diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2022-05-19 07:33:21 +0000 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2022-05-19 07:33:21 +0000 |
commit | 36a59d088eca61b834191dacea009677a96c052f (patch) | |
tree | e4f33972dab5d8ef79e3944a9f403035fceea43f /spec/lib/atlassian/jira_connect/jwt/asymmetric_spec.rb | |
parent | a1761f15ec2cae7c7f7bbda39a75494add0dfd6f (diff) | |
download | gitlab-ce-36a59d088eca61b834191dacea009677a96c052f.tar.gz |
Add latest changes from gitlab-org/gitlab@15-0-stable-eev15.0.0-rc42
Diffstat (limited to 'spec/lib/atlassian/jira_connect/jwt/asymmetric_spec.rb')
-rw-r--r-- | spec/lib/atlassian/jira_connect/jwt/asymmetric_spec.rb | 104 |
1 files changed, 104 insertions, 0 deletions
diff --git a/spec/lib/atlassian/jira_connect/jwt/asymmetric_spec.rb b/spec/lib/atlassian/jira_connect/jwt/asymmetric_spec.rb new file mode 100644 index 00000000000..12ed47a1025 --- /dev/null +++ b/spec/lib/atlassian/jira_connect/jwt/asymmetric_spec.rb @@ -0,0 +1,104 @@ +# frozen_string_literal: true + +require 'spec_helper' + +RSpec.describe Atlassian::JiraConnect::Jwt::Asymmetric do + describe '#valid?' do + subject(:asymmetric_jwt) { described_class.new(jwt, verification_claims) } + + let(:verification_claims) { jwt_claims } + let(:jwt_claims) { { aud: aud, iss: client_key, qsh: qsh } } + let(:aud) { 'https://test.host/-/jira_connect' } + let(:client_key) { '1234' } + let(:public_key_id) { '123e4567-e89b-12d3-a456-426614174000' } + let(:jwt_headers) { { kid: public_key_id } } + let(:private_key) { OpenSSL::PKey::RSA.generate 2048 } + let(:jwt) { JWT.encode(jwt_claims, private_key, 'RS256', jwt_headers) } + let(:public_key) { private_key.public_key } + let(:install_keys_url) { "https://connect-install-keys.atlassian.com/#{public_key_id}" } + let(:qsh) do + Atlassian::Jwt.create_query_string_hash('https://gitlab.test/events/installed', 'POST', 'https://gitlab.test') + end + + before do + stub_request(:get, install_keys_url) + .to_return(body: public_key.to_s, status: 200) + end + + it 'returns true when verified with public key from CDN' do + expect(JWT).to receive(:decode).twice.and_call_original + + expect(asymmetric_jwt).to be_valid + + expect(WebMock).to have_requested(:get, install_keys_url) + end + + context 'JWT does not contain a key ID' do + let(:public_key_id) { nil } + + it { is_expected.not_to be_valid } + end + + context 'JWT contains a key ID that is not a valid UUID4' do + let(:public_key_id) { '123' } + + it { is_expected.not_to be_valid } + end + + context 'public key can not be retrieved' do + before do + stub_request(:get, install_keys_url).to_return(body: '', status: 404) + end + + it { is_expected.not_to be_valid } + end + + context 'retrieving the public raises an error' do + before do + allow(Gitlab::HTTP).to receive(:get).and_raise(SocketError) + end + + it { is_expected.not_to be_valid } + end + + context 'token decoding raises an error' do + before do + allow(JWT).to receive(:decode).and_call_original + allow(JWT).to receive(:decode).with( + jwt, anything, true, + { aud: anything, verify_aud: true, iss: client_key, verify_iss: true, algorithm: 'RS256' } + ).and_raise(JWT::DecodeError) + end + + it { is_expected.not_to be_valid } + end + + context 'when iss could not be verified' do + let(:verification_claims) { { aud: jwt_claims[:aud], iss: 'some other iss', qsh: jwt_claims[:qsh] } } + + it { is_expected.not_to be_valid } + end + + context 'when qsh could not be verified' do + let(:verification_claims) { { aud: jwt_claims[:aud], iss: client_key, qsh: 'some other qsh' } } + + it { is_expected.not_to be_valid } + end + end + + describe '#iss_claim' do + subject { asymmetric_jwt.iss_claim } + + let(:asymmetric_jwt) { described_class.new('123', anything) } + + it { is_expected.to eq(nil) } + + context 'when jwt is verified' do + before do + asymmetric_jwt.instance_variable_set(:@claims, { 'iss' => 'client_key' }) + end + + it { is_expected.to eq('client_key') } + end + end +end |