mirror of
https://github.com/mainflux/mainflux.git
synced 2025-04-29 13:49:28 +08:00

* Move Things and Users to Clients Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Update Add and Delete Policies (#1792) * Remove Policy Action Ranks Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Rebase Issues Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix CI Test Errors Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Adding Check on Subject For Clients Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove Check Client Exists Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Check When Sharing Clients Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Only Add User to Group When Sharing Things Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove clientType Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Minor Fix on ShareClient and Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Policies Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Clean Up Things Authorization Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests on RetrieveAll Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Test ShareThing Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Merge Conflicts Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove Adding Policies. Only Use Ownership Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Check If Subject is same as Object Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Move Back To Union As Sometimes Policy is Empty and Fails to Evaluate on Ownership Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Entity Type For Failing Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix BUG in policy evaluation Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Comments Regarding checkAdmin Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests On Rebase Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Combine Authorize For Things and Users Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests On Rebase Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Error on Things SVC `unsupported protocol scheme` Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Fix Bug on Things Authorization Cache (#1810) Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Use Password instead of username in MQTT handler Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Simplify MQTT authorization Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Fix MQTT tests Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Add More Functions to SDK (#1811) * Add More Functions to SDK Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Examples to GoDoc Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Update Unassign Interface Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Pass Subject as ID and Not Token on List Channels By Thing Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Bootstrap Errors For Element Check Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add empty line Before Return Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Reorder URLS in things mux Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Listing Things Policies Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Share Thing Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Examples to CLI Docs Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Update Identity To Update Another User Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Identify an Update Policies on Things Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Update Things Policies Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix GoDocs on Disconnect Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Change Authorize To Use AccessRequest Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * For Evaluate Policy Use AccessRequest (#1814) Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Add SDK Tests (#1812) * Add Things Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Channel Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Certs Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Consumer Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Enrich Group Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Tests For Health Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Tests For Tokens Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Rename SDK for Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Policies Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Linter Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Make Variable Defination Inline Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Make Cache Key Duration Configurable (#1815) * Make Cache Key Duration Configurable Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Rename ENV Var Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Update GoDocs (#1816) * Add GoDocs Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Missing GoDoc Files Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Enable godot Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add License Information Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Add Call Home Client to Mainflux services (#1751) * Move Things and Users to Clients Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: SammyOina <sammyoina@gmail.com> * collect and send data package Signed-off-by: SammyOina <sammyoina@gmail.com> * create telemetry migrations Signed-off-by: SammyOina <sammyoina@gmail.com> * add telemetry endpoints Signed-off-by: SammyOina <sammyoina@gmail.com> * add transport Signed-off-by: SammyOina <sammyoina@gmail.com> * create service Signed-off-by: SammyOina <sammyoina@gmail.com> * remove homing server Signed-off-by: SammyOina <sammyoina@gmail.com> * add call home to adapters Signed-off-by: SammyOina <sammyoina@gmail.com> * add last seen Signed-off-by: SammyOina <sammyoina@gmail.com> * rename logger Signed-off-by: SammyOina <sammyoina@gmail.com> * remove homing client Signed-off-by: SammyOina <sammyoina@gmail.com> * use unmerged repo Signed-off-by: SammyOina <sammyoina@gmail.com> * use renamed module Signed-off-by: SammyOina <sammyoina@gmail.com> * update call home version Signed-off-by: SammyOina <sammyoina@gmail.com> * edit documentation Signed-off-by: SammyOina <sammyoina@gmail.com> * align table Signed-off-by: SammyOina <sammyoina@gmail.com> * use alias for call home client Signed-off-by: SammyOina <sammyoina@gmail.com> * update callhome Signed-off-by: SammyOina <sammyoina@gmail.com> * update call home pkg Signed-off-by: SammyOina <sammyoina@gmail.com> * update call home Signed-off-by: SammyOina <sammyoina@gmail.com> * fix modules Signed-off-by: SammyOina <sammyoina@gmail.com> * use mf build version Signed-off-by: SammyOina <sammyoina@gmail.com> * use mf build version Signed-off-by: SammyOina <sammyoina@gmail.com> * restore default Signed-off-by: SammyOina <sammyoina@gmail.com> * add call home for users and things Signed-off-by: SammyOina <sammyoina@gmail.com> * enable opting on call home Signed-off-by: SammyOina <sammyoina@gmail.com> * remove full stops Signed-off-by: SammyOina <sammyoina@gmail.com> * update callhome client Signed-off-by: SammyOina <sammyoina@gmail.com> * add call home to all services Signed-off-by: SammyOina <sammyoina@gmail.com> * fix build Signed-off-by: SammyOina <sammyoina@gmail.com> * restore sdk tests Signed-off-by: SammyOina <sammyoina@gmail.com> * remove unnecessary changes Signed-off-by: SammyOina <sammyoina@gmail.com> * restore health_test.go Signed-off-by: SammyOina <sammyoina@gmail.com> --------- Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: SammyOina <sammyoina@gmail.com> Co-authored-by: b1ackd0t <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> --------- Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: SammyOina <sammyoina@gmail.com> Co-authored-by: b1ackd0t <blackd0t@protonmail.com> Co-authored-by: Sammy Kerata Oina <44265300+SammyOina@users.noreply.github.com>
1060 lines
30 KiB
Go
1060 lines
30 KiB
Go
// Copyright (c) Mainflux
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package postgres_test
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/mainflux/mainflux/internal/postgres"
|
|
"github.com/mainflux/mainflux/internal/testsutil"
|
|
mfclients "github.com/mainflux/mainflux/pkg/clients"
|
|
"github.com/mainflux/mainflux/pkg/errors"
|
|
mfgroups "github.com/mainflux/mainflux/pkg/groups"
|
|
"github.com/mainflux/mainflux/pkg/uuid"
|
|
cpostgres "github.com/mainflux/mainflux/users/clients/postgres"
|
|
gpostgres "github.com/mainflux/mainflux/users/groups/postgres"
|
|
"github.com/mainflux/mainflux/users/policies"
|
|
ppostgres "github.com/mainflux/mainflux/users/policies/postgres"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
const (
|
|
maxNameSize = 254
|
|
)
|
|
|
|
var (
|
|
idProvider = uuid.New()
|
|
invalidName = strings.Repeat("m", maxNameSize+10)
|
|
password = "$tr0ngPassw0rd"
|
|
clientIdentity = "client-identity@example.com"
|
|
clientName = "client name"
|
|
wrongName = "wrong-name"
|
|
wrongID = "wrong-id"
|
|
)
|
|
|
|
func TestClientsSave(t *testing.T) {
|
|
t.Cleanup(func() { testsutil.CleanUpDB(t, db) })
|
|
postgres.NewDatabase(db, tracer)
|
|
repo := cpostgres.NewRepository(database)
|
|
|
|
uid := testsutil.GenerateUUID(t, idProvider)
|
|
|
|
cases := []struct {
|
|
desc string
|
|
client mfclients.Client
|
|
err error
|
|
}{
|
|
{
|
|
desc: "add new client successfully",
|
|
client: mfclients.Client{
|
|
ID: uid,
|
|
Name: clientName,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: clientIdentity,
|
|
Secret: password,
|
|
},
|
|
Metadata: mfclients.Metadata{},
|
|
Status: mfclients.EnabledStatus,
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "add new client with an owner",
|
|
client: mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Owner: uid,
|
|
Name: clientName,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "withowner-client@example.com",
|
|
Secret: password,
|
|
},
|
|
Metadata: mfclients.Metadata{},
|
|
Status: mfclients.EnabledStatus,
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "add client with duplicate client identity",
|
|
client: mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: clientName,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: clientIdentity,
|
|
Secret: password,
|
|
},
|
|
Metadata: mfclients.Metadata{},
|
|
Status: mfclients.EnabledStatus,
|
|
},
|
|
err: errors.ErrConflict,
|
|
},
|
|
{
|
|
desc: "add client with invalid client id",
|
|
client: mfclients.Client{
|
|
ID: invalidName,
|
|
Name: clientName,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "invalidid-client@example.com",
|
|
Secret: password,
|
|
},
|
|
Metadata: mfclients.Metadata{},
|
|
Status: mfclients.EnabledStatus,
|
|
},
|
|
err: errors.ErrMalformedEntity,
|
|
},
|
|
{
|
|
desc: "add client with invalid client name",
|
|
client: mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: invalidName,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "invalidname-client@example.com",
|
|
Secret: password,
|
|
},
|
|
Metadata: mfclients.Metadata{},
|
|
Status: mfclients.EnabledStatus,
|
|
},
|
|
err: errors.ErrMalformedEntity,
|
|
},
|
|
{
|
|
desc: "add client with invalid client owner",
|
|
client: mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Owner: invalidName,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "invalidowner-client@example.com",
|
|
Secret: password,
|
|
},
|
|
Metadata: mfclients.Metadata{},
|
|
Status: mfclients.EnabledStatus,
|
|
},
|
|
err: errors.ErrMalformedEntity,
|
|
},
|
|
{
|
|
desc: "add client with invalid client identity",
|
|
client: mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: clientName,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: invalidName,
|
|
Secret: password,
|
|
},
|
|
Metadata: mfclients.Metadata{},
|
|
Status: mfclients.EnabledStatus,
|
|
},
|
|
err: errors.ErrMalformedEntity,
|
|
},
|
|
{
|
|
desc: "add client with a missing client identity",
|
|
client: mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "",
|
|
Secret: password,
|
|
},
|
|
Metadata: mfclients.Metadata{},
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "add client with a missing client secret",
|
|
client: mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "missing-client-secret@example.com",
|
|
Secret: "",
|
|
},
|
|
Metadata: mfclients.Metadata{},
|
|
},
|
|
err: nil,
|
|
},
|
|
}
|
|
for _, tc := range cases {
|
|
rClient, err := repo.Save(context.Background(), tc.client)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
if err == nil {
|
|
rClient[0].Credentials.Secret = tc.client.Credentials.Secret
|
|
assert.Equal(t, tc.client, rClient[0], fmt.Sprintf("%s: expected %v got %v\n", tc.desc, tc.client, rClient))
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestClientsRetrieveByID(t *testing.T) {
|
|
t.Cleanup(func() { testsutil.CleanUpDB(t, db) })
|
|
postgres.NewDatabase(db, tracer)
|
|
repo := cpostgres.NewRepository(database)
|
|
|
|
client := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: clientName,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: clientIdentity,
|
|
Secret: password,
|
|
},
|
|
Status: mfclients.EnabledStatus,
|
|
}
|
|
|
|
clients, err := repo.Save(context.Background(), client)
|
|
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
|
|
client = clients[0]
|
|
|
|
cases := map[string]struct {
|
|
ID string
|
|
err error
|
|
}{
|
|
"retrieve existing client": {client.ID, nil},
|
|
"retrieve non-existing client": {wrongID, errors.ErrNotFound},
|
|
}
|
|
|
|
for desc, tc := range cases {
|
|
cli, err := repo.RetrieveByID(context.Background(), tc.ID)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", desc, tc.err, err))
|
|
if err == nil {
|
|
assert.Equal(t, client.ID, cli.ID, fmt.Sprintf("retrieve client by ID : client ID : expected %s got %s\n", client.ID, cli.ID))
|
|
assert.Equal(t, client.Name, cli.Name, fmt.Sprintf("retrieve client by ID : client Name : expected %s got %s\n", client.Name, cli.Name))
|
|
assert.Equal(t, client.Credentials.Identity, cli.Credentials.Identity, fmt.Sprintf("retrieve client by ID : client Identity : expected %s got %s\n", client.Credentials.Identity, cli.Credentials.Identity))
|
|
assert.Equal(t, client.Status, cli.Status, fmt.Sprintf("retrieve client by ID : client Status : expected %d got %d\n", client.Status, cli.Status))
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestClientsRetrieveByIdentity(t *testing.T) {
|
|
t.Cleanup(func() { testsutil.CleanUpDB(t, db) })
|
|
postgres.NewDatabase(db, tracer)
|
|
repo := cpostgres.NewRepository(database)
|
|
|
|
client := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: clientName,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: clientIdentity,
|
|
Secret: password,
|
|
},
|
|
Status: mfclients.EnabledStatus,
|
|
}
|
|
|
|
_, err := repo.Save(context.Background(), client)
|
|
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
|
|
|
|
cases := map[string]struct {
|
|
identity string
|
|
err error
|
|
}{
|
|
"retrieve existing client": {clientIdentity, nil},
|
|
"retrieve non-existing client": {wrongID, errors.ErrNotFound},
|
|
}
|
|
|
|
for desc, tc := range cases {
|
|
_, err := repo.RetrieveByIdentity(context.Background(), tc.identity)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", desc, tc.err, err))
|
|
}
|
|
}
|
|
|
|
func TestClientsRetrieveAll(t *testing.T) {
|
|
t.Cleanup(func() { testsutil.CleanUpDB(t, db) })
|
|
postgres.NewDatabase(db, tracer)
|
|
repo := cpostgres.NewRepository(database)
|
|
grepo := gpostgres.NewRepository(database)
|
|
prepo := ppostgres.NewRepository(database)
|
|
|
|
var nClients = uint64(200)
|
|
var ownerID string
|
|
|
|
meta := mfclients.Metadata{
|
|
"admin": "true",
|
|
}
|
|
wrongMeta := mfclients.Metadata{
|
|
"admin": "false",
|
|
}
|
|
var expectedClients = []mfclients.Client{}
|
|
|
|
var sharedGroup = mfgroups.Group{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "shared-group",
|
|
}
|
|
_, err := grepo.Save(context.Background(), sharedGroup)
|
|
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
|
|
|
|
for i := uint64(0); i < nClients; i++ {
|
|
identity := fmt.Sprintf("TestRetrieveAll%d@example.com", i)
|
|
client := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: identity,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: identity,
|
|
Secret: password,
|
|
},
|
|
Metadata: mfclients.Metadata{},
|
|
Status: mfclients.EnabledStatus,
|
|
}
|
|
if i == 1 {
|
|
ownerID = client.ID
|
|
}
|
|
if i%10 == 0 {
|
|
client.Owner = ownerID
|
|
client.Metadata = meta
|
|
client.Tags = []string{"Test"}
|
|
}
|
|
if i%50 == 0 {
|
|
client.Status = mfclients.DisabledStatus
|
|
}
|
|
_, err := repo.Save(context.Background(), client)
|
|
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
|
|
client.Credentials.Secret = ""
|
|
expectedClients = append(expectedClients, client)
|
|
var policy = policies.Policy{
|
|
Subject: client.ID,
|
|
Object: sharedGroup.ID,
|
|
Actions: []string{"c_list"},
|
|
}
|
|
err = prepo.Save(context.Background(), policy)
|
|
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
|
|
}
|
|
|
|
cases := map[string]struct {
|
|
size uint64
|
|
pm mfclients.Page
|
|
response []mfclients.Client
|
|
}{
|
|
"retrieve all clients empty page": {
|
|
pm: mfclients.Page{},
|
|
response: []mfclients.Client{},
|
|
size: 0,
|
|
},
|
|
"retrieve all clients": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: expectedClients,
|
|
size: 200,
|
|
},
|
|
"retrieve all clients with limit": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: 50,
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: expectedClients[0:50],
|
|
size: 50,
|
|
},
|
|
"retrieve all clients with offset": {
|
|
pm: mfclients.Page{
|
|
Offset: 50,
|
|
Limit: nClients,
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: expectedClients[50:200],
|
|
size: 150,
|
|
},
|
|
"retrieve all clients with limit and offset": {
|
|
pm: mfclients.Page{
|
|
Offset: 50,
|
|
Limit: 50,
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: expectedClients[50:100],
|
|
size: 50,
|
|
},
|
|
"retrieve all clients with limit and offset not full": {
|
|
pm: mfclients.Page{
|
|
Offset: 170,
|
|
Limit: 50,
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: expectedClients[170:200],
|
|
size: 30,
|
|
},
|
|
"retrieve all clients by metadata": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
Metadata: meta,
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: []mfclients.Client{expectedClients[0], expectedClients[10], expectedClients[20], expectedClients[30], expectedClients[40], expectedClients[50], expectedClients[60],
|
|
expectedClients[70], expectedClients[80], expectedClients[90], expectedClients[100], expectedClients[110], expectedClients[120], expectedClients[130],
|
|
expectedClients[140], expectedClients[150], expectedClients[160], expectedClients[170], expectedClients[180], expectedClients[190],
|
|
},
|
|
size: 20,
|
|
},
|
|
"retrieve clients by wrong metadata": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
Metadata: wrongMeta,
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: []mfclients.Client{},
|
|
size: 0,
|
|
},
|
|
"retrieve all clients by name": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
Name: "TestRetrieveAll3@example.com",
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: []mfclients.Client{expectedClients[3]},
|
|
size: 1,
|
|
},
|
|
"retrieve clients by wrong name": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
Name: wrongName,
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: []mfclients.Client{},
|
|
size: 0,
|
|
},
|
|
"retrieve all clients by owner": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
Owner: ownerID,
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: []mfclients.Client{expectedClients[10], expectedClients[20], expectedClients[30], expectedClients[40], expectedClients[50], expectedClients[60],
|
|
expectedClients[70], expectedClients[80], expectedClients[90], expectedClients[100], expectedClients[110], expectedClients[120], expectedClients[130],
|
|
expectedClients[140], expectedClients[150], expectedClients[160], expectedClients[170], expectedClients[180], expectedClients[190],
|
|
},
|
|
size: 19,
|
|
},
|
|
"retrieve clients by wrong owner": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
Owner: wrongID,
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: []mfclients.Client{},
|
|
size: 0,
|
|
},
|
|
"retrieve all clients by disabled status": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
Status: mfclients.DisabledStatus,
|
|
},
|
|
response: []mfclients.Client{expectedClients[0], expectedClients[50], expectedClients[100], expectedClients[150]},
|
|
size: 4,
|
|
},
|
|
"retrieve all clients by combined status": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: expectedClients,
|
|
size: 200,
|
|
},
|
|
"retrieve clients by the wrong status": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
Status: 10,
|
|
},
|
|
response: []mfclients.Client{},
|
|
size: 0,
|
|
},
|
|
"retrieve all clients by tags": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
Tag: "Test",
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: []mfclients.Client{expectedClients[0], expectedClients[10], expectedClients[20], expectedClients[30], expectedClients[40], expectedClients[50], expectedClients[60],
|
|
expectedClients[70], expectedClients[80], expectedClients[90], expectedClients[100], expectedClients[110], expectedClients[120], expectedClients[130],
|
|
expectedClients[140], expectedClients[150], expectedClients[160], expectedClients[170], expectedClients[180], expectedClients[190],
|
|
},
|
|
size: 20,
|
|
},
|
|
"retrieve clients by wrong tags": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
Tag: "wrongTags",
|
|
Status: mfclients.AllStatus,
|
|
},
|
|
response: []mfclients.Client{},
|
|
size: 0,
|
|
},
|
|
"retrieve all clients by sharedby": {
|
|
pm: mfclients.Page{
|
|
Offset: 0,
|
|
Limit: nClients,
|
|
Total: nClients,
|
|
SharedBy: expectedClients[0].ID,
|
|
Status: mfclients.AllStatus,
|
|
Action: "c_list",
|
|
},
|
|
response: []mfclients.Client{expectedClients[10], expectedClients[20], expectedClients[30], expectedClients[40], expectedClients[50], expectedClients[60],
|
|
expectedClients[70], expectedClients[80], expectedClients[90], expectedClients[100], expectedClients[110], expectedClients[120], expectedClients[130],
|
|
expectedClients[140], expectedClients[150], expectedClients[160], expectedClients[170], expectedClients[180], expectedClients[190],
|
|
},
|
|
size: 19,
|
|
},
|
|
}
|
|
for desc, tc := range cases {
|
|
page, err := repo.RetrieveAll(context.Background(), tc.pm)
|
|
size := uint64(len(page.Clients))
|
|
assert.ElementsMatch(t, page.Clients, tc.response, fmt.Sprintf("%s: expected %v got %v\n", desc, tc.response, page.Clients))
|
|
assert.Equal(t, tc.size, size, fmt.Sprintf("%s: expected size %d got %d\n", desc, tc.size, size))
|
|
assert.Nil(t, err, fmt.Sprintf("%s: expected no error got %d\n", desc, err))
|
|
}
|
|
}
|
|
|
|
func TestClientsUpdateMetadata(t *testing.T) {
|
|
t.Cleanup(func() { testsutil.CleanUpDB(t, db) })
|
|
postgres.NewDatabase(db, tracer)
|
|
repo := cpostgres.NewRepository(database)
|
|
|
|
client1 := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "enabled-client",
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client1-update@example.com",
|
|
Secret: password,
|
|
},
|
|
Metadata: mfclients.Metadata{
|
|
"name": "enabled-client",
|
|
},
|
|
Tags: []string{"enabled", "tag1"},
|
|
Status: mfclients.EnabledStatus,
|
|
}
|
|
|
|
client2 := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "disabled-client",
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client2-update@example.com",
|
|
Secret: password,
|
|
},
|
|
Metadata: mfclients.Metadata{
|
|
"name": "disabled-client",
|
|
},
|
|
Tags: []string{"disabled", "tag1"},
|
|
Status: mfclients.DisabledStatus,
|
|
}
|
|
|
|
clients1, err := repo.Save(context.Background(), client1)
|
|
assert.True(t, errors.Contains(err, nil), fmt.Sprintf("add new client with metadata: expected %v got %s\n", nil, err))
|
|
clients2, err := repo.Save(context.Background(), client2)
|
|
assert.True(t, errors.Contains(err, nil), fmt.Sprintf("add new disabled client: expected %v got %s\n", nil, err))
|
|
client1 = clients1[0]
|
|
client2 = clients2[0]
|
|
|
|
ucases := []struct {
|
|
desc string
|
|
update string
|
|
client mfclients.Client
|
|
err error
|
|
}{
|
|
{
|
|
desc: "update metadata for enabled client",
|
|
update: "metadata",
|
|
client: mfclients.Client{
|
|
ID: client1.ID,
|
|
Metadata: mfclients.Metadata{
|
|
"update": "metadata",
|
|
},
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "update metadata for disabled client",
|
|
update: "metadata",
|
|
client: mfclients.Client{
|
|
ID: client2.ID,
|
|
Metadata: mfclients.Metadata{
|
|
"update": "metadata",
|
|
},
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
{
|
|
desc: "update name for enabled client",
|
|
update: "name",
|
|
client: mfclients.Client{
|
|
ID: client1.ID,
|
|
Name: "updated name",
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "update name for disabled client",
|
|
update: "name",
|
|
client: mfclients.Client{
|
|
ID: client2.ID,
|
|
Name: "updated name",
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
{
|
|
desc: "update name and metadata for enabled client",
|
|
update: "both",
|
|
client: mfclients.Client{
|
|
ID: client1.ID,
|
|
Name: "updated name and metadata",
|
|
Metadata: mfclients.Metadata{
|
|
"update": "name and metadata",
|
|
},
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "update name and metadata for a disabled client",
|
|
update: "both",
|
|
client: mfclients.Client{
|
|
ID: client2.ID,
|
|
Name: "updated name and metadata",
|
|
Metadata: mfclients.Metadata{
|
|
"update": "name and metadata",
|
|
},
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
{
|
|
desc: "update metadata for invalid client",
|
|
update: "metadata",
|
|
client: mfclients.Client{
|
|
ID: wrongID,
|
|
Metadata: mfclients.Metadata{
|
|
"update": "metadata",
|
|
},
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
{
|
|
desc: "update name for invalid client",
|
|
update: "name",
|
|
client: mfclients.Client{
|
|
ID: wrongID,
|
|
Name: "updated name",
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
{
|
|
desc: "update name and metadata for invalid client",
|
|
update: "both",
|
|
client: mfclients.Client{
|
|
ID: client2.ID,
|
|
Name: "updated name and metadata",
|
|
Metadata: mfclients.Metadata{
|
|
"update": "name and metadata",
|
|
},
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
}
|
|
for _, tc := range ucases {
|
|
expected, err := repo.Update(context.Background(), tc.client)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
if err == nil {
|
|
if tc.client.Name != "" {
|
|
assert.Equal(t, expected.Name, tc.client.Name, fmt.Sprintf("%s: expected %v got %v\n", tc.desc, expected.Name, tc.client.Name))
|
|
}
|
|
if tc.client.Metadata != nil {
|
|
assert.Equal(t, expected.Metadata, tc.client.Metadata, fmt.Sprintf("%s: expected %v got %v\n", tc.desc, expected.Metadata, tc.client.Metadata))
|
|
}
|
|
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestClientsUpdateTags(t *testing.T) {
|
|
t.Cleanup(func() { testsutil.CleanUpDB(t, db) })
|
|
postgres.NewDatabase(db, tracer)
|
|
repo := cpostgres.NewRepository(database)
|
|
|
|
client1 := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "enabled-client-with-tags",
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client1-update-tags@example.com",
|
|
Secret: password,
|
|
},
|
|
Tags: []string{"test", "enabled"},
|
|
Status: mfclients.EnabledStatus,
|
|
}
|
|
client2 := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "disabled-client-with-tags",
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client2-update-tags@example.com",
|
|
Secret: password,
|
|
},
|
|
Tags: []string{"test", "disabled"},
|
|
Status: mfclients.DisabledStatus,
|
|
}
|
|
|
|
clients1, err := repo.Save(context.Background(), client1)
|
|
assert.True(t, errors.Contains(err, nil), fmt.Sprintf("add new client with tags: expected %v got %s\n", nil, err))
|
|
if err == nil {
|
|
assert.Equal(t, client1.ID, client1.ID, fmt.Sprintf("add new client with tags: expected %v got %s\n", nil, err))
|
|
}
|
|
client1 = clients1[0]
|
|
clients2, err := repo.Save(context.Background(), client2)
|
|
assert.True(t, errors.Contains(err, nil), fmt.Sprintf("add new disabled client with tags: expected %v got %s\n", nil, err))
|
|
if err == nil {
|
|
assert.Equal(t, client2.ID, client2.ID, fmt.Sprintf("add new disabled client with tags: expected %v got %s\n", nil, err))
|
|
}
|
|
client2 = clients2[0]
|
|
ucases := []struct {
|
|
desc string
|
|
client mfclients.Client
|
|
err error
|
|
}{
|
|
{
|
|
desc: "update tags for enabled client",
|
|
client: mfclients.Client{
|
|
ID: client1.ID,
|
|
Tags: []string{"updated"},
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "update tags for disabled client",
|
|
client: mfclients.Client{
|
|
ID: client2.ID,
|
|
Tags: []string{"updated"},
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
{
|
|
desc: "update tags for invalid client",
|
|
client: mfclients.Client{
|
|
ID: wrongID,
|
|
Tags: []string{"updated"},
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
}
|
|
for _, tc := range ucases {
|
|
expected, err := repo.UpdateTags(context.Background(), tc.client)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
if err == nil {
|
|
assert.Equal(t, tc.client.Tags, expected.Tags, fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.client.Tags, expected.Tags))
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestClientsUpdateSecret(t *testing.T) {
|
|
t.Cleanup(func() { testsutil.CleanUpDB(t, db) })
|
|
postgres.NewDatabase(db, tracer)
|
|
repo := cpostgres.NewRepository(database)
|
|
|
|
client1 := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "enabled-client",
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client1-update@example.com",
|
|
Secret: password,
|
|
},
|
|
Status: mfclients.EnabledStatus,
|
|
}
|
|
client2 := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "disabled-client",
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client2-update@example.com",
|
|
Secret: password,
|
|
},
|
|
Status: mfclients.DisabledStatus,
|
|
}
|
|
|
|
rClients1, err := repo.Save(context.Background(), client1)
|
|
assert.True(t, errors.Contains(err, nil), fmt.Sprintf("add new client: expected %v got %s\n", nil, err))
|
|
if err == nil {
|
|
assert.Equal(t, client1.ID, rClients1[0].ID, fmt.Sprintf("add new client: expected %v got %s\n", nil, err))
|
|
}
|
|
rClients2, err := repo.Save(context.Background(), client2)
|
|
assert.True(t, errors.Contains(err, nil), fmt.Sprintf("add new disabled client: expected %v got %s\n", nil, err))
|
|
if err == nil {
|
|
assert.Equal(t, client2.ID, rClients2[0].ID, fmt.Sprintf("add new disabled client: expected %v got %s\n", nil, err))
|
|
}
|
|
|
|
ucases := []struct {
|
|
desc string
|
|
client mfclients.Client
|
|
err error
|
|
}{
|
|
{
|
|
desc: "update secret for enabled client",
|
|
client: mfclients.Client{
|
|
ID: client1.ID,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client1-update@example.com",
|
|
Secret: "newpassword",
|
|
},
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "update secret for disabled client",
|
|
client: mfclients.Client{
|
|
ID: client2.ID,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client2-update@example.com",
|
|
Secret: "newpassword",
|
|
},
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
{
|
|
desc: "update secret for invalid client",
|
|
client: mfclients.Client{
|
|
ID: wrongID,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client3-update@example.com",
|
|
Secret: "newpassword",
|
|
},
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
}
|
|
for _, tc := range ucases {
|
|
_, err := repo.UpdateSecret(context.Background(), tc.client)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
if err == nil {
|
|
c, err := repo.RetrieveByIdentity(context.Background(), tc.client.Credentials.Identity)
|
|
require.Nil(t, err, fmt.Sprintf("retrieve client by id during update of secret unexpected error: %s", err))
|
|
assert.Equal(t, tc.client.Credentials.Secret, c.Credentials.Secret, fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.client.Credentials.Secret, c.Credentials.Secret))
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestClientsUpdateIdentity(t *testing.T) {
|
|
t.Cleanup(func() { testsutil.CleanUpDB(t, db) })
|
|
postgres.NewDatabase(db, tracer)
|
|
repo := cpostgres.NewRepository(database)
|
|
|
|
client1 := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "enabled-client",
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client1-update@example.com",
|
|
Secret: password,
|
|
},
|
|
Status: mfclients.EnabledStatus,
|
|
}
|
|
client2 := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "disabled-client",
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client2-update@example.com",
|
|
Secret: password,
|
|
},
|
|
Status: mfclients.DisabledStatus,
|
|
}
|
|
|
|
rClients1, err := repo.Save(context.Background(), client1)
|
|
assert.True(t, errors.Contains(err, nil), fmt.Sprintf("add new client: expected %v got %s\n", nil, err))
|
|
if err == nil {
|
|
assert.Equal(t, client1.ID, rClients1[0].ID, fmt.Sprintf("add new client: expected %v got %s\n", nil, err))
|
|
}
|
|
rClients2, err := repo.Save(context.Background(), client2)
|
|
assert.True(t, errors.Contains(err, nil), fmt.Sprintf("add new disabled client: expected %v got %s\n", nil, err))
|
|
if err == nil {
|
|
assert.Equal(t, client2.ID, rClients2[0].ID, fmt.Sprintf("add new disabled client: expected %v got %s\n", nil, err))
|
|
}
|
|
|
|
ucases := []struct {
|
|
desc string
|
|
client mfclients.Client
|
|
err error
|
|
}{
|
|
{
|
|
desc: "update identity for enabled client",
|
|
client: mfclients.Client{
|
|
ID: client1.ID,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client1-updated@example.com",
|
|
},
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "update identity for disabled client",
|
|
client: mfclients.Client{
|
|
ID: client2.ID,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client2-updated@example.com",
|
|
},
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
{
|
|
desc: "update identity for invalid client",
|
|
client: mfclients.Client{
|
|
ID: wrongID,
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client3-updated@example.com",
|
|
},
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
}
|
|
for _, tc := range ucases {
|
|
expected, err := repo.UpdateIdentity(context.Background(), tc.client)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
if err == nil {
|
|
assert.Equal(t, tc.client.Credentials.Identity, expected.Credentials.Identity, fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.client.Credentials.Identity, expected.Credentials.Identity))
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestClientsUpdateOwner(t *testing.T) {
|
|
t.Cleanup(func() { testsutil.CleanUpDB(t, db) })
|
|
postgres.NewDatabase(db, tracer)
|
|
repo := cpostgres.NewRepository(database)
|
|
|
|
client1 := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "enabled-client-with-owner",
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client1-update-owner@example.com",
|
|
Secret: password,
|
|
},
|
|
Owner: testsutil.GenerateUUID(t, idProvider),
|
|
Status: mfclients.EnabledStatus,
|
|
}
|
|
client2 := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "disabled-client-with-owner",
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client2-update-owner@example.com",
|
|
Secret: password,
|
|
},
|
|
Owner: testsutil.GenerateUUID(t, idProvider),
|
|
Status: mfclients.DisabledStatus,
|
|
}
|
|
|
|
clients1, err := repo.Save(context.Background(), client1)
|
|
client1 = clients1[0]
|
|
assert.True(t, errors.Contains(err, nil), fmt.Sprintf("add new client with owner: expected %v got %s\n", nil, err))
|
|
if err == nil {
|
|
assert.Equal(t, client1.ID, client1.ID, fmt.Sprintf("add new client with owner: expected %v got %s\n", nil, err))
|
|
}
|
|
clients2, err := repo.Save(context.Background(), client2)
|
|
client2 = clients2[0]
|
|
assert.True(t, errors.Contains(err, nil), fmt.Sprintf("add new disabled client with owner: expected %v got %s\n", nil, err))
|
|
if err == nil {
|
|
assert.Equal(t, client2.ID, client2.ID, fmt.Sprintf("add new disabled client with owner: expected %v got %s\n", nil, err))
|
|
}
|
|
ucases := []struct {
|
|
desc string
|
|
client mfclients.Client
|
|
err error
|
|
}{
|
|
{
|
|
desc: "update owner for enabled client",
|
|
client: mfclients.Client{
|
|
ID: client1.ID,
|
|
Owner: testsutil.GenerateUUID(t, idProvider),
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "update owner for disabled client",
|
|
client: mfclients.Client{
|
|
ID: client2.ID,
|
|
Owner: testsutil.GenerateUUID(t, idProvider),
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
{
|
|
desc: "update owner for invalid client",
|
|
client: mfclients.Client{
|
|
ID: wrongID,
|
|
Owner: testsutil.GenerateUUID(t, idProvider),
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
}
|
|
for _, tc := range ucases {
|
|
expected, err := repo.UpdateOwner(context.Background(), tc.client)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
if err == nil {
|
|
assert.Equal(t, tc.client.Owner, expected.Owner, fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.client.Owner, expected.Owner))
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestClientsChangeStatus(t *testing.T) {
|
|
t.Cleanup(func() { testsutil.CleanUpDB(t, db) })
|
|
postgres.NewDatabase(db, tracer)
|
|
repo := cpostgres.NewRepository(database)
|
|
|
|
client1 := mfclients.Client{
|
|
ID: testsutil.GenerateUUID(t, idProvider),
|
|
Name: "enabled-client",
|
|
Credentials: mfclients.Credentials{
|
|
Identity: "client1-update@example.com",
|
|
Secret: password,
|
|
},
|
|
Status: mfclients.EnabledStatus,
|
|
}
|
|
|
|
clients1, err := repo.Save(context.Background(), client1)
|
|
assert.True(t, errors.Contains(err, nil), fmt.Sprintf("add new client: expected %v got %s\n", nil, err))
|
|
client1 = clients1[0]
|
|
|
|
ucases := []struct {
|
|
desc string
|
|
client mfclients.Client
|
|
err error
|
|
}{
|
|
{
|
|
desc: "change client status for an enabled client",
|
|
client: mfclients.Client{
|
|
ID: client1.ID,
|
|
Status: 0,
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "change client status for a disabled client",
|
|
client: mfclients.Client{
|
|
ID: client1.ID,
|
|
Status: 1,
|
|
},
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "change client status for non-existing client",
|
|
client: mfclients.Client{
|
|
ID: "invalid",
|
|
Status: 2,
|
|
},
|
|
err: errors.ErrNotFound,
|
|
},
|
|
}
|
|
|
|
for _, tc := range ucases {
|
|
expected, err := repo.ChangeStatus(context.Background(), tc.client)
|
|
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
|
|
if err == nil {
|
|
assert.Equal(t, tc.client.Status, expected.Status, fmt.Sprintf("%s: expected %d got %d\n", tc.desc, tc.client.Status, expected.Status))
|
|
}
|
|
}
|
|
}
|