Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'spec/requests/api/helm_packages_spec.rb')
-rw-r--r--spec/requests/api/helm_packages_spec.rb176
1 files changed, 146 insertions, 30 deletions
diff --git a/spec/requests/api/helm_packages_spec.rb b/spec/requests/api/helm_packages_spec.rb
index 5871c0a5d5b..08b4489a6e3 100644
--- a/spec/requests/api/helm_packages_spec.rb
+++ b/spec/requests/api/helm_packages_spec.rb
@@ -9,55 +9,171 @@ RSpec.describe API::HelmPackages do
let_it_be_with_reload(:project) { create(:project, :public) }
let_it_be(:deploy_token) { create(:deploy_token, read_package_registry: true, write_package_registry: true) }
let_it_be(:project_deploy_token) { create(:project_deploy_token, deploy_token: deploy_token, project: project) }
+ let_it_be(:package) { create(:helm_package, project: project) }
- describe 'GET /api/v4/projects/:id/packages/helm/:channel/charts/:file_name.tgz' do
- let_it_be(:package) { create(:helm_package, project: project) }
-
- let(:channel) { package.package_files.first.helm_channel }
+ describe 'GET /api/v4/projects/:id/packages/helm/:channel/index.yaml' do
+ it_behaves_like 'handling helm chart index requests' do
+ let(:url) { "/projects/#{project.id}/packages/helm/#{package.package_files.first.helm_channel}/index.yaml" }
+ end
+ end
- let(:url) { "/projects/#{project.id}/packages/helm/#{channel}/charts/#{package.name}-#{package.version}.tgz" }
+ describe 'GET /api/v4/projects/:id/packages/helm/:channel/charts/:file_name.tgz' do
+ let(:url) { "/projects/#{project.id}/packages/helm/#{package.package_files.first.helm_channel}/charts/#{package.name}-#{package.version}.tgz" }
- subject { get api(url) }
+ subject { get api(url), headers: headers }
context 'with valid project' do
- where(:visibility, :user_role, :member, :user_token, :shared_examples_name, :expected_status) do
- :public | :developer | true | true | 'process helm download content request' | :success
- :public | :guest | true | true | 'process helm download content request' | :success
- :public | :developer | true | false | 'rejects helm packages access' | :unauthorized
- :public | :guest | true | false | 'rejects helm packages access' | :unauthorized
- :public | :developer | false | true | 'process helm download content request' | :success
- :public | :guest | false | true | 'process helm download content request' | :success
- :public | :developer | false | false | 'rejects helm packages access' | :unauthorized
- :public | :guest | false | false | 'rejects helm packages access' | :unauthorized
- :public | :anonymous | false | true | 'process helm download content request' | :success
- :private | :developer | true | true | 'process helm download content request' | :success
- :private | :guest | true | true | 'rejects helm packages access' | :forbidden
- :private | :developer | true | false | 'rejects helm packages access' | :unauthorized
- :private | :guest | true | false | 'rejects helm packages access' | :unauthorized
- :private | :developer | false | true | 'rejects helm packages access' | :not_found
- :private | :guest | false | true | 'rejects helm packages access' | :not_found
- :private | :developer | false | false | 'rejects helm packages access' | :unauthorized
- :private | :guest | false | false | 'rejects helm packages access' | :unauthorized
- :private | :anonymous | false | true | 'rejects helm packages access' | :unauthorized
+ where(:visibility, :user_role, :shared_examples_name, :expected_status) do
+ :public | :guest | 'process helm download content request' | :success
+ :public | :not_a_member | 'process helm download content request' | :success
+ :public | :anonymous | 'process helm download content request' | :success
+ :private | :reporter | 'process helm download content request' | :success
+ :private | :guest | 'rejects helm packages access' | :forbidden
+ :private | :not_a_member | 'rejects helm packages access' | :not_found
+ :private | :anonymous | 'rejects helm packages access' | :unauthorized
end
with_them do
- let(:token) { user_token ? personal_access_token.token : 'wrong' }
- let(:headers) { user_role == :anonymous ? {} : basic_auth_header(user.username, token) }
+ let(:headers) { user_role == :anonymous ? {} : basic_auth_header(user.username, personal_access_token.token) }
let(:snowplow_gitlab_standard_context) { { project: project, namespace: project.namespace } }
- subject { get api(url), headers: headers }
-
before do
project.update!(visibility: visibility.to_s)
end
- it_behaves_like params[:shared_examples_name], params[:user_role], params[:expected_status], params[:member]
+ it_behaves_like params[:shared_examples_name], params[:user_role], params[:expected_status]
end
end
+ context 'when an invalid token is passed' do
+ let(:headers) { basic_auth_header(user.username, 'wrong') }
+
+ it_behaves_like 'returning response status', :unauthorized
+ end
+
it_behaves_like 'deploy token for package GET requests'
+ end
+
+ describe 'POST /api/v4/projects/:id/packages/helm/api/:channel/charts/authorize' do
+ include_context 'workhorse headers'
+
+ let(:channel) { 'stable' }
+ let(:url) { "/projects/#{project.id}/packages/helm/api/#{channel}/charts/authorize" }
+ let(:headers) { {} }
+
+ subject { post api(url), headers: headers }
+
+ context 'with valid project' do
+ where(:visibility_level, :user_role, :shared_examples_name, :expected_status) do
+ :public | :developer | 'process helm workhorse authorization' | :success
+ :public | :reporter | 'rejects helm packages access' | :forbidden
+ :public | :not_a_member | 'rejects helm packages access' | :forbidden
+ :public | :anonymous | 'rejects helm packages access' | :unauthorized
+ :private | :developer | 'process helm workhorse authorization' | :success
+ :private | :reporter | 'rejects helm packages access' | :forbidden
+ :private | :not_a_member | 'rejects helm packages access' | :not_found
+ :private | :anonymous | 'rejects helm packages access' | :unauthorized
+ end
+
+ with_them do
+ let(:user_headers) { user_role == :anonymous ? {} : basic_auth_header(user.username, personal_access_token.token) }
+ let(:headers) { user_headers.merge(workhorse_headers) }
+
+ before do
+ project.update_column(:visibility_level, Gitlab::VisibilityLevel.level_value(visibility_level.to_s))
+ end
+
+ it_behaves_like params[:shared_examples_name], params[:user_role], params[:expected_status]
+ end
+ end
+
+ context 'when an invalid token is passed' do
+ let(:headers) { basic_auth_header(user.username, 'wrong') }
+
+ it_behaves_like 'returning response status', :unauthorized
+ end
+
+ it_behaves_like 'deploy token for package uploads'
+
+ it_behaves_like 'job token for package uploads', authorize_endpoint: true, accept_invalid_username: true do
+ let_it_be(:job) { create(:ci_build, :running, user: user, project: project) }
+ end
it_behaves_like 'rejects helm access with unknown project id'
end
+
+ describe 'POST /api/v4/projects/:id/packages/helm/api/:channel/charts' do
+ include_context 'workhorse headers'
+
+ let_it_be(:file_name) { 'package.tgz' }
+
+ let(:channel) { 'stable' }
+ let(:url) { "/projects/#{project.id}/packages/helm/api/#{channel}/charts" }
+ let(:headers) { {} }
+ let(:params) { { chart: temp_file(file_name) } }
+ let(:file_key) { :chart }
+ let(:send_rewritten_field) { true }
+ let(:snowplow_gitlab_standard_context) { { project: project, namespace: project.namespace } }
+
+ subject do
+ workhorse_finalize(
+ api(url),
+ method: :post,
+ file_key: file_key,
+ params: params,
+ headers: headers,
+ send_rewritten_field: send_rewritten_field
+ )
+ end
+
+ context 'with valid project' do
+ where(:visibility_level, :user_role, :shared_examples_name, :expected_status) do
+ :public | :developer | 'process helm upload' | :created
+ :public | :reporter | 'rejects helm packages access' | :forbidden
+ :public | :not_a_member | 'rejects helm packages access' | :forbidden
+ :public | :anonymous | 'rejects helm packages access' | :unauthorized
+ :private | :developer | 'process helm upload' | :created
+ :private | :guest | 'rejects helm packages access' | :forbidden
+ :private | :not_a_member | 'rejects helm packages access' | :not_found
+ :private | :anonymous | 'rejects helm packages access' | :unauthorized
+ end
+
+ with_them do
+ let(:user_headers) { user_role == :anonymous ? {} : basic_auth_header(user.username, personal_access_token.token) }
+ let(:headers) { user_headers.merge(workhorse_headers) }
+
+ before do
+ project.update_column(:visibility_level, Gitlab::VisibilityLevel.level_value(visibility_level.to_s))
+ end
+
+ it_behaves_like params[:shared_examples_name], params[:user_role], params[:expected_status]
+ end
+ end
+
+ context 'when an invalid token is passed' do
+ let(:headers) { basic_auth_header(user.username, 'wrong') }
+
+ it_behaves_like 'returning response status', :unauthorized
+ end
+
+ it_behaves_like 'deploy token for package uploads'
+
+ it_behaves_like 'job token for package uploads', accept_invalid_username: true do
+ let_it_be(:job) { create(:ci_build, :running, user: user, project: project) }
+ end
+
+ it_behaves_like 'rejects helm access with unknown project id'
+
+ context 'file size above maximum limit' do
+ let(:headers) { basic_auth_header(deploy_token.username, deploy_token.token).merge(workhorse_headers) }
+
+ before do
+ allow_next_instance_of(UploadedFile) do |uploaded_file|
+ allow(uploaded_file).to receive(:size).and_return(project.actual_limits.helm_max_file_size + 1)
+ end
+ end
+
+ it_behaves_like 'returning response status', :bad_request
+ end
+ end
end