route_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package lfs
  5. import (
  6. "context"
  7. "fmt"
  8. "io"
  9. "net/http"
  10. "net/http/httptest"
  11. "testing"
  12. "github.com/stretchr/testify/assert"
  13. "gopkg.in/macaron.v1"
  14. "gogs.io/gogs/internal/auth"
  15. "gogs.io/gogs/internal/database"
  16. "gogs.io/gogs/internal/lfsutil"
  17. )
  18. func TestAuthenticate(t *testing.T) {
  19. tests := []struct {
  20. name string
  21. header http.Header
  22. mockStore func() *MockStore
  23. expStatusCode int
  24. expHeader http.Header
  25. expBody string
  26. }{
  27. {
  28. name: "no authorization",
  29. expStatusCode: http.StatusUnauthorized,
  30. expHeader: http.Header{
  31. "Lfs-Authenticate": []string{`Basic realm="Git LFS"`},
  32. "Content-Type": []string{"application/vnd.git-lfs+json"},
  33. },
  34. expBody: `{"message":"Credentials needed"}` + "\n",
  35. },
  36. {
  37. name: "user has 2FA enabled",
  38. header: http.Header{
  39. "Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
  40. },
  41. mockStore: func() *MockStore {
  42. mockStore := NewMockStore()
  43. mockStore.IsTwoFactorEnabledFunc.SetDefaultReturn(true)
  44. mockStore.AuthenticateUserFunc.SetDefaultReturn(&database.User{}, nil)
  45. return mockStore
  46. },
  47. expStatusCode: http.StatusBadRequest,
  48. expHeader: http.Header{},
  49. expBody: "Users with 2FA enabled are not allowed to authenticate via username and password.",
  50. },
  51. {
  52. name: "both user and access token do not exist",
  53. header: http.Header{
  54. "Authorization": []string{"Basic dXNlcm5hbWU="},
  55. },
  56. mockStore: func() *MockStore {
  57. mockStore := NewMockStore()
  58. mockStore.GetAccessTokenBySHA1Func.SetDefaultReturn(nil, database.ErrAccessTokenNotExist{})
  59. mockStore.AuthenticateUserFunc.SetDefaultReturn(nil, auth.ErrBadCredentials{})
  60. return mockStore
  61. },
  62. expStatusCode: http.StatusUnauthorized,
  63. expHeader: http.Header{
  64. "Lfs-Authenticate": []string{`Basic realm="Git LFS"`},
  65. "Content-Type": []string{"application/vnd.git-lfs+json"},
  66. },
  67. expBody: `{"message":"Credentials needed"}` + "\n",
  68. },
  69. {
  70. name: "authenticated by username and password",
  71. header: http.Header{
  72. "Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
  73. },
  74. mockStore: func() *MockStore {
  75. mockStore := NewMockStore()
  76. mockStore.IsTwoFactorEnabledFunc.SetDefaultReturn(false)
  77. mockStore.AuthenticateUserFunc.SetDefaultReturn(&database.User{ID: 1, Name: "unknwon"}, nil)
  78. return mockStore
  79. },
  80. expStatusCode: http.StatusOK,
  81. expHeader: http.Header{},
  82. expBody: "ID: 1, Name: unknwon",
  83. },
  84. {
  85. name: "authenticate by access token via username",
  86. header: http.Header{
  87. "Authorization": []string{"Basic dXNlcm5hbWU="},
  88. },
  89. mockStore: func() *MockStore {
  90. mockStore := NewMockStore()
  91. mockStore.GetAccessTokenBySHA1Func.SetDefaultReturn(&database.AccessToken{}, nil)
  92. mockStore.AuthenticateUserFunc.SetDefaultReturn(nil, auth.ErrBadCredentials{})
  93. mockStore.GetUserByIDFunc.SetDefaultReturn(&database.User{ID: 1, Name: "unknwon"}, nil)
  94. return mockStore
  95. },
  96. expStatusCode: http.StatusOK,
  97. expHeader: http.Header{},
  98. expBody: "ID: 1, Name: unknwon",
  99. },
  100. {
  101. name: "authenticate by access token via password",
  102. header: http.Header{
  103. "Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
  104. },
  105. mockStore: func() *MockStore {
  106. mockStore := NewMockStore()
  107. mockStore.GetAccessTokenBySHA1Func.SetDefaultHook(func(_ context.Context, sha1 string) (*database.AccessToken, error) {
  108. if sha1 == "password" {
  109. return &database.AccessToken{}, nil
  110. }
  111. return nil, database.ErrAccessTokenNotExist{}
  112. })
  113. mockStore.AuthenticateUserFunc.SetDefaultReturn(nil, auth.ErrBadCredentials{})
  114. mockStore.GetUserByIDFunc.SetDefaultReturn(&database.User{ID: 1, Name: "unknwon"}, nil)
  115. return mockStore
  116. },
  117. expStatusCode: http.StatusOK,
  118. expHeader: http.Header{},
  119. expBody: "ID: 1, Name: unknwon",
  120. },
  121. }
  122. for _, test := range tests {
  123. t.Run(test.name, func(t *testing.T) {
  124. if test.mockStore == nil {
  125. test.mockStore = NewMockStore
  126. }
  127. m := macaron.New()
  128. m.Use(macaron.Renderer())
  129. m.Get("/", authenticate(test.mockStore()), func(w http.ResponseWriter, user *database.User) {
  130. _, _ = fmt.Fprintf(w, "ID: %d, Name: %s", user.ID, user.Name)
  131. })
  132. r, err := http.NewRequest("GET", "/", nil)
  133. if err != nil {
  134. t.Fatal(err)
  135. }
  136. r.Header = test.header
  137. rr := httptest.NewRecorder()
  138. m.ServeHTTP(rr, r)
  139. resp := rr.Result()
  140. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  141. assert.Equal(t, test.expHeader, resp.Header)
  142. body, err := io.ReadAll(resp.Body)
  143. if err != nil {
  144. t.Fatal(err)
  145. }
  146. assert.Equal(t, test.expBody, string(body))
  147. })
  148. }
  149. }
  150. func TestAuthorize(t *testing.T) {
  151. tests := []struct {
  152. name string
  153. accessMode database.AccessMode
  154. mockStore func() *MockStore
  155. expStatusCode int
  156. expBody string
  157. }{
  158. {
  159. name: "user does not exist",
  160. accessMode: database.AccessModeNone,
  161. mockStore: func() *MockStore {
  162. mockStore := NewMockStore()
  163. mockStore.GetUserByUsernameFunc.SetDefaultReturn(nil, database.ErrUserNotExist{})
  164. return mockStore
  165. },
  166. expStatusCode: http.StatusNotFound,
  167. },
  168. {
  169. name: "repository does not exist",
  170. accessMode: database.AccessModeNone,
  171. mockStore: func() *MockStore {
  172. mockStore := NewMockStore()
  173. mockStore.GetRepositoryByNameFunc.SetDefaultReturn(nil, database.ErrRepoNotExist{})
  174. mockStore.GetUserByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*database.User, error) {
  175. return &database.User{Name: username}, nil
  176. })
  177. return mockStore
  178. },
  179. expStatusCode: http.StatusNotFound,
  180. },
  181. {
  182. name: "actor is not authorized",
  183. accessMode: database.AccessModeWrite,
  184. mockStore: func() *MockStore {
  185. mockStore := NewMockStore()
  186. mockStore.AuthorizeRepositoryAccessFunc.SetDefaultHook(func(_ context.Context, _ int64, _ int64, desired database.AccessMode, _ database.AccessModeOptions) bool {
  187. return desired <= database.AccessModeRead
  188. })
  189. mockStore.GetRepositoryByNameFunc.SetDefaultHook(func(ctx context.Context, ownerID int64, name string) (*database.Repository, error) {
  190. return &database.Repository{Name: name}, nil
  191. })
  192. mockStore.GetUserByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*database.User, error) {
  193. return &database.User{Name: username}, nil
  194. })
  195. return mockStore
  196. },
  197. expStatusCode: http.StatusNotFound,
  198. },
  199. {
  200. name: "actor is authorized",
  201. accessMode: database.AccessModeRead,
  202. mockStore: func() *MockStore {
  203. mockStore := NewMockStore()
  204. mockStore.AuthorizeRepositoryAccessFunc.SetDefaultHook(func(_ context.Context, _ int64, _ int64, desired database.AccessMode, _ database.AccessModeOptions) bool {
  205. return desired <= database.AccessModeRead
  206. })
  207. mockStore.GetRepositoryByNameFunc.SetDefaultHook(func(ctx context.Context, ownerID int64, name string) (*database.Repository, error) {
  208. return &database.Repository{Name: name}, nil
  209. })
  210. mockStore.GetUserByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*database.User, error) {
  211. return &database.User{Name: username}, nil
  212. })
  213. return mockStore
  214. },
  215. expStatusCode: http.StatusOK,
  216. expBody: "owner.Name: owner, repo.Name: repo",
  217. },
  218. }
  219. for _, test := range tests {
  220. t.Run(test.name, func(t *testing.T) {
  221. mockStore := NewMockStore()
  222. if test.mockStore != nil {
  223. mockStore = test.mockStore()
  224. }
  225. m := macaron.New()
  226. m.Use(macaron.Renderer())
  227. m.Use(func(c *macaron.Context) {
  228. c.Map(&database.User{})
  229. })
  230. m.Get(
  231. "/:username/:reponame",
  232. authorize(mockStore, test.accessMode),
  233. func(w http.ResponseWriter, owner *database.User, repo *database.Repository) {
  234. _, _ = fmt.Fprintf(w, "owner.Name: %s, repo.Name: %s", owner.Name, repo.Name)
  235. },
  236. )
  237. r, err := http.NewRequest("GET", "/owner/repo", nil)
  238. if err != nil {
  239. t.Fatal(err)
  240. }
  241. rr := httptest.NewRecorder()
  242. m.ServeHTTP(rr, r)
  243. resp := rr.Result()
  244. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  245. body, err := io.ReadAll(resp.Body)
  246. if err != nil {
  247. t.Fatal(err)
  248. }
  249. assert.Equal(t, test.expBody, string(body))
  250. })
  251. }
  252. }
  253. func Test_verifyHeader(t *testing.T) {
  254. tests := []struct {
  255. name string
  256. verifyHeader macaron.Handler
  257. header http.Header
  258. expStatusCode int
  259. }{
  260. {
  261. name: "header not found",
  262. verifyHeader: verifyHeader("Accept", contentType, http.StatusNotAcceptable),
  263. expStatusCode: http.StatusNotAcceptable,
  264. },
  265. {
  266. name: "header found",
  267. verifyHeader: verifyHeader("Accept", "application/vnd.git-lfs+json", http.StatusNotAcceptable),
  268. header: http.Header{
  269. "Accept": []string{"application/vnd.git-lfs+json; charset=utf-8"},
  270. },
  271. expStatusCode: http.StatusOK,
  272. },
  273. }
  274. for _, test := range tests {
  275. t.Run(test.name, func(t *testing.T) {
  276. m := macaron.New()
  277. m.Use(macaron.Renderer())
  278. m.Get("/", test.verifyHeader)
  279. r, err := http.NewRequest("GET", "/", nil)
  280. if err != nil {
  281. t.Fatal(err)
  282. }
  283. r.Header = test.header
  284. rr := httptest.NewRecorder()
  285. m.ServeHTTP(rr, r)
  286. resp := rr.Result()
  287. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  288. })
  289. }
  290. }
  291. func Test_verifyOID(t *testing.T) {
  292. m := macaron.New()
  293. m.Get("/:oid", verifyOID(), func(w http.ResponseWriter, oid lfsutil.OID) {
  294. fmt.Fprintf(w, "oid: %s", oid)
  295. })
  296. tests := []struct {
  297. name string
  298. url string
  299. expStatusCode int
  300. expBody string
  301. }{
  302. {
  303. name: "bad oid",
  304. url: "/bad_oid",
  305. expStatusCode: http.StatusBadRequest,
  306. expBody: `{"message":"Invalid oid"}` + "\n",
  307. },
  308. {
  309. name: "good oid",
  310. url: "/ef797c8118f02dfb649607dd5d3f8c7623048c9c063d532cc95c5ed7a898a64f",
  311. expStatusCode: http.StatusOK,
  312. expBody: "oid: ef797c8118f02dfb649607dd5d3f8c7623048c9c063d532cc95c5ed7a898a64f",
  313. },
  314. }
  315. for _, test := range tests {
  316. t.Run(test.name, func(t *testing.T) {
  317. r, err := http.NewRequest("GET", test.url, nil)
  318. if err != nil {
  319. t.Fatal(err)
  320. }
  321. rr := httptest.NewRecorder()
  322. m.ServeHTTP(rr, r)
  323. resp := rr.Result()
  324. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  325. body, err := io.ReadAll(resp.Body)
  326. if err != nil {
  327. t.Fatal(err)
  328. }
  329. assert.Equal(t, test.expBody, string(body))
  330. })
  331. }
  332. }
  333. func Test_internalServerError(t *testing.T) {
  334. rr := httptest.NewRecorder()
  335. internalServerError(rr)
  336. resp := rr.Result()
  337. assert.Equal(t, http.StatusInternalServerError, resp.StatusCode)
  338. body, err := io.ReadAll(resp.Body)
  339. if err != nil {
  340. t.Fatal(err)
  341. }
  342. assert.Equal(t, `{"message":"Internal server error"}`+"\n", string(body))
  343. }