Full Mattermost server source with integrated Community Enterprise features. Includes vendor directory for offline/air-gapped builds. Structure: - enterprise-impl/: Enterprise feature implementations - enterprise-community/: Init files that register implementations - enterprise/: Bridge imports (community_imports.go) - vendor/: All dependencies for offline builds Build (online): go build ./cmd/mattermost Build (offline/air-gapped): go build -mod=vendor ./cmd/mattermost 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
399 lines
13 KiB
Go
399 lines
13 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package storetest
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/mattermost/mattermost/server/public/model"
|
|
"github.com/mattermost/mattermost/server/public/shared/request"
|
|
"github.com/mattermost/mattermost/server/v8/channels/store"
|
|
)
|
|
|
|
func TestOAuthStore(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
t.Run("SaveApp", func(t *testing.T) { testOAuthStoreSaveApp(t, rctx, ss) })
|
|
t.Run("GetApp", func(t *testing.T) { testOAuthStoreGetApp(t, rctx, ss) })
|
|
t.Run("UpdateApp", func(t *testing.T) { testOAuthStoreUpdateApp(t, rctx, ss) })
|
|
t.Run("SaveAccessData", func(t *testing.T) { testOAuthStoreSaveAccessData(t, rctx, ss) })
|
|
t.Run("OAuthUpdateAccessData", func(t *testing.T) { testOAuthUpdateAccessData(t, rctx, ss) })
|
|
t.Run("GetAccessData", func(t *testing.T) { testOAuthStoreGetAccessData(t, rctx, ss) })
|
|
t.Run("RemoveAccessData", func(t *testing.T) { testOAuthStoreRemoveAccessData(t, rctx, ss) })
|
|
t.Run("RemoveAllAccessData", func(t *testing.T) { testOAuthStoreRemoveAllAccessData(t, rctx, ss) })
|
|
t.Run("SaveAuthData", func(t *testing.T) { testOAuthStoreSaveAuthData(t, rctx, ss) })
|
|
t.Run("GetAuthData", func(t *testing.T) { testOAuthStoreGetAuthData(t, rctx, ss) })
|
|
t.Run("RemoveAuthData", func(t *testing.T) { testOAuthStoreRemoveAuthData(t, rctx, ss) })
|
|
t.Run("RemoveAuthDataByUser", func(t *testing.T) { testOAuthStoreRemoveAuthDataByUser(t, rctx, ss) })
|
|
t.Run("OAuthGetAuthorizedApps", func(t *testing.T) { testOAuthGetAuthorizedApps(t, rctx, ss) })
|
|
t.Run("OAuthGetAccessDataByUserForApp", func(t *testing.T) { testOAuthGetAccessDataByUserForApp(t, rctx, ss) })
|
|
t.Run("DeleteApp", func(t *testing.T) { testOAuthStoreDeleteApp(t, rctx, ss) })
|
|
}
|
|
|
|
func testOAuthStoreSaveApp(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
|
|
// Try to save an app that already has an Id
|
|
a1.Id = model.NewId()
|
|
_, err := ss.OAuth().SaveApp(&a1)
|
|
require.Error(t, err, "Should have failed, cannot add an OAuth app cannot be save with an Id, it has to be updated")
|
|
|
|
// Try to save an Invalid App
|
|
a1.Id = ""
|
|
_, err = ss.OAuth().SaveApp(&a1)
|
|
require.Error(t, err, "Should have failed, app should be invalid cause it doesn' have a name set")
|
|
|
|
a1.Name = "TestApp" + model.NewId() // Valid name
|
|
a1.MattermostAppID = "a very, very, very, very, very, very, very long id"
|
|
_, err = ss.OAuth().SaveApp(&a1)
|
|
require.Error(t, err, "Should have failed, app should be invalid cause the MattermostAppID is to long")
|
|
|
|
// Save the app
|
|
a1.Id = ""
|
|
a1.MattermostAppID = "some small id" // Valid id
|
|
_, err = ss.OAuth().SaveApp(&a1)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func testOAuthStoreGetApp(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.Name = "TestApp" + model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
_, err := ss.OAuth().SaveApp(&a1)
|
|
require.NoError(t, err)
|
|
|
|
// Lets try to get and app that does not exists
|
|
_, err = ss.OAuth().GetApp("fake0123456789abcderfgret1")
|
|
require.Error(t, err, "Should have failed. App does not exists")
|
|
|
|
_, err = ss.OAuth().GetApp(a1.Id)
|
|
require.NoError(t, err)
|
|
|
|
// Lets try and get the app from a user that hasn't created any apps
|
|
apps, err := ss.OAuth().GetAppByUser("fake0123456789abcderfgret1", 0, 1000)
|
|
require.NoError(t, err)
|
|
assert.Empty(t, apps, "Should have failed. Fake user hasn't created any apps")
|
|
|
|
_, err = ss.OAuth().GetAppByUser(a1.CreatorId, 0, 1000)
|
|
require.NoError(t, err)
|
|
|
|
_, err = ss.OAuth().GetApps(0, 1000)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func testOAuthStoreUpdateApp(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.Name = "TestApp" + model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
_, err := ss.OAuth().SaveApp(&a1)
|
|
require.NoError(t, err)
|
|
|
|
// temporarily save the created app id
|
|
id := a1.Id
|
|
|
|
a1.CreateAt = 1
|
|
a1.ClientSecret = "pwd"
|
|
a1.CreatorId = "12345678901234567890123456"
|
|
|
|
// Lets update the app by removing the name
|
|
a1.Name = ""
|
|
_, err = ss.OAuth().UpdateApp(&a1)
|
|
require.Error(t, err, "Should have failed. App name is not set")
|
|
|
|
// Lets not find the app that we are trying to update
|
|
a1.Id = "fake0123456789abcderfgret1"
|
|
a1.Name = "NewName"
|
|
_, err = ss.OAuth().UpdateApp(&a1)
|
|
require.Error(t, err, "Should have failed. Not able to find the app")
|
|
|
|
a1.Id = id
|
|
ua, err := ss.OAuth().UpdateApp(&a1)
|
|
require.NoError(t, err)
|
|
require.Equal(t, ua.Name, "NewName", "name did not update")
|
|
require.NotEqual(t, ua.CreateAt, 1, "create at should not have updated")
|
|
require.NotEqual(t, ua.CreatorId, "12345678901234567890123456", "creator id should not have updated")
|
|
}
|
|
|
|
func testOAuthStoreSaveAccessData(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.AccessData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
|
|
// Lets try and save an incomplete access data
|
|
_, err := ss.OAuth().SaveAccessData(&a1)
|
|
require.Error(t, err, "Should have failed. Access data needs the token")
|
|
|
|
a1.Token = model.NewId()
|
|
a1.RefreshToken = model.NewId()
|
|
a1.RedirectUri = "http://example.com"
|
|
|
|
_, err = ss.OAuth().SaveAccessData(&a1)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func testOAuthUpdateAccessData(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.AccessData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Token = model.NewId()
|
|
a1.RefreshToken = model.NewId()
|
|
a1.ExpiresAt = model.GetMillis()
|
|
a1.RedirectUri = "http://example.com"
|
|
_, err := ss.OAuth().SaveAccessData(&a1)
|
|
require.NoError(t, err)
|
|
|
|
//Try to update to invalid Refresh Token
|
|
refreshToken := a1.RefreshToken
|
|
a1.RefreshToken = model.NewId() + "123"
|
|
_, err = ss.OAuth().UpdateAccessData(&a1)
|
|
require.Error(t, err, "Should have failed with invalid token")
|
|
|
|
//Try to update to invalid RedirectUri
|
|
a1.RefreshToken = model.NewId()
|
|
a1.RedirectUri = ""
|
|
_, err = ss.OAuth().UpdateAccessData(&a1)
|
|
require.Error(t, err, "Should have failed with invalid Redirect URI")
|
|
|
|
// Should update fine
|
|
a1.RedirectUri = "http://example.com"
|
|
ra1, err := ss.OAuth().UpdateAccessData(&a1)
|
|
require.NoError(t, err)
|
|
require.NotEqual(t, ra1.RefreshToken, refreshToken, "refresh tokens didn't match")
|
|
}
|
|
|
|
func testOAuthStoreGetAccessData(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.AccessData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Token = model.NewId()
|
|
a1.RefreshToken = model.NewId()
|
|
a1.ExpiresAt = model.GetMillis()
|
|
a1.RedirectUri = "http://example.com"
|
|
_, err := ss.OAuth().SaveAccessData(&a1)
|
|
require.NoError(t, err)
|
|
|
|
_, err = ss.OAuth().GetAccessData("invalidToken")
|
|
require.Error(t, err, "Should have failed. There is no data with an invalid token")
|
|
|
|
ra1, err := ss.OAuth().GetAccessData(a1.Token)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, a1.Token, ra1.Token, "tokens didn't match")
|
|
|
|
_, err = ss.OAuth().GetPreviousAccessData(a1.UserId, a1.ClientId)
|
|
require.NoError(t, err)
|
|
|
|
_, err = ss.OAuth().GetPreviousAccessData("user", "junk")
|
|
require.NoError(t, err)
|
|
|
|
// Try to get the Access data using an invalid refresh token
|
|
_, err = ss.OAuth().GetAccessDataByRefreshToken(a1.Token)
|
|
require.Error(t, err, "Should have failed. There is no data with an invalid token")
|
|
|
|
// Get the Access Data using the refresh token
|
|
ra1, err = ss.OAuth().GetAccessDataByRefreshToken(a1.RefreshToken)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, a1.RefreshToken, ra1.RefreshToken, "tokens didn't match")
|
|
}
|
|
|
|
func testOAuthStoreRemoveAccessData(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.AccessData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Token = model.NewId()
|
|
a1.RefreshToken = model.NewId()
|
|
a1.RedirectUri = "http://example.com"
|
|
_, err := ss.OAuth().SaveAccessData(&a1)
|
|
require.NoError(t, err)
|
|
|
|
err = ss.OAuth().RemoveAccessData(a1.Token)
|
|
require.NoError(t, err)
|
|
|
|
result, _ := ss.OAuth().GetPreviousAccessData(a1.UserId, a1.ClientId)
|
|
require.Nil(t, result, "did not delete access token")
|
|
}
|
|
|
|
func testOAuthStoreRemoveAllAccessData(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.AccessData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Token = model.NewId()
|
|
a1.RefreshToken = model.NewId()
|
|
a1.RedirectUri = "http://example.com"
|
|
_, err := ss.OAuth().SaveAccessData(&a1)
|
|
require.NoError(t, err)
|
|
|
|
err = ss.OAuth().RemoveAllAccessData()
|
|
require.NoError(t, err)
|
|
|
|
result, _ := ss.OAuth().GetPreviousAccessData(a1.UserId, a1.ClientId)
|
|
require.Nil(t, result, "did not delete access token")
|
|
}
|
|
|
|
func testOAuthStoreSaveAuthData(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.AuthData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Code = model.NewId()
|
|
a1.RedirectUri = "http://example.com"
|
|
_, err := ss.OAuth().SaveAuthData(&a1)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func testOAuthStoreGetAuthData(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.AuthData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Code = model.NewId()
|
|
a1.RedirectUri = "http://example.com"
|
|
_, err := ss.OAuth().SaveAuthData(&a1)
|
|
require.NoError(t, err)
|
|
|
|
_, err = ss.OAuth().GetAuthData(a1.Code)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func testOAuthStoreRemoveAuthData(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.AuthData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Code = model.NewId()
|
|
a1.RedirectUri = "http://example.com"
|
|
_, err := ss.OAuth().SaveAuthData(&a1)
|
|
require.NoError(t, err)
|
|
|
|
err = ss.OAuth().RemoveAuthData(a1.Code)
|
|
require.NoError(t, err)
|
|
|
|
_, err = ss.OAuth().GetAuthData(a1.Code)
|
|
require.Error(t, err, "should have errored - auth code removed")
|
|
}
|
|
|
|
func testOAuthStoreRemoveAuthDataByUser(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.AuthData{}
|
|
a1.ClientId = model.NewId()
|
|
a1.UserId = model.NewId()
|
|
a1.Code = model.NewId()
|
|
a1.RedirectUri = "http://example.com"
|
|
_, err := ss.OAuth().SaveAuthData(&a1)
|
|
require.NoError(t, err)
|
|
|
|
err = ss.OAuth().PermanentDeleteAuthDataByUser(a1.UserId)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func testOAuthGetAuthorizedApps(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.Name = "TestApp" + model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
_, err := ss.OAuth().SaveApp(&a1)
|
|
require.NoError(t, err)
|
|
|
|
// Lets try and get an Authorized app for a user who hasn't authorized it
|
|
apps, err := ss.OAuth().GetAuthorizedApps("fake0123456789abcderfgret1", 0, 1000)
|
|
require.NoError(t, err)
|
|
assert.Empty(t, apps, "Should have failed. Fake user hasn't authorized the app")
|
|
|
|
// allow the app
|
|
p := model.Preference{}
|
|
p.UserId = a1.CreatorId
|
|
p.Category = model.PreferenceCategoryAuthorizedOAuthApp
|
|
p.Name = a1.Id
|
|
p.Value = "true"
|
|
nErr := ss.Preference().Save(model.Preferences{p})
|
|
require.NoError(t, nErr)
|
|
|
|
apps, err = ss.OAuth().GetAuthorizedApps(a1.CreatorId, 0, 1000)
|
|
require.NoError(t, err)
|
|
assert.NotEqual(t, len(apps), 0, "It should have return apps")
|
|
}
|
|
|
|
func testOAuthGetAccessDataByUserForApp(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.Name = "TestApp" + model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
_, err := ss.OAuth().SaveApp(&a1)
|
|
require.NoError(t, err)
|
|
|
|
// allow the app
|
|
p := model.Preference{}
|
|
p.UserId = a1.CreatorId
|
|
p.Category = model.PreferenceCategoryAuthorizedOAuthApp
|
|
p.Name = a1.Id
|
|
p.Value = "true"
|
|
nErr := ss.Preference().Save(model.Preferences{p})
|
|
require.NoError(t, nErr)
|
|
|
|
apps, err := ss.OAuth().GetAuthorizedApps(a1.CreatorId, 0, 1000)
|
|
require.NoError(t, err)
|
|
assert.NotEqual(t, len(apps), 0, "It should have return apps")
|
|
|
|
// save the token
|
|
ad1 := model.AccessData{}
|
|
ad1.ClientId = a1.Id
|
|
ad1.UserId = a1.CreatorId
|
|
ad1.Token = model.NewId()
|
|
ad1.RefreshToken = model.NewId()
|
|
ad1.RedirectUri = "http://example.com"
|
|
|
|
_, err = ss.OAuth().SaveAccessData(&ad1)
|
|
require.NoError(t, err)
|
|
|
|
accessData, err := ss.OAuth().GetAccessDataByUserForApp(a1.CreatorId, a1.Id)
|
|
require.NoError(t, err)
|
|
assert.NotEqual(t, len(accessData), 0, "It should have return access data")
|
|
}
|
|
|
|
func testOAuthStoreDeleteApp(t *testing.T, rctx request.CTX, ss store.Store) {
|
|
a1 := model.OAuthApp{}
|
|
a1.CreatorId = model.NewId()
|
|
a1.Name = "TestApp" + model.NewId()
|
|
a1.CallbackUrls = []string{"https://nowhere.com"}
|
|
a1.Homepage = "https://nowhere.com"
|
|
_, err := ss.OAuth().SaveApp(&a1)
|
|
require.NoError(t, err)
|
|
|
|
// delete a non-existent app
|
|
err = ss.OAuth().DeleteApp("fakeclientId")
|
|
require.NoError(t, err)
|
|
|
|
s1 := &model.Session{}
|
|
s1.UserId = model.NewId()
|
|
s1.Token = model.NewId()
|
|
s1.IsOAuth = true
|
|
|
|
s1, nErr := ss.Session().Save(rctx, s1)
|
|
require.NoError(t, nErr)
|
|
|
|
ad1 := model.AccessData{}
|
|
ad1.ClientId = a1.Id
|
|
ad1.UserId = a1.CreatorId
|
|
ad1.Token = s1.Token
|
|
ad1.RefreshToken = model.NewId()
|
|
ad1.RedirectUri = "http://example.com"
|
|
|
|
_, err = ss.OAuth().SaveAccessData(&ad1)
|
|
require.NoError(t, err)
|
|
|
|
err = ss.OAuth().DeleteApp(a1.Id)
|
|
require.NoError(t, err)
|
|
|
|
_, nErr = ss.Session().Get(rctx, s1.Token)
|
|
require.Error(t, nErr, "should error - session should be deleted")
|
|
|
|
_, err = ss.OAuth().GetAccessData(s1.Token)
|
|
require.Error(t, err, "should error - access data should be deleted")
|
|
}
|