@@ -28,7 +28,7 @@ func TestAPIAdminCreateAndDeleteSSHKey(t *testing.T) {
2828 session := loginUser (t , "user1" )
2929 keyOwner := unittest .AssertExistsAndLoadBean (t , & user_model.User {Name : "user2" })
3030
31- token := getTokenForLoggedInUser (t , session , auth_model .AccessTokenScopeWriteAdmin )
31+ token := getTokenForLoggedInUser (t , session , auth_model .AccessTokenScopeWriteAdmin , auth_model . AccessTokenScopeWriteUser )
3232 urlStr := fmt .Sprintf ("/api/v1/admin/users/%s/keys" , keyOwner .Name )
3333 req := NewRequestWithValues (t , "POST" , urlStr , map [string ]string {
3434 "key" : "ssh-rsa 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 nocomment\n " ,
@@ -55,7 +55,7 @@ func TestAPIAdminDeleteMissingSSHKey(t *testing.T) {
5555 defer tests .PrepareTestEnv (t )()
5656
5757 // user1 is an admin user
58- token := getUserToken (t , "user1" , auth_model .AccessTokenScopeWriteAdmin )
58+ token := getUserToken (t , "user1" , auth_model .AccessTokenScopeWriteAdmin , auth_model . AccessTokenScopeWriteUser )
5959 req := NewRequestf (t , "DELETE" , "/api/v1/admin/users/user1/keys/%d" , unittest .NonexistentID ).
6060 AddTokenAuth (token )
6161 MakeRequest (t , req , http .StatusNotFound )
@@ -65,7 +65,7 @@ func TestAPIAdminDeleteUnauthorizedKey(t *testing.T) {
6565 defer tests .PrepareTestEnv (t )()
6666 adminUsername := "user1"
6767 normalUsername := "user2"
68- token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin )
68+ token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin , auth_model . AccessTokenScopeWriteUser )
6969
7070 urlStr := fmt .Sprintf ("/api/v1/admin/users/%s/keys" , adminUsername )
7171 req := NewRequestWithValues (t , "POST" , urlStr , map [string ]string {
@@ -111,7 +111,7 @@ func TestAPISudoUserForbidden(t *testing.T) {
111111func TestAPIListUsers (t * testing.T ) {
112112 defer tests .PrepareTestEnv (t )()
113113 adminUsername := "user1"
114- token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeReadAdmin )
114+ token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeReadAdmin , auth_model . AccessTokenScopeReadUser )
115115
116116 req := NewRequest (t , "GET" , "/api/v1/admin/users" ).
117117 AddTokenAuth (token )
@@ -148,7 +148,7 @@ func TestAPIListUsersNonAdmin(t *testing.T) {
148148func TestAPICreateUserInvalidEmail (t * testing.T ) {
149149 defer tests .PrepareTestEnv (t )()
150150 adminUsername := "user1"
151- token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin )
151+ token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeReadAdmin , auth_model . AccessTokenScopeWriteAdmin , auth_model . AccessTokenScopeReadUser , auth_model . AccessTokenScopeWriteUser )
152152 req := NewRequestWithValues (t , "POST" , "/api/v1/admin/users" , map [string ]string {
153153154154 "full_name" : "invalid user" ,
@@ -165,7 +165,7 @@ func TestAPICreateUserInvalidEmail(t *testing.T) {
165165func TestAPICreateAndDeleteUser (t * testing.T ) {
166166 defer tests .PrepareTestEnv (t )()
167167 adminUsername := "user1"
168- token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin )
168+ token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin , auth_model . AccessTokenScopeWriteUser )
169169
170170 req := NewRequestWithValues (
171171 t ,
@@ -192,7 +192,7 @@ func TestAPICreateAndDeleteUser(t *testing.T) {
192192func TestAPIEditUser (t * testing.T ) {
193193 defer tests .PrepareTestEnv (t )()
194194 adminUsername := "user1"
195- token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin )
195+ token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeReadAdmin , auth_model . AccessTokenScopeWriteAdmin , auth_model . AccessTokenScopeReadUser , auth_model . AccessTokenScopeWriteUser )
196196 urlStr := fmt .Sprintf ("/api/v1/admin/users/%s" , "user2" )
197197
198198 fullNameToChange := "Full Name User 2"
@@ -237,7 +237,7 @@ func TestAPIEditUser(t *testing.T) {
237237func TestAPICreateRepoForUser (t * testing.T ) {
238238 defer tests .PrepareTestEnv (t )()
239239 adminUsername := "user1"
240- token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin )
240+ token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin , auth_model . AccessTokenScopeWriteUser , auth_model . AccessTokenScopeWriteRepository )
241241
242242 req := NewRequestWithJSON (
243243 t ,
@@ -253,7 +253,7 @@ func TestAPICreateRepoForUser(t *testing.T) {
253253func TestAPIRenameUser (t * testing.T ) {
254254 defer tests .PrepareTestEnv (t )()
255255 adminUsername := "user1"
256- token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin )
256+ token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin , auth_model . AccessTokenScopeWriteUser )
257257 urlStr := fmt .Sprintf ("/api/v1/admin/users/%s/rename" , "user2" )
258258 req := NewRequestWithValues (t , "POST" , urlStr , map [string ]string {
259259 // required
@@ -348,7 +348,7 @@ func TestAPICreateUser_NotAllowedEmailDomain(t *testing.T) {
348348 }()
349349
350350 adminUsername := "user1"
351- token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin )
351+ token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeReadAdmin , auth_model . AccessTokenScopeWriteAdmin , auth_model . AccessTokenScopeReadUser , auth_model . AccessTokenScopeWriteUser )
352352
353353 req := NewRequestWithValues (t , "POST" , "/api/v1/admin/users" , map [string ]string {
354354@@ -373,7 +373,7 @@ func TestAPIEditUser_NotAllowedEmailDomain(t *testing.T) {
373373 }()
374374
375375 adminUsername := "user1"
376- token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeWriteAdmin )
376+ token := getUserToken (t , adminUsername , auth_model .AccessTokenScopeReadAdmin , auth_model . AccessTokenScopeWriteAdmin , auth_model . AccessTokenScopeReadUser , auth_model . AccessTokenScopeWriteUser )
377377 urlStr := fmt .Sprintf ("/api/v1/admin/users/%s" , "user2" )
378378
379379
0 commit comments