-
Notifications
You must be signed in to change notification settings - Fork 17
/
federation_token_test.go
126 lines (104 loc) · 3.29 KB
/
federation_token_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
package pivnet_test
import (
"fmt"
"github.com/pivotal-cf/go-pivnet/v7/go-pivnetfakes"
"net/http"
"github.com/onsi/gomega/ghttp"
"github.com/pivotal-cf/go-pivnet/v7"
"github.com/pivotal-cf/go-pivnet/v7/logger"
"github.com/pivotal-cf/go-pivnet/v7/logger/loggerfakes"
. "github.com/onsi/ginkgo"
. "github.com/onsi/gomega"
)
var _ = Describe("PivnetClient - federation token", func() {
type requestBody struct {
ProductID string `json:"product_id"`
}
var (
server *ghttp.Server
client pivnet.Client
apiAddress string
userAgent string
mockedResponse interface{}
responseStatusCode int
expectedRequestBody requestBody
newClientConfig pivnet.ClientConfig
fakeLogger logger.Logger
fakeAccessTokenService *gopivnetfakes.FakeAccessTokenService
productSlug string
expectedFederationToken pivnet.FederationToken
)
BeforeEach(func() {
server = ghttp.NewServer()
apiAddress = server.URL()
userAgent = "pivnet-resource/0.1.0 (some-url)"
fakeLogger = &loggerfakes.FakeLogger{}
fakeAccessTokenService = &gopivnetfakes.FakeAccessTokenService{}
newClientConfig = pivnet.ClientConfig{
Host: apiAddress,
UserAgent: userAgent,
}
client = pivnet.NewClient(fakeAccessTokenService, newClientConfig, fakeLogger)
})
JustBeforeEach(func() {
expectedRequestBody = requestBody{
ProductID: productSlug,
}
server.AppendHandlers(
ghttp.CombineHandlers(
ghttp.VerifyRequest(
"POST",
fmt.Sprintf("%s/federation_token", apiPrefix),
),
ghttp.VerifyJSONRepresenting(&expectedRequestBody),
ghttp.RespondWithJSONEncoded(responseStatusCode, mockedResponse),
),
)
})
AfterEach(func() {
server.Close()
})
Describe("Generate a federated token", func() {
BeforeEach(func() {
productSlug = "banana"
mockedResponse = pivnet.FederationToken{
AccessKeyID: "some-AccessKeyID",
SecretAccessKey: "some-SecretAccessKey",
SessionToken: "some-SessionToken",
Bucket: "some-bucket",
Region: "some-region",
}
responseStatusCode = http.StatusOK
expectedFederationToken = pivnet.FederationToken{
AccessKeyID: "some-AccessKeyID",
SecretAccessKey: "some-SecretAccessKey",
SessionToken: "some-SessionToken",
Bucket: "some-bucket",
Region: "some-region",
}
})
It("returns the federated token without error", func() {
federationToken, err := client.FederationToken.GenerateFederationToken(
productSlug,
)
Expect(err).NotTo(HaveOccurred())
Expect(federationToken).ToNot(Equal(nil))
Expect(federationToken).To(Equal(expectedFederationToken))
})
})
Describe("Err when trying to generate token for restricted product", func() {
BeforeEach(func() {
productSlug = "something-i-dont-manage"
mockedResponse = pivnetErr{Message: "only available for product admins and partner product admins"}
responseStatusCode = http.StatusForbidden
})
It("returns a 403 error", func() {
federationToken, err := client.FederationToken.GenerateFederationToken(
productSlug,
)
Expect(federationToken).To(Equal(pivnet.FederationToken{}))
Expect(err).To(HaveOccurred())
Expect(err.Error()).To(ContainSubstring("403 - only available for product admins and partner product admins"))
})
})
})