You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_admin_test.go 7.7KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211
  1. // Copyright 2017 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package integrations
  5. import (
  6. "fmt"
  7. "net/http"
  8. "testing"
  9. asymkey_model "code.gitea.io/gitea/models/asymkey"
  10. "code.gitea.io/gitea/models/unittest"
  11. user_model "code.gitea.io/gitea/models/user"
  12. "code.gitea.io/gitea/modules/json"
  13. api "code.gitea.io/gitea/modules/structs"
  14. "github.com/stretchr/testify/assert"
  15. )
  16. func TestAPIAdminCreateAndDeleteSSHKey(t *testing.T) {
  17. defer prepareTestEnv(t)()
  18. // user1 is an admin user
  19. session := loginUser(t, "user1")
  20. keyOwner := unittest.AssertExistsAndLoadBean(t, &user_model.User{Name: "user2"}).(*user_model.User)
  21. token := getTokenForLoggedInUser(t, session)
  22. urlStr := fmt.Sprintf("/api/v1/admin/users/%s/keys?token=%s", keyOwner.Name, token)
  23. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  24. "key": "ssh-rsa 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 nocomment\n",
  25. "title": "test-key",
  26. })
  27. resp := session.MakeRequest(t, req, http.StatusCreated)
  28. var newPublicKey api.PublicKey
  29. DecodeJSON(t, resp, &newPublicKey)
  30. unittest.AssertExistsAndLoadBean(t, &asymkey_model.PublicKey{
  31. ID: newPublicKey.ID,
  32. Name: newPublicKey.Title,
  33. Content: newPublicKey.Key,
  34. Fingerprint: newPublicKey.Fingerprint,
  35. OwnerID: keyOwner.ID,
  36. })
  37. req = NewRequestf(t, "DELETE", "/api/v1/admin/users/%s/keys/%d?token=%s",
  38. keyOwner.Name, newPublicKey.ID, token)
  39. session.MakeRequest(t, req, http.StatusNoContent)
  40. unittest.AssertNotExistsBean(t, &asymkey_model.PublicKey{ID: newPublicKey.ID})
  41. }
  42. func TestAPIAdminDeleteMissingSSHKey(t *testing.T) {
  43. defer prepareTestEnv(t)()
  44. // user1 is an admin user
  45. session := loginUser(t, "user1")
  46. token := getTokenForLoggedInUser(t, session)
  47. req := NewRequestf(t, "DELETE", "/api/v1/admin/users/user1/keys/%d?token=%s", unittest.NonexistentID, token)
  48. session.MakeRequest(t, req, http.StatusNotFound)
  49. }
  50. func TestAPIAdminDeleteUnauthorizedKey(t *testing.T) {
  51. defer prepareTestEnv(t)()
  52. adminUsername := "user1"
  53. normalUsername := "user2"
  54. session := loginUser(t, adminUsername)
  55. token := getTokenForLoggedInUser(t, session)
  56. urlStr := fmt.Sprintf("/api/v1/admin/users/%s/keys?token=%s", adminUsername, token)
  57. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  58. "key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC4cn+iXnA4KvcQYSV88vGn0Yi91vG47t1P7okprVmhNTkipNRIHWr6WdCO4VDr/cvsRkuVJAsLO2enwjGWWueOO6BodiBgyAOZ/5t5nJNMCNuLGT5UIo/RI1b0WRQwxEZTRjt6mFNw6lH14wRd8ulsr9toSWBPMOGWoYs1PDeDL0JuTjL+tr1SZi/EyxCngpYszKdXllJEHyI79KQgeD0Vt3pTrkbNVTOEcCNqZePSVmUH8X8Vhugz3bnE0/iE9Pb5fkWO9c4AnM1FgI/8Bvp27Fw2ShryIXuR6kKvUqhVMTuOSDHwu6A8jLE5Owt3GAYugDpDYuwTVNGrHLXKpPzrGGPE/jPmaLCMZcsdkec95dYeU3zKODEm8UQZFhmJmDeWVJ36nGrGZHL4J5aTTaeFUJmmXDaJYiJ+K2/ioKgXqnXvltu0A9R8/LGy4nrTJRr4JMLuJFoUXvGm1gXQ70w2LSpk6yl71RNC0hCtsBe8BP8IhYCM0EP5jh7eCMQZNvM= nocomment\n",
  59. "title": "test-key",
  60. })
  61. resp := session.MakeRequest(t, req, http.StatusCreated)
  62. var newPublicKey api.PublicKey
  63. DecodeJSON(t, resp, &newPublicKey)
  64. session = loginUser(t, normalUsername)
  65. token = getTokenForLoggedInUser(t, session)
  66. req = NewRequestf(t, "DELETE", "/api/v1/admin/users/%s/keys/%d?token=%s",
  67. adminUsername, newPublicKey.ID, token)
  68. session.MakeRequest(t, req, http.StatusForbidden)
  69. }
  70. func TestAPISudoUser(t *testing.T) {
  71. defer prepareTestEnv(t)()
  72. adminUsername := "user1"
  73. normalUsername := "user2"
  74. session := loginUser(t, adminUsername)
  75. token := getTokenForLoggedInUser(t, session)
  76. urlStr := fmt.Sprintf("/api/v1/user?sudo=%s&token=%s", normalUsername, token)
  77. req := NewRequest(t, "GET", urlStr)
  78. resp := session.MakeRequest(t, req, http.StatusOK)
  79. var user api.User
  80. DecodeJSON(t, resp, &user)
  81. assert.Equal(t, normalUsername, user.UserName)
  82. }
  83. func TestAPISudoUserForbidden(t *testing.T) {
  84. defer prepareTestEnv(t)()
  85. adminUsername := "user1"
  86. normalUsername := "user2"
  87. session := loginUser(t, normalUsername)
  88. token := getTokenForLoggedInUser(t, session)
  89. urlStr := fmt.Sprintf("/api/v1/user?sudo=%s&token=%s", adminUsername, token)
  90. req := NewRequest(t, "GET", urlStr)
  91. session.MakeRequest(t, req, http.StatusForbidden)
  92. }
  93. func TestAPIListUsers(t *testing.T) {
  94. defer prepareTestEnv(t)()
  95. adminUsername := "user1"
  96. session := loginUser(t, adminUsername)
  97. token := getTokenForLoggedInUser(t, session)
  98. urlStr := fmt.Sprintf("/api/v1/admin/users?token=%s", token)
  99. req := NewRequest(t, "GET", urlStr)
  100. resp := session.MakeRequest(t, req, http.StatusOK)
  101. var users []api.User
  102. DecodeJSON(t, resp, &users)
  103. found := false
  104. for _, user := range users {
  105. if user.UserName == adminUsername {
  106. found = true
  107. }
  108. }
  109. assert.True(t, found)
  110. numberOfUsers := unittest.GetCount(t, &user_model.User{}, "type = 0")
  111. assert.Equal(t, numberOfUsers, len(users))
  112. }
  113. func TestAPIListUsersNotLoggedIn(t *testing.T) {
  114. defer prepareTestEnv(t)()
  115. req := NewRequest(t, "GET", "/api/v1/admin/users")
  116. MakeRequest(t, req, http.StatusUnauthorized)
  117. }
  118. func TestAPIListUsersNonAdmin(t *testing.T) {
  119. defer prepareTestEnv(t)()
  120. nonAdminUsername := "user2"
  121. session := loginUser(t, nonAdminUsername)
  122. token := getTokenForLoggedInUser(t, session)
  123. req := NewRequestf(t, "GET", "/api/v1/admin/users?token=%s", token)
  124. session.MakeRequest(t, req, http.StatusForbidden)
  125. }
  126. func TestAPICreateUserInvalidEmail(t *testing.T) {
  127. defer prepareTestEnv(t)()
  128. adminUsername := "user1"
  129. session := loginUser(t, adminUsername)
  130. token := getTokenForLoggedInUser(t, session)
  131. urlStr := fmt.Sprintf("/api/v1/admin/users?token=%s", token)
  132. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  133. "email": "invalid_email@domain.com\r\n",
  134. "full_name": "invalid user",
  135. "login_name": "invalidUser",
  136. "must_change_password": "true",
  137. "password": "password",
  138. "send_notify": "true",
  139. "source_id": "0",
  140. "username": "invalidUser",
  141. })
  142. session.MakeRequest(t, req, http.StatusUnprocessableEntity)
  143. }
  144. func TestAPIEditUser(t *testing.T) {
  145. defer prepareTestEnv(t)()
  146. adminUsername := "user1"
  147. session := loginUser(t, adminUsername)
  148. token := getTokenForLoggedInUser(t, session)
  149. urlStr := fmt.Sprintf("/api/v1/admin/users/%s?token=%s", "user2", token)
  150. req := NewRequestWithValues(t, "PATCH", urlStr, map[string]string{
  151. // required
  152. "login_name": "user2",
  153. "source_id": "0",
  154. // to change
  155. "full_name": "Full Name User 2",
  156. })
  157. session.MakeRequest(t, req, http.StatusOK)
  158. empty := ""
  159. req = NewRequestWithJSON(t, "PATCH", urlStr, api.EditUserOption{
  160. LoginName: "user2",
  161. SourceID: 0,
  162. Email: &empty,
  163. })
  164. resp := session.MakeRequest(t, req, http.StatusUnprocessableEntity)
  165. errMap := make(map[string]interface{})
  166. json.Unmarshal(resp.Body.Bytes(), &errMap)
  167. assert.EqualValues(t, "email is not allowed to be empty string", errMap["message"].(string))
  168. user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{LoginName: "user2"}).(*user_model.User)
  169. assert.False(t, user2.IsRestricted)
  170. bTrue := true
  171. req = NewRequestWithJSON(t, "PATCH", urlStr, api.EditUserOption{
  172. // required
  173. LoginName: "user2",
  174. SourceID: 0,
  175. // to change
  176. Restricted: &bTrue,
  177. })
  178. session.MakeRequest(t, req, http.StatusOK)
  179. user2 = unittest.AssertExistsAndLoadBean(t, &user_model.User{LoginName: "user2"}).(*user_model.User)
  180. assert.True(t, user2.IsRestricted)
  181. }