Skip to content
GitLab
菜单
为什么选择 GitLab
定价
联系销售
探索
为什么选择 GitLab
定价
联系销售
探索
登录
获取免费试用
主导航
搜索或转到…
项目
GitLab
管理
动态
成员
标记
计划
议题
议题看板
里程碑
迭代
需求
代码
合并请求
仓库
分支
提交
标签
仓库图
比较修订版本
代码片段
锁定的文件
构建
流水线
作业
流水线计划
测试用例
产物
部署
发布
Package registry
Container registry
模型注册表
运维
环境
Terraform 模块
监控
事件
服务台
分析
价值流分析
贡献者分析
CI/CD 分析
仓库分析
代码评审分析
议题分析
洞察
模型实验
效能分析
帮助
帮助
支持
GitLab 文档
比较 GitLab 各版本
社区论坛
为极狐GitLab 提交贡献
提交反馈
隐私声明
快捷键
?
新增功能
4
代码片段
群组
项目
显示更多面包屑
gitlab-cn
GitLab
提交
c02383bd
未验证
提交
c02383bd
编辑于
6 months ago
作者:
Rémy Coutable
浏览文件
操作
下载
补丁
差异文件
Refactor config/initializers/01_secret_token.rb and fix tests
Signed-off-by:
Rémy Coutable
<
remy@rymai.me
>
上级
0bacd723
Loading
Loading
无相关合并请求
变更
2
隐藏空白变更内容
行内
左右并排
显示
2 个更改的文件
config/initializers/01_secret_token.rb
+38
-25
38 个添加, 25 个删除
config/initializers/01_secret_token.rb
spec/initializers/secret_token_spec.rb
+141
-132
141 个添加, 132 个删除
spec/initializers/secret_token_spec.rb
有
179 个添加
和
157 个删除
config/initializers/01_secret_token.rb
+
38
−
25
浏览文件 @
c02383bd
...
@@ -10,30 +10,41 @@
...
@@ -10,30 +10,41 @@
require
'securerandom'
require
'securerandom'
def
create_tokens
def
rails_secrets_config_file
# Inspired by https://github.com/rails/rails/blob/v7.0.8.4/railties/lib/rails/secrets.rb#L25-L36
Rails
.
root
.
join
(
'config/secrets.yml'
)
raw_secrets
=
begin
end
YAML
.
safe_load
(
File
.
read
(
Rails
.
root
.
join
(
'config/secrets.yml'
)))
rescue
Errno
::
ENOENT
,
Psych
::
SyntaxError
{}
end
raw_secrets
||=
{}
secrets
=
{}
def
load_secrets_from_file
secrets
.
merge!
(
raw_secrets
[
"shared"
].
deep_symbolize_keys
)
if
raw_secrets
[
"shared"
]
YAML
.
safe_load_file
(
rails_secrets_config_file
)
secrets
.
merge!
(
raw_secrets
[
Rails
.
env
].
deep_symbolize_keys
)
if
raw_secrets
[
Rails
.
env
]
rescue
Errno
::
ENOENT
,
Psych
::
SyntaxError
{}
end
# Copy secrets into credentials since Rails.application.secrets is populated from config/secrets.yml
def
set_credentials_from_file_and_env!
# Later, once config/secrets.yml won't be read automatically, we'll need to do it manually, and set
# Inspired by https://github.com/rails/rails/blob/v7.0.8.4/railties/lib/rails/secrets.rb#L25-L36
# Later, once config/secrets.yml won't be read automatically, we'll need to do it manually, so
# we anticipate and do it ourselves here.
file_secrets
=
load_secrets_from_file
secrets
=
file_secrets
.
fetch
(
"shared"
,
{}).
deep_symbolize_keys
.
merge
(
file_secrets
.
fetch
(
Rails
.
env
,
{}).
deep_symbolize_keys
)
# Copy secrets from config/secrets.yml into Rails.application.credentials
# If we support native Rails.application.credentials later
# (e.g. config.credentials.yml.enc + config/master.key ), this loop would
# become a no-op as long as credentials are migrated to config.credentials.yml.enc.
secrets
.
each
do
|
key
,
value
|
secrets
.
each
do
|
key
,
value
|
next
if
Rails
.
application
.
credentials
.
public_send
(
key
).
present?
Rails
.
application
.
credentials
[
key
]
=
value
Rails
.
application
.
credentials
[
key
]
=
value
end
end
# Historically, ENV['SECRET_KEY_BASE'] takes precedence over secrets.yml, so we maintain that
# Historically, ENV['SECRET_KEY_BASE'] takes precedence over
config/
secrets.yml, so we maintain that
# behavior by ensuring the environment variable always overrides secrets.yml.
# behavior by ensuring the environment variable always overrides
the value from config/
secrets.yml.
env_secret_key
=
ENV
[
'SECRET_KEY_BASE'
]
env_secret_key
=
ENV
[
'SECRET_KEY_BASE'
]
Rails
.
application
.
credentials
.
secret_key_base
=
env_secret_key
if
env_secret_key
.
present?
Rails
.
application
.
credentials
.
secret_key_base
=
env_secret_key
if
env_secret_key
.
present?
end
def
set_missing_from_defaults!
defaults
=
{
defaults
=
{
secret_key_base:
generate_new_secure_token
,
secret_key_base:
generate_new_secure_token
,
otp_key_base:
generate_new_secure_token
,
otp_key_base:
generate_new_secure_token
,
...
@@ -43,12 +54,16 @@ def create_tokens
...
@@ -43,12 +54,16 @@ def create_tokens
# encrypted_settings_key_base is optional for now
# encrypted_settings_key_base is optional for now
if
ENV
[
'GITLAB_GENERATE_ENCRYPTED_SETTINGS_KEY_BASE'
]
if
ENV
[
'GITLAB_GENERATE_ENCRYPTED_SETTINGS_KEY_BASE'
]
defaults
[
:encrypted_settings_key_base
]
=
defaults
[
:encrypted_settings_key_base
]
=
generate_new_secure_token
generate_new_secure_token
end
end
missing_secrets
=
set_missing_keys
(
defaults
)
missing_secrets
=
set_missing_keys
(
defaults
)
write_secrets_yml
(
missing_secrets
)
unless
missing_secrets
.
empty?
write_secrets_yml!
(
missing_secrets
)
if
missing_secrets
.
any?
end
def
create_tokens
set_credentials_from_file_and_env!
set_missing_from_defaults!
end
end
def
generate_new_secure_token
def
generate_new_secure_token
...
@@ -62,7 +77,8 @@ def generate_new_rsa_private_key
...
@@ -62,7 +77,8 @@ def generate_new_rsa_private_key
def
warn_missing_secret
(
secret
)
def
warn_missing_secret
(
secret
)
return
if
Rails
.
env
.
test?
return
if
Rails
.
env
.
test?
warn
"Missing Rails.application.credentials.
#{
secret
}
for
#{
Rails
.
env
}
environment. The secret will be generated and stored in config/secrets.yml."
warn
"Missing Rails.application.credentials.
#{
secret
}
for
#{
Rails
.
env
}
environment. "
\
"The secret will be generated and stored in config/secrets.yml."
end
end
def
set_missing_keys
(
defaults
)
def
set_missing_keys
(
defaults
)
...
@@ -74,15 +90,12 @@ def set_missing_keys(defaults)
...
@@ -74,15 +90,12 @@ def set_missing_keys(defaults)
end
end
end
end
def
write_secrets_yml
(
missing_secrets
)
def
write_secrets_yml!
(
missing_secrets
)
secrets_yml
=
Rails
.
root
.
join
(
'config/secrets.yml'
)
rails_env
=
Rails
.
env
.
to_s
rails_env
=
Rails
.
env
.
to_s
secrets
=
YAML
.
load_file
(
secrets_yml
)
if
File
.
exist?
(
secrets_yml
)
secrets
=
load_secrets_from_file
secrets
||=
{}
secrets
[
rails_env
]
||=
{}
secrets
[
rails_env
]
||=
{}
secrets
[
rails_env
].
merge!
(
missing_secrets
)
secrets
[
rails_env
].
merge!
(
missing_secrets
)
File
.
write
(
secrets_
yml
,
YAML
.
dump
(
secrets
),
mode:
'w'
,
perm:
0
o600
)
File
.
write
(
rails_
secrets_
config_file
,
YAML
.
dump
(
secrets
),
mode:
'w'
,
perm:
0
o600
)
end
end
create_tokens
create_tokens
此差异已折叠。
点击以展开。
spec/initializers/secret_token_spec.rb
+
141
−
132
浏览文件 @
c02383bd
...
@@ -6,18 +6,32 @@
...
@@ -6,18 +6,32 @@
RSpec
.
describe
'create_tokens'
do
RSpec
.
describe
'create_tokens'
do
include
StubENV
include
StubENV
let
(
:secrets
)
{
ActiveSupport
::
OrderedOptions
.
new
}
let
(
:allowed_keys
)
do
%w[
secret_key_base
db_key_base
otp_key_base
openid_connect_signing_key
]
end
let
(
:hex_key
)
{
/\h{128}/
}
let
(
:hex_key
)
{
/\h{128}/
}
let
(
:rsa_key
)
{
/\A-----BEGIN RSA PRIVATE KEY-----\n.+\n-----END RSA PRIVATE KEY-----\n\Z/m
}
let
(
:rsa_key
)
{
/\A-----BEGIN RSA PRIVATE KEY-----\n.+\n-----END RSA PRIVATE KEY-----\n\Z/m
}
around
do
|
example
|
original_credentials
=
Rails
.
application
.
credentials
# ensure we clear any existing `encrypted_settings_key_base` credential
allowed_keys
.
each
do
|
key
|
Rails
.
application
.
credentials
.
public_send
(
:"
#{
key
}
="
,
nil
)
end
example
.
run
Rails
.
application
.
credentials
=
original_credentials
end
before
do
before
do
allow
(
Rails
).
to
receive_message_chain
(
:application
,
:credentials
).
and_return
(
secrets
)
allow
(
Rails
).
to
receive_message_chain
(
:root
,
:join
)
{
|
string
|
string
}
allow
(
Rails
).
to
receive_message_chain
(
:root
,
:join
)
{
|
string
|
string
}
allow
(
File
).
to
receive
(
:write
).
and_call_original
allow
(
File
).
to
receive
(
:write
).
and_call_original
allow
(
File
).
to
receive
(
:write
).
with
(
Rails
.
root
.
join
(
'config/secrets.yml'
))
allow
(
File
).
to
receive
(
:write
).
with
(
'config/secrets.yml'
)
allow
(
self
).
to
receive
(
:warn
)
allow
(
self
).
to
receive
(
:exit
)
end
end
describe
'ensure acknowledged secrets in any installations'
do
describe
'ensure acknowledged secrets in any installations'
do
...
@@ -45,182 +59,177 @@
...
@@ -45,182 +59,177 @@
end
end
end
end
context
'setting secret keys'
do
context
'when none of the secrets exist'
do
context
'when none of the secrets exist'
do
before
do
before
do
# ensure we clear any existing `encrypted_settings_key_base` credential
stub_env
(
'SECRET_KEY_BASE'
,
nil
)
allowed_keys
.
each
do
|
key
|
allow
(
File
).
to
receive
(
:exist?
).
with
(
'config/secrets.yml'
).
and_return
(
false
)
Rails
.
application
.
credentials
.
public_send
(
:"
#{
key
}
="
,
nil
)
allow
(
self
).
to
receive
(
:warn_missing_secret
)
end
end
it
'generates different hashes for secret_key_base, otp_key_base, and db_key_base'
do
allow
(
self
).
to
receive
(
:load_secrets_from_file
).
and_return
({})
create_tokens
stub_env
(
'SECRET_KEY_BASE'
,
nil
)
end
keys
=
secrets
.
values_at
(
:secret_key_base
,
:otp_key_base
,
:db_key_base
)
it
'generates different hashes for secret_key_base, otp_key_base, and db_key_base'
do
create_tokens
expect
(
keys
.
uniq
).
to
eq
(
keys
)
keys
=
Rails
.
application
.
credentials
.
values_at
(
:secret_key_base
,
:otp_key_base
,
:db_key_base
)
expect
(
keys
).
to
all
(
match
(
hex_key
))
end
it
'generates an RSA key for openid_connect_signing_key'
do
expect
(
keys
.
uniq
).
to
eq
(
keys
)
create_tokens
expect
(
keys
).
to
all
(
match
(
hex_key
))
end
keys
=
secrets
.
values_at
(
:openid_connect_signing_key
)
it
'generates an RSA key for openid_connect_signing_key'
do
create_tokens
expect
(
keys
.
uniq
).
to
eq
(
keys
)
keys
=
Rails
.
application
.
credentials
.
values_at
(
:openid_connect_signing_key
)
expect
(
keys
).
to
all
(
match
(
rsa_key
))
end
it
'warns about the secrets to add to secrets.yml'
do
expect
(
keys
.
uniq
).
to
eq
(
keys
)
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
'secret_key_base'
)
expect
(
keys
).
to
all
(
match
(
rsa_key
))
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
'otp_key_base'
)
end
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
'db_key_base'
)
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
'openid_connect_signing_key'
)
create_tokens
it
'warns about the secrets to add to secrets.yml'
do
allowed_keys
.
each
do
|
key
|
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
key
)
end
end
it
'writes the secrets to secrets.yml'
do
create_tokens
expect
(
File
).
to
receive
(
:write
).
with
(
'config/secrets.yml'
,
any_args
)
do
|
filename
,
contents
,
options
|
end
new_secrets
=
YAML
.
safe_load
(
contents
)[
Rails
.
env
]
it
'writes the secrets to secrets.yml'
do
expect
(
File
).
to
receive
(
:write
).
with
(
'config/secrets.yml'
,
any_args
)
do
|
_filename
,
contents
,
_options
|
new_secrets
=
YAML
.
safe_load
(
contents
)[
'test'
]
expect
(
new_secrets
[
'secret_key_base'
]).
to
eq
(
secrets
.
secret_key_base
)
allowed_keys
.
each
do
|
key
|
expect
(
new_secrets
[
'otp_key_base'
]).
to
eq
(
secrets
.
otp_key_base
)
expect
(
new_secrets
[
key
]).
to
eq
(
Rails
.
application
.
credentials
.
values_at
(
key
.
to_sym
).
first
)
expect
(
new_secrets
[
'db_key_base'
]).
to
eq
(
secrets
.
db_key_base
)
expect
(
new_secrets
[
'openid_connect_signing_key'
]).
to
eq
(
secrets
.
openid_connect_signing_key
)
expect
(
new_secrets
[
'encrypted_settings_key_base'
]).
to
eq
(
secrets
.
encrypted_settings_key_base
)
end
end
expect
(
new_secrets
[
'encrypted_settings_key_base'
]).
to
be_nil
# encrypted_settings_key_base is optional
create_tokens
end
end
create_tokens
end
end
context
'when the other secrets all exist'
do
context
'when GITLAB_GENERATE_ENCRYPTED_SETTINGS_KEY_BASE is set'
do
before
do
let
(
:allowed_keys
)
do
secrets
.
db_key_base
=
'db_key_base'
super
()
+
[
'encrypted_settings_key_base'
]
secrets
.
openid_connect_signing_key
=
'openid_connect_signing_key'
secrets
.
encrypted_settings_key_base
=
'encrypted_settings_key_base'
end
end
context
'when secret_key_base exists in the environment and secrets.yml'
do
before
do
before
do
stub_env
(
'GITLAB_GENERATE_ENCRYPTED_SETTINGS_KEY_BASE'
,
'1'
)
stub_env
(
'SECRET_KEY_BASE'
,
'env_key'
)
allow
(
self
).
to
receive
(
:warn_missing_secret
)
secrets
.
secret_key_base
=
'secret_key_base'
end
secrets
.
otp_key_base
=
'otp_key_base'
secrets
.
openid_connect_signing_key
=
'openid_connect_signing_key'
end
it
'does not issue a warning'
do
it
'writes the encrypted_settings_key_base secret'
do
expect
(
self
).
not_to
receive
(
:warn
)
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
'encrypted_settings_key_base'
)
expect
(
File
).
to
receive
(
:write
).
with
(
'config/secrets.yml'
,
any_args
)
do
|
_filename
,
contents
,
_options
|
new_secrets
=
YAML
.
safe_load
(
contents
)[
'test'
]
create_tokens
expect
(
new_secrets
[
'encrypted_settings_key_base'
]).
to
eq
(
Rails
.
application
.
credentials
.
encrypted_settings_key_base
)
end
end
it
'uses the environment variable'
do
create_tokens
create_tokens
end
end
end
expect
(
secrets
.
secret_key_base
).
to
eq
(
'env_key'
)
shared_examples
'credentials are properly set'
do
end
it
'sets Rails.application.credentials'
do
create_tokens
it
'does not update secrets.yml'
do
expect
(
Rails
.
application
.
credentials
.
values_at
(
*
allowed_keys
.
map
(
&
:to_sym
))).
to
eq
(
allowed_keys
)
expect
(
File
).
not_to
receive
(
:write
)
end
create_tokens
it
'does not issue warnings'
do
end
expect
(
self
).
not_to
receive
(
:warn_missing_secret
)
end
context
'when secret_key_base and otp_key_base exist'
do
create_tokens
before
do
end
secrets
.
secret_key_base
=
'secret_key_base'
secrets
.
otp_key_base
=
'otp_key_base'
secrets
.
openid_connect_signing_key
=
'openid_connect_signing_key'
end
it
'does not
write any files
'
do
it
'does not
update secrets.yml
'
do
expect
(
File
).
not_to
receive
(
:write
)
expect
(
File
).
not_to
receive
(
:write
)
create_tokens
create_tokens
end
end
end
it
'sets the keys to the values from the environment and secrets.yml'
do
context
'when secrets exist in secrets.yml'
do
create_tokens
let
(
:credentials
)
do
Hash
[
allowed_keys
.
zip
(
allowed_keys
)]
end
expect
(
secrets
.
secret_key_base
).
to
eq
(
'secret_key_base'
)
before
do
expect
(
secrets
.
otp_key_base
).
to
eq
(
'otp_key_base'
)
# ensure we clear any existing `encrypted_settings_key_base` credential
expect
(
secrets
.
db_key_base
).
to
eq
(
'db_key_base'
)
allowed_keys
.
each
do
|
key
|
expect
(
secrets
.
openid_connect_signing_key
).
to
eq
(
'openid_connect_signing_key'
)
Rails
.
application
.
credentials
.
public_send
(
:"
#{
key
}
="
,
nil
)
expect
(
secrets
.
encrypted_settings_key_base
).
to
eq
(
'encrypted_settings_key_base'
)
end
end
end
context
'when secret_key_base and otp_key_base do not exist'
do
allow
(
self
).
to
receive
(
:load_secrets_from_file
).
and_return
({
before
do
'test'
=>
credentials
allow
(
File
).
to
receive
(
:exist?
).
with
(
'config/secrets.yml'
).
and_return
(
true
)
})
allow
(
YAML
).
to
receive
(
:load_file
).
with
(
'config/secrets.yml'
).
and_return
(
'test'
=>
secrets
.
to_h
.
stringify_keys
)
end
allow
(
self
).
to
receive
(
:warn_missing_secret
)
end
it
'keeps the other secrets as they were'
do
it_behaves_like
'credentials are properly set'
create_tokens
expect
(
secrets
.
db_key_base
).
to
eq
(
'db_key_base'
)
context
'when secret_key_base also exist in the environment variable'
do
end
before
do
stub_env
(
'SECRET_KEY_BASE'
,
'env_key'
)
end
it
'warns about the missing secrets'
do
it
'sets Rails.application.credentials.secret_key_base from the environment variable'
do
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
'secret_key_base'
)
create_tokens
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
'otp_key_base'
)
create_tokens
expect
(
Rails
.
application
.
credentials
.
secret_key_base
).
to
eq
(
'env_key'
)
end
end
end
end
end
context
'when rotated_encrypted_settings_key_base does not exist'
do
context
'when secrets exist in Rails.application.credentials'
do
before
do
before
do
secrets
.
secret_key_base
=
'secret_key_base'
allowed_keys
.
each
do
|
key
|
secrets
.
otp_key_base
=
'otp_key_base'
Rails
.
application
.
credentials
.
public_send
(
:"
#{
key
}
="
,
key
)
secrets
.
openid_connect_signing_key
=
'openid_connect_signing_key'
end
secrets
.
encrypted_settings_key_base
=
'encrypted_settings_key_base'
end
end
it
'does not warn about the missing secrets'
do
it_behaves_like
'credentials are properly set'
expect
(
self
).
not_to
receive
(
:warn_missing_secret
).
with
(
'rotated_encrypted_settings_key_base'
)
create_tokens
context
'when secret_key_base also exist in the environment variable'
do
end
before
do
stub_env
(
'SECRET_KEY_BASE'
,
'env_key'
)
end
it
'
does not update secrets.yml
'
do
it
'
sets Rails.application.credentials.secret_key_base from the environment variable
'
do
expect
(
File
).
not_to
receive
(
:write
)
create_tokens
create_tokens
expect
(
Rails
.
application
.
credentials
.
secret_key_base
).
to
eq
(
'env_key'
)
end
end
end
end
end
end
context
'when db_key_base is blank but exists in secrets.yml'
do
context
'some secrets miss, some are in env, some are in Rails.application.credentials, and some are in secrets.yml'
do
before
do
before
do
secrets
.
otp_key_base
=
'otp_key_base'
stub_env
(
'SECRET_KEY_BASE'
,
'env_key'
)
secrets
.
secret_key_base
=
'secret_key_base'
secrets
.
encrypted_settings_key_base
=
'encrypted_settings_key_base'
yaml_secrets
=
secrets
.
to_h
.
stringify_keys
.
merge
(
'db_key_base'
=>
'<%= an_erb_expression %>'
)
allow
(
File
).
to
receive
(
:exist?
).
with
(
'.secret'
).
and_return
(
false
)
allow
(
File
).
to
receive
(
:exist?
).
with
(
'config/secrets.yml'
).
and_return
(
true
)
allow
(
YAML
).
to
receive
(
:load_file
).
with
(
'config/secrets.yml'
).
and_return
(
'test'
=>
yaml_secrets
)
allow
(
self
).
to
receive
(
:warn_missing_secret
)
end
it
'warns about updating db_key_base'
do
Rails
.
application
.
credentials
.
db_key_base
=
'db_key_base'
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
'db_key_base'
)
create_tokens
allow
(
self
).
to
receive
(
:load_secrets_from_file
).
and_return
({
end
'test'
=>
{
'otp_key_base'
=>
'otp_key_base'
}
})
end
it
'does not update secrets.yml'
do
it
'sets Rails.application.credentials properly, issue a warning and writes config.secrets.yml'
do
expect
(
self
).
to
receive
(
:exit
).
with
(
1
).
and_call_original
expect
(
self
).
to
receive
(
:warn_missing_secret
).
with
(
'openid_connect_signing_key'
)
expect
(
File
).
not_to
receive
(
:write
)
expect
(
File
).
to
receive
(
:write
).
with
(
'config/secrets.yml'
,
any_args
)
do
|
_filename
,
contents
,
_options
|
new_secrets
=
YAML
.
safe_load
(
contents
)[
'test'
]
expect
{
create_tokens
}.
to
raise_error
(
SystemExit
)
expect
(
new_secrets
[
'otp_key_base'
]).
to
eq
(
'otp_key_base'
)
expect
(
new_secrets
[
'openid_connect_signing_key'
]).
to
match
(
rsa_key
)
end
end
create_tokens
expect
(
Rails
.
application
.
credentials
.
secret_key_base
).
to
eq
(
'env_key'
)
expect
(
Rails
.
application
.
credentials
.
db_key_base
).
to
eq
(
'db_key_base'
)
expect
(
Rails
.
application
.
credentials
.
otp_key_base
).
to
eq
(
'otp_key_base'
)
end
end
end
end
end
end
此差异已折叠。
点击以展开。
预览
0%
加载中
请重试
或
添加新附件
.
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
保存评论
取消
想要评论请
注册
或
登录