feat(users): add authenticated GPG key management
Co-Authored-By: Virgil <virgil@lethean.io>
This commit is contained in:
parent
2460a7b09e
commit
9f686bfa89
2 changed files with 175 additions and 0 deletions
35
users.go
35
users.go
|
|
@ -238,6 +238,41 @@ func (s *UserService) DeleteAvatar(ctx context.Context) error {
|
|||
return s.client.Delete(ctx, "/api/v1/user/avatar")
|
||||
}
|
||||
|
||||
// ListGPGKeys returns all GPG keys owned by the authenticated user.
|
||||
func (s *UserService) ListGPGKeys(ctx context.Context) ([]types.GPGKey, error) {
|
||||
return ListAll[types.GPGKey](ctx, s.client, "/api/v1/user/gpg_keys", nil)
|
||||
}
|
||||
|
||||
// IterGPGKeys returns an iterator over all GPG keys owned by the authenticated user.
|
||||
func (s *UserService) IterGPGKeys(ctx context.Context) iter.Seq2[types.GPGKey, error] {
|
||||
return ListIter[types.GPGKey](ctx, s.client, "/api/v1/user/gpg_keys", nil)
|
||||
}
|
||||
|
||||
// CreateGPGKey adds a GPG key for the authenticated user.
|
||||
func (s *UserService) CreateGPGKey(ctx context.Context, opts *types.CreateGPGKeyOption) (*types.GPGKey, error) {
|
||||
var out types.GPGKey
|
||||
if err := s.client.Post(ctx, "/api/v1/user/gpg_keys", opts, &out); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return &out, nil
|
||||
}
|
||||
|
||||
// GetGPGKey returns a single GPG key owned by the authenticated user.
|
||||
func (s *UserService) GetGPGKey(ctx context.Context, id int64) (*types.GPGKey, error) {
|
||||
path := ResolvePath("/api/v1/user/gpg_keys/{id}", pathParams("id", int64String(id)))
|
||||
var out types.GPGKey
|
||||
if err := s.client.Get(ctx, path, &out); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return &out, nil
|
||||
}
|
||||
|
||||
// DeleteGPGKey removes a GPG key owned by the authenticated user.
|
||||
func (s *UserService) DeleteGPGKey(ctx context.Context, id int64) error {
|
||||
path := ResolvePath("/api/v1/user/gpg_keys/{id}", pathParams("id", int64String(id)))
|
||||
return s.client.Delete(ctx, path)
|
||||
}
|
||||
|
||||
// ListOAuth2Applications returns all OAuth2 applications owned by the authenticated user.
|
||||
func (s *UserService) ListOAuth2Applications(ctx context.Context) ([]types.OAuth2Application, error) {
|
||||
return ListAll[types.OAuth2Application](ctx, s.client, "/api/v1/user/applications/oauth2", nil)
|
||||
|
|
|
|||
140
users_test.go
140
users_test.go
|
|
@ -841,6 +841,146 @@ func TestUserService_DeleteAvatar_Good(t *testing.T) {
|
|||
}
|
||||
}
|
||||
|
||||
func TestUserService_ListGPGKeys_Good(t *testing.T) {
|
||||
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.Method != http.MethodGet {
|
||||
t.Errorf("expected GET, got %s", r.Method)
|
||||
}
|
||||
if r.URL.Path != "/api/v1/user/gpg_keys" {
|
||||
t.Errorf("wrong path: %s", r.URL.Path)
|
||||
}
|
||||
w.Header().Set("X-Total-Count", "2")
|
||||
json.NewEncoder(w).Encode([]types.GPGKey{
|
||||
{ID: 1, KeyID: "ABCD1234", PublicKey: "-----BEGIN PGP PUBLIC KEY BLOCK-----"},
|
||||
{ID: 2, KeyID: "EFGH5678", Verified: true},
|
||||
})
|
||||
}))
|
||||
defer srv.Close()
|
||||
|
||||
f := NewForge(srv.URL, "tok")
|
||||
keys, err := f.Users.ListGPGKeys(context.Background())
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
if len(keys) != 2 {
|
||||
t.Fatalf("got %d keys, want 2", len(keys))
|
||||
}
|
||||
if keys[0].ID != 1 || keys[0].KeyID != "ABCD1234" {
|
||||
t.Errorf("unexpected first key: %+v", keys[0])
|
||||
}
|
||||
}
|
||||
|
||||
func TestUserService_IterGPGKeys_Good(t *testing.T) {
|
||||
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.Method != http.MethodGet {
|
||||
t.Errorf("expected GET, got %s", r.Method)
|
||||
}
|
||||
if r.URL.Path != "/api/v1/user/gpg_keys" {
|
||||
t.Errorf("wrong path: %s", r.URL.Path)
|
||||
}
|
||||
w.Header().Set("X-Total-Count", "1")
|
||||
json.NewEncoder(w).Encode([]types.GPGKey{
|
||||
{ID: 3, KeyID: "IJKL9012", Verified: true},
|
||||
})
|
||||
}))
|
||||
defer srv.Close()
|
||||
|
||||
f := NewForge(srv.URL, "tok")
|
||||
count := 0
|
||||
for key, err := range f.Users.IterGPGKeys(context.Background()) {
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
count++
|
||||
if key.ID != 3 || key.KeyID != "IJKL9012" {
|
||||
t.Errorf("unexpected key: %+v", key)
|
||||
}
|
||||
}
|
||||
if count != 1 {
|
||||
t.Fatalf("got %d keys, want 1", count)
|
||||
}
|
||||
}
|
||||
|
||||
func TestUserService_CreateGPGKey_Good(t *testing.T) {
|
||||
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.Method != http.MethodPost {
|
||||
t.Errorf("expected POST, got %s", r.Method)
|
||||
}
|
||||
if r.URL.Path != "/api/v1/user/gpg_keys" {
|
||||
t.Errorf("wrong path: %s", r.URL.Path)
|
||||
}
|
||||
var body types.CreateGPGKeyOption
|
||||
if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
if body.ArmoredKey != "-----BEGIN PGP PUBLIC KEY BLOCK-----" || body.Signature != "sig" {
|
||||
t.Fatalf("unexpected body: %+v", body)
|
||||
}
|
||||
w.WriteHeader(http.StatusCreated)
|
||||
json.NewEncoder(w).Encode(types.GPGKey{
|
||||
ID: 9,
|
||||
KeyID: "MNOP3456",
|
||||
Verified: true,
|
||||
})
|
||||
}))
|
||||
defer srv.Close()
|
||||
|
||||
f := NewForge(srv.URL, "tok")
|
||||
key, err := f.Users.CreateGPGKey(context.Background(), &types.CreateGPGKeyOption{
|
||||
ArmoredKey: "-----BEGIN PGP PUBLIC KEY BLOCK-----",
|
||||
Signature: "sig",
|
||||
})
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
if key.ID != 9 || key.KeyID != "MNOP3456" || !key.Verified {
|
||||
t.Errorf("unexpected key: %+v", key)
|
||||
}
|
||||
}
|
||||
|
||||
func TestUserService_GetGPGKey_Good(t *testing.T) {
|
||||
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.Method != http.MethodGet {
|
||||
t.Errorf("expected GET, got %s", r.Method)
|
||||
}
|
||||
if r.URL.Path != "/api/v1/user/gpg_keys/9" {
|
||||
t.Errorf("wrong path: %s", r.URL.Path)
|
||||
}
|
||||
json.NewEncoder(w).Encode(types.GPGKey{
|
||||
ID: 9,
|
||||
KeyID: "MNOP3456",
|
||||
})
|
||||
}))
|
||||
defer srv.Close()
|
||||
|
||||
f := NewForge(srv.URL, "tok")
|
||||
key, err := f.Users.GetGPGKey(context.Background(), 9)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
if key.ID != 9 || key.KeyID != "MNOP3456" {
|
||||
t.Errorf("unexpected key: %+v", key)
|
||||
}
|
||||
}
|
||||
|
||||
func TestUserService_DeleteGPGKey_Good(t *testing.T) {
|
||||
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.Method != http.MethodDelete {
|
||||
t.Errorf("expected DELETE, got %s", r.Method)
|
||||
}
|
||||
if r.URL.Path != "/api/v1/user/gpg_keys/9" {
|
||||
t.Errorf("wrong path: %s", r.URL.Path)
|
||||
}
|
||||
w.WriteHeader(http.StatusNoContent)
|
||||
}))
|
||||
defer srv.Close()
|
||||
|
||||
f := NewForge(srv.URL, "tok")
|
||||
if err := f.Users.DeleteGPGKey(context.Background(), 9); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestUserService_ListOAuth2Applications_Good(t *testing.T) {
|
||||
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.Method != http.MethodGet {
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue