Skip to content

Commit 0213df9

Browse files
committed
fixup test
1 parent b8fa251 commit 0213df9

File tree

1 file changed

+27
-21
lines changed

1 file changed

+27
-21
lines changed

coderd/httpmw/apikey_test.go

Lines changed: 27 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -713,21 +713,27 @@ func TestAPIKey(t *testing.T) {
713713
db = dbmem.New()
714714
org = dbgen.Organization(t, db, database.Organization{})
715715
customRole = dbgen.CustomRole(t, db, database.CustomRole{
716-
Name: "custom-role",
717-
716+
Name: "custom-role",
718717
OrgPermissions: []database.CustomRolePermission{},
719718
OrganizationID: uuid.NullUUID{
720719
UUID: org.ID,
721720
Valid: true,
722721
},
723722
})
724723
user = dbgen.User(t, db, database.User{
725-
RBACRoles: []string{
726-
rbac.ScopedRoleOrgAdmin(org.ID).String(),
727-
customRole.RoleIdentifier().String(),
724+
RBACRoles: []string{},
725+
})
726+
_ = dbgen.OrganizationMember(t, db, database.OrganizationMember{
727+
UserID: user.ID,
728+
OrganizationID: org.ID,
729+
CreatedAt: time.Time{},
730+
UpdatedAt: time.Time{},
731+
Roles: []string{
732+
rbac.RoleOrgAdmin(),
733+
customRole.Name,
728734
},
729735
})
730-
sentAPIKey, token = dbgen.APIKey(t, db, database.APIKey{
736+
_, token = dbgen.APIKey(t, db, database.APIKey{
731737
UserID: user.ID,
732738
ExpiresAt: dbtime.Now().AddDate(0, 0, 1),
733739
})
@@ -763,11 +769,6 @@ func TestAPIKey(t *testing.T) {
763769
res := rw.Result()
764770
defer res.Body.Close()
765771
require.Equal(t, http.StatusOK, res.StatusCode)
766-
767-
gotAPIKey, err := db.GetAPIKeyByID(r.Context(), sentAPIKey.ID)
768-
require.NoError(t, err)
769-
770-
require.Equal(t, sentAPIKey.ExpiresAt, gotAPIKey.ExpiresAt)
771772
})
772773

773774
// There is no sql foreign key constraint to require all assigned roles
@@ -780,13 +781,24 @@ func TestAPIKey(t *testing.T) {
780781
org = dbgen.Organization(t, db, database.Organization{})
781782
user = dbgen.User(t, db, database.User{
782783
RBACRoles: []string{
783-
rbac.ScopedRoleOrgAdmin(org.ID).String(),
784-
rbac.RoleIdentifier{Name: roleNotExistsName, OrganizationID: org.ID}.String(),
785-
// Also provide an org not exists
784+
// Also provide an org not exists. In practice this makes no sense
785+
// to store org roles in the user table, but there is no org to
786+
// store it in. So just throw this here for even more unexpected
787+
// behavior handling!
786788
rbac.RoleIdentifier{Name: roleNotExistsName, OrganizationID: uuid.New()}.String(),
787789
},
788790
})
789-
sentAPIKey, token = dbgen.APIKey(t, db, database.APIKey{
791+
_ = dbgen.OrganizationMember(t, db, database.OrganizationMember{
792+
UserID: user.ID,
793+
OrganizationID: org.ID,
794+
CreatedAt: time.Time{},
795+
UpdatedAt: time.Time{},
796+
Roles: []string{
797+
rbac.RoleOrgAdmin(),
798+
roleNotExistsName,
799+
},
800+
})
801+
_, token = dbgen.APIKey(t, db, database.APIKey{
790802
UserID: user.ID,
791803
ExpiresAt: dbtime.Now().AddDate(0, 0, 1),
792804
})
@@ -822,11 +834,5 @@ func TestAPIKey(t *testing.T) {
822834
res := rw.Result()
823835
defer res.Body.Close()
824836
require.Equal(t, http.StatusOK, res.StatusCode)
825-
826-
gotAPIKey, err := db.GetAPIKeyByID(r.Context(), sentAPIKey.ID)
827-
require.NoError(t, err)
828-
829-
require.Equal(t, sentAPIKey.ExpiresAt, gotAPIKey.ExpiresAt)
830837
})
831-
832838
}

0 commit comments

Comments
 (0)