You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_keys_test.go 9.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212
  1. // Copyright 2017 The Gogs Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package integration
  4. import (
  5. "fmt"
  6. "net/http"
  7. "net/url"
  8. "testing"
  9. asymkey_model "code.gitea.io/gitea/models/asymkey"
  10. auth_model "code.gitea.io/gitea/models/auth"
  11. "code.gitea.io/gitea/models/perm"
  12. repo_model "code.gitea.io/gitea/models/repo"
  13. "code.gitea.io/gitea/models/unittest"
  14. user_model "code.gitea.io/gitea/models/user"
  15. api "code.gitea.io/gitea/modules/structs"
  16. "code.gitea.io/gitea/tests"
  17. "github.com/stretchr/testify/assert"
  18. )
  19. func TestViewDeployKeysNoLogin(t *testing.T) {
  20. defer tests.PrepareTestEnv(t)()
  21. req := NewRequest(t, "GET", "/api/v1/repos/user2/repo1/keys")
  22. MakeRequest(t, req, http.StatusUnauthorized)
  23. }
  24. func TestCreateDeployKeyNoLogin(t *testing.T) {
  25. defer tests.PrepareTestEnv(t)()
  26. req := NewRequestWithJSON(t, "POST", "/api/v1/repos/user2/repo1/keys", api.CreateKeyOption{
  27. Title: "title",
  28. Key: "key",
  29. })
  30. MakeRequest(t, req, http.StatusUnauthorized)
  31. }
  32. func TestGetDeployKeyNoLogin(t *testing.T) {
  33. defer tests.PrepareTestEnv(t)()
  34. req := NewRequest(t, "GET", "/api/v1/repos/user2/repo1/keys/1")
  35. MakeRequest(t, req, http.StatusUnauthorized)
  36. }
  37. func TestDeleteDeployKeyNoLogin(t *testing.T) {
  38. defer tests.PrepareTestEnv(t)()
  39. req := NewRequest(t, "DELETE", "/api/v1/repos/user2/repo1/keys/1")
  40. MakeRequest(t, req, http.StatusUnauthorized)
  41. }
  42. func TestCreateReadOnlyDeployKey(t *testing.T) {
  43. defer tests.PrepareTestEnv(t)()
  44. repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{Name: "repo1"})
  45. repoOwner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID})
  46. session := loginUser(t, repoOwner.Name)
  47. token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
  48. keysURL := fmt.Sprintf("/api/v1/repos/%s/%s/keys?token=%s", repoOwner.Name, repo.Name, token)
  49. rawKeyBody := api.CreateKeyOption{
  50. Title: "read-only",
  51. Key: "ssh-rsa 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 nocomment\n",
  52. ReadOnly: true,
  53. }
  54. req := NewRequestWithJSON(t, "POST", keysURL, rawKeyBody)
  55. resp := MakeRequest(t, req, http.StatusCreated)
  56. var newDeployKey api.DeployKey
  57. DecodeJSON(t, resp, &newDeployKey)
  58. unittest.AssertExistsAndLoadBean(t, &asymkey_model.DeployKey{
  59. ID: newDeployKey.ID,
  60. Name: rawKeyBody.Title,
  61. Content: rawKeyBody.Key,
  62. Mode: perm.AccessModeRead,
  63. })
  64. // Using the ID of a key that does not belong to the repository must fail
  65. {
  66. req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/repos/%s/%s/keys/%d?token=%s", repoOwner.Name, repo.Name, newDeployKey.ID, token))
  67. MakeRequest(t, req, http.StatusOK)
  68. session5 := loginUser(t, "user5")
  69. token5 := getTokenForLoggedInUser(t, session5, auth_model.AccessTokenScopeWriteRepository)
  70. req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/repos/user5/repo4/keys/%d?token=%s", newDeployKey.ID, token5))
  71. MakeRequest(t, req, http.StatusNotFound)
  72. }
  73. }
  74. func TestCreateReadWriteDeployKey(t *testing.T) {
  75. defer tests.PrepareTestEnv(t)()
  76. repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{Name: "repo1"})
  77. repoOwner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID})
  78. session := loginUser(t, repoOwner.Name)
  79. token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
  80. keysURL := fmt.Sprintf("/api/v1/repos/%s/%s/keys?token=%s", repoOwner.Name, repo.Name, token)
  81. rawKeyBody := api.CreateKeyOption{
  82. Title: "read-write",
  83. Key: "ssh-rsa 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 nocomment\n",
  84. }
  85. req := NewRequestWithJSON(t, "POST", keysURL, rawKeyBody)
  86. resp := MakeRequest(t, req, http.StatusCreated)
  87. var newDeployKey api.DeployKey
  88. DecodeJSON(t, resp, &newDeployKey)
  89. unittest.AssertExistsAndLoadBean(t, &asymkey_model.DeployKey{
  90. ID: newDeployKey.ID,
  91. Name: rawKeyBody.Title,
  92. Content: rawKeyBody.Key,
  93. Mode: perm.AccessModeWrite,
  94. })
  95. }
  96. func TestCreateUserKey(t *testing.T) {
  97. defer tests.PrepareTestEnv(t)()
  98. user := unittest.AssertExistsAndLoadBean(t, &user_model.User{Name: "user1"})
  99. session := loginUser(t, "user1")
  100. token := url.QueryEscape(getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteUser))
  101. keysURL := fmt.Sprintf("/api/v1/user/keys?token=%s", token)
  102. keyType := "ssh-rsa"
  103. keyContent := "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"
  104. rawKeyBody := api.CreateKeyOption{
  105. Title: "test-key",
  106. Key: keyType + " " + keyContent,
  107. }
  108. req := NewRequestWithJSON(t, "POST", keysURL, rawKeyBody)
  109. resp := MakeRequest(t, req, http.StatusCreated)
  110. var newPublicKey api.PublicKey
  111. DecodeJSON(t, resp, &newPublicKey)
  112. fingerprint, err := asymkey_model.CalcFingerprint(rawKeyBody.Key)
  113. assert.NoError(t, err)
  114. unittest.AssertExistsAndLoadBean(t, &asymkey_model.PublicKey{
  115. ID: newPublicKey.ID,
  116. OwnerID: user.ID,
  117. Name: rawKeyBody.Title,
  118. Fingerprint: fingerprint,
  119. Mode: perm.AccessModeWrite,
  120. })
  121. // Search by fingerprint
  122. fingerprintURL := fmt.Sprintf("/api/v1/user/keys?token=%s&fingerprint=%s", token, newPublicKey.Fingerprint)
  123. req = NewRequest(t, "GET", fingerprintURL)
  124. resp = MakeRequest(t, req, http.StatusOK)
  125. var fingerprintPublicKeys []api.PublicKey
  126. DecodeJSON(t, resp, &fingerprintPublicKeys)
  127. assert.Equal(t, newPublicKey.Fingerprint, fingerprintPublicKeys[0].Fingerprint)
  128. assert.Equal(t, newPublicKey.ID, fingerprintPublicKeys[0].ID)
  129. assert.Equal(t, user.ID, fingerprintPublicKeys[0].Owner.ID)
  130. fingerprintURL = fmt.Sprintf("/api/v1/users/%s/keys?token=%s&fingerprint=%s", user.Name, token, newPublicKey.Fingerprint)
  131. req = NewRequest(t, "GET", fingerprintURL)
  132. resp = MakeRequest(t, req, http.StatusOK)
  133. DecodeJSON(t, resp, &fingerprintPublicKeys)
  134. assert.Equal(t, newPublicKey.Fingerprint, fingerprintPublicKeys[0].Fingerprint)
  135. assert.Equal(t, newPublicKey.ID, fingerprintPublicKeys[0].ID)
  136. assert.Equal(t, user.ID, fingerprintPublicKeys[0].Owner.ID)
  137. // Fail search by fingerprint
  138. fingerprintURL = fmt.Sprintf("/api/v1/user/keys?token=%s&fingerprint=%sA", token, newPublicKey.Fingerprint)
  139. req = NewRequest(t, "GET", fingerprintURL)
  140. resp = MakeRequest(t, req, http.StatusOK)
  141. DecodeJSON(t, resp, &fingerprintPublicKeys)
  142. assert.Len(t, fingerprintPublicKeys, 0)
  143. // Fail searching for wrong users key
  144. fingerprintURL = fmt.Sprintf("/api/v1/users/%s/keys?token=%s&fingerprint=%s", "user2", token, newPublicKey.Fingerprint)
  145. req = NewRequest(t, "GET", fingerprintURL)
  146. resp = MakeRequest(t, req, http.StatusOK)
  147. DecodeJSON(t, resp, &fingerprintPublicKeys)
  148. assert.Len(t, fingerprintPublicKeys, 0)
  149. // Now login as user 2
  150. session2 := loginUser(t, "user2")
  151. token2 := url.QueryEscape(getTokenForLoggedInUser(t, session2, auth_model.AccessTokenScopeWriteUser))
  152. // Should find key even though not ours, but we shouldn't know whose it is
  153. fingerprintURL = fmt.Sprintf("/api/v1/user/keys?token=%s&fingerprint=%s", token2, newPublicKey.Fingerprint)
  154. req = NewRequest(t, "GET", fingerprintURL)
  155. resp = MakeRequest(t, req, http.StatusOK)
  156. DecodeJSON(t, resp, &fingerprintPublicKeys)
  157. assert.Equal(t, newPublicKey.Fingerprint, fingerprintPublicKeys[0].Fingerprint)
  158. assert.Equal(t, newPublicKey.ID, fingerprintPublicKeys[0].ID)
  159. assert.Nil(t, fingerprintPublicKeys[0].Owner)
  160. // Should find key even though not ours, but we shouldn't know whose it is
  161. fingerprintURL = fmt.Sprintf("/api/v1/users/%s/keys?token=%s&fingerprint=%s", user.Name, token2, newPublicKey.Fingerprint)
  162. req = NewRequest(t, "GET", fingerprintURL)
  163. resp = MakeRequest(t, req, http.StatusOK)
  164. DecodeJSON(t, resp, &fingerprintPublicKeys)
  165. assert.Equal(t, newPublicKey.Fingerprint, fingerprintPublicKeys[0].Fingerprint)
  166. assert.Equal(t, newPublicKey.ID, fingerprintPublicKeys[0].ID)
  167. assert.Nil(t, fingerprintPublicKeys[0].Owner)
  168. // Fail when searching for key if it is not ours
  169. fingerprintURL = fmt.Sprintf("/api/v1/users/%s/keys?token=%s&fingerprint=%s", "user2", token2, newPublicKey.Fingerprint)
  170. req = NewRequest(t, "GET", fingerprintURL)
  171. resp = MakeRequest(t, req, http.StatusOK)
  172. DecodeJSON(t, resp, &fingerprintPublicKeys)
  173. assert.Len(t, fingerprintPublicKeys, 0)
  174. }