provision_role) { nil }
|
|
|
|
|
|
|
|
it 'raises an error' do
|
|
|
|
expect { subject }.to raise_error(described_class::MissingRoleError, 'AWS provisioning role not configured')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|