summaryrefslogtreecommitdiffstats
path: root/tests/integration
diff options
context:
space:
mode:
authorZettat123 <zettat123@gmail.com>2023-07-29 22:13:24 +0800
committerGitHub <noreply@github.com>2023-07-29 14:13:24 +0000
commitb33cf4fabcdedff126b173d81c8a5609202b39ff (patch)
tree9bcca2ff15435b15232d197cea045a78ace040c6 /tests/integration
parent05d0b7ca91893b749f3e70e828f9777690ecf5f1 (diff)
downloadgitea-b33cf4fabcdedff126b173d81c8a5609202b39ff.tar.gz
gitea-b33cf4fabcdedff126b173d81c8a5609202b39ff.zip
Fix access check for org-level project (#26182)
Fix #25934 Add `ignoreGlobal` parameter to `reqUnitAccess` and only check global disabled units when `ignoreGlobal` is true. So the org-level projects and user-level projects won't be affected by global disabled `repo.projects` unit.
Diffstat (limited to 'tests/integration')
-rw-r--r--tests/integration/org_project_test.go61
1 files changed, 61 insertions, 0 deletions
diff --git a/tests/integration/org_project_test.go b/tests/integration/org_project_test.go
new file mode 100644
index 0000000000..4ae94b4d45
--- /dev/null
+++ b/tests/integration/org_project_test.go
@@ -0,0 +1,61 @@
+// Copyright 2023 The Gitea Authors. All rights reserved.
+// SPDX-License-Identifier: MIT
+
+package integration
+
+import (
+ "net/http"
+ "testing"
+
+ unit_model "code.gitea.io/gitea/models/unit"
+ "code.gitea.io/gitea/tests"
+)
+
+func TestOrgProjectAccess(t *testing.T) {
+ defer tests.PrepareTestEnv(t)()
+
+ // disable repo project unit
+ unit_model.DisabledRepoUnits = []unit_model.Type{unit_model.TypeProjects}
+
+ // repo project, 404
+ req := NewRequest(t, "GET", "/user2/repo1/projects")
+ MakeRequest(t, req, http.StatusNotFound)
+
+ // user project, 200
+ req = NewRequest(t, "GET", "/user2/-/projects")
+ MakeRequest(t, req, http.StatusOK)
+
+ // org project, 200
+ req = NewRequest(t, "GET", "/user3/-/projects")
+ MakeRequest(t, req, http.StatusOK)
+
+ // change the org's visibility to private
+ session := loginUser(t, "user2")
+ req = NewRequestWithValues(t, "POST", "/org/user3/settings", map[string]string{
+ "_csrf": GetCSRF(t, session, "/user3/-/projects"),
+ "name": "user3",
+ "visibility": "2",
+ })
+ session.MakeRequest(t, req, http.StatusSeeOther)
+
+ // user4 can still access the org's project because its team(team1) has the permission
+ session = loginUser(t, "user4")
+ req = NewRequest(t, "GET", "/user3/-/projects")
+ session.MakeRequest(t, req, http.StatusOK)
+
+ // disable team1's project unit
+ session = loginUser(t, "user2")
+ req = NewRequestWithValues(t, "POST", "/org/user3/teams/team1/edit", map[string]string{
+ "_csrf": GetCSRF(t, session, "/user3/-/projects"),
+ "team_name": "team1",
+ "repo_access": "specific",
+ "permission": "read",
+ "unit_8": "0",
+ })
+ session.MakeRequest(t, req, http.StatusSeeOther)
+
+ // user4 can no longer access the org's project
+ session = loginUser(t, "user4")
+ req = NewRequest(t, "GET", "/user3/-/projects")
+ session.MakeRequest(t, req, http.StatusNotFound)
+}