2023-06-29 23:22:55 +00:00
|
|
|
// Copyright 2018 The Gitea Authors. All rights reserved.
|
|
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
|
|
|
|
package integration
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/base64"
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
auth_model "code.gitea.io/gitea/models/auth"
|
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
|
|
|
"code.gitea.io/gitea/models/unittest"
|
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
|
|
|
api "code.gitea.io/gitea/modules/structs"
|
|
|
|
"code.gitea.io/gitea/tests"
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/assert"
|
2024-07-30 19:41:10 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2023-06-29 23:22:55 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestAPIUpdateRepoAvatar(t *testing.T) {
|
|
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
|
|
|
|
repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
|
|
|
|
user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
|
|
|
token := getUserToken(t, user2.LowerName, auth_model.AccessTokenScopeWriteRepository)
|
|
|
|
|
|
|
|
// Test what happens if you use a valid image
|
|
|
|
avatar, err := os.ReadFile("tests/integration/avatar.png")
|
2024-07-30 19:41:10 +00:00
|
|
|
require.NoError(t, err)
|
2023-06-29 23:22:55 +00:00
|
|
|
if err != nil {
|
|
|
|
assert.FailNow(t, "Unable to open avatar.png")
|
|
|
|
}
|
|
|
|
|
|
|
|
opts := api.UpdateRepoAvatarOption{
|
|
|
|
Image: base64.StdEncoding.EncodeToString(avatar),
|
|
|
|
}
|
|
|
|
|
2023-12-21 23:59:59 +00:00
|
|
|
req := NewRequestWithJSON(t, "POST", fmt.Sprintf("/api/v1/repos/%s/%s/avatar", repo.OwnerName, repo.Name), &opts).
|
|
|
|
AddTokenAuth(token)
|
2023-06-29 23:22:55 +00:00
|
|
|
MakeRequest(t, req, http.StatusNoContent)
|
|
|
|
|
|
|
|
// Test what happens if you don't have a valid Base64 string
|
|
|
|
opts = api.UpdateRepoAvatarOption{
|
|
|
|
Image: "Invalid",
|
|
|
|
}
|
|
|
|
|
2023-12-21 23:59:59 +00:00
|
|
|
req = NewRequestWithJSON(t, "POST", fmt.Sprintf("/api/v1/repos/%s/%s/avatar", repo.OwnerName, repo.Name), &opts).
|
|
|
|
AddTokenAuth(token)
|
2023-06-29 23:22:55 +00:00
|
|
|
MakeRequest(t, req, http.StatusBadRequest)
|
|
|
|
|
|
|
|
// Test what happens if you use a file that is not an image
|
|
|
|
text, err := os.ReadFile("tests/integration/README.md")
|
2024-07-30 19:41:10 +00:00
|
|
|
require.NoError(t, err)
|
2023-06-29 23:22:55 +00:00
|
|
|
if err != nil {
|
|
|
|
assert.FailNow(t, "Unable to open README.md")
|
|
|
|
}
|
|
|
|
|
|
|
|
opts = api.UpdateRepoAvatarOption{
|
|
|
|
Image: base64.StdEncoding.EncodeToString(text),
|
|
|
|
}
|
|
|
|
|
2023-12-21 23:59:59 +00:00
|
|
|
req = NewRequestWithJSON(t, "POST", fmt.Sprintf("/api/v1/repos/%s/%s/avatar", repo.OwnerName, repo.Name), &opts).
|
|
|
|
AddTokenAuth(token)
|
2023-06-29 23:22:55 +00:00
|
|
|
MakeRequest(t, req, http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAPIDeleteRepoAvatar(t *testing.T) {
|
|
|
|
defer tests.PrepareTestEnv(t)()
|
|
|
|
|
|
|
|
repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
|
|
|
|
user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
|
|
|
token := getUserToken(t, user2.LowerName, auth_model.AccessTokenScopeWriteRepository)
|
|
|
|
|
2023-12-21 23:59:59 +00:00
|
|
|
req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/repos/%s/%s/avatar", repo.OwnerName, repo.Name)).
|
|
|
|
AddTokenAuth(token)
|
2023-06-29 23:22:55 +00:00
|
|
|
MakeRequest(t, req, http.StatusNoContent)
|
|
|
|
}
|