|
7 | 7 | "fmt"
|
8 | 8 | "net"
|
9 | 9 | "reflect"
|
10 |
| -"strings" |
11 | 10 | "testing"
|
12 | 11 | "time"
|
13 | 12 |
|
@@ -751,88 +750,78 @@ func (s *MethodTestSuite) TestProvisionerJob() {
|
751 | 750 | }
|
752 | 751 |
|
753 | 752 | func (s*MethodTestSuite)TestLicense() {
|
754 |
| -s.Run("GetLicenses",s.Subtest(func(db database.Store,check*expects) { |
755 |
| -l,err:=db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
756 |
| -UUID:uuid.New(), |
757 |
| -}) |
758 |
| -require.NoError(s.T(),err) |
759 |
| -check.Args().Asserts(l,policy.ActionRead). |
760 |
| -Returns([]database.License{l}) |
| 753 | +s.Run("GetLicenses",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 754 | +l:= database.License{ID:1} |
| 755 | +dbm.EXPECT().GetLicenses(gomock.Any()).Return([]database.License{l},nil).AnyTimes() |
| 756 | +check.Args().Asserts(l,policy.ActionRead).Returns([]database.License{l}) |
761 | 757 | }))
|
762 |
| -s.Run("InsertLicense",s.Subtest(func(db database.Store,check*expects) { |
763 |
| -check.Args(database.InsertLicenseParams{}). |
764 |
| -Asserts(rbac.ResourceLicense,policy.ActionCreate) |
| 758 | +s.Run("InsertLicense",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 759 | +dbm.EXPECT().InsertLicense(gomock.Any(),database.InsertLicenseParams{}).Return(database.License{},nil).AnyTimes() |
| 760 | +check.Args(database.InsertLicenseParams{}).Asserts(rbac.ResourceLicense,policy.ActionCreate) |
765 | 761 | }))
|
766 |
| -s.Run("UpsertLogoURL",s.Subtest(func(db database.Store,check*expects) { |
| 762 | +s.Run("UpsertLogoURL",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 763 | +dbm.EXPECT().UpsertLogoURL(gomock.Any(),"value").Return(nil).AnyTimes() |
767 | 764 | check.Args("value").Asserts(rbac.ResourceDeploymentConfig,policy.ActionUpdate)
|
768 | 765 | }))
|
769 |
| -s.Run("UpsertAnnouncementBanners",s.Subtest(func(db database.Store,check*expects) { |
| 766 | +s.Run("UpsertAnnouncementBanners",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 767 | +dbm.EXPECT().UpsertAnnouncementBanners(gomock.Any(),"value").Return(nil).AnyTimes() |
770 | 768 | check.Args("value").Asserts(rbac.ResourceDeploymentConfig,policy.ActionUpdate)
|
771 | 769 | }))
|
772 |
| -s.Run("GetLicenseByID",s.Subtest(func(db database.Store,check*expects) { |
773 |
| -l,err:=db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
774 |
| -UUID:uuid.New(), |
775 |
| -}) |
776 |
| -require.NoError(s.T(),err) |
777 |
| -check.Args(l.ID).Asserts(l,policy.ActionRead).Returns(l) |
| 770 | +s.Run("GetLicenseByID",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 771 | +l:= database.License{ID:1} |
| 772 | +dbm.EXPECT().GetLicenseByID(gomock.Any(),int32(1)).Return(l,nil).AnyTimes() |
| 773 | +check.Args(int32(1)).Asserts(l,policy.ActionRead).Returns(l) |
778 | 774 | }))
|
779 |
| -s.Run("DeleteLicense",s.Subtest(func(db database.Store,check*expects) { |
780 |
| -l,err:=db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
781 |
| -UUID:uuid.New(), |
782 |
| -}) |
783 |
| -require.NoError(s.T(),err) |
| 775 | +s.Run("DeleteLicense",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 776 | +l:= database.License{ID:1} |
| 777 | +dbm.EXPECT().GetLicenseByID(gomock.Any(),l.ID).Return(l,nil).AnyTimes() |
| 778 | +dbm.EXPECT().DeleteLicense(gomock.Any(),l.ID).Return(int32(1),nil).AnyTimes() |
784 | 779 | check.Args(l.ID).Asserts(l,policy.ActionDelete)
|
785 | 780 | }))
|
786 |
| -s.Run("GetDeploymentID",s.Subtest(func(db database.Store,check*expects) { |
787 |
| -db.InsertDeploymentID(context.Background(),"value") |
| 781 | +s.Run("GetDeploymentID",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 782 | +dbm.EXPECT().GetDeploymentID(gomock.Any()).Return("value",nil).AnyTimes() |
788 | 783 | check.Args().Asserts().Returns("value")
|
789 | 784 | }))
|
790 |
| -s.Run("GetDefaultProxyConfig",s.Subtest(func(db database.Store,check*expects) { |
791 |
| -check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{ |
792 |
| -DisplayName:"Default", |
793 |
| -IconUrl:"/emojis/1f3e1.png", |
794 |
| -}) |
| 785 | +s.Run("GetDefaultProxyConfig",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 786 | +dbm.EXPECT().GetDefaultProxyConfig(gomock.Any()).Return(database.GetDefaultProxyConfigRow{DisplayName:"Default",IconUrl:"/emojis/1f3e1.png"},nil).AnyTimes() |
| 787 | +check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{DisplayName:"Default",IconUrl:"/emojis/1f3e1.png"}) |
795 | 788 | }))
|
796 |
| -s.Run("GetLogoURL",s.Subtest(func(db database.Store,check*expects) { |
797 |
| -err:=db.UpsertLogoURL(context.Background(),"value") |
798 |
| -require.NoError(s.T(),err) |
| 789 | +s.Run("GetLogoURL",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 790 | +dbm.EXPECT().GetLogoURL(gomock.Any()).Return("value",nil).AnyTimes() |
799 | 791 | check.Args().Asserts().Returns("value")
|
800 | 792 | }))
|
801 |
| -s.Run("GetAnnouncementBanners",s.Subtest(func(db database.Store,check*expects) { |
802 |
| -err:=db.UpsertAnnouncementBanners(context.Background(),"value") |
803 |
| -require.NoError(s.T(),err) |
| 793 | +s.Run("GetAnnouncementBanners",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 794 | +dbm.EXPECT().GetAnnouncementBanners(gomock.Any()).Return("value",nil).AnyTimes() |
804 | 795 | check.Args().Asserts().Returns("value")
|
805 | 796 | }))
|
806 |
| -s.Run("GetManagedAgentCount",s.Subtest(func(db database.Store,check*expects) { |
| 797 | +s.Run("GetManagedAgentCount",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
807 | 798 | start:=dbtime.Now()
|
808 | 799 | end:=start.Add(time.Hour)
|
809 |
| -check.Args(database.GetManagedAgentCountParams{ |
810 |
| -StartTime:start, |
811 |
| -EndTime:end, |
812 |
| -}).Asserts(rbac.ResourceWorkspace,policy.ActionRead).Returns(int64(0)) |
| 800 | +dbm.EXPECT().GetManagedAgentCount(gomock.Any(), database.GetManagedAgentCountParams{StartTime:start,EndTime:end}).Return(int64(0),nil).AnyTimes() |
| 801 | +check.Args(database.GetManagedAgentCountParams{StartTime:start,EndTime:end}).Asserts(rbac.ResourceWorkspace,policy.ActionRead).Returns(int64(0)) |
813 | 802 | }))
|
814 | 803 | }
|
815 | 804 |
|
816 | 805 | func (s*MethodTestSuite)TestOrganization() {
|
817 |
| -s.Run("Deployment/OIDCClaimFields",s.Subtest(func(db database.Store,check*expects) { |
| 806 | +s.Run("Deployment/OIDCClaimFields",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 807 | +dbm.EXPECT().OIDCClaimFields(gomock.Any(),uuid.Nil).Return([]string{},nil).AnyTimes() |
818 | 808 | check.Args(uuid.Nil).Asserts(rbac.ResourceIdpsyncSettings,policy.ActionRead).Returns([]string{})
|
819 | 809 | }))
|
820 |
| -s.Run("Organization/OIDCClaimFields",s.Subtest(func(db database.Store,check*expects) { |
| 810 | +s.Run("Organization/OIDCClaimFields",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
821 | 811 | id:=uuid.New()
|
| 812 | +dbm.EXPECT().OIDCClaimFields(gomock.Any(),id).Return([]string{},nil).AnyTimes() |
822 | 813 | check.Args(id).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id),policy.ActionRead).Returns([]string{})
|
823 | 814 | }))
|
824 |
| -s.Run("Deployment/OIDCClaimFieldValues",s.Subtest(func(db database.Store,check*expects) { |
825 |
| -check.Args(database.OIDCClaimFieldValuesParams{ |
826 |
| -ClaimField:"claim-field", |
827 |
| -OrganizationID:uuid.Nil, |
828 |
| -}).Asserts(rbac.ResourceIdpsyncSettings,policy.ActionRead).Returns([]string{}) |
| 815 | +s.Run("Deployment/OIDCClaimFieldValues",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 816 | +arg:= database.OIDCClaimFieldValuesParams{ClaimField:"claim-field",OrganizationID:uuid.Nil} |
| 817 | +dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(),arg).Return([]string{},nil).AnyTimes() |
| 818 | +check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings,policy.ActionRead).Returns([]string{}) |
829 | 819 | }))
|
830 |
| -s.Run("Organization/OIDCClaimFieldValues",s.Subtest(func(db database.Store,check*expects) { |
| 820 | +s.Run("Organization/OIDCClaimFieldValues",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
831 | 821 | id:=uuid.New()
|
832 |
| -check.Args(database.OIDCClaimFieldValuesParams{ |
833 |
| -ClaimField:"claim-field", |
834 |
| -OrganizationID:id, |
835 |
| -}).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id),policy.ActionRead).Returns([]string{}) |
| 822 | +arg:= database.OIDCClaimFieldValuesParams{ClaimField:"claim-field",OrganizationID:id} |
| 823 | +dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(),arg).Return([]string{},nil).AnyTimes() |
| 824 | +check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id),policy.ActionRead).Returns([]string{}) |
836 | 825 | }))
|
837 | 826 | s.Run("ByOrganization/GetGroups",s.Subtest(func(db database.Store,check*expects) {
|
838 | 827 | o:=dbgen.Organization(s.T(),db, database.Organization{})
|
@@ -1139,41 +1128,43 @@ func (s *MethodTestSuite) TestOrganization() {
|
1139 | 1128 | }
|
1140 | 1129 |
|
1141 | 1130 | func (s*MethodTestSuite)TestWorkspaceProxy() {
|
1142 |
| -s.Run("InsertWorkspaceProxy",s.Subtest(func(db database.Store,check*expects) { |
1143 |
| -check.Args(database.InsertWorkspaceProxyParams{ |
1144 |
| -ID:uuid.New(), |
1145 |
| -}).Asserts(rbac.ResourceWorkspaceProxy,policy.ActionCreate) |
1146 |
| -})) |
1147 |
| -s.Run("RegisterWorkspaceProxy",s.Subtest(func(db database.Store,check*expects) { |
1148 |
| -p,_:=dbgen.WorkspaceProxy(s.T(),db, database.WorkspaceProxy{}) |
1149 |
| -check.Args(database.RegisterWorkspaceProxyParams{ |
1150 |
| -ID:p.ID, |
1151 |
| -}).Asserts(p,policy.ActionUpdate) |
1152 |
| -})) |
1153 |
| -s.Run("GetWorkspaceProxyByID",s.Subtest(func(db database.Store,check*expects) { |
1154 |
| -p,_:=dbgen.WorkspaceProxy(s.T(),db, database.WorkspaceProxy{}) |
| 1131 | +s.Run("InsertWorkspaceProxy",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) { |
| 1132 | +arg:= database.InsertWorkspaceProxyParams{ID:uuid.New()} |
| 1133 | +dbm.EXPECT().InsertWorkspaceProxy(gomock.Any(),arg).Return(database.WorkspaceProxy{},nil).AnyTimes() |
| 1134 | +check.Args(arg).Asserts(rbac.ResourceWorkspaceProxy,policy.ActionCreate) |
| 1135 | +})) |
| 1136 | +s.Run("RegisterWorkspaceProxy",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 1137 | +p:=testutil.Fake(s.T(),faker, database.WorkspaceProxy{}) |
| 1138 | +dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(),p.ID).Return(p,nil).AnyTimes() |
| 1139 | +dbm.EXPECT().RegisterWorkspaceProxy(gomock.Any(), database.RegisterWorkspaceProxyParams{ID:p.ID}).Return(p,nil).AnyTimes() |
| 1140 | +check.Args(database.RegisterWorkspaceProxyParams{ID:p.ID}).Asserts(p,policy.ActionUpdate) |
| 1141 | +})) |
| 1142 | +s.Run("GetWorkspaceProxyByID",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 1143 | +p:=testutil.Fake(s.T(),faker, database.WorkspaceProxy{}) |
| 1144 | +dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(),p.ID).Return(p,nil).AnyTimes() |
1155 | 1145 | check.Args(p.ID).Asserts(p,policy.ActionRead).Returns(p)
|
1156 | 1146 | }))
|
1157 |
| -s.Run("GetWorkspaceProxyByName",s.Subtest(func(db database.Store,check*expects) { |
1158 |
| -p,_:=dbgen.WorkspaceProxy(s.T(),db, database.WorkspaceProxy{}) |
| 1147 | +s.Run("GetWorkspaceProxyByName",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 1148 | +p:=testutil.Fake(s.T(),faker, database.WorkspaceProxy{}) |
| 1149 | +dbm.EXPECT().GetWorkspaceProxyByName(gomock.Any(),p.Name).Return(p,nil).AnyTimes() |
1159 | 1150 | check.Args(p.Name).Asserts(p,policy.ActionRead).Returns(p)
|
1160 | 1151 | }))
|
1161 |
| -s.Run("UpdateWorkspaceProxyDeleted",s.Subtest(func(db database.Store,check*expects) { |
1162 |
| -p,_:=dbgen.WorkspaceProxy(s.T(),db, database.WorkspaceProxy{}) |
1163 |
| -check.Args(database.UpdateWorkspaceProxyDeletedParams{ |
1164 |
| -ID:p.ID, |
1165 |
| -Deleted:true, |
1166 |
| -}).Asserts(p,policy.ActionDelete) |
1167 |
| -})) |
1168 |
| -s.Run("UpdateWorkspaceProxy",s.Subtest(func(db database.Store,check*expects) { |
1169 |
| -p,_:=dbgen.WorkspaceProxy(s.T(),db, database.WorkspaceProxy{}) |
1170 |
| -check.Args(database.UpdateWorkspaceProxyParams{ |
1171 |
| -ID:p.ID, |
1172 |
| -}).Asserts(p,policy.ActionUpdate) |
1173 |
| -})) |
1174 |
| -s.Run("GetWorkspaceProxies",s.Subtest(func(db database.Store,check*expects) { |
1175 |
| -p1,_:=dbgen.WorkspaceProxy(s.T(),db, database.WorkspaceProxy{}) |
1176 |
| -p2,_:=dbgen.WorkspaceProxy(s.T(),db,database.WorkspaceProxy{}) |
| 1152 | +s.Run("UpdateWorkspaceProxyDeleted",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 1153 | +p:=testutil.Fake(s.T(),faker, database.WorkspaceProxy{}) |
| 1154 | +dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(),p.ID).Return(p,nil).AnyTimes() |
| 1155 | +dbm.EXPECT().UpdateWorkspaceProxyDeleted(gomock.Any(), database.UpdateWorkspaceProxyDeletedParams{ID:p.ID,Deleted:true}).Return(nil).AnyTimes() |
| 1156 | +check.Args(database.UpdateWorkspaceProxyDeletedParams{ID:p.ID,Deleted:true}).Asserts(p,policy.ActionDelete) |
| 1157 | +})) |
| 1158 | +s.Run("UpdateWorkspaceProxy",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 1159 | +p:=testutil.Fake(s.T(),faker, database.WorkspaceProxy{}) |
| 1160 | +dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(),p.ID).Return(p,nil).AnyTimes() |
| 1161 | +dbm.EXPECT().UpdateWorkspaceProxy(gomock.Any(),database.UpdateWorkspaceProxyParams{ID:p.ID}).Return(p,nil).AnyTimes() |
| 1162 | +check.Args(database.UpdateWorkspaceProxyParams{ID:p.ID}).Asserts(p,policy.ActionUpdate) |
| 1163 | +})) |
| 1164 | +s.Run("GetWorkspaceProxies",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 1165 | +p1:=testutil.Fake(s.T(),faker, database.WorkspaceProxy{}) |
| 1166 | +p2:=testutil.Fake(s.T(),faker, database.WorkspaceProxy{}) |
| 1167 | +dbm.EXPECT().GetWorkspaceProxies(gomock.Any()).Return([]database.WorkspaceProxy{p1,p2},nil).AnyTimes() |
1177 | 1168 | check.Args().Asserts(p1,policy.ActionRead,p2,policy.ActionRead).Returns(slice.New(p1,p2))
|
1178 | 1169 | }))
|
1179 | 1170 | }
|
@@ -3496,73 +3487,49 @@ func (s *MethodTestSuite) TestWorkspacePortSharing() {
|
3496 | 3487 | }
|
3497 | 3488 |
|
3498 | 3489 | func (s*MethodTestSuite)TestProvisionerKeys() {
|
3499 |
| -s.Run("InsertProvisionerKey",s.Subtest(func(db database.Store,check*expects) { |
3500 |
| -org:=dbgen.Organization(s.T(),db, database.Organization{}) |
3501 |
| -pk:= database.ProvisionerKey{ |
3502 |
| -ID:uuid.New(), |
3503 |
| -CreatedAt:dbtestutil.NowInDefaultTimezone(), |
3504 |
| -OrganizationID:org.ID, |
3505 |
| -Name:strings.ToLower(coderdtest.RandomName(s.T())), |
3506 |
| -HashedSecret: []byte(coderdtest.RandomName(s.T())), |
3507 |
| -} |
3508 |
| -//nolint:gosimple // casting is not a simplification |
3509 |
| -check.Args(database.InsertProvisionerKeyParams{ |
3510 |
| -ID:pk.ID, |
3511 |
| -CreatedAt:pk.CreatedAt, |
3512 |
| -OrganizationID:pk.OrganizationID, |
3513 |
| -Name:pk.Name, |
3514 |
| -HashedSecret:pk.HashedSecret, |
3515 |
| -}).Asserts(pk,policy.ActionCreate).Returns(pk) |
3516 |
| -})) |
3517 |
| -s.Run("GetProvisionerKeyByID",s.Subtest(func(db database.Store,check*expects) { |
3518 |
| -org:=dbgen.Organization(s.T(),db, database.Organization{}) |
3519 |
| -pk:=dbgen.ProvisionerKey(s.T(),db, database.ProvisionerKey{OrganizationID:org.ID}) |
| 3490 | +s.Run("InsertProvisionerKey",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 3491 | +org:=testutil.Fake(s.T(),faker, database.Organization{}) |
| 3492 | +pk:=testutil.Fake(s.T(),faker, database.ProvisionerKey{OrganizationID:org.ID}) |
| 3493 | +arg:= database.InsertProvisionerKeyParams{ID:pk.ID,CreatedAt:pk.CreatedAt,OrganizationID:pk.OrganizationID,Name:pk.Name,HashedSecret:pk.HashedSecret} |
| 3494 | +dbm.EXPECT().InsertProvisionerKey(gomock.Any(),arg).Return(pk,nil).AnyTimes() |
| 3495 | +check.Args(arg).Asserts(rbac.ResourceProvisionerDaemon.InOrg(org.ID).WithID(pk.ID),policy.ActionCreate).Returns(pk) |
| 3496 | +})) |
| 3497 | +s.Run("GetProvisionerKeyByID",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 3498 | +org:=testutil.Fake(s.T(),faker, database.Organization{}) |
| 3499 | +pk:=testutil.Fake(s.T(),faker, database.ProvisionerKey{OrganizationID:org.ID}) |
| 3500 | +dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(),pk.ID).Return(pk,nil).AnyTimes() |
3520 | 3501 | check.Args(pk.ID).Asserts(pk,policy.ActionRead).Returns(pk)
|
3521 | 3502 | }))
|
3522 |
| -s.Run("GetProvisionerKeyByHashedSecret",s.Subtest(func(db database.Store,check*expects) { |
3523 |
| -org:=dbgen.Organization(s.T(),db, database.Organization{}) |
3524 |
| -pk:=dbgen.ProvisionerKey(s.T(),db, database.ProvisionerKey{OrganizationID:org.ID,HashedSecret: []byte("foo")}) |
| 3503 | +s.Run("GetProvisionerKeyByHashedSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 3504 | +org:=testutil.Fake(s.T(),faker, database.Organization{}) |
| 3505 | +pk:=testutil.Fake(s.T(),faker, database.ProvisionerKey{OrganizationID:org.ID,HashedSecret: []byte("foo")}) |
| 3506 | +dbm.EXPECT().GetProvisionerKeyByHashedSecret(gomock.Any(), []byte("foo")).Return(pk,nil).AnyTimes() |
3525 | 3507 | check.Args([]byte("foo")).Asserts(pk,policy.ActionRead).Returns(pk)
|
3526 | 3508 | }))
|
3527 |
| -s.Run("GetProvisionerKeyByName",s.Subtest(func(db database.Store,check*expects) { |
3528 |
| -org:=dbgen.Organization(s.T(),db, database.Organization{}) |
3529 |
| -pk:=dbgen.ProvisionerKey(s.T(),db, database.ProvisionerKey{OrganizationID:org.ID}) |
3530 |
| -check.Args(database.GetProvisionerKeyByNameParams{ |
3531 |
| -OrganizationID:org.ID, |
3532 |
| -Name:pk.Name, |
3533 |
| -}).Asserts(pk,policy.ActionRead).Returns(pk) |
3534 |
| -})) |
3535 |
| -s.Run("ListProvisionerKeysByOrganization",s.Subtest(func(db database.Store,check*expects) { |
3536 |
| -org:=dbgen.Organization(s.T(),db, database.Organization{}) |
3537 |
| -pk:=dbgen.ProvisionerKey(s.T(),db, database.ProvisionerKey{OrganizationID:org.ID}) |
3538 |
| -pks:= []database.ProvisionerKey{ |
3539 |
| -{ |
3540 |
| -ID:pk.ID, |
3541 |
| -CreatedAt:pk.CreatedAt, |
3542 |
| -OrganizationID:pk.OrganizationID, |
3543 |
| -Name:pk.Name, |
3544 |
| -HashedSecret:pk.HashedSecret, |
3545 |
| -}, |
3546 |
| -} |
3547 |
| -check.Args(org.ID).Asserts(pk,policy.ActionRead).Returns(pks) |
3548 |
| -})) |
3549 |
| -s.Run("ListProvisionerKeysByOrganizationExcludeReserved",s.Subtest(func(db database.Store,check*expects) { |
3550 |
| -org:=dbgen.Organization(s.T(),db, database.Organization{}) |
3551 |
| -pk:=dbgen.ProvisionerKey(s.T(),db, database.ProvisionerKey{OrganizationID:org.ID}) |
3552 |
| -pks:= []database.ProvisionerKey{ |
3553 |
| -{ |
3554 |
| -ID:pk.ID, |
3555 |
| -CreatedAt:pk.CreatedAt, |
3556 |
| -OrganizationID:pk.OrganizationID, |
3557 |
| -Name:pk.Name, |
3558 |
| -HashedSecret:pk.HashedSecret, |
3559 |
| -}, |
3560 |
| -} |
3561 |
| -check.Args(org.ID).Asserts(pk,policy.ActionRead).Returns(pks) |
3562 |
| -})) |
3563 |
| -s.Run("DeleteProvisionerKey",s.Subtest(func(db database.Store,check*expects) { |
3564 |
| -org:=dbgen.Organization(s.T(),db, database.Organization{}) |
3565 |
| -pk:=dbgen.ProvisionerKey(s.T(),db, database.ProvisionerKey{OrganizationID:org.ID}) |
| 3509 | +s.Run("GetProvisionerKeyByName",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 3510 | +org:=testutil.Fake(s.T(),faker, database.Organization{}) |
| 3511 | +pk:=testutil.Fake(s.T(),faker, database.ProvisionerKey{OrganizationID:org.ID}) |
| 3512 | +arg:= database.GetProvisionerKeyByNameParams{OrganizationID:org.ID,Name:pk.Name} |
| 3513 | +dbm.EXPECT().GetProvisionerKeyByName(gomock.Any(),arg).Return(pk,nil).AnyTimes() |
| 3514 | +check.Args(arg).Asserts(pk,policy.ActionRead).Returns(pk) |
| 3515 | +})) |
| 3516 | +s.Run("ListProvisionerKeysByOrganization",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 3517 | +org:=testutil.Fake(s.T(),faker, database.Organization{}) |
| 3518 | +pk:=testutil.Fake(s.T(),faker, database.ProvisionerKey{OrganizationID:org.ID}) |
| 3519 | +dbm.EXPECT().ListProvisionerKeysByOrganization(gomock.Any(),org.ID).Return([]database.ProvisionerKey{pk},nil).AnyTimes() |
| 3520 | +check.Args(org.ID).Asserts(pk,policy.ActionRead).Returns([]database.ProvisionerKey{pk}) |
| 3521 | +})) |
| 3522 | +s.Run("ListProvisionerKeysByOrganizationExcludeReserved",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 3523 | +org:=testutil.Fake(s.T(),faker, database.Organization{}) |
| 3524 | +pk:=testutil.Fake(s.T(),faker, database.ProvisionerKey{OrganizationID:org.ID}) |
| 3525 | +dbm.EXPECT().ListProvisionerKeysByOrganizationExcludeReserved(gomock.Any(),org.ID).Return([]database.ProvisionerKey{pk},nil).AnyTimes() |
| 3526 | +check.Args(org.ID).Asserts(pk,policy.ActionRead).Returns([]database.ProvisionerKey{pk}) |
| 3527 | +})) |
| 3528 | +s.Run("DeleteProvisionerKey",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) { |
| 3529 | +org:=testutil.Fake(s.T(),faker, database.Organization{}) |
| 3530 | +pk:=testutil.Fake(s.T(),faker, database.ProvisionerKey{OrganizationID:org.ID}) |
| 3531 | +dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(),pk.ID).Return(pk,nil).AnyTimes() |
| 3532 | +dbm.EXPECT().DeleteProvisionerKey(gomock.Any(),pk.ID).Return(nil).AnyTimes() |
3566 | 3533 | check.Args(pk.ID).Asserts(pk,policy.ActionDelete).Returns()
|
3567 | 3534 | }))
|
3568 | 3535 | }
|
|