diff options
Diffstat (limited to 'spec/requests/api/helm_packages_spec.rb')
-rw-r--r-- | spec/requests/api/helm_packages_spec.rb | 176 |
1 files changed, 146 insertions, 30 deletions
diff --git a/spec/requests/api/helm_packages_spec.rb b/spec/requests/api/helm_packages_spec.rb index 5871c0a5d5b..08b4489a6e3 100644 --- a/spec/requests/api/helm_packages_spec.rb +++ b/spec/requests/api/helm_packages_spec.rb @@ -9,55 +9,171 @@ RSpec.describe API::HelmPackages do let_it_be_with_reload(:project) { create(:project, :public) } let_it_be(:deploy_token) { create(:deploy_token, read_package_registry: true, write_package_registry: true) } let_it_be(:project_deploy_token) { create(:project_deploy_token, deploy_token: deploy_token, project: project) } + let_it_be(:package) { create(:helm_package, project: project) } - describe 'GET /api/v4/projects/:id/packages/helm/:channel/charts/:file_name.tgz' do - let_it_be(:package) { create(:helm_package, project: project) } - - let(:channel) { package.package_files.first.helm_channel } + describe 'GET /api/v4/projects/:id/packages/helm/:channel/index.yaml' do + it_behaves_like 'handling helm chart index requests' do + let(:url) { "/projects/#{project.id}/packages/helm/#{package.package_files.first.helm_channel}/index.yaml" } + end + end - let(:url) { "/projects/#{project.id}/packages/helm/#{channel}/charts/#{package.name}-#{package.version}.tgz" } + describe 'GET /api/v4/projects/:id/packages/helm/:channel/charts/:file_name.tgz' do + let(:url) { "/projects/#{project.id}/packages/helm/#{package.package_files.first.helm_channel}/charts/#{package.name}-#{package.version}.tgz" } - subject { get api(url) } + subject { get api(url), headers: headers } context 'with valid project' do - where(:visibility, :user_role, :member, :user_token, :shared_examples_name, :expected_status) do - :public | :developer | true | true | 'process helm download content request' | :success - :public | :guest | true | true | 'process helm download content request' | :success - :public | :developer | true | false | 'rejects helm packages access' | :unauthorized - :public | :guest | true | false | 'rejects helm packages access' | :unauthorized - :public | :developer | false | true | 'process helm download content request' | :success - :public | :guest | false | true | 'process helm download content request' | :success - :public | :developer | false | false | 'rejects helm packages access' | :unauthorized - :public | :guest | false | false | 'rejects helm packages access' | :unauthorized - :public | :anonymous | false | true | 'process helm download content request' | :success - :private | :developer | true | true | 'process helm download content request' | :success - :private | :guest | true | true | 'rejects helm packages access' | :forbidden - :private | :developer | true | false | 'rejects helm packages access' | :unauthorized - :private | :guest | true | false | 'rejects helm packages access' | :unauthorized - :private | :developer | false | true | 'rejects helm packages access' | :not_found - :private | :guest | false | true | 'rejects helm packages access' | :not_found - :private | :developer | false | false | 'rejects helm packages access' | :unauthorized - :private | :guest | false | false | 'rejects helm packages access' | :unauthorized - :private | :anonymous | false | true | 'rejects helm packages access' | :unauthorized + where(:visibility, :user_role, :shared_examples_name, :expected_status) do + :public | :guest | 'process helm download content request' | :success + :public | :not_a_member | 'process helm download content request' | :success + :public | :anonymous | 'process helm download content request' | :success + :private | :reporter | 'process helm download content request' | :success + :private | :guest | 'rejects helm packages access' | :forbidden + :private | :not_a_member | 'rejects helm packages access' | :not_found + :private | :anonymous | 'rejects helm packages access' | :unauthorized end with_them do - let(:token) { user_token ? personal_access_token.token : 'wrong' } - let(:headers) { user_role == :anonymous ? {} : basic_auth_header(user.username, token) } + let(:headers) { user_role == :anonymous ? {} : basic_auth_header(user.username, personal_access_token.token) } let(:snowplow_gitlab_standard_context) { { project: project, namespace: project.namespace } } - subject { get api(url), headers: headers } - before do project.update!(visibility: visibility.to_s) end - it_behaves_like params[:shared_examples_name], params[:user_role], params[:expected_status], params[:member] + it_behaves_like params[:shared_examples_name], params[:user_role], params[:expected_status] end end + context 'when an invalid token is passed' do + let(:headers) { basic_auth_header(user.username, 'wrong') } + + it_behaves_like 'returning response status', :unauthorized + end + it_behaves_like 'deploy token for package GET requests' + end + + describe 'POST /api/v4/projects/:id/packages/helm/api/:channel/charts/authorize' do + include_context 'workhorse headers' + + let(:channel) { 'stable' } + let(:url) { "/projects/#{project.id}/packages/helm/api/#{channel}/charts/authorize" } + let(:headers) { {} } + + subject { post api(url), headers: headers } + + context 'with valid project' do + where(:visibility_level, :user_role, :shared_examples_name, :expected_status) do + :public | :developer | 'process helm workhorse authorization' | :success + :public | :reporter | 'rejects helm packages access' | :forbidden + :public | :not_a_member | 'rejects helm packages access' | :forbidden + :public | :anonymous | 'rejects helm packages access' | :unauthorized + :private | :developer | 'process helm workhorse authorization' | :success + :private | :reporter | 'rejects helm packages access' | :forbidden + :private | :not_a_member | 'rejects helm packages access' | :not_found + :private | :anonymous | 'rejects helm packages access' | :unauthorized + end + + with_them do + let(:user_headers) { user_role == :anonymous ? {} : basic_auth_header(user.username, personal_access_token.token) } + let(:headers) { user_headers.merge(workhorse_headers) } + + before do + project.update_column(:visibility_level, Gitlab::VisibilityLevel.level_value(visibility_level.to_s)) + end + + it_behaves_like params[:shared_examples_name], params[:user_role], params[:expected_status] + end + end + + context 'when an invalid token is passed' do + let(:headers) { basic_auth_header(user.username, 'wrong') } + + it_behaves_like 'returning response status', :unauthorized + end + + it_behaves_like 'deploy token for package uploads' + + it_behaves_like 'job token for package uploads', authorize_endpoint: true, accept_invalid_username: true do + let_it_be(:job) { create(:ci_build, :running, user: user, project: project) } + end it_behaves_like 'rejects helm access with unknown project id' end + + describe 'POST /api/v4/projects/:id/packages/helm/api/:channel/charts' do + include_context 'workhorse headers' + + let_it_be(:file_name) { 'package.tgz' } + + let(:channel) { 'stable' } + let(:url) { "/projects/#{project.id}/packages/helm/api/#{channel}/charts" } + let(:headers) { {} } + let(:params) { { chart: temp_file(file_name) } } + let(:file_key) { :chart } + let(:send_rewritten_field) { true } + let(:snowplow_gitlab_standard_context) { { project: project, namespace: project.namespace } } + + subject do + workhorse_finalize( + api(url), + method: :post, + file_key: file_key, + params: params, + headers: headers, + send_rewritten_field: send_rewritten_field + ) + end + + context 'with valid project' do + where(:visibility_level, :user_role, :shared_examples_name, :expected_status) do + :public | :developer | 'process helm upload' | :created + :public | :reporter | 'rejects helm packages access' | :forbidden + :public | :not_a_member | 'rejects helm packages access' | :forbidden + :public | :anonymous | 'rejects helm packages access' | :unauthorized + :private | :developer | 'process helm upload' | :created + :private | :guest | 'rejects helm packages access' | :forbidden + :private | :not_a_member | 'rejects helm packages access' | :not_found + :private | :anonymous | 'rejects helm packages access' | :unauthorized + end + + with_them do + let(:user_headers) { user_role == :anonymous ? {} : basic_auth_header(user.username, personal_access_token.token) } + let(:headers) { user_headers.merge(workhorse_headers) } + + before do + project.update_column(:visibility_level, Gitlab::VisibilityLevel.level_value(visibility_level.to_s)) + end + + it_behaves_like params[:shared_examples_name], params[:user_role], params[:expected_status] + end + end + + context 'when an invalid token is passed' do + let(:headers) { basic_auth_header(user.username, 'wrong') } + + it_behaves_like 'returning response status', :unauthorized + end + + it_behaves_like 'deploy token for package uploads' + + it_behaves_like 'job token for package uploads', accept_invalid_username: true do + let_it_be(:job) { create(:ci_build, :running, user: user, project: project) } + end + + it_behaves_like 'rejects helm access with unknown project id' + + context 'file size above maximum limit' do + let(:headers) { basic_auth_header(deploy_token.username, deploy_token.token).merge(workhorse_headers) } + + before do + allow_next_instance_of(UploadedFile) do |uploaded_file| + allow(uploaded_file).to receive(:size).and_return(project.actual_limits.helm_max_file_size + 1) + end + end + + it_behaves_like 'returning response status', :bad_request + end + end end |