gitea源码

user_settings_test.go 14KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475
  1. // Copyright 2024 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package integration
  4. import (
  5. "net/http"
  6. "testing"
  7. "code.gitea.io/gitea/modules/container"
  8. "code.gitea.io/gitea/modules/setting"
  9. "code.gitea.io/gitea/tests"
  10. "github.com/stretchr/testify/assert"
  11. )
  12. // Validate that each navbar setting is correct. This checks that the
  13. // appropriate context is passed everywhere the navbar is rendered
  14. func assertNavbar(t *testing.T, doc *HTMLDoc) {
  15. // Only show the account page if users can change their email notifications, delete themselves, or manage credentials
  16. if setting.Admin.UserDisabledFeatures.Contains(setting.UserFeatureDeletion, setting.UserFeatureManageCredentials) && !setting.Service.EnableNotifyMail {
  17. AssertHTMLElement(t, doc, ".menu a[href='/user/settings/account']", false)
  18. } else {
  19. AssertHTMLElement(t, doc, ".menu a[href='/user/settings/account']", true)
  20. }
  21. if setting.Admin.UserDisabledFeatures.Contains(setting.UserFeatureManageMFA, setting.UserFeatureManageCredentials) {
  22. AssertHTMLElement(t, doc, ".menu a[href='/user/settings/security']", false)
  23. } else {
  24. AssertHTMLElement(t, doc, ".menu a[href='/user/settings/security']", true)
  25. }
  26. if setting.Admin.UserDisabledFeatures.Contains(setting.UserFeatureManageSSHKeys, setting.UserFeatureManageGPGKeys) {
  27. AssertHTMLElement(t, doc, ".menu a[href='/user/settings/keys']", false)
  28. } else {
  29. AssertHTMLElement(t, doc, ".menu a[href='/user/settings/keys']", true)
  30. }
  31. }
  32. func WithDisabledFeatures(t *testing.T, features ...string) {
  33. t.Helper()
  34. global := setting.Admin.UserDisabledFeatures
  35. user := setting.Admin.ExternalUserDisableFeatures
  36. setting.Admin.UserDisabledFeatures = container.SetOf(features...)
  37. setting.Admin.ExternalUserDisableFeatures = setting.Admin.UserDisabledFeatures
  38. t.Cleanup(func() {
  39. setting.Admin.UserDisabledFeatures = global
  40. setting.Admin.ExternalUserDisableFeatures = user
  41. })
  42. }
  43. func TestUserSettingsAccount(t *testing.T) {
  44. defer tests.PrepareTestEnv(t)()
  45. t.Run("all features enabled", func(t *testing.T) {
  46. defer tests.PrintCurrentTest(t)()
  47. session := loginUser(t, "user2")
  48. req := NewRequest(t, "GET", "/user/settings/account")
  49. resp := session.MakeRequest(t, req, http.StatusOK)
  50. doc := NewHTMLParser(t, resp.Body)
  51. // account navbar should display
  52. AssertHTMLElement(t, doc, ".menu a[href='/user/settings/account']", true)
  53. AssertHTMLElement(t, doc, "#password", true)
  54. AssertHTMLElement(t, doc, "#email", true)
  55. AssertHTMLElement(t, doc, "#delete-form", true)
  56. })
  57. t.Run("credentials disabled", func(t *testing.T) {
  58. defer tests.PrintCurrentTest(t)()
  59. WithDisabledFeatures(t, setting.UserFeatureManageCredentials)
  60. session := loginUser(t, "user2")
  61. req := NewRequest(t, "GET", "/user/settings/account")
  62. resp := session.MakeRequest(t, req, http.StatusOK)
  63. doc := NewHTMLParser(t, resp.Body)
  64. assertNavbar(t, doc)
  65. AssertHTMLElement(t, doc, "#password", false)
  66. AssertHTMLElement(t, doc, "#email", false)
  67. AssertHTMLElement(t, doc, "#delete-form", true)
  68. })
  69. t.Run("deletion disabled", func(t *testing.T) {
  70. defer tests.PrintCurrentTest(t)()
  71. WithDisabledFeatures(t, setting.UserFeatureDeletion)
  72. session := loginUser(t, "user2")
  73. req := NewRequest(t, "GET", "/user/settings/account")
  74. resp := session.MakeRequest(t, req, http.StatusOK)
  75. doc := NewHTMLParser(t, resp.Body)
  76. assertNavbar(t, doc)
  77. AssertHTMLElement(t, doc, "#password", true)
  78. AssertHTMLElement(t, doc, "#email", true)
  79. AssertHTMLElement(t, doc, "#delete-form", false)
  80. })
  81. t.Run("deletion, credentials and email notifications are disabled", func(t *testing.T) {
  82. defer tests.PrintCurrentTest(t)()
  83. mail := setting.Service.EnableNotifyMail
  84. setting.Service.EnableNotifyMail = false
  85. defer func() {
  86. setting.Service.EnableNotifyMail = mail
  87. }()
  88. WithDisabledFeatures(t, setting.UserFeatureDeletion, setting.UserFeatureManageCredentials)
  89. session := loginUser(t, "user2")
  90. req := NewRequest(t, "GET", "/user/settings/account")
  91. session.MakeRequest(t, req, http.StatusNotFound)
  92. })
  93. }
  94. func TestUserSettingsUpdatePassword(t *testing.T) {
  95. defer tests.PrepareTestEnv(t)()
  96. t.Run("enabled", func(t *testing.T) {
  97. defer tests.PrintCurrentTest(t)()
  98. session := loginUser(t, "user2")
  99. req := NewRequest(t, "GET", "/user/settings/account")
  100. resp := session.MakeRequest(t, req, http.StatusOK)
  101. doc := NewHTMLParser(t, resp.Body)
  102. req = NewRequestWithValues(t, "POST", "/user/settings/account", map[string]string{
  103. "_csrf": doc.GetCSRF(),
  104. "old_password": "password",
  105. "password": "password",
  106. "retype": "password",
  107. })
  108. session.MakeRequest(t, req, http.StatusSeeOther)
  109. })
  110. t.Run("credentials disabled", func(t *testing.T) {
  111. defer tests.PrintCurrentTest(t)()
  112. WithDisabledFeatures(t, setting.UserFeatureManageCredentials)
  113. session := loginUser(t, "user2")
  114. req := NewRequest(t, "GET", "/user/settings/account")
  115. resp := session.MakeRequest(t, req, http.StatusOK)
  116. doc := NewHTMLParser(t, resp.Body)
  117. req = NewRequestWithValues(t, "POST", "/user/settings/account", map[string]string{
  118. "_csrf": doc.GetCSRF(),
  119. })
  120. session.MakeRequest(t, req, http.StatusNotFound)
  121. })
  122. }
  123. func TestUserSettingsUpdateEmail(t *testing.T) {
  124. defer tests.PrepareTestEnv(t)()
  125. t.Run("credentials disabled", func(t *testing.T) {
  126. defer tests.PrintCurrentTest(t)()
  127. WithDisabledFeatures(t, setting.UserFeatureManageCredentials)
  128. session := loginUser(t, "user2")
  129. req := NewRequest(t, "GET", "/user/settings/account")
  130. resp := session.MakeRequest(t, req, http.StatusOK)
  131. doc := NewHTMLParser(t, resp.Body)
  132. req = NewRequestWithValues(t, "POST", "/user/settings/account/email", map[string]string{
  133. "_csrf": doc.GetCSRF(),
  134. })
  135. session.MakeRequest(t, req, http.StatusNotFound)
  136. })
  137. }
  138. func TestUserSettingsDeleteEmail(t *testing.T) {
  139. defer tests.PrepareTestEnv(t)()
  140. t.Run("credentials disabled", func(t *testing.T) {
  141. defer tests.PrintCurrentTest(t)()
  142. WithDisabledFeatures(t, setting.UserFeatureManageCredentials)
  143. session := loginUser(t, "user2")
  144. req := NewRequest(t, "GET", "/user/settings/account")
  145. resp := session.MakeRequest(t, req, http.StatusOK)
  146. doc := NewHTMLParser(t, resp.Body)
  147. req = NewRequestWithValues(t, "POST", "/user/settings/account/email/delete", map[string]string{
  148. "_csrf": doc.GetCSRF(),
  149. })
  150. session.MakeRequest(t, req, http.StatusNotFound)
  151. })
  152. }
  153. func TestUserSettingsDelete(t *testing.T) {
  154. defer tests.PrepareTestEnv(t)()
  155. t.Run("deletion disabled", func(t *testing.T) {
  156. defer tests.PrintCurrentTest(t)()
  157. WithDisabledFeatures(t, setting.UserFeatureDeletion)
  158. session := loginUser(t, "user2")
  159. req := NewRequest(t, "GET", "/user/settings/account")
  160. resp := session.MakeRequest(t, req, http.StatusOK)
  161. doc := NewHTMLParser(t, resp.Body)
  162. req = NewRequestWithValues(t, "POST", "/user/settings/account/delete", map[string]string{
  163. "_csrf": doc.GetCSRF(),
  164. })
  165. session.MakeRequest(t, req, http.StatusNotFound)
  166. })
  167. }
  168. func TestUserSettingsAppearance(t *testing.T) {
  169. defer tests.PrepareTestEnv(t)()
  170. session := loginUser(t, "user2")
  171. req := NewRequest(t, "GET", "/user/settings/appearance")
  172. resp := session.MakeRequest(t, req, http.StatusOK)
  173. doc := NewHTMLParser(t, resp.Body)
  174. assertNavbar(t, doc)
  175. }
  176. func TestUserSettingsSecurity(t *testing.T) {
  177. defer tests.PrepareTestEnv(t)()
  178. t.Run("credentials disabled", func(t *testing.T) {
  179. defer tests.PrintCurrentTest(t)()
  180. WithDisabledFeatures(t, setting.UserFeatureManageCredentials)
  181. session := loginUser(t, "user2")
  182. req := NewRequest(t, "GET", "/user/settings/security")
  183. resp := session.MakeRequest(t, req, http.StatusOK)
  184. doc := NewHTMLParser(t, resp.Body)
  185. assertNavbar(t, doc)
  186. AssertHTMLElement(t, doc, "#register-webauthn", true)
  187. })
  188. t.Run("mfa disabled", func(t *testing.T) {
  189. defer tests.PrintCurrentTest(t)()
  190. WithDisabledFeatures(t, setting.UserFeatureManageMFA)
  191. session := loginUser(t, "user2")
  192. req := NewRequest(t, "GET", "/user/settings/security")
  193. resp := session.MakeRequest(t, req, http.StatusOK)
  194. doc := NewHTMLParser(t, resp.Body)
  195. assertNavbar(t, doc)
  196. AssertHTMLElement(t, doc, "#register-webauthn", false)
  197. })
  198. t.Run("credentials and mfa disabled", func(t *testing.T) {
  199. defer tests.PrintCurrentTest(t)()
  200. WithDisabledFeatures(t, setting.UserFeatureManageCredentials, setting.UserFeatureManageMFA)
  201. session := loginUser(t, "user2")
  202. req := NewRequest(t, "GET", "/user/settings/security")
  203. session.MakeRequest(t, req, http.StatusNotFound)
  204. })
  205. }
  206. func TestUserSettingsApplications(t *testing.T) {
  207. defer tests.PrepareTestEnv(t)()
  208. t.Run("Applications", func(t *testing.T) {
  209. defer tests.PrintCurrentTest(t)()
  210. session := loginUser(t, "user2")
  211. req := NewRequest(t, "GET", "/user/settings/applications")
  212. resp := session.MakeRequest(t, req, http.StatusOK)
  213. doc := NewHTMLParser(t, resp.Body)
  214. assertNavbar(t, doc)
  215. })
  216. t.Run("OAuth2", func(t *testing.T) {
  217. defer tests.PrintCurrentTest(t)()
  218. session := loginUser(t, "user2")
  219. t.Run("OAuth2ApplicationShow", func(t *testing.T) {
  220. defer tests.PrintCurrentTest(t)()
  221. req := NewRequest(t, "GET", "/user/settings/applications/oauth2/2")
  222. resp := session.MakeRequest(t, req, http.StatusOK)
  223. doc := NewHTMLParser(t, resp.Body)
  224. assertNavbar(t, doc)
  225. })
  226. t.Run("OAuthApplicationsEdit", func(t *testing.T) {
  227. defer tests.PrintCurrentTest(t)()
  228. req := NewRequest(t, "GET", "/user/settings/applications/oauth2/2")
  229. resp := session.MakeRequest(t, req, http.StatusOK)
  230. doc := NewHTMLParser(t, resp.Body)
  231. t.Run("Invalid URL", func(t *testing.T) {
  232. defer tests.PrintCurrentTest(t)()
  233. req := NewRequestWithValues(t, "POST", "/user/settings/applications/oauth2/2", map[string]string{
  234. "_csrf": doc.GetCSRF(),
  235. "application_name": "Test native app",
  236. "redirect_uris": "ftp://127.0.0.1",
  237. "confidential_client": "false",
  238. })
  239. resp := session.MakeRequest(t, req, http.StatusOK)
  240. doc := NewHTMLParser(t, resp.Body)
  241. msg := doc.Find(".flash-error p").Text()
  242. assert.Equal(t, `form.RedirectURIs"ftp://127.0.0.1" is not a valid URL.`, msg)
  243. })
  244. t.Run("OK", func(t *testing.T) {
  245. defer tests.PrintCurrentTest(t)()
  246. req := NewRequestWithValues(t, "POST", "/user/settings/applications/oauth2/2", map[string]string{
  247. "_csrf": doc.GetCSRF(),
  248. "application_name": "Test native app",
  249. "redirect_uris": "http://127.0.0.1",
  250. "confidential_client": "false",
  251. })
  252. session.MakeRequest(t, req, http.StatusSeeOther)
  253. })
  254. })
  255. })
  256. }
  257. func TestUserSettingsKeys(t *testing.T) {
  258. defer tests.PrepareTestEnv(t)()
  259. t.Run("all enabled", func(t *testing.T) {
  260. defer tests.PrintCurrentTest(t)()
  261. session := loginUser(t, "user2")
  262. req := NewRequest(t, "GET", "/user/settings/keys")
  263. resp := session.MakeRequest(t, req, http.StatusOK)
  264. doc := NewHTMLParser(t, resp.Body)
  265. assertNavbar(t, doc)
  266. AssertHTMLElement(t, doc, "#add-ssh-button", true)
  267. AssertHTMLElement(t, doc, "#add-gpg-key-panel", true)
  268. })
  269. t.Run("ssh keys disabled", func(t *testing.T) {
  270. defer tests.PrintCurrentTest(t)()
  271. WithDisabledFeatures(t, setting.UserFeatureManageSSHKeys)
  272. session := loginUser(t, "user2")
  273. req := NewRequest(t, "GET", "/user/settings/keys")
  274. resp := session.MakeRequest(t, req, http.StatusOK)
  275. doc := NewHTMLParser(t, resp.Body)
  276. assertNavbar(t, doc)
  277. AssertHTMLElement(t, doc, "#add-ssh-button", false)
  278. AssertHTMLElement(t, doc, "#add-gpg-key-panel", true)
  279. })
  280. t.Run("gpg keys disabled", func(t *testing.T) {
  281. defer tests.PrintCurrentTest(t)()
  282. WithDisabledFeatures(t, setting.UserFeatureManageGPGKeys)
  283. session := loginUser(t, "user2")
  284. req := NewRequest(t, "GET", "/user/settings/keys")
  285. resp := session.MakeRequest(t, req, http.StatusOK)
  286. doc := NewHTMLParser(t, resp.Body)
  287. assertNavbar(t, doc)
  288. AssertHTMLElement(t, doc, "#add-ssh-button", true)
  289. AssertHTMLElement(t, doc, "#add-gpg-key-panel", false)
  290. })
  291. t.Run("ssh & gpg keys disabled", func(t *testing.T) {
  292. defer tests.PrintCurrentTest(t)()
  293. WithDisabledFeatures(t, setting.UserFeatureManageSSHKeys, setting.UserFeatureManageGPGKeys)
  294. session := loginUser(t, "user2")
  295. req := NewRequest(t, "GET", "/user/settings/keys")
  296. _ = session.MakeRequest(t, req, http.StatusNotFound)
  297. })
  298. }
  299. func TestUserSettingsSecrets(t *testing.T) {
  300. defer tests.PrepareTestEnv(t)()
  301. session := loginUser(t, "user2")
  302. req := NewRequest(t, "GET", "/user/settings/actions/secrets")
  303. if setting.Actions.Enabled {
  304. resp := session.MakeRequest(t, req, http.StatusOK)
  305. doc := NewHTMLParser(t, resp.Body)
  306. assertNavbar(t, doc)
  307. } else {
  308. session.MakeRequest(t, req, http.StatusNotFound)
  309. }
  310. }
  311. func TestUserSettingsPackages(t *testing.T) {
  312. defer tests.PrepareTestEnv(t)()
  313. session := loginUser(t, "user2")
  314. req := NewRequest(t, "GET", "/user/settings/packages")
  315. resp := session.MakeRequest(t, req, http.StatusOK)
  316. doc := NewHTMLParser(t, resp.Body)
  317. assertNavbar(t, doc)
  318. }
  319. func TestUserSettingsPackagesRulesAdd(t *testing.T) {
  320. defer tests.PrepareTestEnv(t)()
  321. session := loginUser(t, "user2")
  322. req := NewRequest(t, "GET", "/user/settings/packages/rules/add")
  323. resp := session.MakeRequest(t, req, http.StatusOK)
  324. doc := NewHTMLParser(t, resp.Body)
  325. assertNavbar(t, doc)
  326. }
  327. func TestUserSettingsOrganization(t *testing.T) {
  328. defer tests.PrepareTestEnv(t)()
  329. session := loginUser(t, "user2")
  330. req := NewRequest(t, "GET", "/user/settings/organization")
  331. resp := session.MakeRequest(t, req, http.StatusOK)
  332. doc := NewHTMLParser(t, resp.Body)
  333. assertNavbar(t, doc)
  334. }
  335. func TestUserSettingsRepos(t *testing.T) {
  336. defer tests.PrepareTestEnv(t)()
  337. session := loginUser(t, "user2")
  338. req := NewRequest(t, "GET", "/user/settings/repos")
  339. resp := session.MakeRequest(t, req, http.StatusOK)
  340. doc := NewHTMLParser(t, resp.Body)
  341. assertNavbar(t, doc)
  342. }
  343. func TestUserSettingsBlockedUsers(t *testing.T) {
  344. defer tests.PrepareTestEnv(t)()
  345. session := loginUser(t, "user2")
  346. req := NewRequest(t, "GET", "/user/settings/blocked_users")
  347. resp := session.MakeRequest(t, req, http.StatusOK)
  348. doc := NewHTMLParser(t, resp.Body)
  349. assertNavbar(t, doc)
  350. }