mirror of https://github.com/go-gitea/gitea.git
Fix various permission & login related bugs (#36002)
Permission & protection check:
- Fix Delete Release permission check
- Fix Update Pull Request with rebase branch protection check
- Fix Issue Dependency permission check
- Fix Delete Comment History ID check
Information leaking:
- Show unified message for non-existing user and invalid password
- Fix #35984
- Don't expose release draft to non-writer users.
- Make API returns signature's email address instead of the user
profile's.
Auth & Login:
- Avoid GCM OAuth2 attempt when OAuth2 is disabled
- Fix #35510
---------
Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>
pull/35987/head^2
parent
a60a8c6966
commit
62d750eadb
@ -0,0 +1,32 @@
|
|||||||
|
// Copyright 2025 The Gitea Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package integration
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"code.gitea.io/gitea/tests"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestAPIAuth(t *testing.T) {
|
||||||
|
defer tests.PrepareTestEnv(t)()
|
||||||
|
|
||||||
|
req := NewRequestf(t, "GET", "/api/v1/user").AddBasicAuth("user2")
|
||||||
|
MakeRequest(t, req, http.StatusOK)
|
||||||
|
|
||||||
|
req = NewRequestf(t, "GET", "/api/v1/user").AddBasicAuth("user2", "wrong-password")
|
||||||
|
resp := MakeRequest(t, req, http.StatusUnauthorized)
|
||||||
|
assert.Contains(t, resp.Body.String(), `{"message":"invalid username, password or token"`)
|
||||||
|
|
||||||
|
req = NewRequestf(t, "GET", "/api/v1/user").AddBasicAuth("user-not-exist")
|
||||||
|
resp = MakeRequest(t, req, http.StatusUnauthorized)
|
||||||
|
assert.Contains(t, resp.Body.String(), `{"message":"invalid username, password or token"`)
|
||||||
|
|
||||||
|
req = NewRequestf(t, "GET", "/api/v1/users/user2/repos").AddTokenAuth("Bearer wrong_token")
|
||||||
|
resp = MakeRequest(t, req, http.StatusUnauthorized)
|
||||||
|
assert.Contains(t, resp.Body.String(), `{"message":"invalid username, password or token"`)
|
||||||
|
}
|
||||||
@ -0,0 +1,152 @@
|
|||||||
|
// Copyright 2024 The Gitea Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package integration
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
auth_model "code.gitea.io/gitea/models/auth"
|
||||||
|
"code.gitea.io/gitea/models/db"
|
||||||
|
issues_model "code.gitea.io/gitea/models/issues"
|
||||||
|
"code.gitea.io/gitea/models/perm"
|
||||||
|
access_model "code.gitea.io/gitea/models/perm/access"
|
||||||
|
repo_model "code.gitea.io/gitea/models/repo"
|
||||||
|
"code.gitea.io/gitea/models/unit"
|
||||||
|
"code.gitea.io/gitea/models/unittest"
|
||||||
|
user_model "code.gitea.io/gitea/models/user"
|
||||||
|
api "code.gitea.io/gitea/modules/structs"
|
||||||
|
repo_service "code.gitea.io/gitea/services/repository"
|
||||||
|
"code.gitea.io/gitea/tests"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
func enableRepoDependencies(t *testing.T, repoID int64) {
|
||||||
|
t.Helper()
|
||||||
|
|
||||||
|
repoUnit := unittest.AssertExistsAndLoadBean(t, &repo_model.RepoUnit{RepoID: repoID, Type: unit.TypeIssues})
|
||||||
|
repoUnit.IssuesConfig().EnableDependencies = true
|
||||||
|
assert.NoError(t, repo_model.UpdateRepoUnit(t.Context(), repoUnit))
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAPICreateIssueDependencyCrossRepoPermission(t *testing.T) {
|
||||||
|
defer tests.PrepareTestEnv(t)()
|
||||||
|
|
||||||
|
targetRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
|
||||||
|
targetIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: targetRepo.ID, Index: 1})
|
||||||
|
dependencyRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 3})
|
||||||
|
assert.True(t, dependencyRepo.IsPrivate)
|
||||||
|
dependencyIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: dependencyRepo.ID, Index: 1})
|
||||||
|
|
||||||
|
enableRepoDependencies(t, targetIssue.RepoID)
|
||||||
|
enableRepoDependencies(t, dependencyRepo.ID)
|
||||||
|
|
||||||
|
// remove user 40 access from target repository
|
||||||
|
_, err := db.DeleteByID[access_model.Access](t.Context(), 30)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
url := fmt.Sprintf("/api/v1/repos/%s/%s/issues/%d/dependencies", "user2", "repo1", targetIssue.Index)
|
||||||
|
dependencyMeta := &api.IssueMeta{
|
||||||
|
Owner: "org3",
|
||||||
|
Name: "repo3",
|
||||||
|
Index: dependencyIssue.Index,
|
||||||
|
}
|
||||||
|
|
||||||
|
user40 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 40})
|
||||||
|
// user40 has no access to both target issue and dependency issue
|
||||||
|
writerToken := getUserToken(t, "user40", auth_model.AccessTokenScopeWriteIssue)
|
||||||
|
req := NewRequestWithJSON(t, "POST", url, dependencyMeta).
|
||||||
|
AddTokenAuth(writerToken)
|
||||||
|
MakeRequest(t, req, http.StatusNotFound)
|
||||||
|
unittest.AssertNotExistsBean(t, &issues_model.IssueDependency{
|
||||||
|
IssueID: targetIssue.ID,
|
||||||
|
DependencyID: dependencyIssue.ID,
|
||||||
|
})
|
||||||
|
|
||||||
|
// add user40 as a collaborator to dependency repository with read permission
|
||||||
|
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), dependencyRepo, user40, perm.AccessModeRead))
|
||||||
|
|
||||||
|
// try again after getting read permission to dependency repository
|
||||||
|
req = NewRequestWithJSON(t, "POST", url, dependencyMeta).
|
||||||
|
AddTokenAuth(writerToken)
|
||||||
|
MakeRequest(t, req, http.StatusNotFound)
|
||||||
|
unittest.AssertNotExistsBean(t, &issues_model.IssueDependency{
|
||||||
|
IssueID: targetIssue.ID,
|
||||||
|
DependencyID: dependencyIssue.ID,
|
||||||
|
})
|
||||||
|
|
||||||
|
// add user40 as a collaborator to target repository with write permission
|
||||||
|
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), targetRepo, user40, perm.AccessModeWrite))
|
||||||
|
|
||||||
|
req = NewRequestWithJSON(t, "POST", url, dependencyMeta).
|
||||||
|
AddTokenAuth(writerToken)
|
||||||
|
MakeRequest(t, req, http.StatusCreated)
|
||||||
|
unittest.AssertExistsAndLoadBean(t, &issues_model.IssueDependency{
|
||||||
|
IssueID: targetIssue.ID,
|
||||||
|
DependencyID: dependencyIssue.ID,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAPIDeleteIssueDependencyCrossRepoPermission(t *testing.T) {
|
||||||
|
defer tests.PrepareTestEnv(t)()
|
||||||
|
|
||||||
|
targetRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
|
||||||
|
targetIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: targetRepo.ID, Index: 1})
|
||||||
|
dependencyRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 3})
|
||||||
|
assert.True(t, dependencyRepo.IsPrivate)
|
||||||
|
dependencyIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{RepoID: dependencyRepo.ID, Index: 1})
|
||||||
|
|
||||||
|
enableRepoDependencies(t, targetIssue.RepoID)
|
||||||
|
enableRepoDependencies(t, dependencyRepo.ID)
|
||||||
|
|
||||||
|
user1 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1})
|
||||||
|
assert.NoError(t, issues_model.CreateIssueDependency(t.Context(), user1, targetIssue, dependencyIssue))
|
||||||
|
|
||||||
|
// remove user 40 access from target repository
|
||||||
|
_, err := db.DeleteByID[access_model.Access](t.Context(), 30)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
url := fmt.Sprintf("/api/v1/repos/%s/%s/issues/%d/dependencies", "user2", "repo1", targetIssue.Index)
|
||||||
|
dependencyMeta := &api.IssueMeta{
|
||||||
|
Owner: "org3",
|
||||||
|
Name: "repo3",
|
||||||
|
Index: dependencyIssue.Index,
|
||||||
|
}
|
||||||
|
|
||||||
|
user40 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 40})
|
||||||
|
// user40 has no access to both target issue and dependency issue
|
||||||
|
writerToken := getUserToken(t, "user40", auth_model.AccessTokenScopeWriteIssue)
|
||||||
|
req := NewRequestWithJSON(t, "DELETE", url, dependencyMeta).
|
||||||
|
AddTokenAuth(writerToken)
|
||||||
|
MakeRequest(t, req, http.StatusNotFound)
|
||||||
|
unittest.AssertExistsAndLoadBean(t, &issues_model.IssueDependency{
|
||||||
|
IssueID: targetIssue.ID,
|
||||||
|
DependencyID: dependencyIssue.ID,
|
||||||
|
})
|
||||||
|
|
||||||
|
// add user40 as a collaborator to dependency repository with read permission
|
||||||
|
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), dependencyRepo, user40, perm.AccessModeRead))
|
||||||
|
|
||||||
|
// try again after getting read permission to dependency repository
|
||||||
|
req = NewRequestWithJSON(t, "DELETE", url, dependencyMeta).
|
||||||
|
AddTokenAuth(writerToken)
|
||||||
|
MakeRequest(t, req, http.StatusNotFound)
|
||||||
|
unittest.AssertExistsAndLoadBean(t, &issues_model.IssueDependency{
|
||||||
|
IssueID: targetIssue.ID,
|
||||||
|
DependencyID: dependencyIssue.ID,
|
||||||
|
})
|
||||||
|
|
||||||
|
// add user40 as a collaborator to target repository with write permission
|
||||||
|
assert.NoError(t, repo_service.AddOrUpdateCollaborator(t.Context(), targetRepo, user40, perm.AccessModeWrite))
|
||||||
|
|
||||||
|
req = NewRequestWithJSON(t, "DELETE", url, dependencyMeta).
|
||||||
|
AddTokenAuth(writerToken)
|
||||||
|
MakeRequest(t, req, http.StatusCreated)
|
||||||
|
unittest.AssertNotExistsBean(t, &issues_model.IssueDependency{
|
||||||
|
IssueID: targetIssue.ID,
|
||||||
|
DependencyID: dependencyIssue.ID,
|
||||||
|
})
|
||||||
|
}
|
||||||
Loading…
Reference in New Issue