access_tokens_test.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package db
  5. import (
  6. "context"
  7. "testing"
  8. "time"
  9. "github.com/stretchr/testify/assert"
  10. "github.com/stretchr/testify/require"
  11. "gorm.io/gorm"
  12. "gogs.io/gogs/internal/dbtest"
  13. "gogs.io/gogs/internal/errutil"
  14. )
  15. func TestAccessToken_BeforeCreate(t *testing.T) {
  16. now := time.Now()
  17. db := &gorm.DB{
  18. Config: &gorm.Config{
  19. NowFunc: func() time.Time {
  20. return now
  21. },
  22. },
  23. }
  24. t.Run("CreatedUnix has been set", func(t *testing.T) {
  25. token := &AccessToken{CreatedUnix: 1}
  26. _ = token.BeforeCreate(db)
  27. assert.Equal(t, int64(1), token.CreatedUnix)
  28. assert.Equal(t, int64(0), token.UpdatedUnix)
  29. })
  30. t.Run("CreatedUnix has not been set", func(t *testing.T) {
  31. token := &AccessToken{}
  32. _ = token.BeforeCreate(db)
  33. assert.Equal(t, db.NowFunc().Unix(), token.CreatedUnix)
  34. assert.Equal(t, int64(0), token.UpdatedUnix)
  35. })
  36. }
  37. func TestAccessTokens(t *testing.T) {
  38. if testing.Short() {
  39. t.Skip()
  40. }
  41. t.Parallel()
  42. tables := []interface{}{new(AccessToken)}
  43. db := &accessTokens{
  44. DB: dbtest.NewDB(t, "accessTokens", tables...),
  45. }
  46. for _, tc := range []struct {
  47. name string
  48. test func(*testing.T, *accessTokens)
  49. }{
  50. {"Create", accessTokensCreate},
  51. {"DeleteByID", accessTokensDeleteByID},
  52. {"GetBySHA1", accessTokensGetBySHA},
  53. {"List", accessTokensList},
  54. {"Touch", accessTokensTouch},
  55. } {
  56. t.Run(tc.name, func(t *testing.T) {
  57. t.Cleanup(func() {
  58. err := clearTables(t, db.DB, tables...)
  59. require.NoError(t, err)
  60. })
  61. tc.test(t, db)
  62. })
  63. if t.Failed() {
  64. break
  65. }
  66. }
  67. }
  68. func accessTokensCreate(t *testing.T, db *accessTokens) {
  69. ctx := context.Background()
  70. // Create first access token with name "Test"
  71. token, err := db.Create(ctx, 1, "Test")
  72. require.NoError(t, err)
  73. assert.Equal(t, int64(1), token.UserID)
  74. assert.Equal(t, "Test", token.Name)
  75. assert.Equal(t, 40, len(token.Sha1), "sha1 length")
  76. // Get it back and check the Created field
  77. token, err = db.GetBySHA1(ctx, token.Sha1)
  78. require.NoError(t, err)
  79. assert.Equal(t, db.NowFunc().Format(time.RFC3339), token.Created.UTC().Format(time.RFC3339))
  80. // Try create second access token with same name should fail
  81. _, err = db.Create(ctx, token.UserID, token.Name)
  82. wantErr := ErrAccessTokenAlreadyExist{args: errutil.Args{"userID": token.UserID, "name": token.Name}}
  83. assert.Equal(t, wantErr, err)
  84. }
  85. func accessTokensDeleteByID(t *testing.T, db *accessTokens) {
  86. ctx := context.Background()
  87. // Create an access token with name "Test"
  88. token, err := db.Create(ctx, 1, "Test")
  89. require.NoError(t, err)
  90. // Delete a token with mismatched user ID is noop
  91. err = db.DeleteByID(ctx, 2, token.ID)
  92. require.NoError(t, err)
  93. // We should be able to get it back
  94. _, err = db.GetBySHA1(ctx, token.Sha1)
  95. require.NoError(t, err)
  96. _, err = db.GetBySHA1(ctx, token.Sha1)
  97. require.NoError(t, err)
  98. // Now delete this token with correct user ID
  99. err = db.DeleteByID(ctx, token.UserID, token.ID)
  100. require.NoError(t, err)
  101. // We should get token not found error
  102. _, err = db.GetBySHA1(ctx, token.Sha1)
  103. wantErr := ErrAccessTokenNotExist{args: errutil.Args{"sha": token.Sha1}}
  104. assert.Equal(t, wantErr, err)
  105. }
  106. func accessTokensGetBySHA(t *testing.T, db *accessTokens) {
  107. ctx := context.Background()
  108. // Create an access token with name "Test"
  109. token, err := db.Create(ctx, 1, "Test")
  110. require.NoError(t, err)
  111. // We should be able to get it back
  112. _, err = db.GetBySHA1(ctx, token.Sha1)
  113. require.NoError(t, err)
  114. // Try to get a non-existent token
  115. _, err = db.GetBySHA1(ctx, "bad_sha")
  116. wantErr := ErrAccessTokenNotExist{args: errutil.Args{"sha": "bad_sha"}}
  117. assert.Equal(t, wantErr, err)
  118. }
  119. func accessTokensList(t *testing.T, db *accessTokens) {
  120. ctx := context.Background()
  121. // Create two access tokens for user 1
  122. _, err := db.Create(ctx, 1, "user1_1")
  123. require.NoError(t, err)
  124. _, err = db.Create(ctx, 1, "user1_2")
  125. require.NoError(t, err)
  126. // Create one access token for user 2
  127. _, err = db.Create(ctx, 2, "user2_1")
  128. require.NoError(t, err)
  129. // List all access tokens for user 1
  130. tokens, err := db.List(ctx, 1)
  131. require.NoError(t, err)
  132. assert.Equal(t, 2, len(tokens), "number of tokens")
  133. assert.Equal(t, int64(1), tokens[0].UserID)
  134. assert.Equal(t, "user1_1", tokens[0].Name)
  135. assert.Equal(t, int64(1), tokens[1].UserID)
  136. assert.Equal(t, "user1_2", tokens[1].Name)
  137. }
  138. func accessTokensTouch(t *testing.T, db *accessTokens) {
  139. ctx := context.Background()
  140. // Create an access token with name "Test"
  141. token, err := db.Create(ctx, 1, "Test")
  142. require.NoError(t, err)
  143. // Updated field is zero now
  144. assert.True(t, token.Updated.IsZero())
  145. err = db.Touch(ctx, token.ID)
  146. require.NoError(t, err)
  147. // Get back from DB should have Updated set
  148. token, err = db.GetBySHA1(ctx, token.Sha1)
  149. require.NoError(t, err)
  150. assert.Equal(t, db.NowFunc().Format(time.RFC3339), token.Updated.UTC().Format(time.RFC3339))
  151. }