12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280 |
- // Copyright 2020 The Gogs Authors. All rights reserved.
- // Use of this source code is governed by a MIT-style
- // license that can be found in the LICENSE file.
- package db
- import (
- "context"
- "fmt"
- "os"
- "path/filepath"
- "strings"
- "testing"
- "time"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- "gorm.io/gorm"
- "gogs.io/gogs/internal/auth"
- "gogs.io/gogs/internal/conf"
- "gogs.io/gogs/internal/dbtest"
- "gogs.io/gogs/internal/dbutil"
- "gogs.io/gogs/internal/errutil"
- "gogs.io/gogs/internal/osutil"
- "gogs.io/gogs/internal/repoutil"
- "gogs.io/gogs/internal/userutil"
- "gogs.io/gogs/public"
- )
- func TestUser_BeforeCreate(t *testing.T) {
- now := time.Now()
- db := &gorm.DB{
- Config: &gorm.Config{
- SkipDefaultTransaction: true,
- NowFunc: func() time.Time {
- return now
- },
- },
- }
- t.Run("CreatedUnix has been set", func(t *testing.T) {
- user := &User{
- CreatedUnix: 1,
- }
- _ = user.BeforeCreate(db)
- assert.Equal(t, int64(1), user.CreatedUnix)
- assert.Equal(t, int64(0), user.UpdatedUnix)
- })
- t.Run("CreatedUnix has not been set", func(t *testing.T) {
- user := &User{}
- _ = user.BeforeCreate(db)
- assert.Equal(t, db.NowFunc().Unix(), user.CreatedUnix)
- assert.Equal(t, db.NowFunc().Unix(), user.UpdatedUnix)
- })
- }
- func TestUser_AfterFind(t *testing.T) {
- now := time.Now()
- db := &gorm.DB{
- Config: &gorm.Config{
- SkipDefaultTransaction: true,
- NowFunc: func() time.Time {
- return now
- },
- },
- }
- user := &User{
- FullName: "user1<script src=http://localhost:8181/xss.js>",
- CreatedUnix: now.Unix(),
- UpdatedUnix: now.Unix(),
- }
- _ = user.AfterFind(db)
- assert.Equal(t, "user1", user.FullName)
- assert.Equal(t, user.CreatedUnix, user.Created.Unix())
- assert.Equal(t, user.UpdatedUnix, user.Updated.Unix())
- }
- func TestUsers(t *testing.T) {
- if testing.Short() {
- t.Skip()
- }
- t.Parallel()
- tables := []any{
- new(User), new(EmailAddress), new(Repository), new(Follow), new(PullRequest), new(PublicKey), new(OrgUser),
- new(Watch), new(Star), new(Issue), new(AccessToken), new(Collaboration), new(Action), new(IssueUser),
- new(Access),
- }
- db := &users{
- DB: dbtest.NewDB(t, "users", tables...),
- }
- for _, tc := range []struct {
- name string
- test func(t *testing.T, db *users)
- }{
- {"Authenticate", usersAuthenticate},
- {"ChangeUsername", usersChangeUsername},
- {"Count", usersCount},
- {"Create", usersCreate},
- {"DeleteCustomAvatar", usersDeleteCustomAvatar},
- {"DeleteByID", usersDeleteByID},
- {"DeleteInactivated", usersDeleteInactivated},
- {"GetByEmail", usersGetByEmail},
- {"GetByID", usersGetByID},
- {"GetByUsername", usersGetByUsername},
- {"GetByKeyID", usersGetByKeyID},
- {"GetMailableEmailsByUsernames", usersGetMailableEmailsByUsernames},
- {"IsUsernameUsed", usersIsUsernameUsed},
- {"List", usersList},
- {"ListFollowers", usersListFollowers},
- {"ListFollowings", usersListFollowings},
- {"SearchByName", usersSearchByName},
- {"Update", usersUpdate},
- {"UseCustomAvatar", usersUseCustomAvatar},
- {"Follow", usersFollow},
- {"IsFollowing", usersIsFollowing},
- {"Unfollow", usersUnfollow},
- } {
- t.Run(tc.name, func(t *testing.T) {
- t.Cleanup(func() {
- err := clearTables(t, db.DB, tables...)
- require.NoError(t, err)
- })
- tc.test(t, db)
- })
- if t.Failed() {
- break
- }
- }
- }
- func usersAuthenticate(t *testing.T, db *users) {
- ctx := context.Background()
- password := "pa$$word"
- alice, err := db.Create(ctx, "alice", "[email protected]",
- CreateUserOptions{
- Password: password,
- },
- )
- require.NoError(t, err)
- t.Run("user not found", func(t *testing.T) {
- _, err := db.Authenticate(ctx, "bob", password, -1)
- wantErr := auth.ErrBadCredentials{Args: map[string]any{"login": "bob"}}
- assert.Equal(t, wantErr, err)
- })
- t.Run("invalid password", func(t *testing.T) {
- _, err := db.Authenticate(ctx, alice.Name, "bad_password", -1)
- wantErr := auth.ErrBadCredentials{Args: map[string]any{"login": alice.Name, "userID": alice.ID}}
- assert.Equal(t, wantErr, err)
- })
- t.Run("via email and password", func(t *testing.T) {
- user, err := db.Authenticate(ctx, alice.Email, password, -1)
- require.NoError(t, err)
- assert.Equal(t, alice.Name, user.Name)
- })
- t.Run("via username and password", func(t *testing.T) {
- user, err := db.Authenticate(ctx, alice.Name, password, -1)
- require.NoError(t, err)
- assert.Equal(t, alice.Name, user.Name)
- })
- t.Run("login source mismatch", func(t *testing.T) {
- _, err := db.Authenticate(ctx, alice.Email, password, 1)
- gotErr := fmt.Sprintf("%v", err)
- wantErr := ErrLoginSourceMismatch{args: map[string]any{"actual": 0, "expect": 1}}.Error()
- assert.Equal(t, wantErr, gotErr)
- })
- t.Run("via login source", func(t *testing.T) {
- mockLoginSources := NewMockLoginSourcesStore()
- mockLoginSources.GetByIDFunc.SetDefaultHook(func(ctx context.Context, id int64) (*LoginSource, error) {
- mockProvider := NewMockProvider()
- mockProvider.AuthenticateFunc.SetDefaultReturn(&auth.ExternalAccount{}, nil)
- s := &LoginSource{
- IsActived: true,
- Provider: mockProvider,
- }
- return s, nil
- })
- setMockLoginSourcesStore(t, mockLoginSources)
- bob, err := db.Create(ctx, "bob", "[email protected]",
- CreateUserOptions{
- Password: password,
- LoginSource: 1,
- },
- )
- require.NoError(t, err)
- user, err := db.Authenticate(ctx, bob.Email, password, 1)
- require.NoError(t, err)
- assert.Equal(t, bob.Name, user.Name)
- })
- t.Run("new user via login source", func(t *testing.T) {
- mockLoginSources := NewMockLoginSourcesStore()
- mockLoginSources.GetByIDFunc.SetDefaultHook(func(ctx context.Context, id int64) (*LoginSource, error) {
- mockProvider := NewMockProvider()
- mockProvider.AuthenticateFunc.SetDefaultReturn(
- &auth.ExternalAccount{
- Name: "cindy",
- Email: "[email protected]",
- },
- nil,
- )
- s := &LoginSource{
- IsActived: true,
- Provider: mockProvider,
- }
- return s, nil
- })
- setMockLoginSourcesStore(t, mockLoginSources)
- user, err := db.Authenticate(ctx, "cindy", password, 1)
- require.NoError(t, err)
- assert.Equal(t, "cindy", user.Name)
- user, err = db.GetByUsername(ctx, "cindy")
- require.NoError(t, err)
- assert.Equal(t, "[email protected]", user.Email)
- })
- }
- func usersChangeUsername(t *testing.T, db *users) {
- ctx := context.Background()
- alice, err := db.Create(
- ctx,
- "alice",
- "[email protected]",
- CreateUserOptions{
- Activated: true,
- },
- )
- require.NoError(t, err)
- t.Run("name not allowed", func(t *testing.T) {
- err := db.ChangeUsername(ctx, alice.ID, "-")
- wantErr := ErrNameNotAllowed{
- args: errutil.Args{
- "reason": "reserved",
- "name": "-",
- },
- }
- assert.Equal(t, wantErr, err)
- })
- t.Run("name already exists", func(t *testing.T) {
- bob, err := db.Create(
- ctx,
- "bob",
- "[email protected]",
- CreateUserOptions{
- Activated: true,
- },
- )
- require.NoError(t, err)
- err = db.ChangeUsername(ctx, alice.ID, bob.Name)
- wantErr := ErrUserAlreadyExist{
- args: errutil.Args{
- "name": bob.Name,
- },
- }
- assert.Equal(t, wantErr, err)
- })
- tempRepositoryRoot := filepath.Join(os.TempDir(), "usersChangeUsername-tempRepositoryRoot")
- conf.SetMockRepository(
- t,
- conf.RepositoryOpts{
- Root: tempRepositoryRoot,
- },
- )
- err = os.RemoveAll(tempRepositoryRoot)
- require.NoError(t, err)
- defer func() { _ = os.RemoveAll(tempRepositoryRoot) }()
- tempServerAppDataPath := filepath.Join(os.TempDir(), "usersChangeUsername-tempServerAppDataPath")
- conf.SetMockServer(
- t,
- conf.ServerOpts{
- AppDataPath: tempServerAppDataPath,
- },
- )
- err = os.RemoveAll(tempServerAppDataPath)
- require.NoError(t, err)
- defer func() { _ = os.RemoveAll(tempServerAppDataPath) }()
- repo, err := NewReposStore(db.DB).Create(
- ctx,
- alice.ID,
- CreateRepoOptions{
- Name: "test-repo-1",
- },
- )
- require.NoError(t, err)
- // TODO: Use PullRequests.Create to replace SQL hack when the method is available.
- err = db.Exec(`INSERT INTO pull_request (head_user_name) VALUES (?)`, alice.Name).Error
- require.NoError(t, err)
- err = db.Model(&User{}).Where("id = ?", alice.ID).Update("updated_unix", 0).Error
- require.NoError(t, err)
- err = os.MkdirAll(repoutil.UserPath(alice.Name), os.ModePerm)
- require.NoError(t, err)
- err = os.MkdirAll(repoutil.RepositoryLocalPath(repo.ID), os.ModePerm)
- require.NoError(t, err)
- err = os.MkdirAll(repoutil.RepositoryLocalWikiPath(repo.ID), os.ModePerm)
- require.NoError(t, err)
- // Make sure mock data is set up correctly
- // TODO: Use PullRequests.GetByID to replace SQL hack when the method is available.
- var headUserName string
- err = db.Model(&PullRequest{}).Select("head_user_name").Row().Scan(&headUserName)
- require.NoError(t, err)
- assert.Equal(t, headUserName, alice.Name)
- var updatedUnix int64
- err = db.Model(&User{}).Select("updated_unix").Where("id = ?", alice.ID).Row().Scan(&updatedUnix)
- require.NoError(t, err)
- assert.Equal(t, int64(0), updatedUnix)
- assert.True(t, osutil.IsExist(repoutil.UserPath(alice.Name)))
- assert.True(t, osutil.IsExist(repoutil.RepositoryLocalPath(repo.ID)))
- assert.True(t, osutil.IsExist(repoutil.RepositoryLocalWikiPath(repo.ID)))
- const newUsername = "alice-new"
- err = db.ChangeUsername(ctx, alice.ID, newUsername)
- require.NoError(t, err)
- // TODO: Use PullRequests.GetByID to replace SQL hack when the method is available.
- err = db.Model(&PullRequest{}).Select("head_user_name").Row().Scan(&headUserName)
- require.NoError(t, err)
- assert.Equal(t, headUserName, newUsername)
- assert.True(t, osutil.IsExist(repoutil.UserPath(newUsername)))
- assert.False(t, osutil.IsExist(repoutil.UserPath(alice.Name)))
- assert.False(t, osutil.IsExist(repoutil.RepositoryLocalPath(repo.ID)))
- assert.False(t, osutil.IsExist(repoutil.RepositoryLocalWikiPath(repo.ID)))
- alice, err = db.GetByID(ctx, alice.ID)
- require.NoError(t, err)
- assert.Equal(t, newUsername, alice.Name)
- assert.Equal(t, db.NowFunc().Unix(), alice.UpdatedUnix)
- // Change the cases of the username should just be fine
- err = db.ChangeUsername(ctx, alice.ID, strings.ToUpper(newUsername))
- require.NoError(t, err)
- alice, err = db.GetByID(ctx, alice.ID)
- require.NoError(t, err)
- assert.Equal(t, strings.ToUpper(newUsername), alice.Name)
- }
- func usersCount(t *testing.T, db *users) {
- ctx := context.Background()
- // Has no user initially
- got := db.Count(ctx)
- assert.Equal(t, int64(0), got)
- _, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- got = db.Count(ctx)
- assert.Equal(t, int64(1), got)
- // Create an organization shouldn't count
- // TODO: Use Orgs.Create to replace SQL hack when the method is available.
- org1, err := db.Create(ctx, "org1", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- err = db.Exec(
- dbutil.Quote("UPDATE %s SET type = ? WHERE id = ?", "user"),
- UserTypeOrganization, org1.ID,
- ).Error
- require.NoError(t, err)
- got = db.Count(ctx)
- assert.Equal(t, int64(1), got)
- }
- func usersCreate(t *testing.T, db *users) {
- ctx := context.Background()
- alice, err := db.Create(
- ctx,
- "alice",
- "[email protected]",
- CreateUserOptions{
- Activated: true,
- },
- )
- require.NoError(t, err)
- t.Run("name not allowed", func(t *testing.T) {
- _, err := db.Create(ctx, "-", "", CreateUserOptions{})
- wantErr := ErrNameNotAllowed{
- args: errutil.Args{
- "reason": "reserved",
- "name": "-",
- },
- }
- assert.Equal(t, wantErr, err)
- })
- t.Run("name already exists", func(t *testing.T) {
- _, err := db.Create(ctx, alice.Name, "", CreateUserOptions{})
- wantErr := ErrUserAlreadyExist{
- args: errutil.Args{
- "name": alice.Name,
- },
- }
- assert.Equal(t, wantErr, err)
- })
- t.Run("email already exists", func(t *testing.T) {
- _, err := db.Create(ctx, "bob", alice.Email, CreateUserOptions{})
- wantErr := ErrEmailAlreadyUsed{
- args: errutil.Args{
- "email": alice.Email,
- },
- }
- assert.Equal(t, wantErr, err)
- })
- user, err := db.GetByUsername(ctx, alice.Name)
- require.NoError(t, err)
- assert.Equal(t, db.NowFunc().Format(time.RFC3339), user.Created.UTC().Format(time.RFC3339))
- assert.Equal(t, db.NowFunc().Format(time.RFC3339), user.Updated.UTC().Format(time.RFC3339))
- }
- func usersDeleteCustomAvatar(t *testing.T, db *users) {
- ctx := context.Background()
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- avatar, err := public.Files.ReadFile("img/avatar_default.png")
- require.NoError(t, err)
- avatarPath := userutil.CustomAvatarPath(alice.ID)
- _ = os.Remove(avatarPath)
- defer func() { _ = os.Remove(avatarPath) }()
- err = db.UseCustomAvatar(ctx, alice.ID, avatar)
- require.NoError(t, err)
- // Make sure avatar is saved and the user flag is updated.
- got := osutil.IsFile(avatarPath)
- assert.True(t, got)
- alice, err = db.GetByID(ctx, alice.ID)
- require.NoError(t, err)
- assert.True(t, alice.UseCustomAvatar)
- // Delete avatar should remove the file and revert the user flag.
- err = db.DeleteCustomAvatar(ctx, alice.ID)
- require.NoError(t, err)
- got = osutil.IsFile(avatarPath)
- assert.False(t, got)
- alice, err = db.GetByID(ctx, alice.ID)
- require.NoError(t, err)
- assert.False(t, alice.UseCustomAvatar)
- }
- func usersDeleteByID(t *testing.T, db *users) {
- ctx := context.Background()
- reposStore := NewReposStore(db.DB)
- t.Run("user still has repository ownership", func(t *testing.T) {
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- _, err = reposStore.Create(ctx, alice.ID, CreateRepoOptions{Name: "repo1"})
- require.NoError(t, err)
- err = db.DeleteByID(ctx, alice.ID, false)
- wantErr := ErrUserOwnRepos{errutil.Args{"userID": alice.ID}}
- assert.Equal(t, wantErr, err)
- })
- t.Run("user still has organization membership", func(t *testing.T) {
- bob, err := db.Create(ctx, "bob", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- // TODO: Use Orgs.Create to replace SQL hack when the method is available.
- org1, err := db.Create(ctx, "org1", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- err = db.Exec(
- dbutil.Quote("UPDATE %s SET type = ? WHERE id IN (?)", "user"),
- UserTypeOrganization, org1.ID,
- ).Error
- require.NoError(t, err)
- // TODO: Use Orgs.Join to replace SQL hack when the method is available.
- err = db.Exec(`INSERT INTO org_user (uid, org_id) VALUES (?, ?)`, bob.ID, org1.ID).Error
- require.NoError(t, err)
- err = db.DeleteByID(ctx, bob.ID, false)
- wantErr := ErrUserHasOrgs{errutil.Args{"userID": bob.ID}}
- assert.Equal(t, wantErr, err)
- })
- cindy, err := db.Create(ctx, "cindy", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- frank, err := db.Create(ctx, "frank", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- repo2, err := reposStore.Create(ctx, cindy.ID, CreateRepoOptions{Name: "repo2"})
- require.NoError(t, err)
- testUser, err := db.Create(ctx, "testUser", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- // Mock watches, stars and follows
- err = reposStore.Watch(ctx, testUser.ID, repo2.ID)
- require.NoError(t, err)
- err = reposStore.Star(ctx, testUser.ID, repo2.ID)
- require.NoError(t, err)
- err = db.Follow(ctx, testUser.ID, cindy.ID)
- require.NoError(t, err)
- err = db.Follow(ctx, frank.ID, testUser.ID)
- require.NoError(t, err)
- // Mock "authorized_keys" file
- // TODO: Use PublicKeys.Add to replace SQL hack when the method is available.
- publicKey := &PublicKey{
- OwnerID: testUser.ID,
- Name: "test-key",
- Fingerprint: "12:f8:7e:78:61:b4:bf:e2:de:24:15:96:4e:d4:72:53",
- Content: "test-key-content",
- }
- err = db.DB.Create(publicKey).Error
- require.NoError(t, err)
- tempSSHRootPath := filepath.Join(os.TempDir(), "usersDeleteByID-tempSSHRootPath")
- conf.SetMockSSH(t, conf.SSHOpts{RootPath: tempSSHRootPath})
- err = NewPublicKeysStore(db.DB).RewriteAuthorizedKeys()
- require.NoError(t, err)
- // Mock issue assignee
- // TODO: Use Issues.Assign to replace SQL hack when the method is available.
- issue := &Issue{
- RepoID: repo2.ID,
- Index: 1,
- PosterID: cindy.ID,
- Title: "test-issue",
- AssigneeID: testUser.ID,
- }
- err = db.DB.Create(issue).Error
- require.NoError(t, err)
- // Mock random entries in related tables
- for _, table := range []any{
- &AccessToken{UserID: testUser.ID},
- &Collaboration{UserID: testUser.ID},
- &Access{UserID: testUser.ID},
- &Action{UserID: testUser.ID},
- &IssueUser{UserID: testUser.ID},
- &EmailAddress{UserID: testUser.ID},
- } {
- err = db.DB.Create(table).Error
- require.NoError(t, err, "table for %T", table)
- }
- // Mock user directory
- tempRepositoryRoot := filepath.Join(os.TempDir(), "usersDeleteByID-tempRepositoryRoot")
- conf.SetMockRepository(t, conf.RepositoryOpts{Root: tempRepositoryRoot})
- tempUserPath := repoutil.UserPath(testUser.Name)
- err = os.MkdirAll(tempUserPath, os.ModePerm)
- require.NoError(t, err)
- // Mock user custom avatar
- tempPictureAvatarUploadPath := filepath.Join(os.TempDir(), "usersDeleteByID-tempPictureAvatarUploadPath")
- conf.SetMockPicture(t, conf.PictureOpts{AvatarUploadPath: tempPictureAvatarUploadPath})
- err = os.MkdirAll(tempPictureAvatarUploadPath, os.ModePerm)
- require.NoError(t, err)
- tempCustomAvatarPath := userutil.CustomAvatarPath(testUser.ID)
- err = os.WriteFile(tempCustomAvatarPath, []byte("test"), 0600)
- require.NoError(t, err)
- // Verify mock data
- repo2, err = reposStore.GetByID(ctx, repo2.ID)
- require.NoError(t, err)
- assert.Equal(t, 2, repo2.NumWatches) // The owner is watching the repo by default.
- assert.Equal(t, 1, repo2.NumStars)
- cindy, err = db.GetByID(ctx, cindy.ID)
- require.NoError(t, err)
- assert.Equal(t, 1, cindy.NumFollowers)
- frank, err = db.GetByID(ctx, frank.ID)
- require.NoError(t, err)
- assert.Equal(t, 1, frank.NumFollowing)
- authorizedKeys, err := os.ReadFile(authorizedKeysPath())
- require.NoError(t, err)
- assert.Contains(t, string(authorizedKeys), fmt.Sprintf("key-%d", publicKey.ID))
- assert.Contains(t, string(authorizedKeys), publicKey.Content)
- // TODO: Use Issues.GetByID to replace SQL hack when the method is available.
- err = db.DB.First(issue, issue.ID).Error
- require.NoError(t, err)
- assert.Equal(t, testUser.ID, issue.AssigneeID)
- relatedTables := []any{
- &Watch{UserID: testUser.ID},
- &Star{UserID: testUser.ID},
- &Follow{UserID: testUser.ID},
- &PublicKey{OwnerID: testUser.ID},
- &AccessToken{UserID: testUser.ID},
- &Collaboration{UserID: testUser.ID},
- &Access{UserID: testUser.ID},
- &Action{UserID: testUser.ID},
- &IssueUser{UserID: testUser.ID},
- &EmailAddress{UserID: testUser.ID},
- }
- for _, table := range relatedTables {
- var count int64
- err = db.DB.Model(table).Where(table).Count(&count).Error
- require.NoError(t, err, "table for %T", table)
- assert.NotZero(t, count, "table for %T", table)
- }
- assert.True(t, osutil.IsExist(tempUserPath))
- assert.True(t, osutil.IsExist(tempCustomAvatarPath))
- // Pull the trigger
- err = db.DeleteByID(ctx, testUser.ID, false)
- require.NoError(t, err)
- // Verify after-the-fact data
- repo2, err = reposStore.GetByID(ctx, repo2.ID)
- require.NoError(t, err)
- assert.Equal(t, 1, repo2.NumWatches) // The owner is watching the repo by default.
- assert.Equal(t, 0, repo2.NumStars)
- cindy, err = db.GetByID(ctx, cindy.ID)
- require.NoError(t, err)
- assert.Equal(t, 0, cindy.NumFollowers)
- frank, err = db.GetByID(ctx, frank.ID)
- require.NoError(t, err)
- assert.Equal(t, 0, frank.NumFollowing)
- authorizedKeys, err = os.ReadFile(authorizedKeysPath())
- require.NoError(t, err)
- assert.Empty(t, authorizedKeys)
- // TODO: Use Issues.GetByID to replace SQL hack when the method is available.
- err = db.DB.First(issue, issue.ID).Error
- require.NoError(t, err)
- assert.Equal(t, int64(0), issue.AssigneeID)
- for _, table := range []any{
- &Watch{UserID: testUser.ID},
- &Star{UserID: testUser.ID},
- &Follow{UserID: testUser.ID},
- &PublicKey{OwnerID: testUser.ID},
- &AccessToken{UserID: testUser.ID},
- &Collaboration{UserID: testUser.ID},
- &Access{UserID: testUser.ID},
- &Action{UserID: testUser.ID},
- &IssueUser{UserID: testUser.ID},
- &EmailAddress{UserID: testUser.ID},
- } {
- var count int64
- err = db.DB.Model(table).Where(table).Count(&count).Error
- require.NoError(t, err, "table for %T", table)
- assert.Equal(t, int64(0), count, "table for %T", table)
- }
- assert.False(t, osutil.IsExist(tempUserPath))
- assert.False(t, osutil.IsExist(tempCustomAvatarPath))
- _, err = db.GetByID(ctx, testUser.ID)
- wantErr := ErrUserNotExist{errutil.Args{"userID": testUser.ID}}
- assert.Equal(t, wantErr, err)
- }
- func usersDeleteInactivated(t *testing.T, db *users) {
- ctx := context.Background()
- // User with repository ownership should be skipped
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- reposStore := NewReposStore(db.DB)
- _, err = reposStore.Create(ctx, alice.ID, CreateRepoOptions{Name: "repo1"})
- require.NoError(t, err)
- // User with organization membership should be skipped
- bob, err := db.Create(ctx, "bob", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- // TODO: Use Orgs.Create to replace SQL hack when the method is available.
- org1, err := db.Create(ctx, "org1", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- err = db.Exec(
- dbutil.Quote("UPDATE %s SET type = ? WHERE id IN (?)", "user"),
- UserTypeOrganization, org1.ID,
- ).Error
- require.NoError(t, err)
- // TODO: Use Orgs.Join to replace SQL hack when the method is available.
- err = db.Exec(`INSERT INTO org_user (uid, org_id) VALUES (?, ?)`, bob.ID, org1.ID).Error
- require.NoError(t, err)
- // User activated state should be skipped
- _, err = db.Create(ctx, "cindy", "[email protected]", CreateUserOptions{Activated: true})
- require.NoError(t, err)
- // User meant to be deleted
- david, err := db.Create(ctx, "david", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- tempSSHRootPath := filepath.Join(os.TempDir(), "usersDeleteInactivated-tempSSHRootPath")
- conf.SetMockSSH(t, conf.SSHOpts{RootPath: tempSSHRootPath})
- err = db.DeleteInactivated()
- require.NoError(t, err)
- _, err = db.GetByID(ctx, david.ID)
- wantErr := ErrUserNotExist{errutil.Args{"userID": david.ID}}
- assert.Equal(t, wantErr, err)
- users, err := db.List(ctx, 1, 10)
- require.NoError(t, err)
- require.Len(t, users, 3)
- }
- func usersGetByEmail(t *testing.T, db *users) {
- ctx := context.Background()
- t.Run("empty email", func(t *testing.T) {
- _, err := db.GetByEmail(ctx, "")
- wantErr := ErrUserNotExist{args: errutil.Args{"email": ""}}
- assert.Equal(t, wantErr, err)
- })
- t.Run("ignore organization", func(t *testing.T) {
- // TODO: Use Orgs.Create to replace SQL hack when the method is available.
- org, err := db.Create(ctx, "gogs", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- err = db.Model(&User{}).Where("id", org.ID).UpdateColumn("type", UserTypeOrganization).Error
- require.NoError(t, err)
- _, err = db.GetByEmail(ctx, org.Email)
- wantErr := ErrUserNotExist{args: errutil.Args{"email": org.Email}}
- assert.Equal(t, wantErr, err)
- })
- t.Run("by primary email", func(t *testing.T) {
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- _, err = db.GetByEmail(ctx, alice.Email)
- wantErr := ErrUserNotExist{args: errutil.Args{"email": alice.Email}}
- assert.Equal(t, wantErr, err)
- // Mark user as activated
- // TODO: Use UserEmails.Verify to replace SQL hack when the method is available.
- err = db.Model(&User{}).Where("id", alice.ID).UpdateColumn("is_active", true).Error
- require.NoError(t, err)
- user, err := db.GetByEmail(ctx, alice.Email)
- require.NoError(t, err)
- assert.Equal(t, alice.Name, user.Name)
- })
- t.Run("by secondary email", func(t *testing.T) {
- bob, err := db.Create(ctx, "bob", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- // TODO: Use UserEmails.Create to replace SQL hack when the method is available.
- email2 := "[email protected]"
- err = db.Exec(`INSERT INTO email_address (uid, email) VALUES (?, ?)`, bob.ID, email2).Error
- require.NoError(t, err)
- _, err = db.GetByEmail(ctx, email2)
- wantErr := ErrUserNotExist{args: errutil.Args{"email": email2}}
- assert.Equal(t, wantErr, err)
- // TODO: Use UserEmails.Verify to replace SQL hack when the method is available.
- err = db.Exec(`UPDATE email_address SET is_activated = ? WHERE email = ?`, true, email2).Error
- require.NoError(t, err)
- user, err := db.GetByEmail(ctx, email2)
- require.NoError(t, err)
- assert.Equal(t, bob.Name, user.Name)
- })
- }
- func usersGetByID(t *testing.T, db *users) {
- ctx := context.Background()
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- user, err := db.GetByID(ctx, alice.ID)
- require.NoError(t, err)
- assert.Equal(t, alice.Name, user.Name)
- _, err = db.GetByID(ctx, 404)
- wantErr := ErrUserNotExist{args: errutil.Args{"userID": int64(404)}}
- assert.Equal(t, wantErr, err)
- }
- func usersGetByUsername(t *testing.T, db *users) {
- ctx := context.Background()
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- user, err := db.GetByUsername(ctx, alice.Name)
- require.NoError(t, err)
- assert.Equal(t, alice.Name, user.Name)
- _, err = db.GetByUsername(ctx, "bad_username")
- wantErr := ErrUserNotExist{args: errutil.Args{"name": "bad_username"}}
- assert.Equal(t, wantErr, err)
- }
- func usersGetByKeyID(t *testing.T, db *users) {
- ctx := context.Background()
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- // TODO: Use PublicKeys.Create to replace SQL hack when the method is available.
- publicKey := &PublicKey{
- OwnerID: alice.ID,
- Name: "test-key",
- Fingerprint: "12:f8:7e:78:61:b4:bf:e2:de:24:15:96:4e:d4:72:53",
- Content: "test-key-content",
- CreatedUnix: db.NowFunc().Unix(),
- UpdatedUnix: db.NowFunc().Unix(),
- }
- err = db.WithContext(ctx).Create(publicKey).Error
- require.NoError(t, err)
- user, err := db.GetByKeyID(ctx, publicKey.ID)
- require.NoError(t, err)
- assert.Equal(t, alice.Name, user.Name)
- _, err = db.GetByKeyID(ctx, publicKey.ID+1)
- wantErr := ErrUserNotExist{args: errutil.Args{"keyID": publicKey.ID + 1}}
- assert.Equal(t, wantErr, err)
- }
- func usersGetMailableEmailsByUsernames(t *testing.T, db *users) {
- ctx := context.Background()
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- bob, err := db.Create(ctx, "bob", "[email protected]", CreateUserOptions{Activated: true})
- require.NoError(t, err)
- _, err = db.Create(ctx, "cindy", "[email protected]", CreateUserOptions{Activated: true})
- require.NoError(t, err)
- got, err := db.GetMailableEmailsByUsernames(ctx, []string{alice.Name, bob.Name, "ignore-non-exist"})
- require.NoError(t, err)
- want := []string{bob.Email}
- assert.Equal(t, want, got)
- }
- func usersIsUsernameUsed(t *testing.T, db *users) {
- ctx := context.Background()
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- tests := []struct {
- name string
- username string
- excludeUserID int64
- want bool
- }{
- {
- name: "no change",
- username: alice.Name,
- excludeUserID: alice.ID,
- want: false,
- },
- {
- name: "change case",
- username: strings.ToUpper(alice.Name),
- excludeUserID: alice.ID,
- want: false,
- },
- {
- name: "not used",
- username: "bob",
- excludeUserID: alice.ID,
- want: false,
- },
- {
- name: "not used when not excluded",
- username: "bob",
- excludeUserID: 0,
- want: false,
- },
- {
- name: "used when not excluded",
- username: alice.Name,
- excludeUserID: 0,
- want: true,
- },
- }
- for _, test := range tests {
- t.Run(test.name, func(t *testing.T) {
- got := db.IsUsernameUsed(ctx, test.username, test.excludeUserID)
- assert.Equal(t, test.want, got)
- })
- }
- }
- func usersList(t *testing.T, db *users) {
- ctx := context.Background()
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- bob, err := db.Create(ctx, "bob", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- // Create an organization shouldn't count
- // TODO: Use Orgs.Create to replace SQL hack when the method is available.
- org1, err := db.Create(ctx, "org1", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- err = db.Exec(
- dbutil.Quote("UPDATE %s SET type = ? WHERE id = ?", "user"),
- UserTypeOrganization, org1.ID,
- ).Error
- require.NoError(t, err)
- got, err := db.List(ctx, 1, 1)
- require.NoError(t, err)
- require.Len(t, got, 1)
- assert.Equal(t, alice.ID, got[0].ID)
- got, err = db.List(ctx, 2, 1)
- require.NoError(t, err)
- require.Len(t, got, 1)
- assert.Equal(t, bob.ID, got[0].ID)
- got, err = db.List(ctx, 1, 3)
- require.NoError(t, err)
- require.Len(t, got, 2)
- assert.Equal(t, alice.ID, got[0].ID)
- assert.Equal(t, bob.ID, got[1].ID)
- }
- func usersListFollowers(t *testing.T, db *users) {
- ctx := context.Background()
- john, err := db.Create(ctx, "john", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- got, err := db.ListFollowers(ctx, john.ID, 1, 1)
- require.NoError(t, err)
- assert.Empty(t, got)
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- bob, err := db.Create(ctx, "bob", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- err = db.Follow(ctx, alice.ID, john.ID)
- require.NoError(t, err)
- err = db.Follow(ctx, bob.ID, john.ID)
- require.NoError(t, err)
- // First page only has bob
- got, err = db.ListFollowers(ctx, john.ID, 1, 1)
- require.NoError(t, err)
- require.Len(t, got, 1)
- assert.Equal(t, bob.ID, got[0].ID)
- // Second page only has alice
- got, err = db.ListFollowers(ctx, john.ID, 2, 1)
- require.NoError(t, err)
- require.Len(t, got, 1)
- assert.Equal(t, alice.ID, got[0].ID)
- }
- func usersListFollowings(t *testing.T, db *users) {
- ctx := context.Background()
- john, err := db.Create(ctx, "john", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- got, err := db.ListFollowers(ctx, john.ID, 1, 1)
- require.NoError(t, err)
- assert.Empty(t, got)
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- bob, err := db.Create(ctx, "bob", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- err = db.Follow(ctx, john.ID, alice.ID)
- require.NoError(t, err)
- err = db.Follow(ctx, john.ID, bob.ID)
- require.NoError(t, err)
- // First page only has bob
- got, err = db.ListFollowings(ctx, john.ID, 1, 1)
- require.NoError(t, err)
- require.Len(t, got, 1)
- assert.Equal(t, bob.ID, got[0].ID)
- // Second page only has alice
- got, err = db.ListFollowings(ctx, john.ID, 2, 1)
- require.NoError(t, err)
- require.Len(t, got, 1)
- assert.Equal(t, alice.ID, got[0].ID)
- }
- func usersSearchByName(t *testing.T, db *users) {
- ctx := context.Background()
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{FullName: "Alice Jordan"})
- require.NoError(t, err)
- bob, err := db.Create(ctx, "bob", "[email protected]", CreateUserOptions{FullName: "Bob Jordan"})
- require.NoError(t, err)
- t.Run("search for username alice", func(t *testing.T) {
- users, count, err := db.SearchByName(ctx, "Li", 1, 1, "")
- require.NoError(t, err)
- require.Len(t, users, int(count))
- assert.Equal(t, int64(1), count)
- assert.Equal(t, alice.ID, users[0].ID)
- })
- t.Run("search for username bob", func(t *testing.T) {
- users, count, err := db.SearchByName(ctx, "oB", 1, 1, "")
- require.NoError(t, err)
- require.Len(t, users, int(count))
- assert.Equal(t, int64(1), count)
- assert.Equal(t, bob.ID, users[0].ID)
- })
- t.Run("search for full name jordan", func(t *testing.T) {
- users, count, err := db.SearchByName(ctx, "Jo", 1, 10, "")
- require.NoError(t, err)
- require.Len(t, users, int(count))
- assert.Equal(t, int64(2), count)
- })
- t.Run("search for full name jordan ORDER BY id DESC LIMIT 1", func(t *testing.T) {
- users, count, err := db.SearchByName(ctx, "Jo", 1, 1, "id DESC")
- require.NoError(t, err)
- require.Len(t, users, 1)
- assert.Equal(t, int64(2), count)
- assert.Equal(t, bob.ID, users[0].ID)
- })
- }
- func usersUpdate(t *testing.T, db *users) {
- ctx := context.Background()
- const oldPassword = "Password"
- alice, err := db.Create(
- ctx,
- "alice",
- "[email protected]",
- CreateUserOptions{
- FullName: "FullName",
- Password: oldPassword,
- LoginSource: 9,
- LoginName: "LoginName",
- Location: "Location",
- Website: "Website",
- Activated: false,
- Admin: false,
- },
- )
- require.NoError(t, err)
- t.Run("update password", func(t *testing.T) {
- got := userutil.ValidatePassword(alice.Password, alice.Salt, oldPassword)
- require.True(t, got)
- newPassword := "NewPassword"
- err = db.Update(ctx, alice.ID, UpdateUserOptions{Password: &newPassword})
- require.NoError(t, err)
- alice, err = db.GetByID(ctx, alice.ID)
- require.NoError(t, err)
- got = userutil.ValidatePassword(alice.Password, alice.Salt, oldPassword)
- assert.False(t, got, "Old password should stop working")
- got = userutil.ValidatePassword(alice.Password, alice.Salt, newPassword)
- assert.True(t, got, "New password should work")
- })
- t.Run("update email but already used", func(t *testing.T) {
- // todo
- })
- loginSource := int64(1)
- maxRepoCreation := 99
- lastRepoVisibility := true
- overLimitStr := strings.Repeat("a", 2050)
- opts := UpdateUserOptions{
- LoginSource: &loginSource,
- LoginName: &alice.Name,
- FullName: &overLimitStr,
- Website: &overLimitStr,
- Location: &overLimitStr,
- Description: &overLimitStr,
- MaxRepoCreation: &maxRepoCreation,
- LastRepoVisibility: &lastRepoVisibility,
- IsActivated: &lastRepoVisibility,
- IsAdmin: &lastRepoVisibility,
- AllowGitHook: &lastRepoVisibility,
- AllowImportLocal: &lastRepoVisibility,
- ProhibitLogin: &lastRepoVisibility,
- Avatar: &overLimitStr,
- AvatarEmail: &overLimitStr,
- }
- err = db.Update(ctx, alice.ID, opts)
- require.NoError(t, err)
- alice, err = db.GetByID(ctx, alice.ID)
- require.NoError(t, err)
- assertValues := func() {
- assert.Equal(t, loginSource, alice.LoginSource)
- assert.Equal(t, alice.Name, alice.LoginName)
- wantStr255 := strings.Repeat("a", 255)
- assert.Equal(t, wantStr255, alice.FullName)
- assert.Equal(t, wantStr255, alice.Website)
- assert.Equal(t, wantStr255, alice.Location)
- assert.Equal(t, wantStr255, alice.Description)
- assert.Equal(t, maxRepoCreation, alice.MaxRepoCreation)
- assert.Equal(t, lastRepoVisibility, alice.LastRepoVisibility)
- assert.Equal(t, lastRepoVisibility, alice.IsActive)
- assert.Equal(t, lastRepoVisibility, alice.IsAdmin)
- assert.Equal(t, lastRepoVisibility, alice.AllowGitHook)
- assert.Equal(t, lastRepoVisibility, alice.AllowImportLocal)
- assert.Equal(t, lastRepoVisibility, alice.ProhibitLogin)
- wantStr2048 := strings.Repeat("a", 2048)
- assert.Equal(t, wantStr2048, alice.Avatar)
- assert.Equal(t, wantStr255, alice.AvatarEmail)
- }
- assertValues()
- // Test ignored values
- err = db.Update(ctx, alice.ID, UpdateUserOptions{})
- require.NoError(t, err)
- alice, err = db.GetByID(ctx, alice.ID)
- require.NoError(t, err)
- assertValues()
- }
- func usersUseCustomAvatar(t *testing.T, db *users) {
- ctx := context.Background()
- alice, err := db.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- avatar, err := public.Files.ReadFile("img/avatar_default.png")
- require.NoError(t, err)
- avatarPath := userutil.CustomAvatarPath(alice.ID)
- _ = os.Remove(avatarPath)
- defer func() { _ = os.Remove(avatarPath) }()
- err = db.UseCustomAvatar(ctx, alice.ID, avatar)
- require.NoError(t, err)
- // Make sure avatar is saved and the user flag is updated.
- got := osutil.IsFile(avatarPath)
- assert.True(t, got)
- alice, err = db.GetByID(ctx, alice.ID)
- require.NoError(t, err)
- assert.True(t, alice.UseCustomAvatar)
- }
- func TestIsUsernameAllowed(t *testing.T) {
- for name := range reservedUsernames {
- t.Run(name, func(t *testing.T) {
- assert.True(t, IsErrNameNotAllowed(isUsernameAllowed(name)))
- })
- }
- for _, pattern := range reservedUsernamePatterns {
- t.Run(pattern, func(t *testing.T) {
- username := strings.ReplaceAll(pattern, "*", "alice")
- assert.True(t, IsErrNameNotAllowed(isUsernameAllowed(username)))
- })
- }
- }
- func usersFollow(t *testing.T, db *users) {
- ctx := context.Background()
- usersStore := NewUsersStore(db.DB)
- alice, err := usersStore.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- bob, err := usersStore.Create(ctx, "bob", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- err = db.Follow(ctx, alice.ID, bob.ID)
- require.NoError(t, err)
- // It is OK to follow multiple times and just be noop.
- err = db.Follow(ctx, alice.ID, bob.ID)
- require.NoError(t, err)
- alice, err = usersStore.GetByID(ctx, alice.ID)
- require.NoError(t, err)
- assert.Equal(t, 1, alice.NumFollowing)
- bob, err = usersStore.GetByID(ctx, bob.ID)
- require.NoError(t, err)
- assert.Equal(t, 1, bob.NumFollowers)
- }
- func usersIsFollowing(t *testing.T, db *users) {
- ctx := context.Background()
- usersStore := NewUsersStore(db.DB)
- alice, err := usersStore.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- bob, err := usersStore.Create(ctx, "bob", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- got := db.IsFollowing(ctx, alice.ID, bob.ID)
- assert.False(t, got)
- err = db.Follow(ctx, alice.ID, bob.ID)
- require.NoError(t, err)
- got = db.IsFollowing(ctx, alice.ID, bob.ID)
- assert.True(t, got)
- err = db.Unfollow(ctx, alice.ID, bob.ID)
- require.NoError(t, err)
- got = db.IsFollowing(ctx, alice.ID, bob.ID)
- assert.False(t, got)
- }
- func usersUnfollow(t *testing.T, db *users) {
- ctx := context.Background()
- usersStore := NewUsersStore(db.DB)
- alice, err := usersStore.Create(ctx, "alice", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- bob, err := usersStore.Create(ctx, "bob", "[email protected]", CreateUserOptions{})
- require.NoError(t, err)
- err = db.Follow(ctx, alice.ID, bob.ID)
- require.NoError(t, err)
- // It is OK to unfollow multiple times and just be noop.
- err = db.Unfollow(ctx, alice.ID, bob.ID)
- require.NoError(t, err)
- err = db.Unfollow(ctx, alice.ID, bob.ID)
- require.NoError(t, err)
- alice, err = usersStore.GetByID(ctx, alice.ID)
- require.NoError(t, err)
- assert.Equal(t, 0, alice.NumFollowing)
- bob, err = usersStore.GetByID(ctx, bob.ID)
- require.NoError(t, err)
- assert.Equal(t, 0, bob.NumFollowers)
- }
|