7
7
"io/ioutil"
8
8
"net/http"
9
9
"net/http/httptest"
10
+ "staticbackend/internal"
11
+ "staticbackend/middleware"
10
12
"testing"
11
13
"time"
12
14
)
@@ -23,7 +25,11 @@ func dbPost(t *testing.T, hf func(http.ResponseWriter, *http.Request), repo stri
23
25
req .Header .Set ("SB-PUBLIC-KEY" , pubKey )
24
26
req .Header .Set ("Authorization" , fmt .Sprintf ("Bearer %s" , adminToken ))
25
27
26
- h := chain (http .HandlerFunc (hf ), auth , withDB )
28
+ stdAuth := []middleware.Middleware {
29
+ middleware .WithDB (database .client ),
30
+ middleware .RequireAuth (database .client ),
31
+ }
32
+ h := middleware .Chain (http .HandlerFunc (hf ), stdAuth ... )
27
33
28
34
h .ServeHTTP (w , req )
29
35
@@ -41,26 +47,26 @@ func GetResponseBody(t *testing.T, resp *http.Response) string {
41
47
}
42
48
43
49
func TestHasPermission (t * testing.T ) {
44
- reads := make (map [string ]permissionLevel )
45
- reads ["tbl_740_" ] = permGroup
46
- reads ["tbl_600_" ] = permOwner
47
- reads ["tbl" ] = permGroup
48
- reads ["tbl_226_" ] = permEveryone
50
+ reads := make (map [string ]internal. PermissionLevel )
51
+ reads ["tbl_740_" ] = internal . PermGroup
52
+ reads ["tbl_600_" ] = internal . PermOwner
53
+ reads ["tbl" ] = internal . PermGroup
54
+ reads ["tbl_226_" ] = internal . PermEveryone
49
55
50
56
for k , v := range reads {
51
- if p := readPermission (k ); v != p {
57
+ if p := internal . ReadPermission (k ); v != p {
52
58
t .Errorf ("%s expected read to be %v got %v" , k , v , p )
53
59
}
54
60
}
55
61
56
- writes := make (map [string ]permissionLevel )
57
- writes ["tbl" ] = permOwner
58
- writes ["tbl_760_" ] = permGroup
59
- writes ["tbl_662_" ] = permEveryone
60
- writes ["tbl_244_" ] = permOwner
62
+ writes := make (map [string ]internal. PermissionLevel )
63
+ writes ["tbl" ] = internal . PermOwner
64
+ writes ["tbl_760_" ] = internal . PermGroup
65
+ writes ["tbl_662_" ] = internal . PermEveryone
66
+ writes ["tbl_244_" ] = internal . PermOwner
61
67
62
68
for k , v := range writes {
63
- if p := writePermission (k ); v != p {
69
+ if p := internal . WritePermission (k ); v != p {
64
70
t .Errorf ("%s expected write to be %v got %v" , k , v , p )
65
71
}
66
72
}
@@ -101,7 +107,11 @@ func TestDBListCollections(t *testing.T) {
101
107
req .Header .Set ("SB-PUBLIC-KEY" , pubKey )
102
108
req .Header .Set ("Authorization" , fmt .Sprintf ("Bearer %s" , rootToken ))
103
109
104
- h := chain (http .HandlerFunc (database .listCollections ), requireRoot , withDB )
110
+ stdRoot := []middleware.Middleware {
111
+ middleware .WithDB (database .client ),
112
+ middleware .RequireRoot (database .client ),
113
+ }
114
+ h := middleware .Chain (http .HandlerFunc (database .listCollections ), stdRoot ... )
105
115
106
116
h .ServeHTTP (w , req )
107
117
0 commit comments