feat(users): add oauth2 application management
All checks were successful
Security Scan / security (push) Successful in 26s
Test / test (push) Successful in 1m45s

Co-Authored-By: Virgil <virgil@lethean.io>
This commit is contained in:
Virgil 2026-04-02 03:16:30 +00:00
parent 11e614af4a
commit 452b190e9d
2 changed files with 200 additions and 0 deletions

View file

@ -126,6 +126,51 @@ func (s *UserService) DeleteAvatar(ctx context.Context) error {
return s.client.Delete(ctx, "/api/v1/user/avatar")
}
// ListOAuth2Applications returns all OAuth2 applications owned by the authenticated user.
func (s *UserService) ListOAuth2Applications(ctx context.Context) ([]types.OAuth2Application, error) {
return ListAll[types.OAuth2Application](ctx, s.client, "/api/v1/user/applications/oauth2", nil)
}
// IterOAuth2Applications returns an iterator over all OAuth2 applications owned by the authenticated user.
func (s *UserService) IterOAuth2Applications(ctx context.Context) iter.Seq2[types.OAuth2Application, error] {
return ListIter[types.OAuth2Application](ctx, s.client, "/api/v1/user/applications/oauth2", nil)
}
// CreateOAuth2Application creates a new OAuth2 application for the authenticated user.
func (s *UserService) CreateOAuth2Application(ctx context.Context, opts *types.CreateOAuth2ApplicationOptions) (*types.OAuth2Application, error) {
var out types.OAuth2Application
if err := s.client.Post(ctx, "/api/v1/user/applications/oauth2", opts, &out); err != nil {
return nil, err
}
return &out, nil
}
// GetOAuth2Application returns a single OAuth2 application owned by the authenticated user.
func (s *UserService) GetOAuth2Application(ctx context.Context, id int64) (*types.OAuth2Application, error) {
path := ResolvePath("/api/v1/user/applications/oauth2/{id}", pathParams("id", int64String(id)))
var out types.OAuth2Application
if err := s.client.Get(ctx, path, &out); err != nil {
return nil, err
}
return &out, nil
}
// UpdateOAuth2Application updates an OAuth2 application owned by the authenticated user.
func (s *UserService) UpdateOAuth2Application(ctx context.Context, id int64, opts *types.CreateOAuth2ApplicationOptions) (*types.OAuth2Application, error) {
path := ResolvePath("/api/v1/user/applications/oauth2/{id}", pathParams("id", int64String(id)))
var out types.OAuth2Application
if err := s.client.Patch(ctx, path, opts, &out); err != nil {
return nil, err
}
return &out, nil
}
// DeleteOAuth2Application deletes an OAuth2 application owned by the authenticated user.
func (s *UserService) DeleteOAuth2Application(ctx context.Context, id int64) error {
path := ResolvePath("/api/v1/user/applications/oauth2/{id}", pathParams("id", int64String(id)))
return s.client.Delete(ctx, path)
}
// ListStopwatches returns all existing stopwatches for the authenticated user.
func (s *UserService) ListStopwatches(ctx context.Context) ([]types.StopWatch, error) {
return ListAll[types.StopWatch](ctx, s.client, "/api/v1/user/stopwatches", nil)

View file

@ -735,6 +735,161 @@ func TestUserService_DeleteAvatar_Good(t *testing.T) {
}
}
func TestUserService_ListOAuth2Applications_Good(t *testing.T) {
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodGet {
t.Errorf("expected GET, got %s", r.Method)
}
if r.URL.Path != "/api/v1/user/applications/oauth2" {
t.Errorf("wrong path: %s", r.URL.Path)
}
w.Header().Set("X-Total-Count", "2")
json.NewEncoder(w).Encode([]types.OAuth2Application{
{ID: 1, Name: "CLI", ClientID: "cli", RedirectURIs: []string{"http://localhost:3000/callback"}},
{ID: 2, Name: "Desktop", ClientID: "desktop"},
})
}))
defer srv.Close()
f := NewForge(srv.URL, "tok")
apps, err := f.Users.ListOAuth2Applications(context.Background())
if err != nil {
t.Fatal(err)
}
if len(apps) != 2 {
t.Fatalf("got %d applications, want 2", len(apps))
}
if apps[0].ID != 1 || apps[0].Name != "CLI" {
t.Errorf("unexpected first application: %+v", apps[0])
}
}
func TestUserService_CreateOAuth2Application_Good(t *testing.T) {
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodPost {
t.Errorf("expected POST, got %s", r.Method)
}
if r.URL.Path != "/api/v1/user/applications/oauth2" {
t.Errorf("wrong path: %s", r.URL.Path)
}
var body types.CreateOAuth2ApplicationOptions
if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
t.Fatal(err)
}
if body.Name != "CLI" || !body.ConfidentialClient || len(body.RedirectURIs) != 1 || body.RedirectURIs[0] != "http://localhost:3000/callback" {
t.Fatalf("unexpected body: %+v", body)
}
w.WriteHeader(http.StatusCreated)
json.NewEncoder(w).Encode(types.OAuth2Application{
ID: 1,
Name: body.Name,
ClientID: "cli",
ClientSecret: "secret",
ConfidentialClient: body.ConfidentialClient,
RedirectURIs: body.RedirectURIs,
})
}))
defer srv.Close()
f := NewForge(srv.URL, "tok")
app, err := f.Users.CreateOAuth2Application(context.Background(), &types.CreateOAuth2ApplicationOptions{
Name: "CLI",
ConfidentialClient: true,
RedirectURIs: []string{"http://localhost:3000/callback"},
})
if err != nil {
t.Fatal(err)
}
if app.ID != 1 || app.ClientSecret != "secret" {
t.Errorf("unexpected application: %+v", app)
}
}
func TestUserService_GetOAuth2Application_Good(t *testing.T) {
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodGet {
t.Errorf("expected GET, got %s", r.Method)
}
if r.URL.Path != "/api/v1/user/applications/oauth2/7" {
t.Errorf("wrong path: %s", r.URL.Path)
}
json.NewEncoder(w).Encode(types.OAuth2Application{
ID: 7,
Name: "CLI",
ClientID: "cli",
ConfidentialClient: true,
})
}))
defer srv.Close()
f := NewForge(srv.URL, "tok")
app, err := f.Users.GetOAuth2Application(context.Background(), 7)
if err != nil {
t.Fatal(err)
}
if app.ID != 7 || app.ClientID != "cli" {
t.Errorf("unexpected application: %+v", app)
}
}
func TestUserService_UpdateOAuth2Application_Good(t *testing.T) {
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodPatch {
t.Errorf("expected PATCH, got %s", r.Method)
}
if r.URL.Path != "/api/v1/user/applications/oauth2/7" {
t.Errorf("wrong path: %s", r.URL.Path)
}
var body types.CreateOAuth2ApplicationOptions
if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
t.Fatal(err)
}
if body.Name != "CLI v2" || len(body.RedirectURIs) != 2 {
t.Fatalf("unexpected body: %+v", body)
}
json.NewEncoder(w).Encode(types.OAuth2Application{
ID: 7,
Name: body.Name,
ClientID: "cli",
ClientSecret: "new-secret",
ConfidentialClient: body.ConfidentialClient,
RedirectURIs: body.RedirectURIs,
})
}))
defer srv.Close()
f := NewForge(srv.URL, "tok")
app, err := f.Users.UpdateOAuth2Application(context.Background(), 7, &types.CreateOAuth2ApplicationOptions{
Name: "CLI v2",
RedirectURIs: []string{"http://localhost:3000/callback", "http://localhost:3000/alt"},
ConfidentialClient: false,
})
if err != nil {
t.Fatal(err)
}
if app.Name != "CLI v2" || app.ClientSecret != "new-secret" {
t.Errorf("unexpected application: %+v", app)
}
}
func TestUserService_DeleteOAuth2Application_Good(t *testing.T) {
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodDelete {
t.Errorf("expected DELETE, got %s", r.Method)
}
if r.URL.Path != "/api/v1/user/applications/oauth2/7" {
t.Errorf("wrong path: %s", r.URL.Path)
}
w.WriteHeader(http.StatusNoContent)
}))
defer srv.Close()
f := NewForge(srv.URL, "tok")
if err := f.Users.DeleteOAuth2Application(context.Background(), 7); err != nil {
t.Fatal(err)
}
}
func TestUserService_ListFollowers_Good(t *testing.T) {
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodGet {