You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

user_test.go 22KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513
  1. // Copyright 2017 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package models
  5. import (
  6. "fmt"
  7. "math/rand"
  8. "strings"
  9. "testing"
  10. "code.gitea.io/gitea/models/db"
  11. "code.gitea.io/gitea/models/login"
  12. "code.gitea.io/gitea/modules/setting"
  13. "code.gitea.io/gitea/modules/structs"
  14. "code.gitea.io/gitea/modules/util"
  15. "github.com/stretchr/testify/assert"
  16. )
  17. func TestOAuth2Application_LoadUser(t *testing.T) {
  18. assert.NoError(t, db.PrepareTestDatabase())
  19. app := db.AssertExistsAndLoadBean(t, &login.OAuth2Application{ID: 1}).(*login.OAuth2Application)
  20. user, err := GetUserByID(app.UID)
  21. assert.NoError(t, err)
  22. assert.NotNil(t, user)
  23. }
  24. func TestUserIsPublicMember(t *testing.T) {
  25. assert.NoError(t, db.PrepareTestDatabase())
  26. tt := []struct {
  27. uid int64
  28. orgid int64
  29. expected bool
  30. }{
  31. {2, 3, true},
  32. {4, 3, false},
  33. {5, 6, true},
  34. {5, 7, false},
  35. }
  36. for _, v := range tt {
  37. t.Run(fmt.Sprintf("UserId%dIsPublicMemberOf%d", v.uid, v.orgid), func(t *testing.T) {
  38. testUserIsPublicMember(t, v.uid, v.orgid, v.expected)
  39. })
  40. }
  41. }
  42. func testUserIsPublicMember(t *testing.T, uid, orgID int64, expected bool) {
  43. user, err := GetUserByID(uid)
  44. assert.NoError(t, err)
  45. assert.Equal(t, expected, user.IsPublicMember(orgID))
  46. }
  47. func TestIsUserOrgOwner(t *testing.T) {
  48. assert.NoError(t, db.PrepareTestDatabase())
  49. tt := []struct {
  50. uid int64
  51. orgid int64
  52. expected bool
  53. }{
  54. {2, 3, true},
  55. {4, 3, false},
  56. {5, 6, true},
  57. {5, 7, true},
  58. }
  59. for _, v := range tt {
  60. t.Run(fmt.Sprintf("UserId%dIsOrgOwnerOf%d", v.uid, v.orgid), func(t *testing.T) {
  61. testIsUserOrgOwner(t, v.uid, v.orgid, v.expected)
  62. })
  63. }
  64. }
  65. func testIsUserOrgOwner(t *testing.T, uid, orgID int64, expected bool) {
  66. user, err := GetUserByID(uid)
  67. assert.NoError(t, err)
  68. assert.Equal(t, expected, user.IsUserOrgOwner(orgID))
  69. }
  70. func TestGetUserEmailsByNames(t *testing.T) {
  71. assert.NoError(t, db.PrepareTestDatabase())
  72. // ignore none active user email
  73. assert.Equal(t, []string{"user8@example.com"}, GetUserEmailsByNames([]string{"user8", "user9"}))
  74. assert.Equal(t, []string{"user8@example.com", "user5@example.com"}, GetUserEmailsByNames([]string{"user8", "user5"}))
  75. assert.Equal(t, []string{"user8@example.com"}, GetUserEmailsByNames([]string{"user8", "user7"}))
  76. }
  77. func TestCanCreateOrganization(t *testing.T) {
  78. assert.NoError(t, db.PrepareTestDatabase())
  79. admin := db.AssertExistsAndLoadBean(t, &User{ID: 1}).(*User)
  80. assert.True(t, admin.CanCreateOrganization())
  81. user := db.AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
  82. assert.True(t, user.CanCreateOrganization())
  83. // Disable user create organization permission.
  84. user.AllowCreateOrganization = false
  85. assert.False(t, user.CanCreateOrganization())
  86. setting.Admin.DisableRegularOrgCreation = true
  87. user.AllowCreateOrganization = true
  88. assert.True(t, admin.CanCreateOrganization())
  89. assert.False(t, user.CanCreateOrganization())
  90. }
  91. func TestSearchUsers(t *testing.T) {
  92. assert.NoError(t, db.PrepareTestDatabase())
  93. testSuccess := func(opts *SearchUserOptions, expectedUserOrOrgIDs []int64) {
  94. users, _, err := SearchUsers(opts)
  95. assert.NoError(t, err)
  96. if assert.Len(t, users, len(expectedUserOrOrgIDs)) {
  97. for i, expectedID := range expectedUserOrOrgIDs {
  98. assert.EqualValues(t, expectedID, users[i].ID)
  99. }
  100. }
  101. }
  102. // test orgs
  103. testOrgSuccess := func(opts *SearchUserOptions, expectedOrgIDs []int64) {
  104. opts.Type = UserTypeOrganization
  105. testSuccess(opts, expectedOrgIDs)
  106. }
  107. testOrgSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: db.ListOptions{Page: 1, PageSize: 2}},
  108. []int64{3, 6})
  109. testOrgSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: db.ListOptions{Page: 2, PageSize: 2}},
  110. []int64{7, 17})
  111. testOrgSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: db.ListOptions{Page: 3, PageSize: 2}},
  112. []int64{19, 25})
  113. testOrgSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: db.ListOptions{Page: 4, PageSize: 2}},
  114. []int64{26})
  115. testOrgSuccess(&SearchUserOptions{ListOptions: db.ListOptions{Page: 5, PageSize: 2}},
  116. []int64{})
  117. // test users
  118. testUserSuccess := func(opts *SearchUserOptions, expectedUserIDs []int64) {
  119. opts.Type = UserTypeIndividual
  120. testSuccess(opts, expectedUserIDs)
  121. }
  122. testUserSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: db.ListOptions{Page: 1}},
  123. []int64{1, 2, 4, 5, 8, 9, 10, 11, 12, 13, 14, 15, 16, 18, 20, 21, 24, 27, 28, 29, 30})
  124. testUserSuccess(&SearchUserOptions{ListOptions: db.ListOptions{Page: 1}, IsActive: util.OptionalBoolFalse},
  125. []int64{9})
  126. testUserSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: db.ListOptions{Page: 1}, IsActive: util.OptionalBoolTrue},
  127. []int64{1, 2, 4, 5, 8, 10, 11, 12, 13, 14, 15, 16, 18, 20, 21, 24, 28, 29, 30})
  128. testUserSuccess(&SearchUserOptions{Keyword: "user1", OrderBy: "id ASC", ListOptions: db.ListOptions{Page: 1}, IsActive: util.OptionalBoolTrue},
  129. []int64{1, 10, 11, 12, 13, 14, 15, 16, 18})
  130. // order by name asc default
  131. testUserSuccess(&SearchUserOptions{Keyword: "user1", ListOptions: db.ListOptions{Page: 1}, IsActive: util.OptionalBoolTrue},
  132. []int64{1, 10, 11, 12, 13, 14, 15, 16, 18})
  133. testUserSuccess(&SearchUserOptions{ListOptions: db.ListOptions{Page: 1}, IsAdmin: util.OptionalBoolTrue},
  134. []int64{1})
  135. testUserSuccess(&SearchUserOptions{ListOptions: db.ListOptions{Page: 1}, IsRestricted: util.OptionalBoolTrue},
  136. []int64{29, 30})
  137. testUserSuccess(&SearchUserOptions{ListOptions: db.ListOptions{Page: 1}, IsProhibitLogin: util.OptionalBoolTrue},
  138. []int64{30})
  139. testUserSuccess(&SearchUserOptions{ListOptions: db.ListOptions{Page: 1}, IsTwoFactorEnabled: util.OptionalBoolTrue},
  140. []int64{24})
  141. }
  142. func TestDeleteUser(t *testing.T) {
  143. test := func(userID int64) {
  144. assert.NoError(t, db.PrepareTestDatabase())
  145. user := db.AssertExistsAndLoadBean(t, &User{ID: userID}).(*User)
  146. ownedRepos := make([]*Repository, 0, 10)
  147. assert.NoError(t, db.GetEngine(db.DefaultContext).Find(&ownedRepos, &Repository{OwnerID: userID}))
  148. if len(ownedRepos) > 0 {
  149. err := DeleteUser(user)
  150. assert.Error(t, err)
  151. assert.True(t, IsErrUserOwnRepos(err))
  152. return
  153. }
  154. orgUsers := make([]*OrgUser, 0, 10)
  155. assert.NoError(t, db.GetEngine(db.DefaultContext).Find(&orgUsers, &OrgUser{UID: userID}))
  156. for _, orgUser := range orgUsers {
  157. if err := RemoveOrgUser(orgUser.OrgID, orgUser.UID); err != nil {
  158. assert.True(t, IsErrLastOrgOwner(err))
  159. return
  160. }
  161. }
  162. assert.NoError(t, DeleteUser(user))
  163. db.AssertNotExistsBean(t, &User{ID: userID})
  164. CheckConsistencyFor(t, &User{}, &Repository{})
  165. }
  166. test(2)
  167. test(4)
  168. test(8)
  169. test(11)
  170. org := db.AssertExistsAndLoadBean(t, &User{ID: 3}).(*User)
  171. assert.Error(t, DeleteUser(org))
  172. }
  173. func TestEmailNotificationPreferences(t *testing.T) {
  174. assert.NoError(t, db.PrepareTestDatabase())
  175. for _, test := range []struct {
  176. expected string
  177. userID int64
  178. }{
  179. {EmailNotificationsEnabled, 1},
  180. {EmailNotificationsEnabled, 2},
  181. {EmailNotificationsOnMention, 3},
  182. {EmailNotificationsOnMention, 4},
  183. {EmailNotificationsEnabled, 5},
  184. {EmailNotificationsEnabled, 6},
  185. {EmailNotificationsDisabled, 7},
  186. {EmailNotificationsEnabled, 8},
  187. {EmailNotificationsOnMention, 9},
  188. } {
  189. user := db.AssertExistsAndLoadBean(t, &User{ID: test.userID}).(*User)
  190. assert.Equal(t, test.expected, user.EmailNotifications())
  191. // Try all possible settings
  192. assert.NoError(t, user.SetEmailNotifications(EmailNotificationsEnabled))
  193. assert.Equal(t, EmailNotificationsEnabled, user.EmailNotifications())
  194. assert.NoError(t, user.SetEmailNotifications(EmailNotificationsOnMention))
  195. assert.Equal(t, EmailNotificationsOnMention, user.EmailNotifications())
  196. assert.NoError(t, user.SetEmailNotifications(EmailNotificationsDisabled))
  197. assert.Equal(t, EmailNotificationsDisabled, user.EmailNotifications())
  198. }
  199. }
  200. func TestHashPasswordDeterministic(t *testing.T) {
  201. b := make([]byte, 16)
  202. u := &User{}
  203. algos := []string{"argon2", "pbkdf2", "scrypt", "bcrypt"}
  204. for j := 0; j < len(algos); j++ {
  205. u.PasswdHashAlgo = algos[j]
  206. for i := 0; i < 50; i++ {
  207. // generate a random password
  208. rand.Read(b)
  209. pass := string(b)
  210. // save the current password in the user - hash it and store the result
  211. u.SetPassword(pass)
  212. r1 := u.Passwd
  213. // run again
  214. u.SetPassword(pass)
  215. r2 := u.Passwd
  216. assert.NotEqual(t, r1, r2)
  217. assert.True(t, u.ValidatePassword(pass))
  218. }
  219. }
  220. }
  221. func BenchmarkHashPassword(b *testing.B) {
  222. // BenchmarkHashPassword ensures that it takes a reasonable amount of time
  223. // to hash a password - in order to protect from brute-force attacks.
  224. pass := "password1337"
  225. u := &User{Passwd: pass}
  226. b.ResetTimer()
  227. for i := 0; i < b.N; i++ {
  228. u.SetPassword(pass)
  229. }
  230. }
  231. func TestGetOrgRepositoryIDs(t *testing.T) {
  232. assert.NoError(t, db.PrepareTestDatabase())
  233. user2 := db.AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
  234. user4 := db.AssertExistsAndLoadBean(t, &User{ID: 4}).(*User)
  235. user5 := db.AssertExistsAndLoadBean(t, &User{ID: 5}).(*User)
  236. accessibleRepos, err := user2.GetOrgRepositoryIDs()
  237. assert.NoError(t, err)
  238. // User 2's team has access to private repos 3, 5, repo 32 is a public repo of the organization
  239. assert.Equal(t, []int64{3, 5, 23, 24, 32}, accessibleRepos)
  240. accessibleRepos, err = user4.GetOrgRepositoryIDs()
  241. assert.NoError(t, err)
  242. // User 4's team has access to private repo 3, repo 32 is a public repo of the organization
  243. assert.Equal(t, []int64{3, 32}, accessibleRepos)
  244. accessibleRepos, err = user5.GetOrgRepositoryIDs()
  245. assert.NoError(t, err)
  246. // User 5's team has no access to any repo
  247. assert.Len(t, accessibleRepos, 0)
  248. }
  249. func TestNewGitSig(t *testing.T) {
  250. users := make([]*User, 0, 20)
  251. sess := db.NewSession(db.DefaultContext)
  252. defer sess.Close()
  253. sess.Find(&users)
  254. for _, user := range users {
  255. sig := user.NewGitSig()
  256. assert.NotContains(t, sig.Name, "<")
  257. assert.NotContains(t, sig.Name, ">")
  258. assert.NotContains(t, sig.Name, "\n")
  259. assert.NotEqual(t, len(strings.TrimSpace(sig.Name)), 0)
  260. }
  261. }
  262. func TestDisplayName(t *testing.T) {
  263. users := make([]*User, 0, 20)
  264. sess := db.NewSession(db.DefaultContext)
  265. defer sess.Close()
  266. sess.Find(&users)
  267. for _, user := range users {
  268. displayName := user.DisplayName()
  269. assert.Equal(t, strings.TrimSpace(displayName), displayName)
  270. if len(strings.TrimSpace(user.FullName)) == 0 {
  271. assert.Equal(t, user.Name, displayName)
  272. }
  273. assert.NotEqual(t, len(strings.TrimSpace(displayName)), 0)
  274. }
  275. }
  276. func TestCreateUser(t *testing.T) {
  277. user := &User{
  278. Name: "GiteaBot",
  279. Email: "GiteaBot@gitea.io",
  280. Passwd: ";p['////..-++']",
  281. IsAdmin: false,
  282. Theme: setting.UI.DefaultTheme,
  283. MustChangePassword: false,
  284. }
  285. assert.NoError(t, CreateUser(user))
  286. assert.NoError(t, DeleteUser(user))
  287. }
  288. func TestCreateUserInvalidEmail(t *testing.T) {
  289. user := &User{
  290. Name: "GiteaBot",
  291. Email: "GiteaBot@gitea.io\r\n",
  292. Passwd: ";p['////..-++']",
  293. IsAdmin: false,
  294. Theme: setting.UI.DefaultTheme,
  295. MustChangePassword: false,
  296. }
  297. err := CreateUser(user)
  298. assert.Error(t, err)
  299. assert.True(t, IsErrEmailInvalid(err))
  300. }
  301. func TestCreateUser_Issue5882(t *testing.T) {
  302. // Init settings
  303. _ = setting.Admin
  304. passwd := ".//.;1;;//.,-=_"
  305. tt := []struct {
  306. user *User
  307. disableOrgCreation bool
  308. }{
  309. {&User{Name: "GiteaBot", Email: "GiteaBot@gitea.io", Passwd: passwd, MustChangePassword: false}, false},
  310. {&User{Name: "GiteaBot2", Email: "GiteaBot2@gitea.io", Passwd: passwd, MustChangePassword: false}, true},
  311. }
  312. setting.Service.DefaultAllowCreateOrganization = true
  313. for _, v := range tt {
  314. setting.Admin.DisableRegularOrgCreation = v.disableOrgCreation
  315. assert.NoError(t, CreateUser(v.user))
  316. u, err := GetUserByEmail(v.user.Email)
  317. assert.NoError(t, err)
  318. assert.Equal(t, !u.AllowCreateOrganization, v.disableOrgCreation)
  319. assert.NoError(t, DeleteUser(v.user))
  320. }
  321. }
  322. func TestGetUserIDsByNames(t *testing.T) {
  323. assert.NoError(t, db.PrepareTestDatabase())
  324. // ignore non existing
  325. IDs, err := GetUserIDsByNames([]string{"user1", "user2", "none_existing_user"}, true)
  326. assert.NoError(t, err)
  327. assert.Equal(t, []int64{1, 2}, IDs)
  328. // ignore non existing
  329. IDs, err = GetUserIDsByNames([]string{"user1", "do_not_exist"}, false)
  330. assert.Error(t, err)
  331. assert.Equal(t, []int64(nil), IDs)
  332. }
  333. func TestGetMaileableUsersByIDs(t *testing.T) {
  334. assert.NoError(t, db.PrepareTestDatabase())
  335. results, err := GetMaileableUsersByIDs([]int64{1, 4}, false)
  336. assert.NoError(t, err)
  337. assert.Len(t, results, 1)
  338. if len(results) > 1 {
  339. assert.Equal(t, results[0].ID, 1)
  340. }
  341. results, err = GetMaileableUsersByIDs([]int64{1, 4}, true)
  342. assert.NoError(t, err)
  343. assert.Len(t, results, 2)
  344. if len(results) > 2 {
  345. assert.Equal(t, results[0].ID, 1)
  346. assert.Equal(t, results[1].ID, 4)
  347. }
  348. }
  349. func TestAddLdapSSHPublicKeys(t *testing.T) {
  350. assert.NoError(t, db.PrepareTestDatabase())
  351. user := db.AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
  352. s := &login.Source{ID: 1}
  353. testCases := []struct {
  354. keyString string
  355. number int
  356. keyContents []string
  357. }{
  358. {
  359. keyString: "ssh-rsa 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 nocomment\n",
  360. number: 1,
  361. keyContents: []string{
  362. "ssh-rsa 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",
  363. },
  364. },
  365. {
  366. keyString: `ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC4cn+iXnA4KvcQYSV88vGn0Yi91vG47t1P7okprVmhNTkipNRIHWr6WdCO4VDr/cvsRkuVJAsLO2enwjGWWueOO6BodiBgyAOZ/5t5nJNMCNuLGT5UIo/RI1b0WRQwxEZTRjt6mFNw6lH14wRd8ulsr9toSWBPMOGWoYs1PDeDL0JuTjL+tr1SZi/EyxCngpYszKdXllJEHyI79KQgeD0Vt3pTrkbNVTOEcCNqZePSVmUH8X8Vhugz3bnE0/iE9Pb5fkWO9c4AnM1FgI/8Bvp27Fw2ShryIXuR6kKvUqhVMTuOSDHwu6A8jLE5Owt3GAYugDpDYuwTVNGrHLXKpPzrGGPE/jPmaLCMZcsdkec95dYeU3zKODEm8UQZFhmJmDeWVJ36nGrGZHL4J5aTTaeFUJmmXDaJYiJ+K2/ioKgXqnXvltu0A9R8/LGy4nrTJRr4JMLuJFoUXvGm1gXQ70w2LSpk6yl71RNC0hCtsBe8BP8IhYCM0EP5jh7eCMQZNvM= nocomment
  367. ssh-dss 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 nocomment`,
  368. number: 2,
  369. keyContents: []string{
  370. "ssh-rsa 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",
  371. "ssh-dss AAAAB3NzaC1kc3MAAACBAOChCC7lf6Uo9n7BmZ6M8St19PZf4Tn59NriyboW2x/DZuYAz3ibZ2OkQ3S0SqDIa0HXSEJ1zaExQdmbO+Ux/wsytWZmCczWOVsaszBZSl90q8UnWlSH6P+/YA+RWJm5SFtuV9PtGIhyZgoNuz5kBQ7K139wuQsecdKktISwTakzAAAAFQCzKsO2JhNKlL+wwwLGOcLffoAmkwAAAIBpK7/3xvduajLBD/9vASqBQIHrgK2J+wiQnIb/Wzy0UsVmvfn8A+udRbBo+csM8xrSnlnlJnjkJS3qiM5g+eTwsLIV1IdKPEwmwB+VcP53Cw6lSyWyJcvhFb0N6s08NZysLzvj0N+ZC/FnhKTLzIyMtkHf/IrPCwlM+pV/M/96YgAAAIEAqQcGn9CKgzgPaguIZooTAOQdvBLMI5y0bQjOW6734XOpqQGf/Kra90wpoasLKZjSYKNPjE+FRUOrStLrxcNs4BeVKhy2PYTRnybfYVk1/dmKgH6P1YSRONsGKvTsH6c5IyCRG0ncCgYeF8tXppyd642982daopE7zQ/NPAnJfag=",
  372. },
  373. },
  374. {
  375. keyString: `ssh-rsa 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 nocomment
  376. # comment asmdna,ndp
  377. ssh-dss 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 nocomment`,
  378. number: 2,
  379. keyContents: []string{
  380. "ssh-rsa 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",
  381. "ssh-dss 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",
  382. },
  383. },
  384. {
  385. keyString: `ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC4cn+iXnA4KvcQYSV88vGn0Yi91vG47t1P7okprVmhNTkipNRIHWr6WdCO4VDr/cvsRkuVJAsLO2enwjGWWueOO6BodiBgyAOZ/5t5nJNMCNuLGT5UIo/RI1b0WRQwxEZTRjt6mFNw6lH14wRd8ulsr9toSWBPMOGWoYs1PDeDL0JuTjL+tr1SZi/EyxCngpYszKdXllJEHyI79KQgeD0Vt3pTrkbNVTOEcCNqZePSVmUH8X8Vhugz3bnE0/iE9Pb5fkWO9c4AnM1FgI/8Bvp27Fw2ShryIXuR6kKvUqhVMTuOSDHwu6A8jLE5Owt3GAYugDpDYuwTVNGrHLXKpPzrGGPE/jPmaLCMZcsdkec95dYeU3zKODEm8UQZFhmJmDeWVJ36nGrGZHL4J5aTTaeFUJmmXDaJYiJ+K2/ioKgXqnXvltu0A9R8/LGy4nrTJRr4JMLuJFoUXvGm1gXQ70w2LSpk6yl71RNC0hCtsBe8BP8IhYCM0EP5jh7eCMQZNvM= nocomment
  386. 382488320jasdj1lasmva/vasodifipi4193-fksma.cm
  387. ssh-dss AAAAB3NzaC1kc3MAAACBAOChCC7lf6Uo9n7BmZ6M8St19PZf4Tn59NriyboW2x/DZuYAz3ibZ2OkQ3S0SqDIa0HXSEJ1zaExQdmbO+Ux/wsytWZmCczWOVsaszBZSl90q8UnWlSH6P+/YA+RWJm5SFtuV9PtGIhyZgoNuz5kBQ7K139wuQsecdKktISwTakzAAAAFQCzKsO2JhNKlL+wwwLGOcLffoAmkwAAAIBpK7/3xvduajLBD/9vASqBQIHrgK2J+wiQnIb/Wzy0UsVmvfn8A+udRbBo+csM8xrSnlnlJnjkJS3qiM5g+eTwsLIV1IdKPEwmwB+VcP53Cw6lSyWyJcvhFb0N6s08NZysLzvj0N+ZC/FnhKTLzIyMtkHf/IrPCwlM+pV/M/96YgAAAIEAqQcGn9CKgzgPaguIZooTAOQdvBLMI5y0bQjOW6734XOpqQGf/Kra90wpoasLKZjSYKNPjE+FRUOrStLrxcNs4BeVKhy2PYTRnybfYVk1/dmKgH6P1YSRONsGKvTsH6c5IyCRG0ncCgYeF8tXppyd642982daopE7zQ/NPAnJfag= nocomment`,
  388. number: 2,
  389. keyContents: []string{
  390. "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC4cn+iXnA4KvcQYSV88vGn0Yi91vG47t1P7okprVmhNTkipNRIHWr6WdCO4VDr/cvsRkuVJAsLO2enwjGWWueOO6BodiBgyAOZ/5t5nJNMCNuLGT5UIo/RI1b0WRQwxEZTRjt6mFNw6lH14wRd8ulsr9toSWBPMOGWoYs1PDeDL0JuTjL+tr1SZi/EyxCngpYszKdXllJEHyI79KQgeD0Vt3pTrkbNVTOEcCNqZePSVmUH8X8Vhugz3bnE0/iE9Pb5fkWO9c4AnM1FgI/8Bvp27Fw2ShryIXuR6kKvUqhVMTuOSDHwu6A8jLE5Owt3GAYugDpDYuwTVNGrHLXKpPzrGGPE/jPmaLCMZcsdkec95dYeU3zKODEm8UQZFhmJmDeWVJ36nGrGZHL4J5aTTaeFUJmmXDaJYiJ+K2/ioKgXqnXvltu0A9R8/LGy4nrTJRr4JMLuJFoUXvGm1gXQ70w2LSpk6yl71RNC0hCtsBe8BP8IhYCM0EP5jh7eCMQZNvM=",
  391. "ssh-dss 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",
  392. },
  393. },
  394. }
  395. for i, kase := range testCases {
  396. s.ID = int64(i) + 20
  397. AddPublicKeysBySource(user, s, []string{kase.keyString})
  398. keys, err := ListPublicKeysBySource(user.ID, s.ID)
  399. assert.NoError(t, err)
  400. if err != nil {
  401. continue
  402. }
  403. assert.Len(t, keys, kase.number)
  404. for _, key := range keys {
  405. assert.Contains(t, kase.keyContents, key.Content)
  406. }
  407. for _, key := range keys {
  408. DeletePublicKey(user, key.ID)
  409. }
  410. }
  411. }
  412. func TestUpdateUser(t *testing.T) {
  413. assert.NoError(t, db.PrepareTestDatabase())
  414. user := db.AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
  415. user.KeepActivityPrivate = true
  416. assert.NoError(t, UpdateUser(user))
  417. user = db.AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
  418. assert.True(t, user.KeepActivityPrivate)
  419. setting.Service.AllowedUserVisibilityModesSlice = []bool{true, false, false}
  420. user.KeepActivityPrivate = false
  421. user.Visibility = structs.VisibleTypePrivate
  422. assert.Error(t, UpdateUser(user))
  423. user = db.AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
  424. assert.True(t, user.KeepActivityPrivate)
  425. user.Email = "no mail@mail.org"
  426. assert.Error(t, UpdateUser(user))
  427. }