Платформа ЦРНП "Мирокод" для разработки проектов
https://git.mirocod.ru
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
129 lines
3.5 KiB
129 lines
3.5 KiB
// Copyright 2016 The Gitea Authors. All rights reserved. |
|
// Use of this source code is governed by a MIT-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package models |
|
|
|
import ( |
|
"testing" |
|
|
|
"github.com/stretchr/testify/assert" |
|
) |
|
|
|
func TestNewAccessToken(t *testing.T) { |
|
assert.NoError(t, PrepareTestDatabase()) |
|
token := &AccessToken{ |
|
UID: 3, |
|
Name: "Token C", |
|
} |
|
assert.NoError(t, NewAccessToken(token)) |
|
AssertExistsAndLoadBean(t, token) |
|
|
|
invalidToken := &AccessToken{ |
|
ID: token.ID, // duplicate |
|
UID: 2, |
|
Name: "Token F", |
|
} |
|
assert.Error(t, NewAccessToken(invalidToken)) |
|
} |
|
|
|
func TestAccessTokenByNameExists(t *testing.T) { |
|
name := "Token Gitea" |
|
|
|
assert.NoError(t, PrepareTestDatabase()) |
|
token := &AccessToken{ |
|
UID: 3, |
|
Name: name, |
|
} |
|
|
|
// Check to make sure it doesn't exists already |
|
exist, err := AccessTokenByNameExists(token) |
|
assert.NoError(t, err) |
|
assert.False(t, exist) |
|
|
|
// Save it to the database |
|
assert.NoError(t, NewAccessToken(token)) |
|
AssertExistsAndLoadBean(t, token) |
|
|
|
// This token must be found by name in the DB now |
|
exist, err = AccessTokenByNameExists(token) |
|
assert.NoError(t, err) |
|
assert.True(t, exist) |
|
|
|
user4Token := &AccessToken{ |
|
UID: 4, |
|
Name: name, |
|
} |
|
|
|
// Name matches but different user ID, this shouldn't exists in the |
|
// database |
|
exist, err = AccessTokenByNameExists(user4Token) |
|
assert.NoError(t, err) |
|
assert.False(t, exist) |
|
} |
|
|
|
func TestGetAccessTokenBySHA(t *testing.T) { |
|
assert.NoError(t, PrepareTestDatabase()) |
|
token, err := GetAccessTokenBySHA("d2c6c1ba3890b309189a8e618c72a162e4efbf36") |
|
assert.NoError(t, err) |
|
assert.Equal(t, int64(1), token.UID) |
|
assert.Equal(t, "Token A", token.Name) |
|
assert.Equal(t, "2b3668e11cb82d3af8c6e4524fc7841297668f5008d1626f0ad3417e9fa39af84c268248b78c481daa7e5dc437784003494f", token.TokenHash) |
|
assert.Equal(t, "e4efbf36", token.TokenLastEight) |
|
|
|
_, err = GetAccessTokenBySHA("notahash") |
|
assert.Error(t, err) |
|
assert.True(t, IsErrAccessTokenNotExist(err)) |
|
|
|
_, err = GetAccessTokenBySHA("") |
|
assert.Error(t, err) |
|
assert.True(t, IsErrAccessTokenEmpty(err)) |
|
} |
|
|
|
func TestListAccessTokens(t *testing.T) { |
|
assert.NoError(t, PrepareTestDatabase()) |
|
tokens, err := ListAccessTokens(ListAccessTokensOptions{UserID: 1}) |
|
assert.NoError(t, err) |
|
if assert.Len(t, tokens, 2) { |
|
assert.Equal(t, int64(1), tokens[0].UID) |
|
assert.Equal(t, int64(1), tokens[1].UID) |
|
assert.Contains(t, []string{tokens[0].Name, tokens[1].Name}, "Token A") |
|
assert.Contains(t, []string{tokens[0].Name, tokens[1].Name}, "Token B") |
|
} |
|
|
|
tokens, err = ListAccessTokens(ListAccessTokensOptions{UserID: 2}) |
|
assert.NoError(t, err) |
|
if assert.Len(t, tokens, 1) { |
|
assert.Equal(t, int64(2), tokens[0].UID) |
|
assert.Equal(t, "Token A", tokens[0].Name) |
|
} |
|
|
|
tokens, err = ListAccessTokens(ListAccessTokensOptions{UserID: 100}) |
|
assert.NoError(t, err) |
|
assert.Empty(t, tokens) |
|
} |
|
|
|
func TestUpdateAccessToken(t *testing.T) { |
|
assert.NoError(t, PrepareTestDatabase()) |
|
token, err := GetAccessTokenBySHA("4c6f36e6cf498e2a448662f915d932c09c5a146c") |
|
assert.NoError(t, err) |
|
token.Name = "Token Z" |
|
|
|
assert.NoError(t, UpdateAccessToken(token)) |
|
AssertExistsAndLoadBean(t, token) |
|
} |
|
|
|
func TestDeleteAccessTokenByID(t *testing.T) { |
|
assert.NoError(t, PrepareTestDatabase()) |
|
|
|
token, err := GetAccessTokenBySHA("4c6f36e6cf498e2a448662f915d932c09c5a146c") |
|
assert.NoError(t, err) |
|
assert.Equal(t, int64(1), token.UID) |
|
|
|
assert.NoError(t, DeleteAccessTokenByID(token.ID, 1)) |
|
AssertNotExistsBean(t, token) |
|
|
|
err = DeleteAccessTokenByID(100, 100) |
|
assert.Error(t, err) |
|
assert.True(t, IsErrAccessTokenNotExist(err)) |
|
}
|
|
|