Files
gitlab-foss/spec/features/user_settings/active_sessions_spec.rb
2025-07-28 15:22:25 +00:00

238 lines
6.9 KiB
Ruby

# frozen_string_literal: true
require 'spec_helper'
RSpec.describe 'Profile > Active sessions', :clean_gitlab_redis_shared_state, feature_category: :user_profile do
include Spec::Support::Helpers::ModalHelpers
let(:user) do
create(:user).tap do |user|
user.current_sign_in_at = Time.current
end
end
let(:admin) { create(:admin) }
it 'user sees their active sessions' do
travel_to(Time.zone.parse('2018-03-12 09:06')) do
# note: headers can only be set on the non-js (aka. rack-test) driver
using_session :session1 do
Capybara.page.driver.header(
'User-Agent',
'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:58.0) Gecko/20100101 Firefox/58.0'
)
gitlab_sign_in(user)
end
# set an additional session on another device
using_session :session2 do
Capybara.page.driver.header(
'User-Agent',
'Mozilla/5.0 (iPhone; CPU iPhone OS 8_1_3 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Mobile/12B466 [FBDV/iPhone7,2]'
)
gitlab_sign_in(user)
end
# set an admin session impersonating the user
using_session :session3 do
Capybara.page.driver.header(
'User-Agent',
'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36'
)
gitlab_sign_in(admin)
enable_admin_mode!(admin)
visit admin_user_path(user)
click_link 'Impersonate'
end
using_session :session1 do
visit user_settings_active_sessions_path
expect(page).to(have_selector('ul.list-group li.list-group-item', text: 'Signed in on', count: 2))
expect(page).to have_content(
'127.0.0.1 ' \
'This is your current session ' \
'Firefox on Ubuntu ' \
'Signed in on 12 Mar 09:06'
)
expect(page).to have_selector '[title="Desktop"]', count: 1
expect(page).to have_content(
'127.0.0.1 ' \
'Last accessed on 12 Mar 09:06 ' \
'Mobile Safari on iOS ' \
'Signed in on 12 Mar 09:06'
)
expect(page).to have_selector '[title="Smartphone"]', count: 1
expect(page).not_to have_content('Chrome on Windows')
end
end
end
it 'admin sees if the session is with admin mode', :enable_admin_mode do
using_session :admin_session do
gitlab_sign_in(admin)
visit user_settings_active_sessions_path
expect(page).to have_content('with Admin Mode')
expect(page).not_to have_content('with Step-up Authentication')
end
end
context 'when session step-up authenticated', :with_current_organization do
let(:admin) { create(:omniauth_user, :admin, password_automatically_set: false, extern_uid: extern_uid, provider: provider_oidc) }
let(:extern_uid) { 'my-uid' }
let(:provider_oidc) { 'openid_connect' }
let(:provider_oidc_config_with_step_up_auth) do
GitlabSettings::Options.new(
name: provider_oidc,
step_up_auth: {
admin_mode: {
id_token: {
required: { acr: 'gold' }
}
}
}
)
end
let(:additional_info) { { extra: { raw_info: { acr: 'gold' } } } }
around do |example|
with_omniauth_full_host { example.run }
end
before do
user
stub_omniauth_setting(enabled: true, auto_link_user: true, providers: [provider_oidc_config_with_step_up_auth])
end
it 'marks admin session as step-up authenticated' do
using_session :admin_session do
gitlab_sign_in(admin)
gitlab_enable_admin_mode_sign_in_via(provider_oidc, admin, extern_uid, additional_info: additional_info)
visit user_settings_active_sessions_path
within('.settings-section') do
expect(page).to have_content('with Admin Mode')
expect(page).to have_content('with Step-up Authentication')
end
end
end
it 'does not marks admin session as step-up authenticated when acr is not matching' do
using_session :admin_session do
gitlab_sign_in(admin)
gitlab_enable_admin_mode_sign_in_via(provider_oidc, admin, extern_uid, additional_info: { extra: { raw_info: { acr: 'bronze' } } })
visit user_settings_active_sessions_path
within('.settings-section') do
expect(page).not_to have_content('with Admin Mode')
expect(page).not_to have_content('with Step-up Authentication')
end
end
end
it 'does not marks admin session as step-up authenticated after leaving admin mode', :js do
using_session :admin_session do
gitlab_sign_in(admin)
wait_for_requests
gitlab_enable_admin_mode_sign_in_via(provider_oidc, admin, extern_uid, additional_info: additional_info)
wait_for_requests
visit user_settings_active_sessions_path
wait_for_requests
within('.settings-section') do
expect(page).to have_content('with Admin Mode')
expect(page).to have_content('with Step-up Authentication')
end
gitlab_disable_admin_mode
visit user_settings_active_sessions_path
within('.settings-section') do
expect(page).not_to have_content('with Admin Mode')
expect(page).not_to have_content('with Step-up Authentication')
end
end
end
context 'when feature flag :omniauth_step_up_auth_for_admin_mode is disabled' do
before do
stub_feature_flags(omniauth_step_up_auth_for_admin_mode: false)
end
it 'does not mark admin session as step-up authenticated' do
using_session :admin_session do
gitlab_sign_in(admin)
gitlab_enable_admin_mode_sign_in_via(provider_oidc, admin, extern_uid, additional_info: additional_info)
visit user_settings_active_sessions_path
within('.settings-section') do
expect(page).to have_content('with Admin Mode')
expect(page).not_to have_content('with Step-up Authentication')
end
end
end
end
end
it 'does not display admin mode text in case its not' do
using_session :admin_session do
gitlab_sign_in(admin)
visit user_settings_active_sessions_path
expect(page).not_to have_content('with Admin Mode')
end
end
it 'user can revoke a session', :js do
# set an additional session in another browser
using_session :session2 do
gitlab_sign_in(user)
end
using_session :session1 do
gitlab_sign_in(user)
visit user_settings_active_sessions_path
expect(page).to have_link('Revoke', count: 1)
accept_gl_confirm(button_text: 'Revoke') do
click_on 'Revoke'
end
expect(page).not_to have_link('Revoke')
end
using_session :session2 do
visit user_settings_active_sessions_path
expect(page).to have_content('You need to sign in or sign up before continuing.')
end
end
end