Skip to content

Commit 3454dc8

Browse files
blink-so[bot]hugodutka
authored andcommitted
test(dbauthz): migrate four groups to mocked db (License, Organization OIDC claims, WorkspaceProxy, ProvisionerKeys)\n\n- Convert tests to s.Mocked\n- Add gomock expectations for fetch and authorized paths\n- Remove unused imports\n\nCo-authored-by: hugodutka <28019628+hugodutka@users.noreply.github.com>
1 parent b2b3edf commit 3454dc8

File tree

1 file changed

+115
-148
lines changed

1 file changed

+115
-148
lines changed

coderd/database/dbauthz/dbauthz_test.go

Lines changed: 115 additions & 148 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ import (
77
"fmt"
88
"net"
99
"reflect"
10-
"strings"
1110
"testing"
1211
"time"
1312

@@ -750,88 +749,78 @@ func (s *MethodTestSuite) TestProvisionerJob() {
750749
}
751750

752751
func (s *MethodTestSuite) TestLicense() {
753-
s.Run("GetLicenses", s.Subtest(func(db database.Store, check *expects) {
754-
l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{
755-
UUID: uuid.New(),
756-
})
757-
require.NoError(s.T(), err)
758-
check.Args().Asserts(l, policy.ActionRead).
759-
Returns([]database.License{l})
752+
s.Run("GetLicenses", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
753+
l := database.License{ID: 1}
754+
dbm.EXPECT().GetLicenses(gomock.Any()).Return([]database.License{l}, nil).AnyTimes()
755+
check.Args().Asserts(l, policy.ActionRead).Returns([]database.License{l})
760756
}))
761-
s.Run("InsertLicense", s.Subtest(func(db database.Store, check *expects) {
762-
check.Args(database.InsertLicenseParams{}).
763-
Asserts(rbac.ResourceLicense, policy.ActionCreate)
757+
s.Run("InsertLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
758+
dbm.EXPECT().InsertLicense(gomock.Any(), database.InsertLicenseParams{}).Return(database.License{}, nil).AnyTimes()
759+
check.Args(database.InsertLicenseParams{}).Asserts(rbac.ResourceLicense, policy.ActionCreate)
764760
}))
765-
s.Run("UpsertLogoURL", s.Subtest(func(db database.Store, check *expects) {
761+
s.Run("UpsertLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
762+
dbm.EXPECT().UpsertLogoURL(gomock.Any(), "value").Return(nil).AnyTimes()
766763
check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
767764
}))
768-
s.Run("UpsertAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) {
765+
s.Run("UpsertAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
766+
dbm.EXPECT().UpsertAnnouncementBanners(gomock.Any(), "value").Return(nil).AnyTimes()
769767
check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
770768
}))
771-
s.Run("GetLicenseByID", s.Subtest(func(db database.Store, check *expects) {
772-
l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{
773-
UUID: uuid.New(),
774-
})
775-
require.NoError(s.T(), err)
776-
check.Args(l.ID).Asserts(l, policy.ActionRead).Returns(l)
769+
s.Run("GetLicenseByID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
770+
l := database.License{ID: 1}
771+
dbm.EXPECT().GetLicenseByID(gomock.Any(), int32(1)).Return(l, nil).AnyTimes()
772+
check.Args(int32(1)).Asserts(l, policy.ActionRead).Returns(l)
777773
}))
778-
s.Run("DeleteLicense", s.Subtest(func(db database.Store, check *expects) {
779-
l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{
780-
UUID: uuid.New(),
781-
})
782-
require.NoError(s.T(), err)
774+
s.Run("DeleteLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
775+
l := database.License{ID: 1}
776+
dbm.EXPECT().GetLicenseByID(gomock.Any(), l.ID).Return(l, nil).AnyTimes()
777+
dbm.EXPECT().DeleteLicense(gomock.Any(), l.ID).Return(int32(1), nil).AnyTimes()
783778
check.Args(l.ID).Asserts(l, policy.ActionDelete)
784779
}))
785-
s.Run("GetDeploymentID", s.Subtest(func(db database.Store, check *expects) {
786-
db.InsertDeploymentID(context.Background(), "value")
780+
s.Run("GetDeploymentID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
781+
dbm.EXPECT().GetDeploymentID(gomock.Any()).Return("value", nil).AnyTimes()
787782
check.Args().Asserts().Returns("value")
788783
}))
789-
s.Run("GetDefaultProxyConfig", s.Subtest(func(db database.Store, check *expects) {
790-
check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{
791-
DisplayName: "Default",
792-
IconUrl: "/emojis/1f3e1.png",
793-
})
784+
s.Run("GetDefaultProxyConfig", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
785+
dbm.EXPECT().GetDefaultProxyConfig(gomock.Any()).Return(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"}, nil).AnyTimes()
786+
check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"})
794787
}))
795-
s.Run("GetLogoURL", s.Subtest(func(db database.Store, check *expects) {
796-
err := db.UpsertLogoURL(context.Background(), "value")
797-
require.NoError(s.T(), err)
788+
s.Run("GetLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
789+
dbm.EXPECT().GetLogoURL(gomock.Any()).Return("value", nil).AnyTimes()
798790
check.Args().Asserts().Returns("value")
799791
}))
800-
s.Run("GetAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) {
801-
err := db.UpsertAnnouncementBanners(context.Background(), "value")
802-
require.NoError(s.T(), err)
792+
s.Run("GetAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
793+
dbm.EXPECT().GetAnnouncementBanners(gomock.Any()).Return("value", nil).AnyTimes()
803794
check.Args().Asserts().Returns("value")
804795
}))
805-
s.Run("GetManagedAgentCount", s.Subtest(func(db database.Store, check *expects) {
796+
s.Run("GetManagedAgentCount", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
806797
start := dbtime.Now()
807798
end := start.Add(time.Hour)
808-
check.Args(database.GetManagedAgentCountParams{
809-
StartTime: start,
810-
EndTime: end,
811-
}).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0))
799+
dbm.EXPECT().GetManagedAgentCount(gomock.Any(), database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Return(int64(0), nil).AnyTimes()
800+
check.Args(database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0))
812801
}))
813802
}
814803

815804
func (s *MethodTestSuite) TestOrganization() {
816-
s.Run("Deployment/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) {
805+
s.Run("Deployment/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
806+
dbm.EXPECT().OIDCClaimFields(gomock.Any(), uuid.Nil).Return([]string{}, nil).AnyTimes()
817807
check.Args(uuid.Nil).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
818808
}))
819-
s.Run("Organization/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) {
809+
s.Run("Organization/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
820810
id := uuid.New()
811+
dbm.EXPECT().OIDCClaimFields(gomock.Any(), id).Return([]string{}, nil).AnyTimes()
821812
check.Args(id).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
822813
}))
823-
s.Run("Deployment/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) {
824-
check.Args(database.OIDCClaimFieldValuesParams{
825-
ClaimField: "claim-field",
826-
OrganizationID: uuid.Nil,
827-
}).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
814+
s.Run("Deployment/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
815+
arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: uuid.Nil}
816+
dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes()
817+
check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
828818
}))
829-
s.Run("Organization/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) {
819+
s.Run("Organization/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
830820
id := uuid.New()
831-
check.Args(database.OIDCClaimFieldValuesParams{
832-
ClaimField: "claim-field",
833-
OrganizationID: id,
834-
}).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
821+
arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: id}
822+
dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes()
823+
check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
835824
}))
836825
s.Run("ByOrganization/GetGroups", s.Subtest(func(db database.Store, check *expects) {
837826
o := dbgen.Organization(s.T(), db, database.Organization{})
@@ -1138,41 +1127,43 @@ func (s *MethodTestSuite) TestOrganization() {
11381127
}
11391128

11401129
func (s *MethodTestSuite) TestWorkspaceProxy() {
1141-
s.Run("InsertWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) {
1142-
check.Args(database.InsertWorkspaceProxyParams{
1143-
ID: uuid.New(),
1144-
}).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate)
1145-
}))
1146-
s.Run("RegisterWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) {
1147-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1148-
check.Args(database.RegisterWorkspaceProxyParams{
1149-
ID: p.ID,
1150-
}).Asserts(p, policy.ActionUpdate)
1151-
}))
1152-
s.Run("GetWorkspaceProxyByID", s.Subtest(func(db database.Store, check *expects) {
1153-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1130+
s.Run("InsertWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
1131+
arg := database.InsertWorkspaceProxyParams{ID: uuid.New()}
1132+
dbm.EXPECT().InsertWorkspaceProxy(gomock.Any(), arg).Return(database.WorkspaceProxy{}, nil).AnyTimes()
1133+
check.Args(arg).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate)
1134+
}))
1135+
s.Run("RegisterWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1136+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1137+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
1138+
dbm.EXPECT().RegisterWorkspaceProxy(gomock.Any(), database.RegisterWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes()
1139+
check.Args(database.RegisterWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate)
1140+
}))
1141+
s.Run("GetWorkspaceProxyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1142+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1143+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
11541144
check.Args(p.ID).Asserts(p, policy.ActionRead).Returns(p)
11551145
}))
1156-
s.Run("GetWorkspaceProxyByName", s.Subtest(func(db database.Store, check *expects) {
1157-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1146+
s.Run("GetWorkspaceProxyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1147+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1148+
dbm.EXPECT().GetWorkspaceProxyByName(gomock.Any(), p.Name).Return(p, nil).AnyTimes()
11581149
check.Args(p.Name).Asserts(p, policy.ActionRead).Returns(p)
11591150
}))
1160-
s.Run("UpdateWorkspaceProxyDeleted", s.Subtest(func(db database.Store, check *expects) {
1161-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1162-
check.Args(database.UpdateWorkspaceProxyDeletedParams{
1163-
ID: p.ID,
1164-
Deleted: true,
1165-
}).Asserts(p, policy.ActionDelete)
1166-
}))
1167-
s.Run("UpdateWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) {
1168-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1169-
check.Args(database.UpdateWorkspaceProxyParams{
1170-
ID: p.ID,
1171-
}).Asserts(p, policy.ActionUpdate)
1172-
}))
1173-
s.Run("GetWorkspaceProxies", s.Subtest(func(db database.Store, check *expects) {
1174-
p1, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1175-
p2, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1151+
s.Run("UpdateWorkspaceProxyDeleted", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1152+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1153+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
1154+
dbm.EXPECT().UpdateWorkspaceProxyDeleted(gomock.Any(), database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Return(nil).AnyTimes()
1155+
check.Args(database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Asserts(p, policy.ActionDelete)
1156+
}))
1157+
s.Run("UpdateWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1158+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1159+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
1160+
dbm.EXPECT().UpdateWorkspaceProxy(gomock.Any(), database.UpdateWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes()
1161+
check.Args(database.UpdateWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate)
1162+
}))
1163+
s.Run("GetWorkspaceProxies", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1164+
p1 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1165+
p2 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1166+
dbm.EXPECT().GetWorkspaceProxies(gomock.Any()).Return([]database.WorkspaceProxy{p1, p2}, nil).AnyTimes()
11761167
check.Args().Asserts(p1, policy.ActionRead, p2, policy.ActionRead).Returns(slice.New(p1, p2))
11771168
}))
11781169
}
@@ -3427,73 +3418,49 @@ func (s *MethodTestSuite) TestWorkspacePortSharing() {
34273418
}
34283419

34293420
func (s *MethodTestSuite) TestProvisionerKeys() {
3430-
s.Run("InsertProvisionerKey", s.Subtest(func(db database.Store, check *expects) {
3431-
org := dbgen.Organization(s.T(), db, database.Organization{})
3432-
pk := database.ProvisionerKey{
3433-
ID: uuid.New(),
3434-
CreatedAt: dbtestutil.NowInDefaultTimezone(),
3435-
OrganizationID: org.ID,
3436-
Name: strings.ToLower(coderdtest.RandomName(s.T())),
3437-
HashedSecret: []byte(coderdtest.RandomName(s.T())),
3438-
}
3439-
//nolint:gosimple // casting is not a simplification
3440-
check.Args(database.InsertProvisionerKeyParams{
3441-
ID: pk.ID,
3442-
CreatedAt: pk.CreatedAt,
3443-
OrganizationID: pk.OrganizationID,
3444-
Name: pk.Name,
3445-
HashedSecret: pk.HashedSecret,
3446-
}).Asserts(pk, policy.ActionCreate).Returns(pk)
3447-
}))
3448-
s.Run("GetProvisionerKeyByID", s.Subtest(func(db database.Store, check *expects) {
3449-
org := dbgen.Organization(s.T(), db, database.Organization{})
3450-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3421+
s.Run("InsertProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3422+
org := testutil.Fake(s.T(), faker, database.Organization{})
3423+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3424+
arg := database.InsertProvisionerKeyParams{ID: pk.ID, CreatedAt: pk.CreatedAt, OrganizationID: pk.OrganizationID, Name: pk.Name, HashedSecret: pk.HashedSecret}
3425+
dbm.EXPECT().InsertProvisionerKey(gomock.Any(), arg).Return(pk, nil).AnyTimes()
3426+
check.Args(arg).Asserts(rbac.ResourceProvisionerDaemon.InOrg(org.ID).WithID(pk.ID), policy.ActionCreate).Returns(pk)
3427+
}))
3428+
s.Run("GetProvisionerKeyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3429+
org := testutil.Fake(s.T(), faker, database.Organization{})
3430+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3431+
dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes()
34513432
check.Args(pk.ID).Asserts(pk, policy.ActionRead).Returns(pk)
34523433
}))
3453-
s.Run("GetProvisionerKeyByHashedSecret", s.Subtest(func(db database.Store, check *expects) {
3454-
org := dbgen.Organization(s.T(), db, database.Organization{})
3455-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")})
3434+
s.Run("GetProvisionerKeyByHashedSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3435+
org := testutil.Fake(s.T(), faker, database.Organization{})
3436+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")})
3437+
dbm.EXPECT().GetProvisionerKeyByHashedSecret(gomock.Any(), []byte("foo")).Return(pk, nil).AnyTimes()
34563438
check.Args([]byte("foo")).Asserts(pk, policy.ActionRead).Returns(pk)
34573439
}))
3458-
s.Run("GetProvisionerKeyByName", s.Subtest(func(db database.Store, check *expects) {
3459-
org := dbgen.Organization(s.T(), db, database.Organization{})
3460-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3461-
check.Args(database.GetProvisionerKeyByNameParams{
3462-
OrganizationID: org.ID,
3463-
Name: pk.Name,
3464-
}).Asserts(pk, policy.ActionRead).Returns(pk)
3465-
}))
3466-
s.Run("ListProvisionerKeysByOrganization", s.Subtest(func(db database.Store, check *expects) {
3467-
org := dbgen.Organization(s.T(), db, database.Organization{})
3468-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3469-
pks := []database.ProvisionerKey{
3470-
{
3471-
ID: pk.ID,
3472-
CreatedAt: pk.CreatedAt,
3473-
OrganizationID: pk.OrganizationID,
3474-
Name: pk.Name,
3475-
HashedSecret: pk.HashedSecret,
3476-
},
3477-
}
3478-
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks)
3479-
}))
3480-
s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Subtest(func(db database.Store, check *expects) {
3481-
org := dbgen.Organization(s.T(), db, database.Organization{})
3482-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3483-
pks := []database.ProvisionerKey{
3484-
{
3485-
ID: pk.ID,
3486-
CreatedAt: pk.CreatedAt,
3487-
OrganizationID: pk.OrganizationID,
3488-
Name: pk.Name,
3489-
HashedSecret: pk.HashedSecret,
3490-
},
3491-
}
3492-
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks)
3493-
}))
3494-
s.Run("DeleteProvisionerKey", s.Subtest(func(db database.Store, check *expects) {
3495-
org := dbgen.Organization(s.T(), db, database.Organization{})
3496-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3440+
s.Run("GetProvisionerKeyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3441+
org := testutil.Fake(s.T(), faker, database.Organization{})
3442+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3443+
arg := database.GetProvisionerKeyByNameParams{OrganizationID: org.ID, Name: pk.Name}
3444+
dbm.EXPECT().GetProvisionerKeyByName(gomock.Any(), arg).Return(pk, nil).AnyTimes()
3445+
check.Args(arg).Asserts(pk, policy.ActionRead).Returns(pk)
3446+
}))
3447+
s.Run("ListProvisionerKeysByOrganization", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3448+
org := testutil.Fake(s.T(), faker, database.Organization{})
3449+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3450+
dbm.EXPECT().ListProvisionerKeysByOrganization(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes()
3451+
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk})
3452+
}))
3453+
s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3454+
org := testutil.Fake(s.T(), faker, database.Organization{})
3455+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3456+
dbm.EXPECT().ListProvisionerKeysByOrganizationExcludeReserved(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes()
3457+
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk})
3458+
}))
3459+
s.Run("DeleteProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3460+
org := testutil.Fake(s.T(), faker, database.Organization{})
3461+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3462+
dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes()
3463+
dbm.EXPECT().DeleteProvisionerKey(gomock.Any(), pk.ID).Return(nil).AnyTimes()
34973464
check.Args(pk.ID).Asserts(pk, policy.ActionDelete).Returns()
34983465
}))
34993466
}

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy