Commit 17ec86af authored by Dan Davison's avatar Dan Davison

Merge branch 'qa-shl-fix-gitlab-oauth-spec' into 'master'

Fix GitHub OAuth Spec

Closes #36305

See merge request gitlab-org/gitlab!22525
parents 819289d7 a12b6fb9
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
# Failure issue: https://gitlab.com/gitlab-org/gitlab/issues/36305 context 'Manage', :orchestrated, :oauth do
context 'Manage', :orchestrated, :oauth, :skip do
describe 'OAuth login' do describe 'OAuth login' do
it 'User logs in to GitLab with GitHub OAuth' do it 'User logs in to GitLab with GitHub OAuth' do
Runtime::Browser.visit(:gitlab, Page::Main::Login) Runtime::Browser.visit(:gitlab, Page::Main::Login)
......
# frozen_string_literal: true # frozen_string_literal: true
require 'capybara/dsl' require 'capybara/dsl'
require 'benchmark'
module QA module QA
module Vendor module Vendor
...@@ -13,9 +14,15 @@ module QA ...@@ -13,9 +14,15 @@ module QA
click_on 'Sign in' click_on 'Sign in'
Support::Retrier.retry_until(raise_on_failure: true, sleep_interval: 35) do Support::Retrier.retry_until(raise_on_failure: true, sleep_interval: 35) do
otp = OnePassword::CLI.new.otp fresh_otp = nil
fill_in 'otp', with: otp time = Benchmark.realtime do
fresh_otp = OnePassword::CLI.instance.fresh_otp
end
QA::Runtime::Logger.info("Returned fresh_otp: #{fresh_otp} in #{time} seconds")
fill_in 'otp', with: fresh_otp
click_on 'Verify' click_on 'Verify'
......
# frozen_string_literal: true # frozen_string_literal: true
require 'benchmark'
module QA module QA
module Vendor module Vendor
module OnePassword module OnePassword
class CLI class CLI
include Singleton
def initialize def initialize
@email = QA::Runtime::Env.gitlab_qa_1p_email @email = QA::Runtime::Env.gitlab_qa_1p_email
@password = QA::Runtime::Env.gitlab_qa_1p_password @password = QA::Runtime::Env.gitlab_qa_1p_password
...@@ -11,14 +15,39 @@ module QA ...@@ -11,14 +15,39 @@ module QA
@github_uuid = QA::Runtime::Env.gitlab_qa_1p_github_uuid @github_uuid = QA::Runtime::Env.gitlab_qa_1p_github_uuid
end end
def otp def fresh_otp
`#{op_path} get totp #{@github_uuid} --session=#{session_token}`.to_i otps = []
# Fetches a fresh OTP and returns it only after op provides the same OTP twice
# An OTP is valid for 30 seconds so 70 attempts with 0.5 interval would ensure we complete 1 cycle
Support::Retrier.retry_until(max_attempts: 70, sleep_interval: 0.5) do
otps << fetch_otp
otps.size >= 3 && otps[-1] == otps[-2] && otps[-1] != otps[-3]
end
otps.last
end end
private private
def fetch_otp
result = nil
time = Benchmark.realtime do
result = `#{op_path} get totp #{@github_uuid} --session=#{session_token}`.to_i
end
QA::Runtime::Logger.info("Fetched OTP: #{result} in: #{time} seconds")
result
end
# OP session tokens are valid for 30 minutes. We are caching the session token here and this is fine currently
# as we just have one test that is not expected to go over 30 minutes.
# But note that if we add more tests that use this class, we might need to add a mechanism to invalidate
# the cache after 30 minutes or if the session_token is rejected by op CLI.
def session_token def session_token
`echo '#{@password}' | #{op_path} signin gitlab.1password.com #{@email} #{@secret} --output=raw --shorthand=gitlab_qa` @session_token ||= `echo '#{@password}' | #{op_path} signin gitlab.1password.com #{@email} #{@secret} --output=raw --shorthand=gitlab_qa`
end end
def op_path def op_path
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment