| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198 | // Copyright 2020 The Gogs Authors. All rights reserved.// Use of this source code is governed by a MIT-style// license that can be found in the LICENSE file.package dbimport (	"context"	"testing"	"time"	"github.com/stretchr/testify/assert"	"github.com/stretchr/testify/require"	"gorm.io/gorm"	"gogs.io/gogs/internal/dbtest"	"gogs.io/gogs/internal/errutil")func TestAccessToken_BeforeCreate(t *testing.T) {	now := time.Now()	db := &gorm.DB{		Config: &gorm.Config{			NowFunc: func() time.Time {				return now			},		},	}	t.Run("CreatedUnix has been set", func(t *testing.T) {		token := &AccessToken{CreatedUnix: 1}		_ = token.BeforeCreate(db)		assert.Equal(t, int64(1), token.CreatedUnix)		assert.Equal(t, int64(0), token.UpdatedUnix)	})	t.Run("CreatedUnix has not been set", func(t *testing.T) {		token := &AccessToken{}		_ = token.BeforeCreate(db)		assert.Equal(t, db.NowFunc().Unix(), token.CreatedUnix)		assert.Equal(t, int64(0), token.UpdatedUnix)	})}func TestAccessTokens(t *testing.T) {	if testing.Short() {		t.Skip()	}	t.Parallel()	tables := []interface{}{new(AccessToken)}	db := &accessTokens{		DB: dbtest.NewDB(t, "accessTokens", tables...),	}	for _, tc := range []struct {		name string		test func(*testing.T, *accessTokens)	}{		{"Create", accessTokensCreate},		{"DeleteByID", accessTokensDeleteByID},		{"GetBySHA1", accessTokensGetBySHA},		{"List", accessTokensList},		{"Touch", accessTokensTouch},	} {		t.Run(tc.name, func(t *testing.T) {			t.Cleanup(func() {				err := clearTables(t, db.DB, tables...)				require.NoError(t, err)			})			tc.test(t, db)		})		if t.Failed() {			break		}	}}func accessTokensCreate(t *testing.T, db *accessTokens) {	ctx := context.Background()	// Create first access token with name "Test"	token, err := db.Create(ctx, 1, "Test")	require.NoError(t, err)	assert.Equal(t, int64(1), token.UserID)	assert.Equal(t, "Test", token.Name)	assert.Equal(t, 40, len(token.Sha1), "sha1 length")	// Get it back and check the Created field	token, err = db.GetBySHA1(ctx, token.Sha1)	require.NoError(t, err)	assert.Equal(t, db.NowFunc().Format(time.RFC3339), token.Created.UTC().Format(time.RFC3339))	// Try create second access token with same name should fail	_, err = db.Create(ctx, token.UserID, token.Name)	wantErr := ErrAccessTokenAlreadyExist{		args: errutil.Args{			"userID": token.UserID,			"name":   token.Name,		},	}	assert.Equal(t, wantErr, err)}func accessTokensDeleteByID(t *testing.T, db *accessTokens) {	ctx := context.Background()	// Create an access token with name "Test"	token, err := db.Create(ctx, 1, "Test")	require.NoError(t, err)	// Delete a token with mismatched user ID is noop	err = db.DeleteByID(ctx, 2, token.ID)	require.NoError(t, err)	// We should be able to get it back	_, err = db.GetBySHA1(ctx, token.Sha1)	require.NoError(t, err)	// Now delete this token with correct user ID	err = db.DeleteByID(ctx, token.UserID, token.ID)	require.NoError(t, err)	// We should get token not found error	_, err = db.GetBySHA1(ctx, token.Sha1)	wantErr := ErrAccessTokenNotExist{		args: errutil.Args{			"sha": token.Sha1,		},	}	assert.Equal(t, wantErr, err)}func accessTokensGetBySHA(t *testing.T, db *accessTokens) {	ctx := context.Background()	// Create an access token with name "Test"	token, err := db.Create(ctx, 1, "Test")	require.NoError(t, err)	// We should be able to get it back	_, err = db.GetBySHA1(ctx, token.Sha1)	require.NoError(t, err)	// Try to get a non-existent token	_, err = db.GetBySHA1(ctx, "bad_sha")	wantErr := ErrAccessTokenNotExist{		args: errutil.Args{			"sha": "bad_sha",		},	}	assert.Equal(t, wantErr, err)}func accessTokensList(t *testing.T, db *accessTokens) {	ctx := context.Background()	// Create two access tokens for user 1	_, err := db.Create(ctx, 1, "user1_1")	require.NoError(t, err)	_, err = db.Create(ctx, 1, "user1_2")	require.NoError(t, err)	// Create one access token for user 2	_, err = db.Create(ctx, 2, "user2_1")	require.NoError(t, err)	// List all access tokens for user 1	tokens, err := db.List(ctx, 1)	require.NoError(t, err)	assert.Equal(t, 2, len(tokens), "number of tokens")	assert.Equal(t, int64(1), tokens[0].UserID)	assert.Equal(t, "user1_1", tokens[0].Name)	assert.Equal(t, int64(1), tokens[1].UserID)	assert.Equal(t, "user1_2", tokens[1].Name)}func accessTokensTouch(t *testing.T, db *accessTokens) {	ctx := context.Background()	// Create an access token with name "Test"	token, err := db.Create(ctx, 1, "Test")	require.NoError(t, err)	// Updated field is zero now	assert.True(t, token.Updated.IsZero())	err = db.Touch(ctx, token.ID)	require.NoError(t, err)	// Get back from DB should have Updated set	token, err = db.GetBySHA1(ctx, token.Sha1)	require.NoError(t, err)	assert.Equal(t, db.NowFunc().Format(time.RFC3339), token.Updated.UTC().Format(time.RFC3339))}
 |