mirror of
https://github.com/go-gitea/gitea.git
synced 2025-04-08 17:05:45 +02:00
Backport #34024 since there are too many AI crawlers. The new code is covered by tests and it does nothing if users don't set it.
192 lines
6.7 KiB
Go
192 lines
6.7 KiB
Go
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package integration
|
|
|
|
import (
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
"testing"
|
|
|
|
"code.gitea.io/gitea/models/unittest"
|
|
user_model "code.gitea.io/gitea/models/user"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
"code.gitea.io/gitea/modules/test"
|
|
"code.gitea.io/gitea/modules/translation"
|
|
"code.gitea.io/gitea/modules/web"
|
|
"code.gitea.io/gitea/routers"
|
|
"code.gitea.io/gitea/services/context"
|
|
"code.gitea.io/gitea/tests"
|
|
|
|
"github.com/markbates/goth"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func testLoginFailed(t *testing.T, username, password, message string) {
|
|
session := emptyTestSession(t)
|
|
req := NewRequestWithValues(t, "POST", "/user/login", map[string]string{
|
|
"user_name": username,
|
|
"password": password,
|
|
})
|
|
resp := session.MakeRequest(t, req, http.StatusOK)
|
|
|
|
htmlDoc := NewHTMLParser(t, resp.Body)
|
|
resultMsg := htmlDoc.doc.Find(".ui.message>p").Text()
|
|
|
|
assert.EqualValues(t, message, resultMsg)
|
|
}
|
|
|
|
func TestSignin(t *testing.T) {
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
|
|
|
// add new user with user2's email
|
|
user.Name = "testuser"
|
|
user.LowerName = strings.ToLower(user.Name)
|
|
user.ID = 0
|
|
unittest.AssertSuccessfulInsert(t, user)
|
|
|
|
samples := []struct {
|
|
username string
|
|
password string
|
|
message string
|
|
}{
|
|
{username: "wrongUsername", password: "wrongPassword", message: translation.NewLocale("en-US").TrString("form.username_password_incorrect")},
|
|
{username: "wrongUsername", password: "password", message: translation.NewLocale("en-US").TrString("form.username_password_incorrect")},
|
|
{username: "user15", password: "wrongPassword", message: translation.NewLocale("en-US").TrString("form.username_password_incorrect")},
|
|
{username: "user1@example.com", password: "wrongPassword", message: translation.NewLocale("en-US").TrString("form.username_password_incorrect")},
|
|
}
|
|
|
|
for _, s := range samples {
|
|
testLoginFailed(t, s.username, s.password, s.message)
|
|
}
|
|
}
|
|
|
|
func TestSigninWithRememberMe(t *testing.T) {
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
|
baseURL, _ := url.Parse(setting.AppURL)
|
|
|
|
session := emptyTestSession(t)
|
|
req := NewRequestWithValues(t, "POST", "/user/login", map[string]string{
|
|
"user_name": user.Name,
|
|
"password": userPassword,
|
|
"remember": "on",
|
|
})
|
|
session.MakeRequest(t, req, http.StatusSeeOther)
|
|
|
|
c := session.GetCookie(setting.CookieRememberName)
|
|
assert.NotNil(t, c)
|
|
|
|
session = emptyTestSession(t)
|
|
|
|
// Without session the settings page should not be reachable
|
|
req = NewRequest(t, "GET", "/user/settings")
|
|
session.MakeRequest(t, req, http.StatusSeeOther)
|
|
|
|
req = NewRequest(t, "GET", "/user/login")
|
|
// Set the remember me cookie for the login GET request
|
|
session.jar.SetCookies(baseURL, []*http.Cookie{c})
|
|
session.MakeRequest(t, req, http.StatusSeeOther)
|
|
|
|
// With session the settings page should be reachable
|
|
req = NewRequest(t, "GET", "/user/settings")
|
|
session.MakeRequest(t, req, http.StatusOK)
|
|
}
|
|
|
|
func TestEnablePasswordSignInFormAndEnablePasskeyAuth(t *testing.T) {
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
mockLinkAccount := func(ctx *context.Context) {
|
|
gothUser := goth.User{Email: "invalid-email", Name: "."}
|
|
_ = ctx.Session.Set("linkAccountGothUser", gothUser)
|
|
}
|
|
|
|
t.Run("EnablePasswordSignInForm=false", func(t *testing.T) {
|
|
defer tests.PrintCurrentTest(t)()
|
|
defer test.MockVariableValue(&setting.Service.EnablePasswordSignInForm, false)()
|
|
|
|
req := NewRequest(t, "GET", "/user/login")
|
|
resp := MakeRequest(t, req, http.StatusOK)
|
|
NewHTMLParser(t, resp.Body).AssertElement(t, "form[action='/user/login']", false)
|
|
|
|
req = NewRequest(t, "POST", "/user/login")
|
|
MakeRequest(t, req, http.StatusForbidden)
|
|
|
|
req = NewRequest(t, "GET", "/user/link_account")
|
|
defer web.RouteMockReset()
|
|
web.RouteMock(web.MockAfterMiddlewares, mockLinkAccount)
|
|
resp = MakeRequest(t, req, http.StatusOK)
|
|
NewHTMLParser(t, resp.Body).AssertElement(t, "form[action='/user/link_account_signin']", false)
|
|
})
|
|
|
|
t.Run("EnablePasswordSignInForm=true", func(t *testing.T) {
|
|
defer tests.PrintCurrentTest(t)()
|
|
defer test.MockVariableValue(&setting.Service.EnablePasswordSignInForm, true)()
|
|
|
|
req := NewRequest(t, "GET", "/user/login")
|
|
resp := MakeRequest(t, req, http.StatusOK)
|
|
NewHTMLParser(t, resp.Body).AssertElement(t, "form[action='/user/login']", true)
|
|
|
|
req = NewRequest(t, "POST", "/user/login")
|
|
MakeRequest(t, req, http.StatusOK)
|
|
|
|
req = NewRequest(t, "GET", "/user/link_account")
|
|
defer web.RouteMockReset()
|
|
web.RouteMock(web.MockAfterMiddlewares, mockLinkAccount)
|
|
resp = MakeRequest(t, req, http.StatusOK)
|
|
NewHTMLParser(t, resp.Body).AssertElement(t, "form[action='/user/link_account_signin']", true)
|
|
})
|
|
|
|
t.Run("EnablePasskeyAuth=false", func(t *testing.T) {
|
|
defer tests.PrintCurrentTest(t)()
|
|
defer test.MockVariableValue(&setting.Service.EnablePasskeyAuth, false)()
|
|
|
|
req := NewRequest(t, "GET", "/user/login")
|
|
resp := MakeRequest(t, req, http.StatusOK)
|
|
NewHTMLParser(t, resp.Body).AssertElement(t, ".signin-passkey", false)
|
|
})
|
|
|
|
t.Run("EnablePasskeyAuth=true", func(t *testing.T) {
|
|
defer tests.PrintCurrentTest(t)()
|
|
defer test.MockVariableValue(&setting.Service.EnablePasskeyAuth, true)()
|
|
|
|
req := NewRequest(t, "GET", "/user/login")
|
|
resp := MakeRequest(t, req, http.StatusOK)
|
|
NewHTMLParser(t, resp.Body).AssertElement(t, ".signin-passkey", true)
|
|
})
|
|
}
|
|
|
|
func TestRequireSignInView(t *testing.T) {
|
|
defer tests.PrepareTestEnv(t)()
|
|
t.Run("NoRequireSignInView", func(t *testing.T) {
|
|
require.False(t, setting.Service.RequireSignInViewStrict)
|
|
require.False(t, setting.Service.BlockAnonymousAccessExpensive)
|
|
req := NewRequest(t, "GET", "/user2/repo1/src/branch/master")
|
|
MakeRequest(t, req, http.StatusOK)
|
|
})
|
|
t.Run("RequireSignInView", func(t *testing.T) {
|
|
defer test.MockVariableValue(&setting.Service.RequireSignInViewStrict, true)()
|
|
defer test.MockVariableValue(&testWebRoutes, routers.NormalRoutes())()
|
|
req := NewRequest(t, "GET", "/user2/repo1/src/branch/master")
|
|
resp := MakeRequest(t, req, http.StatusSeeOther)
|
|
assert.Equal(t, "/user/login", resp.Header().Get("Location"))
|
|
})
|
|
t.Run("BlockAnonymousAccessExpensive", func(t *testing.T) {
|
|
defer test.MockVariableValue(&setting.Service.RequireSignInViewStrict, false)()
|
|
defer test.MockVariableValue(&setting.Service.BlockAnonymousAccessExpensive, true)()
|
|
defer test.MockVariableValue(&testWebRoutes, routers.NormalRoutes())()
|
|
|
|
req := NewRequest(t, "GET", "/user2/repo1")
|
|
MakeRequest(t, req, http.StatusOK)
|
|
|
|
req = NewRequest(t, "GET", "/user2/repo1/src/branch/master")
|
|
resp := MakeRequest(t, req, http.StatusSeeOther)
|
|
assert.Equal(t, "/user/login", resp.Header().Get("Location"))
|
|
})
|
|
}
|