2018-05-17 13:05:00 +09:00
|
|
|
// Copyright 2018 The Gitea Authors. All rights reserved.
|
2022-11-28 03:20:29 +09:00
|
|
|
// SPDX-License-Identifier: MIT
|
2017-12-03 02:11:22 +09:00
|
|
|
|
2018-05-17 13:05:00 +09:00
|
|
|
package setting
|
2017-12-03 02:11:22 +09:00
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
|
|
|
"testing"
|
|
|
|
|
2021-11-12 23:36:47 +09:00
|
|
|
"code.gitea.io/gitea/models/unittest"
|
2017-12-03 02:11:22 +09:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
"code.gitea.io/gitea/modules/test"
|
2021-01-27 00:36:53 +09:00
|
|
|
"code.gitea.io/gitea/modules/web"
|
2021-04-07 04:44:05 +09:00
|
|
|
"code.gitea.io/gitea/services/forms"
|
2017-12-03 02:11:22 +09:00
|
|
|
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestChangePassword(t *testing.T) {
|
|
|
|
oldPassword := "password"
|
|
|
|
setting.MinPasswordLength = 6
|
2022-01-21 02:46:10 +09:00
|
|
|
pcALL := []string{"lower", "upper", "digit", "spec"}
|
|
|
|
pcLUN := []string{"lower", "upper", "digit"}
|
|
|
|
pcLU := []string{"lower", "upper"}
|
2017-12-03 02:11:22 +09:00
|
|
|
|
|
|
|
for _, req := range []struct {
|
2019-10-15 00:24:26 +09:00
|
|
|
OldPassword string
|
|
|
|
NewPassword string
|
|
|
|
Retype string
|
|
|
|
Message string
|
2019-10-16 12:09:58 +09:00
|
|
|
PasswordComplexity []string
|
2017-12-03 02:11:22 +09:00
|
|
|
}{
|
|
|
|
{
|
2019-10-15 00:24:26 +09:00
|
|
|
OldPassword: oldPassword,
|
|
|
|
NewPassword: "Qwerty123456-",
|
|
|
|
Retype: "Qwerty123456-",
|
|
|
|
Message: "",
|
2019-10-16 12:09:58 +09:00
|
|
|
PasswordComplexity: pcALL,
|
2019-10-15 00:24:26 +09:00
|
|
|
},
|
|
|
|
{
|
|
|
|
OldPassword: oldPassword,
|
|
|
|
NewPassword: "12345",
|
|
|
|
Retype: "12345",
|
|
|
|
Message: "auth.password_too_short",
|
2019-10-16 12:09:58 +09:00
|
|
|
PasswordComplexity: pcALL,
|
2019-10-15 00:24:26 +09:00
|
|
|
},
|
|
|
|
{
|
|
|
|
OldPassword: "12334",
|
|
|
|
NewPassword: "123456",
|
|
|
|
Retype: "123456",
|
|
|
|
Message: "settings.password_incorrect",
|
2019-10-16 12:09:58 +09:00
|
|
|
PasswordComplexity: pcALL,
|
2019-10-15 00:24:26 +09:00
|
|
|
},
|
|
|
|
{
|
|
|
|
OldPassword: oldPassword,
|
|
|
|
NewPassword: "123456",
|
|
|
|
Retype: "12345",
|
|
|
|
Message: "form.password_not_match",
|
2019-10-16 12:09:58 +09:00
|
|
|
PasswordComplexity: pcALL,
|
2017-12-03 02:11:22 +09:00
|
|
|
},
|
|
|
|
{
|
2019-10-15 00:24:26 +09:00
|
|
|
OldPassword: oldPassword,
|
|
|
|
NewPassword: "Qwerty",
|
|
|
|
Retype: "Qwerty",
|
2019-10-16 12:09:58 +09:00
|
|
|
Message: "form.password_complexity",
|
|
|
|
PasswordComplexity: pcALL,
|
2017-12-03 02:11:22 +09:00
|
|
|
},
|
|
|
|
{
|
2019-10-15 00:24:26 +09:00
|
|
|
OldPassword: oldPassword,
|
|
|
|
NewPassword: "Qwerty",
|
|
|
|
Retype: "Qwerty",
|
2019-10-16 12:09:58 +09:00
|
|
|
Message: "form.password_complexity",
|
2019-10-15 00:24:26 +09:00
|
|
|
PasswordComplexity: pcLUN,
|
2017-12-03 02:11:22 +09:00
|
|
|
},
|
|
|
|
{
|
2019-10-15 00:24:26 +09:00
|
|
|
OldPassword: oldPassword,
|
|
|
|
NewPassword: "QWERTY",
|
|
|
|
Retype: "QWERTY",
|
2019-10-16 12:09:58 +09:00
|
|
|
Message: "form.password_complexity",
|
2019-10-15 00:24:26 +09:00
|
|
|
PasswordComplexity: pcLU,
|
2017-12-03 02:11:22 +09:00
|
|
|
},
|
|
|
|
} {
|
2023-05-04 12:55:35 +09:00
|
|
|
t.Run(req.OldPassword+"__"+req.NewPassword, func(t *testing.T) {
|
|
|
|
unittest.PrepareTestEnv(t)
|
|
|
|
setting.PasswordComplexity = req.PasswordComplexity
|
|
|
|
ctx := test.MockContext(t, "user/settings/security")
|
|
|
|
test.LoadUser(t, ctx, 2)
|
|
|
|
test.LoadRepo(t, ctx, 1)
|
2017-12-03 02:11:22 +09:00
|
|
|
|
2023-05-04 12:55:35 +09:00
|
|
|
web.SetForm(ctx, &forms.ChangePasswordForm{
|
|
|
|
OldPassword: req.OldPassword,
|
|
|
|
Password: req.NewPassword,
|
|
|
|
Retype: req.Retype,
|
|
|
|
})
|
|
|
|
AccountPost(ctx)
|
2017-12-03 02:11:22 +09:00
|
|
|
|
2023-05-04 12:55:35 +09:00
|
|
|
assert.Contains(t, ctx.Flash.ErrorMsg, req.Message)
|
|
|
|
assert.EqualValues(t, http.StatusSeeOther, ctx.Resp.Status())
|
|
|
|
})
|
2017-12-03 02:11:22 +09:00
|
|
|
}
|
|
|
|
}
|