789 lines
		
	
	
		
			26 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			789 lines
		
	
	
		
			26 KiB
		
	
	
	
		
			Ruby
		
	
	
	
| require 'spec_helper'
 | |
| 
 | |
| describe Gitlab::GitAccess do
 | |
|   set(:user) { create(:user) }
 | |
| 
 | |
|   let(:actor) { user }
 | |
|   let(:project) { create(:project, :repository) }
 | |
|   let(:protocol) { 'ssh' }
 | |
|   let(:authentication_abilities) { %i[read_project download_code push_code] }
 | |
|   let(:redirected_path) { nil }
 | |
| 
 | |
|   let(:access) { described_class.new(actor, project, protocol, authentication_abilities: authentication_abilities, redirected_path: redirected_path) }
 | |
|   let(:push_access_check) { access.check('git-receive-pack', '_any') }
 | |
|   let(:pull_access_check) { access.check('git-upload-pack', '_any') }
 | |
| 
 | |
|   describe '#check with single protocols allowed' do
 | |
|     def disable_protocol(protocol)
 | |
|       allow(Gitlab::ProtocolAccess).to receive(:allowed?).with(protocol).and_return(false)
 | |
|     end
 | |
| 
 | |
|     context 'ssh disabled' do
 | |
|       before do
 | |
|         disable_protocol('ssh')
 | |
|       end
 | |
| 
 | |
|       it 'blocks ssh git push and pull' do
 | |
|         aggregate_failures do
 | |
|           expect { push_access_check }.to raise_unauthorized('Git access over SSH is not allowed')
 | |
|           expect { pull_access_check }.to raise_unauthorized('Git access over SSH is not allowed')
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'http disabled' do
 | |
|       let(:protocol) { 'http' }
 | |
| 
 | |
|       before do
 | |
|         disable_protocol('http')
 | |
|       end
 | |
| 
 | |
|       it 'blocks http push and pull' do
 | |
|         aggregate_failures do
 | |
|           expect { push_access_check }.to raise_unauthorized('Git access over HTTP is not allowed')
 | |
|           expect { pull_access_check }.to raise_unauthorized('Git access over HTTP is not allowed')
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '#check_project_accessibility!' do
 | |
|     context 'when the project exists' do
 | |
|       context 'when actor exists' do
 | |
|         context 'when actor is a DeployKey' do
 | |
|           let(:deploy_key) { create(:deploy_key, user: user) }
 | |
|           let(:actor) { deploy_key }
 | |
| 
 | |
|           context 'when the DeployKey has access to the project' do
 | |
|             before do
 | |
|               deploy_key.deploy_keys_projects.create(project: project, can_push: true)
 | |
|             end
 | |
| 
 | |
|             it 'allows push and pull access' do
 | |
|               aggregate_failures do
 | |
|                 expect { push_access_check }.not_to raise_error
 | |
|                 expect { pull_access_check }.not_to raise_error
 | |
|               end
 | |
|             end
 | |
|           end
 | |
| 
 | |
|           context 'when the Deploykey does not have access to the project' do
 | |
|             it 'blocks push and pull with "not found"' do
 | |
|               aggregate_failures do
 | |
|                 expect { push_access_check }.to raise_not_found
 | |
|                 expect { pull_access_check }.to raise_not_found
 | |
|               end
 | |
|             end
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'when actor is a User' do
 | |
|           context 'when the User can read the project' do
 | |
|             before do
 | |
|               project.add_master(user)
 | |
|             end
 | |
| 
 | |
|             it 'allows push and pull access' do
 | |
|               aggregate_failures do
 | |
|                 expect { pull_access_check }.not_to raise_error
 | |
|                 expect { push_access_check }.not_to raise_error
 | |
|               end
 | |
|             end
 | |
|           end
 | |
| 
 | |
|           context 'when the User cannot read the project' do
 | |
|             it 'blocks push and pull with "not found"' do
 | |
|               aggregate_failures do
 | |
|                 expect { push_access_check }.to raise_not_found
 | |
|                 expect { pull_access_check }.to raise_not_found
 | |
|               end
 | |
|             end
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         # For backwards compatibility
 | |
|         context 'when actor is :ci' do
 | |
|           let(:actor) { :ci }
 | |
|           let(:authentication_abilities) { build_authentication_abilities }
 | |
| 
 | |
|           it 'allows pull access' do
 | |
|             expect { pull_access_check }.not_to raise_error
 | |
|           end
 | |
| 
 | |
|           it 'does not block pushes with "not found"' do
 | |
|             expect { push_access_check }.to raise_unauthorized(described_class::ERROR_MESSAGES[:upload])
 | |
|           end
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when actor is nil' do
 | |
|         let(:actor) { nil }
 | |
| 
 | |
|         context 'when guests can read the project' do
 | |
|           let(:project) { create(:project, :repository, :public) }
 | |
| 
 | |
|           it 'allows pull access' do
 | |
|             expect { pull_access_check }.not_to raise_error
 | |
|           end
 | |
| 
 | |
|           it 'does not block pushes with "not found"' do
 | |
|             expect { push_access_check }.to raise_unauthorized(described_class::ERROR_MESSAGES[:upload])
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'when guests cannot read the project' do
 | |
|           it 'blocks pulls with "not found"' do
 | |
|             expect { pull_access_check }.to raise_not_found
 | |
|           end
 | |
| 
 | |
|           it 'blocks pushes with "not found"' do
 | |
|             expect { push_access_check }.to raise_not_found
 | |
|           end
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the project is nil' do
 | |
|       let(:project) { nil }
 | |
| 
 | |
|       it 'blocks push and pull with "not found"' do
 | |
|         aggregate_failures do
 | |
|           expect { pull_access_check }.to raise_not_found
 | |
|           expect { push_access_check }.to raise_not_found
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   shared_examples '#check with a key that is not valid' do
 | |
|     before do
 | |
|       project.add_master(user)
 | |
|     end
 | |
| 
 | |
|     context 'key is too small' do
 | |
|       before do
 | |
|         stub_application_setting(rsa_key_restriction: 4096)
 | |
|       end
 | |
| 
 | |
|       it 'does not allow keys which are too small', :aggregate_failures do
 | |
|         expect(actor).not_to be_valid
 | |
|         expect { pull_access_check }.to raise_unauthorized('Your SSH key must be at least 4096 bits.')
 | |
|         expect { push_access_check }.to raise_unauthorized('Your SSH key must be at least 4096 bits.')
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'key type is not allowed' do
 | |
|       before do
 | |
|         stub_application_setting(rsa_key_restriction: ApplicationSetting::FORBIDDEN_KEY_VALUE)
 | |
|       end
 | |
| 
 | |
|       it 'does not allow keys which are too small', :aggregate_failures do
 | |
|         expect(actor).not_to be_valid
 | |
|         expect { pull_access_check }.to raise_unauthorized(/Your SSH key type is forbidden/)
 | |
|         expect { push_access_check }.to raise_unauthorized(/Your SSH key type is forbidden/)
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   it_behaves_like '#check with a key that is not valid' do
 | |
|     let(:actor) { build(:rsa_key_2048, user: user) }
 | |
|   end
 | |
| 
 | |
|   it_behaves_like '#check with a key that is not valid' do
 | |
|     let(:actor) { build(:rsa_deploy_key_2048, user: user) }
 | |
|   end
 | |
| 
 | |
|   shared_examples 'check_project_moved' do
 | |
|     it 'enqueues a redirected message' do
 | |
|       push_access_check
 | |
| 
 | |
|       expect(Gitlab::Checks::ProjectMoved.fetch_redirect_message(user.id, project.id)).not_to be_nil
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '#check_project_moved!', :clean_gitlab_redis_shared_state do
 | |
|     before do
 | |
|       project.add_master(user)
 | |
|     end
 | |
| 
 | |
|     context 'when a redirect was not followed to find the project' do
 | |
|       it 'allows push and pull access' do
 | |
|         aggregate_failures do
 | |
|           expect { push_access_check }.not_to raise_error
 | |
|           expect { pull_access_check }.not_to raise_error
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when a permanent redirect and ssh protocol' do
 | |
|       let(:redirected_path) { 'some/other-path' }
 | |
| 
 | |
|       before do
 | |
|         allow_any_instance_of(Gitlab::Checks::ProjectMoved).to receive(:permanent_redirect?).and_return(true)
 | |
|       end
 | |
| 
 | |
|       it 'allows push and pull access' do
 | |
|         aggregate_failures do
 | |
|           expect { push_access_check }.not_to raise_error
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       it_behaves_like 'check_project_moved'
 | |
|     end
 | |
| 
 | |
|     context 'with a permanent redirect and http protocol' do
 | |
|       let(:redirected_path) { 'some/other-path' }
 | |
|       let(:protocol) { 'http' }
 | |
| 
 | |
|       before do
 | |
|         allow_any_instance_of(Gitlab::Checks::ProjectMoved).to receive(:permanent_redirect?).and_return(true)
 | |
|       end
 | |
| 
 | |
|       it 'allows_push and pull access' do
 | |
|         aggregate_failures do
 | |
|           expect { push_access_check }.not_to raise_error
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       it_behaves_like 'check_project_moved'
 | |
|     end
 | |
| 
 | |
|     context 'with a temporal redirect and ssh protocol' do
 | |
|       let(:redirected_path) { 'some/other-path' }
 | |
| 
 | |
|       it 'blocks push and pull access' do
 | |
|         aggregate_failures do
 | |
|           expect { push_access_check }.to raise_error(described_class::ProjectMovedError, /Project '#{redirected_path}' was moved to '#{project.full_path}'/)
 | |
|           expect { push_access_check }.to raise_error(described_class::ProjectMovedError, /git remote set-url origin #{project.ssh_url_to_repo}/)
 | |
| 
 | |
|           expect { pull_access_check }.to raise_error(described_class::ProjectMovedError, /Project '#{redirected_path}' was moved to '#{project.full_path}'/)
 | |
|           expect { pull_access_check }.to raise_error(described_class::ProjectMovedError, /git remote set-url origin #{project.ssh_url_to_repo}/)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'with a temporal redirect and http protocol' do
 | |
|       let(:redirected_path) { 'some/other-path' }
 | |
|       let(:protocol) { 'http' }
 | |
| 
 | |
|       it 'does not allow to push and pull access' do
 | |
|         expect { push_access_check }.to raise_error(described_class::ProjectMovedError, /git remote set-url origin #{project.http_url_to_repo}/)
 | |
|         expect { pull_access_check }.to raise_error(described_class::ProjectMovedError, /git remote set-url origin #{project.http_url_to_repo}/)
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '#check_command_disabled!' do
 | |
|     before do
 | |
|       project.add_master(user)
 | |
|     end
 | |
| 
 | |
|     context 'over http' do
 | |
|       let(:protocol) { 'http' }
 | |
| 
 | |
|       context 'when the git-upload-pack command is disabled in config' do
 | |
|         before do
 | |
|           allow(Gitlab.config.gitlab_shell).to receive(:upload_pack).and_return(false)
 | |
|         end
 | |
| 
 | |
|         context 'when calling git-upload-pack' do
 | |
|           it { expect { pull_access_check }.to raise_unauthorized('Pulling over HTTP is not allowed.') }
 | |
|         end
 | |
| 
 | |
|         context 'when calling git-receive-pack' do
 | |
|           it { expect { push_access_check }.not_to raise_error }
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when the git-receive-pack command is disabled in config' do
 | |
|         before do
 | |
|           allow(Gitlab.config.gitlab_shell).to receive(:receive_pack).and_return(false)
 | |
|         end
 | |
| 
 | |
|         context 'when calling git-receive-pack' do
 | |
|           it { expect { push_access_check }.to raise_unauthorized('Pushing over HTTP is not allowed.') }
 | |
|         end
 | |
| 
 | |
|         context 'when calling git-upload-pack' do
 | |
|           it { expect { pull_access_check }.not_to raise_error }
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '#check_download_access!' do
 | |
|     it 'allows masters to pull' do
 | |
|       project.add_master(user)
 | |
| 
 | |
|       expect { pull_access_check }.not_to raise_error
 | |
|     end
 | |
| 
 | |
|     it 'disallows guests to pull' do
 | |
|       project.add_guest(user)
 | |
| 
 | |
|       expect { pull_access_check }.to raise_unauthorized(described_class::ERROR_MESSAGES[:download])
 | |
|     end
 | |
| 
 | |
|     it 'disallows blocked users to pull' do
 | |
|       project.add_master(user)
 | |
|       user.block
 | |
| 
 | |
|       expect { pull_access_check }.to raise_unauthorized('Your account has been blocked.')
 | |
|     end
 | |
| 
 | |
|     describe 'without access to project' do
 | |
|       context 'pull code' do
 | |
|         it { expect { pull_access_check }.to raise_not_found }
 | |
|       end
 | |
| 
 | |
|       context 'when project is public' do
 | |
|         let(:public_project) { create(:project, :public, :repository) }
 | |
|         let(:access) { described_class.new(nil, public_project, 'web', authentication_abilities: []) }
 | |
| 
 | |
|         context 'when repository is enabled' do
 | |
|           it 'give access to download code' do
 | |
|             expect { pull_access_check }.not_to raise_error
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'when repository is disabled' do
 | |
|           it 'does not give access to download code' do
 | |
|             public_project.project_feature.update_attribute(:repository_access_level, ProjectFeature::DISABLED)
 | |
| 
 | |
|             expect { pull_access_check }.to raise_unauthorized(described_class::ERROR_MESSAGES[:download])
 | |
|           end
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     describe 'deploy key permissions' do
 | |
|       let(:key) { create(:deploy_key, user: user) }
 | |
|       let(:actor) { key }
 | |
| 
 | |
|       context 'pull code' do
 | |
|         context 'when project is authorized' do
 | |
|           before do
 | |
|             key.projects << project
 | |
|           end
 | |
| 
 | |
|           it { expect { pull_access_check }.not_to raise_error }
 | |
|         end
 | |
| 
 | |
|         context 'when unauthorized' do
 | |
|           context 'from public project' do
 | |
|             let(:project) { create(:project, :public, :repository) }
 | |
| 
 | |
|             it { expect { pull_access_check }.not_to raise_error }
 | |
|           end
 | |
| 
 | |
|           context 'from internal project' do
 | |
|             let(:project) { create(:project, :internal, :repository) }
 | |
| 
 | |
|             it { expect { pull_access_check }.to raise_not_found }
 | |
|           end
 | |
| 
 | |
|           context 'from private project' do
 | |
|             let(:project) { create(:project, :private, :repository) }
 | |
| 
 | |
|             it { expect { pull_access_check }.to raise_not_found }
 | |
|           end
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     describe 'build authentication_abilities permissions' do
 | |
|       let(:authentication_abilities) { build_authentication_abilities }
 | |
| 
 | |
|       describe 'owner' do
 | |
|         let(:project) { create(:project, :repository, namespace: user.namespace) }
 | |
| 
 | |
|         context 'pull code' do
 | |
|           it { expect { pull_access_check }.not_to raise_error }
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       describe 'reporter user' do
 | |
|         before do
 | |
|           project.add_reporter(user)
 | |
|         end
 | |
| 
 | |
|         context 'pull code' do
 | |
|           it { expect { pull_access_check }.not_to raise_error }
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       describe 'admin user' do
 | |
|         let(:user) { create(:admin) }
 | |
| 
 | |
|         context 'when member of the project' do
 | |
|           before do
 | |
|             project.add_reporter(user)
 | |
|           end
 | |
| 
 | |
|           context 'pull code' do
 | |
|             it { expect { pull_access_check }.not_to raise_error }
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'when is not member of the project' do
 | |
|           context 'pull code' do
 | |
|             it { expect { pull_access_check }.to raise_unauthorized(described_class::ERROR_MESSAGES[:download]) }
 | |
|           end
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       describe 'generic CI (build without a user)' do
 | |
|         let(:actor) { :ci }
 | |
| 
 | |
|         context 'pull code' do
 | |
|           it { expect { pull_access_check }.not_to raise_error }
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '#check_push_access!' do
 | |
|     before do
 | |
|       merge_into_protected_branch
 | |
|     end
 | |
|     let(:unprotected_branch) { 'unprotected_branch' }
 | |
| 
 | |
|     let(:changes) do
 | |
|       { push_new_branch: "#{Gitlab::Git::BLANK_SHA} 570e7b2ab refs/heads/wow",
 | |
|         push_master: '6f6d7e7ed 570e7b2ab refs/heads/master',
 | |
|         push_protected_branch: '6f6d7e7ed 570e7b2ab refs/heads/feature',
 | |
|         push_remove_protected_branch: "570e7b2ab #{Gitlab::Git::BLANK_SHA} "\
 | |
|                                       'refs/heads/feature',
 | |
|         push_tag: '6f6d7e7ed 570e7b2ab refs/tags/v1.0.0',
 | |
|         push_new_tag: "#{Gitlab::Git::BLANK_SHA} 570e7b2ab refs/tags/v7.8.9",
 | |
|         push_all: ['6f6d7e7ed 570e7b2ab refs/heads/master', '6f6d7e7ed 570e7b2ab refs/heads/feature'],
 | |
|         merge_into_protected_branch: "0b4bc9a #{merge_into_protected_branch} refs/heads/feature" }
 | |
|     end
 | |
| 
 | |
|     def stub_git_hooks
 | |
|       # Running the `pre-receive` hook is expensive, and not necessary for this test.
 | |
|       allow_any_instance_of(Gitlab::Git::HooksService).to receive(:execute) do |service, &block|
 | |
|         block.call(service)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     def merge_into_protected_branch
 | |
|       @protected_branch_merge_commit ||= begin
 | |
|         stub_git_hooks
 | |
|         project.repository.add_branch(user, unprotected_branch, 'feature')
 | |
|         target_branch = project.repository.lookup('feature')
 | |
|         source_branch = project.repository.create_file(
 | |
|           user,
 | |
|           'filename',
 | |
|           'This is the file content',
 | |
|           message: 'This is a good commit message',
 | |
|           branch_name: unprotected_branch)
 | |
|         rugged = project.repository.rugged
 | |
|         author = { email: "email@example.com", time: Time.now, name: "Example Git User" }
 | |
| 
 | |
|         merge_index = rugged.merge_commits(target_branch, source_branch)
 | |
|         Rugged::Commit.create(rugged, author: author, committer: author, message: "commit message", parents: [target_branch, source_branch], tree: merge_index.write_tree(rugged))
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     def self.run_permission_checks(permissions_matrix)
 | |
|       permissions_matrix.each_pair do |role, matrix|
 | |
|         # Run through the entire matrix for this role in one test to avoid
 | |
|         # repeated setup.
 | |
|         #
 | |
|         # Expectations are given a custom failure message proc so that it's
 | |
|         # easier to identify which check(s) failed.
 | |
|         it "has the correct permissions for #{role}s" do
 | |
|           if role == :admin
 | |
|             user.update_attribute(:admin, true)
 | |
|           else
 | |
|             project.add_role(user, role)
 | |
|           end
 | |
| 
 | |
|           aggregate_failures do
 | |
|             matrix.each do |action, allowed|
 | |
|               check = -> { access.send(:check_push_access!, changes[action]) }
 | |
| 
 | |
|               if allowed
 | |
|                 expect(&check).not_to raise_error,
 | |
|                   -> { "expected #{action} to be allowed" }
 | |
|               else
 | |
|                 expect(&check).to raise_error(Gitlab::GitAccess::UnauthorizedError),
 | |
|                   -> { "expected #{action} to be disallowed" }
 | |
|               end
 | |
|             end
 | |
|           end
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     permissions_matrix = {
 | |
|       admin: {
 | |
|         push_new_branch: true,
 | |
|         push_master: true,
 | |
|         push_protected_branch: true,
 | |
|         push_remove_protected_branch: false,
 | |
|         push_tag: true,
 | |
|         push_new_tag: true,
 | |
|         push_all: true,
 | |
|         merge_into_protected_branch: true
 | |
|       },
 | |
| 
 | |
|       master: {
 | |
|         push_new_branch: true,
 | |
|         push_master: true,
 | |
|         push_protected_branch: true,
 | |
|         push_remove_protected_branch: false,
 | |
|         push_tag: true,
 | |
|         push_new_tag: true,
 | |
|         push_all: true,
 | |
|         merge_into_protected_branch: true
 | |
|       },
 | |
| 
 | |
|       developer: {
 | |
|         push_new_branch: true,
 | |
|         push_master: true,
 | |
|         push_protected_branch: false,
 | |
|         push_remove_protected_branch: false,
 | |
|         push_tag: false,
 | |
|         push_new_tag: true,
 | |
|         push_all: false,
 | |
|         merge_into_protected_branch: false
 | |
|       },
 | |
| 
 | |
|       reporter: {
 | |
|         push_new_branch: false,
 | |
|         push_master: false,
 | |
|         push_protected_branch: false,
 | |
|         push_remove_protected_branch: false,
 | |
|         push_tag: false,
 | |
|         push_new_tag: false,
 | |
|         push_all: false,
 | |
|         merge_into_protected_branch: false
 | |
|       },
 | |
| 
 | |
|       guest: {
 | |
|         push_new_branch: false,
 | |
|         push_master: false,
 | |
|         push_protected_branch: false,
 | |
|         push_remove_protected_branch: false,
 | |
|         push_tag: false,
 | |
|         push_new_tag: false,
 | |
|         push_all: false,
 | |
|         merge_into_protected_branch: false
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     [%w(feature exact), ['feat*', 'wildcard']].each do |protected_branch_name, protected_branch_type|
 | |
|       context do
 | |
|         before do
 | |
|           create(:protected_branch, name: protected_branch_name, project: project)
 | |
|         end
 | |
| 
 | |
|         run_permission_checks(permissions_matrix)
 | |
|       end
 | |
| 
 | |
|       context "when developers are allowed to push into the #{protected_branch_type} protected branch" do
 | |
|         before do
 | |
|           create(:protected_branch, :developers_can_push, name: protected_branch_name, project: project)
 | |
|         end
 | |
| 
 | |
|         run_permission_checks(permissions_matrix.deep_merge(developer: { push_protected_branch: true, push_all: true, merge_into_protected_branch: true }))
 | |
|       end
 | |
| 
 | |
|       context "developers are allowed to merge into the #{protected_branch_type} protected branch" do
 | |
|         before do
 | |
|           create(:protected_branch, :developers_can_merge, name: protected_branch_name, project: project)
 | |
|         end
 | |
| 
 | |
|         context "when a merge request exists for the given source/target branch" do
 | |
|           context "when the merge request is in progress" do
 | |
|             before do
 | |
|               create(:merge_request, source_project: project, source_branch: unprotected_branch, target_branch: 'feature',
 | |
|                                      state: 'locked', in_progress_merge_commit_sha: merge_into_protected_branch)
 | |
|             end
 | |
| 
 | |
|             run_permission_checks(permissions_matrix.deep_merge(developer: { merge_into_protected_branch: true }))
 | |
|           end
 | |
| 
 | |
|           context "when the merge request is not in progress" do
 | |
|             before do
 | |
|               create(:merge_request, source_project: project, source_branch: unprotected_branch, target_branch: 'feature', in_progress_merge_commit_sha: nil)
 | |
|             end
 | |
| 
 | |
|             run_permission_checks(permissions_matrix.deep_merge(developer: { merge_into_protected_branch: false }))
 | |
|           end
 | |
| 
 | |
|           context "when a merge request does not exist for the given source/target branch" do
 | |
|             run_permission_checks(permissions_matrix.deep_merge(developer: { merge_into_protected_branch: false }))
 | |
|           end
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context "when developers are allowed to push and merge into the #{protected_branch_type} protected branch" do
 | |
|         before do
 | |
|           create(:protected_branch, :developers_can_merge, :developers_can_push, name: protected_branch_name, project: project)
 | |
|         end
 | |
| 
 | |
|         run_permission_checks(permissions_matrix.deep_merge(developer: { push_protected_branch: true, push_all: true, merge_into_protected_branch: true }))
 | |
|       end
 | |
| 
 | |
|       context "when no one is allowed to push to the #{protected_branch_name} protected branch" do
 | |
|         before do
 | |
|           create(:protected_branch, :no_one_can_push, name: protected_branch_name, project: project)
 | |
|         end
 | |
| 
 | |
|         run_permission_checks(permissions_matrix.deep_merge(developer: { push_protected_branch: false, push_all: false, merge_into_protected_branch: false },
 | |
|                                                             master: { push_protected_branch: false, push_all: false, merge_into_protected_branch: false },
 | |
|                                                             admin: { push_protected_branch: false, push_all: false, merge_into_protected_branch: false }))
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context "when in a read-only GitLab instance" do
 | |
|       before do
 | |
|         create(:protected_branch, name: 'feature', project: project)
 | |
|         allow(Gitlab::Database).to receive(:read_only?) { true }
 | |
|       end
 | |
| 
 | |
|       # Only check admin; if an admin can't do it, other roles can't either
 | |
|       matrix = permissions_matrix[:admin].dup
 | |
|       matrix.each { |key, _| matrix[key] = false }
 | |
| 
 | |
|       run_permission_checks(admin: matrix)
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'build authentication abilities' do
 | |
|     let(:authentication_abilities) { build_authentication_abilities }
 | |
| 
 | |
|     context 'when project is authorized' do
 | |
|       before do
 | |
|         project.add_reporter(user)
 | |
|       end
 | |
| 
 | |
|       it { expect { push_access_check }.to raise_unauthorized(described_class::ERROR_MESSAGES[:upload]) }
 | |
|     end
 | |
| 
 | |
|     context 'when unauthorized' do
 | |
|       context 'to public project' do
 | |
|         let(:project) { create(:project, :public, :repository) }
 | |
| 
 | |
|         it { expect { push_access_check }.to raise_unauthorized(described_class::ERROR_MESSAGES[:upload]) }
 | |
|       end
 | |
| 
 | |
|       context 'to internal project' do
 | |
|         let(:project) { create(:project, :internal, :repository) }
 | |
| 
 | |
|         it { expect { push_access_check }.to raise_unauthorized(described_class::ERROR_MESSAGES[:upload]) }
 | |
|       end
 | |
| 
 | |
|       context 'to private project' do
 | |
|         let(:project) { create(:project, :private, :repository) }
 | |
| 
 | |
|         it { expect { push_access_check }.to raise_not_found }
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context 'when the repository is read only' do
 | |
|     let(:project) { create(:project, :repository, :read_only) }
 | |
| 
 | |
|     it 'denies push access' do
 | |
|       project.add_master(user)
 | |
| 
 | |
|       expect { push_access_check }.to raise_unauthorized('The repository is temporarily read-only. Please try again later.')
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'deploy key permissions' do
 | |
|     let(:key) { create(:deploy_key, user: user) }
 | |
|     let(:actor) { key }
 | |
| 
 | |
|     context 'when deploy_key can push' do
 | |
|       context 'when project is authorized' do
 | |
|         before do
 | |
|           key.deploy_keys_projects.create(project: project, can_push: true)
 | |
|         end
 | |
| 
 | |
|         it { expect { push_access_check }.not_to raise_error }
 | |
|       end
 | |
| 
 | |
|       context 'when unauthorized' do
 | |
|         context 'to public project' do
 | |
|           let(:project) { create(:project, :public, :repository) }
 | |
| 
 | |
|           it { expect { push_access_check }.to raise_unauthorized(described_class::ERROR_MESSAGES[:deploy_key_upload]) }
 | |
|         end
 | |
| 
 | |
|         context 'to internal project' do
 | |
|           let(:project) { create(:project, :internal, :repository) }
 | |
| 
 | |
|           it { expect { push_access_check }.to raise_not_found }
 | |
|         end
 | |
| 
 | |
|         context 'to private project' do
 | |
|           let(:project) { create(:project, :private, :repository) }
 | |
| 
 | |
|           it { expect { push_access_check }.to raise_not_found }
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when deploy_key cannot push' do
 | |
|       context 'when project is authorized' do
 | |
|         before do
 | |
|           key.deploy_keys_projects.create(project: project, can_push: false)
 | |
|         end
 | |
| 
 | |
|         it { expect { push_access_check }.to raise_unauthorized(described_class::ERROR_MESSAGES[:deploy_key_upload]) }
 | |
|       end
 | |
| 
 | |
|       context 'when unauthorized' do
 | |
|         context 'to public project' do
 | |
|           let(:project) { create(:project, :public, :repository) }
 | |
| 
 | |
|           it { expect { push_access_check }.to raise_unauthorized(described_class::ERROR_MESSAGES[:deploy_key_upload]) }
 | |
|         end
 | |
| 
 | |
|         context 'to internal project' do
 | |
|           let(:project) { create(:project, :internal, :repository) }
 | |
| 
 | |
|           it { expect { push_access_check }.to raise_not_found }
 | |
|         end
 | |
| 
 | |
|         context 'to private project' do
 | |
|           let(:project) { create(:project, :private, :repository) }
 | |
| 
 | |
|           it { expect { push_access_check }.to raise_not_found }
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   private
 | |
| 
 | |
|   def raise_unauthorized(message)
 | |
|     raise_error(Gitlab::GitAccess::UnauthorizedError, message)
 | |
|   end
 | |
| 
 | |
|   def raise_not_found
 | |
|     raise_error(Gitlab::GitAccess::NotFoundError,
 | |
|                 Gitlab::GitAccess::ERROR_MESSAGES[:project_not_found])
 | |
|   end
 | |
| 
 | |
|   def build_authentication_abilities
 | |
|     [
 | |
|       :read_project,
 | |
|       :build_download_code
 | |
|     ]
 | |
|   end
 | |
| 
 | |
|   def full_authentication_abilities
 | |
|     [
 | |
|       :read_project,
 | |
|       :download_code,
 | |
|       :push_code
 | |
|     ]
 | |
|   end
 | |
| end
 |