| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248 | 
							- // Copyright 2020 The Gogs Authors. All rights reserved.
 
- // Use of this source code is governed by a MIT-style
 
- // license that can be found in the LICENSE file.
 
- package db
 
- import (
 
- 	"context"
 
- 	"testing"
 
- 	"time"
 
- 	"github.com/stretchr/testify/assert"
 
- 	"github.com/stretchr/testify/require"
 
- 	"gorm.io/gorm"
 
- 	"gogs.io/gogs/internal/dbtest"
 
- 	"gogs.io/gogs/internal/errutil"
 
- )
 
- func TestAccessToken_BeforeCreate(t *testing.T) {
 
- 	now := time.Now()
 
- 	db := &gorm.DB{
 
- 		Config: &gorm.Config{
 
- 			SkipDefaultTransaction: true,
 
- 			NowFunc: func() time.Time {
 
- 				return now
 
- 			},
 
- 		},
 
- 	}
 
- 	t.Run("CreatedUnix has been set", func(t *testing.T) {
 
- 		token := &AccessToken{
 
- 			CreatedUnix: 1,
 
- 		}
 
- 		_ = token.BeforeCreate(db)
 
- 		assert.Equal(t, int64(1), token.CreatedUnix)
 
- 		assert.Equal(t, int64(0), token.UpdatedUnix) // Do not set UpdatedUnix until it is used.
 
- 	})
 
- 	t.Run("CreatedUnix has not been set", func(t *testing.T) {
 
- 		token := &AccessToken{}
 
- 		_ = token.BeforeCreate(db)
 
- 		assert.Equal(t, db.NowFunc().Unix(), token.CreatedUnix)
 
- 		assert.Equal(t, int64(0), token.UpdatedUnix) // Do not set UpdatedUnix until it is used.
 
- 	})
 
- }
 
- func TestAccessToken_AfterFind(t *testing.T) {
 
- 	now := time.Now()
 
- 	db := &gorm.DB{
 
- 		Config: &gorm.Config{
 
- 			SkipDefaultTransaction: true,
 
- 			NowFunc: func() time.Time {
 
- 				return now
 
- 			},
 
- 		},
 
- 	}
 
- 	t.Run("UpdatedUnix has been set and within 7 days", func(t *testing.T) {
 
- 		token := &AccessToken{
 
- 			CreatedUnix: now.Unix(),
 
- 			UpdatedUnix: now.Add(time.Second).Unix(),
 
- 		}
 
- 		_ = token.AfterFind(db)
 
- 		assert.Equal(t, token.CreatedUnix, token.Created.Unix())
 
- 		assert.Equal(t, token.UpdatedUnix, token.Updated.Unix())
 
- 		assert.True(t, token.HasUsed)
 
- 		assert.True(t, token.HasRecentActivity)
 
- 	})
 
- 	t.Run("UpdatedUnix has been set and not within 7 days", func(t *testing.T) {
 
- 		token := &AccessToken{
 
- 			CreatedUnix: now.Add(-1 * 9 * 24 * time.Hour).Unix(),
 
- 			UpdatedUnix: now.Add(-1 * 8 * 24 * time.Hour).Unix(),
 
- 		}
 
- 		_ = token.AfterFind(db)
 
- 		assert.Equal(t, token.CreatedUnix, token.Created.Unix())
 
- 		assert.Equal(t, token.UpdatedUnix, token.Updated.Unix())
 
- 		assert.True(t, token.HasUsed)
 
- 		assert.False(t, token.HasRecentActivity)
 
- 	})
 
- 	t.Run("UpdatedUnix has not been set", func(t *testing.T) {
 
- 		token := &AccessToken{
 
- 			CreatedUnix: now.Unix(),
 
- 		}
 
- 		_ = token.AfterFind(db)
 
- 		assert.Equal(t, token.CreatedUnix, token.Created.Unix())
 
- 		assert.True(t, token.Updated.IsZero())
 
- 		assert.False(t, token.HasUsed)
 
- 		assert.False(t, token.HasRecentActivity)
 
- 	})
 
- }
 
- func TestAccessTokens(t *testing.T) {
 
- 	if testing.Short() {
 
- 		t.Skip()
 
- 	}
 
- 	t.Parallel()
 
- 	tables := []interface{}{new(AccessToken)}
 
- 	db := &accessTokens{
 
- 		DB: dbtest.NewDB(t, "accessTokens", tables...),
 
- 	}
 
- 	for _, tc := range []struct {
 
- 		name string
 
- 		test func(t *testing.T, db *accessTokens)
 
- 	}{
 
- 		{"Create", accessTokensCreate},
 
- 		{"DeleteByID", accessTokensDeleteByID},
 
- 		{"GetBySHA1", accessTokensGetBySHA},
 
- 		{"List", accessTokensList},
 
- 		{"Touch", accessTokensTouch},
 
- 	} {
 
- 		t.Run(tc.name, func(t *testing.T) {
 
- 			t.Cleanup(func() {
 
- 				err := clearTables(t, db.DB, tables...)
 
- 				require.NoError(t, err)
 
- 			})
 
- 			tc.test(t, db)
 
- 		})
 
- 		if t.Failed() {
 
- 			break
 
- 		}
 
- 	}
 
- }
 
- func accessTokensCreate(t *testing.T, db *accessTokens) {
 
- 	ctx := context.Background()
 
- 	// Create first access token with name "Test"
 
- 	token, err := db.Create(ctx, 1, "Test")
 
- 	require.NoError(t, err)
 
- 	assert.Equal(t, int64(1), token.UserID)
 
- 	assert.Equal(t, "Test", token.Name)
 
- 	assert.Equal(t, 40, len(token.Sha1), "sha1 length")
 
- 	// Get it back and check the Created field
 
- 	token, err = db.GetBySHA1(ctx, token.Sha1)
 
- 	require.NoError(t, err)
 
- 	assert.Equal(t, db.NowFunc().Format(time.RFC3339), token.Created.UTC().Format(time.RFC3339))
 
- 	// Try create second access token with same name should fail
 
- 	_, err = db.Create(ctx, token.UserID, token.Name)
 
- 	wantErr := ErrAccessTokenAlreadyExist{
 
- 		args: errutil.Args{
 
- 			"userID": token.UserID,
 
- 			"name":   token.Name,
 
- 		},
 
- 	}
 
- 	assert.Equal(t, wantErr, err)
 
- }
 
- func accessTokensDeleteByID(t *testing.T, db *accessTokens) {
 
- 	ctx := context.Background()
 
- 	// Create an access token with name "Test"
 
- 	token, err := db.Create(ctx, 1, "Test")
 
- 	require.NoError(t, err)
 
- 	// Delete a token with mismatched user ID is noop
 
- 	err = db.DeleteByID(ctx, 2, token.ID)
 
- 	require.NoError(t, err)
 
- 	// We should be able to get it back
 
- 	_, err = db.GetBySHA1(ctx, token.Sha1)
 
- 	require.NoError(t, err)
 
- 	// Now delete this token with correct user ID
 
- 	err = db.DeleteByID(ctx, token.UserID, token.ID)
 
- 	require.NoError(t, err)
 
- 	// We should get token not found error
 
- 	_, err = db.GetBySHA1(ctx, token.Sha1)
 
- 	wantErr := ErrAccessTokenNotExist{
 
- 		args: errutil.Args{
 
- 			"sha": token.Sha1,
 
- 		},
 
- 	}
 
- 	assert.Equal(t, wantErr, err)
 
- }
 
- func accessTokensGetBySHA(t *testing.T, db *accessTokens) {
 
- 	ctx := context.Background()
 
- 	// Create an access token with name "Test"
 
- 	token, err := db.Create(ctx, 1, "Test")
 
- 	require.NoError(t, err)
 
- 	// We should be able to get it back
 
- 	_, err = db.GetBySHA1(ctx, token.Sha1)
 
- 	require.NoError(t, err)
 
- 	// Try to get a non-existent token
 
- 	_, err = db.GetBySHA1(ctx, "bad_sha")
 
- 	wantErr := ErrAccessTokenNotExist{
 
- 		args: errutil.Args{
 
- 			"sha": "bad_sha",
 
- 		},
 
- 	}
 
- 	assert.Equal(t, wantErr, err)
 
- }
 
- func accessTokensList(t *testing.T, db *accessTokens) {
 
- 	ctx := context.Background()
 
- 	// Create two access tokens for user 1
 
- 	_, err := db.Create(ctx, 1, "user1_1")
 
- 	require.NoError(t, err)
 
- 	_, err = db.Create(ctx, 1, "user1_2")
 
- 	require.NoError(t, err)
 
- 	// Create one access token for user 2
 
- 	_, err = db.Create(ctx, 2, "user2_1")
 
- 	require.NoError(t, err)
 
- 	// List all access tokens for user 1
 
- 	tokens, err := db.List(ctx, 1)
 
- 	require.NoError(t, err)
 
- 	assert.Equal(t, 2, len(tokens), "number of tokens")
 
- 	assert.Equal(t, int64(1), tokens[0].UserID)
 
- 	assert.Equal(t, "user1_1", tokens[0].Name)
 
- 	assert.Equal(t, int64(1), tokens[1].UserID)
 
- 	assert.Equal(t, "user1_2", tokens[1].Name)
 
- }
 
- func accessTokensTouch(t *testing.T, db *accessTokens) {
 
- 	ctx := context.Background()
 
- 	// Create an access token with name "Test"
 
- 	token, err := db.Create(ctx, 1, "Test")
 
- 	require.NoError(t, err)
 
- 	// Updated field is zero now
 
- 	assert.True(t, token.Updated.IsZero())
 
- 	err = db.Touch(ctx, token.ID)
 
- 	require.NoError(t, err)
 
- 	// Get back from DB should have Updated set
 
- 	token, err = db.GetBySHA1(ctx, token.Sha1)
 
- 	require.NoError(t, err)
 
- 	assert.Equal(t, db.NowFunc().Format(time.RFC3339), token.Updated.UTC().Format(time.RFC3339))
 
- }
 
 
  |