summaryrefslogtreecommitdiff
path: root/spec/requests/api/doorkeeper_access_spec.rb
diff options
context:
space:
mode:
authorMarkus Koller <markus-koller@gmx.ch>2017-01-18 11:23:25 +0100
committerAlexis Reigel <mail@koffeinfrei.org>2017-03-07 15:00:29 +0100
commit93daeee16428707fc348f8c45215854aed6e117a (patch)
tree074d2b524711a42f0f76a27df8d187bd7c6a4ce9 /spec/requests/api/doorkeeper_access_spec.rb
parent789db2cc19b20a4df8ff9f02dd1a771e2736d2fd (diff)
downloadgitlab-ce-93daeee16428707fc348f8c45215854aed6e117a.tar.gz
Don't allow blocked users to authenticate through other means
Gitlab::Auth.find_with_user_password is currently used in these places: - resource_owner_from_credentials in config/initializers/doorkeeper.rb, which is used for the OAuth Resource Owner Password Credentials flow - the /session API call in lib/api/session.rb, which is used to reveal the user's current authentication_token In both cases users should only be authenticated if they're in the active state.
Diffstat (limited to 'spec/requests/api/doorkeeper_access_spec.rb')
-rw-r--r--spec/requests/api/doorkeeper_access_spec.rb18
1 files changed, 18 insertions, 0 deletions
diff --git a/spec/requests/api/doorkeeper_access_spec.rb b/spec/requests/api/doorkeeper_access_spec.rb
index 2974875510a..f6fd567eca5 100644
--- a/spec/requests/api/doorkeeper_access_spec.rb
+++ b/spec/requests/api/doorkeeper_access_spec.rb
@@ -39,4 +39,22 @@ describe API::API, api: true do
end
end
end
+
+ describe "when user is blocked" do
+ it "returns authentication error" do
+ user.block
+ get api("/user"), access_token: token.token
+
+ expect(response).to have_http_status(401)
+ end
+ end
+
+ describe "when user is ldap_blocked" do
+ it "returns authentication error" do
+ user.ldap_block
+ get api("/user"), access_token: token.token
+
+ expect(response).to have_http_status(401)
+ end
+ end
end