diff options
Diffstat (limited to 'internal/route')
-rw-r--r-- | internal/route/api/v1/user/app.go | 4 | ||||
-rw-r--r-- | internal/route/lfs/route.go | 4 | ||||
-rw-r--r-- | internal/route/lfs/route_test.go | 26 | ||||
-rw-r--r-- | internal/route/repo/http.go | 4 | ||||
-rw-r--r-- | internal/route/user/setting.go | 8 |
5 files changed, 23 insertions, 23 deletions
diff --git a/internal/route/api/v1/user/app.go b/internal/route/api/v1/user/app.go index 5afa34fb..dce7d421 100644 --- a/internal/route/api/v1/user/app.go +++ b/internal/route/api/v1/user/app.go @@ -14,7 +14,7 @@ import ( ) func ListAccessTokens(c *context.APIContext) { - tokens, err := db.AccessTokens.List(c.User.ID) + tokens, err := db.AccessTokens.List(c.Req.Context(), c.User.ID) if err != nil { c.Error(err, "list access tokens") return @@ -28,7 +28,7 @@ func ListAccessTokens(c *context.APIContext) { } func CreateAccessToken(c *context.APIContext, form api.CreateAccessTokenOption) { - t, err := db.AccessTokens.Create(c.User.ID, form.Name) + t, err := db.AccessTokens.Create(c.Req.Context(), c.User.ID, form.Name) if err != nil { if db.IsErrAccessTokenAlreadyExist(err) { c.ErrorStatus(http.StatusUnprocessableEntity, err) diff --git a/internal/route/lfs/route.go b/internal/route/lfs/route.go index 388dde0c..78a45fde 100644 --- a/internal/route/lfs/route.go +++ b/internal/route/lfs/route.go @@ -72,7 +72,7 @@ func authenticate() macaron.Handler { // If username and password authentication failed, try again using username as an access token. if auth.IsErrBadCredentials(err) { - token, err := db.AccessTokens.GetBySHA1(username) + token, err := db.AccessTokens.GetBySHA1(c.Req.Context(), username) if err != nil { if db.IsErrAccessTokenNotExist(err) { askCredentials(c.Resp) @@ -82,7 +82,7 @@ func authenticate() macaron.Handler { } return } - if err = db.AccessTokens.Save(token); err != nil { + if err = db.AccessTokens.Save(c.Req.Context(), token); err != nil { log.Error("Failed to update access token: %v", err) } diff --git a/internal/route/lfs/route_test.go b/internal/route/lfs/route_test.go index 119b925e..a07121cc 100644 --- a/internal/route/lfs/route_test.go +++ b/internal/route/lfs/route_test.go @@ -31,7 +31,7 @@ func Test_authenticate(t *testing.T) { header http.Header mockUsersStore *db.MockUsersStore mockTwoFactorsStore *db.MockTwoFactorsStore - mockAccessTokensStore *db.MockAccessTokensStore + mockAccessTokensStore func() db.AccessTokensStore expStatusCode int expHeader http.Header expBody string @@ -74,10 +74,10 @@ func Test_authenticate(t *testing.T) { return nil, auth.ErrBadCredentials{} }, }, - mockAccessTokensStore: &db.MockAccessTokensStore{ - MockGetBySHA1: func(sha string) (*db.AccessToken, error) { - return nil, db.ErrAccessTokenNotExist{} - }, + mockAccessTokensStore: func() db.AccessTokensStore { + mock := db.NewMockAccessTokensStore() + mock.GetBySHA1Func.SetDefaultReturn(nil, db.ErrAccessTokenNotExist{}) + return mock }, expStatusCode: http.StatusUnauthorized, expHeader: http.Header{ @@ -119,13 +119,10 @@ func Test_authenticate(t *testing.T) { return &db.User{ID: 1, Name: "unknwon"}, nil }, }, - mockAccessTokensStore: &db.MockAccessTokensStore{ - MockGetBySHA1: func(sha string) (*db.AccessToken, error) { - return &db.AccessToken{}, nil - }, - MockSave: func(t *db.AccessToken) error { - return nil - }, + mockAccessTokensStore: func() db.AccessTokensStore { + mock := db.NewMockAccessTokensStore() + mock.GetBySHA1Func.SetDefaultReturn(&db.AccessToken{}, nil) + return mock }, expStatusCode: http.StatusOK, expHeader: http.Header{}, @@ -136,7 +133,10 @@ func Test_authenticate(t *testing.T) { t.Run(test.name, func(t *testing.T) { db.SetMockUsersStore(t, test.mockUsersStore) db.SetMockTwoFactorsStore(t, test.mockTwoFactorsStore) - db.SetMockAccessTokensStore(t, test.mockAccessTokensStore) + + if test.mockAccessTokensStore != nil { + db.SetMockAccessTokensStore(t, test.mockAccessTokensStore()) + } r, err := http.NewRequest("GET", "/", nil) if err != nil { diff --git a/internal/route/repo/http.go b/internal/route/repo/http.go index b5bbefc1..575719f1 100644 --- a/internal/route/repo/http.go +++ b/internal/route/repo/http.go @@ -131,7 +131,7 @@ func HTTPContexter() macaron.Handler { // If username and password combination failed, try again using username as a token. if authUser == nil { - token, err := db.AccessTokens.GetBySHA1(authUsername) + token, err := db.AccessTokens.GetBySHA1(c.Req.Context(), authUsername) if err != nil { if db.IsErrAccessTokenNotExist(err) { askCredentials(c, http.StatusUnauthorized, "") @@ -141,7 +141,7 @@ func HTTPContexter() macaron.Handler { } return } - if err = db.AccessTokens.Save(token); err != nil { + if err = db.AccessTokens.Save(c.Req.Context(), token); err != nil { log.Error("Failed to update access token: %v", err) } diff --git a/internal/route/user/setting.go b/internal/route/user/setting.go index 5d879f42..cf2226c5 100644 --- a/internal/route/user/setting.go +++ b/internal/route/user/setting.go @@ -581,7 +581,7 @@ func SettingsApplications(c *context.Context) { c.Title("settings.applications") c.PageIs("SettingsApplications") - tokens, err := db.AccessTokens.List(c.User.ID) + tokens, err := db.AccessTokens.List(c.Req.Context(), c.User.ID) if err != nil { c.Errorf(err, "list access tokens") return @@ -596,7 +596,7 @@ func SettingsApplicationsPost(c *context.Context, f form.NewAccessToken) { c.PageIs("SettingsApplications") if c.HasError() { - tokens, err := db.AccessTokens.List(c.User.ID) + tokens, err := db.AccessTokens.List(c.Req.Context(), c.User.ID) if err != nil { c.Errorf(err, "list access tokens") return @@ -607,7 +607,7 @@ func SettingsApplicationsPost(c *context.Context, f form.NewAccessToken) { return } - t, err := db.AccessTokens.Create(c.User.ID, f.Name) + t, err := db.AccessTokens.Create(c.Req.Context(), c.User.ID, f.Name) if err != nil { if db.IsErrAccessTokenAlreadyExist(err) { c.Flash.Error(c.Tr("settings.token_name_exists")) @@ -624,7 +624,7 @@ func SettingsApplicationsPost(c *context.Context, f form.NewAccessToken) { } func SettingsDeleteApplication(c *context.Context) { - if err := db.AccessTokens.DeleteByID(c.User.ID, c.QueryInt64("id")); err != nil { + if err := db.AccessTokens.DeleteByID(c.Req.Context(), c.User.ID, c.QueryInt64("id")); err != nil { c.Flash.Error("DeleteAccessTokenByID: " + err.Error()) } else { c.Flash.Success(c.Tr("settings.delete_token_success")) |