Skip to content

Commit 136dd99

Browse files
authored
Skip email domain check when admins edit user emails (#29609)
Follow #29522 Administrators should be able to set a user's email address even if the email address is not in `EMAIL_DOMAIN_ALLOWLIST`
1 parent ebff37a commit 136dd99

File tree

6 files changed

+53
-9
lines changed

6 files changed

+53
-9
lines changed

models/user/email_address.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ func ValidateEmail(email string) error {
162162
return validateEmailDomain(email)
163163
}
164164

165-
// ValidateEmailForAdmin check if email is a valid address when admins manually add users
165+
// ValidateEmailForAdmin check if email is a valid address when admins manually add or edit users
166166
func ValidateEmailForAdmin(email string) error {
167167
return validateEmailBasic(email)
168168
// In this case we do not need to check the email domain

routers/api/v1/admin/user.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ func EditUser(ctx *context.APIContext) {
209209
}
210210

211211
if form.Email != nil {
212-
if err := user_service.AddOrSetPrimaryEmailAddress(ctx, ctx.ContextUser, *form.Email); err != nil {
212+
if err := user_service.AdminAddOrSetPrimaryEmailAddress(ctx, ctx.ContextUser, *form.Email); err != nil {
213213
switch {
214214
case user_model.IsErrEmailCharIsNotSupported(err), user_model.IsErrEmailInvalid(err):
215215
ctx.Error(http.StatusBadRequest, "EmailInvalid", err)

routers/web/admin/users.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -412,7 +412,7 @@ func EditUserPost(ctx *context.Context) {
412412
}
413413

414414
if form.Email != "" {
415-
if err := user_service.AddOrSetPrimaryEmailAddress(ctx, u, form.Email); err != nil {
415+
if err := user_service.AdminAddOrSetPrimaryEmailAddress(ctx, u, form.Email); err != nil {
416416
switch {
417417
case user_model.IsErrEmailCharIsNotSupported(err), user_model.IsErrEmailInvalid(err):
418418
ctx.Data["Err_Email"] = true

services/user/email.go

+3-2
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,13 @@ import (
1414
"code.gitea.io/gitea/modules/util"
1515
)
1616

17-
func AddOrSetPrimaryEmailAddress(ctx context.Context, u *user_model.User, emailStr string) error {
17+
// AdminAddOrSetPrimaryEmailAddress is used by admins to add or set a user's primary email address
18+
func AdminAddOrSetPrimaryEmailAddress(ctx context.Context, u *user_model.User, emailStr string) error {
1819
if strings.EqualFold(u.Email, emailStr) {
1920
return nil
2021
}
2122

22-
if err := user_model.ValidateEmail(emailStr); err != nil {
23+
if err := user_model.ValidateEmailForAdmin(emailStr); err != nil {
2324
return err
2425
}
2526

services/user/email_test.go

+18-4
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,13 @@ import (
1010
organization_model "code.gitea.io/gitea/models/organization"
1111
"code.gitea.io/gitea/models/unittest"
1212
user_model "code.gitea.io/gitea/models/user"
13+
"code.gitea.io/gitea/modules/setting"
1314

15+
"github.com/gobwas/glob"
1416
"github.com/stretchr/testify/assert"
1517
)
1618

17-
func TestAddOrSetPrimaryEmailAddress(t *testing.T) {
19+
func TestAdminAddOrSetPrimaryEmailAddress(t *testing.T) {
1820
assert.NoError(t, unittest.PrepareTestDatabase())
1921

2022
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 27})
@@ -28,7 +30,7 @@ func TestAddOrSetPrimaryEmailAddress(t *testing.T) {
2830
assert.NotEqual(t, "[email protected]", primary.Email)
2931
assert.Equal(t, user.Email, primary.Email)
3032

31-
assert.NoError(t, AddOrSetPrimaryEmailAddress(db.DefaultContext, user, "[email protected]"))
33+
assert.NoError(t, AdminAddOrSetPrimaryEmailAddress(db.DefaultContext, user, "[email protected]"))
3234

3335
primary, err = user_model.GetPrimaryEmailAddressOfUser(db.DefaultContext, user.ID)
3436
assert.NoError(t, err)
@@ -39,7 +41,19 @@ func TestAddOrSetPrimaryEmailAddress(t *testing.T) {
3941
assert.NoError(t, err)
4042
assert.Len(t, emails, 2)
4143

42-
assert.NoError(t, AddOrSetPrimaryEmailAddress(db.DefaultContext, user, "[email protected]"))
44+
setting.Service.EmailDomainAllowList = []glob.Glob{glob.MustCompile("example.org")}
45+
defer func() {
46+
setting.Service.EmailDomainAllowList = []glob.Glob{}
47+
}()
48+
49+
assert.NoError(t, AdminAddOrSetPrimaryEmailAddress(db.DefaultContext, user, "[email protected]"))
50+
51+
primary, err = user_model.GetPrimaryEmailAddressOfUser(db.DefaultContext, user.ID)
52+
assert.NoError(t, err)
53+
assert.Equal(t, "[email protected]", primary.Email)
54+
assert.Equal(t, user.Email, primary.Email)
55+
56+
assert.NoError(t, AdminAddOrSetPrimaryEmailAddress(db.DefaultContext, user, "[email protected]"))
4357

4458
primary, err = user_model.GetPrimaryEmailAddressOfUser(db.DefaultContext, user.ID)
4559
assert.NoError(t, err)
@@ -48,7 +62,7 @@ func TestAddOrSetPrimaryEmailAddress(t *testing.T) {
4862

4963
emails, err = user_model.GetEmailAddresses(db.DefaultContext, user.ID)
5064
assert.NoError(t, err)
51-
assert.Len(t, emails, 2)
65+
assert.Len(t, emails, 3)
5266
}
5367

5468
func TestReplacePrimaryEmailAddress(t *testing.T) {

tests/integration/api_admin_test.go

+29
Original file line numberDiff line numberDiff line change
@@ -359,3 +359,32 @@ func TestAPICreateUser_NotAllowedEmailDomain(t *testing.T) {
359359
req = NewRequest(t, "DELETE", "/api/v1/admin/users/allowedUser1").AddTokenAuth(token)
360360
MakeRequest(t, req, http.StatusNoContent)
361361
}
362+
363+
func TestAPIEditUser_NotAllowedEmailDomain(t *testing.T) {
364+
defer tests.PrepareTestEnv(t)()
365+
366+
setting.Service.EmailDomainAllowList = []glob.Glob{glob.MustCompile("example.org")}
367+
defer func() {
368+
setting.Service.EmailDomainAllowList = []glob.Glob{}
369+
}()
370+
371+
adminUsername := "user1"
372+
token := getUserToken(t, adminUsername, auth_model.AccessTokenScopeWriteAdmin)
373+
urlStr := fmt.Sprintf("/api/v1/admin/users/%s", "user2")
374+
375+
newEmail := "[email protected]"
376+
req := NewRequestWithJSON(t, "PATCH", urlStr, api.EditUserOption{
377+
LoginName: "user2",
378+
SourceID: 0,
379+
Email: &newEmail,
380+
}).AddTokenAuth(token)
381+
MakeRequest(t, req, http.StatusOK)
382+
383+
originalEmail := "[email protected]"
384+
req = NewRequestWithJSON(t, "PATCH", urlStr, api.EditUserOption{
385+
LoginName: "user2",
386+
SourceID: 0,
387+
Email: &originalEmail,
388+
}).AddTokenAuth(token)
389+
MakeRequest(t, req, http.StatusOK)
390+
}

0 commit comments

Comments
 (0)