debian-mirror-gitlab/spec/lib/gitlab/url_sanitizer_spec.rb

256 lines
8.8 KiB
Ruby
Raw Normal View History

2019-12-04 20:38:33 +05:30
# frozen_string_literal: true
2016-06-02 11:05:42 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe Gitlab::UrlSanitizer do
2018-03-17 18:26:18 +05:30
using RSpec::Parameterized::TableSyntax
2016-06-02 11:05:42 +05:30
describe '.sanitize' do
def sanitize_url(url)
# We want to try with multi-line content because is how error messages are formatted
described_class.sanitize(%Q{
remote: Not Found
2023-05-08 21:46:49 +05:30
fatal: repository `#{url}` not found
2016-06-02 11:05:42 +05:30
})
end
2018-03-17 18:26:18 +05:30
where(:input, :output) do
2023-05-08 21:46:49 +05:30
# http(s), ssh, git, relative, and schemeless URLs should all be masked correctly
urls = ['http://', 'https://', 'ssh://', 'git://', '//', ''].flat_map do |protocol|
[
["#{protocol}test.com", "#{protocol}test.com"],
["#{protocol}test.com/", "#{protocol}test.com/"],
["#{protocol}test.com/path/to/repo.git", "#{protocol}test.com/path/to/repo.git"],
["#{protocol}user@test.com", "#{protocol}*****@test.com"],
["#{protocol}user:pass@test.com", "#{protocol}*****:*****@test.com"],
["#{protocol}user:@test.com", "#{protocol}*****@test.com"],
["#{protocol}:pass@test.com", "#{protocol}:*****@test.com"]
]
end
2016-06-02 11:05:42 +05:30
2018-03-17 18:26:18 +05:30
# SCP-style URLs are left unmodified
2023-05-08 21:46:49 +05:30
urls << ['user@server:project.git', 'user@server:project.git']
urls << ['user:@server:project.git', 'user:@server:project.git']
urls << [':pass@server:project.git', ':pass@server:project.git']
urls << ['user:pass@server:project.git', 'user:pass@server:project.git']
2016-06-02 11:05:42 +05:30
2018-03-17 18:26:18 +05:30
# return an empty string for invalid URLs
2023-05-08 21:46:49 +05:30
urls << ['ssh://', '']
2016-06-02 11:05:42 +05:30
end
2018-03-17 18:26:18 +05:30
with_them do
2023-05-08 21:46:49 +05:30
it { expect(sanitize_url(input)).to include("repository `#{output}` not found") }
2016-06-02 11:05:42 +05:30
end
2018-03-17 18:26:18 +05:30
end
2016-06-02 11:05:42 +05:30
2018-03-17 18:26:18 +05:30
describe '.valid?' do
where(:value, :url) do
false | nil
false | ''
false | '123://invalid:url'
false | 'valid@project:url.git'
false | 'valid:pass@project:url.git'
2019-02-15 15:39:39 +05:30
false | %w(test array)
2018-03-17 18:26:18 +05:30
true | 'ssh://example.com'
true | 'ssh://:@example.com'
true | 'ssh://foo@example.com'
true | 'ssh://foo:bar@example.com'
true | 'ssh://foo:bar@example.com/group/group/project.git'
true | 'git://example.com/group/group/project.git'
true | 'git://foo:bar@example.com/group/group/project.git'
true | 'http://foo:bar@example.com/group/group/project.git'
true | 'https://foo:bar@example.com/group/group/project.git'
end
2016-06-02 11:05:42 +05:30
2018-03-17 18:26:18 +05:30
with_them do
it { expect(described_class.valid?(url)).to eq(value) }
2016-06-02 11:05:42 +05:30
end
2018-03-17 18:26:18 +05:30
end
2016-06-02 11:05:42 +05:30
2020-05-30 21:06:31 +05:30
describe '.valid_web?' do
where(:value, :url) do
false | nil
false | ''
false | '123://invalid:url'
false | 'valid@project:url.git'
false | 'valid:pass@project:url.git'
false | %w(test array)
false | 'ssh://example.com'
false | 'ssh://:@example.com'
false | 'ssh://foo@example.com'
false | 'ssh://foo:bar@example.com'
false | 'ssh://foo:bar@example.com/group/group/project.git'
false | 'git://example.com/group/group/project.git'
false | 'git://foo:bar@example.com/group/group/project.git'
true | 'http://foo:bar@example.com/group/group/project.git'
true | 'https://foo:bar@example.com/group/group/project.git'
end
with_them do
it { expect(described_class.valid_web?(url)).to eq(value) }
end
end
2018-03-17 18:26:18 +05:30
describe '#sanitized_url' do
context 'credentials in hash' do
where(username: ['foo', '', nil], password: ['bar', '', nil])
2016-06-02 11:05:42 +05:30
2018-03-17 18:26:18 +05:30
with_them do
let(:credentials) { { user: username, password: password } }
subject { described_class.new('http://example.com', credentials: credentials).sanitized_url }
it { is_expected.to eq('http://example.com') }
end
2016-06-02 11:05:42 +05:30
end
2016-08-24 12:49:21 +05:30
2018-03-17 18:26:18 +05:30
context 'credentials in URL' do
where(userinfo: %w[foo:bar@ foo@ :bar@ :@ @] + [nil])
2016-08-24 12:49:21 +05:30
2018-03-17 18:26:18 +05:30
with_them do
subject { described_class.new("http://#{userinfo}example.com").sanitized_url }
2016-06-02 11:05:42 +05:30
2018-03-17 18:26:18 +05:30
it { is_expected.to eq('http://example.com') }
end
2017-08-17 22:00:37 +05:30
end
end
2016-06-02 11:05:42 +05:30
describe '#credentials' do
2018-03-17 18:26:18 +05:30
context 'credentials in hash' do
it 'overrides URL-provided credentials' do
sanitizer = described_class.new('http://a:b@example.com', credentials: { user: 'c', password: 'd' })
expect(sanitizer.credentials).to eq(user: 'c', password: 'd')
end
end
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
context 'credentials in URL' do
where(:url, :credentials) do
'http://foo:bar@example.com' | { user: 'foo', password: 'bar' }
2018-11-18 11:00:15 +05:30
'http://foo:bar:baz@example.com' | { user: 'foo', password: 'bar:baz' }
2018-03-17 18:26:18 +05:30
'http://:bar@example.com' | { user: nil, password: 'bar' }
'http://foo:@example.com' | { user: 'foo', password: nil }
'http://foo@example.com' | { user: 'foo', password: nil }
'http://:@example.com' | { user: nil, password: nil }
'http://@example.com' | { user: nil, password: nil }
'http://example.com' | { user: nil, password: nil }
# Other invalid URLs
nil | { user: nil, password: nil }
'' | { user: nil, password: nil }
'no' | { user: nil, password: nil }
2017-08-17 22:00:37 +05:30
end
2018-03-17 18:26:18 +05:30
with_them do
subject { described_class.new(url).credentials }
it { is_expected.to eq(credentials) }
end
2017-08-17 22:00:37 +05:30
end
2022-06-21 17:19:12 +05:30
context 'with mixed credentials' do
where(:url, :credentials, :result) do
'http://a@example.com' | { password: 'd' } | { user: 'a', password: 'd' }
'http://a:b@example.com' | { password: 'd' } | { user: 'a', password: 'd' }
'http://:b@example.com' | { password: 'd' } | { user: nil, password: 'd' }
'http://a@example.com' | { user: 'c' } | { user: 'c', password: nil }
'http://a:b@example.com' | { user: 'c' } | { user: 'c', password: 'b' }
'http://a:b@example.com' | { user: '' } | { user: 'a', password: 'b' }
end
with_them do
subject { described_class.new(url, credentials: credentials).credentials }
it { is_expected.to eq(result) }
end
end
2016-06-02 11:05:42 +05:30
end
2019-07-31 22:56:46 +05:30
describe '#user' do
context 'credentials in hash' do
it 'overrides URL-provided user' do
sanitizer = described_class.new('http://a:b@example.com', credentials: { user: 'c', password: 'd' })
expect(sanitizer.user).to eq('c')
end
end
context 'credentials in URL' do
where(:url, :user) do
'http://foo:bar@example.com' | 'foo'
'http://foo:bar:baz@example.com' | 'foo'
'http://:bar@example.com' | nil
'http://foo:@example.com' | 'foo'
'http://foo@example.com' | 'foo'
'http://:@example.com' | nil
'http://@example.com' | nil
'http://example.com' | nil
# Other invalid URLs
nil | nil
'' | nil
'no' | nil
end
with_them do
subject { described_class.new(url).user }
it { is_expected.to eq(user) }
end
end
end
2016-06-02 11:05:42 +05:30
describe '#full_url' do
2018-03-17 18:26:18 +05:30
context 'credentials in hash' do
where(:credentials, :userinfo) do
{ user: 'foo', password: 'bar' } | 'foo:bar@'
{ user: 'foo', password: '' } | 'foo@'
{ user: 'foo', password: nil } | 'foo@'
{ user: '', password: 'bar' } | ':bar@'
{ user: '', password: '' } | nil
{ user: '', password: nil } | nil
{ user: nil, password: 'bar' } | ':bar@'
{ user: nil, password: '' } | nil
{ user: nil, password: nil } | nil
end
2016-06-02 11:05:42 +05:30
2018-03-17 18:26:18 +05:30
with_them do
subject { described_class.new('http://example.com', credentials: credentials).full_url }
2016-06-02 11:05:42 +05:30
2018-03-17 18:26:18 +05:30
it { is_expected.to eq("http://#{userinfo}example.com") }
end
2016-06-02 11:05:42 +05:30
end
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
context 'credentials in URL' do
where(:input, :output) do
nil | ''
'' | :same
'git@example.com' | :same
'http://example.com' | :same
'http://foo@example.com' | :same
'http://foo:@example.com' | 'http://foo@example.com'
'http://:bar@example.com' | :same
'http://foo:bar@example.com' | :same
2018-11-18 11:00:15 +05:30
'http://foo:g p@example.com' | 'http://foo:g%20p@example.com'
'http://foo:s/h@example.com' | 'http://foo:s%2Fh@example.com'
'http://t u:a#b@example.com' | 'http://t%20u:a%23b@example.com'
'http://t+u:a#b@example.com' | 'http://t%2Bu:a%23b@example.com'
2018-03-17 18:26:18 +05:30
end
with_them do
let(:expected) { output == :same ? input : output }
it { expect(described_class.new(input).full_url).to eq(expected) }
2017-08-17 22:00:37 +05:30
end
2018-03-17 18:26:18 +05:30
end
end
context 'when credentials contains special chars' do
2019-07-07 11:18:12 +05:30
it 'parses the URL without errors' do
2018-03-17 18:26:18 +05:30
url_sanitizer = described_class.new("https://foo:b?r@github.com/me/project.git")
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
expect(url_sanitizer.sanitized_url).to eq("https://github.com/me/project.git")
2018-11-18 11:00:15 +05:30
expect(url_sanitizer.full_url).to eq("https://foo:b%3Fr@github.com/me/project.git")
2017-08-17 22:00:37 +05:30
end
2016-06-02 11:05:42 +05:30
end
end