You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_admin_test.go 8.8KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254
  1. // Copyright 2017 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package integration
  4. import (
  5. "fmt"
  6. "net/http"
  7. "testing"
  8. asymkey_model "code.gitea.io/gitea/models/asymkey"
  9. "code.gitea.io/gitea/models/unittest"
  10. user_model "code.gitea.io/gitea/models/user"
  11. "code.gitea.io/gitea/modules/json"
  12. api "code.gitea.io/gitea/modules/structs"
  13. "code.gitea.io/gitea/tests"
  14. "github.com/stretchr/testify/assert"
  15. )
  16. func TestAPIAdminCreateAndDeleteSSHKey(t *testing.T) {
  17. defer tests.PrepareTestEnv(t)()
  18. // user1 is an admin user
  19. session := loginUser(t, "user1")
  20. keyOwner := unittest.AssertExistsAndLoadBean(t, &user_model.User{Name: "user2"})
  21. token := getTokenForLoggedInUser(t, session)
  22. urlStr := fmt.Sprintf("/api/v1/admin/users/%s/keys?token=%s", keyOwner.Name, token)
  23. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  24. "key": "ssh-rsa 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 nocomment\n",
  25. "title": "test-key",
  26. })
  27. resp := session.MakeRequest(t, req, http.StatusCreated)
  28. var newPublicKey api.PublicKey
  29. DecodeJSON(t, resp, &newPublicKey)
  30. unittest.AssertExistsAndLoadBean(t, &asymkey_model.PublicKey{
  31. ID: newPublicKey.ID,
  32. Name: newPublicKey.Title,
  33. Fingerprint: newPublicKey.Fingerprint,
  34. OwnerID: keyOwner.ID,
  35. })
  36. req = NewRequestf(t, "DELETE", "/api/v1/admin/users/%s/keys/%d?token=%s",
  37. keyOwner.Name, newPublicKey.ID, token)
  38. session.MakeRequest(t, req, http.StatusNoContent)
  39. unittest.AssertNotExistsBean(t, &asymkey_model.PublicKey{ID: newPublicKey.ID})
  40. }
  41. func TestAPIAdminDeleteMissingSSHKey(t *testing.T) {
  42. defer tests.PrepareTestEnv(t)()
  43. // user1 is an admin user
  44. session := loginUser(t, "user1")
  45. token := getTokenForLoggedInUser(t, session)
  46. req := NewRequestf(t, "DELETE", "/api/v1/admin/users/user1/keys/%d?token=%s", unittest.NonexistentID, token)
  47. session.MakeRequest(t, req, http.StatusNotFound)
  48. }
  49. func TestAPIAdminDeleteUnauthorizedKey(t *testing.T) {
  50. defer tests.PrepareTestEnv(t)()
  51. adminUsername := "user1"
  52. normalUsername := "user2"
  53. session := loginUser(t, adminUsername)
  54. token := getTokenForLoggedInUser(t, session)
  55. urlStr := fmt.Sprintf("/api/v1/admin/users/%s/keys?token=%s", adminUsername, token)
  56. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  57. "key": "ssh-rsa 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 nocomment\n",
  58. "title": "test-key",
  59. })
  60. resp := session.MakeRequest(t, req, http.StatusCreated)
  61. var newPublicKey api.PublicKey
  62. DecodeJSON(t, resp, &newPublicKey)
  63. session = loginUser(t, normalUsername)
  64. token = getTokenForLoggedInUser(t, session)
  65. req = NewRequestf(t, "DELETE", "/api/v1/admin/users/%s/keys/%d?token=%s",
  66. adminUsername, newPublicKey.ID, token)
  67. session.MakeRequest(t, req, http.StatusForbidden)
  68. }
  69. func TestAPISudoUser(t *testing.T) {
  70. defer tests.PrepareTestEnv(t)()
  71. adminUsername := "user1"
  72. normalUsername := "user2"
  73. session := loginUser(t, adminUsername)
  74. token := getTokenForLoggedInUser(t, session)
  75. urlStr := fmt.Sprintf("/api/v1/user?sudo=%s&token=%s", normalUsername, token)
  76. req := NewRequest(t, "GET", urlStr)
  77. resp := session.MakeRequest(t, req, http.StatusOK)
  78. var user api.User
  79. DecodeJSON(t, resp, &user)
  80. assert.Equal(t, normalUsername, user.UserName)
  81. }
  82. func TestAPISudoUserForbidden(t *testing.T) {
  83. defer tests.PrepareTestEnv(t)()
  84. adminUsername := "user1"
  85. normalUsername := "user2"
  86. session := loginUser(t, normalUsername)
  87. token := getTokenForLoggedInUser(t, session)
  88. urlStr := fmt.Sprintf("/api/v1/user?sudo=%s&token=%s", adminUsername, token)
  89. req := NewRequest(t, "GET", urlStr)
  90. session.MakeRequest(t, req, http.StatusForbidden)
  91. }
  92. func TestAPIListUsers(t *testing.T) {
  93. defer tests.PrepareTestEnv(t)()
  94. adminUsername := "user1"
  95. session := loginUser(t, adminUsername)
  96. token := getTokenForLoggedInUser(t, session)
  97. urlStr := fmt.Sprintf("/api/v1/admin/users?token=%s", token)
  98. req := NewRequest(t, "GET", urlStr)
  99. resp := session.MakeRequest(t, req, http.StatusOK)
  100. var users []api.User
  101. DecodeJSON(t, resp, &users)
  102. found := false
  103. for _, user := range users {
  104. if user.UserName == adminUsername {
  105. found = true
  106. }
  107. }
  108. assert.True(t, found)
  109. numberOfUsers := unittest.GetCount(t, &user_model.User{}, "type = 0")
  110. assert.Equal(t, numberOfUsers, len(users))
  111. }
  112. func TestAPIListUsersNotLoggedIn(t *testing.T) {
  113. defer tests.PrepareTestEnv(t)()
  114. req := NewRequest(t, "GET", "/api/v1/admin/users")
  115. MakeRequest(t, req, http.StatusUnauthorized)
  116. }
  117. func TestAPIListUsersNonAdmin(t *testing.T) {
  118. defer tests.PrepareTestEnv(t)()
  119. nonAdminUsername := "user2"
  120. session := loginUser(t, nonAdminUsername)
  121. token := getTokenForLoggedInUser(t, session)
  122. req := NewRequestf(t, "GET", "/api/v1/admin/users?token=%s", token)
  123. session.MakeRequest(t, req, http.StatusForbidden)
  124. }
  125. func TestAPICreateUserInvalidEmail(t *testing.T) {
  126. defer tests.PrepareTestEnv(t)()
  127. adminUsername := "user1"
  128. session := loginUser(t, adminUsername)
  129. token := getTokenForLoggedInUser(t, session)
  130. urlStr := fmt.Sprintf("/api/v1/admin/users?token=%s", token)
  131. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  132. "email": "invalid_email@domain.com\r\n",
  133. "full_name": "invalid user",
  134. "login_name": "invalidUser",
  135. "must_change_password": "true",
  136. "password": "password",
  137. "send_notify": "true",
  138. "source_id": "0",
  139. "username": "invalidUser",
  140. })
  141. session.MakeRequest(t, req, http.StatusUnprocessableEntity)
  142. }
  143. func TestAPICreateAndDeleteUser(t *testing.T) {
  144. defer tests.PrepareTestEnv(t)()
  145. adminUsername := "user1"
  146. session := loginUser(t, adminUsername)
  147. token := getTokenForLoggedInUser(t, session)
  148. req := NewRequestWithValues(
  149. t,
  150. "POST",
  151. fmt.Sprintf("/api/v1/admin/users?token=%s", token),
  152. map[string]string{
  153. "email": "deleteme@domain.com",
  154. "full_name": "delete me",
  155. "login_name": "deleteme",
  156. "must_change_password": "true",
  157. "password": "password",
  158. "send_notify": "true",
  159. "source_id": "0",
  160. "username": "deleteme",
  161. },
  162. )
  163. MakeRequest(t, req, http.StatusCreated)
  164. req = NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/admin/users/deleteme?token=%s", token))
  165. MakeRequest(t, req, http.StatusNoContent)
  166. }
  167. func TestAPIEditUser(t *testing.T) {
  168. defer tests.PrepareTestEnv(t)()
  169. adminUsername := "user1"
  170. session := loginUser(t, adminUsername)
  171. token := getTokenForLoggedInUser(t, session)
  172. urlStr := fmt.Sprintf("/api/v1/admin/users/%s?token=%s", "user2", token)
  173. req := NewRequestWithValues(t, "PATCH", urlStr, map[string]string{
  174. // required
  175. "login_name": "user2",
  176. "source_id": "0",
  177. // to change
  178. "full_name": "Full Name User 2",
  179. })
  180. session.MakeRequest(t, req, http.StatusOK)
  181. empty := ""
  182. req = NewRequestWithJSON(t, "PATCH", urlStr, api.EditUserOption{
  183. LoginName: "user2",
  184. SourceID: 0,
  185. Email: &empty,
  186. })
  187. resp := session.MakeRequest(t, req, http.StatusUnprocessableEntity)
  188. errMap := make(map[string]interface{})
  189. json.Unmarshal(resp.Body.Bytes(), &errMap)
  190. assert.EqualValues(t, "email is not allowed to be empty string", errMap["message"].(string))
  191. user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{LoginName: "user2"})
  192. assert.False(t, user2.IsRestricted)
  193. bTrue := true
  194. req = NewRequestWithJSON(t, "PATCH", urlStr, api.EditUserOption{
  195. // required
  196. LoginName: "user2",
  197. SourceID: 0,
  198. // to change
  199. Restricted: &bTrue,
  200. })
  201. session.MakeRequest(t, req, http.StatusOK)
  202. user2 = unittest.AssertExistsAndLoadBean(t, &user_model.User{LoginName: "user2"})
  203. assert.True(t, user2.IsRestricted)
  204. }
  205. func TestAPICreateRepoForUser(t *testing.T) {
  206. defer tests.PrepareTestEnv(t)()
  207. adminUsername := "user1"
  208. session := loginUser(t, adminUsername)
  209. token := getTokenForLoggedInUser(t, session)
  210. req := NewRequestWithJSON(
  211. t,
  212. "POST",
  213. fmt.Sprintf("/api/v1/admin/users/%s/repos?token=%s", adminUsername, token),
  214. &api.CreateRepoOption{
  215. Name: "admincreatedrepo",
  216. },
  217. )
  218. MakeRequest(t, req, http.StatusCreated)
  219. }