mirror of
https://github.com/gitpod-io/gitpod.git
synced 2025-12-08 17:36:30 +00:00
Co-authored-by: Milan Pavlik <milan@gitpod.io> Co-authored-by: mustard <huiwen@gitpod.io>
203 lines
6.4 KiB
Go
203 lines
6.4 KiB
Go
// Copyright (c) 2022 Gitpod GmbH. All rights reserved.
|
|
// Licensed under the GNU Affero General Public License (AGPL).
|
|
// See License-AGPL.txt in the project root for license information.
|
|
|
|
package db_test
|
|
|
|
import (
|
|
"context"
|
|
"strconv"
|
|
"testing"
|
|
"time"
|
|
|
|
db "github.com/gitpod-io/gitpod/components/gitpod-db/go"
|
|
"github.com/gitpod-io/gitpod/components/gitpod-db/go/dbtest"
|
|
"github.com/google/uuid"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestPersonalAccessToken_Get(t *testing.T) {
|
|
conn := dbtest.ConnectForTests(t)
|
|
|
|
firstUserId := uuid.New()
|
|
secondUserId := uuid.New()
|
|
|
|
token := dbtest.NewPersonalAccessToken(t, db.PersonalAccessToken{UserID: firstUserId})
|
|
token2 := dbtest.NewPersonalAccessToken(t, db.PersonalAccessToken{UserID: secondUserId})
|
|
|
|
tokenEntries := []db.PersonalAccessToken{token, token2}
|
|
|
|
dbtest.CreatePersonalAccessTokenRecords(t, conn, tokenEntries...)
|
|
|
|
t.Run("not matching user", func(t *testing.T) {
|
|
_, err := db.GetPersonalAccessTokenForUser(context.Background(), conn, token.ID, token2.UserID)
|
|
require.Error(t, err, db.ErrorNotFound)
|
|
})
|
|
|
|
t.Run("not matching token", func(t *testing.T) {
|
|
_, err := db.GetPersonalAccessTokenForUser(context.Background(), conn, token2.ID, token.UserID)
|
|
require.Error(t, err, db.ErrorNotFound)
|
|
})
|
|
|
|
t.Run("both token and user don't exist in the DB", func(t *testing.T) {
|
|
_, err := db.GetPersonalAccessTokenForUser(context.Background(), conn, uuid.New(), uuid.New())
|
|
require.Error(t, err, db.ErrorNotFound)
|
|
})
|
|
|
|
t.Run("valid", func(t *testing.T) {
|
|
returned, err := db.GetPersonalAccessTokenForUser(context.Background(), conn, token.ID, token.UserID)
|
|
require.NoError(t, err)
|
|
require.Equal(t, token.ID, returned.ID)
|
|
require.Equal(t, token.UserID, returned.UserID)
|
|
})
|
|
|
|
}
|
|
|
|
func TestPersonalAccessToken_Create(t *testing.T) {
|
|
conn := dbtest.ConnectForTests(t)
|
|
|
|
request := db.PersonalAccessToken{
|
|
ID: uuid.New(),
|
|
UserID: uuid.New(),
|
|
Hash: "another-secure-hash",
|
|
Name: "another-name",
|
|
Description: "another-description",
|
|
Scopes: []string{"read", "write"},
|
|
ExpirationTime: time.Now().Add(5),
|
|
CreatedAt: time.Now(),
|
|
LastModified: time.Now(),
|
|
}
|
|
|
|
result, err := db.CreatePersonalAccessToken(context.Background(), conn, request)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, request.ID, result.ID)
|
|
}
|
|
|
|
func TestPersonalAccessToken_UpdateHash(t *testing.T) {
|
|
conn := dbtest.ConnectForTests(t)
|
|
|
|
firstUserId := uuid.New()
|
|
secondUserId := uuid.New()
|
|
|
|
token := dbtest.NewPersonalAccessToken(t, db.PersonalAccessToken{UserID: firstUserId})
|
|
token2 := dbtest.NewPersonalAccessToken(t, db.PersonalAccessToken{UserID: secondUserId})
|
|
|
|
tokenEntries := []db.PersonalAccessToken{token, token2}
|
|
|
|
dbtest.CreatePersonalAccessTokenRecords(t, conn, tokenEntries...)
|
|
|
|
var newHash = "another-secure-hash"
|
|
var newExpirationTime = time.Now().Add(24 * time.Hour).UTC().Truncate(time.Millisecond)
|
|
|
|
t.Run("not matching user", func(t *testing.T) {
|
|
_, err := db.UpdatePersonalAccessTokenHash(context.Background(), conn, token.ID, token2.UserID, newHash, newExpirationTime)
|
|
require.Error(t, err, db.ErrorNotFound)
|
|
})
|
|
|
|
t.Run("not matching token", func(t *testing.T) {
|
|
_, err := db.UpdatePersonalAccessTokenHash(context.Background(), conn, token2.ID, token.UserID, newHash, newExpirationTime)
|
|
require.Error(t, err, db.ErrorNotFound)
|
|
})
|
|
|
|
t.Run("both token and user don't exist in the DB", func(t *testing.T) {
|
|
_, err := db.UpdatePersonalAccessTokenHash(context.Background(), conn, uuid.New(), uuid.New(), newHash, newExpirationTime)
|
|
require.Error(t, err, db.ErrorNotFound)
|
|
})
|
|
|
|
t.Run("valid", func(t *testing.T) {
|
|
returned, err := db.UpdatePersonalAccessTokenHash(context.Background(), conn, token.ID, token.UserID, newHash, newExpirationTime)
|
|
require.NoError(t, err)
|
|
require.Equal(t, token.ID, returned.ID)
|
|
require.Equal(t, token.UserID, returned.UserID)
|
|
require.Equal(t, newHash, returned.Hash)
|
|
require.Equal(t, token.Name, returned.Name)
|
|
require.Equal(t, token.Description, returned.Description)
|
|
require.Equal(t, token.Scopes, returned.Scopes)
|
|
require.Equal(t, newExpirationTime, returned.ExpirationTime)
|
|
require.Equal(t, token.CreatedAt, returned.CreatedAt)
|
|
})
|
|
}
|
|
|
|
func TestListPersonalAccessTokensForUser(t *testing.T) {
|
|
ctx := context.Background()
|
|
conn := dbtest.ConnectForTests(t)
|
|
pagination := db.Pagination{
|
|
Page: 1,
|
|
PageSize: 10,
|
|
}
|
|
|
|
userA := uuid.New()
|
|
userB := uuid.New()
|
|
|
|
now := time.Now().UTC()
|
|
|
|
dbtest.CreatePersonalAccessTokenRecords(t, conn,
|
|
dbtest.NewPersonalAccessToken(t, db.PersonalAccessToken{
|
|
UserID: userA,
|
|
CreatedAt: now.Add(-1 * time.Minute),
|
|
}),
|
|
dbtest.NewPersonalAccessToken(t, db.PersonalAccessToken{
|
|
UserID: userA,
|
|
CreatedAt: now,
|
|
}),
|
|
dbtest.NewPersonalAccessToken(t, db.PersonalAccessToken{
|
|
UserID: userB,
|
|
}),
|
|
)
|
|
|
|
tokensForUserA, err := db.ListPersonalAccessTokensForUser(ctx, conn, userA, pagination)
|
|
require.NoError(t, err)
|
|
require.Len(t, tokensForUserA.Results, 2)
|
|
|
|
tokensForUserB, err := db.ListPersonalAccessTokensForUser(ctx, conn, userB, pagination)
|
|
require.NoError(t, err)
|
|
require.Len(t, tokensForUserB.Results, 1)
|
|
|
|
tokensForUserWithNoData, err := db.ListPersonalAccessTokensForUser(ctx, conn, uuid.New(), pagination)
|
|
require.NoError(t, err)
|
|
require.Len(t, tokensForUserWithNoData.Results, 0)
|
|
}
|
|
|
|
func TestListPersonalAccessTokensForUser_PaginateThroughResults(t *testing.T) {
|
|
ctx := context.Background()
|
|
conn := dbtest.ConnectForTests(t).Debug()
|
|
|
|
userA := uuid.New()
|
|
|
|
total := 11
|
|
var toCreate []db.PersonalAccessToken
|
|
for i := 0; i < total; i++ {
|
|
toCreate = append(toCreate, dbtest.NewPersonalAccessToken(t, db.PersonalAccessToken{
|
|
UserID: userA,
|
|
Name: strconv.Itoa(i),
|
|
}))
|
|
}
|
|
|
|
dbtest.CreatePersonalAccessTokenRecords(t, conn, toCreate...)
|
|
|
|
batch1, err := db.ListPersonalAccessTokensForUser(ctx, conn, userA, db.Pagination{
|
|
Page: 1,
|
|
PageSize: 5,
|
|
})
|
|
require.NoError(t, err)
|
|
require.Len(t, batch1.Results, 5)
|
|
require.EqualValues(t, batch1.Total, total)
|
|
|
|
batch2, err := db.ListPersonalAccessTokensForUser(ctx, conn, userA, db.Pagination{
|
|
Page: 2,
|
|
PageSize: 5,
|
|
})
|
|
require.NoError(t, err)
|
|
require.Len(t, batch2.Results, 5)
|
|
require.EqualValues(t, batch2.Total, total)
|
|
|
|
batch3, err := db.ListPersonalAccessTokensForUser(ctx, conn, userA, db.Pagination{
|
|
Page: 3,
|
|
PageSize: 5,
|
|
})
|
|
require.NoError(t, err)
|
|
require.Len(t, batch3.Results, 1)
|
|
require.EqualValues(t, batch3.Total, total)
|
|
}
|