697 lines
19 KiB
Go
697 lines
19 KiB
Go
package http
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
|
|
pcontext "github.com/influxdata/platform/context"
|
|
"github.com/influxdata/platform/inmem"
|
|
platformtesting "github.com/influxdata/platform/testing"
|
|
|
|
"github.com/influxdata/platform"
|
|
"github.com/influxdata/platform/mock"
|
|
"github.com/julienschmidt/httprouter"
|
|
)
|
|
|
|
func TestService_handleGetAuthorizations(t *testing.T) {
|
|
type fields struct {
|
|
AuthorizationService platform.AuthorizationService
|
|
UserService platform.UserService
|
|
OrganizationService platform.OrganizationService
|
|
}
|
|
|
|
type args struct {
|
|
queryParams map[string][]string
|
|
}
|
|
|
|
type wants struct {
|
|
statusCode int
|
|
contentType string
|
|
body string
|
|
}
|
|
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
args args
|
|
wants wants
|
|
}{
|
|
{
|
|
name: "get all authorizations",
|
|
fields: fields{
|
|
&mock.AuthorizationService{
|
|
FindAuthorizationsFn: func(ctx context.Context, filter platform.AuthorizationFilter, opts ...platform.FindOptions) ([]*platform.Authorization, int, error) {
|
|
return []*platform.Authorization{
|
|
{
|
|
ID: platformtesting.MustIDBase16("0d0a657820696e74"),
|
|
Token: "hello",
|
|
UserID: platformtesting.MustIDBase16("2070616e656d2076"),
|
|
OrgID: platformtesting.MustIDBase16("3070616e656d2076"),
|
|
Description: "t1",
|
|
Permissions: platform.OperPermissions(),
|
|
},
|
|
{
|
|
ID: platformtesting.MustIDBase16("6669646573207375"),
|
|
Token: "example",
|
|
UserID: platformtesting.MustIDBase16("6c7574652c206f6e"),
|
|
OrgID: platformtesting.MustIDBase16("9d70616e656d2076"),
|
|
Description: "t2",
|
|
Permissions: platform.OperPermissions(),
|
|
},
|
|
}, 2, nil
|
|
},
|
|
},
|
|
&mock.UserService{
|
|
FindUserByIDFn: func(ctx context.Context, id platform.ID) (*platform.User, error) {
|
|
return &platform.User{
|
|
ID: id,
|
|
Name: id.String(),
|
|
}, nil
|
|
},
|
|
},
|
|
&mock.OrganizationService{
|
|
FindOrganizationByIDF: func(ctx context.Context, id platform.ID) (*platform.Organization, error) {
|
|
return &platform.Organization{
|
|
ID: id,
|
|
Name: id.String(),
|
|
}, nil
|
|
},
|
|
},
|
|
},
|
|
args: args{},
|
|
wants: wants{
|
|
statusCode: http.StatusOK,
|
|
contentType: "application/json; charset=utf-8",
|
|
body: fmt.Sprintf(`
|
|
{
|
|
"links": {
|
|
"self": "/api/v2/authorizations"
|
|
},
|
|
"authorizations": [
|
|
{
|
|
"links": {
|
|
"user": "/api/v2/users/2070616e656d2076",
|
|
"self": "/api/v2/authorizations/0d0a657820696e74"
|
|
},
|
|
"id": "0d0a657820696e74",
|
|
"userID": "2070616e656d2076",
|
|
"user": "2070616e656d2076",
|
|
"org": "3070616e656d2076",
|
|
"orgID": "3070616e656d2076",
|
|
"status": "",
|
|
"token": "hello",
|
|
"description": "t1",
|
|
"permissions": %s
|
|
},
|
|
{
|
|
"links": {
|
|
"user": "/api/v2/users/6c7574652c206f6e",
|
|
"self": "/api/v2/authorizations/6669646573207375"
|
|
},
|
|
"id": "6669646573207375",
|
|
"userID": "6c7574652c206f6e",
|
|
"user": "6c7574652c206f6e",
|
|
"org": "9d70616e656d2076",
|
|
"orgID": "9d70616e656d2076",
|
|
"status": "",
|
|
"token": "example",
|
|
"description": "t2",
|
|
"permissions": %s
|
|
}
|
|
]
|
|
}
|
|
`, MustMarshal(platform.OperPermissions()), MustMarshal(platform.OperPermissions())),
|
|
},
|
|
},
|
|
{
|
|
name: "get all authorizations when there are none",
|
|
fields: fields{
|
|
AuthorizationService: &mock.AuthorizationService{
|
|
FindAuthorizationsFn: func(ctx context.Context, filter platform.AuthorizationFilter, opts ...platform.FindOptions) ([]*platform.Authorization, int, error) {
|
|
return []*platform.Authorization{}, 0, nil
|
|
},
|
|
},
|
|
},
|
|
args: args{},
|
|
wants: wants{
|
|
statusCode: http.StatusOK,
|
|
contentType: "application/json; charset=utf-8",
|
|
body: `
|
|
{
|
|
"links": {
|
|
"self": "/api/v2/authorizations"
|
|
},
|
|
"authorizations": []
|
|
}`,
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
h := NewAuthorizationHandler(mock.NewUserService())
|
|
h.AuthorizationService = tt.fields.AuthorizationService
|
|
h.UserService = tt.fields.UserService
|
|
h.OrganizationService = tt.fields.OrganizationService
|
|
|
|
r := httptest.NewRequest("GET", "http://any.url", nil)
|
|
|
|
qp := r.URL.Query()
|
|
for k, vs := range tt.args.queryParams {
|
|
for _, v := range vs {
|
|
qp.Add(k, v)
|
|
}
|
|
}
|
|
r.URL.RawQuery = qp.Encode()
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
h.handleGetAuthorizations(w, r)
|
|
|
|
res := w.Result()
|
|
content := res.Header.Get("Content-Type")
|
|
body, _ := ioutil.ReadAll(res.Body)
|
|
|
|
if res.StatusCode != tt.wants.statusCode {
|
|
t.Errorf("%q. handleGetAuthorizations() = %v, want %v", tt.name, res.StatusCode, tt.wants.statusCode)
|
|
}
|
|
if tt.wants.contentType != "" && content != tt.wants.contentType {
|
|
t.Errorf("%q. handleGetAuthorizations() = %v, want %v", tt.name, content, tt.wants.contentType)
|
|
}
|
|
if eq, diff, _ := jsonEqual(string(body), tt.wants.body); tt.wants.body != "" && !eq {
|
|
t.Errorf("%q. handleGetAuthorizations() = -got/+want %s", tt.name, diff)
|
|
}
|
|
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestService_handleGetAuthorization(t *testing.T) {
|
|
type fields struct {
|
|
AuthorizationService platform.AuthorizationService
|
|
UserService platform.UserService
|
|
OrganizationService platform.OrganizationService
|
|
LookupService platform.LookupService
|
|
}
|
|
type args struct {
|
|
id string
|
|
}
|
|
type wants struct {
|
|
statusCode int
|
|
contentType string
|
|
body string
|
|
}
|
|
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
args args
|
|
wants wants
|
|
}{
|
|
{
|
|
name: "get a authorization by id",
|
|
fields: fields{
|
|
AuthorizationService: &mock.AuthorizationService{
|
|
FindAuthorizationByIDFn: func(ctx context.Context, id platform.ID) (*platform.Authorization, error) {
|
|
if id == platformtesting.MustIDBase16("020f755c3c082000") {
|
|
return &platform.Authorization{
|
|
ID: platformtesting.MustIDBase16("020f755c3c082000"),
|
|
UserID: platformtesting.MustIDBase16("020f755c3c082000"),
|
|
OrgID: platformtesting.MustIDBase16("020f755c3c083000"),
|
|
Permissions: []platform.Permission{
|
|
{
|
|
Action: platform.ReadAction,
|
|
Resource: platform.BucketsResource,
|
|
ID: func() *platform.ID {
|
|
id := platformtesting.MustIDBase16("020f755c3c084000")
|
|
return &id
|
|
}(),
|
|
},
|
|
},
|
|
Token: "hello",
|
|
}, nil
|
|
}
|
|
|
|
return nil, fmt.Errorf("not found")
|
|
},
|
|
},
|
|
UserService: &mock.UserService{
|
|
FindUserByIDFn: func(ctx context.Context, id platform.ID) (*platform.User, error) {
|
|
return &platform.User{
|
|
ID: id,
|
|
Name: "u1",
|
|
}, nil
|
|
},
|
|
},
|
|
OrganizationService: &mock.OrganizationService{
|
|
FindOrganizationByIDF: func(ctx context.Context, id platform.ID) (*platform.Organization, error) {
|
|
return &platform.Organization{
|
|
ID: id,
|
|
Name: "o1",
|
|
}, nil
|
|
},
|
|
},
|
|
LookupService: &mock.LookupService{
|
|
NameFn: func(ctx context.Context, resource platform.Resource, id platform.ID) (string, error) {
|
|
return "b1", nil
|
|
},
|
|
},
|
|
},
|
|
args: args{
|
|
id: "020f755c3c082000",
|
|
},
|
|
wants: wants{
|
|
statusCode: http.StatusOK,
|
|
contentType: "application/json; charset=utf-8",
|
|
body: `
|
|
{
|
|
"links": {
|
|
"user": "/api/v2/users/020f755c3c082000",
|
|
"self": "/api/v2/authorizations/020f755c3c082000"
|
|
},
|
|
"id": "020f755c3c082000",
|
|
"user": "u1",
|
|
"userID": "020f755c3c082000",
|
|
"org": "o1",
|
|
"orgID": "020f755c3c083000",
|
|
"token": "hello",
|
|
"status": "",
|
|
"description": "",
|
|
"permissions": [{"action": "read","id": "020f755c3c084000", "name": "b1", "resource": "buckets"}]
|
|
}
|
|
`,
|
|
},
|
|
},
|
|
{
|
|
name: "not found",
|
|
fields: fields{
|
|
AuthorizationService: &mock.AuthorizationService{
|
|
FindAuthorizationByIDFn: func(ctx context.Context, id platform.ID) (*platform.Authorization, error) {
|
|
return nil, &platform.Error{
|
|
Code: platform.ENotFound,
|
|
Msg: "authorization not found",
|
|
}
|
|
},
|
|
},
|
|
UserService: &mock.UserService{},
|
|
OrganizationService: &mock.OrganizationService{},
|
|
},
|
|
args: args{
|
|
id: "020f755c3c082000",
|
|
},
|
|
wants: wants{
|
|
statusCode: http.StatusNotFound,
|
|
body: `{"code":"not found","message":"authorization not found"}`,
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
h := NewAuthorizationHandler(mock.NewUserService())
|
|
h.AuthorizationService = tt.fields.AuthorizationService
|
|
h.UserService = tt.fields.UserService
|
|
h.OrganizationService = tt.fields.OrganizationService
|
|
h.LookupService = tt.fields.LookupService
|
|
|
|
r := httptest.NewRequest("GET", "http://any.url", nil)
|
|
|
|
r = r.WithContext(context.WithValue(
|
|
context.Background(),
|
|
httprouter.ParamsKey,
|
|
httprouter.Params{
|
|
{
|
|
Key: "id",
|
|
Value: tt.args.id,
|
|
},
|
|
}))
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
h.handleGetAuthorization(w, r)
|
|
|
|
res := w.Result()
|
|
content := res.Header.Get("Content-Type")
|
|
body, _ := ioutil.ReadAll(res.Body)
|
|
|
|
if res.StatusCode != tt.wants.statusCode {
|
|
t.Logf("headers: %v body: %s", res.Header, body)
|
|
t.Errorf("%q. handleGetAuthorization() = %v, want %v", tt.name, res.StatusCode, tt.wants.statusCode)
|
|
}
|
|
if tt.wants.contentType != "" && content != tt.wants.contentType {
|
|
t.Errorf("%q. handleGetAuthorization() = %v, want %v", tt.name, content, tt.wants.contentType)
|
|
}
|
|
if eq, diff, err := jsonEqual(string(body), tt.wants.body); err != nil || (tt.wants.body != "" && !eq) {
|
|
t.Errorf("%q. handleGetAuthorization() = -got/+want %s**", tt.name, diff)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestService_handlePostAuthorization(t *testing.T) {
|
|
type fields struct {
|
|
AuthorizationService platform.AuthorizationService
|
|
UserService platform.UserService
|
|
OrganizationService platform.OrganizationService
|
|
}
|
|
type args struct {
|
|
session *platform.Authorization
|
|
authorization *platform.Authorization
|
|
}
|
|
type wants struct {
|
|
statusCode int
|
|
contentType string
|
|
body string
|
|
}
|
|
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
args args
|
|
wants wants
|
|
}{
|
|
{
|
|
name: "create a new authorization",
|
|
fields: fields{
|
|
AuthorizationService: &mock.AuthorizationService{
|
|
CreateAuthorizationFn: func(ctx context.Context, c *platform.Authorization) error {
|
|
c.ID = platformtesting.MustIDBase16("020f755c3c082000")
|
|
c.Token = "new-test-token"
|
|
return nil
|
|
},
|
|
},
|
|
UserService: &mock.UserService{
|
|
FindUserByIDFn: func(ctx context.Context, id platform.ID) (*platform.User, error) {
|
|
return &platform.User{
|
|
ID: id,
|
|
Name: "u1",
|
|
}, nil
|
|
},
|
|
},
|
|
OrganizationService: &mock.OrganizationService{
|
|
FindOrganizationByIDF: func(ctx context.Context, id platform.ID) (*platform.Organization, error) {
|
|
return &platform.Organization{
|
|
ID: id,
|
|
Name: "o1",
|
|
}, nil
|
|
},
|
|
},
|
|
},
|
|
args: args{
|
|
session: &platform.Authorization{
|
|
Token: "session-token",
|
|
ID: platformtesting.MustIDBase16("020f755c3c082000"),
|
|
UserID: platformtesting.MustIDBase16("aaaaaaaaaaaaaaaa"),
|
|
OrgID: platformtesting.MustIDBase16("020f755c3c083000"),
|
|
Description: "can write to authorization resource",
|
|
Permissions: []platform.Permission{
|
|
{
|
|
Action: platform.WriteAction,
|
|
Resource: platform.AuthorizationsResource,
|
|
},
|
|
},
|
|
},
|
|
authorization: &platform.Authorization{
|
|
ID: platformtesting.MustIDBase16("020f755c3c082000"),
|
|
UserID: platformtesting.MustIDBase16("aaaaaaaaaaaaaaaa"),
|
|
OrgID: platformtesting.MustIDBase16("020f755c3c083000"),
|
|
Description: "only read dashboards sucka",
|
|
Permissions: []platform.Permission{
|
|
{
|
|
Action: platform.ReadAction,
|
|
Resource: platform.DashboardsResource,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wants: wants{
|
|
statusCode: http.StatusCreated,
|
|
contentType: "application/json; charset=utf-8",
|
|
body: `
|
|
{
|
|
"links": {
|
|
"user": "/api/v2/users/aaaaaaaaaaaaaaaa",
|
|
"self": "/api/v2/authorizations/020f755c3c082000"
|
|
},
|
|
"id": "020f755c3c082000",
|
|
"user": "u1",
|
|
"userID": "aaaaaaaaaaaaaaaa",
|
|
"orgID": "020f755c3c083000",
|
|
"org": "o1",
|
|
"token": "new-test-token",
|
|
"status": "active",
|
|
"description": "only read dashboards sucka",
|
|
"permissions": [{"action": "read", "resource": "dashboards"}]
|
|
}
|
|
`,
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
h := NewAuthorizationHandler(tt.fields.UserService)
|
|
h.AuthorizationService = tt.fields.AuthorizationService
|
|
h.UserService = tt.fields.UserService
|
|
h.OrganizationService = tt.fields.OrganizationService
|
|
|
|
b, err := json.Marshal(tt.args.authorization)
|
|
if err != nil {
|
|
t.Fatalf("failed to unmarshal authorization: %v", err)
|
|
}
|
|
|
|
r := httptest.NewRequest("GET", "http://any.url", bytes.NewReader(b))
|
|
w := httptest.NewRecorder()
|
|
|
|
ctx := pcontext.SetAuthorizer(context.Background(), tt.args.session)
|
|
r = r.WithContext(ctx)
|
|
|
|
h.handlePostAuthorization(w, r)
|
|
|
|
res := w.Result()
|
|
content := res.Header.Get("Content-Type")
|
|
body, _ := ioutil.ReadAll(res.Body)
|
|
|
|
if res.StatusCode != tt.wants.statusCode {
|
|
t.Logf("headers: %v body: %s", res.Header, body)
|
|
t.Errorf("%q. handlePostAuthorization() = %v, want %v", tt.name, res.StatusCode, tt.wants.statusCode)
|
|
}
|
|
if tt.wants.contentType != "" && content != tt.wants.contentType {
|
|
t.Errorf("%q. handlePostAuthorization() = %v, want %v", tt.name, content, tt.wants.contentType)
|
|
}
|
|
if eq, diff, _ := jsonEqual(string(body), tt.wants.body); tt.wants.body != "" && !eq {
|
|
t.Errorf("%q. handlePostAuthorization() = -got/+want%s", tt.name, diff)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestService_handleDeleteAuthorization(t *testing.T) {
|
|
type fields struct {
|
|
AuthorizationService platform.AuthorizationService
|
|
UserService platform.UserService
|
|
OrganizationService platform.OrganizationService
|
|
}
|
|
type args struct {
|
|
id string
|
|
}
|
|
type wants struct {
|
|
statusCode int
|
|
contentType string
|
|
body string
|
|
}
|
|
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
args args
|
|
wants wants
|
|
}{
|
|
{
|
|
name: "remove a authorization by id",
|
|
fields: fields{
|
|
&mock.AuthorizationService{
|
|
DeleteAuthorizationFn: func(ctx context.Context, id platform.ID) error {
|
|
if id == platformtesting.MustIDBase16("020f755c3c082000") {
|
|
return nil
|
|
}
|
|
|
|
return fmt.Errorf("wrong id")
|
|
},
|
|
},
|
|
&mock.UserService{},
|
|
&mock.OrganizationService{},
|
|
},
|
|
args: args{
|
|
id: "020f755c3c082000",
|
|
},
|
|
wants: wants{
|
|
statusCode: http.StatusNoContent,
|
|
},
|
|
},
|
|
{
|
|
name: "authorization not found",
|
|
fields: fields{
|
|
&mock.AuthorizationService{
|
|
DeleteAuthorizationFn: func(ctx context.Context, id platform.ID) error {
|
|
return &platform.Error{
|
|
Code: platform.ENotFound,
|
|
Msg: "authorization not found",
|
|
}
|
|
},
|
|
},
|
|
&mock.UserService{},
|
|
&mock.OrganizationService{},
|
|
},
|
|
args: args{
|
|
id: "020f755c3c082000",
|
|
},
|
|
wants: wants{
|
|
statusCode: http.StatusNotFound,
|
|
body: `{"code":"not found","message":"authorization not found"}`,
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
h := NewAuthorizationHandler(mock.NewUserService())
|
|
h.AuthorizationService = tt.fields.AuthorizationService
|
|
h.UserService = tt.fields.UserService
|
|
h.OrganizationService = tt.fields.OrganizationService
|
|
|
|
r := httptest.NewRequest("GET", "http://any.url", nil)
|
|
|
|
r = r.WithContext(context.WithValue(
|
|
context.Background(),
|
|
httprouter.ParamsKey,
|
|
httprouter.Params{
|
|
{
|
|
Key: "id",
|
|
Value: tt.args.id,
|
|
},
|
|
}))
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
h.handleDeleteAuthorization(w, r)
|
|
|
|
res := w.Result()
|
|
content := res.Header.Get("Content-Type")
|
|
body, _ := ioutil.ReadAll(res.Body)
|
|
|
|
if res.StatusCode != tt.wants.statusCode {
|
|
t.Errorf("%q. handleDeleteAuthorization() = %v, want %v", tt.name, res.StatusCode, tt.wants.statusCode)
|
|
}
|
|
if tt.wants.contentType != "" && content != tt.wants.contentType {
|
|
t.Errorf("%q. handleDeleteAuthorization() = %v, want %v", tt.name, content, tt.wants.contentType)
|
|
}
|
|
|
|
if eq, diff, _ := jsonEqual(string(body), tt.wants.body); !eq {
|
|
t.Errorf("%q. handleDeleteAuthorization() = ***%s***", tt.name, diff)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func initAuthorizationService(f platformtesting.AuthorizationFields, t *testing.T) (platform.AuthorizationService, string, func()) {
|
|
t.Helper()
|
|
if t.Name() == "TestAuthorizationService_FindAuthorizations/find_authorization_by_token" {
|
|
/*
|
|
TODO(goller): need a secure way to communicate get
|
|
authorization by token string via headers or something
|
|
*/
|
|
t.Skip("TestAuthorizationService_FindAuthorizations/find_authorization_by_token skipped because user tokens cannot be queried")
|
|
}
|
|
|
|
if t.Name() == "TestAuthorizationService_CreateAuthorization/providing_a_non_existing_user_is_invalid" {
|
|
t.Skip("HTTP authorization service does not required a user id on the authentication struct. We get the user from the session token.")
|
|
}
|
|
|
|
svc := inmem.NewService()
|
|
svc.IDGenerator = f.IDGenerator
|
|
svc.TokenGenerator = f.TokenGenerator
|
|
|
|
ctx := context.Background()
|
|
|
|
for _, u := range f.Users {
|
|
if err := svc.PutUser(ctx, u); err != nil {
|
|
t.Fatalf("failed to populate users")
|
|
}
|
|
}
|
|
|
|
for _, o := range f.Orgs {
|
|
if err := svc.PutOrganization(ctx, o); err != nil {
|
|
t.Fatalf("failed to populate orgs")
|
|
}
|
|
}
|
|
|
|
var token string
|
|
|
|
for _, a := range f.Authorizations {
|
|
if err := svc.PutAuthorization(ctx, a); err != nil {
|
|
t.Fatalf("failed to populate authorizations")
|
|
}
|
|
|
|
token = a.Token
|
|
}
|
|
|
|
authZ := NewAuthorizationHandler(mock.NewUserService())
|
|
authZ.AuthorizationService = svc
|
|
authZ.UserService = svc
|
|
authZ.OrganizationService = svc
|
|
|
|
authN := NewAuthenticationHandler()
|
|
authN.AuthorizationService = svc
|
|
authN.Handler = authZ
|
|
|
|
server := httptest.NewServer(authN)
|
|
client := AuthorizationService{
|
|
Addr: server.URL,
|
|
Token: token,
|
|
}
|
|
done := server.Close
|
|
|
|
return &client, inmem.OpPrefix, done
|
|
}
|
|
|
|
func TestAuthorizationService_CreateAuthorization(t *testing.T) {
|
|
platformtesting.CreateAuthorization(initAuthorizationService, t)
|
|
}
|
|
|
|
func TestAuthorizationService_FindAuthorizationByID(t *testing.T) {
|
|
platformtesting.FindAuthorizationByID(initAuthorizationService, t)
|
|
}
|
|
|
|
func TestAuthorizationService_FindAuthorizationByToken(t *testing.T) {
|
|
/*
|
|
TODO(goller): need a secure way to communicate get
|
|
authorization by token string via headers or something
|
|
*/
|
|
t.Skip()
|
|
platformtesting.FindAuthorizationByToken(initAuthorizationService, t)
|
|
}
|
|
|
|
func TestAuthorizationService_FindAuthorizations(t *testing.T) {
|
|
platformtesting.FindAuthorizations(initAuthorizationService, t)
|
|
}
|
|
|
|
func TestAuthorizationService_DeleteAuthorization(t *testing.T) {
|
|
platformtesting.DeleteAuthorization(initAuthorizationService, t)
|
|
}
|
|
|
|
func TestAuthorizationService_UpdateAuthorizationStatus(t *testing.T) {
|
|
platformtesting.UpdateAuthorizationStatus(initAuthorizationService, t)
|
|
}
|
|
|
|
func MustMarshal(o interface{}) []byte {
|
|
b, _ := json.Marshal(o)
|
|
return b
|
|
}
|