Tests[**Subscription**]
This commit is contained in:
@@ -29,7 +29,7 @@ func TestTokenKeys(t *testing.T) {
|
||||
}
|
||||
|
||||
{
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID))
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID))
|
||||
tt.AssertEqual(t, "len(keys)", 3, len(klist.Keys))
|
||||
|
||||
tt.AssertArrAny(t, "keys->any[Admin]", klist.Keys, func(s keyobj) bool {
|
||||
@@ -43,7 +43,7 @@ func TestTokenKeys(t *testing.T) {
|
||||
})
|
||||
}
|
||||
|
||||
key2 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID), gin.H{
|
||||
key2 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID), gin.H{
|
||||
"all_channels": true,
|
||||
"channels": []string{},
|
||||
"name": "Admin2",
|
||||
@@ -55,33 +55,33 @@ func TestTokenKeys(t *testing.T) {
|
||||
tt.AssertEqual(t, "AllChannels", true, key2.AllChannels)
|
||||
|
||||
{
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID))
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID))
|
||||
tt.AssertEqual(t, "len(keys)", 4, len(klist.Keys))
|
||||
}
|
||||
|
||||
key3 := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, key2.KeytokenId))
|
||||
key3 := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, key2.KeytokenId))
|
||||
|
||||
tt.AssertEqual(t, "KeytokenId", key2.KeytokenId, key3.KeytokenId)
|
||||
tt.AssertEqual(t, "UserID", data.UserID, key3.OwnerUserId)
|
||||
tt.AssertEqual(t, "UserID", data.UID, key3.OwnerUserId)
|
||||
tt.AssertEqual(t, "Name", "Admin2", key3.Name)
|
||||
tt.AssertEqual(t, "Permissions", "A", key3.Permissions)
|
||||
tt.AssertEqual(t, "AllChannels", true, key3.AllChannels)
|
||||
|
||||
tt.RequestAuthDelete[tt.Void](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, key2.KeytokenId), gin.H{})
|
||||
tt.RequestAuthDelete[tt.Void](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, key2.KeytokenId), gin.H{})
|
||||
|
||||
tt.RequestAuthGetShouldFail(t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, key2.KeytokenId), 404, apierr.KEY_NOT_FOUND)
|
||||
tt.RequestAuthGetShouldFail(t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, key2.KeytokenId), 404, apierr.KEY_NOT_FOUND)
|
||||
|
||||
{
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID))
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID))
|
||||
tt.AssertEqual(t, "len(keys)", 3, len(klist.Keys))
|
||||
}
|
||||
|
||||
chan0 := tt.RequestAuthPost[gin.H](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/channels", data.UserID), gin.H{
|
||||
chan0 := tt.RequestAuthPost[gin.H](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/channels", data.UID), gin.H{
|
||||
"name": "testchan1",
|
||||
})
|
||||
chanid := fmt.Sprintf("%v", chan0["channel_id"])
|
||||
|
||||
key4 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID), gin.H{
|
||||
key4 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID), gin.H{
|
||||
"all_channels": false,
|
||||
"channels": []string{chanid},
|
||||
"name": "TKey1",
|
||||
@@ -92,7 +92,7 @@ func TestTokenKeys(t *testing.T) {
|
||||
tt.AssertEqual(t, "AllChannels", false, key4.AllChannels)
|
||||
tt.AssertStrRepEqual(t, "Channels", []string{chanid}, key4.Channels)
|
||||
|
||||
key5 := tt.RequestAuthPatch[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, key4.KeytokenId), gin.H{
|
||||
key5 := tt.RequestAuthPatch[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, key4.KeytokenId), gin.H{
|
||||
"all_channels": true,
|
||||
"channels": []string{},
|
||||
"name": "TKey2-A",
|
||||
@@ -103,13 +103,13 @@ func TestTokenKeys(t *testing.T) {
|
||||
tt.AssertEqual(t, "AllChannels", true, key5.AllChannels)
|
||||
tt.AssertStrRepEqual(t, "Channels", []string{}, key5.Channels)
|
||||
|
||||
key6 := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, key5.KeytokenId))
|
||||
key6 := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, key5.KeytokenId))
|
||||
tt.AssertEqual(t, "Name", "TKey2-A", key6.Name)
|
||||
tt.AssertEqual(t, "Permissions", "A", key6.Permissions)
|
||||
tt.AssertEqual(t, "AllChannels", true, key6.AllChannels)
|
||||
tt.AssertStrRepEqual(t, "Channels", []string{}, key6.Channels)
|
||||
|
||||
key7 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID), gin.H{
|
||||
key7 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID), gin.H{
|
||||
"all_channels": false,
|
||||
"channels": []string{chanid},
|
||||
"name": "TKey7",
|
||||
@@ -117,13 +117,13 @@ func TestTokenKeys(t *testing.T) {
|
||||
})
|
||||
|
||||
{
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID))
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID))
|
||||
tt.AssertEqual(t, "len(keys)", 5, len(klist.Keys))
|
||||
}
|
||||
|
||||
msg1s := tt.RequestPost[gin.H](t, baseUrl, "/", gin.H{
|
||||
"key": key7.Token,
|
||||
"user_id": data.UserID,
|
||||
"user_id": data.UID,
|
||||
"channel": "testchan1",
|
||||
"title": "HelloWorld_001",
|
||||
})
|
||||
@@ -134,22 +134,22 @@ func TestTokenKeys(t *testing.T) {
|
||||
|
||||
tt.RequestPostShouldFail(t, baseUrl, "/", gin.H{
|
||||
"key": key7.Token,
|
||||
"user_id": data.UserID,
|
||||
"user_id": data.UID,
|
||||
"channel": "testchan2",
|
||||
"title": "HelloWorld_001",
|
||||
}, 401, apierr.USER_AUTH_FAILED) // wrong channel
|
||||
|
||||
tt.RequestPostShouldFail(t, baseUrl, "/", gin.H{
|
||||
"key": key7.Token,
|
||||
"user_id": data.UserID,
|
||||
"user_id": data.UID,
|
||||
"title": "HelloWorld_001",
|
||||
}, 401, apierr.USER_AUTH_FAILED) // no channel (=main)
|
||||
|
||||
tt.RequestAuthGetShouldFail(t, key7.Token, baseUrl, fmt.Sprintf("/api/v2/users/%s", data.UserID), 401, apierr.USER_AUTH_FAILED) // no user read perm
|
||||
tt.RequestAuthGetShouldFail(t, key7.Token, baseUrl, fmt.Sprintf("/api/v2/users/%s", data.UID), 401, apierr.USER_AUTH_FAILED) // no user read perm
|
||||
|
||||
tt.RequestAuthPatchShouldFail(t, key7.Token, baseUrl, "/api/v2/users/"+data.UserID, gin.H{"username": "my_user_001"}, 401, apierr.USER_AUTH_FAILED) // no user update perm
|
||||
tt.RequestAuthPatchShouldFail(t, key7.Token, baseUrl, "/api/v2/users/"+data.UID, gin.H{"username": "my_user_001"}, 401, apierr.USER_AUTH_FAILED) // no user update perm
|
||||
|
||||
key8 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID), gin.H{
|
||||
key8 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID), gin.H{
|
||||
"all_channels": true,
|
||||
"channels": []string{},
|
||||
"name": "TKey7",
|
||||
@@ -158,7 +158,7 @@ func TestTokenKeys(t *testing.T) {
|
||||
|
||||
tt.RequestPostShouldFail(t, baseUrl, "/", gin.H{
|
||||
"key": key8.Token,
|
||||
"user_id": data.UserID,
|
||||
"user_id": data.UID,
|
||||
"title": "HelloWorld_001",
|
||||
}, 401, apierr.USER_AUTH_FAILED) // no send perm
|
||||
|
||||
@@ -184,7 +184,7 @@ func TestTokenKeysInitial(t *testing.T) {
|
||||
Keys []keyobj `json:"keys"`
|
||||
}
|
||||
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID))
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID))
|
||||
tt.AssertEqual(t, "len(keys)", 3, len(klist.Keys))
|
||||
|
||||
tt.AssertArrAny(t, "keys->any[Admin]", klist.Keys, func(s keyobj) bool {
|
||||
@@ -218,7 +218,7 @@ func TestTokenKeysCreate(t *testing.T) {
|
||||
Keys []keyobj `json:"keys"`
|
||||
}
|
||||
|
||||
key2 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID), gin.H{
|
||||
key2 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID), gin.H{
|
||||
"all_channels": true,
|
||||
"channels": []string{},
|
||||
"name": "Admin2",
|
||||
@@ -230,14 +230,14 @@ func TestTokenKeysCreate(t *testing.T) {
|
||||
tt.AssertEqual(t, "AllChannels", true, key2.AllChannels)
|
||||
|
||||
{
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID))
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID))
|
||||
tt.AssertEqual(t, "len(keys)", 4, len(klist.Keys))
|
||||
}
|
||||
|
||||
key3 := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, key2.KeytokenId))
|
||||
key3 := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, key2.KeytokenId))
|
||||
|
||||
tt.AssertEqual(t, "KeytokenId", key2.KeytokenId, key3.KeytokenId)
|
||||
tt.AssertEqual(t, "UserID", data.UserID, key3.OwnerUserId)
|
||||
tt.AssertEqual(t, "UserID", data.UID, key3.OwnerUserId)
|
||||
tt.AssertEqual(t, "Name", "Admin2", key3.Name)
|
||||
tt.AssertEqual(t, "Permissions", "A", key3.Permissions)
|
||||
tt.AssertEqual(t, "AllChannels", true, key3.AllChannels)
|
||||
@@ -264,7 +264,7 @@ func TestTokenKeysUpdate(t *testing.T) {
|
||||
Keys []keyobj `json:"keys"`
|
||||
}
|
||||
|
||||
key2 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID), gin.H{
|
||||
key2 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID), gin.H{
|
||||
"all_channels": true,
|
||||
"channels": []string{},
|
||||
"name": "Admin2",
|
||||
@@ -275,15 +275,15 @@ func TestTokenKeysUpdate(t *testing.T) {
|
||||
tt.AssertEqual(t, "Permissions", "A", key2.Permissions)
|
||||
tt.AssertEqual(t, "AllChannels", true, key2.AllChannels)
|
||||
|
||||
key3 := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, key2.KeytokenId))
|
||||
key3 := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, key2.KeytokenId))
|
||||
|
||||
tt.AssertEqual(t, "KeytokenId", key2.KeytokenId, key3.KeytokenId)
|
||||
tt.AssertEqual(t, "UserID", data.UserID, key3.OwnerUserId)
|
||||
tt.AssertEqual(t, "UserID", data.UID, key3.OwnerUserId)
|
||||
tt.AssertEqual(t, "Name", "Admin2", key3.Name)
|
||||
tt.AssertEqual(t, "Permissions", "A", key3.Permissions)
|
||||
tt.AssertEqual(t, "AllChannels", true, key3.AllChannels)
|
||||
|
||||
key5 := tt.RequestAuthPatch[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, key3.KeytokenId), gin.H{
|
||||
key5 := tt.RequestAuthPatch[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, key3.KeytokenId), gin.H{
|
||||
"name": "Hello",
|
||||
})
|
||||
tt.AssertEqual(t, "Name", "Hello", key5.Name)
|
||||
@@ -291,7 +291,7 @@ func TestTokenKeysUpdate(t *testing.T) {
|
||||
tt.AssertEqual(t, "AllChannels", true, key5.AllChannels)
|
||||
tt.AssertStrRepEqual(t, "Channels", []string{}, key5.Channels)
|
||||
|
||||
key6 := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, key5.KeytokenId))
|
||||
key6 := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, key5.KeytokenId))
|
||||
tt.AssertEqual(t, "Name", "Hello", key6.Name)
|
||||
tt.AssertEqual(t, "Permissions", "A", key6.Permissions)
|
||||
tt.AssertEqual(t, "AllChannels", true, key6.AllChannels)
|
||||
@@ -319,7 +319,7 @@ func TestTokenKeysDelete(t *testing.T) {
|
||||
Keys []keyobj `json:"keys"`
|
||||
}
|
||||
|
||||
key2 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID), gin.H{
|
||||
key2 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID), gin.H{
|
||||
"all_channels": true,
|
||||
"channels": []string{},
|
||||
"name": "Admin2",
|
||||
@@ -331,14 +331,14 @@ func TestTokenKeysDelete(t *testing.T) {
|
||||
tt.AssertEqual(t, "AllChannels", true, key2.AllChannels)
|
||||
|
||||
{
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID))
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID))
|
||||
tt.AssertEqual(t, "len(keys)", 4, len(klist.Keys))
|
||||
}
|
||||
|
||||
tt.RequestAuthDelete[tt.Void](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, key2.KeytokenId), gin.H{})
|
||||
tt.RequestAuthDelete[tt.Void](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, key2.KeytokenId), gin.H{})
|
||||
|
||||
{
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID))
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID))
|
||||
tt.AssertEqual(t, "len(keys)", 3, len(klist.Keys))
|
||||
}
|
||||
|
||||
@@ -364,7 +364,7 @@ func TestTokenKeysDeleteSelf(t *testing.T) {
|
||||
Keys []keyobj `json:"keys"`
|
||||
}
|
||||
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID))
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID))
|
||||
|
||||
ak := ""
|
||||
for _, v := range klist.Keys {
|
||||
@@ -373,7 +373,7 @@ func TestTokenKeysDeleteSelf(t *testing.T) {
|
||||
}
|
||||
}
|
||||
|
||||
tt.RequestAuthDeleteShouldFail(t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, ak), gin.H{}, 400, apierr.CANNOT_SELFDELETE_KEY)
|
||||
tt.RequestAuthDeleteShouldFail(t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, ak), gin.H{}, 400, apierr.CANNOT_SELFDELETE_KEY)
|
||||
}
|
||||
|
||||
func TestTokenKeysDowngradeSelf(t *testing.T) {
|
||||
@@ -396,7 +396,7 @@ func TestTokenKeysDowngradeSelf(t *testing.T) {
|
||||
Keys []keyobj `json:"keys"`
|
||||
}
|
||||
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID))
|
||||
klist := tt.RequestAuthGet[keylist](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID))
|
||||
|
||||
ak := ""
|
||||
for _, v := range klist.Keys {
|
||||
@@ -405,25 +405,25 @@ func TestTokenKeysDowngradeSelf(t *testing.T) {
|
||||
}
|
||||
}
|
||||
|
||||
tt.RequestAuthPatchShouldFail(t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, ak), gin.H{
|
||||
tt.RequestAuthPatchShouldFail(t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, ak), gin.H{
|
||||
"permissions": "CR",
|
||||
}, 400, apierr.CANNOT_SELFUPDATE_KEY)
|
||||
|
||||
tt.RequestAuthPatchShouldFail(t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, ak), gin.H{
|
||||
tt.RequestAuthPatchShouldFail(t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, ak), gin.H{
|
||||
"all_channels": false,
|
||||
}, 400, apierr.CANNOT_SELFUPDATE_KEY)
|
||||
|
||||
tt.RequestAuthPatchShouldFail(t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, ak), gin.H{
|
||||
tt.RequestAuthPatchShouldFail(t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, ak), gin.H{
|
||||
"channels": []string{"main"},
|
||||
}, 400, apierr.CANNOT_SELFUPDATE_KEY)
|
||||
|
||||
tt.RequestAuthPatch[tt.Void](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, ak), gin.H{
|
||||
tt.RequestAuthPatch[tt.Void](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, ak), gin.H{
|
||||
"name": "This-is-allowed",
|
||||
})
|
||||
|
||||
keyOut := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UserID, ak))
|
||||
keyOut := tt.RequestAuthGet[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys/%s", data.UID, ak))
|
||||
|
||||
tt.AssertEqual(t, "UserID", data.UserID, keyOut.OwnerUserId)
|
||||
tt.AssertEqual(t, "UserID", data.UID, keyOut.OwnerUserId)
|
||||
tt.AssertEqual(t, "Name", "This-is-allowed", keyOut.Name)
|
||||
tt.AssertEqual(t, "Permissions", "A", keyOut.Permissions)
|
||||
tt.AssertEqual(t, "AllChannels", true, keyOut.AllChannels)
|
||||
@@ -448,12 +448,12 @@ func TestTokenKeysPermissions(t *testing.T) {
|
||||
Token string `json:"token"` // only in create
|
||||
}
|
||||
|
||||
chan0 := tt.RequestAuthPost[gin.H](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/channels", data.UserID), gin.H{
|
||||
chan0 := tt.RequestAuthPost[gin.H](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/channels", data.UID), gin.H{
|
||||
"name": "testchan1",
|
||||
})
|
||||
chanid := fmt.Sprintf("%v", chan0["channel_id"])
|
||||
|
||||
key7 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID), gin.H{
|
||||
key7 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID), gin.H{
|
||||
"all_channels": false,
|
||||
"channels": []string{chanid},
|
||||
"name": "TKey7",
|
||||
@@ -462,22 +462,22 @@ func TestTokenKeysPermissions(t *testing.T) {
|
||||
|
||||
tt.RequestPostShouldFail(t, baseUrl, "/", gin.H{
|
||||
"key": key7.Token,
|
||||
"user_id": data.UserID,
|
||||
"user_id": data.UID,
|
||||
"channel": "testchan2",
|
||||
"title": "HelloWorld_001",
|
||||
}, 401, apierr.USER_AUTH_FAILED) // wrong channel
|
||||
|
||||
tt.RequestPostShouldFail(t, baseUrl, "/", gin.H{
|
||||
"key": key7.Token,
|
||||
"user_id": data.UserID,
|
||||
"user_id": data.UID,
|
||||
"title": "HelloWorld_001",
|
||||
}, 401, apierr.USER_AUTH_FAILED) // no channel (=main)
|
||||
|
||||
tt.RequestAuthGetShouldFail(t, key7.Token, baseUrl, fmt.Sprintf("/api/v2/users/%s", data.UserID), 401, apierr.USER_AUTH_FAILED) // no user read perm
|
||||
tt.RequestAuthGetShouldFail(t, key7.Token, baseUrl, fmt.Sprintf("/api/v2/users/%s", data.UID), 401, apierr.USER_AUTH_FAILED) // no user read perm
|
||||
|
||||
tt.RequestAuthPatchShouldFail(t, key7.Token, baseUrl, "/api/v2/users/"+data.UserID, gin.H{"username": "my_user_001"}, 401, apierr.USER_AUTH_FAILED) // no user update perm
|
||||
tt.RequestAuthPatchShouldFail(t, key7.Token, baseUrl, "/api/v2/users/"+data.UID, gin.H{"username": "my_user_001"}, 401, apierr.USER_AUTH_FAILED) // no user update perm
|
||||
|
||||
key8 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UserID), gin.H{
|
||||
key8 := tt.RequestAuthPost[keyobj](t, data.AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.UID), gin.H{
|
||||
"all_channels": true,
|
||||
"channels": []string{},
|
||||
"name": "TKey7",
|
||||
@@ -486,7 +486,7 @@ func TestTokenKeysPermissions(t *testing.T) {
|
||||
|
||||
tt.RequestPostShouldFail(t, baseUrl, "/", gin.H{
|
||||
"key": key8.Token,
|
||||
"user_id": data.UserID,
|
||||
"user_id": data.UID,
|
||||
"title": "HelloWorld_001",
|
||||
}, 401, apierr.USER_AUTH_FAILED) // no send perm
|
||||
|
||||
|
||||
Reference in New Issue
Block a user