184 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			184 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Ruby
		
	
	
	
| # frozen_string_literal: true
 | |
| 
 | |
| require 'spec_helper'
 | |
| 
 | |
| RSpec.describe Gitlab::Ci::JwtV2, feature_category: :secrets_management do
 | |
|   let(:namespace) { build_stubbed(:namespace) }
 | |
|   let(:project) { build_stubbed(:project, namespace: namespace) }
 | |
|   let(:user) do
 | |
|     build_stubbed(
 | |
|       :user,
 | |
|       identities: [build_stubbed(:identity, extern_uid: '1', provider: 'github')]
 | |
|     )
 | |
|   end
 | |
| 
 | |
|   let(:pipeline) { build_stubbed(:ci_pipeline, ref: 'auto-deploy-2020-03-19') }
 | |
|   let(:runner) { build_stubbed(:ci_runner) }
 | |
|   let(:aud) { described_class::DEFAULT_AUD }
 | |
|   let(:target_audience) { nil }
 | |
| 
 | |
|   let(:build) do
 | |
|     build_stubbed(
 | |
|       :ci_build,
 | |
|       project: project,
 | |
|       user: user,
 | |
|       pipeline: pipeline,
 | |
|       runner: runner
 | |
|     )
 | |
|   end
 | |
| 
 | |
|   subject(:ci_job_jwt_v2) { described_class.new(build, ttl: 30, aud: aud, target_audience: target_audience) }
 | |
| 
 | |
|   it { is_expected.to be_a Gitlab::Ci::Jwt }
 | |
| 
 | |
|   describe '#payload' do
 | |
|     subject(:payload) { ci_job_jwt_v2.payload }
 | |
| 
 | |
|     it 'includes user identities when enabled' do
 | |
|       expect(user).to receive(:pass_user_identities_to_ci_jwt).and_return(true)
 | |
|       identities = payload[:user_identities].map { |identity| identity.slice(:extern_uid, :provider) }
 | |
|       expect(identities).to eq([{ extern_uid: '1', provider: 'github' }])
 | |
|     end
 | |
| 
 | |
|     it 'does not include user identities when disabled' do
 | |
|       expect(user).to receive(:pass_user_identities_to_ci_jwt).and_return(false)
 | |
| 
 | |
|       expect(payload).not_to include(:user_identities)
 | |
|     end
 | |
| 
 | |
|     it 'has correct values for the standard JWT attributes' do
 | |
|       aggregate_failures do
 | |
|         expect(payload[:iss]).to eq(Gitlab.config.gitlab.url)
 | |
|         expect(payload[:aud]).to eq(Settings.gitlab.base_url)
 | |
|         expect(payload[:sub]).to eq("project_path:#{project.full_path}:ref_type:branch:ref:#{pipeline.source_ref}")
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when given an aud' do
 | |
|       let(:aud) { 'AWS' }
 | |
| 
 | |
|       it 'uses that aud in the payload' do
 | |
|         expect(payload[:aud]).to eq('AWS')
 | |
|       end
 | |
| 
 | |
|       it 'does not use target_audience claim in the payload' do
 | |
|         expect(payload.include?(:target_audience)).to be_falsey
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when given an target_audience claim' do
 | |
|       let(:target_audience) { '//iam.googleapis.com/foo' }
 | |
| 
 | |
|       it 'uses specified target_audience in the payload' do
 | |
|         expect(payload[:target_audience]).to eq(target_audience)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     describe 'custom claims' do
 | |
|       let(:project_config) do
 | |
|         instance_double(
 | |
|           Gitlab::Ci::ProjectConfig,
 | |
|           url: 'gitlab.com/gitlab-org/gitlab//.gitlab-ci.yml',
 | |
|           source: :repository_source
 | |
|         )
 | |
|       end
 | |
| 
 | |
|       before do
 | |
|         allow(Gitlab::Ci::ProjectConfig).to receive(:new).with(
 | |
|           project: project,
 | |
|           sha: pipeline.sha,
 | |
|           pipeline_source: pipeline.source.to_sym,
 | |
|           pipeline_source_bridge: pipeline.source_bridge
 | |
|         ).and_return(project_config)
 | |
|       end
 | |
| 
 | |
|       describe 'runner_id' do
 | |
|         it 'is the ID of the runner executing the job' do
 | |
|           expect(payload[:runner_id]).to eq(runner.id)
 | |
|         end
 | |
| 
 | |
|         context 'when build is not associated with a runner' do
 | |
|           let(:runner) { nil }
 | |
| 
 | |
|           it 'is nil' do
 | |
|             expect(payload[:runner_id]).to be_nil
 | |
|           end
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       describe 'runner_environment' do
 | |
|         context 'when runner is gitlab-hosted' do
 | |
|           before do
 | |
|             allow(runner).to receive(:gitlab_hosted?).and_return(true)
 | |
|           end
 | |
| 
 | |
|           it "is #{described_class::GITLAB_HOSTED_RUNNER}" do
 | |
|             expect(payload[:runner_environment]).to eq(described_class::GITLAB_HOSTED_RUNNER)
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'when runner is self-hosted' do
 | |
|           before do
 | |
|             allow(runner).to receive(:gitlab_hosted?).and_return(false)
 | |
|           end
 | |
| 
 | |
|           it "is #{described_class::SELF_HOSTED_RUNNER}" do
 | |
|             expect(payload[:runner_environment]).to eq(described_class::SELF_HOSTED_RUNNER)
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'when build is not associated with a runner' do
 | |
|           let(:runner) { nil }
 | |
| 
 | |
|           it 'is nil' do
 | |
|             expect(payload[:runner_environment]).to be_nil
 | |
|           end
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       describe 'sha' do
 | |
|         it 'is the commit revision the project is built for' do
 | |
|           expect(payload[:sha]).to eq(pipeline.sha)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       describe 'claims delegated to mapper' do
 | |
|         let(:ci_config_ref_uri) { 'ci_config_ref_uri' }
 | |
|         let(:ci_config_sha) { 'ci_config_sha' }
 | |
| 
 | |
|         it 'delegates claims to Gitlab::Ci::JwtV2::ClaimMapper' do
 | |
|           expect_next_instance_of(Gitlab::Ci::JwtV2::ClaimMapper, project_config, pipeline) do |mapper|
 | |
|             expect(mapper).to receive(:to_h).and_return({
 | |
|               ci_config_ref_uri: ci_config_ref_uri,
 | |
|               ci_config_sha: ci_config_sha
 | |
|             })
 | |
|           end
 | |
| 
 | |
|           expect(payload[:ci_config_ref_uri]).to eq(ci_config_ref_uri)
 | |
|           expect(payload[:ci_config_sha]).to eq(ci_config_sha)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       describe 'project_visibility' do
 | |
|         using RSpec::Parameterized::TableSyntax
 | |
| 
 | |
|         where(:visibility_level, :visibility_level_string) do
 | |
|           Project::PUBLIC   | 'public'
 | |
|           Project::INTERNAL | 'internal'
 | |
|           Project::PRIVATE  | 'private'
 | |
|         end
 | |
| 
 | |
|         with_them do
 | |
|           before do
 | |
|             project.visibility_level = visibility_level
 | |
|           end
 | |
| 
 | |
|           it 'is a string representation of the project visibility_level' do
 | |
|             expect(payload[:project_visibility]).to eq(visibility_level_string)
 | |
|           end
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| end
 |