access_tokens_test.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233
  1. package database
  2. import (
  3. "context"
  4. "testing"
  5. "time"
  6. "github.com/stretchr/testify/assert"
  7. "github.com/stretchr/testify/require"
  8. "gorm.io/gorm"
  9. "gogs.io/gogs/internal/errutil"
  10. )
  11. func TestAccessToken_BeforeCreate(t *testing.T) {
  12. now := time.Now()
  13. db := &gorm.DB{
  14. Config: &gorm.Config{
  15. SkipDefaultTransaction: true,
  16. NowFunc: func() time.Time {
  17. return now
  18. },
  19. },
  20. }
  21. t.Run("CreatedUnix has been set", func(t *testing.T) {
  22. token := &AccessToken{
  23. CreatedUnix: 1,
  24. }
  25. _ = token.BeforeCreate(db)
  26. assert.Equal(t, int64(1), token.CreatedUnix)
  27. assert.Equal(t, int64(0), token.UpdatedUnix) // Do not set UpdatedUnix until it is used.
  28. })
  29. t.Run("CreatedUnix has not been set", func(t *testing.T) {
  30. token := &AccessToken{}
  31. _ = token.BeforeCreate(db)
  32. assert.Equal(t, db.NowFunc().Unix(), token.CreatedUnix)
  33. assert.Equal(t, int64(0), token.UpdatedUnix) // Do not set UpdatedUnix until it is used.
  34. })
  35. }
  36. func TestAccessToken_AfterFind(t *testing.T) {
  37. now := time.Now()
  38. db := &gorm.DB{
  39. Config: &gorm.Config{
  40. SkipDefaultTransaction: true,
  41. NowFunc: func() time.Time {
  42. return now
  43. },
  44. },
  45. }
  46. t.Run("UpdatedUnix has been set and within 7 days", func(t *testing.T) {
  47. token := &AccessToken{
  48. CreatedUnix: now.Unix(),
  49. UpdatedUnix: now.Add(time.Second).Unix(),
  50. }
  51. _ = token.AfterFind(db)
  52. assert.Equal(t, token.CreatedUnix, token.Created.Unix())
  53. assert.Equal(t, token.UpdatedUnix, token.Updated.Unix())
  54. assert.True(t, token.HasUsed)
  55. assert.True(t, token.HasRecentActivity)
  56. })
  57. t.Run("UpdatedUnix has been set and not within 7 days", func(t *testing.T) {
  58. token := &AccessToken{
  59. CreatedUnix: now.Add(-1 * 9 * 24 * time.Hour).Unix(),
  60. UpdatedUnix: now.Add(-1 * 8 * 24 * time.Hour).Unix(),
  61. }
  62. _ = token.AfterFind(db)
  63. assert.Equal(t, token.CreatedUnix, token.Created.Unix())
  64. assert.Equal(t, token.UpdatedUnix, token.Updated.Unix())
  65. assert.True(t, token.HasUsed)
  66. assert.False(t, token.HasRecentActivity)
  67. })
  68. t.Run("UpdatedUnix has not been set", func(t *testing.T) {
  69. token := &AccessToken{
  70. CreatedUnix: now.Unix(),
  71. }
  72. _ = token.AfterFind(db)
  73. assert.Equal(t, token.CreatedUnix, token.Created.Unix())
  74. assert.True(t, token.Updated.IsZero())
  75. assert.False(t, token.HasUsed)
  76. assert.False(t, token.HasRecentActivity)
  77. })
  78. }
  79. func TestAccessTokens(t *testing.T) {
  80. if testing.Short() {
  81. t.Skip()
  82. }
  83. t.Parallel()
  84. ctx := context.Background()
  85. s := &AccessTokensStore{
  86. db: newTestDB(t, "AccessTokensStore"),
  87. }
  88. for _, tc := range []struct {
  89. name string
  90. test func(t *testing.T, ctx context.Context, s *AccessTokensStore)
  91. }{
  92. {"Create", accessTokensCreate},
  93. {"DeleteByID", accessTokensDeleteByID},
  94. {"GetBySHA1", accessTokensGetBySHA},
  95. {"List", accessTokensList},
  96. {"Touch", accessTokensTouch},
  97. } {
  98. t.Run(tc.name, func(t *testing.T) {
  99. t.Cleanup(func() {
  100. err := clearTables(t, s.db)
  101. require.NoError(t, err)
  102. })
  103. tc.test(t, ctx, s)
  104. })
  105. if t.Failed() {
  106. break
  107. }
  108. }
  109. }
  110. func accessTokensCreate(t *testing.T, ctx context.Context, s *AccessTokensStore) {
  111. // Create first access token with name "Test"
  112. token, err := s.Create(ctx, 1, "Test")
  113. require.NoError(t, err)
  114. assert.Equal(t, int64(1), token.UserID)
  115. assert.Equal(t, "Test", token.Name)
  116. assert.Equal(t, 40, len(token.Sha1), "sha1 length")
  117. // Get it back and check the Created field
  118. token, err = s.GetBySHA1(ctx, token.Sha1)
  119. require.NoError(t, err)
  120. assert.Equal(t, s.db.NowFunc().Format(time.RFC3339), token.Created.UTC().Format(time.RFC3339))
  121. // Try create second access token with same name should fail
  122. _, err = s.Create(ctx, token.UserID, token.Name)
  123. wantErr := ErrAccessTokenAlreadyExist{
  124. args: errutil.Args{
  125. "userID": token.UserID,
  126. "name": token.Name,
  127. },
  128. }
  129. assert.Equal(t, wantErr, err)
  130. }
  131. func accessTokensDeleteByID(t *testing.T, ctx context.Context, s *AccessTokensStore) {
  132. // Create an access token with name "Test"
  133. token, err := s.Create(ctx, 1, "Test")
  134. require.NoError(t, err)
  135. // Delete a token with mismatched user ID is noop
  136. err = s.DeleteByID(ctx, 2, token.ID)
  137. require.NoError(t, err)
  138. // We should be able to get it back
  139. _, err = s.GetBySHA1(ctx, token.Sha1)
  140. require.NoError(t, err)
  141. // Now delete this token with correct user ID
  142. err = s.DeleteByID(ctx, token.UserID, token.ID)
  143. require.NoError(t, err)
  144. // We should get token not found error
  145. _, err = s.GetBySHA1(ctx, token.Sha1)
  146. wantErr := ErrAccessTokenNotExist{
  147. args: errutil.Args{
  148. "sha": token.Sha1,
  149. },
  150. }
  151. assert.Equal(t, wantErr, err)
  152. }
  153. func accessTokensGetBySHA(t *testing.T, ctx context.Context, s *AccessTokensStore) {
  154. // Create an access token with name "Test"
  155. token, err := s.Create(ctx, 1, "Test")
  156. require.NoError(t, err)
  157. // We should be able to get it back
  158. _, err = s.GetBySHA1(ctx, token.Sha1)
  159. require.NoError(t, err)
  160. // Try to get a non-existent token
  161. _, err = s.GetBySHA1(ctx, "bad_sha")
  162. wantErr := ErrAccessTokenNotExist{
  163. args: errutil.Args{
  164. "sha": "bad_sha",
  165. },
  166. }
  167. assert.Equal(t, wantErr, err)
  168. }
  169. func accessTokensList(t *testing.T, ctx context.Context, s *AccessTokensStore) {
  170. // Create two access tokens for user 1
  171. _, err := s.Create(ctx, 1, "user1_1")
  172. require.NoError(t, err)
  173. _, err = s.Create(ctx, 1, "user1_2")
  174. require.NoError(t, err)
  175. // Create one access token for user 2
  176. _, err = s.Create(ctx, 2, "user2_1")
  177. require.NoError(t, err)
  178. // List all access tokens for user 1
  179. tokens, err := s.List(ctx, 1)
  180. require.NoError(t, err)
  181. require.Equal(t, 2, len(tokens), "number of tokens")
  182. assert.Equal(t, int64(1), tokens[0].UserID)
  183. assert.Equal(t, "user1_1", tokens[0].Name)
  184. assert.Equal(t, int64(1), tokens[1].UserID)
  185. assert.Equal(t, "user1_2", tokens[1].Name)
  186. }
  187. func accessTokensTouch(t *testing.T, ctx context.Context, s *AccessTokensStore) {
  188. // Create an access token with name "Test"
  189. token, err := s.Create(ctx, 1, "Test")
  190. require.NoError(t, err)
  191. // Updated field is zero now
  192. assert.True(t, token.Updated.IsZero())
  193. err = s.Touch(ctx, token.ID)
  194. require.NoError(t, err)
  195. // Get back from DB should have Updated set
  196. token, err = s.GetBySHA1(ctx, token.Sha1)
  197. require.NoError(t, err)
  198. assert.Equal(t, s.db.NowFunc().Format(time.RFC3339), token.Updated.UTC().Format(time.RFC3339))
  199. }