debian-mirror-gitlab/spec/lib/gitlab/auth/auth_finders_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

1076 lines
31 KiB
Ruby
Raw Permalink Normal View History

2019-10-12 21:52:04 +05:30
# frozen_string_literal: true
2018-03-17 18:26:18 +05:30
require 'spec_helper'
2023-05-27 22:25:52 +05:30
RSpec.describe Gitlab::Auth::AuthFinders, feature_category: :system_access do
2018-03-17 18:26:18 +05:30
include described_class
2020-06-23 00:09:42 +05:30
include HttpBasicAuthHelpers
2018-03-17 18:26:18 +05:30
2021-03-08 18:12:59 +05:30
# Create the feed_token and static_object_token for the user
2021-03-11 19:13:27 +05:30
let_it_be(:user, freeze: true) { create(:user).tap(&:feed_token).tap(&:static_object_token) }
let_it_be(:personal_access_token, freeze: true) { create(:personal_access_token, user: user) }
let_it_be(:project, freeze: true) { create(:project, :private) }
let_it_be(:pipeline, freeze: true) { create(:ci_pipeline, project: project) }
let_it_be(:job, freeze: true) { create(:ci_build, :running, pipeline: pipeline, user: user) }
let_it_be(:failed_job, freeze: true) { create(:ci_build, :failed, pipeline: pipeline, user: user) }
let_it_be(:project2, freeze: true) { create(:project, :private) }
let_it_be(:pipeline2, freeze: true) { create(:ci_pipeline, project: project2) }
let_it_be(:job2, freeze: true) { create(:ci_build, :running, pipeline: pipeline2, user: user) }
2018-03-17 18:26:18 +05:30
let(:env) do
{
'rack.input' => ''
}
end
2020-10-24 23:57:45 +05:30
2019-03-02 22:35:43 +05:30
let(:request) { ActionDispatch::Request.new(env) }
2021-03-11 19:13:27 +05:30
let(:params) { {} }
before_all do
project.add_developer(user)
project2.add_developer(user)
end
2018-03-17 18:26:18 +05:30
def set_param(key, value)
request.update_param(key, value)
end
2020-05-24 23:13:21 +05:30
def set_header(key, value)
env[key] = value
end
def set_basic_auth_header(username, password)
2020-06-23 00:09:42 +05:30
env.merge!(basic_auth_header(username, password))
2020-05-24 23:13:21 +05:30
end
2021-03-11 19:13:27 +05:30
def set_bearer_token(token)
env['HTTP_AUTHORIZATION'] = "Bearer #{token}"
end
shared_examples 'find user from job token' do |without_job_token_allowed|
2021-09-04 01:27:46 +05:30
context 'when route is allowed to be authenticated', :request_store do
2020-07-28 23:09:34 +05:30
let(:route_authentication_setting) { { job_token_allowed: true } }
2021-03-11 19:13:27 +05:30
context 'for an invalid token' do
let(:token) { 'invalid token' }
2020-07-28 23:09:34 +05:30
2021-03-11 19:13:27 +05:30
it "returns an Unauthorized exception" do
expect { subject }.to raise_error(Gitlab::Auth::UnauthorizedError)
expect(@current_authenticated_job).to be_nil
end
2020-07-28 23:09:34 +05:30
end
2020-09-03 11:15:55 +05:30
context 'with a running job' do
2021-03-11 19:13:27 +05:30
let(:token) { job.token }
2020-09-03 11:15:55 +05:30
2021-03-11 19:13:27 +05:30
it 'return user' do
2020-09-03 11:15:55 +05:30
expect(subject).to eq(user)
expect(@current_authenticated_job).to eq job
2021-09-04 01:27:46 +05:30
expect(subject).to be_from_ci_job_token
2023-03-04 22:38:38 +05:30
expect(subject.ci_job_token_scope.current_project).to eq(job.project)
2020-09-03 11:15:55 +05:30
end
end
2020-07-28 23:09:34 +05:30
2020-09-03 11:15:55 +05:30
context 'with a job that is not running' do
2021-03-11 19:13:27 +05:30
let(:token) { failed_job.token }
2020-09-03 11:15:55 +05:30
it 'returns an Unauthorized exception' do
expect { subject }.to raise_error(Gitlab::Auth::UnauthorizedError)
2021-03-11 19:13:27 +05:30
expect(@current_authenticated_job).to be_nil
end
end
end
2021-09-04 01:27:46 +05:30
context 'when route is not allowed to be authenticated', :request_store do
2021-03-11 19:13:27 +05:30
let(:route_authentication_setting) { { job_token_allowed: false } }
context 'with a running job' do
let(:token) { job.token }
2023-01-13 00:05:48 +05:30
case without_job_token_allowed
when :error
2021-03-11 19:13:27 +05:30
it 'returns an Unauthorized exception' do
expect { subject }.to raise_error(Gitlab::Auth::UnauthorizedError)
expect(@current_authenticated_job).to be_nil
end
2023-01-13 00:05:48 +05:30
when :user
2021-03-11 19:13:27 +05:30
it 'returns the user' do
expect(subject).to eq(user)
expect(@current_authenticated_job).to eq job
2021-09-04 01:27:46 +05:30
expect(subject).to be_from_ci_job_token
2023-03-04 22:38:38 +05:30
expect(subject.ci_job_token_scope.current_project).to eq(job.project)
2021-03-11 19:13:27 +05:30
end
else
it 'returns nil' do
is_expected.to be_nil
expect(@current_authenticated_job).to be_nil
end
2020-09-03 11:15:55 +05:30
end
2020-07-28 23:09:34 +05:30
end
end
end
describe '#find_user_from_bearer_token' do
subject { find_user_from_bearer_token }
context 'when the token is passed as an oauth token' do
2021-03-11 19:13:27 +05:30
before do
set_bearer_token(token)
2020-07-28 23:09:34 +05:30
end
2021-03-11 19:13:27 +05:30
it_behaves_like 'find user from job token', :error
end
2020-07-28 23:09:34 +05:30
2021-03-11 19:13:27 +05:30
context 'with oauth token' do
let(:application) { Doorkeeper::Application.create!(name: 'MyApp', redirect_uri: 'https://app.com', owner: user) }
let(:doorkeeper_access_token) { Doorkeeper::AccessToken.create!(application_id: application.id, resource_owner_id: user.id, scopes: 'api') }
2020-07-28 23:09:34 +05:30
2021-03-11 19:13:27 +05:30
before do
2022-08-27 11:52:29 +05:30
set_bearer_token(doorkeeper_access_token.plaintext_token)
2020-07-28 23:09:34 +05:30
end
2021-03-11 19:13:27 +05:30
it { is_expected.to eq user }
2020-07-28 23:09:34 +05:30
end
context 'with a personal access token' do
before do
2021-03-11 19:13:27 +05:30
env[described_class::PRIVATE_TOKEN_HEADER] = personal_access_token.token
2020-07-28 23:09:34 +05:30
end
it { is_expected.to eq user }
end
end
2018-03-17 18:26:18 +05:30
describe '#find_user_from_warden' do
context 'with CSRF token' do
before do
allow(Gitlab::RequestForgeryProtection).to receive(:verified?).and_return(true)
end
context 'with invalid credentials' do
it 'returns nil' do
expect(find_user_from_warden).to be_nil
end
end
context 'with valid credentials' do
it 'returns the user' do
2020-05-24 23:13:21 +05:30
set_header('warden', double("warden", authenticate: user))
2018-03-17 18:26:18 +05:30
expect(find_user_from_warden).to eq user
end
end
end
context 'without CSRF token' do
it 'returns nil' do
allow(Gitlab::RequestForgeryProtection).to receive(:verified?).and_return(false)
2020-05-24 23:13:21 +05:30
set_header('warden', double("warden", authenticate: user))
2018-03-17 18:26:18 +05:30
expect(find_user_from_warden).to be_nil
end
end
end
2018-11-08 19:23:39 +05:30
describe '#find_user_from_feed_token' do
2018-03-17 18:26:18 +05:30
context 'when the request format is atom' do
before do
2020-05-24 23:13:21 +05:30
set_header('SCRIPT_NAME', 'url.atom')
set_header('HTTP_ACCEPT', 'application/atom+xml')
2018-03-17 18:26:18 +05:30
end
2018-11-08 19:23:39 +05:30
context 'when feed_token param is provided' do
it 'returns user if valid feed_token' do
set_param(:feed_token, user.feed_token)
2018-03-17 18:26:18 +05:30
2018-11-29 20:51:05 +05:30
expect(find_user_from_feed_token(:rss)).to eq user
2018-11-08 19:23:39 +05:30
end
2021-02-22 17:27:13 +05:30
it 'returns nil if valid feed_token and disabled' do
2023-03-04 22:38:38 +05:30
allow(Gitlab::CurrentSettings).to receive_messages(disable_feed_token: true)
2021-02-22 17:27:13 +05:30
set_param(:feed_token, user.feed_token)
expect(find_user_from_feed_token(:rss)).to be_nil
end
2018-11-08 19:23:39 +05:30
it 'returns nil if feed_token is blank' do
2018-11-29 20:51:05 +05:30
expect(find_user_from_feed_token(:rss)).to be_nil
2018-11-08 19:23:39 +05:30
end
it 'returns exception if invalid feed_token' do
set_param(:feed_token, 'invalid_token')
2018-03-17 18:26:18 +05:30
2018-11-29 20:51:05 +05:30
expect { find_user_from_feed_token(:rss) }.to raise_error(Gitlab::Auth::UnauthorizedError)
2018-11-08 19:23:39 +05:30
end
2018-03-17 18:26:18 +05:30
end
2018-11-08 19:23:39 +05:30
context 'when rss_token param is provided' do
2021-03-08 18:12:59 +05:30
it 'returns user if valid rss_token' do
2018-11-08 19:23:39 +05:30
set_param(:rss_token, user.feed_token)
2018-03-17 18:26:18 +05:30
2018-11-29 20:51:05 +05:30
expect(find_user_from_feed_token(:rss)).to eq user
2018-11-08 19:23:39 +05:30
end
it 'returns nil if rss_token is blank' do
2018-11-29 20:51:05 +05:30
expect(find_user_from_feed_token(:rss)).to be_nil
2018-11-08 19:23:39 +05:30
end
it 'returns exception if invalid rss_token' do
set_param(:rss_token, 'invalid_token')
2018-11-29 20:51:05 +05:30
expect { find_user_from_feed_token(:rss) }.to raise_error(Gitlab::Auth::UnauthorizedError)
2018-11-08 19:23:39 +05:30
end
2018-03-17 18:26:18 +05:30
end
end
context 'when the request format is not atom' do
it 'returns nil' do
2020-05-24 23:13:21 +05:30
set_header('SCRIPT_NAME', 'json')
2018-11-29 20:51:05 +05:30
2018-11-08 19:23:39 +05:30
set_param(:feed_token, user.feed_token)
2018-03-17 18:26:18 +05:30
2018-11-29 20:51:05 +05:30
expect(find_user_from_feed_token(:rss)).to be_nil
2018-03-17 18:26:18 +05:30
end
end
context 'when the request format is empty' do
it 'the method call does not modify the original value' do
2020-05-24 23:13:21 +05:30
set_header('SCRIPT_NAME', 'url.atom')
2018-11-29 20:51:05 +05:30
2018-11-08 19:23:39 +05:30
env.delete('action_dispatch.request.formats')
2018-03-17 18:26:18 +05:30
2018-11-29 20:51:05 +05:30
find_user_from_feed_token(:rss)
2018-03-17 18:26:18 +05:30
expect(env['action_dispatch.request.formats']).to be_nil
end
end
end
2019-12-04 20:38:33 +05:30
describe '#find_user_from_static_object_token' do
2020-01-01 13:55:28 +05:30
shared_examples 'static object request' do
2019-12-04 20:38:33 +05:30
before do
2020-05-24 23:13:21 +05:30
set_header('SCRIPT_NAME', path)
2019-12-04 20:38:33 +05:30
end
context 'when token header param is present' do
context 'when token is correct' do
it 'returns the user' do
request.headers['X-Gitlab-Static-Object-Token'] = user.static_object_token
2020-01-01 13:55:28 +05:30
expect(find_user_from_static_object_token(format)).to eq(user)
2019-12-04 20:38:33 +05:30
end
end
context 'when token is incorrect' do
it 'returns the user' do
request.headers['X-Gitlab-Static-Object-Token'] = 'foobar'
2020-01-01 13:55:28 +05:30
expect { find_user_from_static_object_token(format) }.to raise_error(Gitlab::Auth::UnauthorizedError)
2019-12-04 20:38:33 +05:30
end
end
end
context 'when token query param is present' do
context 'when token is correct' do
it 'returns the user' do
set_param(:token, user.static_object_token)
2020-01-01 13:55:28 +05:30
expect(find_user_from_static_object_token(format)).to eq(user)
2019-12-04 20:38:33 +05:30
end
end
context 'when token is incorrect' do
it 'returns the user' do
set_param(:token, 'foobar')
2020-01-01 13:55:28 +05:30
expect { find_user_from_static_object_token(format) }.to raise_error(Gitlab::Auth::UnauthorizedError)
2019-12-04 20:38:33 +05:30
end
end
end
end
2020-01-01 13:55:28 +05:30
context 'when request format is archive' do
it_behaves_like 'static object request' do
let_it_be(:path) { 'project/-/archive/master.zip' }
let_it_be(:format) { :archive }
end
end
context 'when request format is blob' do
it_behaves_like 'static object request' do
let_it_be(:path) { 'project/raw/master/README.md' }
let_it_be(:format) { :blob }
end
end
context 'when request format is not archive nor blob' do
2019-12-04 20:38:33 +05:30
before do
2020-05-24 23:13:21 +05:30
set_header('script_name', 'url')
2019-12-04 20:38:33 +05:30
end
it 'returns nil' do
expect(find_user_from_static_object_token(:foo)).to be_nil
end
end
end
2020-05-24 23:13:21 +05:30
describe '#deploy_token_from_request' do
2021-03-11 19:13:27 +05:30
let_it_be(:deploy_token, freeze: true) { create(:deploy_token) }
2020-05-24 23:13:21 +05:30
let_it_be(:route_authentication_setting) { { deploy_token_allowed: true } }
subject { deploy_token_from_request }
it { is_expected.to be_nil }
shared_examples 'an unauthenticated route' do
context 'when route is not allowed to use deploy_tokens' do
let(:route_authentication_setting) { { deploy_token_allowed: false } }
it { is_expected.to be_nil }
end
end
context 'with deploy token headers' do
2021-03-11 19:13:27 +05:30
context 'with valid deploy token' do
before do
set_header(described_class::DEPLOY_TOKEN_HEADER, deploy_token.token)
end
2020-05-24 23:13:21 +05:30
2021-03-11 19:13:27 +05:30
it { is_expected.to eq deploy_token }
end
2020-05-24 23:13:21 +05:30
it_behaves_like 'an unauthenticated route'
context 'with incorrect token' do
before do
set_header(described_class::DEPLOY_TOKEN_HEADER, 'invalid_token')
end
it { is_expected.to be_nil }
end
end
context 'with oauth headers' do
2021-03-11 19:13:27 +05:30
context 'with valid token' do
before do
set_bearer_token(deploy_token.token)
end
2020-05-24 23:13:21 +05:30
2021-03-11 19:13:27 +05:30
it { is_expected.to eq deploy_token }
2020-05-24 23:13:21 +05:30
2021-03-11 19:13:27 +05:30
it_behaves_like 'an unauthenticated route'
end
2020-05-24 23:13:21 +05:30
context 'with invalid token' do
before do
2021-03-11 19:13:27 +05:30
set_bearer_token('invalid_token')
2020-05-24 23:13:21 +05:30
end
it { is_expected.to be_nil }
end
end
context 'with basic auth headers' do
before do
set_basic_auth_header(deploy_token.username, deploy_token.token)
end
it { is_expected.to eq deploy_token }
it_behaves_like 'an unauthenticated route'
context 'with incorrect token' do
before do
set_basic_auth_header(deploy_token.username, 'invalid')
end
it { is_expected.to be_nil }
end
end
2023-01-10 11:22:00 +05:30
2023-04-23 21:23:45 +05:30
context 'when the the deploy token is restricted with external_authorization' do
2023-01-10 11:22:00 +05:30
before do
2023-04-23 21:23:45 +05:30
allow(Gitlab::ExternalAuthorization).to receive(:allow_deploy_tokens_and_deploy_keys?).and_return(false)
2023-01-10 11:22:00 +05:30
set_header(described_class::DEPLOY_TOKEN_HEADER, deploy_token.token)
end
it { is_expected.to be_nil }
end
2020-05-24 23:13:21 +05:30
end
2018-03-17 18:26:18 +05:30
describe '#find_user_from_access_token' do
2018-11-29 20:51:05 +05:30
before do
2020-05-24 23:13:21 +05:30
set_header('SCRIPT_NAME', 'url.atom')
2018-11-29 20:51:05 +05:30
end
2018-03-17 18:26:18 +05:30
it 'returns nil if no access_token present' do
2018-11-29 20:51:05 +05:30
expect(find_user_from_access_token).to be_nil
2018-03-17 18:26:18 +05:30
end
2023-07-09 08:55:56 +05:30
context 'when run for kubernetes internal API endpoint' do
before do
set_bearer_token('AgentToken')
set_header('SCRIPT_NAME', '/api/v4/internal/kubernetes/modules/starboard_vulnerability/policies_configuration')
end
it 'returns nil' do
expect(find_user_from_access_token).to be_nil
end
end
2018-03-17 18:26:18 +05:30
context 'when validate_access_token! returns valid' do
it 'returns user' do
2020-05-24 23:13:21 +05:30
set_header(described_class::PRIVATE_TOKEN_HEADER, personal_access_token.token)
2018-03-17 18:26:18 +05:30
expect(find_user_from_access_token).to eq user
end
it 'returns exception if token has no user' do
2020-05-24 23:13:21 +05:30
set_header(described_class::PRIVATE_TOKEN_HEADER, personal_access_token.token)
2018-03-17 18:26:18 +05:30
allow_any_instance_of(PersonalAccessToken).to receive(:user).and_return(nil)
expect { find_user_from_access_token }.to raise_error(Gitlab::Auth::UnauthorizedError)
end
end
2019-10-12 21:52:04 +05:30
context 'with OAuth headers' do
2021-03-11 19:13:27 +05:30
context 'with valid personal access token' do
before do
set_bearer_token(personal_access_token.token)
end
2019-10-12 21:52:04 +05:30
2021-03-11 19:13:27 +05:30
it 'returns user' do
expect(find_user_from_access_token).to eq user
end
2019-10-12 21:52:04 +05:30
end
2021-03-11 19:13:27 +05:30
context 'with invalid personal_access_token' do
before do
set_bearer_token('invalid_20byte_token')
end
2019-10-12 21:52:04 +05:30
2021-03-11 19:13:27 +05:30
it 'returns exception' do
expect { find_personal_access_token }.to raise_error(Gitlab::Auth::UnauthorizedError)
end
2019-10-12 21:52:04 +05:30
end
2021-02-22 17:27:13 +05:30
context 'when using a non-prefixed access token' do
2021-03-11 19:13:27 +05:30
let_it_be(:personal_access_token, freeze: true) { create(:personal_access_token, :no_prefix, user: user) }
2021-02-22 17:27:13 +05:30
2021-03-11 19:13:27 +05:30
before do
set_bearer_token(personal_access_token.token)
end
2021-02-22 17:27:13 +05:30
2021-03-11 19:13:27 +05:30
it 'returns user' do
2021-02-22 17:27:13 +05:30
expect(find_user_from_access_token).to eq user
end
end
2019-10-12 21:52:04 +05:30
end
2018-03-17 18:26:18 +05:30
end
2018-11-29 20:51:05 +05:30
describe '#find_user_from_web_access_token' do
before do
2020-05-24 23:13:21 +05:30
set_header(described_class::PRIVATE_TOKEN_HEADER, personal_access_token.token)
2018-11-29 20:51:05 +05:30
end
it 'returns exception if token has no user' do
allow_any_instance_of(PersonalAccessToken).to receive(:user).and_return(nil)
expect { find_user_from_access_token }.to raise_error(Gitlab::Auth::UnauthorizedError)
end
2023-04-23 21:23:45 +05:30
context 'no feed, API, archive or download requests' do
2018-11-29 20:51:05 +05:30
it 'returns nil if the request is not RSS' do
expect(find_user_from_web_access_token(:rss)).to be_nil
end
it 'returns nil if the request is not ICS' do
expect(find_user_from_web_access_token(:ics)).to be_nil
end
it 'returns nil if the request is not API' do
expect(find_user_from_web_access_token(:api)).to be_nil
end
2021-09-30 23:02:18 +05:30
it 'returns nil if the request is not ARCHIVE' do
expect(find_user_from_web_access_token(:archive)).to be_nil
end
2023-04-23 21:23:45 +05:30
it 'returns nil if the request is not DOWNLOAD' do
expect(find_user_from_web_access_token(:download)).to be_nil
end
2018-11-29 20:51:05 +05:30
end
it 'returns the user for RSS requests' do
2020-05-24 23:13:21 +05:30
set_header('SCRIPT_NAME', 'url.atom')
2018-11-29 20:51:05 +05:30
expect(find_user_from_web_access_token(:rss)).to eq(user)
end
it 'returns the user for ICS requests' do
2020-05-24 23:13:21 +05:30
set_header('SCRIPT_NAME', 'url.ics')
2018-11-29 20:51:05 +05:30
expect(find_user_from_web_access_token(:ics)).to eq(user)
end
2021-09-30 23:02:18 +05:30
it 'returns the user for ARCHIVE requests' do
set_header('SCRIPT_NAME', '/-/archive/main.zip')
expect(find_user_from_web_access_token(:archive)).to eq(user)
end
2023-04-23 21:23:45 +05:30
it 'returns the user for DOWNLOAD requests' do
set_header('SCRIPT_NAME', '/-/1.0.0/downloads/main.zip')
expect(find_user_from_web_access_token(:download)).to eq(user)
end
2021-01-03 14:25:43 +05:30
context 'for API requests' do
it 'returns the user' do
set_header('SCRIPT_NAME', '/api/endpoint')
2018-11-29 20:51:05 +05:30
2021-01-03 14:25:43 +05:30
expect(find_user_from_web_access_token(:api)).to eq(user)
end
it 'returns nil if URL does not start with /api/' do
set_header('SCRIPT_NAME', '/relative_root/api/endpoint')
expect(find_user_from_web_access_token(:api)).to be_nil
end
2021-03-08 18:12:59 +05:30
context 'when the token has read_api scope' do
2021-03-11 19:13:27 +05:30
let_it_be(:personal_access_token, freeze: true) { create(:personal_access_token, user: user, scopes: ['read_api']) }
2021-03-08 18:12:59 +05:30
2021-03-11 19:13:27 +05:30
before do
2021-03-08 18:12:59 +05:30
set_header('SCRIPT_NAME', '/api/endpoint')
end
it 'raises InsufficientScopeError by default' do
expect { find_user_from_web_access_token(:api) }.to raise_error(Gitlab::Auth::InsufficientScopeError)
end
it 'finds the user when the read_api scope is passed' do
expect(find_user_from_web_access_token(:api, scopes: [:api, :read_api])).to eq(user)
end
end
2021-01-03 14:25:43 +05:30
context 'when relative_url_root is set' do
before do
stub_config_setting(relative_url_root: '/relative_root')
end
it 'returns the user' do
set_header('SCRIPT_NAME', '/relative_root/api/endpoint')
expect(find_user_from_web_access_token(:api)).to eq(user)
end
end
2018-11-29 20:51:05 +05:30
end
end
2018-03-17 18:26:18 +05:30
describe '#find_personal_access_token' do
2018-11-29 20:51:05 +05:30
before do
2020-05-24 23:13:21 +05:30
set_header('SCRIPT_NAME', 'url.atom')
2018-11-29 20:51:05 +05:30
end
2018-03-17 18:26:18 +05:30
context 'passed as header' do
it 'returns token if valid personal_access_token' do
2020-05-24 23:13:21 +05:30
set_header(described_class::PRIVATE_TOKEN_HEADER, personal_access_token.token)
2018-03-17 18:26:18 +05:30
expect(find_personal_access_token).to eq personal_access_token
end
end
context 'passed as param' do
it 'returns token if valid personal_access_token' do
2020-01-01 13:55:28 +05:30
set_param(described_class::PRIVATE_TOKEN_PARAM, personal_access_token.token)
2018-03-17 18:26:18 +05:30
expect(find_personal_access_token).to eq personal_access_token
end
end
it 'returns nil if no personal_access_token' do
expect(find_personal_access_token).to be_nil
end
it 'returns exception if invalid personal_access_token' do
2020-05-24 23:13:21 +05:30
set_header(described_class::PRIVATE_TOKEN_HEADER, 'invalid_token')
2018-03-17 18:26:18 +05:30
expect { find_personal_access_token }.to raise_error(Gitlab::Auth::UnauthorizedError)
end
end
describe '#find_oauth_access_token' do
let(:application) { Doorkeeper::Application.create!(name: 'MyApp', redirect_uri: 'https://app.com', owner: user) }
2021-03-11 19:13:27 +05:30
let(:doorkeeper_access_token) { Doorkeeper::AccessToken.create!(application_id: application.id, resource_owner_id: user.id, scopes: 'api') }
2018-03-17 18:26:18 +05:30
context 'passed as header' do
2021-03-11 19:13:27 +05:30
before do
2022-08-27 11:52:29 +05:30
set_bearer_token(doorkeeper_access_token.plaintext_token)
2021-03-11 19:13:27 +05:30
end
2018-03-17 18:26:18 +05:30
2021-03-11 19:13:27 +05:30
it 'returns token if valid oauth_access_token' do
expect(find_oauth_access_token.token).to eq doorkeeper_access_token.token
2018-03-17 18:26:18 +05:30
end
end
context 'passed as param' do
it 'returns user if valid oauth_access_token' do
2022-08-27 11:52:29 +05:30
set_param(:access_token, doorkeeper_access_token.plaintext_token)
2018-03-17 18:26:18 +05:30
2021-03-11 19:13:27 +05:30
expect(find_oauth_access_token.token).to eq doorkeeper_access_token.token
2018-03-17 18:26:18 +05:30
end
end
it 'returns nil if no oauth_access_token' do
expect(find_oauth_access_token).to be_nil
end
2021-03-11 19:13:27 +05:30
context 'with invalid token' do
before do
set_bearer_token('invalid_token')
end
2018-03-17 18:26:18 +05:30
2021-03-11 19:13:27 +05:30
it 'returns exception if invalid oauth_access_token' do
expect { find_oauth_access_token }.to raise_error(Gitlab::Auth::UnauthorizedError)
end
2018-03-17 18:26:18 +05:30
end
end
2020-04-22 19:07:51 +05:30
describe '#find_personal_access_token_from_http_basic_auth' do
def auth_header_with(token)
2020-05-24 23:13:21 +05:30
set_basic_auth_header('username', token)
2020-04-22 19:07:51 +05:30
end
context 'access token is valid' do
let(:route_authentication_setting) { { basic_auth_personal_access_token: true } }
it 'finds the token from basic auth' do
auth_header_with(personal_access_token.token)
expect(find_personal_access_token_from_http_basic_auth).to eq personal_access_token
end
end
context 'access token is not valid' do
let(:route_authentication_setting) { { basic_auth_personal_access_token: true } }
it 'returns nil' do
auth_header_with('failing_token')
expect(find_personal_access_token_from_http_basic_auth).to be_nil
end
end
context 'route_setting is not set' do
it 'returns nil' do
auth_header_with(personal_access_token.token)
expect(find_personal_access_token_from_http_basic_auth).to be_nil
end
end
context 'route_setting is not correct' do
let(:route_authentication_setting) { { basic_auth_personal_access_token: false } }
it 'returns nil' do
auth_header_with(personal_access_token.token)
expect(find_personal_access_token_from_http_basic_auth).to be_nil
end
end
end
2020-01-01 13:55:28 +05:30
describe '#find_user_from_basic_auth_job' do
subject { find_user_from_basic_auth_job }
context 'when the request does not have AUTHORIZATION header' do
it { is_expected.to be_nil }
end
context 'with wrong credentials' do
it 'returns nil without user and password' do
2020-05-24 23:13:21 +05:30
set_basic_auth_header(nil, nil)
2020-01-01 13:55:28 +05:30
is_expected.to be_nil
end
it 'returns nil without password' do
2020-05-24 23:13:21 +05:30
set_basic_auth_header('some-user', nil)
2020-01-01 13:55:28 +05:30
is_expected.to be_nil
end
it 'returns nil without user' do
2020-05-24 23:13:21 +05:30
set_basic_auth_header(nil, 'password')
2020-01-01 13:55:28 +05:30
is_expected.to be_nil
end
it 'returns nil without CI username' do
2020-05-24 23:13:21 +05:30
set_basic_auth_header('user', 'password')
2020-01-01 13:55:28 +05:30
is_expected.to be_nil
end
end
context 'with CI username' do
2020-10-24 23:57:45 +05:30
let(:username) { ::Gitlab::Auth::CI_JOB_USER }
2021-03-08 18:12:59 +05:30
2021-03-11 19:13:27 +05:30
before do
set_basic_auth_header(username, token)
2020-01-01 13:55:28 +05:30
end
2020-09-03 11:15:55 +05:30
2021-03-11 19:13:27 +05:30
it_behaves_like 'find user from job token', :user
2020-01-01 13:55:28 +05:30
end
end
2021-09-30 23:02:18 +05:30
describe '#find_user_from_basic_auth_password' do
subject { find_user_from_basic_auth_password }
context 'when the request does not have AUTHORIZATION header' do
it { is_expected.to be_nil }
end
it 'returns nil without user and password' do
set_basic_auth_header(nil, nil)
is_expected.to be_nil
end
it 'returns nil without password' do
set_basic_auth_header('some-user', nil)
is_expected.to be_nil
end
it 'returns nil without user' do
set_basic_auth_header(nil, 'password')
is_expected.to be_nil
end
it 'returns nil with CI username' do
set_basic_auth_header(::Gitlab::Auth::CI_JOB_USER, 'password')
is_expected.to be_nil
end
it 'returns nil with wrong password' do
set_basic_auth_header(user.username, 'wrong-password')
is_expected.to be_nil
end
it 'returns user with correct credentials' do
set_basic_auth_header(user.username, user.password)
is_expected.to eq(user)
end
end
describe '#find_user_from_lfs_token' do
subject { find_user_from_lfs_token }
context 'when the request does not have AUTHORIZATION header' do
it { is_expected.to be_nil }
end
it 'returns nil without user and token' do
set_basic_auth_header(nil, nil)
is_expected.to be_nil
end
it 'returns nil without token' do
set_basic_auth_header('some-user', nil)
is_expected.to be_nil
end
it 'returns nil without user' do
set_basic_auth_header(nil, 'token')
is_expected.to be_nil
end
it 'returns nil with wrong token' do
set_basic_auth_header(user.username, 'wrong-token')
is_expected.to be_nil
end
it 'returns user with correct user and correct token' do
lfs_token = Gitlab::LfsToken.new(user).token
set_basic_auth_header(user.username, lfs_token)
is_expected.to eq(user)
end
it 'returns nil with wrong user and correct token' do
lfs_token = Gitlab::LfsToken.new(user).token
other_user = create(:user)
set_basic_auth_header(other_user.username, lfs_token)
is_expected.to be_nil
end
end
describe '#find_user_from_personal_access_token' do
subject { find_user_from_personal_access_token }
it 'returns nil without access token' do
allow_any_instance_of(described_class).to receive(:access_token).and_return(nil)
is_expected.to be_nil
end
it 'returns user with correct access token' do
personal_access_token = create(:personal_access_token, user: user)
allow_any_instance_of(described_class).to receive(:access_token).and_return(personal_access_token)
is_expected.to eq(user)
end
it 'returns exception if access token has no user' do
personal_access_token = create(:personal_access_token, user: user)
allow_any_instance_of(described_class).to receive(:access_token).and_return(personal_access_token)
allow_any_instance_of(PersonalAccessToken).to receive(:user).and_return(nil)
expect { subject }.to raise_error(Gitlab::Auth::UnauthorizedError)
end
end
2018-03-17 18:26:18 +05:30
describe '#validate_access_token!' do
2020-07-28 23:09:34 +05:30
subject { validate_access_token! }
context 'with a job token' do
let(:route_authentication_setting) { { job_token_allowed: true } }
before do
env['HTTP_AUTHORIZATION'] = "Bearer #{job.token}"
find_user_from_bearer_token
end
it 'does not raise an error' do
expect { subject }.not_to raise_error
end
end
2018-03-17 18:26:18 +05:30
it 'returns nil if no access_token present' do
expect(validate_access_token!).to be_nil
end
context 'token is not valid' do
2021-03-11 19:13:27 +05:30
let_it_be_with_reload(:personal_access_token) { create(:personal_access_token, user: user) }
2018-03-17 18:26:18 +05:30
before do
allow_any_instance_of(described_class).to receive(:access_token).and_return(personal_access_token)
end
it 'returns Gitlab::Auth::ExpiredError if token expired' do
2021-03-08 18:12:59 +05:30
personal_access_token.update!(expires_at: 1.day.ago)
2018-03-17 18:26:18 +05:30
expect { validate_access_token! }.to raise_error(Gitlab::Auth::ExpiredError)
end
it 'returns Gitlab::Auth::RevokedError if token revoked' do
personal_access_token.revoke!
expect { validate_access_token! }.to raise_error(Gitlab::Auth::RevokedError)
end
it 'returns Gitlab::Auth::InsufficientScopeError if invalid token scope' do
expect { validate_access_token!(scopes: [:sudo]) }.to raise_error(Gitlab::Auth::InsufficientScopeError)
end
end
2019-02-15 15:39:39 +05:30
context 'with impersonation token' do
2021-03-11 19:13:27 +05:30
let_it_be(:personal_access_token, freeze: true) { create(:personal_access_token, :impersonation, user: user) }
2019-02-15 15:39:39 +05:30
context 'when impersonation is disabled' do
before do
stub_config_setting(impersonation_enabled: false)
allow_any_instance_of(described_class).to receive(:access_token).and_return(personal_access_token)
end
it 'returns Gitlab::Auth::ImpersonationDisabled' do
expect { validate_access_token! }.to raise_error(Gitlab::Auth::ImpersonationDisabled)
end
end
end
2018-03-17 18:26:18 +05:30
end
2020-01-01 13:55:28 +05:30
2020-03-13 15:44:24 +05:30
describe '#find_user_from_job_token' do
2021-12-11 22:18:48 +05:30
let(:token) { job.token }
2020-03-13 15:44:24 +05:30
subject { find_user_from_job_token }
2021-12-11 22:18:48 +05:30
shared_examples 'finds user when job token allowed' do
context 'when the token is in the headers' do
before do
set_header(described_class::JOB_TOKEN_HEADER, token)
end
it_behaves_like 'find user from job token'
2020-03-13 15:44:24 +05:30
end
2021-12-11 22:18:48 +05:30
context 'when the token is in the job_token param' do
before do
set_param(described_class::JOB_TOKEN_PARAM, token)
end
2020-09-03 11:15:55 +05:30
2021-12-11 22:18:48 +05:30
it_behaves_like 'find user from job token'
2020-09-03 11:15:55 +05:30
end
2021-12-11 22:18:48 +05:30
context 'when the token is in the token param' do
before do
set_param(described_class::RUNNER_JOB_TOKEN_PARAM, token)
end
2020-03-13 15:44:24 +05:30
2021-12-11 22:18:48 +05:30
it_behaves_like 'find user from job token'
2020-03-13 15:44:24 +05:30
end
2021-12-11 22:18:48 +05:30
end
2020-03-13 15:44:24 +05:30
2021-12-11 22:18:48 +05:30
context 'when route setting allows job_token' do
let(:route_authentication_setting) { { job_token_allowed: true } }
include_examples 'finds user when job token allowed'
2020-03-13 15:44:24 +05:30
end
2020-06-23 00:09:42 +05:30
2021-12-11 22:18:48 +05:30
context 'when route setting is basic auth' do
2020-06-23 00:09:42 +05:30
let(:route_authentication_setting) { { job_token_allowed: :basic_auth } }
2021-12-11 22:18:48 +05:30
context 'when the token is provided via basic auth' do
let(:username) { ::Gitlab::Auth::CI_JOB_USER }
before do
set_basic_auth_header(username, token)
end
it { is_expected.to eq(user) }
2020-06-23 00:09:42 +05:30
end
2021-12-11 22:18:48 +05:30
include_examples 'finds user when job token allowed'
end
2020-06-23 00:09:42 +05:30
2021-12-11 22:18:48 +05:30
context 'when route setting job_token_allowed is invalid' do
let(:route_authentication_setting) { { job_token_allowed: false } }
context 'when the token is provided' do
before do
set_header(described_class::JOB_TOKEN_HEADER, token)
end
2020-06-23 00:09:42 +05:30
it { is_expected.to be_nil }
end
end
2020-03-13 15:44:24 +05:30
end
2020-10-24 23:57:45 +05:30
describe '#cluster_agent_token_from_authorization_token' do
2022-03-02 08:16:31 +05:30
let_it_be(:agent_token) { create(:cluster_agent_token) }
subject { cluster_agent_token_from_authorization_token }
2020-10-24 23:57:45 +05:30
context 'when route_setting is empty' do
2022-03-02 08:16:31 +05:30
it { is_expected.to be_nil }
2020-10-24 23:57:45 +05:30
end
context 'when route_setting allows cluster agent token' do
let(:route_authentication_setting) { { cluster_agent_token_allowed: true } }
context 'Authorization header is empty' do
2022-03-02 08:16:31 +05:30
it { is_expected.to be_nil }
2020-10-24 23:57:45 +05:30
end
context 'Authorization header is incorrect' do
before do
request.headers['Authorization'] = 'Bearer ABCD'
end
2022-03-02 08:16:31 +05:30
it { is_expected.to be_nil }
2020-10-24 23:57:45 +05:30
end
context 'Authorization header is malformed' do
before do
request.headers['Authorization'] = 'Bearer'
end
2022-03-02 08:16:31 +05:30
it { is_expected.to be_nil }
2020-10-24 23:57:45 +05:30
end
context 'Authorization header matches agent token' do
before do
request.headers['Authorization'] = "Bearer #{agent_token.token}"
end
2022-03-02 08:16:31 +05:30
it { is_expected.to eq(agent_token) }
context 'agent token has been revoked' do
before do
agent_token.revoked!
end
it { is_expected.to be_nil }
2020-10-24 23:57:45 +05:30
end
end
end
end
2020-01-01 13:55:28 +05:30
describe '#find_runner_from_token' do
2021-03-11 19:13:27 +05:30
let_it_be(:runner, freeze: true) { create(:ci_runner) }
2020-01-01 13:55:28 +05:30
context 'with API requests' do
before do
2020-05-24 23:13:21 +05:30
set_header('SCRIPT_NAME', '/api/endpoint')
2020-01-01 13:55:28 +05:30
end
it 'returns the runner if token is valid' do
set_param(:token, runner.token)
expect(find_runner_from_token).to eq(runner)
end
it 'returns nil if token is not present' do
expect(find_runner_from_token).to be_nil
end
it 'returns nil if token is blank' do
set_param(:token, '')
expect(find_runner_from_token).to be_nil
end
it 'returns exception if invalid token' do
set_param(:token, 'invalid_token')
expect { find_runner_from_token }.to raise_error(Gitlab::Auth::UnauthorizedError)
end
end
context 'without API requests' do
before do
2020-05-24 23:13:21 +05:30
set_header('SCRIPT_NAME', 'url.ics')
2020-01-01 13:55:28 +05:30
end
it 'returns nil if token is valid' do
set_param(:token, runner.token)
expect(find_runner_from_token).to be_nil
end
it 'returns nil if token is blank' do
expect(find_runner_from_token).to be_nil
end
it 'returns nil if invalid token' do
set_param(:token, 'invalid_token')
expect(find_runner_from_token).to be_nil
end
end
end
2018-03-17 18:26:18 +05:30
end