Skip to content

Commit b7ff778

Browse files
blink-so[bot]hugodutka
authored andcommitted
test(dbauthz): migrate four groups to mocked db (License, Organization OIDC claims, WorkspaceProxy, ProvisionerKeys)\n\n- Convert tests to s.Mocked\n- Add gomock expectations for fetch and authorized paths\n- Remove unused imports\n\nCo-authored-by: hugodutka <28019628+hugodutka@users.noreply.github.com>
1 parent 1ff8f54 commit b7ff778

File tree

1 file changed

+115
-148
lines changed

1 file changed

+115
-148
lines changed

coderd/database/dbauthz/dbauthz_test.go

Lines changed: 115 additions & 148 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ import (
77
"fmt"
88
"net"
99
"reflect"
10-
"strings"
1110
"testing"
1211
"time"
1312

@@ -751,88 +750,78 @@ func (s *MethodTestSuite) TestProvisionerJob() {
751750
}
752751

753752
func (s *MethodTestSuite) TestLicense() {
754-
s.Run("GetLicenses", s.Subtest(func(db database.Store, check *expects) {
755-
l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{
756-
UUID: uuid.New(),
757-
})
758-
require.NoError(s.T(), err)
759-
check.Args().Asserts(l, policy.ActionRead).
760-
Returns([]database.License{l})
753+
s.Run("GetLicenses", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
754+
l := database.License{ID: 1}
755+
dbm.EXPECT().GetLicenses(gomock.Any()).Return([]database.License{l}, nil).AnyTimes()
756+
check.Args().Asserts(l, policy.ActionRead).Returns([]database.License{l})
761757
}))
762-
s.Run("InsertLicense", s.Subtest(func(db database.Store, check *expects) {
763-
check.Args(database.InsertLicenseParams{}).
764-
Asserts(rbac.ResourceLicense, policy.ActionCreate)
758+
s.Run("InsertLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
759+
dbm.EXPECT().InsertLicense(gomock.Any(), database.InsertLicenseParams{}).Return(database.License{}, nil).AnyTimes()
760+
check.Args(database.InsertLicenseParams{}).Asserts(rbac.ResourceLicense, policy.ActionCreate)
765761
}))
766-
s.Run("UpsertLogoURL", s.Subtest(func(db database.Store, check *expects) {
762+
s.Run("UpsertLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
763+
dbm.EXPECT().UpsertLogoURL(gomock.Any(), "value").Return(nil).AnyTimes()
767764
check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
768765
}))
769-
s.Run("UpsertAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) {
766+
s.Run("UpsertAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
767+
dbm.EXPECT().UpsertAnnouncementBanners(gomock.Any(), "value").Return(nil).AnyTimes()
770768
check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
771769
}))
772-
s.Run("GetLicenseByID", s.Subtest(func(db database.Store, check *expects) {
773-
l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{
774-
UUID: uuid.New(),
775-
})
776-
require.NoError(s.T(), err)
777-
check.Args(l.ID).Asserts(l, policy.ActionRead).Returns(l)
770+
s.Run("GetLicenseByID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
771+
l := database.License{ID: 1}
772+
dbm.EXPECT().GetLicenseByID(gomock.Any(), int32(1)).Return(l, nil).AnyTimes()
773+
check.Args(int32(1)).Asserts(l, policy.ActionRead).Returns(l)
778774
}))
779-
s.Run("DeleteLicense", s.Subtest(func(db database.Store, check *expects) {
780-
l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{
781-
UUID: uuid.New(),
782-
})
783-
require.NoError(s.T(), err)
775+
s.Run("DeleteLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
776+
l := database.License{ID: 1}
777+
dbm.EXPECT().GetLicenseByID(gomock.Any(), l.ID).Return(l, nil).AnyTimes()
778+
dbm.EXPECT().DeleteLicense(gomock.Any(), l.ID).Return(int32(1), nil).AnyTimes()
784779
check.Args(l.ID).Asserts(l, policy.ActionDelete)
785780
}))
786-
s.Run("GetDeploymentID", s.Subtest(func(db database.Store, check *expects) {
787-
db.InsertDeploymentID(context.Background(), "value")
781+
s.Run("GetDeploymentID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
782+
dbm.EXPECT().GetDeploymentID(gomock.Any()).Return("value", nil).AnyTimes()
788783
check.Args().Asserts().Returns("value")
789784
}))
790-
s.Run("GetDefaultProxyConfig", s.Subtest(func(db database.Store, check *expects) {
791-
check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{
792-
DisplayName: "Default",
793-
IconUrl: "/emojis/1f3e1.png",
794-
})
785+
s.Run("GetDefaultProxyConfig", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
786+
dbm.EXPECT().GetDefaultProxyConfig(gomock.Any()).Return(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"}, nil).AnyTimes()
787+
check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"})
795788
}))
796-
s.Run("GetLogoURL", s.Subtest(func(db database.Store, check *expects) {
797-
err := db.UpsertLogoURL(context.Background(), "value")
798-
require.NoError(s.T(), err)
789+
s.Run("GetLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
790+
dbm.EXPECT().GetLogoURL(gomock.Any()).Return("value", nil).AnyTimes()
799791
check.Args().Asserts().Returns("value")
800792
}))
801-
s.Run("GetAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) {
802-
err := db.UpsertAnnouncementBanners(context.Background(), "value")
803-
require.NoError(s.T(), err)
793+
s.Run("GetAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
794+
dbm.EXPECT().GetAnnouncementBanners(gomock.Any()).Return("value", nil).AnyTimes()
804795
check.Args().Asserts().Returns("value")
805796
}))
806-
s.Run("GetManagedAgentCount", s.Subtest(func(db database.Store, check *expects) {
797+
s.Run("GetManagedAgentCount", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
807798
start := dbtime.Now()
808799
end := start.Add(time.Hour)
809-
check.Args(database.GetManagedAgentCountParams{
810-
StartTime: start,
811-
EndTime: end,
812-
}).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0))
800+
dbm.EXPECT().GetManagedAgentCount(gomock.Any(), database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Return(int64(0), nil).AnyTimes()
801+
check.Args(database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0))
813802
}))
814803
}
815804

816805
func (s *MethodTestSuite) TestOrganization() {
817-
s.Run("Deployment/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) {
806+
s.Run("Deployment/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
807+
dbm.EXPECT().OIDCClaimFields(gomock.Any(), uuid.Nil).Return([]string{}, nil).AnyTimes()
818808
check.Args(uuid.Nil).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
819809
}))
820-
s.Run("Organization/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) {
810+
s.Run("Organization/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
821811
id := uuid.New()
812+
dbm.EXPECT().OIDCClaimFields(gomock.Any(), id).Return([]string{}, nil).AnyTimes()
822813
check.Args(id).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
823814
}))
824-
s.Run("Deployment/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) {
825-
check.Args(database.OIDCClaimFieldValuesParams{
826-
ClaimField: "claim-field",
827-
OrganizationID: uuid.Nil,
828-
}).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
815+
s.Run("Deployment/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
816+
arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: uuid.Nil}
817+
dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes()
818+
check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
829819
}))
830-
s.Run("Organization/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) {
820+
s.Run("Organization/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
831821
id := uuid.New()
832-
check.Args(database.OIDCClaimFieldValuesParams{
833-
ClaimField: "claim-field",
834-
OrganizationID: id,
835-
}).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
822+
arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: id}
823+
dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes()
824+
check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
836825
}))
837826
s.Run("ByOrganization/GetGroups", s.Subtest(func(db database.Store, check *expects) {
838827
o := dbgen.Organization(s.T(), db, database.Organization{})
@@ -1139,41 +1128,43 @@ func (s *MethodTestSuite) TestOrganization() {
11391128
}
11401129

11411130
func (s *MethodTestSuite) TestWorkspaceProxy() {
1142-
s.Run("InsertWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) {
1143-
check.Args(database.InsertWorkspaceProxyParams{
1144-
ID: uuid.New(),
1145-
}).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate)
1146-
}))
1147-
s.Run("RegisterWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) {
1148-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1149-
check.Args(database.RegisterWorkspaceProxyParams{
1150-
ID: p.ID,
1151-
}).Asserts(p, policy.ActionUpdate)
1152-
}))
1153-
s.Run("GetWorkspaceProxyByID", s.Subtest(func(db database.Store, check *expects) {
1154-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1131+
s.Run("InsertWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
1132+
arg := database.InsertWorkspaceProxyParams{ID: uuid.New()}
1133+
dbm.EXPECT().InsertWorkspaceProxy(gomock.Any(), arg).Return(database.WorkspaceProxy{}, nil).AnyTimes()
1134+
check.Args(arg).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate)
1135+
}))
1136+
s.Run("RegisterWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1137+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1138+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
1139+
dbm.EXPECT().RegisterWorkspaceProxy(gomock.Any(), database.RegisterWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes()
1140+
check.Args(database.RegisterWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate)
1141+
}))
1142+
s.Run("GetWorkspaceProxyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1143+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1144+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
11551145
check.Args(p.ID).Asserts(p, policy.ActionRead).Returns(p)
11561146
}))
1157-
s.Run("GetWorkspaceProxyByName", s.Subtest(func(db database.Store, check *expects) {
1158-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1147+
s.Run("GetWorkspaceProxyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1148+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1149+
dbm.EXPECT().GetWorkspaceProxyByName(gomock.Any(), p.Name).Return(p, nil).AnyTimes()
11591150
check.Args(p.Name).Asserts(p, policy.ActionRead).Returns(p)
11601151
}))
1161-
s.Run("UpdateWorkspaceProxyDeleted", s.Subtest(func(db database.Store, check *expects) {
1162-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1163-
check.Args(database.UpdateWorkspaceProxyDeletedParams{
1164-
ID: p.ID,
1165-
Deleted: true,
1166-
}).Asserts(p, policy.ActionDelete)
1167-
}))
1168-
s.Run("UpdateWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) {
1169-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1170-
check.Args(database.UpdateWorkspaceProxyParams{
1171-
ID: p.ID,
1172-
}).Asserts(p, policy.ActionUpdate)
1173-
}))
1174-
s.Run("GetWorkspaceProxies", s.Subtest(func(db database.Store, check *expects) {
1175-
p1, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1176-
p2, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1152+
s.Run("UpdateWorkspaceProxyDeleted", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1153+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1154+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
1155+
dbm.EXPECT().UpdateWorkspaceProxyDeleted(gomock.Any(), database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Return(nil).AnyTimes()
1156+
check.Args(database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Asserts(p, policy.ActionDelete)
1157+
}))
1158+
s.Run("UpdateWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1159+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1160+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
1161+
dbm.EXPECT().UpdateWorkspaceProxy(gomock.Any(), database.UpdateWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes()
1162+
check.Args(database.UpdateWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate)
1163+
}))
1164+
s.Run("GetWorkspaceProxies", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1165+
p1 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1166+
p2 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1167+
dbm.EXPECT().GetWorkspaceProxies(gomock.Any()).Return([]database.WorkspaceProxy{p1, p2}, nil).AnyTimes()
11771168
check.Args().Asserts(p1, policy.ActionRead, p2, policy.ActionRead).Returns(slice.New(p1, p2))
11781169
}))
11791170
}
@@ -3496,73 +3487,49 @@ func (s *MethodTestSuite) TestWorkspacePortSharing() {
34963487
}
34973488

34983489
func (s *MethodTestSuite) TestProvisionerKeys() {
3499-
s.Run("InsertProvisionerKey", s.Subtest(func(db database.Store, check *expects) {
3500-
org := dbgen.Organization(s.T(), db, database.Organization{})
3501-
pk := database.ProvisionerKey{
3502-
ID: uuid.New(),
3503-
CreatedAt: dbtestutil.NowInDefaultTimezone(),
3504-
OrganizationID: org.ID,
3505-
Name: strings.ToLower(coderdtest.RandomName(s.T())),
3506-
HashedSecret: []byte(coderdtest.RandomName(s.T())),
3507-
}
3508-
//nolint:gosimple // casting is not a simplification
3509-
check.Args(database.InsertProvisionerKeyParams{
3510-
ID: pk.ID,
3511-
CreatedAt: pk.CreatedAt,
3512-
OrganizationID: pk.OrganizationID,
3513-
Name: pk.Name,
3514-
HashedSecret: pk.HashedSecret,
3515-
}).Asserts(pk, policy.ActionCreate).Returns(pk)
3516-
}))
3517-
s.Run("GetProvisionerKeyByID", s.Subtest(func(db database.Store, check *expects) {
3518-
org := dbgen.Organization(s.T(), db, database.Organization{})
3519-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3490+
s.Run("InsertProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3491+
org := testutil.Fake(s.T(), faker, database.Organization{})
3492+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3493+
arg := database.InsertProvisionerKeyParams{ID: pk.ID, CreatedAt: pk.CreatedAt, OrganizationID: pk.OrganizationID, Name: pk.Name, HashedSecret: pk.HashedSecret}
3494+
dbm.EXPECT().InsertProvisionerKey(gomock.Any(), arg).Return(pk, nil).AnyTimes()
3495+
check.Args(arg).Asserts(rbac.ResourceProvisionerDaemon.InOrg(org.ID).WithID(pk.ID), policy.ActionCreate).Returns(pk)
3496+
}))
3497+
s.Run("GetProvisionerKeyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3498+
org := testutil.Fake(s.T(), faker, database.Organization{})
3499+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3500+
dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes()
35203501
check.Args(pk.ID).Asserts(pk, policy.ActionRead).Returns(pk)
35213502
}))
3522-
s.Run("GetProvisionerKeyByHashedSecret", s.Subtest(func(db database.Store, check *expects) {
3523-
org := dbgen.Organization(s.T(), db, database.Organization{})
3524-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")})
3503+
s.Run("GetProvisionerKeyByHashedSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3504+
org := testutil.Fake(s.T(), faker, database.Organization{})
3505+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")})
3506+
dbm.EXPECT().GetProvisionerKeyByHashedSecret(gomock.Any(), []byte("foo")).Return(pk, nil).AnyTimes()
35253507
check.Args([]byte("foo")).Asserts(pk, policy.ActionRead).Returns(pk)
35263508
}))
3527-
s.Run("GetProvisionerKeyByName", s.Subtest(func(db database.Store, check *expects) {
3528-
org := dbgen.Organization(s.T(), db, database.Organization{})
3529-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3530-
check.Args(database.GetProvisionerKeyByNameParams{
3531-
OrganizationID: org.ID,
3532-
Name: pk.Name,
3533-
}).Asserts(pk, policy.ActionRead).Returns(pk)
3534-
}))
3535-
s.Run("ListProvisionerKeysByOrganization", s.Subtest(func(db database.Store, check *expects) {
3536-
org := dbgen.Organization(s.T(), db, database.Organization{})
3537-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3538-
pks := []database.ProvisionerKey{
3539-
{
3540-
ID: pk.ID,
3541-
CreatedAt: pk.CreatedAt,
3542-
OrganizationID: pk.OrganizationID,
3543-
Name: pk.Name,
3544-
HashedSecret: pk.HashedSecret,
3545-
},
3546-
}
3547-
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks)
3548-
}))
3549-
s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Subtest(func(db database.Store, check *expects) {
3550-
org := dbgen.Organization(s.T(), db, database.Organization{})
3551-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3552-
pks := []database.ProvisionerKey{
3553-
{
3554-
ID: pk.ID,
3555-
CreatedAt: pk.CreatedAt,
3556-
OrganizationID: pk.OrganizationID,
3557-
Name: pk.Name,
3558-
HashedSecret: pk.HashedSecret,
3559-
},
3560-
}
3561-
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks)
3562-
}))
3563-
s.Run("DeleteProvisionerKey", s.Subtest(func(db database.Store, check *expects) {
3564-
org := dbgen.Organization(s.T(), db, database.Organization{})
3565-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3509+
s.Run("GetProvisionerKeyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3510+
org := testutil.Fake(s.T(), faker, database.Organization{})
3511+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3512+
arg := database.GetProvisionerKeyByNameParams{OrganizationID: org.ID, Name: pk.Name}
3513+
dbm.EXPECT().GetProvisionerKeyByName(gomock.Any(), arg).Return(pk, nil).AnyTimes()
3514+
check.Args(arg).Asserts(pk, policy.ActionRead).Returns(pk)
3515+
}))
3516+
s.Run("ListProvisionerKeysByOrganization", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3517+
org := testutil.Fake(s.T(), faker, database.Organization{})
3518+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3519+
dbm.EXPECT().ListProvisionerKeysByOrganization(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes()
3520+
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk})
3521+
}))
3522+
s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3523+
org := testutil.Fake(s.T(), faker, database.Organization{})
3524+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3525+
dbm.EXPECT().ListProvisionerKeysByOrganizationExcludeReserved(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes()
3526+
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk})
3527+
}))
3528+
s.Run("DeleteProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3529+
org := testutil.Fake(s.T(), faker, database.Organization{})
3530+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3531+
dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes()
3532+
dbm.EXPECT().DeleteProvisionerKey(gomock.Any(), pk.ID).Return(nil).AnyTimes()
35663533
check.Args(pk.ID).Asserts(pk, policy.ActionDelete).Returns()
35673534
}))
35683535
}

0 commit comments

Comments
 (0)