2017-03-11 14:30:29 +00:00
|
|
|
// Copyright 2017 The Gitea Authors. All rights reserved.
|
2022-11-27 18:20:29 +00:00
|
|
|
// SPDX-License-Identifier: MIT
|
2017-03-11 14:30:29 +00:00
|
|
|
|
2022-09-02 19:18:23 +00:00
|
|
|
package integration
|
2017-03-11 14:30:29 +00:00
|
|
|
|
|
|
|
import (
|
2020-11-14 16:53:43 +00:00
|
|
|
"fmt"
|
2017-04-25 07:24:51 +00:00
|
|
|
"net/http"
|
2020-11-14 16:53:43 +00:00
|
|
|
"strings"
|
2017-03-11 14:30:29 +00:00
|
|
|
"testing"
|
|
|
|
|
2021-11-16 08:53:21 +00:00
|
|
|
"code.gitea.io/gitea/models/unittest"
|
2021-11-24 09:49:20 +00:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2017-04-25 07:24:51 +00:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2024-02-25 21:55:00 +00:00
|
|
|
"code.gitea.io/gitea/modules/test"
|
2022-06-26 14:19:22 +00:00
|
|
|
"code.gitea.io/gitea/modules/translation"
|
2022-09-02 19:18:23 +00:00
|
|
|
"code.gitea.io/gitea/tests"
|
2021-11-17 12:34:35 +00:00
|
|
|
|
2020-11-14 16:53:43 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
2017-04-25 07:24:51 +00:00
|
|
|
)
|
2017-03-11 14:30:29 +00:00
|
|
|
|
|
|
|
func TestSignup(t *testing.T) {
|
2022-09-02 19:18:23 +00:00
|
|
|
defer tests.PrepareTestEnv(t)()
|
2017-04-28 13:23:28 +00:00
|
|
|
|
2017-04-25 07:24:51 +00:00
|
|
|
setting.Service.EnableCaptcha = false
|
|
|
|
|
2017-06-17 04:49:45 +00:00
|
|
|
req := NewRequestWithValues(t, "POST", "/user/sign_up", map[string]string{
|
|
|
|
"user_name": "exampleUser",
|
|
|
|
"email": "exampleUser@example.com",
|
2019-11-09 03:40:37 +00:00
|
|
|
"password": "examplePassword!1",
|
|
|
|
"retype": "examplePassword!1",
|
2017-06-17 04:49:45 +00:00
|
|
|
})
|
2022-03-23 04:54:07 +00:00
|
|
|
MakeRequest(t, req, http.StatusSeeOther)
|
2017-03-11 14:30:29 +00:00
|
|
|
|
2017-04-25 07:24:51 +00:00
|
|
|
// should be able to view new user's page
|
2017-06-10 00:41:36 +00:00
|
|
|
req = NewRequest(t, "GET", "/exampleUser")
|
2017-07-07 19:36:47 +00:00
|
|
|
MakeRequest(t, req, http.StatusOK)
|
2017-03-11 14:30:29 +00:00
|
|
|
}
|
2020-11-14 16:53:43 +00:00
|
|
|
|
2021-07-15 19:19:48 +00:00
|
|
|
func TestSignupAsRestricted(t *testing.T) {
|
2022-09-02 19:18:23 +00:00
|
|
|
defer tests.PrepareTestEnv(t)()
|
2021-07-15 19:19:48 +00:00
|
|
|
|
|
|
|
setting.Service.EnableCaptcha = false
|
|
|
|
setting.Service.DefaultUserIsRestricted = true
|
|
|
|
|
|
|
|
req := NewRequestWithValues(t, "POST", "/user/sign_up", map[string]string{
|
|
|
|
"user_name": "restrictedUser",
|
|
|
|
"email": "restrictedUser@example.com",
|
|
|
|
"password": "examplePassword!1",
|
|
|
|
"retype": "examplePassword!1",
|
|
|
|
})
|
2022-03-23 04:54:07 +00:00
|
|
|
MakeRequest(t, req, http.StatusSeeOther)
|
2021-07-15 19:19:48 +00:00
|
|
|
|
|
|
|
// should be able to view new user's page
|
|
|
|
req = NewRequest(t, "GET", "/restrictedUser")
|
|
|
|
MakeRequest(t, req, http.StatusOK)
|
|
|
|
|
2022-08-16 02:22:25 +00:00
|
|
|
user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{Name: "restrictedUser"})
|
2021-07-15 19:19:48 +00:00
|
|
|
assert.True(t, user2.IsRestricted)
|
|
|
|
}
|
|
|
|
|
2024-02-25 21:55:00 +00:00
|
|
|
func TestSignupEmailValidation(t *testing.T) {
|
2022-09-02 19:18:23 +00:00
|
|
|
defer tests.PrepareTestEnv(t)()
|
2020-11-14 16:53:43 +00:00
|
|
|
|
|
|
|
setting.Service.EnableCaptcha = false
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
email string
|
|
|
|
wantStatus int
|
|
|
|
wantMsg string
|
|
|
|
}{
|
2024-02-14 21:48:45 +00:00
|
|
|
{"exampleUser@example.com\r\n", http.StatusOK, translation.NewLocale("en-US").TrString("form.email_invalid")},
|
|
|
|
{"exampleUser@example.com\r", http.StatusOK, translation.NewLocale("en-US").TrString("form.email_invalid")},
|
|
|
|
{"exampleUser@example.com\n", http.StatusOK, translation.NewLocale("en-US").TrString("form.email_invalid")},
|
2022-03-23 04:54:07 +00:00
|
|
|
{"exampleUser@example.com", http.StatusSeeOther, ""},
|
2020-11-14 16:53:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for i, test := range tests {
|
|
|
|
req := NewRequestWithValues(t, "POST", "/user/sign_up", map[string]string{
|
|
|
|
"user_name": fmt.Sprintf("exampleUser%d", i),
|
|
|
|
"email": test.email,
|
|
|
|
"password": "examplePassword!1",
|
|
|
|
"retype": "examplePassword!1",
|
|
|
|
})
|
|
|
|
resp := MakeRequest(t, req, test.wantStatus)
|
|
|
|
if test.wantMsg != "" {
|
|
|
|
htmlDoc := NewHTMLParser(t, resp.Body)
|
|
|
|
assert.Equal(t,
|
|
|
|
test.wantMsg,
|
|
|
|
strings.TrimSpace(htmlDoc.doc.Find(".ui.message").Text()),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2024-02-25 21:55:00 +00:00
|
|
|
|
|
|
|
func TestSignupEmailActive(t *testing.T) {
|
|
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
defer test.MockVariableValue(&setting.Service.RegisterEmailConfirm, true)()
|
|
|
|
|
|
|
|
// try to sign up and send the activation email
|
|
|
|
req := NewRequestWithValues(t, "POST", "/user/sign_up", map[string]string{
|
|
|
|
"user_name": "test-user-1",
|
|
|
|
"email": "email-1@example.com",
|
|
|
|
"password": "password1",
|
|
|
|
"retype": "password1",
|
|
|
|
})
|
|
|
|
resp := MakeRequest(t, req, http.StatusOK)
|
|
|
|
assert.Contains(t, resp.Body.String(), `A new confirmation email has been sent to <b>email-1@example.com</b>.`)
|
|
|
|
|
|
|
|
// access "user/active" means trying to re-send the activation email
|
|
|
|
session := loginUserWithPassword(t, "test-user-1", "password1")
|
|
|
|
resp = session.MakeRequest(t, NewRequest(t, "GET", "/user/activate"), http.StatusOK)
|
|
|
|
assert.Contains(t, resp.Body.String(), "You have already requested an activation email recently")
|
|
|
|
|
|
|
|
// access "user/active" with a valid activation code, then get the "verify password" page
|
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{Name: "test-user-1"})
|
|
|
|
activationCode := user.GenerateEmailActivateCode(user.Email)
|
|
|
|
resp = session.MakeRequest(t, NewRequest(t, "GET", "/user/activate?code="+activationCode), http.StatusOK)
|
|
|
|
assert.Contains(t, resp.Body.String(), `<input id="verify-password"`)
|
|
|
|
|
|
|
|
// try to use a wrong password, it should fail
|
|
|
|
req = NewRequestWithValues(t, "POST", "/user/activate", map[string]string{
|
|
|
|
"code": activationCode,
|
|
|
|
"password": "password-wrong",
|
|
|
|
})
|
|
|
|
resp = session.MakeRequest(t, req, http.StatusOK)
|
|
|
|
assert.Contains(t, resp.Body.String(), `Your password does not match`)
|
|
|
|
assert.Contains(t, resp.Body.String(), `<input id="verify-password"`)
|
|
|
|
user = unittest.AssertExistsAndLoadBean(t, &user_model.User{Name: "test-user-1"})
|
|
|
|
assert.False(t, user.IsActive)
|
|
|
|
|
|
|
|
// then use a correct password, the user should be activated
|
|
|
|
req = NewRequestWithValues(t, "POST", "/user/activate", map[string]string{
|
|
|
|
"code": activationCode,
|
|
|
|
"password": "password1",
|
|
|
|
})
|
|
|
|
resp = session.MakeRequest(t, req, http.StatusSeeOther)
|
|
|
|
assert.Equal(t, "/", test.RedirectURL(resp))
|
|
|
|
user = unittest.AssertExistsAndLoadBean(t, &user_model.User{Name: "test-user-1"})
|
|
|
|
assert.True(t, user.IsActive)
|
|
|
|
}
|