mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-11-10 12:15:43 +01:00
4de909747b
Some checks are pending
/ release (push) Waiting to run
testing / test-remote-cacher (map[image:redis:7.2 port:6379]) (push) Blocked by required conditions
testing / test-remote-cacher (map[image:registry.redict.io/redict:7.3.0-scratch port:6379]) (push) Blocked by required conditions
testing / test-mysql (push) Blocked by required conditions
testing / test-pgsql (push) Blocked by required conditions
testing / backend-checks (push) Waiting to run
testing / frontend-checks (push) Waiting to run
testing / test-unit (push) Blocked by required conditions
testing / test-remote-cacher (map[image:docker.io/valkey/valkey:7.2.5-alpine3.19 port:6379]) (push) Blocked by required conditions
testing / test-remote-cacher (map[image:ghcr.io/microsoft/garnet-alpine:1.0.14 port:6379]) (push) Blocked by required conditions
testing / test-sqlite (push) Blocked by required conditions
testing / security-check (push) Blocked by required conditions
go-require lint is ignored for now Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/4535 Reviewed-by: Gusted <gusted@noreply.codeberg.org> Co-authored-by: TheFox0x7 <thefox0x7@gmail.com> Co-committed-by: TheFox0x7 <thefox0x7@gmail.com>
133 lines
4 KiB
Go
133 lines
4 KiB
Go
// Copyright 2023 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package setting
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"code.gitea.io/gitea/modules/structs"
|
|
|
|
"github.com/gobwas/glob"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestLoadServices(t *testing.T) {
|
|
oldService := Service
|
|
defer func() {
|
|
Service = oldService
|
|
}()
|
|
|
|
cfg, err := NewConfigProviderFromData(`
|
|
[service]
|
|
EMAIL_DOMAIN_WHITELIST = d1, *.w
|
|
EMAIL_DOMAIN_ALLOWLIST = d2, *.a
|
|
EMAIL_DOMAIN_BLOCKLIST = d3, *.b
|
|
`)
|
|
require.NoError(t, err)
|
|
loadServiceFrom(cfg)
|
|
|
|
match := func(globs []glob.Glob, s string) bool {
|
|
for _, g := range globs {
|
|
if g.Match(s) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
assert.True(t, match(Service.EmailDomainAllowList, "d1"))
|
|
assert.True(t, match(Service.EmailDomainAllowList, "foo.w"))
|
|
assert.True(t, match(Service.EmailDomainAllowList, "d2"))
|
|
assert.True(t, match(Service.EmailDomainAllowList, "foo.a"))
|
|
assert.False(t, match(Service.EmailDomainAllowList, "d3"))
|
|
|
|
assert.True(t, match(Service.EmailDomainBlockList, "d3"))
|
|
assert.True(t, match(Service.EmailDomainBlockList, "foo.b"))
|
|
assert.False(t, match(Service.EmailDomainBlockList, "d1"))
|
|
}
|
|
|
|
func TestLoadServiceVisibilityModes(t *testing.T) {
|
|
oldService := Service
|
|
defer func() {
|
|
Service = oldService
|
|
}()
|
|
|
|
kases := map[string]func(){
|
|
`
|
|
[service]
|
|
DEFAULT_USER_VISIBILITY = public
|
|
ALLOWED_USER_VISIBILITY_MODES = public,limited,private
|
|
`: func() {
|
|
assert.Equal(t, "public", Service.DefaultUserVisibility)
|
|
assert.Equal(t, structs.VisibleTypePublic, Service.DefaultUserVisibilityMode)
|
|
assert.Equal(t, []string{"public", "limited", "private"}, Service.AllowedUserVisibilityModes)
|
|
},
|
|
`
|
|
[service]
|
|
DEFAULT_USER_VISIBILITY = public
|
|
`: func() {
|
|
assert.Equal(t, "public", Service.DefaultUserVisibility)
|
|
assert.Equal(t, structs.VisibleTypePublic, Service.DefaultUserVisibilityMode)
|
|
assert.Equal(t, []string{"public", "limited", "private"}, Service.AllowedUserVisibilityModes)
|
|
},
|
|
`
|
|
[service]
|
|
DEFAULT_USER_VISIBILITY = limited
|
|
`: func() {
|
|
assert.Equal(t, "limited", Service.DefaultUserVisibility)
|
|
assert.Equal(t, structs.VisibleTypeLimited, Service.DefaultUserVisibilityMode)
|
|
assert.Equal(t, []string{"public", "limited", "private"}, Service.AllowedUserVisibilityModes)
|
|
},
|
|
`
|
|
[service]
|
|
ALLOWED_USER_VISIBILITY_MODES = public,limited,private
|
|
`: func() {
|
|
assert.Equal(t, "public", Service.DefaultUserVisibility)
|
|
assert.Equal(t, structs.VisibleTypePublic, Service.DefaultUserVisibilityMode)
|
|
assert.Equal(t, []string{"public", "limited", "private"}, Service.AllowedUserVisibilityModes)
|
|
},
|
|
`
|
|
[service]
|
|
DEFAULT_USER_VISIBILITY = public
|
|
ALLOWED_USER_VISIBILITY_MODES = limited,private
|
|
`: func() {
|
|
assert.Equal(t, "limited", Service.DefaultUserVisibility)
|
|
assert.Equal(t, structs.VisibleTypeLimited, Service.DefaultUserVisibilityMode)
|
|
assert.Equal(t, []string{"limited", "private"}, Service.AllowedUserVisibilityModes)
|
|
},
|
|
`
|
|
[service]
|
|
DEFAULT_USER_VISIBILITY = my_type
|
|
ALLOWED_USER_VISIBILITY_MODES = limited,private
|
|
`: func() {
|
|
assert.Equal(t, "limited", Service.DefaultUserVisibility)
|
|
assert.Equal(t, structs.VisibleTypeLimited, Service.DefaultUserVisibilityMode)
|
|
assert.Equal(t, []string{"limited", "private"}, Service.AllowedUserVisibilityModes)
|
|
},
|
|
`
|
|
[service]
|
|
DEFAULT_USER_VISIBILITY = public
|
|
ALLOWED_USER_VISIBILITY_MODES = public, limit, privated
|
|
`: func() {
|
|
assert.Equal(t, "public", Service.DefaultUserVisibility)
|
|
assert.Equal(t, structs.VisibleTypePublic, Service.DefaultUserVisibilityMode)
|
|
assert.Equal(t, []string{"public"}, Service.AllowedUserVisibilityModes)
|
|
},
|
|
}
|
|
|
|
for kase, fun := range kases {
|
|
t.Run(kase, func(t *testing.T) {
|
|
cfg, err := NewConfigProviderFromData(kase)
|
|
require.NoError(t, err)
|
|
loadServiceFrom(cfg)
|
|
fun()
|
|
// reset
|
|
Service.AllowedUserVisibilityModesSlice = []bool{true, true, true}
|
|
Service.AllowedUserVisibilityModes = []string{}
|
|
Service.DefaultUserVisibility = ""
|
|
Service.DefaultUserVisibilityMode = structs.VisibleTypePublic
|
|
})
|
|
}
|
|
}
|