summaryrefslogtreecommitdiff
path: root/spec/lib/gitlab/conan_token_spec.rb
blob: c8bda0a5cf08365c5d7d6f08ded012e571fcf07c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
# frozen_string_literal: true
require 'spec_helper'

RSpec.describe Gitlab::ConanToken do
  let(:base_secret) { SecureRandom.base64(64) }

  let(:jwt_secret) do
    OpenSSL::HMAC.hexdigest(
      OpenSSL::Digest.new('SHA256'),
      base_secret,
      described_class::HMAC_KEY
    )
  end

  before do
    allow(Settings).to receive(:attr_encrypted_db_key_base).and_return(base_secret)
  end

  def build_jwt(access_token_id:, user_id:, expire_time: nil)
    JSONWebToken::HMACToken.new(jwt_secret).tap do |jwt|
      jwt['access_token'] = access_token_id
      jwt['user_id'] = user_id || user_id
      jwt.expire_time = expire_time || jwt.issued_at + ::Gitlab::ConanToken::CONAN_TOKEN_EXPIRE_TIME
    end
  end

  describe '.from_personal_access_token' do
    it 'sets access token and user id and does not use the token id' do
      personal_access_token = double(id: 999, token: 123, user_id: 456)

      token = described_class.from_personal_access_token(
        personal_access_token.user_id,
        personal_access_token.token
      )

      expect(token.access_token_id).not_to eq(personal_access_token.id)
      expect(token.access_token_id).to eq(personal_access_token.token)
      expect(token.user_id).to eq(personal_access_token.user_id)
    end
  end

  describe '.from_job' do
    it 'sets access token id and user id' do
      user = double(id: 456)
      job = double(token: 123, user: user)

      token = described_class.from_job(job)

      expect(token.access_token_id).to eq(123)
      expect(token.user_id).to eq(456)
    end
  end

  describe '.from_deploy_token' do
    it 'sets access token id and user id' do
      deploy_token = double(token: '123', username: 'bob')

      token = described_class.from_deploy_token(deploy_token)

      expect(token.access_token_id).to eq('123')
      expect(token.user_id).to eq('bob')
    end
  end

  describe '.decode' do
    it 'sets access token id and user id' do
      jwt = build_jwt(access_token_id: 123, user_id: 456)

      token = described_class.decode(jwt.encoded)

      expect(token.access_token_id).to eq(123)
      expect(token.user_id).to eq(456)
    end

    it 'returns nil for invalid JWT' do
      expect(described_class.decode('invalid-jwt')).to be_nil
    end

    it 'returns nil for expired JWT' do
      jwt = build_jwt(access_token_id: 123,
                      user_id: 456,
                      expire_time: Time.zone.now - (::Gitlab::ConanToken::CONAN_TOKEN_EXPIRE_TIME + 1.hour))

      expect(described_class.decode(jwt.encoded)).to be_nil
    end
  end

  describe '#to_jwt' do
    it 'returns the encoded JWT' do
      allow(SecureRandom).to receive(:uuid).and_return('u-u-i-d')

      freeze_time do
        jwt = build_jwt(access_token_id: 123, user_id: 456)

        token = described_class.new(access_token_id: 123, user_id: 456)

        expect(token.to_jwt).to eq(jwt.encoded)
      end
    end
  end
end