|
7 | 7 | "fmt"
|
8 | 8 | "net"
|
9 | 9 | "reflect"
|
10 |
| - "strings" |
11 | 10 | "testing"
|
12 | 11 | "time"
|
13 | 12 |
|
@@ -754,88 +753,78 @@ func (s *MethodTestSuite) TestProvisionerJob() {
|
754 | 753 | }
|
755 | 754 |
|
756 | 755 | func (s *MethodTestSuite) TestLicense() {
|
757 |
| - s.Run("GetLicenses", s.Subtest(func(db database.Store, check *expects) { |
758 |
| - l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
759 |
| - UUID: uuid.New(), |
760 |
| - }) |
761 |
| - require.NoError(s.T(), err) |
762 |
| - check.Args().Asserts(l, policy.ActionRead). |
763 |
| - Returns([]database.License{l}) |
| 756 | + s.Run("GetLicenses", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 757 | + l := database.License{ID: 1} |
| 758 | + dbm.EXPECT().GetLicenses(gomock.Any()).Return([]database.License{l}, nil).AnyTimes() |
| 759 | + check.Args().Asserts(l, policy.ActionRead).Returns([]database.License{l}) |
764 | 760 | }))
|
765 |
| - s.Run("InsertLicense", s.Subtest(func(db database.Store, check *expects) { |
766 |
| - check.Args(database.InsertLicenseParams{}). |
767 |
| - Asserts(rbac.ResourceLicense, policy.ActionCreate) |
| 761 | + s.Run("InsertLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 762 | + dbm.EXPECT().InsertLicense(gomock.Any(), database.InsertLicenseParams{}).Return(database.License{}, nil).AnyTimes() |
| 763 | + check.Args(database.InsertLicenseParams{}).Asserts(rbac.ResourceLicense, policy.ActionCreate) |
768 | 764 | }))
|
769 |
| - s.Run("UpsertLogoURL", s.Subtest(func(db database.Store, check *expects) { |
| 765 | + s.Run("UpsertLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 766 | + dbm.EXPECT().UpsertLogoURL(gomock.Any(), "value").Return(nil).AnyTimes() |
770 | 767 | check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
|
771 | 768 | }))
|
772 |
| - s.Run("UpsertAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) { |
| 769 | + s.Run("UpsertAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 770 | + dbm.EXPECT().UpsertAnnouncementBanners(gomock.Any(), "value").Return(nil).AnyTimes() |
773 | 771 | check.Args("value").Asserts(rbac.ResourceDeploymentConfig, policy.ActionUpdate)
|
774 | 772 | }))
|
775 |
| - s.Run("GetLicenseByID", s.Subtest(func(db database.Store, check *expects) { |
776 |
| - l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
777 |
| - UUID: uuid.New(), |
778 |
| - }) |
779 |
| - require.NoError(s.T(), err) |
780 |
| - check.Args(l.ID).Asserts(l, policy.ActionRead).Returns(l) |
| 773 | + s.Run("GetLicenseByID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 774 | + l := database.License{ID: 1} |
| 775 | + dbm.EXPECT().GetLicenseByID(gomock.Any(), int32(1)).Return(l, nil).AnyTimes() |
| 776 | + check.Args(int32(1)).Asserts(l, policy.ActionRead).Returns(l) |
781 | 777 | }))
|
782 |
| - s.Run("DeleteLicense", s.Subtest(func(db database.Store, check *expects) { |
783 |
| - l, err := db.InsertLicense(context.Background(), database.InsertLicenseParams{ |
784 |
| - UUID: uuid.New(), |
785 |
| - }) |
786 |
| - require.NoError(s.T(), err) |
| 778 | + s.Run("DeleteLicense", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 779 | + l := database.License{ID: 1} |
| 780 | + dbm.EXPECT().GetLicenseByID(gomock.Any(), l.ID).Return(l, nil).AnyTimes() |
| 781 | + dbm.EXPECT().DeleteLicense(gomock.Any(), l.ID).Return(int32(1), nil).AnyTimes() |
787 | 782 | check.Args(l.ID).Asserts(l, policy.ActionDelete)
|
788 | 783 | }))
|
789 |
| - s.Run("GetDeploymentID", s.Subtest(func(db database.Store, check *expects) { |
790 |
| - db.InsertDeploymentID(context.Background(), "value") |
| 784 | + s.Run("GetDeploymentID", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 785 | + dbm.EXPECT().GetDeploymentID(gomock.Any()).Return("value", nil).AnyTimes() |
791 | 786 | check.Args().Asserts().Returns("value")
|
792 | 787 | }))
|
793 |
| - s.Run("GetDefaultProxyConfig", s.Subtest(func(db database.Store, check *expects) { |
794 |
| - check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{ |
795 |
| - DisplayName: "Default", |
796 |
| - IconUrl: "/emojis/1f3e1.png", |
797 |
| - }) |
| 788 | + s.Run("GetDefaultProxyConfig", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 789 | + dbm.EXPECT().GetDefaultProxyConfig(gomock.Any()).Return(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"}, nil).AnyTimes() |
| 790 | + check.Args().Asserts().Returns(database.GetDefaultProxyConfigRow{DisplayName: "Default", IconUrl: "/emojis/1f3e1.png"}) |
798 | 791 | }))
|
799 |
| - s.Run("GetLogoURL", s.Subtest(func(db database.Store, check *expects) { |
800 |
| - err := db.UpsertLogoURL(context.Background(), "value") |
801 |
| - require.NoError(s.T(), err) |
| 792 | + s.Run("GetLogoURL", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 793 | + dbm.EXPECT().GetLogoURL(gomock.Any()).Return("value", nil).AnyTimes() |
802 | 794 | check.Args().Asserts().Returns("value")
|
803 | 795 | }))
|
804 |
| - s.Run("GetAnnouncementBanners", s.Subtest(func(db database.Store, check *expects) { |
805 |
| - err := db.UpsertAnnouncementBanners(context.Background(), "value") |
806 |
| - require.NoError(s.T(), err) |
| 796 | + s.Run("GetAnnouncementBanners", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 797 | + dbm.EXPECT().GetAnnouncementBanners(gomock.Any()).Return("value", nil).AnyTimes() |
807 | 798 | check.Args().Asserts().Returns("value")
|
808 | 799 | }))
|
809 |
| - s.Run("GetManagedAgentCount", s.Subtest(func(db database.Store, check *expects) { |
| 800 | + s.Run("GetManagedAgentCount", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
810 | 801 | start := dbtime.Now()
|
811 | 802 | end := start.Add(time.Hour)
|
812 |
| - check.Args(database.GetManagedAgentCountParams{ |
813 |
| - StartTime: start, |
814 |
| - EndTime: end, |
815 |
| - }).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0)) |
| 803 | + dbm.EXPECT().GetManagedAgentCount(gomock.Any(), database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Return(int64(0), nil).AnyTimes() |
| 804 | + check.Args(database.GetManagedAgentCountParams{StartTime: start, EndTime: end}).Asserts(rbac.ResourceWorkspace, policy.ActionRead).Returns(int64(0)) |
816 | 805 | }))
|
817 | 806 | }
|
818 | 807 |
|
819 | 808 | func (s *MethodTestSuite) TestOrganization() {
|
820 |
| - s.Run("Deployment/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) { |
| 809 | + s.Run("Deployment/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 810 | + dbm.EXPECT().OIDCClaimFields(gomock.Any(), uuid.Nil).Return([]string{}, nil).AnyTimes() |
821 | 811 | check.Args(uuid.Nil).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{})
|
822 | 812 | }))
|
823 |
| - s.Run("Organization/OIDCClaimFields", s.Subtest(func(db database.Store, check *expects) { |
| 813 | + s.Run("Organization/OIDCClaimFields", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
824 | 814 | id := uuid.New()
|
| 815 | + dbm.EXPECT().OIDCClaimFields(gomock.Any(), id).Return([]string{}, nil).AnyTimes() |
825 | 816 | check.Args(id).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{})
|
826 | 817 | }))
|
827 |
| - s.Run("Deployment/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) { |
828 |
| - check.Args(database.OIDCClaimFieldValuesParams{ |
829 |
| - ClaimField: "claim-field", |
830 |
| - OrganizationID: uuid.Nil, |
831 |
| - }).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{}) |
| 818 | + s.Run("Deployment/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 819 | + arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: uuid.Nil} |
| 820 | + dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes() |
| 821 | + check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings, policy.ActionRead).Returns([]string{}) |
832 | 822 | }))
|
833 |
| - s.Run("Organization/OIDCClaimFieldValues", s.Subtest(func(db database.Store, check *expects) { |
| 823 | + s.Run("Organization/OIDCClaimFieldValues", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
834 | 824 | id := uuid.New()
|
835 |
| - check.Args(database.OIDCClaimFieldValuesParams{ |
836 |
| - ClaimField: "claim-field", |
837 |
| - OrganizationID: id, |
838 |
| - }).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{}) |
| 825 | + arg := database.OIDCClaimFieldValuesParams{ClaimField: "claim-field", OrganizationID: id} |
| 826 | + dbm.EXPECT().OIDCClaimFieldValues(gomock.Any(), arg).Return([]string{}, nil).AnyTimes() |
| 827 | + check.Args(arg).Asserts(rbac.ResourceIdpsyncSettings.InOrg(id), policy.ActionRead).Returns([]string{}) |
839 | 828 | }))
|
840 | 829 | s.Run("ByOrganization/GetGroups", s.Subtest(func(db database.Store, check *expects) {
|
841 | 830 | o := dbgen.Organization(s.T(), db, database.Organization{})
|
@@ -1142,41 +1131,43 @@ func (s *MethodTestSuite) TestOrganization() {
|
1142 | 1131 | }
|
1143 | 1132 |
|
1144 | 1133 | func (s *MethodTestSuite) TestWorkspaceProxy() {
|
1145 |
| - s.Run("InsertWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) { |
1146 |
| - check.Args(database.InsertWorkspaceProxyParams{ |
1147 |
| - ID: uuid.New(), |
1148 |
| - }).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate) |
1149 |
| - })) |
1150 |
| - s.Run("RegisterWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) { |
1151 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1152 |
| - check.Args(database.RegisterWorkspaceProxyParams{ |
1153 |
| - ID: p.ID, |
1154 |
| - }).Asserts(p, policy.ActionUpdate) |
1155 |
| - })) |
1156 |
| - s.Run("GetWorkspaceProxyByID", s.Subtest(func(db database.Store, check *expects) { |
1157 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
| 1134 | + s.Run("InsertWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) { |
| 1135 | + arg := database.InsertWorkspaceProxyParams{ID: uuid.New()} |
| 1136 | + dbm.EXPECT().InsertWorkspaceProxy(gomock.Any(), arg).Return(database.WorkspaceProxy{}, nil).AnyTimes() |
| 1137 | + check.Args(arg).Asserts(rbac.ResourceWorkspaceProxy, policy.ActionCreate) |
| 1138 | + })) |
| 1139 | + s.Run("RegisterWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1140 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1141 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
| 1142 | + dbm.EXPECT().RegisterWorkspaceProxy(gomock.Any(), database.RegisterWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes() |
| 1143 | + check.Args(database.RegisterWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate) |
| 1144 | + })) |
| 1145 | + s.Run("GetWorkspaceProxyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1146 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1147 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
1158 | 1148 | check.Args(p.ID).Asserts(p, policy.ActionRead).Returns(p)
|
1159 | 1149 | }))
|
1160 |
| - s.Run("GetWorkspaceProxyByName", s.Subtest(func(db database.Store, check *expects) { |
1161 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
| 1150 | + s.Run("GetWorkspaceProxyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1151 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1152 | + dbm.EXPECT().GetWorkspaceProxyByName(gomock.Any(), p.Name).Return(p, nil).AnyTimes() |
1162 | 1153 | check.Args(p.Name).Asserts(p, policy.ActionRead).Returns(p)
|
1163 | 1154 | }))
|
1164 |
| - s.Run("UpdateWorkspaceProxyDeleted", s.Subtest(func(db database.Store, check *expects) { |
1165 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1166 |
| - check.Args(database.UpdateWorkspaceProxyDeletedParams{ |
1167 |
| - ID: p.ID, |
1168 |
| - Deleted: true, |
1169 |
| - }).Asserts(p, policy.ActionDelete) |
1170 |
| - })) |
1171 |
| - s.Run("UpdateWorkspaceProxy", s.Subtest(func(db database.Store, check *expects) { |
1172 |
| - p, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1173 |
| - check.Args(database.UpdateWorkspaceProxyParams{ |
1174 |
| - ID: p.ID, |
1175 |
| - }).Asserts(p, policy.ActionUpdate) |
1176 |
| - })) |
1177 |
| - s.Run("GetWorkspaceProxies", s.Subtest(func(db database.Store, check *expects) { |
1178 |
| - p1, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
1179 |
| - p2, _ := dbgen.WorkspaceProxy(s.T(), db, database.WorkspaceProxy{}) |
| 1155 | + s.Run("UpdateWorkspaceProxyDeleted", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1156 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1157 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
| 1158 | + dbm.EXPECT().UpdateWorkspaceProxyDeleted(gomock.Any(), database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Return(nil).AnyTimes() |
| 1159 | + check.Args(database.UpdateWorkspaceProxyDeletedParams{ID: p.ID, Deleted: true}).Asserts(p, policy.ActionDelete) |
| 1160 | + })) |
| 1161 | + s.Run("UpdateWorkspaceProxy", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1162 | + p := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1163 | + dbm.EXPECT().GetWorkspaceProxyByID(gomock.Any(), p.ID).Return(p, nil).AnyTimes() |
| 1164 | + dbm.EXPECT().UpdateWorkspaceProxy(gomock.Any(), database.UpdateWorkspaceProxyParams{ID: p.ID}).Return(p, nil).AnyTimes() |
| 1165 | + check.Args(database.UpdateWorkspaceProxyParams{ID: p.ID}).Asserts(p, policy.ActionUpdate) |
| 1166 | + })) |
| 1167 | + s.Run("GetWorkspaceProxies", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 1168 | + p1 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1169 | + p2 := testutil.Fake(s.T(), faker, database.WorkspaceProxy{}) |
| 1170 | + dbm.EXPECT().GetWorkspaceProxies(gomock.Any()).Return([]database.WorkspaceProxy{p1, p2}, nil).AnyTimes() |
1180 | 1171 | check.Args().Asserts(p1, policy.ActionRead, p2, policy.ActionRead).Returns(slice.New(p1, p2))
|
1181 | 1172 | }))
|
1182 | 1173 | }
|
@@ -3499,73 +3490,49 @@ func (s *MethodTestSuite) TestWorkspacePortSharing() {
|
3499 | 3490 | }
|
3500 | 3491 |
|
3501 | 3492 | func (s *MethodTestSuite) TestProvisionerKeys() {
|
3502 |
| - s.Run("InsertProvisionerKey", s.Subtest(func(db database.Store, check *expects) { |
3503 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3504 |
| - pk := database.ProvisionerKey{ |
3505 |
| - ID: uuid.New(), |
3506 |
| - CreatedAt: dbtestutil.NowInDefaultTimezone(), |
3507 |
| - OrganizationID: org.ID, |
3508 |
| - Name: strings.ToLower(coderdtest.RandomName(s.T())), |
3509 |
| - HashedSecret: []byte(coderdtest.RandomName(s.T())), |
3510 |
| - } |
3511 |
| - //nolint:gosimple // casting is not a simplification |
3512 |
| - check.Args(database.InsertProvisionerKeyParams{ |
3513 |
| - ID: pk.ID, |
3514 |
| - CreatedAt: pk.CreatedAt, |
3515 |
| - OrganizationID: pk.OrganizationID, |
3516 |
| - Name: pk.Name, |
3517 |
| - HashedSecret: pk.HashedSecret, |
3518 |
| - }).Asserts(pk, policy.ActionCreate).Returns(pk) |
3519 |
| - })) |
3520 |
| - s.Run("GetProvisionerKeyByID", s.Subtest(func(db database.Store, check *expects) { |
3521 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3522 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3493 | + s.Run("InsertProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3494 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3495 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3496 | + arg := database.InsertProvisionerKeyParams{ID: pk.ID, CreatedAt: pk.CreatedAt, OrganizationID: pk.OrganizationID, Name: pk.Name, HashedSecret: pk.HashedSecret} |
| 3497 | + dbm.EXPECT().InsertProvisionerKey(gomock.Any(), arg).Return(pk, nil).AnyTimes() |
| 3498 | + check.Args(arg).Asserts(rbac.ResourceProvisionerDaemon.InOrg(org.ID).WithID(pk.ID), policy.ActionCreate).Returns(pk) |
| 3499 | + })) |
| 3500 | + s.Run("GetProvisionerKeyByID", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3501 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3502 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3503 | + dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes() |
3523 | 3504 | check.Args(pk.ID).Asserts(pk, policy.ActionRead).Returns(pk)
|
3524 | 3505 | }))
|
3525 |
| - s.Run("GetProvisionerKeyByHashedSecret", s.Subtest(func(db database.Store, check *expects) { |
3526 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3527 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")}) |
| 3506 | + s.Run("GetProvisionerKeyByHashedSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3507 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3508 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID, HashedSecret: []byte("foo")}) |
| 3509 | + dbm.EXPECT().GetProvisionerKeyByHashedSecret(gomock.Any(), []byte("foo")).Return(pk, nil).AnyTimes() |
3528 | 3510 | check.Args([]byte("foo")).Asserts(pk, policy.ActionRead).Returns(pk)
|
3529 | 3511 | }))
|
3530 |
| - s.Run("GetProvisionerKeyByName", s.Subtest(func(db database.Store, check *expects) { |
3531 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3532 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
3533 |
| - check.Args(database.GetProvisionerKeyByNameParams{ |
3534 |
| - OrganizationID: org.ID, |
3535 |
| - Name: pk.Name, |
3536 |
| - }).Asserts(pk, policy.ActionRead).Returns(pk) |
3537 |
| - })) |
3538 |
| - s.Run("ListProvisionerKeysByOrganization", s.Subtest(func(db database.Store, check *expects) { |
3539 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3540 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
3541 |
| - pks := []database.ProvisionerKey{ |
3542 |
| - { |
3543 |
| - ID: pk.ID, |
3544 |
| - CreatedAt: pk.CreatedAt, |
3545 |
| - OrganizationID: pk.OrganizationID, |
3546 |
| - Name: pk.Name, |
3547 |
| - HashedSecret: pk.HashedSecret, |
3548 |
| - }, |
3549 |
| - } |
3550 |
| - check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks) |
3551 |
| - })) |
3552 |
| - s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Subtest(func(db database.Store, check *expects) { |
3553 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3554 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
3555 |
| - pks := []database.ProvisionerKey{ |
3556 |
| - { |
3557 |
| - ID: pk.ID, |
3558 |
| - CreatedAt: pk.CreatedAt, |
3559 |
| - OrganizationID: pk.OrganizationID, |
3560 |
| - Name: pk.Name, |
3561 |
| - HashedSecret: pk.HashedSecret, |
3562 |
| - }, |
3563 |
| - } |
3564 |
| - check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns(pks) |
3565 |
| - })) |
3566 |
| - s.Run("DeleteProvisionerKey", s.Subtest(func(db database.Store, check *expects) { |
3567 |
| - org := dbgen.Organization(s.T(), db, database.Organization{}) |
3568 |
| - pk := dbgen.ProvisionerKey(s.T(), db, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3512 | + s.Run("GetProvisionerKeyByName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3513 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3514 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3515 | + arg := database.GetProvisionerKeyByNameParams{OrganizationID: org.ID, Name: pk.Name} |
| 3516 | + dbm.EXPECT().GetProvisionerKeyByName(gomock.Any(), arg).Return(pk, nil).AnyTimes() |
| 3517 | + check.Args(arg).Asserts(pk, policy.ActionRead).Returns(pk) |
| 3518 | + })) |
| 3519 | + s.Run("ListProvisionerKeysByOrganization", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3520 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3521 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3522 | + dbm.EXPECT().ListProvisionerKeysByOrganization(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes() |
| 3523 | + check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk}) |
| 3524 | + })) |
| 3525 | + s.Run("ListProvisionerKeysByOrganizationExcludeReserved", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3526 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3527 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3528 | + dbm.EXPECT().ListProvisionerKeysByOrganizationExcludeReserved(gomock.Any(), org.ID).Return([]database.ProvisionerKey{pk}, nil).AnyTimes() |
| 3529 | + check.Args(org.ID).Asserts(pk, policy.ActionRead).Returns([]database.ProvisionerKey{pk}) |
| 3530 | + })) |
| 3531 | + s.Run("DeleteProvisionerKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) { |
| 3532 | + org := testutil.Fake(s.T(), faker, database.Organization{}) |
| 3533 | + pk := testutil.Fake(s.T(), faker, database.ProvisionerKey{OrganizationID: org.ID}) |
| 3534 | + dbm.EXPECT().GetProvisionerKeyByID(gomock.Any(), pk.ID).Return(pk, nil).AnyTimes() |
| 3535 | + dbm.EXPECT().DeleteProvisionerKey(gomock.Any(), pk.ID).Return(nil).AnyTimes() |
3569 | 3536 | check.Args(pk.ID).Asserts(pk, policy.ActionDelete).Returns()
|
3570 | 3537 | }))
|
3571 | 3538 | }
|
|
0 commit comments