Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
548169cf
Commit
548169cf
authored
Sep 15, 2016
by
Kamil Trzcinski
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fix most of specs
parent
551787ac
Changes
7
Hide whitespace changes
Inline
Side-by-side
Showing
7 changed files
with
39 additions
and
20 deletions
+39
-20
app/controllers/projects/git_http_client_controller.rb
app/controllers/projects/git_http_client_controller.rb
+5
-2
lib/ci/api/helpers.rb
lib/ci/api/helpers.rb
+2
-2
lib/gitlab/auth.rb
lib/gitlab/auth.rb
+1
-2
spec/lib/gitlab/git_access_spec.rb
spec/lib/gitlab/git_access_spec.rb
+11
-3
spec/lib/gitlab/git_access_wiki_spec.rb
spec/lib/gitlab/git_access_wiki_spec.rb
+8
-1
spec/requests/lfs_http_spec.rb
spec/requests/lfs_http_spec.rb
+6
-4
spec/services/auth/container_registry_authentication_service_spec.rb
...es/auth/container_registry_authentication_service_spec.rb
+6
-6
No files found.
app/controllers/projects/git_http_client_controller.rb
View file @
548169cf
...
...
@@ -23,10 +23,12 @@ class Projects::GitHttpClientController < Projects::ApplicationController
login
,
password
=
user_name_and_password
(
request
)
auth_result
=
Gitlab
::
Auth
.
find_for_git_client
(
login
,
password
,
project:
project
,
ip:
request
.
ip
)
if
auth_result
.
type
==
:ci
&&
download_request?
@ci
=
true
if
auth_result
.
type
==
:ci
&&
!
download_request?
# Not allowed
auth_result
=
Gitlab
::
Auth
::
Result
.
new
elsif
auth_result
.
type
==
:oauth
&&
!
download_request?
# Not allowed
auth_result
=
Gitlab
::
Auth
::
Result
.
new
elsif
auth_result
.
type
==
:missing_personal_token
render_missing_personal_token
return
# Render above denied access, nothing left to do
...
...
@@ -35,6 +37,7 @@ class Projects::GitHttpClientController < Projects::ApplicationController
end
@capabilities
=
auth_result
.
capabilities
||
[]
@ci
=
auth_result
.
type
==
:ci
if
auth_result
.
succeeded?
return
# Allow access
...
...
lib/ci/api/helpers.rb
View file @
548169cf
...
...
@@ -14,7 +14,7 @@ module Ci
end
def
authenticate_build_token!
(
build
)
forbidden!
unless
build_token_valid?
forbidden!
unless
build_token_valid?
(
build
)
end
def
runner_registration_token_valid?
...
...
@@ -23,7 +23,7 @@ module Ci
current_application_settings
.
runners_registration_token
)
end
def
build_token_valid?
def
build_token_valid?
(
build
)
token
=
(
params
[
BUILD_TOKEN_PARAM
]
||
env
[
BUILD_TOKEN_HEADER
]).
to_s
# We require to also check `runners_token` to maintain compatibility with old version of runners
...
...
lib/gitlab/auth.rb
View file @
548169cf
...
...
@@ -117,6 +117,7 @@ module Gitlab
build
=
::
Ci
::
Build
.
running
.
find_by_token
(
password
)
return
unless
build
return
unless
build
.
project
.
builds_enabled?
if
build
.
user
# If user is assigned to build, use restricted credentials of user
...
...
@@ -127,8 +128,6 @@ module Gitlab
end
end
private
def
build_capabilities
[
:read_project
,
...
...
spec/lib/gitlab/git_access_spec.rb
View file @
548169cf
...
...
@@ -324,7 +324,7 @@ describe Gitlab::GitAccess, lib: true do
subject
{
access
.
check
(
'git-receive-pack'
,
'_any'
)
}
context
'when project is authorized'
do
before
{
key
.
projects
<<
project
}
before
{
authorize
}
it
{
expect
(
subject
).
not_to
be_allowed
}
end
...
...
@@ -353,14 +353,22 @@ describe Gitlab::GitAccess, lib: true do
describe
'build capabilities permissions'
do
let
(
:capabilities
)
{
build_capabilities
}
it_behaves_like
'can not push code'
it_behaves_like
'can not push code'
do
def
authorize
project
.
team
<<
[
user
,
:reporter
]
end
end
end
describe
'deploy key permissions'
do
let
(
:key
)
{
create
(
:deploy_key
)
}
let
(
:actor
)
{
key
}
it_behaves_like
'can not push code'
it_behaves_like
'can not push code'
do
def
authorize
key
.
projects
<<
project
end
end
end
private
...
...
spec/lib/gitlab/git_access_wiki_spec.rb
View file @
548169cf
require
'spec_helper'
describe
Gitlab
::
GitAccessWiki
,
lib:
true
do
let
(
:access
)
{
Gitlab
::
GitAccessWiki
.
new
(
user
,
project
,
'web'
)
}
let
(
:access
)
{
Gitlab
::
GitAccessWiki
.
new
(
user
,
project
,
'web'
,
capabilities:
capabilities
)
}
let
(
:project
)
{
create
(
:project
)
}
let
(
:user
)
{
create
(
:user
)
}
let
(
:capabilities
)
do
[
:read_project
,
:download_code
,
:push_code
]
end
describe
'push_allowed?'
do
before
do
...
...
spec/requests/lfs_http_spec.rb
View file @
548169cf
...
...
@@ -586,8 +586,8 @@ describe 'Git LFS API and storage' do
context
'when CI is authorized'
do
let
(
:authorization
)
{
authorize_ci_project
}
it
'responds with 40
1
'
do
expect
(
response
).
to
have_http_status
(
40
1
)
it
'responds with 40
3
'
do
expect
(
response
).
to
have_http_status
(
40
3
)
end
end
end
...
...
@@ -614,7 +614,7 @@ describe 'Git LFS API and storage' do
let
(
:authorization
)
{
authorize_ci_project
}
it
'responds with status 403'
do
expect
(
response
).
to
have_http_status
(
40
1
)
expect
(
response
).
to
have_http_status
(
40
3
)
end
end
end
...
...
@@ -897,7 +897,9 @@ describe 'Git LFS API and storage' do
end
def
authorize_ci_project
ActionController
::
HttpAuthentication
::
Basic
.
encode_credentials
(
'gitlab-ci-token'
,
project
.
runners_token
)
pipeline
=
create
(
:ci_empty_pipeline
,
project:
project
)
build
=
create
(
:ci_build
,
:running
,
pipeline:
pipeline
)
ActionController
::
HttpAuthentication
::
Basic
.
encode_credentials
(
'gitlab-ci-token'
,
build
.
token
)
end
def
authorize_user
...
...
spec/services/auth/container_registry_authentication_service_spec.rb
View file @
548169cf
...
...
@@ -48,12 +48,6 @@ describe Auth::ContainerRegistryAuthenticationService, services: true do
'actions'
=>
actions
,
}]
end
let
(
:capabilities
)
do
[
:build_read_container_image
,
:build_create_container_image
]
end
it_behaves_like
'a valid token'
it
{
expect
(
payload
).
to
include
(
'access'
=>
access
)
}
...
...
@@ -203,6 +197,12 @@ describe Auth::ContainerRegistryAuthenticationService, services: true do
context
'project authorization'
do
let
(
:current_project
)
{
create
(
:empty_project
)
}
let
(
:capabilities
)
do
[
:build_read_container_image
,
:build_create_container_image
]
end
context
'allow to use scope-less authentication'
do
it_behaves_like
'a valid token'
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment