kanbanworkflowstimelinescrumrubyroadmapproject-planningproject-managementopenprojectangularissue-trackerifcgantt-chartganttbug-trackerboardsbcf
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
259 lines
11 KiB
259 lines
11 KiB
#-- copyright
|
|
# OpenProject is a project management system.
|
|
# Copyright (C) 2012-2014 the OpenProject Foundation (OPF)
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License version 3.
|
|
#
|
|
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
|
|
# Copyright (C) 2006-2013 Jean-Philippe Lang
|
|
# Copyright (C) 2010-2013 the ChiliProject Team
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
#
|
|
# See doc/COPYRIGHT.rdoc for more details.
|
|
#++
|
|
|
|
require 'spec_helper'
|
|
|
|
module OpenProjectRepositoryAuthenticationSpecs
|
|
describe SysController, :type => :controller do
|
|
let(:commit_role) { FactoryGirl.create(:role, :permissions => [:commit_access,
|
|
:browse_repository]) }
|
|
let(:browse_role) { FactoryGirl.create(:role, :permissions => [:browse_repository]) }
|
|
let(:guest_role) { FactoryGirl.create(:role, :permissions => []) }
|
|
let(:valid_user_password) { "Top Secret Password" }
|
|
let(:valid_user) { FactoryGirl.create(:user, :login => "johndoe",
|
|
:password => valid_user_password,
|
|
:password_confirmation => valid_user_password)}
|
|
|
|
before(:each) do
|
|
FactoryGirl.create(:non_member, :permissions => [:browse_repository])
|
|
DeletedUser.first # creating it first in order to avoid problems with should_receive
|
|
|
|
random_project = FactoryGirl.create(:project, :is_public => false)
|
|
@member = FactoryGirl.create(:member, :user => valid_user,
|
|
:roles => [browse_role],
|
|
:project => random_project)
|
|
allow(Setting).to receive(:sys_api_key).and_return("12345678")
|
|
allow(Setting).to receive(:sys_api_enabled?).and_return(true)
|
|
allow(Setting).to receive(:repository_authentication_caching_enabled?).and_return(true)
|
|
end
|
|
|
|
describe :repo_auth, "for valid login, but no access to repo_auth" do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
post "repo_auth", { :key => @key, :repository => "without-access", :method => "GET" }
|
|
end
|
|
|
|
it "should respond 403 not allowed" do
|
|
expect(response.code).to eq("403")
|
|
expect(response.body).to eq("Not allowed")
|
|
end
|
|
end
|
|
|
|
describe :repo_auth, "for valid login and user has browse repository permission (role reporter) for project" do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
@project = FactoryGirl.create(:project, :is_public => false)
|
|
@member = FactoryGirl.create(:member, :user => valid_user,
|
|
:roles => [browse_role],
|
|
:project => @project)
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
end
|
|
|
|
it "should respond 200 okay dokay for GET" do
|
|
post "repo_auth", { :key => @key, :repository => @project.identifier, :method => "GET" }
|
|
expect(response.code).to eq("200")
|
|
end
|
|
|
|
it "should respond 403 not allowed for POST" do
|
|
post "repo_auth", { :key => @key, :repository => @project.identifier, :method => "POST" }
|
|
expect(response.code).to eq("403")
|
|
end
|
|
end
|
|
|
|
describe :repo_auth, "for valid login and user has commit access permission (role developer) for project" do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
@project = FactoryGirl.create(:project, :is_public => false)
|
|
@member = FactoryGirl.create(:member, :user => valid_user,
|
|
:roles => [commit_role],
|
|
:project => @project )
|
|
valid_user.save
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
end
|
|
|
|
it "should respond 200 okay dokay for GET" do
|
|
post "repo_auth", { :key => @key, :repository => @project.identifier, :method => "GET" }
|
|
expect(response.code).to eq("200")
|
|
end
|
|
|
|
it "should respond 200 okay dokay for POST" do
|
|
post "repo_auth", { :key => @key, :repository => @project.identifier, :method => "POST" }
|
|
expect(response.code).to eq("200")
|
|
end
|
|
end
|
|
|
|
describe :repo_auth, "for invalid login and user has role manager for project" do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
@project = FactoryGirl.create(:project, :is_public => false )
|
|
@member = FactoryGirl.create(:member, :user => valid_user,
|
|
:roles => [commit_role],
|
|
:project => @project)
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password + "made invalid")
|
|
post "repo_auth", { :key => @key, :repository => @project.identifier, :method => "GET" }
|
|
end
|
|
|
|
it "should respond 401 auth required" do
|
|
expect(response.code).to eq("401")
|
|
end
|
|
end
|
|
|
|
describe :repo_auth, "for valid login and user is not member for project" do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
@project = FactoryGirl.create(:project, :is_public => false)
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
post "repo_auth", { :key => @key, :repository => @project.identifier, :method => "GET" }
|
|
end
|
|
|
|
it "should respond 403 not allowed" do
|
|
expect(response.code).to eq("403")
|
|
end
|
|
end
|
|
|
|
describe :repo_auth, "for valid login and project is public" do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
@project = FactoryGirl.create(:project, :is_public => true)
|
|
|
|
random_project = FactoryGirl.create(:project, :is_public => false)
|
|
@member = FactoryGirl.create(:member, :user => valid_user,
|
|
:roles => [browse_role],
|
|
:project => random_project)
|
|
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
post "repo_auth", { :key => @key, :repository => @project.identifier, :method => "GET" }
|
|
end
|
|
|
|
it "should respond 200 OK" do
|
|
expect(response.code).to eq("200")
|
|
end
|
|
end
|
|
|
|
describe :repo_auth, "for invalid credentials" do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
post "repo_auth", { :key => @key, :repository => "any-repo", :method => "GET" }
|
|
end
|
|
|
|
it "should respond 401 auth required" do
|
|
expect(response.code).to eq("401")
|
|
expect(response.body).to eq("Authorization required")
|
|
end
|
|
end
|
|
|
|
describe :repo_auth, "for invalid api key" do
|
|
before(:each) do
|
|
@key = "invalid"
|
|
end
|
|
|
|
it "should respond 403 for valid username/password" do
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
post "repo_auth", { :key => @key, :repository => "any-repo", :method => "GET" }
|
|
expect(response.code).to eq("403")
|
|
expect(response.body).to eq("Access denied. Repository management WS is disabled or key is invalid.")
|
|
end
|
|
|
|
it "should respond 403 for invalid username/password" do
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials("invalid", "invalid")
|
|
post "repo_auth", { :key => @key, :repository => "any-repo", :method => "GET" }
|
|
expect(response.code).to eq("403")
|
|
expect(response.body).to eq("Access denied. Repository management WS is disabled or key is invalid.")
|
|
end
|
|
end
|
|
|
|
before(:each) do
|
|
Rails.cache.clear
|
|
allow(Rails.cache).to receive(:kind_of?).with(anything).and_return(false)
|
|
end
|
|
|
|
describe :cached_user_login do
|
|
let(:cache_key) { OpenProject::RepositoryAuthentication::CACHE_PREFIX +
|
|
Digest::SHA1.hexdigest("#{valid_user.login}#{valid_user_password}") }
|
|
let(:cache_expiry) { OpenProject::RepositoryAuthentication::CACHE_EXPIRES_AFTER }
|
|
|
|
it "should call user_login only once when called twice" do
|
|
expect(controller).to receive(:user_login).once.and_return(valid_user)
|
|
2.times { controller.send(:cached_user_login, valid_user.login, valid_user_password) }
|
|
end
|
|
|
|
it "should return the same as user_login for valid creds" do
|
|
expect(controller.send(:cached_user_login, valid_user.login, valid_user_password)).to eq(
|
|
controller.send(:user_login, valid_user.login, valid_user_password)
|
|
)
|
|
end
|
|
|
|
it "should return the same as user_login for invalid creds" do
|
|
expect(controller.send(:cached_user_login, "invalid", "invalid")).to eq(
|
|
controller.send(:user_login, "invalid", "invalid")
|
|
)
|
|
end
|
|
|
|
it "should use cache" do
|
|
# allow the cache to return something reasonable for
|
|
# other requests, while ensuring that it is not queried
|
|
# with the cache key in question
|
|
|
|
# unfortunately, and_call_original currently fails
|
|
allow(Rails.cache).to receive(:fetch) do |*args|
|
|
expect(args.first).not_to eq(cache_key)
|
|
|
|
name = args.first.split("/").last
|
|
Marshal.dump(Setting.send(:find_or_default, name).value)
|
|
end
|
|
#Rails.cache.should_receive(:fetch).with(anything).and_call_original
|
|
expect(Rails.cache).to receive(:fetch).with(cache_key, :expires_in => cache_expiry) \
|
|
.and_return(Marshal.dump(valid_user.id.to_s))
|
|
controller.send(:cached_user_login, valid_user.login, valid_user_password)
|
|
end
|
|
|
|
describe "with caching disabled" do
|
|
before do
|
|
allow(Setting).to receive(:repository_authentication_caching_enabled?).and_return(false)
|
|
end
|
|
|
|
it 'should not use a cache' do
|
|
# allow the cache to return something reasonable for
|
|
# other requests, while ensuring that it is not queried
|
|
# with the cache key in question
|
|
#
|
|
# unfortunately, and_call_original currently fails
|
|
allow(Rails.cache).to receive(:fetch) do |*args|
|
|
expect(args.first).not_to eq(cache_key)
|
|
|
|
name = args.first.split("/").last
|
|
Marshal.dump(Setting.send(:find_or_default, name).value)
|
|
end
|
|
|
|
controller.send(:cached_user_login, valid_user.login, valid_user_password)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|