Full Mattermost server source with integrated Community Enterprise features. Includes vendor directory for offline/air-gapped builds. Structure: - enterprise-impl/: Enterprise feature implementations - enterprise-community/: Init files that register implementations - enterprise/: Bridge imports (community_imports.go) - vendor/: All dependencies for offline builds Build (online): go build ./cmd/mattermost Build (offline/air-gapped): go build -mod=vendor ./cmd/mattermost 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
679 lines
21 KiB
Go
679 lines
21 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package slashcommands
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"net/url"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/mattermost/mattermost/server/public/model"
|
|
"github.com/mattermost/mattermost/server/public/plugin/plugintest/mock"
|
|
"github.com/mattermost/mattermost/server/v8/einterfaces/mocks"
|
|
)
|
|
|
|
type InfiniteReader struct{}
|
|
|
|
func (r InfiniteReader) Read(p []byte) (n int, err error) {
|
|
for i := range p {
|
|
p[i] = 'a'
|
|
}
|
|
|
|
return len(p), nil
|
|
}
|
|
|
|
func TestMoveCommand(t *testing.T) {
|
|
th := setup(t)
|
|
|
|
sourceTeam := th.createTeam(t)
|
|
targetTeam := th.createTeam(t)
|
|
t.Cleanup(func() {
|
|
appErr := th.App.PermanentDeleteTeam(th.Context, sourceTeam)
|
|
require.Nil(t, appErr)
|
|
appErr = th.App.PermanentDeleteTeam(th.Context, targetTeam)
|
|
require.Nil(t, appErr)
|
|
})
|
|
|
|
command := &model.Command{}
|
|
command.CreatorId = model.NewId()
|
|
command.Method = model.CommandMethodPost
|
|
command.TeamId = sourceTeam.Id
|
|
command.URL = "http://nowhere.com/"
|
|
command.Trigger = "trigger1"
|
|
|
|
command, err := th.App.CreateCommand(command)
|
|
assert.Nil(t, err)
|
|
|
|
// Move a command and check the team is updated.
|
|
assert.Nil(t, th.App.MoveCommand(targetTeam, command))
|
|
retrievedCommand, err := th.App.GetCommand(command.Id)
|
|
assert.Nil(t, err)
|
|
assert.EqualValues(t, targetTeam.Id, retrievedCommand.TeamId)
|
|
|
|
// Move it to the team it's already in. Nothing should change.
|
|
assert.Nil(t, th.App.MoveCommand(targetTeam, command))
|
|
retrievedCommand, err = th.App.GetCommand(command.Id)
|
|
assert.Nil(t, err)
|
|
assert.EqualValues(t, targetTeam.Id, retrievedCommand.TeamId)
|
|
}
|
|
|
|
func TestCreateCommandPost(t *testing.T) {
|
|
th := setup(t).initBasic(t)
|
|
|
|
post := &model.Post{
|
|
ChannelId: th.BasicChannel.Id,
|
|
UserId: th.BasicUser.Id,
|
|
Type: model.PostTypeSystemGeneric,
|
|
}
|
|
|
|
resp := &model.CommandResponse{
|
|
Text: "some message",
|
|
}
|
|
|
|
skipSlackParsing := false
|
|
_, err := th.App.CreateCommandPost(th.Context, post, th.BasicTeam.Id, resp, skipSlackParsing)
|
|
require.NotNil(t, err)
|
|
require.Equal(t, err.Id, "api.context.invalid_param.app_error")
|
|
}
|
|
|
|
func TestExecuteCommand(t *testing.T) {
|
|
th := setup(t).initBasic(t)
|
|
|
|
t.Run("valid tests with different whitespace characters", func(t *testing.T) {
|
|
TestCases := map[string]string{
|
|
"/code happy path": " happy path",
|
|
"/code\nnewline path": " newline path",
|
|
"/code\n/nDouble newline path": " /nDouble newline path",
|
|
"/code double space": " double space",
|
|
"/code\ttab": " tab",
|
|
}
|
|
|
|
for TestCase, result := range TestCases {
|
|
args := &model.CommandArgs{
|
|
Command: TestCase,
|
|
TeamId: th.BasicTeam.Id,
|
|
ChannelId: th.BasicChannel.Id,
|
|
UserId: th.BasicUser.Id,
|
|
T: func(s string, args ...any) string { return s },
|
|
}
|
|
resp, err := th.App.ExecuteCommand(th.Context, args)
|
|
require.Nil(t, err)
|
|
require.NotNil(t, resp)
|
|
|
|
assert.Equal(t, resp.Text, result)
|
|
}
|
|
})
|
|
|
|
t.Run("missing slash character", func(t *testing.T) {
|
|
argsMissingSlashCharacter := &model.CommandArgs{
|
|
Command: "missing leading slash character",
|
|
T: func(s string, args ...any) string { return s },
|
|
}
|
|
_, err := th.App.ExecuteCommand(th.Context, argsMissingSlashCharacter)
|
|
require.Equal(t, "api.command.execute_command.format.app_error", err.Id)
|
|
})
|
|
|
|
t.Run("empty", func(t *testing.T) {
|
|
argsMissingSlashCharacter := &model.CommandArgs{
|
|
Command: "",
|
|
T: func(s string, args ...any) string { return s },
|
|
}
|
|
_, err := th.App.ExecuteCommand(th.Context, argsMissingSlashCharacter)
|
|
require.Equal(t, "api.command.execute_command.format.app_error", err.Id)
|
|
})
|
|
}
|
|
|
|
func TestHandleCommandResponsePost(t *testing.T) {
|
|
th := setup(t).initBasic(t)
|
|
|
|
command := &model.Command{}
|
|
args := &model.CommandArgs{
|
|
ChannelId: th.BasicChannel.Id,
|
|
TeamId: th.BasicTeam.Id,
|
|
UserId: th.BasicUser.Id,
|
|
RootId: "",
|
|
}
|
|
|
|
resp := &model.CommandResponse{
|
|
Type: model.PostTypeDefault,
|
|
ResponseType: model.CommandResponseTypeInChannel,
|
|
Props: model.StringInterface{"some_key": "some value"},
|
|
Text: "some message",
|
|
}
|
|
|
|
builtIn := true
|
|
|
|
post, err := th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
assert.Equal(t, args.ChannelId, post.ChannelId)
|
|
assert.Equal(t, args.RootId, post.RootId)
|
|
assert.Equal(t, args.UserId, post.UserId)
|
|
assert.Equal(t, resp.Type, post.Type)
|
|
assert.Equal(t, resp.Props, post.GetProps())
|
|
assert.Equal(t, resp.Text, post.Message)
|
|
assert.Nil(t, post.GetProp(model.PostPropsOverrideIconURL))
|
|
assert.Nil(t, post.GetProp(model.PostPropsOverrideUsername))
|
|
assert.Nil(t, post.GetProp(model.PostPropsFromWebhook))
|
|
|
|
// Command is not built in, so it is a bot command.
|
|
builtIn = false
|
|
post, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
assert.Equal(t, "true", post.GetProp(model.PostPropsFromWebhook))
|
|
|
|
builtIn = true
|
|
|
|
// Channel id is specified by response, it should override the command args value.
|
|
channel := th.CreateChannel(t, th.BasicTeam)
|
|
resp.ChannelId = channel.Id
|
|
th.addUserToChannel(t, th.BasicUser, channel)
|
|
|
|
post, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
assert.Equal(t, resp.ChannelId, post.ChannelId)
|
|
assert.NotEqual(t, args.ChannelId, post.ChannelId)
|
|
|
|
// Override username config is turned off. No override should occur.
|
|
*th.App.Config().ServiceSettings.EnablePostUsernameOverride = false
|
|
resp.ChannelId = ""
|
|
command.Username = "Command username"
|
|
resp.Username = "Response username"
|
|
|
|
post, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
assert.Nil(t, post.GetProp(model.PostPropsOverrideUsername))
|
|
|
|
*th.App.Config().ServiceSettings.EnablePostUsernameOverride = true
|
|
|
|
// Override username config is turned on. Override username through command property.
|
|
post, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
assert.Equal(t, command.Username, post.GetProp(model.PostPropsOverrideUsername))
|
|
assert.Equal(t, "true", post.GetProp(model.PostPropsFromWebhook))
|
|
|
|
command.Username = ""
|
|
|
|
// Override username through response property.
|
|
post, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
assert.Equal(t, resp.Username, post.GetProp(model.PostPropsOverrideUsername))
|
|
assert.Equal(t, "true", post.GetProp(model.PostPropsFromWebhook))
|
|
|
|
*th.App.Config().ServiceSettings.EnablePostUsernameOverride = false
|
|
|
|
// Override icon url config is turned off. No override should occur.
|
|
*th.App.Config().ServiceSettings.EnablePostIconOverride = false
|
|
command.IconURL = "Command icon url"
|
|
resp.IconURL = "Response icon url"
|
|
|
|
post, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
assert.Nil(t, post.GetProp(model.PostPropsOverrideIconURL))
|
|
|
|
*th.App.Config().ServiceSettings.EnablePostIconOverride = true
|
|
|
|
// Override icon url config is turned on. Override icon url through command property.
|
|
post, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
assert.Equal(t, command.IconURL, post.GetProp(model.PostPropsOverrideIconURL))
|
|
assert.Equal(t, "true", post.GetProp(model.PostPropsFromWebhook))
|
|
|
|
command.IconURL = ""
|
|
|
|
// Override icon url through response property.
|
|
post, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
assert.Equal(t, resp.IconURL, post.GetProp(model.PostPropsOverrideIconURL))
|
|
assert.Equal(t, "true", post.GetProp(model.PostPropsFromWebhook))
|
|
|
|
// Test Slack text conversion.
|
|
resp.Text = "<!channel>"
|
|
|
|
post, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
assert.Equal(t, "@channel", post.Message)
|
|
assert.Equal(t, "true", post.GetProp(model.PostPropsFromWebhook))
|
|
|
|
// Test Slack attachments text conversion.
|
|
resp.Attachments = []*model.SlackAttachment{
|
|
{
|
|
Text: "<!here>",
|
|
},
|
|
}
|
|
|
|
post, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
assert.Equal(t, "@channel", post.Message)
|
|
if assert.Len(t, post.Attachments(), 1) {
|
|
assert.Equal(t, "@here", post.Attachments()[0].Text)
|
|
}
|
|
assert.Equal(t, "true", post.GetProp(model.PostPropsFromWebhook))
|
|
|
|
channel = th.createPrivateChannel(t, th.BasicTeam)
|
|
resp.ChannelId = channel.Id
|
|
args.UserId = th.BasicUser2.Id
|
|
_, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
|
|
require.NotNil(t, err)
|
|
require.Equal(t, err.Id, "api.command.command_post.forbidden.app_error")
|
|
|
|
// Test that /code text is not converted with the Slack text conversion.
|
|
command.Trigger = "code"
|
|
resp.ChannelId = ""
|
|
resp.Text = "<test.com|test website>"
|
|
resp.Attachments = []*model.SlackAttachment{
|
|
{
|
|
Text: "<!here>",
|
|
},
|
|
}
|
|
|
|
// set and unset SkipSlackParsing here seems the nicest way as no separate response objects are created for every testcase.
|
|
resp.SkipSlackParsing = true
|
|
post, err = th.App.HandleCommandResponsePost(th.Context, command, args, resp, builtIn)
|
|
resp.SkipSlackParsing = false
|
|
|
|
assert.Nil(t, err)
|
|
assert.Equal(t, resp.Text, post.Message, "/code text should not be converted to Slack links")
|
|
assert.Equal(t, "<!here>", resp.Attachments[0].Text)
|
|
}
|
|
|
|
func TestHandleCommandResponse(t *testing.T) {
|
|
th := setup(t).initBasic(t)
|
|
|
|
command := &model.Command{}
|
|
|
|
args := &model.CommandArgs{
|
|
Command: "/invite username",
|
|
UserId: th.BasicUser.Id,
|
|
ChannelId: th.BasicChannel.Id,
|
|
}
|
|
|
|
resp := &model.CommandResponse{
|
|
Text: "message 1",
|
|
Type: model.PostTypeSystemGeneric,
|
|
}
|
|
|
|
builtIn := true
|
|
|
|
_, err := th.App.HandleCommandResponse(th.Context, command, args, resp, builtIn)
|
|
require.NotNil(t, err)
|
|
require.Equal(t, err.Id, "api.command.execute_command.create_post_failed.app_error")
|
|
|
|
resp = &model.CommandResponse{
|
|
Text: "message 1",
|
|
}
|
|
|
|
_, err = th.App.HandleCommandResponse(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
|
|
resp = &model.CommandResponse{
|
|
Text: "message 1",
|
|
ExtraResponses: []*model.CommandResponse{
|
|
{
|
|
Text: "message 2",
|
|
},
|
|
{
|
|
Type: model.PostTypeSystemGeneric,
|
|
Text: "message 3",
|
|
},
|
|
},
|
|
}
|
|
|
|
_, err = th.App.HandleCommandResponse(th.Context, command, args, resp, builtIn)
|
|
require.NotNil(t, err)
|
|
require.Equal(t, err.Id, "api.command.execute_command.create_post_failed.app_error")
|
|
|
|
resp = &model.CommandResponse{
|
|
ExtraResponses: []*model.CommandResponse{
|
|
{},
|
|
{},
|
|
},
|
|
}
|
|
|
|
_, err = th.App.HandleCommandResponse(th.Context, command, args, resp, builtIn)
|
|
assert.Nil(t, err)
|
|
}
|
|
|
|
func TestDoCommandRequest(t *testing.T) {
|
|
th := setup(t)
|
|
|
|
th.App.UpdateConfig(func(cfg *model.Config) {
|
|
cfg.ServiceSettings.AllowedUntrustedInternalConnections = model.NewPointer("127.0.0.1")
|
|
cfg.ServiceSettings.EnableCommands = model.NewPointer(true)
|
|
})
|
|
|
|
t.Run("with a valid text response", func(t *testing.T) {
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
_, err := io.Copy(w, strings.NewReader("Hello, World!"))
|
|
require.NoError(t, err)
|
|
}))
|
|
t.Cleanup(server.Close)
|
|
|
|
_, resp, err := th.App.DoCommandRequest(th.Context, &model.Command{URL: server.URL}, url.Values{})
|
|
require.Nil(t, err)
|
|
|
|
assert.NotNil(t, resp)
|
|
assert.Equal(t, "Hello, World!", resp.Text)
|
|
})
|
|
|
|
t.Run("with a valid json response", func(t *testing.T) {
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.Header().Add("Content-Type", "application/json")
|
|
|
|
_, err := io.Copy(w, strings.NewReader(`{"text": "Hello, World!"}`))
|
|
require.NoError(t, err)
|
|
}))
|
|
t.Cleanup(server.Close)
|
|
|
|
_, resp, err := th.App.DoCommandRequest(th.Context, &model.Command{URL: server.URL}, url.Values{})
|
|
require.Nil(t, err)
|
|
|
|
assert.NotNil(t, resp)
|
|
assert.Equal(t, "Hello, World!", resp.Text)
|
|
})
|
|
|
|
t.Run("with a large text response", func(t *testing.T) {
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
_, err := io.Copy(w, InfiniteReader{})
|
|
require.Error(t, err) // InfiniteReader never returns EOF, so this will error
|
|
}))
|
|
t.Cleanup(server.Close)
|
|
|
|
// Since we limit the length of the response, no error will be returned and resp.Text will be a finite string
|
|
|
|
_, resp, err := th.App.DoCommandRequest(th.Context, &model.Command{URL: server.URL}, url.Values{})
|
|
require.Nil(t, err)
|
|
require.NotNil(t, resp)
|
|
})
|
|
|
|
t.Run("with a large, valid json response", func(t *testing.T) {
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.Header().Add("Content-Type", "application/json")
|
|
|
|
_, err := io.Copy(w, io.MultiReader(strings.NewReader(`{"text": "`), InfiniteReader{}, strings.NewReader(`"}`)))
|
|
require.Error(t, err) // InfiniteReader never returns EOF, so this will error
|
|
}))
|
|
t.Cleanup(server.Close)
|
|
|
|
_, _, err := th.App.DoCommandRequest(th.Context, &model.Command{URL: server.URL}, url.Values{})
|
|
require.NotNil(t, err)
|
|
require.Equal(t, "api.command.execute_command.failed.app_error", err.Id)
|
|
})
|
|
|
|
t.Run("with a large, invalid json response", func(t *testing.T) {
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.Header().Add("Content-Type", "application/json")
|
|
|
|
_, err := io.Copy(w, InfiniteReader{})
|
|
require.Error(t, err) // InfiniteReader never returns EOF, so this will error
|
|
}))
|
|
t.Cleanup(server.Close)
|
|
|
|
_, _, err := th.App.DoCommandRequest(th.Context, &model.Command{URL: server.URL}, url.Values{})
|
|
require.NotNil(t, err)
|
|
require.Equal(t, "api.command.execute_command.failed.app_error", err.Id)
|
|
})
|
|
|
|
t.Run("with a too slow response", func(t *testing.T) {
|
|
done := make(chan bool)
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
<-done
|
|
_, err := io.Copy(w, strings.NewReader("Hello, World!"))
|
|
require.NoError(t, err)
|
|
}))
|
|
t.Cleanup(server.Close)
|
|
|
|
th.App.UpdateConfig(func(cfg *model.Config) {
|
|
cfg.ServiceSettings.OutgoingIntegrationRequestsTimeout = model.NewPointer(int64(1))
|
|
})
|
|
|
|
_, _, err := th.App.DoCommandRequest(th.Context, &model.Command{URL: server.URL}, url.Values{})
|
|
require.NotNil(t, err)
|
|
require.Equal(t, "api.command.execute_command.failed.app_error", err.Id)
|
|
close(done)
|
|
})
|
|
|
|
t.Run("with a too slow response, long timeout configured", func(t *testing.T) {
|
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
time.Sleep(1 * time.Second)
|
|
|
|
_, err := io.Copy(w, strings.NewReader("Hello, World!"))
|
|
require.NoError(t, err)
|
|
}))
|
|
t.Cleanup(server.Close)
|
|
|
|
th.App.UpdateConfig(func(cfg *model.Config) {
|
|
cfg.ServiceSettings.OutgoingIntegrationRequestsTimeout = model.NewPointer(int64(2))
|
|
})
|
|
|
|
_, resp, appErr := th.App.DoCommandRequest(th.Context, &model.Command{URL: server.URL}, url.Values{})
|
|
require.Nil(t, appErr)
|
|
require.NotNil(t, resp)
|
|
assert.Equal(t, "Hello, World!", resp.Text)
|
|
})
|
|
|
|
t.Run("with a url that matches an outgoing oauth connection", func(t *testing.T) {
|
|
outgoingOauthIface := &mocks.OutgoingOAuthConnectionInterface{}
|
|
outgoingOauthImpl := th.App.Srv().OutgoingOAuthConnection
|
|
outgoingOAuthConnectionConfig := th.App.Config().ServiceSettings.EnableOutgoingOAuthConnections
|
|
th.App.Config().ServiceSettings.EnableOutgoingOAuthConnections = model.NewPointer(true)
|
|
t.Cleanup(func() {
|
|
th.App.Srv().OutgoingOAuthConnection = outgoingOauthImpl
|
|
th.App.Config().ServiceSettings.EnableOutgoingOAuthConnections = outgoingOAuthConnectionConfig
|
|
})
|
|
th.App.Srv().OutgoingOAuthConnection = outgoingOauthIface
|
|
|
|
serverCommand := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
_, err := io.Copy(w, strings.NewReader(r.Header.Get("Authorization")))
|
|
require.NoError(t, err)
|
|
}))
|
|
t.Cleanup(serverCommand.Close)
|
|
|
|
connection := &model.OutgoingOAuthConnection{
|
|
Id: model.NewId(),
|
|
Name: "test",
|
|
ClientId: "test",
|
|
ClientSecret: "test",
|
|
CreatorId: model.NewId(),
|
|
OAuthTokenURL: "fake",
|
|
GrantType: model.OutgoingOAuthConnectionGrantTypeClientCredentials,
|
|
Audiences: model.StringArray{
|
|
serverCommand.URL,
|
|
},
|
|
}
|
|
|
|
outgoingOauthIface.Mock.On("GetConnectionForAudience", mock.Anything, serverCommand.URL).Return(connection, nil)
|
|
outgoingOauthIface.Mock.On("SanitizeConnections", mock.Anything)
|
|
outgoingOauthIface.Mock.On("RetrieveTokenForConnection", mock.Anything, connection).Return(&model.OutgoingOAuthConnectionToken{
|
|
AccessToken: "token",
|
|
TokenType: "type",
|
|
}, nil)
|
|
|
|
_, resp, err := th.App.DoCommandRequest(th.Context, &model.Command{URL: serverCommand.URL}, url.Values{})
|
|
require.Nil(t, err)
|
|
|
|
require.NotNil(t, resp)
|
|
// Ensure that the Authorization header was set correctly by reading the body from the command response
|
|
// which was set to the Authorization header by the command handler.
|
|
assert.Equal(t, "type token", resp.Text)
|
|
})
|
|
}
|
|
|
|
func TestMentionsToTeamMembers(t *testing.T) {
|
|
th := setup(t).initBasic(t)
|
|
|
|
otherTeam := th.createTeam(t)
|
|
otherUser := th.createUser(t)
|
|
th.linkUserToTeam(t, otherUser, otherTeam)
|
|
|
|
fixture := []struct {
|
|
message string
|
|
inTeam string
|
|
expectedMap model.UserMentionMap
|
|
}{
|
|
{
|
|
"",
|
|
th.BasicTeam.Id,
|
|
model.UserMentionMap{},
|
|
},
|
|
{
|
|
"/trigger",
|
|
th.BasicTeam.Id,
|
|
model.UserMentionMap{},
|
|
},
|
|
{
|
|
"/trigger 0 mentions",
|
|
th.BasicTeam.Id,
|
|
model.UserMentionMap{},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger 1 valid user @%s", th.BasicUser.Username),
|
|
th.BasicTeam.Id,
|
|
model.UserMentionMap{th.BasicUser.Username: th.BasicUser.Id},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger 2 valid users @%s @%s",
|
|
th.BasicUser.Username, th.BasicUser2.Username,
|
|
),
|
|
th.BasicTeam.Id,
|
|
model.UserMentionMap{
|
|
th.BasicUser.Username: th.BasicUser.Id,
|
|
th.BasicUser2.Username: th.BasicUser2.Id,
|
|
},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger 1 user from another team @%s", otherUser.Username),
|
|
th.BasicTeam.Id,
|
|
model.UserMentionMap{},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger 2 valid users + 1 from another team @%s @%s @%s",
|
|
th.BasicUser.Username, th.BasicUser2.Username, otherUser.Username,
|
|
),
|
|
th.BasicTeam.Id,
|
|
model.UserMentionMap{
|
|
th.BasicUser.Username: th.BasicUser.Id,
|
|
th.BasicUser2.Username: th.BasicUser2.Id,
|
|
},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger a valid channel ~%s", th.BasicChannel.Name),
|
|
th.BasicTeam.Id,
|
|
model.UserMentionMap{},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger channel and mentions ~%s @%s",
|
|
th.BasicChannel.Name, th.BasicUser.Username),
|
|
th.BasicTeam.Id,
|
|
model.UserMentionMap{th.BasicUser.Username: th.BasicUser.Id},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger repeated users @%s @%s @%s",
|
|
th.BasicUser.Username, th.BasicUser2.Username, th.BasicUser.Username),
|
|
th.BasicTeam.Id,
|
|
model.UserMentionMap{
|
|
th.BasicUser.Username: th.BasicUser.Id,
|
|
th.BasicUser2.Username: th.BasicUser2.Id,
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, data := range fixture {
|
|
actualMap := th.App.MentionsToTeamMembers(th.Context, data.message, data.inTeam)
|
|
require.Equal(t, actualMap, data.expectedMap)
|
|
}
|
|
}
|
|
|
|
func TestMentionsToPublicChannels(t *testing.T) {
|
|
th := setup(t).initBasic(t)
|
|
|
|
otherPublicChannel := th.CreateChannel(t, th.BasicTeam)
|
|
privateChannel := th.createPrivateChannel(t, th.BasicTeam)
|
|
|
|
fixture := []struct {
|
|
message string
|
|
inTeam string
|
|
expectedMap model.ChannelMentionMap
|
|
}{
|
|
{
|
|
"",
|
|
th.BasicTeam.Id,
|
|
model.ChannelMentionMap{},
|
|
},
|
|
{
|
|
"/trigger",
|
|
th.BasicTeam.Id,
|
|
model.ChannelMentionMap{},
|
|
},
|
|
{
|
|
"/trigger 0 mentions",
|
|
th.BasicTeam.Id,
|
|
model.ChannelMentionMap{},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger 1 public channel ~%s", th.BasicChannel.Name),
|
|
th.BasicTeam.Id,
|
|
model.ChannelMentionMap{th.BasicChannel.Name: th.BasicChannel.Id},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger 2 public channels ~%s ~%s",
|
|
th.BasicChannel.Name, otherPublicChannel.Name,
|
|
),
|
|
th.BasicTeam.Id,
|
|
model.ChannelMentionMap{
|
|
th.BasicChannel.Name: th.BasicChannel.Id,
|
|
otherPublicChannel.Name: otherPublicChannel.Id,
|
|
},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger 1 private channel ~%s", privateChannel.Name),
|
|
th.BasicTeam.Id,
|
|
model.ChannelMentionMap{},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger 2 public channel + 1 private ~%s ~%s ~%s",
|
|
th.BasicChannel.Name, otherPublicChannel.Name, privateChannel.Name,
|
|
),
|
|
th.BasicTeam.Id,
|
|
model.ChannelMentionMap{
|
|
th.BasicChannel.Name: th.BasicChannel.Id,
|
|
otherPublicChannel.Name: otherPublicChannel.Id,
|
|
},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger a valid user @%s", th.BasicUser.Username),
|
|
th.BasicTeam.Id,
|
|
model.ChannelMentionMap{},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger channel and mentions ~%s @%s",
|
|
th.BasicChannel.Name, th.BasicUser.Username),
|
|
th.BasicTeam.Id,
|
|
model.ChannelMentionMap{th.BasicChannel.Name: th.BasicChannel.Id},
|
|
},
|
|
{
|
|
fmt.Sprintf("/trigger repeated channels ~%s ~%s ~%s",
|
|
th.BasicChannel.Name, otherPublicChannel.Name, th.BasicChannel.Name),
|
|
th.BasicTeam.Id,
|
|
model.ChannelMentionMap{
|
|
th.BasicChannel.Name: th.BasicChannel.Id,
|
|
otherPublicChannel.Name: otherPublicChannel.Id,
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, data := range fixture {
|
|
actualMap := th.App.MentionsToPublicChannels(th.Context, data.message, data.inTeam)
|
|
require.Equal(t, actualMap, data.expectedMap)
|
|
}
|
|
}
|