mirror of
https://github.com/go-gitea/gitea.git
synced 2024-12-21 03:45:10 +01:00
f183783baa
This will allow instance admins to view signup pattern patterns for public instances. It is modelled after discourse, mastodon, and MediaWiki's approaches. Note: This has privacy implications, but as the above-stated open-source projects take this approach, especially MediaWiki, which I have no doubt looked into this thoroughly, it is likely okay for us, too. However, I would be appreciative of any feedback on how this could be improved. --------- Co-authored-by: Giteabot <teabot@gitea.io>
101 lines
2.5 KiB
Go
101 lines
2.5 KiB
Go
// Copyright 2024 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package oauth2
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"code.gitea.io/gitea/models/auth"
|
|
"code.gitea.io/gitea/models/unittest"
|
|
user_model "code.gitea.io/gitea/models/user"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestSource(t *testing.T) {
|
|
assert.NoError(t, unittest.PrepareTestDatabase())
|
|
|
|
source := &Source{
|
|
Provider: "fake",
|
|
authSource: &auth.Source{
|
|
ID: 12,
|
|
Type: auth.OAuth2,
|
|
Name: "fake",
|
|
IsActive: true,
|
|
IsSyncEnabled: true,
|
|
},
|
|
}
|
|
|
|
user := &user_model.User{
|
|
LoginName: "external",
|
|
LoginType: auth.OAuth2,
|
|
LoginSource: source.authSource.ID,
|
|
Name: "test",
|
|
Email: "external@example.com",
|
|
}
|
|
|
|
err := user_model.CreateUser(context.Background(), user, &user_model.Meta{}, &user_model.CreateUserOverwriteOptions{})
|
|
assert.NoError(t, err)
|
|
|
|
e := &user_model.ExternalLoginUser{
|
|
ExternalID: "external",
|
|
UserID: user.ID,
|
|
LoginSourceID: user.LoginSource,
|
|
RefreshToken: "valid",
|
|
}
|
|
err = user_model.LinkExternalToUser(context.Background(), user, e)
|
|
assert.NoError(t, err)
|
|
|
|
provider, err := createProvider(source.authSource.Name, source)
|
|
assert.NoError(t, err)
|
|
|
|
t.Run("refresh", func(t *testing.T) {
|
|
t.Run("valid", func(t *testing.T) {
|
|
err := source.refresh(context.Background(), provider, e)
|
|
assert.NoError(t, err)
|
|
|
|
e := &user_model.ExternalLoginUser{
|
|
ExternalID: e.ExternalID,
|
|
LoginSourceID: e.LoginSourceID,
|
|
}
|
|
|
|
ok, err := user_model.GetExternalLogin(context.Background(), e)
|
|
assert.NoError(t, err)
|
|
assert.True(t, ok)
|
|
assert.Equal(t, e.RefreshToken, "refresh")
|
|
assert.Equal(t, e.AccessToken, "token")
|
|
|
|
u, err := user_model.GetUserByID(context.Background(), user.ID)
|
|
assert.NoError(t, err)
|
|
assert.True(t, u.IsActive)
|
|
})
|
|
|
|
t.Run("expired", func(t *testing.T) {
|
|
err := source.refresh(context.Background(), provider, &user_model.ExternalLoginUser{
|
|
ExternalID: "external",
|
|
UserID: user.ID,
|
|
LoginSourceID: user.LoginSource,
|
|
RefreshToken: "expired",
|
|
})
|
|
assert.NoError(t, err)
|
|
|
|
e := &user_model.ExternalLoginUser{
|
|
ExternalID: e.ExternalID,
|
|
LoginSourceID: e.LoginSourceID,
|
|
}
|
|
|
|
ok, err := user_model.GetExternalLogin(context.Background(), e)
|
|
assert.NoError(t, err)
|
|
assert.True(t, ok)
|
|
assert.Equal(t, e.RefreshToken, "")
|
|
assert.Equal(t, e.AccessToken, "")
|
|
|
|
u, err := user_model.GetUserByID(context.Background(), user.ID)
|
|
assert.NoError(t, err)
|
|
assert.False(t, u.IsActive)
|
|
})
|
|
})
|
|
}
|