test_server_git.py
194 lines
| 7.3 KiB
| text/x-python
|
PythonLexer
r2043 | # -*- coding: utf-8 -*- | ||
# Copyright (C) 2016-2017 RhodeCode GmbH | |||
# | |||
# This program is free software: you can redistribute it and/or modify | |||
# it under the terms of the GNU Affero General Public License, version 3 | |||
# (only), as published by the Free Software Foundation. | |||
# | |||
# This program is distributed in the hope that it will be useful, | |||
# but WITHOUT ANY WARRANTY; without even the implied warranty of | |||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |||
# GNU General Public License for more details. | |||
# | |||
# You should have received a copy of the GNU Affero General Public License | |||
# along with this program. If not, see <http://www.gnu.org/licenses/>. | |||
# | |||
# This program is dual-licensed. If you wish to learn more about the | |||
# RhodeCode Enterprise Edition, including its added features, Support services, | |||
# and proprietary license terms, please see https://rhodecode.com/licenses/ | |||
import json | |||
import pytest | |||
from mock import Mock, patch, call | |||
from rhodecode.apps.ssh_support.lib.ssh_wrapper import GitServer | |||
@pytest.fixture | |||
def git_server(): | |||
return GitServerCreator() | |||
class GitServerCreator(object): | |||
root = '/tmp/repo/path/' | |||
git_path = '/usr/local/bin/' | |||
config_data = { | |||
'app:main': { | |||
'ssh.executable.git': git_path | |||
} | |||
} | |||
repo_name = 'test_git' | |||
repo_mode = 'receive-pack' | |||
user = 'vcs' | |||
def __init__(self): | |||
def config_get(part, key): | |||
return self.config_data.get(part, {}).get(key) | |||
self.config_mock = Mock() | |||
self.config_mock.get = Mock(side_effect=config_get) | |||
def create(self, **kwargs): | |||
parameters = { | |||
'store': {'path': self.root}, | |||
'ini_path': '', | |||
'user': self.user, | |||
'repo_name': self.repo_name, | |||
'repo_mode': self.repo_mode, | |||
'user_permissions': { | |||
self.repo_name: 'repo_admin' | |||
}, | |||
'config': self.config_mock, | |||
} | |||
parameters.update(kwargs) | |||
server = GitServer(**parameters) | |||
return server | |||
class TestGitServer(object): | |||
def test_command(self, git_server): | |||
server = git_server.create() | |||
server.read_only = False | |||
expected_command = ( | |||
'cd {root}; {git_path}-{repo_mode}' | |||
' \'{root}{repo_name}\''.format( | |||
root=git_server.root, git_path=git_server.git_path, | |||
repo_mode=git_server.repo_mode, repo_name=git_server.repo_name) | |||
) | |||
assert expected_command == server.command | |||
def test_run_returns_exit_code_2_when_no_permissions(self, git_server, caplog): | |||
server = git_server.create() | |||
with patch.object(server, '_check_permissions') as permissions_mock: | |||
with patch.object(server, '_update_environment'): | |||
permissions_mock.return_value = 2 | |||
exit_code = server.run() | |||
assert exit_code == (2, False) | |||
def test_run_returns_executes_command(self, git_server, caplog): | |||
server = git_server.create() | |||
with patch.object(server, '_check_permissions') as permissions_mock: | |||
with patch('os.system') as system_mock: | |||
with patch.object(server, '_update_environment') as ( | |||
update_mock): | |||
permissions_mock.return_value = 0 | |||
system_mock.return_value = 0 | |||
exit_code = server.run() | |||
system_mock.assert_called_once_with(server.command) | |||
update_mock.assert_called_once_with() | |||
assert exit_code == (0, True) | |||
@pytest.mark.parametrize( | |||
'repo_mode, action', [ | |||
['receive-pack', 'push'], | |||
['upload-pack', 'pull'] | |||
]) | |||
def test_update_environment(self, git_server, repo_mode, action): | |||
server = git_server.create(repo_mode=repo_mode) | |||
with patch('os.environ', {'SSH_CLIENT': '10.10.10.10 b'}): | |||
with patch('os.putenv') as putenv_mock: | |||
server._update_environment() | |||
expected_data = { | |||
"username": git_server.user, | |||
"scm": "git", | |||
"repository": git_server.repo_name, | |||
"make_lock": None, | |||
"action": [action], | |||
"ip": "10.10.10.10", | |||
"locked_by": [None, None], | |||
"config": "" | |||
} | |||
putenv_mock.assert_called_once_with( | |||
'RC_SCM_DATA', json.dumps(expected_data)) | |||
class TestGitServerCheckPermissions(object): | |||
def test_returns_2_when_no_permissions_found(self, git_server, caplog): | |||
user_permissions = {} | |||
server = git_server.create(user_permissions=user_permissions) | |||
result = server._check_permissions() | |||
assert result == 2 | |||
log_msg = 'permission for vcs on test_git are: None' | |||
assert log_msg in [t[2] for t in caplog.record_tuples] | |||
def test_returns_2_when_no_permissions(self, git_server, caplog): | |||
user_permissions = {git_server.repo_name: 'repository.none'} | |||
server = git_server.create(user_permissions=user_permissions) | |||
result = server._check_permissions() | |||
assert result == 2 | |||
log_msg = 'repo not found or no permissions' | |||
assert log_msg in [t[2] for t in caplog.record_tuples] | |||
@pytest.mark.parametrize( | |||
'permission', ['repository.admin', 'repository.write']) | |||
def test_access_allowed_when_user_has_write_permissions( | |||
self, git_server, permission, caplog): | |||
user_permissions = {git_server.repo_name: permission} | |||
server = git_server.create(user_permissions=user_permissions) | |||
result = server._check_permissions() | |||
assert result is None | |||
log_msg = 'Write Permissions for User "%s" granted to repo "%s"!' % ( | |||
git_server.user, git_server.repo_name) | |||
assert log_msg in [t[2] for t in caplog.record_tuples] | |||
def test_write_access_is_not_allowed_when_user_has_read_permission( | |||
self, git_server, caplog): | |||
user_permissions = {git_server.repo_name: 'repository.read'} | |||
server = git_server.create( | |||
user_permissions=user_permissions, repo_mode='receive-pack') | |||
result = server._check_permissions() | |||
assert result == -3 | |||
log_msg = 'Only Read Only access for User "%s" granted to repo "%s"! Failing!' % ( | |||
git_server.user, git_server.repo_name) | |||
assert log_msg in [t[2] for t in caplog.record_tuples] | |||
def test_read_access_allowed_when_user_has_read_permission( | |||
self, git_server, caplog): | |||
user_permissions = {git_server.repo_name: 'repository.read'} | |||
server = git_server.create( | |||
user_permissions=user_permissions, repo_mode='upload-pack') | |||
result = server._check_permissions() | |||
assert result is None | |||
log_msg = 'Only Read Only access for User "%s" granted to repo "%s"!' % ( | |||
git_server.user, git_server.repo_name) | |||
assert log_msg in [t[2] for t in caplog.record_tuples] | |||
def test_returns_error_when_permission_not_recognised( | |||
self, git_server, caplog): | |||
user_permissions = {git_server.repo_name: 'repository.whatever'} | |||
server = git_server.create( | |||
user_permissions=user_permissions, repo_mode='upload-pack') | |||
result = server._check_permissions() | |||
assert result == -2 | |||
log_msg = 'Cannot properly fetch user permission. ' \ | |||
'Return value is: repository.whatever' | |||
assert log_msg in [t[2] for t in caplog.record_tuples] |