Skip to content
This repository was archived by the owner on Sep 2, 2024. It is now read-only.

Commit a76eb4d

Browse files
committed
fixed tests and first refactor for sub-packages
1 parent 593b962 commit a76eb4d

File tree

5 files changed

+97
-82
lines changed

5 files changed

+97
-82
lines changed

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ build:
55
@cd cmd && rm -rf staticbackend && go build -o staticbackend
66

77
start: build
8-
@./staticbackend -host localhost
8+
@cd cmd && ./staticbackend -host localhost
99

1010
deploy:
1111
CGO_ENABLED=0 go build

db_test.go

Lines changed: 24 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ import (
77
"io/ioutil"
88
"net/http"
99
"net/http/httptest"
10+
"staticbackend/internal"
11+
"staticbackend/middleware"
1012
"testing"
1113
"time"
1214
)
@@ -23,7 +25,11 @@ func dbPost(t *testing.T, hf func(http.ResponseWriter, *http.Request), repo stri
2325
req.Header.Set("SB-PUBLIC-KEY", pubKey)
2426
req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", adminToken))
2527

26-
h := chain(http.HandlerFunc(hf), auth, withDB)
28+
stdAuth := []middleware.Middleware{
29+
middleware.WithDB(database.client),
30+
middleware.RequireAuth(database.client),
31+
}
32+
h := middleware.Chain(http.HandlerFunc(hf), stdAuth...)
2733

2834
h.ServeHTTP(w, req)
2935

@@ -41,26 +47,26 @@ func GetResponseBody(t *testing.T, resp *http.Response) string {
4147
}
4248

4349
func TestHasPermission(t *testing.T) {
44-
reads := make(map[string]permissionLevel)
45-
reads["tbl_740_"] = permGroup
46-
reads["tbl_600_"] = permOwner
47-
reads["tbl"] = permGroup
48-
reads["tbl_226_"] = permEveryone
50+
reads := make(map[string]internal.PermissionLevel)
51+
reads["tbl_740_"] = internal.PermGroup
52+
reads["tbl_600_"] = internal.PermOwner
53+
reads["tbl"] = internal.PermGroup
54+
reads["tbl_226_"] = internal.PermEveryone
4955

5056
for k, v := range reads {
51-
if p := readPermission(k); v != p {
57+
if p := internal.ReadPermission(k); v != p {
5258
t.Errorf("%s expected read to be %v got %v", k, v, p)
5359
}
5460
}
5561

56-
writes := make(map[string]permissionLevel)
57-
writes["tbl"] = permOwner
58-
writes["tbl_760_"] = permGroup
59-
writes["tbl_662_"] = permEveryone
60-
writes["tbl_244_"] = permOwner
62+
writes := make(map[string]internal.PermissionLevel)
63+
writes["tbl"] = internal.PermOwner
64+
writes["tbl_760_"] = internal.PermGroup
65+
writes["tbl_662_"] = internal.PermEveryone
66+
writes["tbl_244_"] = internal.PermOwner
6167

6268
for k, v := range writes {
63-
if p := writePermission(k); v != p {
69+
if p := internal.WritePermission(k); v != p {
6470
t.Errorf("%s expected write to be %v got %v", k, v, p)
6571
}
6672
}
@@ -101,7 +107,11 @@ func TestDBListCollections(t *testing.T) {
101107
req.Header.Set("SB-PUBLIC-KEY", pubKey)
102108
req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", rootToken))
103109

104-
h := chain(http.HandlerFunc(database.listCollections), requireRoot, withDB)
110+
stdRoot := []middleware.Middleware{
111+
middleware.WithDB(database.client),
112+
middleware.RequireRoot(database.client),
113+
}
114+
h := middleware.Chain(http.HandlerFunc(database.listCollections), stdRoot...)
105115

106116
h.ServeHTTP(w, req)
107117

0 commit comments

Comments
 (0)