mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-27 00:23:41 +09:00 
			
		
		
		
	Now that #16069 is merged, some sites may wish to enforce that users are all public, limited or private, and/or disallow users from becoming private. This PR adds functionality and settings to constrain a user's ability to change their visibility. Co-authored-by: zeripath <art27@cantab.net>
		
			
				
	
	
		
			492 lines
		
	
	
		
			21 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			492 lines
		
	
	
		
			21 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2017 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package models
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"math/rand"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	"code.gitea.io/gitea/modules/structs"
 | |
| 	"code.gitea.io/gitea/modules/util"
 | |
| 
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| )
 | |
| 
 | |
| func TestUserIsPublicMember(t *testing.T) {
 | |
| 	assert.NoError(t, PrepareTestDatabase())
 | |
| 
 | |
| 	tt := []struct {
 | |
| 		uid      int64
 | |
| 		orgid    int64
 | |
| 		expected bool
 | |
| 	}{
 | |
| 		{2, 3, true},
 | |
| 		{4, 3, false},
 | |
| 		{5, 6, true},
 | |
| 		{5, 7, false},
 | |
| 	}
 | |
| 	for _, v := range tt {
 | |
| 		t.Run(fmt.Sprintf("UserId%dIsPublicMemberOf%d", v.uid, v.orgid), func(t *testing.T) {
 | |
| 			testUserIsPublicMember(t, v.uid, v.orgid, v.expected)
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func testUserIsPublicMember(t *testing.T, uid, orgID int64, expected bool) {
 | |
| 	user, err := GetUserByID(uid)
 | |
| 	assert.NoError(t, err)
 | |
| 	assert.Equal(t, expected, user.IsPublicMember(orgID))
 | |
| }
 | |
| 
 | |
| func TestIsUserOrgOwner(t *testing.T) {
 | |
| 	assert.NoError(t, PrepareTestDatabase())
 | |
| 
 | |
| 	tt := []struct {
 | |
| 		uid      int64
 | |
| 		orgid    int64
 | |
| 		expected bool
 | |
| 	}{
 | |
| 		{2, 3, true},
 | |
| 		{4, 3, false},
 | |
| 		{5, 6, true},
 | |
| 		{5, 7, true},
 | |
| 	}
 | |
| 	for _, v := range tt {
 | |
| 		t.Run(fmt.Sprintf("UserId%dIsOrgOwnerOf%d", v.uid, v.orgid), func(t *testing.T) {
 | |
| 			testIsUserOrgOwner(t, v.uid, v.orgid, v.expected)
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func testIsUserOrgOwner(t *testing.T, uid, orgID int64, expected bool) {
 | |
| 	user, err := GetUserByID(uid)
 | |
| 	assert.NoError(t, err)
 | |
| 	assert.Equal(t, expected, user.IsUserOrgOwner(orgID))
 | |
| }
 | |
| 
 | |
| func TestGetUserEmailsByNames(t *testing.T) {
 | |
| 	assert.NoError(t, PrepareTestDatabase())
 | |
| 
 | |
| 	// ignore none active user email
 | |
| 	assert.Equal(t, []string{"user8@example.com"}, GetUserEmailsByNames([]string{"user8", "user9"}))
 | |
| 	assert.Equal(t, []string{"user8@example.com", "user5@example.com"}, GetUserEmailsByNames([]string{"user8", "user5"}))
 | |
| 
 | |
| 	assert.Equal(t, []string{"user8@example.com"}, GetUserEmailsByNames([]string{"user8", "user7"}))
 | |
| }
 | |
| 
 | |
| func TestCanCreateOrganization(t *testing.T) {
 | |
| 	assert.NoError(t, PrepareTestDatabase())
 | |
| 
 | |
| 	admin := AssertExistsAndLoadBean(t, &User{ID: 1}).(*User)
 | |
| 	assert.True(t, admin.CanCreateOrganization())
 | |
| 
 | |
| 	user := AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
 | |
| 	assert.True(t, user.CanCreateOrganization())
 | |
| 	// Disable user create organization permission.
 | |
| 	user.AllowCreateOrganization = false
 | |
| 	assert.False(t, user.CanCreateOrganization())
 | |
| 
 | |
| 	setting.Admin.DisableRegularOrgCreation = true
 | |
| 	user.AllowCreateOrganization = true
 | |
| 	assert.True(t, admin.CanCreateOrganization())
 | |
| 	assert.False(t, user.CanCreateOrganization())
 | |
| }
 | |
| 
 | |
| func TestSearchUsers(t *testing.T) {
 | |
| 	assert.NoError(t, PrepareTestDatabase())
 | |
| 	testSuccess := func(opts *SearchUserOptions, expectedUserOrOrgIDs []int64) {
 | |
| 		users, _, err := SearchUsers(opts)
 | |
| 		assert.NoError(t, err)
 | |
| 		if assert.Len(t, users, len(expectedUserOrOrgIDs)) {
 | |
| 			for i, expectedID := range expectedUserOrOrgIDs {
 | |
| 				assert.EqualValues(t, expectedID, users[i].ID)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// test orgs
 | |
| 	testOrgSuccess := func(opts *SearchUserOptions, expectedOrgIDs []int64) {
 | |
| 		opts.Type = UserTypeOrganization
 | |
| 		testSuccess(opts, expectedOrgIDs)
 | |
| 	}
 | |
| 
 | |
| 	testOrgSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: ListOptions{Page: 1, PageSize: 2}},
 | |
| 		[]int64{3, 6})
 | |
| 
 | |
| 	testOrgSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: ListOptions{Page: 2, PageSize: 2}},
 | |
| 		[]int64{7, 17})
 | |
| 
 | |
| 	testOrgSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: ListOptions{Page: 3, PageSize: 2}},
 | |
| 		[]int64{19, 25})
 | |
| 
 | |
| 	testOrgSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: ListOptions{Page: 4, PageSize: 2}},
 | |
| 		[]int64{26})
 | |
| 
 | |
| 	testOrgSuccess(&SearchUserOptions{ListOptions: ListOptions{Page: 5, PageSize: 2}},
 | |
| 		[]int64{})
 | |
| 
 | |
| 	// test users
 | |
| 	testUserSuccess := func(opts *SearchUserOptions, expectedUserIDs []int64) {
 | |
| 		opts.Type = UserTypeIndividual
 | |
| 		testSuccess(opts, expectedUserIDs)
 | |
| 	}
 | |
| 
 | |
| 	testUserSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: ListOptions{Page: 1}},
 | |
| 		[]int64{1, 2, 4, 5, 8, 9, 10, 11, 12, 13, 14, 15, 16, 18, 20, 21, 24, 27, 28, 29, 30})
 | |
| 
 | |
| 	testUserSuccess(&SearchUserOptions{ListOptions: ListOptions{Page: 1}, IsActive: util.OptionalBoolFalse},
 | |
| 		[]int64{9})
 | |
| 
 | |
| 	testUserSuccess(&SearchUserOptions{OrderBy: "id ASC", ListOptions: ListOptions{Page: 1}, IsActive: util.OptionalBoolTrue},
 | |
| 		[]int64{1, 2, 4, 5, 8, 10, 11, 12, 13, 14, 15, 16, 18, 20, 21, 24, 28, 29, 30})
 | |
| 
 | |
| 	testUserSuccess(&SearchUserOptions{Keyword: "user1", OrderBy: "id ASC", ListOptions: ListOptions{Page: 1}, IsActive: util.OptionalBoolTrue},
 | |
| 		[]int64{1, 10, 11, 12, 13, 14, 15, 16, 18})
 | |
| 
 | |
| 	// order by name asc default
 | |
| 	testUserSuccess(&SearchUserOptions{Keyword: "user1", ListOptions: ListOptions{Page: 1}, IsActive: util.OptionalBoolTrue},
 | |
| 		[]int64{1, 10, 11, 12, 13, 14, 15, 16, 18})
 | |
| }
 | |
| 
 | |
| func TestDeleteUser(t *testing.T) {
 | |
| 	test := func(userID int64) {
 | |
| 		assert.NoError(t, PrepareTestDatabase())
 | |
| 		user := AssertExistsAndLoadBean(t, &User{ID: userID}).(*User)
 | |
| 
 | |
| 		ownedRepos := make([]*Repository, 0, 10)
 | |
| 		assert.NoError(t, x.Find(&ownedRepos, &Repository{OwnerID: userID}))
 | |
| 		if len(ownedRepos) > 0 {
 | |
| 			err := DeleteUser(user)
 | |
| 			assert.Error(t, err)
 | |
| 			assert.True(t, IsErrUserOwnRepos(err))
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		orgUsers := make([]*OrgUser, 0, 10)
 | |
| 		assert.NoError(t, x.Find(&orgUsers, &OrgUser{UID: userID}))
 | |
| 		for _, orgUser := range orgUsers {
 | |
| 			if err := RemoveOrgUser(orgUser.OrgID, orgUser.UID); err != nil {
 | |
| 				assert.True(t, IsErrLastOrgOwner(err))
 | |
| 				return
 | |
| 			}
 | |
| 		}
 | |
| 		assert.NoError(t, DeleteUser(user))
 | |
| 		AssertNotExistsBean(t, &User{ID: userID})
 | |
| 		CheckConsistencyFor(t, &User{}, &Repository{})
 | |
| 	}
 | |
| 	test(2)
 | |
| 	test(4)
 | |
| 	test(8)
 | |
| 	test(11)
 | |
| 
 | |
| 	org := AssertExistsAndLoadBean(t, &User{ID: 3}).(*User)
 | |
| 	assert.Error(t, DeleteUser(org))
 | |
| }
 | |
| 
 | |
| func TestEmailNotificationPreferences(t *testing.T) {
 | |
| 	assert.NoError(t, PrepareTestDatabase())
 | |
| 
 | |
| 	for _, test := range []struct {
 | |
| 		expected string
 | |
| 		userID   int64
 | |
| 	}{
 | |
| 		{EmailNotificationsEnabled, 1},
 | |
| 		{EmailNotificationsEnabled, 2},
 | |
| 		{EmailNotificationsOnMention, 3},
 | |
| 		{EmailNotificationsOnMention, 4},
 | |
| 		{EmailNotificationsEnabled, 5},
 | |
| 		{EmailNotificationsEnabled, 6},
 | |
| 		{EmailNotificationsDisabled, 7},
 | |
| 		{EmailNotificationsEnabled, 8},
 | |
| 		{EmailNotificationsOnMention, 9},
 | |
| 	} {
 | |
| 		user := AssertExistsAndLoadBean(t, &User{ID: test.userID}).(*User)
 | |
| 		assert.Equal(t, test.expected, user.EmailNotifications())
 | |
| 
 | |
| 		// Try all possible settings
 | |
| 		assert.NoError(t, user.SetEmailNotifications(EmailNotificationsEnabled))
 | |
| 		assert.Equal(t, EmailNotificationsEnabled, user.EmailNotifications())
 | |
| 
 | |
| 		assert.NoError(t, user.SetEmailNotifications(EmailNotificationsOnMention))
 | |
| 		assert.Equal(t, EmailNotificationsOnMention, user.EmailNotifications())
 | |
| 
 | |
| 		assert.NoError(t, user.SetEmailNotifications(EmailNotificationsDisabled))
 | |
| 		assert.Equal(t, EmailNotificationsDisabled, user.EmailNotifications())
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestHashPasswordDeterministic(t *testing.T) {
 | |
| 	b := make([]byte, 16)
 | |
| 	u := &User{}
 | |
| 	algos := []string{"argon2", "pbkdf2", "scrypt", "bcrypt"}
 | |
| 	for j := 0; j < len(algos); j++ {
 | |
| 		u.PasswdHashAlgo = algos[j]
 | |
| 		for i := 0; i < 50; i++ {
 | |
| 			// generate a random password
 | |
| 			rand.Read(b)
 | |
| 			pass := string(b)
 | |
| 
 | |
| 			// save the current password in the user - hash it and store the result
 | |
| 			u.SetPassword(pass)
 | |
| 			r1 := u.Passwd
 | |
| 
 | |
| 			// run again
 | |
| 			u.SetPassword(pass)
 | |
| 			r2 := u.Passwd
 | |
| 
 | |
| 			assert.NotEqual(t, r1, r2)
 | |
| 			assert.True(t, u.ValidatePassword(pass))
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func BenchmarkHashPassword(b *testing.B) {
 | |
| 	// BenchmarkHashPassword ensures that it takes a reasonable amount of time
 | |
| 	// to hash a password - in order to protect from brute-force attacks.
 | |
| 	pass := "password1337"
 | |
| 	u := &User{Passwd: pass}
 | |
| 	b.ResetTimer()
 | |
| 	for i := 0; i < b.N; i++ {
 | |
| 		u.SetPassword(pass)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestGetOrgRepositoryIDs(t *testing.T) {
 | |
| 	assert.NoError(t, PrepareTestDatabase())
 | |
| 	user2 := AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
 | |
| 	user4 := AssertExistsAndLoadBean(t, &User{ID: 4}).(*User)
 | |
| 	user5 := AssertExistsAndLoadBean(t, &User{ID: 5}).(*User)
 | |
| 
 | |
| 	accessibleRepos, err := user2.GetOrgRepositoryIDs()
 | |
| 	assert.NoError(t, err)
 | |
| 	// User 2's team has access to private repos 3, 5, repo 32 is a public repo of the organization
 | |
| 	assert.Equal(t, []int64{3, 5, 23, 24, 32}, accessibleRepos)
 | |
| 
 | |
| 	accessibleRepos, err = user4.GetOrgRepositoryIDs()
 | |
| 	assert.NoError(t, err)
 | |
| 	// User 4's team has access to private repo 3, repo 32 is a public repo of the organization
 | |
| 	assert.Equal(t, []int64{3, 32}, accessibleRepos)
 | |
| 
 | |
| 	accessibleRepos, err = user5.GetOrgRepositoryIDs()
 | |
| 	assert.NoError(t, err)
 | |
| 	// User 5's team has no access to any repo
 | |
| 	assert.Len(t, accessibleRepos, 0)
 | |
| }
 | |
| 
 | |
| func TestNewGitSig(t *testing.T) {
 | |
| 	users := make([]*User, 0, 20)
 | |
| 	sess := x.NewSession()
 | |
| 	defer sess.Close()
 | |
| 	sess.Find(&users)
 | |
| 
 | |
| 	for _, user := range users {
 | |
| 		sig := user.NewGitSig()
 | |
| 		assert.NotContains(t, sig.Name, "<")
 | |
| 		assert.NotContains(t, sig.Name, ">")
 | |
| 		assert.NotContains(t, sig.Name, "\n")
 | |
| 		assert.NotEqual(t, len(strings.TrimSpace(sig.Name)), 0)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestDisplayName(t *testing.T) {
 | |
| 	users := make([]*User, 0, 20)
 | |
| 	sess := x.NewSession()
 | |
| 	defer sess.Close()
 | |
| 	sess.Find(&users)
 | |
| 
 | |
| 	for _, user := range users {
 | |
| 		displayName := user.DisplayName()
 | |
| 		assert.Equal(t, strings.TrimSpace(displayName), displayName)
 | |
| 		if len(strings.TrimSpace(user.FullName)) == 0 {
 | |
| 			assert.Equal(t, user.Name, displayName)
 | |
| 		}
 | |
| 		assert.NotEqual(t, len(strings.TrimSpace(displayName)), 0)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestCreateUser(t *testing.T) {
 | |
| 	user := &User{
 | |
| 		Name:               "GiteaBot",
 | |
| 		Email:              "GiteaBot@gitea.io",
 | |
| 		Passwd:             ";p['////..-++']",
 | |
| 		IsAdmin:            false,
 | |
| 		Theme:              setting.UI.DefaultTheme,
 | |
| 		MustChangePassword: false,
 | |
| 	}
 | |
| 
 | |
| 	assert.NoError(t, CreateUser(user))
 | |
| 
 | |
| 	assert.NoError(t, DeleteUser(user))
 | |
| }
 | |
| 
 | |
| func TestCreateUserInvalidEmail(t *testing.T) {
 | |
| 	user := &User{
 | |
| 		Name:               "GiteaBot",
 | |
| 		Email:              "GiteaBot@gitea.io\r\n",
 | |
| 		Passwd:             ";p['////..-++']",
 | |
| 		IsAdmin:            false,
 | |
| 		Theme:              setting.UI.DefaultTheme,
 | |
| 		MustChangePassword: false,
 | |
| 	}
 | |
| 
 | |
| 	err := CreateUser(user)
 | |
| 	assert.Error(t, err)
 | |
| 	assert.True(t, IsErrEmailInvalid(err))
 | |
| }
 | |
| 
 | |
| func TestCreateUser_Issue5882(t *testing.T) {
 | |
| 	// Init settings
 | |
| 	_ = setting.Admin
 | |
| 
 | |
| 	passwd := ".//.;1;;//.,-=_"
 | |
| 
 | |
| 	tt := []struct {
 | |
| 		user               *User
 | |
| 		disableOrgCreation bool
 | |
| 	}{
 | |
| 		{&User{Name: "GiteaBot", Email: "GiteaBot@gitea.io", Passwd: passwd, MustChangePassword: false}, false},
 | |
| 		{&User{Name: "GiteaBot2", Email: "GiteaBot2@gitea.io", Passwd: passwd, MustChangePassword: false}, true},
 | |
| 	}
 | |
| 
 | |
| 	setting.Service.DefaultAllowCreateOrganization = true
 | |
| 
 | |
| 	for _, v := range tt {
 | |
| 		setting.Admin.DisableRegularOrgCreation = v.disableOrgCreation
 | |
| 
 | |
| 		assert.NoError(t, CreateUser(v.user))
 | |
| 
 | |
| 		u, err := GetUserByEmail(v.user.Email)
 | |
| 		assert.NoError(t, err)
 | |
| 
 | |
| 		assert.Equal(t, !u.AllowCreateOrganization, v.disableOrgCreation)
 | |
| 
 | |
| 		assert.NoError(t, DeleteUser(v.user))
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestGetUserIDsByNames(t *testing.T) {
 | |
| 	assert.NoError(t, PrepareTestDatabase())
 | |
| 
 | |
| 	// ignore non existing
 | |
| 	IDs, err := GetUserIDsByNames([]string{"user1", "user2", "none_existing_user"}, true)
 | |
| 	assert.NoError(t, err)
 | |
| 	assert.Equal(t, []int64{1, 2}, IDs)
 | |
| 
 | |
| 	// ignore non existing
 | |
| 	IDs, err = GetUserIDsByNames([]string{"user1", "do_not_exist"}, false)
 | |
| 	assert.Error(t, err)
 | |
| 	assert.Equal(t, []int64(nil), IDs)
 | |
| }
 | |
| 
 | |
| func TestGetMaileableUsersByIDs(t *testing.T) {
 | |
| 	assert.NoError(t, PrepareTestDatabase())
 | |
| 
 | |
| 	results, err := GetMaileableUsersByIDs([]int64{1, 4}, false)
 | |
| 	assert.NoError(t, err)
 | |
| 	assert.Len(t, results, 1)
 | |
| 	if len(results) > 1 {
 | |
| 		assert.Equal(t, results[0].ID, 1)
 | |
| 	}
 | |
| 
 | |
| 	results, err = GetMaileableUsersByIDs([]int64{1, 4}, true)
 | |
| 	assert.NoError(t, err)
 | |
| 	assert.Len(t, results, 2)
 | |
| 	if len(results) > 2 {
 | |
| 		assert.Equal(t, results[0].ID, 1)
 | |
| 		assert.Equal(t, results[1].ID, 4)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAddLdapSSHPublicKeys(t *testing.T) {
 | |
| 	assert.NoError(t, PrepareTestDatabase())
 | |
| 
 | |
| 	user := AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
 | |
| 	s := &LoginSource{ID: 1}
 | |
| 
 | |
| 	testCases := []struct {
 | |
| 		keyString   string
 | |
| 		number      int
 | |
| 		keyContents []string
 | |
| 	}{
 | |
| 		{
 | |
| 			keyString: "ssh-rsa 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 nocomment\n",
 | |
| 			number:    1,
 | |
| 			keyContents: []string{
 | |
| 				"ssh-rsa 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",
 | |
| 			},
 | |
| 		},
 | |
| 		{
 | |
| 			keyString: `ssh-rsa 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 nocomment
 | |
| ssh-dss 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 nocomment`,
 | |
| 			number: 2,
 | |
| 			keyContents: []string{
 | |
| 				"ssh-rsa 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",
 | |
| 				"ssh-dss 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",
 | |
| 			},
 | |
| 		},
 | |
| 		{
 | |
| 			keyString: `ssh-rsa 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 nocomment
 | |
| # comment asmdna,ndp
 | |
| ssh-dss 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 nocomment`,
 | |
| 			number: 2,
 | |
| 			keyContents: []string{
 | |
| 				"ssh-rsa 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",
 | |
| 				"ssh-dss AAAAB3NzaC1kc3MAAACBAOChCC7lf6Uo9n7BmZ6M8St19PZf4Tn59NriyboW2x/DZuYAz3ibZ2OkQ3S0SqDIa0HXSEJ1zaExQdmbO+Ux/wsytWZmCczWOVsaszBZSl90q8UnWlSH6P+/YA+RWJm5SFtuV9PtGIhyZgoNuz5kBQ7K139wuQsecdKktISwTakzAAAAFQCzKsO2JhNKlL+wwwLGOcLffoAmkwAAAIBpK7/3xvduajLBD/9vASqBQIHrgK2J+wiQnIb/Wzy0UsVmvfn8A+udRbBo+csM8xrSnlnlJnjkJS3qiM5g+eTwsLIV1IdKPEwmwB+VcP53Cw6lSyWyJcvhFb0N6s08NZysLzvj0N+ZC/FnhKTLzIyMtkHf/IrPCwlM+pV/M/96YgAAAIEAqQcGn9CKgzgPaguIZooTAOQdvBLMI5y0bQjOW6734XOpqQGf/Kra90wpoasLKZjSYKNPjE+FRUOrStLrxcNs4BeVKhy2PYTRnybfYVk1/dmKgH6P1YSRONsGKvTsH6c5IyCRG0ncCgYeF8tXppyd642982daopE7zQ/NPAnJfag=",
 | |
| 			},
 | |
| 		},
 | |
| 		{
 | |
| 			keyString: `ssh-rsa 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 nocomment
 | |
| 382488320jasdj1lasmva/vasodifipi4193-fksma.cm
 | |
| ssh-dss AAAAB3NzaC1kc3MAAACBAOChCC7lf6Uo9n7BmZ6M8St19PZf4Tn59NriyboW2x/DZuYAz3ibZ2OkQ3S0SqDIa0HXSEJ1zaExQdmbO+Ux/wsytWZmCczWOVsaszBZSl90q8UnWlSH6P+/YA+RWJm5SFtuV9PtGIhyZgoNuz5kBQ7K139wuQsecdKktISwTakzAAAAFQCzKsO2JhNKlL+wwwLGOcLffoAmkwAAAIBpK7/3xvduajLBD/9vASqBQIHrgK2J+wiQnIb/Wzy0UsVmvfn8A+udRbBo+csM8xrSnlnlJnjkJS3qiM5g+eTwsLIV1IdKPEwmwB+VcP53Cw6lSyWyJcvhFb0N6s08NZysLzvj0N+ZC/FnhKTLzIyMtkHf/IrPCwlM+pV/M/96YgAAAIEAqQcGn9CKgzgPaguIZooTAOQdvBLMI5y0bQjOW6734XOpqQGf/Kra90wpoasLKZjSYKNPjE+FRUOrStLrxcNs4BeVKhy2PYTRnybfYVk1/dmKgH6P1YSRONsGKvTsH6c5IyCRG0ncCgYeF8tXppyd642982daopE7zQ/NPAnJfag= nocomment`,
 | |
| 			number: 2,
 | |
| 			keyContents: []string{
 | |
| 				"ssh-rsa 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",
 | |
| 				"ssh-dss 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",
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for i, kase := range testCases {
 | |
| 		s.ID = int64(i) + 20
 | |
| 		addLdapSSHPublicKeys(user, s, []string{kase.keyString})
 | |
| 		keys, err := ListPublicLdapSSHKeys(user.ID, s.ID)
 | |
| 		assert.NoError(t, err)
 | |
| 		if err != nil {
 | |
| 			continue
 | |
| 		}
 | |
| 		assert.Len(t, keys, kase.number)
 | |
| 
 | |
| 		for _, key := range keys {
 | |
| 			assert.Contains(t, kase.keyContents, key.Content)
 | |
| 		}
 | |
| 		for _, key := range keys {
 | |
| 			DeletePublicKey(user, key.ID)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestUpdateUser(t *testing.T) {
 | |
| 	assert.NoError(t, PrepareTestDatabase())
 | |
| 	user := AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
 | |
| 
 | |
| 	user.KeepActivityPrivate = true
 | |
| 	assert.NoError(t, UpdateUser(user))
 | |
| 	user = AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
 | |
| 	assert.True(t, user.KeepActivityPrivate)
 | |
| 
 | |
| 	setting.Service.AllowedUserVisibilityModesSlice = []bool{true, false, false}
 | |
| 	user.KeepActivityPrivate = false
 | |
| 	user.Visibility = structs.VisibleTypePrivate
 | |
| 	assert.Error(t, UpdateUser(user))
 | |
| 	user = AssertExistsAndLoadBean(t, &User{ID: 2}).(*User)
 | |
| 	assert.True(t, user.KeepActivityPrivate)
 | |
| 
 | |
| 	user.Email = "no mail@mail.org"
 | |
| 	assert.Error(t, UpdateUser(user))
 | |
| }
 |