Skip to content
GitLab
菜单
为什么选择 GitLab
定价
联系销售
探索
为什么选择 GitLab
定价
联系销售
探索
登录
获取免费试用
主导航
搜索或转到…
项目
GitLab
管理
动态
成员
标记
计划
议题
议题看板
里程碑
迭代
需求
代码
合并请求
仓库
分支
提交
标签
仓库图
比较修订版本
代码片段
锁定的文件
构建
流水线
作业
流水线计划
测试用例
产物
部署
发布
Package registry
Container registry
模型注册表
运维
环境
Terraform 模块
监控
事件
服务台
分析
价值流分析
贡献者分析
CI/CD 分析
仓库分析
代码评审分析
议题分析
洞察
模型实验
效能分析
帮助
帮助
支持
GitLab 文档
比较 GitLab 各版本
社区论坛
为极狐GitLab 提交贡献
提交反馈
隐私声明
快捷键
?
新增功能
4
代码片段
群组
项目
显示更多面包屑
gitlab-cn
GitLab
提交
74253e61
未验证
提交
74253e61
编辑于
6 months ago
作者:
Rémy Coutable
浏览文件
操作
下载
补丁
差异文件
Define a proper class in config/initializers/01_secret_token.rb
Signed-off-by:
Rémy Coutable
<
remy@rymai.me
>
上级
c02383bd
No related branches found
No related tags found
无相关合并请求
变更
2
隐藏空白变更内容
行内
左右并排
显示
2 个更改的文件
config/initializers/01_secret_token.rb
+83
-73
83 个添加, 73 个删除
config/initializers/01_secret_token.rb
spec/initializers/secret_token_spec.rb
+178
-146
178 个添加, 146 个删除
spec/initializers/secret_token_spec.rb
有
261 个添加
和
219 个删除
config/initializers/01_secret_token.rb
+
83
−
73
浏览文件 @
74253e61
...
@@ -7,95 +7,105 @@
...
@@ -7,95 +7,105 @@
# prepend modules that require access to secrets (e.g. EE's 0_as_concern.rb).
# prepend modules that require access to secrets (e.g. EE's 0_as_concern.rb).
#
#
# Be sure to restart your server when you modify this file.
# Be sure to restart your server when you modify this file.
require
'securerandom'
require
'securerandom'
def
rails_secrets_config_file
class
SecretsInitializer
Rails
.
root
.
join
(
'config/secrets.yml'
)
def
initialize
(
secrets_file_path
:,
rails_env
:)
end
@secrets_file_path
=
secrets_file_path
@rails_env
=
rails_env
end
def
load_secrets_from_file
def
secrets_from_file
YAML
.
safe_load_file
(
rails_secrets_config_file
)
@secrets_from_file
||=
begin
rescue
Errno
::
ENOENT
,
Psych
::
SyntaxError
YAML
.
safe_load_file
(
secrets_file_path
)
{}
rescue
Errno
::
ENOENT
end
{}
end
end
def
set_credentials_from_file_and_env!
def
execute!
# Inspired by https://github.com/rails/rails/blob/v7.0.8.4/railties/lib/rails/secrets.rb#L25-L36
set_credentials_from_file_and_env!
# Later, once config/secrets.yml won't be read automatically, we'll need to do it manually, so
set_missing_from_defaults!
# we anticipate and do it ourselves here.
file_secrets
=
load_secrets_from_file
secrets
=
file_secrets
.
fetch
(
"shared"
,
{}).
deep_symbolize_keys
.
merge
(
file_secrets
.
fetch
(
Rails
.
env
,
{}).
deep_symbolize_keys
)
# Copy secrets from config/secrets.yml into Rails.application.credentials
# If we support native Rails.application.credentials later
# (e.g. config.credentials.yml.enc + config/master.key ), this loop would
# become a no-op as long as credentials are migrated to config.credentials.yml.enc.
secrets
.
each
do
|
key
,
value
|
next
if
Rails
.
application
.
credentials
.
public_send
(
key
).
present?
Rails
.
application
.
credentials
[
key
]
=
value
end
end
# Historically, ENV['SECRET_KEY_BASE'] takes precedence over config/secrets.yml, so we maintain that
private
# behavior by ensuring the environment variable always overrides the value from config/secrets.yml.
env_secret_key
=
ENV
[
'SECRET_KEY_BASE'
]
Rails
.
application
.
credentials
.
secret_key_base
=
env_secret_key
if
env_secret_key
.
present?
end
def
set_missing_from_defaults!
attr_reader
:secrets_file_path
,
:rails_env
defaults
=
{
secret_key_base:
generate_new_secure_token
,
otp_key_base:
generate_new_secure_token
,
db_key_base:
generate_new_secure_token
,
openid_connect_signing_key:
generate_new_rsa_private_key
}
# encrypted_settings_key_base is optional for now
if
ENV
[
'GITLAB_GENERATE_ENCRYPTED_SETTINGS_KEY_BASE'
]
defaults
[
:encrypted_settings_key_base
]
=
generate_new_secure_token
end
missing_secrets
=
set_missing_keys
(
defaults
)
def
set_credentials_from_file_and_env!
write_secrets_yml!
(
missing_secrets
)
if
missing_secrets
.
any?
# Inspired by https://github.com/rails/rails/blob/v7.0.8.4/railties/lib/rails/secrets.rb#L25-L36
end
# Later, once config/secrets.yml won't be read automatically, we'll need to do it manually, so
# we anticipate and do it ourselves here.
secrets
=
secrets_from_file
.
fetch
(
"shared"
,
{}).
deep_symbolize_keys
.
merge
(
secrets_from_file
.
fetch
(
rails_env
,
{}).
deep_symbolize_keys
)
def
create_tokens
# Copy secrets from config/secrets.yml into Rails.application.credentials
set_credentials_from_file_and_env!
# If we support native Rails.application.credentials later
set_missing_from_defaults!
# (e.g. config.credentials.yml.enc + config/master.key ), this loop would
end
# become a no-op as long as credentials are migrated to config.credentials.yml.enc.
secrets
.
each
do
|
key
,
value
|
next
if
Rails
.
application
.
credentials
.
public_send
(
key
).
present?
def
generate_new_secure_token
Rails
.
application
.
credentials
[
key
]
=
value
SecureRandom
.
hex
(
64
)
end
end
def
generate_new_rsa_private_key
# Historically, ENV['SECRET_KEY_BASE'] takes precedence over config/secrets.yml, so we maintain that
OpenSSL
::
PKey
::
RSA
.
new
(
2048
).
to_pem
# behavior by ensuring the environment variable always overrides the value from config/secrets.yml.
end
env_secret_key
=
ENV
[
'SECRET_KEY_BASE'
]
Rails
.
application
.
credentials
.
secret_key_base
=
env_secret_key
if
env_secret_key
.
present?
end
def
warn_missing_secret
(
secret
)
def
set_missing_from_defaults!
return
if
Rails
.
env
.
test?
defaults
=
{
secret_key_base:
generate_new_secure_token
,
otp_key_base:
generate_new_secure_token
,
db_key_base:
generate_new_secure_token
,
openid_connect_signing_key:
generate_new_rsa_private_key
}
# encrypted_settings_key_base is optional for now
if
ENV
[
'GITLAB_GENERATE_ENCRYPTED_SETTINGS_KEY_BASE'
]
defaults
[
:encrypted_settings_key_base
]
=
generate_new_secure_token
end
missing_secrets
=
set_missing_keys
(
defaults
)
write_secrets_yml!
(
missing_secrets
)
if
missing_secrets
.
any?
end
warn
"Missing Rails.application.credentials.
#{
secre
t
}
for
#{
Rails
.
env
}
environment. "
\
def
generate_new_
sec
u
re
_token
"The secret will be generated and stored in config/secrets.yml."
SecureRandom
.
hex
(
64
)
end
end
def
set_missing_keys
(
defaults
)
def
generate_new_rsa_private_key
defaults
.
stringify_keys
.
each_with_object
({})
do
|
(
key
,
default
),
missing
|
OpenSSL
::
PKey
::
RSA
.
new
(
2048
).
to_pem
next
if
Rails
.
application
.
credentials
.
public_send
(
key
).
present?
end
def
warn_missing_secret
(
secret
)
return
if
rails_env
.
test?
warn
_m
issing
_secret
(
key
)
warn
"M
issing
Rails.application.credentials.
#{
secret
}
for
#{
rails_env
}
environment. "
\
missing
[
key
]
=
Rails
.
application
.
credentials
[
key
]
=
default
"The secret will be generated and stored in config/secrets.yml."
end
end
end
def
write_secrets_yml!
(
missing_secrets
)
def
set_missing_keys
(
defaults
)
rails_env
=
Rails
.
env
.
to_s
defaults
.
stringify_keys
.
each_with_object
({})
do
|
(
key
,
default
),
missing
|
secrets
=
load_secrets_from_file
next
if
Rails
.
application
.
credentials
.
public_send
(
key
).
present?
secrets
[
rails_env
]
||=
{}
secrets
[
rails_env
].
merge!
(
missing_secrets
)
warn_missing_secret
(
key
)
File
.
write
(
rails_secrets_config_file
,
YAML
.
dump
(
secrets
),
mode:
'w'
,
perm:
0
o600
)
missing
[
key
]
=
Rails
.
application
.
credentials
[
key
]
=
default
end
end
def
write_secrets_yml!
(
missing_secrets
)
secrets_from_file
[
rails_env
.
to_s
]
||=
{}
secrets_from_file
[
rails_env
.
to_s
].
merge!
(
missing_secrets
)
File
.
write
(
secrets_file_path
,
YAML
.
dump
(
secrets_from_file
),
mode:
'w'
,
perm:
0
o600
)
end
end
end
cre
ate_tokens
Se
cre
tsInitializer
.
new
(
secrets_file_path:
Rails
.
root
.
join
(
'config/secrets.yml'
),
rails_env:
Rails
.
env
).
execute!
此差异已折叠。
点击以展开。
spec/initializers/secret_token_spec.rb
+
178
−
146
浏览文件 @
74253e61
...
@@ -3,37 +3,27 @@
...
@@ -3,37 +3,27 @@
require
'spec_helper'
require
'spec_helper'
require_relative
'../../config/initializers/01_secret_token'
require_relative
'../../config/initializers/01_secret_token'
RSpec
.
describe
'create_tokens'
do
# rubocop:disable RSpec/FilePath -- The initializer name starts with `01` because we want to run it ASAP
include
StubENV
# rubocop:disable RSpec/FeatureCategory -- This is a shared responsibility
RSpec
.
describe
SecretsInitializer
do
let
(
:allowed_keys
)
do
let
(
:rails_env_name
)
{
'test'
}
%w[
let
(
:rails_env
)
{
ActiveSupport
::
EnvironmentInquirer
.
new
(
rails_env_name
)
}
secret_key_base
let
(
:fake_secret_file
)
{
Tempfile
.
new
([
'fake-secrets'
,
'.yml'
])
}
db_key_base
let
(
:secrets_hash
)
{
{}
}
otp_key_base
let
(
:fake_secret_file_content
)
{
secrets_hash
.
to_yaml
}
openid_connect_signing_key
]
end
let
(
:hex_key
)
{
/\h{128}/
}
let
(
:rsa_key
)
{
/\A-----BEGIN RSA PRIVATE KEY-----\n.+\n-----END RSA PRIVATE KEY-----\n\Z/m
}
around
do
|
example
|
before
do
original_credentials
=
Rails
.
application
.
credentials
fake_secret_file
.
write
(
fake_secret_file_content
)
# ensure we clear any existing `encrypted_settings_key_base` credential
fake_secret_file
.
rewind
allowed_keys
.
each
do
|
key
|
Rails
.
application
.
credentials
.
public_send
(
:"
#{
key
}
="
,
nil
)
end
example
.
run
Rails
.
application
.
credentials
=
original_credentials
end
end
before
do
after
do
allow
(
Rails
).
to
receive_message_chain
(
:root
,
:join
)
{
|
string
|
string
}
fake_secret_file
.
close
allow
(
File
).
to
receive
(
:write
).
and_call_original
fake_secret_file
.
unlink
allow
(
File
).
to
receive
(
:write
).
with
(
'config/secrets.yml'
)
end
end
subject
(
:initializer
)
{
described_class
.
new
(
secrets_file_path:
fake_secret_file
.
path
,
rails_env:
rails_env
)
}
describe
'ensure acknowledged secrets in any installations'
do
describe
'ensure acknowledged secrets in any installations'
do
let
(
:acknowledged_secrets
)
do
let
(
:acknowledged_secrets
)
do
%w[secret_key_base otp_key_base db_key_base openid_connect_signing_key encrypted_settings_key_base
%w[secret_key_base otp_key_base db_key_base openid_connect_signing_key encrypted_settings_key_base
...
@@ -41,195 +31,237 @@
...
@@ -41,195 +31,237 @@
end
end
it
'does not allow to add a new secret without a proper handling'
do
it
'does not allow to add a new secret without a proper handling'
do
cre
ate_tokens
se
cre
ts_hash
=
YAML
.
safe_load_file
(
Rails
.
root
.
join
(
'config/secrets.yml'
))
secrets_hash
=
YAML
.
load_file
(
Rails
.
root
.
join
(
'config/secrets.yml'
))
secrets_hash
.
each_value
do
|
secrets
|
secrets_hash
.
each
do
|
environment
,
secrets
|
new_secrets
=
secrets
.
keys
-
acknowledged_secrets
new_secrets
=
secrets
.
keys
-
acknowledged_secrets
expect
(
new_secrets
).
to
be_empty
,
expect
(
new_secrets
).
to
be_empty
,
<<~
EOS
<<~
WARNING
CAUTION:
CAUTION:
It looks like you have just added new secret(s)
#{
new_secrets
.
inspect
}
to the secrets.yml.
It looks like you have just added new secret(s)
#{
new_secrets
.
inspect
}
to the secrets.yml.
Please read the development guide for GitLab secrets at doc/development/application_secrets.md before you proceed this change.
Please read the development guide for GitLab secrets at doc/development/application_secrets.md before you proceed this change.
If you're absolutely sure that the change is safe, please add the new secrets to the 'acknowledged_secrets' in order to silence this warning.
If you're absolutely sure that the change is safe, please add the new secrets to the 'acknowledged_secrets' in order to silence this warning.
EOS
WARNING
end
end
end
end
end
end
context
'when none of the secrets exist'
do
describe
'#secrets_from_file'
do
before
do
context
'when the secrets files is a valid YAML'
do
# ensure we clear any existing `encrypted_settings_key_base` credential
let
(
:secrets_hash
)
{
{
'foo'
=>
'bar'
}
}
allowed_keys
.
each
do
|
key
|
Rails
.
application
.
credentials
.
public_send
(
:"
#{
key
}
="
,
nil
)
end
allow
(
self
).
to
receive
(
:load_secrets_from_file
).
and_return
({})
it
'parses and returns the hash'
do
stub_env
(
'SECRET_KEY_BASE'
,
nil
)
expect
(
initializer
.
secrets_from_file
).
to
eq
({
'foo'
=>
'bar'
})
end
end
end
it
'generates different hashes for secret_key_base, otp_key_base, and db_key_base
'
do
context
'when the secrets file does not exist
'
do
create_tokens
let
(
:fake_secret_file_content
)
{
'foo = bar'
}
keys
=
Rails
.
application
.
credentials
.
values_at
(
:secret_key_base
,
:otp_key_base
,
:db_key_base
)
it
'returns an empty hash'
do
expect
(
YAML
).
to
receive
(
:safe_load_file
).
and_raise
(
Errno
::
ENOENT
)
expect
(
keys
.
uniq
).
to
eq
(
keys
)
expect
(
initializer
.
secrets_from_file
).
to
eq
(
{}
)
e
xpect
(
keys
).
to
all
(
match
(
hex_key
))
e
nd
end
end
it
'generates an RSA key for openid_connect_signing_key'
do
context
'when the secrets file contains invalid YAML'
do
create_tokens
let
(
:fake_secret_file_content
)
{
"foo:
\n\t
bar: baz
\n\t
bar: foo"
}
it
'raises a Psych::SyntaxError exception'
do
expect
{
initializer
.
secrets_from_file
}.
to
raise_error
(
Psych
::
SyntaxError
)
end
end
end
keys
=
Rails
.
application
.
credentials
.
values_at
(
:openid_connect_signing_key
)
describe
'#execute!'
do
include
StubENV
expect
(
keys
.
uniq
).
to
eq
(
keys
)
let
(
:allowed_keys
)
do
expect
(
keys
).
to
all
(
match
(
rsa_key
))
%w[
secret_key_base
db_key_base
otp_key_base
openid_connect_signing_key
]
end
end
it
'warns about the secrets to add to secrets.yml'
do
let
(
:hex_key
)
{
/\h{128}/
}
let
(
:rsa_key
)
{
/\A-----BEGIN RSA PRIVATE KEY-----\n.+\n-----END RSA PRIVATE KEY-----\n\Z/m
}
around
do
|
example
|
original_credentials
=
Rails
.
application
.
credentials
# Ensure we clear any existing `encrypted_settings_key_base` credential
allowed_keys
.
each
do
|
key
|
allowed_keys
.
each
do
|
key
|
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
key
)
Rails
.
application
.
credentials
.
public_send
(
:"
#{
key
}
="
,
nil
)
end
end
create_tokens
example
.
run
Rails
.
application
.
credentials
=
original_credentials
end
end
it
'writes the secrets to secrets.yml'
do
before
do
expect
(
File
).
to
receive
(
:write
).
with
(
'config/secrets.yml'
,
any_args
)
do
|
_filename
,
contents
,
_options
|
allow
(
File
).
to
receive
(
:write
).
with
(
fake_secret_file
.
path
,
any_args
)
new_secrets
=
YAML
.
safe_load
(
contents
)[
'test'
]
end
allowed_keys
.
each
do
|
key
|
context
'when none of the secrets exist'
do
expect
(
new_secrets
[
key
]).
to
eq
(
Rails
.
application
.
credentials
.
values_at
(
key
.
to_sym
).
first
)
before
do
end
stub_env
(
'SECRET_KEY_BASE'
,
nil
)
expect
(
new_secrets
[
'encrypted_settings_key_base'
]).
to
be_nil
# encrypted_settings_key_base is optional
end
end
create_tokens
it
'generates different hashes for secret_key_base, otp_key_base, and db_key_base'
do
end
initializer
.
execute!
context
'when GITLAB_GENERATE_ENCRYPTED_SETTINGS_KEY_BASE is set'
do
keys
=
Rails
.
application
.
credentials
.
values_at
(
:secret_key_base
,
:otp_key_base
,
:db_key_base
)
let
(
:allowed_keys
)
do
super
()
+
[
'encrypted_settings_key_base'
]
end
before
do
expect
(
keys
.
uniq
).
to
eq
(
keys
)
stub_env
(
'GITLAB_GENERATE_ENCRYPTED_SETTINGS_KEY_BASE'
,
'1'
)
expect
(
keys
).
to
all
(
match
(
hex_key
))
allow
(
self
).
to
receive
(
:warn_missing_secret
)
end
end
it
'writes the encrypted_settings_key_base secret'
do
it
'generates an RSA key for openid_connect_signing_key'
do
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
'encrypted_settings_key_base'
)
initializer
.
execute!
expect
(
File
).
to
receive
(
:write
).
with
(
'config/secrets.yml'
,
any_args
)
do
|
_filename
,
contents
,
_options
|
new_secrets
=
YAML
.
safe_load
(
contents
)[
'test'
]
keys
=
Rails
.
application
.
credentials
.
values_at
(
:openid_connect_signing_key
)
expect
(
keys
.
uniq
).
to
eq
(
keys
)
expect
(
keys
).
to
all
(
match
(
rsa_key
))
end
expect
(
new_secrets
[
'encrypted_settings_key_base'
]).
to
eq
(
Rails
.
application
.
credentials
.
encrypted_settings_key_base
)
it
'warns about the secrets to add to secrets.yml'
do
allowed_keys
.
each
do
|
key
|
expect
(
initializer
).
to
receive
(
:warn_missing_secret
).
with
(
key
)
end
end
create_tokens
initializer
.
execute!
end
end
end
end
shared_examples
'credentials are properly set
'
do
it
'writes the secrets to secrets.yml
'
do
it
'sets Rails.application.credentials'
do
expect
(
File
).
to
receive
(
:write
).
with
(
fake_secret_file
.
path
,
any_args
)
do
|
_filename
,
contents
,
_options
|
create_tokens
new_secrets
=
YAML
.
safe_load
(
contents
)[
rails_env_name
]
expect
(
Rails
.
application
.
credentials
.
values_at
(
*
allowed_keys
.
map
(
&
:to_sym
))).
to
eq
(
allowed_keys
)
allowed_keys
.
each
do
|
key
|
end
expect
(
new_secrets
[
key
]).
to
eq
(
Rails
.
application
.
credentials
.
values_at
(
key
.
to_sym
).
first
)
end
expect
(
new_secrets
[
'encrypted_settings_key_base'
]).
to
be_nil
# encrypted_settings_key_base is optional
end
it
'does not issue warnings'
do
initializer
.
execute!
e
xpect
(
self
).
not_to
receive
(
:warn_missing_secret
)
e
nd
create_tokens
context
'when GITLAB_GENERATE_ENCRYPTED_SETTINGS_KEY_BASE is set'
do
end
let
(
:allowed_keys
)
do
super
()
+
[
'encrypted_settings_key_base'
]
end
it
'does not update secrets.yml'
do
before
do
expect
(
File
).
not_to
receive
(
:write
)
stub_env
(
'GITLAB_GENERATE_ENCRYPTED_SETTINGS_KEY_BASE'
,
'1'
)
allow
(
initializer
).
to
receive
(
:warn_missing_secret
)
end
create_tokens
it
'writes the encrypted_settings_key_base secret'
do
end
expect
(
initializer
).
to
receive
(
:warn_missing_secret
).
with
(
'encrypted_settings_key_base'
)
end
expect
(
File
).
to
receive
(
:write
).
with
(
fake_secret_file
.
path
,
any_args
)
do
|
_filename
,
contents
,
_options
|
new_secrets
=
YAML
.
safe_load
(
contents
)[
rails_env_name
]
context
'when secrets exist in secrets.yml'
do
expect
(
new_secrets
[
'encrypted_settings_key_base'
]).
to
eq
(
Rails
.
application
.
credentials
.
encrypted_settings_key_base
)
let
(
:credentials
)
do
end
Hash
[
allowed_keys
.
zip
(
allowed_keys
)]
end
before
do
initializer
.
execute!
# ensure we clear any existing `encrypted_settings_key_base` credential
end
allowed_keys
.
each
do
|
key
|
Rails
.
application
.
credentials
.
public_send
(
:"
#{
key
}
="
,
nil
)
end
end
allow
(
self
).
to
receive
(
:load_secrets_from_file
).
and_return
({
'test'
=>
credentials
})
end
end
it_behaves_like
'credentials are properly set'
shared_examples
'credentials are properly set'
do
it
'sets Rails.application.credentials'
do
initializer
.
execute!
context
'when secret_key_base also exist in the environment variable'
do
expect
(
Rails
.
application
.
credentials
.
values_at
(
*
allowed_keys
.
map
(
&
:to_sym
))).
to
eq
(
allowed_keys
)
before
do
stub_env
(
'SECRET_KEY_BASE'
,
'env_key'
)
end
end
it
'
sets Rails.application.credentials.secret_key_base from the environment variable
'
do
it
'
does not issue warnings
'
do
create_tokens
expect
(
initializer
).
not_to
receive
(
:warn_missing_secret
)
expect
(
Rails
.
application
.
credentials
.
secret_key_base
).
to
eq
(
'env_key'
)
initializer
.
execute!
end
end
end
end
context
'when secrets exist in Rails.application.credentials
'
do
it
'does not update secrets.yml
'
do
before
do
expect
(
File
).
not_to
receive
(
:write
)
allowed_keys
.
each
do
|
key
|
Rails
.
application
.
credentials
.
public_send
(
:"
#{
key
}
="
,
key
)
initializer
.
execute!
end
end
end
end
it_behaves_like
'credentials are properly set'
context
'when secrets exist in secrets.yml'
do
let
(
:secrets_hash
)
{
{
rails_env_name
=>
Hash
[
allowed_keys
.
zip
(
allowed_keys
)]
}
}
context
'when secret_key_base also exist in the environment variable'
do
it_behaves_like
'credentials are properly set'
before
do
stub_env
(
'SECRET_KEY_BASE'
,
'env_key'
)
end
it
'sets Rails.application.credentials.secret_key_base from the environment variable'
do
context
'when secret_key_base also exist in the environment variable'
do
create_tokens
before
do
stub_env
(
'SECRET_KEY_BASE'
,
'env_key'
)
end
expect
(
Rails
.
application
.
credentials
.
secret_key_base
).
to
eq
(
'env_key'
)
it
'sets Rails.application.credentials.secret_key_base from the environment variable'
do
initializer
.
execute!
expect
(
Rails
.
application
.
credentials
.
secret_key_base
).
to
eq
(
'env_key'
)
end
end
end
end
end
end
context
'some secrets miss, some are in env, some are in Rails.application.credentials, and some are in secrets.yml'
do
context
'when secrets exist in Rails.application.credentials'
do
before
do
before
do
stub_env
(
'SECRET_KEY_BASE'
,
'env_key'
)
allowed_keys
.
each
do
|
key
|
Rails
.
application
.
credentials
.
public_send
(
:"
#{
key
}
="
,
key
)
end
end
it_behaves_like
'credentials are properly set'
context
'when secret_key_base also exist in the environment variable'
do
before
do
stub_env
(
'SECRET_KEY_BASE'
,
'env_key'
)
end
Rails
.
application
.
credentials
.
db_key_base
=
'db_key_base'
it
'sets Rails.application.credentials.secret_key_base from the environment variable'
do
initializer
.
execute!
allow
(
self
).
to
receive
(
:load_secrets_from_file
).
and_return
({
expect
(
Rails
.
application
.
credentials
.
secret_key_base
).
to
eq
(
'env_key'
)
'test'
=>
{
'otp_key_base'
=>
'otp_key_base'
}
end
})
end
end
end
it
'sets Rails.application.credentials properly, issue a warning and writes config.secrets.yml'
do
context
'with some secrets missing, some in ENV, some in Rails.application.credentials, some in secrets.yml'
do
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
'openid_connect_signing_key'
)
let
(
:rails_env_name
)
{
'foo'
}
expect
(
File
).
to
receive
(
:write
).
with
(
'config/secrets.yml'
,
any_args
)
do
|
_filename
,
contents
,
_options
|
let
(
:secrets_hash
)
{
{
rails_env_name
=>
{
'otp_key_base'
=>
'otp_key_base'
}
}
}
new_secrets
=
YAML
.
safe_load
(
contents
)[
'test'
]
expect
(
new_secrets
[
'otp_key_base'
]).
to
eq
(
'otp_key_base'
)
before
do
expect
(
new_secrets
[
'openid_connect_signing_key'
]).
to
match
(
rsa_key
)
stub_env
(
'SECRET_KEY_BASE'
,
'env_key'
)
Rails
.
application
.
credentials
.
db_key_base
=
'db_key_base'
end
end
create_tokens
it
'sets Rails.application.credentials properly, issue a warning and writes config.secrets.yml'
do
expect
(
File
).
to
receive
(
:write
).
with
(
fake_secret_file
.
path
,
any_args
)
do
|
_filename
,
contents
,
_options
|
new_secrets
=
YAML
.
safe_load
(
contents
)[
rails_env_name
]
expect
(
Rails
.
application
.
credentials
.
secret_key_base
).
to
eq
(
'env_key'
)
expect
(
new_secrets
[
'otp_key_base'
]).
to
eq
(
'otp_key_base'
)
expect
(
Rails
.
application
.
credentials
.
db_key_base
).
to
eq
(
'db_key_base'
)
expect
(
new_secrets
[
'openid_connect_signing_key'
]).
to
match
(
rsa_key
)
expect
(
Rails
.
application
.
credentials
.
otp_key_base
).
to
eq
(
'otp_key_base'
)
end
expect
(
initializer
).
to
receive
(
:warn
).
with
(
"Missing Rails.application.credentials.openid_connect_signing_key for
#{
rails_env_name
}
environment. "
\
"The secret will be generated and stored in config/secrets.yml."
)
initializer
.
execute!
expect
(
Rails
.
application
.
credentials
.
secret_key_base
).
to
eq
(
'env_key'
)
expect
(
Rails
.
application
.
credentials
.
db_key_base
).
to
eq
(
'db_key_base'
)
expect
(
Rails
.
application
.
credentials
.
otp_key_base
).
to
eq
(
'otp_key_base'
)
end
end
end
end
end
end
end
# rubocop:enable RSpec/FeatureCategory
# rubocop:enable RSpec/FilePath
此差异已折叠。
点击以展开。
预览
0%
加载中
请重试
或
添加新附件
.
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
保存评论
取消
想要评论请
注册
或
登录