kanbanworkflowstimelinescrumrubyroadmapproject-planningproject-managementopenprojectangularissue-trackerifcgantt-chartganttbug-trackerboardsbcf
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
265 lines
11 KiB
265 lines
11 KiB
#-- copyright
|
|
# OpenProject is a project management system.
|
|
# Copyright (C) 2012-2015 the OpenProject Foundation (OPF)
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License version 3.
|
|
#
|
|
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
|
|
# Copyright (C) 2006-2013 Jean-Philippe Lang
|
|
# Copyright (C) 2010-2013 the ChiliProject Team
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
#
|
|
# See doc/COPYRIGHT.rdoc for more details.
|
|
#++
|
|
|
|
require 'spec_helper'
|
|
|
|
module OpenProjectRepositoryAuthenticationSpecs
|
|
describe SysController, type: :controller do
|
|
let(:commit_role) {
|
|
FactoryGirl.create(:role, permissions: [:commit_access,
|
|
:browse_repository])
|
|
}
|
|
let(:browse_role) { FactoryGirl.create(:role, permissions: [:browse_repository]) }
|
|
let(:guest_role) { FactoryGirl.create(:role, permissions: []) }
|
|
let(:valid_user_password) { 'Top Secret Password' }
|
|
let(:valid_user) {
|
|
FactoryGirl.create(:user, login: 'johndoe',
|
|
password: valid_user_password,
|
|
password_confirmation: valid_user_password)
|
|
}
|
|
|
|
before(:each) do
|
|
FactoryGirl.create(:non_member, permissions: [:browse_repository])
|
|
DeletedUser.first # creating it first in order to avoid problems with should_receive
|
|
|
|
random_project = FactoryGirl.create(:project, is_public: false)
|
|
@member = FactoryGirl.create(:member, user: valid_user,
|
|
roles: [browse_role],
|
|
project: random_project)
|
|
allow(Setting).to receive(:sys_api_key).and_return('12345678')
|
|
allow(Setting).to receive(:sys_api_enabled?).and_return(true)
|
|
allow(Setting).to receive(:repository_authentication_caching_enabled?).and_return(true)
|
|
end
|
|
|
|
describe '#repo_auth', 'for valid login, but no access to repo_auth' do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
post 'repo_auth', key: @key, repository: 'without-access', method: 'GET'
|
|
end
|
|
|
|
it 'should respond 403 not allowed' do
|
|
expect(response.code).to eq('403')
|
|
expect(response.body).to eq('Not allowed')
|
|
end
|
|
end
|
|
|
|
describe '#repo_auth', 'for valid login and user has browse repository permission (role reporter) for project' do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
@project = FactoryGirl.create(:project, is_public: false)
|
|
@member = FactoryGirl.create(:member, user: valid_user,
|
|
roles: [browse_role],
|
|
project: @project)
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
end
|
|
|
|
it 'should respond 200 okay dokay for GET' do
|
|
post 'repo_auth', key: @key, repository: @project.identifier, method: 'GET'
|
|
expect(response.code).to eq('200')
|
|
end
|
|
|
|
it 'should respond 403 not allowed for POST' do
|
|
post 'repo_auth', key: @key, repository: @project.identifier, method: 'POST'
|
|
expect(response.code).to eq('403')
|
|
end
|
|
end
|
|
|
|
describe '#repo_auth', 'for valid login and user has commit access permission (role developer) for project' do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
@project = FactoryGirl.create(:project, is_public: false)
|
|
@member = FactoryGirl.create(:member, user: valid_user,
|
|
roles: [commit_role],
|
|
project: @project)
|
|
valid_user.save
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
end
|
|
|
|
it 'should respond 200 okay dokay for GET' do
|
|
post 'repo_auth', key: @key, repository: @project.identifier, method: 'GET'
|
|
expect(response.code).to eq('200')
|
|
end
|
|
|
|
it 'should respond 200 okay dokay for POST' do
|
|
post 'repo_auth', key: @key, repository: @project.identifier, method: 'POST'
|
|
expect(response.code).to eq('200')
|
|
end
|
|
end
|
|
|
|
describe '#repo_auth', 'for invalid login and user has role manager for project' do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
@project = FactoryGirl.create(:project, is_public: false)
|
|
@member = FactoryGirl.create(:member, user: valid_user,
|
|
roles: [commit_role],
|
|
project: @project)
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password + 'made invalid')
|
|
post 'repo_auth', key: @key, repository: @project.identifier, method: 'GET'
|
|
end
|
|
|
|
it 'should respond 401 auth required' do
|
|
expect(response.code).to eq('401')
|
|
end
|
|
end
|
|
|
|
describe '#repo_auth', 'for valid login and user is not member for project' do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
@project = FactoryGirl.create(:project, is_public: false)
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
post 'repo_auth', key: @key, repository: @project.identifier, method: 'GET'
|
|
end
|
|
|
|
it 'should respond 403 not allowed' do
|
|
expect(response.code).to eq('403')
|
|
end
|
|
end
|
|
|
|
describe '#repo_auth', 'for valid login and project is public' do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
@project = FactoryGirl.create(:project, is_public: true)
|
|
|
|
random_project = FactoryGirl.create(:project, is_public: false)
|
|
@member = FactoryGirl.create(:member, user: valid_user,
|
|
roles: [browse_role],
|
|
project: random_project)
|
|
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
post 'repo_auth', key: @key, repository: @project.identifier, method: 'GET'
|
|
end
|
|
|
|
it 'should respond 200 OK' do
|
|
expect(response.code).to eq('200')
|
|
end
|
|
end
|
|
|
|
describe '#repo_auth', 'for invalid credentials' do
|
|
before(:each) do
|
|
@key = Setting.sys_api_key
|
|
post 'repo_auth', key: @key, repository: 'any-repo', method: 'GET'
|
|
end
|
|
|
|
it 'should respond 401 auth required' do
|
|
expect(response.code).to eq('401')
|
|
expect(response.body).to eq('Authorization required')
|
|
end
|
|
end
|
|
|
|
describe '#repo_auth', 'for invalid api key' do
|
|
before(:each) do
|
|
@key = 'invalid'
|
|
end
|
|
|
|
it 'should respond 403 for valid username/password' do
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials(valid_user.login, valid_user_password)
|
|
post 'repo_auth', key: @key, repository: 'any-repo', method: 'GET'
|
|
expect(response.code).to eq('403')
|
|
expect(response.body).to eq('Access denied. Repository management WS is disabled or key is invalid.')
|
|
end
|
|
|
|
it 'should respond 403 for invalid username/password' do
|
|
request.env['HTTP_AUTHORIZATION'] = ActionController::HttpAuthentication::Basic.encode_credentials('invalid', 'invalid')
|
|
post 'repo_auth', key: @key, repository: 'any-repo', method: 'GET'
|
|
expect(response.code).to eq('403')
|
|
expect(response.body).to eq('Access denied. Repository management WS is disabled or key is invalid.')
|
|
end
|
|
end
|
|
|
|
before(:each) do
|
|
Rails.cache.clear
|
|
allow(Rails.cache).to receive(:kind_of?).with(anything).and_return(false)
|
|
end
|
|
|
|
describe '#cached_user_login' do
|
|
let(:cache_key) {
|
|
OpenProject::RepositoryAuthentication::CACHE_PREFIX +
|
|
Digest::SHA1.hexdigest("#{valid_user.login}#{valid_user_password}")
|
|
}
|
|
let(:cache_expiry) { OpenProject::RepositoryAuthentication::CACHE_EXPIRES_AFTER }
|
|
|
|
it 'should call user_login only once when called twice' do
|
|
expect(controller).to receive(:user_login).once.and_return(valid_user)
|
|
2.times { controller.send(:cached_user_login, valid_user.login, valid_user_password) }
|
|
end
|
|
|
|
it 'should return the same as user_login for valid creds' do
|
|
expect(controller.send(:cached_user_login, valid_user.login, valid_user_password)).to eq(
|
|
controller.send(:user_login, valid_user.login, valid_user_password)
|
|
)
|
|
end
|
|
|
|
it 'should return the same as user_login for invalid creds' do
|
|
expect(controller.send(:cached_user_login, 'invalid', 'invalid')).to eq(
|
|
controller.send(:user_login, 'invalid', 'invalid')
|
|
)
|
|
end
|
|
|
|
it 'should use cache' do
|
|
# allow the cache to return something reasonable for
|
|
# other requests, while ensuring that it is not queried
|
|
# with the cache key in question
|
|
|
|
# unfortunately, and_call_original currently fails
|
|
allow(Rails.cache).to receive(:fetch) do |*args|
|
|
expect(args.first).not_to eq(cache_key)
|
|
|
|
name = args.first.split('/').last
|
|
Marshal.dump(Setting.send(:find_or_default, name).value)
|
|
end
|
|
# Rails.cache.should_receive(:fetch).with(anything).and_call_original
|
|
expect(Rails.cache).to receive(:fetch).with(cache_key, expires_in: cache_expiry) \
|
|
.and_return(Marshal.dump(valid_user.id.to_s))
|
|
controller.send(:cached_user_login, valid_user.login, valid_user_password)
|
|
end
|
|
|
|
describe 'with caching disabled' do
|
|
before do
|
|
allow(Setting).to receive(:repository_authentication_caching_enabled?).and_return(false)
|
|
end
|
|
|
|
it 'should not use a cache' do
|
|
# allow the cache to return something reasonable for
|
|
# other requests, while ensuring that it is not queried
|
|
# with the cache key in question
|
|
#
|
|
# unfortunately, and_call_original currently fails
|
|
allow(Rails.cache).to receive(:fetch) do |*args|
|
|
expect(args.first).not_to eq(cache_key)
|
|
|
|
name = args.first.split('/').last
|
|
Marshal.dump(Setting.send(:find_or_default, name).value)
|
|
end
|
|
|
|
controller.send(:cached_user_login, valid_user.login, valid_user_password)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|