// Vikunja is a to-do list application to facilitate your life. // Copyright 2018-2021 Vikunja and contributors. All rights reserved. // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public Licensee as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public Licensee for more details. // // You should have received a copy of the GNU Affero General Public Licensee // along with this program. If not, see . package models import ( "reflect" "runtime" "testing" "time" "code.vikunja.io/api/pkg/db" "code.vikunja.io/api/pkg/user" "gopkg.in/d4l3k/messagediff.v1" "code.vikunja.io/web" ) func TestLabel_ReadAll(t *testing.T) { type fields struct { ID int64 Title string Description string HexColor string CreatedByID int64 CreatedBy *user.User Created time.Time Updated time.Time CRUDable web.CRUDable Rights web.Rights } type args struct { search string a web.Auth page int } user1 := &user.User{ ID: 1, Username: "user1", Password: "$2a$14$dcadBoMBL9jQoOcZK8Fju.cy0Ptx2oZECkKLnaa8ekRoTFe1w7To.", IsActive: true, Issuer: "local", EmailRemindersEnabled: true, Created: testCreatedTime, Updated: testUpdatedTime, } tests := []struct { name string fields fields args args wantLs interface{} wantErr bool }{ { name: "normal", args: args{ a: &user.User{ID: 1}, }, wantLs: []*labelWithTaskID{ { Label: Label{ ID: 1, Title: "Label #1", CreatedByID: 1, CreatedBy: user1, Created: testCreatedTime, Updated: testUpdatedTime, }, }, { Label: Label{ ID: 2, Title: "Label #2", CreatedByID: 1, CreatedBy: user1, Created: testCreatedTime, Updated: testUpdatedTime, }, }, { Label: Label{ ID: 4, Title: "Label #4 - visible via other task", Created: testCreatedTime, Updated: testUpdatedTime, CreatedByID: 2, CreatedBy: &user.User{ ID: 2, Username: "user2", Password: "$2a$14$dcadBoMBL9jQoOcZK8Fju.cy0Ptx2oZECkKLnaa8ekRoTFe1w7To.", Issuer: "local", EmailRemindersEnabled: true, Created: testCreatedTime, Updated: testUpdatedTime, }, }, }, }, }, { name: "invalid user", args: args{ a: &user.User{ID: -1}, }, wantErr: true, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { l := &Label{ ID: tt.fields.ID, Title: tt.fields.Title, Description: tt.fields.Description, HexColor: tt.fields.HexColor, CreatedByID: tt.fields.CreatedByID, CreatedBy: tt.fields.CreatedBy, Created: tt.fields.Created, Updated: tt.fields.Updated, CRUDable: tt.fields.CRUDable, Rights: tt.fields.Rights, } db.LoadAndAssertFixtures(t) s := db.NewSession() gotLs, _, _, err := l.ReadAll(s, tt.args.a, tt.args.search, tt.args.page, 0) if (err != nil) != tt.wantErr { t.Errorf("Label.ReadAll() error = %v, wantErr %v", err, tt.wantErr) return } if diff, equal := messagediff.PrettyDiff(gotLs, tt.wantLs); !equal { t.Errorf("Label.ReadAll() = %v, want %v, diff: %v", gotLs, tt.wantLs, diff) } s.Close() }) } } func TestLabel_ReadOne(t *testing.T) { type fields struct { ID int64 Title string Description string HexColor string CreatedByID int64 CreatedBy *user.User Created time.Time Updated time.Time CRUDable web.CRUDable Rights web.Rights } user1 := &user.User{ ID: 1, Username: "user1", Password: "$2a$14$dcadBoMBL9jQoOcZK8Fju.cy0Ptx2oZECkKLnaa8ekRoTFe1w7To.", IsActive: true, Issuer: "local", EmailRemindersEnabled: true, Created: testCreatedTime, Updated: testUpdatedTime, } tests := []struct { name string fields fields want *Label wantErr bool errType func(error) bool auth web.Auth wantForbidden bool }{ { name: "Get label #1", fields: fields{ ID: 1, }, want: &Label{ ID: 1, Title: "Label #1", CreatedByID: 1, CreatedBy: user1, Created: testCreatedTime, Updated: testUpdatedTime, }, auth: &user.User{ID: 1}, }, { name: "Get nonexistant label", fields: fields{ ID: 9999, }, wantErr: true, errType: IsErrLabelDoesNotExist, wantForbidden: true, auth: &user.User{ID: 1}, }, { name: "no rights", fields: fields{ ID: 3, }, wantForbidden: true, auth: &user.User{ID: 1}, }, { name: "Get label #4 - other user", fields: fields{ ID: 4, }, want: &Label{ ID: 4, Title: "Label #4 - visible via other task", CreatedByID: 2, CreatedBy: &user.User{ ID: 2, Username: "user2", Password: "$2a$14$dcadBoMBL9jQoOcZK8Fju.cy0Ptx2oZECkKLnaa8ekRoTFe1w7To.", Issuer: "local", EmailRemindersEnabled: true, Created: testCreatedTime, Updated: testUpdatedTime, }, Created: testCreatedTime, Updated: testUpdatedTime, }, auth: &user.User{ID: 1}, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { l := &Label{ ID: tt.fields.ID, Title: tt.fields.Title, Description: tt.fields.Description, HexColor: tt.fields.HexColor, CreatedByID: tt.fields.CreatedByID, CreatedBy: tt.fields.CreatedBy, Created: tt.fields.Created, Updated: tt.fields.Updated, CRUDable: tt.fields.CRUDable, Rights: tt.fields.Rights, } s := db.NewSession() allowed, _, _ := l.CanRead(s, tt.auth) if !allowed && !tt.wantForbidden { t.Errorf("Label.CanRead() forbidden, want %v", tt.wantForbidden) } err := l.ReadOne(s) if (err != nil) != tt.wantErr { t.Errorf("Label.ReadOne() error = %v, wantErr %v", err, tt.wantErr) } if (err != nil) && tt.wantErr && !tt.errType(err) { t.Errorf("Label.ReadOne() Wrong error type! Error = %v, want = %v", err, runtime.FuncForPC(reflect.ValueOf(tt.errType).Pointer()).Name()) } if diff, equal := messagediff.PrettyDiff(l, tt.want); !equal && !tt.wantErr && !tt.wantForbidden { t.Errorf("Label.ReadAll() = %v, want %v, diff: %v", l, tt.want, diff) } s.Close() }) } } func TestLabel_Create(t *testing.T) { type fields struct { ID int64 Title string Description string HexColor string CreatedByID int64 CreatedBy *user.User Created time.Time Updated time.Time CRUDable web.CRUDable Rights web.Rights } type args struct { a web.Auth } tests := []struct { name string fields fields args args wantErr bool wantForbidden bool }{ { name: "normal", fields: fields{ Title: "Test #1", Description: "Lorem Ipsum", HexColor: "ffccff", }, args: args{ a: &user.User{ID: 1}, }, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { l := &Label{ ID: tt.fields.ID, Title: tt.fields.Title, Description: tt.fields.Description, HexColor: tt.fields.HexColor, CreatedByID: tt.fields.CreatedByID, CreatedBy: tt.fields.CreatedBy, Created: tt.fields.Created, Updated: tt.fields.Updated, CRUDable: tt.fields.CRUDable, Rights: tt.fields.Rights, } s := db.NewSession() allowed, _ := l.CanCreate(s, tt.args.a) if !allowed && !tt.wantForbidden { t.Errorf("Label.CanCreate() forbidden, want %v", tt.wantForbidden) } if err := l.Create(s, tt.args.a); (err != nil) != tt.wantErr { t.Errorf("Label.Create() error = %v, wantErr %v", err, tt.wantErr) } if !tt.wantErr { db.AssertExists(t, "labels", map[string]interface{}{ "id": l.ID, "title": l.Title, "description": l.Description, "hex_color": l.HexColor, }, false) } _ = s.Close() }) } } func TestLabel_Update(t *testing.T) { type fields struct { ID int64 Title string Description string HexColor string CreatedByID int64 CreatedBy *user.User Created time.Time Updated time.Time CRUDable web.CRUDable Rights web.Rights } tests := []struct { name string fields fields wantErr bool auth web.Auth wantForbidden bool }{ { name: "normal", fields: fields{ ID: 1, Title: "new and better", }, auth: &user.User{ID: 1}, }, { name: "nonexisting", fields: fields{ ID: 99999, Title: "new and better", }, auth: &user.User{ID: 1}, wantForbidden: true, wantErr: true, }, { name: "no rights", fields: fields{ ID: 3, Title: "new and better", }, auth: &user.User{ID: 1}, wantForbidden: true, }, { name: "no rights other creator but access", fields: fields{ ID: 4, Title: "new and better", }, auth: &user.User{ID: 1}, wantForbidden: true, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { l := &Label{ ID: tt.fields.ID, Title: tt.fields.Title, Description: tt.fields.Description, HexColor: tt.fields.HexColor, CreatedByID: tt.fields.CreatedByID, CreatedBy: tt.fields.CreatedBy, Created: tt.fields.Created, Updated: tt.fields.Updated, CRUDable: tt.fields.CRUDable, Rights: tt.fields.Rights, } s := db.NewSession() allowed, _ := l.CanUpdate(s, tt.auth) if !allowed && !tt.wantForbidden { t.Errorf("Label.CanUpdate() forbidden, want %v", tt.wantForbidden) } if err := l.Update(s); (err != nil) != tt.wantErr { t.Errorf("Label.Update() error = %v, wantErr %v", err, tt.wantErr) } if !tt.wantErr && !tt.wantForbidden { db.AssertExists(t, "labels", map[string]interface{}{ "id": tt.fields.ID, "title": tt.fields.Title, }, false) } _ = s.Close() }) } } func TestLabel_Delete(t *testing.T) { type fields struct { ID int64 Title string Description string HexColor string CreatedByID int64 CreatedBy *user.User Created time.Time Updated time.Time CRUDable web.CRUDable Rights web.Rights } tests := []struct { name string fields fields wantErr bool auth web.Auth wantForbidden bool }{ { name: "normal", fields: fields{ ID: 1, }, auth: &user.User{ID: 1}, }, { name: "nonexisting", fields: fields{ ID: 99999, }, auth: &user.User{ID: 1}, wantForbidden: true, // When the label does not exist, it is forbidden. We should fix this, but for everything. }, { name: "no rights", fields: fields{ ID: 3, }, auth: &user.User{ID: 1}, wantForbidden: true, }, { name: "no rights but visible", fields: fields{ ID: 4, }, auth: &user.User{ID: 1}, wantForbidden: true, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { l := &Label{ ID: tt.fields.ID, Title: tt.fields.Title, Description: tt.fields.Description, HexColor: tt.fields.HexColor, CreatedByID: tt.fields.CreatedByID, CreatedBy: tt.fields.CreatedBy, Created: tt.fields.Created, Updated: tt.fields.Updated, CRUDable: tt.fields.CRUDable, Rights: tt.fields.Rights, } s := db.NewSession() allowed, _ := l.CanDelete(s, tt.auth) if !allowed && !tt.wantForbidden { t.Errorf("Label.CanDelete() forbidden, want %v", tt.wantForbidden) } if err := l.Delete(s); (err != nil) != tt.wantErr { t.Errorf("Label.Delete() error = %v, wantErr %v", err, tt.wantErr) } if !tt.wantErr && !tt.wantForbidden { db.AssertMissing(t, "labels", map[string]interface{}{ "id": l.ID, }) } _ = s.Close() }) } }