mirror of
https://github.com/mattermost/mattermost.git
synced 2026-02-03 20:40:00 -05:00
267 lines
8.3 KiB
Go
267 lines
8.3 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package commands
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/http"
|
|
|
|
"github.com/mattermost/mattermost/server/public/model"
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/mattermost/mattermost/server/v8/cmd/mmctl/printer"
|
|
|
|
"github.com/spf13/cobra"
|
|
)
|
|
|
|
func (s *MmctlUnitTestSuite) TestGenerateTokenForAUserCmd() {
|
|
s.Run("Should generate a token for a user", func() {
|
|
printer.Clean()
|
|
|
|
userArg := "userId1"
|
|
mockUser := model.User{Id: "userId1", Email: "user1@example.com", Username: "user1"}
|
|
mockToken := model.UserAccessToken{Token: "token-id", Description: "token-desc"}
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUserByUsername(context.TODO(), userArg, "").
|
|
Return(nil, &model.Response{}, errors.New("no user found with the given username")).
|
|
Times(1)
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUser(context.TODO(), userArg, "").
|
|
Return(&mockUser, &model.Response{}, nil).
|
|
Times(1)
|
|
|
|
s.client.
|
|
EXPECT().
|
|
CreateUserAccessToken(context.TODO(), mockUser.Id, mockToken.Description).
|
|
Return(&mockToken, &model.Response{}, nil).
|
|
Times(1)
|
|
|
|
err := generateTokenForAUserCmdF(s.client, &cobra.Command{}, []string{mockUser.Id, mockToken.Description})
|
|
s.Require().Nil(err)
|
|
s.Require().Len(printer.GetLines(), 1)
|
|
s.Require().Equal(&mockToken, printer.GetLines()[0])
|
|
})
|
|
|
|
s.Run("Should fail on an invalid username", func() {
|
|
printer.Clean()
|
|
|
|
userArg := "some-text"
|
|
s.client.
|
|
EXPECT().
|
|
GetUserByUsername(context.TODO(), userArg, "").
|
|
Return(nil, &model.Response{}, errors.New("no user found with the given username")).
|
|
Times(1)
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUser(context.TODO(), userArg, "").
|
|
Return(nil, &model.Response{}, errors.New("no user found with the given ID")).
|
|
Times(1)
|
|
|
|
err := generateTokenForAUserCmdF(s.client, &cobra.Command{}, []string{userArg, "description"})
|
|
s.Require().NotNil(err)
|
|
s.Require().Contains(err.Error(), fmt.Sprintf("could not retrieve user information of %q", userArg))
|
|
})
|
|
|
|
s.Run("Should fail if can't create tokens for a valid user", func() {
|
|
printer.Clean()
|
|
|
|
userArg := "user1"
|
|
mockUser := model.User{Id: "userId1", Email: "user1@example.com", Username: "user1"}
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUserByUsername(context.TODO(), userArg, "").
|
|
Return(&mockUser, &model.Response{}, nil).
|
|
Times(1)
|
|
|
|
s.client.
|
|
EXPECT().
|
|
CreateUserAccessToken(context.TODO(), mockUser.Id, "description").
|
|
Return(nil, &model.Response{}, errors.New("error-message")).
|
|
Times(1)
|
|
|
|
err := generateTokenForAUserCmdF(s.client, &cobra.Command{}, []string{"user1", "description"})
|
|
s.Require().NotNil(err)
|
|
s.Require().Contains(err.Error(), fmt.Sprintf("could not create token for %q:", "user1"))
|
|
})
|
|
}
|
|
|
|
func (s *MmctlUnitTestSuite) TestListTokensOfAUserCmdF() {
|
|
s.Run("Should list access tokens of a user", func() {
|
|
printer.Clean()
|
|
|
|
command := cobra.Command{}
|
|
command.Flags().Int("page", 0, "")
|
|
command.Flags().Int("per-page", 2, "")
|
|
command.Flags().Bool("all", true, "")
|
|
command.Flags().Bool("active", false, "")
|
|
command.Flags().Bool("inactive", false, "")
|
|
|
|
mockUser := model.User{Id: "userId1", Email: "user1@example.com", Username: "user1"}
|
|
mockToken1 := model.UserAccessToken{IsActive: true, Id: "token-1-id", Description: "token-1-desc"}
|
|
mockToken2 := model.UserAccessToken{IsActive: false, Id: "token-2-id", Description: "token-2-desc"}
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUserByUsername(context.TODO(), mockUser.Id, "").
|
|
Return(nil, &model.Response{}, errors.New("no user found with the given username")).
|
|
Times(1)
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUser(context.TODO(), mockUser.Id, "").
|
|
Return(&mockUser, &model.Response{}, nil).
|
|
Times(1)
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUserAccessTokensForUser(context.TODO(), mockUser.Id, 0, 9999).
|
|
Return(
|
|
[]*model.UserAccessToken{&mockToken1, &mockToken2},
|
|
&model.Response{}, nil,
|
|
).Times(1)
|
|
|
|
err := listTokensOfAUserCmdF(s.client, &command, []string{mockUser.Id})
|
|
s.Require().Nil(err)
|
|
s.Require().Len(printer.GetLines(), 2)
|
|
s.Require().Equal(&mockToken1, printer.GetLines()[0])
|
|
s.Require().Equal(&mockToken2, printer.GetLines()[1])
|
|
})
|
|
|
|
s.Run("Should list only active user access tokens of a user", func() {
|
|
printer.Clean()
|
|
|
|
command := cobra.Command{}
|
|
command.Flags().Int("page", 0, "")
|
|
command.Flags().Int("per-page", 2, "")
|
|
command.Flags().Bool("all", false, "")
|
|
command.Flags().Bool("active", true, "")
|
|
command.Flags().Bool("inactive", false, "")
|
|
|
|
mockUser := model.User{Id: "userId1", Email: "user1@example.com", Username: "user1"}
|
|
mockToken1 := model.UserAccessToken{IsActive: true, Id: "token-1-id", Description: "token-1-desc"}
|
|
mockToken2 := model.UserAccessToken{IsActive: false, Id: "token-2-id", Description: "token-2-desc"}
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUserByEmail(context.TODO(), mockUser.Email, "").
|
|
Return(&mockUser, &model.Response{}, errors.New("no user found with the given email")).
|
|
Times(1)
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUserAccessTokensForUser(context.TODO(), mockUser.Id, 0, 2).
|
|
Return(
|
|
[]*model.UserAccessToken{&mockToken1, &mockToken2},
|
|
&model.Response{}, nil,
|
|
).Times(1)
|
|
|
|
err := listTokensOfAUserCmdF(s.client, &command, []string{mockUser.Email})
|
|
s.Require().Nil(err)
|
|
s.Require().Len(printer.GetLines(), 1)
|
|
s.Require().Equal(&mockToken1, printer.GetLines()[0])
|
|
})
|
|
|
|
s.Run("Should err on a absent user", func() {
|
|
printer.Clean()
|
|
|
|
userArg := "test-user"
|
|
command := cobra.Command{}
|
|
command.Flags().Int("page", 0, "")
|
|
command.Flags().Int("per-page", 2, "")
|
|
command.Flags().Bool("all", false, "")
|
|
command.Flags().Bool("active", false, "")
|
|
command.Flags().Bool("inactive", false, "")
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUserByUsername(context.TODO(), userArg, "").
|
|
Return(nil, &model.Response{}, errors.New("no user found with the given username")).
|
|
Times(1)
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUser(context.TODO(), userArg, "").
|
|
Return(nil, &model.Response{}, errors.New("no user found with the given user ID")).
|
|
Times(1)
|
|
|
|
err := listTokensOfAUserCmdF(s.client, &command, []string{userArg})
|
|
s.Require().NotNil(err)
|
|
s.Require().Contains(err.Error(), fmt.Sprintf("could not retrieve user information of %q", userArg))
|
|
})
|
|
|
|
s.Run("Should error if there are no user access tokens for a valid user", func() {
|
|
printer.Clean()
|
|
|
|
command := cobra.Command{}
|
|
command.Flags().Int("page", 0, "")
|
|
command.Flags().Int("per-page", 2, "")
|
|
command.Flags().Bool("all", false, "")
|
|
command.Flags().Bool("active", true, "")
|
|
command.Flags().Bool("inactive", false, "")
|
|
|
|
mockUser := model.User{Id: "userId1", Email: "user1@example.com", Username: "user1"}
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUserByEmail(context.TODO(), mockUser.Email, "").
|
|
Return(&mockUser, &model.Response{}, errors.New("no user found with the given email")).
|
|
Times(1)
|
|
|
|
s.client.
|
|
EXPECT().
|
|
GetUserAccessTokensForUser(context.TODO(), mockUser.Id, 0, 2).
|
|
Return(
|
|
[]*model.UserAccessToken{},
|
|
&model.Response{}, nil,
|
|
).Times(1)
|
|
|
|
err := listTokensOfAUserCmdF(s.client, &command, []string{mockUser.Email})
|
|
s.Require().NotNil(err)
|
|
s.Require().Equal(err.Error(), fmt.Sprintf("there are no tokens for the %q", mockUser.Email))
|
|
})
|
|
}
|
|
|
|
func (s *MmctlUnitTestSuite) TestRevokeTokenForAUserCmdF() {
|
|
s.Run("Should revoke user access tokens", func() {
|
|
printer.Clean()
|
|
|
|
mockToken1 := model.UserAccessToken{Id: "123456"}
|
|
mockToken2 := model.UserAccessToken{Id: "234567"}
|
|
|
|
s.client.
|
|
EXPECT().
|
|
RevokeUserAccessToken(context.TODO(), mockToken1.Id).
|
|
Return(&model.Response{StatusCode: http.StatusOK}, nil).
|
|
Times(1)
|
|
|
|
s.client.
|
|
EXPECT().
|
|
RevokeUserAccessToken(context.TODO(), mockToken2.Id).
|
|
Return(&model.Response{StatusCode: http.StatusOK}, nil).
|
|
Times(1)
|
|
|
|
err := revokeTokenForAUserCmdF(s.client, &cobra.Command{}, []string{mockToken1.Id, mockToken2.Id})
|
|
s.Require().Nil(err)
|
|
s.Require().Len(printer.GetLines(), 0)
|
|
})
|
|
|
|
s.Run("Should fail if can't revoke user access token", func() {
|
|
s.client.
|
|
EXPECT().
|
|
RevokeUserAccessToken(context.TODO(), "token-id").
|
|
Return(&model.Response{StatusCode: http.StatusBadRequest}, errors.New("some-error")).
|
|
Times(1)
|
|
|
|
err := revokeTokenForAUserCmdF(s.client, &cobra.Command{}, []string{"token-id"})
|
|
s.Require().NotNil(err)
|
|
s.Require().Contains(err.Error(), fmt.Sprintf("could not revoke token %q", "token-id"))
|
|
})
|
|
}
|