route_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package lfs
  5. import (
  6. "context"
  7. "fmt"
  8. "io"
  9. "net/http"
  10. "net/http/httptest"
  11. "testing"
  12. "github.com/stretchr/testify/assert"
  13. "gopkg.in/macaron.v1"
  14. "gogs.io/gogs/internal/auth"
  15. "gogs.io/gogs/internal/database"
  16. "gogs.io/gogs/internal/lfsutil"
  17. )
  18. func TestAuthenticate(t *testing.T) {
  19. tests := []struct {
  20. name string
  21. header http.Header
  22. mockUsersStore func() database.UsersStore
  23. mockTwoFactorsStore func() database.TwoFactorsStore
  24. mockStore func() *MockStore
  25. expStatusCode int
  26. expHeader http.Header
  27. expBody string
  28. }{
  29. {
  30. name: "no authorization",
  31. expStatusCode: http.StatusUnauthorized,
  32. expHeader: http.Header{
  33. "Lfs-Authenticate": []string{`Basic realm="Git LFS"`},
  34. "Content-Type": []string{"application/vnd.git-lfs+json"},
  35. },
  36. expBody: `{"message":"Credentials needed"}` + "\n",
  37. },
  38. {
  39. name: "user has 2FA enabled",
  40. header: http.Header{
  41. "Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
  42. },
  43. mockUsersStore: func() database.UsersStore {
  44. mock := NewMockUsersStore()
  45. mock.AuthenticateFunc.SetDefaultReturn(&database.User{}, nil)
  46. return mock
  47. },
  48. mockTwoFactorsStore: func() database.TwoFactorsStore {
  49. mock := NewMockTwoFactorsStore()
  50. mock.IsEnabledFunc.SetDefaultReturn(true)
  51. return mock
  52. },
  53. expStatusCode: http.StatusBadRequest,
  54. expHeader: http.Header{},
  55. expBody: "Users with 2FA enabled are not allowed to authenticate via username and password.",
  56. },
  57. {
  58. name: "both user and access token do not exist",
  59. header: http.Header{
  60. "Authorization": []string{"Basic dXNlcm5hbWU="},
  61. },
  62. mockUsersStore: func() database.UsersStore {
  63. mock := NewMockUsersStore()
  64. mock.AuthenticateFunc.SetDefaultReturn(nil, auth.ErrBadCredentials{})
  65. return mock
  66. },
  67. mockStore: func() *MockStore {
  68. mockStore := NewMockStore()
  69. mockStore.GetAccessTokenBySHA1Func.SetDefaultReturn(nil, database.ErrAccessTokenNotExist{})
  70. return mockStore
  71. },
  72. expStatusCode: http.StatusUnauthorized,
  73. expHeader: http.Header{
  74. "Lfs-Authenticate": []string{`Basic realm="Git LFS"`},
  75. "Content-Type": []string{"application/vnd.git-lfs+json"},
  76. },
  77. expBody: `{"message":"Credentials needed"}` + "\n",
  78. },
  79. {
  80. name: "authenticated by username and password",
  81. header: http.Header{
  82. "Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
  83. },
  84. mockUsersStore: func() database.UsersStore {
  85. mock := NewMockUsersStore()
  86. mock.AuthenticateFunc.SetDefaultReturn(&database.User{ID: 1, Name: "unknwon"}, nil)
  87. return mock
  88. },
  89. mockTwoFactorsStore: func() database.TwoFactorsStore {
  90. mock := NewMockTwoFactorsStore()
  91. mock.IsEnabledFunc.SetDefaultReturn(false)
  92. return mock
  93. },
  94. expStatusCode: http.StatusOK,
  95. expHeader: http.Header{},
  96. expBody: "ID: 1, Name: unknwon",
  97. },
  98. {
  99. name: "authenticate by access token via username",
  100. header: http.Header{
  101. "Authorization": []string{"Basic dXNlcm5hbWU="},
  102. },
  103. mockUsersStore: func() database.UsersStore {
  104. mock := NewMockUsersStore()
  105. mock.AuthenticateFunc.SetDefaultReturn(nil, auth.ErrBadCredentials{})
  106. mock.GetByIDFunc.SetDefaultReturn(&database.User{ID: 1, Name: "unknwon"}, nil)
  107. return mock
  108. },
  109. mockStore: func() *MockStore {
  110. mockStore := NewMockStore()
  111. mockStore.GetAccessTokenBySHA1Func.SetDefaultReturn(&database.AccessToken{}, nil)
  112. return mockStore
  113. },
  114. expStatusCode: http.StatusOK,
  115. expHeader: http.Header{},
  116. expBody: "ID: 1, Name: unknwon",
  117. },
  118. {
  119. name: "authenticate by access token via password",
  120. header: http.Header{
  121. "Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
  122. },
  123. mockUsersStore: func() database.UsersStore {
  124. mock := NewMockUsersStore()
  125. mock.AuthenticateFunc.SetDefaultReturn(nil, auth.ErrBadCredentials{})
  126. mock.GetByIDFunc.SetDefaultReturn(&database.User{ID: 1, Name: "unknwon"}, nil)
  127. return mock
  128. },
  129. mockStore: func() *MockStore {
  130. mockStore := NewMockStore()
  131. mockStore.GetAccessTokenBySHA1Func.SetDefaultHook(func(_ context.Context, sha1 string) (*database.AccessToken, error) {
  132. if sha1 == "password" {
  133. return &database.AccessToken{}, nil
  134. }
  135. return nil, database.ErrAccessTokenNotExist{}
  136. })
  137. return mockStore
  138. },
  139. expStatusCode: http.StatusOK,
  140. expHeader: http.Header{},
  141. expBody: "ID: 1, Name: unknwon",
  142. },
  143. }
  144. for _, test := range tests {
  145. t.Run(test.name, func(t *testing.T) {
  146. if test.mockUsersStore != nil {
  147. database.SetMockUsersStore(t, test.mockUsersStore())
  148. }
  149. if test.mockTwoFactorsStore != nil {
  150. database.SetMockTwoFactorsStore(t, test.mockTwoFactorsStore())
  151. }
  152. if test.mockStore == nil {
  153. test.mockStore = NewMockStore
  154. }
  155. m := macaron.New()
  156. m.Use(macaron.Renderer())
  157. m.Get("/", authenticate(test.mockStore()), func(w http.ResponseWriter, user *database.User) {
  158. _, _ = fmt.Fprintf(w, "ID: %d, Name: %s", user.ID, user.Name)
  159. })
  160. r, err := http.NewRequest("GET", "/", nil)
  161. if err != nil {
  162. t.Fatal(err)
  163. }
  164. r.Header = test.header
  165. rr := httptest.NewRecorder()
  166. m.ServeHTTP(rr, r)
  167. resp := rr.Result()
  168. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  169. assert.Equal(t, test.expHeader, resp.Header)
  170. body, err := io.ReadAll(resp.Body)
  171. if err != nil {
  172. t.Fatal(err)
  173. }
  174. assert.Equal(t, test.expBody, string(body))
  175. })
  176. }
  177. }
  178. func TestAuthorize(t *testing.T) {
  179. tests := []struct {
  180. name string
  181. accessMode database.AccessMode
  182. mockUsersStore func() database.UsersStore
  183. mockStore func() *MockStore
  184. expStatusCode int
  185. expBody string
  186. }{
  187. {
  188. name: "user does not exist",
  189. accessMode: database.AccessModeNone,
  190. mockUsersStore: func() database.UsersStore {
  191. mock := NewMockUsersStore()
  192. mock.GetByUsernameFunc.SetDefaultReturn(nil, database.ErrUserNotExist{})
  193. return mock
  194. },
  195. expStatusCode: http.StatusNotFound,
  196. },
  197. {
  198. name: "repository does not exist",
  199. accessMode: database.AccessModeNone,
  200. mockUsersStore: func() database.UsersStore {
  201. mock := NewMockUsersStore()
  202. mock.GetByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*database.User, error) {
  203. return &database.User{Name: username}, nil
  204. })
  205. return mock
  206. },
  207. mockStore: func() *MockStore {
  208. mockStore := NewMockStore()
  209. mockStore.GetRepositoryByNameFunc.SetDefaultReturn(nil, database.ErrRepoNotExist{})
  210. return mockStore
  211. },
  212. expStatusCode: http.StatusNotFound,
  213. },
  214. {
  215. name: "actor is not authorized",
  216. accessMode: database.AccessModeWrite,
  217. mockUsersStore: func() database.UsersStore {
  218. mock := NewMockUsersStore()
  219. mock.GetByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*database.User, error) {
  220. return &database.User{Name: username}, nil
  221. })
  222. return mock
  223. },
  224. mockStore: func() *MockStore {
  225. mockStore := NewMockStore()
  226. mockStore.AuthorizeRepositoryAccessFunc.SetDefaultHook(func(_ context.Context, _ int64, _ int64, desired database.AccessMode, _ database.AccessModeOptions) bool {
  227. return desired <= database.AccessModeRead
  228. })
  229. mockStore.GetRepositoryByNameFunc.SetDefaultHook(func(ctx context.Context, ownerID int64, name string) (*database.Repository, error) {
  230. return &database.Repository{Name: name}, nil
  231. })
  232. return mockStore
  233. },
  234. expStatusCode: http.StatusNotFound,
  235. },
  236. {
  237. name: "actor is authorized",
  238. accessMode: database.AccessModeRead,
  239. mockUsersStore: func() database.UsersStore {
  240. mock := NewMockUsersStore()
  241. mock.GetByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*database.User, error) {
  242. return &database.User{Name: username}, nil
  243. })
  244. return mock
  245. },
  246. mockStore: func() *MockStore {
  247. mockStore := NewMockStore()
  248. mockStore.AuthorizeRepositoryAccessFunc.SetDefaultHook(func(_ context.Context, _ int64, _ int64, desired database.AccessMode, _ database.AccessModeOptions) bool {
  249. return desired <= database.AccessModeRead
  250. })
  251. mockStore.GetRepositoryByNameFunc.SetDefaultHook(func(ctx context.Context, ownerID int64, name string) (*database.Repository, error) {
  252. return &database.Repository{Name: name}, nil
  253. })
  254. return mockStore
  255. },
  256. expStatusCode: http.StatusOK,
  257. expBody: "owner.Name: owner, repo.Name: repo",
  258. },
  259. }
  260. for _, test := range tests {
  261. t.Run(test.name, func(t *testing.T) {
  262. if test.mockUsersStore != nil {
  263. database.SetMockUsersStore(t, test.mockUsersStore())
  264. }
  265. mockStore := NewMockStore()
  266. if test.mockStore != nil {
  267. mockStore = test.mockStore()
  268. }
  269. m := macaron.New()
  270. m.Use(macaron.Renderer())
  271. m.Use(func(c *macaron.Context) {
  272. c.Map(&database.User{})
  273. })
  274. m.Get(
  275. "/:username/:reponame",
  276. authorize(mockStore, test.accessMode),
  277. func(w http.ResponseWriter, owner *database.User, repo *database.Repository) {
  278. _, _ = fmt.Fprintf(w, "owner.Name: %s, repo.Name: %s", owner.Name, repo.Name)
  279. },
  280. )
  281. r, err := http.NewRequest("GET", "/owner/repo", nil)
  282. if err != nil {
  283. t.Fatal(err)
  284. }
  285. rr := httptest.NewRecorder()
  286. m.ServeHTTP(rr, r)
  287. resp := rr.Result()
  288. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  289. body, err := io.ReadAll(resp.Body)
  290. if err != nil {
  291. t.Fatal(err)
  292. }
  293. assert.Equal(t, test.expBody, string(body))
  294. })
  295. }
  296. }
  297. func Test_verifyHeader(t *testing.T) {
  298. tests := []struct {
  299. name string
  300. verifyHeader macaron.Handler
  301. header http.Header
  302. expStatusCode int
  303. }{
  304. {
  305. name: "header not found",
  306. verifyHeader: verifyHeader("Accept", contentType, http.StatusNotAcceptable),
  307. expStatusCode: http.StatusNotAcceptable,
  308. },
  309. {
  310. name: "header found",
  311. verifyHeader: verifyHeader("Accept", "application/vnd.git-lfs+json", http.StatusNotAcceptable),
  312. header: http.Header{
  313. "Accept": []string{"application/vnd.git-lfs+json; charset=utf-8"},
  314. },
  315. expStatusCode: http.StatusOK,
  316. },
  317. }
  318. for _, test := range tests {
  319. t.Run(test.name, func(t *testing.T) {
  320. m := macaron.New()
  321. m.Use(macaron.Renderer())
  322. m.Get("/", test.verifyHeader)
  323. r, err := http.NewRequest("GET", "/", nil)
  324. if err != nil {
  325. t.Fatal(err)
  326. }
  327. r.Header = test.header
  328. rr := httptest.NewRecorder()
  329. m.ServeHTTP(rr, r)
  330. resp := rr.Result()
  331. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  332. })
  333. }
  334. }
  335. func Test_verifyOID(t *testing.T) {
  336. m := macaron.New()
  337. m.Get("/:oid", verifyOID(), func(w http.ResponseWriter, oid lfsutil.OID) {
  338. fmt.Fprintf(w, "oid: %s", oid)
  339. })
  340. tests := []struct {
  341. name string
  342. url string
  343. expStatusCode int
  344. expBody string
  345. }{
  346. {
  347. name: "bad oid",
  348. url: "/bad_oid",
  349. expStatusCode: http.StatusBadRequest,
  350. expBody: `{"message":"Invalid oid"}` + "\n",
  351. },
  352. {
  353. name: "good oid",
  354. url: "/ef797c8118f02dfb649607dd5d3f8c7623048c9c063d532cc95c5ed7a898a64f",
  355. expStatusCode: http.StatusOK,
  356. expBody: "oid: ef797c8118f02dfb649607dd5d3f8c7623048c9c063d532cc95c5ed7a898a64f",
  357. },
  358. }
  359. for _, test := range tests {
  360. t.Run(test.name, func(t *testing.T) {
  361. r, err := http.NewRequest("GET", test.url, nil)
  362. if err != nil {
  363. t.Fatal(err)
  364. }
  365. rr := httptest.NewRecorder()
  366. m.ServeHTTP(rr, r)
  367. resp := rr.Result()
  368. assert.Equal(t, test.expStatusCode, resp.StatusCode)
  369. body, err := io.ReadAll(resp.Body)
  370. if err != nil {
  371. t.Fatal(err)
  372. }
  373. assert.Equal(t, test.expBody, string(body))
  374. })
  375. }
  376. }
  377. func Test_internalServerError(t *testing.T) {
  378. rr := httptest.NewRecorder()
  379. internalServerError(rr)
  380. resp := rr.Result()
  381. assert.Equal(t, http.StatusInternalServerError, resp.StatusCode)
  382. body, err := io.ReadAll(resp.Body)
  383. if err != nil {
  384. t.Fatal(err)
  385. }
  386. assert.Equal(t, `{"message":"Internal server error"}`+"\n", string(body))
  387. }