diff options
author | Zettat123 <zettat123@gmail.com> | 2023-07-29 22:13:24 +0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2023-07-29 14:13:24 +0000 |
commit | b33cf4fabcdedff126b173d81c8a5609202b39ff (patch) | |
tree | 9bcca2ff15435b15232d197cea045a78ace040c6 /tests/integration | |
parent | 05d0b7ca91893b749f3e70e828f9777690ecf5f1 (diff) | |
download | gitea-b33cf4fabcdedff126b173d81c8a5609202b39ff.tar.gz gitea-b33cf4fabcdedff126b173d81c8a5609202b39ff.zip |
Fix access check for org-level project (#26182)
Fix #25934
Add `ignoreGlobal` parameter to `reqUnitAccess` and only check global
disabled units when `ignoreGlobal` is true. So the org-level projects
and user-level projects won't be affected by global disabled
`repo.projects` unit.
Diffstat (limited to 'tests/integration')
-rw-r--r-- | tests/integration/org_project_test.go | 61 |
1 files changed, 61 insertions, 0 deletions
diff --git a/tests/integration/org_project_test.go b/tests/integration/org_project_test.go new file mode 100644 index 0000000000..4ae94b4d45 --- /dev/null +++ b/tests/integration/org_project_test.go @@ -0,0 +1,61 @@ +// Copyright 2023 The Gitea Authors. All rights reserved. +// SPDX-License-Identifier: MIT + +package integration + +import ( + "net/http" + "testing" + + unit_model "code.gitea.io/gitea/models/unit" + "code.gitea.io/gitea/tests" +) + +func TestOrgProjectAccess(t *testing.T) { + defer tests.PrepareTestEnv(t)() + + // disable repo project unit + unit_model.DisabledRepoUnits = []unit_model.Type{unit_model.TypeProjects} + + // repo project, 404 + req := NewRequest(t, "GET", "/user2/repo1/projects") + MakeRequest(t, req, http.StatusNotFound) + + // user project, 200 + req = NewRequest(t, "GET", "/user2/-/projects") + MakeRequest(t, req, http.StatusOK) + + // org project, 200 + req = NewRequest(t, "GET", "/user3/-/projects") + MakeRequest(t, req, http.StatusOK) + + // change the org's visibility to private + session := loginUser(t, "user2") + req = NewRequestWithValues(t, "POST", "/org/user3/settings", map[string]string{ + "_csrf": GetCSRF(t, session, "/user3/-/projects"), + "name": "user3", + "visibility": "2", + }) + session.MakeRequest(t, req, http.StatusSeeOther) + + // user4 can still access the org's project because its team(team1) has the permission + session = loginUser(t, "user4") + req = NewRequest(t, "GET", "/user3/-/projects") + session.MakeRequest(t, req, http.StatusOK) + + // disable team1's project unit + session = loginUser(t, "user2") + req = NewRequestWithValues(t, "POST", "/org/user3/teams/team1/edit", map[string]string{ + "_csrf": GetCSRF(t, session, "/user3/-/projects"), + "team_name": "team1", + "repo_access": "specific", + "permission": "read", + "unit_8": "0", + }) + session.MakeRequest(t, req, http.StatusSeeOther) + + // user4 can no longer access the org's project + session = loginUser(t, "user4") + req = NewRequest(t, "GET", "/user3/-/projects") + session.MakeRequest(t, req, http.StatusNotFound) +} |