gitea源码

integration_test.go 13KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455
  1. // Copyright 2017 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. //nolint:forbidigo // use of print functions is allowed in tests
  4. package integration
  5. import (
  6. "bytes"
  7. "context"
  8. "fmt"
  9. "hash"
  10. "hash/fnv"
  11. "io"
  12. "net/http"
  13. "net/http/cookiejar"
  14. "net/http/httptest"
  15. "net/url"
  16. "os"
  17. "path/filepath"
  18. "strings"
  19. "sync/atomic"
  20. "testing"
  21. "code.gitea.io/gitea/models/auth"
  22. "code.gitea.io/gitea/models/unittest"
  23. "code.gitea.io/gitea/modules/graceful"
  24. "code.gitea.io/gitea/modules/json"
  25. "code.gitea.io/gitea/modules/log"
  26. "code.gitea.io/gitea/modules/setting"
  27. "code.gitea.io/gitea/modules/util"
  28. "code.gitea.io/gitea/modules/web"
  29. "code.gitea.io/gitea/modules/web/middleware"
  30. "code.gitea.io/gitea/routers"
  31. gitea_context "code.gitea.io/gitea/services/context"
  32. "code.gitea.io/gitea/tests"
  33. "github.com/PuerkitoBio/goquery"
  34. "github.com/stretchr/testify/assert"
  35. "github.com/stretchr/testify/require"
  36. "github.com/xeipuuv/gojsonschema"
  37. )
  38. var testWebRoutes *web.Router
  39. type NilResponseRecorder struct {
  40. httptest.ResponseRecorder
  41. Length int
  42. }
  43. func (n *NilResponseRecorder) Write(b []byte) (int, error) {
  44. n.Length += len(b)
  45. return len(b), nil
  46. }
  47. // NewRecorder returns an initialized ResponseRecorder.
  48. func NewNilResponseRecorder() *NilResponseRecorder {
  49. return &NilResponseRecorder{
  50. ResponseRecorder: *httptest.NewRecorder(),
  51. }
  52. }
  53. type NilResponseHashSumRecorder struct {
  54. httptest.ResponseRecorder
  55. Hash hash.Hash
  56. Length int
  57. }
  58. func (n *NilResponseHashSumRecorder) Write(b []byte) (int, error) {
  59. _, _ = n.Hash.Write(b)
  60. n.Length += len(b)
  61. return len(b), nil
  62. }
  63. // NewRecorder returns an initialized ResponseRecorder.
  64. func NewNilResponseHashSumRecorder() *NilResponseHashSumRecorder {
  65. return &NilResponseHashSumRecorder{
  66. Hash: fnv.New32(),
  67. ResponseRecorder: *httptest.NewRecorder(),
  68. }
  69. }
  70. func TestMain(m *testing.M) {
  71. defer log.GetManager().Close()
  72. managerCtx, cancel := context.WithCancel(context.Background())
  73. graceful.InitManager(managerCtx)
  74. defer cancel()
  75. tests.InitTest(true)
  76. testWebRoutes = routers.NormalRoutes()
  77. err := unittest.InitFixtures(
  78. unittest.FixturesOptions{
  79. Dir: filepath.Join(filepath.Dir(setting.AppPath), "models/fixtures/"),
  80. },
  81. )
  82. if err != nil {
  83. fmt.Printf("Error initializing test database: %v\n", err)
  84. os.Exit(1)
  85. }
  86. // FIXME: the console logger is deleted by mistake, so if there is any `log.Fatal`, developers won't see any error message.
  87. // Instead, "No tests were found", last nonsense log is "According to the configuration, subsequent logs will not be printed to the console"
  88. exitCode := m.Run()
  89. if err = util.RemoveAll(setting.Indexer.IssuePath); err != nil {
  90. fmt.Printf("util.RemoveAll: %v\n", err)
  91. os.Exit(1)
  92. }
  93. if err = util.RemoveAll(setting.Indexer.RepoPath); err != nil {
  94. fmt.Printf("Unable to remove repo indexer: %v\n", err)
  95. os.Exit(1)
  96. }
  97. os.Exit(exitCode)
  98. }
  99. type TestSession struct {
  100. jar http.CookieJar
  101. }
  102. func (s *TestSession) GetRawCookie(name string) *http.Cookie {
  103. baseURL, err := url.Parse(setting.AppURL)
  104. if err != nil {
  105. return nil
  106. }
  107. for _, c := range s.jar.Cookies(baseURL) {
  108. if c.Name == name {
  109. return c
  110. }
  111. }
  112. return nil
  113. }
  114. func (s *TestSession) GetSiteCookie(name string) string {
  115. c := s.GetRawCookie(name)
  116. if c != nil {
  117. v, _ := url.QueryUnescape(c.Value)
  118. return v
  119. }
  120. return ""
  121. }
  122. func (s *TestSession) GetCookieFlashMessage() *middleware.Flash {
  123. cookie := s.GetSiteCookie(gitea_context.CookieNameFlash)
  124. return middleware.ParseCookieFlashMessage(cookie)
  125. }
  126. func (s *TestSession) MakeRequest(t testing.TB, rw *RequestWrapper, expectedStatus int) *httptest.ResponseRecorder {
  127. t.Helper()
  128. if s == nil {
  129. return MakeRequest(t, rw, expectedStatus)
  130. }
  131. req := rw.Request
  132. baseURL, err := url.Parse(setting.AppURL)
  133. assert.NoError(t, err)
  134. for _, c := range s.jar.Cookies(baseURL) {
  135. req.AddCookie(c)
  136. }
  137. resp := MakeRequest(t, rw, expectedStatus)
  138. ch := http.Header{}
  139. ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
  140. cr := http.Request{Header: ch}
  141. s.jar.SetCookies(baseURL, cr.Cookies())
  142. return resp
  143. }
  144. func (s *TestSession) MakeRequestNilResponseRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseRecorder {
  145. t.Helper()
  146. req := rw.Request
  147. baseURL, err := url.Parse(setting.AppURL)
  148. assert.NoError(t, err)
  149. for _, c := range s.jar.Cookies(baseURL) {
  150. req.AddCookie(c)
  151. }
  152. resp := MakeRequestNilResponseRecorder(t, rw, expectedStatus)
  153. ch := http.Header{}
  154. ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
  155. cr := http.Request{Header: ch}
  156. s.jar.SetCookies(baseURL, cr.Cookies())
  157. return resp
  158. }
  159. func (s *TestSession) MakeRequestNilResponseHashSumRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseHashSumRecorder {
  160. t.Helper()
  161. req := rw.Request
  162. baseURL, err := url.Parse(setting.AppURL)
  163. assert.NoError(t, err)
  164. for _, c := range s.jar.Cookies(baseURL) {
  165. req.AddCookie(c)
  166. }
  167. resp := MakeRequestNilResponseHashSumRecorder(t, rw, expectedStatus)
  168. ch := http.Header{}
  169. ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
  170. cr := http.Request{Header: ch}
  171. s.jar.SetCookies(baseURL, cr.Cookies())
  172. return resp
  173. }
  174. const userPassword = "password"
  175. func emptyTestSession(t testing.TB) *TestSession {
  176. t.Helper()
  177. jar, err := cookiejar.New(nil)
  178. assert.NoError(t, err)
  179. return &TestSession{jar: jar}
  180. }
  181. func getUserToken(t testing.TB, userName string, scope ...auth.AccessTokenScope) string {
  182. return getTokenForLoggedInUser(t, loginUser(t, userName), scope...)
  183. }
  184. func loginUser(t testing.TB, userName string) *TestSession {
  185. t.Helper()
  186. return loginUserWithPassword(t, userName, userPassword)
  187. }
  188. func loginUserWithPassword(t testing.TB, userName, password string) *TestSession {
  189. t.Helper()
  190. req := NewRequest(t, "GET", "/user/login")
  191. resp := MakeRequest(t, req, http.StatusOK)
  192. doc := NewHTMLParser(t, resp.Body)
  193. req = NewRequestWithValues(t, "POST", "/user/login", map[string]string{
  194. "_csrf": doc.GetCSRF(),
  195. "user_name": userName,
  196. "password": password,
  197. })
  198. resp = MakeRequest(t, req, http.StatusSeeOther)
  199. ch := http.Header{}
  200. ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
  201. cr := http.Request{Header: ch}
  202. session := emptyTestSession(t)
  203. baseURL, err := url.Parse(setting.AppURL)
  204. assert.NoError(t, err)
  205. session.jar.SetCookies(baseURL, cr.Cookies())
  206. return session
  207. }
  208. // token has to be unique this counter take care of
  209. var tokenCounter int64
  210. // getTokenForLoggedInUser returns a token for a logged-in user.
  211. func getTokenForLoggedInUser(t testing.TB, session *TestSession, scopes ...auth.AccessTokenScope) string {
  212. t.Helper()
  213. urlValues := url.Values{}
  214. urlValues.Add("_csrf", GetUserCSRFToken(t, session))
  215. urlValues.Add("name", fmt.Sprintf("api-testing-token-%d", atomic.AddInt64(&tokenCounter, 1)))
  216. for _, scope := range scopes {
  217. urlValues.Add("scope-dummy", string(scope)) // it only needs to start with "scope-" to be accepted
  218. }
  219. req := NewRequestWithURLValues(t, "POST", "/user/settings/applications", urlValues)
  220. session.MakeRequest(t, req, http.StatusSeeOther)
  221. flashes := session.GetCookieFlashMessage()
  222. return flashes.InfoMsg
  223. }
  224. type RequestWrapper struct {
  225. *http.Request
  226. }
  227. func (req *RequestWrapper) AddBasicAuth(username string) *RequestWrapper {
  228. req.Request.SetBasicAuth(username, userPassword)
  229. return req
  230. }
  231. func (req *RequestWrapper) AddTokenAuth(token string) *RequestWrapper {
  232. if token == "" {
  233. return req
  234. }
  235. if !strings.HasPrefix(token, "Bearer ") {
  236. token = "Bearer " + token
  237. }
  238. req.Request.Header.Set("Authorization", token)
  239. return req
  240. }
  241. func (req *RequestWrapper) SetHeader(name, value string) *RequestWrapper {
  242. req.Request.Header.Set(name, value)
  243. return req
  244. }
  245. func NewRequest(t testing.TB, method, urlStr string) *RequestWrapper {
  246. t.Helper()
  247. return NewRequestWithBody(t, method, urlStr, nil)
  248. }
  249. func NewRequestf(t testing.TB, method, urlFormat string, args ...any) *RequestWrapper {
  250. t.Helper()
  251. return NewRequest(t, method, fmt.Sprintf(urlFormat, args...))
  252. }
  253. func NewRequestWithValues(t testing.TB, method, urlStr string, values map[string]string) *RequestWrapper {
  254. t.Helper()
  255. urlValues := url.Values{}
  256. for key, value := range values {
  257. urlValues[key] = []string{value}
  258. }
  259. return NewRequestWithURLValues(t, method, urlStr, urlValues)
  260. }
  261. func NewRequestWithURLValues(t testing.TB, method, urlStr string, urlValues url.Values) *RequestWrapper {
  262. t.Helper()
  263. return NewRequestWithBody(t, method, urlStr, strings.NewReader(urlValues.Encode())).
  264. SetHeader("Content-Type", "application/x-www-form-urlencoded")
  265. }
  266. func NewRequestWithJSON(t testing.TB, method, urlStr string, v any) *RequestWrapper {
  267. t.Helper()
  268. jsonBytes, err := json.Marshal(v)
  269. assert.NoError(t, err)
  270. return NewRequestWithBody(t, method, urlStr, bytes.NewBuffer(jsonBytes)).
  271. SetHeader("Content-Type", "application/json")
  272. }
  273. func NewRequestWithBody(t testing.TB, method, urlStr string, body io.Reader) *RequestWrapper {
  274. t.Helper()
  275. if !strings.HasPrefix(urlStr, "http") && !strings.HasPrefix(urlStr, "/") {
  276. urlStr = "/" + urlStr
  277. }
  278. req, err := http.NewRequest(method, urlStr, body)
  279. assert.NoError(t, err)
  280. req.RequestURI = urlStr
  281. return &RequestWrapper{req}
  282. }
  283. const NoExpectedStatus = -1
  284. func MakeRequest(t testing.TB, rw *RequestWrapper, expectedStatus int) *httptest.ResponseRecorder {
  285. t.Helper()
  286. req := rw.Request
  287. recorder := httptest.NewRecorder()
  288. if req.RemoteAddr == "" {
  289. req.RemoteAddr = "test-mock:12345"
  290. }
  291. testWebRoutes.ServeHTTP(recorder, req)
  292. if expectedStatus != NoExpectedStatus {
  293. if expectedStatus != recorder.Code {
  294. logUnexpectedResponse(t, recorder)
  295. require.Equal(t, expectedStatus, recorder.Code, "Request: %s %s", req.Method, req.URL.String())
  296. }
  297. }
  298. return recorder
  299. }
  300. func MakeRequestNilResponseRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseRecorder {
  301. t.Helper()
  302. req := rw.Request
  303. recorder := NewNilResponseRecorder()
  304. testWebRoutes.ServeHTTP(recorder, req)
  305. if expectedStatus != NoExpectedStatus {
  306. if !assert.Equal(t, expectedStatus, recorder.Code,
  307. "Request: %s %s", req.Method, req.URL.String()) {
  308. logUnexpectedResponse(t, &recorder.ResponseRecorder)
  309. }
  310. }
  311. return recorder
  312. }
  313. func MakeRequestNilResponseHashSumRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseHashSumRecorder {
  314. t.Helper()
  315. req := rw.Request
  316. recorder := NewNilResponseHashSumRecorder()
  317. testWebRoutes.ServeHTTP(recorder, req)
  318. if expectedStatus != NoExpectedStatus {
  319. if !assert.Equal(t, expectedStatus, recorder.Code,
  320. "Request: %s %s", req.Method, req.URL.String()) {
  321. logUnexpectedResponse(t, &recorder.ResponseRecorder)
  322. }
  323. }
  324. return recorder
  325. }
  326. // logUnexpectedResponse logs the contents of an unexpected response.
  327. func logUnexpectedResponse(t testing.TB, recorder *httptest.ResponseRecorder) {
  328. t.Helper()
  329. respBytes := recorder.Body.Bytes()
  330. if len(respBytes) == 0 {
  331. return
  332. } else if len(respBytes) < 500 {
  333. // if body is short, just log the whole thing
  334. t.Log("Response: ", string(respBytes))
  335. return
  336. }
  337. t.Log("Response length: ", len(respBytes))
  338. // log the "flash" error message, if one exists
  339. // we must create a new buffer, so that we don't "use up" resp.Body
  340. htmlDoc, err := goquery.NewDocumentFromReader(bytes.NewBuffer(respBytes))
  341. if err != nil {
  342. return // probably a non-HTML response
  343. }
  344. errMsg := htmlDoc.Find(".ui.negative.message").Text()
  345. if len(errMsg) > 0 {
  346. t.Log("A flash error message was found:", errMsg)
  347. }
  348. }
  349. func DecodeJSON(t testing.TB, resp *httptest.ResponseRecorder, v any) {
  350. t.Helper()
  351. decoder := json.NewDecoder(resp.Body)
  352. require.NoError(t, decoder.Decode(v))
  353. }
  354. func VerifyJSONSchema(t testing.TB, resp *httptest.ResponseRecorder, schemaFile string) {
  355. t.Helper()
  356. schemaFilePath := filepath.Join(filepath.Dir(setting.AppPath), "tests", "integration", "schemas", schemaFile)
  357. _, schemaFileErr := os.Stat(schemaFilePath)
  358. assert.NoError(t, schemaFileErr)
  359. schema, schemaFileReadErr := os.ReadFile(schemaFilePath)
  360. assert.NoError(t, schemaFileReadErr)
  361. assert.NotEmpty(t, schema)
  362. nodeinfoSchema := gojsonschema.NewStringLoader(string(schema))
  363. nodeinfoString := gojsonschema.NewStringLoader(resp.Body.String())
  364. result, schemaValidationErr := gojsonschema.Validate(nodeinfoSchema, nodeinfoString)
  365. assert.NoError(t, schemaValidationErr)
  366. assert.Empty(t, result.Errors())
  367. assert.True(t, result.Valid())
  368. }
  369. // GetUserCSRFToken returns CSRF token for current user
  370. func GetUserCSRFToken(t testing.TB, session *TestSession) string {
  371. t.Helper()
  372. cookie := session.GetSiteCookie("_csrf")
  373. require.NotEmpty(t, cookie)
  374. return cookie
  375. }
  376. // GetUserCSRFToken returns CSRF token for anonymous user (not logged in)
  377. func GetAnonymousCSRFToken(t testing.TB, session *TestSession) string {
  378. t.Helper()
  379. resp := session.MakeRequest(t, NewRequest(t, "GET", "/user/login"), http.StatusOK)
  380. csrfToken := NewHTMLParser(t, resp.Body).GetCSRF()
  381. require.NotEmpty(t, csrfToken)
  382. return csrfToken
  383. }