mirror of
https://github.com/mattermost/mattermost.git
synced 2025-02-25 18:55:24 -06:00
* Deauthorize OAuth APIs * Deautorize OAuth Apps Account Settings * Fix typo in client method * Fix issues found by PM * Show help text only when there is at least one authorized app
293 lines
6.8 KiB
Go
293 lines
6.8 KiB
Go
// Copyright (c) 2015 Mattermost, Inc. All Rights Reserved.
|
|
// See License.txt for license information.
|
|
|
|
package store
|
|
|
|
import (
|
|
"github.com/mattermost/platform/model"
|
|
"testing"
|
|
)
|
|
|
|
func TestOAuthStoreSaveApp(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.Name = "TestApp" + model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
|
|
if err := (<-store.OAuth().SaveApp(&a1)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestOAuthStoreGetApp(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.Name = "TestApp" + model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
Must(store.OAuth().SaveApp(&a1))
|
|
|
|
if err := (<-store.OAuth().GetApp(a1.Id)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if err := (<-store.OAuth().GetAppByUser(a1.CreatorId)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if err := (<-store.OAuth().GetApps()).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestOAuthStoreUpdateApp(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.Name = "TestApp" + model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
Must(store.OAuth().SaveApp(&a1))
|
|
|
|
a1.CreateAt = 1
|
|
a1.ClientSecret = "pwd"
|
|
a1.CreatorId = "12345678901234567890123456"
|
|
a1.Name = "NewName"
|
|
if result := <-store.OAuth().UpdateApp(&a1); result.Err != nil {
|
|
t.Fatal(result.Err)
|
|
} else {
|
|
ua1 := (result.Data.([2]*model.OAuthApp)[0])
|
|
if ua1.Name != "NewName" {
|
|
t.Fatal("name did not update")
|
|
}
|
|
if ua1.CreateAt == 1 {
|
|
t.Fatal("create at should not have updated")
|
|
}
|
|
if ua1.ClientSecret == "pwd" {
|
|
t.Fatal("client secret should not have updated")
|
|
}
|
|
if ua1.CreatorId == "12345678901234567890123456" {
|
|
t.Fatal("creator id should not have updated")
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestOAuthStoreSaveAccessData(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.AccessData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Token = model.NewId()
|
|
a1.RefreshToken = model.NewId()
|
|
|
|
if err := (<-store.OAuth().SaveAccessData(&a1)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestOAuthStoreGetAccessData(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.AccessData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Token = model.NewId()
|
|
a1.RefreshToken = model.NewId()
|
|
a1.ExpiresAt = model.GetMillis()
|
|
Must(store.OAuth().SaveAccessData(&a1))
|
|
|
|
if result := <-store.OAuth().GetAccessData(a1.Token); result.Err != nil {
|
|
t.Fatal(result.Err)
|
|
} else {
|
|
ra1 := result.Data.(*model.AccessData)
|
|
if a1.Token != ra1.Token {
|
|
t.Fatal("tokens didn't match")
|
|
}
|
|
}
|
|
|
|
if err := (<-store.OAuth().GetPreviousAccessData(a1.UserId, a1.ClientId)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if err := (<-store.OAuth().GetPreviousAccessData("user", "junk")).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestOAuthStoreRemoveAccessData(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.AccessData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Token = model.NewId()
|
|
a1.RefreshToken = model.NewId()
|
|
Must(store.OAuth().SaveAccessData(&a1))
|
|
|
|
if err := (<-store.OAuth().RemoveAccessData(a1.Token)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if result := (<-store.OAuth().GetPreviousAccessData(a1.UserId, a1.ClientId)); result.Err != nil {
|
|
} else {
|
|
if result.Data != nil {
|
|
t.Fatal("did not delete access token")
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestOAuthStoreSaveAuthData(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.AuthData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Code = model.NewId()
|
|
|
|
if err := (<-store.OAuth().SaveAuthData(&a1)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestOAuthStoreGetAuthData(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.AuthData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Code = model.NewId()
|
|
Must(store.OAuth().SaveAuthData(&a1))
|
|
|
|
if err := (<-store.OAuth().GetAuthData(a1.Code)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestOAuthStoreRemoveAuthData(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.AuthData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Code = model.NewId()
|
|
Must(store.OAuth().SaveAuthData(&a1))
|
|
|
|
if err := (<-store.OAuth().RemoveAuthData(a1.Code)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if err := (<-store.OAuth().GetAuthData(a1.Code)).Err; err == nil {
|
|
t.Fatal("should have errored - auth code removed")
|
|
}
|
|
}
|
|
|
|
func TestOAuthStoreRemoveAuthDataByUser(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.AuthData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Code = model.NewId()
|
|
Must(store.OAuth().SaveAuthData(&a1))
|
|
|
|
if err := (<-store.OAuth().PermanentDeleteAuthDataByUser(a1.UserId)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestOAuthGetAuthorizedApps(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.Name = "TestApp" + model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
Must(store.OAuth().SaveApp(&a1))
|
|
|
|
// allow the app
|
|
p := model.Preference{}
|
|
p.UserId = a1.CreatorId
|
|
p.Category = model.PREFERENCE_CATEGORY_AUTHORIZED_OAUTH_APP
|
|
p.Name = a1.Id
|
|
p.Value = "true"
|
|
Must(store.Preference().Save(&model.Preferences{p}))
|
|
|
|
if result := <-store.OAuth().GetAuthorizedApps(a1.CreatorId); result.Err != nil {
|
|
t.Fatal(result.Err)
|
|
} else {
|
|
apps := result.Data.([]*model.OAuthApp)
|
|
if len(apps) == 0 {
|
|
t.Fatal("It should have return apps")
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestOAuthGetAccessDataByUserForApp(t *testing.T) {
|
|
Setup()
|
|
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.Name = "TestApp" + model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
Must(store.OAuth().SaveApp(&a1))
|
|
|
|
// allow the app
|
|
p := model.Preference{}
|
|
p.UserId = a1.CreatorId
|
|
p.Category = model.PREFERENCE_CATEGORY_AUTHORIZED_OAUTH_APP
|
|
p.Name = a1.Id
|
|
p.Value = "true"
|
|
Must(store.Preference().Save(&model.Preferences{p}))
|
|
|
|
if result := <-store.OAuth().GetAuthorizedApps(a1.CreatorId); result.Err != nil {
|
|
t.Fatal(result.Err)
|
|
} else {
|
|
apps := result.Data.([]*model.OAuthApp)
|
|
if len(apps) == 0 {
|
|
t.Fatal("It should have return apps")
|
|
}
|
|
}
|
|
|
|
// save the token
|
|
ad1 := model.AccessData{}
|
|
ad1.ClientId = a1.Id
|
|
ad1.UserId = a1.CreatorId
|
|
ad1.Token = model.NewId()
|
|
ad1.RefreshToken = model.NewId()
|
|
|
|
if err := (<-store.OAuth().SaveAccessData(&ad1)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if result := <-store.OAuth().GetAccessDataByUserForApp(a1.CreatorId, a1.Id); result.Err != nil {
|
|
t.Fatal(result.Err)
|
|
} else {
|
|
accessData := result.Data.([]*model.AccessData)
|
|
if len(accessData) == 0 {
|
|
t.Fatal("It should have return access data")
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestOAuthStoreDeleteApp(t *testing.T) {
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.Name = "TestApp" + model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
Must(store.OAuth().SaveApp(&a1))
|
|
|
|
if err := (<-store.OAuth().DeleteApp(a1.Id)).Err; err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|