195 lines
5.4 KiB
Rust
195 lines
5.4 KiB
Rust
|
use forgejo_api::structs::*;
|
||
|
|
||
|
mod common;
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn user() {
|
||
|
let api = common::login();
|
||
|
|
||
|
let user_opt = CreateUserOption {
|
||
|
created_at: None,
|
||
|
email: "pipis@noreply.example.org".into(),
|
||
|
full_name: None,
|
||
|
login_name: None,
|
||
|
must_change_password: None,
|
||
|
password: Some("userpass".into()),
|
||
|
restricted: Some(false),
|
||
|
send_notify: Some(true),
|
||
|
source_id: None,
|
||
|
username: "Pipis".into(),
|
||
|
visibility: Some("public".into()),
|
||
|
};
|
||
|
let _ = api
|
||
|
.admin_create_user(user_opt)
|
||
|
.await
|
||
|
.expect("failed to create user");
|
||
|
|
||
|
let query = AdminSearchUsersQuery::default();
|
||
|
let users = api
|
||
|
.admin_search_users(query)
|
||
|
.await
|
||
|
.expect("failed to search users");
|
||
|
assert!(
|
||
|
users
|
||
|
.iter()
|
||
|
.find(|u| u.login.as_ref().unwrap() == "Pipis")
|
||
|
.is_some(),
|
||
|
"could not find new user"
|
||
|
);
|
||
|
let query = AdminGetAllEmailsQuery::default();
|
||
|
let users = api
|
||
|
.admin_get_all_emails(query)
|
||
|
.await
|
||
|
.expect("failed to search emails");
|
||
|
assert!(
|
||
|
users
|
||
|
.iter()
|
||
|
.find(|u| u.email.as_ref().unwrap() == "pipis@noreply.example.org")
|
||
|
.is_some(),
|
||
|
"could not find new user"
|
||
|
);
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn org() {
|
||
|
let api = common::login();
|
||
|
|
||
|
let user_opt = CreateUserOption {
|
||
|
created_at: None,
|
||
|
email: "org-owner@noreply.example.org".into(),
|
||
|
full_name: None,
|
||
|
login_name: None,
|
||
|
must_change_password: None,
|
||
|
password: Some("userpass".into()),
|
||
|
restricted: Some(false),
|
||
|
send_notify: Some(true),
|
||
|
source_id: None,
|
||
|
username: "OrgOwner".into(),
|
||
|
visibility: Some("public".into()),
|
||
|
};
|
||
|
let _ = api
|
||
|
.admin_create_user(user_opt)
|
||
|
.await
|
||
|
.expect("failed to create user");
|
||
|
|
||
|
let org_opt = CreateOrgOption {
|
||
|
description: None,
|
||
|
email: None,
|
||
|
full_name: None,
|
||
|
location: None,
|
||
|
repo_admin_change_team_access: None,
|
||
|
username: "test-org".into(),
|
||
|
visibility: Some(CreateOrgOptionVisibility::Public),
|
||
|
website: None,
|
||
|
};
|
||
|
let _ = api
|
||
|
.admin_create_org("OrgOwner", org_opt)
|
||
|
.await
|
||
|
.expect("failed to create org");
|
||
|
let query = AdminGetAllOrgsQuery::default();
|
||
|
assert!(
|
||
|
!api.admin_get_all_orgs(query).await.unwrap().is_empty(),
|
||
|
"org list empty"
|
||
|
);
|
||
|
let rename_opt = RenameUserOption {
|
||
|
new_username: "Bepis".into(),
|
||
|
};
|
||
|
api.admin_rename_user("Pipis", rename_opt)
|
||
|
.await
|
||
|
.expect("failed to rename user");
|
||
|
let query = AdminDeleteUserQuery { purge: Some(true) };
|
||
|
api.admin_delete_user("Bepis", query)
|
||
|
.await
|
||
|
.expect("failed to delete user");
|
||
|
let query = AdminDeleteUserQuery { purge: Some(true) };
|
||
|
assert!(
|
||
|
api.admin_delete_user("Ghost", query).await.is_err(),
|
||
|
"deleting fake user should fail"
|
||
|
);
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn key() {
|
||
|
let api = common::login();
|
||
|
|
||
|
let user_opt = CreateUserOption {
|
||
|
created_at: None,
|
||
|
email: "key-holder@noreply.example.org".into(),
|
||
|
full_name: None,
|
||
|
login_name: None,
|
||
|
must_change_password: None,
|
||
|
password: Some("userpass".into()),
|
||
|
restricted: Some(false),
|
||
|
send_notify: Some(true),
|
||
|
source_id: None,
|
||
|
username: "KeyHolder".into(),
|
||
|
visibility: Some("public".into()),
|
||
|
};
|
||
|
let _ = api
|
||
|
.admin_create_user(user_opt)
|
||
|
.await
|
||
|
.expect("failed to create user");
|
||
|
|
||
|
let key_opt = CreateKeyOption {
|
||
|
key: "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN68ehQAsbGEwlXPa2AxbAh1QxFQrtRel2jeC0hRlPc1 user@noreply.example.org".into(),
|
||
|
read_only: None,
|
||
|
title: "Example Key".into(),
|
||
|
};
|
||
|
let key = api
|
||
|
.admin_create_public_key("KeyHolder", key_opt)
|
||
|
.await
|
||
|
.expect("failed to create key");
|
||
|
api.admin_delete_user_public_key("KeyHolder", key.id.unwrap() as u64)
|
||
|
.await
|
||
|
.expect("failed to delete key");
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn cron() {
|
||
|
let api = common::login();
|
||
|
|
||
|
let query = AdminCronListQuery::default();
|
||
|
let crons = api
|
||
|
.admin_cron_list(query)
|
||
|
.await
|
||
|
.expect("failed to get crons list");
|
||
|
api.admin_cron_run(&crons.get(0).expect("no crons").name.as_ref().unwrap())
|
||
|
.await
|
||
|
.expect("failed to run cron");
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn hook() {
|
||
|
let api = common::login();
|
||
|
let hook_opt = CreateHookOption {
|
||
|
active: None,
|
||
|
authorization_header: None,
|
||
|
branch_filter: None,
|
||
|
config: CreateHookOptionConfig {
|
||
|
content_type: "json".into(),
|
||
|
url: url::Url::parse("http://test.local/").unwrap(),
|
||
|
additional: Default::default(),
|
||
|
},
|
||
|
events: Some(Vec::new()),
|
||
|
r#type: CreateHookOptionType::Gitea,
|
||
|
};
|
||
|
// yarr har har me matey this is me hook
|
||
|
let hook = api
|
||
|
.admin_create_hook(hook_opt)
|
||
|
.await
|
||
|
.expect("failed to create hook");
|
||
|
let edit_hook = EditHookOption {
|
||
|
active: Some(true),
|
||
|
authorization_header: None,
|
||
|
branch_filter: None,
|
||
|
config: None,
|
||
|
events: None,
|
||
|
};
|
||
|
api.admin_edit_hook(hook.id.unwrap() as u64, edit_hook)
|
||
|
.await
|
||
|
.expect("failed to edit hook");
|
||
|
api.admin_delete_hook(hook.id.unwrap() as u64)
|
||
|
.await
|
||
|
.expect("failed to delete hook");
|
||
|
}
|