mirror of
https://github.com/mattermost/mattermost.git
synced 2025-02-25 18:55:24 -06:00
* Introducing unit (not integration) tests for the app layer
* Initial support for unit tests at the API
* Adding unit tests support to the store layer
* Add unit tests support in commands
* Adding last tests needed for run unit tests properly
* Fixing govet
* Removing some duplication
* Fixing tests
* Fixing tests
* Not compiling test helpers with the main module for api
* Revert "Not compiling test helpers with the main module for api"
This reverts commit 36a199bbe0.
* Fixing tests
* Fixing unit tests
* More consistency between api4/apiteslib.go and app/helper_test.go
* Renaming things to make more obvious the new Setup functions purpose
* Reverting change in go.sum
* Start with empty mock for app layer
* Start with empty mock for api layer
* Start with empty mock for web layer
* Renaming SetupWithStoreMockConfig to SetupConfigWithStoreMock
* Fixing tests on web package
* Removing unnecesary function
117 lines
4.6 KiB
Go
117 lines
4.6 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package app
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
"testing"
|
|
|
|
"github.com/mattermost/mattermost-server/v5/model"
|
|
"github.com/mattermost/mattermost-server/v5/store/storetest/mocks"
|
|
"github.com/mattermost/mattermost-server/v5/utils/fileutils"
|
|
"github.com/stretchr/testify/mock"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestPluginPublicKeys(t *testing.T) {
|
|
th := SetupWithStoreMock(t)
|
|
defer th.TearDown()
|
|
|
|
mockStore := th.App.Srv().Store.(*mocks.Store)
|
|
mockUserStore := mocks.UserStore{}
|
|
mockUserStore.On("Count", mock.Anything).Return(int64(10), nil)
|
|
mockPostStore := mocks.PostStore{}
|
|
mockPostStore.On("GetMaxPostSize").Return(65535, nil)
|
|
mockSystemStore := mocks.SystemStore{}
|
|
mockSystemStore.On("GetByName", "InstallationDate").Return(&model.System{Name: "InstallationDate", Value: "10"}, nil)
|
|
mockStore.On("User").Return(&mockUserStore)
|
|
mockStore.On("Post").Return(&mockPostStore)
|
|
mockStore.On("System").Return(&mockSystemStore)
|
|
|
|
path, _ := fileutils.FindDir("tests")
|
|
publicKeyFilename := "test-public-key.plugin.gpg"
|
|
publicKey, err := ioutil.ReadFile(filepath.Join(path, publicKeyFilename))
|
|
require.Nil(t, err)
|
|
fileReader, err := os.Open(filepath.Join(path, publicKeyFilename))
|
|
require.Nil(t, err)
|
|
defer fileReader.Close()
|
|
th.App.AddPublicKey(publicKeyFilename, fileReader)
|
|
file, err := th.App.GetPublicKey(publicKeyFilename)
|
|
require.Nil(t, err)
|
|
require.Equal(t, publicKey, file)
|
|
_, err = th.App.GetPublicKey("wrong file name")
|
|
require.NotNil(t, err)
|
|
_, err = th.App.GetPublicKey("wrong-file-name.plugin.gpg")
|
|
require.NotNil(t, err)
|
|
|
|
err = th.App.DeletePublicKey("wrong file name")
|
|
require.Nil(t, err)
|
|
err = th.App.DeletePublicKey("wrong-file-name.plugin.gpg")
|
|
require.Nil(t, err)
|
|
|
|
err = th.App.DeletePublicKey(publicKeyFilename)
|
|
require.Nil(t, err)
|
|
_, err = th.App.GetPublicKey(publicKeyFilename)
|
|
require.NotNil(t, err)
|
|
}
|
|
|
|
func TestVerifySignature(t *testing.T) {
|
|
path, _ := fileutils.FindDir("tests")
|
|
pluginFilename := "testplugin.tar.gz"
|
|
signatureFilename := "testplugin.tar.gz.sig"
|
|
armoredSignatureFilename := "testplugin.tar.gz.asc"
|
|
publicKeyFilename := "development-public-key.gpg"
|
|
armoredPublicKeyFilename := "development-public-key.asc"
|
|
t.Run("verify armored signature and armored public key", func(t *testing.T) {
|
|
publicKeyFileReader, err := os.Open(filepath.Join(path, armoredPublicKeyFilename))
|
|
require.Nil(t, err)
|
|
defer publicKeyFileReader.Close()
|
|
pluginFileReader, err := os.Open(filepath.Join(path, pluginFilename))
|
|
require.Nil(t, err)
|
|
defer pluginFileReader.Close()
|
|
signatureFileReader, err := os.Open(filepath.Join(path, armoredSignatureFilename))
|
|
require.Nil(t, err)
|
|
defer signatureFileReader.Close()
|
|
require.Nil(t, verifySignature(publicKeyFileReader, pluginFileReader, signatureFileReader))
|
|
})
|
|
t.Run("verify non armored signature and armored public key", func(t *testing.T) {
|
|
publicKeyFileReader, err := os.Open(filepath.Join(path, armoredPublicKeyFilename))
|
|
require.Nil(t, err)
|
|
defer publicKeyFileReader.Close()
|
|
pluginFileReader, err := os.Open(filepath.Join(path, pluginFilename))
|
|
require.Nil(t, err)
|
|
defer pluginFileReader.Close()
|
|
signatureFileReader, err := os.Open(filepath.Join(path, signatureFilename))
|
|
require.Nil(t, err)
|
|
defer signatureFileReader.Close()
|
|
require.Nil(t, verifySignature(publicKeyFileReader, pluginFileReader, signatureFileReader))
|
|
})
|
|
t.Run("verify armored signature and non armored public key", func(t *testing.T) {
|
|
publicKeyFileReader, err := os.Open(filepath.Join(path, publicKeyFilename))
|
|
require.Nil(t, err)
|
|
defer publicKeyFileReader.Close()
|
|
pluginFileReader, err := os.Open(filepath.Join(path, pluginFilename))
|
|
require.Nil(t, err)
|
|
defer pluginFileReader.Close()
|
|
armoredSignatureFileReader, err := os.Open(filepath.Join(path, armoredSignatureFilename))
|
|
require.Nil(t, err)
|
|
defer armoredSignatureFileReader.Close()
|
|
require.Nil(t, verifySignature(publicKeyFileReader, pluginFileReader, armoredSignatureFileReader))
|
|
})
|
|
t.Run("verify non armored signature and non armored public key", func(t *testing.T) {
|
|
publicKeyFileReader, err := os.Open(filepath.Join(path, publicKeyFilename))
|
|
require.Nil(t, err)
|
|
defer publicKeyFileReader.Close()
|
|
pluginFileReader, err := os.Open(filepath.Join(path, pluginFilename))
|
|
require.Nil(t, err)
|
|
defer pluginFileReader.Close()
|
|
signatureFileReader, err := os.Open(filepath.Join(path, signatureFilename))
|
|
require.Nil(t, err)
|
|
defer signatureFileReader.Close()
|
|
require.Nil(t, verifySignature(publicKeyFileReader, pluginFileReader, signatureFileReader))
|
|
})
|
|
}
|