You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_gpg_keys_test.go 12KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261
  1. // Copyright 2017 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package integrations
  5. import (
  6. "net/http"
  7. "net/http/httptest"
  8. "strconv"
  9. "testing"
  10. api "code.gitea.io/gitea/modules/structs"
  11. "github.com/stretchr/testify/assert"
  12. )
  13. type makeRequestFunc func(testing.TB, *http.Request, int) *httptest.ResponseRecorder
  14. func TestGPGKeys(t *testing.T) {
  15. defer prepareTestEnv(t)()
  16. session := loginUser(t, "user2")
  17. token := getTokenForLoggedInUser(t, session)
  18. tt := []struct {
  19. name string
  20. makeRequest makeRequestFunc
  21. token string
  22. results []int
  23. }{
  24. {name: "NoLogin", makeRequest: MakeRequest, token: "",
  25. results: []int{http.StatusUnauthorized, http.StatusUnauthorized, http.StatusUnauthorized, http.StatusUnauthorized, http.StatusUnauthorized, http.StatusUnauthorized, http.StatusUnauthorized, http.StatusUnauthorized, http.StatusUnauthorized},
  26. },
  27. {name: "LoggedAsUser2", makeRequest: session.MakeRequest, token: token,
  28. results: []int{http.StatusOK, http.StatusOK, http.StatusNotFound, http.StatusNoContent, http.StatusUnprocessableEntity, http.StatusNotFound, http.StatusCreated, http.StatusNotFound, http.StatusCreated}},
  29. }
  30. for _, tc := range tt {
  31. //Basic test on result code
  32. t.Run(tc.name, func(t *testing.T) {
  33. t.Run("ViewOwnGPGKeys", func(t *testing.T) {
  34. testViewOwnGPGKeys(t, tc.makeRequest, tc.token, tc.results[0])
  35. })
  36. t.Run("ViewGPGKeys", func(t *testing.T) {
  37. testViewGPGKeys(t, tc.makeRequest, tc.token, tc.results[1])
  38. })
  39. t.Run("GetGPGKey", func(t *testing.T) {
  40. testGetGPGKey(t, tc.makeRequest, tc.token, tc.results[2])
  41. })
  42. t.Run("DeleteGPGKey", func(t *testing.T) {
  43. testDeleteGPGKey(t, tc.makeRequest, tc.token, tc.results[3])
  44. })
  45. t.Run("CreateInvalidGPGKey", func(t *testing.T) {
  46. testCreateInvalidGPGKey(t, tc.makeRequest, tc.token, tc.results[4])
  47. })
  48. t.Run("CreateNoneRegistredEmailGPGKey", func(t *testing.T) {
  49. testCreateNoneRegistredEmailGPGKey(t, tc.makeRequest, tc.token, tc.results[5])
  50. })
  51. t.Run("CreateValidGPGKey", func(t *testing.T) {
  52. testCreateValidGPGKey(t, tc.makeRequest, tc.token, tc.results[6])
  53. })
  54. t.Run("CreateValidSecondaryEmailGPGKeyNotActivated", func(t *testing.T) {
  55. testCreateValidSecondaryEmailGPGKey(t, tc.makeRequest, tc.token, tc.results[7])
  56. })
  57. })
  58. }
  59. //Check state after basic add
  60. t.Run("CheckState", func(t *testing.T) {
  61. var keys []*api.GPGKey
  62. req := NewRequest(t, "GET", "/api/v1/user/gpg_keys?token="+token) //GET all keys
  63. resp := session.MakeRequest(t, req, http.StatusOK)
  64. DecodeJSON(t, resp, &keys)
  65. assert.Len(t, keys, 1)
  66. primaryKey1 := keys[0] //Primary key 1
  67. assert.EqualValues(t, "38EA3BCED732982C", primaryKey1.KeyID)
  68. assert.Len(t, primaryKey1.Emails, 1)
  69. assert.EqualValues(t, "user2@example.com", primaryKey1.Emails[0].Email)
  70. assert.True(t, primaryKey1.Emails[0].Verified)
  71. subKey := primaryKey1.SubsKey[0] //Subkey of 38EA3BCED732982C
  72. assert.EqualValues(t, "70D7C694D17D03AD", subKey.KeyID)
  73. assert.Empty(t, subKey.Emails)
  74. var key api.GPGKey
  75. req = NewRequest(t, "GET", "/api/v1/user/gpg_keys/"+strconv.FormatInt(primaryKey1.ID, 10)+"?token="+token) //Primary key 1
  76. resp = session.MakeRequest(t, req, http.StatusOK)
  77. DecodeJSON(t, resp, &key)
  78. assert.EqualValues(t, "38EA3BCED732982C", key.KeyID)
  79. assert.Len(t, key.Emails, 1)
  80. assert.EqualValues(t, "user2@example.com", key.Emails[0].Email)
  81. assert.True(t, key.Emails[0].Verified)
  82. req = NewRequest(t, "GET", "/api/v1/user/gpg_keys/"+strconv.FormatInt(subKey.ID, 10)+"?token="+token) //Subkey of 38EA3BCED732982C
  83. resp = session.MakeRequest(t, req, http.StatusOK)
  84. DecodeJSON(t, resp, &key)
  85. assert.EqualValues(t, "70D7C694D17D03AD", key.KeyID)
  86. assert.Empty(t, key.Emails)
  87. })
  88. //Check state after basic add
  89. t.Run("CheckCommits", func(t *testing.T) {
  90. t.Run("NotSigned", func(t *testing.T) {
  91. var branch api.Branch
  92. req := NewRequest(t, "GET", "/api/v1/repos/user2/repo16/branches/not-signed?token="+token)
  93. resp := session.MakeRequest(t, req, http.StatusOK)
  94. DecodeJSON(t, resp, &branch)
  95. assert.False(t, branch.Commit.Verification.Verified)
  96. })
  97. t.Run("SignedWithNotValidatedEmail", func(t *testing.T) {
  98. var branch api.Branch
  99. req := NewRequest(t, "GET", "/api/v1/repos/user2/repo16/branches/good-sign-not-yet-validated?token="+token)
  100. resp := session.MakeRequest(t, req, http.StatusOK)
  101. DecodeJSON(t, resp, &branch)
  102. assert.False(t, branch.Commit.Verification.Verified)
  103. })
  104. t.Run("SignedWithValidEmail", func(t *testing.T) {
  105. var branch api.Branch
  106. req := NewRequest(t, "GET", "/api/v1/repos/user2/repo16/branches/good-sign?token="+token)
  107. resp := session.MakeRequest(t, req, http.StatusOK)
  108. DecodeJSON(t, resp, &branch)
  109. assert.True(t, branch.Commit.Verification.Verified)
  110. })
  111. })
  112. }
  113. func testViewOwnGPGKeys(t *testing.T, makeRequest makeRequestFunc, token string, expected int) {
  114. req := NewRequest(t, "GET", "/api/v1/user/gpg_keys?token="+token)
  115. makeRequest(t, req, expected)
  116. }
  117. func testViewGPGKeys(t *testing.T, makeRequest makeRequestFunc, token string, expected int) {
  118. req := NewRequest(t, "GET", "/api/v1/users/user2/gpg_keys?token="+token)
  119. makeRequest(t, req, expected)
  120. }
  121. func testGetGPGKey(t *testing.T, makeRequest makeRequestFunc, token string, expected int) {
  122. req := NewRequest(t, "GET", "/api/v1/user/gpg_keys/1?token="+token)
  123. makeRequest(t, req, expected)
  124. }
  125. func testDeleteGPGKey(t *testing.T, makeRequest makeRequestFunc, token string, expected int) {
  126. req := NewRequest(t, "DELETE", "/api/v1/user/gpg_keys/1?token="+token)
  127. makeRequest(t, req, expected)
  128. }
  129. func testCreateGPGKey(t *testing.T, makeRequest makeRequestFunc, token string, expected int, publicKey string) {
  130. req := NewRequestWithJSON(t, "POST", "/api/v1/user/gpg_keys?token="+token, api.CreateGPGKeyOption{
  131. ArmoredKey: publicKey,
  132. })
  133. makeRequest(t, req, expected)
  134. }
  135. func testCreateInvalidGPGKey(t *testing.T, makeRequest makeRequestFunc, token string, expected int) {
  136. testCreateGPGKey(t, makeRequest, token, expected, "invalid_key")
  137. }
  138. func testCreateNoneRegistredEmailGPGKey(t *testing.T, makeRequest makeRequestFunc, token string, expected int) {
  139. testCreateGPGKey(t, makeRequest, token, expected, `-----BEGIN PGP PUBLIC KEY BLOCK-----
  140. mQENBFmGUygBCACjCNbKvMGgp0fd5vyFW9olE1CLCSyyF9gQN2hSuzmZLuAZF2Kh
  141. dCMCG2T1UwzUB/yWUFWJ2BtCwSjuaRv+cGohqEy6bhEBV90peGA33lHfjx7wP25O
  142. 7moAphDOTZtDj1AZfCh/PTcJut8Lc0eRDMhNyp/bYtO7SHNT1Hr6rrCV/xEtSAvR
  143. 3b148/tmIBiSadaLwc558KU3ucjnW5RVGins3AjBZ+TuT4XXVH/oeLSeXPSJ5rt1
  144. rHwaseslMqZ4AbvwFLx5qn1OC9rEQv/F548QsA8m0IntLjoPon+6wcubA9Gra21c
  145. Fp6aRYl9x7fiqXDLg8i3s2nKdV7+e6as6Tp9ABEBAAG0FG5vdGtub3duQGV4YW1w
  146. bGUuY29tiQEcBBABAgAGBQJZhlMoAAoJEC8+pvYULDtte/wH/2JNrhmHwDY+hMj0
  147. batIK4HICnkKxjIgbha80P2Ao08NkzSge58fsxiKDFYAQjHui+ZAw4dq79Ax9AOO
  148. Iv2GS9+DUfWhrb6RF+vNuJldFzcI0rTW/z2q+XGKrUCwN3khJY5XngHfQQrdBtMK
  149. qsoUXz/5B8g422RTbo/SdPsyYAV6HeLLeV3rdgjI1fpaW0seZKHeTXQb/HvNeuPg
  150. qz+XV1g6Gdqa1RjDOaX7A8elVKxrYq3LBtc93FW+grBde8n7JL0zPM3DY+vJ0IJZ
  151. INx/MmBfmtCq05FqNclvU+sj2R3N1JJOtBOjZrJHQbJhzoILou8AkxeX1A+q9OAz
  152. 1geiY5E=
  153. =TkP3
  154. -----END PGP PUBLIC KEY BLOCK-----`)
  155. }
  156. func testCreateValidGPGKey(t *testing.T, makeRequest makeRequestFunc, token string, expected int) {
  157. //User2 <user2@example.com> //primary & activated
  158. testCreateGPGKey(t, makeRequest, token, expected, `-----BEGIN PGP PUBLIC KEY BLOCK-----
  159. mQENBFmGVsMBCACuxgZ7W7rI9xN08Y4M7B8yx/6/I4Slm94+wXf8YNRvAyqj30dW
  160. VJhyBcnfNRDLKSQp5o/hhfDkCgdqBjLa1PnHlGS3PXJc0hP/FyYPD2BFvNMPpCYS
  161. eu3T1qKSNXm6X0XOWD2LIrdiDC8HaI9FqZVMI/srMK2CF8XCL2m67W1FuoPlWzod
  162. 5ORy0IZB7spoF0xihmcgnEGElRmdo5w/vkGH8U7Zyn9Eb57UVFeafgeskf4wqB23
  163. BjbMdW2YaB+yzMRwYgOnD5lnBD4uqSmvjaV9C0kxn7x+oJkkiRV8/z1cNcO+BaeQ
  164. Akh/yTTeTzYGSc/ZOqCX1O+NOPgSeixVlqenABEBAAG0GVVzZXIyIDx1c2VyMkBl
  165. eGFtcGxlLmNvbT6JAVQEEwEIAD4WIQRXgbSh0TtGbgRd7XI46jvO1zKYLAUCWYZW
  166. wwIbAwUJA8JnAAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRA46jvO1zKYLF/e
  167. B/91wm2KLMIQBZBA9WA2/+9rQWTo9EqgYrXN60rEzX3cYJWXZiE4DrKR1oWDGNLi
  168. KXOCW62snvJldolBqq0ZqaKvPKzl0Y5TRqbYEc9AjUSqgRin1b+G2DevLGT4ibq+
  169. 7ocQvz0XkASEUAgHahp0Ubiiib1521WwT/duL+AG8Gg0+DK09RfV3eX5/EOkQCKv
  170. 8cutqgsd2Smz40A8wXuJkRcipZBtrB/GkUaZ/eJdwEeSYZjEA9GWF61LJT2stvRN
  171. HCk7C3z3pVEek1PluiFs/4VN8BG8yDzW4c0tLty4Fj3VwPqwIbB5AJbquVfhQCb4
  172. Eep2lm3Lc9b1OwO5N3coPJkouQENBFmGVsMBCADAGba2L6NCOE1i3WIP6CPzbdOo
  173. N3gdTfTgccAx9fNeon9jor+3tgEjlo9/6cXiRoksOV6W4wFab/ZwWgwN6JO4CGvZ
  174. Wi7EQwMMMp1E36YTojKQJrcA9UvMnTHulqQQ88F5E845DhzFQM3erv42QZZMBAX3
  175. kXCgy1GNFocl6tLUvJdEqs+VcJGGANMpmzE4WLa8KhSYnxipwuQ62JBy9R+cHyKT
  176. OARk8znRqSu5bT3LtlrZ/HXu+6Oy4+2uCdNzZIh5J5tPS7CPA6ptl88iGVBte/CJ
  177. 7cjgJWSQqeYp2Y5QvsWAivkQ4Ww9plHbbwV0A2eaHsjjWzlUl3HoJ/snMOhBABEB
  178. AAGJATwEGAEIACYWIQRXgbSh0TtGbgRd7XI46jvO1zKYLAUCWYZWwwIbDAUJA8Jn
  179. AAAKCRA46jvO1zKYLBwLCACQOpeRVrwIKVaWcPMYjVHHJsGscaLKpgpARAUgbiG6
  180. Cbc2WI8Sm3fRwrY0VAfN+u9QwrtvxANcyB3vTgTzw7FimfhOimxiTSO8HQCfjDZF
  181. Xly8rq+Fua7+ClWUpy21IekW41VvZYjH2sL6EVP+UcEOaGAyN53XfhaRVZPhNtZN
  182. NKAE9N5EG3rbsZ33LzJj40rEKlzFSseAAPft8qA3IXjzFBx+PQXHMpNCagL79he6
  183. lqockTJ+oPmta4CF/J0U5LUr1tOZXheL3TP6m8d08gDrtn0YuGOPk87i9sJz+jR9
  184. uy6MA3VSB99SK9ducGmE1Jv8mcziREroz2TEGr0zPs6h
  185. =J59D
  186. -----END PGP PUBLIC KEY BLOCK-----`)
  187. }
  188. func testCreateValidSecondaryEmailGPGKey(t *testing.T, makeRequest makeRequestFunc, token string, expected int) {
  189. //User2 <user2-2@example.com> //secondary and not activated
  190. testCreateGPGKey(t, makeRequest, token, expected, `-----BEGIN PGP PUBLIC KEY BLOCK-----
  191. mQGNBGC2K2cBDAC1+Xgk+8UfhASVgRngQi4rnQ8k0t+bWsBz4Czd26+cxVDRwlTT
  192. 8PALdrbrY/e9iXjcVcZ8Npo4UYe7/LfnL57dc7tgbenRGYYrWyVoNNv58BVw4xCY
  193. RmgvdHWIIPGuz3aME0smHxbJ2KewYTqjTPuVKF/wrHTwCpVWdjYKC5KDo3yx0mro
  194. xf9vOJOnkWNMiEw7TiZfkrbUqxyA53BVsSNKRX5C3b4FJcVT7eiAq7sDAaFxjEHy
  195. ahZslmvg7XZxWzSVzxDNesR7f4xuop8HBjzaluJoVuwiyWculTvz1b6hyHVQr+ad
  196. h8JGjj1tySI65OTFsTuptsfHXjtjl/NR4P6BXkf+FVwweaTQaEzpHkv0m9b9pY43
  197. CY/8XtS4uNPermiLG/Z0BB1eOCdoOQVHpjOa55IXQWhxXB6NZVyowiUbrR7jLDQy
  198. 5JP7D1HmErTR8JRm3VDqGbSaCgugRgFX+lb/fpgFp9k02OeK+JQudolZOt1mVk+T
  199. C4xmEWxfiH15/JMAEQEAAbQbdXNlcjIgPHVzZXIyLTJAZXhhbXBsZS5jb20+iQHU
  200. BBMBCAA+FiEEB/Y4DM3Ba2H9iXmlPO9G70C+/D4FAmC2K2cCGwMFCQPCZwAFCwkI
  201. BwIGFQoJCAsCBBYCAwECHgECF4AACgkQPO9G70C+/D59/Av/XZIhCH4X2FpxCO3d
  202. oCa+sbYkBL5xeUoPfAx5ThXzqL/tllO88TKTMEGZF3k5pocXWH0xmhqlvDTcdb0i
  203. W3O0CN8FLmuotU51c0JC1mt9zwJP9PeJNyqxrMm01Yzj55z/Dz3QHSTlDjrWTWjn
  204. YBqDf2HfdM177oydfSYmevZni1aDmBalWpFPRvqISCO7uFnvg1hJQ5mD/0qie663
  205. QJ8LAAANg32H9DyPnYi9wU62WX0DMUVTjKctT3cnYCbirjjJ7ZlCCm+cf61CRX1B
  206. E1Ng/Ef3ZcUfXWitZSjfET/pKEMSNjsQawFpZ/LPCBl+UPHzaTPAASeGJvcbZ3py
  207. wZQLQc1MCu2hmMBQ8zHQTdS2Pp0RISxCQLYvVQL6DrcJDNiSqn9p9RQt5c5r5Pjx
  208. 80BIPcjj3glOVP7PYE2azQAkt6reEjhimwCfjeDpiPnkBTY7Av2jCcUFhhemDY/j
  209. TRXK1paLphhJ36zC22SeHGxNNakjjuUakqB85DEUeoWuVm6ouQGNBGC2K2cBDADx
  210. G2rIAgMjdPtofhkEZXwv6zdNwmYOlIIM+59bam9Ep/vFq8F5f+xldevm5dvM8SeR
  211. pNwDGSOUf5OKBWBdsJFhlYBl7+EcKd/Tent/XS6JoA9ffF33b+r04L543+ykiKON
  212. WYeYi0F4WwYTIQgqZHJze1sPVkYGR5F0bL8PAcLuwd5dzZVi/q2HakrGdg29N8oY
  213. b/XnoR7FflPrNYdzO6hawi5Inx7KS7aWa0ZkARb0F4HSct+/m6nAZVsoJINLudyQ
  214. ut2NWeU8rWIm1hqyIxQFvuQJy46umq++10J/sWA98bkg41Rx+72+eP7DM5v8IgUp
  215. clJsfljRXIBWbmRAVZvtNI7PX9fwMMhf4M7wHO7G2WV39o1exKps5xFFcn8PUQiX
  216. jCSR81M145CgCdmLUR1y0pdkN/WIqjXBhkPIvO2dxEcodMNHb1aUUuUOnww6+xIP
  217. 8rGVw+a2DUiALc8Qr5RP21AYKRctfiwhSQh2KODveMtyLI3U9C/eLRPp+QM3XB8A
  218. EQEAAYkBvAQYAQgAJhYhBAf2OAzNwWth/Yl5pTzvRu9Avvw+BQJgtitnAhsMBQkD
  219. wmcAAAoJEDzvRu9Avvw+3FcMAJBwupyJ4zwQFxTJ5BkDlusG3U2FXEf3bDrXhvNd
  220. qi8eS8Vo/vRiH/w/my5JFpz1o2tJToryF71D+uF5DTItalKquhsQ9reAEmXggqOh
  221. 9Jd9mWJIEEWcRORiLNDKENKvE8bouw4U4hRaSF0IaGzAe5mO+oOvwal8L97wFxrZ
  222. 4leM1GzkopiuNfbkkBBw2KJcMjYBHzzXSCALnVwhjbgkBEWPIg38APT3cr9KfnMM
  223. q8+tvsGLj4piAl3Lww7+GhSsDOUXH8btR41BSAQDrbO5q6oi/h4nuxoNmQIDW/Ug
  224. s+dd5hnY2FtHRjb4FCR9kAjdTE6stc8wzohWfbg1N+12TTA2ylByAumICVXixavH
  225. RJ7l0OiWJk388qw9mqh3k8HcBxL7OfDlFC9oPmCS0iYiIwW/Yc80kBhoxcvl/Xa7
  226. mIMMn8taHIaQO7v9ln2EVQYTzbNCmwTw9ovTM0j/Pbkg2EftfP1TCoxQHvBnsCED
  227. 6qgtsUdi5eviONRkBgeZtN3oxA==
  228. =MgDv
  229. -----END PGP PUBLIC KEY BLOCK-----`)
  230. }