mirror of https://github.com/go-gitea/gitea.git
Browse Source
Permission & protection check:
- Fix Delete Release permission check
- Fix Update Pull Request with rebase branch protection check
- Fix Issue Dependency permission check
- Fix Delete Comment History ID check
Information leaking:
- Show unified message for non-existing user and invalid password
- Fix #35984
- Don't expose release draft to non-writer users.
- Make API returns signature's email address instead of the user
profile's.
Auth & Login:
- Avoid GCM OAuth2 attempt when OAuth2 is disabled
- Fix #35510
---------
Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>
pull/36010/head
18 changed files with 385 additions and 61 deletions
@ -0,0 +1,32 @@
@@ -0,0 +1,32 @@
|
||||
// Copyright 2025 The Gitea Authors. All rights reserved.
|
||||
// SPDX-License-Identifier: MIT
|
||||
|
||||
package integration |
||||
|
||||
import ( |
||||
"net/http" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/tests" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestAPIAuth(t *testing.T) { |
||||
defer tests.PrepareTestEnv(t)() |
||||
|
||||
req := NewRequestf(t, "GET", "/api/v1/user").AddBasicAuth("user2") |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
req = NewRequestf(t, "GET", "/api/v1/user").AddBasicAuth("user2", "wrong-password") |
||||
resp := MakeRequest(t, req, http.StatusUnauthorized) |
||||
assert.Contains(t, resp.Body.String(), `{"message":"invalid username, password or token"`) |
||||
|
||||
req = NewRequestf(t, "GET", "/api/v1/user").AddBasicAuth("user-not-exist") |
||||
resp = MakeRequest(t, req, http.StatusUnauthorized) |
||||
assert.Contains(t, resp.Body.String(), `{"message":"invalid username, password or token"`) |
||||
|
||||
req = NewRequestf(t, "GET", "/api/v1/users/user2/repos").AddTokenAuth("Bearer wrong_token") |
||||
resp = MakeRequest(t, req, http.StatusUnauthorized) |
||||
assert.Contains(t, resp.Body.String(), `{"message":"invalid username, password or token"`) |
||||
} |
||||
@ -0,0 +1,152 @@
@@ -0,0 +1,152 @@
|
||||
// Copyright 2024 The Gitea Authors. All rights reserved.
|
||||
// SPDX-License-Identifier: MIT
|
||||
|
||||
package integration |
||||
|
||||
import ( |
||||
"fmt" |
||||
"net/http" |
||||
"testing" |
||||
|
||||
auth_model "code.gitea.io/gitea/models/auth" |
||||
"code.gitea.io/gitea/models/db" |
||||
issues_model "code.gitea.io/gitea/models/issues" |
||||
"code.gitea.io/gitea/models/perm" |
||||
access_model "code.gitea.io/gitea/models/perm/access" |
||||
repo_model "code.gitea.io/gitea/models/repo" |
||||
"code.gitea.io/gitea/models/unit" |
||||
"code.gitea.io/gitea/models/unittest" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
api "code.gitea.io/gitea/modules/structs" |
||||
repo_service "code.gitea.io/gitea/services/repository" |
||||
"code.gitea.io/gitea/tests" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func enableRepoDependencies(t *testing.T, repoID int64) { |
||||
t.Helper() |
||||
|
||||
repoUnit := unittest.AssertExistsAndLoadBean(t, &repo_model.RepoUnit{RepoID: repoID, Type: unit.TypeIssues}) |
||||
repoUnit.IssuesConfig().EnableDependencies = true |
||||
assert.NoError(t, repo_model.UpdateRepoUnit(t.Context(), repoUnit)) |
||||
} |
||||
|
||||
func TestAPICreateIssueDependencyCrossRepoPermission(t *testing.T) { |
||||
defer tests.PrepareTestEnv(t)() |
||||
|
||||
targetRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) |
||||
targetIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: targetRepo.ID, Index: 1}) |
||||
dependencyRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 3}) |
||||
assert.True(t, dependencyRepo.IsPrivate) |
||||
dependencyIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: dependencyRepo.ID, Index: 1}) |
||||
|
||||
enableRepoDependencies(t, targetIssue.RepoID) |
||||
enableRepoDependencies(t, dependencyRepo.ID) |
||||
|
||||
// remove user 40 access from target repository
|
||||
_, err := db.DeleteByID[access_model.Access](t.Context(), 30) |
||||
assert.NoError(t, err) |
||||
|
||||
url := fmt.Sprintf("/api/v1/repos/%s/%s/issues/%d/dependencies", "user2", "repo1", targetIssue.Index) |
||||
dependencyMeta := &api.IssueMeta{ |
||||
Owner: "org3", |
||||
Name: "repo3", |
||||
Index: dependencyIssue.Index, |
||||
} |
||||
|
||||
user40 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 40}) |
||||
// user40 has no access to both target issue and dependency issue
|
||||
writerToken := getUserToken(t, "user40", auth_model.AccessTokenScopeWriteIssue) |
||||
req := NewRequestWithJSON(t, "POST", url, dependencyMeta). |
||||
AddTokenAuth(writerToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
unittest.AssertNotExistsBean(t, &issues_model.IssueDependency{ |
||||
IssueID: targetIssue.ID, |
||||
DependencyID: dependencyIssue.ID, |
||||
}) |
||||
|
||||
// add user40 as a collaborator to dependency repository with read permission
|
||||
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), dependencyRepo, user40, perm.AccessModeRead)) |
||||
|
||||
// try again after getting read permission to dependency repository
|
||||
req = NewRequestWithJSON(t, "POST", url, dependencyMeta). |
||||
AddTokenAuth(writerToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
unittest.AssertNotExistsBean(t, &issues_model.IssueDependency{ |
||||
IssueID: targetIssue.ID, |
||||
DependencyID: dependencyIssue.ID, |
||||
}) |
||||
|
||||
// add user40 as a collaborator to target repository with write permission
|
||||
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), targetRepo, user40, perm.AccessModeWrite)) |
||||
|
||||
req = NewRequestWithJSON(t, "POST", url, dependencyMeta). |
||||
AddTokenAuth(writerToken) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
unittest.AssertExistsAndLoadBean(t, &issues_model.IssueDependency{ |
||||
IssueID: targetIssue.ID, |
||||
DependencyID: dependencyIssue.ID, |
||||
}) |
||||
} |
||||
|
||||
func TestAPIDeleteIssueDependencyCrossRepoPermission(t *testing.T) { |
||||
defer tests.PrepareTestEnv(t)() |
||||
|
||||
targetRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) |
||||
targetIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: targetRepo.ID, Index: 1}) |
||||
dependencyRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 3}) |
||||
assert.True(t, dependencyRepo.IsPrivate) |
||||
dependencyIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: dependencyRepo.ID, Index: 1}) |
||||
|
||||
enableRepoDependencies(t, targetIssue.RepoID) |
||||
enableRepoDependencies(t, dependencyRepo.ID) |
||||
|
||||
user1 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}) |
||||
assert.NoError(t, issues_model.CreateIssueDependency(t.Context(), user1, targetIssue, dependencyIssue)) |
||||
|
||||
// remove user 40 access from target repository
|
||||
_, err := db.DeleteByID[access_model.Access](t.Context(), 30) |
||||
assert.NoError(t, err) |
||||
|
||||
url := fmt.Sprintf("/api/v1/repos/%s/%s/issues/%d/dependencies", "user2", "repo1", targetIssue.Index) |
||||
dependencyMeta := &api.IssueMeta{ |
||||
Owner: "org3", |
||||
Name: "repo3", |
||||
Index: dependencyIssue.Index, |
||||
} |
||||
|
||||
user40 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 40}) |
||||
// user40 has no access to both target issue and dependency issue
|
||||
writerToken := getUserToken(t, "user40", auth_model.AccessTokenScopeWriteIssue) |
||||
req := NewRequestWithJSON(t, "DELETE", url, dependencyMeta). |
||||
AddTokenAuth(writerToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
unittest.AssertExistsAndLoadBean(t, &issues_model.IssueDependency{ |
||||
IssueID: targetIssue.ID, |
||||
DependencyID: dependencyIssue.ID, |
||||
}) |
||||
|
||||
// add user40 as a collaborator to dependency repository with read permission
|
||||
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), dependencyRepo, user40, perm.AccessModeRead)) |
||||
|
||||
// try again after getting read permission to dependency repository
|
||||
req = NewRequestWithJSON(t, "DELETE", url, dependencyMeta). |
||||
AddTokenAuth(writerToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
unittest.AssertExistsAndLoadBean(t, &issues_model.IssueDependency{ |
||||
IssueID: targetIssue.ID, |
||||
DependencyID: dependencyIssue.ID, |
||||
}) |
||||
|
||||
// add user40 as a collaborator to target repository with write permission
|
||||
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), targetRepo, user40, perm.AccessModeWrite)) |
||||
|
||||
req = NewRequestWithJSON(t, "DELETE", url, dependencyMeta). |
||||
AddTokenAuth(writerToken) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
unittest.AssertNotExistsBean(t, &issues_model.IssueDependency{ |
||||
IssueID: targetIssue.ID, |
||||
DependencyID: dependencyIssue.ID, |
||||
}) |
||||
} |
||||
Loading…
Reference in new issue