gitlab-org--gitlab-foss/spec/requests/api/internal_spec.rb

208 lines
4.6 KiB
Ruby

require 'spec_helper'
describe API::API, api: true do
include ApiHelpers
let(:user) { create(:user) }
let(:key) { create(:key, user: user) }
let(:project) { create(:project) }
let(:secret_token) { File.read Rails.root.join('.gitlab_shell_secret') }
describe "GET /internal/check", no_db: true do
it do
get api("/internal/check"), secret_token: secret_token
response.status.should == 200
json_response['api_version'].should == API::API.version
end
end
describe "GET /internal/discover" do
it do
get(api("/internal/discover"), key_id: key.id, secret_token: secret_token)
response.status.should == 200
json_response['name'].should == user.name
end
end
describe "POST /internal/allowed" do
context "access granted" do
before do
project.team << [user, :developer]
end
context "git pull" do
it do
pull(key, project)
response.status.should == 200
JSON.parse(response.body)["status"].should be_true
end
end
context "git push" do
it do
push(key, project)
response.status.should == 200
JSON.parse(response.body)["status"].should be_true
end
end
end
context "access denied" do
before do
project.team << [user, :guest]
end
context "git pull" do
it do
pull(key, project)
response.status.should == 200
JSON.parse(response.body)["status"].should be_false
end
end
context "git push" do
it do
push(key, project)
response.status.should == 200
JSON.parse(response.body)["status"].should be_false
end
end
end
context "blocked user" do
let(:personal_project) { create(:project, namespace: user.namespace) }
before do
user.block
end
context "git pull" do
it do
pull(key, personal_project)
response.status.should == 200
JSON.parse(response.body)["status"].should be_false
end
end
context "git push" do
it do
push(key, personal_project)
response.status.should == 200
JSON.parse(response.body)["status"].should be_false
end
end
end
context "archived project" do
let(:personal_project) { create(:project, namespace: user.namespace) }
before do
project.team << [user, :developer]
project.archive!
end
context "git pull" do
it do
pull(key, project)
response.status.should == 200
JSON.parse(response.body)["status"].should be_true
end
end
context "git push" do
it do
push(key, project)
response.status.should == 200
JSON.parse(response.body)["status"].should be_false
end
end
end
context "deploy key" do
let(:key) { create(:deploy_key) }
context "added to project" do
before do
key.projects << project
end
it do
archive(key, project)
response.status.should == 200
JSON.parse(response.body)["status"].should be_true
end
end
context "not added to project" do
it do
archive(key, project)
response.status.should == 200
JSON.parse(response.body)["status"].should be_false
end
end
end
context 'project does not exist' do
it do
pull(key, OpenStruct.new(path_with_namespace: 'gitlab/notexists'))
response.status.should == 200
JSON.parse(response.body)["status"].should be_false
end
end
context 'user does not exist' do
it do
pull(OpenStruct.new(id: 0), project)
response.status.should == 200
JSON.parse(response.body)["status"].should be_false
end
end
end
def pull(key, project)
post(
api("/internal/allowed"),
key_id: key.id,
project: project.path_with_namespace,
action: 'git-upload-pack',
secret_token: secret_token
)
end
def push(key, project)
post(
api("/internal/allowed"),
changes: 'd14d6c0abdd253381df51a723d58691b2ee1ab08 570e7b2abdd848b95f2f578043fc23bd6f6fd24d refs/heads/master',
key_id: key.id,
project: project.path_with_namespace,
action: 'git-receive-pack',
secret_token: secret_token
)
end
def archive(key, project)
post(
api("/internal/allowed"),
ref: 'master',
key_id: key.id,
project: project.path_with_namespace,
action: 'git-upload-archive',
secret_token: secret_token
)
end
end