2019-10-20 21:06:17 +00:00
|
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
2016-06-24 05:26:33 +00:00
|
|
|
|
require 'spec_helper'
|
2018-03-14 13:42:49 +00:00
|
|
|
|
require_relative '../../config/initializers/1_settings' unless defined?(Settings)
|
2016-01-18 11:35:30 +00:00
|
|
|
|
|
2020-06-24 09:08:32 +00:00
|
|
|
|
RSpec.describe Settings do
|
2017-08-17 22:05:56 +00:00
|
|
|
|
describe '#ldap' do
|
|
|
|
|
it 'can be accessed with dot syntax all the way down' do
|
|
|
|
|
expect(Gitlab.config.ldap.servers.main.label).to eq('ldap')
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
# Specifically trying to cause this error discovered in EE when removing the
|
|
|
|
|
# reassignment of each server element with Settingslogic.
|
|
|
|
|
#
|
|
|
|
|
# `undefined method `label' for #<Hash:0x007fbd18b59c08>`
|
|
|
|
|
#
|
|
|
|
|
it 'can be accessed in a very specific way that breaks without reassigning each element with Settingslogic' do
|
|
|
|
|
server_settings = Gitlab.config.ldap.servers['main']
|
|
|
|
|
expect(server_settings.label).to eq('ldap')
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2016-01-18 11:35:30 +00:00
|
|
|
|
describe '#host_without_www' do
|
|
|
|
|
context 'URL with protocol' do
|
|
|
|
|
it 'returns the host' do
|
2017-07-25 17:09:00 +00:00
|
|
|
|
expect(described_class.host_without_www('http://foo.com')).to eq 'foo.com'
|
|
|
|
|
expect(described_class.host_without_www('http://www.foo.com')).to eq 'foo.com'
|
|
|
|
|
expect(described_class.host_without_www('http://secure.foo.com')).to eq 'secure.foo.com'
|
2018-01-24 09:11:30 +00:00
|
|
|
|
expect(described_class.host_without_www('https://www.gravatar.com/avatar/%{hash}?s=%{size}&d=identicon')).to eq 'gravatar.com'
|
2016-01-18 11:35:30 +00:00
|
|
|
|
|
2017-07-25 17:09:00 +00:00
|
|
|
|
expect(described_class.host_without_www('https://foo.com')).to eq 'foo.com'
|
|
|
|
|
expect(described_class.host_without_www('https://www.foo.com')).to eq 'foo.com'
|
|
|
|
|
expect(described_class.host_without_www('https://secure.foo.com')).to eq 'secure.foo.com'
|
|
|
|
|
expect(described_class.host_without_www('https://secure.gravatar.com/avatar/%{hash}?s=%{size}&d=identicon')).to eq 'secure.gravatar.com'
|
2016-01-18 11:35:30 +00:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context 'URL without protocol' do
|
|
|
|
|
it 'returns the host' do
|
2017-07-25 17:09:00 +00:00
|
|
|
|
expect(described_class.host_without_www('foo.com')).to eq 'foo.com'
|
|
|
|
|
expect(described_class.host_without_www('www.foo.com')).to eq 'foo.com'
|
|
|
|
|
expect(described_class.host_without_www('secure.foo.com')).to eq 'secure.foo.com'
|
|
|
|
|
expect(described_class.host_without_www('www.gravatar.com/avatar/%{hash}?s=%{size}&d=identicon')).to eq 'gravatar.com'
|
2016-01-18 11:35:30 +00:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context 'URL with user/port' do
|
|
|
|
|
it 'returns the host' do
|
2017-07-25 17:09:00 +00:00
|
|
|
|
expect(described_class.host_without_www('bob:pass@foo.com:8080')).to eq 'foo.com'
|
|
|
|
|
expect(described_class.host_without_www('bob:pass@www.foo.com:8080')).to eq 'foo.com'
|
|
|
|
|
expect(described_class.host_without_www('bob:pass@secure.foo.com:8080')).to eq 'secure.foo.com'
|
|
|
|
|
expect(described_class.host_without_www('bob:pass@www.gravatar.com:8080/avatar/%{hash}?s=%{size}&d=identicon')).to eq 'gravatar.com'
|
2016-01-18 11:35:30 +00:00
|
|
|
|
|
2017-07-25 17:09:00 +00:00
|
|
|
|
expect(described_class.host_without_www('http://bob:pass@foo.com:8080')).to eq 'foo.com'
|
|
|
|
|
expect(described_class.host_without_www('http://bob:pass@www.foo.com:8080')).to eq 'foo.com'
|
|
|
|
|
expect(described_class.host_without_www('http://bob:pass@secure.foo.com:8080')).to eq 'secure.foo.com'
|
|
|
|
|
expect(described_class.host_without_www('http://bob:pass@www.gravatar.com:8080/avatar/%{hash}?s=%{size}&d=identicon')).to eq 'gravatar.com'
|
2016-01-18 11:35:30 +00:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-09-16 03:13:19 +00:00
|
|
|
|
|
|
|
|
|
describe "#weak_passwords_digest_set" do
|
|
|
|
|
subject { described_class.gitlab.weak_passwords_digest_set }
|
|
|
|
|
|
|
|
|
|
it 'is a Set' do
|
|
|
|
|
expect(subject).to be_kind_of(Set)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it 'contains 4500 password digests' do
|
|
|
|
|
expect(subject.length).to eq(4500)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it 'includes 8 char weak password digest' do
|
|
|
|
|
expect(subject).to include(digest("password"))
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it 'includes 16 char weak password digest' do
|
|
|
|
|
expect(subject).to include(digest("progressivehouse"))
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it 'includes long char weak password digest' do
|
|
|
|
|
expect(subject).to include(digest("01234567890123456789"))
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it 'does not include 7 char weak password digest' do
|
|
|
|
|
expect(subject).not_to include(digest("1234567"))
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it 'does not include plaintext' do
|
|
|
|
|
expect(subject).not_to include("password")
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
def digest(plaintext)
|
|
|
|
|
Digest::SHA256.base64digest(plaintext)
|
|
|
|
|
end
|
|
|
|
|
end
|
2016-01-18 11:35:30 +00:00
|
|
|
|
end
|