2019-02-14 02:25:25 -05:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-06-03 23:08:05 -04:00
|
|
|
RSpec.describe Gitlab::Application do # rubocop:disable RSpec/FilePath
|
2019-02-14 02:25:25 -05:00
|
|
|
using RSpec::Parameterized::TableSyntax
|
|
|
|
|
2020-05-05 08:09:31 -04:00
|
|
|
filtered_param = ActiveSupport::ParameterFilter::FILTERED
|
2019-02-14 02:25:25 -05:00
|
|
|
|
|
|
|
context 'when parameters are logged' do
|
|
|
|
describe 'rails does not leak confidential parameters' do
|
|
|
|
def request_for_url(input_url)
|
|
|
|
env = Rack::MockRequest.env_for(input_url)
|
|
|
|
env['action_dispatch.parameter_filter'] = described_class.config.filter_parameters
|
|
|
|
|
|
|
|
ActionDispatch::Request.new(env)
|
|
|
|
end
|
|
|
|
|
|
|
|
where(:input_url, :output_query) do
|
|
|
|
'/' | {}
|
|
|
|
'/?safe=1' | { 'safe' => '1' }
|
2020-05-05 08:09:31 -04:00
|
|
|
'/?private_token=secret' | { 'private_token' => filtered_param }
|
|
|
|
'/?mixed=1&private_token=secret' | { 'mixed' => '1', 'private_token' => filtered_param }
|
|
|
|
'/?note=secret¬eable=1&prefix_note=2' | { 'note' => filtered_param, 'noteable' => '1', 'prefix_note' => '2' }
|
|
|
|
'/?note[note]=secret&target_type=1' | { 'note' => filtered_param, 'target_type' => '1' }
|
|
|
|
'/?safe[note]=secret&target_type=1' | { 'safe' => { 'note' => filtered_param }, 'target_type' => '1' }
|
2019-02-14 02:25:25 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
with_them do
|
|
|
|
it { expect(request_for_url(input_url).filtered_parameters).to eq(output_query) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|