|
7 | 7 | "fmt"
|
8 | 8 | "net"
|
9 | 9 | "reflect"
|
10 |
| - "strings" |
11 | 10 | "testing"
|
12 | 11 | "time"
|
13 | 12 |
|
@@ -751,88 +750,78 @@ func (s *MethodTestSuite) TestProvisionerJob() {
|
751 | 750 | }
|
752 | 751 |
|
753 | 752 | func (s *MethodTestSuite) TestLicense() {
|
754 |
| - s.Run("GetLicenses", s.Subtest(func(db database.Store, check *expects) { |
755 |
| - l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
756 |
| - UUID: uuid.New(), |
757 |
| - }) |
758 |
| - require.NoError(s.T(), err) |
759 |
| - check.Args().Asserts(l, policy.ActionRead). |
760 |
| - Returns([]database.License{l}) |
| 753 | + s.Run("GetLicenses", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 754 | + l := database.License{ID: 1} |
| 755 | + dbm.EXPECT().GetLicenses(gomock.Any()).Return([]database.License{l}, nil).AnyTimes() |
| 756 | + check.Args().Asserts(l, policy.ActionRead).Returns([]database.License{l}) |
761 | 757 | }))
|
762 |
| - s.Run("InsertLicense", s.Subtest(func(db database.Store, check *expects) { |
763 |
| - check.Args(database.InsertLicenseParams{}). |
764 |
| - Asserts(rbac.ResourceLicense, policy.ActionCreate) |
| 758 | + s.Run("InsertLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 759 | + dbm.EXPECT().InsertLicense(gomock.Any(), database.InsertLicenseParams{}).Return(database.License{}, nil).AnyTimes() |
| 760 | + check.Args(database.InsertLicenseParams{}).Asserts(rbac.ResourceLicense, policy.ActionCreate) |
765 | 761 | }))
|
766 |
| - s.Run("UpsertLogoURL", s.Subtest(func(db database.Store, check *expects) { |
| 762 | + s.Run("UpsertLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 763 | + dbm.EXPECT().UpsertLogoURL(gomock.Any(), "value").Return(nil).AnyTimes() |
767 | 764 | check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
|
768 | 765 | }))
|
769 |
| - s.Run("UpsertAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) { |
| 766 | + s.Run("UpsertAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 767 | + dbm.EXPECT().UpsertAnnouncementBanners(gomock.Any(), "value").Return(nil).AnyTimes() |
770 | 768 | check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
|
771 | 769 | }))
|
772 |
| - s.Run("GetLicenseByID", s.Subtest(func(db database.Store, check *expects) { |
773 |
| - l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
774 |
| - UUID: uuid.New(), |
775 |
| - }) |
776 |
| - require.NoError(s.T(), err) |
777 |
| - check.Args(l.ID).Asserts(l, policy.ActionRead).Returns(l) |
| 770 | + s.Run("GetLicenseByID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 771 | + l := database.License{ID: 1} |
| 772 | + dbm.EXPECT().GetLicenseByID(gomock.Any(), int32(1)).Return(l, nil).AnyTimes() |
| 773 | + check.Args(int32(1)).Asserts(l, policy.ActionRead).Returns(l) |
778 | 774 | }))
|
779 |
| - s.Run("DeleteLicense", s.Subtest(func(db database.Store, check *expects) { |
780 |
| - l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
781 |
| - UUID: uuid.New(), |
782 |
| - }) |
783 |
| - require.NoError(s.T(), err) |
| 775 | + s.Run("DeleteLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 776 | + l := database.License{ID: 1} |
| 777 | + dbm.EXPECT().GetLicenseByID(gomock.Any(), l.ID).Return(l, nil).AnyTimes() |
| 778 | + dbm.EXPECT().DeleteLicense(gomock.Any(), l.ID).Return(int32(1), nil).AnyTimes() |
784 | 779 | check.Args(l.ID).Asserts(l, policy.ActionDelete)
|
785 | 780 | }))
|
786 |
| - s.Run("GetDeploymentID", s.Subtest(func(db database.Store, check *expects) { |
787 |
| - db.InsertDeploymentID(context.Background(), "value") |
| 781 | + s.Run("GetDeploymentID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 782 | + dbm.EXPECT().GetDeploymentID(gomock.Any()).Return("value", nil).AnyTimes() |
788 | 783 | check.Args().Asserts().Returns("value")
|
789 | 784 | }))
|
790 |
| - s.Run("GetDefaultProxyConfig", s.Subtest(func(db database.Store, check *expects) { |
791 |
| - check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{ |
792 |
| - DisplayName: "Default", |
793 |
| - IconUrl: "/emojis/1f3e1.png", |
794 |
| - }) |
| 785 | + s.Run("GetDefaultProxyConfig", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 786 | + dbm.EXPECT().GetDefaultProxyConfig(gomock.Any()).Return(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"}, nil).AnyTimes() |
| 787 | + check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"}) |
795 | 788 | }))
|
796 |
| - s.Run("GetLogoURL", s.Subtest(func(db database.Store, check *expects) { |
797 |
| - err := db.UpsertLogoURL(context.Background(), "value") |
798 |
| - require.NoError(s.T(), err) |
| 789 | + s.Run("GetLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 790 | + dbm.EXPECT().GetLogoURL(gomock.Any()).Return("value", nil).AnyTimes() |
799 | 791 | check.Args().Asserts().Returns("value")
|
800 | 792 | }))
|
801 |
| - s.Run("GetAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) { |
802 |
| - err := db.UpsertAnnouncementBanners(context.Background(), "value") |
803 |
| - require.NoError(s.T(), err) |
| 793 | + s.Run("GetAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 794 | + dbm.EXPECT().GetAnnouncementBanners(gomock.Any()).Return("value", nil).AnyTimes() |
804 | 795 | check.Args().Asserts().Returns("value")
|
805 | 796 | }))
|
806 |
| - s.Run("GetManagedAgentCount", s.Subtest(func(db database.Store, check *expects) { |
| 797 | + s.Run("GetManagedAgentCount", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
807 | 798 | start := dbtime.Now()
|
808 | 799 | end := start.Add(time.Hour)
|
809 |
| - check.Args(database.GetManagedAgentCountParams{ |
810 |
| - StartTime: start, |
811 |
| - EndTime: end, |
812 |
| - }).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0)) |
| 800 | + dbm.EXPECT().GetManagedAgentCount(gomock.Any(), database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Return(int64(0), nil).AnyTimes() |
| 801 | + check.Args(database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0)) |
813 | 802 | }))
|
814 | 803 | }
|
815 | 804 |
|
816 | 805 | func (s *MethodTestSuite) TestOrganization() {
|
817 |
| - s.Run("Deployment/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) { |
| 806 | + s.Run("Deployment/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 807 | + dbm.EXPECT().OIDCClaimFields(gomock.Any(), uuid.Nil).Return([]string{}, nil).AnyTimes() |
818 | 808 | check.Args(uuid.Nil).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
|
819 | 809 | }))
|
820 |
| - s.Run("Organization/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) { |
| 810 | + s.Run("Organization/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
821 | 811 | id := uuid.New()
|
| 812 | + dbm.EXPECT().OIDCClaimFields(gomock.Any(), id).Return([]string{}, nil).AnyTimes() |
822 | 813 | check.Args(id).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
|
823 | 814 | }))
|
824 |
| - s.Run("Deployment/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) { |
825 |
| - check.Args(database.OIDCClaimFieldValuesParams{ |
826 |
| - ClaimField: "claim-field", |
827 |
| - OrganizationID: uuid.Nil, |
828 |
| - }).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{}) |
| 815 | + s.Run("Deployment/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 816 | + arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: uuid.Nil} |
| 817 | + dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes() |
| 818 | + check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{}) |
829 | 819 | }))
|
830 |
| - s.Run("Organization/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) { |
| 820 | + s.Run("Organization/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
831 | 821 | id := uuid.New()
|
832 |
| - check.Args(database.OIDCClaimFieldValuesParams{ |
833 |
| - ClaimField: "claim-field", |
834 |
| - OrganizationID: id, |
835 |
| - }).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{}) |
| 822 | + arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: id} |
| 823 | + dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes() |
| 824 | + check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{}) |
836 | 825 | }))
|
837 | 826 | s.Run("ByOrganization/GetGroups", s.Subtest(func(db database.Store, check *expects) {
|
838 | 827 | o := dbgen.Organization(s.T(), db, database.Organization{})
|
@@ -1139,41 +1128,43 @@ func (s *MethodTestSuite) TestOrganization() {
|
1139 | 1128 | }
|
1140 | 1129 |
|
1141 | 1130 | func (s *MethodTestSuite) TestWorkspaceProxy() {
|
1142 |
| - s.Run("InsertWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) { |
1143 |
| - check.Args(database.InsertWorkspaceProxyParams{ |
1144 |
| - ID: uuid.New(), |
1145 |
| - }).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate) |
1146 |
| - })) |
1147 |
| - s.Run("RegisterWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) { |
1148 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1149 |
| - check.Args(database.RegisterWorkspaceProxyParams{ |
1150 |
| - ID: p.ID, |
1151 |
| - }).Asserts(p, policy.ActionUpdate) |
1152 |
| - })) |
1153 |
| - s.Run("GetWorkspaceProxyByID", s.Subtest(func(db database.Store, check *expects) { |
1154 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
| 1131 | + s.Run("InsertWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 1132 | + arg := database.InsertWorkspaceProxyParams{ID: uuid.New()} |
| 1133 | + dbm.EXPECT().InsertWorkspaceProxy(gomock.Any(), arg).Return(database.WorkspaceProxy{}, nil).AnyTimes() |
| 1134 | + check.Args(arg).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate) |
| 1135 | + })) |
| 1136 | + s.Run("RegisterWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1137 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1138 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
| 1139 | + dbm.EXPECT().RegisterWorkspaceProxy(gomock.Any(), database.RegisterWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes() |
| 1140 | + check.Args(database.RegisterWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate) |
| 1141 | + })) |
| 1142 | + s.Run("GetWorkspaceProxyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1143 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1144 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
1155 | 1145 | check.Args(p.ID).Asserts(p, policy.ActionRead).Returns(p)
|
1156 | 1146 | }))
|
1157 |
| - s.Run("GetWorkspaceProxyByName", s.Subtest(func(db database.Store, check *expects) { |
1158 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
| 1147 | + s.Run("GetWorkspaceProxyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1148 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1149 | + dbm.EXPECT().GetWorkspaceProxyByName(gomock.Any(), p.Name).Return(p, nil).AnyTimes() |
1159 | 1150 | check.Args(p.Name).Asserts(p, policy.ActionRead).Returns(p)
|
1160 | 1151 | }))
|
1161 |
| - s.Run("UpdateWorkspaceProxyDeleted", s.Subtest(func(db database.Store, check *expects) { |
1162 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1163 |
| - check.Args(database.UpdateWorkspaceProxyDeletedParams{ |
1164 |
| - ID: p.ID, |
1165 |
| - Deleted: true, |
1166 |
| - }).Asserts(p, policy.ActionDelete) |
1167 |
| - })) |
1168 |
| - s.Run("UpdateWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) { |
1169 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1170 |
| - check.Args(database.UpdateWorkspaceProxyParams{ |
1171 |
| - ID: p.ID, |
1172 |
| - }).Asserts(p, policy.ActionUpdate) |
1173 |
| - })) |
1174 |
| - s.Run("GetWorkspaceProxies", s.Subtest(func(db database.Store, check *expects) { |
1175 |
| - p1, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1176 |
| - p2, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
| 1152 | + s.Run("UpdateWorkspaceProxyDeleted", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1153 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1154 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
| 1155 | + dbm.EXPECT().UpdateWorkspaceProxyDeleted(gomock.Any(), database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Return(nil).AnyTimes() |
| 1156 | + check.Args(database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Asserts(p, policy.ActionDelete) |
| 1157 | + })) |
| 1158 | + s.Run("UpdateWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1159 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1160 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
| 1161 | + dbm.EXPECT().UpdateWorkspaceProxy(gomock.Any(), database.UpdateWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes() |
| 1162 | + check.Args(database.UpdateWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate) |
| 1163 | + })) |
| 1164 | + s.Run("GetWorkspaceProxies", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1165 | + p1 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1166 | + p2 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1167 | + dbm.EXPECT().GetWorkspaceProxies(gomock.Any()).Return([]database.WorkspaceProxy{p1, p2}, nil).AnyTimes() |
1177 | 1168 | check.Args().Asserts(p1, policy.ActionRead, p2, policy.ActionRead).Returns(slice.New(p1, p2))
|
1178 | 1169 | }))
|
1179 | 1170 | }
|
@@ -3496,73 +3487,49 @@ func (s *MethodTestSuite) TestWorkspacePortSharing() {
|
3496 | 3487 | }
|
3497 | 3488 |
|
3498 | 3489 | func (s *MethodTestSuite) TestProvisionerKeys() {
|
3499 |
| - s.Run("InsertProvisionerKey", s.Subtest(func(db database.Store, check *expects) { |
3500 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3501 |
| - pk := database.ProvisionerKey{ |
3502 |
| - ID: uuid.New(), |
3503 |
| - CreatedAt: dbtestutil.NowInDefaultTimezone(), |
3504 |
| - OrganizationID: org.ID, |
3505 |
| - Name: strings.ToLower(coderdtest.RandomName(s.T())), |
3506 |
| - HashedSecret: []byte(coderdtest.RandomName(s.T())), |
3507 |
| - } |
3508 |
| - //nolint:gosimple // casting is not a simplification |
3509 |
| - check.Args(database.InsertProvisionerKeyParams{ |
3510 |
| - ID: pk.ID, |
3511 |
| - CreatedAt: pk.CreatedAt, |
3512 |
| - OrganizationID: pk.OrganizationID, |
3513 |
| - Name: pk.Name, |
3514 |
| - HashedSecret: pk.HashedSecret, |
3515 |
| - }).Asserts(pk, policy.ActionCreate).Returns(pk) |
3516 |
| - })) |
3517 |
| - s.Run("GetProvisionerKeyByID", s.Subtest(func(db database.Store, check *expects) { |
3518 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3519 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3490 | + s.Run("InsertProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3491 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3492 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3493 | + arg := database.InsertProvisionerKeyParams{ID: pk.ID, CreatedAt: pk.CreatedAt, OrganizationID: pk.OrganizationID, Name: pk.Name, HashedSecret: pk.HashedSecret} |
| 3494 | + dbm.EXPECT().InsertProvisionerKey(gomock.Any(), arg).Return(pk, nil).AnyTimes() |
| 3495 | + check.Args(arg).Asserts(rbac.ResourceProvisionerDaemon.InOrg(org.ID).WithID(pk.ID), policy.ActionCreate).Returns(pk) |
| 3496 | + })) |
| 3497 | + s.Run("GetProvisionerKeyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3498 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3499 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3500 | + dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes() |
3520 | 3501 | check.Args(pk.ID).Asserts(pk, policy.ActionRead).Returns(pk)
|
3521 | 3502 | }))
|
3522 |
| - s.Run("GetProvisionerKeyByHashedSecret", s.Subtest(func(db database.Store, check *expects) { |
3523 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3524 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")}) |
| 3503 | + s.Run("GetProvisionerKeyByHashedSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3504 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3505 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")}) |
| 3506 | + dbm.EXPECT().GetProvisionerKeyByHashedSecret(gomock.Any(), []byte("foo")).Return(pk, nil).AnyTimes() |
3525 | 3507 | check.Args([]byte("foo")).Asserts(pk, policy.ActionRead).Returns(pk)
|
3526 | 3508 | }))
|
3527 |
| - s.Run("GetProvisionerKeyByName", s.Subtest(func(db database.Store, check *expects) { |
3528 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3529 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
3530 |
| - check.Args(database.GetProvisionerKeyByNameParams{ |
3531 |
| - OrganizationID: org.ID, |
3532 |
| - Name: pk.Name, |
3533 |
| - }).Asserts(pk, policy.ActionRead).Returns(pk) |
3534 |
| - })) |
3535 |
| - s.Run("ListProvisionerKeysByOrganization", s.Subtest(func(db database.Store, check *expects) { |
3536 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3537 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
3538 |
| - pks := []database.ProvisionerKey{ |
3539 |
| - { |
3540 |
| - ID: pk.ID, |
3541 |
| - CreatedAt: pk.CreatedAt, |
3542 |
| - OrganizationID: pk.OrganizationID, |
3543 |
| - Name: pk.Name, |
3544 |
| - HashedSecret: pk.HashedSecret, |
3545 |
| - }, |
3546 |
| - } |
3547 |
| - check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks) |
3548 |
| - })) |
3549 |
| - s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Subtest(func(db database.Store, check *expects) { |
3550 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3551 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
3552 |
| - pks := []database.ProvisionerKey{ |
3553 |
| - { |
3554 |
| - ID: pk.ID, |
3555 |
| - CreatedAt: pk.CreatedAt, |
3556 |
| - OrganizationID: pk.OrganizationID, |
3557 |
| - Name: pk.Name, |
3558 |
| - HashedSecret: pk.HashedSecret, |
3559 |
| - }, |
3560 |
| - } |
3561 |
| - check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks) |
3562 |
| - })) |
3563 |
| - s.Run("DeleteProvisionerKey", s.Subtest(func(db database.Store, check *expects) { |
3564 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3565 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3509 | + s.Run("GetProvisionerKeyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3510 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3511 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3512 | + arg := database.GetProvisionerKeyByNameParams{OrganizationID: org.ID, Name: pk.Name} |
| 3513 | + dbm.EXPECT().GetProvisionerKeyByName(gomock.Any(), arg).Return(pk, nil).AnyTimes() |
| 3514 | + check.Args(arg).Asserts(pk, policy.ActionRead).Returns(pk) |
| 3515 | + })) |
| 3516 | + s.Run("ListProvisionerKeysByOrganization", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3517 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3518 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3519 | + dbm.EXPECT().ListProvisionerKeysByOrganization(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes() |
| 3520 | + check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk}) |
| 3521 | + })) |
| 3522 | + s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3523 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3524 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3525 | + dbm.EXPECT().ListProvisionerKeysByOrganizationExcludeReserved(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes() |
| 3526 | + check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk}) |
| 3527 | + })) |
| 3528 | + s.Run("DeleteProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3529 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3530 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3531 | + dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes() |
| 3532 | + dbm.EXPECT().DeleteProvisionerKey(gomock.Any(), pk.ID).Return(nil).AnyTimes() |
3566 | 3533 | check.Args(pk.ID).Asserts(pk, policy.ActionDelete).Returns()
|
3567 | 3534 | }))
|
3568 | 3535 | }
|
|
0 commit comments