access_tokens_test.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package db
  5. import (
  6. "context"
  7. "testing"
  8. "time"
  9. "github.com/stretchr/testify/assert"
  10. "github.com/stretchr/testify/require"
  11. "gorm.io/gorm"
  12. "gogs.io/gogs/internal/errutil"
  13. )
  14. func TestAccessToken_BeforeCreate(t *testing.T) {
  15. now := time.Now()
  16. db := &gorm.DB{
  17. Config: &gorm.Config{
  18. NowFunc: func() time.Time {
  19. return now
  20. },
  21. },
  22. }
  23. t.Run("CreatedUnix has been set", func(t *testing.T) {
  24. token := &AccessToken{CreatedUnix: 1}
  25. _ = token.BeforeCreate(db)
  26. assert.Equal(t, int64(1), token.CreatedUnix)
  27. assert.Equal(t, int64(0), token.UpdatedUnix)
  28. })
  29. t.Run("CreatedUnix has not been set", func(t *testing.T) {
  30. token := &AccessToken{}
  31. _ = token.BeforeCreate(db)
  32. assert.Equal(t, db.NowFunc().Unix(), token.CreatedUnix)
  33. assert.Equal(t, int64(0), token.UpdatedUnix)
  34. })
  35. }
  36. func TestAccessTokens(t *testing.T) {
  37. if testing.Short() {
  38. t.Skip()
  39. }
  40. t.Parallel()
  41. tables := []interface{}{new(AccessToken)}
  42. db := &accessTokens{
  43. DB: initTestDB(t, "accessTokens", tables...),
  44. }
  45. for _, tc := range []struct {
  46. name string
  47. test func(*testing.T, *accessTokens)
  48. }{
  49. {"Create", accessTokensCreate},
  50. {"DeleteByID", accessTokensDeleteByID},
  51. {"GetBySHA1", accessTokensGetBySHA},
  52. {"List", accessTokensList},
  53. {"Touch", accessTokensTouch},
  54. } {
  55. t.Run(tc.name, func(t *testing.T) {
  56. t.Cleanup(func() {
  57. err := clearTables(t, db.DB, tables...)
  58. if err != nil {
  59. t.Fatal(err)
  60. }
  61. })
  62. tc.test(t, db)
  63. })
  64. if t.Failed() {
  65. break
  66. }
  67. }
  68. }
  69. func accessTokensCreate(t *testing.T, db *accessTokens) {
  70. ctx := context.Background()
  71. // Create first access token with name "Test"
  72. token, err := db.Create(ctx, 1, "Test")
  73. require.NoError(t, err)
  74. assert.Equal(t, int64(1), token.UserID)
  75. assert.Equal(t, "Test", token.Name)
  76. assert.Equal(t, 40, len(token.Sha1), "sha1 length")
  77. // Get it back and check the Created field
  78. token, err = db.GetBySHA1(ctx, token.Sha1)
  79. require.NoError(t, err)
  80. assert.Equal(t, db.NowFunc().Format(time.RFC3339), token.Created.UTC().Format(time.RFC3339))
  81. // Try create second access token with same name should fail
  82. _, err = db.Create(ctx, token.UserID, token.Name)
  83. wantErr := ErrAccessTokenAlreadyExist{args: errutil.Args{"userID": token.UserID, "name": token.Name}}
  84. assert.Equal(t, wantErr, err)
  85. }
  86. func accessTokensDeleteByID(t *testing.T, db *accessTokens) {
  87. ctx := context.Background()
  88. // Create an access token with name "Test"
  89. token, err := db.Create(ctx, 1, "Test")
  90. require.NoError(t, err)
  91. // Delete a token with mismatched user ID is noop
  92. err = db.DeleteByID(ctx, 2, token.ID)
  93. require.NoError(t, err)
  94. // We should be able to get it back
  95. _, err = db.GetBySHA1(ctx, token.Sha1)
  96. require.NoError(t, err)
  97. _, err = db.GetBySHA1(ctx, token.Sha1)
  98. require.NoError(t, err)
  99. // Now delete this token with correct user ID
  100. err = db.DeleteByID(ctx, token.UserID, token.ID)
  101. require.NoError(t, err)
  102. // We should get token not found error
  103. _, err = db.GetBySHA1(ctx, token.Sha1)
  104. expErr := ErrAccessTokenNotExist{args: errutil.Args{"sha": token.Sha1}}
  105. assert.Equal(t, expErr, err)
  106. }
  107. func accessTokensGetBySHA(t *testing.T, db *accessTokens) {
  108. ctx := context.Background()
  109. // Create an access token with name "Test"
  110. token, err := db.Create(ctx, 1, "Test")
  111. require.NoError(t, err)
  112. // We should be able to get it back
  113. _, err = db.GetBySHA1(ctx, token.Sha1)
  114. require.NoError(t, err)
  115. // Try to get a non-existent token
  116. _, err = db.GetBySHA1(ctx, "bad_sha")
  117. expErr := ErrAccessTokenNotExist{args: errutil.Args{"sha": "bad_sha"}}
  118. assert.Equal(t, expErr, err)
  119. }
  120. func accessTokensList(t *testing.T, db *accessTokens) {
  121. ctx := context.Background()
  122. // Create two access tokens for user 1
  123. _, err := db.Create(ctx, 1, "user1_1")
  124. require.NoError(t, err)
  125. _, err = db.Create(ctx, 1, "user1_2")
  126. require.NoError(t, err)
  127. // Create one access token for user 2
  128. _, err = db.Create(ctx, 2, "user2_1")
  129. require.NoError(t, err)
  130. // List all access tokens for user 1
  131. tokens, err := db.List(ctx, 1)
  132. require.NoError(t, err)
  133. assert.Equal(t, 2, len(tokens), "number of tokens")
  134. assert.Equal(t, int64(1), tokens[0].UserID)
  135. assert.Equal(t, "user1_1", tokens[0].Name)
  136. assert.Equal(t, int64(1), tokens[1].UserID)
  137. assert.Equal(t, "user1_2", tokens[1].Name)
  138. }
  139. func accessTokensTouch(t *testing.T, db *accessTokens) {
  140. ctx := context.Background()
  141. // Create an access token with name "Test"
  142. token, err := db.Create(ctx, 1, "Test")
  143. require.NoError(t, err)
  144. // Updated field is zero now
  145. assert.True(t, token.Updated.IsZero())
  146. err = db.Touch(ctx, token.ID)
  147. require.NoError(t, err)
  148. // Get back from DB should have Updated set
  149. token, err = db.GetBySHA1(ctx, token.Sha1)
  150. require.NoError(t, err)
  151. assert.Equal(t, db.NowFunc().Format(time.RFC3339), token.Updated.UTC().Format(time.RFC3339))
  152. }