2019-01-24 16:26:36 +00:00
|
|
|
// Copyright (C) 2019 Storj Labs, Inc.
|
2019-01-08 14:54:35 +00:00
|
|
|
// See LICENSE for copying information.
|
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
package consoleql_test
|
2019-01-08 14:54:35 +00:00
|
|
|
|
|
|
|
import (
|
2019-06-04 12:55:38 +01:00
|
|
|
"context"
|
2019-01-08 14:54:35 +00:00
|
|
|
"fmt"
|
|
|
|
"testing"
|
2020-06-02 00:19:10 +01:00
|
|
|
"time"
|
2019-01-08 14:54:35 +00:00
|
|
|
|
|
|
|
"github.com/graphql-go/graphql"
|
|
|
|
"github.com/stretchr/testify/assert"
|
2019-05-17 14:31:14 +01:00
|
|
|
"github.com/stretchr/testify/require"
|
2019-01-31 13:01:13 +00:00
|
|
|
"go.uber.org/zap/zaptest"
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-12-27 11:48:47 +00:00
|
|
|
"storj.io/common/testcontext"
|
2020-07-27 20:43:47 +01:00
|
|
|
"storj.io/common/testrand"
|
2020-03-30 10:08:50 +01:00
|
|
|
"storj.io/common/uuid"
|
2019-11-14 19:46:15 +00:00
|
|
|
"storj.io/storj/private/post"
|
2021-11-12 20:47:41 +00:00
|
|
|
"storj.io/storj/private/testplanet"
|
2021-03-09 17:42:10 +00:00
|
|
|
"storj.io/storj/private/testredis"
|
2019-12-12 12:58:15 +00:00
|
|
|
"storj.io/storj/satellite/accounting"
|
|
|
|
"storj.io/storj/satellite/accounting/live"
|
2021-04-08 18:34:23 +01:00
|
|
|
"storj.io/storj/satellite/analytics"
|
2019-01-15 13:03:24 +00:00
|
|
|
"storj.io/storj/satellite/console"
|
|
|
|
"storj.io/storj/satellite/console/consoleauth"
|
2019-01-24 16:26:36 +00:00
|
|
|
"storj.io/storj/satellite/console/consoleweb/consoleql"
|
2022-04-12 17:59:07 +01:00
|
|
|
"storj.io/storj/satellite/console/restkeys"
|
2019-03-02 15:22:20 +00:00
|
|
|
"storj.io/storj/satellite/mailservice"
|
2021-10-26 14:30:19 +01:00
|
|
|
"storj.io/storj/satellite/payments"
|
2020-05-18 10:17:05 +01:00
|
|
|
"storj.io/storj/satellite/payments/paymentsconfig"
|
|
|
|
"storj.io/storj/satellite/payments/stripecoinpayments"
|
2019-01-08 14:54:35 +00:00
|
|
|
)
|
|
|
|
|
2020-07-16 15:18:02 +01:00
|
|
|
// discardSender discard sending of an actual email.
|
2019-03-02 15:22:20 +00:00
|
|
|
type discardSender struct{}
|
|
|
|
|
2020-07-16 15:18:02 +01:00
|
|
|
// SendEmail immediately returns with nil error.
|
2019-06-04 12:55:38 +01:00
|
|
|
func (*discardSender) SendEmail(ctx context.Context, msg *post.Message) error {
|
2019-03-02 15:22:20 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-07-16 15:18:02 +01:00
|
|
|
// FromAddress returns empty post.Address.
|
2019-03-02 15:22:20 +00:00
|
|
|
func (*discardSender) FromAddress() post.Address {
|
|
|
|
return post.Address{}
|
|
|
|
}
|
|
|
|
|
2020-10-21 18:25:24 +01:00
|
|
|
func TestGraphqlMutation(t *testing.T) {
|
2021-11-12 20:47:41 +00:00
|
|
|
testplanet.Run(t, testplanet.Config{SatelliteCount: 1}, func(t *testing.T, ctx *testcontext.Context, planet *testplanet.Planet) {
|
|
|
|
sat := planet.Satellites[0]
|
|
|
|
db := sat.DB
|
2019-01-31 13:01:13 +00:00
|
|
|
log := zaptest.NewLogger(t)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2021-04-08 18:34:23 +01:00
|
|
|
analyticsService := analytics.NewService(log, analytics.Config{}, "test-satellite")
|
|
|
|
|
2021-03-09 17:42:10 +00:00
|
|
|
redis, err := testredis.Mini(ctx)
|
2019-10-31 17:27:38 +00:00
|
|
|
require.NoError(t, err)
|
2020-01-31 18:28:42 +00:00
|
|
|
defer ctx.Check(redis.Close)
|
2019-10-31 17:27:38 +00:00
|
|
|
|
2021-03-24 19:22:50 +00:00
|
|
|
cache, err := live.OpenCache(ctx, log.Named("cache"), live.Config{StorageBackend: "redis://" + redis.Addr() + "?db=0"})
|
2019-12-12 12:58:15 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
2021-12-03 15:06:20 +00:00
|
|
|
projectLimitCache := accounting.NewProjectLimitCache(db.ProjectAccounting(), 0, 0, 0, accounting.ProjectLimitConfig{CacheCapacity: 100})
|
2020-09-09 20:20:44 +01:00
|
|
|
|
2021-12-14 13:49:33 +00:00
|
|
|
projectUsage := accounting.NewService(db.ProjectAccounting(), cache, projectLimitCache, *sat.Metabase.DB, 5*time.Minute, -10*time.Second)
|
2019-10-17 15:42:18 +01:00
|
|
|
|
2020-05-18 10:17:05 +01:00
|
|
|
// TODO maybe switch this test to testplanet to avoid defining config and Stripe service
|
|
|
|
pc := paymentsconfig.Config{
|
2022-12-01 07:40:52 +00:00
|
|
|
UsagePrice: paymentsconfig.ProjectUsagePrice{
|
|
|
|
StorageTB: "10",
|
|
|
|
EgressTB: "45",
|
|
|
|
Segment: "0.0000022",
|
|
|
|
},
|
2020-05-18 10:17:05 +01:00
|
|
|
}
|
|
|
|
|
2022-12-01 07:40:52 +00:00
|
|
|
prices, err := pc.UsagePrice.ToModel()
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
priceOverrides, err := pc.UsagePriceOverrides.ToModels()
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2020-05-18 10:17:05 +01:00
|
|
|
paymentsService, err := stripecoinpayments.NewService(
|
|
|
|
log.Named("payments.stripe:service"),
|
2020-10-08 18:14:09 +01:00
|
|
|
stripecoinpayments.NewStripeMock(
|
|
|
|
testrand.NodeID(),
|
|
|
|
db.StripeCoinPayments().Customers(),
|
|
|
|
db.Console().Users(),
|
|
|
|
),
|
2020-05-18 10:17:05 +01:00
|
|
|
pc.StripeCoinPayments,
|
|
|
|
db.StripeCoinPayments(),
|
2022-05-10 20:19:53 +01:00
|
|
|
db.Wallets(),
|
|
|
|
db.Billing(),
|
2020-05-18 10:17:05 +01:00
|
|
|
db.Console().Projects(),
|
2023-01-30 22:11:12 +00:00
|
|
|
db.Console().Users(),
|
2020-05-18 10:17:05 +01:00
|
|
|
db.ProjectAccounting(),
|
2022-12-01 07:40:52 +00:00
|
|
|
prices,
|
|
|
|
priceOverrides,
|
2023-01-30 22:11:12 +00:00
|
|
|
pc.PackagePlans.Packages,
|
2021-08-27 01:51:26 +01:00
|
|
|
pc.BonusRate)
|
2020-05-18 10:17:05 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
service, err := console.NewService(
|
2019-12-12 12:58:15 +00:00
|
|
|
log.Named("console"),
|
2019-01-24 16:26:36 +00:00
|
|
|
db.Console(),
|
2022-04-12 17:59:07 +01:00
|
|
|
restkeys.NewService(db.OIDC().OAuthTokens(), planet.Satellites[0].Config.RESTKeys),
|
2019-11-15 14:27:44 +00:00
|
|
|
db.ProjectAccounting(),
|
2019-12-12 12:58:15 +00:00
|
|
|
projectUsage,
|
2021-11-12 20:47:41 +00:00
|
|
|
sat.API.Buckets.Service,
|
2020-05-18 10:17:05 +01:00
|
|
|
paymentsService.Accounts(),
|
2022-04-28 03:54:56 +01:00
|
|
|
// TODO: do we need a payment deposit wallet here?
|
|
|
|
nil,
|
2022-08-15 15:41:19 +01:00
|
|
|
db.Billing(),
|
2021-04-08 18:34:23 +01:00
|
|
|
analyticsService,
|
2022-04-19 21:50:15 +01:00
|
|
|
consoleauth.NewService(consoleauth.Config{
|
|
|
|
TokenExpirationTime: 24 * time.Hour,
|
|
|
|
}, &consoleauth.Hmac{Secret: []byte("my-suppa-secret-key")}),
|
2022-07-14 14:44:06 +01:00
|
|
|
nil,
|
|
|
|
"",
|
2021-11-18 18:55:37 +00:00
|
|
|
console.Config{
|
|
|
|
PasswordCost: console.TestPasswordCost,
|
|
|
|
DefaultProjectLimit: 5,
|
2022-07-19 10:26:18 +01:00
|
|
|
Session: console.SessionConfig{
|
|
|
|
Duration: time.Hour,
|
|
|
|
},
|
2021-11-18 18:55:37 +00:00
|
|
|
},
|
2019-01-08 14:54:35 +00:00
|
|
|
)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-24 16:26:36 +00:00
|
|
|
|
2019-03-02 15:22:20 +00:00
|
|
|
mailService, err := mailservice.New(log, &discardSender{}, "testdata")
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-05-17 13:29:35 +01:00
|
|
|
defer ctx.Check(mailService.Close)
|
2019-03-02 15:22:20 +00:00
|
|
|
|
|
|
|
rootObject := make(map[string]interface{})
|
|
|
|
rootObject["origin"] = "http://doesntmatter.com/"
|
|
|
|
rootObject[consoleql.ActivationPath] = "?activationToken="
|
2019-03-26 15:56:16 +00:00
|
|
|
rootObject[consoleql.SignInPath] = "login"
|
2019-09-27 17:48:53 +01:00
|
|
|
rootObject[consoleql.LetUsKnowURL] = "letUsKnowURL"
|
|
|
|
rootObject[consoleql.ContactInfoURL] = "contactInfoURL"
|
|
|
|
rootObject[consoleql.TermsAndConditionsURL] = "termsAndConditionsURL"
|
2019-03-02 15:22:20 +00:00
|
|
|
|
2019-03-26 15:56:16 +00:00
|
|
|
schema, err := consoleql.CreateSchema(log, service, mailService)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
createUser := console.CreateUser{
|
2021-10-26 14:30:19 +01:00
|
|
|
FullName: "John Roll",
|
|
|
|
ShortName: "Roll",
|
|
|
|
Email: "test@mail.test",
|
|
|
|
UserAgent: []byte("120bf202-8252-437e-ac12-0e364bee852e"),
|
|
|
|
Password: "123a123",
|
|
|
|
SignupPromoCode: "promo1",
|
2019-01-08 14:54:35 +00:00
|
|
|
}
|
|
|
|
|
2019-03-19 17:55:43 +00:00
|
|
|
regToken, err := service.CreateRegToken(ctx, 1)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-03-19 17:55:43 +00:00
|
|
|
|
2021-02-04 18:16:49 +00:00
|
|
|
rootUser, err := service.CreateUser(ctx, createUser, regToken.Secret)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2021-09-23 00:38:18 +01:00
|
|
|
require.Equal(t, createUser.UserAgent, rootUser.UserAgent)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2021-10-26 14:30:19 +01:00
|
|
|
couponType, err := paymentsService.Accounts().Setup(ctx, rootUser.ID, rootUser.Email, rootUser.SignupPromoCode)
|
|
|
|
|
|
|
|
var signupCouponType payments.CouponType = payments.SignupCoupon
|
|
|
|
|
2020-05-18 10:17:05 +01:00
|
|
|
require.NoError(t, err)
|
2021-10-26 14:30:19 +01:00
|
|
|
assert.Equal(t, signupCouponType, couponType)
|
2020-05-18 10:17:05 +01:00
|
|
|
|
2019-03-08 14:01:11 +00:00
|
|
|
activationToken, err := service.GenerateActivationToken(ctx, rootUser.ID, rootUser.Email)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-30 15:04:40 +00:00
|
|
|
|
2021-10-06 14:33:54 +01:00
|
|
|
_, err = service.ActivateAccount(ctx, activationToken)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-30 15:04:40 +00:00
|
|
|
|
2022-07-19 10:26:18 +01:00
|
|
|
tokenInfo, err := service.Token(ctx, console.AuthUser{Email: createUser.Email, Password: createUser.Password})
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-24 16:26:36 +00:00
|
|
|
|
2022-07-19 10:26:18 +01:00
|
|
|
userCtx, err := service.TokenAuth(ctx, tokenInfo.Token, time.Now())
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2020-10-06 15:25:53 +01:00
|
|
|
testQuery := func(t *testing.T, query string) (interface{}, error) {
|
2019-01-24 16:26:36 +00:00
|
|
|
result := graphql.Do(graphql.Params{
|
|
|
|
Schema: schema,
|
2022-06-05 23:41:38 +01:00
|
|
|
Context: userCtx,
|
2019-01-24 16:26:36 +00:00
|
|
|
RequestString: query,
|
2019-03-02 15:22:20 +00:00
|
|
|
RootObject: rootObject,
|
2019-01-24 16:26:36 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
for _, err := range result.Errors {
|
2020-10-06 15:25:53 +01:00
|
|
|
if err.OriginalError() != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-01-24 16:26:36 +00:00
|
|
|
}
|
2019-05-17 14:31:14 +01:00
|
|
|
require.False(t, result.HasErrors())
|
2019-01-24 16:26:36 +00:00
|
|
|
|
2020-10-06 15:25:53 +01:00
|
|
|
return result.Data, nil
|
2019-01-08 14:54:35 +00:00
|
|
|
}
|
|
|
|
|
2022-07-19 10:26:18 +01:00
|
|
|
tokenInfo, err = service.Token(ctx, console.AuthUser{Email: rootUser.Email, Password: createUser.Password})
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2022-07-19 10:26:18 +01:00
|
|
|
userCtx, err = service.TokenAuth(ctx, tokenInfo.Token, time.Now())
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2020-04-02 13:30:43 +01:00
|
|
|
var projectIDField string
|
2023-01-04 19:18:12 +00:00
|
|
|
var projectPublicIDField string
|
2019-01-24 16:26:36 +00:00
|
|
|
t.Run("Create project mutation", func(t *testing.T) {
|
|
|
|
projectInfo := console.ProjectInfo{
|
|
|
|
Name: "Project name",
|
|
|
|
Description: "desc",
|
|
|
|
}
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
query := fmt.Sprintf(
|
2023-01-04 19:18:12 +00:00
|
|
|
"mutation {createProject(input:{name:\"%s\",description:\"%s\"}){name,description,id,publicId,createdAt}}",
|
2019-01-24 16:26:36 +00:00
|
|
|
projectInfo.Name,
|
|
|
|
projectInfo.Description,
|
|
|
|
)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2020-10-06 15:25:53 +01:00
|
|
|
result, err := testQuery(t, query)
|
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
data := result.(map[string]interface{})
|
|
|
|
project := data[consoleql.CreateProjectMutation].(map[string]interface{})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
assert.Equal(t, projectInfo.Name, project[consoleql.FieldName])
|
|
|
|
assert.Equal(t, projectInfo.Description, project[consoleql.FieldDescription])
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2020-04-02 13:30:43 +01:00
|
|
|
projectIDField = project[consoleql.FieldID].(string)
|
2023-01-04 19:18:12 +00:00
|
|
|
projectPublicIDField = project[consoleql.FieldPublicID].(string)
|
|
|
|
|
|
|
|
_, err = uuid.FromString(projectPublicIDField)
|
|
|
|
require.NoError(t, err)
|
2019-01-24 16:26:36 +00:00
|
|
|
})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2020-04-02 13:30:43 +01:00
|
|
|
projectID, err := uuid.FromString(projectIDField)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2022-06-05 23:41:38 +01:00
|
|
|
project, err := service.GetProject(userCtx, projectID)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2023-01-27 21:07:32 +00:00
|
|
|
require.Equal(t, rootUser.UserAgent, project.UserAgent)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-03-19 17:55:43 +00:00
|
|
|
regTokenUser1, err := service.CreateRegToken(ctx, 1)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-03-19 17:55:43 +00:00
|
|
|
|
2022-06-05 23:41:38 +01:00
|
|
|
user1, err := service.CreateUser(userCtx, console.CreateUser{
|
2019-10-29 14:24:16 +00:00
|
|
|
FullName: "User1",
|
|
|
|
Email: "u1@mail.test",
|
2019-01-24 16:26:36 +00:00
|
|
|
Password: "123a123",
|
2021-02-04 18:16:49 +00:00
|
|
|
}, regTokenUser1.Secret)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-02-05 17:22:17 +00:00
|
|
|
t.Run("Activation", func(t *testing.T) {
|
|
|
|
activationToken1, err := service.GenerateActivationToken(
|
|
|
|
ctx,
|
|
|
|
user1.ID,
|
2019-06-18 01:28:40 +01:00
|
|
|
"u1@mail.test",
|
2019-02-05 17:22:17 +00:00
|
|
|
)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
2021-10-06 14:33:54 +01:00
|
|
|
_, err = service.ActivateAccount(ctx, activationToken1)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
2019-06-18 01:28:40 +01:00
|
|
|
user1.Email = "u1@mail.test"
|
2019-02-05 17:22:17 +00:00
|
|
|
})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-03-19 17:55:43 +00:00
|
|
|
regTokenUser2, err := service.CreateRegToken(ctx, 1)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-03-19 17:55:43 +00:00
|
|
|
|
2022-06-05 23:41:38 +01:00
|
|
|
user2, err := service.CreateUser(userCtx, console.CreateUser{
|
2019-10-29 14:24:16 +00:00
|
|
|
FullName: "User1",
|
|
|
|
Email: "u2@mail.test",
|
2019-01-24 16:26:36 +00:00
|
|
|
Password: "123a123",
|
2021-02-04 18:16:49 +00:00
|
|
|
}, regTokenUser2.Secret)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-02-05 17:22:17 +00:00
|
|
|
|
|
|
|
t.Run("Activation", func(t *testing.T) {
|
|
|
|
activationToken2, err := service.GenerateActivationToken(
|
|
|
|
ctx,
|
|
|
|
user2.ID,
|
2019-06-18 01:28:40 +01:00
|
|
|
"u2@mail.test",
|
2019-02-05 17:22:17 +00:00
|
|
|
)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
2021-10-06 14:33:54 +01:00
|
|
|
_, err = service.ActivateAccount(ctx, activationToken2)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
2019-06-18 01:28:40 +01:00
|
|
|
user2.Email = "u2@mail.test"
|
2019-02-05 17:22:17 +00:00
|
|
|
})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2023-01-19 14:54:17 +00:00
|
|
|
regTokenUser3, err := service.CreateRegToken(ctx, 1)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
user3, err := service.CreateUser(userCtx, console.CreateUser{
|
|
|
|
FullName: "User3",
|
|
|
|
Email: "u3@mail.test",
|
|
|
|
Password: "123a123",
|
|
|
|
}, regTokenUser3.Secret)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
t.Run("Activation", func(t *testing.T) {
|
|
|
|
activationToken3, err := service.GenerateActivationToken(
|
|
|
|
ctx,
|
|
|
|
user3.ID,
|
|
|
|
"u3@mail.test",
|
2019-01-24 16:26:36 +00:00
|
|
|
)
|
2023-01-19 14:54:17 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
_, err = service.ActivateAccount(ctx, activationToken3)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
user3.Email = "u3@mail.test"
|
|
|
|
})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2023-01-19 14:54:17 +00:00
|
|
|
testAdd := func(query string, expectedMembers int) {
|
2020-10-06 15:25:53 +01:00
|
|
|
result, err := testQuery(t, query)
|
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
data := result.(map[string]interface{})
|
|
|
|
proj := data[consoleql.AddProjectMembersMutation].(map[string]interface{})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-08-12 11:22:32 +01:00
|
|
|
members := proj[consoleql.FieldMembers].(map[string]interface{})
|
|
|
|
projectMembers := members[consoleql.FieldProjectMembers].([]interface{})
|
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
assert.Equal(t, project.ID.String(), proj[consoleql.FieldID])
|
2023-01-04 19:18:12 +00:00
|
|
|
assert.Equal(t, project.PublicID.String(), proj[consoleql.FieldPublicID])
|
2019-01-24 16:26:36 +00:00
|
|
|
assert.Equal(t, project.Name, proj[consoleql.FieldName])
|
2023-01-19 14:54:17 +00:00
|
|
|
assert.Equal(t, expectedMembers, len(projectMembers))
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("Add project members mutation", func(t *testing.T) {
|
|
|
|
query := fmt.Sprintf(
|
|
|
|
"mutation {addProjectMembers(projectID:\"%s\",email:[\"%s\",\"%s\"]){id,publicId,name,members(cursor: { limit: 50, search: \"\", page: 1, order: 1, orderDirection: 2 }){projectMembers{joinedAt}}}}",
|
|
|
|
project.ID.String(),
|
|
|
|
user1.Email,
|
|
|
|
user2.Email,
|
|
|
|
)
|
|
|
|
|
|
|
|
testAdd(query, 3)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("Add project members mutation with publicId", func(t *testing.T) {
|
|
|
|
query := fmt.Sprintf(
|
|
|
|
"mutation {addProjectMembers(publicId:\"%s\",email:[\"%s\"]){id,publicId,name,members(cursor: { limit: 50, search: \"\", page: 1, order: 1, orderDirection: 2 }){projectMembers{joinedAt}}}}",
|
|
|
|
project.PublicID.String(),
|
|
|
|
user3.Email,
|
|
|
|
)
|
|
|
|
|
|
|
|
testAdd(query, 4)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("Fail add project members mutation without ID", func(t *testing.T) {
|
|
|
|
query := fmt.Sprintf(
|
|
|
|
"mutation {addProjectMembers(email:[\"%s\",\"%s\"]){id,publicId,name,members(cursor: { limit: 50, search: \"\", page: 1, order: 1, orderDirection: 2 }){projectMembers{joinedAt}}}}",
|
|
|
|
user1.Email,
|
|
|
|
user2.Email,
|
|
|
|
)
|
|
|
|
|
|
|
|
_, err = testQuery(t, query)
|
|
|
|
require.Error(t, err)
|
2019-01-24 16:26:36 +00:00
|
|
|
})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
t.Run("Delete project members mutation", func(t *testing.T) {
|
|
|
|
query := fmt.Sprintf(
|
2023-01-19 14:54:17 +00:00
|
|
|
"mutation {deleteProjectMembers(projectID:\"%s\",email:[\"%s\",\"%s\",\"%s\"]){id,publicId,name,members(cursor: { limit: 50, search: \"\", page: 1, order: 1, orderDirection: 2 }){projectMembers{user{id}}}}}",
|
2019-01-24 16:26:36 +00:00
|
|
|
project.ID.String(),
|
|
|
|
user1.Email,
|
|
|
|
user2.Email,
|
2023-01-19 14:54:17 +00:00
|
|
|
user3.Email,
|
2019-01-24 16:26:36 +00:00
|
|
|
)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2020-10-06 15:25:53 +01:00
|
|
|
result, err := testQuery(t, query)
|
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
data := result.(map[string]interface{})
|
|
|
|
proj := data[consoleql.DeleteProjectMembersMutation].(map[string]interface{})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-08-12 11:22:32 +01:00
|
|
|
members := proj[consoleql.FieldMembers].(map[string]interface{})
|
|
|
|
projectMembers := members[consoleql.FieldProjectMembers].([]interface{})
|
|
|
|
rootMember := projectMembers[0].(map[string]interface{})[consoleql.UserType].(map[string]interface{})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
assert.Equal(t, project.ID.String(), proj[consoleql.FieldID])
|
2023-01-04 19:18:12 +00:00
|
|
|
assert.Equal(t, project.PublicID.String(), proj[consoleql.FieldPublicID])
|
2019-01-24 16:26:36 +00:00
|
|
|
assert.Equal(t, project.Name, proj[consoleql.FieldName])
|
|
|
|
assert.Equal(t, 1, len(members))
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
assert.Equal(t, rootUser.ID.String(), rootMember[consoleql.FieldID])
|
|
|
|
})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
var keyID string
|
|
|
|
t.Run("Create api key mutation", func(t *testing.T) {
|
|
|
|
keyName := "key1"
|
|
|
|
query := fmt.Sprintf(
|
2023-01-27 21:07:32 +00:00
|
|
|
"mutation {createAPIKey(projectID:\"%s\",name:\"%s\"){key,keyInfo{id,name,projectID}}}",
|
2019-01-24 16:26:36 +00:00
|
|
|
project.ID.String(),
|
|
|
|
keyName,
|
|
|
|
)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2020-10-06 15:25:53 +01:00
|
|
|
result, err := testQuery(t, query)
|
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
data := result.(map[string]interface{})
|
|
|
|
createAPIKey := data[consoleql.CreateAPIKeyMutation].(map[string]interface{})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
key := createAPIKey[consoleql.FieldKey].(string)
|
|
|
|
keyInfo := createAPIKey[consoleql.APIKeyInfoType].(map[string]interface{})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
assert.NotEqual(t, "", key)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
assert.Equal(t, keyName, keyInfo[consoleql.FieldName])
|
|
|
|
assert.Equal(t, project.ID.String(), keyInfo[consoleql.FieldProjectID])
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
keyID = keyInfo[consoleql.FieldID].(string)
|
|
|
|
})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
t.Run("Delete api key mutation", func(t *testing.T) {
|
2020-04-02 13:30:43 +01:00
|
|
|
id, err := uuid.FromString(keyID)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2022-06-05 23:41:38 +01:00
|
|
|
info, err := service.GetAPIKeyInfo(userCtx, id)
|
2019-05-17 14:31:14 +01:00
|
|
|
require.NoError(t, err)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
query := fmt.Sprintf(
|
2019-02-13 11:34:40 +00:00
|
|
|
"mutation {deleteAPIKeys(id:[\"%s\"]){name,projectID}}",
|
|
|
|
keyID,
|
2019-01-24 16:26:36 +00:00
|
|
|
)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2020-10-06 15:25:53 +01:00
|
|
|
result, err := testQuery(t, query)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
data := result.(map[string]interface{})
|
2019-02-13 11:34:40 +00:00
|
|
|
keyInfoList := data[consoleql.DeleteAPIKeysMutation].([]interface{})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2019-02-13 11:34:40 +00:00
|
|
|
for _, k := range keyInfoList {
|
|
|
|
keyInfo := k.(map[string]interface{})
|
|
|
|
|
|
|
|
assert.Equal(t, info.Name, keyInfo[consoleql.FieldName])
|
|
|
|
assert.Equal(t, project.ID.String(), keyInfo[consoleql.FieldProjectID])
|
|
|
|
}
|
2019-01-24 16:26:36 +00:00
|
|
|
})
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2020-09-10 10:32:35 +01:00
|
|
|
const testName = "testName"
|
|
|
|
const testDescription = "test description"
|
2021-08-02 23:06:15 +01:00
|
|
|
const StorageLimit = "100"
|
|
|
|
const BandwidthLimit = "100"
|
2020-09-10 10:32:35 +01:00
|
|
|
|
2023-01-19 14:54:17 +00:00
|
|
|
testUpdate := func(query string) {
|
|
|
|
result, err := testQuery(t, query)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
data := result.(map[string]interface{})
|
|
|
|
proj := data[consoleql.UpdateProjectMutation].(map[string]interface{})
|
|
|
|
|
|
|
|
assert.Equal(t, project.ID.String(), proj[consoleql.FieldID])
|
|
|
|
assert.Equal(t, project.PublicID.String(), proj[consoleql.FieldPublicID])
|
|
|
|
assert.Equal(t, testName, proj[consoleql.FieldName])
|
|
|
|
assert.Equal(t, testDescription, proj[consoleql.FieldDescription])
|
|
|
|
}
|
|
|
|
|
2020-09-10 10:32:35 +01:00
|
|
|
t.Run("Update project mutation", func(t *testing.T) {
|
|
|
|
query := fmt.Sprintf(
|
2023-01-04 19:18:12 +00:00
|
|
|
"mutation {updateProject(id:\"%s\",projectFields:{name:\"%s\",description:\"%s\"},projectLimits:{storageLimit:\"%s\",bandwidthLimit:\"%s\"}){id,publicId,name,description}}",
|
2020-09-10 10:32:35 +01:00
|
|
|
project.ID.String(),
|
|
|
|
testName,
|
|
|
|
testDescription,
|
2021-08-02 23:06:15 +01:00
|
|
|
StorageLimit,
|
|
|
|
BandwidthLimit,
|
2020-09-10 10:32:35 +01:00
|
|
|
)
|
|
|
|
|
2023-01-19 14:54:17 +00:00
|
|
|
testUpdate(query)
|
|
|
|
})
|
2020-09-10 10:32:35 +01:00
|
|
|
|
2023-01-19 14:54:17 +00:00
|
|
|
t.Run("Update project mutation with publicId", func(t *testing.T) {
|
|
|
|
query := fmt.Sprintf(
|
|
|
|
"mutation {updateProject(publicId:\"%s\",projectFields:{name:\"%s\",description:\"%s\"},projectLimits:{storageLimit:\"%s\",bandwidthLimit:\"%s\"}){id,publicId,name,description}}",
|
|
|
|
project.PublicID.String(),
|
|
|
|
testName,
|
|
|
|
testDescription,
|
|
|
|
StorageLimit,
|
|
|
|
BandwidthLimit,
|
|
|
|
)
|
2020-09-10 10:32:35 +01:00
|
|
|
|
2023-01-19 14:54:17 +00:00
|
|
|
testUpdate(query)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("Fail update project mutation without ID", func(t *testing.T) {
|
|
|
|
query := fmt.Sprintf(
|
|
|
|
"mutation {updateProject(projectFields:{name:\"%s\",description:\"%s\"},projectLimits:{storageLimit:\"%s\",bandwidthLimit:\"%s\"}){id,publicId,name,description}}",
|
|
|
|
testName,
|
|
|
|
testDescription,
|
|
|
|
StorageLimit,
|
|
|
|
BandwidthLimit,
|
|
|
|
)
|
|
|
|
|
|
|
|
_, err := testQuery(t, query)
|
|
|
|
require.Error(t, err)
|
2020-09-10 10:32:35 +01:00
|
|
|
})
|
|
|
|
|
2019-01-24 16:26:36 +00:00
|
|
|
t.Run("Delete project mutation", func(t *testing.T) {
|
|
|
|
query := fmt.Sprintf(
|
|
|
|
"mutation {deleteProject(id:\"%s\"){id,name}}",
|
|
|
|
projectID,
|
|
|
|
)
|
2019-01-08 14:54:35 +00:00
|
|
|
|
2020-10-06 15:25:53 +01:00
|
|
|
result, err := testQuery(t, query)
|
|
|
|
require.Error(t, err)
|
|
|
|
require.Nil(t, result)
|
|
|
|
require.Equal(t, console.ErrUnauthorized.New("not implemented").Error(), err.Error())
|
2019-01-24 16:26:36 +00:00
|
|
|
})
|
2019-01-08 14:54:35 +00:00
|
|
|
})
|
|
|
|
}
|