mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-31 02:46:04 +01:00 
			
		
		
		
	Kd/ci playwright go test (#20123)
* Add initial playwright config * Simplify Makefile * Simplify Makefile * Use correct config files * Update playwright settings * Fix package-lock file * Don't use test logger for e2e tests * fix frontend lint * Allow passing TEST_LOGGER variable * Init postgres database * use standard gitea env variables * Update playwright * update drone * Move empty env var to commands * Cleanup * Move integrations to subfolder * tests integrations to tests integraton * Run e2e tests with go test * Fix linting * install CI deps * Add files to ESlint * Fix drone typo * Don't log to console in CI * Use go test http server * Add build step before tests * Move shared init function to common package * fix drone * Clean up tests * Fix linting * Better mocking for page + version string * Cleanup test generation * Remove dependency on gitea binary * Fix linting * add initial support for running specific tests * Add ACCEPT_VISUAL variable * don't require git-lfs * Add initial documentation * Review feedback * Add logged in session test * Attempt fixing drone race * Cleanup and bump version * Bump deps * Review feedback * simplify installation * Fix ci * Update install docs
This commit is contained in:
		
							
								
								
									
										197
									
								
								tests/integration/api_repo_git_hook_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										197
									
								
								tests/integration/api_repo_git_hook_test.go
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,197 @@ | ||||
| // Copyright 2019 The Gitea Authors. All rights reserved. | ||||
| // Use of this source code is governed by a MIT-style | ||||
| // license that can be found in the LICENSE file. | ||||
|  | ||||
| package integration | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"net/http" | ||||
| 	"testing" | ||||
|  | ||||
| 	repo_model "code.gitea.io/gitea/models/repo" | ||||
| 	"code.gitea.io/gitea/models/unittest" | ||||
| 	user_model "code.gitea.io/gitea/models/user" | ||||
| 	api "code.gitea.io/gitea/modules/structs" | ||||
| 	"code.gitea.io/gitea/tests" | ||||
|  | ||||
| 	"github.com/stretchr/testify/assert" | ||||
| ) | ||||
|  | ||||
| const testHookContent = `#!/bin/bash | ||||
|  | ||||
| echo Hello, World! | ||||
| ` | ||||
|  | ||||
| func TestAPIListGitHooks(t *testing.T) { | ||||
| 	defer tests.PrepareTestEnv(t)() | ||||
|  | ||||
| 	repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 37}) | ||||
| 	owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) | ||||
|  | ||||
| 	// user1 is an admin user | ||||
| 	session := loginUser(t, "user1") | ||||
| 	token := getTokenForLoggedInUser(t, session) | ||||
| 	req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git?token=%s", | ||||
| 		owner.Name, repo.Name, token) | ||||
| 	resp := MakeRequest(t, req, http.StatusOK) | ||||
| 	var apiGitHooks []*api.GitHook | ||||
| 	DecodeJSON(t, resp, &apiGitHooks) | ||||
| 	assert.Len(t, apiGitHooks, 3) | ||||
| 	for _, apiGitHook := range apiGitHooks { | ||||
| 		if apiGitHook.Name == "pre-receive" { | ||||
| 			assert.True(t, apiGitHook.IsActive) | ||||
| 			assert.Equal(t, testHookContent, apiGitHook.Content) | ||||
| 		} else { | ||||
| 			assert.False(t, apiGitHook.IsActive) | ||||
| 			assert.Empty(t, apiGitHook.Content) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestAPIListGitHooksNoHooks(t *testing.T) { | ||||
| 	defer tests.PrepareTestEnv(t)() | ||||
|  | ||||
| 	repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) | ||||
| 	owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) | ||||
|  | ||||
| 	// user1 is an admin user | ||||
| 	session := loginUser(t, "user1") | ||||
| 	token := getTokenForLoggedInUser(t, session) | ||||
| 	req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git?token=%s", | ||||
| 		owner.Name, repo.Name, token) | ||||
| 	resp := MakeRequest(t, req, http.StatusOK) | ||||
| 	var apiGitHooks []*api.GitHook | ||||
| 	DecodeJSON(t, resp, &apiGitHooks) | ||||
| 	assert.Len(t, apiGitHooks, 3) | ||||
| 	for _, apiGitHook := range apiGitHooks { | ||||
| 		assert.False(t, apiGitHook.IsActive) | ||||
| 		assert.Empty(t, apiGitHook.Content) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestAPIListGitHooksNoAccess(t *testing.T) { | ||||
| 	defer tests.PrepareTestEnv(t)() | ||||
|  | ||||
| 	repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) | ||||
| 	owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) | ||||
|  | ||||
| 	session := loginUser(t, owner.Name) | ||||
| 	token := getTokenForLoggedInUser(t, session) | ||||
| 	req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git?token=%s", | ||||
| 		owner.Name, repo.Name, token) | ||||
| 	MakeRequest(t, req, http.StatusForbidden) | ||||
| } | ||||
|  | ||||
| func TestAPIGetGitHook(t *testing.T) { | ||||
| 	defer tests.PrepareTestEnv(t)() | ||||
|  | ||||
| 	repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 37}) | ||||
| 	owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) | ||||
|  | ||||
| 	// user1 is an admin user | ||||
| 	session := loginUser(t, "user1") | ||||
| 	token := getTokenForLoggedInUser(t, session) | ||||
| 	req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s", | ||||
| 		owner.Name, repo.Name, token) | ||||
| 	resp := MakeRequest(t, req, http.StatusOK) | ||||
| 	var apiGitHook *api.GitHook | ||||
| 	DecodeJSON(t, resp, &apiGitHook) | ||||
| 	assert.True(t, apiGitHook.IsActive) | ||||
| 	assert.Equal(t, testHookContent, apiGitHook.Content) | ||||
| } | ||||
|  | ||||
| func TestAPIGetGitHookNoAccess(t *testing.T) { | ||||
| 	defer tests.PrepareTestEnv(t)() | ||||
|  | ||||
| 	repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) | ||||
| 	owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) | ||||
|  | ||||
| 	session := loginUser(t, owner.Name) | ||||
| 	token := getTokenForLoggedInUser(t, session) | ||||
| 	req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s", | ||||
| 		owner.Name, repo.Name, token) | ||||
| 	MakeRequest(t, req, http.StatusForbidden) | ||||
| } | ||||
|  | ||||
| func TestAPIEditGitHook(t *testing.T) { | ||||
| 	defer tests.PrepareTestEnv(t)() | ||||
|  | ||||
| 	repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) | ||||
| 	owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) | ||||
|  | ||||
| 	// user1 is an admin user | ||||
| 	session := loginUser(t, "user1") | ||||
| 	token := getTokenForLoggedInUser(t, session) | ||||
|  | ||||
| 	urlStr := fmt.Sprintf("/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s", | ||||
| 		owner.Name, repo.Name, token) | ||||
| 	req := NewRequestWithJSON(t, "PATCH", urlStr, &api.EditGitHookOption{ | ||||
| 		Content: testHookContent, | ||||
| 	}) | ||||
| 	resp := MakeRequest(t, req, http.StatusOK) | ||||
| 	var apiGitHook *api.GitHook | ||||
| 	DecodeJSON(t, resp, &apiGitHook) | ||||
| 	assert.True(t, apiGitHook.IsActive) | ||||
| 	assert.Equal(t, testHookContent, apiGitHook.Content) | ||||
|  | ||||
| 	req = NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s", | ||||
| 		owner.Name, repo.Name, token) | ||||
| 	resp = MakeRequest(t, req, http.StatusOK) | ||||
| 	var apiGitHook2 *api.GitHook | ||||
| 	DecodeJSON(t, resp, &apiGitHook2) | ||||
| 	assert.True(t, apiGitHook2.IsActive) | ||||
| 	assert.Equal(t, testHookContent, apiGitHook2.Content) | ||||
| } | ||||
|  | ||||
| func TestAPIEditGitHookNoAccess(t *testing.T) { | ||||
| 	defer tests.PrepareTestEnv(t)() | ||||
|  | ||||
| 	repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) | ||||
| 	owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) | ||||
|  | ||||
| 	session := loginUser(t, owner.Name) | ||||
| 	token := getTokenForLoggedInUser(t, session) | ||||
| 	urlStr := fmt.Sprintf("/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s", | ||||
| 		owner.Name, repo.Name, token) | ||||
| 	req := NewRequestWithJSON(t, "PATCH", urlStr, &api.EditGitHookOption{ | ||||
| 		Content: testHookContent, | ||||
| 	}) | ||||
| 	MakeRequest(t, req, http.StatusForbidden) | ||||
| } | ||||
|  | ||||
| func TestAPIDeleteGitHook(t *testing.T) { | ||||
| 	defer tests.PrepareTestEnv(t)() | ||||
|  | ||||
| 	repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 37}) | ||||
| 	owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) | ||||
|  | ||||
| 	// user1 is an admin user | ||||
| 	session := loginUser(t, "user1") | ||||
| 	token := getTokenForLoggedInUser(t, session) | ||||
|  | ||||
| 	req := NewRequestf(t, "DELETE", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s", | ||||
| 		owner.Name, repo.Name, token) | ||||
| 	MakeRequest(t, req, http.StatusNoContent) | ||||
|  | ||||
| 	req = NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s", | ||||
| 		owner.Name, repo.Name, token) | ||||
| 	resp := MakeRequest(t, req, http.StatusOK) | ||||
| 	var apiGitHook2 *api.GitHook | ||||
| 	DecodeJSON(t, resp, &apiGitHook2) | ||||
| 	assert.False(t, apiGitHook2.IsActive) | ||||
| 	assert.Empty(t, apiGitHook2.Content) | ||||
| } | ||||
|  | ||||
| func TestAPIDeleteGitHookNoAccess(t *testing.T) { | ||||
| 	defer tests.PrepareTestEnv(t)() | ||||
|  | ||||
| 	repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) | ||||
| 	owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) | ||||
|  | ||||
| 	session := loginUser(t, owner.Name) | ||||
| 	token := getTokenForLoggedInUser(t, session) | ||||
| 	req := NewRequestf(t, "DELETE", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s", | ||||
| 		owner.Name, repo.Name, token) | ||||
| 	MakeRequest(t, req, http.StatusForbidden) | ||||
| } | ||||
		Reference in New Issue
	
	Block a user