2022-12-29 16:09:45 +00:00
|
|
|
package user
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
import (
|
2022-12-29 18:08:47 +00:00
|
|
|
"database/sql"
|
2022-01-26 02:57:28 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2023-01-25 15:05:54 +00:00
|
|
|
"heckel.io/ntfy/util"
|
2022-01-26 02:57:28 +00:00
|
|
|
"path/filepath"
|
|
|
|
"strings"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
2022-02-08 03:09:31 +00:00
|
|
|
const minBcryptTimingMillis = int64(50) // Ideally should be >100ms, but this should also run on a Raspberry Pi without massive resources
|
|
|
|
|
2022-12-28 18:46:18 +00:00
|
|
|
func TestManager_FullScenario_Default_DenyAll(t *testing.T) {
|
2023-01-03 02:12:42 +00:00
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("phil", "phil", RoleAdmin))
|
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2023-01-21 03:47:37 +00:00
|
|
|
require.Nil(t, a.AllowAccess("ben", "mytopic", PermissionReadWrite))
|
|
|
|
require.Nil(t, a.AllowAccess("ben", "readme", PermissionRead))
|
|
|
|
require.Nil(t, a.AllowAccess("ben", "writeme", PermissionWrite))
|
|
|
|
require.Nil(t, a.AllowAccess("ben", "everyonewrite", PermissionDenyAll)) // How unfair!
|
|
|
|
require.Nil(t, a.AllowAccess(Everyone, "announcements", PermissionRead))
|
|
|
|
require.Nil(t, a.AllowAccess(Everyone, "everyonewrite", PermissionReadWrite))
|
|
|
|
require.Nil(t, a.AllowAccess(Everyone, "up*", PermissionWrite)) // Everyone can write to /up*
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
phil, err := a.Authenticate("phil", "phil")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "phil", phil.Name)
|
2022-02-08 03:09:31 +00:00
|
|
|
require.True(t, strings.HasPrefix(phil.Hash, "$2a$10$"))
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, RoleAdmin, phil.Role)
|
2023-01-03 02:12:42 +00:00
|
|
|
|
|
|
|
philGrants, err := a.Grants("phil")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, []Grant{}, philGrants)
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
ben, err := a.Authenticate("ben", "ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "ben", ben.Name)
|
2022-02-08 03:09:31 +00:00
|
|
|
require.True(t, strings.HasPrefix(ben.Hash, "$2a$10$"))
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, RoleUser, ben.Role)
|
2023-01-03 02:12:42 +00:00
|
|
|
|
|
|
|
benGrants, err := a.Grants("ben")
|
|
|
|
require.Nil(t, err)
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, []Grant{
|
2023-01-03 02:12:42 +00:00
|
|
|
{"mytopic", PermissionReadWrite},
|
|
|
|
{"writeme", PermissionWrite},
|
|
|
|
{"readme", PermissionRead},
|
|
|
|
{"everyonewrite", PermissionDenyAll},
|
|
|
|
}, benGrants)
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
notben, err := a.Authenticate("ben", "this is wrong")
|
|
|
|
require.Nil(t, notben)
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
// Admin can do everything
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Nil(t, a.Authorize(phil, "sometopic", PermissionWrite))
|
|
|
|
require.Nil(t, a.Authorize(phil, "mytopic", PermissionRead))
|
|
|
|
require.Nil(t, a.Authorize(phil, "readme", PermissionWrite))
|
|
|
|
require.Nil(t, a.Authorize(phil, "writeme", PermissionWrite))
|
|
|
|
require.Nil(t, a.Authorize(phil, "announcements", PermissionWrite))
|
|
|
|
require.Nil(t, a.Authorize(phil, "everyonewrite", PermissionWrite))
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
// User cannot do everything
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Nil(t, a.Authorize(ben, "mytopic", PermissionWrite))
|
|
|
|
require.Nil(t, a.Authorize(ben, "mytopic", PermissionRead))
|
|
|
|
require.Nil(t, a.Authorize(ben, "readme", PermissionRead))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(ben, "readme", PermissionWrite))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(ben, "writeme", PermissionRead))
|
|
|
|
require.Nil(t, a.Authorize(ben, "writeme", PermissionWrite))
|
|
|
|
require.Nil(t, a.Authorize(ben, "writeme", PermissionWrite))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(ben, "everyonewrite", PermissionRead))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(ben, "everyonewrite", PermissionWrite))
|
|
|
|
require.Nil(t, a.Authorize(ben, "announcements", PermissionRead))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(ben, "announcements", PermissionWrite))
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
// Everyone else can do barely anything
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(nil, "sometopicnotinthelist", PermissionRead))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(nil, "sometopicnotinthelist", PermissionWrite))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(nil, "mytopic", PermissionRead))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(nil, "mytopic", PermissionWrite))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(nil, "readme", PermissionRead))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(nil, "readme", PermissionWrite))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(nil, "writeme", PermissionRead))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(nil, "writeme", PermissionWrite))
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(nil, "announcements", PermissionWrite))
|
|
|
|
require.Nil(t, a.Authorize(nil, "announcements", PermissionRead))
|
|
|
|
require.Nil(t, a.Authorize(nil, "everyonewrite", PermissionRead))
|
|
|
|
require.Nil(t, a.Authorize(nil, "everyonewrite", PermissionWrite))
|
|
|
|
require.Nil(t, a.Authorize(nil, "up1234", PermissionWrite)) // Wildcard permission
|
|
|
|
require.Nil(t, a.Authorize(nil, "up5678", PermissionWrite))
|
2022-01-26 02:57:28 +00:00
|
|
|
}
|
|
|
|
|
2022-12-28 18:46:18 +00:00
|
|
|
func TestManager_AddUser_Invalid(t *testing.T) {
|
2023-01-03 02:12:42 +00:00
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Equal(t, ErrInvalidArgument, a.AddUser(" invalid ", "pass", RoleAdmin))
|
|
|
|
require.Equal(t, ErrInvalidArgument, a.AddUser("validuser", "pass", "invalid-role"))
|
2022-01-26 02:57:28 +00:00
|
|
|
}
|
|
|
|
|
2022-12-28 18:46:18 +00:00
|
|
|
func TestManager_AddUser_Timing(t *testing.T) {
|
2023-01-03 02:12:42 +00:00
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2022-01-26 02:57:28 +00:00
|
|
|
start := time.Now().UnixMilli()
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("user", "pass", RoleAdmin))
|
2022-02-08 03:09:31 +00:00
|
|
|
require.GreaterOrEqual(t, time.Now().UnixMilli()-start, minBcryptTimingMillis)
|
2022-01-26 02:57:28 +00:00
|
|
|
}
|
|
|
|
|
2022-12-28 18:46:18 +00:00
|
|
|
func TestManager_Authenticate_Timing(t *testing.T) {
|
2023-01-03 02:12:42 +00:00
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("user", "pass", RoleAdmin))
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
// Timing a correct attempt
|
|
|
|
start := time.Now().UnixMilli()
|
|
|
|
_, err := a.Authenticate("user", "pass")
|
|
|
|
require.Nil(t, err)
|
2022-02-08 03:09:31 +00:00
|
|
|
require.GreaterOrEqual(t, time.Now().UnixMilli()-start, minBcryptTimingMillis)
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
// Timing an incorrect attempt
|
|
|
|
start = time.Now().UnixMilli()
|
|
|
|
_, err = a.Authenticate("user", "INCORRECT")
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
2022-02-08 03:09:31 +00:00
|
|
|
require.GreaterOrEqual(t, time.Now().UnixMilli()-start, minBcryptTimingMillis)
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
// Timing a non-existing user attempt
|
|
|
|
start = time.Now().UnixMilli()
|
|
|
|
_, err = a.Authenticate("DOES-NOT-EXIST", "hithere")
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
2022-02-08 03:09:31 +00:00
|
|
|
require.GreaterOrEqual(t, time.Now().UnixMilli()-start, minBcryptTimingMillis)
|
2022-01-26 02:57:28 +00:00
|
|
|
}
|
|
|
|
|
2023-01-23 03:21:30 +00:00
|
|
|
func TestManager_MarkUserRemoved_RemoveDeletedUsers(t *testing.T) {
|
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
|
|
|
|
|
|
|
// Create user, add reservations and token
|
|
|
|
require.Nil(t, a.AddUser("user", "pass", RoleAdmin))
|
|
|
|
require.Nil(t, a.AddReservation("user", "mytopic", PermissionRead))
|
|
|
|
|
|
|
|
u, err := a.User("user")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.False(t, u.Deleted)
|
|
|
|
|
|
|
|
token, err := a.CreateToken(u)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
u, err = a.Authenticate("user", "pass")
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
_, err = a.AuthenticateToken(token.Value)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
reservations, err := a.Reservations("user")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 1, len(reservations))
|
|
|
|
|
|
|
|
// Mark deleted: cannot auth anymore, and all reservations are gone
|
|
|
|
require.Nil(t, a.MarkUserRemoved(u))
|
|
|
|
|
|
|
|
_, err = a.Authenticate("user", "pass")
|
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
|
|
|
|
|
|
|
_, err = a.AuthenticateToken(token.Value)
|
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
|
|
|
|
|
|
|
reservations, err = a.Reservations("user")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 0, len(reservations))
|
|
|
|
|
|
|
|
// Make sure user is still there
|
|
|
|
u, err = a.User("user")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.True(t, u.Deleted)
|
|
|
|
|
|
|
|
_, err = a.db.Exec("UPDATE user SET deleted = ? WHERE id = ?", time.Now().Add(-1*(userHardDeleteAfterDuration+time.Hour)).Unix(), u.ID)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Nil(t, a.RemoveDeletedUsers())
|
|
|
|
|
|
|
|
_, err = a.User("user")
|
|
|
|
require.Equal(t, ErrUserNotFound, err)
|
|
|
|
}
|
|
|
|
|
2022-12-28 18:46:18 +00:00
|
|
|
func TestManager_UserManagement(t *testing.T) {
|
2023-01-03 02:12:42 +00:00
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("phil", "phil", RoleAdmin))
|
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2023-01-21 03:47:37 +00:00
|
|
|
require.Nil(t, a.AllowAccess("ben", "mytopic", PermissionReadWrite))
|
|
|
|
require.Nil(t, a.AllowAccess("ben", "readme", PermissionRead))
|
|
|
|
require.Nil(t, a.AllowAccess("ben", "writeme", PermissionWrite))
|
|
|
|
require.Nil(t, a.AllowAccess("ben", "everyonewrite", PermissionDenyAll)) // How unfair!
|
|
|
|
require.Nil(t, a.AllowAccess(Everyone, "announcements", PermissionRead))
|
|
|
|
require.Nil(t, a.AllowAccess(Everyone, "everyonewrite", PermissionReadWrite))
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
// Query user details
|
|
|
|
phil, err := a.User("phil")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "phil", phil.Name)
|
2022-02-08 03:09:31 +00:00
|
|
|
require.True(t, strings.HasPrefix(phil.Hash, "$2a$10$"))
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, RoleAdmin, phil.Role)
|
2023-01-03 02:12:42 +00:00
|
|
|
|
|
|
|
philGrants, err := a.Grants("phil")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, []Grant{}, philGrants)
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
ben, err := a.User("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "ben", ben.Name)
|
2022-02-08 03:09:31 +00:00
|
|
|
require.True(t, strings.HasPrefix(ben.Hash, "$2a$10$"))
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, RoleUser, ben.Role)
|
2023-01-03 02:12:42 +00:00
|
|
|
|
|
|
|
benGrants, err := a.Grants("ben")
|
|
|
|
require.Nil(t, err)
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, []Grant{
|
2023-01-03 02:12:42 +00:00
|
|
|
{"mytopic", PermissionReadWrite},
|
|
|
|
{"writeme", PermissionWrite},
|
|
|
|
{"readme", PermissionRead},
|
|
|
|
{"everyonewrite", PermissionDenyAll},
|
|
|
|
}, benGrants)
|
2022-01-26 02:57:28 +00:00
|
|
|
|
2022-12-29 16:09:45 +00:00
|
|
|
everyone, err := a.User(Everyone)
|
2022-01-26 02:57:28 +00:00
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "*", everyone.Name)
|
|
|
|
require.Equal(t, "", everyone.Hash)
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, RoleAnonymous, everyone.Role)
|
2023-01-03 02:12:42 +00:00
|
|
|
|
|
|
|
everyoneGrants, err := a.Grants(Everyone)
|
|
|
|
require.Nil(t, err)
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, []Grant{
|
2023-01-03 02:12:42 +00:00
|
|
|
{"everyonewrite", PermissionReadWrite},
|
|
|
|
{"announcements", PermissionRead},
|
|
|
|
}, everyoneGrants)
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
// Ben: Before revoking
|
2023-01-21 03:47:37 +00:00
|
|
|
require.Nil(t, a.AllowAccess("ben", "mytopic", PermissionReadWrite)) // Overwrite!
|
|
|
|
require.Nil(t, a.AllowAccess("ben", "readme", PermissionRead))
|
|
|
|
require.Nil(t, a.AllowAccess("ben", "writeme", PermissionWrite))
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Nil(t, a.Authorize(ben, "mytopic", PermissionRead))
|
|
|
|
require.Nil(t, a.Authorize(ben, "mytopic", PermissionWrite))
|
|
|
|
require.Nil(t, a.Authorize(ben, "readme", PermissionRead))
|
|
|
|
require.Nil(t, a.Authorize(ben, "writeme", PermissionWrite))
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
// Revoke access for "ben" to "mytopic", then check again
|
|
|
|
require.Nil(t, a.ResetAccess("ben", "mytopic"))
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(ben, "mytopic", PermissionWrite)) // Revoked
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(ben, "mytopic", PermissionRead)) // Revoked
|
|
|
|
require.Nil(t, a.Authorize(ben, "readme", PermissionRead)) // Unchanged
|
|
|
|
require.Nil(t, a.Authorize(ben, "writeme", PermissionWrite)) // Unchanged
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
// Revoke rest of the access
|
|
|
|
require.Nil(t, a.ResetAccess("ben", ""))
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(ben, "readme", PermissionRead)) // Revoked
|
|
|
|
require.Equal(t, ErrUnauthorized, a.Authorize(ben, "wrtiteme", PermissionWrite)) // Revoked
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
// User list
|
|
|
|
users, err := a.Users()
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 3, len(users))
|
|
|
|
require.Equal(t, "phil", users[0].Name)
|
|
|
|
require.Equal(t, "ben", users[1].Name)
|
|
|
|
require.Equal(t, "*", users[2].Name)
|
|
|
|
|
|
|
|
// Remove user
|
|
|
|
require.Nil(t, a.RemoveUser("ben"))
|
|
|
|
_, err = a.User("ben")
|
2023-01-14 11:43:44 +00:00
|
|
|
require.Equal(t, ErrUserNotFound, err)
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
users, err = a.Users()
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 2, len(users))
|
|
|
|
require.Equal(t, "phil", users[0].Name)
|
|
|
|
require.Equal(t, "*", users[1].Name)
|
|
|
|
}
|
|
|
|
|
2022-12-28 18:46:18 +00:00
|
|
|
func TestManager_ChangePassword(t *testing.T) {
|
2023-01-03 02:12:42 +00:00
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("phil", "phil", RoleAdmin))
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
_, err := a.Authenticate("phil", "phil")
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
require.Nil(t, a.ChangePassword("phil", "newpass"))
|
|
|
|
_, err = a.Authenticate("phil", "phil")
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
2022-01-26 02:57:28 +00:00
|
|
|
_, err = a.Authenticate("phil", "newpass")
|
|
|
|
require.Nil(t, err)
|
|
|
|
}
|
|
|
|
|
2022-12-28 18:46:18 +00:00
|
|
|
func TestManager_ChangeRole(t *testing.T) {
|
2023-01-03 02:12:42 +00:00
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2023-01-21 03:47:37 +00:00
|
|
|
require.Nil(t, a.AllowAccess("ben", "mytopic", PermissionReadWrite))
|
|
|
|
require.Nil(t, a.AllowAccess("ben", "readme", PermissionRead))
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
ben, err := a.User("ben")
|
|
|
|
require.Nil(t, err)
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, RoleUser, ben.Role)
|
2023-01-03 02:12:42 +00:00
|
|
|
|
|
|
|
benGrants, err := a.Grants("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 2, len(benGrants))
|
2022-01-26 02:57:28 +00:00
|
|
|
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Nil(t, a.ChangeRole("ben", RoleAdmin))
|
2022-01-26 02:57:28 +00:00
|
|
|
|
|
|
|
ben, err = a.User("ben")
|
|
|
|
require.Nil(t, err)
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, RoleAdmin, ben.Role)
|
2023-01-03 02:12:42 +00:00
|
|
|
|
|
|
|
benGrants, err = a.Grants("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 0, len(benGrants))
|
2022-01-26 02:57:28 +00:00
|
|
|
}
|
|
|
|
|
2023-01-21 03:47:37 +00:00
|
|
|
func TestManager_Reservations(t *testing.T) {
|
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2023-01-22 04:15:22 +00:00
|
|
|
require.Nil(t, a.AddReservation("ben", "ztopic", PermissionDenyAll))
|
|
|
|
require.Nil(t, a.AddReservation("ben", "readme", PermissionRead))
|
2023-01-21 03:47:37 +00:00
|
|
|
require.Nil(t, a.AllowAccess("ben", "something-else", PermissionRead))
|
|
|
|
|
|
|
|
reservations, err := a.Reservations("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 2, len(reservations))
|
|
|
|
require.Equal(t, Reservation{
|
|
|
|
Topic: "readme",
|
|
|
|
Owner: PermissionReadWrite,
|
|
|
|
Everyone: PermissionRead,
|
|
|
|
}, reservations[0])
|
|
|
|
require.Equal(t, Reservation{
|
|
|
|
Topic: "ztopic",
|
|
|
|
Owner: PermissionReadWrite,
|
|
|
|
Everyone: PermissionDenyAll,
|
|
|
|
}, reservations[1])
|
|
|
|
}
|
|
|
|
|
2023-01-09 20:40:46 +00:00
|
|
|
func TestManager_ChangeRoleFromTierUserToAdmin(t *testing.T) {
|
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
|
|
|
require.Nil(t, a.CreateTier(&Tier{
|
|
|
|
Code: "pro",
|
|
|
|
Name: "ntfy Pro",
|
2023-01-18 01:32:57 +00:00
|
|
|
StripePriceID: "price123",
|
2023-01-27 03:57:18 +00:00
|
|
|
MessageLimit: 5_000,
|
|
|
|
MessageExpiryDuration: 3 * 24 * time.Hour,
|
|
|
|
EmailLimit: 50,
|
|
|
|
ReservationLimit: 5,
|
2023-01-09 20:40:46 +00:00
|
|
|
AttachmentFileSizeLimit: 52428800,
|
|
|
|
AttachmentTotalSizeLimit: 524288000,
|
|
|
|
AttachmentExpiryDuration: 24 * time.Hour,
|
|
|
|
}))
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2023-01-09 20:40:46 +00:00
|
|
|
require.Nil(t, a.ChangeTier("ben", "pro"))
|
2023-01-22 04:15:22 +00:00
|
|
|
require.Nil(t, a.AddReservation("ben", "mytopic", PermissionDenyAll))
|
2023-01-09 20:40:46 +00:00
|
|
|
|
|
|
|
ben, err := a.User("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, RoleUser, ben.Role)
|
|
|
|
require.Equal(t, "pro", ben.Tier.Code)
|
2023-01-27 03:57:18 +00:00
|
|
|
require.Equal(t, int64(5000), ben.Tier.MessageLimit)
|
|
|
|
require.Equal(t, 3*24*time.Hour, ben.Tier.MessageExpiryDuration)
|
|
|
|
require.Equal(t, int64(50), ben.Tier.EmailLimit)
|
|
|
|
require.Equal(t, int64(5), ben.Tier.ReservationLimit)
|
2023-01-09 20:40:46 +00:00
|
|
|
require.Equal(t, int64(52428800), ben.Tier.AttachmentFileSizeLimit)
|
|
|
|
require.Equal(t, int64(524288000), ben.Tier.AttachmentTotalSizeLimit)
|
|
|
|
require.Equal(t, 24*time.Hour, ben.Tier.AttachmentExpiryDuration)
|
|
|
|
|
|
|
|
benGrants, err := a.Grants("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 1, len(benGrants))
|
|
|
|
require.Equal(t, PermissionReadWrite, benGrants[0].Allow)
|
|
|
|
|
|
|
|
everyoneGrants, err := a.Grants(Everyone)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 1, len(everyoneGrants))
|
|
|
|
require.Equal(t, PermissionDenyAll, everyoneGrants[0].Allow)
|
|
|
|
|
2023-01-21 03:47:37 +00:00
|
|
|
benReservations, err := a.Reservations("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 1, len(benReservations))
|
|
|
|
require.Equal(t, "mytopic", benReservations[0].Topic)
|
|
|
|
require.Equal(t, PermissionReadWrite, benReservations[0].Owner)
|
|
|
|
require.Equal(t, PermissionDenyAll, benReservations[0].Everyone)
|
|
|
|
|
2023-01-09 20:40:46 +00:00
|
|
|
// Switch to admin, this should remove all grants and owned ACL entries
|
|
|
|
require.Nil(t, a.ChangeRole("ben", RoleAdmin))
|
|
|
|
|
|
|
|
benGrants, err = a.Grants("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 0, len(benGrants))
|
|
|
|
|
|
|
|
everyoneGrants, err = a.Grants(Everyone)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 0, len(everyoneGrants))
|
|
|
|
}
|
|
|
|
|
2022-12-28 18:46:18 +00:00
|
|
|
func TestManager_Token_Valid(t *testing.T) {
|
2023-01-03 02:12:42 +00:00
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2022-12-28 18:46:18 +00:00
|
|
|
|
|
|
|
u, err := a.User("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
// Create token for user
|
|
|
|
token, err := a.CreateToken(u)
|
2022-12-28 20:51:09 +00:00
|
|
|
require.Nil(t, err)
|
2022-12-28 18:46:18 +00:00
|
|
|
require.NotEmpty(t, token.Value)
|
|
|
|
require.True(t, time.Now().Add(71*time.Hour).Unix() < token.Expires.Unix())
|
|
|
|
|
|
|
|
u2, err := a.AuthenticateToken(token.Value)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, u.Name, u2.Name)
|
|
|
|
require.Equal(t, token.Value, u2.Token)
|
|
|
|
|
|
|
|
// Remove token and auth again
|
|
|
|
require.Nil(t, a.RemoveToken(u2))
|
|
|
|
u3, err := a.AuthenticateToken(token.Value)
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
2022-12-28 18:46:18 +00:00
|
|
|
require.Nil(t, u3)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestManager_Token_Invalid(t *testing.T) {
|
2023-01-03 02:12:42 +00:00
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2022-12-28 18:46:18 +00:00
|
|
|
|
|
|
|
u, err := a.AuthenticateToken(strings.Repeat("x", 32)) // 32 == token length
|
|
|
|
require.Nil(t, u)
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
2022-12-28 18:46:18 +00:00
|
|
|
|
|
|
|
u, err = a.AuthenticateToken("not long enough anyway")
|
|
|
|
require.Nil(t, u)
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
2022-12-28 18:46:18 +00:00
|
|
|
}
|
|
|
|
|
2022-12-29 16:09:45 +00:00
|
|
|
func TestManager_Token_Expire(t *testing.T) {
|
2023-01-03 02:12:42 +00:00
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2022-12-29 16:09:45 +00:00
|
|
|
|
|
|
|
u, err := a.User("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
// Create tokens for user
|
|
|
|
token1, err := a.CreateToken(u)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.NotEmpty(t, token1.Value)
|
|
|
|
require.True(t, time.Now().Add(71*time.Hour).Unix() < token1.Expires.Unix())
|
|
|
|
|
|
|
|
token2, err := a.CreateToken(u)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.NotEmpty(t, token2.Value)
|
|
|
|
require.NotEqual(t, token1.Value, token2.Value)
|
|
|
|
require.True(t, time.Now().Add(71*time.Hour).Unix() < token2.Expires.Unix())
|
|
|
|
|
|
|
|
// See that tokens work
|
|
|
|
_, err = a.AuthenticateToken(token1.Value)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
_, err = a.AuthenticateToken(token2.Value)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
// Modify token expiration in database
|
|
|
|
_, err = a.db.Exec("UPDATE user_token SET expires = 1 WHERE token = ?", token1.Value)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
// Now token1 shouldn't work anymore
|
|
|
|
_, err = a.AuthenticateToken(token1.Value)
|
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
|
|
|
|
|
|
|
result, err := a.db.Query("SELECT * from user_token WHERE token = ?", token1.Value)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.True(t, result.Next()) // Still a matching row
|
|
|
|
require.Nil(t, result.Close())
|
|
|
|
|
|
|
|
// Expire tokens and check database rows
|
|
|
|
require.Nil(t, a.RemoveExpiredTokens())
|
|
|
|
|
|
|
|
result, err = a.db.Query("SELECT * from user_token WHERE token = ?", token1.Value)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.False(t, result.Next()) // No matching row!
|
|
|
|
require.Nil(t, result.Close())
|
|
|
|
}
|
|
|
|
|
2022-12-31 15:16:14 +00:00
|
|
|
func TestManager_Token_Extend(t *testing.T) {
|
2023-01-03 02:12:42 +00:00
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2022-12-31 15:16:14 +00:00
|
|
|
|
|
|
|
// Try to extend token for user without token
|
|
|
|
u, err := a.User("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
_, err = a.ExtendToken(u)
|
|
|
|
require.Equal(t, errNoTokenProvided, err)
|
|
|
|
|
|
|
|
// Create token for user
|
|
|
|
token, err := a.CreateToken(u)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.NotEmpty(t, token.Value)
|
|
|
|
|
|
|
|
userWithToken, err := a.AuthenticateToken(token.Value)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
time.Sleep(1100 * time.Millisecond)
|
|
|
|
|
|
|
|
extendedToken, err := a.ExtendToken(userWithToken)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, token.Value, extendedToken.Value)
|
|
|
|
require.True(t, token.Expires.Unix() < extendedToken.Expires.Unix())
|
|
|
|
}
|
|
|
|
|
2023-01-06 01:22:34 +00:00
|
|
|
func TestManager_Token_MaxCount_AutoDelete(t *testing.T) {
|
|
|
|
a := newTestManager(t, PermissionDenyAll)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2023-01-06 01:22:34 +00:00
|
|
|
|
|
|
|
// Try to extend token for user without token
|
|
|
|
u, err := a.User("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
// Tokens
|
|
|
|
baseTime := time.Now().Add(24 * time.Hour)
|
|
|
|
tokens := make([]string, 0)
|
|
|
|
for i := 0; i < 12; i++ {
|
|
|
|
token, err := a.CreateToken(u)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.NotEmpty(t, token.Value)
|
|
|
|
tokens = append(tokens, token.Value)
|
|
|
|
|
|
|
|
// Manually modify expiry date to avoid sorting issues (this is a hack)
|
|
|
|
_, err = a.db.Exec(`UPDATE user_token SET expires=? WHERE token=?`, baseTime.Add(time.Duration(i)*time.Minute).Unix(), token.Value)
|
|
|
|
require.Nil(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = a.AuthenticateToken(tokens[0])
|
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
|
|
|
|
|
|
|
_, err = a.AuthenticateToken(tokens[1])
|
|
|
|
require.Equal(t, ErrUnauthenticated, err)
|
|
|
|
|
|
|
|
for i := 2; i < 12; i++ {
|
|
|
|
userWithToken, err := a.AuthenticateToken(tokens[i])
|
|
|
|
require.Nil(t, err, "token[%d]=%s failed", i, tokens[i])
|
|
|
|
require.Equal(t, "ben", userWithToken.Name)
|
|
|
|
require.Equal(t, tokens[i], userWithToken.Token)
|
|
|
|
}
|
|
|
|
|
|
|
|
var count int
|
|
|
|
rows, err := a.db.Query(`SELECT COUNT(*) FROM user_token`)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.True(t, rows.Next())
|
|
|
|
require.Nil(t, rows.Scan(&count))
|
|
|
|
require.Equal(t, 10, count)
|
|
|
|
}
|
|
|
|
|
2022-12-29 16:09:45 +00:00
|
|
|
func TestManager_EnqueueStats(t *testing.T) {
|
2023-01-06 01:22:34 +00:00
|
|
|
a, err := newManager(filepath.Join(t.TempDir(), "db"), "", PermissionReadWrite, 1500*time.Millisecond)
|
2022-12-29 16:09:45 +00:00
|
|
|
require.Nil(t, err)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2022-12-29 16:09:45 +00:00
|
|
|
|
|
|
|
// Baseline: No messages or emails
|
|
|
|
u, err := a.User("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, int64(0), u.Stats.Messages)
|
|
|
|
require.Equal(t, int64(0), u.Stats.Emails)
|
|
|
|
|
|
|
|
u.Stats.Messages = 11
|
|
|
|
u.Stats.Emails = 2
|
|
|
|
a.EnqueueStats(u)
|
|
|
|
|
|
|
|
// Still no change, because it's queued asynchronously
|
|
|
|
u, err = a.User("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, int64(0), u.Stats.Messages)
|
|
|
|
require.Equal(t, int64(0), u.Stats.Emails)
|
|
|
|
|
|
|
|
// After 2 seconds they should be persisted
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
|
|
|
|
u, err = a.User("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, int64(11), u.Stats.Messages)
|
|
|
|
require.Equal(t, int64(2), u.Stats.Emails)
|
|
|
|
}
|
|
|
|
|
2022-12-31 15:16:14 +00:00
|
|
|
func TestManager_ChangeSettings(t *testing.T) {
|
2023-01-06 01:22:34 +00:00
|
|
|
a, err := newManager(filepath.Join(t.TempDir(), "db"), "", PermissionReadWrite, 1500*time.Millisecond)
|
2022-12-31 15:16:14 +00:00
|
|
|
require.Nil(t, err)
|
2023-01-23 03:21:30 +00:00
|
|
|
require.Nil(t, a.AddUser("ben", "ben", RoleUser))
|
2022-12-31 15:16:14 +00:00
|
|
|
|
|
|
|
// No settings
|
|
|
|
u, err := a.User("ben")
|
|
|
|
require.Nil(t, err)
|
2023-01-10 02:53:21 +00:00
|
|
|
require.Nil(t, u.Prefs.Subscriptions)
|
|
|
|
require.Nil(t, u.Prefs.Notification)
|
2023-01-25 15:05:54 +00:00
|
|
|
require.Nil(t, u.Prefs.Language)
|
2022-12-31 15:16:14 +00:00
|
|
|
|
|
|
|
// Save with new settings
|
|
|
|
u.Prefs = &Prefs{
|
2023-01-25 15:05:54 +00:00
|
|
|
Language: util.String("de"),
|
2022-12-31 15:16:14 +00:00
|
|
|
Notification: &NotificationPrefs{
|
2023-01-25 15:05:54 +00:00
|
|
|
Sound: util.String("ding"),
|
|
|
|
MinPriority: util.Int(2),
|
2022-12-31 15:16:14 +00:00
|
|
|
},
|
|
|
|
Subscriptions: []*Subscription{
|
|
|
|
{
|
|
|
|
ID: "someID",
|
|
|
|
BaseURL: "https://ntfy.sh",
|
|
|
|
Topic: "mytopic",
|
2023-01-25 15:05:54 +00:00
|
|
|
DisplayName: util.String("My Topic"),
|
2022-12-31 15:16:14 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
require.Nil(t, a.ChangeSettings(u))
|
|
|
|
|
|
|
|
// Read again
|
|
|
|
u, err = a.User("ben")
|
|
|
|
require.Nil(t, err)
|
2023-01-25 15:05:54 +00:00
|
|
|
require.Equal(t, util.String("de"), u.Prefs.Language)
|
|
|
|
require.Equal(t, util.String("ding"), u.Prefs.Notification.Sound)
|
|
|
|
require.Equal(t, util.Int(2), u.Prefs.Notification.MinPriority)
|
|
|
|
require.Nil(t, u.Prefs.Notification.DeleteAfter)
|
2022-12-31 15:16:14 +00:00
|
|
|
require.Equal(t, "someID", u.Prefs.Subscriptions[0].ID)
|
|
|
|
require.Equal(t, "https://ntfy.sh", u.Prefs.Subscriptions[0].BaseURL)
|
|
|
|
require.Equal(t, "mytopic", u.Prefs.Subscriptions[0].Topic)
|
2023-01-25 15:05:54 +00:00
|
|
|
require.Equal(t, util.String("My Topic"), u.Prefs.Subscriptions[0].DisplayName)
|
2022-12-31 15:16:14 +00:00
|
|
|
}
|
|
|
|
|
2022-12-29 18:08:47 +00:00
|
|
|
func TestSqliteCache_Migration_From1(t *testing.T) {
|
|
|
|
filename := filepath.Join(t.TempDir(), "user.db")
|
|
|
|
db, err := sql.Open("sqlite3", filename)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
// Create "version 1" schema
|
|
|
|
_, err = db.Exec(`
|
|
|
|
BEGIN;
|
|
|
|
CREATE TABLE IF NOT EXISTS user (
|
|
|
|
user TEXT NOT NULL PRIMARY KEY,
|
|
|
|
pass TEXT NOT NULL,
|
|
|
|
role TEXT NOT NULL
|
|
|
|
);
|
|
|
|
CREATE TABLE IF NOT EXISTS access (
|
|
|
|
user TEXT NOT NULL,
|
|
|
|
topic TEXT NOT NULL,
|
|
|
|
read INT NOT NULL,
|
|
|
|
write INT NOT NULL,
|
|
|
|
PRIMARY KEY (topic, user)
|
|
|
|
);
|
|
|
|
CREATE TABLE IF NOT EXISTS schemaVersion (
|
|
|
|
id INT PRIMARY KEY,
|
|
|
|
version INT NOT NULL
|
|
|
|
);
|
|
|
|
INSERT INTO schemaVersion (id, version) VALUES (1, 1);
|
|
|
|
COMMIT;
|
|
|
|
`)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
// Insert a bunch of users and ACL entries
|
|
|
|
_, err = db.Exec(`
|
|
|
|
BEGIN;
|
|
|
|
INSERT INTO user (user, pass, role) VALUES ('ben', '$2a$10$EEp6gBheOsqEFsXlo523E.gBVoeg1ytphXiEvTPlNzkenBlHZBPQy', 'user');
|
|
|
|
INSERT INTO user (user, pass, role) VALUES ('phil', '$2a$10$YLiO8U21sX1uhZamTLJXHuxgVC0Z/GKISibrKCLohPgtG7yIxSk4C', 'admin');
|
|
|
|
INSERT INTO access (user, topic, read, write) VALUES ('ben', 'stats', 1, 1);
|
|
|
|
INSERT INTO access (user, topic, read, write) VALUES ('ben', 'secret', 1, 0);
|
|
|
|
INSERT INTO access (user, topic, read, write) VALUES ('*', 'stats', 1, 0);
|
|
|
|
COMMIT;
|
|
|
|
`)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
// Create manager to trigger migration
|
2023-01-06 01:22:34 +00:00
|
|
|
a := newTestManagerFromFile(t, filename, "", PermissionDenyAll, userStatsQueueWriterInterval)
|
2022-12-29 18:08:47 +00:00
|
|
|
checkSchemaVersion(t, a.db)
|
|
|
|
|
|
|
|
users, err := a.Users()
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 3, len(users))
|
|
|
|
phil, ben, everyone := users[0], users[1], users[2]
|
|
|
|
|
2023-01-03 02:12:42 +00:00
|
|
|
philGrants, err := a.Grants("phil")
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
benGrants, err := a.Grants("ben")
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
everyoneGrants, err := a.Grants(Everyone)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
2023-01-22 04:15:22 +00:00
|
|
|
require.True(t, strings.HasPrefix(phil.ID, "u_"))
|
2022-12-29 18:08:47 +00:00
|
|
|
require.Equal(t, "phil", phil.Name)
|
|
|
|
require.Equal(t, RoleAdmin, phil.Role)
|
2023-01-10 20:41:08 +00:00
|
|
|
require.Equal(t, syncTopicLength, len(phil.SyncTopic))
|
2023-01-03 02:12:42 +00:00
|
|
|
require.Equal(t, 0, len(philGrants))
|
2022-12-29 18:08:47 +00:00
|
|
|
|
2023-01-22 04:15:22 +00:00
|
|
|
require.True(t, strings.HasPrefix(ben.ID, "u_"))
|
|
|
|
require.NotEqual(t, phil.ID, ben.ID)
|
2022-12-29 18:08:47 +00:00
|
|
|
require.Equal(t, "ben", ben.Name)
|
|
|
|
require.Equal(t, RoleUser, ben.Role)
|
2023-01-10 20:41:08 +00:00
|
|
|
require.Equal(t, syncTopicLength, len(ben.SyncTopic))
|
|
|
|
require.NotEqual(t, ben.SyncTopic, phil.SyncTopic)
|
2023-01-03 02:12:42 +00:00
|
|
|
require.Equal(t, 2, len(benGrants))
|
|
|
|
require.Equal(t, "stats", benGrants[0].TopicPattern)
|
|
|
|
require.Equal(t, PermissionReadWrite, benGrants[0].Allow)
|
|
|
|
require.Equal(t, "secret", benGrants[1].TopicPattern)
|
|
|
|
require.Equal(t, PermissionRead, benGrants[1].Allow)
|
2022-12-29 18:08:47 +00:00
|
|
|
|
2023-01-22 04:15:22 +00:00
|
|
|
require.Equal(t, "u_everyone", everyone.ID)
|
2022-12-29 18:08:47 +00:00
|
|
|
require.Equal(t, Everyone, everyone.Name)
|
|
|
|
require.Equal(t, RoleAnonymous, everyone.Role)
|
2023-01-03 02:12:42 +00:00
|
|
|
require.Equal(t, 1, len(everyoneGrants))
|
|
|
|
require.Equal(t, "stats", everyoneGrants[0].TopicPattern)
|
|
|
|
require.Equal(t, PermissionRead, everyoneGrants[0].Allow)
|
2022-12-29 18:08:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func checkSchemaVersion(t *testing.T, db *sql.DB) {
|
|
|
|
rows, err := db.Query(`SELECT version FROM schemaVersion`)
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.True(t, rows.Next())
|
|
|
|
|
|
|
|
var schemaVersion int
|
|
|
|
require.Nil(t, rows.Scan(&schemaVersion))
|
|
|
|
require.Equal(t, currentSchemaVersion, schemaVersion)
|
|
|
|
require.Nil(t, rows.Close())
|
|
|
|
}
|
|
|
|
|
2023-01-03 02:12:42 +00:00
|
|
|
func newTestManager(t *testing.T, defaultAccess Permission) *Manager {
|
2023-01-06 01:22:34 +00:00
|
|
|
return newTestManagerFromFile(t, filepath.Join(t.TempDir(), "user.db"), "", defaultAccess, userStatsQueueWriterInterval)
|
2022-12-29 18:08:47 +00:00
|
|
|
}
|
|
|
|
|
2023-01-06 01:22:34 +00:00
|
|
|
func newTestManagerFromFile(t *testing.T, filename, startupQueries string, defaultAccess Permission, statsWriterInterval time.Duration) *Manager {
|
|
|
|
a, err := newManager(filename, startupQueries, defaultAccess, statsWriterInterval)
|
2022-01-26 02:57:28 +00:00
|
|
|
require.Nil(t, err)
|
|
|
|
return a
|
|
|
|
}
|