debian-mirror-gitlab/spec/lib/gitlab/git_access_spec.rb

424 lines
14 KiB
Ruby
Raw Normal View History

2015-04-26 12:48:37 +05:30
require 'spec_helper'
2015-12-23 02:04:40 +05:30
describe Gitlab::GitAccess, lib: true do
2016-09-29 09:46:39 +05:30
let(:access) { Gitlab::GitAccess.new(actor, project, 'web', authentication_abilities: authentication_abilities) }
2015-04-26 12:48:37 +05:30
let(:project) { create(:project) }
let(:user) { create(:user) }
let(:actor) { user }
2016-09-29 09:46:39 +05:30
let(:authentication_abilities) do
[
:read_project,
:download_code,
:push_code
]
end
2015-04-26 12:48:37 +05:30
2016-08-24 12:49:21 +05:30
describe '#check with single protocols allowed' do
def disable_protocol(protocol)
settings = ::ApplicationSetting.create_from_defaults
settings.update_attribute(:enabled_git_access_protocol, protocol)
2015-04-26 12:48:37 +05:30
end
2016-08-24 12:49:21 +05:30
context 'ssh disabled' do
2015-04-26 12:48:37 +05:30
before do
2016-08-24 12:49:21 +05:30
disable_protocol('ssh')
2016-09-29 09:46:39 +05:30
@acc = Gitlab::GitAccess.new(actor, project, 'ssh', authentication_abilities: authentication_abilities)
2015-04-26 12:48:37 +05:30
end
2016-08-24 12:49:21 +05:30
it 'blocks ssh git push' do
2016-09-13 17:45:13 +05:30
expect(@acc.check('git-receive-pack', '_any').allowed?).to be_falsey
2015-04-26 12:48:37 +05:30
end
2016-08-24 12:49:21 +05:30
it 'blocks ssh git pull' do
2016-09-13 17:45:13 +05:30
expect(@acc.check('git-upload-pack', '_any').allowed?).to be_falsey
2015-04-26 12:48:37 +05:30
end
end
2016-08-24 12:49:21 +05:30
context 'http disabled' do
2015-04-26 12:48:37 +05:30
before do
2016-08-24 12:49:21 +05:30
disable_protocol('http')
2016-09-29 09:46:39 +05:30
@acc = Gitlab::GitAccess.new(actor, project, 'http', authentication_abilities: authentication_abilities)
2015-04-26 12:48:37 +05:30
end
2016-08-24 12:49:21 +05:30
it 'blocks http push' do
2016-09-13 17:45:13 +05:30
expect(@acc.check('git-receive-pack', '_any').allowed?).to be_falsey
2015-04-26 12:48:37 +05:30
end
2016-08-24 12:49:21 +05:30
it 'blocks http git pull' do
2016-09-13 17:45:13 +05:30
expect(@acc.check('git-upload-pack', '_any').allowed?).to be_falsey
2015-04-26 12:48:37 +05:30
end
end
end
describe 'download_access_check' do
2016-09-13 17:45:13 +05:30
subject { access.check('git-upload-pack', '_any') }
2016-08-24 12:49:21 +05:30
2015-04-26 12:48:37 +05:30
describe 'master permissions' do
before { project.team << [user, :master] }
context 'pull code' do
it { expect(subject.allowed?).to be_truthy }
end
end
describe 'guest permissions' do
before { project.team << [user, :guest] }
context 'pull code' do
it { expect(subject.allowed?).to be_falsey }
2016-11-24 13:41:30 +05:30
it { expect(subject.message).to match(/You are not allowed to download code/) }
2015-04-26 12:48:37 +05:30
end
end
describe 'blocked user' do
before do
project.team << [user, :master]
user.block
end
context 'pull code' do
it { expect(subject.allowed?).to be_falsey }
2016-11-24 13:41:30 +05:30
it { expect(subject.message).to match(/Your account has been blocked/) }
2015-04-26 12:48:37 +05:30
end
end
describe 'without acccess to project' do
context 'pull code' do
it { expect(subject.allowed?).to be_falsey }
end
2016-11-24 13:41:30 +05:30
context 'when project is public' do
let(:public_project) { create(:project, :public) }
let(:guest_access) { Gitlab::GitAccess.new(nil, public_project, 'web', authentication_abilities: []) }
subject { guest_access.check('git-upload-pack', '_any') }
context 'when repository is enabled' do
it 'give access to download code' do
public_project.project_feature.update_attribute(:repository_access_level, ProjectFeature::ENABLED)
expect(subject.allowed?).to be_truthy
end
end
context 'when repository is disabled' do
it 'does not give access to download code' do
public_project.project_feature.update_attribute(:repository_access_level, ProjectFeature::DISABLED)
expect(subject.allowed?).to be_falsey
expect(subject.message).to match(/You are not allowed to download code/)
end
end
end
2015-04-26 12:48:37 +05:30
end
describe 'deploy key permissions' do
let(:key) { create(:deploy_key) }
let(:actor) { key }
context 'pull code' do
2016-08-24 12:49:21 +05:30
context 'when project is authorized' do
before { key.projects << project }
2015-04-26 12:48:37 +05:30
2016-08-24 12:49:21 +05:30
it { expect(subject).to be_allowed }
end
context 'when unauthorized' do
context 'from public project' do
let(:project) { create(:project, :public) }
it { expect(subject).to be_allowed }
end
context 'from internal project' do
let(:project) { create(:project, :internal) }
it { expect(subject).not_to be_allowed }
end
context 'from private project' do
let(:project) { create(:project, :internal) }
it { expect(subject).not_to be_allowed }
end
end
2015-04-26 12:48:37 +05:30
end
end
2016-09-29 09:46:39 +05:30
describe 'build authentication_abilities permissions' do
let(:authentication_abilities) { build_authentication_abilities }
2016-11-24 13:41:30 +05:30
describe 'owner' do
let(:project) { create(:project, namespace: user.namespace) }
context 'pull code' do
it { expect(subject).to be_allowed }
end
end
2016-09-29 09:46:39 +05:30
describe 'reporter user' do
before { project.team << [user, :reporter] }
context 'pull code' do
it { expect(subject).to be_allowed }
end
end
describe 'admin user' do
let(:user) { create(:admin) }
context 'when member of the project' do
before { project.team << [user, :reporter] }
context 'pull code' do
it { expect(subject).to be_allowed }
end
end
context 'when is not member of the project' do
context 'pull code' do
it { expect(subject).not_to be_allowed }
end
end
end
end
2015-04-26 12:48:37 +05:30
end
describe 'push_access_check' do
2016-08-24 12:49:21 +05:30
before { merge_into_protected_branch }
let(:unprotected_branch) { FFaker::Internet.user_name }
2015-04-26 12:48:37 +05:30
2016-08-24 12:49:21 +05:30
let(:changes) do
{ push_new_branch: "#{Gitlab::Git::BLANK_SHA} 570e7b2ab refs/heads/wow",
2015-04-26 12:48:37 +05:30
push_master: '6f6d7e7ed 570e7b2ab refs/heads/master',
push_protected_branch: '6f6d7e7ed 570e7b2ab refs/heads/feature',
push_remove_protected_branch: "570e7b2ab #{Gitlab::Git::BLANK_SHA} "\
'refs/heads/feature',
push_tag: '6f6d7e7ed 570e7b2ab refs/tags/v1.0.0',
push_new_tag: "#{Gitlab::Git::BLANK_SHA} 570e7b2ab refs/tags/v7.8.9",
2016-08-24 12:49:21 +05:30
push_all: ['6f6d7e7ed 570e7b2ab refs/heads/master', '6f6d7e7ed 570e7b2ab refs/heads/feature'],
merge_into_protected_branch: "0b4bc9a #{merge_into_protected_branch} refs/heads/feature" }
2015-04-26 12:48:37 +05:30
end
2016-08-24 12:49:21 +05:30
def stub_git_hooks
# Running the `pre-receive` hook is expensive, and not necessary for this test.
allow_any_instance_of(GitHooksService).to receive(:execute).and_yield
2015-04-26 12:48:37 +05:30
end
2016-08-24 12:49:21 +05:30
def merge_into_protected_branch
@protected_branch_merge_commit ||= begin
stub_git_hooks
project.repository.add_branch(user, unprotected_branch, 'feature')
target_branch = project.repository.lookup('feature')
source_branch = project.repository.commit_file(user, FFaker::InternetSE.login_user_name, FFaker::HipsterIpsum.paragraph, FFaker::HipsterIpsum.sentence, unprotected_branch, false)
rugged = project.repository.rugged
author = { email: "email@example.com", time: Time.now, name: "Example Git User" }
merge_index = rugged.merge_commits(target_branch, source_branch)
Rugged::Commit.create(rugged, author: author, committer: author, message: "commit message", parents: [target_branch, source_branch], tree: merge_index.write_tree(rugged))
end
2015-04-26 12:48:37 +05:30
end
2016-11-03 12:29:30 +05:30
# Run permission checks for a user
2016-08-24 12:49:21 +05:30
def self.run_permission_checks(permissions_matrix)
permissions_matrix.keys.each do |role|
describe "#{role} access" do
2016-09-13 17:45:13 +05:30
before do
if role == :admin
user.update_attribute(:admin, true)
else
project.team << [user, role]
end
2015-04-26 12:48:37 +05:30
2016-11-03 12:29:30 +05:30
permissions_matrix[role].each do |action, allowed|
context action do
subject { access.push_access_check(changes[action]) }
it { expect(subject.allowed?).to allowed ? be_truthy : be_falsey }
end
2016-08-24 12:49:21 +05:30
end
2015-04-26 12:48:37 +05:30
end
end
end
end
2016-08-24 12:49:21 +05:30
permissions_matrix = {
2016-09-13 17:45:13 +05:30
admin: {
push_new_branch: true,
push_master: true,
push_protected_branch: true,
push_remove_protected_branch: false,
push_tag: true,
push_new_tag: true,
push_all: true,
merge_into_protected_branch: true
},
2016-08-24 12:49:21 +05:30
master: {
push_new_branch: true,
push_master: true,
push_protected_branch: true,
push_remove_protected_branch: false,
push_tag: true,
push_new_tag: true,
push_all: true,
merge_into_protected_branch: true
},
developer: {
push_new_branch: true,
push_master: true,
push_protected_branch: false,
push_remove_protected_branch: false,
push_tag: false,
push_new_tag: true,
push_all: false,
merge_into_protected_branch: false
},
reporter: {
push_new_branch: false,
push_master: false,
push_protected_branch: false,
push_remove_protected_branch: false,
push_tag: false,
push_new_tag: false,
push_all: false,
merge_into_protected_branch: false
},
guest: {
push_new_branch: false,
push_master: false,
push_protected_branch: false,
push_remove_protected_branch: false,
push_tag: false,
push_new_tag: false,
push_all: false,
merge_into_protected_branch: false
}
}
2015-04-26 12:48:37 +05:30
2016-08-24 12:49:21 +05:30
[['feature', 'exact'], ['feat*', 'wildcard']].each do |protected_branch_name, protected_branch_type|
context do
before { create(:protected_branch, name: protected_branch_name, project: project) }
2015-04-26 12:48:37 +05:30
2016-08-24 12:49:21 +05:30
run_permission_checks(permissions_matrix)
end
2016-09-13 17:45:13 +05:30
context "when developers are allowed to push into the #{protected_branch_type} protected branch" do
before { create(:protected_branch, :developers_can_push, name: protected_branch_name, project: project) }
2016-08-24 12:49:21 +05:30
run_permission_checks(permissions_matrix.deep_merge(developer: { push_protected_branch: true, push_all: true, merge_into_protected_branch: true }))
end
2016-09-13 17:45:13 +05:30
context "developers are allowed to merge into the #{protected_branch_type} protected branch" do
before { create(:protected_branch, :developers_can_merge, name: protected_branch_name, project: project) }
2016-08-24 12:49:21 +05:30
context "when a merge request exists for the given source/target branch" do
context "when the merge request is in progress" do
before do
2016-09-13 17:45:13 +05:30
create(:merge_request, source_project: project, source_branch: unprotected_branch, target_branch: 'feature',
state: 'locked', in_progress_merge_commit_sha: merge_into_protected_branch)
2015-04-26 12:48:37 +05:30
end
2016-08-24 12:49:21 +05:30
run_permission_checks(permissions_matrix.deep_merge(developer: { merge_into_protected_branch: true }))
end
context "when the merge request is not in progress" do
before do
create(:merge_request, source_project: project, source_branch: unprotected_branch, target_branch: 'feature', in_progress_merge_commit_sha: nil)
end
run_permission_checks(permissions_matrix.deep_merge(developer: { merge_into_protected_branch: false }))
end
2016-09-13 17:45:13 +05:30
context "when a merge request does not exist for the given source/target branch" do
run_permission_checks(permissions_matrix.deep_merge(developer: { merge_into_protected_branch: false }))
end
2016-08-24 12:49:21 +05:30
end
end
2016-09-13 17:45:13 +05:30
context "when developers are allowed to push and merge into the #{protected_branch_type} protected branch" do
before { create(:protected_branch, :developers_can_merge, :developers_can_push, name: protected_branch_name, project: project) }
2016-08-24 12:49:21 +05:30
run_permission_checks(permissions_matrix.deep_merge(developer: { push_protected_branch: true, push_all: true, merge_into_protected_branch: true }))
end
2016-09-13 17:45:13 +05:30
context "when no one is allowed to push to the #{protected_branch_name} protected branch" do
before { create(:protected_branch, :no_one_can_push, name: protected_branch_name, project: project) }
run_permission_checks(permissions_matrix.deep_merge(developer: { push_protected_branch: false, push_all: false, merge_into_protected_branch: false },
master: { push_protected_branch: false, push_all: false, merge_into_protected_branch: false },
admin: { push_protected_branch: false, push_all: false, merge_into_protected_branch: false }))
end
2016-08-24 12:49:21 +05:30
end
2016-09-13 17:45:13 +05:30
end
2016-08-24 12:49:21 +05:30
2016-09-29 09:46:39 +05:30
shared_examples 'can not push code' do
subject { access.check('git-receive-pack', '_any') }
context 'when project is authorized' do
before { authorize }
2016-08-24 12:49:21 +05:30
2016-09-29 09:46:39 +05:30
it { expect(subject).not_to be_allowed }
end
2016-08-24 12:49:21 +05:30
2016-09-29 09:46:39 +05:30
context 'when unauthorized' do
context 'to public project' do
let(:project) { create(:project, :public) }
2016-08-24 12:49:21 +05:30
2016-09-13 17:45:13 +05:30
it { expect(subject).not_to be_allowed }
end
2016-08-24 12:49:21 +05:30
2016-09-29 09:46:39 +05:30
context 'to internal project' do
let(:project) { create(:project, :internal) }
2016-08-24 12:49:21 +05:30
2016-09-29 09:46:39 +05:30
it { expect(subject).not_to be_allowed }
end
2016-08-24 12:49:21 +05:30
2016-09-29 09:46:39 +05:30
context 'to private project' do
let(:project) { create(:project) }
2016-08-24 12:49:21 +05:30
2016-09-29 09:46:39 +05:30
it { expect(subject).not_to be_allowed }
end
end
end
2016-08-24 12:49:21 +05:30
2016-09-29 09:46:39 +05:30
describe 'build authentication abilities' do
let(:authentication_abilities) { build_authentication_abilities }
2016-08-24 12:49:21 +05:30
2016-09-29 09:46:39 +05:30
it_behaves_like 'can not push code' do
def authorize
project.team << [user, :reporter]
2015-04-26 12:48:37 +05:30
end
end
end
2016-09-29 09:46:39 +05:30
describe 'deploy key permissions' do
let(:key) { create(:deploy_key) }
let(:actor) { key }
it_behaves_like 'can not push code' do
def authorize
key.projects << project
end
end
end
private
def build_authentication_abilities
[
:read_project,
:build_download_code
]
end
def full_authentication_abilities
[
:read_project,
:download_code,
:push_code
]
end
2015-04-26 12:48:37 +05:30
end