route_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package lfs
  5. import (
  6. "context"
  7. "fmt"
  8. "io/ioutil"
  9. "net/http"
  10. "net/http/httptest"
  11. "testing"
  12. "github.com/stretchr/testify/assert"
  13. "gopkg.in/macaron.v1"
  14. "gogs.io/gogs/internal/auth"
  15. "gogs.io/gogs/internal/db"
  16. "gogs.io/gogs/internal/lfsutil"
  17. )
  18. func Test_authenticate(t *testing.T) {
  19. m := macaron.New()
  20. m.Use(macaron.Renderer())
  21. m.Get("/", authenticate(), func(w http.ResponseWriter, user *db.User) {
  22. fmt.Fprintf(w, "ID: %d, Name: %s", user.ID, user.Name)
  23. })
  24. tests := []struct {
  25. name string
  26. header http.Header
  27. mockUsersStore func() db.UsersStore
  28. mockTwoFactorsStore func() db.TwoFactorsStore
  29. mockAccessTokensStore func() db.AccessTokensStore
  30. expStatusCode int
  31. expHeader http.Header
  32. expBody string
  33. }{
  34. {
  35. name: "no authorization",
  36. expStatusCode: http.StatusUnauthorized,
  37. expHeader: http.Header{
  38. "Lfs-Authenticate": []string{`Basic realm="Git LFS"`},
  39. "Content-Type": []string{"application/vnd.git-lfs+json"},
  40. },
  41. expBody: `{"message":"Credentials needed"}` + "\n",
  42. },
  43. {
  44. name: "user has 2FA enabled",
  45. header: http.Header{
  46. "Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
  47. },
  48. mockUsersStore: func() db.UsersStore {
  49. mock := NewMockUsersStore()
  50. mock.AuthenticateFunc.SetDefaultReturn(&db.User{}, nil)
  51. return mock
  52. },
  53. mockTwoFactorsStore: func() db.TwoFactorsStore {
  54. mock := NewMockTwoFactorsStore()
  55. mock.IsUserEnabledFunc.SetDefaultReturn(true)
  56. return mock
  57. },
  58. expStatusCode: http.StatusBadRequest,
  59. expHeader: http.Header{},
  60. expBody: "Users with 2FA enabled are not allowed to authenticate via username and password.",
  61. },
  62. {
  63. name: "both user and access token do not exist",
  64. header: http.Header{
  65. "Authorization": []string{"Basic dXNlcm5hbWU="},
  66. },
  67. mockUsersStore: func() db.UsersStore {
  68. mock := NewMockUsersStore()
  69. mock.AuthenticateFunc.SetDefaultReturn(nil, auth.ErrBadCredentials{})
  70. return mock
  71. },
  72. mockAccessTokensStore: func() db.AccessTokensStore {
  73. mock := NewMockAccessTokensStore()
  74. mock.GetBySHA1Func.SetDefaultReturn(nil, db.ErrAccessTokenNotExist{})
  75. return mock
  76. },
  77. expStatusCode: http.StatusUnauthorized,
  78. expHeader: http.Header{
  79. "Lfs-Authenticate": []string{`Basic realm="Git LFS"`},
  80. "Content-Type": []string{"application/vnd.git-lfs+json"},
  81. },
  82. expBody: `{"message":"Credentials needed"}` + "\n",
  83. },
  84. {
  85. name: "authenticated by username and password",
  86. header: http.Header{
  87. "Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
  88. },
  89. mockUsersStore: func() db.UsersStore {
  90. mock := NewMockUsersStore()
  91. mock.AuthenticateFunc.SetDefaultReturn(&db.User{ID: 1, Name: "unknwon"}, nil)
  92. return mock
  93. },
  94. mockTwoFactorsStore: func() db.TwoFactorsStore {
  95. mock := NewMockTwoFactorsStore()
  96. mock.IsUserEnabledFunc.SetDefaultReturn(false)
  97. return mock
  98. },
  99. expStatusCode: http.StatusOK,
  100. expHeader: http.Header{},
  101. expBody: "ID: 1, Name: unknwon",
  102. },
  103. {
  104. name: "authenticate by access token",
  105. header: http.Header{
  106. "Authorization": []string{"Basic dXNlcm5hbWU="},
  107. },
  108. mockUsersStore: func() db.UsersStore {
  109. mock := NewMockUsersStore()
  110. mock.AuthenticateFunc.SetDefaultReturn(nil, auth.ErrBadCredentials{})
  111. mock.GetByIDFunc.SetDefaultReturn(&db.User{ID: 1, Name: "unknwon"}, nil)
  112. return mock
  113. },
  114. mockAccessTokensStore: func() db.AccessTokensStore {
  115. mock := NewMockAccessTokensStore()
  116. mock.GetBySHA1Func.SetDefaultReturn(&db.AccessToken{}, nil)
  117. return mock
  118. },
  119. expStatusCode: http.StatusOK,
  120. expHeader: http.Header{},
  121. expBody: "ID: 1, Name: unknwon",
  122. },
  123. }
  124. for _, test := range tests {
  125. t.Run(test.name, func(t *testing.T) {
  126. if test.mockUsersStore != nil {
  127. db.SetMockUsersStore(t, test.mockUsersStore())
  128. }
  129. if test.mockTwoFactorsStore != nil {
  130. db.SetMockTwoFactorsStore(t, test.mockTwoFactorsStore())
  131. }
  132. if test.mockAccessTokensStore != nil {
  133. db.SetMockAccessTokensStore(t, test.mockAccessTokensStore())
  134. }
  135. r, err := http.NewRequest("GET", "/", nil)
  136. if err != nil {
  137. t.Fatal(err)
  138. }
  139. r.Header = test.header
  140. rr := httptest.NewRecorder()
  141. m.ServeHTTP(rr, r)
  142. resp := rr.Result()
  143. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  144. assert.Equal(t, test.expHeader, resp.Header)
  145. body, err := ioutil.ReadAll(resp.Body)
  146. if err != nil {
  147. t.Fatal(err)
  148. }
  149. assert.Equal(t, test.expBody, string(body))
  150. })
  151. }
  152. }
  153. func Test_authorize(t *testing.T) {
  154. tests := []struct {
  155. name string
  156. authroize macaron.Handler
  157. mockUsersStore func() db.UsersStore
  158. mockReposStore func() db.ReposStore
  159. mockPermsStore func() db.PermsStore
  160. expStatusCode int
  161. expBody string
  162. }{
  163. {
  164. name: "user does not exist",
  165. authroize: authorize(db.AccessModeNone),
  166. mockUsersStore: func() db.UsersStore {
  167. mock := NewMockUsersStore()
  168. mock.GetByUsernameFunc.SetDefaultReturn(nil, db.ErrUserNotExist{})
  169. return mock
  170. },
  171. expStatusCode: http.StatusNotFound,
  172. },
  173. {
  174. name: "repository does not exist",
  175. authroize: authorize(db.AccessModeNone),
  176. mockUsersStore: func() db.UsersStore {
  177. mock := NewMockUsersStore()
  178. mock.GetByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*db.User, error) {
  179. return &db.User{Name: username}, nil
  180. })
  181. return mock
  182. },
  183. mockReposStore: func() db.ReposStore {
  184. mock := NewMockReposStore()
  185. mock.GetByNameFunc.SetDefaultReturn(nil, db.ErrRepoNotExist{})
  186. return mock
  187. },
  188. expStatusCode: http.StatusNotFound,
  189. },
  190. {
  191. name: "actor is not authorized",
  192. authroize: authorize(db.AccessModeWrite),
  193. mockUsersStore: func() db.UsersStore {
  194. mock := NewMockUsersStore()
  195. mock.GetByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*db.User, error) {
  196. return &db.User{Name: username}, nil
  197. })
  198. return mock
  199. },
  200. mockReposStore: func() db.ReposStore {
  201. mock := NewMockReposStore()
  202. mock.GetByNameFunc.SetDefaultHook(func(ctx context.Context, ownerID int64, name string) (*db.Repository, error) {
  203. return &db.Repository{Name: name}, nil
  204. })
  205. return mock
  206. },
  207. mockPermsStore: func() db.PermsStore {
  208. mock := NewMockPermsStore()
  209. mock.AuthorizeFunc.SetDefaultHook(func(ctx context.Context, userID int64, repoID int64, desired db.AccessMode, opts db.AccessModeOptions) bool {
  210. return desired <= db.AccessModeRead
  211. })
  212. return mock
  213. },
  214. expStatusCode: http.StatusNotFound,
  215. },
  216. {
  217. name: "actor is authorized",
  218. authroize: authorize(db.AccessModeRead),
  219. mockUsersStore: func() db.UsersStore {
  220. mock := NewMockUsersStore()
  221. mock.GetByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*db.User, error) {
  222. return &db.User{Name: username}, nil
  223. })
  224. return mock
  225. },
  226. mockReposStore: func() db.ReposStore {
  227. mock := NewMockReposStore()
  228. mock.GetByNameFunc.SetDefaultHook(func(ctx context.Context, ownerID int64, name string) (*db.Repository, error) {
  229. return &db.Repository{Name: name}, nil
  230. })
  231. return mock
  232. },
  233. mockPermsStore: func() db.PermsStore {
  234. mock := NewMockPermsStore()
  235. mock.AuthorizeFunc.SetDefaultHook(func(ctx context.Context, userID int64, repoID int64, desired db.AccessMode, opts db.AccessModeOptions) bool {
  236. return desired <= db.AccessModeRead
  237. })
  238. return mock
  239. },
  240. expStatusCode: http.StatusOK,
  241. expBody: "owner.Name: owner, repo.Name: repo",
  242. },
  243. }
  244. for _, test := range tests {
  245. t.Run(test.name, func(t *testing.T) {
  246. if test.mockUsersStore != nil {
  247. db.SetMockUsersStore(t, test.mockUsersStore())
  248. }
  249. if test.mockReposStore != nil {
  250. db.SetMockReposStore(t, test.mockReposStore())
  251. }
  252. if test.mockPermsStore != nil {
  253. db.SetMockPermsStore(t, test.mockPermsStore())
  254. }
  255. m := macaron.New()
  256. m.Use(macaron.Renderer())
  257. m.Use(func(c *macaron.Context) {
  258. c.Map(&db.User{})
  259. })
  260. m.Get("/:username/:reponame", test.authroize, func(w http.ResponseWriter, owner *db.User, repo *db.Repository) {
  261. fmt.Fprintf(w, "owner.Name: %s, repo.Name: %s", owner.Name, repo.Name)
  262. })
  263. r, err := http.NewRequest("GET", "/owner/repo", nil)
  264. if err != nil {
  265. t.Fatal(err)
  266. }
  267. rr := httptest.NewRecorder()
  268. m.ServeHTTP(rr, r)
  269. resp := rr.Result()
  270. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  271. body, err := ioutil.ReadAll(resp.Body)
  272. if err != nil {
  273. t.Fatal(err)
  274. }
  275. assert.Equal(t, test.expBody, string(body))
  276. })
  277. }
  278. }
  279. func Test_verifyHeader(t *testing.T) {
  280. tests := []struct {
  281. name string
  282. verifyHeader macaron.Handler
  283. header http.Header
  284. expStatusCode int
  285. }{
  286. {
  287. name: "header not found",
  288. verifyHeader: verifyHeader("Accept", contentType, http.StatusNotAcceptable),
  289. expStatusCode: http.StatusNotAcceptable,
  290. },
  291. {
  292. name: "header found",
  293. verifyHeader: verifyHeader("Accept", "application/vnd.git-lfs+json", http.StatusNotAcceptable),
  294. header: http.Header{
  295. "Accept": []string{"application/vnd.git-lfs+json; charset=utf-8"},
  296. },
  297. expStatusCode: http.StatusOK,
  298. },
  299. }
  300. for _, test := range tests {
  301. t.Run(test.name, func(t *testing.T) {
  302. m := macaron.New()
  303. m.Use(macaron.Renderer())
  304. m.Get("/", test.verifyHeader)
  305. r, err := http.NewRequest("GET", "/", nil)
  306. if err != nil {
  307. t.Fatal(err)
  308. }
  309. r.Header = test.header
  310. rr := httptest.NewRecorder()
  311. m.ServeHTTP(rr, r)
  312. resp := rr.Result()
  313. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  314. })
  315. }
  316. }
  317. func Test_verifyOID(t *testing.T) {
  318. m := macaron.New()
  319. m.Get("/:oid", verifyOID(), func(w http.ResponseWriter, oid lfsutil.OID) {
  320. fmt.Fprintf(w, "oid: %s", oid)
  321. })
  322. tests := []struct {
  323. name string
  324. url string
  325. expStatusCode int
  326. expBody string
  327. }{
  328. {
  329. name: "bad oid",
  330. url: "/bad_oid",
  331. expStatusCode: http.StatusBadRequest,
  332. expBody: `{"message":"Invalid oid"}` + "\n",
  333. },
  334. {
  335. name: "good oid",
  336. url: "/ef797c8118f02dfb649607dd5d3f8c7623048c9c063d532cc95c5ed7a898a64f",
  337. expStatusCode: http.StatusOK,
  338. expBody: "oid: ef797c8118f02dfb649607dd5d3f8c7623048c9c063d532cc95c5ed7a898a64f",
  339. },
  340. }
  341. for _, test := range tests {
  342. t.Run(test.name, func(t *testing.T) {
  343. r, err := http.NewRequest("GET", test.url, nil)
  344. if err != nil {
  345. t.Fatal(err)
  346. }
  347. rr := httptest.NewRecorder()
  348. m.ServeHTTP(rr, r)
  349. resp := rr.Result()
  350. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  351. body, err := ioutil.ReadAll(resp.Body)
  352. if err != nil {
  353. t.Fatal(err)
  354. }
  355. assert.Equal(t, test.expBody, string(body))
  356. })
  357. }
  358. }
  359. func Test_internalServerError(t *testing.T) {
  360. rr := httptest.NewRecorder()
  361. internalServerError(rr)
  362. resp := rr.Result()
  363. assert.Equal(t, http.StatusInternalServerError, resp.StatusCode)
  364. body, err := ioutil.ReadAll(resp.Body)
  365. if err != nil {
  366. t.Fatal(err)
  367. }
  368. assert.Equal(t, `{"message":"Internal server error"}`+"\n", string(body))
  369. }