2022-12-29 01:55:11 +01:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2022-12-29 04:16:11 +01:00
|
|
|
"fmt"
|
2022-12-29 01:55:11 +01:00
|
|
|
"github.com/stretchr/testify/require"
|
2023-01-28 05:10:59 +01:00
|
|
|
"heckel.io/ntfy/log"
|
2022-12-29 04:16:11 +01:00
|
|
|
"heckel.io/ntfy/user"
|
2022-12-29 01:55:11 +01:00
|
|
|
"heckel.io/ntfy/util"
|
|
|
|
"io"
|
2023-01-29 02:29:06 +01:00
|
|
|
"net/netip"
|
2023-01-26 04:26:04 +01:00
|
|
|
"strings"
|
2022-12-29 01:55:11 +01:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
2022-12-29 04:16:11 +01:00
|
|
|
func TestAccount_Signup_Success(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
2022-12-29 01:55:11 +01:00
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
2022-12-29 01:55:11 +01:00
|
|
|
|
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"phil", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2022-12-31 22:08:49 +01:00
|
|
|
token, _ := util.UnmarshalJSON[apiAccountTokenResponse](io.NopCloser(rr.Body))
|
2022-12-29 01:55:11 +01:00
|
|
|
require.NotEmpty(t, token.Token)
|
|
|
|
require.True(t, time.Now().Add(71*time.Hour).Unix() < token.Expires)
|
2023-01-29 02:29:06 +01:00
|
|
|
require.True(t, strings.HasPrefix(token.Token, "tk_"))
|
|
|
|
require.Equal(t, "9.9.9.9", token.LastOrigin)
|
|
|
|
require.True(t, token.LastAccess > time.Now().Unix()-1)
|
|
|
|
require.True(t, token.LastAccess < time.Now().Unix()+1)
|
2022-12-29 01:55:11 +01:00
|
|
|
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BearerAuth(token.Token),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2022-12-31 22:08:49 +01:00
|
|
|
account, _ := util.UnmarshalJSON[apiAccountResponse](io.NopCloser(rr.Body))
|
2022-12-29 01:55:11 +01:00
|
|
|
require.Equal(t, "phil", account.Username)
|
|
|
|
require.Equal(t, "user", account.Role)
|
2023-01-29 22:15:08 +01:00
|
|
|
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("", token.Token), // We allow a fake basic auth to make curl-ing easier (curl -u :<token>)
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
account, _ = util.UnmarshalJSON[apiAccountResponse](io.NopCloser(rr.Body))
|
|
|
|
require.Equal(t, "phil", account.Username)
|
2022-12-29 01:55:11 +01:00
|
|
|
}
|
|
|
|
|
2022-12-29 04:16:11 +01:00
|
|
|
func TestAccount_Signup_UserExists(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
2022-12-29 04:16:11 +01:00
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
2022-12-29 04:16:11 +01:00
|
|
|
|
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"phil", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "POST", "/v1/account", `{"username":"phil", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 409, rr.Code)
|
|
|
|
require.Equal(t, 40901, toHTTPError(t, rr.Body.String()).Code)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAccount_Signup_LimitReached(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
2022-12-29 04:16:11 +01:00
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
2022-12-29 04:16:11 +01:00
|
|
|
|
|
|
|
for i := 0; i < 3; i++ {
|
|
|
|
rr := request(t, s, "POST", "/v1/account", fmt.Sprintf(`{"username":"phil%d", "password":"mypass"}`, i), nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
}
|
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"thiswontwork", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 429, rr.Code)
|
|
|
|
require.Equal(t, 42906, toHTTPError(t, rr.Body.String()).Code)
|
|
|
|
}
|
|
|
|
|
2022-12-29 15:57:42 +01:00
|
|
|
func TestAccount_Signup_AsUser(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
2022-12-29 15:57:42 +01:00
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
2022-12-29 15:57:42 +01:00
|
|
|
|
2023-01-28 15:03:14 +01:00
|
|
|
log.Info("1")
|
2023-01-23 04:21:30 +01:00
|
|
|
require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin))
|
2023-01-28 15:03:14 +01:00
|
|
|
log.Info("2")
|
2023-01-23 04:21:30 +01:00
|
|
|
require.Nil(t, s.userManager.AddUser("ben", "ben", user.RoleUser))
|
2023-01-28 15:03:14 +01:00
|
|
|
log.Info("3")
|
2022-12-29 15:57:42 +01:00
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"emma", "password":"emma"}`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2023-01-28 15:03:14 +01:00
|
|
|
log.Info("4")
|
2022-12-29 15:57:42 +01:00
|
|
|
rr = request(t, s, "POST", "/v1/account", `{"username":"marian", "password":"marian"}`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("ben", "ben"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 401, rr.Code)
|
|
|
|
}
|
|
|
|
|
2022-12-29 04:16:11 +01:00
|
|
|
func TestAccount_Signup_Disabled(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
2022-12-29 01:55:11 +01:00
|
|
|
conf.EnableSignup = false
|
|
|
|
s := newTestServer(t, conf)
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
2022-12-29 01:55:11 +01:00
|
|
|
|
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"phil", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 400, rr.Code)
|
|
|
|
require.Equal(t, 40022, toHTTPError(t, rr.Body.String()).Code)
|
|
|
|
}
|
2022-12-29 04:16:11 +01:00
|
|
|
|
2023-01-26 04:26:04 +01:00
|
|
|
func TestAccount_Signup_Rate_Limit(t *testing.T) {
|
|
|
|
conf := newTestConfigWithAuthFile(t)
|
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
|
|
|
|
|
|
|
for i := 0; i < 3; i++ {
|
|
|
|
rr := request(t, s, "POST", "/v1/account", fmt.Sprintf(`{"username":"phil%d", "password":"mypass"}`, i), nil)
|
|
|
|
require.Equal(t, 200, rr.Code, "failed on iteration %d", i)
|
|
|
|
}
|
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"notallowed", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 429, rr.Code)
|
|
|
|
require.Equal(t, 42906, toHTTPError(t, rr.Body.String()).Code)
|
|
|
|
}
|
|
|
|
|
2022-12-29 04:16:11 +01:00
|
|
|
func TestAccount_Get_Anonymous(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
2022-12-29 04:16:11 +01:00
|
|
|
conf.VisitorRequestLimitReplenish = 86 * time.Second
|
|
|
|
conf.VisitorEmailLimitReplenish = time.Hour
|
|
|
|
conf.VisitorAttachmentTotalSizeLimit = 5123
|
|
|
|
conf.AttachmentFileSizeLimit = 512
|
|
|
|
s := newTestServer(t, conf)
|
|
|
|
s.smtpSender = &testMailer{}
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
2022-12-29 04:16:11 +01:00
|
|
|
|
|
|
|
rr := request(t, s, "GET", "/v1/account", "", nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2022-12-31 22:08:49 +01:00
|
|
|
account, _ := util.UnmarshalJSON[apiAccountResponse](io.NopCloser(rr.Body))
|
2022-12-29 04:16:11 +01:00
|
|
|
require.Equal(t, "*", account.Username)
|
|
|
|
require.Equal(t, string(user.RoleAnonymous), account.Role)
|
|
|
|
require.Equal(t, "ip", account.Limits.Basis)
|
|
|
|
require.Equal(t, int64(1004), account.Limits.Messages) // I hate this
|
|
|
|
require.Equal(t, int64(24), account.Limits.Emails) // I hate this
|
|
|
|
require.Equal(t, int64(5123), account.Limits.AttachmentTotalSize)
|
|
|
|
require.Equal(t, int64(512), account.Limits.AttachmentFileSize)
|
|
|
|
require.Equal(t, int64(0), account.Stats.Messages)
|
|
|
|
require.Equal(t, int64(1004), account.Stats.MessagesRemaining)
|
|
|
|
require.Equal(t, int64(0), account.Stats.Emails)
|
|
|
|
require.Equal(t, int64(24), account.Stats.EmailsRemaining)
|
|
|
|
|
|
|
|
rr = request(t, s, "POST", "/mytopic", "", nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
rr = request(t, s, "POST", "/mytopic", "", map[string]string{
|
|
|
|
"Email": "phil@ntfy.sh",
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2022-12-31 22:08:49 +01:00
|
|
|
account, _ = util.UnmarshalJSON[apiAccountResponse](io.NopCloser(rr.Body))
|
2022-12-29 04:16:11 +01:00
|
|
|
require.Equal(t, int64(2), account.Stats.Messages)
|
|
|
|
require.Equal(t, int64(1002), account.Stats.MessagesRemaining)
|
|
|
|
require.Equal(t, int64(1), account.Stats.Emails)
|
|
|
|
require.Equal(t, int64(23), account.Stats.EmailsRemaining)
|
|
|
|
}
|
|
|
|
|
2022-12-29 15:57:42 +01:00
|
|
|
func TestAccount_ChangeSettings(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
s := newTestServer(t, newTestConfigWithAuthFile(t))
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
|
|
|
|
2023-01-23 04:21:30 +01:00
|
|
|
require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleUser))
|
2023-01-28 05:10:59 +01:00
|
|
|
u, _ := s.userManager.User("phil")
|
2023-01-29 02:29:06 +01:00
|
|
|
token, _ := s.userManager.CreateToken(u.ID, "", time.Unix(0, 0), netip.IPv4Unspecified())
|
2022-12-29 15:57:42 +01:00
|
|
|
|
|
|
|
rr := request(t, s, "PATCH", "/v1/account/settings", `{"notification": {"sound": "juntos"},"ignored": true}`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "PATCH", "/v1/account/settings", `{"notification": {"delete_after": 86400}, "language": "de"}`, map[string]string{
|
|
|
|
"Authorization": util.BearerAuth(token.Value),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "GET", "/v1/account", `{"username":"marian", "password":"marian"}`, map[string]string{
|
|
|
|
"Authorization": util.BearerAuth(token.Value),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2022-12-31 22:08:49 +01:00
|
|
|
account, _ := util.UnmarshalJSON[apiAccountResponse](io.NopCloser(rr.Body))
|
2022-12-29 15:57:42 +01:00
|
|
|
require.Equal(t, "de", account.Language)
|
2023-01-25 16:05:54 +01:00
|
|
|
require.Equal(t, util.Int(86400), account.Notification.DeleteAfter)
|
|
|
|
require.Equal(t, util.String("juntos"), account.Notification.Sound)
|
|
|
|
require.Nil(t, account.Notification.MinPriority) // Not set
|
2022-12-29 15:57:42 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestAccount_Subscription_AddUpdateDelete(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
s := newTestServer(t, newTestConfigWithAuthFile(t))
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
|
|
|
|
2023-01-23 04:21:30 +01:00
|
|
|
require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleUser))
|
2022-12-29 15:57:42 +01:00
|
|
|
|
|
|
|
rr := request(t, s, "POST", "/v1/account/subscription", `{"base_url": "http://abc.com", "topic": "def"}`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2022-12-31 22:08:49 +01:00
|
|
|
account, _ := util.UnmarshalJSON[apiAccountResponse](io.NopCloser(rr.Body))
|
2022-12-29 15:57:42 +01:00
|
|
|
require.Equal(t, 1, len(account.Subscriptions))
|
|
|
|
require.NotEmpty(t, account.Subscriptions[0].ID)
|
|
|
|
require.Equal(t, "http://abc.com", account.Subscriptions[0].BaseURL)
|
|
|
|
require.Equal(t, "def", account.Subscriptions[0].Topic)
|
2023-01-25 16:05:54 +01:00
|
|
|
require.Nil(t, account.Subscriptions[0].DisplayName)
|
2022-12-29 15:57:42 +01:00
|
|
|
|
|
|
|
subscriptionID := account.Subscriptions[0].ID
|
|
|
|
rr = request(t, s, "PATCH", "/v1/account/subscription/"+subscriptionID, `{"display_name": "ding dong"}`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2022-12-31 22:08:49 +01:00
|
|
|
account, _ = util.UnmarshalJSON[apiAccountResponse](io.NopCloser(rr.Body))
|
2022-12-29 15:57:42 +01:00
|
|
|
require.Equal(t, 1, len(account.Subscriptions))
|
|
|
|
require.Equal(t, subscriptionID, account.Subscriptions[0].ID)
|
|
|
|
require.Equal(t, "http://abc.com", account.Subscriptions[0].BaseURL)
|
|
|
|
require.Equal(t, "def", account.Subscriptions[0].Topic)
|
2023-01-25 16:05:54 +01:00
|
|
|
require.Equal(t, util.String("ding dong"), account.Subscriptions[0].DisplayName)
|
2022-12-29 15:57:42 +01:00
|
|
|
|
|
|
|
rr = request(t, s, "DELETE", "/v1/account/subscription/"+subscriptionID, "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2022-12-31 22:08:49 +01:00
|
|
|
account, _ = util.UnmarshalJSON[apiAccountResponse](io.NopCloser(rr.Body))
|
2022-12-29 15:57:42 +01:00
|
|
|
require.Equal(t, 0, len(account.Subscriptions))
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAccount_ChangePassword(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
s := newTestServer(t, newTestConfigWithAuthFile(t))
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
|
|
|
|
2023-01-23 04:21:30 +01:00
|
|
|
require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleUser))
|
2022-12-29 15:57:42 +01:00
|
|
|
|
2023-01-29 22:15:08 +01:00
|
|
|
rr := request(t, s, "POST", "/v1/account/password", `{"password": "WRONG", "new_password": ""}`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 400, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "POST", "/v1/account/password", `{"password": "WRONG", "new_password": "new password"}`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 400, rr.Code)
|
2023-02-03 01:07:16 +01:00
|
|
|
require.Equal(t, 40026, toHTTPError(t, rr.Body.String()).Code)
|
2023-01-29 22:15:08 +01:00
|
|
|
|
|
|
|
rr = request(t, s, "POST", "/v1/account/password", `{"password": "phil", "new_password": "new password"}`, map[string]string{
|
2022-12-29 15:57:42 +01:00
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 401, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "new password"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAccount_ChangePassword_NoAccount(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
s := newTestServer(t, newTestConfigWithAuthFile(t))
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
2022-12-29 15:57:42 +01:00
|
|
|
|
|
|
|
rr := request(t, s, "POST", "/v1/account/password", `{"password": "new password"}`, nil)
|
|
|
|
require.Equal(t, 401, rr.Code)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAccount_ExtendToken(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
s := newTestServer(t, newTestConfigWithAuthFile(t))
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
|
|
|
|
2023-01-23 04:21:30 +01:00
|
|
|
require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleUser))
|
2022-12-29 15:57:42 +01:00
|
|
|
|
|
|
|
rr := request(t, s, "POST", "/v1/account/token", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2022-12-31 22:08:49 +01:00
|
|
|
token, err := util.UnmarshalJSON[apiAccountTokenResponse](io.NopCloser(rr.Body))
|
2022-12-29 15:57:42 +01:00
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
time.Sleep(time.Second)
|
|
|
|
|
|
|
|
rr = request(t, s, "PATCH", "/v1/account/token", "", map[string]string{
|
|
|
|
"Authorization": util.BearerAuth(token.Token),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2022-12-31 22:08:49 +01:00
|
|
|
extendedToken, err := util.UnmarshalJSON[apiAccountTokenResponse](io.NopCloser(rr.Body))
|
2022-12-29 15:57:42 +01:00
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, token.Token, extendedToken.Token)
|
|
|
|
require.True(t, token.Expires < extendedToken.Expires)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAccount_ExtendToken_NoTokenProvided(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
s := newTestServer(t, newTestConfigWithAuthFile(t))
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
|
|
|
|
2023-01-23 04:21:30 +01:00
|
|
|
require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleUser))
|
2022-12-29 15:57:42 +01:00
|
|
|
|
|
|
|
rr := request(t, s, "PATCH", "/v1/account/token", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"), // Not Bearer!
|
|
|
|
})
|
|
|
|
require.Equal(t, 400, rr.Code)
|
|
|
|
require.Equal(t, 40023, toHTTPError(t, rr.Body.String()).Code)
|
|
|
|
}
|
|
|
|
|
2022-12-31 16:16:14 +01:00
|
|
|
func TestAccount_DeleteToken(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
s := newTestServer(t, newTestConfigWithAuthFile(t))
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
|
|
|
|
2023-01-23 04:21:30 +01:00
|
|
|
require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleUser))
|
2022-12-31 16:16:14 +01:00
|
|
|
|
|
|
|
rr := request(t, s, "POST", "/v1/account/token", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2022-12-31 22:08:49 +01:00
|
|
|
token, err := util.UnmarshalJSON[apiAccountTokenResponse](io.NopCloser(rr.Body))
|
2022-12-31 16:16:14 +01:00
|
|
|
require.Nil(t, err)
|
2023-01-28 05:10:59 +01:00
|
|
|
require.True(t, token.Expires > time.Now().Add(71*time.Hour).Unix())
|
2022-12-31 16:16:14 +01:00
|
|
|
|
|
|
|
// Delete token failure (using basic auth)
|
|
|
|
rr = request(t, s, "DELETE", "/v1/account/token", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"), // Not Bearer!
|
|
|
|
})
|
|
|
|
require.Equal(t, 400, rr.Code)
|
|
|
|
require.Equal(t, 40023, toHTTPError(t, rr.Body.String()).Code)
|
|
|
|
|
|
|
|
// Delete token with wrong token
|
|
|
|
rr = request(t, s, "DELETE", "/v1/account/token", "", map[string]string{
|
|
|
|
"Authorization": util.BearerAuth("invalidtoken"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 401, rr.Code)
|
|
|
|
|
|
|
|
// Delete token with correct token
|
|
|
|
rr = request(t, s, "DELETE", "/v1/account/token", "", map[string]string{
|
|
|
|
"Authorization": util.BearerAuth(token.Token),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
// Cannot get account anymore
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BearerAuth(token.Token),
|
|
|
|
})
|
|
|
|
require.Equal(t, 401, rr.Code)
|
|
|
|
}
|
|
|
|
|
2022-12-29 04:16:11 +01:00
|
|
|
func TestAccount_Delete_Success(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
2022-12-29 04:16:11 +01:00
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
|
|
|
|
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"phil", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
2023-01-23 16:58:39 +01:00
|
|
|
rr = request(t, s, "DELETE", "/v1/account", `{"password":"mypass"}`, map[string]string{
|
2022-12-29 04:16:11 +01:00
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
2023-01-23 04:21:30 +01:00
|
|
|
// Account was marked deleted
|
2022-12-29 04:16:11 +01:00
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 401, rr.Code)
|
2023-01-23 04:21:30 +01:00
|
|
|
|
|
|
|
// Cannot re-create account, since still exists
|
|
|
|
rr = request(t, s, "POST", "/v1/account", `{"username":"phil", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 409, rr.Code)
|
2022-12-29 04:16:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestAccount_Delete_Not_Allowed(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
2022-12-29 04:16:11 +01:00
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
|
|
|
|
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"phil", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "DELETE", "/v1/account", "", nil)
|
|
|
|
require.Equal(t, 401, rr.Code)
|
2023-01-23 16:58:39 +01:00
|
|
|
|
|
|
|
rr = request(t, s, "DELETE", "/v1/account", `{"password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 401, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "DELETE", "/v1/account", `{"password":"INCORRECT"}`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 400, rr.Code)
|
2023-02-03 01:07:16 +01:00
|
|
|
require.Equal(t, 40026, toHTTPError(t, rr.Body.String()).Code)
|
2022-12-29 04:16:11 +01:00
|
|
|
}
|
2023-01-06 16:45:38 +01:00
|
|
|
|
2023-01-08 03:04:13 +01:00
|
|
|
func TestAccount_Reservation_AddWithoutTierFails(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
|
|
|
|
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"phil", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
2023-01-12 16:50:09 +01:00
|
|
|
rr = request(t, s, "POST", "/v1/account/reservation", `{"topic":"mytopic", "everyone":"deny-all"}`, map[string]string{
|
2023-01-06 16:45:38 +01:00
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 401, rr.Code)
|
|
|
|
}
|
|
|
|
|
2023-01-08 03:04:13 +01:00
|
|
|
func TestAccount_Reservation_AddAdminSuccess(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
2023-02-02 21:19:37 +01:00
|
|
|
|
|
|
|
// A user, an admin, and a reservation walk into a bar
|
|
|
|
require.Nil(t, s.userManager.CreateTier(&user.Tier{
|
|
|
|
Code: "pro",
|
|
|
|
ReservationLimit: 2,
|
|
|
|
}))
|
|
|
|
require.Nil(t, s.userManager.AddUser("noadmin1", "pass", user.RoleUser))
|
|
|
|
require.Nil(t, s.userManager.ChangeTier("noadmin1", "pro"))
|
|
|
|
require.Nil(t, s.userManager.AddReservation("noadmin1", "mytopic", user.PermissionDenyAll))
|
|
|
|
|
|
|
|
require.Nil(t, s.userManager.AddUser("noadmin2", "pass", user.RoleUser))
|
|
|
|
require.Nil(t, s.userManager.ChangeTier("noadmin2", "pro"))
|
|
|
|
|
2023-01-23 04:21:30 +01:00
|
|
|
require.Nil(t, s.userManager.AddUser("phil", "adminpass", user.RoleAdmin))
|
2023-01-06 16:45:38 +01:00
|
|
|
|
2023-02-02 21:19:37 +01:00
|
|
|
// Admin can reserve topic
|
|
|
|
rr := request(t, s, "POST", "/v1/account/reservation", `{"topic":"sometopic","everyone":"deny-all"}`, map[string]string{
|
2023-01-06 16:45:38 +01:00
|
|
|
"Authorization": util.BasicAuth("phil", "adminpass"),
|
|
|
|
})
|
2023-02-02 21:19:37 +01:00
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
// User cannot reserve already reserved topic
|
|
|
|
rr = request(t, s, "POST", "/v1/account/reservation", `{"topic":"mytopic","everyone":"deny-all"}`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("noadmin2", "pass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 409, rr.Code)
|
|
|
|
|
|
|
|
// Admin cannot reserve already reserved topic
|
|
|
|
rr = request(t, s, "POST", "/v1/account/reservation", `{"topic":"mytopic","everyone":"deny-all"}`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "adminpass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 409, rr.Code)
|
|
|
|
|
|
|
|
reservations, err := s.userManager.Reservations("phil")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 1, len(reservations))
|
|
|
|
require.Equal(t, "sometopic", reservations[0].Topic)
|
|
|
|
|
|
|
|
reservations, err = s.userManager.Reservations("noadmin1")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 1, len(reservations))
|
|
|
|
require.Equal(t, "mytopic", reservations[0].Topic)
|
|
|
|
|
|
|
|
reservations, err = s.userManager.Reservations("noadmin2")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 0, len(reservations))
|
2023-01-06 16:45:38 +01:00
|
|
|
}
|
|
|
|
|
2023-01-08 03:04:13 +01:00
|
|
|
func TestAccount_Reservation_AddRemoveUserWithTierSuccess(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
|
|
|
|
|
|
|
// Create user
|
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"phil", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
2023-01-08 03:04:13 +01:00
|
|
|
// Create a tier
|
|
|
|
require.Nil(t, s.userManager.CreateTier(&user.Tier{
|
|
|
|
Code: "pro",
|
2023-01-27 04:57:18 +01:00
|
|
|
MessageLimit: 123,
|
|
|
|
MessageExpiryDuration: 86400 * time.Second,
|
|
|
|
EmailLimit: 32,
|
|
|
|
ReservationLimit: 2,
|
2023-01-08 03:04:13 +01:00
|
|
|
AttachmentFileSizeLimit: 1231231,
|
|
|
|
AttachmentTotalSizeLimit: 123123,
|
2023-01-09 21:40:46 +01:00
|
|
|
AttachmentExpiryDuration: 10800 * time.Second,
|
2023-01-25 16:05:54 +01:00
|
|
|
AttachmentBandwidthLimit: 21474836480,
|
2023-01-08 03:04:13 +01:00
|
|
|
}))
|
|
|
|
require.Nil(t, s.userManager.ChangeTier("phil", "pro"))
|
2023-01-06 16:45:38 +01:00
|
|
|
|
|
|
|
// Reserve two topics
|
2023-01-12 16:50:09 +01:00
|
|
|
rr = request(t, s, "POST", "/v1/account/reservation", `{"topic": "mytopic", "everyone":"deny-all"}`, map[string]string{
|
2023-01-06 16:45:38 +01:00
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
2023-01-12 16:50:09 +01:00
|
|
|
rr = request(t, s, "POST", "/v1/account/reservation", `{"topic": "another", "everyone":"read-only"}`, map[string]string{
|
2023-01-06 16:45:38 +01:00
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
// Trying to reserve a third should fail
|
2023-01-12 16:50:09 +01:00
|
|
|
rr = request(t, s, "POST", "/v1/account/reservation", `{"topic": "yet-another", "everyone":"deny-all"}`, map[string]string{
|
2023-01-06 16:45:38 +01:00
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 429, rr.Code)
|
|
|
|
|
|
|
|
// Modify existing should still work
|
2023-01-12 16:50:09 +01:00
|
|
|
rr = request(t, s, "POST", "/v1/account/reservation", `{"topic": "another", "everyone":"write-only"}`, map[string]string{
|
2023-01-06 16:45:38 +01:00
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
// Check account result
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
account, _ := util.UnmarshalJSON[apiAccountResponse](io.NopCloser(rr.Body))
|
2023-01-08 03:04:13 +01:00
|
|
|
require.Equal(t, "pro", account.Tier.Code)
|
|
|
|
require.Equal(t, int64(123), account.Limits.Messages)
|
|
|
|
require.Equal(t, int64(86400), account.Limits.MessagesExpiryDuration)
|
|
|
|
require.Equal(t, int64(32), account.Limits.Emails)
|
|
|
|
require.Equal(t, int64(2), account.Limits.Reservations)
|
|
|
|
require.Equal(t, int64(1231231), account.Limits.AttachmentFileSize)
|
|
|
|
require.Equal(t, int64(123123), account.Limits.AttachmentTotalSize)
|
|
|
|
require.Equal(t, int64(10800), account.Limits.AttachmentExpiryDuration)
|
2023-01-25 16:05:54 +01:00
|
|
|
require.Equal(t, int64(21474836480), account.Limits.AttachmentBandwidth)
|
2023-01-06 16:45:38 +01:00
|
|
|
require.Equal(t, 2, len(account.Reservations))
|
|
|
|
require.Equal(t, "another", account.Reservations[0].Topic)
|
|
|
|
require.Equal(t, "write-only", account.Reservations[0].Everyone)
|
|
|
|
require.Equal(t, "mytopic", account.Reservations[1].Topic)
|
|
|
|
require.Equal(t, "deny-all", account.Reservations[1].Everyone)
|
|
|
|
|
|
|
|
// Delete and re-check
|
2023-01-12 16:50:09 +01:00
|
|
|
rr = request(t, s, "DELETE", "/v1/account/reservation/another", "", map[string]string{
|
2023-01-06 16:45:38 +01:00
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
account, _ = util.UnmarshalJSON[apiAccountResponse](io.NopCloser(rr.Body))
|
|
|
|
require.Equal(t, 1, len(account.Reservations))
|
|
|
|
require.Equal(t, "mytopic", account.Reservations[0].Topic)
|
|
|
|
}
|
|
|
|
|
2023-01-08 03:04:13 +01:00
|
|
|
func TestAccount_Reservation_PublishByAnonymousFails(t *testing.T) {
|
2023-01-06 16:45:38 +01:00
|
|
|
conf := newTestConfigWithAuthFile(t)
|
|
|
|
conf.AuthDefault = user.PermissionReadWrite
|
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
|
|
|
|
2023-01-08 03:04:13 +01:00
|
|
|
// Create user with tier
|
2023-01-06 16:45:38 +01:00
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"phil", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
2023-01-08 03:04:13 +01:00
|
|
|
require.Nil(t, s.userManager.CreateTier(&user.Tier{
|
2023-01-27 04:57:18 +01:00
|
|
|
Code: "pro",
|
|
|
|
MessageLimit: 20,
|
|
|
|
ReservationLimit: 2,
|
2023-01-08 03:04:13 +01:00
|
|
|
}))
|
|
|
|
require.Nil(t, s.userManager.ChangeTier("phil", "pro"))
|
2023-01-06 16:45:38 +01:00
|
|
|
|
|
|
|
// Reserve a topic
|
2023-01-12 16:50:09 +01:00
|
|
|
rr = request(t, s, "POST", "/v1/account/reservation", `{"topic": "mytopic", "everyone":"deny-all"}`, map[string]string{
|
2023-01-06 16:45:38 +01:00
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
// Publish a message
|
|
|
|
rr = request(t, s, "POST", "/mytopic", `Howdy`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
// Publish a message (as anonymous)
|
|
|
|
rr = request(t, s, "POST", "/mytopic", `Howdy`, nil)
|
|
|
|
require.Equal(t, 403, rr.Code)
|
|
|
|
}
|
2023-01-23 20:05:41 +01:00
|
|
|
|
|
|
|
func TestAccount_Reservation_Add_Kills_Other_Subscribers(t *testing.T) {
|
|
|
|
conf := newTestConfigWithAuthFile(t)
|
|
|
|
conf.AuthDefault = user.PermissionReadWrite
|
|
|
|
conf.EnableSignup = true
|
|
|
|
s := newTestServer(t, conf)
|
2023-01-28 15:03:14 +01:00
|
|
|
defer s.closeDatabases()
|
2023-01-23 20:05:41 +01:00
|
|
|
|
|
|
|
// Create user with tier
|
|
|
|
rr := request(t, s, "POST", "/v1/account", `{"username":"phil", "password":"mypass"}`, nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
require.Nil(t, s.userManager.CreateTier(&user.Tier{
|
2023-01-27 04:57:18 +01:00
|
|
|
Code: "pro",
|
|
|
|
MessageLimit: 20,
|
|
|
|
ReservationLimit: 2,
|
2023-01-23 20:05:41 +01:00
|
|
|
}))
|
|
|
|
require.Nil(t, s.userManager.ChangeTier("phil", "pro"))
|
|
|
|
|
|
|
|
// Subscribe anonymously
|
|
|
|
anonCh, userCh := make(chan bool), make(chan bool)
|
|
|
|
go func() {
|
2023-01-29 02:29:06 +01:00
|
|
|
rr := request(t, s, "GET", "/mytopic/json", ``, nil) // This blocks until it's killed!
|
2023-01-23 20:05:41 +01:00
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
messages := toMessages(t, rr.Body.String())
|
|
|
|
require.Equal(t, 2, len(messages)) // This is the meat. We should NOT receive the second message!
|
|
|
|
require.Equal(t, "open", messages[0].Event)
|
|
|
|
require.Equal(t, "message before reservation", messages[1].Message)
|
|
|
|
anonCh <- true
|
2023-01-28 15:03:14 +01:00
|
|
|
log.Info("Anonymous subscription ended")
|
2023-01-23 20:05:41 +01:00
|
|
|
}()
|
|
|
|
|
|
|
|
// Subscribe with user
|
|
|
|
go func() {
|
2023-01-29 02:29:06 +01:00
|
|
|
rr := request(t, s, "GET", "/mytopic/json", ``, map[string]string{ // Blocks!
|
2023-01-23 20:05:41 +01:00
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
messages := toMessages(t, rr.Body.String())
|
|
|
|
require.Equal(t, 3, len(messages))
|
|
|
|
require.Equal(t, "open", messages[0].Event)
|
|
|
|
require.Equal(t, "message before reservation", messages[1].Message)
|
|
|
|
require.Equal(t, "message after reservation", messages[2].Message)
|
|
|
|
userCh <- true
|
2023-01-28 15:03:14 +01:00
|
|
|
log.Info("User subscription ended")
|
2023-01-23 20:05:41 +01:00
|
|
|
}()
|
|
|
|
|
|
|
|
// Publish message (before reservation)
|
2023-01-29 02:29:06 +01:00
|
|
|
time.Sleep(2 * time.Second) // Wait for subscribers
|
2023-01-23 20:05:41 +01:00
|
|
|
rr = request(t, s, "POST", "/mytopic", "message before reservation", nil)
|
|
|
|
require.Equal(t, 200, rr.Code)
|
2023-01-29 02:29:06 +01:00
|
|
|
time.Sleep(2 * time.Second) // Wait for subscribers to receive message
|
2023-01-23 20:05:41 +01:00
|
|
|
|
|
|
|
// Reserve a topic
|
|
|
|
rr = request(t, s, "POST", "/v1/account/reservation", `{"topic": "mytopic", "everyone":"deny-all"}`, map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
// Everyone but phil should be killed
|
2023-01-29 02:29:06 +01:00
|
|
|
select {
|
|
|
|
case <-anonCh:
|
|
|
|
case <-time.After(5 * time.Second):
|
|
|
|
t.Fatal("Waiting for anonymous subscription to be killed failed")
|
|
|
|
}
|
2023-01-23 20:05:41 +01:00
|
|
|
|
|
|
|
// Publish a message
|
|
|
|
rr = request(t, s, "POST", "/mytopic", "message after reservation", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "mypass"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
// Kill user Go routine
|
|
|
|
s.topics["mytopic"].CancelSubscribers("<invalid>")
|
2023-01-26 04:26:04 +01:00
|
|
|
|
2023-01-29 02:29:06 +01:00
|
|
|
select {
|
|
|
|
case <-userCh:
|
|
|
|
case <-time.After(5 * time.Second):
|
|
|
|
t.Fatal("Waiting for user subscription to be killed failed")
|
|
|
|
}
|
2023-01-26 04:26:04 +01:00
|
|
|
}
|
2023-01-29 03:27:05 +01:00
|
|
|
|
|
|
|
func TestAccount_Persist_UserStats_After_Tier_Change(t *testing.T) {
|
|
|
|
conf := newTestConfigWithAuthFile(t)
|
|
|
|
conf.AuthDefault = user.PermissionReadWrite
|
|
|
|
conf.AuthStatsQueueWriterInterval = 100 * time.Millisecond
|
|
|
|
s := newTestServer(t, conf)
|
|
|
|
defer s.closeDatabases()
|
|
|
|
|
|
|
|
// Create user with tier
|
|
|
|
require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleUser))
|
|
|
|
require.Nil(t, s.userManager.CreateTier(&user.Tier{
|
|
|
|
Code: "starter",
|
|
|
|
MessageLimit: 10,
|
|
|
|
}))
|
|
|
|
require.Nil(t, s.userManager.CreateTier(&user.Tier{
|
|
|
|
Code: "pro",
|
|
|
|
MessageLimit: 20,
|
|
|
|
}))
|
|
|
|
require.Nil(t, s.userManager.ChangeTier("phil", "starter"))
|
|
|
|
|
|
|
|
// Publish a message
|
|
|
|
rr := request(t, s, "POST", "/mytopic", "hi", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
// Wait for stats queue writer
|
|
|
|
time.Sleep(200 * time.Millisecond)
|
|
|
|
|
|
|
|
// Verify that message stats were persisted
|
|
|
|
u, err := s.userManager.User("phil")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, int64(1), u.Stats.Messages)
|
|
|
|
|
|
|
|
// Change tier, make a request (to reset limiters)
|
|
|
|
require.Nil(t, s.userManager.ChangeTier("phil", "pro"))
|
|
|
|
rr = request(t, s, "GET", "/v1/account", "", map[string]string{
|
|
|
|
"Authorization": util.BasicAuth("phil", "phil"),
|
|
|
|
})
|
|
|
|
require.Equal(t, 200, rr.Code)
|
|
|
|
|
|
|
|
// Verify that message stats were persisted
|
|
|
|
time.Sleep(300 * time.Millisecond)
|
|
|
|
u, err = s.userManager.User("phil")
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, int64(0), u.Stats.Messages) // v.EnqueueStats had run!
|
|
|
|
}
|