#-- copyright # OpenProject is an open source project management software. # Copyright (C) 2012-2021 the OpenProject GmbH # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License version 3. # # OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows: # Copyright (C) 2006-2013 Jean-Philippe Lang # Copyright (C) 2010-2013 the ChiliProject Team # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. # # See docs/COPYRIGHT.rdoc for more details. #++ require 'spec_helper' describe SysController, type: :controller do let(:commit_role) { FactoryBot.create(:role, permissions: %i[commit_access browse_repository]) } let(:browse_role) { FactoryBot.create(:role, permissions: [:browse_repository]) } let(:guest_role) { FactoryBot.create(:role, permissions: []) } let(:valid_user_password) { 'Top Secret Password' } let(:valid_user) { FactoryBot.create(:user, login: 'johndoe', password: valid_user_password, password_confirmation: valid_user_password) } let(:api_key) { '12345678' } let(:public) { false } let(:project) { FactoryBot.create(:project, public: public) } before(:each) do FactoryBot.create(:non_member, permissions: [:browse_repository]) DeletedUser.first # creating it first in order to avoid problems with should_receive random_project = FactoryBot.create(:project, public: false) FactoryBot.create(:member, user: valid_user, roles: [browse_role], project: random_project) allow(Setting).to receive(:sys_api_key).and_return(api_key) allow(Setting).to receive(:sys_api_enabled?).and_return(true) allow(Setting).to receive(:repository_authentication_caching_enabled?).and_return(true) Rails.cache.clear RequestStore.clear! end describe 'svn' do let!(:repository) { FactoryBot.create(:repository_subversion, project: project) } describe 'repo_auth' do context 'for valid login, but no access to repo_auth' do before(:each) do request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) post 'repo_auth', params: {key: api_key, repository: 'without-access', method: 'GET'} end it 'should respond 403 not allowed' do expect(response.code).to eq('403') expect(response.body).to eq('Not allowed') end end context 'for valid login and user has read permission (role reporter) for project' do before(:each) do FactoryBot.create(:member, user: valid_user, roles: [browse_role], project: project) request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) end it 'should respond 200 okay dokay for GET' do post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'GET'} expect(response.code).to eq('200') end it 'should respond 403 not allowed for POST' do post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'POST'} expect(response.code).to eq('403') end end context 'for valid login and user has rw permission (role developer) for project' do before(:each) do FactoryBot.create(:member, user: valid_user, roles: [commit_role], project: project) valid_user.save request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) end it 'should respond 200 okay dokay for GET' do post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'GET'} expect(response.code).to eq('200') end it 'should respond 200 okay dokay for POST' do post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'POST'} expect(response.code).to eq('200') end end context 'for invalid login and user has role manager for project' do before(:each) do FactoryBot.create(:member, user: valid_user, roles: [commit_role], project: project) request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password + 'made invalid' ) post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'GET'} end it 'should respond 401 auth required' do expect(response.code).to eq('401') end end context 'for valid login and user is not member for project' do before(:each) do request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'GET'} end it 'should respond 403 not allowed' do expect(response.code).to eq('403') end end context 'for valid login and project is public' do let(:public) { true } before(:each) do random_project = FactoryBot.create(:project, public: false) FactoryBot.create(:member, user: valid_user, roles: [browse_role], project: random_project) request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'GET'} end it 'should respond 200 OK' do expect(response.code).to eq('200') end end context 'for invalid credentials' do before(:each) do post 'repo_auth', params: {key: api_key, repository: 'any-repo', method: 'GET'} end it 'should respond 401 auth required' do expect(response.code).to eq('401') expect(response.body).to eq('Authorization required') end end context 'for invalid api key' do it 'should respond 403 for valid username/password' do request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) post 'repo_auth', params: {key: 'not_the_api_key', repository: 'any-repo', method: 'GET'} expect(response.code).to eq('403') expect(response.body) .to eq('Access denied. Repository management WS is disabled or key is invalid.') end it 'should respond 403 for invalid username/password' do request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( 'invalid', 'invalid' ) post 'repo_auth', params: {key: 'not_the_api_key', repository: 'any-repo', method: 'GET'} expect(response.code).to eq('403') expect(response.body) .to eq('Access denied. Repository management WS is disabled or key is invalid.') end end end end describe 'git' do let!(:repository) { FactoryBot.create(:repository_git, project: project) } describe 'repo_auth' do context 'for valid login, but no access to repo_auth' do before(:each) do request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) post 'repo_auth', params: {key: api_key, repository: 'without-access', method: 'GET', git_smart_http: '1', uri: '/git', location: '/git'} end it 'should respond 403 not allowed' do expect(response.code).to eq('403') expect(response.body).to eq('Not allowed') end end context 'for valid login and user has read permission (role reporter) for project' do before(:each) do FactoryBot.create(:member, user: valid_user, roles: [browse_role], project: project) request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) end it 'should respond 200 okay dokay for read-only access' do post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'GET', git_smart_http: '1', uri: '/git', location: '/git'} expect(response.code).to eq('200') end it 'should respond 403 not allowed for write (push)' do post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'POST', git_smart_http: '1', uri: "/git/#{project.identifier}/git-receive-pack", location: '/git'} expect(response.code).to eq('403') end end context 'for valid login and user has rw permission (role developer) for project' do before(:each) do FactoryBot.create(:member, user: valid_user, roles: [commit_role], project: project) valid_user.save request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) end it 'should respond 200 okay dokay for GET' do post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'GET', git_smart_http: '1', uri: '/git', location: '/git'} expect(response.code).to eq('200') end it 'should respond 200 okay dokay for POST' do post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'POST', git_smart_http: '1', uri: "/git/#{project.identifier}/git-receive-pack", location: '/git'} expect(response.code).to eq('200') end end context 'for invalid login and user has role manager for project' do before(:each) do FactoryBot.create(:member, user: valid_user, roles: [commit_role], project: project) request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password + 'made invalid' ) post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'GET', git_smart_http: '1', uri: '/git', location: '/git'} end it 'should respond 401 auth required' do expect(response.code).to eq('401') end end context 'for valid login and user is not member for project' do before(:each) do project = FactoryBot.create(:project, public: false) request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'GET', git_smart_http: '1', uri: '/git', location: '/git'} end it 'should respond 403 not allowed' do expect(response.code).to eq('403') end end context 'for valid login and project is public' do let(:public) { true } before(:each) do random_project = FactoryBot.create(:project, public: false) FactoryBot.create(:member, user: valid_user, roles: [browse_role], project: random_project) request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) post 'repo_auth', params: {key: api_key, repository: project.identifier, method: 'GET', git_smart_http: '1', uri: '/git', location: '/git'} end it 'should respond 200 OK' do expect(response.code).to eq('200') end end context 'for invalid credentials' do before(:each) do post 'repo_auth', params: {key: api_key, repository: 'any-repo', method: 'GET', git_smart_http: '1', uri: '/git', location: '/git'} end it 'should respond 401 auth required' do expect(response.code).to eq('401') expect(response.body).to eq('Authorization required') end end context 'for invalid api key' do it 'should respond 403 for valid username/password' do request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( valid_user.login, valid_user_password ) post 'repo_auth', params: {key: 'not_the_api_key', repository: 'any-repo', method: 'GET', git_smart_http: '1', uri: '/git', location: '/git'} expect(response.code).to eq('403') expect(response.body) .to eq('Access denied. Repository management WS is disabled or key is invalid.') end it 'should respond 403 for invalid username/password' do request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials( 'invalid', 'invalid' ) post 'repo_auth', params: {key: 'not_the_api_key', repository: 'any-repo', method: 'GET', git_smart_http: '1', uri: '/git', location: '/git'} expect(response.code).to eq('403') expect(response.body) .to eq('Access denied. Repository management WS is disabled or key is invalid.') end end end end describe '#cached_user_login' do let(:cache_key) { OpenProject::RepositoryAuthentication::CACHE_PREFIX + Digest::SHA1.hexdigest("#{valid_user.login}#{valid_user_password}") } let(:cache_expiry) { OpenProject::RepositoryAuthentication::CACHE_EXPIRES_AFTER } it 'should call user_login only once when called twice' do expect(controller).to receive(:user_login).once.and_return(valid_user) 2.times { controller.send(:cached_user_login, valid_user.login, valid_user_password) } end it 'should return the same as user_login for valid creds' do expect(controller.send(:cached_user_login, valid_user.login, valid_user_password)) .to eq(controller.send(:user_login, valid_user.login, valid_user_password)) end it 'should return the same as user_login for invalid creds' do expect(controller.send(:cached_user_login, 'invalid', 'invalid')) .to eq(controller.send(:user_login, 'invalid', 'invalid')) end it 'should use cache' do allow(Rails.cache).to receive(:fetch).and_call_original expect(Rails.cache).to receive(:fetch).with(cache_key, expires_in: cache_expiry) \ .and_return(Marshal.dump(valid_user.id.to_s)) controller.send(:cached_user_login, valid_user.login, valid_user_password) end describe 'with caching disabled' do before do allow(Setting).to receive(:repository_authentication_caching_enabled?).and_return(false) end it 'should not use a cache' do allow(Rails.cache).to receive(:fetch).and_wrap_original do |m, *args, &block| expect(args.first).not_to eq(cache_key) m.call(*args, &block) end controller.send(:cached_user_login, valid_user.login, valid_user_password) end end describe 'update_required_storage' do let(:force) { nil } let(:apikey) { Setting.sys_api_key } let(:last_updated) { nil } def request_storage get 'update_required_storage', params: {key: apikey, id: id, force: force} end context 'missing project' do let(:id) { 1234 } it 'returns 404' do request_storage expect(response.code).to eq('404') expect(response.body).to include('Could not find project #1234') end end context 'available project, but missing repository' do let(:project) { FactoryBot.build_stubbed(:project) } let(:id) { project.id } before do allow(Project).to receive(:find).and_return(project) request_storage end it 'returns 404' do expect(response.code).to eq('404') expect(response.body).to include("Project ##{project.id} does not have a repository.") end end context 'stubbed repository' do let(:project) { FactoryBot.build_stubbed(:project) } let(:id) { project.id } let(:repository) { FactoryBot.build_stubbed(:repository_subversion, url: url, root_url: url) } before do allow(Project).to receive(:find).and_return(project) allow(project).to receive(:repository).and_return(repository) allow(repository).to receive(:storage_updated_at).and_return(last_updated) request_storage end context 'local non-existing repository' do let(:root_url) { '/tmp/does/not/exist/svn/foo.svn' } let(:url) { "file://#{root_url}" } it 'does not have storage available' do expect(repository.scm.storage_available?).to be false expect(response.code).to eq('400') end end context 'remote stubbed repository' do let(:root_url) { '' } let(:url) { 'https://foo.example.org/svn/bar' } it 'has no storage available' do request_storage expect(repository.scm.storage_available?).to be false expect(response.code).to eq('400') end end end context 'local existing repository' do with_subversion_repository do |repo_dir| let(:root_url) { repo_dir } let(:url) { "file://#{root_url}" } let(:project) { FactoryBot.create(:project) } let(:id) { project.id } let(:repository) { FactoryBot.create(:repository_subversion, project: project, url: url, root_url: url) } before do allow(Project).to receive(:find).and_return(project) allow(project).to receive(:repository).and_return(repository) allow(repository).to receive(:storage_updated_at).and_return(last_updated) end it 'has storage available' do expect(repository.scm.storage_available?).to be true end context 'storage never updated before' do it 'updates the storage' do expect(repository.required_storage_bytes).to be == 0 request_storage expect(response.code).to eq('200') expect(response.body).to include('Updated: true') perform_enqueued_jobs repository.reload expect(repository.required_storage_bytes).to be > 0 end end context 'outdated storage' do let(:last_updated) { 2.days.ago } it 'updates the storage' do expect(::SCM::StorageUpdaterJob).to receive(:perform_later) request_storage end end context 'valid storage time' do let(:last_updated) { 10.minutes.ago } it 'does not update to storage' do expect(::SCM::StorageUpdaterJob).not_to receive(:perform_later) request_storage end end context 'valid storage time and force' do let(:force) { '1' } let(:last_updated) { 10.minutes.ago } it 'does update to storage' do expect(::SCM::StorageUpdaterJob).to receive(:perform_later) request_storage end end end end end end end