mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-31 10:56:10 +01:00 
			
		
		
		
	Enable tenv and testifylint rules (#32852)
Enables tenv and testifylint linters closes: https://github.com/go-gitea/gitea/issues/32842
This commit is contained in:
		| @@ -89,7 +89,7 @@ func TestAuthorizeRedirectWithExistingGrant(t *testing.T) { | ||||
| 	u, err := resp.Result().Location() | ||||
| 	assert.NoError(t, err) | ||||
| 	assert.Equal(t, "thestate", u.Query().Get("state")) | ||||
| 	assert.Truef(t, len(u.Query().Get("code")) > 30, "authorization code '%s' should be longer then 30", u.Query().Get("code")) | ||||
| 	assert.Greaterf(t, len(u.Query().Get("code")), 30, "authorization code '%s' should be longer then 30", u.Query().Get("code")) | ||||
| 	u.RawQuery = "" | ||||
| 	assert.Equal(t, "https://example.com/xyzzy", u.String()) | ||||
| } | ||||
| @@ -125,8 +125,8 @@ func TestAccessTokenExchange(t *testing.T) { | ||||
| 	parsed := new(response) | ||||
|  | ||||
| 	assert.NoError(t, json.Unmarshal(resp.Body.Bytes(), parsed)) | ||||
| 	assert.True(t, len(parsed.AccessToken) > 10) | ||||
| 	assert.True(t, len(parsed.RefreshToken) > 10) | ||||
| 	assert.Greater(t, len(parsed.AccessToken), 10) | ||||
| 	assert.Greater(t, len(parsed.RefreshToken), 10) | ||||
| } | ||||
|  | ||||
| func TestAccessTokenExchangeWithPublicClient(t *testing.T) { | ||||
| @@ -148,8 +148,8 @@ func TestAccessTokenExchangeWithPublicClient(t *testing.T) { | ||||
| 	parsed := new(response) | ||||
|  | ||||
| 	assert.NoError(t, json.Unmarshal(resp.Body.Bytes(), parsed)) | ||||
| 	assert.True(t, len(parsed.AccessToken) > 10) | ||||
| 	assert.True(t, len(parsed.RefreshToken) > 10) | ||||
| 	assert.Greater(t, len(parsed.AccessToken), 10) | ||||
| 	assert.Greater(t, len(parsed.RefreshToken), 10) | ||||
| } | ||||
|  | ||||
| func TestAccessTokenExchangeJSON(t *testing.T) { | ||||
| @@ -172,8 +172,8 @@ func TestAccessTokenExchangeJSON(t *testing.T) { | ||||
| 	parsed := new(response) | ||||
|  | ||||
| 	assert.NoError(t, json.Unmarshal(resp.Body.Bytes(), parsed)) | ||||
| 	assert.True(t, len(parsed.AccessToken) > 10) | ||||
| 	assert.True(t, len(parsed.RefreshToken) > 10) | ||||
| 	assert.Greater(t, len(parsed.AccessToken), 10) | ||||
| 	assert.Greater(t, len(parsed.RefreshToken), 10) | ||||
| } | ||||
|  | ||||
| func TestAccessTokenExchangeWithoutPKCE(t *testing.T) { | ||||
| @@ -289,8 +289,8 @@ func TestAccessTokenExchangeWithBasicAuth(t *testing.T) { | ||||
| 	parsed := new(response) | ||||
|  | ||||
| 	assert.NoError(t, json.Unmarshal(resp.Body.Bytes(), parsed)) | ||||
| 	assert.True(t, len(parsed.AccessToken) > 10) | ||||
| 	assert.True(t, len(parsed.RefreshToken) > 10) | ||||
| 	assert.Greater(t, len(parsed.AccessToken), 10) | ||||
| 	assert.Greater(t, len(parsed.RefreshToken), 10) | ||||
|  | ||||
| 	// use wrong client_secret | ||||
| 	req = NewRequestWithValues(t, "POST", "/login/oauth/access_token", map[string]string{ | ||||
| @@ -449,8 +449,8 @@ func TestOAuthIntrospection(t *testing.T) { | ||||
| 	parsed := new(response) | ||||
|  | ||||
| 	assert.NoError(t, json.Unmarshal(resp.Body.Bytes(), parsed)) | ||||
| 	assert.True(t, len(parsed.AccessToken) > 10) | ||||
| 	assert.True(t, len(parsed.RefreshToken) > 10) | ||||
| 	assert.Greater(t, len(parsed.AccessToken), 10) | ||||
| 	assert.Greater(t, len(parsed.RefreshToken), 10) | ||||
|  | ||||
| 	// successful request with a valid client_id/client_secret and a valid token | ||||
| 	req = NewRequestWithValues(t, "POST", "/login/oauth/introspect", map[string]string{ | ||||
|   | ||||
		Reference in New Issue
	
	Block a user