Welcome to mirror list, hosted at ThFree Co, Russian Federation.

job_token_scope_type_spec.rb « ci « types « graphql « spec - gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
blob: 0104436488113d9b749e15250bd2d37ac2f205c4 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
# frozen_string_literal: true

require 'spec_helper'

RSpec.describe GitlabSchema.types['CiJobTokenScopeType'], feature_category: :continuous_integration do
  specify { expect(described_class.graphql_name).to eq('CiJobTokenScopeType') }

  it 'has the correct fields' do
    expected_fields = [:projects, :inboundAllowlist, :outboundAllowlist]

    expect(described_class).to have_graphql_fields(*expected_fields)
  end

  describe 'query' do
    let(:project) do
      create(
        :project,
        ci_outbound_job_token_scope_enabled: true,
        ci_inbound_job_token_scope_enabled: true
      ).tap(&:save!)
    end

    let_it_be(:current_user) { create(:user) }

    let(:query) do
      %(
        query {
          project(fullPath: "#{project.full_path}") {
            ciJobTokenScope {
              projects {
                nodes {
                  path
                }
              }
              inboundAllowlist {
                nodes {
                  path
                }
              }
              outboundAllowlist {
                nodes {
                  path
                }
              }
            }
          }
        }
      )
    end

    subject { GitlabSchema.execute(query, context: { current_user: current_user }).as_json }

    let(:scope_field) { subject.dig('data', 'project', 'ciJobTokenScope') }
    let(:errors_field) { subject['errors'] }
    let(:projects_field) { scope_field&.dig('projects', 'nodes') }
    let(:outbound_allowlist_field) { scope_field&.dig('outboundAllowlist', 'nodes') }
    let(:inbound_allowlist_field) { scope_field&.dig('inboundAllowlist', 'nodes') }
    let(:returned_project_paths) { projects_field.map { |p| p['path'] } }
    let(:returned_outbound_paths) { outbound_allowlist_field.map { |p| p['path'] } }
    let(:returned_inbound_paths) { inbound_allowlist_field.map { |p| p['path'] } }

    context 'without access to scope' do
      before do
        project.add_member(current_user, :developer)
      end

      it 'returns no projects' do
        expect(projects_field).to be_nil
        expect(outbound_allowlist_field).to be_nil
        expect(inbound_allowlist_field).to be_nil
        expect(errors_field.first['message']).to include "don't have permission"
      end
    end

    context 'with access to scope' do
      before do
        project.add_member(current_user, :maintainer)
      end

      context 'when multiple projects in the allow lists' do
        include Ci::JobTokenScopeHelpers
        let!(:outbound_allowlist_project) { create_project_in_allowlist(project, direction: :outbound) }
        let!(:inbound_allowlist_project) { create_project_in_allowlist(project, direction: :inbound) }
        let!(:both_allowlists_project) { create_project_in_both_allowlists(project) }

        context 'when linked projects are readable' do
          before do
            outbound_allowlist_project.add_member(current_user, :developer)
            inbound_allowlist_project.add_member(current_user, :developer)
            both_allowlists_project.add_member(current_user, :developer)
          end

          shared_examples 'returns projects' do
            it 'returns readable projects in scope' do
              outbound_paths = [project.path, outbound_allowlist_project.path, both_allowlists_project.path]
              inbound_paths = [project.path, inbound_allowlist_project.path, both_allowlists_project.path]

              expect(returned_project_paths).to contain_exactly(*outbound_paths)
              expect(returned_outbound_paths).to contain_exactly(*outbound_paths)
              expect(returned_inbound_paths).to contain_exactly(*inbound_paths)
            end
          end

          it_behaves_like 'returns projects'

          context 'when job token scope is disabled' do
            before do
              project.ci_cd_settings.update!(job_token_scope_enabled: false)
            end

            it_behaves_like 'returns projects'
          end
        end

        context 'when linked projects are not readable' do
          it 'returns readable projects in scope' do
            expect(returned_project_paths).to contain_exactly(project.path)
            expect(returned_outbound_paths).to contain_exactly(project.path)
            expect(returned_inbound_paths).to contain_exactly(project.path)
          end
        end

        context 'when job token scope is disabled' do
          before do
            project.ci_cd_settings.update!(job_token_scope_enabled: false)
          end

          it 'does not return an error' do
            expect(subject['errors']).to be_nil
          end

          it 'returns readable projects in scope' do
            expect(returned_project_paths).to contain_exactly(project.path)
            expect(returned_outbound_paths).to contain_exactly(project.path)
            expect(returned_inbound_paths).to contain_exactly(project.path)
          end
        end
      end
    end
  end
end