aboutsummaryrefslogtreecommitdiffstats
path: root/integrations
diff options
context:
space:
mode:
authortechknowlogick <techknowlogick@users.noreply.github.com>2018-07-06 21:54:30 -0400
committerGitHub <noreply@github.com>2018-07-06 21:54:30 -0400
commitab55ca7ebd7d30dad894c35e6facd0b1822fb899 (patch)
tree979f05088d7d0362cb7c95f097ff3931b3dc2e91 /integrations
parent1675fc4301d4bff339a0831348fca76a9e394999 (diff)
downloadgitea-ab55ca7ebd7d30dad894c35e6facd0b1822fb899.tar.gz
gitea-ab55ca7ebd7d30dad894c35e6facd0b1822fb899.zip
Add ability to delete a token (#4235)
Fix #4234
Diffstat (limited to 'integrations')
-rw-r--r--integrations/api_token_test.go50
-rw-r--r--integrations/integration_test.go5
2 files changed, 55 insertions, 0 deletions
diff --git a/integrations/api_token_test.go b/integrations/api_token_test.go
new file mode 100644
index 0000000000..2520f356b7
--- /dev/null
+++ b/integrations/api_token_test.go
@@ -0,0 +1,50 @@
+// Copyright 2018 The Gitea Authors. All rights reserved.
+// Use of this source code is governed by a MIT-style
+// license that can be found in the LICENSE file.
+
+package integrations
+
+import (
+ "net/http"
+ "testing"
+
+ "code.gitea.io/gitea/models"
+ api "code.gitea.io/sdk/gitea"
+)
+
+// TestAPICreateAndDeleteToken tests that token that was just created can be deleted
+func TestAPICreateAndDeleteToken(t *testing.T) {
+ prepareTestEnv(t)
+ user := models.AssertExistsAndLoadBean(t, &models.User{ID: 1}).(*models.User)
+
+ req := NewRequestWithJSON(t, "POST", "/api/v1/users/user1/tokens", map[string]string{
+ "name": "test-key-1",
+ })
+ req = AddBasicAuthHeader(req, user.Name)
+ resp := MakeRequest(t, req, http.StatusCreated)
+
+ var newAccessToken api.AccessToken
+ DecodeJSON(t, resp, &newAccessToken)
+ models.AssertExistsAndLoadBean(t, &models.AccessToken{
+ ID: newAccessToken.ID,
+ Name: newAccessToken.Name,
+ Sha1: newAccessToken.Sha1,
+ UID: user.ID,
+ })
+
+ req = NewRequestf(t, "DELETE", "/api/v1/users/user1/tokens/%d", newAccessToken.ID)
+ req = AddBasicAuthHeader(req, user.Name)
+ MakeRequest(t, req, http.StatusNoContent)
+
+ models.AssertNotExistsBean(t, &models.AccessToken{ID: newAccessToken.ID})
+}
+
+// TestAPIDeleteMissingToken ensures that error is thrown when token not found
+func TestAPIDeleteMissingToken(t *testing.T) {
+ prepareTestEnv(t)
+ user := models.AssertExistsAndLoadBean(t, &models.User{ID: 1}).(*models.User)
+
+ req := NewRequestf(t, "DELETE", "/api/v1/users/user1/tokens/%d", models.NonexistentID)
+ req = AddBasicAuthHeader(req, user.Name)
+ MakeRequest(t, req, http.StatusNotFound)
+}
diff --git a/integrations/integration_test.go b/integrations/integration_test.go
index 664290cc9d..a1e66ffdfd 100644
--- a/integrations/integration_test.go
+++ b/integrations/integration_test.go
@@ -256,6 +256,11 @@ func NewRequestWithBody(t testing.TB, method, urlStr string, body io.Reader) *ht
return request
}
+func AddBasicAuthHeader(request *http.Request, username string) *http.Request {
+ request.SetBasicAuth(username, userPassword)
+ return request
+}
+
const NoExpectedStatus = -1
func MakeRequest(t testing.TB, req *http.Request, expectedStatus int) *httptest.ResponseRecorder {
46013/stable27 Nextcloud server, a safe home for all your data: https://github.com/nextcloud/serverwww-data
summaryrefslogtreecommitdiffstats
path: root/apps/dav/lib/Storage/PublicOwnerWrapper.php
blob: 10bcd20de055f0dc2da939634111d2baa2ce85ab (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
<?php

declare(strict_types=1);

/**
 * @copyright Copyright (c) 2020, Roeland Jago Douma <roeland@famdouma.nl>
 *
 * @author Roeland Jago Douma <roeland@famdouma.nl>
 *
 * @license GNU AGPL version 3 or any later version
 *
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU Affero General Public License as
 * published by the Free Software Foundation, either version 3 of the
 * License, or (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 * GNU Affero General Public License for more details.
 *
 * You should have received a copy of the GNU Affero General Public License
 * along with this program. If not, see <http://www.gnu.org/licenses/>.
 *
 */
namespace OCA\DAV\Storage;

use OC\Files\Storage\Wrapper\Wrapper;

class PublicOwnerWrapper extends Wrapper {

	/** @var string */
	private $owner;

	/**
	 * @param array $arguments ['storage' => $storage, 'owner' => $owner]
	 *
	 * $storage: The storage the permissions mask should be applied on
	 * $owner: The owner to use in case no owner is found
	 */
	public function __construct($arguments) {
		parent::__construct($arguments);
		$this->owner = $arguments['owner'];
	}

	public function getOwner($path) {
		$owner = parent::getOwner($path);

		if ($owner === null || $owner === false) {
			return $this->owner;
		}

		return $owner;
	}
}