gitea源码

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135
  1. // Copyright 2023 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package cmd
  4. import (
  5. "fmt"
  6. "strings"
  7. "testing"
  8. auth_model "code.gitea.io/gitea/models/auth"
  9. "code.gitea.io/gitea/models/db"
  10. "code.gitea.io/gitea/models/unittest"
  11. user_model "code.gitea.io/gitea/models/user"
  12. "github.com/stretchr/testify/assert"
  13. "github.com/stretchr/testify/require"
  14. )
  15. func TestAdminUserCreate(t *testing.T) {
  16. reset := func() {
  17. require.NoError(t, db.TruncateBeans(t.Context(), &user_model.User{}))
  18. require.NoError(t, db.TruncateBeans(t.Context(), &user_model.EmailAddress{}))
  19. require.NoError(t, db.TruncateBeans(t.Context(), &auth_model.AccessToken{}))
  20. }
  21. t.Run("MustChangePassword", func(t *testing.T) {
  22. type check struct {
  23. IsAdmin bool
  24. MustChangePassword bool
  25. }
  26. createCheck := func(name, args string) check {
  27. require.NoError(t, microcmdUserCreate().Run(t.Context(), strings.Fields(fmt.Sprintf("create --username %s --email %s@gitea.local %s --password foobar", name, name, args))))
  28. u := unittest.AssertExistsAndLoadBean(t, &user_model.User{LowerName: name})
  29. return check{IsAdmin: u.IsAdmin, MustChangePassword: u.MustChangePassword}
  30. }
  31. reset()
  32. assert.Equal(t, check{IsAdmin: false, MustChangePassword: false}, createCheck("u", ""), "first non-admin user doesn't need to change password")
  33. reset()
  34. assert.Equal(t, check{IsAdmin: true, MustChangePassword: false}, createCheck("u", "--admin"), "first admin user doesn't need to change password")
  35. reset()
  36. assert.Equal(t, check{IsAdmin: true, MustChangePassword: true}, createCheck("u", "--admin --must-change-password"))
  37. assert.Equal(t, check{IsAdmin: true, MustChangePassword: true}, createCheck("u2", "--admin"))
  38. assert.Equal(t, check{IsAdmin: true, MustChangePassword: false}, createCheck("u3", "--admin --must-change-password=false"))
  39. assert.Equal(t, check{IsAdmin: false, MustChangePassword: true}, createCheck("u4", ""))
  40. assert.Equal(t, check{IsAdmin: false, MustChangePassword: false}, createCheck("u5", "--must-change-password=false"))
  41. })
  42. createUser := func(name string, args ...string) error {
  43. return microcmdUserCreate().Run(t.Context(), append([]string{"create", "--username", name, "--email", name + "@gitea.local"}, args...))
  44. }
  45. t.Run("UserType", func(t *testing.T) {
  46. reset()
  47. assert.ErrorContains(t, createUser("u", "--user-type", "invalid"), "invalid user type")
  48. assert.ErrorContains(t, createUser("u", "--user-type", "bot", "--password", "123"), "can only be set for individual users")
  49. assert.ErrorContains(t, createUser("u", "--user-type", "bot", "--must-change-password"), "can only be set for individual users")
  50. assert.NoError(t, createUser("u", "--user-type", "bot"))
  51. u := unittest.AssertExistsAndLoadBean(t, &user_model.User{LowerName: "u"})
  52. assert.Equal(t, user_model.UserTypeBot, u.Type)
  53. assert.Empty(t, u.Passwd)
  54. })
  55. t.Run("AccessToken", func(t *testing.T) {
  56. // no generated access token
  57. reset()
  58. assert.NoError(t, createUser("u", "--random-password"))
  59. assert.Equal(t, 1, unittest.GetCount(t, &user_model.User{}))
  60. assert.Equal(t, 0, unittest.GetCount(t, &auth_model.AccessToken{}))
  61. // using "--access-token" only means "all" access
  62. reset()
  63. assert.NoError(t, createUser("u", "--random-password", "--access-token"))
  64. assert.Equal(t, 1, unittest.GetCount(t, &user_model.User{}))
  65. assert.Equal(t, 1, unittest.GetCount(t, &auth_model.AccessToken{}))
  66. accessToken := unittest.AssertExistsAndLoadBean(t, &auth_model.AccessToken{Name: "gitea-admin"})
  67. hasScopes, err := accessToken.Scope.HasScope(auth_model.AccessTokenScopeWriteAdmin, auth_model.AccessTokenScopeWriteRepository)
  68. assert.NoError(t, err)
  69. assert.True(t, hasScopes)
  70. // using "--access-token" with name & scopes
  71. reset()
  72. assert.NoError(t, createUser("u", "--random-password", "--access-token", "--access-token-name", "new-token-name", "--access-token-scopes", "read:issue,read:user"))
  73. assert.Equal(t, 1, unittest.GetCount(t, &user_model.User{}))
  74. assert.Equal(t, 1, unittest.GetCount(t, &auth_model.AccessToken{}))
  75. accessToken = unittest.AssertExistsAndLoadBean(t, &auth_model.AccessToken{Name: "new-token-name"})
  76. hasScopes, err = accessToken.Scope.HasScope(auth_model.AccessTokenScopeReadIssue, auth_model.AccessTokenScopeReadUser)
  77. assert.NoError(t, err)
  78. assert.True(t, hasScopes)
  79. hasScopes, err = accessToken.Scope.HasScope(auth_model.AccessTokenScopeWriteAdmin, auth_model.AccessTokenScopeWriteRepository)
  80. assert.NoError(t, err)
  81. assert.False(t, hasScopes)
  82. // using "--access-token-name" without "--access-token"
  83. reset()
  84. err = createUser("u", "--random-password", "--access-token-name", "new-token-name")
  85. assert.Equal(t, 0, unittest.GetCount(t, &user_model.User{}))
  86. assert.Equal(t, 0, unittest.GetCount(t, &auth_model.AccessToken{}))
  87. assert.ErrorContains(t, err, "access-token-name and access-token-scopes flags are only valid when access-token flag is set")
  88. // using "--access-token-scopes" without "--access-token"
  89. reset()
  90. err = createUser("u", "--random-password", "--access-token-scopes", "read:issue")
  91. assert.Equal(t, 0, unittest.GetCount(t, &user_model.User{}))
  92. assert.Equal(t, 0, unittest.GetCount(t, &auth_model.AccessToken{}))
  93. assert.ErrorContains(t, err, "access-token-name and access-token-scopes flags are only valid when access-token flag is set")
  94. // empty permission
  95. reset()
  96. err = createUser("u", "--random-password", "--access-token", "--access-token-scopes", "public-only")
  97. assert.Equal(t, 0, unittest.GetCount(t, &user_model.User{}))
  98. assert.Equal(t, 0, unittest.GetCount(t, &auth_model.AccessToken{}))
  99. assert.ErrorContains(t, err, "access token does not have any permission")
  100. })
  101. t.Run("UserFields", func(t *testing.T) {
  102. reset()
  103. assert.NoError(t, createUser("u-FullNameWithSpace", "--random-password", "--fullname", "First O'Middle Last"))
  104. unittest.AssertExistsAndLoadBean(t, &user_model.User{
  105. Name: "u-FullNameWithSpace",
  106. LowerName: "u-fullnamewithspace",
  107. FullName: "First O'Middle Last",
  108. Email: "u-FullNameWithSpace@gitea.local",
  109. })
  110. assert.NoError(t, createUser("u-FullNameEmpty", "--random-password", "--fullname", ""))
  111. u := unittest.AssertExistsAndLoadBean(t, &user_model.User{LowerName: "u-fullnameempty"})
  112. assert.Empty(t, u.FullName)
  113. })
  114. }