|  | 
|  | 1 | +// Copyright 2024 The Gitea Authors. All rights reserved. | 
|  | 2 | +// SPDX-License-Identifier: MIT | 
|  | 3 | + | 
|  | 4 | +package actions | 
|  | 5 | + | 
|  | 6 | +import ( | 
|  | 7 | +	"os" | 
|  | 8 | +	"testing" | 
|  | 9 | + | 
|  | 10 | +	actions_model "code.gitea.io/gitea/models/actions" | 
|  | 11 | +	"code.gitea.io/gitea/models/db" | 
|  | 12 | +	"code.gitea.io/gitea/models/unittest" | 
|  | 13 | +	"code.gitea.io/gitea/modules/util" | 
|  | 14 | + | 
|  | 15 | +	"github.com/stretchr/testify/assert" | 
|  | 16 | +	"github.com/stretchr/testify/require" | 
|  | 17 | +) | 
|  | 18 | + | 
|  | 19 | +func TestMain(m *testing.M) { | 
|  | 20 | +	unittest.MainTest(m, &unittest.TestOptions{ | 
|  | 21 | +		FixtureFiles: []string{"action_runner_token.yml"}, | 
|  | 22 | +	}) | 
|  | 23 | +	os.Exit(m.Run()) | 
|  | 24 | +} | 
|  | 25 | + | 
|  | 26 | +func TestInitToken(t *testing.T) { | 
|  | 27 | +	assert.NoError(t, unittest.PrepareTestDatabase()) | 
|  | 28 | + | 
|  | 29 | +	t.Run("NoToken", func(t *testing.T) { | 
|  | 30 | +		_, _ = db.Exec(db.DefaultContext, "DELETE FROM action_runner_token") | 
|  | 31 | +		t.Setenv("GITEA_RUNNER_REGISTRATION_TOKEN", "") | 
|  | 32 | +		t.Setenv("GITEA_RUNNER_REGISTRATION_TOKEN_FILE", "") | 
|  | 33 | +		err := initGlobalRunnerToken(db.DefaultContext) | 
|  | 34 | +		require.NoError(t, err) | 
|  | 35 | +		notEmpty, err := db.IsTableNotEmpty(&actions_model.ActionRunnerToken{}) | 
|  | 36 | +		require.NoError(t, err) | 
|  | 37 | +		assert.False(t, notEmpty) | 
|  | 38 | +	}) | 
|  | 39 | + | 
|  | 40 | +	t.Run("EnvToken", func(t *testing.T) { | 
|  | 41 | +		tokenValue, _ := util.CryptoRandomString(32) | 
|  | 42 | +		t.Setenv("GITEA_RUNNER_REGISTRATION_TOKEN", tokenValue) | 
|  | 43 | +		t.Setenv("GITEA_RUNNER_REGISTRATION_TOKEN_FILE", "") | 
|  | 44 | +		err := initGlobalRunnerToken(db.DefaultContext) | 
|  | 45 | +		require.NoError(t, err) | 
|  | 46 | +		token := unittest.AssertExistsAndLoadBean(t, &actions_model.ActionRunnerToken{Token: tokenValue}) | 
|  | 47 | +		assert.True(t, token.IsActive) | 
|  | 48 | + | 
|  | 49 | +		// init with the same token again, should not create a new token | 
|  | 50 | +		err = initGlobalRunnerToken(db.DefaultContext) | 
|  | 51 | +		require.NoError(t, err) | 
|  | 52 | +		token2 := unittest.AssertExistsAndLoadBean(t, &actions_model.ActionRunnerToken{Token: tokenValue}) | 
|  | 53 | +		assert.Equal(t, token.ID, token2.ID) | 
|  | 54 | +		assert.True(t, token.IsActive) | 
|  | 55 | +	}) | 
|  | 56 | + | 
|  | 57 | +	t.Run("EnvFileToken", func(t *testing.T) { | 
|  | 58 | +		tokenValue, _ := util.CryptoRandomString(32) | 
|  | 59 | +		f := t.TempDir() + "/token" | 
|  | 60 | +		_ = os.WriteFile(f, []byte(tokenValue), 0o644) | 
|  | 61 | +		t.Setenv("GITEA_RUNNER_REGISTRATION_TOKEN", "") | 
|  | 62 | +		t.Setenv("GITEA_RUNNER_REGISTRATION_TOKEN_FILE", f) | 
|  | 63 | +		err := initGlobalRunnerToken(db.DefaultContext) | 
|  | 64 | +		require.NoError(t, err) | 
|  | 65 | +		token := unittest.AssertExistsAndLoadBean(t, &actions_model.ActionRunnerToken{Token: tokenValue}) | 
|  | 66 | +		assert.True(t, token.IsActive) | 
|  | 67 | + | 
|  | 68 | +		// if the env token is invalidated by another new token, then it shouldn't be active anymore | 
|  | 69 | +		_, err = actions_model.NewRunnerToken(db.DefaultContext, 0, 0) | 
|  | 70 | +		require.NoError(t, err) | 
|  | 71 | +		token = unittest.AssertExistsAndLoadBean(t, &actions_model.ActionRunnerToken{Token: tokenValue}) | 
|  | 72 | +		assert.False(t, token.IsActive) | 
|  | 73 | +	}) | 
|  | 74 | + | 
|  | 75 | +	t.Run("InvalidToken", func(t *testing.T) { | 
|  | 76 | +		t.Setenv("GITEA_RUNNER_REGISTRATION_TOKEN", "abc") | 
|  | 77 | +		err := initGlobalRunnerToken(db.DefaultContext) | 
|  | 78 | +		assert.ErrorContains(t, err, "must be at least") | 
|  | 79 | +	}) | 
|  | 80 | +} | 
0 commit comments