Skip to content

Commit 163376b

Browse files
SK-1816 added beta version in constant and removed v1 code
1 parent c782d7e commit 163376b

File tree

121 files changed

+46
-4890
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

121 files changed

+46
-4890
lines changed
File renamed without changes.
File renamed without changes.
File renamed without changes.

v2/client/service_test.go renamed to client/service_test.go

+2-3
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,15 @@ package client_test
33
import (
44
"context"
55
"encoding/json"
6-
"net/http"
7-
"net/http/httptest"
8-
96
. "github.com/onsi/ginkgo/v2"
107
. "github.com/onsi/gomega"
118
. "github.com/skyflowapi/skyflow-go/v2/client"
129
vaultapi2 "github.com/skyflowapi/skyflow-go/v2/internal/generated/vaultapi"
1310
. "github.com/skyflowapi/skyflow-go/v2/internal/vault/controller"
1411
. "github.com/skyflowapi/skyflow-go/v2/utils/common"
1512
skyflowError "github.com/skyflowapi/skyflow-go/v2/utils/error"
13+
"net/http"
14+
"net/http/httptest"
1615
)
1716

1817
var _ = Describe("Vault controller Test cases", func() {
File renamed without changes.

v2/internal/constants/constants.go renamed to internal/constants/constants.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,6 @@ const (
1111
GRANT_TYPE = "urn:ietf:params:oauth:grant-type:jwt-bearer"
1212
SDK_LOG_PREFIX = "[ " + SDK_PREFIX + " ] "
1313
SDK_NAME = "Skyflow Go SDK "
14-
SDK_VERSION = "v2"
14+
SDK_VERSION = "v2.0.0-beta.1"
1515
SDK_PREFIX = SDK_NAME + SDK_VERSION
1616
)

v2/internal/generated/auth/model_googlerpc_status.go renamed to internal/generated/auth/model_googlerpc_status.go

+1-1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.
File renamed without changes.

v2/internal/helpers/helpers_test.go renamed to internal/helpers/helpers_test.go

+40-40
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ import (
1717

1818
. "github.com/onsi/ginkgo/v2"
1919
. "github.com/onsi/gomega"
20-
"github.com/skyflowapi/skyflow-go/v2/internal/helpers"
20+
. "github.com/skyflowapi/skyflow-go/v2/internal/helpers"
2121
"github.com/skyflowapi/skyflow-go/v2/utils/common"
2222
. "github.com/skyflowapi/skyflow-go/v2/utils/error"
2323
)
@@ -35,7 +35,7 @@ var _ = Describe("Helpers", func() {
3535
ioutil.WriteFile(filePath, []byte(credentialsContent), 0644)
3636
defer os.Remove(filePath)
3737

38-
credKeys, err := helpers.ParseCredentialsFile(filePath)
38+
credKeys, err := ParseCredentialsFile(filePath)
3939

4040
Expect(err).To(BeNil())
4141
Expect(credKeys).To(HaveKeyWithValue("clientID", "test-client-id"))
@@ -47,13 +47,13 @@ var _ = Describe("Helpers", func() {
4747
var credMap = map[string]interface{}{}
4848
_ = json.Unmarshal([]byte(invalidKeyType), &credMap)
4949

50-
credKeys, err1 := helpers.ParsePrivateKey(credMap["privateKey"].(string))
50+
credKeys, err1 := ParsePrivateKey(credMap["privateKey"].(string))
5151

5252
Expect(err1).ToNot(BeNil())
5353
Expect(credKeys).To(BeNil())
5454
})
5555
It("should return an error for an invalid file path", func() {
56-
_, err := helpers.ParseCredentialsFile("invalid_path.txt")
56+
_, err := ParseCredentialsFile("invalid_path.txt")
5757

5858
Expect(err).NotTo(BeNil())
5959
Expect(err.GetCode()).To(Equal("Code: 400"))
@@ -64,7 +64,7 @@ var _ = Describe("Helpers", func() {
6464
ioutil.WriteFile(filePath, []byte(""), 0644)
6565
defer os.Remove(filePath)
6666

67-
_, err := helpers.ParseCredentialsFile(filePath)
67+
_, err := ParseCredentialsFile(filePath)
6868

6969
Expect(err).NotTo(BeNil())
7070
Expect(err.GetCode()).To(Equal("Code: 400"))
@@ -76,7 +76,7 @@ var _ = Describe("Helpers", func() {
7676
credMap := map[string]interface{}{}
7777
err := json.Unmarshal([]byte(pvtKey), &credMap)
7878

79-
privateKey, err := helpers.GetPrivateKey(credMap)
79+
privateKey, err := GetPrivateKey(credMap)
8080

8181
Expect(err).To(BeNil())
8282
Expect(privateKey).ToNot(BeNil())
@@ -86,7 +86,7 @@ var _ = Describe("Helpers", func() {
8686
It("should return an error for a missing private key", func() {
8787
credKeys := map[string]interface{}{}
8888

89-
_, err := helpers.GetPrivateKey(credKeys)
89+
_, err := GetPrivateKey(credKeys)
9090

9191
Expect(err).NotTo(BeNil())
9292
Expect(err.GetCode()).To(Equal("Code: 400"))
@@ -96,7 +96,7 @@ var _ = Describe("Helpers", func() {
9696
pemKey := `INVALID PRIVATE KEY FORMAT`
9797
credKeys := map[string]interface{}{"privateKey": pemKey}
9898

99-
_, err := helpers.GetPrivateKey(credKeys)
99+
_, err := GetPrivateKey(credKeys)
100100

101101
Expect(err).NotTo(BeNil())
102102
Expect(err.GetCode()).To(Equal("Code: 400"))
@@ -106,7 +106,7 @@ var _ = Describe("Helpers", func() {
106106
It("should return a valid base URL for a valid URL string", func() {
107107
urlStr := "https://example.com/some/path"
108108

109-
baseURL, err := helpers.GetBaseURL(urlStr)
109+
baseURL, err := GetBaseURL(urlStr)
110110

111111
Expect(err).To(BeNil())
112112
Expect(baseURL).To(Equal("https://example.com"))
@@ -115,7 +115,7 @@ var _ = Describe("Helpers", func() {
115115
It("should return an error for an invalid URL string", func() {
116116
urlStr := "invalid_url"
117117

118-
_, err := helpers.GetBaseURL(urlStr)
118+
_, err := GetBaseURL(urlStr)
119119

120120
Expect(err).NotTo(BeNil())
121121
Expect(err.GetCode()).To(Equal("Code: 400"))
@@ -124,7 +124,7 @@ var _ = Describe("Helpers", func() {
124124
It("should return an error for a URL without protocol", func() {
125125
urlStr := "www.example.com"
126126

127-
_, err := helpers.GetBaseURL(urlStr)
127+
_, err := GetBaseURL(urlStr)
128128

129129
Expect(err).NotTo(BeNil())
130130
Expect(err.GetCode()).To(Equal("Code: 400"))
@@ -136,7 +136,7 @@ var _ = Describe("Helpers", func() {
136136
MIIBAAIBADANINVALIDKEY==
137137
-----END PRIVATE KEY-----`
138138
// Act
139-
privateKey, err := helpers.ParsePrivateKey(pemKey)
139+
privateKey, err := ParsePrivateKey(pemKey)
140140

141141
// Assert
142142
Expect(err).ToNot(BeNil())
@@ -159,7 +159,7 @@ MIIBAAIBADANINVALIDKEY==
159159
})
160160

161161
// Act
162-
_, parseErr := helpers.ParsePrivateKey(string(pemKey))
162+
_, parseErr := ParsePrivateKey(string(pemKey))
163163

164164
// Assert
165165
Expect(parseErr).NotTo(BeNil())
@@ -182,7 +182,7 @@ MIIBAAIBADANINVALIDKEY==
182182
})
183183

184184
// Act
185-
parsedKey, parseErr := helpers.ParsePrivateKey(string(pemKey))
185+
parsedKey, parseErr := ParsePrivateKey(string(pemKey))
186186

187187
// Assert
188188
Expect(parseErr).To(BeNil())
@@ -211,7 +211,7 @@ MIIBAAIBADANINVALIDKEY==
211211

212212
Context("When all credential parameters are valid", func() {
213213
It("should return clientID, tokenURI, keyID and no error", func() {
214-
clientID, tokenURI, keyID, err := helpers.GetCredentialParams(validCredKeys)
214+
clientID, tokenURI, keyID, err := GetCredentialParams(validCredKeys)
215215

216216
Expect(clientID).To(Equal("validClientID"))
217217
Expect(tokenURI).To(Equal("validTokenURI"))
@@ -222,7 +222,7 @@ MIIBAAIBADANINVALIDKEY==
222222

223223
Context("When one or more credential parameters are missing", func() {
224224
It("should return an error", func() {
225-
clientID, tokenURI, keyID, err := helpers.GetCredentialParams(invalidCredKeys)
225+
clientID, tokenURI, keyID, err := GetCredentialParams(invalidCredKeys)
226226

227227
Expect(clientID).To(BeEmpty())
228228
Expect(tokenURI).To(BeEmpty())
@@ -236,7 +236,7 @@ MIIBAAIBADANINVALIDKEY==
236236
Context("When all credential parameters are missing", func() {
237237
It("should return an error", func() {
238238
emptyCredKeys := make(map[string]interface{})
239-
clientID, tokenURI, keyID, err := helpers.GetCredentialParams(emptyCredKeys)
239+
clientID, tokenURI, keyID, err := GetCredentialParams(emptyCredKeys)
240240

241241
Expect(clientID).To(BeEmpty())
242242
Expect(tokenURI).To(BeEmpty())
@@ -275,7 +275,7 @@ MIIBAAIBADANINVALIDKEY==
275275
Context("When all credentials and options are valid", func() {
276276
It("should return signed data tokens successfully", func() {
277277
credKeys = getValidCreds()
278-
response, err = helpers.GetSignedDataTokens(credKeys, options)
278+
response, err = GetSignedDataTokens(credKeys, options)
279279
Expect(err).Should(BeNil())
280280
Expect(response).Should(HaveLen(2))
281281
Expect(response[0].Token).Should(Equal("testToken1"))
@@ -284,7 +284,7 @@ MIIBAAIBADANINVALIDKEY==
284284
It("should return signed data tokens successfully when timeToLive not passed", func() {
285285
credKeys = getValidCreds()
286286
options.TimeToLive = 0
287-
response, err = helpers.GetSignedDataTokens(credKeys, options)
287+
response, err = GetSignedDataTokens(credKeys, options)
288288
Expect(err).Should(BeNil())
289289
Expect(response).Should(HaveLen(2))
290290
Expect(response[0].Token).Should(Equal("testToken1"))
@@ -299,7 +299,7 @@ MIIBAAIBADANINVALIDKEY==
299299
credMap := map[string]interface{}{}
300300
_ = json.Unmarshal([]byte(pvtKey), &credMap)
301301
credMap["privateKey"] = nil // Invalidate the private key
302-
response, err = helpers.GetSignedDataTokens(credMap, options)
302+
response, err = GetSignedDataTokens(credMap, options)
303303
Expect(response).Should(BeNil())
304304
Expect(err).ShouldNot(BeNil())
305305
Expect(err.GetCode()).Should(Equal("Code: 400")) // Assuming a 400 error code for this case
@@ -314,7 +314,7 @@ MIIBAAIBADANINVALIDKEY==
314314
credMap := map[string]interface{}{}
315315
_ = json.Unmarshal([]byte(pvtKey), &credMap)
316316
credMap["clientID"] = nil // Invalidate the clientID
317-
response, err = helpers.GetSignedDataTokens(credMap, options)
317+
response, err = GetSignedDataTokens(credMap, options)
318318
Expect(response).Should(BeNil())
319319
Expect(err).ShouldNot(BeNil())
320320
Expect(err.GetCode()).Should(Equal("Code: 400")) // Assuming a 400 error code for this case
@@ -326,7 +326,7 @@ MIIBAAIBADANINVALIDKEY==
326326
It("should propagate the error", func() {
327327
invalidPrivateKey := "invalidKey"
328328
credKeys["privateKey"] = invalidPrivateKey
329-
response, err = helpers.GetSignedDataTokens(credKeys, options)
329+
response, err = GetSignedDataTokens(credKeys, options)
330330
Expect(response).Should(BeNil())
331331
Expect(err).ShouldNot(BeNil())
332332
Expect(err.GetCode()).Should(Equal("Code: 400")) // Assuming 400 error for signing failure
@@ -337,36 +337,36 @@ MIIBAAIBADANINVALIDKEY==
337337
Context("GetScopeUsingRoles", func() {
338338
// Test case 1: roles is nil
339339
It("should return an empty string when roles is nil", func() {
340-
result := helpers.GetScopeUsingRoles(nil)
340+
result := GetScopeUsingRoles(nil)
341341
Expect(result).To(Equal(""))
342342
})
343343

344344
// Test case 2: roles is an empty slice
345345
It("should return an empty string when roles is an empty slice", func() {
346-
result := helpers.GetScopeUsingRoles([]string{})
346+
result := GetScopeUsingRoles([]string{})
347347
Expect(result).To(Equal(""))
348348
})
349349

350350
// Test case 3: roles contains multiple roles
351351
It("should return a string with roles prefixed by ' role:'", func() {
352352
roles := []string{"admin", "user", "editor"}
353-
result := helpers.GetScopeUsingRoles(roles)
353+
result := GetScopeUsingRoles(roles)
354354
expected := " role:admin role:user role:editor"
355355
Expect(result).To(Equal(expected))
356356
})
357357

358358
// Test case 4: roles contains one role
359359
It("should return a string with a single role", func() {
360360
roles := []string{"admin"}
361-
result := helpers.GetScopeUsingRoles(roles)
361+
result := GetScopeUsingRoles(roles)
362362
expected := " role:admin"
363363
Expect(result).To(Equal(expected))
364364
})
365365

366366
// Test case 5: roles contains one empty string role
367367
It("should handle empty role string correctly", func() {
368368
roles := []string{""}
369-
result := helpers.GetScopeUsingRoles(roles)
369+
result := GetScopeUsingRoles(roles)
370370
expected := " role:"
371371
Expect(result).To(Equal(expected))
372372
})
@@ -402,15 +402,15 @@ MIIBAAIBADANINVALIDKEY==
402402
credKeys = getValidCreds()
403403
mockServer = mockserver("ok")
404404
credKeys["tokenURI"] = mockServer.URL
405-
originalGetBaseURLHelper := helpers.GetBaseURLHelper
405+
originalGetBaseURLHelper := GetBaseURLHelper
406406

407-
defer func() { helpers.GetBaseURLHelper = originalGetBaseURLHelper }()
408-
helpers.GetBaseURLHelper = func(urlStr string) (string, *SkyflowError) {
407+
defer func() { GetBaseURLHelper = originalGetBaseURLHelper }()
408+
GetBaseURLHelper = func(urlStr string) (string, *SkyflowError) {
409409
return mockServer.URL, nil
410410
}
411411

412412
// Call the function under test
413-
response, err := helpers.GenerateBearerTokenHelper(credKeys, options)
413+
response, err := GenerateBearerTokenHelper(credKeys, options)
414414

415415
// Assertions
416416
Expect(err).Should(BeNil())
@@ -422,16 +422,16 @@ MIIBAAIBADANINVALIDKEY==
422422
credKeys = getValidCreds()
423423
credKeys["tokenURI"] = mockServer.URL
424424
mockServer = mockserver("err")
425-
originalGetBaseURLHelper := helpers.GetBaseURLHelper
425+
originalGetBaseURLHelper := GetBaseURLHelper
426426

427-
defer func() { helpers.GetBaseURLHelper = originalGetBaseURLHelper }()
427+
defer func() { GetBaseURLHelper = originalGetBaseURLHelper }()
428428

429-
helpers.GetBaseURLHelper = func(urlStr string) (string, *SkyflowError) {
429+
GetBaseURLHelper = func(urlStr string) (string, *SkyflowError) {
430430
return mockServer.URL, nil
431431
}
432432

433433
// Call the function under test
434-
response, err := helpers.GenerateBearerTokenHelper(credKeys, options)
434+
response, err := GenerateBearerTokenHelper(credKeys, options)
435435

436436
// Assertions
437437
Expect(err).ShouldNot(BeNil())
@@ -447,7 +447,7 @@ MIIBAAIBADANINVALIDKEY==
447447
delete(credKeys, "privateKey")
448448

449449
// Call the function under test
450-
response, err := helpers.GenerateBearerTokenHelper(credKeys, options)
450+
response, err := GenerateBearerTokenHelper(credKeys, options)
451451

452452
// Assertions
453453
Expect(err).ShouldNot(BeNil())
@@ -460,7 +460,7 @@ MIIBAAIBADANINVALIDKEY==
460460
credKeys = getValidCreds()
461461
delete(credKeys, "clientID")
462462
// Call the function under test
463-
response, err := helpers.GenerateBearerTokenHelper(credKeys, options)
463+
response, err := GenerateBearerTokenHelper(credKeys, options)
464464

465465
// Assertions
466466
Expect(err).ShouldNot(BeNil())
@@ -473,7 +473,7 @@ MIIBAAIBADANINVALIDKEY==
473473
credKeys = getValidCreds()
474474
delete(credKeys, "tokenURI")
475475
// Call the function under test
476-
response, err := helpers.GenerateBearerTokenHelper(credKeys, options)
476+
response, err := GenerateBearerTokenHelper(credKeys, options)
477477

478478
// Assertions
479479
Expect(err).ShouldNot(BeNil())
@@ -486,7 +486,7 @@ MIIBAAIBADANINVALIDKEY==
486486
credKeys = getValidCreds()
487487
delete(credKeys, "keyID")
488488
// Call the function under test
489-
response, err := helpers.GenerateBearerTokenHelper(credKeys, options)
489+
response, err := GenerateBearerTokenHelper(credKeys, options)
490490

491491
// Assertions
492492
Expect(err).ShouldNot(BeNil())
@@ -499,7 +499,7 @@ MIIBAAIBADANINVALIDKEY==
499499
credKeys = getValidCreds()
500500
credKeys["tokenURI"] = ""
501501
// Call the function under test
502-
response, err := helpers.GenerateBearerTokenHelper(credKeys, options)
502+
response, err := GenerateBearerTokenHelper(credKeys, options)
503503

504504
// Assertions
505505
Expect(err).ShouldNot(BeNil())
File renamed without changes.

v2/serviceaccount/token_test.go renamed to serviceaccount/token_test.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,11 @@ package serviceaccount_test
22

33
import (
44
"fmt"
5+
"github.com/skyflowapi/skyflow-go/v2/serviceaccount"
6+
57
. "github.com/onsi/ginkgo/v2"
68
. "github.com/onsi/gomega"
79
"github.com/skyflowapi/skyflow-go/v2/internal/helpers"
8-
"github.com/skyflowapi/skyflow-go/v2/serviceaccount"
910
"github.com/skyflowapi/skyflow-go/v2/utils/common"
1011
skyflowError "github.com/skyflowapi/skyflow-go/v2/utils/error"
1112
"net/http"
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

v1/commonutils/errors/error_codes.go

-16
This file was deleted.

0 commit comments

Comments
 (0)