OpenProject is the leading open source project management software.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
openproject/spec/controllers/sys_controller_spec.rb

683 lines
24 KiB

#-- copyright
# OpenProject is an open source project management software.
# Copyright (C) 2012-2020 the OpenProject GmbH
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License version 3.
#
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
# Copyright (C) 2006-2017 Jean-Philippe Lang
# Copyright (C) 2010-2013 the ChiliProject Team
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
#
# See docs/COPYRIGHT.rdoc for more details.
#++
require 'spec_helper'
describe SysController, type: :controller do
let(:commit_role) {
FactoryBot.create(:role, permissions: %i[commit_access browse_repository])
}
let(:browse_role) { FactoryBot.create(:role, permissions: [:browse_repository]) }
let(:guest_role) { FactoryBot.create(:role, permissions: []) }
let(:valid_user_password) { 'Top Secret Password' }
let(:valid_user) {
FactoryBot.create(:user,
login: 'johndoe',
password: valid_user_password,
password_confirmation: valid_user_password)
}
let(:api_key) { '12345678' }
let(:public) { false }
let(:project) { FactoryBot.create(:project, public: public) }
before(:each) do
FactoryBot.create(:non_member, permissions: [:browse_repository])
DeletedUser.first # creating it first in order to avoid problems with should_receive
random_project = FactoryBot.create(:project, public: false)
FactoryBot.create(:member,
user: valid_user,
roles: [browse_role],
project: random_project)
allow(Setting).to receive(:sys_api_key).and_return(api_key)
allow(Setting).to receive(:sys_api_enabled?).and_return(true)
allow(Setting).to receive(:repository_authentication_caching_enabled?).and_return(true)
Rails.cache.clear
RequestStore.clear!
end
describe 'svn' do
let!(:repository) { FactoryBot.create(:repository_subversion, project: project) }
describe 'repo_auth' do
context 'for valid login, but no access to repo_auth' do
before(:each) do
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
post 'repo_auth', params: {key: api_key,
repository: 'without-access',
method: 'GET'}
end
it 'should respond 403 not allowed' do
expect(response.code).to eq('403')
expect(response.body).to eq('Not allowed')
end
end
context 'for valid login and user has read permission (role reporter) for project' do
before(:each) do
FactoryBot.create(:member,
user: valid_user,
roles: [browse_role],
project: project)
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
end
it 'should respond 200 okay dokay for GET' do
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'GET'}
expect(response.code).to eq('200')
end
it 'should respond 403 not allowed for POST' do
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'POST'}
expect(response.code).to eq('403')
end
end
context 'for valid login and user has rw permission (role developer) for project' do
before(:each) do
FactoryBot.create(:member,
user: valid_user,
roles: [commit_role],
project: project)
valid_user.save
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
end
it 'should respond 200 okay dokay for GET' do
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'GET'}
expect(response.code).to eq('200')
end
it 'should respond 200 okay dokay for POST' do
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'POST'}
expect(response.code).to eq('200')
end
end
context 'for invalid login and user has role manager for project' do
before(:each) do
FactoryBot.create(:member,
user: valid_user,
roles: [commit_role],
project: project)
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password + 'made invalid'
)
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'GET'}
end
it 'should respond 401 auth required' do
expect(response.code).to eq('401')
end
end
context 'for valid login and user is not member for project' do
before(:each) do
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'GET'}
end
it 'should respond 403 not allowed' do
expect(response.code).to eq('403')
end
end
context 'for valid login and project is public' do
let(:public) { true }
before(:each) do
random_project = FactoryBot.create(:project, public: false)
FactoryBot.create(:member,
user: valid_user,
roles: [browse_role],
project: random_project)
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'GET'}
end
it 'should respond 200 OK' do
expect(response.code).to eq('200')
end
end
context 'for invalid credentials' do
before(:each) do
post 'repo_auth', params: {key: api_key,
repository: 'any-repo',
method: 'GET'}
end
it 'should respond 401 auth required' do
expect(response.code).to eq('401')
expect(response.body).to eq('Authorization required')
end
end
context 'for invalid api key' do
it 'should respond 403 for valid username/password' do
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
post 'repo_auth', params: {key: 'not_the_api_key',
repository: 'any-repo',
method: 'GET'}
expect(response.code).to eq('403')
expect(response.body)
.to eq('Access denied. Repository management WS is disabled or key is invalid.')
end
it 'should respond 403 for invalid username/password' do
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
'invalid',
'invalid'
)
post 'repo_auth', params: {key: 'not_the_api_key',
repository: 'any-repo',
method: 'GET'}
expect(response.code).to eq('403')
expect(response.body)
.to eq('Access denied. Repository management WS is disabled or key is invalid.')
end
end
end
end
describe 'git' do
let!(:repository) { FactoryBot.create(:repository_git, project: project) }
describe 'repo_auth' do
context 'for valid login, but no access to repo_auth' do
before(:each) do
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
post 'repo_auth', params: {key: api_key,
repository: 'without-access',
method: 'GET',
git_smart_http: '1',
uri: '/git',
location: '/git'}
end
it 'should respond 403 not allowed' do
expect(response.code).to eq('403')
expect(response.body).to eq('Not allowed')
end
end
context 'for valid login and user has read permission (role reporter) for project' do
before(:each) do
FactoryBot.create(:member,
user: valid_user,
roles: [browse_role],
project: project)
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
end
it 'should respond 200 okay dokay for read-only access' do
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'GET',
git_smart_http: '1',
uri: '/git',
location: '/git'}
expect(response.code).to eq('200')
end
it 'should respond 403 not allowed for write (push)' do
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'POST',
git_smart_http: '1',
uri: "/git/#{project.identifier}/git-receive-pack",
location: '/git'}
expect(response.code).to eq('403')
end
end
context 'for valid login and user has rw permission (role developer) for project' do
before(:each) do
FactoryBot.create(:member,
user: valid_user,
roles: [commit_role],
project: project)
valid_user.save
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
end
it 'should respond 200 okay dokay for GET' do
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'GET',
git_smart_http: '1',
uri: '/git',
location: '/git'}
expect(response.code).to eq('200')
end
it 'should respond 200 okay dokay for POST' do
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'POST',
git_smart_http: '1',
uri: "/git/#{project.identifier}/git-receive-pack",
location: '/git'}
expect(response.code).to eq('200')
end
end
context 'for invalid login and user has role manager for project' do
before(:each) do
FactoryBot.create(:member,
user: valid_user,
roles: [commit_role],
project: project)
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password + 'made invalid'
)
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'GET',
git_smart_http: '1',
uri: '/git',
location: '/git'}
end
it 'should respond 401 auth required' do
expect(response.code).to eq('401')
end
end
context 'for valid login and user is not member for project' do
before(:each) do
project = FactoryBot.create(:project, public: false)
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'GET',
git_smart_http: '1',
uri: '/git',
location: '/git'}
end
it 'should respond 403 not allowed' do
expect(response.code).to eq('403')
end
end
context 'for valid login and project is public' do
let(:public) { true }
before(:each) do
random_project = FactoryBot.create(:project, public: false)
FactoryBot.create(:member,
user: valid_user,
roles: [browse_role],
project: random_project)
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
post 'repo_auth', params: {key: api_key,
repository: project.identifier,
method: 'GET',
git_smart_http: '1',
uri: '/git',
location: '/git'}
end
it 'should respond 200 OK' do
expect(response.code).to eq('200')
end
end
context 'for invalid credentials' do
before(:each) do
post 'repo_auth', params: {key: api_key,
repository: 'any-repo',
method: 'GET',
git_smart_http: '1',
uri: '/git',
location: '/git'}
end
it 'should respond 401 auth required' do
expect(response.code).to eq('401')
expect(response.body).to eq('Authorization required')
end
end
context 'for invalid api key' do
it 'should respond 403 for valid username/password' do
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
valid_user.login,
valid_user_password
)
post 'repo_auth', params: {key: 'not_the_api_key',
repository: 'any-repo',
method: 'GET',
git_smart_http: '1',
uri: '/git',
location: '/git'}
expect(response.code).to eq('403')
expect(response.body)
.to eq('Access denied. Repository management WS is disabled or key is invalid.')
end
it 'should respond 403 for invalid username/password' do
request.env['HTTP_AUTHORIZATION'] =
ActionController::HttpAuthentication::Basic.encode_credentials(
'invalid',
'invalid'
)
post 'repo_auth', params: {key: 'not_the_api_key',
repository: 'any-repo',
method: 'GET',
git_smart_http: '1',
uri: '/git',
location: '/git'}
expect(response.code).to eq('403')
expect(response.body)
.to eq('Access denied. Repository management WS is disabled or key is invalid.')
end
end
end
end
describe '#cached_user_login' do
let(:cache_key) {
OpenProject::RepositoryAuthentication::CACHE_PREFIX +
Digest::SHA1.hexdigest("#{valid_user.login}#{valid_user_password}")
}
let(:cache_expiry) { OpenProject::RepositoryAuthentication::CACHE_EXPIRES_AFTER }
it 'should call user_login only once when called twice' do
expect(controller).to receive(:user_login).once.and_return(valid_user)
2.times { controller.send(:cached_user_login, valid_user.login, valid_user_password) }
end
it 'should return the same as user_login for valid creds' do
expect(controller.send(:cached_user_login, valid_user.login, valid_user_password))
.to eq(controller.send(:user_login, valid_user.login, valid_user_password))
end
it 'should return the same as user_login for invalid creds' do
expect(controller.send(:cached_user_login, 'invalid', 'invalid'))
.to eq(controller.send(:user_login, 'invalid', 'invalid'))
end
it 'should use cache' do
8 years ago
allow(Rails.cache).to receive(:fetch).and_call_original
expect(Rails.cache).to receive(:fetch).with(cache_key, expires_in: cache_expiry) \
.and_return(Marshal.dump(valid_user.id.to_s))
controller.send(:cached_user_login, valid_user.login, valid_user_password)
end
describe 'with caching disabled' do
before do
allow(Setting).to receive(:repository_authentication_caching_enabled?).and_return(false)
end
it 'should not use a cache' do
allow(Rails.cache).to receive(:fetch).and_wrap_original do |m, *args, &block|
Convert specs to RSpec 2.99.0 syntax with Transpec This conversion is done by Transpec 2.3.6 with the following command: transpec -f * 66 conversions from: it { should ... } to: it { is_expected.to ... } * 53 conversions from: obj.stub(:message) to: allow(obj).to receive(:message) * 20 conversions from: == expected to: eq(expected) * 19 conversions from: obj.should to: expect(obj).to * 7 conversions from: describe 'some request' { } to: describe 'some request', :type => :request { } * 7 conversions from: describe 'some routing' { } to: describe 'some routing', :type => :routing { } * 7 conversions from: its(:attr) { } to: describe '#attr' do subject { super().attr }; it { } end * 5 conversions from: obj.should_not to: expect(obj).not_to * 4 conversions from: describe 'some view' { } to: describe 'some view', :type => :view { } * 3 conversions from: be_true to: be_truthy * 2 conversions from: describe 'some model' { } to: describe 'some model', :type => :model { } * 2 conversions from: its([:key]) { } to: describe '[:key]' do subject { super()[:key] }; it { } end * 2 conversions from: obj.should_receive(:message) to: expect(obj).to receive(:message) * 1 conversion from: be_false to: be_falsey * 1 conversion from: describe 'some controller' { } to: describe 'some controller', :type => :controller { } * 1 conversion from: describe 'some feature' { } to: describe 'some feature', :type => :feature { } * 1 conversion from: it { should_not ... } to: it { is_expected.not_to ... } For more details: https://github.com/yujinakayama/transpec#supported-conversions
10 years ago
expect(args.first).not_to eq(cache_key)
m.call(*args, &block)
end
controller.send(:cached_user_login, valid_user.login, valid_user_password)
end
end
describe 'update_required_storage' do
let(:force) { nil }
let(:apikey) { Setting.sys_api_key }
let(:last_updated) { nil }
def request_storage
get 'update_required_storage', params: {key: apikey,
id: id,
force: force}
end
context 'missing project' do
let(:id) { 1234 }
it 'returns 404' do
request_storage
expect(response.code).to eq('404')
expect(response.body).to include('Could not find project #1234')
end
end
context 'available project, but missing repository' do
let(:project) { FactoryBot.build_stubbed(:project) }
let(:id) { project.id }
before do
allow(Project).to receive(:find).and_return(project)
request_storage
end
it 'returns 404' do
expect(response.code).to eq('404')
expect(response.body).to include("Project ##{project.id} does not have a repository.")
end
end
context 'stubbed repository' do
let(:project) { FactoryBot.build_stubbed(:project) }
let(:id) { project.id }
let(:repository) {
FactoryBot.build_stubbed(:repository_subversion, url: url, root_url: url)
}
before do
allow(Project).to receive(:find).and_return(project)
allow(project).to receive(:repository).and_return(repository)
allow(repository).to receive(:storage_updated_at).and_return(last_updated)
request_storage
end
context 'local non-existing repository' do
let(:root_url) { '/tmp/does/not/exist/svn/foo.svn' }
let(:url) { "file://#{root_url}" }
it 'does not have storage available' do
expect(repository.scm.storage_available?).to be false
expect(response.code).to eq('400')
end
end
context 'remote stubbed repository' do
let(:root_url) { '' }
let(:url) { 'https://foo.example.org/svn/bar' }
it 'has no storage available' do
request_storage
expect(repository.scm.storage_available?).to be false
expect(response.code).to eq('400')
end
end
end
context 'local existing repository' do
with_subversion_repository do |repo_dir|
let(:root_url) { repo_dir }
let(:url) { "file://#{root_url}" }
let(:project) { FactoryBot.create(:project) }
let(:id) { project.id }
let(:repository) {
FactoryBot.create(:repository_subversion, project: project, url: url, root_url: url)
}
before do
allow(Project).to receive(:find).and_return(project)
allow(project).to receive(:repository).and_return(repository)
allow(repository).to receive(:storage_updated_at).and_return(last_updated)
end
it 'has storage available' do
expect(repository.scm.storage_available?).to be true
end
context 'storage never updated before' do
it 'updates the storage' do
expect(repository.required_storage_bytes).to be == 0
request_storage
expect(response.code).to eq('200')
expect(response.body).to include('Updated: true')
5 years ago
perform_enqueued_jobs
repository.reload
expect(repository.required_storage_bytes).to be > 0
end
end
context 'outdated storage' do
let(:last_updated) { 2.days.ago }
it 'updates the storage' do
expect(::Scm::StorageUpdaterJob).to receive(:perform_later)
request_storage
end
end
context 'valid storage time' do
let(:last_updated) { 10.minutes.ago }
it 'does not update to storage' do
expect(::Scm::StorageUpdaterJob).not_to receive(:perform_later)
request_storage
end
end
context 'valid storage time and force' do
let(:force) { '1' }
let(:last_updated) { 10.minutes.ago }
it 'does update to storage' do
expect(::Scm::StorageUpdaterJob).to receive(:perform_later)
request_storage
end
end
end
end
end
end
end