debian-mirror-gitlab/spec/lib/gitlab/background_migration/migrate_u2f_webauthn_spec.rb
2021-12-11 22:18:48 +05:30

68 lines
2.7 KiB
Ruby

# frozen_string_literal: true
require 'spec_helper'
require 'webauthn/u2f_migrator'
RSpec.describe Gitlab::BackgroundMigration::MigrateU2fWebauthn, :migration, schema: 20181228175414 do
let(:users) { table(:users) }
let(:user) { users.create!(email: 'email@email.com', name: 'foo', username: 'foo', projects_limit: 0) }
let(:u2f_registrations) { table(:u2f_registrations) }
let(:webauthn_registrations) { table(:webauthn_registrations) }
let!(:u2f_registration_not_migrated) { create_u2f_registration(1, 'reg1') }
let!(:u2f_registration_not_migrated_no_name) { create_u2f_registration(2, nil, 2) }
let!(:u2f_registration_migrated) { create_u2f_registration(3, 'reg3') }
subject { described_class.new.perform(1, 3) }
before do
converted_credential = convert_credential_for(u2f_registration_migrated)
webauthn_registrations.create!(converted_credential)
end
it 'migrates all records' do
expect { subject }.to change { webauthn_registrations.count }.from(1).to(3)
all_webauthn_registrations = webauthn_registrations.all.map(&:attributes)
[u2f_registration_not_migrated, u2f_registration_not_migrated_no_name].each do |u2f_registration|
expected_credential = convert_credential_for(u2f_registration).except(:created_at).stringify_keys
expect(all_webauthn_registrations).to include(a_hash_including(expected_credential))
end
end
def create_u2f_registration(id, name, counter = 5)
device = U2F::FakeU2F.new(FFaker::BaconIpsum.characters(5))
u2f_registrations.create!({ id: id,
certificate: Base64.strict_encode64(device.cert_raw),
key_handle: U2F.urlsafe_encode64(device.key_handle_raw),
public_key: Base64.strict_encode64(device.origin_public_key_raw),
counter: counter,
name: name,
user_id: user.id })
end
def convert_credential_for(u2f_registration)
converted_credential = WebAuthn::U2fMigrator.new(
app_id: Gitlab.config.gitlab.url,
certificate: u2f_registration.certificate,
key_handle: u2f_registration.key_handle,
public_key: u2f_registration.public_key,
counter: u2f_registration.counter
).credential
{
credential_xid: Base64.strict_encode64(converted_credential.id),
public_key: Base64.strict_encode64(converted_credential.public_key),
counter: u2f_registration.counter,
name: u2f_registration.name || '',
user_id: u2f_registration.user_id,
u2f_registration_id: u2f_registration.id,
created_at: u2f_registration.created_at
}
end
end