Skip to content
GitLab
菜单
为什么选择 GitLab
定价
联系销售
探索
为什么选择 GitLab
定价
联系销售
探索
登录
获取免费试用
主导航
搜索或转到…
项目
GitLab
管理
动态
成员
标记
计划
议题
议题看板
里程碑
迭代
需求
代码
合并请求
仓库
分支
提交
标签
仓库图
比较修订版本
代码片段
锁定的文件
构建
流水线
作业
流水线计划
测试用例
产物
部署
发布
Package registry
Container registry
模型注册表
运维
环境
Terraform 模块
监控
事件
服务台
分析
价值流分析
贡献者分析
CI/CD 分析
仓库分析
代码评审分析
议题分析
洞察
模型实验
效能分析
帮助
帮助
支持
GitLab 文档
比较 GitLab 各版本
社区论坛
为极狐GitLab 提交贡献
提交反馈
隐私声明
快捷键
?
新增功能
4
代码片段
群组
项目
显示更多面包屑
gitlab-cn
GitLab
提交
8538221d
未验证
提交
8538221d
编辑于
5 months ago
作者:
Andrejs Cunskis
提交者:
GitLab
5 months ago
浏览文件
操作
下载
补丁
差异文件
Add UserStore class for global user management
上级
f54bbd1f
No related branches found
No related tags found
无相关合并请求
变更
2
隐藏空白变更内容
行内
左右并排
显示
2 个更改的文件
qa/qa/runtime/user_store.rb
+166
-0
166 个添加, 0 个删除
qa/qa/runtime/user_store.rb
qa/spec/runtime/user_store_spec.rb
+189
-0
189 个添加, 0 个删除
qa/spec/runtime/user_store_spec.rb
有
355 个添加
和
0 个删除
qa/qa/runtime/user_store.rb
0 → 100644
+
166
−
0
浏览文件 @
8538221d
# frozen_string_literal: true
module
QA
module
Runtime
# Helper class to create and store globally accessible test users
#
class
UserStore
InvalidTokenError
=
Class
.
new
(
StandardError
)
ExpiredAdminPasswordError
=
Class
.
new
(
StandardError
)
# @return [String] default admin api token pre-seeded on ephemeral test environments
DEFAULT_ADMIN_API_TOKEN
=
"ypCa3Dzb23o5nvsixwPA"
# gitleaks:allow
# @return [String] default username for admin user
DEFAULT_ADMIN_USERNAME
=
"root"
# @return [String] default password for admin user
DEFAULT_ADMIN_PASSWORD
=
"5iveL!fe"
class
<<
self
# Global admin client
#
# @return [QA::Runtime::API::Client]
def
admin_api_client
return
@admin_api_client
if
@admin_api_client
info
(
"Creating admin api client for api fabrications"
)
if
Env
.
admin_personal_access_token
info
(
"Admin api token variable is set, using it for default admin api fabrications"
)
@admin_api_client
=
API
::
Client
.
new
(
personal_access_token:
Env
.
admin_personal_access_token
)
.
tap
{
|
client
|
validate_admin_client!
(
client
)
}
elsif
default_admin_token_valid?
info
(
"Admin api token variable is not set, using default - '
#{
DEFAULT_ADMIN_API_TOKEN
}
'"
)
@admin_api_client
=
API
::
Client
.
new
(
personal_access_token:
DEFAULT_ADMIN_API_TOKEN
)
else
@admin_api_client
=
create_admin_api_client
(
admin_user
)
end
info
(
"Admin token set up successfully"
)
@admin_api_client
end
alias_method
:initialize_admin_api_client
,
:admin_api_client
# Global admin user
#
# @return [QA::Resource::User]
def
admin_user
return
@admin_user
if
@admin_user
@admin_user
=
Resource
::
User
.
init
do
|
user
|
user
.
username
=
if
Env
.
admin_username
Env
.
admin_username
else
debug
(
"Admin username variable not set, using default - '
#{
DEFAULT_ADMIN_USERNAME
}
'"
)
DEFAULT_ADMIN_USERNAME
end
user
.
password
=
if
Env
.
admin_password
Env
.
admin_password
else
debug
(
"Admin password variable not set, using default - '
#{
DEFAULT_ADMIN_PASSWORD
}
'"
)
DEFAULT_ADMIN_PASSWORD
end
end
if
@admin_api_client
&&
client_belongs_to_user?
(
@admin_api_client
,
@admin_user
)
@admin_user
.
api_client
=
@admin_api_client
@admin_user
.
reload!
elsif
@admin_api_client
warn
(
<<~
WARN
)
Configured global admin token does not belong to configured admin user
Please check values for GITLAB_QA_ADMIN_ACCESS_TOKEN, GITLAB_ADMIN_USERNAME and GITLAB_ADMIN_PASSWORD variables
WARN
end
@admin_user
end
alias_method
:initialize_admin_user
,
:admin_user
private
delegate
:debug
,
:info
,
:warn
,
:error
,
to:
Logger
# Check if default admin token is present in environment and valid
#
# @return [Boolean]
def
default_admin_token_valid?
debug
(
"Validating presence of default admin api token in environment"
)
validate_admin_client!
(
API
::
Client
.
new
(
personal_access_token:
DEFAULT_ADMIN_API_TOKEN
))
debug
(
"Default admin token is present in environment and is valid"
)
true
rescue
InvalidTokenError
debug
(
"Default admin token is not valid or present in environment, skipping..."
)
false
end
# Create admin access client and validate it
#
# @param [QA::Resource::User] user
# @return [QA::Runtime::API::Client]
def
create_admin_api_client
(
user
)
info
(
"Creating admin token via ui"
)
admin_token
=
Flow
::
Login
.
while_signed_in
(
as:
user
)
do
Resource
::
PersonalAccessToken
.
fabricate_via_browser_ui!
{
|
pat
|
pat
.
user
=
user
}.
token
end
API
::
Client
.
new
(
:gitlab
,
personal_access_token:
admin_token
).
tap
do
|
client
|
validate_admin_client!
(
client
)
user
.
api_client
=
client
user
.
reload!
end
end
# Validate if client belongs to an admin user
#
# @param [QA::Runtime::API::Client] client
# @return [void]
def
validate_admin_client!
(
client
)
debug
(
"Validating admin access token"
)
resp
=
fetch_user_details
(
client
)
if
resp
.
code
==
403
&&
resp
.
body
.
include?
(
"Your password expired"
)
raise
ExpiredAdminPasswordError
,
"Admin password has expired and must be reset"
elsif
!
status_ok?
(
resp
)
raise
InvalidTokenError
,
"Admin token validation failed! Code:
#{
resp
.
code
}
, Err: '
#{
resp
.
body
}
'"
end
is_admin
=
Support
::
API
.
parse_body
(
resp
)[
:is_admin
]
raise
InvalidTokenError
,
"Admin token does not belong to admin user"
unless
is_admin
debug
(
"Admin token is valid"
)
end
# Check if token belongs to specific user
#
# @param [QA::Runtime::API::Client] client
# @param [QA::Resource::User] user
# @return [Boolean]
def
client_belongs_to_user?
(
client
,
user
)
resp
=
fetch_user_details
(
client
)
unless
status_ok?
(
resp
)
raise
InvalidTokenError
,
"Token validation failed! Code:
#{
resp
.
code
}
, Err: '
#{
resp
.
body
}
'"
end
Support
::
API
.
parse_body
(
resp
)[
:username
]
==
user
.
username
end
# Fetch user details of given api client
#
# @param [QA::Runtime::API::Client] client
# @return [RestClient::Response]
def
fetch_user_details
(
client
)
Support
::
API
.
get
(
API
::
Request
.
new
(
client
,
"/user"
).
url
)
end
# Validate 200 HTTP status code of response
#
# @param [RestClient::Response] resp
# @return [Boolean]
def
status_ok?
(
resp
)
resp
.
code
==
Support
::
API
::
HTTP_STATUS_OK
end
end
end
end
end
此差异已折叠。
点击以展开。
qa/spec/runtime/user_store_spec.rb
0 → 100644
+
189
−
0
浏览文件 @
8538221d
# frozen_string_literal: true
module
QA
RSpec
.
describe
Runtime
::
UserStore
do
let
(
:default_admin_token
)
{
"ypCa3Dzb23o5nvsixwPA"
}
before
do
allow
(
Runtime
::
Scenario
).
to
receive
(
:send
).
with
(
"gitlab_address"
).
and_return
(
"https://example.com"
)
allow
(
Runtime
::
Logger
).
to
receive_messages
({
debug:
nil
,
info:
nil
,
warn:
nil
,
error:
nil
})
allow
(
Runtime
::
Env
).
to
receive_messages
({
admin_username:
nil
,
admin_password:
nil
,
admin_personal_access_token:
nil
})
described_class
.
instance_variable_set
(
:@admin_api_client
,
nil
)
described_class
.
instance_variable_set
(
:@admin_user
,
nil
)
end
def
mock_user_get
(
token
:,
code:
200
,
body:
{
is_admin:
true
,
id:
1
,
username:
"root"
}.
to_json
)
allow
(
Support
::
API
).
to
receive
(
:get
).
with
(
"https://example.com/api/v4/user?private_token=
#{
token
}
"
).
and_return
(
instance_double
(
RestClient
::
Response
,
code:
code
,
body:
body
)
)
end
describe
"#admin_api_client"
do
let
(
:admin_token
)
{
nil
}
before
do
allow
(
Runtime
::
Env
).
to
receive
(
:admin_personal_access_token
).
and_return
(
admin_token
)
end
context
"when admin token variable is set"
do
let
(
:admin_token
)
{
"admin-token"
}
before
do
mock_user_get
(
token:
admin_token
)
end
it
"creates admin api client with configured token"
do
expect
(
described_class
.
admin_api_client
.
personal_access_token
).
to
eq
(
admin_token
)
end
end
context
"with valid default admin token and no token configured"
do
before
do
mock_user_get
(
token:
default_admin_token
)
end
it
"creates admin api client with default admin token"
do
expect
(
described_class
.
admin_api_client
.
personal_access_token
).
to
eq
(
default_admin_token
)
end
end
context
"with invalid token set via environment variable"
do
let
(
:admin_token
)
{
"admin-token"
}
before
do
mock_user_get
(
token:
admin_token
,
code:
401
,
body:
"401 Unauthorized"
)
end
it
"raises InvalidTokenError"
do
expect
{
described_class
.
admin_api_client
}.
to
raise_error
(
described_class
::
InvalidTokenError
,
"Admin token validation failed! Code: 401, Err: '401 Unauthorized'"
)
end
end
context
"with expired admin password"
do
let
(
:admin_token
)
{
"admin-token"
}
before
do
mock_user_get
(
token:
admin_token
,
code:
403
,
body:
"Your password expired"
)
end
it
"raises ExpiredAdminPasswordError"
do
expect
{
described_class
.
admin_api_client
}.
to
raise_error
(
described_class
::
ExpiredAdminPasswordError
,
"Admin password has expired and must be reset"
)
end
end
context
"with token creation via UI"
do
let
(
:admin_user
)
{
Resource
::
User
.
new
}
let
(
:pat
)
{
Resource
::
PersonalAccessToken
.
init
{
|
pat
|
pat
.
token
=
"test"
}
}
before
do
allow
(
Resource
::
User
).
to
receive
(
:init
).
and_yield
(
admin_user
).
and_return
(
admin_user
)
allow
(
Resource
::
PersonalAccessToken
).
to
receive
(
:fabricate_via_browser_ui!
).
and_yield
(
pat
).
and_return
(
pat
)
allow
(
Flow
::
Login
).
to
receive
(
:while_signed_in
).
with
(
as:
admin_user
).
and_yield
allow
(
admin_user
).
to
receive
(
:reload!
)
mock_user_get
(
token:
default_admin_token
,
code:
401
)
mock_user_get
(
token:
pat
.
token
)
end
it
"creates admin api client with token created from UI"
do
expect
(
described_class
.
admin_api_client
.
personal_access_token
).
to
eq
(
pat
.
token
)
expect
(
admin_user
.
username
).
to
eq
(
"root"
)
expect
(
admin_user
.
password
).
to
eq
(
"5iveL!fe"
)
expect
(
admin_user
).
to
have_received
(
:reload!
)
end
end
end
describe
"#admin_user"
do
context
"when admin client has not been initialized"
do
context
"with admin user variables set"
do
let
(
:username
)
{
"admin-username"
}
let
(
:password
)
{
"admin-password"
}
before
do
allow
(
Runtime
::
Env
).
to
receive_messages
({
admin_username:
username
,
admin_password:
password
})
end
it
"returns admin user with configured credentials"
do
expect
(
described_class
.
admin_user
.
username
).
to
eq
(
username
)
expect
(
described_class
.
admin_user
.
password
).
to
eq
(
password
)
end
end
context
"without admin user variables set"
do
let
(
:username
)
{
"root"
}
let
(
:password
)
{
"5iveL!fe"
}
it
"returns admin user with default credentials"
do
expect
(
described_class
.
admin_user
.
username
).
to
eq
(
username
)
expect
(
described_class
.
admin_user
.
password
).
to
eq
(
password
)
end
end
end
context
"when admin client has been initialized"
do
let
(
:admin_user
)
{
Resource
::
User
.
new
}
let
(
:admin_client
)
{
Runtime
::
API
::
Client
.
new
(
personal_access_token:
default_admin_token
)
}
before
do
allow
(
Resource
::
User
).
to
receive
(
:init
).
and_yield
(
admin_user
).
and_return
(
admin_user
)
allow
(
admin_user
).
to
receive
(
:reload!
)
described_class
.
instance_variable_set
(
:@admin_api_client
,
admin_client
)
end
context
"with valid admin client belonging to user"
do
before
do
mock_user_get
(
token:
default_admin_token
)
end
it
"sets api client on admin user and reloads it"
do
expect
(
described_class
.
admin_user
.
instance_variable_get
(
:@api_client
)).
to
eq
(
admin_client
)
expect
(
admin_user
).
to
have_received
(
:reload!
)
end
end
context
"with valid admin client not belonging to user"
do
before
do
mock_user_get
(
token:
default_admin_token
,
body:
{
username:
"test"
}.
to_json
)
end
it
"prints warning message"
do
described_class
.
initialize_admin_user
expect
(
Runtime
::
Logger
).
to
have_received
(
:warn
).
with
(
<<~
WARN
)
Configured global admin token does not belong to configured admin user
Please check values for GITLAB_QA_ADMIN_ACCESS_TOKEN, GITLAB_ADMIN_USERNAME and GITLAB_ADMIN_PASSWORD variables
WARN
end
end
context
"with invalid admin client"
do
before
do
mock_user_get
(
token:
default_admin_token
,
code:
403
,
body:
"Unauthorized"
)
end
it
"raises invalid token error"
do
expect
{
described_class
.
admin_user
}.
to
raise_error
(
described_class
::
InvalidTokenError
,
"Token validation failed! Code: 403, Err: 'Unauthorized'"
)
end
end
end
end
end
end
此差异已折叠。
点击以展开。
预览
0%
加载中
请重试
或
添加新附件
.
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
保存评论
取消
想要评论请
注册
或
登录