summaryrefslogtreecommitdiff
path: root/spec/uploaders
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2020-01-02 21:07:38 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2020-01-02 21:07:38 +0000
commit9d54184f308893338967b18874dedebf38acf89e (patch)
tree100e32c6d4b34deac52d9e98a083361d89804b50 /spec/uploaders
parentd5b5f5e6e1474d5526add9033c9754b8e395841f (diff)
downloadgitlab-ce-9d54184f308893338967b18874dedebf38acf89e.tar.gz
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'spec/uploaders')
-rw-r--r--spec/uploaders/avatar_uploader_spec.rb12
-rw-r--r--spec/uploaders/favicon_uploader_spec.rb24
-rw-r--r--spec/uploaders/upload_type_check_spec.rb124
3 files changed, 160 insertions, 0 deletions
diff --git a/spec/uploaders/avatar_uploader_spec.rb b/spec/uploaders/avatar_uploader_spec.rb
index c0844360589..669f75b2ee8 100644
--- a/spec/uploaders/avatar_uploader_spec.rb
+++ b/spec/uploaders/avatar_uploader_spec.rb
@@ -46,4 +46,16 @@ describe AvatarUploader do
expect(uploader.absolute_path).to eq(absolute_path)
end
end
+
+ context 'upload type check' do
+ AvatarUploader::SAFE_IMAGE_EXT.each do |ext|
+ context "#{ext} extension" do
+ it_behaves_like 'type checked uploads', filenames: "image.#{ext}"
+ end
+ end
+
+ context 'skip image/svg+xml integrity check' do
+ it_behaves_like 'skipped type checked uploads', filenames: 'image.svg'
+ end
+ end
end
diff --git a/spec/uploaders/favicon_uploader_spec.rb b/spec/uploaders/favicon_uploader_spec.rb
new file mode 100644
index 00000000000..4d6c849883a
--- /dev/null
+++ b/spec/uploaders/favicon_uploader_spec.rb
@@ -0,0 +1,24 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+describe FaviconUploader do
+ let_it_be(:model) { build_stubbed(:user) }
+ let_it_be(:uploader) { described_class.new(model, :favicon) }
+
+ context 'upload type check' do
+ FaviconUploader::EXTENSION_WHITELIST.each do |ext|
+ context "#{ext} extension" do
+ it_behaves_like 'type checked uploads', filenames: "image.#{ext}"
+ end
+ end
+ end
+
+ context 'upload non-whitelisted file extensions' do
+ it 'will deny upload' do
+ path = File.join('spec', 'fixtures', 'banana_sample.gif')
+ fixture_file = fixture_file_upload(path)
+ expect { uploader.cache!(fixture_file) }.to raise_exception(CarrierWave::IntegrityError)
+ end
+ end
+end
diff --git a/spec/uploaders/upload_type_check_spec.rb b/spec/uploaders/upload_type_check_spec.rb
new file mode 100644
index 00000000000..a4895f6a956
--- /dev/null
+++ b/spec/uploaders/upload_type_check_spec.rb
@@ -0,0 +1,124 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+describe UploadTypeCheck do
+ include_context 'uploader with type check'
+
+ def upload_fixture(filename)
+ fixture_file_upload(File.join('spec', 'fixtures', filename))
+ end
+
+ describe '#check_content_matches_extension! callback using file upload' do
+ context 'when extension matches contents' do
+ it 'not raise error on upload' do
+ expect { uploader.cache!(upload_fixture('banana_sample.gif')) }.not_to raise_error
+ end
+ end
+
+ context 'when extension does not match contents' do
+ it 'raise error' do
+ expect { uploader.cache!(upload_fixture('not_a_png.png')) }.to raise_error(CarrierWave::IntegrityError)
+ end
+ end
+ end
+
+ describe '#check_content_matches_extension! callback using stubs' do
+ include_context 'stubbed MimeMagic mime type detection'
+
+ context 'when no extension and with ambiguous/text content' do
+ let(:magic_mime) { '' }
+ let(:ext_mime) { '' }
+
+ it_behaves_like 'upload passes content type check'
+ end
+
+ context 'when no extension and with non-text content' do
+ let(:magic_mime) { 'image/gif' }
+ let(:ext_mime) { '' }
+
+ it_behaves_like 'upload fails content type check'
+ end
+
+ # Most text files will exhibit this behaviour.
+ context 'when ambiguous content with text extension' do
+ let(:magic_mime) { '' }
+ let(:ext_mime) { 'text/plain' }
+
+ it_behaves_like 'upload passes content type check'
+ end
+
+ context 'when text content with text extension' do
+ let(:magic_mime) { 'text/plain' }
+ let(:ext_mime) { 'text/plain' }
+
+ it_behaves_like 'upload passes content type check'
+ end
+
+ context 'when ambiguous content with non-text extension' do
+ let(:magic_mime) { '' }
+ let(:ext_mime) { 'application/zip' }
+
+ it_behaves_like 'upload fails content type check'
+ end
+
+ # These are the types when uploading a .dmg
+ context 'when content and extension do not match' do
+ let(:magic_mime) { 'application/x-bzip' }
+ let(:ext_mime) { 'application/x-apple-diskimage' }
+
+ it_behaves_like 'upload fails content type check'
+ end
+ end
+
+ describe '#check_content_matches_extension! mime_type filtering' do
+ context 'without mime types' do
+ let(:mime_types) { nil }
+
+ it_behaves_like 'type checked uploads', %w[doc_sample.txt rails_sample.jpg]
+ end
+
+ context 'with mime types string' do
+ let(:mime_types) { 'text/plain' }
+
+ it_behaves_like 'type checked uploads', %w[doc_sample.txt]
+ it_behaves_like 'skipped type checked uploads', %w[dk.png]
+ end
+
+ context 'with mime types regex' do
+ let(:mime_types) { [/image\/(gif|png)/] }
+
+ it_behaves_like 'type checked uploads', %w[banana_sample.gif dk.png]
+ it_behaves_like 'skipped type checked uploads', %w[doc_sample.txt]
+ end
+
+ context 'with mime types array' do
+ let(:mime_types) { ['text/plain', /image\/png/] }
+
+ it_behaves_like 'type checked uploads', %w[doc_sample.txt dk.png]
+ it_behaves_like 'skipped type checked uploads', %w[audio_sample.wav]
+ end
+ end
+
+ describe '#check_content_matches_extension! extensions filtering' do
+ context 'without extensions' do
+ let(:extensions) { nil }
+
+ it_behaves_like 'type checked uploads', %w[doc_sample.txt dk.png]
+ end
+
+ context 'with extensions string' do
+ let(:extensions) { 'txt' }
+
+ it_behaves_like 'type checked uploads', %w[doc_sample.txt]
+ it_behaves_like 'skipped type checked uploads', %w[rails_sample.jpg]
+ end
+
+ context 'with extensions array of strings' do
+ let(:extensions) { %w[txt png] }
+
+ it_behaves_like 'type checked uploads', %w[doc_sample.txt dk.png]
+ it_behaves_like 'skipped type checked uploads', %w[audio_sample.wav]
+ end
+ end
+end