mirror of
https://github.com/mattermost/mattermost.git
synced 2025-02-25 18:55:24 -06:00
* Initial models, API, app, and persistence of groups and group syncing. * Consistent letter casing in ldif. * Moves group-specific migrations into func. * Adds API endpoint to retrieve LDAP groups (and associated MM groups) one tree level at a time. * Adds mattermost group id to SCIMGroup (if available). * Splits user and group creation so that memberOf works. Returns users from ldap interface. * Updates method name. * Returns users IDs instead of User. * Removes non-essential group data. * MM-11807: Add GroupFilter to LDAP config. (#9513) * MM-11807: Add GroupFilter to LDAP config. * Add diagnostic. * Adds new config option for using 'memberOf' overlay. * Adds API endpoint to link a group. * Removes debug statements. * Adds unlink group API endpoint. * Fix to LDAP API. Adds API method to client4 and app. * Adds some missing app methods. Renames API unexported func. * Fixes link/unlink API path to accept valid DNs. * Allow any character for DN portion of path. * Switches from DN to objectGUID or entryUUID as the remote identifier linking LDAP groups to MM groups. * Formatting. * Formatting. * Setting group name field to an ID for phase 1. * Adds an LDAP config field to Setting up configuration for local LDAP. * Changes to LDAP and GroupStore interfaces. * Draft of nesting groups in API response. * Removes unnecessary tree models. * Updates group membershipt create store method to also restore. * Adds new config to test config. * Accept AD format length. * Switches to SetUniqueTogether method. * Updates revert. * Tweaks to syncing queries . * Updates query for pending team and channel memberships. * Removes old GroupSyncableScanner usage. Some formatting and renaming. * Fixes bug setting syncable type in selecting paged. * Adds tests for syncables populator. * Only add users to teams and channels that are not deleted. * Renames method. * Updates test LDAP setup. * Removes memberof config stuff. * Renames. * Updates test data. * Fix for gofmt. * Adds missing license. * Adds missing teardowns. * Test fix. * Adds a cycle to the groups test data. * Changes API to return flat list. * Removes some unused interface and app methods. * Returns empty braces if results are empty. * Adds more LDAP test data. * Fix for test data error. * Adds error. * Moves test groups. * Adds OU for load test data. * Moves load test ou creation to load data. * Adds a new bool flag to SCIMGroups. * Removes SCIMGroup completely. * Removes FULL JOIN because it is not supported in MySQL. * Adds tests for sync queries; renames constant. * Bad merge fix. * Vet fix. * Returning OK on delete ldap group link * Removes foreign key constraints. * Adding total to the ldap getAllGroups api endpoint * Adds get group members page. * Removes pagination from groups syncables list API. * Adding syncable check now that foreign key constraint is removes. * Joins teams and channels to group syncables. * Adds group member count. * Adding GetAllChannels and SearchAllChannels for system admins only * Fix. * Test fix from pagination removal. * Orders groupmembers by createat. * Fixing search of all channels * Test fix after removing pagination. * JSON syntax error fix. * Changing tests (for now) pending investigation. * Adding GetAllChannels and SearchAllChannels tests for the store * Adding GetAllChannels and SearchAllChannels API tests * Omit empty JSON values of group syncables. * Fixing GetAllChannels and SearchAllChannels tests * Fixing GetAllChannels and SearchAllChannels store tests * Fixing GetAllChannels api tests * Adds 'LDAP groups' feature flag. (#9861) * Migrate new client functions to idiomatic error handling * Test fixes. * Simplification of groups api (#9860) * Simplification of groups api * Fixing RequireSyncableType * Test fix. * Update api4/group.go Co-Authored-By: mkraft <martinkraft@gmail.com> * Update api4/group.go Co-Authored-By: mkraft <martinkraft@gmail.com> * Update api4/group.go Co-Authored-By: mkraft <martinkraft@gmail.com> * Update api4/group.go Co-Authored-By: mkraft <martinkraft@gmail.com> * Update api4/group.go Co-Authored-By: mkraft <martinkraft@gmail.com> * Update api4/group.go Co-Authored-By: mkraft <martinkraft@gmail.com> * Update api4/group.go Co-Authored-By: mkraft <martinkraft@gmail.com> * Update api4/group.go Co-Authored-By: mkraft <martinkraft@gmail.com> * Update api4/group.go Co-Authored-By: mkraft <martinkraft@gmail.com> * Update api4/group.go Co-Authored-By: mkraft <martinkraft@gmail.com> * Fix copy/paste error. * Fix copy/paste error. * Adds missing return, changes to correct HTTP status code. * Adds missing return, changes status codes. * Check for license. * Renames variable for new signature. * Adds client method to get a group. * Adds client method and tests for PatchGroup. * Adds more API tests. * Adds groups API tests. * Adds client method and tests for getting group syncables. * Adds tests for patching group teams and channels. * Update to translations. * Removes test. * Fix incorrect conditional. * Removes unnecessary nil check. * Removes unnecessary return. * Updates comment, removes unused variable. * Uses consistent JSON unmarshal pattern. * Uses consistent JSON unmarshal pattern. * Moves const block. * Switches 'already linked' from error to success response. * Removes commented-out code. * Switched to status ok. * Add parens for readability. * Fix copy/paste error. * Unexport some structs. * Removes repeated validity check. * Return without attempting commit if there's a rollback. * Fix incorrect HTTP status code. * Update store/sqlstore/group_supplier.go Co-Authored-By: mkraft <martinkraft@gmail.com> * Adds utility methods for going from groupsyncable to groupteam and groupchannel. * Fixing george suggestions (#9911) * Test fix. * Adds QA data to VC with visualization. * Fixes typo in graph image. * Update display name when re-linking in case it has changed in LDAP. * Adds ability to configure group display name and unique identifier. (#9923) * Adds ability to configure group display name and unique identifier. * Adds some configs to confi-ldap make command. * Fix for move of session. * Exposes method for use by SAML package. * Switches GroupSyncableType from int to string. * Update Jenkins build files. * Removes unused variable assignment. * Removes old unnecessary early return. * Removes unnecessary variable. * Moves param parsing before license and permissions checks. * Removes old code. * Compares agains underlying error rather than error id. * Switches tests to assertions. * Adds more assertions. * Adds missing return. * Adds space after comma for added legibility. * Moves a view model to the api package. * Unexports method. * Uses id validator function. * Fix docker-compose flag. * Typo fix. * Moves index creation to supplier. * Removes bad merge. * Renames parameter. * Re-adds space. * Removes unnecessary transaction. * Escapes the Groups table name with backticks because it is a reserved keyword. * Fix roles cache bug * Removing unnecesiary deserializing function * Switches table name rather than custom SQL everywhere for Postgres without backticks. * Removes redundant check for sql.ErrNoRows. * Removes redundant check for sql.ErrNoRows. * Removes data integrity check and redundant nil conditional. * Removes redundant check for sql.ErrNoRows. * Removes unnecessary query. * Removes ID length validation from persistence tier. * Makes some supplier methods idempotent. * Removes some empty switch defaults. * Renames Group Type field to Source. * Fix for mistaken field name change. * Uses IsValidId function. * Removes comment. * Changes json key name. * Removes test because no longer validating user. * Moves model state validation to app layer. * Don't create Groups.CanLeave column until phase 2. * Removes state validation until properties are used in phase 2. * Removes duplicated check. * Removes state validation until properties are used in phase 2. * Removes some tests until phase 2. * Comment-out a bunch of test related to CanLeave. * Extra unmarshal validation check. Removes more code for CanLeave. * Removes tests for CanLeave. * Explict error msg. * Rewrite queries. * Changes index name. Adds index. * Removes assertion. * Adds experimental feature flag.
229 lines
5.4 KiB
Go
229 lines
5.4 KiB
Go
// Copyright (c) 2016-present Mattermost, Inc. All Rights Reserved.
|
|
// See License.txt for license information.
|
|
|
|
package model
|
|
|
|
import (
|
|
"strings"
|
|
"testing"
|
|
)
|
|
|
|
func TestLicenseFeaturesToMap(t *testing.T) {
|
|
f := Features{}
|
|
f.SetDefaults()
|
|
|
|
m := f.ToMap()
|
|
|
|
CheckTrue(t, m["ldap"].(bool))
|
|
CheckTrue(t, m["ldap_groups"].(bool))
|
|
CheckTrue(t, m["mfa"].(bool))
|
|
CheckTrue(t, m["google"].(bool))
|
|
CheckTrue(t, m["office365"].(bool))
|
|
CheckTrue(t, m["compliance"].(bool))
|
|
CheckTrue(t, m["cluster"].(bool))
|
|
CheckTrue(t, m["metrics"].(bool))
|
|
CheckTrue(t, m["mhpns"].(bool))
|
|
CheckTrue(t, m["saml"].(bool))
|
|
CheckTrue(t, m["elastic_search"].(bool))
|
|
CheckTrue(t, m["email_notification_contents"].(bool))
|
|
CheckTrue(t, m["data_retention"].(bool))
|
|
CheckTrue(t, m["message_export"].(bool))
|
|
CheckTrue(t, m["custom_permissions_schemes"].(bool))
|
|
CheckTrue(t, m["future"].(bool))
|
|
}
|
|
|
|
func TestLicenseFeaturesSetDefaults(t *testing.T) {
|
|
f := Features{}
|
|
f.SetDefaults()
|
|
|
|
CheckInt(t, *f.Users, 0)
|
|
CheckTrue(t, *f.LDAP)
|
|
CheckTrue(t, *f.LDAPGroups)
|
|
CheckTrue(t, *f.MFA)
|
|
CheckTrue(t, *f.GoogleOAuth)
|
|
CheckTrue(t, *f.Office365OAuth)
|
|
CheckTrue(t, *f.Compliance)
|
|
CheckTrue(t, *f.Cluster)
|
|
CheckTrue(t, *f.Metrics)
|
|
CheckTrue(t, *f.MHPNS)
|
|
CheckTrue(t, *f.SAML)
|
|
CheckTrue(t, *f.Elasticsearch)
|
|
CheckTrue(t, *f.EmailNotificationContents)
|
|
CheckTrue(t, *f.DataRetention)
|
|
CheckTrue(t, *f.MessageExport)
|
|
CheckTrue(t, *f.CustomPermissionsSchemes)
|
|
CheckTrue(t, *f.FutureFeatures)
|
|
|
|
f = Features{}
|
|
f.SetDefaults()
|
|
|
|
*f.Users = 300
|
|
*f.FutureFeatures = false
|
|
*f.LDAP = true
|
|
*f.LDAPGroups = true
|
|
*f.MFA = true
|
|
*f.GoogleOAuth = true
|
|
*f.Office365OAuth = true
|
|
*f.Compliance = true
|
|
*f.Cluster = true
|
|
*f.Metrics = true
|
|
*f.MHPNS = true
|
|
*f.SAML = true
|
|
*f.Elasticsearch = true
|
|
*f.DataRetention = true
|
|
*f.MessageExport = true
|
|
*f.CustomPermissionsSchemes = true
|
|
*f.EmailNotificationContents = true
|
|
|
|
f.SetDefaults()
|
|
|
|
CheckInt(t, *f.Users, 300)
|
|
CheckTrue(t, *f.LDAP)
|
|
CheckTrue(t, *f.LDAPGroups)
|
|
CheckTrue(t, *f.MFA)
|
|
CheckTrue(t, *f.GoogleOAuth)
|
|
CheckTrue(t, *f.Office365OAuth)
|
|
CheckTrue(t, *f.Compliance)
|
|
CheckTrue(t, *f.Cluster)
|
|
CheckTrue(t, *f.Metrics)
|
|
CheckTrue(t, *f.MHPNS)
|
|
CheckTrue(t, *f.SAML)
|
|
CheckTrue(t, *f.Elasticsearch)
|
|
CheckTrue(t, *f.EmailNotificationContents)
|
|
CheckTrue(t, *f.DataRetention)
|
|
CheckTrue(t, *f.MessageExport)
|
|
CheckTrue(t, *f.CustomPermissionsSchemes)
|
|
CheckFalse(t, *f.FutureFeatures)
|
|
}
|
|
|
|
func TestLicenseIsExpired(t *testing.T) {
|
|
l1 := License{}
|
|
l1.ExpiresAt = GetMillis() - 1000
|
|
if !l1.IsExpired() {
|
|
t.Fatal("license should be expired")
|
|
}
|
|
|
|
l1.ExpiresAt = GetMillis() + 10000
|
|
if l1.IsExpired() {
|
|
t.Fatal("license should not be expired")
|
|
}
|
|
}
|
|
|
|
func TestLicenseIsStarted(t *testing.T) {
|
|
l1 := License{}
|
|
l1.StartsAt = GetMillis() - 1000
|
|
if !l1.IsStarted() {
|
|
t.Fatal("license should be started")
|
|
}
|
|
|
|
l1.StartsAt = GetMillis() + 10000
|
|
if l1.IsStarted() {
|
|
t.Fatal("license should not be started")
|
|
}
|
|
}
|
|
|
|
func TestLicenseToFromJson(t *testing.T) {
|
|
f := Features{}
|
|
f.SetDefaults()
|
|
|
|
l := License{
|
|
Id: NewId(),
|
|
IssuedAt: GetMillis(),
|
|
StartsAt: GetMillis(),
|
|
ExpiresAt: GetMillis(),
|
|
Customer: &Customer{
|
|
Id: NewId(),
|
|
Name: NewId(),
|
|
Email: NewId(),
|
|
Company: NewId(),
|
|
PhoneNumber: NewId(),
|
|
},
|
|
Features: &f,
|
|
}
|
|
|
|
j := l.ToJson()
|
|
|
|
l1 := LicenseFromJson(strings.NewReader(j))
|
|
if l1 == nil {
|
|
t.Fatalf("Decoding failed but should have passed.")
|
|
}
|
|
|
|
CheckString(t, l1.Id, l.Id)
|
|
CheckInt64(t, l1.IssuedAt, l.IssuedAt)
|
|
CheckInt64(t, l1.StartsAt, l.StartsAt)
|
|
CheckInt64(t, l1.ExpiresAt, l.ExpiresAt)
|
|
|
|
CheckString(t, l1.Customer.Id, l.Customer.Id)
|
|
CheckString(t, l1.Customer.Name, l.Customer.Name)
|
|
CheckString(t, l1.Customer.Email, l.Customer.Email)
|
|
CheckString(t, l1.Customer.Company, l.Customer.Company)
|
|
CheckString(t, l1.Customer.PhoneNumber, l.Customer.PhoneNumber)
|
|
|
|
f1 := l1.Features
|
|
|
|
CheckInt(t, *f1.Users, *f.Users)
|
|
CheckBool(t, *f1.LDAP, *f.LDAP)
|
|
CheckBool(t, *f1.LDAPGroups, *f.LDAPGroups)
|
|
CheckBool(t, *f1.MFA, *f.MFA)
|
|
CheckBool(t, *f1.GoogleOAuth, *f.GoogleOAuth)
|
|
CheckBool(t, *f1.Office365OAuth, *f.Office365OAuth)
|
|
CheckBool(t, *f1.Compliance, *f.Compliance)
|
|
CheckBool(t, *f1.Cluster, *f.Cluster)
|
|
CheckBool(t, *f1.Metrics, *f.Metrics)
|
|
CheckBool(t, *f1.MHPNS, *f.MHPNS)
|
|
CheckBool(t, *f1.SAML, *f.SAML)
|
|
CheckBool(t, *f1.Elasticsearch, *f.Elasticsearch)
|
|
CheckBool(t, *f1.DataRetention, *f.DataRetention)
|
|
CheckBool(t, *f1.MessageExport, *f.MessageExport)
|
|
CheckBool(t, *f1.CustomPermissionsSchemes, *f.CustomPermissionsSchemes)
|
|
CheckBool(t, *f1.FutureFeatures, *f.FutureFeatures)
|
|
|
|
invalid := `{"asdf`
|
|
l2 := LicenseFromJson(strings.NewReader(invalid))
|
|
if l2 != nil {
|
|
t.Fatalf("Should have failed but didn't")
|
|
}
|
|
}
|
|
|
|
func TestLicenseRecordIsValid(t *testing.T) {
|
|
lr := LicenseRecord{
|
|
CreateAt: GetMillis(),
|
|
Bytes: "asdfghjkl;",
|
|
}
|
|
|
|
if err := lr.IsValid(); err == nil {
|
|
t.Fatalf("Should have been invalid")
|
|
}
|
|
|
|
lr.Id = NewId()
|
|
lr.CreateAt = 0
|
|
if err := lr.IsValid(); err == nil {
|
|
t.Fatalf("Should have been invalid")
|
|
}
|
|
|
|
lr.CreateAt = GetMillis()
|
|
lr.Bytes = ""
|
|
if err := lr.IsValid(); err == nil {
|
|
t.Fatalf("Should have been invalid")
|
|
}
|
|
|
|
lr.Bytes = strings.Repeat("0123456789", 1001)
|
|
if err := lr.IsValid(); err == nil {
|
|
t.Fatalf("Should have been invalid")
|
|
}
|
|
|
|
lr.Bytes = "ASDFGHJKL;"
|
|
if err := lr.IsValid(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestLicenseRecordPreSave(t *testing.T) {
|
|
lr := LicenseRecord{}
|
|
lr.PreSave()
|
|
|
|
if lr.CreateAt == 0 {
|
|
t.Fatal("CreateAt should not be zero")
|
|
}
|
|
}
|