diff options
author | Nick Frazier <nrflaw@gmail.com> | 2017-10-19 08:10:29 -0400 |
---|---|---|
committer | Joram Wilander <jwawilander@gmail.com> | 2017-10-19 08:10:29 -0400 |
commit | 7fa4913f902457dadb1a4806ce194eb122dbc090 (patch) | |
tree | ea340ad55f6dfa1e6ee647e0a87af69ac406e25d /api4/user_test.go | |
parent | 8e19ba029f889519d93cf272960dce858971106c (diff) | |
download | chat-7fa4913f902457dadb1a4806ce194eb122dbc090.tar.gz chat-7fa4913f902457dadb1a4806ce194eb122dbc090.tar.bz2 chat-7fa4913f902457dadb1a4806ce194eb122dbc090.zip |
[PLT-7794] Add user access token enable/disable endpoints (#7630)
* Add column to UserAccessTokens table
* PLT-7794 Add user access token enable/disable endpoints
* replaced eliminated global variable
* updates to user_access_token_store and upgrade.go
* style fix and cleanup
Diffstat (limited to 'api4/user_test.go')
-rw-r--r-- | api4/user_test.go | 98 |
1 files changed, 97 insertions, 1 deletions
diff --git a/api4/user_test.go b/api4/user_test.go index ceaf3f038..1f408048e 100644 --- a/api4/user_test.go +++ b/api4/user_test.go @@ -2302,6 +2302,8 @@ func TestCreateUserAccessToken(t *testing.T) { t.Fatal("id should not be empty") } else if rtoken.Description != testDescription { t.Fatal("description did not match") + } else if !rtoken.IsActive { + t.Fatal("token should be active") } oldSessionToken := Client.AuthToken @@ -2445,7 +2447,7 @@ func TestRevokeUserAccessToken(t *testing.T) { if !ok { t.Fatal("should have passed") } - + oldSessionToken = Client.AuthToken Client.AuthToken = token.Token _, resp = Client.GetMe("") @@ -2463,6 +2465,100 @@ func TestRevokeUserAccessToken(t *testing.T) { } } +func TestDisableUserAccessToken(t *testing.T) { + th := Setup().InitBasic().InitSystemAdmin() + defer th.TearDown() + Client := th.Client + AdminClient := th.SystemAdminClient + + testDescription := "test token" + + enableUserAccessTokens := *utils.Cfg.ServiceSettings.EnableUserAccessTokens + defer func() { + *utils.Cfg.ServiceSettings.EnableUserAccessTokens = enableUserAccessTokens + }() + *utils.Cfg.ServiceSettings.EnableUserAccessTokens = true + + th.App.UpdateUserRoles(th.BasicUser.Id, model.ROLE_SYSTEM_USER.Id+" "+model.ROLE_SYSTEM_USER_ACCESS_TOKEN.Id) + token, resp := Client.CreateUserAccessToken(th.BasicUser.Id, testDescription) + CheckNoError(t, resp) + + oldSessionToken := Client.AuthToken + Client.AuthToken = token.Token + _, resp = Client.GetMe("") + CheckNoError(t, resp) + Client.AuthToken = oldSessionToken + + ok, resp := Client.DisableUserAccessToken(token.Id) + CheckNoError(t, resp) + + if !ok { + t.Fatal("should have passed") + } + + oldSessionToken = Client.AuthToken + Client.AuthToken = token.Token + _, resp = Client.GetMe("") + CheckUnauthorizedStatus(t, resp) + Client.AuthToken = oldSessionToken + + token, resp = AdminClient.CreateUserAccessToken(th.BasicUser2.Id, testDescription) + CheckNoError(t, resp) + + ok, resp = Client.DisableUserAccessToken(token.Id) + CheckForbiddenStatus(t, resp) + + if ok { + t.Fatal("should have failed") + } +} + +func TestEnableUserAccessToken(t *testing.T) { + th := Setup().InitBasic().InitSystemAdmin() + defer th.TearDown() + Client := th.Client + + testDescription := "test token" + + enableUserAccessTokens := *utils.Cfg.ServiceSettings.EnableUserAccessTokens + defer func() { + *utils.Cfg.ServiceSettings.EnableUserAccessTokens = enableUserAccessTokens + }() + *utils.Cfg.ServiceSettings.EnableUserAccessTokens = true + + th.App.UpdateUserRoles(th.BasicUser.Id, model.ROLE_SYSTEM_USER.Id+" "+model.ROLE_SYSTEM_USER_ACCESS_TOKEN.Id) + token, resp := Client.CreateUserAccessToken(th.BasicUser.Id, testDescription) + CheckNoError(t, resp) + + oldSessionToken := Client.AuthToken + Client.AuthToken = token.Token + _, resp = Client.GetMe("") + CheckNoError(t, resp) + Client.AuthToken = oldSessionToken + + _, resp = Client.DisableUserAccessToken(token.Id) + CheckNoError(t, resp) + + oldSessionToken = Client.AuthToken + Client.AuthToken = token.Token + _, resp = Client.GetMe("") + CheckUnauthorizedStatus(t, resp) + Client.AuthToken = oldSessionToken + + ok, resp := Client.EnableUserAccessToken(token.Id) + CheckNoError(t, resp) + + if !ok { + t.Fatal("should have passed") + } + + oldSessionToken = Client.AuthToken + Client.AuthToken = token.Token + _, resp = Client.GetMe("") + CheckNoError(t, resp) + Client.AuthToken = oldSessionToken +} + func TestUserAccessTokenInactiveUser(t *testing.T) { th := Setup().InitBasic().InitSystemAdmin() defer th.TearDown() |