Skip to content
代码片段 群组 项目
未验证 提交 8538221d 编辑于 作者: Andrejs Cunskis's avatar Andrejs Cunskis 提交者: GitLab
浏览文件

Add UserStore class for global user management

上级 f54bbd1f
No related branches found
No related tags found
无相关合并请求
# frozen_string_literal: true
module QA
module Runtime
# Helper class to create and store globally accessible test users
#
class UserStore
InvalidTokenError = Class.new(StandardError)
ExpiredAdminPasswordError = Class.new(StandardError)
# @return [String] default admin api token pre-seeded on ephemeral test environments
DEFAULT_ADMIN_API_TOKEN = "ypCa3Dzb23o5nvsixwPA" # gitleaks:allow
# @return [String] default username for admin user
DEFAULT_ADMIN_USERNAME = "root"
# @return [String] default password for admin user
DEFAULT_ADMIN_PASSWORD = "5iveL!fe"
class << self
# Global admin client
#
# @return [QA::Runtime::API::Client]
def admin_api_client
return @admin_api_client if @admin_api_client
info("Creating admin api client for api fabrications")
if Env.admin_personal_access_token
info("Admin api token variable is set, using it for default admin api fabrications")
@admin_api_client = API::Client
.new(personal_access_token: Env.admin_personal_access_token)
.tap { |client| validate_admin_client!(client) }
elsif default_admin_token_valid?
info("Admin api token variable is not set, using default - '#{DEFAULT_ADMIN_API_TOKEN}'")
@admin_api_client = API::Client.new(personal_access_token: DEFAULT_ADMIN_API_TOKEN)
else
@admin_api_client = create_admin_api_client(admin_user)
end
info("Admin token set up successfully")
@admin_api_client
end
alias_method :initialize_admin_api_client, :admin_api_client
# Global admin user
#
# @return [QA::Resource::User]
def admin_user
return @admin_user if @admin_user
@admin_user = Resource::User.init do |user|
user.username = if Env.admin_username
Env.admin_username
else
debug("Admin username variable not set, using default - '#{DEFAULT_ADMIN_USERNAME}'")
DEFAULT_ADMIN_USERNAME
end
user.password = if Env.admin_password
Env.admin_password
else
debug("Admin password variable not set, using default - '#{DEFAULT_ADMIN_PASSWORD}'")
DEFAULT_ADMIN_PASSWORD
end
end
if @admin_api_client && client_belongs_to_user?(@admin_api_client, @admin_user)
@admin_user.api_client = @admin_api_client
@admin_user.reload!
elsif @admin_api_client
warn(<<~WARN)
Configured global admin token does not belong to configured admin user
Please check values for GITLAB_QA_ADMIN_ACCESS_TOKEN, GITLAB_ADMIN_USERNAME and GITLAB_ADMIN_PASSWORD variables
WARN
end
@admin_user
end
alias_method :initialize_admin_user, :admin_user
private
delegate :debug, :info, :warn, :error, to: Logger
# Check if default admin token is present in environment and valid
#
# @return [Boolean]
def default_admin_token_valid?
debug("Validating presence of default admin api token in environment")
validate_admin_client!(API::Client.new(personal_access_token: DEFAULT_ADMIN_API_TOKEN))
debug("Default admin token is present in environment and is valid")
true
rescue InvalidTokenError
debug("Default admin token is not valid or present in environment, skipping...")
false
end
# Create admin access client and validate it
#
# @param [QA::Resource::User] user
# @return [QA::Runtime::API::Client]
def create_admin_api_client(user)
info("Creating admin token via ui")
admin_token = Flow::Login.while_signed_in(as: user) do
Resource::PersonalAccessToken.fabricate_via_browser_ui! { |pat| pat.user = user }.token
end
API::Client.new(:gitlab, personal_access_token: admin_token).tap do |client|
validate_admin_client!(client)
user.api_client = client
user.reload!
end
end
# Validate if client belongs to an admin user
#
# @param [QA::Runtime::API::Client] client
# @return [void]
def validate_admin_client!(client)
debug("Validating admin access token")
resp = fetch_user_details(client)
if resp.code == 403 && resp.body.include?("Your password expired")
raise ExpiredAdminPasswordError, "Admin password has expired and must be reset"
elsif !status_ok?(resp)
raise InvalidTokenError, "Admin token validation failed! Code: #{resp.code}, Err: '#{resp.body}'"
end
is_admin = Support::API.parse_body(resp)[:is_admin]
raise InvalidTokenError, "Admin token does not belong to admin user" unless is_admin
debug("Admin token is valid")
end
# Check if token belongs to specific user
#
# @param [QA::Runtime::API::Client] client
# @param [QA::Resource::User] user
# @return [Boolean]
def client_belongs_to_user?(client, user)
resp = fetch_user_details(client)
unless status_ok?(resp)
raise InvalidTokenError, "Token validation failed! Code: #{resp.code}, Err: '#{resp.body}'"
end
Support::API.parse_body(resp)[:username] == user.username
end
# Fetch user details of given api client
#
# @param [QA::Runtime::API::Client] client
# @return [RestClient::Response]
def fetch_user_details(client)
Support::API.get(API::Request.new(client, "/user").url)
end
# Validate 200 HTTP status code of response
#
# @param [RestClient::Response] resp
# @return [Boolean]
def status_ok?(resp)
resp.code == Support::API::HTTP_STATUS_OK
end
end
end
end
end
# frozen_string_literal: true
module QA
RSpec.describe Runtime::UserStore do
let(:default_admin_token) { "ypCa3Dzb23o5nvsixwPA" }
before do
allow(Runtime::Scenario).to receive(:send).with("gitlab_address").and_return("https://example.com")
allow(Runtime::Logger).to receive_messages({
debug: nil,
info: nil,
warn: nil,
error: nil
})
allow(Runtime::Env).to receive_messages({
admin_username: nil,
admin_password: nil,
admin_personal_access_token: nil
})
described_class.instance_variable_set(:@admin_api_client, nil)
described_class.instance_variable_set(:@admin_user, nil)
end
def mock_user_get(token:, code: 200, body: { is_admin: true, id: 1, username: "root" }.to_json)
allow(Support::API).to receive(:get).with("https://example.com/api/v4/user?private_token=#{token}").and_return(
instance_double(RestClient::Response, code: code, body: body)
)
end
describe "#admin_api_client" do
let(:admin_token) { nil }
before do
allow(Runtime::Env).to receive(:admin_personal_access_token).and_return(admin_token)
end
context "when admin token variable is set" do
let(:admin_token) { "admin-token" }
before do
mock_user_get(token: admin_token)
end
it "creates admin api client with configured token" do
expect(described_class.admin_api_client.personal_access_token).to eq(admin_token)
end
end
context "with valid default admin token and no token configured" do
before do
mock_user_get(token: default_admin_token)
end
it "creates admin api client with default admin token" do
expect(described_class.admin_api_client.personal_access_token).to eq(default_admin_token)
end
end
context "with invalid token set via environment variable" do
let(:admin_token) { "admin-token" }
before do
mock_user_get(token: admin_token, code: 401, body: "401 Unauthorized")
end
it "raises InvalidTokenError" do
expect { described_class.admin_api_client }.to raise_error(
described_class::InvalidTokenError, "Admin token validation failed! Code: 401, Err: '401 Unauthorized'"
)
end
end
context "with expired admin password" do
let(:admin_token) { "admin-token" }
before do
mock_user_get(token: admin_token, code: 403, body: "Your password expired")
end
it "raises ExpiredAdminPasswordError" do
expect { described_class.admin_api_client }.to raise_error(
described_class::ExpiredAdminPasswordError, "Admin password has expired and must be reset"
)
end
end
context "with token creation via UI" do
let(:admin_user) { Resource::User.new }
let(:pat) { Resource::PersonalAccessToken.init { |pat| pat.token = "test" } }
before do
allow(Resource::User).to receive(:init).and_yield(admin_user).and_return(admin_user)
allow(Resource::PersonalAccessToken).to receive(:fabricate_via_browser_ui!).and_yield(pat).and_return(pat)
allow(Flow::Login).to receive(:while_signed_in).with(as: admin_user).and_yield
allow(admin_user).to receive(:reload!)
mock_user_get(token: default_admin_token, code: 401)
mock_user_get(token: pat.token)
end
it "creates admin api client with token created from UI" do
expect(described_class.admin_api_client.personal_access_token).to eq(pat.token)
expect(admin_user.username).to eq("root")
expect(admin_user.password).to eq("5iveL!fe")
expect(admin_user).to have_received(:reload!)
end
end
end
describe "#admin_user" do
context "when admin client has not been initialized" do
context "with admin user variables set" do
let(:username) { "admin-username" }
let(:password) { "admin-password" }
before do
allow(Runtime::Env).to receive_messages({ admin_username: username, admin_password: password })
end
it "returns admin user with configured credentials" do
expect(described_class.admin_user.username).to eq(username)
expect(described_class.admin_user.password).to eq(password)
end
end
context "without admin user variables set" do
let(:username) { "root" }
let(:password) { "5iveL!fe" }
it "returns admin user with default credentials" do
expect(described_class.admin_user.username).to eq(username)
expect(described_class.admin_user.password).to eq(password)
end
end
end
context "when admin client has been initialized" do
let(:admin_user) { Resource::User.new }
let(:admin_client) { Runtime::API::Client.new(personal_access_token: default_admin_token) }
before do
allow(Resource::User).to receive(:init).and_yield(admin_user).and_return(admin_user)
allow(admin_user).to receive(:reload!)
described_class.instance_variable_set(:@admin_api_client, admin_client)
end
context "with valid admin client belonging to user" do
before do
mock_user_get(token: default_admin_token)
end
it "sets api client on admin user and reloads it" do
expect(described_class.admin_user.instance_variable_get(:@api_client)).to eq(admin_client)
expect(admin_user).to have_received(:reload!)
end
end
context "with valid admin client not belonging to user" do
before do
mock_user_get(token: default_admin_token, body: { username: "test" }.to_json)
end
it "prints warning message" do
described_class.initialize_admin_user
expect(Runtime::Logger).to have_received(:warn).with(<<~WARN)
Configured global admin token does not belong to configured admin user
Please check values for GITLAB_QA_ADMIN_ACCESS_TOKEN, GITLAB_ADMIN_USERNAME and GITLAB_ADMIN_PASSWORD variables
WARN
end
end
context "with invalid admin client" do
before do
mock_user_get(token: default_admin_token, code: 403, body: "Unauthorized")
end
it "raises invalid token error" do
expect { described_class.admin_user }.to raise_error(
described_class::InvalidTokenError, "Token validation failed! Code: 403, Err: 'Unauthorized'"
)
end
end
end
end
end
end
0% 加载中 .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册