debian-mirror-gitlab/spec/lib/gitlab/auth_spec.rb

725 lines
27 KiB
Ruby
Raw Normal View History

2019-10-12 21:52:04 +05:30
# frozen_string_literal: true
2015-04-26 12:48:37 +05:30
require 'spec_helper'
2020-01-01 13:55:28 +05:30
describe Gitlab::Auth, :use_clean_rails_memory_store_caching do
2020-04-08 14:13:33 +05:30
let_it_be(:project) { create(:project) }
let(:gl_auth) { described_class }
2020-01-01 13:55:28 +05:30
2017-08-17 22:00:37 +05:30
describe 'constants' do
it 'API_SCOPES contains all scopes for API access' do
2020-04-22 19:07:51 +05:30
expect(subject::API_SCOPES).to eq %i[api read_user read_api]
2019-07-31 22:56:46 +05:30
end
it 'ADMIN_SCOPES contains all scopes for ADMIN access' do
expect(subject::ADMIN_SCOPES).to eq %i[sudo]
end
it 'REPOSITORY_SCOPES contains all scopes for REPOSITORY access' do
expect(subject::REPOSITORY_SCOPES).to eq %i[read_repository write_repository]
2017-08-17 22:00:37 +05:30
end
it 'OPENID_SCOPES contains all scopes for OpenID Connect' do
expect(subject::OPENID_SCOPES).to eq [:openid]
end
it 'DEFAULT_SCOPES contains all default scopes' do
expect(subject::DEFAULT_SCOPES).to eq [:api]
end
2018-03-17 18:26:18 +05:30
it 'optional_scopes contains all non-default scopes' do
stub_container_registry_config(enabled: true)
2020-04-22 19:07:51 +05:30
expect(subject.optional_scopes).to eq %i[read_user read_api read_repository write_repository read_registry write_registry sudo openid profile email]
2019-07-31 22:56:46 +05:30
end
end
context 'available_scopes' do
it 'contains all non-default scopes' do
stub_container_registry_config(enabled: true)
2020-04-22 19:07:51 +05:30
expect(subject.all_available_scopes).to eq %i[api read_user read_api read_repository write_repository read_registry write_registry sudo]
2019-07-31 22:56:46 +05:30
end
it 'contains for non-admin user all non-default scopes without ADMIN access' do
stub_container_registry_config(enabled: true)
user = create(:user, admin: false)
2020-04-22 19:07:51 +05:30
expect(subject.available_scopes_for(user)).to eq %i[api read_user read_api read_repository write_repository read_registry write_registry]
2019-07-31 22:56:46 +05:30
end
it 'contains for admin user all non-default scopes with ADMIN access' do
stub_container_registry_config(enabled: true)
user = create(:user, admin: true)
2020-04-22 19:07:51 +05:30
expect(subject.available_scopes_for(user)).to eq %i[api read_user read_api read_repository write_repository read_registry write_registry sudo]
2017-09-10 17:25:29 +05:30
end
2018-03-17 18:26:18 +05:30
context 'registry_scopes' do
context 'when registry is disabled' do
before do
stub_container_registry_config(enabled: false)
end
it 'is empty' do
expect(subject.registry_scopes).to eq []
end
end
context 'when registry is enabled' do
before do
stub_container_registry_config(enabled: true)
end
it 'contains all registry related scopes' do
2020-04-22 19:07:51 +05:30
expect(subject.registry_scopes).to eq %i[read_registry write_registry]
2018-03-17 18:26:18 +05:30
end
end
2017-08-17 22:00:37 +05:30
end
end
describe 'find_for_git_client' do
2020-01-01 13:55:28 +05:30
describe 'rate limiting' do
before do
stub_rack_attack_setting(enabled: true, ip_whitelist: [])
end
context 'when IP is already banned' do
subject { gl_auth.find_for_git_client('username', 'password', project: nil, ip: 'ip') }
before do
expect_next_instance_of(Gitlab::Auth::IpRateLimiter) do |rate_limiter|
expect(rate_limiter).to receive(:banned?).and_return(true)
end
end
it 'raises an IpBlacklisted exception' do
expect { subject }.to raise_error(Gitlab::Auth::IpBlacklisted)
end
end
context 'for CI registry user' do
let_it_be(:build) { create(:ci_build, :running) }
it 'skips rate limiting for successful auth' do
expect_next_instance_of(Gitlab::Auth::IpRateLimiter) do |rate_limiter|
expect(rate_limiter).not_to receive(:reset!)
end
gl_auth.find_for_git_client('gitlab-ci-token', build.token, project: build.project, ip: 'ip')
end
it 'skips rate limiting for failed auth' do
expect_next_instance_of(Gitlab::Auth::IpRateLimiter) do |rate_limiter|
expect(rate_limiter).not_to receive(:register_fail!)
end
gl_auth.find_for_git_client('gitlab-ci-token', 'wrong_token', project: build.project, ip: 'ip')
end
end
context 'for other users' do
let_it_be(:user) { create(:user) }
it 'resets rate limit for successful auth' do
expect_next_instance_of(Gitlab::Auth::IpRateLimiter) do |rate_limiter|
expect(rate_limiter).to receive(:reset!)
end
gl_auth.find_for_git_client(user.username, user.password, project: nil, ip: 'ip')
end
2020-03-13 15:44:24 +05:30
it 'rate limits a user by unique IPs' do
expect_next_instance_of(Gitlab::Auth::IpRateLimiter) do |rate_limiter|
expect(rate_limiter).to receive(:reset!)
end
expect(Gitlab::Auth::UniqueIpsLimiter).to receive(:limit_user!).twice.and_call_original
gl_auth.find_for_git_client(user.username, user.password, project: nil, ip: 'ip')
end
2020-01-01 13:55:28 +05:30
it 'registers failure for failed auth' do
expect_next_instance_of(Gitlab::Auth::IpRateLimiter) do |rate_limiter|
expect(rate_limiter).to receive(:register_fail!)
end
gl_auth.find_for_git_client(user.username, 'wrong_password', project: nil, ip: 'ip')
end
end
end
2016-09-29 09:46:39 +05:30
context 'build token' do
subject { gl_auth.find_for_git_client('gitlab-ci-token', build.token, project: project, ip: 'ip') }
context 'for running build' do
let!(:build) { create(:ci_build, :running) }
let(:project) { build.project }
it 'recognises user-less build' do
2019-12-21 20:55:43 +05:30
expect(subject).to eq(Gitlab::Auth::Result.new(nil, build.project, :ci, described_class.build_authentication_abilities))
2016-09-29 09:46:39 +05:30
end
it 'recognises user token' do
build.update(user: create(:user))
2019-12-21 20:55:43 +05:30
expect(subject).to eq(Gitlab::Auth::Result.new(build.user, build.project, :build, described_class.build_authentication_abilities))
2016-09-29 09:46:39 +05:30
end
2020-03-28 13:19:24 +05:30
it 'fails with blocked user token' do
build.update(user: create(:user, :blocked))
expect(subject).to eq(Gitlab::Auth::Result.new(nil, nil, nil, nil))
end
2016-09-29 09:46:39 +05:30
end
(HasStatus::AVAILABLE_STATUSES - ['running']).each do |build_status|
context "for #{build_status} build" do
let!(:build) { create(:ci_build, status: build_status) }
let(:project) { build.project }
it 'denies authentication' do
expect(subject).to eq(Gitlab::Auth::Result.new)
end
end
end
end
it 'recognizes other ci services' do
project.create_drone_ci_service(active: true)
project.drone_ci_service.update(token: 'token')
2019-12-21 20:55:43 +05:30
expect(gl_auth.find_for_git_client('drone-ci-token', 'token', project: project, ip: 'ip')).to eq(Gitlab::Auth::Result.new(nil, project, :ci, described_class.build_authentication_abilities))
end
it 'recognizes master passwords' do
user = create(:user, password: 'password')
2019-12-21 20:55:43 +05:30
expect(gl_auth.find_for_git_client(user.username, 'password', project: nil, ip: 'ip')).to eq(Gitlab::Auth::Result.new(user, nil, :gitlab_or_ldap, described_class.full_authentication_abilities))
2016-09-29 09:46:39 +05:30
end
2017-08-17 22:00:37 +05:30
include_examples 'user login operation with unique ip limit' do
let(:user) { create(:user, password: 'password') }
2016-09-29 09:46:39 +05:30
2017-08-17 22:00:37 +05:30
def operation
2019-12-21 20:55:43 +05:30
expect(gl_auth.find_for_git_client(user.username, 'password', project: nil, ip: 'ip')).to eq(Gitlab::Auth::Result.new(user, nil, :gitlab_or_ldap, described_class.full_authentication_abilities))
2017-08-17 22:00:37 +05:30
end
2016-09-29 09:46:39 +05:30
end
2017-08-17 22:00:37 +05:30
context 'while using LFS authenticate' do
it 'recognizes user lfs tokens' do
user = create(:user)
token = Gitlab::LfsToken.new(user).token
2019-12-21 20:55:43 +05:30
expect(gl_auth.find_for_git_client(user.username, token, project: nil, ip: 'ip')).to eq(Gitlab::Auth::Result.new(user, nil, :lfs_token, described_class.read_write_project_authentication_abilities))
2017-08-17 22:00:37 +05:30
end
it 'recognizes deploy key lfs tokens' do
key = create(:deploy_key)
token = Gitlab::LfsToken.new(key).token
2019-12-21 20:55:43 +05:30
expect(gl_auth.find_for_git_client("lfs+deploy-key-#{key.id}", token, project: nil, ip: 'ip')).to eq(Gitlab::Auth::Result.new(key, nil, :lfs_deploy_token, described_class.read_only_authentication_abilities))
2017-08-17 22:00:37 +05:30
end
it 'does not try password auth before oauth' do
user = create(:user)
token = Gitlab::LfsToken.new(user).token
2016-09-29 09:46:39 +05:30
2017-08-17 22:00:37 +05:30
expect(gl_auth).not_to receive(:find_with_user_password)
gl_auth.find_for_git_client(user.username, token, project: nil, ip: 'ip')
end
2018-03-17 18:26:18 +05:30
it 'grants deploy key write permissions' do
key = create(:deploy_key)
create(:deploy_keys_project, :write_access, deploy_key: key, project: project)
token = Gitlab::LfsToken.new(key).token
2019-12-21 20:55:43 +05:30
expect(gl_auth.find_for_git_client("lfs+deploy-key-#{key.id}", token, project: project, ip: 'ip')).to eq(Gitlab::Auth::Result.new(key, nil, :lfs_deploy_token, described_class.read_write_authentication_abilities))
2018-03-17 18:26:18 +05:30
end
it 'does not grant deploy key write permissions' do
key = create(:deploy_key)
token = Gitlab::LfsToken.new(key).token
2019-12-21 20:55:43 +05:30
expect(gl_auth.find_for_git_client("lfs+deploy-key-#{key.id}", token, project: project, ip: 'ip')).to eq(Gitlab::Auth::Result.new(key, nil, :lfs_deploy_token, described_class.read_only_authentication_abilities))
2018-03-17 18:26:18 +05:30
end
end
2017-08-17 22:00:37 +05:30
context 'while using OAuth tokens as passwords' do
let(:user) { create(:user) }
let(:token_w_api_scope) { Doorkeeper::AccessToken.create!(application_id: application.id, resource_owner_id: user.id, scopes: 'api') }
let(:application) { Doorkeeper::Application.create!(name: 'MyApp', redirect_uri: 'https://app.com', owner: user) }
2020-04-22 19:07:51 +05:30
shared_examples 'an oauth failure' do
it 'fails' do
expect(gl_auth.find_for_git_client("oauth2", token_w_api_scope.token, project: nil, ip: 'ip'))
.to eq(Gitlab::Auth::Result.new(nil, nil, nil, nil))
end
end
2017-08-17 22:00:37 +05:30
it 'succeeds for OAuth tokens with the `api` scope' do
2019-12-21 20:55:43 +05:30
expect(gl_auth.find_for_git_client("oauth2", token_w_api_scope.token, project: nil, ip: 'ip')).to eq(Gitlab::Auth::Result.new(user, nil, :oauth, described_class.full_authentication_abilities))
2017-08-17 22:00:37 +05:30
end
it 'fails for OAuth tokens with other scopes' do
token = Doorkeeper::AccessToken.create!(application_id: application.id, resource_owner_id: user.id, scopes: 'read_user')
expect(gl_auth.find_for_git_client("oauth2", token.token, project: nil, ip: 'ip')).to eq(Gitlab::Auth::Result.new(nil, nil))
end
it 'does not try password auth before oauth' do
expect(gl_auth).not_to receive(:find_with_user_password)
gl_auth.find_for_git_client("oauth2", token_w_api_scope.token, project: nil, ip: 'ip')
end
2020-03-28 13:19:24 +05:30
context 'blocked user' do
let(:user) { create(:user, :blocked) }
2020-04-22 19:07:51 +05:30
it_behaves_like 'an oauth failure'
end
context 'orphaned token' do
before do
user.destroy
2020-03-28 13:19:24 +05:30
end
2020-04-22 19:07:51 +05:30
it_behaves_like 'an oauth failure'
2020-03-28 13:19:24 +05:30
end
2017-08-17 22:00:37 +05:30
end
context 'while using personal access tokens as passwords' do
it 'succeeds for personal access tokens with the `api` scope' do
personal_access_token = create(:personal_access_token, scopes: ['api'])
2019-12-21 20:55:43 +05:30
expect_results_with_abilities(personal_access_token, described_class.full_authentication_abilities)
2019-07-31 22:56:46 +05:30
end
it 'succeeds for personal access tokens with the `read_repository` scope' do
personal_access_token = create(:personal_access_token, scopes: ['read_repository'])
expect_results_with_abilities(personal_access_token, [:download_code])
end
it 'succeeds for personal access tokens with the `write_repository` scope' do
personal_access_token = create(:personal_access_token, scopes: ['write_repository'])
expect_results_with_abilities(personal_access_token, [:download_code, :push_code])
2017-08-17 22:00:37 +05:30
end
2018-03-17 18:26:18 +05:30
context 'when registry is enabled' do
before do
stub_container_registry_config(enabled: true)
end
it 'succeeds for personal access tokens with the `read_registry` scope' do
personal_access_token = create(:personal_access_token, scopes: ['read_registry'])
2017-09-10 17:25:29 +05:30
2019-07-31 22:56:46 +05:30
expect_results_with_abilities(personal_access_token, [:read_container_image])
2018-03-17 18:26:18 +05:30
end
2017-09-10 17:25:29 +05:30
end
2017-08-17 22:00:37 +05:30
it 'succeeds if it is an impersonation token' do
impersonation_token = create(:personal_access_token, :impersonation, scopes: ['api'])
2019-12-21 20:55:43 +05:30
expect_results_with_abilities(impersonation_token, described_class.full_authentication_abilities)
2017-08-17 22:00:37 +05:30
end
2017-09-10 17:25:29 +05:30
it 'limits abilities based on scope' do
2018-03-17 18:26:18 +05:30
personal_access_token = create(:personal_access_token, scopes: %w[read_user sudo])
2017-08-17 22:00:37 +05:30
2019-07-31 22:56:46 +05:30
expect_results_with_abilities(personal_access_token, [])
2017-08-17 22:00:37 +05:30
end
it 'fails if password is nil' do
2019-07-31 22:56:46 +05:30
expect_results_with_abilities(nil, nil, false)
2017-08-17 22:00:37 +05:30
end
2020-03-28 13:19:24 +05:30
context 'when user is blocked' do
let(:user) { create(:user, :blocked) }
let(:personal_access_token) { create(:personal_access_token, scopes: ['read_registry'], user: user) }
before do
stub_container_registry_config(enabled: true)
end
it 'fails if user is blocked' do
expect(gl_auth.find_for_git_client('', personal_access_token.token, project: nil, ip: 'ip'))
.to eq(Gitlab::Auth::Result.new(nil, nil, nil, nil))
end
end
2017-08-17 22:00:37 +05:30
end
context 'while using regular user and password' do
2020-03-28 13:19:24 +05:30
it 'fails for a blocked user' do
user = create(
:user,
:blocked,
username: 'normal_user',
password: 'my-secret'
)
expect(gl_auth.find_for_git_client(user.username, user.password, project: nil, ip: 'ip'))
.to eq(Gitlab::Auth::Result.new(nil, nil, nil, nil))
end
2020-01-01 13:55:28 +05:30
it 'goes through lfs authentication' do
2017-08-17 22:00:37 +05:30
user = create(
:user,
username: 'normal_user',
2017-09-10 17:25:29 +05:30
password: 'my-secret'
2017-08-17 22:00:37 +05:30
)
expect(gl_auth.find_for_git_client(user.username, user.password, project: nil, ip: 'ip'))
2019-12-21 20:55:43 +05:30
.to eq(Gitlab::Auth::Result.new(user, nil, :gitlab_or_ldap, described_class.full_authentication_abilities))
2017-08-17 22:00:37 +05:30
end
2020-01-01 13:55:28 +05:30
it 'goes through oauth authentication when the username is oauth2' do
2017-08-17 22:00:37 +05:30
user = create(
:user,
username: 'oauth2',
2017-09-10 17:25:29 +05:30
password: 'my-secret'
2017-08-17 22:00:37 +05:30
)
expect(gl_auth.find_for_git_client(user.username, user.password, project: nil, ip: 'ip'))
2019-12-21 20:55:43 +05:30
.to eq(Gitlab::Auth::Result.new(user, nil, :gitlab_or_ldap, described_class.full_authentication_abilities))
2017-08-17 22:00:37 +05:30
end
end
it 'returns double nil for invalid credentials' do
login = 'foo'
2017-08-17 22:00:37 +05:30
expect(gl_auth.find_for_git_client(login, 'bar', project: nil, ip: 'ip')).to eq(Gitlab::Auth::Result.new)
end
2017-09-10 17:25:29 +05:30
it 'throws an error suggesting user create a PAT when internal auth is disabled' do
2018-03-17 18:26:18 +05:30
allow_any_instance_of(ApplicationSetting).to receive(:password_authentication_enabled_for_git?) { false }
2017-09-10 17:25:29 +05:30
2018-03-17 18:26:18 +05:30
expect { gl_auth.find_for_git_client('foo', 'bar', project: nil, ip: 'ip') }.to raise_error(Gitlab::Auth::MissingPersonalAccessTokenError)
2017-09-10 17:25:29 +05:30
end
2018-05-09 12:01:36 +05:30
context 'while using deploy tokens' do
let(:auth_failure) { Gitlab::Auth::Result.new(nil, nil) }
2020-04-22 19:07:51 +05:30
shared_examples 'registry token scope' do
it 'fails when login is not valid' do
expect(gl_auth.find_for_git_client('random_login', deploy_token.token, project: project, ip: 'ip'))
.to eq(auth_failure)
end
it 'fails when token is not valid' do
expect(gl_auth.find_for_git_client(login, '123123', project: project, ip: 'ip'))
.to eq(auth_failure)
end
it 'fails if token is nil' do
expect(gl_auth.find_for_git_client(login, nil, project: nil, ip: 'ip'))
.to eq(auth_failure)
end
it 'fails if token is not related to project' do
expect(gl_auth.find_for_git_client(login, 'abcdef', project: nil, ip: 'ip'))
.to eq(auth_failure)
end
it 'fails if token has been revoked' do
deploy_token.revoke!
expect(deploy_token.revoked?).to be_truthy
expect(gl_auth.find_for_git_client('deploy-token', deploy_token.token, project: nil, ip: 'ip'))
.to eq(auth_failure)
end
end
shared_examples 'deploy token with disabled registry' do
context 'when registry disabled' do
before do
stub_container_registry_config(enabled: false)
end
it 'fails when login and token are valid' do
expect(gl_auth.find_for_git_client(login, deploy_token.token, project: nil, ip: 'ip'))
.to eq(auth_failure)
end
end
end
2019-09-30 21:07:59 +05:30
context 'when deploy token and user have the same username' do
let(:username) { 'normal_user' }
let(:user) { create(:user, username: username, password: 'my-secret') }
let(:deploy_token) { create(:deploy_token, username: username, read_registry: false, projects: [project]) }
it 'succeeds for the token' do
auth_success = Gitlab::Auth::Result.new(deploy_token, project, :deploy_token, [:download_code])
expect(gl_auth.find_for_git_client(username, deploy_token.token, project: project, ip: 'ip'))
.to eq(auth_success)
end
it 'succeeds for the user' do
2019-12-21 20:55:43 +05:30
auth_success = Gitlab::Auth::Result.new(user, nil, :gitlab_or_ldap, described_class.full_authentication_abilities)
2019-09-30 21:07:59 +05:30
expect(gl_auth.find_for_git_client(username, 'my-secret', project: project, ip: 'ip'))
.to eq(auth_success)
end
end
context 'when deploy tokens have the same username' do
context 'and belong to the same project' do
let!(:read_registry) { create(:deploy_token, username: 'deployer', read_repository: false, projects: [project]) }
let!(:read_repository) { create(:deploy_token, username: read_registry.username, read_registry: false, projects: [project]) }
2020-04-22 19:07:51 +05:30
let(:auth_success) { Gitlab::Auth::Result.new(read_repository, project, :deploy_token, [:download_code]) }
2019-09-30 21:07:59 +05:30
it 'succeeds for the right token' do
expect(gl_auth.find_for_git_client('deployer', read_repository.token, project: project, ip: 'ip'))
.to eq(auth_success)
end
it 'fails for the wrong token' do
expect(gl_auth.find_for_git_client('deployer', read_registry.token, project: project, ip: 'ip'))
2020-04-22 19:07:51 +05:30
.not_to eq(auth_success)
2019-09-30 21:07:59 +05:30
end
end
context 'and belong to different projects' do
2020-04-22 19:07:51 +05:30
let_it_be(:other_project) { create(:project) }
2019-12-21 20:55:43 +05:30
let!(:read_registry) { create(:deploy_token, username: 'deployer', read_repository: false, projects: [project]) }
2020-04-22 19:07:51 +05:30
let!(:read_repository) { create(:deploy_token, username: read_registry.username, read_registry: false, projects: [other_project]) }
let(:auth_success) { Gitlab::Auth::Result.new(read_repository, other_project, :deploy_token, [:download_code]) }
2019-09-30 21:07:59 +05:30
it 'succeeds for the right token' do
2020-04-22 19:07:51 +05:30
expect(gl_auth.find_for_git_client('deployer', read_repository.token, project: other_project, ip: 'ip'))
2019-09-30 21:07:59 +05:30
.to eq(auth_success)
end
it 'fails for the wrong token' do
2020-04-22 19:07:51 +05:30
expect(gl_auth.find_for_git_client('deployer', read_registry.token, project: other_project, ip: 'ip'))
.not_to eq(auth_success)
2019-09-30 21:07:59 +05:30
end
end
end
2018-05-09 12:01:36 +05:30
context 'when the deploy token has read_repository as scope' do
let(:deploy_token) { create(:deploy_token, read_registry: false, projects: [project]) }
let(:login) { deploy_token.username }
it 'succeeds when login and token are valid' do
auth_success = Gitlab::Auth::Result.new(deploy_token, project, :deploy_token, [:download_code])
expect(gl_auth.find_for_git_client(login, deploy_token.token, project: project, ip: 'ip'))
.to eq(auth_success)
end
2019-09-30 21:07:59 +05:30
it 'succeeds when custom login and token are valid' do
deploy_token = create(:deploy_token, username: 'deployer', read_registry: false, projects: [project])
auth_success = Gitlab::Auth::Result.new(deploy_token, project, :deploy_token, [:download_code])
expect(gl_auth.find_for_git_client('deployer', deploy_token.token, project: project, ip: 'ip'))
.to eq(auth_success)
end
2020-03-13 15:44:24 +05:30
it 'does not attempt to rate limit unique IPs for a deploy token' do
expect(Gitlab::Auth::UniqueIpsLimiter).not_to receive(:limit_user!)
gl_auth.find_for_git_client(login, deploy_token.token, project: project, ip: 'ip')
end
2018-05-09 12:01:36 +05:30
it 'fails when login is not valid' do
expect(gl_auth.find_for_git_client('random_login', deploy_token.token, project: project, ip: 'ip'))
.to eq(auth_failure)
end
it 'fails when token is not valid' do
expect(gl_auth.find_for_git_client(login, '123123', project: project, ip: 'ip'))
.to eq(auth_failure)
end
it 'fails if token is nil' do
expect(gl_auth.find_for_git_client(login, nil, project: project, ip: 'ip'))
.to eq(auth_failure)
end
it 'fails if token is not related to project' do
another_deploy_token = create(:deploy_token)
expect(gl_auth.find_for_git_client(login, another_deploy_token.token, project: project, ip: 'ip'))
.to eq(auth_failure)
end
it 'fails if token has been revoked' do
deploy_token.revoke!
expect(deploy_token.revoked?).to be_truthy
expect(gl_auth.find_for_git_client('deploy-token', deploy_token.token, project: project, ip: 'ip'))
.to eq(auth_failure)
end
end
2020-03-13 15:44:24 +05:30
context 'when the deploy token is of group type' do
let(:project_with_group) { create(:project, group: create(:group)) }
let(:deploy_token) { create(:deploy_token, :group, read_repository: true, groups: [project_with_group.group]) }
let(:login) { deploy_token.username }
subject { gl_auth.find_for_git_client(login, deploy_token.token, project: project_with_group, ip: 'ip') }
it 'succeeds when login and a group deploy token are valid' do
auth_success = Gitlab::Auth::Result.new(deploy_token, project_with_group, :deploy_token, [:download_code, :read_container_image])
expect(subject).to eq(auth_success)
end
end
2018-05-09 12:01:36 +05:30
context 'when the deploy token has read_registry as a scope' do
let(:deploy_token) { create(:deploy_token, read_repository: false, projects: [project]) }
let(:login) { deploy_token.username }
context 'when registry enabled' do
before do
stub_container_registry_config(enabled: true)
end
2020-03-13 15:44:24 +05:30
it 'succeeds when login and a project token are valid' do
2018-05-09 12:01:36 +05:30
auth_success = Gitlab::Auth::Result.new(deploy_token, project, :deploy_token, [:read_container_image])
2020-03-13 15:44:24 +05:30
expect(gl_auth.find_for_git_client(login, deploy_token.token, project: project, ip: 'ip'))
2018-05-09 12:01:36 +05:30
.to eq(auth_success)
end
2020-04-22 19:07:51 +05:30
it_behaves_like 'registry token scope'
end
2018-05-09 12:01:36 +05:30
2020-04-22 19:07:51 +05:30
it_behaves_like 'deploy token with disabled registry'
end
2018-05-09 12:01:36 +05:30
2020-04-22 19:07:51 +05:30
context 'when the deploy token has write_registry as a scope' do
let_it_be(:deploy_token) { create(:deploy_token, write_registry: true, read_repository: false, read_registry: false, projects: [project]) }
let_it_be(:login) { deploy_token.username }
2018-05-09 12:01:36 +05:30
2020-04-22 19:07:51 +05:30
context 'when registry enabled' do
before do
stub_container_registry_config(enabled: true)
2018-05-09 12:01:36 +05:30
end
2020-04-22 19:07:51 +05:30
it 'succeeds when login and a project token are valid' do
auth_success = Gitlab::Auth::Result.new(deploy_token, project, :deploy_token, [:create_container_image])
2018-05-09 12:01:36 +05:30
2020-04-22 19:07:51 +05:30
expect(gl_auth.find_for_git_client(login, deploy_token.token, project: project, ip: 'ip'))
.to eq(auth_success)
2018-05-09 12:01:36 +05:30
end
2020-04-22 19:07:51 +05:30
it_behaves_like 'registry token scope'
2018-05-09 12:01:36 +05:30
end
2020-04-22 19:07:51 +05:30
it_behaves_like 'deploy token with disabled registry'
2018-05-09 12:01:36 +05:30
end
end
end
describe 'find_with_user_password' do
2015-04-26 12:48:37 +05:30
let!(:user) do
create(:user,
username: username,
password: password,
password_confirmation: password)
end
2019-03-02 22:35:43 +05:30
let(:username) { 'John' } # username isn't lowercase, test this
2015-04-26 12:48:37 +05:30
let(:password) { 'my-secret' }
2016-09-13 17:45:13 +05:30
it "finds user by valid login/password" do
expect( gl_auth.find_with_user_password(username, password) ).to eql user
2015-04-26 12:48:37 +05:30
end
2016-09-13 17:45:13 +05:30
it 'finds user by valid email/password with case-insensitive email' do
expect(gl_auth.find_with_user_password(user.email.upcase, password)).to eql user
2015-04-26 12:48:37 +05:30
end
2016-09-13 17:45:13 +05:30
it 'finds user by valid username/password with case-insensitive username' do
expect(gl_auth.find_with_user_password(username.upcase, password)).to eql user
2015-04-26 12:48:37 +05:30
end
2016-09-13 17:45:13 +05:30
it "does not find user with invalid password" do
2015-04-26 12:48:37 +05:30
password = 'wrong'
expect( gl_auth.find_with_user_password(username, password) ).not_to eql user
2015-04-26 12:48:37 +05:30
end
2016-09-13 17:45:13 +05:30
it "does not find user with invalid login" do
2015-04-26 12:48:37 +05:30
user = 'wrong'
expect( gl_auth.find_with_user_password(username, password) ).not_to eql user
2017-08-17 22:00:37 +05:30
end
include_examples 'user login operation with unique ip limit' do
def operation
expect(gl_auth.find_with_user_password(username, password)).to eq(user)
end
end
2019-12-21 20:55:43 +05:30
it 'finds the user in deactivated state' do
user.deactivate!
expect( gl_auth.find_with_user_password(username, password) ).to eql user
end
2017-08-17 22:00:37 +05:30
it "does not find user in blocked state" do
user.block
expect( gl_auth.find_with_user_password(username, password) ).not_to eql user
end
it "does not find user in ldap_blocked state" do
user.ldap_block
expect( gl_auth.find_with_user_password(username, password) ).not_to eql user
2015-04-26 12:48:37 +05:30
end
context "with ldap enabled" do
2015-09-11 14:41:01 +05:30
before do
2020-04-08 14:13:33 +05:30
allow(Gitlab::Auth::Ldap::Config).to receive(:enabled?).and_return(true)
2015-09-11 14:41:01 +05:30
end
2015-04-26 12:48:37 +05:30
it "tries to autheticate with db before ldap" do
2020-04-08 14:13:33 +05:30
expect(Gitlab::Auth::Ldap::Authentication).not_to receive(:login)
2015-04-26 12:48:37 +05:30
2018-04-04 21:44:52 +05:30
expect(gl_auth.find_with_user_password(username, password)).to eq(user)
end
it "does not find user by using ldap as fallback to for authentication" do
2020-04-08 14:13:33 +05:30
expect(Gitlab::Auth::Ldap::Authentication).to receive(:login).and_return(nil)
2018-04-04 21:44:52 +05:30
expect(gl_auth.find_with_user_password('ldap_user', 'password')).to be_nil
2015-04-26 12:48:37 +05:30
end
2018-04-04 21:44:52 +05:30
it "find new user by using ldap as fallback to for authentication" do
2020-04-08 14:13:33 +05:30
expect(Gitlab::Auth::Ldap::Authentication).to receive(:login).and_return(user)
2015-04-26 12:48:37 +05:30
2018-04-04 21:44:52 +05:30
expect(gl_auth.find_with_user_password('ldap_user', 'password')).to eq(user)
2015-04-26 12:48:37 +05:30
end
end
2018-03-17 18:26:18 +05:30
context "with password authentication disabled for Git" do
before do
stub_application_setting(password_authentication_enabled_for_git: false)
end
it "does not find user by valid login/password" do
expect(gl_auth.find_with_user_password(username, password)).to be_nil
end
context "with ldap enabled" do
before do
2020-04-08 14:13:33 +05:30
allow(Gitlab::Auth::Ldap::Config).to receive(:enabled?).and_return(true)
2018-03-17 18:26:18 +05:30
end
it "does not find non-ldap user by valid login/password" do
expect(gl_auth.find_with_user_password(username, password)).to be_nil
end
end
end
2015-04-26 12:48:37 +05:30
end
2016-09-29 09:46:39 +05:30
private
2019-07-31 22:56:46 +05:30
def expect_results_with_abilities(personal_access_token, abilities, success = true)
expect(gl_auth.find_for_git_client('', personal_access_token&.token, project: nil, ip: 'ip'))
.to eq(Gitlab::Auth::Result.new(personal_access_token&.user, nil, personal_access_token.nil? ? nil : :personal_access_token, abilities))
end
2015-04-26 12:48:37 +05:30
end