summaryrefslogtreecommitdiffstats
path: root/store/storetest/user_access_token_store.go
diff options
context:
space:
mode:
authorChris <ccbrown112@gmail.com>2017-10-06 11:08:59 -0700
committerGitHub <noreply@github.com>2017-10-06 11:08:59 -0700
commit70e5f00241473c27a3008959ce08832c75e76ba8 (patch)
tree3afd074964c9220cc4a87210286a13dfd38c61d0 /store/storetest/user_access_token_store.go
parentd1958bdc49cd10277ca2e27bb2eea499c5994954 (diff)
downloadchat-70e5f00241473c27a3008959ce08832c75e76ba8.tar.gz
chat-70e5f00241473c27a3008959ce08832c75e76ba8.tar.bz2
chat-70e5f00241473c27a3008959ce08832c75e76ba8.zip
store/storetest package (#7588)
* prerequisites * storetest package
Diffstat (limited to 'store/storetest/user_access_token_store.go')
-rw-r--r--store/storetest/user_access_token_store.go89
1 files changed, 89 insertions, 0 deletions
diff --git a/store/storetest/user_access_token_store.go b/store/storetest/user_access_token_store.go
new file mode 100644
index 000000000..292929419
--- /dev/null
+++ b/store/storetest/user_access_token_store.go
@@ -0,0 +1,89 @@
+// Copyright (c) 2017-present Mattermost, Inc. All Rights Reserved.
+// See License.txt for license information.
+
+package storetest
+
+import (
+ "testing"
+
+ "github.com/mattermost/mattermost-server/model"
+ "github.com/mattermost/mattermost-server/store"
+)
+
+func TestUserAccessTokenStore(t *testing.T, ss store.Store) {
+ t.Run("UserAccessTokenSaveGetDelete", func(t *testing.T) { testUserAccessTokenSaveGetDelete(t, ss) })
+}
+
+func testUserAccessTokenSaveGetDelete(t *testing.T, ss store.Store) {
+ uat := &model.UserAccessToken{
+ Token: model.NewId(),
+ UserId: model.NewId(),
+ Description: "testtoken",
+ }
+
+ s1 := model.Session{}
+ s1.UserId = uat.UserId
+ s1.Token = uat.Token
+
+ store.Must(ss.Session().Save(&s1))
+
+ if result := <-ss.UserAccessToken().Save(uat); result.Err != nil {
+ t.Fatal(result.Err)
+ }
+
+ if result := <-ss.UserAccessToken().Get(uat.Id); result.Err != nil {
+ t.Fatal(result.Err)
+ } else if received := result.Data.(*model.UserAccessToken); received.Token != uat.Token {
+ t.Fatal("received incorrect token after save")
+ }
+
+ if result := <-ss.UserAccessToken().GetByToken(uat.Token); result.Err != nil {
+ t.Fatal(result.Err)
+ } else if received := result.Data.(*model.UserAccessToken); received.Token != uat.Token {
+ t.Fatal("received incorrect token after save")
+ }
+
+ if result := <-ss.UserAccessToken().GetByToken("notarealtoken"); result.Err == nil {
+ t.Fatal("should have failed on bad token")
+ }
+
+ if result := <-ss.UserAccessToken().GetByUser(uat.UserId, 0, 100); result.Err != nil {
+ t.Fatal(result.Err)
+ } else if received := result.Data.([]*model.UserAccessToken); len(received) != 1 {
+ t.Fatal("received incorrect number of tokens after save")
+ }
+
+ if result := <-ss.UserAccessToken().Delete(uat.Id); result.Err != nil {
+ t.Fatal(result.Err)
+ }
+
+ if err := (<-ss.Session().Get(s1.Token)).Err; err == nil {
+ t.Fatal("should error - session should be deleted")
+ }
+
+ if err := (<-ss.UserAccessToken().GetByToken(s1.Token)).Err; err == nil {
+ t.Fatal("should error - access token should be deleted")
+ }
+
+ s2 := model.Session{}
+ s2.UserId = uat.UserId
+ s2.Token = uat.Token
+
+ store.Must(ss.Session().Save(&s2))
+
+ if result := <-ss.UserAccessToken().Save(uat); result.Err != nil {
+ t.Fatal(result.Err)
+ }
+
+ if result := <-ss.UserAccessToken().DeleteAllForUser(uat.UserId); result.Err != nil {
+ t.Fatal(result.Err)
+ }
+
+ if err := (<-ss.Session().Get(s2.Token)).Err; err == nil {
+ t.Fatal("should error - session should be deleted")
+ }
+
+ if err := (<-ss.UserAccessToken().GetByToken(s2.Token)).Err; err == nil {
+ t.Fatal("should error - access token should be deleted")
+ }
+}