123 lines
3.5 KiB
Ruby
123 lines
3.5 KiB
Ruby
require_relative 'devise_helpers'
|
|
|
|
module LoginHelpers
|
|
include DeviseHelpers
|
|
|
|
# Internal: Log in as a specific user or a new user of a specific role
|
|
#
|
|
# user_or_role - User object, or a role to create (e.g., :admin, :user)
|
|
#
|
|
# Examples:
|
|
#
|
|
# # Create a user automatically
|
|
# gitlab_sign_in(:user)
|
|
#
|
|
# # Create an admin automatically
|
|
# gitlab_sign_in(:admin)
|
|
#
|
|
# # Provide an existing User record
|
|
# user = create(:user)
|
|
# gitlab_sign_in(user)
|
|
def gitlab_sign_in(user_or_role, **kwargs)
|
|
user =
|
|
if user_or_role.is_a?(User)
|
|
user_or_role
|
|
else
|
|
create(user_or_role)
|
|
end
|
|
|
|
gitlab_sign_in_with(user, **kwargs)
|
|
|
|
user
|
|
end
|
|
|
|
def gitlab_sign_in_via(provider, user, uid)
|
|
mock_auth_hash(provider, uid, user.email)
|
|
visit new_user_session_path
|
|
click_link provider
|
|
end
|
|
|
|
# Requires Javascript driver.
|
|
def gitlab_sign_out
|
|
find(".header-user-dropdown-toggle").click
|
|
click_link "Sign out"
|
|
|
|
expect(page).to have_button('Sign in')
|
|
end
|
|
|
|
private
|
|
|
|
# Private: Login as the specified user
|
|
#
|
|
# user - User instance to login with
|
|
# remember - Whether or not to check "Remember me" (default: false)
|
|
def gitlab_sign_in_with(user, remember: false)
|
|
visit new_user_session_path
|
|
|
|
fill_in "user_login", with: user.email
|
|
fill_in "user_password", with: "12345678"
|
|
check 'user_remember_me' if remember
|
|
|
|
click_button "Sign in"
|
|
end
|
|
|
|
def login_via(provider, user, uid, remember_me: false)
|
|
mock_auth_hash(provider, uid, user.email)
|
|
visit new_user_session_path
|
|
expect(page).to have_content('Sign in with')
|
|
|
|
check 'remember_me' if remember_me
|
|
|
|
click_link "oauth-login-#{provider}"
|
|
end
|
|
|
|
def mock_auth_hash(provider, uid, email)
|
|
# The mock_auth configuration allows you to set per-provider (or default)
|
|
# authentication hashes to return during integration testing.
|
|
OmniAuth.config.mock_auth[provider.to_sym] = OmniAuth::AuthHash.new({
|
|
provider: provider,
|
|
uid: uid,
|
|
info: {
|
|
name: 'mockuser',
|
|
email: email,
|
|
image: 'mock_user_thumbnail_url'
|
|
},
|
|
credentials: {
|
|
token: 'mock_token',
|
|
secret: 'mock_secret'
|
|
},
|
|
extra: {
|
|
raw_info: {
|
|
info: {
|
|
name: 'mockuser',
|
|
email: email,
|
|
image: 'mock_user_thumbnail_url'
|
|
}
|
|
}
|
|
}
|
|
})
|
|
Rails.application.env_config['omniauth.auth'] = OmniAuth.config.mock_auth[:saml]
|
|
end
|
|
|
|
def mock_saml_config
|
|
OpenStruct.new(name: 'saml', label: 'saml', args: {
|
|
assertion_consumer_service_url: 'https://localhost:3443/users/auth/saml/callback',
|
|
idp_cert_fingerprint: '26:43:2C:47:AF:F0:6B:D0:07:9C:AD:A3:74:FE:5D:94:5F:4E:9E:52',
|
|
idp_sso_target_url: 'https://idp.example.com/sso/saml',
|
|
issuer: 'https://localhost:3443/',
|
|
name_identifier_format: 'urn:oasis:names:tc:SAML:2.0:nameid-format:transient'
|
|
})
|
|
end
|
|
|
|
def stub_omniauth_saml_config(messages)
|
|
set_devise_mapping(context: Rails.application)
|
|
Rails.application.routes.disable_clear_and_finalize = true
|
|
Rails.application.routes.draw do
|
|
post '/users/auth/saml' => 'omniauth_callbacks#saml'
|
|
end
|
|
allow(Gitlab::OAuth::Provider).to receive_messages(providers: [:saml], config_for: mock_saml_config)
|
|
stub_omniauth_setting(messages)
|
|
allow_any_instance_of(Object).to receive(:user_saml_omniauth_authorize_path).and_return('/users/auth/saml')
|
|
allow_any_instance_of(Object).to receive(:omniauth_authorize_path).with(:user, "saml").and_return('/users/auth/saml')
|
|
end
|
|
end
|