-
Notifications
You must be signed in to change notification settings - Fork 0
/
test_delete_vault.go
173 lines (142 loc) · 5.19 KB
/
test_delete_vault.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
package tests
import (
"io"
"net/http"
"net/http/httptest"
"testing"
"github.com/gofiber/fiber/v2"
"github.com/stretchr/testify/require"
"gorm.io/gorm"
"github.com/liobrdev/simplepasswords_vaults/models"
"github.com/liobrdev/simplepasswords_vaults/tests/helpers"
"github.com/liobrdev/simplepasswords_vaults/tests/setup"
"github.com/liobrdev/simplepasswords_vaults/utils"
)
func testDeleteVault(t *testing.T, app *fiber.App, db *gorm.DB) {
t.Run("valid_slug_404_not_found", func(t *testing.T) {
testDeleteVaultClientError(
t, app, db, helpers.NewSlug(t), http.StatusNotFound, utils.ErrorNoRowsAffected,
"Likely that slug was not found.",
)
})
t.Run("invalid_slug_400_bad_request", func(t *testing.T) {
slug := "notEvenARealSlug"
testDeleteVaultClientError(
t, app, db, slug, http.StatusBadRequest, utils.ErrorVaultSlug, slug,
)
})
t.Run("valid_slug_204_no_content", func(t *testing.T) {
testDeleteVaultSuccess(t, app, db)
})
}
func testDeleteVaultClientError(
t *testing.T,
app *fiber.App,
db *gorm.DB,
slug string,
expectedStatus int,
expectedMessage utils.ErrorMessage,
expectedDetail string,
) {
resp := newRequestDeleteVault(t, app, slug)
require.Equal(t, expectedStatus, resp.StatusCode)
helpers.AssertErrorResponseBody(t, resp, utils.ErrorResponseBody{
ClientOperation: utils.DeleteVault,
Message: string(expectedMessage),
Detail: expectedDetail,
})
}
func testDeleteVaultSuccess(t *testing.T, app *fiber.App, db *gorm.DB) {
setup.SetUpWithData(t, db)
var vault models.Vault
helpers.QueryTestVaultEager(t, db, &vault, "vault@0.1.*.*")
require.Len(t, vault.Entries, 2)
entry1 := vault.Entries[0]
require.Equal(t, "entry@0.1.0.*", entry1.Title)
require.Len(t, entry1.Secrets, 2)
secret1 := entry1.Secrets[0]
secret2 := entry1.Secrets[1]
require.Equal(t, "secret[_label='username']@0.1.0.0", secret1.Label)
require.Equal(t, "secret[_string='foodeater1234']@0.1.0.0", secret1.String)
require.Equal(t, "secret[_label='password']@0.1.0.1", secret2.Label)
require.Equal(t, "secret[_string='3a7!ng40oD']@0.1.0.1", secret2.String)
entry2 := vault.Entries[1]
require.Equal(t, "entry@0.1.1.*", entry2.Title)
require.Len(t, entry2.Secrets, 2)
secret3 := entry2.Secrets[0]
secret4 := entry2.Secrets[1]
require.Equal(t, "secret[_label='username']@0.1.1.0", secret3.Label)
require.Equal(t, "secret[_string='foodeater1234']@0.1.1.0", secret3.String)
require.Equal(t, "secret[_label='password']@0.1.1.1", secret4.Label)
require.Equal(t, "secret[_string='3a7!ng40oD']@0.1.1.1", secret4.String)
var vaultCount int64
helpers.CountVaults(t, db, &vaultCount)
require.EqualValues(t, 4, vaultCount)
var entryCount int64
helpers.CountEntries(t, db, &entryCount)
require.EqualValues(t, 8, entryCount)
var secretCount int64
helpers.CountSecrets(t, db, &secretCount)
require.EqualValues(t, 16, secretCount)
resp := newRequestDeleteVault(t, app, vault.Slug)
require.Equal(t, http.StatusNoContent, resp.StatusCode)
if respBody, err := io.ReadAll(resp.Body); err != nil {
t.Fatalf("Read response body failed: %s", err.Error())
} else {
require.Empty(t, respBody)
}
if result := db.First(&vault, "slug = ?", vault.Slug); result.Error != nil {
require.ErrorIs(t, result.Error, gorm.ErrRecordNotFound)
} else {
t.Fatalf("Deleted vault query failed: %s", result.Error.Error())
}
if result := db.First(&entry1, "slug = ?", entry1.Slug); result.Error != nil {
require.ErrorIs(t, result.Error, gorm.ErrRecordNotFound)
} else {
t.Fatalf("Deleted entry1 query failed: %s", result.Error.Error())
}
if result := db.First(&entry2, "slug = ?", entry2.Slug); result.Error != nil {
require.ErrorIs(t, result.Error, gorm.ErrRecordNotFound)
} else {
t.Fatalf("Deleted entry2 query failed: %s", result.Error.Error())
}
if result := db.First(&secret1, "slug = ?", secret1.Slug); result.Error != nil {
require.ErrorIs(t, result.Error, gorm.ErrRecordNotFound)
} else {
t.Fatalf("Deleted secret1 query failed: %s", result.Error.Error())
}
if result := db.First(&secret2, "slug = ?", secret2.Slug); result.Error != nil {
require.ErrorIs(t, result.Error, gorm.ErrRecordNotFound)
} else {
t.Fatalf("Deleted secret2 query failed: %s", result.Error.Error())
}
if result := db.First(&secret3, "slug = ?", secret3.Slug); result.Error != nil {
require.ErrorIs(t, result.Error, gorm.ErrRecordNotFound)
} else {
t.Fatalf("Deleted secret3 query failed: %s", result.Error.Error())
}
if result := db.First(&secret4, "slug = ?", secret4.Slug); result.Error != nil {
require.ErrorIs(t, result.Error, gorm.ErrRecordNotFound)
} else {
t.Fatalf("Deleted secret4 query failed: %s", result.Error.Error())
}
helpers.CountVaults(t, db, &vaultCount)
require.EqualValues(t, 3, vaultCount)
helpers.CountEntries(t, db, &entryCount)
require.EqualValues(t, 6, entryCount)
helpers.CountSecrets(t, db, &secretCount)
require.EqualValues(t, 12, secretCount)
}
func newRequestDeleteVault(
t *testing.T,
app *fiber.App,
slug string,
) *http.Response {
req := httptest.NewRequest(http.MethodDelete, "/api/vaults/"+slug, nil)
req.Header.Set("Content-Type", "application/json")
resp, err := app.Test(req)
if err != nil {
t.Fatalf("Send test request failed: %s", err.Error())
}
return resp
}