2019-10-12 21:52:04 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe Gitlab::Auth::RequestAuthenticator do
|
|
|
|
let(:env) do
|
|
|
|
{
|
|
|
|
'rack.input' => '',
|
|
|
|
'REQUEST_METHOD' => 'GET'
|
|
|
|
}
|
|
|
|
end
|
|
|
|
let(:request) { ActionDispatch::Request.new(env) }
|
|
|
|
|
|
|
|
subject { described_class.new(request) }
|
|
|
|
|
|
|
|
describe '#user' do
|
|
|
|
let!(:sessionless_user) { build(:user) }
|
|
|
|
let!(:session_user) { build(:user) }
|
|
|
|
|
|
|
|
it 'returns sessionless user first' do
|
|
|
|
allow_any_instance_of(described_class).to receive(:find_sessionless_user).and_return(sessionless_user)
|
|
|
|
allow_any_instance_of(described_class).to receive(:find_user_from_warden).and_return(session_user)
|
|
|
|
|
2018-11-29 20:51:05 +05:30
|
|
|
expect(subject.user([:api])).to eq sessionless_user
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns session user if no sessionless user found' do
|
|
|
|
allow_any_instance_of(described_class).to receive(:find_user_from_warden).and_return(session_user)
|
|
|
|
|
2018-11-29 20:51:05 +05:30
|
|
|
expect(subject.user([:api])).to eq session_user
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns nil if no user found' do
|
2018-11-29 20:51:05 +05:30
|
|
|
expect(subject.user([:api])).to be_blank
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'bubbles up exceptions' do
|
|
|
|
allow_any_instance_of(described_class).to receive(:find_user_from_warden).and_raise(Gitlab::Auth::UnauthorizedError)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#find_sessionless_user' do
|
|
|
|
let!(:access_token_user) { build(:user) }
|
2018-11-08 19:23:39 +05:30
|
|
|
let!(:feed_token_user) { build(:user) }
|
2020-03-09 13:42:32 +05:30
|
|
|
let!(:static_object_token_user) { build(:user) }
|
|
|
|
let!(:job_token_user) { build(:user) }
|
2018-03-17 18:26:18 +05:30
|
|
|
|
|
|
|
it 'returns access_token user first' do
|
2018-11-29 20:51:05 +05:30
|
|
|
allow_any_instance_of(described_class).to receive(:find_user_from_web_access_token).and_return(access_token_user)
|
2018-11-08 19:23:39 +05:30
|
|
|
allow_any_instance_of(described_class).to receive(:find_user_from_feed_token).and_return(feed_token_user)
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2018-11-29 20:51:05 +05:30
|
|
|
expect(subject.find_sessionless_user([:api])).to eq access_token_user
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
it 'returns feed_token user if no access_token user found' do
|
|
|
|
allow_any_instance_of(described_class).to receive(:find_user_from_feed_token).and_return(feed_token_user)
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2018-11-29 20:51:05 +05:30
|
|
|
expect(subject.find_sessionless_user([:api])).to eq feed_token_user
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
2020-03-09 13:42:32 +05:30
|
|
|
it 'returns static_object_token user if no feed_token user found' do
|
|
|
|
allow_any_instance_of(described_class)
|
|
|
|
.to receive(:find_user_from_static_object_token)
|
|
|
|
.and_return(static_object_token_user)
|
|
|
|
|
|
|
|
expect(subject.find_sessionless_user([:api])).to eq static_object_token_user
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns job_token user if no static_object_token user found' do
|
|
|
|
allow_any_instance_of(described_class)
|
|
|
|
.to receive(:find_user_from_job_token)
|
|
|
|
.and_return(job_token_user)
|
|
|
|
|
|
|
|
expect(subject.find_sessionless_user([:api])).to eq job_token_user
|
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
it 'returns nil if no user found' do
|
2018-11-29 20:51:05 +05:30
|
|
|
expect(subject.find_sessionless_user([:api])).to be_blank
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'rescue Gitlab::Auth::AuthenticationError exceptions' do
|
2018-11-29 20:51:05 +05:30
|
|
|
allow_any_instance_of(described_class).to receive(:find_user_from_web_access_token).and_raise(Gitlab::Auth::UnauthorizedError)
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2018-11-29 20:51:05 +05:30
|
|
|
expect(subject.find_sessionless_user([:api])).to be_blank
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
end
|
2020-01-01 13:55:28 +05:30
|
|
|
|
2020-03-09 13:42:32 +05:30
|
|
|
describe '#find_user_from_job_token' do
|
|
|
|
let!(:user) { build(:user) }
|
|
|
|
let!(:job) { build(:ci_build, user: user) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
env[Gitlab::Auth::AuthFinders::JOB_TOKEN_HEADER] = 'token'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with API requests' do
|
|
|
|
before do
|
|
|
|
env['SCRIPT_NAME'] = '/api/endpoint'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'tries to find the user' do
|
|
|
|
expect(::Ci::Build).to receive(:find_by_token).and_return(job)
|
|
|
|
|
|
|
|
expect(subject.find_sessionless_user([:api])).to eq user
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'without API requests' do
|
|
|
|
before do
|
|
|
|
env['SCRIPT_NAME'] = '/web/endpoint'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not search for job users' do
|
|
|
|
expect(::Ci::Build).not_to receive(:find_by_token)
|
|
|
|
|
|
|
|
expect(subject.find_sessionless_user([:api])).to be_nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
describe '#runner' do
|
|
|
|
let!(:runner) { build(:ci_runner) }
|
|
|
|
|
|
|
|
it 'returns the runner using #find_runner_from_token' do
|
|
|
|
expect_any_instance_of(described_class)
|
|
|
|
.to receive(:find_runner_from_token)
|
|
|
|
.and_return(runner)
|
|
|
|
|
|
|
|
expect(subject.runner).to eq runner
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns nil if no runner is found' do
|
|
|
|
expect(subject.runner).to be_blank
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'rescue Gitlab::Auth::AuthenticationError exceptions' do
|
|
|
|
expect_any_instance_of(described_class)
|
|
|
|
.to receive(:find_runner_from_token)
|
|
|
|
.and_raise(Gitlab::Auth::UnauthorizedError)
|
|
|
|
|
|
|
|
expect(subject.runner).to be_blank
|
|
|
|
end
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|