Welcome to mirror list, hosted at ThFree Co, Russian Federation.

export_file_helper.rb « import_export « support « spec - gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
blob: 791863b8d16f806d32f1e0884be7e2247ef9768a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
module ExportFileHelper
  IGNORED_ATTRIBUTES = %w[created_at updated_at url group_id]

  def setup_project
    project = create(:project, :public)

    create(:release, project: project)

    issue = create(:issue, assignee: user, project: project)
    snippet = create(:project_snippet, project: project)
    label = create(:label, project: project)
    milestone = create(:milestone, project: project)
    merge_request = create(:merge_request, source_project: project, milestone: milestone)
    commit_status = create(:commit_status, project: project)

    create(:label_link, label: label, target: issue)

    ci_pipeline = create(:ci_pipeline,
                         project: project,
                         sha: merge_request.diff_head_sha,
                         ref: merge_request.source_branch,
                         statuses: [commit_status])

    create(:ci_build, pipeline: ci_pipeline, project: project)
    create(:milestone, project: project)
    create(:note, noteable: issue, project: project)
    create(:note, noteable: merge_request, project: project)
    create(:note, noteable: snippet, project: project)
    create(:note_on_commit,
           author: user,
           project: project,
           commit_id: ci_pipeline.sha)

    create(:event, target: milestone, project: project, action: Event::CREATED, author: user)
    create(:project_member, :master, user: user, project: project)
    create(:ci_variable, project: project)
    create(:ci_trigger, project: project)
    key = create(:deploy_key)
    key.projects << project
    create(:service, project: project)
    create(:project_hook, project: project, token: 'token')
    create(:protected_branch, project: project)

    project
  end

  # Expands the compressed file for an exported project into +tmpdir+
  def in_directory_with_expanded_export(project)
    Dir.mktmpdir do |tmpdir|
      export_file = project.export_project_path
      _output, exit_status = Gitlab::Popen.popen(%W{tar -zxf #{export_file} -C #{tmpdir}})

      yield(exit_status, tmpdir)
    end
  end

  # Recursively finds key/values including +key+ as part of the key, inside a nested hash
  def deep_find_with_parent(sensitive_key_word, object, found = nil)
    # Returns the parent object and the object found containing a sensitive word as part of the key
    if object_contains_key?(object, sensitive_key_word)
      [object[sensitive_key_word], object] if object[sensitive_key_word]
    elsif object.is_a?(Enumerable)
      # Recursively lookup for keys containing sensitive words in a Hash or Array
      object.find { |*hash_or_array| found, object = deep_find_with_parent(sensitive_key_word, hash_or_array.last, found) }
      [found, object] if found
    end
  end

  #Return true if the hash has a key containing a sensitive word
  def object_contains_key?(object, sensitive_key_word)
    object.is_a?(Hash) && object.keys.any? { |key| key.include?(sensitive_key_word) }
  end

  # Returns true if a sensitive word is found inside a hash, excluding safe hashes
  def has_sensitive_attributes?(sensitive_word, project_hash)
    loop do
      object, parent = deep_find_with_parent(sensitive_word, project_hash)

      if object && is_safe_hash?(parent, sensitive_word)
        # It's in the safe list, remove hash and keep looking
        parent.delete(object)
      elsif object
        return true
      else
        return false
      end
    end
  end

  # Returns true if it's one of the excluded models in +safe_models+
  def is_safe_hash?(parent, sensitive_word)
    return false unless parent

    # Extra attributes that appear in a model but not in the exported hash.
    excluded_attributes = ['type']

    safe_models[sensitive_word.to_sym].each do |safe_model|
      return true if (safe_model.attribute_names - parent.keys - excluded_attributes).empty?
    end

    false
  end
end