mirror of
https://github.com/mattermost/mattermost.git
synced 2025-02-25 18:55:24 -06:00
241 lines
6.1 KiB
Go
241 lines
6.1 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package model
|
|
|
|
import (
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestLicenseFeaturesToMap(t *testing.T) {
|
|
f := Features{}
|
|
f.SetDefaults()
|
|
|
|
m := f.ToMap()
|
|
|
|
CheckTrue(t, m["ldap"].(bool))
|
|
CheckTrue(t, m["ldap_groups"].(bool))
|
|
CheckTrue(t, m["mfa"].(bool))
|
|
CheckTrue(t, m["google"].(bool))
|
|
CheckTrue(t, m["office365"].(bool))
|
|
CheckTrue(t, m["compliance"].(bool))
|
|
CheckTrue(t, m["cluster"].(bool))
|
|
CheckTrue(t, m["metrics"].(bool))
|
|
CheckTrue(t, m["mhpns"].(bool))
|
|
CheckTrue(t, m["saml"].(bool))
|
|
CheckTrue(t, m["elastic_search"].(bool))
|
|
CheckTrue(t, m["email_notification_contents"].(bool))
|
|
CheckTrue(t, m["data_retention"].(bool))
|
|
CheckTrue(t, m["message_export"].(bool))
|
|
CheckTrue(t, m["custom_permissions_schemes"].(bool))
|
|
CheckTrue(t, m["id_loaded"].(bool))
|
|
CheckTrue(t, m["future"].(bool))
|
|
CheckTrue(t, m["shared_channels"].(bool))
|
|
CheckTrue(t, m["remote_cluster_service"].(bool))
|
|
}
|
|
|
|
func TestLicenseFeaturesSetDefaults(t *testing.T) {
|
|
f := Features{}
|
|
f.SetDefaults()
|
|
|
|
CheckInt(t, *f.Users, 0)
|
|
CheckTrue(t, *f.LDAP)
|
|
CheckTrue(t, *f.LDAPGroups)
|
|
CheckTrue(t, *f.MFA)
|
|
CheckTrue(t, *f.GoogleOAuth)
|
|
CheckTrue(t, *f.Office365OAuth)
|
|
CheckTrue(t, *f.Compliance)
|
|
CheckTrue(t, *f.Cluster)
|
|
CheckTrue(t, *f.Metrics)
|
|
CheckTrue(t, *f.MHPNS)
|
|
CheckTrue(t, *f.SAML)
|
|
CheckTrue(t, *f.Elasticsearch)
|
|
CheckTrue(t, *f.EmailNotificationContents)
|
|
CheckTrue(t, *f.DataRetention)
|
|
CheckTrue(t, *f.MessageExport)
|
|
CheckTrue(t, *f.CustomPermissionsSchemes)
|
|
CheckTrue(t, *f.GuestAccountsPermissions)
|
|
CheckTrue(t, *f.IDLoadedPushNotifications)
|
|
CheckTrue(t, *f.SharedChannels)
|
|
CheckTrue(t, *f.RemoteClusterService)
|
|
CheckTrue(t, *f.FutureFeatures)
|
|
|
|
f = Features{}
|
|
f.SetDefaults()
|
|
|
|
*f.Users = 300
|
|
*f.FutureFeatures = false
|
|
*f.LDAP = true
|
|
*f.LDAPGroups = true
|
|
*f.MFA = true
|
|
*f.GoogleOAuth = true
|
|
*f.Office365OAuth = true
|
|
*f.Compliance = true
|
|
*f.Cluster = true
|
|
*f.Metrics = true
|
|
*f.MHPNS = true
|
|
*f.SAML = true
|
|
*f.Elasticsearch = true
|
|
*f.DataRetention = true
|
|
*f.MessageExport = true
|
|
*f.CustomPermissionsSchemes = true
|
|
*f.GuestAccounts = true
|
|
*f.GuestAccountsPermissions = true
|
|
*f.EmailNotificationContents = true
|
|
*f.IDLoadedPushNotifications = true
|
|
*f.SharedChannels = true
|
|
|
|
f.SetDefaults()
|
|
|
|
CheckInt(t, *f.Users, 300)
|
|
CheckTrue(t, *f.LDAP)
|
|
CheckTrue(t, *f.LDAPGroups)
|
|
CheckTrue(t, *f.MFA)
|
|
CheckTrue(t, *f.GoogleOAuth)
|
|
CheckTrue(t, *f.Office365OAuth)
|
|
CheckTrue(t, *f.Compliance)
|
|
CheckTrue(t, *f.Cluster)
|
|
CheckTrue(t, *f.Metrics)
|
|
CheckTrue(t, *f.MHPNS)
|
|
CheckTrue(t, *f.SAML)
|
|
CheckTrue(t, *f.Elasticsearch)
|
|
CheckTrue(t, *f.EmailNotificationContents)
|
|
CheckTrue(t, *f.DataRetention)
|
|
CheckTrue(t, *f.MessageExport)
|
|
CheckTrue(t, *f.CustomPermissionsSchemes)
|
|
CheckTrue(t, *f.GuestAccounts)
|
|
CheckTrue(t, *f.GuestAccountsPermissions)
|
|
CheckTrue(t, *f.IDLoadedPushNotifications)
|
|
CheckTrue(t, *f.SharedChannels)
|
|
CheckTrue(t, *f.RemoteClusterService)
|
|
CheckFalse(t, *f.FutureFeatures)
|
|
}
|
|
|
|
func TestLicenseIsExpired(t *testing.T) {
|
|
l1 := License{}
|
|
l1.ExpiresAt = GetMillis() - 1000
|
|
assert.True(t, l1.IsExpired())
|
|
|
|
l1.ExpiresAt = GetMillis() + 10000
|
|
assert.False(t, l1.IsExpired())
|
|
}
|
|
|
|
func TestLicenseIsPastGracePeriod(t *testing.T) {
|
|
l1 := License{}
|
|
l1.ExpiresAt = GetMillis() - LICENSE_GRACE_PERIOD - 1000
|
|
assert.True(t, l1.IsPastGracePeriod())
|
|
|
|
l1.ExpiresAt = GetMillis() + 1000
|
|
assert.False(t, l1.IsPastGracePeriod())
|
|
}
|
|
|
|
func TestLicenseIsStarted(t *testing.T) {
|
|
l1 := License{}
|
|
l1.StartsAt = GetMillis() - 1000
|
|
|
|
assert.True(t, l1.IsStarted())
|
|
|
|
l1.StartsAt = GetMillis() + 10000
|
|
assert.False(t, l1.IsStarted())
|
|
}
|
|
|
|
func TestLicenseToFromJson(t *testing.T) {
|
|
f := Features{}
|
|
f.SetDefaults()
|
|
|
|
l := License{
|
|
Id: NewId(),
|
|
IssuedAt: GetMillis(),
|
|
StartsAt: GetMillis(),
|
|
ExpiresAt: GetMillis(),
|
|
Customer: &Customer{
|
|
Id: NewId(),
|
|
Name: NewId(),
|
|
Email: NewId(),
|
|
Company: NewId(),
|
|
},
|
|
Features: &f,
|
|
}
|
|
|
|
j := l.ToJson()
|
|
|
|
l1 := LicenseFromJson(strings.NewReader(j))
|
|
assert.NotNil(t, l1)
|
|
|
|
CheckString(t, l1.Id, l.Id)
|
|
CheckInt64(t, l1.IssuedAt, l.IssuedAt)
|
|
CheckInt64(t, l1.StartsAt, l.StartsAt)
|
|
CheckInt64(t, l1.ExpiresAt, l.ExpiresAt)
|
|
|
|
CheckString(t, l1.Customer.Id, l.Customer.Id)
|
|
CheckString(t, l1.Customer.Name, l.Customer.Name)
|
|
CheckString(t, l1.Customer.Email, l.Customer.Email)
|
|
CheckString(t, l1.Customer.Company, l.Customer.Company)
|
|
|
|
f1 := l1.Features
|
|
|
|
CheckInt(t, *f1.Users, *f.Users)
|
|
CheckBool(t, *f1.LDAP, *f.LDAP)
|
|
CheckBool(t, *f1.LDAPGroups, *f.LDAPGroups)
|
|
CheckBool(t, *f1.MFA, *f.MFA)
|
|
CheckBool(t, *f1.GoogleOAuth, *f.GoogleOAuth)
|
|
CheckBool(t, *f1.Office365OAuth, *f.Office365OAuth)
|
|
CheckBool(t, *f1.Compliance, *f.Compliance)
|
|
CheckBool(t, *f1.Cluster, *f.Cluster)
|
|
CheckBool(t, *f1.Metrics, *f.Metrics)
|
|
CheckBool(t, *f1.MHPNS, *f.MHPNS)
|
|
CheckBool(t, *f1.SAML, *f.SAML)
|
|
CheckBool(t, *f1.Elasticsearch, *f.Elasticsearch)
|
|
CheckBool(t, *f1.DataRetention, *f.DataRetention)
|
|
CheckBool(t, *f1.MessageExport, *f.MessageExport)
|
|
CheckBool(t, *f1.CustomPermissionsSchemes, *f.CustomPermissionsSchemes)
|
|
CheckBool(t, *f1.GuestAccounts, *f.GuestAccounts)
|
|
CheckBool(t, *f1.GuestAccountsPermissions, *f.GuestAccountsPermissions)
|
|
CheckBool(t, *f1.IDLoadedPushNotifications, *f.IDLoadedPushNotifications)
|
|
CheckBool(t, *f1.SharedChannels, *f.SharedChannels)
|
|
CheckBool(t, *f1.RemoteClusterService, *f.RemoteClusterService)
|
|
CheckBool(t, *f1.FutureFeatures, *f.FutureFeatures)
|
|
|
|
invalid := `{"asdf`
|
|
l2 := LicenseFromJson(strings.NewReader(invalid))
|
|
assert.Nil(t, l2)
|
|
}
|
|
|
|
func TestLicenseRecordIsValid(t *testing.T) {
|
|
lr := LicenseRecord{
|
|
CreateAt: GetMillis(),
|
|
Bytes: "asdfghjkl;",
|
|
}
|
|
|
|
err := lr.IsValid()
|
|
assert.NotNil(t, err)
|
|
|
|
lr.Id = NewId()
|
|
lr.CreateAt = 0
|
|
err = lr.IsValid()
|
|
assert.NotNil(t, err)
|
|
|
|
lr.CreateAt = GetMillis()
|
|
lr.Bytes = ""
|
|
err = lr.IsValid()
|
|
assert.NotNil(t, err)
|
|
|
|
lr.Bytes = strings.Repeat("0123456789", 1001)
|
|
err = lr.IsValid()
|
|
assert.NotNil(t, err)
|
|
|
|
lr.Bytes = "ASDFGHJKL;"
|
|
err = lr.IsValid()
|
|
assert.Nil(t, err)
|
|
}
|
|
|
|
func TestLicenseRecordPreSave(t *testing.T) {
|
|
lr := LicenseRecord{}
|
|
lr.PreSave()
|
|
|
|
assert.NotZero(t, lr.CreateAt)
|
|
}
|