You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_admin_test.go 7.6KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209
  1. // Copyright 2017 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package integrations
  5. import (
  6. "fmt"
  7. "net/http"
  8. "testing"
  9. "code.gitea.io/gitea/models"
  10. "code.gitea.io/gitea/modules/json"
  11. api "code.gitea.io/gitea/modules/structs"
  12. "github.com/stretchr/testify/assert"
  13. )
  14. func TestAPIAdminCreateAndDeleteSSHKey(t *testing.T) {
  15. defer prepareTestEnv(t)()
  16. // user1 is an admin user
  17. session := loginUser(t, "user1")
  18. keyOwner := models.AssertExistsAndLoadBean(t, &models.User{Name: "user2"}).(*models.User)
  19. token := getTokenForLoggedInUser(t, session)
  20. urlStr := fmt.Sprintf("/api/v1/admin/users/%s/keys?token=%s", keyOwner.Name, token)
  21. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  22. "key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC4cn+iXnA4KvcQYSV88vGn0Yi91vG47t1P7okprVmhNTkipNRIHWr6WdCO4VDr/cvsRkuVJAsLO2enwjGWWueOO6BodiBgyAOZ/5t5nJNMCNuLGT5UIo/RI1b0WRQwxEZTRjt6mFNw6lH14wRd8ulsr9toSWBPMOGWoYs1PDeDL0JuTjL+tr1SZi/EyxCngpYszKdXllJEHyI79KQgeD0Vt3pTrkbNVTOEcCNqZePSVmUH8X8Vhugz3bnE0/iE9Pb5fkWO9c4AnM1FgI/8Bvp27Fw2ShryIXuR6kKvUqhVMTuOSDHwu6A8jLE5Owt3GAYugDpDYuwTVNGrHLXKpPzrGGPE/jPmaLCMZcsdkec95dYeU3zKODEm8UQZFhmJmDeWVJ36nGrGZHL4J5aTTaeFUJmmXDaJYiJ+K2/ioKgXqnXvltu0A9R8/LGy4nrTJRr4JMLuJFoUXvGm1gXQ70w2LSpk6yl71RNC0hCtsBe8BP8IhYCM0EP5jh7eCMQZNvM= nocomment\n",
  23. "title": "test-key",
  24. })
  25. resp := session.MakeRequest(t, req, http.StatusCreated)
  26. var newPublicKey api.PublicKey
  27. DecodeJSON(t, resp, &newPublicKey)
  28. models.AssertExistsAndLoadBean(t, &models.PublicKey{
  29. ID: newPublicKey.ID,
  30. Name: newPublicKey.Title,
  31. Content: newPublicKey.Key,
  32. Fingerprint: newPublicKey.Fingerprint,
  33. OwnerID: keyOwner.ID,
  34. })
  35. req = NewRequestf(t, "DELETE", "/api/v1/admin/users/%s/keys/%d?token=%s",
  36. keyOwner.Name, newPublicKey.ID, token)
  37. session.MakeRequest(t, req, http.StatusNoContent)
  38. models.AssertNotExistsBean(t, &models.PublicKey{ID: newPublicKey.ID})
  39. }
  40. func TestAPIAdminDeleteMissingSSHKey(t *testing.T) {
  41. defer prepareTestEnv(t)()
  42. // user1 is an admin user
  43. session := loginUser(t, "user1")
  44. token := getTokenForLoggedInUser(t, session)
  45. req := NewRequestf(t, "DELETE", "/api/v1/admin/users/user1/keys/%d?token=%s", models.NonexistentID, token)
  46. session.MakeRequest(t, req, http.StatusNotFound)
  47. }
  48. func TestAPIAdminDeleteUnauthorizedKey(t *testing.T) {
  49. defer prepareTestEnv(t)()
  50. adminUsername := "user1"
  51. normalUsername := "user2"
  52. session := loginUser(t, adminUsername)
  53. token := getTokenForLoggedInUser(t, session)
  54. urlStr := fmt.Sprintf("/api/v1/admin/users/%s/keys?token=%s", adminUsername, token)
  55. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  56. "key": "ssh-rsa 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 nocomment\n",
  57. "title": "test-key",
  58. })
  59. resp := session.MakeRequest(t, req, http.StatusCreated)
  60. var newPublicKey api.PublicKey
  61. DecodeJSON(t, resp, &newPublicKey)
  62. session = loginUser(t, normalUsername)
  63. token = getTokenForLoggedInUser(t, session)
  64. req = NewRequestf(t, "DELETE", "/api/v1/admin/users/%s/keys/%d?token=%s",
  65. adminUsername, newPublicKey.ID, token)
  66. session.MakeRequest(t, req, http.StatusForbidden)
  67. }
  68. func TestAPISudoUser(t *testing.T) {
  69. defer prepareTestEnv(t)()
  70. adminUsername := "user1"
  71. normalUsername := "user2"
  72. session := loginUser(t, adminUsername)
  73. token := getTokenForLoggedInUser(t, session)
  74. urlStr := fmt.Sprintf("/api/v1/user?sudo=%s&token=%s", normalUsername, token)
  75. req := NewRequest(t, "GET", urlStr)
  76. resp := session.MakeRequest(t, req, http.StatusOK)
  77. var user api.User
  78. DecodeJSON(t, resp, &user)
  79. assert.Equal(t, normalUsername, user.UserName)
  80. }
  81. func TestAPISudoUserForbidden(t *testing.T) {
  82. defer prepareTestEnv(t)()
  83. adminUsername := "user1"
  84. normalUsername := "user2"
  85. session := loginUser(t, normalUsername)
  86. token := getTokenForLoggedInUser(t, session)
  87. urlStr := fmt.Sprintf("/api/v1/user?sudo=%s&token=%s", adminUsername, token)
  88. req := NewRequest(t, "GET", urlStr)
  89. session.MakeRequest(t, req, http.StatusForbidden)
  90. }
  91. func TestAPIListUsers(t *testing.T) {
  92. defer prepareTestEnv(t)()
  93. adminUsername := "user1"
  94. session := loginUser(t, adminUsername)
  95. token := getTokenForLoggedInUser(t, session)
  96. urlStr := fmt.Sprintf("/api/v1/admin/users?token=%s", token)
  97. req := NewRequest(t, "GET", urlStr)
  98. resp := session.MakeRequest(t, req, http.StatusOK)
  99. var users []api.User
  100. DecodeJSON(t, resp, &users)
  101. found := false
  102. for _, user := range users {
  103. if user.UserName == adminUsername {
  104. found = true
  105. }
  106. }
  107. assert.True(t, found)
  108. numberOfUsers := models.GetCount(t, &models.User{}, "type = 0")
  109. assert.Equal(t, numberOfUsers, len(users))
  110. }
  111. func TestAPIListUsersNotLoggedIn(t *testing.T) {
  112. defer prepareTestEnv(t)()
  113. req := NewRequest(t, "GET", "/api/v1/admin/users")
  114. MakeRequest(t, req, http.StatusUnauthorized)
  115. }
  116. func TestAPIListUsersNonAdmin(t *testing.T) {
  117. defer prepareTestEnv(t)()
  118. nonAdminUsername := "user2"
  119. session := loginUser(t, nonAdminUsername)
  120. token := getTokenForLoggedInUser(t, session)
  121. req := NewRequestf(t, "GET", "/api/v1/admin/users?token=%s", token)
  122. session.MakeRequest(t, req, http.StatusForbidden)
  123. }
  124. func TestAPICreateUserInvalidEmail(t *testing.T) {
  125. defer prepareTestEnv(t)()
  126. adminUsername := "user1"
  127. session := loginUser(t, adminUsername)
  128. token := getTokenForLoggedInUser(t, session)
  129. urlStr := fmt.Sprintf("/api/v1/admin/users?token=%s", token)
  130. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  131. "email": "invalid_email@domain.com\r\n",
  132. "full_name": "invalid user",
  133. "login_name": "invalidUser",
  134. "must_change_password": "true",
  135. "password": "password",
  136. "send_notify": "true",
  137. "source_id": "0",
  138. "username": "invalidUser",
  139. })
  140. session.MakeRequest(t, req, http.StatusUnprocessableEntity)
  141. }
  142. func TestAPIEditUser(t *testing.T) {
  143. defer prepareTestEnv(t)()
  144. adminUsername := "user1"
  145. session := loginUser(t, adminUsername)
  146. token := getTokenForLoggedInUser(t, session)
  147. urlStr := fmt.Sprintf("/api/v1/admin/users/%s?token=%s", "user2", token)
  148. req := NewRequestWithValues(t, "PATCH", urlStr, map[string]string{
  149. // required
  150. "login_name": "user2",
  151. "source_id": "0",
  152. // to change
  153. "full_name": "Full Name User 2",
  154. })
  155. session.MakeRequest(t, req, http.StatusOK)
  156. empty := ""
  157. req = NewRequestWithJSON(t, "PATCH", urlStr, api.EditUserOption{
  158. LoginName: "user2",
  159. SourceID: 0,
  160. Email: &empty,
  161. })
  162. resp := session.MakeRequest(t, req, http.StatusUnprocessableEntity)
  163. errMap := make(map[string]interface{})
  164. json.Unmarshal(resp.Body.Bytes(), &errMap)
  165. assert.EqualValues(t, "email is not allowed to be empty string", errMap["message"].(string))
  166. user2 := models.AssertExistsAndLoadBean(t, &models.User{LoginName: "user2"}).(*models.User)
  167. assert.False(t, user2.IsRestricted)
  168. bTrue := true
  169. req = NewRequestWithJSON(t, "PATCH", urlStr, api.EditUserOption{
  170. // required
  171. LoginName: "user2",
  172. SourceID: 0,
  173. // to change
  174. Restricted: &bTrue,
  175. })
  176. session.MakeRequest(t, req, http.StatusOK)
  177. user2 = models.AssertExistsAndLoadBean(t, &models.User{LoginName: "user2"}).(*models.User)
  178. assert.True(t, user2.IsRestricted)
  179. }