mirror of
https://github.com/go-gitea/gitea.git
synced 2025-11-25 21:02:34 +01:00
Permission & protection check:
- Fix Delete Release permission check
- Fix Update Pull Request with rebase branch protection check
- Fix Issue Dependency permission check
- Fix Delete Comment History ID check
Information leaking:
- Show unified message for non-existing user and invalid password
- Fix #35984
- Don't expose release draft to non-writer users.
- Make API returns signature's email address instead of the user
profile's.
Auth & Login:
- Avoid GCM OAuth2 attempt when OAuth2 is disabled
- Fix #35510
---------
Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>
153 lines
6.0 KiB
Go
153 lines
6.0 KiB
Go
// Copyright 2024 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package integration
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"testing"
|
|
|
|
auth_model "code.gitea.io/gitea/models/auth"
|
|
"code.gitea.io/gitea/models/db"
|
|
issues_model "code.gitea.io/gitea/models/issues"
|
|
"code.gitea.io/gitea/models/perm"
|
|
access_model "code.gitea.io/gitea/models/perm/access"
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
|
"code.gitea.io/gitea/models/unit"
|
|
"code.gitea.io/gitea/models/unittest"
|
|
user_model "code.gitea.io/gitea/models/user"
|
|
api "code.gitea.io/gitea/modules/structs"
|
|
repo_service "code.gitea.io/gitea/services/repository"
|
|
"code.gitea.io/gitea/tests"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func enableRepoDependencies(t *testing.T, repoID int64) {
|
|
t.Helper()
|
|
|
|
repoUnit := unittest.AssertExistsAndLoadBean(t, &repo_model.RepoUnit{RepoID: repoID, Type: unit.TypeIssues})
|
|
repoUnit.IssuesConfig().EnableDependencies = true
|
|
assert.NoError(t, repo_model.UpdateRepoUnit(t.Context(), repoUnit))
|
|
}
|
|
|
|
func TestAPICreateIssueDependencyCrossRepoPermission(t *testing.T) {
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
targetRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
|
|
targetIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: targetRepo.ID, Index: 1})
|
|
dependencyRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 3})
|
|
assert.True(t, dependencyRepo.IsPrivate)
|
|
dependencyIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: dependencyRepo.ID, Index: 1})
|
|
|
|
enableRepoDependencies(t, targetIssue.RepoID)
|
|
enableRepoDependencies(t, dependencyRepo.ID)
|
|
|
|
// remove user 40 access from target repository
|
|
_, err := db.DeleteByID[access_model.Access](t.Context(), 30)
|
|
assert.NoError(t, err)
|
|
|
|
url := fmt.Sprintf("/api/v1/repos/%s/%s/issues/%d/dependencies", "user2", "repo1", targetIssue.Index)
|
|
dependencyMeta := &api.IssueMeta{
|
|
Owner: "org3",
|
|
Name: "repo3",
|
|
Index: dependencyIssue.Index,
|
|
}
|
|
|
|
user40 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 40})
|
|
// user40 has no access to both target issue and dependency issue
|
|
writerToken := getUserToken(t, "user40", auth_model.AccessTokenScopeWriteIssue)
|
|
req := NewRequestWithJSON(t, "POST", url, dependencyMeta).
|
|
AddTokenAuth(writerToken)
|
|
MakeRequest(t, req, http.StatusNotFound)
|
|
unittest.AssertNotExistsBean(t, &issues_model.IssueDependency{
|
|
IssueID: targetIssue.ID,
|
|
DependencyID: dependencyIssue.ID,
|
|
})
|
|
|
|
// add user40 as a collaborator to dependency repository with read permission
|
|
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), dependencyRepo, user40, perm.AccessModeRead))
|
|
|
|
// try again after getting read permission to dependency repository
|
|
req = NewRequestWithJSON(t, "POST", url, dependencyMeta).
|
|
AddTokenAuth(writerToken)
|
|
MakeRequest(t, req, http.StatusNotFound)
|
|
unittest.AssertNotExistsBean(t, &issues_model.IssueDependency{
|
|
IssueID: targetIssue.ID,
|
|
DependencyID: dependencyIssue.ID,
|
|
})
|
|
|
|
// add user40 as a collaborator to target repository with write permission
|
|
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), targetRepo, user40, perm.AccessModeWrite))
|
|
|
|
req = NewRequestWithJSON(t, "POST", url, dependencyMeta).
|
|
AddTokenAuth(writerToken)
|
|
MakeRequest(t, req, http.StatusCreated)
|
|
unittest.AssertExistsAndLoadBean(t, &issues_model.IssueDependency{
|
|
IssueID: targetIssue.ID,
|
|
DependencyID: dependencyIssue.ID,
|
|
})
|
|
}
|
|
|
|
func TestAPIDeleteIssueDependencyCrossRepoPermission(t *testing.T) {
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
targetRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
|
|
targetIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: targetRepo.ID, Index: 1})
|
|
dependencyRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 3})
|
|
assert.True(t, dependencyRepo.IsPrivate)
|
|
dependencyIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: dependencyRepo.ID, Index: 1})
|
|
|
|
enableRepoDependencies(t, targetIssue.RepoID)
|
|
enableRepoDependencies(t, dependencyRepo.ID)
|
|
|
|
user1 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1})
|
|
assert.NoError(t, issues_model.CreateIssueDependency(t.Context(), user1, targetIssue, dependencyIssue))
|
|
|
|
// remove user 40 access from target repository
|
|
_, err := db.DeleteByID[access_model.Access](t.Context(), 30)
|
|
assert.NoError(t, err)
|
|
|
|
url := fmt.Sprintf("/api/v1/repos/%s/%s/issues/%d/dependencies", "user2", "repo1", targetIssue.Index)
|
|
dependencyMeta := &api.IssueMeta{
|
|
Owner: "org3",
|
|
Name: "repo3",
|
|
Index: dependencyIssue.Index,
|
|
}
|
|
|
|
user40 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 40})
|
|
// user40 has no access to both target issue and dependency issue
|
|
writerToken := getUserToken(t, "user40", auth_model.AccessTokenScopeWriteIssue)
|
|
req := NewRequestWithJSON(t, "DELETE", url, dependencyMeta).
|
|
AddTokenAuth(writerToken)
|
|
MakeRequest(t, req, http.StatusNotFound)
|
|
unittest.AssertExistsAndLoadBean(t, &issues_model.IssueDependency{
|
|
IssueID: targetIssue.ID,
|
|
DependencyID: dependencyIssue.ID,
|
|
})
|
|
|
|
// add user40 as a collaborator to dependency repository with read permission
|
|
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), dependencyRepo, user40, perm.AccessModeRead))
|
|
|
|
// try again after getting read permission to dependency repository
|
|
req = NewRequestWithJSON(t, "DELETE", url, dependencyMeta).
|
|
AddTokenAuth(writerToken)
|
|
MakeRequest(t, req, http.StatusNotFound)
|
|
unittest.AssertExistsAndLoadBean(t, &issues_model.IssueDependency{
|
|
IssueID: targetIssue.ID,
|
|
DependencyID: dependencyIssue.ID,
|
|
})
|
|
|
|
// add user40 as a collaborator to target repository with write permission
|
|
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), targetRepo, user40, perm.AccessModeWrite))
|
|
|
|
req = NewRequestWithJSON(t, "DELETE", url, dependencyMeta).
|
|
AddTokenAuth(writerToken)
|
|
MakeRequest(t, req, http.StatusCreated)
|
|
unittest.AssertNotExistsBean(t, &issues_model.IssueDependency{
|
|
IssueID: targetIssue.ID,
|
|
DependencyID: dependencyIssue.ID,
|
|
})
|
|
}
|