@@ -17,7 +17,7 @@ import (
17
17
18
18
. "github.com/onsi/ginkgo/v2"
19
19
. "github.com/onsi/gomega"
20
- "github.com/skyflowapi/skyflow-go/v2/internal/helpers"
20
+ . "github.com/skyflowapi/skyflow-go/v2/internal/helpers"
21
21
"github.com/skyflowapi/skyflow-go/v2/utils/common"
22
22
. "github.com/skyflowapi/skyflow-go/v2/utils/error"
23
23
)
@@ -35,7 +35,7 @@ var _ = Describe("Helpers", func() {
35
35
ioutil .WriteFile (filePath , []byte (credentialsContent ), 0644 )
36
36
defer os .Remove (filePath )
37
37
38
- credKeys , err := helpers . ParseCredentialsFile (filePath )
38
+ credKeys , err := ParseCredentialsFile (filePath )
39
39
40
40
Expect (err ).To (BeNil ())
41
41
Expect (credKeys ).To (HaveKeyWithValue ("clientID" , "test-client-id" ))
@@ -47,13 +47,13 @@ var _ = Describe("Helpers", func() {
47
47
var credMap = map [string ]interface {}{}
48
48
_ = json .Unmarshal ([]byte (invalidKeyType ), & credMap )
49
49
50
- credKeys , err1 := helpers . ParsePrivateKey (credMap ["privateKey" ].(string ))
50
+ credKeys , err1 := ParsePrivateKey (credMap ["privateKey" ].(string ))
51
51
52
52
Expect (err1 ).ToNot (BeNil ())
53
53
Expect (credKeys ).To (BeNil ())
54
54
})
55
55
It ("should return an error for an invalid file path" , func () {
56
- _ , err := helpers . ParseCredentialsFile ("invalid_path.txt" )
56
+ _ , err := ParseCredentialsFile ("invalid_path.txt" )
57
57
58
58
Expect (err ).NotTo (BeNil ())
59
59
Expect (err .GetCode ()).To (Equal ("Code: 400" ))
@@ -64,7 +64,7 @@ var _ = Describe("Helpers", func() {
64
64
ioutil .WriteFile (filePath , []byte ("" ), 0644 )
65
65
defer os .Remove (filePath )
66
66
67
- _ , err := helpers . ParseCredentialsFile (filePath )
67
+ _ , err := ParseCredentialsFile (filePath )
68
68
69
69
Expect (err ).NotTo (BeNil ())
70
70
Expect (err .GetCode ()).To (Equal ("Code: 400" ))
@@ -76,7 +76,7 @@ var _ = Describe("Helpers", func() {
76
76
credMap := map [string ]interface {}{}
77
77
err := json .Unmarshal ([]byte (pvtKey ), & credMap )
78
78
79
- privateKey , err := helpers . GetPrivateKey (credMap )
79
+ privateKey , err := GetPrivateKey (credMap )
80
80
81
81
Expect (err ).To (BeNil ())
82
82
Expect (privateKey ).ToNot (BeNil ())
@@ -86,7 +86,7 @@ var _ = Describe("Helpers", func() {
86
86
It ("should return an error for a missing private key" , func () {
87
87
credKeys := map [string ]interface {}{}
88
88
89
- _ , err := helpers . GetPrivateKey (credKeys )
89
+ _ , err := GetPrivateKey (credKeys )
90
90
91
91
Expect (err ).NotTo (BeNil ())
92
92
Expect (err .GetCode ()).To (Equal ("Code: 400" ))
@@ -96,7 +96,7 @@ var _ = Describe("Helpers", func() {
96
96
pemKey := `INVALID PRIVATE KEY FORMAT`
97
97
credKeys := map [string ]interface {}{"privateKey" : pemKey }
98
98
99
- _ , err := helpers . GetPrivateKey (credKeys )
99
+ _ , err := GetPrivateKey (credKeys )
100
100
101
101
Expect (err ).NotTo (BeNil ())
102
102
Expect (err .GetCode ()).To (Equal ("Code: 400" ))
@@ -106,7 +106,7 @@ var _ = Describe("Helpers", func() {
106
106
It ("should return a valid base URL for a valid URL string" , func () {
107
107
urlStr := "https://example.com/some/path"
108
108
109
- baseURL , err := helpers . GetBaseURL (urlStr )
109
+ baseURL , err := GetBaseURL (urlStr )
110
110
111
111
Expect (err ).To (BeNil ())
112
112
Expect (baseURL ).To (Equal ("https://example.com" ))
@@ -115,7 +115,7 @@ var _ = Describe("Helpers", func() {
115
115
It ("should return an error for an invalid URL string" , func () {
116
116
urlStr := "invalid_url"
117
117
118
- _ , err := helpers . GetBaseURL (urlStr )
118
+ _ , err := GetBaseURL (urlStr )
119
119
120
120
Expect (err ).NotTo (BeNil ())
121
121
Expect (err .GetCode ()).To (Equal ("Code: 400" ))
@@ -124,7 +124,7 @@ var _ = Describe("Helpers", func() {
124
124
It ("should return an error for a URL without protocol" , func () {
125
125
urlStr := "www.example.com"
126
126
127
- _ , err := helpers . GetBaseURL (urlStr )
127
+ _ , err := GetBaseURL (urlStr )
128
128
129
129
Expect (err ).NotTo (BeNil ())
130
130
Expect (err .GetCode ()).To (Equal ("Code: 400" ))
@@ -136,7 +136,7 @@ var _ = Describe("Helpers", func() {
136
136
MIIBAAIBADANINVALIDKEY==
137
137
-----END PRIVATE KEY-----`
138
138
// Act
139
- privateKey , err := helpers . ParsePrivateKey (pemKey )
139
+ privateKey , err := ParsePrivateKey (pemKey )
140
140
141
141
// Assert
142
142
Expect (err ).ToNot (BeNil ())
@@ -159,7 +159,7 @@ MIIBAAIBADANINVALIDKEY==
159
159
})
160
160
161
161
// Act
162
- _ , parseErr := helpers . ParsePrivateKey (string (pemKey ))
162
+ _ , parseErr := ParsePrivateKey (string (pemKey ))
163
163
164
164
// Assert
165
165
Expect (parseErr ).NotTo (BeNil ())
@@ -182,7 +182,7 @@ MIIBAAIBADANINVALIDKEY==
182
182
})
183
183
184
184
// Act
185
- parsedKey , parseErr := helpers . ParsePrivateKey (string (pemKey ))
185
+ parsedKey , parseErr := ParsePrivateKey (string (pemKey ))
186
186
187
187
// Assert
188
188
Expect (parseErr ).To (BeNil ())
@@ -211,7 +211,7 @@ MIIBAAIBADANINVALIDKEY==
211
211
212
212
Context ("When all credential parameters are valid" , func () {
213
213
It ("should return clientID, tokenURI, keyID and no error" , func () {
214
- clientID , tokenURI , keyID , err := helpers . GetCredentialParams (validCredKeys )
214
+ clientID , tokenURI , keyID , err := GetCredentialParams (validCredKeys )
215
215
216
216
Expect (clientID ).To (Equal ("validClientID" ))
217
217
Expect (tokenURI ).To (Equal ("validTokenURI" ))
@@ -222,7 +222,7 @@ MIIBAAIBADANINVALIDKEY==
222
222
223
223
Context ("When one or more credential parameters are missing" , func () {
224
224
It ("should return an error" , func () {
225
- clientID , tokenURI , keyID , err := helpers . GetCredentialParams (invalidCredKeys )
225
+ clientID , tokenURI , keyID , err := GetCredentialParams (invalidCredKeys )
226
226
227
227
Expect (clientID ).To (BeEmpty ())
228
228
Expect (tokenURI ).To (BeEmpty ())
@@ -236,7 +236,7 @@ MIIBAAIBADANINVALIDKEY==
236
236
Context ("When all credential parameters are missing" , func () {
237
237
It ("should return an error" , func () {
238
238
emptyCredKeys := make (map [string ]interface {})
239
- clientID , tokenURI , keyID , err := helpers . GetCredentialParams (emptyCredKeys )
239
+ clientID , tokenURI , keyID , err := GetCredentialParams (emptyCredKeys )
240
240
241
241
Expect (clientID ).To (BeEmpty ())
242
242
Expect (tokenURI ).To (BeEmpty ())
@@ -275,7 +275,7 @@ MIIBAAIBADANINVALIDKEY==
275
275
Context ("When all credentials and options are valid" , func () {
276
276
It ("should return signed data tokens successfully" , func () {
277
277
credKeys = getValidCreds ()
278
- response , err = helpers . GetSignedDataTokens (credKeys , options )
278
+ response , err = GetSignedDataTokens (credKeys , options )
279
279
Expect (err ).Should (BeNil ())
280
280
Expect (response ).Should (HaveLen (2 ))
281
281
Expect (response [0 ].Token ).Should (Equal ("testToken1" ))
@@ -284,7 +284,7 @@ MIIBAAIBADANINVALIDKEY==
284
284
It ("should return signed data tokens successfully when timeToLive not passed" , func () {
285
285
credKeys = getValidCreds ()
286
286
options .TimeToLive = 0
287
- response , err = helpers . GetSignedDataTokens (credKeys , options )
287
+ response , err = GetSignedDataTokens (credKeys , options )
288
288
Expect (err ).Should (BeNil ())
289
289
Expect (response ).Should (HaveLen (2 ))
290
290
Expect (response [0 ].Token ).Should (Equal ("testToken1" ))
@@ -299,7 +299,7 @@ MIIBAAIBADANINVALIDKEY==
299
299
credMap := map [string ]interface {}{}
300
300
_ = json .Unmarshal ([]byte (pvtKey ), & credMap )
301
301
credMap ["privateKey" ] = nil // Invalidate the private key
302
- response , err = helpers . GetSignedDataTokens (credMap , options )
302
+ response , err = GetSignedDataTokens (credMap , options )
303
303
Expect (response ).Should (BeNil ())
304
304
Expect (err ).ShouldNot (BeNil ())
305
305
Expect (err .GetCode ()).Should (Equal ("Code: 400" )) // Assuming a 400 error code for this case
@@ -314,7 +314,7 @@ MIIBAAIBADANINVALIDKEY==
314
314
credMap := map [string ]interface {}{}
315
315
_ = json .Unmarshal ([]byte (pvtKey ), & credMap )
316
316
credMap ["clientID" ] = nil // Invalidate the clientID
317
- response , err = helpers . GetSignedDataTokens (credMap , options )
317
+ response , err = GetSignedDataTokens (credMap , options )
318
318
Expect (response ).Should (BeNil ())
319
319
Expect (err ).ShouldNot (BeNil ())
320
320
Expect (err .GetCode ()).Should (Equal ("Code: 400" )) // Assuming a 400 error code for this case
@@ -326,7 +326,7 @@ MIIBAAIBADANINVALIDKEY==
326
326
It ("should propagate the error" , func () {
327
327
invalidPrivateKey := "invalidKey"
328
328
credKeys ["privateKey" ] = invalidPrivateKey
329
- response , err = helpers . GetSignedDataTokens (credKeys , options )
329
+ response , err = GetSignedDataTokens (credKeys , options )
330
330
Expect (response ).Should (BeNil ())
331
331
Expect (err ).ShouldNot (BeNil ())
332
332
Expect (err .GetCode ()).Should (Equal ("Code: 400" )) // Assuming 400 error for signing failure
@@ -337,36 +337,36 @@ MIIBAAIBADANINVALIDKEY==
337
337
Context ("GetScopeUsingRoles" , func () {
338
338
// Test case 1: roles is nil
339
339
It ("should return an empty string when roles is nil" , func () {
340
- result := helpers . GetScopeUsingRoles (nil )
340
+ result := GetScopeUsingRoles (nil )
341
341
Expect (result ).To (Equal ("" ))
342
342
})
343
343
344
344
// Test case 2: roles is an empty slice
345
345
It ("should return an empty string when roles is an empty slice" , func () {
346
- result := helpers . GetScopeUsingRoles ([]string {})
346
+ result := GetScopeUsingRoles ([]string {})
347
347
Expect (result ).To (Equal ("" ))
348
348
})
349
349
350
350
// Test case 3: roles contains multiple roles
351
351
It ("should return a string with roles prefixed by ' role:'" , func () {
352
352
roles := []string {"admin" , "user" , "editor" }
353
- result := helpers . GetScopeUsingRoles (roles )
353
+ result := GetScopeUsingRoles (roles )
354
354
expected := " role:admin role:user role:editor"
355
355
Expect (result ).To (Equal (expected ))
356
356
})
357
357
358
358
// Test case 4: roles contains one role
359
359
It ("should return a string with a single role" , func () {
360
360
roles := []string {"admin" }
361
- result := helpers . GetScopeUsingRoles (roles )
361
+ result := GetScopeUsingRoles (roles )
362
362
expected := " role:admin"
363
363
Expect (result ).To (Equal (expected ))
364
364
})
365
365
366
366
// Test case 5: roles contains one empty string role
367
367
It ("should handle empty role string correctly" , func () {
368
368
roles := []string {"" }
369
- result := helpers . GetScopeUsingRoles (roles )
369
+ result := GetScopeUsingRoles (roles )
370
370
expected := " role:"
371
371
Expect (result ).To (Equal (expected ))
372
372
})
@@ -402,15 +402,15 @@ MIIBAAIBADANINVALIDKEY==
402
402
credKeys = getValidCreds ()
403
403
mockServer = mockserver ("ok" )
404
404
credKeys ["tokenURI" ] = mockServer .URL
405
- originalGetBaseURLHelper := helpers . GetBaseURLHelper
405
+ originalGetBaseURLHelper := GetBaseURLHelper
406
406
407
- defer func () { helpers . GetBaseURLHelper = originalGetBaseURLHelper }()
408
- helpers . GetBaseURLHelper = func (urlStr string ) (string , * SkyflowError ) {
407
+ defer func () { GetBaseURLHelper = originalGetBaseURLHelper }()
408
+ GetBaseURLHelper = func (urlStr string ) (string , * SkyflowError ) {
409
409
return mockServer .URL , nil
410
410
}
411
411
412
412
// Call the function under test
413
- response , err := helpers . GenerateBearerTokenHelper (credKeys , options )
413
+ response , err := GenerateBearerTokenHelper (credKeys , options )
414
414
415
415
// Assertions
416
416
Expect (err ).Should (BeNil ())
@@ -422,16 +422,16 @@ MIIBAAIBADANINVALIDKEY==
422
422
credKeys = getValidCreds ()
423
423
credKeys ["tokenURI" ] = mockServer .URL
424
424
mockServer = mockserver ("err" )
425
- originalGetBaseURLHelper := helpers . GetBaseURLHelper
425
+ originalGetBaseURLHelper := GetBaseURLHelper
426
426
427
- defer func () { helpers . GetBaseURLHelper = originalGetBaseURLHelper }()
427
+ defer func () { GetBaseURLHelper = originalGetBaseURLHelper }()
428
428
429
- helpers . GetBaseURLHelper = func (urlStr string ) (string , * SkyflowError ) {
429
+ GetBaseURLHelper = func (urlStr string ) (string , * SkyflowError ) {
430
430
return mockServer .URL , nil
431
431
}
432
432
433
433
// Call the function under test
434
- response , err := helpers . GenerateBearerTokenHelper (credKeys , options )
434
+ response , err := GenerateBearerTokenHelper (credKeys , options )
435
435
436
436
// Assertions
437
437
Expect (err ).ShouldNot (BeNil ())
@@ -447,7 +447,7 @@ MIIBAAIBADANINVALIDKEY==
447
447
delete (credKeys , "privateKey" )
448
448
449
449
// Call the function under test
450
- response , err := helpers . GenerateBearerTokenHelper (credKeys , options )
450
+ response , err := GenerateBearerTokenHelper (credKeys , options )
451
451
452
452
// Assertions
453
453
Expect (err ).ShouldNot (BeNil ())
@@ -460,7 +460,7 @@ MIIBAAIBADANINVALIDKEY==
460
460
credKeys = getValidCreds ()
461
461
delete (credKeys , "clientID" )
462
462
// Call the function under test
463
- response , err := helpers . GenerateBearerTokenHelper (credKeys , options )
463
+ response , err := GenerateBearerTokenHelper (credKeys , options )
464
464
465
465
// Assertions
466
466
Expect (err ).ShouldNot (BeNil ())
@@ -473,7 +473,7 @@ MIIBAAIBADANINVALIDKEY==
473
473
credKeys = getValidCreds ()
474
474
delete (credKeys , "tokenURI" )
475
475
// Call the function under test
476
- response , err := helpers . GenerateBearerTokenHelper (credKeys , options )
476
+ response , err := GenerateBearerTokenHelper (credKeys , options )
477
477
478
478
// Assertions
479
479
Expect (err ).ShouldNot (BeNil ())
@@ -486,7 +486,7 @@ MIIBAAIBADANINVALIDKEY==
486
486
credKeys = getValidCreds ()
487
487
delete (credKeys , "keyID" )
488
488
// Call the function under test
489
- response , err := helpers . GenerateBearerTokenHelper (credKeys , options )
489
+ response , err := GenerateBearerTokenHelper (credKeys , options )
490
490
491
491
// Assertions
492
492
Expect (err ).ShouldNot (BeNil ())
@@ -499,7 +499,7 @@ MIIBAAIBADANINVALIDKEY==
499
499
credKeys = getValidCreds ()
500
500
credKeys ["tokenURI" ] = ""
501
501
// Call the function under test
502
- response , err := helpers . GenerateBearerTokenHelper (credKeys , options )
502
+ response , err := GenerateBearerTokenHelper (credKeys , options )
503
503
504
504
// Assertions
505
505
Expect (err ).ShouldNot (BeNil ())
0 commit comments