You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_admin_test.go 12KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334
  1. // Copyright 2017 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package integration
  4. import (
  5. "fmt"
  6. "net/http"
  7. "testing"
  8. "time"
  9. asymkey_model "code.gitea.io/gitea/models/asymkey"
  10. auth_model "code.gitea.io/gitea/models/auth"
  11. "code.gitea.io/gitea/models/unittest"
  12. user_model "code.gitea.io/gitea/models/user"
  13. "code.gitea.io/gitea/modules/json"
  14. api "code.gitea.io/gitea/modules/structs"
  15. "code.gitea.io/gitea/tests"
  16. "github.com/stretchr/testify/assert"
  17. )
  18. func TestAPIAdminCreateAndDeleteSSHKey(t *testing.T) {
  19. defer tests.PrepareTestEnv(t)()
  20. // user1 is an admin user
  21. session := loginUser(t, "user1")
  22. keyOwner := unittest.AssertExistsAndLoadBean(t, &user_model.User{Name: "user2"})
  23. token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteAdmin)
  24. urlStr := fmt.Sprintf("/api/v1/admin/users/%s/keys?token=%s", keyOwner.Name, token)
  25. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  26. "key": "ssh-rsa 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 nocomment\n",
  27. "title": "test-key",
  28. })
  29. resp := MakeRequest(t, req, http.StatusCreated)
  30. var newPublicKey api.PublicKey
  31. DecodeJSON(t, resp, &newPublicKey)
  32. unittest.AssertExistsAndLoadBean(t, &asymkey_model.PublicKey{
  33. ID: newPublicKey.ID,
  34. Name: newPublicKey.Title,
  35. Fingerprint: newPublicKey.Fingerprint,
  36. OwnerID: keyOwner.ID,
  37. })
  38. req = NewRequestf(t, "DELETE", "/api/v1/admin/users/%s/keys/%d?token=%s",
  39. keyOwner.Name, newPublicKey.ID, token)
  40. MakeRequest(t, req, http.StatusNoContent)
  41. unittest.AssertNotExistsBean(t, &asymkey_model.PublicKey{ID: newPublicKey.ID})
  42. }
  43. func TestAPIAdminDeleteMissingSSHKey(t *testing.T) {
  44. defer tests.PrepareTestEnv(t)()
  45. // user1 is an admin user
  46. token := getUserToken(t, "user1", auth_model.AccessTokenScopeWriteAdmin)
  47. req := NewRequestf(t, "DELETE", "/api/v1/admin/users/user1/keys/%d?token=%s", unittest.NonexistentID, token)
  48. MakeRequest(t, req, http.StatusNotFound)
  49. }
  50. func TestAPIAdminDeleteUnauthorizedKey(t *testing.T) {
  51. defer tests.PrepareTestEnv(t)()
  52. adminUsername := "user1"
  53. normalUsername := "user2"
  54. token := getUserToken(t, adminUsername, auth_model.AccessTokenScopeWriteAdmin)
  55. urlStr := fmt.Sprintf("/api/v1/admin/users/%s/keys?token=%s", adminUsername, token)
  56. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  57. "key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC4cn+iXnA4KvcQYSV88vGn0Yi91vG47t1P7okprVmhNTkipNRIHWr6WdCO4VDr/cvsRkuVJAsLO2enwjGWWueOO6BodiBgyAOZ/5t5nJNMCNuLGT5UIo/RI1b0WRQwxEZTRjt6mFNw6lH14wRd8ulsr9toSWBPMOGWoYs1PDeDL0JuTjL+tr1SZi/EyxCngpYszKdXllJEHyI79KQgeD0Vt3pTrkbNVTOEcCNqZePSVmUH8X8Vhugz3bnE0/iE9Pb5fkWO9c4AnM1FgI/8Bvp27Fw2ShryIXuR6kKvUqhVMTuOSDHwu6A8jLE5Owt3GAYugDpDYuwTVNGrHLXKpPzrGGPE/jPmaLCMZcsdkec95dYeU3zKODEm8UQZFhmJmDeWVJ36nGrGZHL4J5aTTaeFUJmmXDaJYiJ+K2/ioKgXqnXvltu0A9R8/LGy4nrTJRr4JMLuJFoUXvGm1gXQ70w2LSpk6yl71RNC0hCtsBe8BP8IhYCM0EP5jh7eCMQZNvM= nocomment\n",
  58. "title": "test-key",
  59. })
  60. resp := MakeRequest(t, req, http.StatusCreated)
  61. var newPublicKey api.PublicKey
  62. DecodeJSON(t, resp, &newPublicKey)
  63. token = getUserToken(t, normalUsername)
  64. req = NewRequestf(t, "DELETE", "/api/v1/admin/users/%s/keys/%d?token=%s",
  65. adminUsername, newPublicKey.ID, token)
  66. MakeRequest(t, req, http.StatusForbidden)
  67. }
  68. func TestAPISudoUser(t *testing.T) {
  69. defer tests.PrepareTestEnv(t)()
  70. adminUsername := "user1"
  71. normalUsername := "user2"
  72. token := getUserToken(t, adminUsername, auth_model.AccessTokenScopeReadUser)
  73. urlStr := fmt.Sprintf("/api/v1/user?sudo=%s&token=%s", normalUsername, token)
  74. req := NewRequest(t, "GET", urlStr)
  75. resp := MakeRequest(t, req, http.StatusOK)
  76. var user api.User
  77. DecodeJSON(t, resp, &user)
  78. assert.Equal(t, normalUsername, user.UserName)
  79. }
  80. func TestAPISudoUserForbidden(t *testing.T) {
  81. defer tests.PrepareTestEnv(t)()
  82. adminUsername := "user1"
  83. normalUsername := "user2"
  84. token := getUserToken(t, normalUsername, auth_model.AccessTokenScopeReadAdmin)
  85. urlStr := fmt.Sprintf("/api/v1/user?sudo=%s&token=%s", adminUsername, token)
  86. req := NewRequest(t, "GET", urlStr)
  87. MakeRequest(t, req, http.StatusForbidden)
  88. }
  89. func TestAPIListUsers(t *testing.T) {
  90. defer tests.PrepareTestEnv(t)()
  91. adminUsername := "user1"
  92. token := getUserToken(t, adminUsername, auth_model.AccessTokenScopeReadAdmin)
  93. urlStr := fmt.Sprintf("/api/v1/admin/users?token=%s", token)
  94. req := NewRequest(t, "GET", urlStr)
  95. resp := MakeRequest(t, req, http.StatusOK)
  96. var users []api.User
  97. DecodeJSON(t, resp, &users)
  98. found := false
  99. for _, user := range users {
  100. if user.UserName == adminUsername {
  101. found = true
  102. }
  103. }
  104. assert.True(t, found)
  105. numberOfUsers := unittest.GetCount(t, &user_model.User{}, "type = 0")
  106. assert.Len(t, users, numberOfUsers)
  107. }
  108. func TestAPIListUsersNotLoggedIn(t *testing.T) {
  109. defer tests.PrepareTestEnv(t)()
  110. req := NewRequest(t, "GET", "/api/v1/admin/users")
  111. MakeRequest(t, req, http.StatusUnauthorized)
  112. }
  113. func TestAPIListUsersNonAdmin(t *testing.T) {
  114. defer tests.PrepareTestEnv(t)()
  115. nonAdminUsername := "user2"
  116. token := getUserToken(t, nonAdminUsername)
  117. req := NewRequestf(t, "GET", "/api/v1/admin/users?token=%s", token)
  118. MakeRequest(t, req, http.StatusForbidden)
  119. }
  120. func TestAPICreateUserInvalidEmail(t *testing.T) {
  121. defer tests.PrepareTestEnv(t)()
  122. adminUsername := "user1"
  123. token := getUserToken(t, adminUsername, auth_model.AccessTokenScopeWriteAdmin)
  124. urlStr := fmt.Sprintf("/api/v1/admin/users?token=%s", token)
  125. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  126. "email": "invalid_email@domain.com\r\n",
  127. "full_name": "invalid user",
  128. "login_name": "invalidUser",
  129. "must_change_password": "true",
  130. "password": "password",
  131. "send_notify": "true",
  132. "source_id": "0",
  133. "username": "invalidUser",
  134. })
  135. MakeRequest(t, req, http.StatusUnprocessableEntity)
  136. }
  137. func TestAPICreateAndDeleteUser(t *testing.T) {
  138. defer tests.PrepareTestEnv(t)()
  139. adminUsername := "user1"
  140. token := getUserToken(t, adminUsername, auth_model.AccessTokenScopeWriteAdmin)
  141. req := NewRequestWithValues(
  142. t,
  143. "POST",
  144. fmt.Sprintf("/api/v1/admin/users?token=%s", token),
  145. map[string]string{
  146. "email": "deleteme@domain.com",
  147. "full_name": "delete me",
  148. "login_name": "deleteme",
  149. "must_change_password": "true",
  150. "password": "password",
  151. "send_notify": "true",
  152. "source_id": "0",
  153. "username": "deleteme",
  154. },
  155. )
  156. MakeRequest(t, req, http.StatusCreated)
  157. req = NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/admin/users/deleteme?token=%s", token))
  158. MakeRequest(t, req, http.StatusNoContent)
  159. }
  160. func TestAPIEditUser(t *testing.T) {
  161. defer tests.PrepareTestEnv(t)()
  162. adminUsername := "user1"
  163. token := getUserToken(t, adminUsername, auth_model.AccessTokenScopeWriteAdmin)
  164. urlStr := fmt.Sprintf("/api/v1/admin/users/%s?token=%s", "user2", token)
  165. req := NewRequestWithValues(t, "PATCH", urlStr, map[string]string{
  166. // required
  167. "login_name": "user2",
  168. "source_id": "0",
  169. // to change
  170. "full_name": "Full Name User 2",
  171. })
  172. MakeRequest(t, req, http.StatusOK)
  173. empty := ""
  174. req = NewRequestWithJSON(t, "PATCH", urlStr, api.EditUserOption{
  175. LoginName: "user2",
  176. SourceID: 0,
  177. Email: &empty,
  178. })
  179. resp := MakeRequest(t, req, http.StatusUnprocessableEntity)
  180. errMap := make(map[string]any)
  181. json.Unmarshal(resp.Body.Bytes(), &errMap)
  182. assert.EqualValues(t, "email is not allowed to be empty string", errMap["message"].(string))
  183. user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{LoginName: "user2"})
  184. assert.False(t, user2.IsRestricted)
  185. bTrue := true
  186. req = NewRequestWithJSON(t, "PATCH", urlStr, api.EditUserOption{
  187. // required
  188. LoginName: "user2",
  189. SourceID: 0,
  190. // to change
  191. Restricted: &bTrue,
  192. })
  193. MakeRequest(t, req, http.StatusOK)
  194. user2 = unittest.AssertExistsAndLoadBean(t, &user_model.User{LoginName: "user2"})
  195. assert.True(t, user2.IsRestricted)
  196. }
  197. func TestAPICreateRepoForUser(t *testing.T) {
  198. defer tests.PrepareTestEnv(t)()
  199. adminUsername := "user1"
  200. token := getUserToken(t, adminUsername, auth_model.AccessTokenScopeWriteAdmin)
  201. req := NewRequestWithJSON(
  202. t,
  203. "POST",
  204. fmt.Sprintf("/api/v1/admin/users/%s/repos?token=%s", adminUsername, token),
  205. &api.CreateRepoOption{
  206. Name: "admincreatedrepo",
  207. },
  208. )
  209. MakeRequest(t, req, http.StatusCreated)
  210. }
  211. func TestAPIRenameUser(t *testing.T) {
  212. defer tests.PrepareTestEnv(t)()
  213. adminUsername := "user1"
  214. token := getUserToken(t, adminUsername, auth_model.AccessTokenScopeWriteAdmin)
  215. urlStr := fmt.Sprintf("/api/v1/admin/users/%s/rename?token=%s", "user2", token)
  216. req := NewRequestWithValues(t, "POST", urlStr, map[string]string{
  217. // required
  218. "new_name": "User2",
  219. })
  220. MakeRequest(t, req, http.StatusOK)
  221. urlStr = fmt.Sprintf("/api/v1/admin/users/%s/rename?token=%s", "User2", token)
  222. req = NewRequestWithValues(t, "POST", urlStr, map[string]string{
  223. // required
  224. "new_name": "User2-2-2",
  225. })
  226. MakeRequest(t, req, http.StatusOK)
  227. urlStr = fmt.Sprintf("/api/v1/admin/users/%s/rename?token=%s", "User2", token)
  228. req = NewRequestWithValues(t, "POST", urlStr, map[string]string{
  229. // required
  230. "new_name": "user1",
  231. })
  232. // the old user name still be used by with a redirect
  233. MakeRequest(t, req, http.StatusTemporaryRedirect)
  234. urlStr = fmt.Sprintf("/api/v1/admin/users/%s/rename?token=%s", "User2-2-2", token)
  235. req = NewRequestWithValues(t, "POST", urlStr, map[string]string{
  236. // required
  237. "new_name": "user1",
  238. })
  239. MakeRequest(t, req, http.StatusUnprocessableEntity)
  240. urlStr = fmt.Sprintf("/api/v1/admin/users/%s/rename?token=%s", "User2-2-2", token)
  241. req = NewRequestWithValues(t, "POST", urlStr, map[string]string{
  242. // required
  243. "new_name": "user2",
  244. })
  245. MakeRequest(t, req, http.StatusOK)
  246. }
  247. func TestAPICron(t *testing.T) {
  248. defer tests.PrepareTestEnv(t)()
  249. // user1 is an admin user
  250. session := loginUser(t, "user1")
  251. t.Run("List", func(t *testing.T) {
  252. defer tests.PrintCurrentTest(t)()
  253. token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadAdmin)
  254. urlStr := fmt.Sprintf("/api/v1/admin/cron?token=%s", token)
  255. req := NewRequest(t, "GET", urlStr)
  256. resp := MakeRequest(t, req, http.StatusOK)
  257. assert.Equal(t, "28", resp.Header().Get("X-Total-Count"))
  258. var crons []api.Cron
  259. DecodeJSON(t, resp, &crons)
  260. assert.Len(t, crons, 28)
  261. })
  262. t.Run("Execute", func(t *testing.T) {
  263. defer tests.PrintCurrentTest(t)()
  264. now := time.Now()
  265. token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteAdmin)
  266. // Archive cleanup is harmless, because in the test environment there are none
  267. // and is thus an NOOP operation and therefore doesn't interfere with any other
  268. // tests.
  269. urlStr := fmt.Sprintf("/api/v1/admin/cron/archive_cleanup?token=%s", token)
  270. req := NewRequest(t, "POST", urlStr)
  271. MakeRequest(t, req, http.StatusNoContent)
  272. // Check for the latest run time for this cron, to ensure it has been run.
  273. urlStr = fmt.Sprintf("/api/v1/admin/cron?token=%s", token)
  274. req = NewRequest(t, "GET", urlStr)
  275. resp := MakeRequest(t, req, http.StatusOK)
  276. var crons []api.Cron
  277. DecodeJSON(t, resp, &crons)
  278. for _, cron := range crons {
  279. if cron.Name == "archive_cleanup" {
  280. assert.True(t, now.Before(cron.Prev))
  281. }
  282. }
  283. })
  284. }