mirror of
https://github.com/mattermost/mattermost.git
synced 2025-02-25 18:55:24 -06:00
* improve performance on sendNotifications * Fix SQL queries * Remove get direct profiles, not needed anymore * Add raw data to error details if AppError fails to decode * men * Fix decode (#4052) * Fixing json decode * Adding unit test * Initial work for client scaling (#4051) * Begin adding paging to profiles API * Added more paging functionality * Finish hooking up admin console user lists * Add API for searching users and add searching to all user lists * Add lazy loading of profiles * Revert config.json * Fix unit tests and some style issues * Add GetProfilesFromList to Go driver and fix web unit test * Update etag for GetProfiles * Updating ui for filters and pagination (#4044) * Updating UI for pagination * Adjusting margins for filter row * Adjusting margin for specific modals * Adding relative padding to system console * Adjusting responsive view * Update client user tests * Minor fixes for direct messages modal (#4056) * Remove some unneeded initial load calls (#4057) * UX updates to user lists, added smart counts and bug fixes (#4059) * Improved getExplicitMentions and unit tests (#4064) * Refactor getting posts to lazy load profiles correctly (#4062) * Comment out SetActiveChannel test (#4066) * Profiler cpu, block, and memory profiler. (#4081) * Fix TestSetActiveChannel unit test (#4071) * Fixing build failure caused by dependancies updating (#4076) * Adding profiler * Fix admin_team_member_dropdown eslint errors * Bumping session cache size (#4077) * Bumping session cache size * Bumping status cache * Refactor how the client handles channel members to be large team friendly (#4106) * Refactor how the client handles channel members to be large team friendly * Change Id to ChannelId in ChannelStats model * Updated getChannelMember and getProfilesByIds routes to match proposal * Performance improvements (#4100) * Performance improvements * Fixing re-connect issue * Fixing error message * Some other minor perf tweaks * Some other minor perf tweaks * Fixing config file * Fixing buffer size * Fixing web socket send message * adding some error logging * fix getMe to be user required * Fix websocket event for new user * Fixing shutting down * Reverting web socket changes * Fixing logging lvl * Adding caching to GetMember * Adding some logging * Fixing caching * Fixing caching invalidate * Fixing direct message caching * Fixing caching * Fixing caching * Remove GetDirectProfiles from initial load * Adding logging and fixing websocket client * Adding back caching from bad merge. * Explicitly close go driver requests (#4162) * Refactored how the client handles team members to be more large team friendly (#4159) * Refactor getProfilesForDirectMessageList API into getAllProfiles API * Refactored how the client handles team members to be more large team friendly * Fix js error when receiving a notification * Fix JS error caused by current user being overwritten with sanitized version (#4165) * Adding error message to status failure (#4167) * Fix a few bugs caused by client scaling refactoring (#4170) * When there is no read replica, don't open a second set of connections to the master database (#4173) * Adding connection tacking to stats (#4174) * Reduce DB writes for statuses and other status related changes (#4175) * Fix bug preventing opening of DM channels from more modal (#4181) * Fixing socket timing error (#4183) * Fixing ping/pong handler * Fixing socket timing error * Commenting out status broadcasting * Removing user status changes * Removing user status changes * Removing user status changes * Removing user status changes * Adding DoPreComputeJson() * Performance improvements (#4194) * * Fix System Console Analytics queries * Add db.SetConnMaxLifetime to 15 minutes * Add "net/http/pprof" for profiling * Add FreeOSMemory() to manually release memory on reload config * Add flag to enable http profiler * Fix memory leak (#4197) * Fix memory leak * removed unneeded nil assignment * Fixing go routine leak (#4208) * Merge fixes * Merge fix * Refactored statuses to be queried by the client rather than broadcast by the server (#4212) * Refactored server code to reduce status broadcasts and to allow getting statuses by IDs * Refactor client code to periodically fetch statuses * Add store unit test for getting statuses by ids * Fix status unit test * Add getStatusesByIds REST API and move the client over to use that instead of the WebSocket * Adding multiple threads to websocket hub (#4230) * Adding multiple threads to websocket hub * Fixing unit tests * Fixing so websocket connections from the same user end up in the same… (#4240) * Fixing so websocket connections from the same user end up in the same list * Removing old comment * Refactor user autocomplete to query the server (#4239) * Add API for autocompleting users * Converted at mention autocomplete to query server * Converted user search autocomplete to query server * Switch autocomplete API naming to use term instead of username * Split autocomplete API into two, one for channels and for teams * Fix copy/paste error * Some final client scaling fixes (#4246) * Add lazy loading of profiles to integration pages * Add lazy loading of profiles to emoji page * Fix JS error when receiving post in select team menu and also clean up channel store
2230 lines
65 KiB
Go
2230 lines
65 KiB
Go
// Copyright (c) 2015 Mattermost, Inc. All Rights Reserved.
|
|
// See License.txt for license information.
|
|
|
|
package api
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"image"
|
|
"image/color"
|
|
"io"
|
|
"mime/multipart"
|
|
"net/http"
|
|
"os"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/goamz/goamz/aws"
|
|
"github.com/goamz/goamz/s3"
|
|
|
|
"github.com/mattermost/platform/model"
|
|
"github.com/mattermost/platform/store"
|
|
"github.com/mattermost/platform/utils"
|
|
)
|
|
|
|
func TestCreateUser(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower("success+"+model.NewId()) + "@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "hello1", Username: "n" + model.NewId()}
|
|
|
|
ruser, err := Client.CreateUser(&user, "")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
LinkUserToTeam(ruser.Data.(*model.User), rteam.Data.(*model.Team))
|
|
|
|
if ruser.Data.(*model.User).Nickname != user.Nickname {
|
|
t.Fatal("nickname didn't match")
|
|
}
|
|
|
|
if ruser.Data.(*model.User).Password != "" {
|
|
t.Fatal("password wasn't blank")
|
|
}
|
|
|
|
if _, err := Client.CreateUser(ruser.Data.(*model.User), ""); err == nil {
|
|
t.Fatal("Cannot create an existing")
|
|
}
|
|
|
|
ruser.Data.(*model.User).Id = ""
|
|
ruser.Data.(*model.User).Username = "n" + model.NewId()
|
|
ruser.Data.(*model.User).Password = "passwd1"
|
|
if _, err := Client.CreateUser(ruser.Data.(*model.User), ""); err != nil {
|
|
if err.Message != "An account with that email already exists." {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
ruser.Data.(*model.User).Email = "success+" + model.NewId() + "@simulator.amazonses.com"
|
|
ruser.Data.(*model.User).Username = user.Username
|
|
if _, err := Client.CreateUser(ruser.Data.(*model.User), ""); err != nil {
|
|
if err.Message != "An account with that username already exists." {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
ruser.Data.(*model.User).Email = ""
|
|
if _, err := Client.CreateUser(ruser.Data.(*model.User), ""); err != nil {
|
|
if err.Message != "Invalid email" {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
if _, err := Client.DoApiPost("/users/create", "garbage"); err == nil {
|
|
t.Fatal("should have been an error")
|
|
}
|
|
}
|
|
|
|
func TestLogin(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
enableSignInWithEmail := *utils.Cfg.EmailSettings.EnableSignInWithEmail
|
|
enableSignInWithUsername := *utils.Cfg.EmailSettings.EnableSignInWithUsername
|
|
enableLdap := *utils.Cfg.LdapSettings.Enable
|
|
defer func() {
|
|
*utils.Cfg.EmailSettings.EnableSignInWithEmail = enableSignInWithEmail
|
|
*utils.Cfg.EmailSettings.EnableSignInWithUsername = enableSignInWithUsername
|
|
*utils.Cfg.LdapSettings.Enable = enableLdap
|
|
}()
|
|
|
|
*utils.Cfg.EmailSettings.EnableSignInWithEmail = false
|
|
*utils.Cfg.EmailSettings.EnableSignInWithUsername = false
|
|
*utils.Cfg.LdapSettings.Enable = false
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Username: "corey" + model.NewId(), Password: "passwd1"}
|
|
ruser, _ := Client.CreateUser(&user, "")
|
|
LinkUserToTeam(ruser.Data.(*model.User), rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser.Data.(*model.User).Id))
|
|
|
|
if result, err := Client.LoginById(ruser.Data.(*model.User).Id, user.Password); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
if result.Data.(*model.User).Email != user.Email {
|
|
t.Fatal("emails didn't match")
|
|
}
|
|
}
|
|
|
|
if _, err := Client.Login(user.Email, user.Password); err == nil {
|
|
t.Fatal("shouldn't be able to log in by email when disabled")
|
|
}
|
|
|
|
*utils.Cfg.EmailSettings.EnableSignInWithEmail = true
|
|
if result, err := Client.Login(user.Email, user.Password); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
if result.Data.(*model.User).Email != user.Email {
|
|
t.Fatal("emails didn't match")
|
|
}
|
|
}
|
|
|
|
if _, err := Client.Login(user.Username, user.Password); err == nil {
|
|
t.Fatal("shouldn't be able to log in by username when disabled")
|
|
}
|
|
|
|
*utils.Cfg.EmailSettings.EnableSignInWithUsername = true
|
|
if result, err := Client.Login(user.Username, user.Password); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
if result.Data.(*model.User).Email != user.Email {
|
|
t.Fatal("emails didn't match")
|
|
}
|
|
}
|
|
|
|
if _, err := Client.Login(user.Email, user.Password+"invalid"); err == nil {
|
|
t.Fatal("Invalid Password")
|
|
}
|
|
|
|
if _, err := Client.Login(user.Username, user.Password+"invalid"); err == nil {
|
|
t.Fatal("Invalid Password")
|
|
}
|
|
|
|
if _, err := Client.Login("", user.Password); err == nil {
|
|
t.Fatal("should have failed")
|
|
}
|
|
|
|
if _, err := Client.Login("", user.Password); err == nil {
|
|
t.Fatal("should have failed")
|
|
}
|
|
|
|
authToken := Client.AuthToken
|
|
Client.AuthToken = "invalid"
|
|
|
|
if _, err := Client.GetUser(ruser.Data.(*model.User).Id, ""); err == nil {
|
|
t.Fatal("should have failed")
|
|
}
|
|
|
|
Client.AuthToken = ""
|
|
|
|
team2 := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_INVITE}
|
|
rteam2 := Client.Must(Client.CreateTeam(&team2))
|
|
|
|
user2 := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
|
|
if _, err := Client.CreateUserFromSignup(&user2, "junk", "1231312"); err == nil {
|
|
t.Fatal("Should have errored, signed up without hashed email")
|
|
}
|
|
|
|
props := make(map[string]string)
|
|
props["email"] = user2.Email
|
|
props["id"] = rteam2.Data.(*model.Team).Id
|
|
props["display_name"] = rteam2.Data.(*model.Team).DisplayName
|
|
props["time"] = fmt.Sprintf("%v", model.GetMillis())
|
|
data := model.MapToJson(props)
|
|
hash := model.HashPassword(fmt.Sprintf("%v:%v", data, utils.Cfg.EmailSettings.InviteSalt))
|
|
|
|
ruser2, _ := Client.CreateUserFromSignup(&user2, data, hash)
|
|
|
|
if _, err := Client.Login(ruser2.Data.(*model.User).Email, user2.Password); err != nil {
|
|
t.Fatal("From verfied hash")
|
|
}
|
|
|
|
Client.AuthToken = authToken
|
|
|
|
user3 := &model.User{
|
|
Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com",
|
|
Nickname: "Corey Hulen",
|
|
Username: "corey" + model.NewId(),
|
|
Password: "passwd1",
|
|
AuthService: model.USER_AUTH_SERVICE_LDAP,
|
|
}
|
|
user3 = Client.Must(Client.CreateUser(user3, "")).Data.(*model.User)
|
|
store.Must(Srv.Store.User().VerifyEmail(user3.Id))
|
|
|
|
if _, err := Client.Login(user3.Id, user3.Password); err == nil {
|
|
t.Fatal("AD/LDAP user should not be able to log in with AD/LDAP disabled")
|
|
}
|
|
}
|
|
|
|
func TestLoginByLdap(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Username: "corey" + model.NewId(), Password: "passwd1"}
|
|
ruser, _ := Client.CreateUser(&user, "")
|
|
LinkUserToTeam(ruser.Data.(*model.User), rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser.Data.(*model.User).Id))
|
|
|
|
if _, err := Client.LoginByLdap(ruser.Data.(*model.User).Id, user.Password); err == nil {
|
|
t.Fatal("should have failed to log in with non AD/LDAP user")
|
|
}
|
|
}
|
|
|
|
func TestLoginWithDeviceId(t *testing.T) {
|
|
th := Setup().InitBasic()
|
|
Client := th.BasicClient
|
|
user := th.BasicUser
|
|
Client.Must(Client.Logout())
|
|
|
|
deviceId := model.NewId()
|
|
if result, err := Client.LoginWithDevice(user.Email, user.Password, deviceId); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
ruser := result.Data.(*model.User)
|
|
|
|
if ssresult, err := Client.GetSessions(ruser.Id); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
sessions := ssresult.Data.([]*model.Session)
|
|
if _, err := Client.LoginWithDevice(user.Email, user.Password, deviceId); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if sresult := <-Srv.Store.Session().Get(sessions[0].Id); sresult.Err == nil {
|
|
t.Fatal("session should have been removed")
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestPasswordGuessLockout(t *testing.T) {
|
|
th := Setup().InitBasic()
|
|
Client := th.BasicClient
|
|
user := th.BasicUser
|
|
Client.Must(Client.Logout())
|
|
|
|
enableSignInWithEmail := *utils.Cfg.EmailSettings.EnableSignInWithEmail
|
|
passwordAttempts := utils.Cfg.ServiceSettings.MaximumLoginAttempts
|
|
defer func() {
|
|
*utils.Cfg.EmailSettings.EnableSignInWithEmail = enableSignInWithEmail
|
|
utils.Cfg.ServiceSettings.MaximumLoginAttempts = passwordAttempts
|
|
}()
|
|
*utils.Cfg.EmailSettings.EnableSignInWithEmail = true
|
|
utils.Cfg.ServiceSettings.MaximumLoginAttempts = 2
|
|
|
|
// OK to log in
|
|
if _, err := Client.Login(user.Username, user.Password); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
Client.Must(Client.Logout())
|
|
|
|
// Fail twice
|
|
if _, err := Client.Login(user.Email, "notthepassword"); err == nil {
|
|
t.Fatal("Shouldn't be able to login with bad password.")
|
|
}
|
|
if _, err := Client.Login(user.Email, "notthepassword"); err == nil {
|
|
t.Fatal("Shouldn't be able to login with bad password.")
|
|
}
|
|
|
|
// Locked out
|
|
if _, err := Client.Login(user.Email, user.Password); err == nil {
|
|
t.Fatal("Shouldn't be able to login with password when account is locked out.")
|
|
}
|
|
}
|
|
|
|
func TestSessions(t *testing.T) {
|
|
th := Setup().InitBasic()
|
|
Client := th.BasicClient
|
|
user := th.BasicUser
|
|
Client.Must(Client.Logout())
|
|
|
|
deviceId := model.NewId()
|
|
Client.LoginWithDevice(user.Email, user.Password, deviceId)
|
|
Client.Login(user.Email, user.Password)
|
|
|
|
r1, err := Client.GetSessions(user.Id)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
sessions := r1.Data.([]*model.Session)
|
|
otherSession := ""
|
|
|
|
if len(sessions) != 2 {
|
|
t.Fatal("invalid number of sessions")
|
|
}
|
|
|
|
for _, session := range sessions {
|
|
if session.DeviceId == deviceId {
|
|
otherSession = session.Id
|
|
}
|
|
|
|
if len(session.Token) != 0 {
|
|
t.Fatal("shouldn't return session tokens")
|
|
}
|
|
}
|
|
|
|
if _, err := Client.RevokeSession(otherSession); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
r2, err := Client.GetSessions(user.Id)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
sessions2 := r2.Data.([]*model.Session)
|
|
|
|
if len(sessions2) != 1 {
|
|
t.Fatal("invalid number of sessions")
|
|
}
|
|
}
|
|
|
|
func TestGetUser(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
ruser, _ := Client.CreateUser(&user, "")
|
|
LinkUserToTeam(ruser.Data.(*model.User), rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser.Data.(*model.User).Id))
|
|
|
|
user2 := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1", FirstName: "Corey", LastName: "Hulen"}
|
|
ruser2, _ := Client.CreateUser(&user2, "")
|
|
LinkUserToTeam(ruser2.Data.(*model.User), rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser2.Data.(*model.User).Id))
|
|
|
|
team2 := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam2, _ := Client.CreateTeam(&team2)
|
|
|
|
user3 := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
ruser3, _ := Client.CreateUser(&user3, "")
|
|
LinkUserToTeam(ruser3.Data.(*model.User), rteam2.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser3.Data.(*model.User).Id))
|
|
|
|
Client.Login(user.Email, user.Password)
|
|
|
|
rId := ruser.Data.(*model.User).Id
|
|
if result, err := Client.GetUser(rId, ""); err != nil {
|
|
t.Fatal("Failed to get user")
|
|
} else {
|
|
if result.Data.(*model.User).Password != "" {
|
|
t.Fatal("User shouldn't have any password data once set")
|
|
}
|
|
|
|
if cache_result, err := Client.GetUser(rId, result.Etag); err != nil {
|
|
t.Fatal(err)
|
|
} else if cache_result.Data.(*model.User) != nil {
|
|
t.Fatal("cache should be empty")
|
|
}
|
|
}
|
|
|
|
if result, err := Client.GetMe(""); err != nil {
|
|
t.Fatal("Failed to get user")
|
|
} else {
|
|
if result.Data.(*model.User).Password != "" {
|
|
t.Fatal("User shouldn't have any password data once set")
|
|
}
|
|
}
|
|
|
|
if _, err := Client.GetUser("FORBIDDENERROR", ""); err == nil {
|
|
t.Fatal("shouldn't exist")
|
|
}
|
|
|
|
emailPrivacy := utils.Cfg.PrivacySettings.ShowEmailAddress
|
|
namePrivacy := utils.Cfg.PrivacySettings.ShowFullName
|
|
defer func() {
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = emailPrivacy
|
|
utils.Cfg.PrivacySettings.ShowFullName = namePrivacy
|
|
}()
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = false
|
|
utils.Cfg.PrivacySettings.ShowFullName = false
|
|
|
|
if result, err := Client.GetUser(ruser2.Data.(*model.User).Id, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
u := result.Data.(*model.User)
|
|
if u.Password != "" {
|
|
t.Fatal("password must be empty")
|
|
}
|
|
if *u.AuthData != "" {
|
|
t.Fatal("auth data must be empty")
|
|
}
|
|
if u.Email != "" {
|
|
t.Fatal("email should be sanitized")
|
|
}
|
|
if u.FirstName != "" {
|
|
t.Fatal("full name should be sanitized")
|
|
}
|
|
if u.LastName != "" {
|
|
t.Fatal("full name should be sanitized")
|
|
}
|
|
}
|
|
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = true
|
|
utils.Cfg.PrivacySettings.ShowFullName = true
|
|
|
|
if result, err := Client.GetUser(ruser2.Data.(*model.User).Id, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
u := result.Data.(*model.User)
|
|
if u.Email == "" {
|
|
t.Fatal("email should not be sanitized")
|
|
}
|
|
if u.FirstName == "" {
|
|
t.Fatal("full name should not be sanitized")
|
|
}
|
|
if u.LastName == "" {
|
|
t.Fatal("full name should not be sanitized")
|
|
}
|
|
}
|
|
|
|
if userMap, err := Client.GetProfilesInTeam(rteam.Data.(*model.Team).Id, 0, 100, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else if len(userMap.Data.(map[string]*model.User)) != 2 {
|
|
t.Fatal("should have been 2")
|
|
} else if userMap.Data.(map[string]*model.User)[rId].Id != rId {
|
|
t.Fatal("should have been valid")
|
|
} else {
|
|
|
|
// test etag caching
|
|
if cache_result, err := Client.GetProfilesInTeam(rteam.Data.(*model.Team).Id, 0, 100, userMap.Etag); err != nil {
|
|
t.Fatal(err)
|
|
} else if cache_result.Data.(map[string]*model.User) != nil {
|
|
t.Log(cache_result.Data)
|
|
t.Fatal("cache should be empty")
|
|
}
|
|
}
|
|
|
|
if userMap, err := Client.GetProfilesInTeam(rteam.Data.(*model.Team).Id, 0, 1, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else if len(userMap.Data.(map[string]*model.User)) != 1 {
|
|
t.Fatal("should have been 1")
|
|
}
|
|
|
|
if userMap, err := Client.GetProfilesInTeam(rteam.Data.(*model.Team).Id, 1, 1, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else if len(userMap.Data.(map[string]*model.User)) != 1 {
|
|
t.Fatal("should have been 1")
|
|
}
|
|
|
|
if userMap, err := Client.GetProfilesInTeam(rteam.Data.(*model.Team).Id, 10, 10, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else if len(userMap.Data.(map[string]*model.User)) != 0 {
|
|
t.Fatal("should have been 0")
|
|
}
|
|
|
|
if _, err := Client.GetProfilesInTeam(rteam2.Data.(*model.Team).Id, 0, 100, ""); err == nil {
|
|
t.Fatal("shouldn't have access")
|
|
}
|
|
|
|
Client.AuthToken = ""
|
|
if _, err := Client.GetUser(ruser2.Data.(*model.User).Id, ""); err == nil {
|
|
t.Fatal("shouldn't have accss")
|
|
}
|
|
|
|
c := &Context{}
|
|
c.RequestId = model.NewId()
|
|
c.IpAddress = "cmd_line"
|
|
UpdateUserRoles(c, ruser.Data.(*model.User), model.ROLE_SYSTEM_ADMIN.Id)
|
|
|
|
Client.Login(user.Email, "passwd1")
|
|
|
|
if _, err := Client.GetProfilesInTeam(rteam2.Data.(*model.Team).Id, 0, 100, ""); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestGetProfiles(t *testing.T) {
|
|
th := Setup().InitBasic()
|
|
|
|
th.BasicClient.Must(th.BasicClient.CreateDirectChannel(th.BasicUser2.Id))
|
|
|
|
prevShowEmail := utils.Cfg.PrivacySettings.ShowEmailAddress
|
|
defer func() {
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = prevShowEmail
|
|
}()
|
|
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = true
|
|
|
|
if result, err := th.BasicClient.GetProfiles(0, 100, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.(map[string]*model.User)
|
|
|
|
if len(users) < 1 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
|
|
for _, user := range users {
|
|
if user.Email == "" {
|
|
t.Fatal("problem with show email")
|
|
}
|
|
}
|
|
|
|
// test etag caching
|
|
if cache_result, err := th.BasicClient.GetProfiles(0, 100, result.Etag); err != nil {
|
|
t.Fatal(err)
|
|
} else if cache_result.Data.(map[string]*model.User) != nil {
|
|
t.Log(cache_result.Etag)
|
|
t.Log(result.Etag)
|
|
t.Fatal("cache should be empty")
|
|
}
|
|
}
|
|
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = false
|
|
|
|
if result, err := th.BasicClient.GetProfiles(0, 100, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.(map[string]*model.User)
|
|
|
|
if len(users) < 1 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
|
|
for _, user := range users {
|
|
if user.Email != "" {
|
|
t.Fatal("problem with show email")
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestGetProfilesByIds(t *testing.T) {
|
|
th := Setup().InitBasic()
|
|
|
|
prevShowEmail := utils.Cfg.PrivacySettings.ShowEmailAddress
|
|
defer func() {
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = prevShowEmail
|
|
}()
|
|
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = true
|
|
|
|
if result, err := th.BasicClient.GetProfilesByIds([]string{th.BasicUser.Id}); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.(map[string]*model.User)
|
|
|
|
if len(users) != 1 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
|
|
for _, user := range users {
|
|
if user.Email == "" {
|
|
t.Fatal("problem with show email")
|
|
}
|
|
}
|
|
}
|
|
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = false
|
|
|
|
if result, err := th.BasicClient.GetProfilesByIds([]string{th.BasicUser.Id}); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.(map[string]*model.User)
|
|
|
|
if len(users) != 1 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
|
|
for _, user := range users {
|
|
if user.Email != "" {
|
|
t.Fatal("problem with show email")
|
|
}
|
|
}
|
|
}
|
|
|
|
if result, err := th.BasicClient.GetProfilesByIds([]string{th.BasicUser.Id, th.BasicUser2.Id}); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.(map[string]*model.User)
|
|
|
|
if len(users) != 2 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestGetAudits(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
ruser, _ := Client.CreateUser(&user, "")
|
|
LinkUserToTeam(ruser.Data.(*model.User), rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser.Data.(*model.User).Id))
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
Client.Login(user.Email, user.Password)
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
if result, err := Client.GetAudits(ruser.Data.(*model.User).Id, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
|
|
if len(result.Data.(model.Audits)) != 2 {
|
|
t.Fatal(result.Data.(model.Audits))
|
|
}
|
|
|
|
if cache_result, err := Client.GetAudits(ruser.Data.(*model.User).Id, result.Etag); err != nil {
|
|
t.Fatal(err)
|
|
} else if cache_result.Data.(model.Audits) != nil {
|
|
t.Fatal("cache should be empty")
|
|
}
|
|
}
|
|
|
|
if _, err := Client.GetAudits("FORBIDDENERROR", ""); err == nil {
|
|
t.Fatal("audit log shouldn't exist")
|
|
}
|
|
}
|
|
|
|
func TestUserCreateImage(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
b, err := createProfileImage("Corey Hulen", "eo1zkdr96pdj98pjmq8zy35wba")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
rdr := bytes.NewReader(b)
|
|
img, _, err2 := image.Decode(rdr)
|
|
if err2 != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
colorful := color.RGBA{116, 49, 196, 255}
|
|
|
|
if img.At(1, 1) != colorful {
|
|
t.Fatal("Failed to create correct color")
|
|
}
|
|
|
|
team := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team = Client.Must(Client.CreateTeam(team)).Data.(*model.Team)
|
|
|
|
user := &model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user = Client.Must(Client.CreateUser(user, "")).Data.(*model.User)
|
|
LinkUserToTeam(user, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user.Id))
|
|
|
|
Client.Login(user.Email, "passwd1")
|
|
|
|
Client.DoApiGet("/users/"+user.Id+"/image", "", "")
|
|
|
|
if utils.Cfg.FileSettings.DriverName == model.IMAGE_DRIVER_S3 {
|
|
var auth aws.Auth
|
|
auth.AccessKey = utils.Cfg.FileSettings.AmazonS3AccessKeyId
|
|
auth.SecretKey = utils.Cfg.FileSettings.AmazonS3SecretAccessKey
|
|
|
|
s := s3.New(auth, aws.Regions[utils.Cfg.FileSettings.AmazonS3Region])
|
|
bucket := s.Bucket(utils.Cfg.FileSettings.AmazonS3Bucket)
|
|
|
|
if err := bucket.Del("/users/" + user.Id + "/profile.png"); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
} else {
|
|
path := utils.Cfg.FileSettings.Directory + "/users/" + user.Id + "/profile.png"
|
|
if err := os.Remove(path); err != nil {
|
|
t.Fatal("Couldn't remove file at " + path)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestUserUploadProfileImage(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team = Client.Must(Client.CreateTeam(team)).Data.(*model.Team)
|
|
|
|
user := &model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user = Client.Must(Client.CreateUser(user, "")).Data.(*model.User)
|
|
LinkUserToTeam(user, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user.Id))
|
|
|
|
if utils.Cfg.FileSettings.DriverName != "" {
|
|
|
|
body := &bytes.Buffer{}
|
|
writer := multipart.NewWriter(body)
|
|
|
|
if _, upErr := Client.UploadProfileFile(body.Bytes(), writer.FormDataContentType()); upErr == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
Client.Login(user.Email, "passwd1")
|
|
Client.SetTeamId(team.Id)
|
|
|
|
if _, upErr := Client.UploadProfileFile(body.Bytes(), writer.FormDataContentType()); upErr == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
part, err := writer.CreateFormFile("blargh", "test.png")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
path := utils.FindDir("tests")
|
|
file, err := os.Open(path + "/test.png")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer file.Close()
|
|
|
|
_, err = io.Copy(part, file)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if err := writer.Close(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if _, upErr := Client.UploadProfileFile(body.Bytes(), writer.FormDataContentType()); upErr == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
file2, err := os.Open(path + "/test.png")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer file2.Close()
|
|
|
|
body = &bytes.Buffer{}
|
|
writer = multipart.NewWriter(body)
|
|
|
|
part, err = writer.CreateFormFile("image", "test.png")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if _, err := io.Copy(part, file2); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if err := writer.Close(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if _, upErr := Client.UploadProfileFile(body.Bytes(), writer.FormDataContentType()); upErr != nil {
|
|
t.Fatal(upErr)
|
|
}
|
|
|
|
Client.DoApiGet("/users/"+user.Id+"/image", "", "")
|
|
|
|
if utils.Cfg.FileSettings.DriverName == model.IMAGE_DRIVER_S3 {
|
|
var auth aws.Auth
|
|
auth.AccessKey = utils.Cfg.FileSettings.AmazonS3AccessKeyId
|
|
auth.SecretKey = utils.Cfg.FileSettings.AmazonS3SecretAccessKey
|
|
|
|
s := s3.New(auth, aws.Regions[utils.Cfg.FileSettings.AmazonS3Region])
|
|
bucket := s.Bucket(utils.Cfg.FileSettings.AmazonS3Bucket)
|
|
|
|
if err := bucket.Del("users/" + user.Id + "/profile.png"); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
} else {
|
|
path := utils.Cfg.FileSettings.Directory + "users/" + user.Id + "/profile.png"
|
|
if err := os.Remove(path); err != nil {
|
|
t.Fatal("Couldn't remove file at " + path)
|
|
}
|
|
}
|
|
} else {
|
|
body := &bytes.Buffer{}
|
|
writer := multipart.NewWriter(body)
|
|
if _, upErr := Client.UploadProfileFile(body.Bytes(), writer.FormDataContentType()); upErr.StatusCode != http.StatusNotImplemented {
|
|
t.Fatal("Should have failed with 501 - Not Implemented")
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestUserUpdate(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team = Client.Must(Client.CreateTeam(team)).Data.(*model.Team)
|
|
|
|
user := &model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1", Roles: ""}
|
|
user = Client.Must(Client.CreateUser(user, "")).Data.(*model.User)
|
|
LinkUserToTeam(user, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user.Id))
|
|
|
|
if _, err := Client.UpdateUser(user); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
Client.Login(user.Email, "passwd1")
|
|
Client.SetTeamId(team.Id)
|
|
|
|
user.Nickname = "Jim Jimmy"
|
|
user.Roles = model.ROLE_SYSTEM_ADMIN.Id
|
|
user.LastPasswordUpdate = 123
|
|
|
|
if result, err := Client.UpdateUser(user); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
if result.Data.(*model.User).Nickname != "Jim Jimmy" {
|
|
t.Fatal("Nickname did not update properly")
|
|
}
|
|
if result.Data.(*model.User).Roles != model.ROLE_SYSTEM_USER.Id {
|
|
t.Fatal("Roles should not have updated")
|
|
}
|
|
if result.Data.(*model.User).LastPasswordUpdate == 123 {
|
|
t.Fatal("LastPasswordUpdate should not have updated")
|
|
}
|
|
}
|
|
|
|
user2 := &model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user2 = Client.Must(Client.CreateUser(user2, "")).Data.(*model.User)
|
|
LinkUserToTeam(user2, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user2.Id))
|
|
|
|
Client.Login(user2.Email, "passwd1")
|
|
Client.SetTeamId(team.Id)
|
|
|
|
user.Nickname = "Tim Timmy"
|
|
|
|
if _, err := Client.UpdateUser(user); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
}
|
|
|
|
func TestUserUpdatePassword(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team = Client.Must(Client.CreateTeam(team)).Data.(*model.Team)
|
|
Client.SetTeamId(team.Id)
|
|
|
|
user := &model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user = Client.Must(Client.CreateUser(user, "")).Data.(*model.User)
|
|
LinkUserToTeam(user, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user.Id))
|
|
|
|
if _, err := Client.UpdateUserPassword(user.Id, "passwd1", "newpasswd1"); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
Client.Login(user.Email, "passwd1")
|
|
|
|
if _, err := Client.UpdateUserPassword("123", "passwd1", "newpwd"); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
if _, err := Client.UpdateUserPassword(user.Id, "", "newpwd"); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
if _, err := Client.UpdateUserPassword(user.Id, "passwd1", "npwd"); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
if _, err := Client.UpdateUserPassword("12345678901234567890123456", "passwd1", "newpwd1"); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
if _, err := Client.UpdateUserPassword(user.Id, "badpwd", "newpwd"); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
if _, err := Client.UpdateUserPassword(user.Id, "passwd1", "newpwd1"); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
updatedUser := Client.Must(Client.GetUser(user.Id, "")).Data.(*model.User)
|
|
if updatedUser.LastPasswordUpdate == user.LastPasswordUpdate {
|
|
t.Fatal("LastPasswordUpdate should have changed")
|
|
}
|
|
|
|
if _, err := Client.Login(user.Email, "newpwd1"); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// Test lockout
|
|
passwordAttempts := utils.Cfg.ServiceSettings.MaximumLoginAttempts
|
|
defer func() {
|
|
utils.Cfg.ServiceSettings.MaximumLoginAttempts = passwordAttempts
|
|
}()
|
|
utils.Cfg.ServiceSettings.MaximumLoginAttempts = 2
|
|
|
|
// Fail twice
|
|
if _, err := Client.UpdateUserPassword(user.Id, "badpwd", "newpwd"); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
if _, err := Client.UpdateUserPassword(user.Id, "badpwd", "newpwd"); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
// Should fail because account is locked out
|
|
if _, err := Client.UpdateUserPassword(user.Id, "newpwd1", "newpwd2"); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
user2 := &model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user2 = Client.Must(Client.CreateUser(user2, "")).Data.(*model.User)
|
|
LinkUserToTeam(user2, team)
|
|
|
|
Client.Login(user2.Email, "passwd1")
|
|
|
|
if _, err := Client.UpdateUserPassword(user.Id, "passwd1", "newpwd"); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
}
|
|
|
|
func TestUserUpdateRoles(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team = Client.Must(Client.CreateTeam(team)).Data.(*model.Team)
|
|
|
|
user := &model.User{Email: "success+" + model.NewId() + "@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user = Client.Must(Client.CreateUser(user, "")).Data.(*model.User)
|
|
LinkUserToTeam(user, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user.Id))
|
|
|
|
user2 := &model.User{Email: "success+" + model.NewId() + "@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user2 = Client.Must(Client.CreateUser(user2, "")).Data.(*model.User)
|
|
LinkUserToTeam(user2, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user2.Id))
|
|
|
|
if _, err := Client.UpdateUserRoles(user.Id, ""); err == nil {
|
|
t.Fatal("Should have errored, not logged in")
|
|
}
|
|
|
|
Client.Login(user2.Email, "passwd1")
|
|
Client.SetTeamId(team.Id)
|
|
|
|
if _, err := Client.UpdateUserRoles(user.Id, ""); err == nil {
|
|
t.Fatal("Should have errored, not admin")
|
|
}
|
|
|
|
team2 := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team2 = Client.Must(Client.CreateTeam(team2)).Data.(*model.Team)
|
|
|
|
user3 := &model.User{Email: "success+" + model.NewId() + "@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user3 = Client.Must(Client.CreateUser(user3, "")).Data.(*model.User)
|
|
LinkUserToTeam(user3, team2)
|
|
store.Must(Srv.Store.User().VerifyEmail(user3.Id))
|
|
|
|
Client.Login(user3.Email, "passwd1")
|
|
Client.SetTeamId(team2.Id)
|
|
|
|
if _, err := Client.UpdateUserRoles(user2.Id, ""); err == nil {
|
|
t.Fatal("Should have errored, wrong team")
|
|
}
|
|
|
|
Client.Login(user.Email, "passwd1")
|
|
|
|
if _, err := Client.UpdateUserRoles("junk", ""); err == nil {
|
|
t.Fatal("Should have errored, bad id")
|
|
}
|
|
|
|
if _, err := Client.UpdateUserRoles("12345678901234567890123456", ""); err == nil {
|
|
t.Fatal("Should have errored, bad id")
|
|
}
|
|
|
|
if _, err := Client.UpdateUserRoles(user2.Id, "junk"); err == nil {
|
|
t.Fatal("Should have errored, bad role")
|
|
}
|
|
}
|
|
|
|
func TestUserUpdateRolesMoreCases(t *testing.T) {
|
|
th := Setup().InitSystemAdmin().InitBasic()
|
|
th.SystemAdminClient.SetTeamId(th.BasicTeam.Id)
|
|
LinkUserToTeam(th.SystemAdminUser, th.BasicTeam)
|
|
|
|
const BASIC_USER = "system_user"
|
|
const SYSTEM_ADMIN = "system_user system_admin"
|
|
|
|
// user 1 is trying to promote user 2
|
|
if _, err := th.BasicClient.UpdateUserRoles(th.BasicUser2.Id, SYSTEM_ADMIN); err == nil {
|
|
t.Fatal("Should have errored, basic user is not a system admin")
|
|
}
|
|
|
|
// user 1 is trying to demote system admin
|
|
if _, err := th.BasicClient.UpdateUserRoles(th.SystemAdminUser.Id, BASIC_USER); err == nil {
|
|
t.Fatal("Should have errored, can only be system admin")
|
|
}
|
|
|
|
// user 1 is trying to promote himself
|
|
if _, err := th.BasicClient.UpdateUserRoles(th.BasicUser.Id, SYSTEM_ADMIN); err == nil {
|
|
t.Fatal("Should have errored, can only be system admin")
|
|
}
|
|
|
|
// System admin promoting user 2
|
|
if _, err := th.SystemAdminClient.UpdateUserRoles(th.BasicUser2.Id, SYSTEM_ADMIN); err != nil {
|
|
t.Fatal("Should have succeeded since they are system admin")
|
|
}
|
|
|
|
// System admin demoting user 2
|
|
if _, err := th.SystemAdminClient.UpdateUserRoles(th.BasicUser2.Id, BASIC_USER); err != nil {
|
|
t.Fatal("Should have succeeded since they are system admin")
|
|
}
|
|
|
|
// Setting user to team admin should have no effect on results
|
|
th.BasicClient.Must(th.SystemAdminClient.UpdateTeamRoles(th.BasicUser.Id, "team_user team_admin"))
|
|
|
|
// user 1 is trying to promote user 2
|
|
if _, err := th.BasicClient.UpdateUserRoles(th.BasicUser2.Id, SYSTEM_ADMIN); err == nil {
|
|
t.Fatal("Should have errored, basic user is not a system admin")
|
|
}
|
|
|
|
// user 1 is trying to demote system admin
|
|
if _, err := th.BasicClient.UpdateUserRoles(th.SystemAdminUser.Id, BASIC_USER); err == nil {
|
|
t.Fatal("Should have errored, can only be system admin")
|
|
}
|
|
|
|
// user 1 is trying to promote himself
|
|
if _, err := th.BasicClient.UpdateUserRoles(th.BasicUser.Id, SYSTEM_ADMIN); err == nil {
|
|
t.Fatal("Should have errored, can only be system admin")
|
|
}
|
|
|
|
// system admin demoting himself
|
|
if _, err := th.SystemAdminClient.UpdateUserRoles(th.SystemAdminUser.Id, BASIC_USER); err != nil {
|
|
t.Fatal("Should have succeeded since they are system admin")
|
|
}
|
|
}
|
|
|
|
func TestUserUpdateDeviceId(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team = Client.Must(Client.CreateTeam(team)).Data.(*model.Team)
|
|
|
|
user := &model.User{Email: "success+" + model.NewId() + "@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user = Client.Must(Client.CreateUser(user, "")).Data.(*model.User)
|
|
LinkUserToTeam(user, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user.Id))
|
|
|
|
Client.Login(user.Email, "passwd1")
|
|
Client.SetTeamId(team.Id)
|
|
deviceId := model.PUSH_NOTIFY_APPLE + ":1234567890"
|
|
|
|
if _, err := Client.AttachDeviceId(deviceId); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if result := <-Srv.Store.Session().GetSessions(user.Id); result.Err != nil {
|
|
t.Fatal(result.Err)
|
|
} else {
|
|
sessions := result.Data.([]*model.Session)
|
|
|
|
if sessions[0].DeviceId != deviceId {
|
|
t.Fatal("Missing device Id")
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestUserUpdateActive(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team = Client.Must(Client.CreateTeam(team)).Data.(*model.Team)
|
|
|
|
user := &model.User{Email: "success+" + model.NewId() + "@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user = Client.Must(Client.CreateUser(user, "")).Data.(*model.User)
|
|
LinkUserToTeam(user, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user.Id))
|
|
|
|
user2 := &model.User{Email: "success+" + model.NewId() + "@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user2 = Client.Must(Client.CreateUser(user2, "")).Data.(*model.User)
|
|
LinkUserToTeam(user2, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user2.Id))
|
|
|
|
if _, err := Client.UpdateActive(user.Id, false); err == nil {
|
|
t.Fatal("Should have errored, not logged in")
|
|
}
|
|
|
|
Client.Login(user2.Email, "passwd1")
|
|
Client.SetTeamId(team.Id)
|
|
|
|
if _, err := Client.UpdateActive(user.Id, false); err == nil {
|
|
t.Fatal("Should have errored, not admin")
|
|
}
|
|
|
|
Client.Must(Client.Logout())
|
|
|
|
team2 := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team2 = Client.Must(Client.CreateTeam(team2)).Data.(*model.Team)
|
|
|
|
user3 := &model.User{Email: "success+" + model.NewId() + "@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user3 = Client.Must(Client.CreateUser(user3, "")).Data.(*model.User)
|
|
LinkUserToTeam(user2, team2)
|
|
store.Must(Srv.Store.User().VerifyEmail(user3.Id))
|
|
|
|
Client.Login(user3.Email, "passwd1")
|
|
Client.SetTeamId(team2.Id)
|
|
|
|
if _, err := Client.UpdateActive(user.Id, false); err == nil {
|
|
t.Fatal("Should have errored, not yourself")
|
|
}
|
|
|
|
Client.Login(user.Email, "passwd1")
|
|
Client.SetTeamId(team.Id)
|
|
|
|
if _, err := Client.UpdateActive("junk", false); err == nil {
|
|
t.Fatal("Should have errored, bad id")
|
|
}
|
|
|
|
if _, err := Client.UpdateActive("12345678901234567890123456", false); err == nil {
|
|
t.Fatal("Should have errored, bad id")
|
|
}
|
|
}
|
|
|
|
func TestUserPermDelete(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team = Client.Must(Client.CreateTeam(team)).Data.(*model.Team)
|
|
|
|
user1 := &model.User{Email: model.NewId() + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user1 = Client.Must(Client.CreateUser(user1, "")).Data.(*model.User)
|
|
LinkUserToTeam(user1, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user1.Id))
|
|
|
|
Client.Login(user1.Email, "passwd1")
|
|
Client.SetTeamId(team.Id)
|
|
|
|
channel1 := &model.Channel{DisplayName: "TestGetPosts", Name: "a" + model.NewId() + "a", Type: model.CHANNEL_OPEN, TeamId: team.Id}
|
|
channel1 = Client.Must(Client.CreateChannel(channel1)).Data.(*model.Channel)
|
|
|
|
post1 := &model.Post{ChannelId: channel1.Id, Message: "search for post1"}
|
|
post1 = Client.Must(Client.CreatePost(post1)).Data.(*model.Post)
|
|
|
|
post2 := &model.Post{ChannelId: channel1.Id, Message: "search for post2"}
|
|
post2 = Client.Must(Client.CreatePost(post2)).Data.(*model.Post)
|
|
|
|
post3 := &model.Post{ChannelId: channel1.Id, Message: "#hashtag search for post3"}
|
|
post3 = Client.Must(Client.CreatePost(post3)).Data.(*model.Post)
|
|
|
|
post4 := &model.Post{ChannelId: channel1.Id, Message: "hashtag for post4"}
|
|
post4 = Client.Must(Client.CreatePost(post4)).Data.(*model.Post)
|
|
|
|
c := &Context{}
|
|
c.RequestId = model.NewId()
|
|
c.IpAddress = "test"
|
|
|
|
err := PermanentDeleteUser(c, user1)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
Client.ClearOAuthToken()
|
|
}
|
|
|
|
func TestSendPasswordReset(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team = Client.Must(Client.CreateTeam(team)).Data.(*model.Team)
|
|
|
|
user := &model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user = Client.Must(Client.CreateUser(user, "")).Data.(*model.User)
|
|
LinkUserToTeam(user, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user.Id))
|
|
|
|
if _, err := Client.SendPasswordReset(user.Email); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if _, err := Client.SendPasswordReset(""); err == nil {
|
|
t.Fatal("Should have errored - no email")
|
|
}
|
|
|
|
if _, err := Client.SendPasswordReset("junk@junk.com"); err == nil {
|
|
t.Fatal("Should have errored - bad email")
|
|
}
|
|
|
|
authData := model.NewId()
|
|
user2 := &model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", AuthData: &authData, AuthService: "random"}
|
|
user2 = Client.Must(Client.CreateUser(user2, "")).Data.(*model.User)
|
|
LinkUserToTeam(user2, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user2.Id))
|
|
|
|
if _, err := Client.SendPasswordReset(user2.Email); err == nil {
|
|
t.Fatal("should have errored - SSO user can't send reset password link")
|
|
}
|
|
}
|
|
|
|
func TestResetPassword(t *testing.T) {
|
|
th := Setup().InitSystemAdmin()
|
|
Client := th.SystemAdminClient
|
|
team := th.SystemAdminTeam
|
|
|
|
user := &model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user = Client.Must(Client.CreateUser(user, "")).Data.(*model.User)
|
|
LinkUserToTeam(user, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user.Id))
|
|
|
|
Client.Must(Client.SendPasswordReset(user.Email))
|
|
|
|
var recovery *model.PasswordRecovery
|
|
if result := <-Srv.Store.PasswordRecovery().Get(user.Id); result.Err != nil {
|
|
t.Fatal(result.Err)
|
|
} else {
|
|
recovery = result.Data.(*model.PasswordRecovery)
|
|
}
|
|
|
|
if _, err := Client.ResetPassword(recovery.Code, ""); err == nil {
|
|
t.Fatal("Should have errored - no password")
|
|
}
|
|
|
|
if _, err := Client.ResetPassword(recovery.Code, "newp"); err == nil {
|
|
t.Fatal("Should have errored - password too short")
|
|
}
|
|
|
|
if _, err := Client.ResetPassword("", "newpwd"); err == nil {
|
|
t.Fatal("Should have errored - no code")
|
|
}
|
|
|
|
if _, err := Client.ResetPassword("junk", "newpwd"); err == nil {
|
|
t.Fatal("Should have errored - bad code")
|
|
}
|
|
|
|
code := ""
|
|
for i := 0; i < model.PASSWORD_RECOVERY_CODE_SIZE; i++ {
|
|
code += "a"
|
|
}
|
|
if _, err := Client.ResetPassword(code, "newpwd1"); err == nil {
|
|
t.Fatal("Should have errored - bad code")
|
|
}
|
|
|
|
if _, err := Client.ResetPassword(recovery.Code, "newpwd1"); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
Client.Logout()
|
|
Client.Must(Client.LoginById(user.Id, "newpwd1"))
|
|
Client.SetTeamId(team.Id)
|
|
|
|
Client.Must(Client.SendPasswordReset(user.Email))
|
|
|
|
if result := <-Srv.Store.PasswordRecovery().Get(user.Id); result.Err != nil {
|
|
t.Fatal(result.Err)
|
|
} else {
|
|
recovery = result.Data.(*model.PasswordRecovery)
|
|
}
|
|
|
|
authData := model.NewId()
|
|
if result := <-Srv.Store.User().UpdateAuthData(user.Id, "random", &authData, ""); result.Err != nil {
|
|
t.Fatal(result.Err)
|
|
}
|
|
|
|
if _, err := Client.ResetPassword(recovery.Code, "newpwd1"); err == nil {
|
|
t.Fatal("Should have errored - sso user")
|
|
}
|
|
}
|
|
|
|
func TestUserUpdateNotify(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := &model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
team = Client.Must(Client.CreateTeam(team)).Data.(*model.Team)
|
|
|
|
user := &model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1", Roles: ""}
|
|
user = Client.Must(Client.CreateUser(user, "")).Data.(*model.User)
|
|
LinkUserToTeam(user, team)
|
|
store.Must(Srv.Store.User().VerifyEmail(user.Id))
|
|
|
|
data := make(map[string]string)
|
|
data["user_id"] = user.Id
|
|
data["email"] = "true"
|
|
data["desktop"] = "all"
|
|
data["desktop_sound"] = "false"
|
|
data["comments"] = "any"
|
|
|
|
if _, err := Client.UpdateUserNotify(data); err == nil {
|
|
t.Fatal("Should have errored - not logged in")
|
|
}
|
|
|
|
Client.Login(user.Email, "passwd1")
|
|
Client.SetTeamId(team.Id)
|
|
|
|
if result, err := Client.UpdateUserNotify(data); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
if result.Data.(*model.User).NotifyProps["desktop"] != data["desktop"] {
|
|
t.Fatal("NotifyProps did not update properly - desktop")
|
|
}
|
|
if result.Data.(*model.User).NotifyProps["desktop_sound"] != data["desktop_sound"] {
|
|
t.Fatal("NotifyProps did not update properly - desktop_sound")
|
|
}
|
|
if result.Data.(*model.User).NotifyProps["email"] != data["email"] {
|
|
t.Fatal("NotifyProps did not update properly - email")
|
|
}
|
|
if result.Data.(*model.User).NotifyProps["comments"] != data["comments"] {
|
|
t.Fatal("NotifyProps did not update properly - comments")
|
|
}
|
|
}
|
|
|
|
if _, err := Client.UpdateUserNotify(nil); err == nil {
|
|
t.Fatal("Should have errored")
|
|
}
|
|
|
|
data["user_id"] = "junk"
|
|
if _, err := Client.UpdateUserNotify(data); err == nil {
|
|
t.Fatal("Should have errored - junk user id")
|
|
}
|
|
|
|
data["user_id"] = "12345678901234567890123456"
|
|
if _, err := Client.UpdateUserNotify(data); err == nil {
|
|
t.Fatal("Should have errored - bad user id")
|
|
}
|
|
|
|
data["user_id"] = user.Id
|
|
data["desktop"] = ""
|
|
if _, err := Client.UpdateUserNotify(data); err == nil {
|
|
t.Fatal("Should have errored - empty desktop notify")
|
|
}
|
|
|
|
data["desktop"] = "all"
|
|
data["desktop_sound"] = ""
|
|
if _, err := Client.UpdateUserNotify(data); err == nil {
|
|
t.Fatal("Should have errored - empty desktop sound")
|
|
}
|
|
|
|
data["desktop_sound"] = "false"
|
|
data["email"] = ""
|
|
if _, err := Client.UpdateUserNotify(data); err == nil {
|
|
t.Fatal("Should have errored - empty email")
|
|
}
|
|
|
|
data["email"] = "true"
|
|
data["comments"] = ""
|
|
if _, err := Client.UpdateUserNotify(data); err == nil {
|
|
t.Fatal("Should have errored - empty comments")
|
|
}
|
|
}
|
|
|
|
func TestFuzzyUserCreate(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
for i := 0; i < len(utils.FUZZY_STRINGS_NAMES) || i < len(utils.FUZZY_STRINGS_EMAILS); i++ {
|
|
testName := "Name"
|
|
testEmail := "test@nowhere.com"
|
|
|
|
if i < len(utils.FUZZY_STRINGS_NAMES) {
|
|
testName = utils.FUZZY_STRINGS_NAMES[i]
|
|
}
|
|
if i < len(utils.FUZZY_STRINGS_EMAILS) {
|
|
testEmail = utils.FUZZY_STRINGS_EMAILS[i]
|
|
}
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + testEmail, Nickname: testName, Password: "hello1"}
|
|
|
|
ruser, err := Client.CreateUser(&user, "")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
LinkUserToTeam(ruser.Data.(*model.User), rteam.Data.(*model.Team))
|
|
}
|
|
}
|
|
|
|
func TestEmailToOAuth(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
ruser := Client.Must(Client.CreateUser(&user, "")).Data.(*model.User)
|
|
LinkUserToTeam(ruser, rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser.Id))
|
|
|
|
m := map[string]string{}
|
|
if _, err := Client.EmailToOAuth(m); err == nil {
|
|
t.Fatal("should have failed - empty data")
|
|
}
|
|
|
|
m["password"] = "passwd1"
|
|
_, err := Client.EmailToOAuth(m)
|
|
if err == nil {
|
|
t.Fatal("should have failed - missing team_name, service, email")
|
|
}
|
|
|
|
m["team_name"] = team.Name
|
|
if _, err := Client.EmailToOAuth(m); err == nil {
|
|
t.Fatal("should have failed - missing service, email")
|
|
}
|
|
|
|
m["service"] = "someservice"
|
|
if _, err := Client.EmailToOAuth(m); err == nil {
|
|
t.Fatal("should have failed - missing email")
|
|
}
|
|
|
|
m["team_name"] = "junk"
|
|
if _, err := Client.EmailToOAuth(m); err == nil {
|
|
t.Fatal("should have failed - bad team name")
|
|
}
|
|
|
|
m["team_name"] = team.Name
|
|
m["email"] = "junk"
|
|
if _, err := Client.EmailToOAuth(m); err == nil {
|
|
t.Fatal("should have failed - bad email")
|
|
}
|
|
|
|
m["email"] = ruser.Email
|
|
m["password"] = "junk"
|
|
if _, err := Client.EmailToOAuth(m); err == nil {
|
|
t.Fatal("should have failed - bad password")
|
|
}
|
|
}
|
|
|
|
func TestOAuthToEmail(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
ruser := Client.Must(Client.CreateUser(&user, "")).Data.(*model.User)
|
|
LinkUserToTeam(ruser, rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser.Id))
|
|
|
|
user2 := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
ruser2 := Client.Must(Client.CreateUser(&user2, "")).Data.(*model.User)
|
|
LinkUserToTeam(ruser2, rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser2.Id))
|
|
|
|
m := map[string]string{}
|
|
if _, err := Client.OAuthToEmail(m); err == nil {
|
|
t.Fatal("should have failed - not logged in")
|
|
}
|
|
|
|
Client.Login(user.Email, user.Password)
|
|
|
|
if _, err := Client.OAuthToEmail(m); err == nil {
|
|
t.Fatal("should have failed - empty data")
|
|
}
|
|
|
|
m["password"] = "passwd1"
|
|
_, err := Client.OAuthToEmail(m)
|
|
if err == nil {
|
|
t.Fatal("should have failed - missing team_name, service, email")
|
|
}
|
|
|
|
m["team_name"] = team.Name
|
|
if _, err := Client.OAuthToEmail(m); err == nil {
|
|
t.Fatal("should have failed - missing email")
|
|
}
|
|
|
|
m["team_name"] = team.Name
|
|
m["email"] = "junk"
|
|
if _, err := Client.OAuthToEmail(m); err == nil {
|
|
t.Fatal("should have failed - bad email")
|
|
}
|
|
|
|
m["email"] = ruser2.Email
|
|
if _, err := Client.OAuthToEmail(m); err == nil {
|
|
t.Fatal("should have failed - wrong user")
|
|
}
|
|
}
|
|
|
|
func TestLDAPToEmail(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
ruser := Client.Must(Client.CreateUser(&user, "")).Data.(*model.User)
|
|
LinkUserToTeam(ruser, rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser.Id))
|
|
|
|
Client.Login(user.Email, user.Password)
|
|
|
|
m := map[string]string{}
|
|
if _, err := Client.LDAPToEmail(m); err == nil {
|
|
t.Fatal("should have failed - empty data")
|
|
}
|
|
|
|
m["email_password"] = "passwd1"
|
|
_, err := Client.LDAPToEmail(m)
|
|
if err == nil {
|
|
t.Fatal("should have failed - missing team_name, ldap_password, email")
|
|
}
|
|
|
|
m["team_name"] = team.Name
|
|
if _, err := Client.LDAPToEmail(m); err == nil {
|
|
t.Fatal("should have failed - missing email, ldap_password")
|
|
}
|
|
|
|
m["ldap_password"] = "passwd1"
|
|
if _, err := Client.LDAPToEmail(m); err == nil {
|
|
t.Fatal("should have failed - missing email")
|
|
}
|
|
|
|
m["email"] = ruser.Email
|
|
m["team_name"] = "junk"
|
|
if _, err := Client.LDAPToEmail(m); err == nil {
|
|
t.Fatal("should have failed - bad team name")
|
|
}
|
|
|
|
m["team_name"] = team.Name
|
|
m["email"] = "junk"
|
|
if _, err := Client.LDAPToEmail(m); err == nil {
|
|
t.Fatal("should have failed - bad email")
|
|
}
|
|
|
|
m["email"] = user.Email
|
|
if _, err := Client.LDAPToEmail(m); err == nil {
|
|
t.Fatal("should have failed - user is not an AD/LDAP user")
|
|
}
|
|
}
|
|
|
|
func TestEmailToLDAP(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
ruser := Client.Must(Client.CreateUser(&user, "")).Data.(*model.User)
|
|
LinkUserToTeam(ruser, rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser.Id))
|
|
|
|
Client.Login(user.Email, user.Password)
|
|
|
|
m := map[string]string{}
|
|
if _, err := Client.EmailToLDAP(m); err == nil {
|
|
t.Fatal("should have failed - empty data")
|
|
}
|
|
|
|
m["email_password"] = "passwd1"
|
|
_, err := Client.EmailToLDAP(m)
|
|
if err == nil {
|
|
t.Fatal("should have failed - missing team_name, ldap_id, ldap_password, email")
|
|
}
|
|
|
|
m["team_name"] = team.Name
|
|
if _, err := Client.EmailToLDAP(m); err == nil {
|
|
t.Fatal("should have failed - missing email, ldap_password, ldap_id")
|
|
}
|
|
|
|
m["ldap_id"] = "someid"
|
|
if _, err := Client.EmailToLDAP(m); err == nil {
|
|
t.Fatal("should have failed - missing email, ldap_password")
|
|
}
|
|
|
|
m["ldap_password"] = "passwd1"
|
|
if _, err := Client.EmailToLDAP(m); err == nil {
|
|
t.Fatal("should have failed - missing email")
|
|
}
|
|
|
|
m["email"] = ruser.Email
|
|
m["team_name"] = "junk"
|
|
if _, err := Client.EmailToLDAP(m); err == nil {
|
|
t.Fatal("should have failed - bad team name")
|
|
}
|
|
|
|
m["team_name"] = team.Name
|
|
m["email"] = "junk"
|
|
if _, err := Client.EmailToLDAP(m); err == nil {
|
|
t.Fatal("should have failed - bad email")
|
|
}
|
|
|
|
m["email"] = user.Email
|
|
m["email_password"] = "junk"
|
|
if _, err := Client.EmailToLDAP(m); err == nil {
|
|
t.Fatal("should have failed - bad password")
|
|
}
|
|
|
|
m["email_password"] = "passwd1"
|
|
if _, err := Client.EmailToLDAP(m); err == nil {
|
|
t.Fatal("should have failed - missing ldap bits or user")
|
|
}
|
|
}
|
|
|
|
func TestMeInitialLoad(t *testing.T) {
|
|
th := Setup().InitBasic()
|
|
|
|
if result, err := th.BasicClient.GetInitialLoad(); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
il := result.Data.(*model.InitialLoad)
|
|
|
|
if il.User == nil {
|
|
t.Fatal("should be valid")
|
|
}
|
|
|
|
if il.Preferences == nil {
|
|
t.Fatal("should be valid")
|
|
}
|
|
|
|
if len(il.Teams) != 1 {
|
|
t.Fatal("should be valid")
|
|
}
|
|
|
|
if len(il.TeamMembers) != 1 {
|
|
t.Fatal("should be valid")
|
|
}
|
|
|
|
if len(il.ClientCfg) == 0 {
|
|
t.Fatal("should be valid")
|
|
}
|
|
|
|
if len(il.LicenseCfg) == 0 {
|
|
t.Fatal("should be valid")
|
|
}
|
|
}
|
|
|
|
th.BasicClient.Logout()
|
|
|
|
if result, err := th.BasicClient.GetInitialLoad(); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
il := result.Data.(*model.InitialLoad)
|
|
|
|
if il.User != nil {
|
|
t.Fatal("should be valid")
|
|
}
|
|
|
|
if il.Preferences != nil {
|
|
t.Fatal("should be valid")
|
|
}
|
|
|
|
if len(il.Teams) != 0 {
|
|
t.Fatal("should be valid")
|
|
}
|
|
|
|
if len(il.TeamMembers) != 0 {
|
|
t.Fatal("should be valid")
|
|
}
|
|
|
|
if len(il.ClientCfg) == 0 {
|
|
t.Fatal("should be valid")
|
|
}
|
|
|
|
if len(il.LicenseCfg) == 0 {
|
|
t.Fatal("should be valid")
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
func TestGenerateMfaQrCode(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
ruser, _ := Client.CreateUser(&user, "")
|
|
LinkUserToTeam(ruser.Data.(*model.User), rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser.Data.(*model.User).Id))
|
|
|
|
Client.Logout()
|
|
|
|
if _, err := Client.GenerateMfaQrCode(); err == nil {
|
|
t.Fatal("should have failed - not logged in")
|
|
}
|
|
|
|
Client.Login(user.Email, user.Password)
|
|
|
|
if _, err := Client.GenerateMfaQrCode(); err == nil {
|
|
t.Fatal("should have failed - not licensed")
|
|
}
|
|
|
|
// need to add more test cases when license and config can be configured for tests
|
|
}
|
|
|
|
func TestUpdateMfa(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
if utils.License.Features.MFA == nil {
|
|
utils.License.Features.MFA = new(bool)
|
|
}
|
|
|
|
enableMfa := *utils.Cfg.ServiceSettings.EnableMultifactorAuthentication
|
|
defer func() {
|
|
utils.IsLicensed = false
|
|
*utils.License.Features.MFA = false
|
|
*utils.Cfg.ServiceSettings.EnableMultifactorAuthentication = enableMfa
|
|
}()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
ruser, _ := Client.CreateUser(&user, "")
|
|
LinkUserToTeam(ruser.Data.(*model.User), rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser.Data.(*model.User).Id))
|
|
|
|
Client.Logout()
|
|
|
|
if _, err := Client.UpdateMfa(true, "123456"); err == nil {
|
|
t.Fatal("should have failed - not logged in")
|
|
}
|
|
|
|
Client.Login(user.Email, user.Password)
|
|
|
|
if _, err := Client.UpdateMfa(true, ""); err == nil {
|
|
t.Fatal("should have failed - no token")
|
|
}
|
|
|
|
if _, err := Client.UpdateMfa(true, "123456"); err == nil {
|
|
t.Fatal("should have failed - not licensed")
|
|
}
|
|
|
|
utils.IsLicensed = true
|
|
*utils.License.Features.MFA = true
|
|
*utils.Cfg.ServiceSettings.EnableMultifactorAuthentication = true
|
|
|
|
if _, err := Client.UpdateMfa(true, "123456"); err == nil {
|
|
t.Fatal("should have failed - bad token")
|
|
}
|
|
|
|
// need to add more test cases when enterprise bits can be loaded into tests
|
|
}
|
|
|
|
func TestCheckMfa(t *testing.T) {
|
|
th := Setup()
|
|
Client := th.CreateClient()
|
|
|
|
team := model.Team{DisplayName: "Name", Name: "z-z-" + model.NewId() + "a", Email: "test@nowhere.com", Type: model.TEAM_OPEN}
|
|
rteam, _ := Client.CreateTeam(&team)
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
ruser, _ := Client.CreateUser(&user, "")
|
|
LinkUserToTeam(ruser.Data.(*model.User), rteam.Data.(*model.Team))
|
|
store.Must(Srv.Store.User().VerifyEmail(ruser.Data.(*model.User).Id))
|
|
|
|
if result, err := Client.CheckMfa(user.Email); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
resp := result.Data.(map[string]string)
|
|
if resp["mfa_required"] != "false" {
|
|
t.Fatal("mfa should not be required")
|
|
}
|
|
}
|
|
|
|
// need to add more test cases when enterprise bits can be loaded into tests
|
|
}
|
|
|
|
func TestUserTyping(t *testing.T) {
|
|
th := Setup().InitBasic()
|
|
Client := th.BasicClient
|
|
WebSocketClient, err := th.CreateWebSocketClient()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer WebSocketClient.Close()
|
|
WebSocketClient.Listen()
|
|
|
|
WebSocketClient.UserTyping("", "")
|
|
time.Sleep(300 * time.Millisecond)
|
|
if resp := <-WebSocketClient.ResponseChannel; resp.Error.Id != "api.websocket_handler.invalid_param.app_error" {
|
|
t.Fatal("should have been invalid param response")
|
|
}
|
|
|
|
th.LoginBasic2()
|
|
Client.Must(Client.JoinChannel(th.BasicChannel.Id))
|
|
|
|
WebSocketClient2, err2 := th.CreateWebSocketClient()
|
|
if err2 != nil {
|
|
t.Fatal(err2)
|
|
}
|
|
defer WebSocketClient2.Close()
|
|
WebSocketClient2.Listen()
|
|
|
|
time.Sleep(300 * time.Millisecond)
|
|
|
|
WebSocketClient.UserTyping(th.BasicChannel.Id, "")
|
|
|
|
time.Sleep(300 * time.Millisecond)
|
|
|
|
stop := make(chan bool)
|
|
eventHit := false
|
|
|
|
go func() {
|
|
for {
|
|
select {
|
|
case resp := <-WebSocketClient2.EventChannel:
|
|
if resp.Event == model.WEBSOCKET_EVENT_TYPING && resp.Data["user_id"].(string) == th.BasicUser.Id {
|
|
eventHit = true
|
|
}
|
|
case <-stop:
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
|
|
time.Sleep(1000 * time.Millisecond)
|
|
|
|
stop <- true
|
|
|
|
if !eventHit {
|
|
t.Fatal("did not receive typing event")
|
|
}
|
|
|
|
WebSocketClient.UserTyping(th.BasicChannel.Id, "someparentid")
|
|
|
|
time.Sleep(300 * time.Millisecond)
|
|
|
|
eventHit = false
|
|
|
|
go func() {
|
|
for {
|
|
select {
|
|
case resp := <-WebSocketClient2.EventChannel:
|
|
if resp.Event == model.WEBSOCKET_EVENT_TYPING && resp.Data["parent_id"] == "someparentid" {
|
|
eventHit = true
|
|
}
|
|
case <-stop:
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
|
|
time.Sleep(300 * time.Millisecond)
|
|
|
|
stop <- true
|
|
|
|
if !eventHit {
|
|
t.Fatal("did not receive typing event")
|
|
}
|
|
}
|
|
|
|
func TestGetProfilesInChannel(t *testing.T) {
|
|
th := Setup().InitBasic()
|
|
Client := th.BasicClient
|
|
|
|
prevShowEmail := utils.Cfg.PrivacySettings.ShowEmailAddress
|
|
defer func() {
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = prevShowEmail
|
|
}()
|
|
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = true
|
|
|
|
if result, err := Client.GetProfilesInChannel(th.BasicChannel.Id, 0, 100, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.(map[string]*model.User)
|
|
|
|
if len(users) < 1 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
|
|
for _, user := range users {
|
|
if user.Email == "" {
|
|
t.Fatal("problem with show email")
|
|
}
|
|
}
|
|
}
|
|
|
|
th.LoginBasic2()
|
|
|
|
if _, err := Client.GetProfilesInChannel(th.BasicChannel.Id, 0, 100, ""); err == nil {
|
|
t.Fatal("should not have access")
|
|
}
|
|
|
|
Client.Must(Client.JoinChannel(th.BasicChannel.Id))
|
|
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = false
|
|
|
|
if result, err := Client.GetProfilesInChannel(th.BasicChannel.Id, 0, 100, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.(map[string]*model.User)
|
|
|
|
if len(users) < 1 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
|
|
found := false
|
|
for _, user := range users {
|
|
if user.Email != "" {
|
|
t.Fatal("problem with show email")
|
|
}
|
|
if user.Id == th.BasicUser2.Id {
|
|
found = true
|
|
}
|
|
}
|
|
|
|
if !found {
|
|
t.Fatal("should have found profile")
|
|
}
|
|
}
|
|
|
|
user := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
Client.Must(Client.CreateUser(&user, ""))
|
|
|
|
Client.Login(user.Email, "passwd1")
|
|
Client.SetTeamId("junk")
|
|
|
|
if _, err := Client.GetProfilesInChannel(th.BasicChannel.Id, 0, 100, ""); err == nil {
|
|
t.Fatal("should not have access")
|
|
}
|
|
}
|
|
|
|
func TestGetProfilesNotInChannel(t *testing.T) {
|
|
th := Setup().InitBasic()
|
|
Client := th.BasicClient
|
|
|
|
prevShowEmail := utils.Cfg.PrivacySettings.ShowEmailAddress
|
|
defer func() {
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = prevShowEmail
|
|
}()
|
|
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = true
|
|
|
|
if result, err := Client.GetProfilesNotInChannel(th.BasicChannel.Id, 0, 100, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.(map[string]*model.User)
|
|
|
|
if len(users) < 1 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
|
|
found := false
|
|
for _, user := range users {
|
|
if user.Email == "" {
|
|
t.Fatal("problem with show email")
|
|
}
|
|
if user.Id == th.BasicUser2.Id {
|
|
found = true
|
|
}
|
|
}
|
|
|
|
if !found {
|
|
t.Fatal("should have found profile")
|
|
}
|
|
}
|
|
|
|
user := &model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
user = Client.Must(Client.CreateUser(user, "")).Data.(*model.User)
|
|
LinkUserToTeam(user, th.BasicTeam)
|
|
|
|
th.LoginBasic2()
|
|
|
|
if _, err := Client.GetProfilesNotInChannel(th.BasicChannel.Id, 0, 100, ""); err == nil {
|
|
t.Fatal("should not have access")
|
|
}
|
|
|
|
Client.Must(Client.JoinChannel(th.BasicChannel.Id))
|
|
|
|
utils.Cfg.PrivacySettings.ShowEmailAddress = false
|
|
|
|
if result, err := Client.GetProfilesNotInChannel(th.BasicChannel.Id, 0, 100, ""); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.(map[string]*model.User)
|
|
|
|
if len(users) < 1 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
|
|
found := false
|
|
for _, user := range users {
|
|
if user.Email != "" {
|
|
t.Fatal("problem with show email")
|
|
}
|
|
if user.Id == th.BasicUser2.Id {
|
|
found = true
|
|
}
|
|
}
|
|
|
|
if found {
|
|
t.Fatal("should not have found profile")
|
|
}
|
|
}
|
|
|
|
user2 := model.User{Email: strings.ToLower(model.NewId()) + "success+test@simulator.amazonses.com", Nickname: "Corey Hulen", Password: "passwd1"}
|
|
Client.Must(Client.CreateUser(&user2, ""))
|
|
|
|
Client.Login(user2.Email, "passwd1")
|
|
Client.SetTeamId(th.BasicTeam.Id)
|
|
|
|
if _, err := Client.GetProfilesNotInChannel(th.BasicChannel.Id, 0, 100, ""); err == nil {
|
|
t.Fatal("should not have access")
|
|
}
|
|
}
|
|
|
|
func TestSearchUsers(t *testing.T) {
|
|
th := Setup().InitBasic()
|
|
Client := th.BasicClient
|
|
|
|
if result, err := Client.SearchUsers(th.BasicUser.Username, "", map[string]string{}); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.([]*model.User)
|
|
|
|
found := false
|
|
for _, user := range users {
|
|
if user.Id == th.BasicUser.Id {
|
|
found = true
|
|
}
|
|
}
|
|
|
|
if !found {
|
|
t.Fatal("should have found profile")
|
|
}
|
|
}
|
|
|
|
if result, err := Client.SearchUsers(th.BasicUser.Username, "", map[string]string{"in_channel": th.BasicChannel.Id}); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.([]*model.User)
|
|
|
|
if len(users) != 1 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
|
|
found := false
|
|
for _, user := range users {
|
|
if user.Id == th.BasicUser.Id {
|
|
found = true
|
|
}
|
|
}
|
|
|
|
if !found {
|
|
t.Fatal("should have found profile")
|
|
}
|
|
}
|
|
|
|
if result, err := Client.SearchUsers(th.BasicUser2.Username, "", map[string]string{"not_in_channel": th.BasicChannel.Id}); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.([]*model.User)
|
|
|
|
if len(users) != 1 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
|
|
found1 := false
|
|
found2 := false
|
|
for _, user := range users {
|
|
if user.Id == th.BasicUser.Id {
|
|
found1 = true
|
|
} else if user.Id == th.BasicUser2.Id {
|
|
found2 = true
|
|
}
|
|
}
|
|
|
|
if found1 {
|
|
t.Fatal("should not have found profile")
|
|
}
|
|
if !found2 {
|
|
t.Fatal("should have found profile")
|
|
}
|
|
}
|
|
|
|
if result, err := Client.SearchUsers(th.BasicUser2.Username, th.BasicTeam.Id, map[string]string{"not_in_channel": th.BasicChannel.Id}); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.([]*model.User)
|
|
|
|
if len(users) != 1 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
|
|
found1 := false
|
|
found2 := false
|
|
for _, user := range users {
|
|
if user.Id == th.BasicUser.Id {
|
|
found1 = true
|
|
} else if user.Id == th.BasicUser2.Id {
|
|
found2 = true
|
|
}
|
|
}
|
|
|
|
if found1 {
|
|
t.Fatal("should not have found profile")
|
|
}
|
|
if !found2 {
|
|
t.Fatal("should have found profile")
|
|
}
|
|
}
|
|
|
|
if result, err := Client.SearchUsers(th.BasicUser.Username, "junk", map[string]string{"not_in_channel": th.BasicChannel.Id}); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.([]*model.User)
|
|
|
|
if len(users) != 0 {
|
|
t.Fatal("map was wrong length")
|
|
}
|
|
}
|
|
|
|
th.LoginBasic2()
|
|
|
|
if result, err := Client.SearchUsers(th.BasicUser.Username, "", map[string]string{}); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
users := result.Data.([]*model.User)
|
|
|
|
found := false
|
|
for _, user := range users {
|
|
if user.Id == th.BasicUser.Id {
|
|
found = true
|
|
}
|
|
}
|
|
|
|
if !found {
|
|
t.Fatal("should have found profile")
|
|
}
|
|
}
|
|
|
|
if _, err := Client.SearchUsers("", "", map[string]string{}); err == nil {
|
|
t.Fatal("should have errored - blank term")
|
|
}
|
|
|
|
if _, err := Client.SearchUsers(th.BasicUser.Username, "", map[string]string{"in_channel": th.BasicChannel.Id}); err == nil {
|
|
t.Fatal("should not have access")
|
|
}
|
|
|
|
if _, err := Client.SearchUsers(th.BasicUser.Username, "", map[string]string{"not_in_channel": th.BasicChannel.Id}); err == nil {
|
|
t.Fatal("should not have access")
|
|
}
|
|
}
|
|
|
|
func TestAutocompleteUsers(t *testing.T) {
|
|
th := Setup().InitBasic()
|
|
Client := th.BasicClient
|
|
|
|
if result, err := Client.AutocompleteUsersInTeam(th.BasicUser.Username); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
autocomplete := result.Data.(*model.UserAutocompleteInTeam)
|
|
if len(autocomplete.InTeam) != 1 {
|
|
t.Fatal("should have returned 1 user in")
|
|
}
|
|
}
|
|
|
|
if result, err := Client.AutocompleteUsersInTeam(th.BasicUser.Username[0:5]); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
autocomplete := result.Data.(*model.UserAutocompleteInTeam)
|
|
if len(autocomplete.InTeam) < 1 {
|
|
t.Fatal("should have returned at least 1 user in")
|
|
}
|
|
}
|
|
|
|
if result, err := Client.AutocompleteUsersInChannel(th.BasicUser.Username, th.BasicChannel.Id); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
autocomplete := result.Data.(*model.UserAutocompleteInChannel)
|
|
if len(autocomplete.InChannel) != 1 {
|
|
t.Fatal("should have returned 1 user in")
|
|
}
|
|
if len(autocomplete.OutOfChannel) != 0 {
|
|
t.Fatal("should have returned no users out")
|
|
}
|
|
}
|
|
|
|
if result, err := Client.AutocompleteUsersInChannel("", th.BasicChannel.Id); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
autocomplete := result.Data.(*model.UserAutocompleteInChannel)
|
|
if len(autocomplete.InChannel) != 1 && autocomplete.InChannel[0].Id != th.BasicUser2.Id {
|
|
t.Fatal("should have returned at 1 user in")
|
|
}
|
|
if len(autocomplete.OutOfChannel) != 1 && autocomplete.OutOfChannel[0].Id != th.BasicUser2.Id {
|
|
t.Fatal("should have returned 1 user out")
|
|
}
|
|
}
|
|
|
|
if result, err := Client.AutocompleteUsersInTeam(""); err != nil {
|
|
t.Fatal(err)
|
|
} else {
|
|
autocomplete := result.Data.(*model.UserAutocompleteInTeam)
|
|
if len(autocomplete.InTeam) != 2 {
|
|
t.Fatal("should have returned 2 users in")
|
|
}
|
|
}
|
|
|
|
if _, err := Client.AutocompleteUsersInChannel("", "junk"); err == nil {
|
|
t.Fatal("should have errored - bad channel id")
|
|
}
|
|
|
|
Client.SetTeamId("junk")
|
|
if _, err := Client.AutocompleteUsersInChannel("", th.BasicChannel.Id); err == nil {
|
|
t.Fatal("should have errored - bad team id")
|
|
}
|
|
|
|
if _, err := Client.AutocompleteUsersInTeam(""); err == nil {
|
|
t.Fatal("should have errored - bad team id")
|
|
}
|
|
}
|