mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-11-04 08:21:11 +00:00 
			
		
		
		
	- #6727 added this test and #6726 modified it to also include webauthn users. The former was not rebased on the latter when it was merged. Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/6738 Reviewed-by: Earl Warren <earl-warren@noreply.codeberg.org> Reviewed-by: Michael Kriese <michael.kriese@gmx.de> Co-authored-by: Gusted <postmaster@gusted.xyz> Co-committed-by: Gusted <postmaster@gusted.xyz>
		
			
				
	
	
		
			221 lines
		
	
	
	
		
			7.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			221 lines
		
	
	
	
		
			7.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2021 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package integration
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
	"strconv"
 | 
						|
	"testing"
 | 
						|
	"time"
 | 
						|
 | 
						|
	auth_model "code.gitea.io/gitea/models/auth"
 | 
						|
	"code.gitea.io/gitea/models/db"
 | 
						|
	issues_model "code.gitea.io/gitea/models/issues"
 | 
						|
	"code.gitea.io/gitea/models/unittest"
 | 
						|
	user_model "code.gitea.io/gitea/models/user"
 | 
						|
	api "code.gitea.io/gitea/modules/structs"
 | 
						|
	"code.gitea.io/gitea/modules/timeutil"
 | 
						|
	"code.gitea.io/gitea/tests"
 | 
						|
 | 
						|
	"github.com/stretchr/testify/assert"
 | 
						|
)
 | 
						|
 | 
						|
func TestAdminViewUsers(t *testing.T) {
 | 
						|
	defer tests.PrepareTestEnv(t)()
 | 
						|
 | 
						|
	t.Run("Admin user", func(t *testing.T) {
 | 
						|
		defer tests.PrintCurrentTest(t)()
 | 
						|
 | 
						|
		session := loginUser(t, "user1")
 | 
						|
		req := NewRequest(t, "GET", "/admin/users")
 | 
						|
		session.MakeRequest(t, req, http.StatusOK)
 | 
						|
 | 
						|
		req = NewRequest(t, "GET", "/admin/users?status_filter[is_2fa_enabled]=1")
 | 
						|
		resp := session.MakeRequest(t, req, http.StatusOK)
 | 
						|
		htmlDoc := NewHTMLParser(t, resp.Body)
 | 
						|
 | 
						|
		// 6th column is the 2FA column.
 | 
						|
		// One user that has TOTP and another user that has WebAuthn.
 | 
						|
		assert.EqualValues(t, 2, htmlDoc.Find(".admin-setting-content table tbody tr td:nth-child(6) .octicon-check").Length())
 | 
						|
	})
 | 
						|
 | 
						|
	t.Run("Normal user", func(t *testing.T) {
 | 
						|
		defer tests.PrintCurrentTest(t)()
 | 
						|
 | 
						|
		session := loginUser(t, "user2")
 | 
						|
		req := NewRequest(t, "GET", "/admin/users")
 | 
						|
		session.MakeRequest(t, req, http.StatusForbidden)
 | 
						|
	})
 | 
						|
 | 
						|
	t.Run("Anonymous user", func(t *testing.T) {
 | 
						|
		defer tests.PrintCurrentTest(t)()
 | 
						|
 | 
						|
		req := NewRequest(t, "GET", "/admin/users")
 | 
						|
		MakeRequest(t, req, http.StatusSeeOther)
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
func TestAdminViewUser(t *testing.T) {
 | 
						|
	defer tests.PrepareTestEnv(t)()
 | 
						|
 | 
						|
	session := loginUser(t, "user1")
 | 
						|
	req := NewRequest(t, "GET", "/admin/users/1")
 | 
						|
	session.MakeRequest(t, req, http.StatusOK)
 | 
						|
 | 
						|
	session = loginUser(t, "user2")
 | 
						|
	req = NewRequest(t, "GET", "/admin/users/1")
 | 
						|
	session.MakeRequest(t, req, http.StatusForbidden)
 | 
						|
}
 | 
						|
 | 
						|
func TestAdminEditUser(t *testing.T) {
 | 
						|
	defer tests.PrepareTestEnv(t)()
 | 
						|
 | 
						|
	testSuccessfullEdit(t, user_model.User{ID: 2, Name: "newusername", LoginName: "otherlogin", Email: "new@e-mail.gitea"})
 | 
						|
}
 | 
						|
 | 
						|
func testSuccessfullEdit(t *testing.T, formData user_model.User) {
 | 
						|
	makeRequest(t, formData, http.StatusSeeOther)
 | 
						|
}
 | 
						|
 | 
						|
func makeRequest(t *testing.T, formData user_model.User, headerCode int) {
 | 
						|
	session := loginUser(t, "user1")
 | 
						|
	csrf := GetCSRF(t, session, "/admin/users/"+strconv.Itoa(int(formData.ID))+"/edit")
 | 
						|
	req := NewRequestWithValues(t, "POST", "/admin/users/"+strconv.Itoa(int(formData.ID))+"/edit", map[string]string{
 | 
						|
		"_csrf":      csrf,
 | 
						|
		"user_name":  formData.Name,
 | 
						|
		"login_name": formData.LoginName,
 | 
						|
		"login_type": "0-0",
 | 
						|
		"email":      formData.Email,
 | 
						|
	})
 | 
						|
 | 
						|
	session.MakeRequest(t, req, headerCode)
 | 
						|
	user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: formData.ID})
 | 
						|
	assert.Equal(t, formData.Name, user.Name)
 | 
						|
	assert.Equal(t, formData.LoginName, user.LoginName)
 | 
						|
	assert.Equal(t, formData.Email, user.Email)
 | 
						|
}
 | 
						|
 | 
						|
func TestAdminDeleteUser(t *testing.T) {
 | 
						|
	defer tests.AddFixtures("tests/integration/fixtures/TestAdminDeleteUser/")()
 | 
						|
	defer tests.PrepareTestEnv(t)()
 | 
						|
 | 
						|
	session := loginUser(t, "user1")
 | 
						|
 | 
						|
	userID := int64(1000)
 | 
						|
 | 
						|
	unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{PosterID: userID})
 | 
						|
 | 
						|
	csrf := GetCSRF(t, session, fmt.Sprintf("/admin/users/%d/edit", userID))
 | 
						|
	req := NewRequestWithValues(t, "POST", fmt.Sprintf("/admin/users/%d/delete", userID), map[string]string{
 | 
						|
		"_csrf": csrf,
 | 
						|
		"purge": "true",
 | 
						|
	})
 | 
						|
	session.MakeRequest(t, req, http.StatusSeeOther)
 | 
						|
 | 
						|
	assertUserDeleted(t, userID, true)
 | 
						|
	unittest.CheckConsistencyFor(t, &user_model.User{})
 | 
						|
}
 | 
						|
 | 
						|
func TestSourceId(t *testing.T) {
 | 
						|
	defer tests.PrepareTestEnv(t)()
 | 
						|
 | 
						|
	testUser23 := &user_model.User{
 | 
						|
		Name:        "ausersourceid23",
 | 
						|
		LoginName:   "ausersourceid23",
 | 
						|
		Email:       "ausersourceid23@example.com",
 | 
						|
		Passwd:      "ausersourceid23password",
 | 
						|
		Type:        user_model.UserTypeIndividual,
 | 
						|
		LoginType:   auth_model.Plain,
 | 
						|
		LoginSource: 23,
 | 
						|
	}
 | 
						|
	defer createUser(context.Background(), t, testUser23)()
 | 
						|
 | 
						|
	session := loginUser(t, "user1")
 | 
						|
	token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadAdmin)
 | 
						|
 | 
						|
	// Our new user start with 'a' so it should be the first one
 | 
						|
	req := NewRequest(t, "GET", "/api/v1/admin/users?limit=1").AddTokenAuth(token)
 | 
						|
	resp := session.MakeRequest(t, req, http.StatusOK)
 | 
						|
	var users []api.User
 | 
						|
	DecodeJSON(t, resp, &users)
 | 
						|
	assert.Len(t, users, 1)
 | 
						|
	assert.Equal(t, "ausersourceid23", users[0].UserName)
 | 
						|
 | 
						|
	// Now our new user should not be in the list, because we filter by source_id 0
 | 
						|
	req = NewRequest(t, "GET", "/api/v1/admin/users?limit=1&source_id=0").AddTokenAuth(token)
 | 
						|
	resp = session.MakeRequest(t, req, http.StatusOK)
 | 
						|
	DecodeJSON(t, resp, &users)
 | 
						|
	assert.Len(t, users, 1)
 | 
						|
	assert.Equal(t, "the_34-user.with.all.allowedChars", users[0].UserName)
 | 
						|
 | 
						|
	// Now our new user should be in the list, because we filter by source_id 23
 | 
						|
	req = NewRequest(t, "GET", "/api/v1/admin/users?limit=1&source_id=23").AddTokenAuth(token)
 | 
						|
	resp = session.MakeRequest(t, req, http.StatusOK)
 | 
						|
	DecodeJSON(t, resp, &users)
 | 
						|
	assert.Len(t, users, 1)
 | 
						|
	assert.Equal(t, "ausersourceid23", users[0].UserName)
 | 
						|
}
 | 
						|
 | 
						|
func TestAdminViewUsersSorted(t *testing.T) {
 | 
						|
	defer tests.PrepareTestEnv(t)()
 | 
						|
	createTimestamp := time.Now().Unix() - 1000
 | 
						|
	updateTimestamp := time.Now().Unix() - 500
 | 
						|
	sess := db.GetEngine(context.Background())
 | 
						|
 | 
						|
	// Create 10 users with login source 44
 | 
						|
	for i := int64(1); i <= 10; i++ {
 | 
						|
		name := "sorttest" + strconv.Itoa(int(i))
 | 
						|
		user := &user_model.User{
 | 
						|
			Name:        name,
 | 
						|
			LowerName:   name,
 | 
						|
			LoginName:   name,
 | 
						|
			Email:       name + "@example.com",
 | 
						|
			Passwd:      name + ".password",
 | 
						|
			Type:        user_model.UserTypeIndividual,
 | 
						|
			LoginType:   auth_model.OAuth2,
 | 
						|
			LoginSource: 44,
 | 
						|
			CreatedUnix: timeutil.TimeStamp(createTimestamp - i),
 | 
						|
			UpdatedUnix: timeutil.TimeStamp(updateTimestamp - i),
 | 
						|
		}
 | 
						|
		if _, err := sess.NoAutoTime().Insert(user); err != nil {
 | 
						|
			t.Fatalf("Failed to create user: %v", err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	session := loginUser(t, "user1")
 | 
						|
	token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadAdmin)
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		loginSource   int64
 | 
						|
		sortType      string
 | 
						|
		expectedUsers []string
 | 
						|
	}{
 | 
						|
		{0, "alphabetically", []string{"the_34-user.with.all.allowedChars", "user1", "user10", "user11"}},
 | 
						|
		{0, "reversealphabetically", []string{"user9", "user8", "user5", "user40"}},
 | 
						|
		{0, "newest", []string{"user40", "user39", "user38", "user37"}},
 | 
						|
		{0, "oldest", []string{"user1", "user2", "user4", "user5"}},
 | 
						|
		{44, "recentupdate", []string{"sorttest1", "sorttest2", "sorttest3", "sorttest4"}},
 | 
						|
		{44, "leastupdate", []string{"sorttest10", "sorttest9", "sorttest8", "sorttest7"}},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, testCase := range testCases {
 | 
						|
		req := NewRequest(
 | 
						|
			t,
 | 
						|
			"GET",
 | 
						|
			fmt.Sprintf("/api/v1/admin/users?sort=%s&limit=4&source_id=%d",
 | 
						|
				testCase.sortType,
 | 
						|
				testCase.loginSource),
 | 
						|
		).AddTokenAuth(token)
 | 
						|
		resp := session.MakeRequest(t, req, http.StatusOK)
 | 
						|
 | 
						|
		var users []api.User
 | 
						|
		DecodeJSON(t, resp, &users)
 | 
						|
		assert.Len(t, users, 4)
 | 
						|
		for i, user := range users {
 | 
						|
			assert.Equalf(t, testCase.expectedUsers[i], user.UserName, "Sort type: %s, index %d", testCase.sortType, i)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 |