users_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package db
  5. import (
  6. "context"
  7. "fmt"
  8. "os"
  9. "strings"
  10. "testing"
  11. "time"
  12. "github.com/stretchr/testify/assert"
  13. "github.com/stretchr/testify/require"
  14. "gorm.io/gorm"
  15. "gogs.io/gogs/internal/auth"
  16. "gogs.io/gogs/internal/dbtest"
  17. "gogs.io/gogs/internal/errutil"
  18. "gogs.io/gogs/internal/osutil"
  19. "gogs.io/gogs/internal/userutil"
  20. "gogs.io/gogs/public"
  21. )
  22. func TestUser_BeforeCreate(t *testing.T) {
  23. now := time.Now()
  24. db := &gorm.DB{
  25. Config: &gorm.Config{
  26. SkipDefaultTransaction: true,
  27. NowFunc: func() time.Time {
  28. return now
  29. },
  30. },
  31. }
  32. t.Run("CreatedUnix has been set", func(t *testing.T) {
  33. user := &User{
  34. CreatedUnix: 1,
  35. }
  36. _ = user.BeforeCreate(db)
  37. assert.Equal(t, int64(1), user.CreatedUnix)
  38. assert.Equal(t, int64(0), user.UpdatedUnix)
  39. })
  40. t.Run("CreatedUnix has not been set", func(t *testing.T) {
  41. user := &User{}
  42. _ = user.BeforeCreate(db)
  43. assert.Equal(t, db.NowFunc().Unix(), user.CreatedUnix)
  44. assert.Equal(t, db.NowFunc().Unix(), user.UpdatedUnix)
  45. })
  46. }
  47. func TestUser_AfterFind(t *testing.T) {
  48. now := time.Now()
  49. db := &gorm.DB{
  50. Config: &gorm.Config{
  51. SkipDefaultTransaction: true,
  52. NowFunc: func() time.Time {
  53. return now
  54. },
  55. },
  56. }
  57. user := &User{
  58. CreatedUnix: now.Unix(),
  59. UpdatedUnix: now.Unix(),
  60. }
  61. _ = user.AfterFind(db)
  62. assert.Equal(t, user.CreatedUnix, user.Created.Unix())
  63. assert.Equal(t, user.UpdatedUnix, user.Updated.Unix())
  64. }
  65. func TestUsers(t *testing.T) {
  66. if testing.Short() {
  67. t.Skip()
  68. }
  69. t.Parallel()
  70. tables := []interface{}{new(User), new(EmailAddress), new(Repository), new(Follow)}
  71. db := &users{
  72. DB: dbtest.NewDB(t, "users", tables...),
  73. }
  74. for _, tc := range []struct {
  75. name string
  76. test func(t *testing.T, db *users)
  77. }{
  78. {"Authenticate", usersAuthenticate},
  79. {"Create", usersCreate},
  80. {"DeleteCustomAvatar", usersDeleteCustomAvatar},
  81. {"GetByEmail", usersGetByEmail},
  82. {"GetByID", usersGetByID},
  83. {"GetByUsername", usersGetByUsername},
  84. {"HasForkedRepository", usersHasForkedRepository},
  85. {"IsUsernameUsed", usersIsUsernameUsed},
  86. {"ListFollowers", usersListFollowers},
  87. {"ListFollowings", usersListFollowings},
  88. {"UseCustomAvatar", usersUseCustomAvatar},
  89. } {
  90. t.Run(tc.name, func(t *testing.T) {
  91. t.Cleanup(func() {
  92. err := clearTables(t, db.DB, tables...)
  93. require.NoError(t, err)
  94. })
  95. tc.test(t, db)
  96. })
  97. if t.Failed() {
  98. break
  99. }
  100. }
  101. }
  102. func usersAuthenticate(t *testing.T, db *users) {
  103. ctx := context.Background()
  104. password := "pa$$word"
  105. alice, err := db.Create(ctx, "alice", "alice@example.com",
  106. CreateUserOptions{
  107. Password: password,
  108. },
  109. )
  110. require.NoError(t, err)
  111. t.Run("user not found", func(t *testing.T) {
  112. _, err := db.Authenticate(ctx, "bob", password, -1)
  113. wantErr := auth.ErrBadCredentials{Args: map[string]interface{}{"login": "bob"}}
  114. assert.Equal(t, wantErr, err)
  115. })
  116. t.Run("invalid password", func(t *testing.T) {
  117. _, err := db.Authenticate(ctx, alice.Name, "bad_password", -1)
  118. wantErr := auth.ErrBadCredentials{Args: map[string]interface{}{"login": alice.Name, "userID": alice.ID}}
  119. assert.Equal(t, wantErr, err)
  120. })
  121. t.Run("via email and password", func(t *testing.T) {
  122. user, err := db.Authenticate(ctx, alice.Email, password, -1)
  123. require.NoError(t, err)
  124. assert.Equal(t, alice.Name, user.Name)
  125. })
  126. t.Run("via username and password", func(t *testing.T) {
  127. user, err := db.Authenticate(ctx, alice.Name, password, -1)
  128. require.NoError(t, err)
  129. assert.Equal(t, alice.Name, user.Name)
  130. })
  131. t.Run("login source mismatch", func(t *testing.T) {
  132. _, err := db.Authenticate(ctx, alice.Email, password, 1)
  133. gotErr := fmt.Sprintf("%v", err)
  134. wantErr := ErrLoginSourceMismatch{args: map[string]interface{}{"actual": 0, "expect": 1}}.Error()
  135. assert.Equal(t, wantErr, gotErr)
  136. })
  137. t.Run("via login source", func(t *testing.T) {
  138. mockLoginSources := NewMockLoginSourcesStore()
  139. mockLoginSources.GetByIDFunc.SetDefaultHook(func(ctx context.Context, id int64) (*LoginSource, error) {
  140. mockProvider := NewMockProvider()
  141. mockProvider.AuthenticateFunc.SetDefaultReturn(&auth.ExternalAccount{}, nil)
  142. s := &LoginSource{
  143. IsActived: true,
  144. Provider: mockProvider,
  145. }
  146. return s, nil
  147. })
  148. setMockLoginSourcesStore(t, mockLoginSources)
  149. bob, err := db.Create(ctx, "bob", "bob@example.com",
  150. CreateUserOptions{
  151. Password: password,
  152. LoginSource: 1,
  153. },
  154. )
  155. require.NoError(t, err)
  156. user, err := db.Authenticate(ctx, bob.Email, password, 1)
  157. require.NoError(t, err)
  158. assert.Equal(t, bob.Name, user.Name)
  159. })
  160. t.Run("new user via login source", func(t *testing.T) {
  161. mockLoginSources := NewMockLoginSourcesStore()
  162. mockLoginSources.GetByIDFunc.SetDefaultHook(func(ctx context.Context, id int64) (*LoginSource, error) {
  163. mockProvider := NewMockProvider()
  164. mockProvider.AuthenticateFunc.SetDefaultReturn(
  165. &auth.ExternalAccount{
  166. Name: "cindy",
  167. Email: "cindy@example.com",
  168. },
  169. nil,
  170. )
  171. s := &LoginSource{
  172. IsActived: true,
  173. Provider: mockProvider,
  174. }
  175. return s, nil
  176. })
  177. setMockLoginSourcesStore(t, mockLoginSources)
  178. user, err := db.Authenticate(ctx, "cindy", password, 1)
  179. require.NoError(t, err)
  180. assert.Equal(t, "cindy", user.Name)
  181. user, err = db.GetByUsername(ctx, "cindy")
  182. require.NoError(t, err)
  183. assert.Equal(t, "cindy@example.com", user.Email)
  184. })
  185. }
  186. func usersCreate(t *testing.T, db *users) {
  187. ctx := context.Background()
  188. alice, err := db.Create(
  189. ctx,
  190. "alice",
  191. "alice@example.com",
  192. CreateUserOptions{
  193. Activated: true,
  194. },
  195. )
  196. require.NoError(t, err)
  197. t.Run("name not allowed", func(t *testing.T) {
  198. _, err := db.Create(ctx, "-", "", CreateUserOptions{})
  199. wantErr := ErrNameNotAllowed{
  200. args: errutil.Args{
  201. "reason": "reserved",
  202. "name": "-",
  203. },
  204. }
  205. assert.Equal(t, wantErr, err)
  206. })
  207. t.Run("name already exists", func(t *testing.T) {
  208. _, err := db.Create(ctx, alice.Name, "", CreateUserOptions{})
  209. wantErr := ErrUserAlreadyExist{
  210. args: errutil.Args{
  211. "name": alice.Name,
  212. },
  213. }
  214. assert.Equal(t, wantErr, err)
  215. })
  216. t.Run("email already exists", func(t *testing.T) {
  217. _, err := db.Create(ctx, "bob", alice.Email, CreateUserOptions{})
  218. wantErr := ErrEmailAlreadyUsed{
  219. args: errutil.Args{
  220. "email": alice.Email,
  221. },
  222. }
  223. assert.Equal(t, wantErr, err)
  224. })
  225. user, err := db.GetByUsername(ctx, alice.Name)
  226. require.NoError(t, err)
  227. assert.Equal(t, db.NowFunc().Format(time.RFC3339), user.Created.UTC().Format(time.RFC3339))
  228. assert.Equal(t, db.NowFunc().Format(time.RFC3339), user.Updated.UTC().Format(time.RFC3339))
  229. }
  230. func usersDeleteCustomAvatar(t *testing.T, db *users) {
  231. ctx := context.Background()
  232. alice, err := db.Create(ctx, "alice", "alice@example.com", CreateUserOptions{})
  233. require.NoError(t, err)
  234. avatar, err := public.Files.ReadFile("img/avatar_default.png")
  235. require.NoError(t, err)
  236. avatarPath := userutil.CustomAvatarPath(alice.ID)
  237. _ = os.Remove(avatarPath)
  238. defer func() { _ = os.Remove(avatarPath) }()
  239. err = db.UseCustomAvatar(ctx, alice.ID, avatar)
  240. require.NoError(t, err)
  241. // Make sure avatar is saved and the user flag is updated.
  242. got := osutil.IsFile(avatarPath)
  243. assert.True(t, got)
  244. alice, err = db.GetByID(ctx, alice.ID)
  245. require.NoError(t, err)
  246. assert.True(t, alice.UseCustomAvatar)
  247. // Delete avatar should remove the file and revert the user flag.
  248. err = db.DeleteCustomAvatar(ctx, alice.ID)
  249. require.NoError(t, err)
  250. got = osutil.IsFile(avatarPath)
  251. assert.False(t, got)
  252. alice, err = db.GetByID(ctx, alice.ID)
  253. require.NoError(t, err)
  254. assert.False(t, alice.UseCustomAvatar)
  255. }
  256. func usersGetByEmail(t *testing.T, db *users) {
  257. ctx := context.Background()
  258. t.Run("empty email", func(t *testing.T) {
  259. _, err := db.GetByEmail(ctx, "")
  260. wantErr := ErrUserNotExist{args: errutil.Args{"email": ""}}
  261. assert.Equal(t, wantErr, err)
  262. })
  263. t.Run("ignore organization", func(t *testing.T) {
  264. // TODO: Use Orgs.Create to replace SQL hack when the method is available.
  265. org, err := db.Create(ctx, "gogs", "gogs@exmaple.com", CreateUserOptions{})
  266. require.NoError(t, err)
  267. err = db.Model(&User{}).Where("id", org.ID).UpdateColumn("type", UserTypeOrganization).Error
  268. require.NoError(t, err)
  269. _, err = db.GetByEmail(ctx, org.Email)
  270. wantErr := ErrUserNotExist{args: errutil.Args{"email": org.Email}}
  271. assert.Equal(t, wantErr, err)
  272. })
  273. t.Run("by primary email", func(t *testing.T) {
  274. alice, err := db.Create(ctx, "alice", "alice@exmaple.com", CreateUserOptions{})
  275. require.NoError(t, err)
  276. _, err = db.GetByEmail(ctx, alice.Email)
  277. wantErr := ErrUserNotExist{args: errutil.Args{"email": alice.Email}}
  278. assert.Equal(t, wantErr, err)
  279. // Mark user as activated
  280. // TODO: Use UserEmails.Verify to replace SQL hack when the method is available.
  281. err = db.Model(&User{}).Where("id", alice.ID).UpdateColumn("is_active", true).Error
  282. require.NoError(t, err)
  283. user, err := db.GetByEmail(ctx, alice.Email)
  284. require.NoError(t, err)
  285. assert.Equal(t, alice.Name, user.Name)
  286. })
  287. t.Run("by secondary email", func(t *testing.T) {
  288. bob, err := db.Create(ctx, "bob", "bob@example.com", CreateUserOptions{})
  289. require.NoError(t, err)
  290. // TODO: Use UserEmails.Create to replace SQL hack when the method is available.
  291. email2 := "bob2@exmaple.com"
  292. err = db.Exec(`INSERT INTO email_address (uid, email) VALUES (?, ?)`, bob.ID, email2).Error
  293. require.NoError(t, err)
  294. _, err = db.GetByEmail(ctx, email2)
  295. wantErr := ErrUserNotExist{args: errutil.Args{"email": email2}}
  296. assert.Equal(t, wantErr, err)
  297. // TODO: Use UserEmails.Verify to replace SQL hack when the method is available.
  298. err = db.Exec(`UPDATE email_address SET is_activated = ? WHERE email = ?`, true, email2).Error
  299. require.NoError(t, err)
  300. user, err := db.GetByEmail(ctx, email2)
  301. require.NoError(t, err)
  302. assert.Equal(t, bob.Name, user.Name)
  303. })
  304. }
  305. func usersGetByID(t *testing.T, db *users) {
  306. ctx := context.Background()
  307. alice, err := db.Create(ctx, "alice", "alice@exmaple.com", CreateUserOptions{})
  308. require.NoError(t, err)
  309. user, err := db.GetByID(ctx, alice.ID)
  310. require.NoError(t, err)
  311. assert.Equal(t, alice.Name, user.Name)
  312. _, err = db.GetByID(ctx, 404)
  313. wantErr := ErrUserNotExist{args: errutil.Args{"userID": int64(404)}}
  314. assert.Equal(t, wantErr, err)
  315. }
  316. func usersGetByUsername(t *testing.T, db *users) {
  317. ctx := context.Background()
  318. alice, err := db.Create(ctx, "alice", "alice@exmaple.com", CreateUserOptions{})
  319. require.NoError(t, err)
  320. user, err := db.GetByUsername(ctx, alice.Name)
  321. require.NoError(t, err)
  322. assert.Equal(t, alice.Name, user.Name)
  323. _, err = db.GetByUsername(ctx, "bad_username")
  324. wantErr := ErrUserNotExist{args: errutil.Args{"name": "bad_username"}}
  325. assert.Equal(t, wantErr, err)
  326. }
  327. func usersHasForkedRepository(t *testing.T, db *users) {
  328. ctx := context.Background()
  329. has := db.HasForkedRepository(ctx, 1, 1)
  330. assert.False(t, has)
  331. _, err := NewReposStore(db.DB).Create(
  332. ctx,
  333. 1,
  334. CreateRepoOptions{
  335. Name: "repo1",
  336. ForkID: 1,
  337. },
  338. )
  339. require.NoError(t, err)
  340. has = db.HasForkedRepository(ctx, 1, 1)
  341. assert.True(t, has)
  342. }
  343. func usersIsUsernameUsed(t *testing.T, db *users) {
  344. ctx := context.Background()
  345. alice, err := db.Create(ctx, "alice", "alice@example.com", CreateUserOptions{})
  346. require.NoError(t, err)
  347. got := db.IsUsernameUsed(ctx, alice.Name)
  348. assert.True(t, got)
  349. got = db.IsUsernameUsed(ctx, "bob")
  350. assert.False(t, got)
  351. }
  352. func usersListFollowers(t *testing.T, db *users) {
  353. ctx := context.Background()
  354. john, err := db.Create(ctx, "john", "john@example.com", CreateUserOptions{})
  355. require.NoError(t, err)
  356. got, err := db.ListFollowers(ctx, john.ID, 1, 1)
  357. require.NoError(t, err)
  358. assert.Empty(t, got)
  359. alice, err := db.Create(ctx, "alice", "alice@example.com", CreateUserOptions{})
  360. require.NoError(t, err)
  361. bob, err := db.Create(ctx, "bob", "bob@example.com", CreateUserOptions{})
  362. require.NoError(t, err)
  363. followsStore := NewFollowsStore(db.DB)
  364. err = followsStore.Follow(ctx, alice.ID, john.ID)
  365. require.NoError(t, err)
  366. err = followsStore.Follow(ctx, bob.ID, john.ID)
  367. require.NoError(t, err)
  368. // First page only has bob
  369. got, err = db.ListFollowers(ctx, john.ID, 1, 1)
  370. require.NoError(t, err)
  371. require.Len(t, got, 1)
  372. assert.Equal(t, bob.ID, got[0].ID)
  373. // Second page only has alice
  374. got, err = db.ListFollowers(ctx, john.ID, 2, 1)
  375. require.NoError(t, err)
  376. require.Len(t, got, 1)
  377. assert.Equal(t, alice.ID, got[0].ID)
  378. }
  379. func usersListFollowings(t *testing.T, db *users) {
  380. ctx := context.Background()
  381. john, err := db.Create(ctx, "john", "john@example.com", CreateUserOptions{})
  382. require.NoError(t, err)
  383. got, err := db.ListFollowers(ctx, john.ID, 1, 1)
  384. require.NoError(t, err)
  385. assert.Empty(t, got)
  386. alice, err := db.Create(ctx, "alice", "alice@example.com", CreateUserOptions{})
  387. require.NoError(t, err)
  388. bob, err := db.Create(ctx, "bob", "bob@example.com", CreateUserOptions{})
  389. require.NoError(t, err)
  390. followsStore := NewFollowsStore(db.DB)
  391. err = followsStore.Follow(ctx, john.ID, alice.ID)
  392. require.NoError(t, err)
  393. err = followsStore.Follow(ctx, john.ID, bob.ID)
  394. require.NoError(t, err)
  395. // First page only has bob
  396. got, err = db.ListFollowings(ctx, john.ID, 1, 1)
  397. require.NoError(t, err)
  398. require.Len(t, got, 1)
  399. assert.Equal(t, bob.ID, got[0].ID)
  400. // Second page only has alice
  401. got, err = db.ListFollowings(ctx, john.ID, 2, 1)
  402. require.NoError(t, err)
  403. require.Len(t, got, 1)
  404. assert.Equal(t, alice.ID, got[0].ID)
  405. }
  406. func usersUseCustomAvatar(t *testing.T, db *users) {
  407. ctx := context.Background()
  408. alice, err := db.Create(ctx, "alice", "alice@example.com", CreateUserOptions{})
  409. require.NoError(t, err)
  410. avatar, err := public.Files.ReadFile("img/avatar_default.png")
  411. require.NoError(t, err)
  412. avatarPath := userutil.CustomAvatarPath(alice.ID)
  413. _ = os.Remove(avatarPath)
  414. defer func() { _ = os.Remove(avatarPath) }()
  415. err = db.UseCustomAvatar(ctx, alice.ID, avatar)
  416. require.NoError(t, err)
  417. // Make sure avatar is saved and the user flag is updated.
  418. got := osutil.IsFile(avatarPath)
  419. assert.True(t, got)
  420. alice, err = db.GetByID(ctx, alice.ID)
  421. require.NoError(t, err)
  422. assert.True(t, alice.UseCustomAvatar)
  423. }
  424. func TestIsUsernameAllowed(t *testing.T) {
  425. for name := range reservedUsernames {
  426. t.Run(name, func(t *testing.T) {
  427. assert.True(t, IsErrNameNotAllowed(isUsernameAllowed(name)))
  428. })
  429. }
  430. for _, pattern := range reservedUsernamePatterns {
  431. t.Run(pattern, func(t *testing.T) {
  432. username := strings.ReplaceAll(pattern, "*", "alice")
  433. assert.True(t, IsErrNameNotAllowed(isUsernameAllowed(username)))
  434. })
  435. }
  436. }