summaryrefslogtreecommitdiff
path: root/spec
diff options
context:
space:
mode:
Diffstat (limited to 'spec')
-rw-r--r--spec/lib/gitlab/auth_spec.rb18
-rw-r--r--spec/lib/gitlab/lfs_token_spec.rb51
-rw-r--r--spec/requests/api/internal_spec.rb46
-rw-r--r--spec/requests/lfs_http_spec.rb16
4 files changed, 0 insertions, 131 deletions
diff --git a/spec/lib/gitlab/auth_spec.rb b/spec/lib/gitlab/auth_spec.rb
index 21f0d46100e..8807a68a0a2 100644
--- a/spec/lib/gitlab/auth_spec.rb
+++ b/spec/lib/gitlab/auth_spec.rb
@@ -61,24 +61,6 @@ describe Gitlab::Auth, lib: true do
expect(gl_auth.find_for_git_client(user.username, 'password', project: nil, ip: ip)).to eq(Gitlab::Auth::Result.new(user, nil, :gitlab_or_ldap, full_authentication_abilities))
end
- it 'recognizes user lfs tokens' do
- user = create(:user)
- ip = 'ip'
- token = Gitlab::LfsToken.new(user).generate
-
- expect(gl_auth).to receive(:rate_limit!).with(ip, success: true, login: user.username)
- expect(gl_auth.find_for_git_client(user.username, token, project: nil, ip: ip)).to eq(Gitlab::Auth::Result.new(user, nil, :lfs_token, read_authentication_abilities))
- end
-
- it 'recognizes deploy key lfs tokens' do
- key = create(:deploy_key)
- ip = 'ip'
- token = Gitlab::LfsToken.new(key).generate
-
- expect(gl_auth).to receive(:rate_limit!).with(ip, success: true, login: "lfs+deploy-key-#{key.id}")
- expect(gl_auth.find_for_git_client("lfs+deploy-key-#{key.id}", token, project: nil, ip: ip)).to eq(Gitlab::Auth::Result.new(key, nil, :lfs_deploy_token, read_authentication_abilities))
- end
-
it 'recognizes OAuth tokens' do
user = create(:user)
application = Doorkeeper::Application.create!(name: "MyApp", redirect_uri: "https://app.com", owner: user)
diff --git a/spec/lib/gitlab/lfs_token_spec.rb b/spec/lib/gitlab/lfs_token_spec.rb
deleted file mode 100644
index 9f04f67e0a8..00000000000
--- a/spec/lib/gitlab/lfs_token_spec.rb
+++ /dev/null
@@ -1,51 +0,0 @@
-require 'spec_helper'
-
-describe Gitlab::LfsToken, lib: true do
- describe '#generate and #value' do
- shared_examples 'an LFS token generator' do
- it 'returns a randomly generated token' do
- token = handler.generate
-
- expect(token).not_to be_nil
- expect(token).to be_a String
- expect(token.length).to eq 50
- end
-
- it 'returns the correct token based on the key' do
- token = handler.generate
-
- expect(handler.value).to eq(token)
- end
- end
-
- context 'when the actor is a user' do
- let(:actor) { create(:user) }
- let(:handler) { described_class.new(actor) }
-
- it_behaves_like 'an LFS token generator'
-
- it 'returns the correct username' do
- expect(handler.actor_name).to eq(actor.username)
- end
-
- it 'returns the correct token type' do
- expect(handler.type).to eq(:lfs_token)
- end
- end
-
- context 'when the actor is a deploy key' do
- let(:actor) { create(:deploy_key) }
- let(:handler) { described_class.new(actor) }
-
- it_behaves_like 'an LFS token generator'
-
- it 'returns the correct username' do
- expect(handler.actor_name).to eq("lfs+deploy-key-#{actor.id}")
- end
-
- it 'returns the correct token type' do
- expect(handler.type).to eq(:lfs_deploy_token)
- end
- end
- end
-end
diff --git a/spec/requests/api/internal_spec.rb b/spec/requests/api/internal_spec.rb
index 46e8e6f1169..46d1b868782 100644
--- a/spec/requests/api/internal_spec.rb
+++ b/spec/requests/api/internal_spec.rb
@@ -100,43 +100,6 @@ describe API::API, api: true do
end
end
- describe "POST /internal/lfs_authenticate" do
- before do
- project.team << [user, :developer]
- end
-
- context 'user key' do
- it 'returns the correct information about the key' do
- lfs_auth(key.id, project)
-
- expect(response).to have_http_status(200)
- expect(json_response['username']).to eq(user.username)
- expect(json_response['lfs_token']).to eq(Gitlab::LfsToken.new(key).value)
-
- expect(json_response['repository_http_path']).to eq(project.http_url_to_repo)
- end
-
- it 'returns a 404 when the wrong key is provided' do
- lfs_auth(nil, project)
-
- expect(response).to have_http_status(404)
- end
- end
-
- context 'deploy key' do
- let(:key) { create(:deploy_key) }
-
- it 'returns the correct information about the key' do
- lfs_auth(key.id, project)
-
- expect(response).to have_http_status(200)
- expect(json_response['username']).to eq("lfs+deploy-key-#{key.id}")
- expect(json_response['lfs_token']).to eq(Gitlab::LfsToken.new(key).value)
- expect(json_response['repository_http_path']).to eq(project.http_url_to_repo)
- end
- end
- end
-
describe "GET /internal/discover" do
it do
get(api("/internal/discover"), key_id: key.id, secret_token: secret_token)
@@ -426,13 +389,4 @@ describe API::API, api: true do
protocol: 'ssh'
)
end
-
- def lfs_auth(key_id, project)
- post(
- api("/internal/lfs_authenticate"),
- key_id: key_id,
- secret_token: secret_token,
- project: project.path_with_namespace
- )
- end
end
diff --git a/spec/requests/lfs_http_spec.rb b/spec/requests/lfs_http_spec.rb
index 09e4e265dd1..b58d410b7a3 100644
--- a/spec/requests/lfs_http_spec.rb
+++ b/spec/requests/lfs_http_spec.rb
@@ -245,18 +245,6 @@ describe 'Git LFS API and storage' do
end
end
- context 'when deploy key is authorized' do
- let(:key) { create(:deploy_key) }
- let(:authorization) { authorize_deploy_key }
-
- let(:update_permissions) do
- project.deploy_keys << key
- project.lfs_objects << lfs_object
- end
-
- it_behaves_like 'responds with a file'
- end
-
context 'when build is authorized as' do
let(:authorization) { authorize_ci_project }
@@ -1109,10 +1097,6 @@ describe 'Git LFS API and storage' do
ActionController::HttpAuthentication::Basic.encode_credentials(user.username, user.password)
end
- def authorize_deploy_key
- ActionController::HttpAuthentication::Basic.encode_credentials("lfs+deploy-key-#{key.id}", Gitlab::LfsToken.new(key).generate)
- end
-
def fork_project(project, user, object = nil)
allow(RepositoryForkWorker).to receive(:perform_async).and_return(true)
Projects::ForkService.new(project, user, {}).execute