mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-12-27 13:39:19 -05:00
dbbd359984
Signed-off-by: Awiteb <a@4rs.nl>
198 lines
6.3 KiB
Go
198 lines
6.3 KiB
Go
// Copyright 2021 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package integration
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/http"
|
|
"strconv"
|
|
"testing"
|
|
"time"
|
|
|
|
auth_model "code.gitea.io/gitea/models/auth"
|
|
"code.gitea.io/gitea/models/db"
|
|
issues_model "code.gitea.io/gitea/models/issues"
|
|
"code.gitea.io/gitea/models/unittest"
|
|
user_model "code.gitea.io/gitea/models/user"
|
|
api "code.gitea.io/gitea/modules/structs"
|
|
"code.gitea.io/gitea/modules/timeutil"
|
|
"code.gitea.io/gitea/tests"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestAdminViewUsers(t *testing.T) {
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
session := loginUser(t, "user1")
|
|
req := NewRequest(t, "GET", "/admin/users")
|
|
session.MakeRequest(t, req, http.StatusOK)
|
|
|
|
session = loginUser(t, "user2")
|
|
req = NewRequest(t, "GET", "/admin/users")
|
|
session.MakeRequest(t, req, http.StatusForbidden)
|
|
}
|
|
|
|
func TestAdminViewUser(t *testing.T) {
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
session := loginUser(t, "user1")
|
|
req := NewRequest(t, "GET", "/admin/users/1")
|
|
session.MakeRequest(t, req, http.StatusOK)
|
|
|
|
session = loginUser(t, "user2")
|
|
req = NewRequest(t, "GET", "/admin/users/1")
|
|
session.MakeRequest(t, req, http.StatusForbidden)
|
|
}
|
|
|
|
func TestAdminEditUser(t *testing.T) {
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
testSuccessfullEdit(t, user_model.User{ID: 2, Name: "newusername", LoginName: "otherlogin", Email: "new@e-mail.gitea"})
|
|
}
|
|
|
|
func testSuccessfullEdit(t *testing.T, formData user_model.User) {
|
|
makeRequest(t, formData, http.StatusSeeOther)
|
|
}
|
|
|
|
func makeRequest(t *testing.T, formData user_model.User, headerCode int) {
|
|
session := loginUser(t, "user1")
|
|
csrf := GetCSRF(t, session, "/admin/users/"+strconv.Itoa(int(formData.ID))+"/edit")
|
|
req := NewRequestWithValues(t, "POST", "/admin/users/"+strconv.Itoa(int(formData.ID))+"/edit", map[string]string{
|
|
"_csrf": csrf,
|
|
"user_name": formData.Name,
|
|
"login_name": formData.LoginName,
|
|
"login_type": "0-0",
|
|
"email": formData.Email,
|
|
})
|
|
|
|
session.MakeRequest(t, req, headerCode)
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: formData.ID})
|
|
assert.Equal(t, formData.Name, user.Name)
|
|
assert.Equal(t, formData.LoginName, user.LoginName)
|
|
assert.Equal(t, formData.Email, user.Email)
|
|
}
|
|
|
|
func TestAdminDeleteUser(t *testing.T) {
|
|
defer tests.AddFixtures("tests/integration/fixtures/TestAdminDeleteUser/")()
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
session := loginUser(t, "user1")
|
|
|
|
userID := int64(1000)
|
|
|
|
unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{PosterID: userID})
|
|
|
|
csrf := GetCSRF(t, session, fmt.Sprintf("/admin/users/%d/edit", userID))
|
|
req := NewRequestWithValues(t, "POST", fmt.Sprintf("/admin/users/%d/delete", userID), map[string]string{
|
|
"_csrf": csrf,
|
|
"purge": "true",
|
|
})
|
|
session.MakeRequest(t, req, http.StatusSeeOther)
|
|
|
|
assertUserDeleted(t, userID, true)
|
|
unittest.CheckConsistencyFor(t, &user_model.User{})
|
|
}
|
|
|
|
func TestSourceId(t *testing.T) {
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
testUser23 := &user_model.User{
|
|
Name: "ausersourceid23",
|
|
LoginName: "ausersourceid23",
|
|
Email: "ausersourceid23@example.com",
|
|
Passwd: "ausersourceid23password",
|
|
Type: user_model.UserTypeIndividual,
|
|
LoginType: auth_model.Plain,
|
|
LoginSource: 23,
|
|
}
|
|
defer createUser(context.Background(), t, testUser23)()
|
|
|
|
session := loginUser(t, "user1")
|
|
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadAdmin)
|
|
|
|
// Our new user start with 'a' so it should be the first one
|
|
req := NewRequest(t, "GET", "/api/v1/admin/users?limit=1").AddTokenAuth(token)
|
|
resp := session.MakeRequest(t, req, http.StatusOK)
|
|
var users []api.User
|
|
DecodeJSON(t, resp, &users)
|
|
assert.Len(t, users, 1)
|
|
assert.Equal(t, "ausersourceid23", users[0].UserName)
|
|
|
|
// Now our new user should not be in the list, because we filter by source_id 0
|
|
req = NewRequest(t, "GET", "/api/v1/admin/users?limit=1&source_id=0").AddTokenAuth(token)
|
|
resp = session.MakeRequest(t, req, http.StatusOK)
|
|
DecodeJSON(t, resp, &users)
|
|
assert.Len(t, users, 1)
|
|
assert.Equal(t, "the_34-user.with.all.allowedChars", users[0].UserName)
|
|
|
|
// Now our new user should be in the list, because we filter by source_id 23
|
|
req = NewRequest(t, "GET", "/api/v1/admin/users?limit=1&source_id=23").AddTokenAuth(token)
|
|
resp = session.MakeRequest(t, req, http.StatusOK)
|
|
DecodeJSON(t, resp, &users)
|
|
assert.Len(t, users, 1)
|
|
assert.Equal(t, "ausersourceid23", users[0].UserName)
|
|
}
|
|
|
|
func TestAdminViewUsersSorted(t *testing.T) {
|
|
defer tests.PrepareTestEnv(t)()
|
|
createTimestamp := time.Now().Unix() - 1000
|
|
updateTimestamp := time.Now().Unix() - 500
|
|
sess := db.GetEngine(context.Background())
|
|
|
|
// Create 10 users with login source 44
|
|
for i := int64(1); i <= 10; i++ {
|
|
name := "sorttest" + strconv.Itoa(int(i))
|
|
user := &user_model.User{
|
|
Name: name,
|
|
LowerName: name,
|
|
LoginName: name,
|
|
Email: name + "@example.com",
|
|
Passwd: name + ".password",
|
|
Type: user_model.UserTypeIndividual,
|
|
LoginType: auth_model.OAuth2,
|
|
LoginSource: 44,
|
|
CreatedUnix: timeutil.TimeStamp(createTimestamp - i),
|
|
UpdatedUnix: timeutil.TimeStamp(updateTimestamp - i),
|
|
}
|
|
if _, err := sess.NoAutoTime().Insert(user); err != nil {
|
|
t.Fatalf("Failed to create user: %v", err)
|
|
}
|
|
}
|
|
|
|
session := loginUser(t, "user1")
|
|
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadAdmin)
|
|
|
|
testCases := []struct {
|
|
loginSource int64
|
|
sortType string
|
|
expectedUsers []string
|
|
}{
|
|
{0, "alphabetically", []string{"the_34-user.with.all.allowedChars", "user1", "user10", "user11"}},
|
|
{0, "reversealphabetically", []string{"user9", "user8", "user5", "user40"}},
|
|
{0, "newest", []string{"user40", "user39", "user38", "user37"}},
|
|
{0, "oldest", []string{"user1", "user2", "user4", "user5"}},
|
|
{44, "recentupdate", []string{"sorttest1", "sorttest2", "sorttest3", "sorttest4"}},
|
|
{44, "leastupdate", []string{"sorttest10", "sorttest9", "sorttest8", "sorttest7"}},
|
|
}
|
|
|
|
for _, testCase := range testCases {
|
|
req := NewRequest(
|
|
t,
|
|
"GET",
|
|
fmt.Sprintf("/api/v1/admin/users?sort=%s&limit=4&source_id=%d",
|
|
testCase.sortType,
|
|
testCase.loginSource),
|
|
).AddTokenAuth(token)
|
|
resp := session.MakeRequest(t, req, http.StatusOK)
|
|
|
|
var users []api.User
|
|
DecodeJSON(t, resp, &users)
|
|
assert.Len(t, users, 4)
|
|
for i, user := range users {
|
|
assert.Equalf(t, testCase.expectedUsers[i], user.UserName, "Sort type: %s, index %d", testCase.sortType, i)
|
|
}
|
|
}
|
|
}
|