|
7 | 7 | "fmt"
|
8 | 8 | "net"
|
9 | 9 | "reflect"
|
10 |
| - "strings" |
11 | 10 | "testing"
|
12 | 11 | "time"
|
13 | 12 |
|
@@ -750,88 +749,78 @@ func (s *MethodTestSuite) TestProvisionerJob() {
|
750 | 749 | }
|
751 | 750 |
|
752 | 751 | func (s *MethodTestSuite) TestLicense() {
|
753 |
| - s.Run("GetLicenses", s.Subtest(func(db database.Store, check *expects) { |
754 |
| - l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
755 |
| - UUID: uuid.New(), |
756 |
| - }) |
757 |
| - require.NoError(s.T(), err) |
758 |
| - check.Args().Asserts(l, policy.ActionRead). |
759 |
| - Returns([]database.License{l}) |
| 752 | + s.Run("GetLicenses", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 753 | + l := database.License{ID: 1} |
| 754 | + dbm.EXPECT().GetLicenses(gomock.Any()).Return([]database.License{l}, nil).AnyTimes() |
| 755 | + check.Args().Asserts(l, policy.ActionRead).Returns([]database.License{l}) |
760 | 756 | }))
|
761 |
| - s.Run("InsertLicense", s.Subtest(func(db database.Store, check *expects) { |
762 |
| - check.Args(database.InsertLicenseParams{}). |
763 |
| - Asserts(rbac.ResourceLicense, policy.ActionCreate) |
| 757 | + s.Run("InsertLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 758 | + dbm.EXPECT().InsertLicense(gomock.Any(), database.InsertLicenseParams{}).Return(database.License{}, nil).AnyTimes() |
| 759 | + check.Args(database.InsertLicenseParams{}).Asserts(rbac.ResourceLicense, policy.ActionCreate) |
764 | 760 | }))
|
765 |
| - s.Run("UpsertLogoURL", s.Subtest(func(db database.Store, check *expects) { |
| 761 | + s.Run("UpsertLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 762 | + dbm.EXPECT().UpsertLogoURL(gomock.Any(), "value").Return(nil).AnyTimes() |
766 | 763 | check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
|
767 | 764 | }))
|
768 |
| - s.Run("UpsertAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) { |
| 765 | + s.Run("UpsertAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 766 | + dbm.EXPECT().UpsertAnnouncementBanners(gomock.Any(), "value").Return(nil).AnyTimes() |
769 | 767 | check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
|
770 | 768 | }))
|
771 |
| - s.Run("GetLicenseByID", s.Subtest(func(db database.Store, check *expects) { |
772 |
| - l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
773 |
| - UUID: uuid.New(), |
774 |
| - }) |
775 |
| - require.NoError(s.T(), err) |
776 |
| - check.Args(l.ID).Asserts(l, policy.ActionRead).Returns(l) |
| 769 | + s.Run("GetLicenseByID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 770 | + l := database.License{ID: 1} |
| 771 | + dbm.EXPECT().GetLicenseByID(gomock.Any(), int32(1)).Return(l, nil).AnyTimes() |
| 772 | + check.Args(int32(1)).Asserts(l, policy.ActionRead).Returns(l) |
777 | 773 | }))
|
778 |
| - s.Run("DeleteLicense", s.Subtest(func(db database.Store, check *expects) { |
779 |
| - l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
780 |
| - UUID: uuid.New(), |
781 |
| - }) |
782 |
| - require.NoError(s.T(), err) |
| 774 | + s.Run("DeleteLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 775 | + l := database.License{ID: 1} |
| 776 | + dbm.EXPECT().GetLicenseByID(gomock.Any(), l.ID).Return(l, nil).AnyTimes() |
| 777 | + dbm.EXPECT().DeleteLicense(gomock.Any(), l.ID).Return(int32(1), nil).AnyTimes() |
783 | 778 | check.Args(l.ID).Asserts(l, policy.ActionDelete)
|
784 | 779 | }))
|
785 |
| - s.Run("GetDeploymentID", s.Subtest(func(db database.Store, check *expects) { |
786 |
| - db.InsertDeploymentID(context.Background(), "value") |
| 780 | + s.Run("GetDeploymentID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 781 | + dbm.EXPECT().GetDeploymentID(gomock.Any()).Return("value", nil).AnyTimes() |
787 | 782 | check.Args().Asserts().Returns("value")
|
788 | 783 | }))
|
789 |
| - s.Run("GetDefaultProxyConfig", s.Subtest(func(db database.Store, check *expects) { |
790 |
| - check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{ |
791 |
| - DisplayName: "Default", |
792 |
| - IconUrl: "/emojis/1f3e1.png", |
793 |
| - }) |
| 784 | + s.Run("GetDefaultProxyConfig", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 785 | + dbm.EXPECT().GetDefaultProxyConfig(gomock.Any()).Return(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"}, nil).AnyTimes() |
| 786 | + check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"}) |
794 | 787 | }))
|
795 |
| - s.Run("GetLogoURL", s.Subtest(func(db database.Store, check *expects) { |
796 |
| - err := db.UpsertLogoURL(context.Background(), "value") |
797 |
| - require.NoError(s.T(), err) |
| 788 | + s.Run("GetLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 789 | + dbm.EXPECT().GetLogoURL(gomock.Any()).Return("value", nil).AnyTimes() |
798 | 790 | check.Args().Asserts().Returns("value")
|
799 | 791 | }))
|
800 |
| - s.Run("GetAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) { |
801 |
| - err := db.UpsertAnnouncementBanners(context.Background(), "value") |
802 |
| - require.NoError(s.T(), err) |
| 792 | + s.Run("GetAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 793 | + dbm.EXPECT().GetAnnouncementBanners(gomock.Any()).Return("value", nil).AnyTimes() |
803 | 794 | check.Args().Asserts().Returns("value")
|
804 | 795 | }))
|
805 |
| - s.Run("GetManagedAgentCount", s.Subtest(func(db database.Store, check *expects) { |
| 796 | + s.Run("GetManagedAgentCount", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
806 | 797 | start := dbtime.Now()
|
807 | 798 | end := start.Add(time.Hour)
|
808 |
| - check.Args(database.GetManagedAgentCountParams{ |
809 |
| - StartTime: start, |
810 |
| - EndTime: end, |
811 |
| - }).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0)) |
| 799 | + dbm.EXPECT().GetManagedAgentCount(gomock.Any(), database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Return(int64(0), nil).AnyTimes() |
| 800 | + check.Args(database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0)) |
812 | 801 | }))
|
813 | 802 | }
|
814 | 803 |
|
815 | 804 | func (s *MethodTestSuite) TestOrganization() {
|
816 |
| - s.Run("Deployment/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) { |
| 805 | + s.Run("Deployment/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 806 | + dbm.EXPECT().OIDCClaimFields(gomock.Any(), uuid.Nil).Return([]string{}, nil).AnyTimes() |
817 | 807 | check.Args(uuid.Nil).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
|
818 | 808 | }))
|
819 |
| - s.Run("Organization/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) { |
| 809 | + s.Run("Organization/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
820 | 810 | id := uuid.New()
|
| 811 | + dbm.EXPECT().OIDCClaimFields(gomock.Any(), id).Return([]string{}, nil).AnyTimes() |
821 | 812 | check.Args(id).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
|
822 | 813 | }))
|
823 |
| - s.Run("Deployment/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) { |
824 |
| - check.Args(database.OIDCClaimFieldValuesParams{ |
825 |
| - ClaimField: "claim-field", |
826 |
| - OrganizationID: uuid.Nil, |
827 |
| - }).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{}) |
| 814 | + s.Run("Deployment/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 815 | + arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: uuid.Nil} |
| 816 | + dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes() |
| 817 | + check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{}) |
828 | 818 | }))
|
829 |
| - s.Run("Organization/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) { |
| 819 | + s.Run("Organization/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
830 | 820 | id := uuid.New()
|
831 |
| - check.Args(database.OIDCClaimFieldValuesParams{ |
832 |
| - ClaimField: "claim-field", |
833 |
| - OrganizationID: id, |
834 |
| - }).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{}) |
| 821 | + arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: id} |
| 822 | + dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes() |
| 823 | + check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{}) |
835 | 824 | }))
|
836 | 825 | s.Run("ByOrganization/GetGroups", s.Subtest(func(db database.Store, check *expects) {
|
837 | 826 | o := dbgen.Organization(s.T(), db, database.Organization{})
|
@@ -1138,41 +1127,43 @@ func (s *MethodTestSuite) TestOrganization() {
|
1138 | 1127 | }
|
1139 | 1128 |
|
1140 | 1129 | func (s *MethodTestSuite) TestWorkspaceProxy() {
|
1141 |
| - s.Run("InsertWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) { |
1142 |
| - check.Args(database.InsertWorkspaceProxyParams{ |
1143 |
| - ID: uuid.New(), |
1144 |
| - }).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate) |
1145 |
| - })) |
1146 |
| - s.Run("RegisterWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) { |
1147 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1148 |
| - check.Args(database.RegisterWorkspaceProxyParams{ |
1149 |
| - ID: p.ID, |
1150 |
| - }).Asserts(p, policy.ActionUpdate) |
1151 |
| - })) |
1152 |
| - s.Run("GetWorkspaceProxyByID", s.Subtest(func(db database.Store, check *expects) { |
1153 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
| 1130 | + s.Run("InsertWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 1131 | + arg := database.InsertWorkspaceProxyParams{ID: uuid.New()} |
| 1132 | + dbm.EXPECT().InsertWorkspaceProxy(gomock.Any(), arg).Return(database.WorkspaceProxy{}, nil).AnyTimes() |
| 1133 | + check.Args(arg).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate) |
| 1134 | + })) |
| 1135 | + s.Run("RegisterWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1136 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1137 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
| 1138 | + dbm.EXPECT().RegisterWorkspaceProxy(gomock.Any(), database.RegisterWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes() |
| 1139 | + check.Args(database.RegisterWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate) |
| 1140 | + })) |
| 1141 | + s.Run("GetWorkspaceProxyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1142 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1143 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
1154 | 1144 | check.Args(p.ID).Asserts(p, policy.ActionRead).Returns(p)
|
1155 | 1145 | }))
|
1156 |
| - s.Run("GetWorkspaceProxyByName", s.Subtest(func(db database.Store, check *expects) { |
1157 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
| 1146 | + s.Run("GetWorkspaceProxyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1147 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1148 | + dbm.EXPECT().GetWorkspaceProxyByName(gomock.Any(), p.Name).Return(p, nil).AnyTimes() |
1158 | 1149 | check.Args(p.Name).Asserts(p, policy.ActionRead).Returns(p)
|
1159 | 1150 | }))
|
1160 |
| - s.Run("UpdateWorkspaceProxyDeleted", s.Subtest(func(db database.Store, check *expects) { |
1161 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1162 |
| - check.Args(database.UpdateWorkspaceProxyDeletedParams{ |
1163 |
| - ID: p.ID, |
1164 |
| - Deleted: true, |
1165 |
| - }).Asserts(p, policy.ActionDelete) |
1166 |
| - })) |
1167 |
| - s.Run("UpdateWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) { |
1168 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1169 |
| - check.Args(database.UpdateWorkspaceProxyParams{ |
1170 |
| - ID: p.ID, |
1171 |
| - }).Asserts(p, policy.ActionUpdate) |
1172 |
| - })) |
1173 |
| - s.Run("GetWorkspaceProxies", s.Subtest(func(db database.Store, check *expects) { |
1174 |
| - p1, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1175 |
| - p2, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
| 1151 | + s.Run("UpdateWorkspaceProxyDeleted", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1152 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1153 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
| 1154 | + dbm.EXPECT().UpdateWorkspaceProxyDeleted(gomock.Any(), database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Return(nil).AnyTimes() |
| 1155 | + check.Args(database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Asserts(p, policy.ActionDelete) |
| 1156 | + })) |
| 1157 | + s.Run("UpdateWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1158 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1159 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
| 1160 | + dbm.EXPECT().UpdateWorkspaceProxy(gomock.Any(), database.UpdateWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes() |
| 1161 | + check.Args(database.UpdateWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate) |
| 1162 | + })) |
| 1163 | + s.Run("GetWorkspaceProxies", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1164 | + p1 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1165 | + p2 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1166 | + dbm.EXPECT().GetWorkspaceProxies(gomock.Any()).Return([]database.WorkspaceProxy{p1, p2}, nil).AnyTimes() |
1176 | 1167 | check.Args().Asserts(p1, policy.ActionRead, p2, policy.ActionRead).Returns(slice.New(p1, p2))
|
1177 | 1168 | }))
|
1178 | 1169 | }
|
@@ -3427,73 +3418,49 @@ func (s *MethodTestSuite) TestWorkspacePortSharing() {
|
3427 | 3418 | }
|
3428 | 3419 |
|
3429 | 3420 | func (s *MethodTestSuite) TestProvisionerKeys() {
|
3430 |
| - s.Run("InsertProvisionerKey", s.Subtest(func(db database.Store, check *expects) { |
3431 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3432 |
| - pk := database.ProvisionerKey{ |
3433 |
| - ID: uuid.New(), |
3434 |
| - CreatedAt: dbtestutil.NowInDefaultTimezone(), |
3435 |
| - OrganizationID: org.ID, |
3436 |
| - Name: strings.ToLower(coderdtest.RandomName(s.T())), |
3437 |
| - HashedSecret: []byte(coderdtest.RandomName(s.T())), |
3438 |
| - } |
3439 |
| - //nolint:gosimple // casting is not a simplification |
3440 |
| - check.Args(database.InsertProvisionerKeyParams{ |
3441 |
| - ID: pk.ID, |
3442 |
| - CreatedAt: pk.CreatedAt, |
3443 |
| - OrganizationID: pk.OrganizationID, |
3444 |
| - Name: pk.Name, |
3445 |
| - HashedSecret: pk.HashedSecret, |
3446 |
| - }).Asserts(pk, policy.ActionCreate).Returns(pk) |
3447 |
| - })) |
3448 |
| - s.Run("GetProvisionerKeyByID", s.Subtest(func(db database.Store, check *expects) { |
3449 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3450 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3421 | + s.Run("InsertProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3422 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3423 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3424 | + arg := database.InsertProvisionerKeyParams{ID: pk.ID, CreatedAt: pk.CreatedAt, OrganizationID: pk.OrganizationID, Name: pk.Name, HashedSecret: pk.HashedSecret} |
| 3425 | + dbm.EXPECT().InsertProvisionerKey(gomock.Any(), arg).Return(pk, nil).AnyTimes() |
| 3426 | + check.Args(arg).Asserts(rbac.ResourceProvisionerDaemon.InOrg(org.ID).WithID(pk.ID), policy.ActionCreate).Returns(pk) |
| 3427 | + })) |
| 3428 | + s.Run("GetProvisionerKeyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3429 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3430 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3431 | + dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes() |
3451 | 3432 | check.Args(pk.ID).Asserts(pk, policy.ActionRead).Returns(pk)
|
3452 | 3433 | }))
|
3453 |
| - s.Run("GetProvisionerKeyByHashedSecret", s.Subtest(func(db database.Store, check *expects) { |
3454 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3455 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")}) |
| 3434 | + s.Run("GetProvisionerKeyByHashedSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3435 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3436 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")}) |
| 3437 | + dbm.EXPECT().GetProvisionerKeyByHashedSecret(gomock.Any(), []byte("foo")).Return(pk, nil).AnyTimes() |
3456 | 3438 | check.Args([]byte("foo")).Asserts(pk, policy.ActionRead).Returns(pk)
|
3457 | 3439 | }))
|
3458 |
| - s.Run("GetProvisionerKeyByName", s.Subtest(func(db database.Store, check *expects) { |
3459 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3460 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
3461 |
| - check.Args(database.GetProvisionerKeyByNameParams{ |
3462 |
| - OrganizationID: org.ID, |
3463 |
| - Name: pk.Name, |
3464 |
| - }).Asserts(pk, policy.ActionRead).Returns(pk) |
3465 |
| - })) |
3466 |
| - s.Run("ListProvisionerKeysByOrganization", s.Subtest(func(db database.Store, check *expects) { |
3467 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3468 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
3469 |
| - pks := []database.ProvisionerKey{ |
3470 |
| - { |
3471 |
| - ID: pk.ID, |
3472 |
| - CreatedAt: pk.CreatedAt, |
3473 |
| - OrganizationID: pk.OrganizationID, |
3474 |
| - Name: pk.Name, |
3475 |
| - HashedSecret: pk.HashedSecret, |
3476 |
| - }, |
3477 |
| - } |
3478 |
| - check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks) |
3479 |
| - })) |
3480 |
| - s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Subtest(func(db database.Store, check *expects) { |
3481 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3482 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
3483 |
| - pks := []database.ProvisionerKey{ |
3484 |
| - { |
3485 |
| - ID: pk.ID, |
3486 |
| - CreatedAt: pk.CreatedAt, |
3487 |
| - OrganizationID: pk.OrganizationID, |
3488 |
| - Name: pk.Name, |
3489 |
| - HashedSecret: pk.HashedSecret, |
3490 |
| - }, |
3491 |
| - } |
3492 |
| - check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks) |
3493 |
| - })) |
3494 |
| - s.Run("DeleteProvisionerKey", s.Subtest(func(db database.Store, check *expects) { |
3495 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3496 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3440 | + s.Run("GetProvisionerKeyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3441 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3442 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3443 | + arg := database.GetProvisionerKeyByNameParams{OrganizationID: org.ID, Name: pk.Name} |
| 3444 | + dbm.EXPECT().GetProvisionerKeyByName(gomock.Any(), arg).Return(pk, nil).AnyTimes() |
| 3445 | + check.Args(arg).Asserts(pk, policy.ActionRead).Returns(pk) |
| 3446 | + })) |
| 3447 | + s.Run("ListProvisionerKeysByOrganization", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3448 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3449 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3450 | + dbm.EXPECT().ListProvisionerKeysByOrganization(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes() |
| 3451 | + check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk}) |
| 3452 | + })) |
| 3453 | + s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3454 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3455 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3456 | + dbm.EXPECT().ListProvisionerKeysByOrganizationExcludeReserved(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes() |
| 3457 | + check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk}) |
| 3458 | + })) |
| 3459 | + s.Run("DeleteProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3460 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3461 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3462 | + dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes() |
| 3463 | + dbm.EXPECT().DeleteProvisionerKey(gomock.Any(), pk.ID).Return(nil).AnyTimes() |
3497 | 3464 | check.Args(pk.ID).Asserts(pk, policy.ActionDelete).Returns()
|
3498 | 3465 | }))
|
3499 | 3466 | }
|
|
0 commit comments