route_test.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package lfs
  5. import (
  6. "fmt"
  7. "io/ioutil"
  8. "net/http"
  9. "net/http/httptest"
  10. "testing"
  11. "github.com/stretchr/testify/assert"
  12. "gopkg.in/macaron.v1"
  13. "gogs.io/gogs/internal/auth"
  14. "gogs.io/gogs/internal/db"
  15. "gogs.io/gogs/internal/lfsutil"
  16. )
  17. func Test_authenticate(t *testing.T) {
  18. m := macaron.New()
  19. m.Use(macaron.Renderer())
  20. m.Get("/", authenticate(), func(w http.ResponseWriter, user *db.User) {
  21. fmt.Fprintf(w, "ID: %d, Name: %s", user.ID, user.Name)
  22. })
  23. tests := []struct {
  24. name string
  25. header http.Header
  26. mockUsersStore *db.MockUsersStore
  27. mockTwoFactorsStore *db.MockTwoFactorsStore
  28. mockAccessTokensStore func() db.AccessTokensStore
  29. expStatusCode int
  30. expHeader http.Header
  31. expBody string
  32. }{
  33. {
  34. name: "no authorization",
  35. expStatusCode: http.StatusUnauthorized,
  36. expHeader: http.Header{
  37. "Lfs-Authenticate": []string{`Basic realm="Git LFS"`},
  38. "Content-Type": []string{"application/vnd.git-lfs+json"},
  39. },
  40. expBody: `{"message":"Credentials needed"}` + "\n",
  41. },
  42. {
  43. name: "user has 2FA enabled",
  44. header: http.Header{
  45. "Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
  46. },
  47. mockUsersStore: &db.MockUsersStore{
  48. MockAuthenticate: func(username, password string, loginSourceID int64) (*db.User, error) {
  49. return &db.User{}, nil
  50. },
  51. },
  52. mockTwoFactorsStore: &db.MockTwoFactorsStore{
  53. MockIsUserEnabled: func(userID int64) bool {
  54. return true
  55. },
  56. },
  57. expStatusCode: http.StatusBadRequest,
  58. expHeader: http.Header{},
  59. expBody: "Users with 2FA enabled are not allowed to authenticate via username and password.",
  60. },
  61. {
  62. name: "both user and access token do not exist",
  63. header: http.Header{
  64. "Authorization": []string{"Basic dXNlcm5hbWU="},
  65. },
  66. mockUsersStore: &db.MockUsersStore{
  67. MockAuthenticate: func(username, password string, loginSourceID int64) (*db.User, error) {
  68. return nil, auth.ErrBadCredentials{}
  69. },
  70. },
  71. mockAccessTokensStore: func() db.AccessTokensStore {
  72. mock := db.NewMockAccessTokensStore()
  73. mock.GetBySHA1Func.SetDefaultReturn(nil, db.ErrAccessTokenNotExist{})
  74. return mock
  75. },
  76. expStatusCode: http.StatusUnauthorized,
  77. expHeader: http.Header{
  78. "Lfs-Authenticate": []string{`Basic realm="Git LFS"`},
  79. "Content-Type": []string{"application/vnd.git-lfs+json"},
  80. },
  81. expBody: `{"message":"Credentials needed"}` + "\n",
  82. },
  83. {
  84. name: "authenticated by username and password",
  85. header: http.Header{
  86. "Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
  87. },
  88. mockUsersStore: &db.MockUsersStore{
  89. MockAuthenticate: func(username, password string, loginSourceID int64) (*db.User, error) {
  90. return &db.User{ID: 1, Name: "unknwon"}, nil
  91. },
  92. },
  93. mockTwoFactorsStore: &db.MockTwoFactorsStore{
  94. MockIsUserEnabled: func(userID int64) bool {
  95. return false
  96. },
  97. },
  98. expStatusCode: http.StatusOK,
  99. expHeader: http.Header{},
  100. expBody: "ID: 1, Name: unknwon",
  101. },
  102. {
  103. name: "authenticate by access token",
  104. header: http.Header{
  105. "Authorization": []string{"Basic dXNlcm5hbWU="},
  106. },
  107. mockUsersStore: &db.MockUsersStore{
  108. MockAuthenticate: func(username, password string, loginSourceID int64) (*db.User, error) {
  109. return nil, auth.ErrBadCredentials{}
  110. },
  111. MockGetByID: func(id int64) (*db.User, error) {
  112. return &db.User{ID: 1, Name: "unknwon"}, nil
  113. },
  114. },
  115. mockAccessTokensStore: func() db.AccessTokensStore {
  116. mock := db.NewMockAccessTokensStore()
  117. mock.GetBySHA1Func.SetDefaultReturn(&db.AccessToken{}, nil)
  118. return mock
  119. },
  120. expStatusCode: http.StatusOK,
  121. expHeader: http.Header{},
  122. expBody: "ID: 1, Name: unknwon",
  123. },
  124. }
  125. for _, test := range tests {
  126. t.Run(test.name, func(t *testing.T) {
  127. db.SetMockUsersStore(t, test.mockUsersStore)
  128. db.SetMockTwoFactorsStore(t, test.mockTwoFactorsStore)
  129. if test.mockAccessTokensStore != nil {
  130. db.SetMockAccessTokensStore(t, test.mockAccessTokensStore())
  131. }
  132. r, err := http.NewRequest("GET", "/", nil)
  133. if err != nil {
  134. t.Fatal(err)
  135. }
  136. r.Header = test.header
  137. rr := httptest.NewRecorder()
  138. m.ServeHTTP(rr, r)
  139. resp := rr.Result()
  140. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  141. assert.Equal(t, test.expHeader, resp.Header)
  142. body, err := ioutil.ReadAll(resp.Body)
  143. if err != nil {
  144. t.Fatal(err)
  145. }
  146. assert.Equal(t, test.expBody, string(body))
  147. })
  148. }
  149. }
  150. func Test_authorize(t *testing.T) {
  151. tests := []struct {
  152. name string
  153. authroize macaron.Handler
  154. mockUsersStore *db.MockUsersStore
  155. mockReposStore *db.MockReposStore
  156. mockPermsStore *db.MockPermsStore
  157. expStatusCode int
  158. expBody string
  159. }{
  160. {
  161. name: "user does not exist",
  162. authroize: authorize(db.AccessModeNone),
  163. mockUsersStore: &db.MockUsersStore{
  164. MockGetByUsername: func(username string) (*db.User, error) {
  165. return nil, db.ErrUserNotExist{}
  166. },
  167. },
  168. expStatusCode: http.StatusNotFound,
  169. },
  170. {
  171. name: "repository does not exist",
  172. authroize: authorize(db.AccessModeNone),
  173. mockUsersStore: &db.MockUsersStore{
  174. MockGetByUsername: func(username string) (*db.User, error) {
  175. return &db.User{Name: username}, nil
  176. },
  177. },
  178. mockReposStore: &db.MockReposStore{
  179. MockGetByName: func(ownerID int64, name string) (*db.Repository, error) {
  180. return nil, db.ErrRepoNotExist{}
  181. },
  182. },
  183. expStatusCode: http.StatusNotFound,
  184. },
  185. {
  186. name: "actor is not authorized",
  187. authroize: authorize(db.AccessModeWrite),
  188. mockUsersStore: &db.MockUsersStore{
  189. MockGetByUsername: func(username string) (*db.User, error) {
  190. return &db.User{Name: username}, nil
  191. },
  192. },
  193. mockReposStore: &db.MockReposStore{
  194. MockGetByName: func(ownerID int64, name string) (*db.Repository, error) {
  195. return &db.Repository{Name: name}, nil
  196. },
  197. },
  198. mockPermsStore: &db.MockPermsStore{
  199. MockAuthorize: func(userID, repoID int64, desired db.AccessMode, opts db.AccessModeOptions) bool {
  200. return desired <= db.AccessModeRead
  201. },
  202. },
  203. expStatusCode: http.StatusNotFound,
  204. },
  205. {
  206. name: "actor is authorized",
  207. authroize: authorize(db.AccessModeRead),
  208. mockUsersStore: &db.MockUsersStore{
  209. MockGetByUsername: func(username string) (*db.User, error) {
  210. return &db.User{Name: username}, nil
  211. },
  212. },
  213. mockReposStore: &db.MockReposStore{
  214. MockGetByName: func(ownerID int64, name string) (*db.Repository, error) {
  215. return &db.Repository{Name: name}, nil
  216. },
  217. },
  218. mockPermsStore: &db.MockPermsStore{
  219. MockAuthorize: func(userID, repoID int64, desired db.AccessMode, opts db.AccessModeOptions) bool {
  220. return desired <= db.AccessModeRead
  221. },
  222. },
  223. expStatusCode: http.StatusOK,
  224. expBody: "owner.Name: owner, repo.Name: repo",
  225. },
  226. }
  227. for _, test := range tests {
  228. t.Run(test.name, func(t *testing.T) {
  229. db.SetMockUsersStore(t, test.mockUsersStore)
  230. db.SetMockReposStore(t, test.mockReposStore)
  231. db.SetMockPermsStore(t, test.mockPermsStore)
  232. m := macaron.New()
  233. m.Use(macaron.Renderer())
  234. m.Use(func(c *macaron.Context) {
  235. c.Map(&db.User{})
  236. })
  237. m.Get("/:username/:reponame", test.authroize, func(w http.ResponseWriter, owner *db.User, repo *db.Repository) {
  238. fmt.Fprintf(w, "owner.Name: %s, repo.Name: %s", owner.Name, repo.Name)
  239. })
  240. r, err := http.NewRequest("GET", "/owner/repo", nil)
  241. if err != nil {
  242. t.Fatal(err)
  243. }
  244. rr := httptest.NewRecorder()
  245. m.ServeHTTP(rr, r)
  246. resp := rr.Result()
  247. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  248. body, err := ioutil.ReadAll(resp.Body)
  249. if err != nil {
  250. t.Fatal(err)
  251. }
  252. assert.Equal(t, test.expBody, string(body))
  253. })
  254. }
  255. }
  256. func Test_verifyHeader(t *testing.T) {
  257. tests := []struct {
  258. name string
  259. verifyHeader macaron.Handler
  260. header http.Header
  261. expStatusCode int
  262. }{
  263. {
  264. name: "header not found",
  265. verifyHeader: verifyHeader("Accept", contentType, http.StatusNotAcceptable),
  266. expStatusCode: http.StatusNotAcceptable,
  267. },
  268. {
  269. name: "header found",
  270. verifyHeader: verifyHeader("Accept", "application/vnd.git-lfs+json", http.StatusNotAcceptable),
  271. header: http.Header{
  272. "Accept": []string{"application/vnd.git-lfs+json; charset=utf-8"},
  273. },
  274. expStatusCode: http.StatusOK,
  275. },
  276. }
  277. for _, test := range tests {
  278. t.Run(test.name, func(t *testing.T) {
  279. m := macaron.New()
  280. m.Use(macaron.Renderer())
  281. m.Get("/", test.verifyHeader)
  282. r, err := http.NewRequest("GET", "/", nil)
  283. if err != nil {
  284. t.Fatal(err)
  285. }
  286. r.Header = test.header
  287. rr := httptest.NewRecorder()
  288. m.ServeHTTP(rr, r)
  289. resp := rr.Result()
  290. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  291. })
  292. }
  293. }
  294. func Test_verifyOID(t *testing.T) {
  295. m := macaron.New()
  296. m.Get("/:oid", verifyOID(), func(w http.ResponseWriter, oid lfsutil.OID) {
  297. fmt.Fprintf(w, "oid: %s", oid)
  298. })
  299. tests := []struct {
  300. name string
  301. url string
  302. expStatusCode int
  303. expBody string
  304. }{
  305. {
  306. name: "bad oid",
  307. url: "/bad_oid",
  308. expStatusCode: http.StatusBadRequest,
  309. expBody: `{"message":"Invalid oid"}` + "\n",
  310. },
  311. {
  312. name: "good oid",
  313. url: "/ef797c8118f02dfb649607dd5d3f8c7623048c9c063d532cc95c5ed7a898a64f",
  314. expStatusCode: http.StatusOK,
  315. expBody: "oid: ef797c8118f02dfb649607dd5d3f8c7623048c9c063d532cc95c5ed7a898a64f",
  316. },
  317. }
  318. for _, test := range tests {
  319. t.Run(test.name, func(t *testing.T) {
  320. r, err := http.NewRequest("GET", test.url, nil)
  321. if err != nil {
  322. t.Fatal(err)
  323. }
  324. rr := httptest.NewRecorder()
  325. m.ServeHTTP(rr, r)
  326. resp := rr.Result()
  327. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  328. body, err := ioutil.ReadAll(resp.Body)
  329. if err != nil {
  330. t.Fatal(err)
  331. }
  332. assert.Equal(t, test.expBody, string(body))
  333. })
  334. }
  335. }
  336. func Test_internalServerError(t *testing.T) {
  337. rr := httptest.NewRecorder()
  338. internalServerError(rr)
  339. resp := rr.Result()
  340. assert.Equal(t, http.StatusInternalServerError, resp.StatusCode)
  341. body, err := ioutil.ReadAll(resp.Body)
  342. if err != nil {
  343. t.Fatal(err)
  344. }
  345. assert.Equal(t, `{"message":"Internal server error"}`+"\n", string(body))
  346. }