Skip to content
代码片段 群组 项目
提交 37ed4bb1 编辑于 作者: Ahmed Hemdan's avatar Ahmed Hemdan 提交者: Etienne Baqué
浏览文件

Add pre_receive_secret_detection_enabled application setting

上级 dfe1b984
No related branches found
No related tags found
无相关合并请求
# frozen_string_literal: true
class AddPreReceiveSecretDetectionEnabledToApplicationSettings < Gitlab::Database::Migration[2.2]
milestone '16.7'
def change
add_column :application_settings, :pre_receive_secret_detection_enabled, :boolean, null: false, default: false
end
end
057503cc1306afe9dea3a3d01a2fd8eeb240c33d292a6e3f2bd8ba52b38cfa62
\ No newline at end of file
...@@ -12122,6 +12122,7 @@ CREATE TABLE application_settings ( ...@@ -12122,6 +12122,7 @@ CREATE TABLE application_settings (
enable_artifact_external_redirect_warning_page boolean DEFAULT true NOT NULL, enable_artifact_external_redirect_warning_page boolean DEFAULT true NOT NULL,
allow_project_creation_for_guest_and_below boolean DEFAULT true NOT NULL, allow_project_creation_for_guest_and_below boolean DEFAULT true NOT NULL,
update_namespace_name_rate_limit smallint DEFAULT 120 NOT NULL, update_namespace_name_rate_limit smallint DEFAULT 120 NOT NULL,
pre_receive_secret_detection_enabled boolean DEFAULT false NOT NULL,
CONSTRAINT app_settings_container_reg_cleanup_tags_max_list_size_positive CHECK ((container_registry_cleanup_tags_service_max_list_size >= 0)), CONSTRAINT app_settings_container_reg_cleanup_tags_max_list_size_positive CHECK ((container_registry_cleanup_tags_service_max_list_size >= 0)),
CONSTRAINT app_settings_container_registry_pre_import_tags_rate_positive CHECK ((container_registry_pre_import_tags_rate >= (0)::numeric)), CONSTRAINT app_settings_container_registry_pre_import_tags_rate_positive CHECK ((container_registry_pre_import_tags_rate >= (0)::numeric)),
CONSTRAINT app_settings_dep_proxy_ttl_policies_worker_capacity_positive CHECK ((dependency_proxy_ttl_group_policy_worker_capacity >= 0)), CONSTRAINT app_settings_dep_proxy_ttl_policies_worker_capacity_positive CHECK ((dependency_proxy_ttl_group_policy_worker_capacity >= 0)),
...@@ -7,12 +7,16 @@ module PushRules ...@@ -7,12 +7,16 @@ module PushRules
class SecretsCheck < ::Gitlab::Checks::BaseBulkChecker class SecretsCheck < ::Gitlab::Checks::BaseBulkChecker
def validate! def validate!
# Return early and not perform the check if: # Return early and not perform the check if:
# 1. no push rule exist # 1. unless application setting is enabled (regardless of whether it's a gitlab dedicated instance or not)
# 2. and license is not ultimate # 2. feature flag is disabled for this project (when instance type is not gitlab dedicated)
# 3. and feature flag is disabled # 3. no push rule exist
return unless push_rule && # 4. license is not ultimate
push_rule.project.licensed_feature_available?(:pre_receive_secret_detection) && return unless ::Gitlab::CurrentSettings.pre_receive_secret_detection_enabled
::Feature.enabled?(:pre_receive_secret_detection_push_check, push_rule.project)
return if ::Gitlab::CurrentSettings.gitlab_dedicated_instance != true &&
::Feature.disabled?(:pre_receive_secret_detection_push_check, push_rule.project)
return unless push_rule && push_rule.project.licensed_feature_available?(:pre_receive_secret_detection)
end end
end end
end end
......
...@@ -9,32 +9,78 @@ ...@@ -9,32 +9,78 @@
describe '#validate!' do describe '#validate!' do
it_behaves_like 'check ignored when push rule unlicensed' it_behaves_like 'check ignored when push rule unlicensed'
it_behaves_like 'use predefined push rules'
context 'when license is not ultimate' do context 'when application settings is disabled' do
before do
Gitlab::CurrentSettings.update!(pre_receive_secret_detection_enabled: false)
end
it 'skips the check' do it 'skips the check' do
expect(subject.validate!).to be_nil expect(subject.validate!).to be_nil
end end
end end
context 'when license is ultimate' do context 'when application settings is enabled' do
before do before do
stub_licensed_features(pre_receive_secret_detection: true) Gitlab::CurrentSettings.update!(pre_receive_secret_detection_enabled: true)
end end
it 'returns without raising errors' do it_behaves_like 'use predefined push rules'
# Since the check does nothing at the moment, it just execute without raising errors
expect { subject.validate! }.not_to raise_error
end
end
context 'when feature flag is disabled' do context 'when instance is dedicated' do
before do before do
stub_feature_flags(pre_receive_secret_detection_push_check: false) Gitlab::CurrentSettings.update!(gitlab_dedicated_instance: true)
end
context 'when license is not ultimate' do
it 'skips the check' do
expect(subject.validate!).to be_nil
end
end
context 'when license is ultimate' do
before do
stub_licensed_features(pre_receive_secret_detection: true)
end
it 'returns without raising errors' do
# Since the check does nothing at the moment, it just execute without raising errors
expect { subject.validate! }.not_to raise_error
end
end
end end
it 'skips the check' do context 'when instance is not dedicated' do
expect(subject.validate!).to be_nil before do
Gitlab::CurrentSettings.update!(gitlab_dedicated_instance: false)
end
context 'when license is not ultimate' do
it 'skips the check' do
expect(subject.validate!).to be_nil
end
end
context 'when license is ultimate' do
before do
stub_licensed_features(pre_receive_secret_detection: true)
end
it 'returns without raising errors' do
# Since the check does nothing at the moment, it just execute without raising errors
expect { subject.validate! }.not_to raise_error
end
end
context 'when feature flag is disabled' do
before do
stub_feature_flags(pre_receive_secret_detection_push_check: false)
end
it 'skips the check' do
expect(subject.validate!).to be_nil
end
end
end end
end end
end end
......
0% 加载中 .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册