227 lines
6.8 KiB
Ruby
227 lines
6.8 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'spec_helper'
|
|
|
|
RSpec.describe Gitlab::Ci::JwtV2, feature_category: :secrets_management do
|
|
let(:namespace) { build_stubbed(:namespace) }
|
|
let(:project) { build_stubbed(:project, namespace: namespace) }
|
|
let(:user) do
|
|
build_stubbed(
|
|
:user,
|
|
identities: [build_stubbed(:identity, extern_uid: '1', provider: 'github')]
|
|
)
|
|
end
|
|
|
|
let(:pipeline) { build_stubbed(:ci_pipeline, ref: 'auto-deploy-2020-03-19') }
|
|
let(:runner) { build_stubbed(:ci_runner) }
|
|
let(:aud) { nil }
|
|
let(:sub_components) { [:project_path, :ref_type, :ref] }
|
|
let(:target_audience) { nil }
|
|
|
|
let(:build) do
|
|
build_stubbed(
|
|
:ci_build,
|
|
project: project,
|
|
user: user,
|
|
pipeline: pipeline,
|
|
runner: runner
|
|
)
|
|
end
|
|
|
|
subject(:ci_job_jwt_v2) do
|
|
described_class.new(build, ttl: 30, aud: aud, sub_components: sub_components,
|
|
target_audience: target_audience)
|
|
end
|
|
|
|
it { is_expected.to be_a Gitlab::Ci::Jwt }
|
|
|
|
describe '#payload' do
|
|
subject(:payload) { ci_job_jwt_v2.payload }
|
|
|
|
it 'includes user identities when enabled' do
|
|
expect(user).to receive(:pass_user_identities_to_ci_jwt).and_return(true)
|
|
identities = payload[:user_identities].map { |identity| identity.slice(:extern_uid, :provider) }
|
|
expect(identities).to eq([{ extern_uid: '1', provider: 'github' }])
|
|
end
|
|
|
|
it 'does not include user identities when disabled' do
|
|
expect(user).to receive(:pass_user_identities_to_ci_jwt).and_return(false)
|
|
|
|
expect(payload).not_to include(:user_identities)
|
|
end
|
|
|
|
it 'has correct values for the standard JWT attributes' do
|
|
aggregate_failures do
|
|
expect(payload[:iss]).to eq(Gitlab.config.gitlab.url)
|
|
expect(payload[:sub]).to eq("project_path:#{project.full_path}:ref_type:branch:ref:#{pipeline.source_ref}")
|
|
end
|
|
end
|
|
|
|
describe 'when only project_path provided' do
|
|
let(:sub_components) { [:project_path] }
|
|
|
|
it 'has only project_path in sub section' do
|
|
aggregate_failures do
|
|
expect(payload[:sub]).to eq("project_path:#{project.full_path}")
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'when project_path and ref_type provided' do
|
|
let(:sub_components) { [:project_path, :ref_type] }
|
|
|
|
it 'has project_path and ref_type in sub section' do
|
|
aggregate_failures do
|
|
expect(payload[:sub]).to eq("project_path:#{project.full_path}:ref_type:branch")
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'when project_path and ref provided' do
|
|
let(:sub_components) { [:project_path, :ref] }
|
|
|
|
it 'has project_path and ref_type in sub section' do
|
|
aggregate_failures do
|
|
expect(payload[:sub]).to eq("project_path:#{project.full_path}:ref:#{pipeline.source_ref}")
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'when project_path and invalid claim provided' do
|
|
let(:sub_components) { [:project_path, :not_existing_claim] }
|
|
|
|
it 'has project_path' do
|
|
aggregate_failures do
|
|
expect(payload[:sub]).to eq("project_path:#{project.full_path}")
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when given an aud' do
|
|
let(:aud) { 'AWS' }
|
|
|
|
it 'uses that aud in the payload' do
|
|
expect(payload[:aud]).to eq('AWS')
|
|
end
|
|
|
|
it 'does not use target_audience claim in the payload' do
|
|
expect(payload.include?(:target_audience)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'when given an target_audience claim' do
|
|
let(:target_audience) { '//iam.googleapis.com/foo' }
|
|
|
|
it 'uses specified target_audience in the payload' do
|
|
expect(payload[:target_audience]).to eq(target_audience)
|
|
end
|
|
end
|
|
|
|
describe 'custom claims' do
|
|
let(:project_config) do
|
|
instance_double(
|
|
Gitlab::Ci::ProjectConfig,
|
|
url: 'gitlab.com/gitlab-org/gitlab//.gitlab-ci.yml',
|
|
source: :repository_source
|
|
)
|
|
end
|
|
|
|
before do
|
|
allow(Gitlab::Ci::ProjectConfig).to receive(:new).with(
|
|
project: project,
|
|
sha: pipeline.sha,
|
|
pipeline_source: pipeline.source.to_sym,
|
|
pipeline_source_bridge: pipeline.source_bridge
|
|
).and_return(project_config)
|
|
end
|
|
|
|
describe 'runner_id' do
|
|
it 'is the ID of the runner executing the job' do
|
|
expect(payload[:runner_id]).to eq(runner.id)
|
|
end
|
|
|
|
context 'when build is not associated with a runner' do
|
|
let(:runner) { nil }
|
|
|
|
it 'is nil' do
|
|
expect(payload[:runner_id]).to be_nil
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'runner_environment' do
|
|
context 'when runner is gitlab-hosted' do
|
|
before do
|
|
allow(runner).to receive(:gitlab_hosted?).and_return(true)
|
|
end
|
|
|
|
it "is #{described_class::GITLAB_HOSTED_RUNNER}" do
|
|
expect(payload[:runner_environment]).to eq(described_class::GITLAB_HOSTED_RUNNER)
|
|
end
|
|
end
|
|
|
|
context 'when runner is self-hosted' do
|
|
before do
|
|
allow(runner).to receive(:gitlab_hosted?).and_return(false)
|
|
end
|
|
|
|
it "is #{described_class::SELF_HOSTED_RUNNER}" do
|
|
expect(payload[:runner_environment]).to eq(described_class::SELF_HOSTED_RUNNER)
|
|
end
|
|
end
|
|
|
|
context 'when build is not associated with a runner' do
|
|
let(:runner) { nil }
|
|
|
|
it 'is nil' do
|
|
expect(payload[:runner_environment]).to be_nil
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'sha' do
|
|
it 'is the commit revision the project is built for' do
|
|
expect(payload[:sha]).to eq(pipeline.sha)
|
|
end
|
|
end
|
|
|
|
describe 'claims delegated to mapper' do
|
|
let(:ci_config_ref_uri) { 'ci_config_ref_uri' }
|
|
let(:ci_config_sha) { 'ci_config_sha' }
|
|
|
|
it 'delegates claims to Gitlab::Ci::JwtV2::ClaimMapper' do
|
|
expect_next_instance_of(Gitlab::Ci::JwtV2::ClaimMapper, project_config, pipeline) do |mapper|
|
|
expect(mapper).to receive(:to_h).and_return({
|
|
ci_config_ref_uri: ci_config_ref_uri,
|
|
ci_config_sha: ci_config_sha
|
|
})
|
|
end
|
|
|
|
expect(payload[:ci_config_ref_uri]).to eq(ci_config_ref_uri)
|
|
expect(payload[:ci_config_sha]).to eq(ci_config_sha)
|
|
end
|
|
end
|
|
|
|
describe 'project_visibility' do
|
|
using RSpec::Parameterized::TableSyntax
|
|
|
|
where(:visibility_level, :visibility_level_string) do
|
|
Project::PUBLIC | 'public'
|
|
Project::INTERNAL | 'internal'
|
|
Project::PRIVATE | 'private'
|
|
end
|
|
|
|
with_them do
|
|
before do
|
|
project.visibility_level = visibility_level
|
|
end
|
|
|
|
it 'is a string representation of the project visibility_level' do
|
|
expect(payload[:project_visibility]).to eq(visibility_level_string)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|