mirror of
https://github.com/mattermost/mattermost.git
synced 2025-02-25 18:55:24 -06:00
* Replacing require.nil in app layer * Fixing some tests * Fixing tests * Reverting the error correction, defering it for another PR * Fixing golangci-lint errors Co-authored-by: Mattermod <mattermod@users.noreply.github.com>
163 lines
5.4 KiB
Go
163 lines
5.4 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package app
|
|
|
|
import (
|
|
"strconv"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/mock"
|
|
|
|
"github.com/mattermost/mattermost-server/v5/model"
|
|
"github.com/mattermost/mattermost-server/v5/store/storetest/mocks"
|
|
"github.com/mattermost/mattermost-server/v5/utils"
|
|
)
|
|
|
|
func TestConfigListener(t *testing.T) {
|
|
th := Setup(t)
|
|
defer th.TearDown()
|
|
|
|
originalSiteName := th.App.Config().TeamSettings.SiteName
|
|
|
|
listenerCalled := false
|
|
listener := func(oldConfig *model.Config, newConfig *model.Config) {
|
|
assert.False(t, listenerCalled, "listener called twice")
|
|
|
|
assert.Equal(t, *originalSiteName, *oldConfig.TeamSettings.SiteName, "old config contains incorrect site name")
|
|
assert.Equal(t, "test123", *newConfig.TeamSettings.SiteName, "new config contains incorrect site name")
|
|
|
|
listenerCalled = true
|
|
}
|
|
listenerId := th.App.AddConfigListener(listener)
|
|
defer th.App.RemoveConfigListener(listenerId)
|
|
|
|
listener2Called := false
|
|
listener2 := func(oldConfig *model.Config, newConfig *model.Config) {
|
|
assert.False(t, listener2Called, "listener2 called twice")
|
|
|
|
listener2Called = true
|
|
}
|
|
listener2Id := th.App.AddConfigListener(listener2)
|
|
defer th.App.RemoveConfigListener(listener2Id)
|
|
|
|
th.App.UpdateConfig(func(cfg *model.Config) {
|
|
*cfg.TeamSettings.SiteName = "test123"
|
|
})
|
|
|
|
assert.True(t, listenerCalled, "listener should've been called")
|
|
assert.True(t, listener2Called, "listener 2 should've been called")
|
|
}
|
|
|
|
func TestAsymmetricSigningKey(t *testing.T) {
|
|
th := SetupWithStoreMock(t)
|
|
defer th.TearDown()
|
|
assert.NotNil(t, th.App.AsymmetricSigningKey())
|
|
assert.NotEmpty(t, th.App.ClientConfig()["AsymmetricSigningPublicKey"])
|
|
}
|
|
|
|
func TestPostActionCookieSecret(t *testing.T) {
|
|
th := SetupWithStoreMock(t)
|
|
defer th.TearDown()
|
|
assert.Equal(t, 32, len(th.App.PostActionCookieSecret()))
|
|
}
|
|
|
|
func TestClientConfigWithComputed(t *testing.T) {
|
|
th := SetupWithStoreMock(t)
|
|
defer th.TearDown()
|
|
|
|
mockStore := th.App.Srv().Store.(*mocks.Store)
|
|
mockUserStore := mocks.UserStore{}
|
|
mockUserStore.On("Count", mock.Anything).Return(int64(10), nil)
|
|
mockPostStore := mocks.PostStore{}
|
|
mockPostStore.On("GetMaxPostSize").Return(65535, nil)
|
|
mockSystemStore := mocks.SystemStore{}
|
|
mockSystemStore.On("GetByName", "UpgradedFromTE").Return(&model.System{Name: "UpgradedFromTE", Value: "false"}, nil)
|
|
mockSystemStore.On("GetByName", "InstallationDate").Return(&model.System{Name: "InstallationDate", Value: "10"}, nil)
|
|
mockStore.On("User").Return(&mockUserStore)
|
|
mockStore.On("Post").Return(&mockPostStore)
|
|
mockStore.On("System").Return(&mockSystemStore)
|
|
|
|
config := th.App.ClientConfigWithComputed()
|
|
_, ok := config["NoAccounts"]
|
|
assert.True(t, ok, "expected NoAccounts in returned config")
|
|
_, ok = config["MaxPostSize"]
|
|
assert.True(t, ok, "expected MaxPostSize in returned config")
|
|
}
|
|
|
|
func TestEnsureInstallationDate(t *testing.T) {
|
|
th := Setup(t)
|
|
defer th.TearDown()
|
|
|
|
tt := []struct {
|
|
Name string
|
|
PrevInstallationDate *int64
|
|
UsersCreationDates []int64
|
|
ExpectedInstallationDate *int64
|
|
}{
|
|
{
|
|
Name: "New installation: no users, no installation date",
|
|
PrevInstallationDate: nil,
|
|
UsersCreationDates: nil,
|
|
ExpectedInstallationDate: model.NewInt64(utils.MillisFromTime(time.Now())),
|
|
},
|
|
{
|
|
Name: "Old installation: users, no installation date",
|
|
PrevInstallationDate: nil,
|
|
UsersCreationDates: []int64{10000000000, 30000000000, 20000000000},
|
|
ExpectedInstallationDate: model.NewInt64(10000000000),
|
|
},
|
|
{
|
|
Name: "New installation, second run: no users, installation date",
|
|
PrevInstallationDate: model.NewInt64(80000000000),
|
|
UsersCreationDates: []int64{10000000000, 30000000000, 20000000000},
|
|
ExpectedInstallationDate: model.NewInt64(80000000000),
|
|
},
|
|
{
|
|
Name: "Old installation already updated: users, installation date",
|
|
PrevInstallationDate: model.NewInt64(90000000000),
|
|
UsersCreationDates: []int64{10000000000, 30000000000, 20000000000},
|
|
ExpectedInstallationDate: model.NewInt64(90000000000),
|
|
},
|
|
}
|
|
|
|
for _, tc := range tt {
|
|
t.Run(tc.Name, func(t *testing.T) {
|
|
sqlStore := th.GetSqlStore()
|
|
sqlStore.GetMaster().Exec("DELETE FROM Users")
|
|
|
|
for _, createAt := range tc.UsersCreationDates {
|
|
user := th.CreateUser()
|
|
user.CreateAt = createAt
|
|
sqlStore.GetMaster().Exec("UPDATE Users SET CreateAt = :CreateAt WHERE Id = :UserId", map[string]interface{}{"CreateAt": createAt, "UserId": user.Id})
|
|
}
|
|
|
|
if tc.PrevInstallationDate == nil {
|
|
th.App.Srv().Store.System().PermanentDeleteByName(model.SYSTEM_INSTALLATION_DATE_KEY)
|
|
} else {
|
|
th.App.Srv().Store.System().SaveOrUpdate(&model.System{
|
|
Name: model.SYSTEM_INSTALLATION_DATE_KEY,
|
|
Value: strconv.FormatInt(*tc.PrevInstallationDate, 10),
|
|
})
|
|
}
|
|
|
|
err := th.App.Srv().ensureInstallationDate()
|
|
|
|
if tc.ExpectedInstallationDate == nil {
|
|
assert.Error(t, err)
|
|
} else {
|
|
assert.NoError(t, err)
|
|
|
|
data, err := th.App.Srv().Store.System().GetByName(model.SYSTEM_INSTALLATION_DATE_KEY)
|
|
assert.NoError(t, err)
|
|
value, _ := strconv.ParseInt(data.Value, 10, 64)
|
|
assert.True(t, *tc.ExpectedInstallationDate <= value && *tc.ExpectedInstallationDate+1000 >= value)
|
|
}
|
|
|
|
sqlStore.GetMaster().Exec("DELETE FROM Users")
|
|
})
|
|
}
|
|
}
|