mattermost-community-enterp.../cmd/mmctl/commands/token_e2e_test.go
Claude ec1f89217a Merge: Complete Mattermost Server with Community Enterprise
Full Mattermost server source with integrated Community Enterprise features.
Includes vendor directory for offline/air-gapped builds.

Structure:
- enterprise-impl/: Enterprise feature implementations
- enterprise-community/: Init files that register implementations
- enterprise/: Bridge imports (community_imports.go)
- vendor/: All dependencies for offline builds

Build (online):
  go build ./cmd/mattermost

Build (offline/air-gapped):
  go build -mod=vendor ./cmd/mattermost

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2025-12-17 23:59:07 +09:00

142 lines
5.1 KiB
Go

// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
// See LICENSE.txt for license information.
package commands
import (
"fmt"
"github.com/mattermost/mattermost/server/public/model"
"github.com/spf13/cobra"
"github.com/mattermost/mattermost/server/v8/cmd/mmctl/client"
"github.com/mattermost/mattermost/server/v8/cmd/mmctl/printer"
)
func (s *MmctlE2ETestSuite) TestTokenGenerateForUserCmd() {
s.SetupTestHelper().InitBasic()
tokenDescription := model.NewRandomString(10)
previousVal := s.th.App.Config().ServiceSettings.EnableUserAccessTokens
s.th.App.UpdateConfig(func(cfg *model.Config) { *cfg.ServiceSettings.EnableUserAccessTokens = true })
defer s.th.App.UpdateConfig(func(cfg *model.Config) { *cfg.ServiceSettings.EnableUserAccessTokens = *previousVal })
s.RunForSystemAdminAndLocal("Generate token for user", func(c client.Client) {
printer.Clean()
user, appErr := s.th.App.CreateUser(s.th.Context, &model.User{Email: s.th.GenerateTestEmail(), Username: model.NewUsername(), Password: model.NewId()})
s.Require().Nil(appErr)
err := generateTokenForAUserCmdF(c, &cobra.Command{}, []string{user.Email, tokenDescription})
s.Require().Nil(err)
s.Require().Len(printer.GetErrorLines(), 0)
userTokens, appErr := s.th.App.GetUserAccessTokensForUser(user.Id, 0, 1)
s.Require().Nil(appErr)
s.Require().Equal(1, len(userTokens))
userToken, appErr := s.th.App.GetUserAccessToken(userTokens[0].Id, false)
s.Require().Nil(appErr)
expectedUserToken := printer.GetLines()[0].(*model.UserAccessToken)
s.Require().Equal(expectedUserToken, userToken)
})
s.RunForSystemAdminAndLocal("Generate token for nonexistent user", func(c client.Client) {
printer.Clean()
nonExistentUserEmail := s.th.GenerateTestEmail()
err := generateTokenForAUserCmdF(c, &cobra.Command{}, []string{nonExistentUserEmail, tokenDescription})
s.Require().NotNil(err)
s.Require().Len(printer.GetLines(), 0)
s.Require().Len(printer.GetErrorLines(), 0)
s.Require().Equal(
fmt.Sprintf(`could not retrieve user information of %q`, nonExistentUserEmail),
err.Error())
})
s.Run("Generate token without permission", func() {
printer.Clean()
user, appErr := s.th.App.CreateUser(s.th.Context, &model.User{Email: s.th.GenerateTestEmail(), Username: model.NewUsername(), Password: model.NewId()})
s.Require().Nil(appErr)
err := generateTokenForAUserCmdF(s.th.Client, &cobra.Command{}, []string{user.Email, tokenDescription})
s.Require().NotNil(err)
s.Require().Len(printer.GetLines(), 0)
s.Require().Len(printer.GetErrorLines(), 0)
s.Require().ErrorContains(
err,
fmt.Sprintf(`could not create token for %q: You do not have the appropriate permissions.`, user.Email),
)
userTokens, appErr := s.th.App.GetUserAccessTokensForUser(user.Id, 0, 1)
s.Require().Nil(appErr)
s.Require().Equal(0, len(userTokens))
})
}
func (s *MmctlE2ETestSuite) TestRevokeTokenForAUserCmdF() {
s.SetupTestHelper().InitBasic()
previousVal := s.th.App.Config().ServiceSettings.EnableUserAccessTokens
s.th.App.UpdateConfig(func(cfg *model.Config) { *cfg.ServiceSettings.EnableUserAccessTokens = true })
defer s.th.App.UpdateConfig(func(cfg *model.Config) { *cfg.ServiceSettings.EnableUserAccessTokens = *previousVal })
s.RunForSystemAdminAndLocal("Revoke user access tokens", func(c client.Client) {
printer.Clean()
user, appErr := s.th.App.CreateUser(s.th.Context, &model.User{Email: s.th.GenerateTestEmail(), Username: model.NewUsername(), Password: model.NewId()})
s.Require().Nil(appErr)
token, appErr := s.th.App.CreateUserAccessToken(s.th.Context, &model.UserAccessToken{
UserId: user.Id,
Description: "test token",
})
s.Require().Nil(appErr)
err := revokeTokenForAUserCmdF(c, &cobra.Command{}, []string{token.Id})
s.Require().NoError(err)
s.Require().Len(printer.GetLines(), 0)
s.Require().Len(printer.GetErrorLines(), 0)
_, appErr = s.th.App.GetUserAccessToken(token.Id, false)
s.Require().Error(appErr)
s.Require().Contains(appErr.Error(), "not found")
})
s.RunForSystemAdminAndLocal("Fail to revoke non-existent token", func(c client.Client) {
printer.Clean()
err := revokeTokenForAUserCmdF(c, &cobra.Command{}, []string{"non-existent-token-id"})
s.Require().Error(err)
s.Require().Contains(err.Error(), "could not revoke token")
s.Require().Len(printer.GetLines(), 0)
s.Require().Len(printer.GetErrorLines(), 0)
})
s.Run("Revoke token without permission", func() {
printer.Clean()
user, appErr := s.th.App.CreateUser(s.th.Context, &model.User{Email: s.th.GenerateTestEmail(), Username: model.NewUsername(), Password: model.NewId()})
s.Require().Nil(appErr)
token, appErr := s.th.App.CreateUserAccessToken(s.th.Context, &model.UserAccessToken{
UserId: user.Id,
Description: "test token",
})
s.Require().Nil(appErr)
err := revokeTokenForAUserCmdF(s.th.Client, &cobra.Command{}, []string{token.Id})
s.Require().Error(err)
s.Require().Len(printer.GetLines(), 0)
s.Require().Len(printer.GetErrorLines(), 0)
s.Require().ErrorContains(
err,
fmt.Sprintf(`could not revoke token %q: You do not have the appropriate permissions.`, token.Id),
)
})
}