mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-29 13:31:20 +00:00 
			
		
		
		
	To be able to easily test cases where the repository does not have any code, where the git repo itself is completely uninitialized, lets support a case where the `AutoInit` property is false. For the sake of backwards compatibility, if the option is not set either way, it will default to `true`. Signed-off-by: Gergely Nagy <forgejo@gergo.csillger.hu>
		
			
				
	
	
		
			822 lines
		
	
	
	
		
			24 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			822 lines
		
	
	
	
		
			24 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2017 The Gitea Authors. All rights reserved.
 | |
| // Copyright 2024 The Forgejo Authors c/o Codeberg e.V.. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| //nolint:forbidigo
 | |
| package integration
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"hash"
 | |
| 	"hash/fnv"
 | |
| 	"io"
 | |
| 	"net/http"
 | |
| 	"net/http/cookiejar"
 | |
| 	"net/http/httptest"
 | |
| 	"net/url"
 | |
| 	"os"
 | |
| 	"os/exec"
 | |
| 	"path/filepath"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 	"sync/atomic"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"code.gitea.io/gitea/cmd"
 | |
| 	"code.gitea.io/gitea/models/auth"
 | |
| 	"code.gitea.io/gitea/models/db"
 | |
| 	repo_model "code.gitea.io/gitea/models/repo"
 | |
| 	unit_model "code.gitea.io/gitea/models/unit"
 | |
| 	"code.gitea.io/gitea/models/unittest"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	"code.gitea.io/gitea/modules/git"
 | |
| 	"code.gitea.io/gitea/modules/graceful"
 | |
| 	"code.gitea.io/gitea/modules/json"
 | |
| 	"code.gitea.io/gitea/modules/log"
 | |
| 	"code.gitea.io/gitea/modules/optional"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	"code.gitea.io/gitea/modules/testlogger"
 | |
| 	"code.gitea.io/gitea/modules/util"
 | |
| 	"code.gitea.io/gitea/modules/web"
 | |
| 	"code.gitea.io/gitea/routers"
 | |
| 	"code.gitea.io/gitea/services/auth/source/remote"
 | |
| 	gitea_context "code.gitea.io/gitea/services/context"
 | |
| 	repo_service "code.gitea.io/gitea/services/repository"
 | |
| 	files_service "code.gitea.io/gitea/services/repository/files"
 | |
| 	user_service "code.gitea.io/gitea/services/user"
 | |
| 	wiki_service "code.gitea.io/gitea/services/wiki"
 | |
| 	"code.gitea.io/gitea/tests"
 | |
| 
 | |
| 	"github.com/PuerkitoBio/goquery"
 | |
| 	gouuid "github.com/google/uuid"
 | |
| 	"github.com/markbates/goth"
 | |
| 	"github.com/markbates/goth/gothic"
 | |
| 	goth_gitlab "github.com/markbates/goth/providers/github"
 | |
| 	goth_github "github.com/markbates/goth/providers/gitlab"
 | |
| 	"github.com/santhosh-tekuri/jsonschema/v5"
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| )
 | |
| 
 | |
| var testWebRoutes *web.Route
 | |
| 
 | |
| type NilResponseRecorder struct {
 | |
| 	httptest.ResponseRecorder
 | |
| 	Length int
 | |
| }
 | |
| 
 | |
| func (n *NilResponseRecorder) Write(b []byte) (int, error) {
 | |
| 	n.Length += len(b)
 | |
| 	return len(b), nil
 | |
| }
 | |
| 
 | |
| // NewRecorder returns an initialized ResponseRecorder.
 | |
| func NewNilResponseRecorder() *NilResponseRecorder {
 | |
| 	return &NilResponseRecorder{
 | |
| 		ResponseRecorder: *httptest.NewRecorder(),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type NilResponseHashSumRecorder struct {
 | |
| 	httptest.ResponseRecorder
 | |
| 	Hash   hash.Hash
 | |
| 	Length int
 | |
| }
 | |
| 
 | |
| func (n *NilResponseHashSumRecorder) Write(b []byte) (int, error) {
 | |
| 	_, _ = n.Hash.Write(b)
 | |
| 	n.Length += len(b)
 | |
| 	return len(b), nil
 | |
| }
 | |
| 
 | |
| // NewRecorder returns an initialized ResponseRecorder.
 | |
| func NewNilResponseHashSumRecorder() *NilResponseHashSumRecorder {
 | |
| 	return &NilResponseHashSumRecorder{
 | |
| 		Hash:             fnv.New32(),
 | |
| 		ResponseRecorder: *httptest.NewRecorder(),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // runMainApp runs the subcommand and returns its standard output. Any returned error will usually be of type *ExitError. If c.Stderr was nil, Output populates ExitError.Stderr.
 | |
| func runMainApp(subcommand string, args ...string) (string, error) {
 | |
| 	return runMainAppWithStdin(nil, subcommand, args...)
 | |
| }
 | |
| 
 | |
| // runMainAppWithStdin runs the subcommand and returns its standard output. Any returned error will usually be of type *ExitError. If c.Stderr was nil, Output populates ExitError.Stderr.
 | |
| func runMainAppWithStdin(stdin io.Reader, subcommand string, args ...string) (string, error) {
 | |
| 	// running the main app directly will very likely mess with the testing setup (logger & co.)
 | |
| 	// hence we run it as a subprocess and capture its output
 | |
| 	args = append([]string{subcommand}, args...)
 | |
| 	cmd := exec.Command(os.Args[0], args...)
 | |
| 	cmd.Env = append(os.Environ(),
 | |
| 		"GITEA_TEST_CLI=true",
 | |
| 		"GITEA_CONF="+setting.CustomConf,
 | |
| 		"GITEA_WORK_DIR="+setting.AppWorkPath)
 | |
| 	cmd.Stdin = stdin
 | |
| 	out, err := cmd.Output()
 | |
| 	return string(out), err
 | |
| }
 | |
| 
 | |
| func TestMain(m *testing.M) {
 | |
| 	// GITEA_TEST_CLI is set by runMainAppWithStdin
 | |
| 	// inspired by https://abhinavg.net/2022/05/15/hijack-testmain/
 | |
| 	if testCLI := os.Getenv("GITEA_TEST_CLI"); testCLI == "true" {
 | |
| 		app := cmd.NewMainApp("test-version", "integration-test")
 | |
| 		args := append([]string{
 | |
| 			"executable-name", // unused, but expected at position 1
 | |
| 			"--config", os.Getenv("GITEA_CONF"),
 | |
| 		},
 | |
| 			os.Args[1:]..., // skip the executable name
 | |
| 		)
 | |
| 		if err := cmd.RunMainApp(app, args...); err != nil {
 | |
| 			panic(err) // should never happen since RunMainApp exits on error
 | |
| 		}
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	defer log.GetManager().Close()
 | |
| 
 | |
| 	managerCtx, cancel := context.WithCancel(context.Background())
 | |
| 	graceful.InitManager(managerCtx)
 | |
| 	defer cancel()
 | |
| 
 | |
| 	tests.InitTest(true)
 | |
| 	testWebRoutes = routers.NormalRoutes()
 | |
| 
 | |
| 	// integration test settings...
 | |
| 	if setting.CfgProvider != nil {
 | |
| 		testingCfg := setting.CfgProvider.Section("integration-tests")
 | |
| 		testlogger.SlowTest = testingCfg.Key("SLOW_TEST").MustDuration(testlogger.SlowTest)
 | |
| 		testlogger.SlowFlush = testingCfg.Key("SLOW_FLUSH").MustDuration(testlogger.SlowFlush)
 | |
| 	}
 | |
| 
 | |
| 	if os.Getenv("GITEA_SLOW_TEST_TIME") != "" {
 | |
| 		duration, err := time.ParseDuration(os.Getenv("GITEA_SLOW_TEST_TIME"))
 | |
| 		if err == nil {
 | |
| 			testlogger.SlowTest = duration
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if os.Getenv("GITEA_SLOW_FLUSH_TIME") != "" {
 | |
| 		duration, err := time.ParseDuration(os.Getenv("GITEA_SLOW_FLUSH_TIME"))
 | |
| 		if err == nil {
 | |
| 			testlogger.SlowFlush = duration
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	os.Unsetenv("GIT_AUTHOR_NAME")
 | |
| 	os.Unsetenv("GIT_AUTHOR_EMAIL")
 | |
| 	os.Unsetenv("GIT_AUTHOR_DATE")
 | |
| 	os.Unsetenv("GIT_COMMITTER_NAME")
 | |
| 	os.Unsetenv("GIT_COMMITTER_EMAIL")
 | |
| 	os.Unsetenv("GIT_COMMITTER_DATE")
 | |
| 
 | |
| 	err := unittest.InitFixtures(
 | |
| 		unittest.FixturesOptions{
 | |
| 			Dir: filepath.Join(filepath.Dir(setting.AppPath), "models/fixtures/"),
 | |
| 		},
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		fmt.Printf("Error initializing test database: %v\n", err)
 | |
| 		os.Exit(1)
 | |
| 	}
 | |
| 
 | |
| 	// FIXME: the console logger is deleted by mistake, so if there is any `log.Fatal`, developers won't see any error message.
 | |
| 	// Instead, "No tests were found",  last nonsense log is "According to the configuration, subsequent logs will not be printed to the console"
 | |
| 	exitCode := m.Run()
 | |
| 
 | |
| 	if err := testlogger.WriterCloser.Reset(); err != nil {
 | |
| 		fmt.Printf("testlogger.WriterCloser.Reset: error ignored: %v\n", err)
 | |
| 	}
 | |
| 
 | |
| 	if err = util.RemoveAll(setting.Indexer.IssuePath); err != nil {
 | |
| 		fmt.Printf("util.RemoveAll: %v\n", err)
 | |
| 		os.Exit(1)
 | |
| 	}
 | |
| 	if err = util.RemoveAll(setting.Indexer.RepoPath); err != nil {
 | |
| 		fmt.Printf("Unable to remove repo indexer: %v\n", err)
 | |
| 		os.Exit(1)
 | |
| 	}
 | |
| 
 | |
| 	os.Exit(exitCode)
 | |
| }
 | |
| 
 | |
| type TestSession struct {
 | |
| 	jar http.CookieJar
 | |
| }
 | |
| 
 | |
| func (s *TestSession) GetCookie(name string) *http.Cookie {
 | |
| 	baseURL, err := url.Parse(setting.AppURL)
 | |
| 	if err != nil {
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	for _, c := range s.jar.Cookies(baseURL) {
 | |
| 		if c.Name == name {
 | |
| 			return c
 | |
| 		}
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (s *TestSession) SetCookie(cookie *http.Cookie) *http.Cookie {
 | |
| 	baseURL, err := url.Parse(setting.AppURL)
 | |
| 	if err != nil {
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	s.jar.SetCookies(baseURL, []*http.Cookie{cookie})
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (s *TestSession) MakeRequest(t testing.TB, rw *RequestWrapper, expectedStatus int) *httptest.ResponseRecorder {
 | |
| 	t.Helper()
 | |
| 	req := rw.Request
 | |
| 	baseURL, err := url.Parse(setting.AppURL)
 | |
| 	assert.NoError(t, err)
 | |
| 	for _, c := range s.jar.Cookies(baseURL) {
 | |
| 		req.AddCookie(c)
 | |
| 	}
 | |
| 	resp := MakeRequest(t, rw, expectedStatus)
 | |
| 
 | |
| 	ch := http.Header{}
 | |
| 	ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
 | |
| 	cr := http.Request{Header: ch}
 | |
| 	s.jar.SetCookies(baseURL, cr.Cookies())
 | |
| 
 | |
| 	return resp
 | |
| }
 | |
| 
 | |
| func (s *TestSession) MakeRequestNilResponseRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseRecorder {
 | |
| 	t.Helper()
 | |
| 	req := rw.Request
 | |
| 	baseURL, err := url.Parse(setting.AppURL)
 | |
| 	assert.NoError(t, err)
 | |
| 	for _, c := range s.jar.Cookies(baseURL) {
 | |
| 		req.AddCookie(c)
 | |
| 	}
 | |
| 	resp := MakeRequestNilResponseRecorder(t, rw, expectedStatus)
 | |
| 
 | |
| 	ch := http.Header{}
 | |
| 	ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
 | |
| 	cr := http.Request{Header: ch}
 | |
| 	s.jar.SetCookies(baseURL, cr.Cookies())
 | |
| 
 | |
| 	return resp
 | |
| }
 | |
| 
 | |
| func (s *TestSession) MakeRequestNilResponseHashSumRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseHashSumRecorder {
 | |
| 	t.Helper()
 | |
| 	req := rw.Request
 | |
| 	baseURL, err := url.Parse(setting.AppURL)
 | |
| 	assert.NoError(t, err)
 | |
| 	for _, c := range s.jar.Cookies(baseURL) {
 | |
| 		req.AddCookie(c)
 | |
| 	}
 | |
| 	resp := MakeRequestNilResponseHashSumRecorder(t, rw, expectedStatus)
 | |
| 
 | |
| 	ch := http.Header{}
 | |
| 	ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
 | |
| 	cr := http.Request{Header: ch}
 | |
| 	s.jar.SetCookies(baseURL, cr.Cookies())
 | |
| 
 | |
| 	return resp
 | |
| }
 | |
| 
 | |
| const userPassword = "password"
 | |
| 
 | |
| func emptyTestSession(t testing.TB) *TestSession {
 | |
| 	t.Helper()
 | |
| 	jar, err := cookiejar.New(nil)
 | |
| 	assert.NoError(t, err)
 | |
| 
 | |
| 	return &TestSession{jar: jar}
 | |
| }
 | |
| 
 | |
| func getUserToken(t testing.TB, userName string, scope ...auth.AccessTokenScope) string {
 | |
| 	return getTokenForLoggedInUser(t, loginUser(t, userName), scope...)
 | |
| }
 | |
| 
 | |
| func mockCompleteUserAuth(mock func(res http.ResponseWriter, req *http.Request) (goth.User, error)) func() {
 | |
| 	old := gothic.CompleteUserAuth
 | |
| 	gothic.CompleteUserAuth = mock
 | |
| 	return func() {
 | |
| 		gothic.CompleteUserAuth = old
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func addAuthSource(t *testing.T, payload map[string]string) *auth.Source {
 | |
| 	session := loginUser(t, "user1")
 | |
| 	payload["_csrf"] = GetCSRF(t, session, "/admin/auths/new")
 | |
| 	req := NewRequestWithValues(t, "POST", "/admin/auths/new", payload)
 | |
| 	session.MakeRequest(t, req, http.StatusSeeOther)
 | |
| 	source, err := auth.GetSourceByName(context.Background(), payload["name"])
 | |
| 	assert.NoError(t, err)
 | |
| 	return source
 | |
| }
 | |
| 
 | |
| func authSourcePayloadOAuth2(name string) map[string]string {
 | |
| 	return map[string]string{
 | |
| 		"type":      fmt.Sprintf("%d", auth.OAuth2),
 | |
| 		"name":      name,
 | |
| 		"is_active": "on",
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func authSourcePayloadGitLab(name string) map[string]string {
 | |
| 	payload := authSourcePayloadOAuth2(name)
 | |
| 	payload["oauth2_provider"] = "gitlab"
 | |
| 	return payload
 | |
| }
 | |
| 
 | |
| func authSourcePayloadGitLabCustom(name string) map[string]string {
 | |
| 	payload := authSourcePayloadGitLab(name)
 | |
| 	payload["oauth2_use_custom_url"] = "on"
 | |
| 	payload["oauth2_auth_url"] = goth_gitlab.AuthURL
 | |
| 	payload["oauth2_token_url"] = goth_gitlab.TokenURL
 | |
| 	payload["oauth2_profile_url"] = goth_gitlab.ProfileURL
 | |
| 	return payload
 | |
| }
 | |
| 
 | |
| func authSourcePayloadGitHub(name string) map[string]string {
 | |
| 	payload := authSourcePayloadOAuth2(name)
 | |
| 	payload["oauth2_provider"] = "github"
 | |
| 	return payload
 | |
| }
 | |
| 
 | |
| func authSourcePayloadGitHubCustom(name string) map[string]string {
 | |
| 	payload := authSourcePayloadGitHub(name)
 | |
| 	payload["oauth2_use_custom_url"] = "on"
 | |
| 	payload["oauth2_auth_url"] = goth_github.AuthURL
 | |
| 	payload["oauth2_token_url"] = goth_github.TokenURL
 | |
| 	payload["oauth2_profile_url"] = goth_github.ProfileURL
 | |
| 	return payload
 | |
| }
 | |
| 
 | |
| func createRemoteAuthSource(t *testing.T, name, url, matchingSource string) *auth.Source {
 | |
| 	assert.NoError(t, auth.CreateSource(context.Background(), &auth.Source{
 | |
| 		Type:     auth.Remote,
 | |
| 		Name:     name,
 | |
| 		IsActive: true,
 | |
| 		Cfg: &remote.Source{
 | |
| 			URL:            url,
 | |
| 			MatchingSource: matchingSource,
 | |
| 		},
 | |
| 	}))
 | |
| 	source, err := auth.GetSourceByName(context.Background(), name)
 | |
| 	assert.NoError(t, err)
 | |
| 	return source
 | |
| }
 | |
| 
 | |
| func createUser(ctx context.Context, t testing.TB, user *user_model.User) func() {
 | |
| 	user.MustChangePassword = false
 | |
| 	user.LowerName = strings.ToLower(user.Name)
 | |
| 
 | |
| 	assert.NoError(t, db.Insert(ctx, user))
 | |
| 
 | |
| 	if len(user.Email) > 0 {
 | |
| 		assert.NoError(t, user_service.ReplacePrimaryEmailAddress(ctx, user, user.Email))
 | |
| 	}
 | |
| 
 | |
| 	return func() {
 | |
| 		assert.NoError(t, user_service.DeleteUser(ctx, user, true))
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func loginUser(t testing.TB, userName string) *TestSession {
 | |
| 	t.Helper()
 | |
| 
 | |
| 	return loginUserWithPassword(t, userName, userPassword)
 | |
| }
 | |
| 
 | |
| func loginUserWithPassword(t testing.TB, userName, password string) *TestSession {
 | |
| 	t.Helper()
 | |
| 
 | |
| 	return loginUserWithPasswordRemember(t, userName, password, false)
 | |
| }
 | |
| 
 | |
| func loginUserWithPasswordRemember(t testing.TB, userName, password string, rememberMe bool) *TestSession {
 | |
| 	t.Helper()
 | |
| 	req := NewRequest(t, "GET", "/user/login")
 | |
| 	resp := MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 	doc := NewHTMLParser(t, resp.Body)
 | |
| 	req = NewRequestWithValues(t, "POST", "/user/login", map[string]string{
 | |
| 		"_csrf":     doc.GetCSRF(),
 | |
| 		"user_name": userName,
 | |
| 		"password":  password,
 | |
| 		"remember":  strconv.FormatBool(rememberMe),
 | |
| 	})
 | |
| 	resp = MakeRequest(t, req, http.StatusSeeOther)
 | |
| 
 | |
| 	ch := http.Header{}
 | |
| 	ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
 | |
| 	cr := http.Request{Header: ch}
 | |
| 
 | |
| 	session := emptyTestSession(t)
 | |
| 
 | |
| 	baseURL, err := url.Parse(setting.AppURL)
 | |
| 	assert.NoError(t, err)
 | |
| 	session.jar.SetCookies(baseURL, cr.Cookies())
 | |
| 
 | |
| 	return session
 | |
| }
 | |
| 
 | |
| // token has to be unique this counter take care of
 | |
| var tokenCounter int64
 | |
| 
 | |
| // getTokenForLoggedInUser returns a token for a logged in user.
 | |
| // The scope is an optional list of snake_case strings like the frontend form fields,
 | |
| // but without the "scope_" prefix.
 | |
| func getTokenForLoggedInUser(t testing.TB, session *TestSession, scopes ...auth.AccessTokenScope) string {
 | |
| 	t.Helper()
 | |
| 	var token string
 | |
| 	req := NewRequest(t, "GET", "/user/settings/applications")
 | |
| 	resp := session.MakeRequest(t, req, http.StatusOK)
 | |
| 	var csrf string
 | |
| 	for _, cookie := range resp.Result().Cookies() {
 | |
| 		if cookie.Name != "_csrf" {
 | |
| 			continue
 | |
| 		}
 | |
| 		csrf = cookie.Value
 | |
| 		break
 | |
| 	}
 | |
| 	if csrf == "" {
 | |
| 		doc := NewHTMLParser(t, resp.Body)
 | |
| 		csrf = doc.GetCSRF()
 | |
| 	}
 | |
| 	assert.NotEmpty(t, csrf)
 | |
| 	urlValues := url.Values{}
 | |
| 	urlValues.Add("_csrf", csrf)
 | |
| 	urlValues.Add("name", fmt.Sprintf("api-testing-token-%d", atomic.AddInt64(&tokenCounter, 1)))
 | |
| 	for _, scope := range scopes {
 | |
| 		urlValues.Add("scope", string(scope))
 | |
| 	}
 | |
| 	req = NewRequestWithURLValues(t, "POST", "/user/settings/applications", urlValues)
 | |
| 	resp = session.MakeRequest(t, req, http.StatusSeeOther)
 | |
| 
 | |
| 	// Log the flash values on failure
 | |
| 	if !assert.Equal(t, resp.Result().Header["Location"], []string{"/user/settings/applications"}) {
 | |
| 		for _, cookie := range resp.Result().Cookies() {
 | |
| 			if cookie.Name != gitea_context.CookieNameFlash {
 | |
| 				continue
 | |
| 			}
 | |
| 			flash, _ := url.ParseQuery(cookie.Value)
 | |
| 			for key, value := range flash {
 | |
| 				t.Logf("Flash %q: %q", key, value)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	req = NewRequest(t, "GET", "/user/settings/applications")
 | |
| 	resp = session.MakeRequest(t, req, http.StatusOK)
 | |
| 	htmlDoc := NewHTMLParser(t, resp.Body)
 | |
| 	token = htmlDoc.doc.Find(".ui.info p").Text()
 | |
| 	assert.NotEmpty(t, token)
 | |
| 	return token
 | |
| }
 | |
| 
 | |
| type RequestWrapper struct {
 | |
| 	*http.Request
 | |
| }
 | |
| 
 | |
| func (req *RequestWrapper) AddBasicAuth(username string) *RequestWrapper {
 | |
| 	req.Request.SetBasicAuth(username, userPassword)
 | |
| 	return req
 | |
| }
 | |
| 
 | |
| func (req *RequestWrapper) AddTokenAuth(token string) *RequestWrapper {
 | |
| 	if token == "" {
 | |
| 		return req
 | |
| 	}
 | |
| 	if !strings.HasPrefix(token, "Bearer ") {
 | |
| 		token = "Bearer " + token
 | |
| 	}
 | |
| 	req.Request.Header.Set("Authorization", token)
 | |
| 	return req
 | |
| }
 | |
| 
 | |
| func (req *RequestWrapper) SetHeader(name, value string) *RequestWrapper {
 | |
| 	req.Request.Header.Set(name, value)
 | |
| 	return req
 | |
| }
 | |
| 
 | |
| func NewRequest(t testing.TB, method, urlStr string) *RequestWrapper {
 | |
| 	t.Helper()
 | |
| 	return NewRequestWithBody(t, method, urlStr, nil)
 | |
| }
 | |
| 
 | |
| func NewRequestf(t testing.TB, method, urlFormat string, args ...any) *RequestWrapper {
 | |
| 	t.Helper()
 | |
| 	return NewRequest(t, method, fmt.Sprintf(urlFormat, args...))
 | |
| }
 | |
| 
 | |
| func NewRequestWithValues(t testing.TB, method, urlStr string, values map[string]string) *RequestWrapper {
 | |
| 	t.Helper()
 | |
| 	urlValues := url.Values{}
 | |
| 	for key, value := range values {
 | |
| 		urlValues[key] = []string{value}
 | |
| 	}
 | |
| 	return NewRequestWithURLValues(t, method, urlStr, urlValues)
 | |
| }
 | |
| 
 | |
| func NewRequestWithURLValues(t testing.TB, method, urlStr string, urlValues url.Values) *RequestWrapper {
 | |
| 	t.Helper()
 | |
| 	return NewRequestWithBody(t, method, urlStr, bytes.NewBufferString(urlValues.Encode())).
 | |
| 		SetHeader("Content-Type", "application/x-www-form-urlencoded")
 | |
| }
 | |
| 
 | |
| func NewRequestWithJSON(t testing.TB, method, urlStr string, v any) *RequestWrapper {
 | |
| 	t.Helper()
 | |
| 
 | |
| 	jsonBytes, err := json.Marshal(v)
 | |
| 	assert.NoError(t, err)
 | |
| 	return NewRequestWithBody(t, method, urlStr, bytes.NewBuffer(jsonBytes)).
 | |
| 		SetHeader("Content-Type", "application/json")
 | |
| }
 | |
| 
 | |
| func NewRequestWithBody(t testing.TB, method, urlStr string, body io.Reader) *RequestWrapper {
 | |
| 	t.Helper()
 | |
| 	if !strings.HasPrefix(urlStr, "http") && !strings.HasPrefix(urlStr, "/") {
 | |
| 		urlStr = "/" + urlStr
 | |
| 	}
 | |
| 	req, err := http.NewRequest(method, urlStr, body)
 | |
| 	assert.NoError(t, err)
 | |
| 	req.RequestURI = urlStr
 | |
| 
 | |
| 	return &RequestWrapper{req}
 | |
| }
 | |
| 
 | |
| const NoExpectedStatus = -1
 | |
| 
 | |
| func MakeRequest(t testing.TB, rw *RequestWrapper, expectedStatus int) *httptest.ResponseRecorder {
 | |
| 	t.Helper()
 | |
| 	req := rw.Request
 | |
| 	recorder := httptest.NewRecorder()
 | |
| 	if req.RemoteAddr == "" {
 | |
| 		req.RemoteAddr = "test-mock:12345"
 | |
| 	}
 | |
| 	testWebRoutes.ServeHTTP(recorder, req)
 | |
| 	if expectedStatus != NoExpectedStatus {
 | |
| 		if !assert.EqualValues(t, expectedStatus, recorder.Code, "Request: %s %s", req.Method, req.URL.String()) {
 | |
| 			logUnexpectedResponse(t, recorder)
 | |
| 		}
 | |
| 	}
 | |
| 	return recorder
 | |
| }
 | |
| 
 | |
| func MakeRequestNilResponseRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseRecorder {
 | |
| 	t.Helper()
 | |
| 	req := rw.Request
 | |
| 	recorder := NewNilResponseRecorder()
 | |
| 	testWebRoutes.ServeHTTP(recorder, req)
 | |
| 	if expectedStatus != NoExpectedStatus {
 | |
| 		if !assert.EqualValues(t, expectedStatus, recorder.Code,
 | |
| 			"Request: %s %s", req.Method, req.URL.String()) {
 | |
| 			logUnexpectedResponse(t, &recorder.ResponseRecorder)
 | |
| 		}
 | |
| 	}
 | |
| 	return recorder
 | |
| }
 | |
| 
 | |
| func MakeRequestNilResponseHashSumRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseHashSumRecorder {
 | |
| 	t.Helper()
 | |
| 	req := rw.Request
 | |
| 	recorder := NewNilResponseHashSumRecorder()
 | |
| 	testWebRoutes.ServeHTTP(recorder, req)
 | |
| 	if expectedStatus != NoExpectedStatus {
 | |
| 		if !assert.EqualValues(t, expectedStatus, recorder.Code,
 | |
| 			"Request: %s %s", req.Method, req.URL.String()) {
 | |
| 			logUnexpectedResponse(t, &recorder.ResponseRecorder)
 | |
| 		}
 | |
| 	}
 | |
| 	return recorder
 | |
| }
 | |
| 
 | |
| // logUnexpectedResponse logs the contents of an unexpected response.
 | |
| func logUnexpectedResponse(t testing.TB, recorder *httptest.ResponseRecorder) {
 | |
| 	t.Helper()
 | |
| 	respBytes := recorder.Body.Bytes()
 | |
| 	if len(respBytes) == 0 {
 | |
| 		// log the content of the flash cookie
 | |
| 		for _, cookie := range recorder.Result().Cookies() {
 | |
| 			if cookie.Name != gitea_context.CookieNameFlash {
 | |
| 				continue
 | |
| 			}
 | |
| 			flash, _ := url.ParseQuery(cookie.Value)
 | |
| 			for key, value := range flash {
 | |
| 				// the key is itself url-encoded
 | |
| 				if flash, err := url.ParseQuery(key); err == nil {
 | |
| 					for key, value := range flash {
 | |
| 						t.Logf("FlashCookie %q: %q", key, value)
 | |
| 					}
 | |
| 				} else {
 | |
| 					t.Logf("FlashCookie %q: %q", key, value)
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		return
 | |
| 	} else if len(respBytes) < 500 {
 | |
| 		// if body is short, just log the whole thing
 | |
| 		t.Log("Response: ", string(respBytes))
 | |
| 		return
 | |
| 	}
 | |
| 	t.Log("Response length: ", len(respBytes))
 | |
| 
 | |
| 	// log the "flash" error message, if one exists
 | |
| 	// we must create a new buffer, so that we don't "use up" resp.Body
 | |
| 	htmlDoc, err := goquery.NewDocumentFromReader(bytes.NewBuffer(respBytes))
 | |
| 	if err != nil {
 | |
| 		return // probably a non-HTML response
 | |
| 	}
 | |
| 	errMsg := htmlDoc.Find(".ui.negative.message").Text()
 | |
| 	if len(errMsg) > 0 {
 | |
| 		t.Log("A flash error message was found:", errMsg)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func DecodeJSON(t testing.TB, resp *httptest.ResponseRecorder, v any) {
 | |
| 	t.Helper()
 | |
| 
 | |
| 	decoder := json.NewDecoder(resp.Body)
 | |
| 	assert.NoError(t, decoder.Decode(v))
 | |
| }
 | |
| 
 | |
| func VerifyJSONSchema(t testing.TB, resp *httptest.ResponseRecorder, schemaFile string) {
 | |
| 	t.Helper()
 | |
| 
 | |
| 	schemaFilePath := filepath.Join(filepath.Dir(setting.AppPath), "tests", "integration", "schemas", schemaFile)
 | |
| 	_, schemaFileErr := os.Stat(schemaFilePath)
 | |
| 	assert.Nil(t, schemaFileErr)
 | |
| 
 | |
| 	schema, err := jsonschema.Compile(schemaFilePath)
 | |
| 	assert.NoError(t, err)
 | |
| 
 | |
| 	var data any
 | |
| 	err = json.Unmarshal(resp.Body.Bytes(), &data)
 | |
| 	assert.NoError(t, err)
 | |
| 
 | |
| 	schemaValidation := schema.Validate(data)
 | |
| 	assert.Nil(t, schemaValidation)
 | |
| }
 | |
| 
 | |
| func GetCSRF(t testing.TB, session *TestSession, urlStr string) string {
 | |
| 	t.Helper()
 | |
| 	req := NewRequest(t, "GET", urlStr)
 | |
| 	resp := session.MakeRequest(t, req, http.StatusOK)
 | |
| 	doc := NewHTMLParser(t, resp.Body)
 | |
| 	return doc.GetCSRF()
 | |
| }
 | |
| 
 | |
| func GetHTMLTitle(t testing.TB, session *TestSession, urlStr string) string {
 | |
| 	t.Helper()
 | |
| 
 | |
| 	req := NewRequest(t, "GET", urlStr)
 | |
| 	var resp *httptest.ResponseRecorder
 | |
| 	if session == nil {
 | |
| 		resp = MakeRequest(t, req, http.StatusOK)
 | |
| 	} else {
 | |
| 		resp = session.MakeRequest(t, req, http.StatusOK)
 | |
| 	}
 | |
| 
 | |
| 	doc := NewHTMLParser(t, resp.Body)
 | |
| 	return doc.Find("head title").Text()
 | |
| }
 | |
| 
 | |
| type DeclarativeRepoOptions struct {
 | |
| 	Name          optional.Option[string]
 | |
| 	EnabledUnits  optional.Option[[]unit_model.Type]
 | |
| 	DisabledUnits optional.Option[[]unit_model.Type]
 | |
| 	Files         optional.Option[[]*files_service.ChangeRepoFile]
 | |
| 	WikiBranch    optional.Option[string]
 | |
| 	AutoInit      optional.Option[bool]
 | |
| }
 | |
| 
 | |
| func CreateDeclarativeRepoWithOptions(t *testing.T, owner *user_model.User, opts DeclarativeRepoOptions) (*repo_model.Repository, string, func()) {
 | |
| 	t.Helper()
 | |
| 
 | |
| 	// Not using opts.Name.ValueOrDefault() here to avoid unnecessarily
 | |
| 	// generating an UUID when a name is specified.
 | |
| 	var repoName string
 | |
| 	if opts.Name.Has() {
 | |
| 		repoName = opts.Name.Value()
 | |
| 	} else {
 | |
| 		repoName = gouuid.NewString()
 | |
| 	}
 | |
| 
 | |
| 	var autoInit bool
 | |
| 	if opts.AutoInit.Has() {
 | |
| 		autoInit = opts.AutoInit.Value()
 | |
| 	} else {
 | |
| 		autoInit = true
 | |
| 	}
 | |
| 
 | |
| 	// Create the repository
 | |
| 	repo, err := repo_service.CreateRepository(db.DefaultContext, owner, owner, repo_service.CreateRepoOptions{
 | |
| 		Name:          repoName,
 | |
| 		Description:   "Temporary Repo",
 | |
| 		AutoInit:      autoInit,
 | |
| 		Gitignores:    "",
 | |
| 		License:       "WTFPL",
 | |
| 		Readme:        "Default",
 | |
| 		DefaultBranch: "main",
 | |
| 	})
 | |
| 	assert.NoError(t, err)
 | |
| 	assert.NotEmpty(t, repo)
 | |
| 
 | |
| 	// Populate `enabledUnits` if we have any enabled.
 | |
| 	var enabledUnits []repo_model.RepoUnit
 | |
| 	if opts.EnabledUnits.Has() {
 | |
| 		units := opts.EnabledUnits.Value()
 | |
| 		enabledUnits = make([]repo_model.RepoUnit, len(units))
 | |
| 
 | |
| 		for i, unitType := range units {
 | |
| 			enabledUnits[i] = repo_model.RepoUnit{
 | |
| 				RepoID: repo.ID,
 | |
| 				Type:   unitType,
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Adjust the repo units according to our parameters.
 | |
| 	if opts.EnabledUnits.Has() || opts.DisabledUnits.Has() {
 | |
| 		err := repo_service.UpdateRepositoryUnits(db.DefaultContext, repo, enabledUnits, opts.DisabledUnits.ValueOrDefault(nil))
 | |
| 		assert.NoError(t, err)
 | |
| 	}
 | |
| 
 | |
| 	// Add files, if any.
 | |
| 	var sha string
 | |
| 	if opts.Files.Has() {
 | |
| 		assert.True(t, autoInit, "Files cannot be specified if AutoInit is disabled")
 | |
| 		files := opts.Files.Value()
 | |
| 
 | |
| 		resp, err := files_service.ChangeRepoFiles(git.DefaultContext, repo, owner, &files_service.ChangeRepoFilesOptions{
 | |
| 			Files:     files,
 | |
| 			Message:   "add files",
 | |
| 			OldBranch: "main",
 | |
| 			NewBranch: "main",
 | |
| 			Author: &files_service.IdentityOptions{
 | |
| 				Name:  owner.Name,
 | |
| 				Email: owner.Email,
 | |
| 			},
 | |
| 			Committer: &files_service.IdentityOptions{
 | |
| 				Name:  owner.Name,
 | |
| 				Email: owner.Email,
 | |
| 			},
 | |
| 			Dates: &files_service.CommitDateOptions{
 | |
| 				Author:    time.Now(),
 | |
| 				Committer: time.Now(),
 | |
| 			},
 | |
| 		})
 | |
| 		assert.NoError(t, err)
 | |
| 		assert.NotEmpty(t, resp)
 | |
| 
 | |
| 		sha = resp.Commit.SHA
 | |
| 	}
 | |
| 
 | |
| 	// If there's a Wiki branch specified, create a wiki, and a default wiki page.
 | |
| 	if opts.WikiBranch.Has() {
 | |
| 		// Set the wiki branch in the database first
 | |
| 		repo.WikiBranch = opts.WikiBranch.Value()
 | |
| 		err := repo_model.UpdateRepositoryCols(db.DefaultContext, repo, "wiki_branch")
 | |
| 		assert.NoError(t, err)
 | |
| 
 | |
| 		// Initialize the wiki
 | |
| 		err = wiki_service.InitWiki(db.DefaultContext, repo)
 | |
| 		assert.NoError(t, err)
 | |
| 
 | |
| 		// Add a new wiki page
 | |
| 		err = wiki_service.AddWikiPage(db.DefaultContext, owner, repo, "Home", "Welcome to the wiki!", "Add a Home page")
 | |
| 		assert.NoError(t, err)
 | |
| 	}
 | |
| 
 | |
| 	// Return the repo, the top commit, and a defer-able function to delete the
 | |
| 	// repo.
 | |
| 	return repo, sha, func() {
 | |
| 		repo_service.DeleteRepository(db.DefaultContext, owner, repo, false)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func CreateDeclarativeRepo(t *testing.T, owner *user_model.User, name string, enabledUnits, disabledUnits []unit_model.Type, files []*files_service.ChangeRepoFile) (*repo_model.Repository, string, func()) {
 | |
| 	t.Helper()
 | |
| 
 | |
| 	var opts DeclarativeRepoOptions
 | |
| 
 | |
| 	if name != "" {
 | |
| 		opts.Name = optional.Some(name)
 | |
| 	}
 | |
| 	if enabledUnits != nil {
 | |
| 		opts.EnabledUnits = optional.Some(enabledUnits)
 | |
| 	}
 | |
| 	if disabledUnits != nil {
 | |
| 		opts.DisabledUnits = optional.Some(disabledUnits)
 | |
| 	}
 | |
| 	if files != nil {
 | |
| 		opts.Files = optional.Some(files)
 | |
| 	}
 | |
| 
 | |
| 	return CreateDeclarativeRepoWithOptions(t, owner, opts)
 | |
| }
 |