Skip to content

Commit f70bf92

Browse files
committed
test(dbauthz): migrate four groups to mocked db (License, Organization OIDC claims, WorkspaceProxy, ProvisionerKeys)\n\n- Convert tests to s.Mocked\n- Add gomock expectations for fetch and authorized paths\n- Remove unused imports\n\nCo-authored-by: hugodutka <28019628+hugodutka@users.noreply.github.com>
1 parent 48918d5 commit f70bf92

File tree

1 file changed

+115
-148
lines changed

1 file changed

+115
-148
lines changed

coderd/database/dbauthz/dbauthz_test.go

Lines changed: 115 additions & 148 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ import (
77
"fmt"
88
"net"
99
"reflect"
10-
"strings"
1110
"testing"
1211
"time"
1312

@@ -754,88 +753,78 @@ func (s *MethodTestSuite) TestProvisionerJob() {
754753
}
755754

756755
func (s *MethodTestSuite) TestLicense() {
757-
s.Run("GetLicenses", s.Subtest(func(db database.Store, check *expects) {
758-
l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{
759-
UUID: uuid.New(),
760-
})
761-
require.NoError(s.T(), err)
762-
check.Args().Asserts(l, policy.ActionRead).
763-
Returns([]database.License{l})
756+
s.Run("GetLicenses", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
757+
l := database.License{ID: 1}
758+
dbm.EXPECT().GetLicenses(gomock.Any()).Return([]database.License{l}, nil).AnyTimes()
759+
check.Args().Asserts(l, policy.ActionRead).Returns([]database.License{l})
764760
}))
765-
s.Run("InsertLicense", s.Subtest(func(db database.Store, check *expects) {
766-
check.Args(database.InsertLicenseParams{}).
767-
Asserts(rbac.ResourceLicense, policy.ActionCreate)
761+
s.Run("InsertLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
762+
dbm.EXPECT().InsertLicense(gomock.Any(), database.InsertLicenseParams{}).Return(database.License{}, nil).AnyTimes()
763+
check.Args(database.InsertLicenseParams{}).Asserts(rbac.ResourceLicense, policy.ActionCreate)
768764
}))
769-
s.Run("UpsertLogoURL", s.Subtest(func(db database.Store, check *expects) {
765+
s.Run("UpsertLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
766+
dbm.EXPECT().UpsertLogoURL(gomock.Any(), "value").Return(nil).AnyTimes()
770767
check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
771768
}))
772-
s.Run("UpsertAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) {
769+
s.Run("UpsertAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
770+
dbm.EXPECT().UpsertAnnouncementBanners(gomock.Any(), "value").Return(nil).AnyTimes()
773771
check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
774772
}))
775-
s.Run("GetLicenseByID", s.Subtest(func(db database.Store, check *expects) {
776-
l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{
777-
UUID: uuid.New(),
778-
})
779-
require.NoError(s.T(), err)
780-
check.Args(l.ID).Asserts(l, policy.ActionRead).Returns(l)
773+
s.Run("GetLicenseByID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
774+
l := database.License{ID: 1}
775+
dbm.EXPECT().GetLicenseByID(gomock.Any(), int32(1)).Return(l, nil).AnyTimes()
776+
check.Args(int32(1)).Asserts(l, policy.ActionRead).Returns(l)
781777
}))
782-
s.Run("DeleteLicense", s.Subtest(func(db database.Store, check *expects) {
783-
l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{
784-
UUID: uuid.New(),
785-
})
786-
require.NoError(s.T(), err)
778+
s.Run("DeleteLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
779+
l := database.License{ID: 1}
780+
dbm.EXPECT().GetLicenseByID(gomock.Any(), l.ID).Return(l, nil).AnyTimes()
781+
dbm.EXPECT().DeleteLicense(gomock.Any(), l.ID).Return(int32(1), nil).AnyTimes()
787782
check.Args(l.ID).Asserts(l, policy.ActionDelete)
788783
}))
789-
s.Run("GetDeploymentID", s.Subtest(func(db database.Store, check *expects) {
790-
db.InsertDeploymentID(context.Background(), "value")
784+
s.Run("GetDeploymentID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
785+
dbm.EXPECT().GetDeploymentID(gomock.Any()).Return("value", nil).AnyTimes()
791786
check.Args().Asserts().Returns("value")
792787
}))
793-
s.Run("GetDefaultProxyConfig", s.Subtest(func(db database.Store, check *expects) {
794-
check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{
795-
DisplayName: "Default",
796-
IconUrl: "/emojis/1f3e1.png",
797-
})
788+
s.Run("GetDefaultProxyConfig", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
789+
dbm.EXPECT().GetDefaultProxyConfig(gomock.Any()).Return(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"}, nil).AnyTimes()
790+
check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"})
798791
}))
799-
s.Run("GetLogoURL", s.Subtest(func(db database.Store, check *expects) {
800-
err := db.UpsertLogoURL(context.Background(), "value")
801-
require.NoError(s.T(), err)
792+
s.Run("GetLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
793+
dbm.EXPECT().GetLogoURL(gomock.Any()).Return("value", nil).AnyTimes()
802794
check.Args().Asserts().Returns("value")
803795
}))
804-
s.Run("GetAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) {
805-
err := db.UpsertAnnouncementBanners(context.Background(), "value")
806-
require.NoError(s.T(), err)
796+
s.Run("GetAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
797+
dbm.EXPECT().GetAnnouncementBanners(gomock.Any()).Return("value", nil).AnyTimes()
807798
check.Args().Asserts().Returns("value")
808799
}))
809-
s.Run("GetManagedAgentCount", s.Subtest(func(db database.Store, check *expects) {
800+
s.Run("GetManagedAgentCount", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
810801
start := dbtime.Now()
811802
end := start.Add(time.Hour)
812-
check.Args(database.GetManagedAgentCountParams{
813-
StartTime: start,
814-
EndTime: end,
815-
}).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0))
803+
dbm.EXPECT().GetManagedAgentCount(gomock.Any(), database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Return(int64(0), nil).AnyTimes()
804+
check.Args(database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0))
816805
}))
817806
}
818807

819808
func (s *MethodTestSuite) TestOrganization() {
820-
s.Run("Deployment/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) {
809+
s.Run("Deployment/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
810+
dbm.EXPECT().OIDCClaimFields(gomock.Any(), uuid.Nil).Return([]string{}, nil).AnyTimes()
821811
check.Args(uuid.Nil).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
822812
}))
823-
s.Run("Organization/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) {
813+
s.Run("Organization/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
824814
id := uuid.New()
815+
dbm.EXPECT().OIDCClaimFields(gomock.Any(), id).Return([]string{}, nil).AnyTimes()
825816
check.Args(id).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
826817
}))
827-
s.Run("Deployment/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) {
828-
check.Args(database.OIDCClaimFieldValuesParams{
829-
ClaimField: "claim-field",
830-
OrganizationID: uuid.Nil,
831-
}).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
818+
s.Run("Deployment/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
819+
arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: uuid.Nil}
820+
dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes()
821+
check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
832822
}))
833-
s.Run("Organization/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) {
823+
s.Run("Organization/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
834824
id := uuid.New()
835-
check.Args(database.OIDCClaimFieldValuesParams{
836-
ClaimField: "claim-field",
837-
OrganizationID: id,
838-
}).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
825+
arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: id}
826+
dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes()
827+
check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
839828
}))
840829
s.Run("ByOrganization/GetGroups", s.Subtest(func(db database.Store, check *expects) {
841830
o := dbgen.Organization(s.T(), db, database.Organization{})
@@ -1142,41 +1131,43 @@ func (s *MethodTestSuite) TestOrganization() {
11421131
}
11431132

11441133
func (s *MethodTestSuite) TestWorkspaceProxy() {
1145-
s.Run("InsertWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) {
1146-
check.Args(database.InsertWorkspaceProxyParams{
1147-
ID: uuid.New(),
1148-
}).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate)
1149-
}))
1150-
s.Run("RegisterWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) {
1151-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1152-
check.Args(database.RegisterWorkspaceProxyParams{
1153-
ID: p.ID,
1154-
}).Asserts(p, policy.ActionUpdate)
1155-
}))
1156-
s.Run("GetWorkspaceProxyByID", s.Subtest(func(db database.Store, check *expects) {
1157-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1134+
s.Run("InsertWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
1135+
arg := database.InsertWorkspaceProxyParams{ID: uuid.New()}
1136+
dbm.EXPECT().InsertWorkspaceProxy(gomock.Any(), arg).Return(database.WorkspaceProxy{}, nil).AnyTimes()
1137+
check.Args(arg).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate)
1138+
}))
1139+
s.Run("RegisterWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1140+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1141+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
1142+
dbm.EXPECT().RegisterWorkspaceProxy(gomock.Any(), database.RegisterWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes()
1143+
check.Args(database.RegisterWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate)
1144+
}))
1145+
s.Run("GetWorkspaceProxyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1146+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1147+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
11581148
check.Args(p.ID).Asserts(p, policy.ActionRead).Returns(p)
11591149
}))
1160-
s.Run("GetWorkspaceProxyByName", s.Subtest(func(db database.Store, check *expects) {
1161-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1150+
s.Run("GetWorkspaceProxyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1151+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1152+
dbm.EXPECT().GetWorkspaceProxyByName(gomock.Any(), p.Name).Return(p, nil).AnyTimes()
11621153
check.Args(p.Name).Asserts(p, policy.ActionRead).Returns(p)
11631154
}))
1164-
s.Run("UpdateWorkspaceProxyDeleted", s.Subtest(func(db database.Store, check *expects) {
1165-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1166-
check.Args(database.UpdateWorkspaceProxyDeletedParams{
1167-
ID: p.ID,
1168-
Deleted: true,
1169-
}).Asserts(p, policy.ActionDelete)
1170-
}))
1171-
s.Run("UpdateWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) {
1172-
p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1173-
check.Args(database.UpdateWorkspaceProxyParams{
1174-
ID: p.ID,
1175-
}).Asserts(p, policy.ActionUpdate)
1176-
}))
1177-
s.Run("GetWorkspaceProxies", s.Subtest(func(db database.Store, check *expects) {
1178-
p1, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1179-
p2, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{})
1155+
s.Run("UpdateWorkspaceProxyDeleted", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1156+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1157+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
1158+
dbm.EXPECT().UpdateWorkspaceProxyDeleted(gomock.Any(), database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Return(nil).AnyTimes()
1159+
check.Args(database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Asserts(p, policy.ActionDelete)
1160+
}))
1161+
s.Run("UpdateWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1162+
p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1163+
dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes()
1164+
dbm.EXPECT().UpdateWorkspaceProxy(gomock.Any(), database.UpdateWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes()
1165+
check.Args(database.UpdateWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate)
1166+
}))
1167+
s.Run("GetWorkspaceProxies", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
1168+
p1 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1169+
p2 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{})
1170+
dbm.EXPECT().GetWorkspaceProxies(gomock.Any()).Return([]database.WorkspaceProxy{p1, p2}, nil).AnyTimes()
11801171
check.Args().Asserts(p1, policy.ActionRead, p2, policy.ActionRead).Returns(slice.New(p1, p2))
11811172
}))
11821173
}
@@ -3499,73 +3490,49 @@ func (s *MethodTestSuite) TestWorkspacePortSharing() {
34993490
}
35003491

35013492
func (s *MethodTestSuite) TestProvisionerKeys() {
3502-
s.Run("InsertProvisionerKey", s.Subtest(func(db database.Store, check *expects) {
3503-
org := dbgen.Organization(s.T(), db, database.Organization{})
3504-
pk := database.ProvisionerKey{
3505-
ID: uuid.New(),
3506-
CreatedAt: dbtestutil.NowInDefaultTimezone(),
3507-
OrganizationID: org.ID,
3508-
Name: strings.ToLower(coderdtest.RandomName(s.T())),
3509-
HashedSecret: []byte(coderdtest.RandomName(s.T())),
3510-
}
3511-
//nolint:gosimple // casting is not a simplification
3512-
check.Args(database.InsertProvisionerKeyParams{
3513-
ID: pk.ID,
3514-
CreatedAt: pk.CreatedAt,
3515-
OrganizationID: pk.OrganizationID,
3516-
Name: pk.Name,
3517-
HashedSecret: pk.HashedSecret,
3518-
}).Asserts(pk, policy.ActionCreate).Returns(pk)
3519-
}))
3520-
s.Run("GetProvisionerKeyByID", s.Subtest(func(db database.Store, check *expects) {
3521-
org := dbgen.Organization(s.T(), db, database.Organization{})
3522-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3493+
s.Run("InsertProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3494+
org := testutil.Fake(s.T(), faker, database.Organization{})
3495+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3496+
arg := database.InsertProvisionerKeyParams{ID: pk.ID, CreatedAt: pk.CreatedAt, OrganizationID: pk.OrganizationID, Name: pk.Name, HashedSecret: pk.HashedSecret}
3497+
dbm.EXPECT().InsertProvisionerKey(gomock.Any(), arg).Return(pk, nil).AnyTimes()
3498+
check.Args(arg).Asserts(rbac.ResourceProvisionerDaemon.InOrg(org.ID).WithID(pk.ID), policy.ActionCreate).Returns(pk)
3499+
}))
3500+
s.Run("GetProvisionerKeyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3501+
org := testutil.Fake(s.T(), faker, database.Organization{})
3502+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3503+
dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes()
35233504
check.Args(pk.ID).Asserts(pk, policy.ActionRead).Returns(pk)
35243505
}))
3525-
s.Run("GetProvisionerKeyByHashedSecret", s.Subtest(func(db database.Store, check *expects) {
3526-
org := dbgen.Organization(s.T(), db, database.Organization{})
3527-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")})
3506+
s.Run("GetProvisionerKeyByHashedSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3507+
org := testutil.Fake(s.T(), faker, database.Organization{})
3508+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")})
3509+
dbm.EXPECT().GetProvisionerKeyByHashedSecret(gomock.Any(), []byte("foo")).Return(pk, nil).AnyTimes()
35283510
check.Args([]byte("foo")).Asserts(pk, policy.ActionRead).Returns(pk)
35293511
}))
3530-
s.Run("GetProvisionerKeyByName", s.Subtest(func(db database.Store, check *expects) {
3531-
org := dbgen.Organization(s.T(), db, database.Organization{})
3532-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3533-
check.Args(database.GetProvisionerKeyByNameParams{
3534-
OrganizationID: org.ID,
3535-
Name: pk.Name,
3536-
}).Asserts(pk, policy.ActionRead).Returns(pk)
3537-
}))
3538-
s.Run("ListProvisionerKeysByOrganization", s.Subtest(func(db database.Store, check *expects) {
3539-
org := dbgen.Organization(s.T(), db, database.Organization{})
3540-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3541-
pks := []database.ProvisionerKey{
3542-
{
3543-
ID: pk.ID,
3544-
CreatedAt: pk.CreatedAt,
3545-
OrganizationID: pk.OrganizationID,
3546-
Name: pk.Name,
3547-
HashedSecret: pk.HashedSecret,
3548-
},
3549-
}
3550-
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks)
3551-
}))
3552-
s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Subtest(func(db database.Store, check *expects) {
3553-
org := dbgen.Organization(s.T(), db, database.Organization{})
3554-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3555-
pks := []database.ProvisionerKey{
3556-
{
3557-
ID: pk.ID,
3558-
CreatedAt: pk.CreatedAt,
3559-
OrganizationID: pk.OrganizationID,
3560-
Name: pk.Name,
3561-
HashedSecret: pk.HashedSecret,
3562-
},
3563-
}
3564-
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks)
3565-
}))
3566-
s.Run("DeleteProvisionerKey", s.Subtest(func(db database.Store, check *expects) {
3567-
org := dbgen.Organization(s.T(), db, database.Organization{})
3568-
pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID})
3512+
s.Run("GetProvisionerKeyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3513+
org := testutil.Fake(s.T(), faker, database.Organization{})
3514+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3515+
arg := database.GetProvisionerKeyByNameParams{OrganizationID: org.ID, Name: pk.Name}
3516+
dbm.EXPECT().GetProvisionerKeyByName(gomock.Any(), arg).Return(pk, nil).AnyTimes()
3517+
check.Args(arg).Asserts(pk, policy.ActionRead).Returns(pk)
3518+
}))
3519+
s.Run("ListProvisionerKeysByOrganization", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3520+
org := testutil.Fake(s.T(), faker, database.Organization{})
3521+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3522+
dbm.EXPECT().ListProvisionerKeysByOrganization(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes()
3523+
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk})
3524+
}))
3525+
s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3526+
org := testutil.Fake(s.T(), faker, database.Organization{})
3527+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3528+
dbm.EXPECT().ListProvisionerKeysByOrganizationExcludeReserved(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes()
3529+
check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk})
3530+
}))
3531+
s.Run("DeleteProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3532+
org := testutil.Fake(s.T(), faker, database.Organization{})
3533+
pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID})
3534+
dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes()
3535+
dbm.EXPECT().DeleteProvisionerKey(gomock.Any(), pk.ID).Return(nil).AnyTimes()
35693536
check.Args(pk.ID).Asserts(pk, policy.ActionDelete).Returns()
35703537
}))
35713538
}

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy