Skip to content
Snippets Groups Projects
Commit 23bd9b37 authored by Alex Pooley's avatar Alex Pooley :one:
Browse files

Merge branch 'philipcunningham-fix-dast-site-token-generation-362992' into 'master'

Align DAST Site Token URL validation

See merge request !88246
parents 166145bb 40ae54ee
No related branches found
No related tags found
1 merge request!88246Align DAST Site Token URL validation
Pipeline #548492355 passed
# frozen_string_literal: true
module AppSec
module Dast
module UrlAddressable
extend ::ActiveSupport::Concern
included do
validates :url, addressable_url: true
end
end
end
end
# frozen_string_literal: true
class DastSite < ApplicationRecord
include AppSec::Dast::UrlAddressable
belongs_to :project
belongs_to :dast_site_validation
has_many :dast_site_profiles
validates :url, length: { maximum: 255 }, uniqueness: { scope: :project_id }
validates :url, addressable_url: true
validates :project_id, presence: true
validate :dast_site_validation_project_id_fk
......
# frozen_string_literal: true
class DastSiteToken < ApplicationRecord
include AppSec::Dast::UrlAddressable
belongs_to :project
validates :project_id, presence: true
validates :token, length: { maximum: 255 }, presence: true, uniqueness: true
validates :url, length: { maximum: 255 }, presence: true, public_url: true, uniqueness: { scope: :project_id }
validates :url, length: { maximum: 255 }, uniqueness: { scope: :project_id }, presence: true
def dast_site
@dast_site ||= DastSite.find_by(project_id: project.id, url: url)
......
......@@ -19,6 +19,8 @@
it { is_expected.to validate_uniqueness_of(:url).scoped_to(:project_id) }
it { is_expected.to validate_presence_of(:project_id) }
it_behaves_like 'dast url addressable'
context 'when the project_id and dast_site_token.project_id do not match' do
let(:project) { create(:project) }
let(:dast_site_validation) { create(:dast_site_validation) }
......@@ -32,17 +34,6 @@
end
end
end
context 'when the url is not public' do
let_it_be(:message) { 'Url is blocked: Requests to localhost are not allowed' }
subject { build(:dast_site, project: project, url: 'http://127.0.0.1') }
it 'is is valid', :aggregate_failures do
expect(subject).to be_valid
expect(subject.errors.full_messages).not_to include(message)
end
end
end
describe 'callbacks' do
......
......@@ -19,16 +19,7 @@
it { is_expected.to validate_uniqueness_of(:token) }
it { is_expected.to validate_uniqueness_of(:url).scoped_to(:project_id) }
context 'when the url is not public' do
subject { build(:dast_site_token, url: 'http://127.0.0.1') }
it 'is not valid' do
aggregate_failures do
expect(subject.valid?).to eq(false)
expect(subject.errors.full_messages).to include('Url is blocked: Requests to localhost are not allowed')
end
end
end
it_behaves_like 'dast url addressable'
end
describe '#dast_site' do
......
# frozen_string_literal: true
RSpec.shared_examples 'dast url addressable' do
it 'includes UrlAddressable' do
expect(described_class).to include(AppSec::Dast::UrlAddressable)
end
context 'when the url is not public' do
before do
subject.url = 'http://127.0.0.1'
end
it 'is valid', :aggregate_failures do
expect(subject).to be_valid
end
end
end
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment