1
0
mirror of https://gitcode.com/gitea/gitea.git synced 2025-06-16 17:59:25 +08:00

Convert to url auth to header auth in tests ()

Related 
This commit is contained in:
KN4CK3R
2023-12-22 00:59:59 +01:00
committed by GitHub
parent 04b235d094
commit 838db2f891
102 changed files with 1715 additions and 1523 deletions
tests/integration
api_actions_artifact_test.goapi_activitypub_person_test.goapi_admin_org_test.goapi_admin_test.goapi_branch_test.goapi_comment_attachment_test.goapi_comment_test.goapi_gpg_keys_test.goapi_helper_for_declarative_test.goapi_httpsig_test.goapi_issue_attachment_test.goapi_issue_label_test.goapi_issue_milestone_test.goapi_issue_pin_test.goapi_issue_reaction_test.goapi_issue_stopwatch_test.goapi_issue_subscription_test.goapi_issue_test.goapi_issue_tracked_time_test.goapi_keys_test.goapi_nodeinfo_test.goapi_notification_test.goapi_oauth2_apps_test.goapi_org_avatar_test.goapi_org_test.goapi_packages_alpine_test.goapi_packages_cargo_test.goapi_packages_chef_test.goapi_packages_composer_test.goapi_packages_conan_test.goapi_packages_conda_test.goapi_packages_container_test.goapi_packages_cran_test.goapi_packages_debian_test.goapi_packages_generic_test.goapi_packages_goproxy_test.goapi_packages_helm_test.goapi_packages_maven_test.goapi_packages_npm_test.goapi_packages_nuget_test.goapi_packages_pub_test.goapi_packages_pypi_test.goapi_packages_rpm_test.goapi_packages_rubygems_test.goapi_packages_swift_test.goapi_packages_test.goapi_packages_vagrant_test.goapi_pull_review_test.goapi_pull_test.goapi_releases_test.goapi_repo_avatar_test.goapi_repo_collaborator_test.goapi_repo_edit_test.goapi_repo_file_create_test.goapi_repo_file_delete_test.goapi_repo_file_update_test.goapi_repo_files_change_test.goapi_repo_get_contents_list_test.goapi_repo_get_contents_test.goapi_repo_git_blobs_test.goapi_repo_git_commits_test.goapi_repo_git_hook_test.goapi_repo_git_notes_test.goapi_repo_git_ref_test.goapi_repo_git_tags_test.goapi_repo_git_trees_test.goapi_repo_hook_test.goapi_repo_lfs_migrate_test.goapi_repo_lfs_test.goapi_repo_raw_test.goapi_repo_secrets_test.goapi_repo_tags_test.goapi_repo_teams_test.goapi_repo_test.goapi_repo_topic_test.goapi_team_test.goapi_team_user_test.goapi_token_test.goapi_twofa_test.goapi_user_avatar_test.goapi_user_email_test.goapi_user_follow_test.goapi_user_heatmap_test.goapi_user_info_test.goapi_user_org_perm_test.goapi_user_orgs_test.goapi_user_search_test.goapi_user_secrets_test.goapi_user_star_test.goapi_user_watch_test.goapi_wiki_test.gocors_test.goempty_repo_test.goeventsource_test.gointegration_test.goorg_test.goprivateactivity_test.gopull_merge_test.gopull_status_test.gopull_update_test.gorepo_search_test.gouser_test.go

@ -32,8 +32,8 @@ func TestAPIListGitHooks(t *testing.T) {
// user1 is an admin user
session := loginUser(t, "user1")
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadRepository)
req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git?token=%s",
owner.Name, repo.Name, token)
req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git", owner.Name, repo.Name).
AddTokenAuth(token)
resp := MakeRequest(t, req, http.StatusOK)
var apiGitHooks []*api.GitHook
DecodeJSON(t, resp, &apiGitHooks)
@ -58,8 +58,8 @@ func TestAPIListGitHooksNoHooks(t *testing.T) {
// user1 is an admin user
session := loginUser(t, "user1")
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadRepository)
req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git?token=%s",
owner.Name, repo.Name, token)
req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git", owner.Name, repo.Name).
AddTokenAuth(token)
resp := MakeRequest(t, req, http.StatusOK)
var apiGitHooks []*api.GitHook
DecodeJSON(t, resp, &apiGitHooks)
@ -78,8 +78,8 @@ func TestAPIListGitHooksNoAccess(t *testing.T) {
session := loginUser(t, owner.Name)
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadRepository)
req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git?token=%s",
owner.Name, repo.Name, token)
req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git", owner.Name, repo.Name).
AddTokenAuth(token)
MakeRequest(t, req, http.StatusForbidden)
}
@ -92,8 +92,8 @@ func TestAPIGetGitHook(t *testing.T) {
// user1 is an admin user
session := loginUser(t, "user1")
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadRepository)
req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s",
owner.Name, repo.Name, token)
req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive", owner.Name, repo.Name).
AddTokenAuth(token)
resp := MakeRequest(t, req, http.StatusOK)
var apiGitHook *api.GitHook
DecodeJSON(t, resp, &apiGitHook)
@ -109,8 +109,8 @@ func TestAPIGetGitHookNoAccess(t *testing.T) {
session := loginUser(t, owner.Name)
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadRepository)
req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s",
owner.Name, repo.Name, token)
req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive", owner.Name, repo.Name).
AddTokenAuth(token)
MakeRequest(t, req, http.StatusForbidden)
}
@ -124,19 +124,19 @@ func TestAPIEditGitHook(t *testing.T) {
session := loginUser(t, "user1")
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
urlStr := fmt.Sprintf("/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s",
owner.Name, repo.Name, token)
urlStr := fmt.Sprintf("/api/v1/repos/%s/%s/hooks/git/pre-receive",
owner.Name, repo.Name)
req := NewRequestWithJSON(t, "PATCH", urlStr, &api.EditGitHookOption{
Content: testHookContent,
})
}).AddTokenAuth(token)
resp := MakeRequest(t, req, http.StatusOK)
var apiGitHook *api.GitHook
DecodeJSON(t, resp, &apiGitHook)
assert.True(t, apiGitHook.IsActive)
assert.Equal(t, testHookContent, apiGitHook.Content)
req = NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s",
owner.Name, repo.Name, token)
req = NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive", owner.Name, repo.Name).
AddTokenAuth(token)
resp = MakeRequest(t, req, http.StatusOK)
var apiGitHook2 *api.GitHook
DecodeJSON(t, resp, &apiGitHook2)
@ -152,11 +152,10 @@ func TestAPIEditGitHookNoAccess(t *testing.T) {
session := loginUser(t, owner.Name)
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
urlStr := fmt.Sprintf("/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s",
owner.Name, repo.Name, token)
urlStr := fmt.Sprintf("/api/v1/repos/%s/%s/hooks/git/pre-receive", owner.Name, repo.Name)
req := NewRequestWithJSON(t, "PATCH", urlStr, &api.EditGitHookOption{
Content: testHookContent,
})
}).AddTokenAuth(token)
MakeRequest(t, req, http.StatusForbidden)
}
@ -170,12 +169,12 @@ func TestAPIDeleteGitHook(t *testing.T) {
session := loginUser(t, "user1")
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
req := NewRequestf(t, "DELETE", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s",
owner.Name, repo.Name, token)
req := NewRequestf(t, "DELETE", "/api/v1/repos/%s/%s/hooks/git/pre-receive", owner.Name, repo.Name).
AddTokenAuth(token)
MakeRequest(t, req, http.StatusNoContent)
req = NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s",
owner.Name, repo.Name, token)
req = NewRequestf(t, "GET", "/api/v1/repos/%s/%s/hooks/git/pre-receive", owner.Name, repo.Name).
AddTokenAuth(token)
resp := MakeRequest(t, req, http.StatusOK)
var apiGitHook2 *api.GitHook
DecodeJSON(t, resp, &apiGitHook2)
@ -191,7 +190,7 @@ func TestAPIDeleteGitHookNoAccess(t *testing.T) {
session := loginUser(t, owner.Name)
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
req := NewRequestf(t, "DELETE", "/api/v1/repos/%s/%s/hooks/git/pre-receive?token=%s",
owner.Name, repo.Name, token)
req := NewRequestf(t, "DELETE", "/api/v1/repos/%s/%s/hooks/git/pre-receive", owner.Name, repo.Name).
AddTokenAuth(token)
MakeRequest(t, req, http.StatusForbidden)
}