mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-11-04 10:44:12 +01:00 
			
		
		
		
	details: https://pkg.go.dev/encoding/json/v2 --------- Co-authored-by: techknowlogick <matti@mdranta.net> Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>
		
			
				
	
	
		
			456 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			456 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2017 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
//nolint:forbidigo // use of print functions is allowed in tests
 | 
						|
package integration
 | 
						|
 | 
						|
import (
 | 
						|
	"bytes"
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
	"hash"
 | 
						|
	"hash/fnv"
 | 
						|
	"io"
 | 
						|
	"net/http"
 | 
						|
	"net/http/cookiejar"
 | 
						|
	"net/http/httptest"
 | 
						|
	"net/url"
 | 
						|
	"os"
 | 
						|
	"path/filepath"
 | 
						|
	"strings"
 | 
						|
	"sync/atomic"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"code.gitea.io/gitea/models/auth"
 | 
						|
	"code.gitea.io/gitea/models/unittest"
 | 
						|
	"code.gitea.io/gitea/modules/graceful"
 | 
						|
	"code.gitea.io/gitea/modules/json"
 | 
						|
	"code.gitea.io/gitea/modules/log"
 | 
						|
	"code.gitea.io/gitea/modules/setting"
 | 
						|
	"code.gitea.io/gitea/modules/util"
 | 
						|
	"code.gitea.io/gitea/modules/web"
 | 
						|
	"code.gitea.io/gitea/modules/web/middleware"
 | 
						|
	"code.gitea.io/gitea/routers"
 | 
						|
	gitea_context "code.gitea.io/gitea/services/context"
 | 
						|
	"code.gitea.io/gitea/tests"
 | 
						|
 | 
						|
	"github.com/PuerkitoBio/goquery"
 | 
						|
	"github.com/stretchr/testify/assert"
 | 
						|
	"github.com/stretchr/testify/require"
 | 
						|
	"github.com/xeipuuv/gojsonschema"
 | 
						|
)
 | 
						|
 | 
						|
var testWebRoutes *web.Router
 | 
						|
 | 
						|
type NilResponseRecorder struct {
 | 
						|
	httptest.ResponseRecorder
 | 
						|
	Length int
 | 
						|
}
 | 
						|
 | 
						|
func (n *NilResponseRecorder) Write(b []byte) (int, error) {
 | 
						|
	n.Length += len(b)
 | 
						|
	return len(b), nil
 | 
						|
}
 | 
						|
 | 
						|
// NewRecorder returns an initialized ResponseRecorder.
 | 
						|
func NewNilResponseRecorder() *NilResponseRecorder {
 | 
						|
	return &NilResponseRecorder{
 | 
						|
		ResponseRecorder: *httptest.NewRecorder(),
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
type NilResponseHashSumRecorder struct {
 | 
						|
	httptest.ResponseRecorder
 | 
						|
	Hash   hash.Hash
 | 
						|
	Length int
 | 
						|
}
 | 
						|
 | 
						|
func (n *NilResponseHashSumRecorder) Write(b []byte) (int, error) {
 | 
						|
	_, _ = n.Hash.Write(b)
 | 
						|
	n.Length += len(b)
 | 
						|
	return len(b), nil
 | 
						|
}
 | 
						|
 | 
						|
// NewRecorder returns an initialized ResponseRecorder.
 | 
						|
func NewNilResponseHashSumRecorder() *NilResponseHashSumRecorder {
 | 
						|
	return &NilResponseHashSumRecorder{
 | 
						|
		Hash:             fnv.New32(),
 | 
						|
		ResponseRecorder: *httptest.NewRecorder(),
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestMain(m *testing.M) {
 | 
						|
	defer log.GetManager().Close()
 | 
						|
 | 
						|
	managerCtx, cancel := context.WithCancel(context.Background())
 | 
						|
	graceful.InitManager(managerCtx)
 | 
						|
	defer cancel()
 | 
						|
 | 
						|
	tests.InitTest(true)
 | 
						|
	testWebRoutes = routers.NormalRoutes()
 | 
						|
 | 
						|
	err := unittest.InitFixtures(
 | 
						|
		unittest.FixturesOptions{
 | 
						|
			Dir: filepath.Join(filepath.Dir(setting.AppPath), "models/fixtures/"),
 | 
						|
		},
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		fmt.Printf("Error initializing test database: %v\n", err)
 | 
						|
		os.Exit(1)
 | 
						|
	}
 | 
						|
 | 
						|
	// FIXME: the console logger is deleted by mistake, so if there is any `log.Fatal`, developers won't see any error message.
 | 
						|
	// Instead, "No tests were found",  last nonsense log is "According to the configuration, subsequent logs will not be printed to the console"
 | 
						|
	exitCode := m.Run()
 | 
						|
 | 
						|
	if err = util.RemoveAll(setting.Indexer.IssuePath); err != nil {
 | 
						|
		fmt.Printf("util.RemoveAll: %v\n", err)
 | 
						|
		os.Exit(1)
 | 
						|
	}
 | 
						|
	if err = util.RemoveAll(setting.Indexer.RepoPath); err != nil {
 | 
						|
		fmt.Printf("Unable to remove repo indexer: %v\n", err)
 | 
						|
		os.Exit(1)
 | 
						|
	}
 | 
						|
 | 
						|
	os.Exit(exitCode)
 | 
						|
}
 | 
						|
 | 
						|
type TestSession struct {
 | 
						|
	jar http.CookieJar
 | 
						|
}
 | 
						|
 | 
						|
func (s *TestSession) GetRawCookie(name string) *http.Cookie {
 | 
						|
	baseURL, err := url.Parse(setting.AppURL)
 | 
						|
	if err != nil {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	for _, c := range s.jar.Cookies(baseURL) {
 | 
						|
		if c.Name == name {
 | 
						|
			return c
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (s *TestSession) GetSiteCookie(name string) string {
 | 
						|
	c := s.GetRawCookie(name)
 | 
						|
	if c != nil {
 | 
						|
		v, _ := url.QueryUnescape(c.Value)
 | 
						|
		return v
 | 
						|
	}
 | 
						|
	return ""
 | 
						|
}
 | 
						|
 | 
						|
func (s *TestSession) GetCookieFlashMessage() *middleware.Flash {
 | 
						|
	cookie := s.GetSiteCookie(gitea_context.CookieNameFlash)
 | 
						|
	return middleware.ParseCookieFlashMessage(cookie)
 | 
						|
}
 | 
						|
 | 
						|
func (s *TestSession) MakeRequest(t testing.TB, rw *RequestWrapper, expectedStatus int) *httptest.ResponseRecorder {
 | 
						|
	t.Helper()
 | 
						|
	if s == nil {
 | 
						|
		return MakeRequest(t, rw, expectedStatus)
 | 
						|
	}
 | 
						|
	req := rw.Request
 | 
						|
	baseURL, err := url.Parse(setting.AppURL)
 | 
						|
	assert.NoError(t, err)
 | 
						|
	for _, c := range s.jar.Cookies(baseURL) {
 | 
						|
		req.AddCookie(c)
 | 
						|
	}
 | 
						|
	resp := MakeRequest(t, rw, expectedStatus)
 | 
						|
 | 
						|
	ch := http.Header{}
 | 
						|
	ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
 | 
						|
	cr := http.Request{Header: ch}
 | 
						|
	s.jar.SetCookies(baseURL, cr.Cookies())
 | 
						|
 | 
						|
	return resp
 | 
						|
}
 | 
						|
 | 
						|
func (s *TestSession) MakeRequestNilResponseRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseRecorder {
 | 
						|
	t.Helper()
 | 
						|
	req := rw.Request
 | 
						|
	baseURL, err := url.Parse(setting.AppURL)
 | 
						|
	assert.NoError(t, err)
 | 
						|
	for _, c := range s.jar.Cookies(baseURL) {
 | 
						|
		req.AddCookie(c)
 | 
						|
	}
 | 
						|
	resp := MakeRequestNilResponseRecorder(t, rw, expectedStatus)
 | 
						|
 | 
						|
	ch := http.Header{}
 | 
						|
	ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
 | 
						|
	cr := http.Request{Header: ch}
 | 
						|
	s.jar.SetCookies(baseURL, cr.Cookies())
 | 
						|
 | 
						|
	return resp
 | 
						|
}
 | 
						|
 | 
						|
func (s *TestSession) MakeRequestNilResponseHashSumRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseHashSumRecorder {
 | 
						|
	t.Helper()
 | 
						|
	req := rw.Request
 | 
						|
	baseURL, err := url.Parse(setting.AppURL)
 | 
						|
	assert.NoError(t, err)
 | 
						|
	for _, c := range s.jar.Cookies(baseURL) {
 | 
						|
		req.AddCookie(c)
 | 
						|
	}
 | 
						|
	resp := MakeRequestNilResponseHashSumRecorder(t, rw, expectedStatus)
 | 
						|
 | 
						|
	ch := http.Header{}
 | 
						|
	ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
 | 
						|
	cr := http.Request{Header: ch}
 | 
						|
	s.jar.SetCookies(baseURL, cr.Cookies())
 | 
						|
 | 
						|
	return resp
 | 
						|
}
 | 
						|
 | 
						|
const userPassword = "password"
 | 
						|
 | 
						|
func emptyTestSession(t testing.TB) *TestSession {
 | 
						|
	t.Helper()
 | 
						|
	jar, err := cookiejar.New(nil)
 | 
						|
	assert.NoError(t, err)
 | 
						|
 | 
						|
	return &TestSession{jar: jar}
 | 
						|
}
 | 
						|
 | 
						|
func getUserToken(t testing.TB, userName string, scope ...auth.AccessTokenScope) string {
 | 
						|
	return getTokenForLoggedInUser(t, loginUser(t, userName), scope...)
 | 
						|
}
 | 
						|
 | 
						|
func loginUser(t testing.TB, userName string) *TestSession {
 | 
						|
	t.Helper()
 | 
						|
 | 
						|
	return loginUserWithPassword(t, userName, userPassword)
 | 
						|
}
 | 
						|
 | 
						|
func loginUserWithPassword(t testing.TB, userName, password string) *TestSession {
 | 
						|
	t.Helper()
 | 
						|
	req := NewRequest(t, "GET", "/user/login")
 | 
						|
	resp := MakeRequest(t, req, http.StatusOK)
 | 
						|
 | 
						|
	doc := NewHTMLParser(t, resp.Body)
 | 
						|
	req = NewRequestWithValues(t, "POST", "/user/login", map[string]string{
 | 
						|
		"_csrf":     doc.GetCSRF(),
 | 
						|
		"user_name": userName,
 | 
						|
		"password":  password,
 | 
						|
	})
 | 
						|
	resp = MakeRequest(t, req, http.StatusSeeOther)
 | 
						|
 | 
						|
	ch := http.Header{}
 | 
						|
	ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
 | 
						|
	cr := http.Request{Header: ch}
 | 
						|
 | 
						|
	session := emptyTestSession(t)
 | 
						|
 | 
						|
	baseURL, err := url.Parse(setting.AppURL)
 | 
						|
	assert.NoError(t, err)
 | 
						|
	session.jar.SetCookies(baseURL, cr.Cookies())
 | 
						|
 | 
						|
	return session
 | 
						|
}
 | 
						|
 | 
						|
// token has to be unique this counter take care of
 | 
						|
var tokenCounter int64
 | 
						|
 | 
						|
// getTokenForLoggedInUser returns a token for a logged-in user.
 | 
						|
func getTokenForLoggedInUser(t testing.TB, session *TestSession, scopes ...auth.AccessTokenScope) string {
 | 
						|
	t.Helper()
 | 
						|
	urlValues := url.Values{}
 | 
						|
	urlValues.Add("_csrf", GetUserCSRFToken(t, session))
 | 
						|
	urlValues.Add("name", fmt.Sprintf("api-testing-token-%d", atomic.AddInt64(&tokenCounter, 1)))
 | 
						|
	for _, scope := range scopes {
 | 
						|
		urlValues.Add("scope-dummy", string(scope)) // it only needs to start with "scope-" to be accepted
 | 
						|
	}
 | 
						|
	req := NewRequestWithURLValues(t, "POST", "/user/settings/applications", urlValues)
 | 
						|
	session.MakeRequest(t, req, http.StatusSeeOther)
 | 
						|
	flashes := session.GetCookieFlashMessage()
 | 
						|
	return flashes.InfoMsg
 | 
						|
}
 | 
						|
 | 
						|
type RequestWrapper struct {
 | 
						|
	*http.Request
 | 
						|
}
 | 
						|
 | 
						|
func (req *RequestWrapper) AddBasicAuth(username string) *RequestWrapper {
 | 
						|
	req.Request.SetBasicAuth(username, userPassword)
 | 
						|
	return req
 | 
						|
}
 | 
						|
 | 
						|
func (req *RequestWrapper) AddTokenAuth(token string) *RequestWrapper {
 | 
						|
	if token == "" {
 | 
						|
		return req
 | 
						|
	}
 | 
						|
	if !strings.HasPrefix(token, "Bearer ") {
 | 
						|
		token = "Bearer " + token
 | 
						|
	}
 | 
						|
	req.Request.Header.Set("Authorization", token)
 | 
						|
	return req
 | 
						|
}
 | 
						|
 | 
						|
func (req *RequestWrapper) SetHeader(name, value string) *RequestWrapper {
 | 
						|
	req.Request.Header.Set(name, value)
 | 
						|
	return req
 | 
						|
}
 | 
						|
 | 
						|
func NewRequest(t testing.TB, method, urlStr string) *RequestWrapper {
 | 
						|
	t.Helper()
 | 
						|
	return NewRequestWithBody(t, method, urlStr, nil)
 | 
						|
}
 | 
						|
 | 
						|
func NewRequestf(t testing.TB, method, urlFormat string, args ...any) *RequestWrapper {
 | 
						|
	t.Helper()
 | 
						|
	return NewRequest(t, method, fmt.Sprintf(urlFormat, args...))
 | 
						|
}
 | 
						|
 | 
						|
func NewRequestWithValues(t testing.TB, method, urlStr string, values map[string]string) *RequestWrapper {
 | 
						|
	t.Helper()
 | 
						|
	urlValues := url.Values{}
 | 
						|
	for key, value := range values {
 | 
						|
		urlValues[key] = []string{value}
 | 
						|
	}
 | 
						|
	return NewRequestWithURLValues(t, method, urlStr, urlValues)
 | 
						|
}
 | 
						|
 | 
						|
func NewRequestWithURLValues(t testing.TB, method, urlStr string, urlValues url.Values) *RequestWrapper {
 | 
						|
	t.Helper()
 | 
						|
	return NewRequestWithBody(t, method, urlStr, strings.NewReader(urlValues.Encode())).
 | 
						|
		SetHeader("Content-Type", "application/x-www-form-urlencoded")
 | 
						|
}
 | 
						|
 | 
						|
func NewRequestWithJSON(t testing.TB, method, urlStr string, v any) *RequestWrapper {
 | 
						|
	t.Helper()
 | 
						|
 | 
						|
	jsonBytes, err := json.Marshal(v)
 | 
						|
	assert.NoError(t, err)
 | 
						|
	return NewRequestWithBody(t, method, urlStr, bytes.NewBuffer(jsonBytes)).
 | 
						|
		SetHeader("Content-Type", "application/json")
 | 
						|
}
 | 
						|
 | 
						|
func NewRequestWithBody(t testing.TB, method, urlStr string, body io.Reader) *RequestWrapper {
 | 
						|
	t.Helper()
 | 
						|
	if !strings.HasPrefix(urlStr, "http") && !strings.HasPrefix(urlStr, "/") {
 | 
						|
		urlStr = "/" + urlStr
 | 
						|
	}
 | 
						|
	req, err := http.NewRequest(method, urlStr, body)
 | 
						|
	assert.NoError(t, err)
 | 
						|
	req.RequestURI = urlStr
 | 
						|
 | 
						|
	return &RequestWrapper{req}
 | 
						|
}
 | 
						|
 | 
						|
const NoExpectedStatus = -1
 | 
						|
 | 
						|
func MakeRequest(t testing.TB, rw *RequestWrapper, expectedStatus int) *httptest.ResponseRecorder {
 | 
						|
	t.Helper()
 | 
						|
	req := rw.Request
 | 
						|
	recorder := httptest.NewRecorder()
 | 
						|
	if req.RemoteAddr == "" {
 | 
						|
		req.RemoteAddr = "test-mock:12345"
 | 
						|
	}
 | 
						|
	testWebRoutes.ServeHTTP(recorder, req)
 | 
						|
	if expectedStatus != NoExpectedStatus {
 | 
						|
		if expectedStatus != recorder.Code {
 | 
						|
			logUnexpectedResponse(t, recorder)
 | 
						|
			require.Equal(t, expectedStatus, recorder.Code, "Request: %s %s", req.Method, req.URL.String())
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return recorder
 | 
						|
}
 | 
						|
 | 
						|
func MakeRequestNilResponseRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseRecorder {
 | 
						|
	t.Helper()
 | 
						|
	req := rw.Request
 | 
						|
	recorder := NewNilResponseRecorder()
 | 
						|
	testWebRoutes.ServeHTTP(recorder, req)
 | 
						|
	if expectedStatus != NoExpectedStatus {
 | 
						|
		if !assert.Equal(t, expectedStatus, recorder.Code,
 | 
						|
			"Request: %s %s", req.Method, req.URL.String()) {
 | 
						|
			logUnexpectedResponse(t, &recorder.ResponseRecorder)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return recorder
 | 
						|
}
 | 
						|
 | 
						|
func MakeRequestNilResponseHashSumRecorder(t testing.TB, rw *RequestWrapper, expectedStatus int) *NilResponseHashSumRecorder {
 | 
						|
	t.Helper()
 | 
						|
	req := rw.Request
 | 
						|
	recorder := NewNilResponseHashSumRecorder()
 | 
						|
	testWebRoutes.ServeHTTP(recorder, req)
 | 
						|
	if expectedStatus != NoExpectedStatus {
 | 
						|
		if !assert.Equal(t, expectedStatus, recorder.Code,
 | 
						|
			"Request: %s %s", req.Method, req.URL.String()) {
 | 
						|
			logUnexpectedResponse(t, &recorder.ResponseRecorder)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return recorder
 | 
						|
}
 | 
						|
 | 
						|
// logUnexpectedResponse logs the contents of an unexpected response.
 | 
						|
func logUnexpectedResponse(t testing.TB, recorder *httptest.ResponseRecorder) {
 | 
						|
	t.Helper()
 | 
						|
	respBytes := recorder.Body.Bytes()
 | 
						|
	if len(respBytes) == 0 {
 | 
						|
		return
 | 
						|
	} else if len(respBytes) < 500 {
 | 
						|
		// if body is short, just log the whole thing
 | 
						|
		t.Log("Response: ", string(respBytes))
 | 
						|
		return
 | 
						|
	}
 | 
						|
	t.Log("Response length: ", len(respBytes))
 | 
						|
 | 
						|
	// log the "flash" error message, if one exists
 | 
						|
	// we must create a new buffer, so that we don't "use up" resp.Body
 | 
						|
	htmlDoc, err := goquery.NewDocumentFromReader(bytes.NewBuffer(respBytes))
 | 
						|
	if err != nil {
 | 
						|
		return // probably a non-HTML response
 | 
						|
	}
 | 
						|
	errMsg := htmlDoc.Find(".ui.negative.message").Text()
 | 
						|
	if len(errMsg) > 0 {
 | 
						|
		t.Log("A flash error message was found:", errMsg)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func DecodeJSON(t testing.TB, resp *httptest.ResponseRecorder, v any) {
 | 
						|
	t.Helper()
 | 
						|
 | 
						|
	// FIXME: JSON-KEY-CASE: for testing purpose only, because many structs don't provide `json` tags, they just use capitalized field names
 | 
						|
	decoder := json.NewDecoderCaseInsensitive(resp.Body)
 | 
						|
	require.NoError(t, decoder.Decode(v))
 | 
						|
}
 | 
						|
 | 
						|
func VerifyJSONSchema(t testing.TB, resp *httptest.ResponseRecorder, schemaFile string) {
 | 
						|
	t.Helper()
 | 
						|
 | 
						|
	schemaFilePath := filepath.Join(filepath.Dir(setting.AppPath), "tests", "integration", "schemas", schemaFile)
 | 
						|
	_, schemaFileErr := os.Stat(schemaFilePath)
 | 
						|
	assert.NoError(t, schemaFileErr)
 | 
						|
 | 
						|
	schema, schemaFileReadErr := os.ReadFile(schemaFilePath)
 | 
						|
	assert.NoError(t, schemaFileReadErr)
 | 
						|
	assert.NotEmpty(t, schema)
 | 
						|
 | 
						|
	nodeinfoSchema := gojsonschema.NewStringLoader(string(schema))
 | 
						|
	nodeinfoString := gojsonschema.NewStringLoader(resp.Body.String())
 | 
						|
	result, schemaValidationErr := gojsonschema.Validate(nodeinfoSchema, nodeinfoString)
 | 
						|
	assert.NoError(t, schemaValidationErr)
 | 
						|
	assert.Empty(t, result.Errors())
 | 
						|
	assert.True(t, result.Valid())
 | 
						|
}
 | 
						|
 | 
						|
// GetUserCSRFToken returns CSRF token for current user
 | 
						|
func GetUserCSRFToken(t testing.TB, session *TestSession) string {
 | 
						|
	t.Helper()
 | 
						|
	cookie := session.GetSiteCookie("_csrf")
 | 
						|
	require.NotEmpty(t, cookie)
 | 
						|
	return cookie
 | 
						|
}
 | 
						|
 | 
						|
// GetUserCSRFToken returns CSRF token for anonymous user (not logged in)
 | 
						|
func GetAnonymousCSRFToken(t testing.TB, session *TestSession) string {
 | 
						|
	t.Helper()
 | 
						|
	resp := session.MakeRequest(t, NewRequest(t, "GET", "/user/login"), http.StatusOK)
 | 
						|
	csrfToken := NewHTMLParser(t, resp.Body).GetCSRF()
 | 
						|
	require.NotEmpty(t, csrfToken)
 | 
						|
	return csrfToken
 | 
						|
}
 |