gitlab-ce/spec/requests/api/doorkeeper_access_spec.rb

117 lines
3.4 KiB
Ruby

# frozen_string_literal: true
require 'spec_helper'
RSpec.describe 'doorkeeper access', feature_category: :system_access do
let_it_be(:organization) { create(:organization) }
let_it_be_with_reload(:user) { create(:user) }
let!(:application) { Doorkeeper::Application.create!(name: "MyApp", redirect_uri: "https://app.com", owner: user) }
let!(:token) { Doorkeeper::AccessToken.create! application_id: application.id, resource_owner_id: user.id, scopes: "api", organization_id: organization.id }
describe 'access token with composite identity scope', :request_store do
let!(:scopes) { "user:#{scope_user.id} api" }
let!(:scoped_token) { OauthAccessToken.create!(application_id: application.id, user: user, scopes: scopes, organization_id: organization.id) }
let(:scope_user) { create(:user) }
let(:group) { create(:group, :private) }
context 'when user one has a composite identity token scoped to user two' do
before do
user.update!(composite_identity_enforced: true, user_type: :service_account)
group.add_developer(user) # user one has access, user two doesn't have access
end
it 'restricts user access permissions' do
get api("/groups/#{group.id}"), params: { access_token: scoped_token.plaintext_token }
expect(response).to have_gitlab_http_status(:not_found)
end
context 'when both users have access to a resource' do
before do
group.add_developer(scope_user)
end
it 'allows access' do
get api("/groups/#{group.id}"), params: { access_token: scoped_token.plaintext_token }
expect(response).to have_gitlab_http_status(:ok)
end
end
end
end
describe "unauthenticated" do
it "returns authentication success" do
get api("/user"), params: { access_token: token.plaintext_token }
expect(response).to have_gitlab_http_status(:ok)
end
include_examples 'user login request with unique ip limit' do
def gitlab_request
get api('/user'), params: { access_token: token.plaintext_token }
end
end
end
describe "when token invalid" do
it "returns authentication error" do
get api("/user"), params: { access_token: "123a" }
expect(response).to have_gitlab_http_status(:unauthorized)
end
end
describe "authorization by OAuth token" do
it "returns authentication success" do
get api("/user", user)
expect(response).to have_gitlab_http_status(:ok)
end
include_examples 'user login request with unique ip limit' do
def gitlab_request
get api('/user', user)
end
end
end
shared_examples 'forbidden request' do
it 'returns 403 response' do
get api("/user"), params: { access_token: token.plaintext_token }
expect(response).to have_gitlab_http_status(:forbidden)
end
end
context "when user is blocked" do
before do
user.block
end
it_behaves_like 'forbidden request'
end
context "when user is ldap_blocked" do
before do
user.ldap_block
end
it_behaves_like 'forbidden request'
end
context "when user is deactivated" do
before do
user.deactivate
end
it_behaves_like 'forbidden request'
end
context 'when user is blocked pending approval' do
before do
user.block_pending_approval
end
it_behaves_like 'forbidden request'
end
end