|
|
|
@@ -1,12 +1,13 @@
|
|
|
|
|
package test
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"fmt"
|
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
|
|
"blackforestbytes.com/simplecloudnotifier/api/apierr"
|
|
|
|
|
tt "blackforestbytes.com/simplecloudnotifier/test/util"
|
|
|
|
|
"fmt"
|
|
|
|
|
"github.com/gin-gonic/gin"
|
|
|
|
|
"gogs.mikescher.com/BlackForestBytes/goext/langext"
|
|
|
|
|
"testing"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
func TestGetChannelPreview(t *testing.T) {
|
|
|
|
@@ -148,7 +149,7 @@ func TestGetUserPreview(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestGetKeyTokenPreview(t *testing.T) {
|
|
|
|
|
func TestGetKeyTokenPreviewByID(t *testing.T) {
|
|
|
|
|
ws, baseUrl, stop := tt.StartSimpleWebserver(t)
|
|
|
|
|
defer stop()
|
|
|
|
|
|
|
|
|
@@ -248,3 +249,174 @@ func TestGetKeyTokenPreview(t *testing.T) {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestGetKeyTokenPreviewByToken(t *testing.T) {
|
|
|
|
|
ws, baseUrl, stop := tt.StartSimpleWebserver(t)
|
|
|
|
|
defer stop()
|
|
|
|
|
|
|
|
|
|
data := tt.InitDefaultData(t, ws)
|
|
|
|
|
|
|
|
|
|
type keyobj struct {
|
|
|
|
|
AllChannels bool `json:"all_channels"`
|
|
|
|
|
Channels []string `json:"channels"`
|
|
|
|
|
KeytokenId string `json:"keytoken_id"`
|
|
|
|
|
MessagesSent int `json:"messages_sent"`
|
|
|
|
|
Name string `json:"name"`
|
|
|
|
|
OwnerUserId string `json:"owner_user_id"`
|
|
|
|
|
Permissions string `json:"permissions"`
|
|
|
|
|
}
|
|
|
|
|
type keylist struct {
|
|
|
|
|
Keys []keyobj `json:"keys"`
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
klist := tt.RequestAuthGet[keylist](t, data.User[0].AdminKey, baseUrl, fmt.Sprintf("/api/v2/users/%s/keys", data.User[0].UID))
|
|
|
|
|
|
|
|
|
|
adminKeyObj := *langext.ArrFirstOrNil(klist.Keys, func(v keyobj) bool { return v.Permissions == "A" })
|
|
|
|
|
readKeyObj := *langext.ArrFirstOrNil(klist.Keys, func(v keyobj) bool { return v.Permissions == "UR;CR" })
|
|
|
|
|
sendKeyObj := *langext.ArrFirstOrNil(klist.Keys, func(v keyobj) bool { return v.Permissions == "CS" })
|
|
|
|
|
|
|
|
|
|
// Test with User[0]'s keys accessing their own key previews via token value
|
|
|
|
|
{
|
|
|
|
|
rqAdmin := tt.RequestAuthGet[gin.H](t, data.User[0].AdminKey, baseUrl, fmt.Sprintf("/api/v2/preview/keys/%s", data.User[0].AdminKey))
|
|
|
|
|
tt.AssertEqual(t, "keytoken_id", adminKeyObj.KeytokenId, rqAdmin["keytoken_id"])
|
|
|
|
|
tt.AssertEqual(t, "name", adminKeyObj.Name, rqAdmin["name"])
|
|
|
|
|
tt.AssertEqual(t, "owner_user_id", adminKeyObj.OwnerUserId, rqAdmin["owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "permissions", adminKeyObj.Permissions, rqAdmin["permissions"])
|
|
|
|
|
|
|
|
|
|
rqRead := tt.RequestAuthGet[gin.H](t, data.User[0].ReadKey, baseUrl, fmt.Sprintf("/api/v2/preview/keys/%s", data.User[0].ReadKey))
|
|
|
|
|
tt.AssertEqual(t, "keytoken_id", readKeyObj.KeytokenId, rqRead["keytoken_id"])
|
|
|
|
|
tt.AssertEqual(t, "name", readKeyObj.Name, rqRead["name"])
|
|
|
|
|
tt.AssertEqual(t, "owner_user_id", readKeyObj.OwnerUserId, rqRead["owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "permissions", readKeyObj.Permissions, rqRead["permissions"])
|
|
|
|
|
|
|
|
|
|
rqSend := tt.RequestAuthGet[gin.H](t, data.User[0].SendKey, baseUrl, fmt.Sprintf("/api/v2/preview/keys/%s", data.User[0].SendKey))
|
|
|
|
|
tt.AssertEqual(t, "keytoken_id", sendKeyObj.KeytokenId, rqSend["keytoken_id"])
|
|
|
|
|
tt.AssertEqual(t, "name", sendKeyObj.Name, rqSend["name"])
|
|
|
|
|
tt.AssertEqual(t, "owner_user_id", sendKeyObj.OwnerUserId, rqSend["owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "permissions", sendKeyObj.Permissions, rqSend["permissions"])
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Test with User[1]'s keys accessing User[0]'s key previews via token value (should work as preview is public)
|
|
|
|
|
{
|
|
|
|
|
rqAdmin := tt.RequestAuthGet[gin.H](t, data.User[1].AdminKey, baseUrl, fmt.Sprintf("/api/v2/preview/keys/%s", data.User[0].AdminKey))
|
|
|
|
|
tt.AssertEqual(t, "keytoken_id", adminKeyObj.KeytokenId, rqAdmin["keytoken_id"])
|
|
|
|
|
tt.AssertEqual(t, "name", adminKeyObj.Name, rqAdmin["name"])
|
|
|
|
|
tt.AssertEqual(t, "owner_user_id", adminKeyObj.OwnerUserId, rqAdmin["owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "permissions", adminKeyObj.Permissions, rqAdmin["permissions"])
|
|
|
|
|
|
|
|
|
|
rqRead := tt.RequestAuthGet[gin.H](t, data.User[1].ReadKey, baseUrl, fmt.Sprintf("/api/v2/preview/keys/%s", data.User[0].ReadKey))
|
|
|
|
|
tt.AssertEqual(t, "keytoken_id", readKeyObj.KeytokenId, rqRead["keytoken_id"])
|
|
|
|
|
tt.AssertEqual(t, "name", readKeyObj.Name, rqRead["name"])
|
|
|
|
|
tt.AssertEqual(t, "owner_user_id", readKeyObj.OwnerUserId, rqRead["owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "permissions", readKeyObj.Permissions, rqRead["permissions"])
|
|
|
|
|
|
|
|
|
|
rqSend := tt.RequestAuthGet[gin.H](t, data.User[1].SendKey, baseUrl, fmt.Sprintf("/api/v2/preview/keys/%s", data.User[0].SendKey))
|
|
|
|
|
tt.AssertEqual(t, "keytoken_id", sendKeyObj.KeytokenId, rqSend["keytoken_id"])
|
|
|
|
|
tt.AssertEqual(t, "name", sendKeyObj.Name, rqSend["name"])
|
|
|
|
|
tt.AssertEqual(t, "owner_user_id", sendKeyObj.OwnerUserId, rqSend["owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "permissions", sendKeyObj.Permissions, rqSend["permissions"])
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Test with User[1]'s keys accessing User[0]'s key previews via token value (should work as preview is public)
|
|
|
|
|
{
|
|
|
|
|
rqAdmin := tt.RequestAuthGet[gin.H](t, data.User[1].AdminKey, baseUrl, fmt.Sprintf("/api/v2/preview/keys/%s", data.User[0].AdminKey))
|
|
|
|
|
tt.AssertEqual(t, "keytoken_id", adminKeyObj.KeytokenId, rqAdmin["keytoken_id"])
|
|
|
|
|
tt.AssertEqual(t, "name", adminKeyObj.Name, rqAdmin["name"])
|
|
|
|
|
tt.AssertEqual(t, "owner_user_id", adminKeyObj.OwnerUserId, rqAdmin["owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "permissions", adminKeyObj.Permissions, rqAdmin["permissions"])
|
|
|
|
|
|
|
|
|
|
rqRead := tt.RequestAuthGet[gin.H](t, data.User[1].ReadKey, baseUrl, fmt.Sprintf("/api/v2/preview/keys/%s", data.User[0].ReadKey))
|
|
|
|
|
tt.AssertEqual(t, "keytoken_id", readKeyObj.KeytokenId, rqRead["keytoken_id"])
|
|
|
|
|
tt.AssertEqual(t, "name", readKeyObj.Name, rqRead["name"])
|
|
|
|
|
tt.AssertEqual(t, "owner_user_id", readKeyObj.OwnerUserId, rqRead["owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "permissions", readKeyObj.Permissions, rqRead["permissions"])
|
|
|
|
|
|
|
|
|
|
rqSend := tt.RequestAuthGet[gin.H](t, data.User[1].SendKey, baseUrl, fmt.Sprintf("/api/v2/preview/keys/%s", data.User[0].SendKey))
|
|
|
|
|
tt.AssertEqual(t, "keytoken_id", sendKeyObj.KeytokenId, rqSend["keytoken_id"])
|
|
|
|
|
tt.AssertEqual(t, "name", sendKeyObj.Name, rqSend["name"])
|
|
|
|
|
tt.AssertEqual(t, "owner_user_id", sendKeyObj.OwnerUserId, rqSend["owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "permissions", sendKeyObj.Permissions, rqSend["permissions"])
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Test with invalid token
|
|
|
|
|
{
|
|
|
|
|
tt.RequestAuthGetShouldFail(t, data.User[0].AdminKey, baseUrl, fmt.Sprintf("/api/v2/preview/keys/%s", "invalid-token-string"), 404, apierr.KEY_NOT_FOUND)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Test without auth
|
|
|
|
|
{
|
|
|
|
|
tt.RequestGetShouldFail(t, baseUrl, fmt.Sprintf("/api/v2/preview/keys/%s", data.User[0].SendKey), 401, apierr.USER_AUTH_FAILED)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestGetChannelPreviewSubscriptionNone(t *testing.T) {
|
|
|
|
|
ws, baseUrl, stop := tt.StartSimpleWebserver(t)
|
|
|
|
|
defer stop()
|
|
|
|
|
|
|
|
|
|
data := tt.InitDefaultData(t, ws)
|
|
|
|
|
|
|
|
|
|
// User[1] (who is not subscribed) requests preview of User[0]'s channel
|
|
|
|
|
preview := tt.RequestAuthGet[gin.H](t, data.User[1].ReadKey, baseUrl, fmt.Sprintf("/api/v2/preview/channels/%s", data.User[0].Channels[0].ChannelID))
|
|
|
|
|
|
|
|
|
|
// Assert User[1] sees no subscription
|
|
|
|
|
tt.AssertNil(t, "subscription", preview["subscription"])
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestGetChannelPreviewSubscriptionUnconfirmed(t *testing.T) {
|
|
|
|
|
ws, baseUrl, stop := tt.StartSimpleWebserver(t)
|
|
|
|
|
defer stop()
|
|
|
|
|
|
|
|
|
|
data := tt.InitDefaultData(t, ws)
|
|
|
|
|
|
|
|
|
|
chanReq := *langext.ArrFirstOrNil(data.User[15].Channels, func(v tt.ChanData) bool { return v.InternalName == "chan_other_request" })
|
|
|
|
|
|
|
|
|
|
preview := tt.RequestAuthGet[gin.H](t, data.User[14].ReadKey, baseUrl, fmt.Sprintf("/api/v2/preview/channels/%s", chanReq.ChannelID))
|
|
|
|
|
|
|
|
|
|
// Assert User[14] sees their unconfirmed subscription
|
|
|
|
|
tt.AssertNotNil(t, "subscription", preview["subscription"])
|
|
|
|
|
subscription, ok := preview["subscription"].(map[string]any)
|
|
|
|
|
tt.AssertTrue(t, "subscription is map", ok)
|
|
|
|
|
tt.AssertEqual(t, "subscription.user_id", data.User[14].UID, subscription["subscriber_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "subscription.user_id", data.User[15].UID, subscription["channel_owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "subscription.channel_id", chanReq.ChannelID, subscription["channel_id"])
|
|
|
|
|
tt.AssertEqual(t, "subscription.confirmed", false, subscription["confirmed"])
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestGetChannelPreviewSubscriptionOwnSubscription(t *testing.T) {
|
|
|
|
|
ws, baseUrl, stop := tt.StartSimpleWebserver(t)
|
|
|
|
|
defer stop()
|
|
|
|
|
|
|
|
|
|
data := tt.InitDefaultData(t, ws)
|
|
|
|
|
|
|
|
|
|
preview := tt.RequestAuthGet[gin.H](t, data.User[4].ReadKey, baseUrl, fmt.Sprintf("/api/v2/preview/channels/%s", data.User[4].Channels[0].ChannelID))
|
|
|
|
|
|
|
|
|
|
// Assert User[4] sees their own subscription
|
|
|
|
|
tt.AssertNotNil(t, "subscription", preview["subscription"])
|
|
|
|
|
subscription, ok := preview["subscription"].(map[string]any)
|
|
|
|
|
tt.AssertTrue(t, "subscription is map", ok)
|
|
|
|
|
tt.AssertEqual(t, "subscription.user_id", data.User[4].UID, subscription["subscriber_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "subscription.user_id", data.User[4].UID, subscription["channel_owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "subscription.channel_id", data.User[4].Channels[0].ChannelID, subscription["channel_id"])
|
|
|
|
|
tt.AssertEqual(t, "subscription.confirmed", true, subscription["confirmed"])
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestGetChannelPreviewSubscriptionForeignSubscription(t *testing.T) {
|
|
|
|
|
ws, baseUrl, stop := tt.StartSimpleWebserver(t)
|
|
|
|
|
defer stop()
|
|
|
|
|
|
|
|
|
|
data := tt.InitDefaultData(t, ws)
|
|
|
|
|
|
|
|
|
|
chanReq := *langext.ArrFirstOrNil(data.User[15].Channels, func(v tt.ChanData) bool { return v.InternalName == "chan_other_accepted" })
|
|
|
|
|
|
|
|
|
|
preview := tt.RequestAuthGet[gin.H](t, data.User[14].ReadKey, baseUrl, fmt.Sprintf("/api/v2/preview/channels/%s", chanReq.ChannelID))
|
|
|
|
|
|
|
|
|
|
// Assert User[14] sees their confirmed subscription
|
|
|
|
|
tt.AssertNotNil(t, "subscription", preview["subscription"])
|
|
|
|
|
subscription, ok := preview["subscription"].(map[string]any)
|
|
|
|
|
tt.AssertTrue(t, "subscription is map", ok)
|
|
|
|
|
tt.AssertEqual(t, "subscription.user_id", data.User[14].UID, subscription["subscriber_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "subscription.user_id", data.User[15].UID, subscription["channel_owner_user_id"])
|
|
|
|
|
tt.AssertEqual(t, "subscription.channel_id", chanReq.ChannelID, subscription["channel_id"])
|
|
|
|
|
tt.AssertEqual(t, "subscription.confirmed", true, subscription["confirmed"])
|
|
|
|
|
}
|
|
|
|
|