use forgejo_api::{structs::*, Forgejo}; fn get_api() -> Forgejo { let url = url::Url::parse(&std::env::var("FORGEJO_API_CI_INSTANCE_URL").unwrap()).unwrap(); let token = std::env::var("FORGEJO_API_CI_TOKEN").unwrap(); Forgejo::new(forgejo_api::Auth::Token(&token), url).unwrap() } #[tokio::test] async fn user() { let api = get_api(); let myself = api.user_get_current().await.unwrap(); assert!(myself.is_admin.unwrap(), "user should be admin"); assert_eq!( myself.login.as_ref().unwrap(), "TestingAdmin", "user should be named \"TestingAdmin\"" ); let myself_indirect = api.user_get("TestingAdmin").await.unwrap(); assert_eq!( myself, myself_indirect, "result of `myself` does not match result of `get_user`" ); let query = UserListFollowingQuery::default(); let following = api .user_list_following("TestingAdmin", query) .await .unwrap(); assert_eq!(following, Vec::new(), "following list not empty"); let query = UserListFollowersQuery::default(); let followers = api .user_list_followers("TestingAdmin", query) .await .unwrap(); assert_eq!(followers, Vec::new(), "follower list not empty"); let url = url::Url::parse(&std::env::var("FORGEJO_API_CI_INSTANCE_URL").unwrap()).unwrap(); let password_api = Forgejo::new( forgejo_api::Auth::Password { username: "TestingAdmin", password: "password", mfa: None, }, url, ) .expect("failed to log in using username and password"); assert!( api.user_get_current().await.unwrap() == password_api.user_get_current().await.unwrap(), "users not equal comparing token-auth and pass-auth" ); } #[tokio::test] async fn repo() { let api = get_api(); tokio::fs::create_dir("./test_repo").await.unwrap(); let git = || { let mut cmd = std::process::Command::new("git"); cmd.current_dir("./test_repo"); cmd }; let _ = git() .args(["config", "--global", "init.defaultBranch", "main"]) .status() .unwrap(); let _ = git().args(["init"]).status().unwrap(); let _ = git() .args(["config", "user.name", "TestingAdmin"]) .status() .unwrap(); let _ = git() .args(["config", "user.email", "admin@noreply.example.org"]) .status() .unwrap(); tokio::fs::write("./test_repo/README.md", "# Test\nThis is a test repo") .await .unwrap(); let _ = git().args(["add", "."]).status().unwrap(); let _ = git() .args(["commit", "-m", "initial commit"]) .status() .unwrap(); let repo_opt = CreateRepoOption { auto_init: Some(false), default_branch: Some("main".into()), description: Some("Test Repo".into()), gitignores: Some("".into()), issue_labels: Some("".into()), license: Some("".into()), name: "test".into(), object_format_name: None, private: Some(false), readme: None, template: Some(false), trust_model: Some(CreateRepoOptionTrustModel::Default), }; let remote_repo = api.create_current_user_repo(repo_opt).await.unwrap(); assert!( remote_repo.has_pull_requests.unwrap(), "repo does not accept pull requests" ); assert!( remote_repo.owner.as_ref().unwrap().login.as_ref().unwrap() == "TestingAdmin", "repo owner is not \"TestingAdmin\"" ); assert!( remote_repo.name.as_ref().unwrap() == "test", "repo owner is not \"test\"" ); tokio::time::sleep(std::time::Duration::from_secs(3)).await; let mut remote_url = remote_repo.clone_url.clone().unwrap(); remote_url.set_username("TestingAdmin").unwrap(); remote_url.set_password(Some("password")).unwrap(); let _ = git() .args(["remote", "add", "origin", remote_url.as_str()]) .status() .unwrap(); let _ = git() .args(["push", "-u", "origin", "main"]) .status() .unwrap(); let _ = git().args(["switch", "-c", "test"]).status().unwrap(); tokio::fs::write( "./test_repo/example.rs", "fn add_one(x: u32) -> u32 { x + 1 }", ) .await .unwrap(); let _ = git().args(["add", "."]).status().unwrap(); let _ = git().args(["commit", "-m", "egg"]).status().unwrap(); let _ = git() .args(["push", "-u", "origin", "test"]) .status() .unwrap(); let pr_opt = CreatePullRequestOption { assignee: None, assignees: Some(vec!["TestingAdmin".into()]), base: Some("main".into()), body: Some("This is a test PR".into()), due_date: None, head: Some("test".into()), labels: None, milestone: None, title: Some("test pr".into()), }; let pr = api .repo_create_pull_request("TestingAdmin", "test", pr_opt) .await .expect("couldn't create pr"); tokio::time::sleep(std::time::Duration::from_secs(3)).await; let is_merged = api .repo_pull_request_is_merged("TestingAdmin", "test", pr.number.unwrap()) .await .is_ok(); assert!(!is_merged, "pr should not yet be merged"); let pr_files_query = RepoGetPullRequestFilesQuery::default(); let (_, _) = api .repo_get_pull_request_files("TestingAdmin", "test", pr.number.unwrap(), pr_files_query) .await .unwrap(); let merge_opt = MergePullRequestOption { r#do: MergePullRequestOptionDo::Merge, merge_commit_id: None, merge_message_field: None, merge_title_field: None, delete_branch_after_merge: Some(true), force_merge: None, head_commit_id: None, merge_when_checks_succeed: None, }; api.repo_merge_pull_request("TestingAdmin", "test", pr.number.unwrap(), merge_opt) .await .expect("couldn't merge pr"); let is_merged = api .repo_pull_request_is_merged("TestingAdmin", "test", pr.number.unwrap()) .await .is_ok(); assert!(is_merged, "pr should be merged"); let _ = git().args(["fetch"]).status().unwrap(); let _ = git().args(["pull"]).status().unwrap(); let query = RepoListReleasesQuery::default(); assert!( api.repo_list_releases("TestingAdmin", "test", query) .await .unwrap() .is_empty(), "there should be no releases yet" ); let tag_opt = CreateTagOption { message: Some("This is a tag!".into()), tag_name: "v1.0".into(), target: None, }; api.repo_create_tag("TestingAdmin", "test", tag_opt) .await .expect("failed to create tag"); let release_opt = CreateReleaseOption { body: Some("This is a release!".into()), draft: Some(true), name: Some("v1.0".into()), prerelease: Some(false), tag_name: "v1.0".into(), target_commitish: None, }; let release = api .repo_create_release("TestingAdmin", "test", release_opt) .await .expect("failed to create release"); let edit_release = EditReleaseOption { body: None, draft: Some(false), name: None, prerelease: None, tag_name: None, target_commitish: None, }; api.repo_edit_release("TestingAdmin", "test", release.id.unwrap(), edit_release) .await .expect("failed to edit release"); let release_by_tag = api .repo_get_release_by_tag("TestingAdmin", "test", "v1.0") .await .expect("failed to find release"); let release_latest = api .repo_get_latest_release("TestingAdmin", "test") .await .expect("failed to find latest release"); assert!(release_by_tag == release_latest, "releases not equal"); let attachment = api .repo_create_release_attachment( "TestingAdmin", "test", release.id.unwrap(), b"This is a file!".to_vec(), RepoCreateReleaseAttachmentQuery { name: Some("test.txt".into()), }, ) .await .expect("failed to create release attachment"); assert!( &*api .download_release_attachment( "TestingAdmin", "test", release.id.unwrap(), attachment.id.unwrap() ) .await .unwrap() == b"This is a file!", "couldn't download attachment" ); let _zip_archive = api .repo_get_archive("TestingAdmin", "test", "v1.0.zip") .await .unwrap(); let _tar_archive = api .repo_get_archive("TestingAdmin", "test", "v1.0.tar.gz") .await .unwrap(); // check these contents when their return value is fixed api.repo_delete_release_attachment( "TestingAdmin", "test", release.id.unwrap(), attachment.id.unwrap(), ) .await .expect("failed to deleted attachment"); api.repo_delete_release("TestingAdmin", "test", release.id.unwrap()) .await .expect("failed to delete release"); api.repo_delete_tag("TestingAdmin", "test", "v1.0") .await .expect("failed to delete release"); } #[tokio::test] async fn admin() { let api = get_api(); let user_opt = CreateUserOption { created_at: None, email: "pipis@noreply.example.org".into(), full_name: None, login_name: None, must_change_password: None, password: Some("userpass".into()), restricted: Some(false), send_notify: Some(true), source_id: None, username: "Pipis".into(), visibility: Some("public".into()), }; let _ = api .admin_create_user(user_opt) .await .expect("failed to create user"); let query = AdminSearchUsersQuery::default(); let users = api .admin_search_users(query) .await .expect("failed to search users"); assert!( users .iter() .find(|u| u.login.as_ref().unwrap() == "Pipis") .is_some(), "could not find new user" ); let query = AdminGetAllEmailsQuery::default(); let users = api .admin_get_all_emails(query) .await .expect("failed to search emails"); assert!( users .iter() .find(|u| u.email.as_ref().unwrap() == "pipis@noreply.example.org") .is_some(), "could not find new user" ); let org_opt = CreateOrgOption { description: None, email: None, full_name: None, location: None, repo_admin_change_team_access: None, username: "test-org".into(), visibility: Some(CreateOrgOptionVisibility::Public), website: None, }; let _ = api .admin_create_org("Pipis", org_opt) .await .expect("failed to create org"); let query = AdminGetAllOrgsQuery::default(); assert!( !api.admin_get_all_orgs(query).await.unwrap().is_empty(), "org list empty" ); let key_opt = CreateKeyOption { key: "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN68ehQAsbGEwlXPa2AxbAh1QxFQrtRel2jeC0hRlPc1 user@noreply.example.org".into(), read_only: None, title: "Example Key".into(), }; let key = api .admin_create_public_key("Pipis", key_opt) .await .expect("failed to create key"); api.admin_delete_user_public_key("Pipis", key.id.unwrap()) .await .expect("failed to delete key"); let rename_opt = RenameUserOption { new_username: "Bepis".into(), }; api.admin_rename_user("Pipis", rename_opt) .await .expect("failed to rename user"); let query = AdminDeleteUserQuery { purge: Some(true) }; api.admin_delete_user("Bepis", query) .await .expect("failed to delete user"); let query = AdminDeleteUserQuery { purge: Some(true) }; assert!( api.admin_delete_user("Ghost", query).await.is_err(), "deleting fake user should fail" ); let query = AdminCronListQuery::default(); let crons = api .admin_cron_list(query) .await .expect("failed to get crons list"); api.admin_cron_run(&crons.get(0).expect("no crons").name.as_ref().unwrap()) .await .expect("failed to run cron"); let hook_opt = CreateHookOption { active: None, authorization_header: None, branch_filter: None, config: CreateHookOptionConfig { content_type: "json".into(), url: url::Url::parse("http://test.local/").unwrap(), additional: Default::default(), }, events: Some(Vec::new()), r#type: CreateHookOptionType::Gitea, }; // yarr har har me matey this is me hook let hook = api .admin_create_hook(hook_opt) .await .expect("failed to create hook"); let edit_hook = EditHookOption { active: Some(true), authorization_header: None, branch_filter: None, config: None, events: None, }; api.admin_edit_hook(hook.id.unwrap(), edit_hook) .await .expect("failed to edit hook"); api.admin_delete_hook(hook.id.unwrap()) .await .expect("failed to delete hook"); } #[tokio::test] async fn oauth2_login() { let api = get_api(); let opt = forgejo_api::structs::CreateOAuth2ApplicationOptions { confidential_client: Some(true), name: Some("Test Application".into()), redirect_uris: Some(vec!["http://127.0.0.1:48879/".into()]), }; let app = api.user_create_oauth2_application(opt).await.unwrap(); let client_id = app.client_id.unwrap(); let client_secret = app.client_secret.unwrap(); let base_url = &std::env::var("FORGEJO_API_CI_INSTANCE_URL").unwrap(); let client = reqwest::Client::builder() .cookie_store(true) .redirect(reqwest::redirect::Policy::none()) .build() .unwrap(); // Log in via the web interface let _ = client .post(&format!("{base_url}user/login")) .form(&[("user_name", "TestingAdmin"), ("password", "password")]) .send() .await .unwrap() .error_for_status() .unwrap(); // Load the authorization page let response = client .get(&format!( "{base_url}login/oauth/authorize\ ?client_id={client_id}\ &redirect_uri=http%3A%2F%2F127.0.0.1%3A48879%2F\ &response_type=code\ &state=theyve" )) .send() .await .unwrap() .error_for_status() .unwrap(); let csrf = response.cookies().find(|x| x.name() == "_csrf").unwrap(); // Authorize the new application via the web interface let response = client .post(&format!("{base_url}login/oauth/grant")) .form(&[ ("_csrf", csrf.value()), ("client_id", &client_id), ("state", "theyve"), ("scope", ""), ("nonce", ""), ("redirect_uri", "http://127.0.0.1:48879/"), ]) .send() .await .unwrap() .error_for_status() .unwrap(); // Extract the code from the redirect url let location = response.headers().get(reqwest::header::LOCATION).unwrap(); let location = url::Url::parse(dbg!(location.to_str().unwrap())).unwrap(); let mut code = None; for (key, value) in location.query_pairs() { if key == "code" { code = Some(value.into_owned()); } else if key == "error_description" { panic!("{value}"); } } let code = code.unwrap(); // Redeem the code and check it works let url = url::Url::parse(&base_url).unwrap(); let api = Forgejo::new(forgejo_api::Auth::None, url.clone()).unwrap(); let request = forgejo_api::structs::OAuthTokenRequest::Confidential { client_id: &client_id, client_secret: &client_secret, code: &code, redirect_uri: url::Url::parse("http://127.0.0.1:48879/").unwrap(), }; let token = api.oauth_get_access_token(request).await.unwrap(); let token_api = Forgejo::new(forgejo_api::Auth::OAuth2(&token.access_token), url.clone()).unwrap(); let myself = token_api.user_get_current().await.unwrap(); assert_eq!(myself.login.as_deref(), Some("TestingAdmin")); let request = forgejo_api::structs::OAuthTokenRequest::Refresh { refresh_token: &token.refresh_token, client_id: &client_id, client_secret: &client_secret, }; let token = token_api.oauth_get_access_token(request).await.unwrap(); let token_api = Forgejo::new(forgejo_api::Auth::OAuth2(&token.access_token), url).unwrap(); let myself = token_api.user_get_current().await.unwrap(); assert_eq!(myself.login.as_deref(), Some("TestingAdmin")); }