@@ -713,21 +713,27 @@ func TestAPIKey(t *testing.T) {
713
713
db = dbmem .New ()
714
714
org = dbgen .Organization (t , db , database.Organization {})
715
715
customRole = dbgen .CustomRole (t , db , database.CustomRole {
716
- Name : "custom-role" ,
717
-
716
+ Name : "custom-role" ,
718
717
OrgPermissions : []database.CustomRolePermission {},
719
718
OrganizationID : uuid.NullUUID {
720
719
UUID : org .ID ,
721
720
Valid : true ,
722
721
},
723
722
})
724
723
user = dbgen .User (t , db , database.User {
725
- RBACRoles : []string {
726
- rbac .ScopedRoleOrgAdmin (org .ID ).String (),
727
- customRole .RoleIdentifier ().String (),
724
+ RBACRoles : []string {},
725
+ })
726
+ _ = dbgen .OrganizationMember (t , db , database.OrganizationMember {
727
+ UserID : user .ID ,
728
+ OrganizationID : org .ID ,
729
+ CreatedAt : time.Time {},
730
+ UpdatedAt : time.Time {},
731
+ Roles : []string {
732
+ rbac .RoleOrgAdmin (),
733
+ customRole .Name ,
728
734
},
729
735
})
730
- sentAPIKey , token = dbgen .APIKey (t , db , database.APIKey {
736
+ _ , token = dbgen .APIKey (t , db , database.APIKey {
731
737
UserID : user .ID ,
732
738
ExpiresAt : dbtime .Now ().AddDate (0 , 0 , 1 ),
733
739
})
@@ -763,11 +769,6 @@ func TestAPIKey(t *testing.T) {
763
769
res := rw .Result ()
764
770
defer res .Body .Close ()
765
771
require .Equal (t , http .StatusOK , res .StatusCode )
766
-
767
- gotAPIKey , err := db .GetAPIKeyByID (r .Context (), sentAPIKey .ID )
768
- require .NoError (t , err )
769
-
770
- require .Equal (t , sentAPIKey .ExpiresAt , gotAPIKey .ExpiresAt )
771
772
})
772
773
773
774
// There is no sql foreign key constraint to require all assigned roles
@@ -780,13 +781,24 @@ func TestAPIKey(t *testing.T) {
780
781
org = dbgen .Organization (t , db , database.Organization {})
781
782
user = dbgen .User (t , db , database.User {
782
783
RBACRoles : []string {
783
- rbac .ScopedRoleOrgAdmin (org .ID ).String (),
784
- rbac.RoleIdentifier {Name : roleNotExistsName , OrganizationID : org .ID }.String (),
785
- // Also provide an org not exists
784
+ // Also provide an org not exists. In practice this makes no sense
785
+ // to store org roles in the user table, but there is no org to
786
+ // store it in. So just throw this here for even more unexpected
787
+ // behavior handling!
786
788
rbac.RoleIdentifier {Name : roleNotExistsName , OrganizationID : uuid .New ()}.String (),
787
789
},
788
790
})
789
- sentAPIKey , token = dbgen .APIKey (t , db , database.APIKey {
791
+ _ = dbgen .OrganizationMember (t , db , database.OrganizationMember {
792
+ UserID : user .ID ,
793
+ OrganizationID : org .ID ,
794
+ CreatedAt : time.Time {},
795
+ UpdatedAt : time.Time {},
796
+ Roles : []string {
797
+ rbac .RoleOrgAdmin (),
798
+ roleNotExistsName ,
799
+ },
800
+ })
801
+ _ , token = dbgen .APIKey (t , db , database.APIKey {
790
802
UserID : user .ID ,
791
803
ExpiresAt : dbtime .Now ().AddDate (0 , 0 , 1 ),
792
804
})
@@ -822,11 +834,5 @@ func TestAPIKey(t *testing.T) {
822
834
res := rw .Result ()
823
835
defer res .Body .Close ()
824
836
require .Equal (t , http .StatusOK , res .StatusCode )
825
-
826
- gotAPIKey , err := db .GetAPIKeyByID (r .Context (), sentAPIKey .ID )
827
- require .NoError (t , err )
828
-
829
- require .Equal (t , sentAPIKey .ExpiresAt , gotAPIKey .ExpiresAt )
830
837
})
831
-
832
838
}
0 commit comments