@@ -271,10 +271,74 @@ func TestHandleProject(t *testing.T) {
271271 },
272272 "should fail to configure authentication modes" : {
273273 atlasClientMocker : func () * mongodbatlas.Client {
274- return nil
274+ integrations := & atlasmocks.ThirdPartyIntegrationsClientMock {
275+ ListFunc : func (projectID string ) (* mongodbatlas.ThirdPartyIntegrations , * mongodbatlas.Response , error ) {
276+ return & mongodbatlas.ThirdPartyIntegrations {}, nil , nil
277+ },
278+ }
279+ encryptionAtRest := & atlasmocks.EncryptionAtRestClientMock {
280+ GetFunc : func (projectID string ) (* mongodbatlas.EncryptionAtRest , * mongodbatlas.Response , error ) {
281+ return & mongodbatlas.EncryptionAtRest {}, nil , nil
282+ },
283+ }
284+ projectAPI := & atlasmocks.ProjectsClientMock {}
285+
286+ return & mongodbatlas.Client {
287+ Integrations : integrations ,
288+ EncryptionsAtRest : encryptionAtRest ,
289+ Projects : projectAPI ,
290+ }
275291 },
276- atlasSDKMocker : func () * admin.APIClient {
277- return nil
292+ atlasSDKMocker : func () * admin.APIClient { //nolint:dupl
293+ ipAccessList := mockadmin .NewProjectIPAccessListApi (t )
294+ ipAccessList .EXPECT ().ListProjectIpAccessLists (context .Background (), "projectID" ).
295+ Return (admin.ListProjectIpAccessListsApiRequest {ApiService : ipAccessList })
296+ ipAccessList .EXPECT ().ListProjectIpAccessListsExecute (mock .AnythingOfType ("admin.ListProjectIpAccessListsApiRequest" )).
297+ Return (nil , nil , nil )
298+ privateEndpoints := mockadmin .NewPrivateEndpointServicesApi (t )
299+ privateEndpoints .EXPECT ().ListPrivateEndpointServices (context .Background (), "projectID" , mock .Anything ).
300+ Return (admin.ListPrivateEndpointServicesApiRequest {ApiService : privateEndpoints })
301+ privateEndpoints .EXPECT ().ListPrivateEndpointServicesExecute (mock .AnythingOfType ("admin.ListPrivateEndpointServicesApiRequest" )).
302+ Return (nil , nil , nil )
303+ networkPeering := mockadmin .NewNetworkPeeringApi (t )
304+ networkPeering .EXPECT ().ListPeeringConnectionsWithParams (context .Background (), mock .AnythingOfType ("*admin.ListPeeringConnectionsApiParams" )).
305+ Return (admin.ListPeeringConnectionsApiRequest {ApiService : networkPeering })
306+ networkPeering .EXPECT ().ListPeeringConnectionsExecute (mock .AnythingOfType ("admin.ListPeeringConnectionsApiRequest" )).
307+ Return (nil , nil , nil )
308+ networkPeering .EXPECT ().ListPeeringContainers (context .Background (), "projectID" ).
309+ Return (admin.ListPeeringContainersApiRequest {ApiService : networkPeering })
310+ networkPeering .EXPECT ().ListPeeringContainersExecute (mock .AnythingOfType ("admin.ListPeeringContainersApiRequest" )).
311+ Return (nil , nil , nil )
312+ audit := mockadmin .NewAuditingApi (t )
313+ audit .EXPECT ().GetAuditingConfiguration (context .Background (), "projectID" ).
314+ Return (admin.GetAuditingConfigurationApiRequest {ApiService : audit })
315+ audit .EXPECT ().GetAuditingConfigurationExecute (mock .AnythingOfType ("admin.GetAuditingConfigurationApiRequest" )).
316+ Return (nil , nil , nil )
317+ customRoles := mockadmin .NewCustomDatabaseRolesApi (t )
318+ customRoles .EXPECT ().ListCustomDatabaseRoles (context .Background (), "projectID" ).
319+ Return (admin.ListCustomDatabaseRolesApiRequest {ApiService : customRoles })
320+ customRoles .EXPECT ().ListCustomDatabaseRolesExecute (mock .AnythingOfType ("admin.ListCustomDatabaseRolesApiRequest" )).
321+ Return (nil , nil , nil )
322+ projectAPI := mockadmin .NewProjectsApi (t )
323+ projectAPI .EXPECT ().GetProjectSettings (context .Background (), "projectID" ).
324+ Return (admin.GetProjectSettingsApiRequest {ApiService : projectAPI })
325+ projectAPI .EXPECT ().GetProjectSettingsExecute (mock .AnythingOfType ("admin.GetProjectSettingsApiRequest" )).
326+ Return (admin .NewGroupSettings (), nil , nil )
327+ backup := mockadmin .NewCloudBackupsApi (t )
328+ backup .EXPECT ().GetDataProtectionSettings (context .Background (), "projectID" ).
329+ Return (admin.GetDataProtectionSettingsApiRequest {ApiService : backup })
330+ backup .EXPECT ().GetDataProtectionSettingsExecute (mock .AnythingOfType ("admin.GetDataProtectionSettingsApiRequest" )).
331+ Return (nil , nil , nil )
332+
333+ return & admin.APIClient {
334+ ProjectIPAccessListApi : ipAccessList ,
335+ PrivateEndpointServicesApi : privateEndpoints ,
336+ NetworkPeeringApi : networkPeering ,
337+ AuditingApi : audit ,
338+ CustomDatabaseRolesApi : customRoles ,
339+ ProjectsApi : projectAPI ,
340+ CloudBackupsApi : backup ,
341+ }
278342 },
279343 projectServiceMocker : func () project.ProjectService {
280344 service := translation .NewProjectServiceMock (t )
@@ -284,10 +348,14 @@ func TestHandleProject(t *testing.T) {
284348 return service
285349 },
286350 teamServiceMocker : func () teams.TeamsService {
287- return nil
351+ service := translation .NewTeamsServiceMock (t )
352+ service .EXPECT ().ListProjectTeams (context .Background (), mock .Anything ).Return ([]teams.AssignedTeam {}, nil )
353+ return service
288354 },
289355 encryptionAtRestMocker : func () encryptionatrest.EncryptionAtRestService {
290- return nil
356+ service := translation .NewEncryptionAtRestServiceMock (t )
357+ service .EXPECT ().Get (context .Background (), mock .Anything ).Return (nil , nil )
358+ return service
291359 },
292360 project : & akov2.AtlasProject {
293361 ObjectMeta : metav1.ObjectMeta {
@@ -303,10 +371,10 @@ func TestHandleProject(t *testing.T) {
303371 ID : "projectID" ,
304372 },
305373 },
306- result : reconcile.Result {RequeueAfter : workflow .DefaultRetry },
374+ result : reconcile.Result {RequeueAfter : workflow .DefaultRetry , Requeue : false },
307375 conditions : []api.Condition {
308- api .FalseCondition (api .ProjectReadyType ).
309- WithReason ( string ( workflow . Internal ) ).
376+ api .TrueCondition (api .ProjectReadyType ),
377+ api . FalseCondition ( api . X509AuthReadyType ).
310378 WithMessageRegexp ("secrets \" invalid-ref\" not found" ),
311379 },
312380 finalizers : []string {customresource .FinalizerLabel },
0 commit comments