mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-13 11:34:26 +00:00
37ee5b4bab
* job queue * wg improvements * start handler * statement * statements * imporve handler * improve statement * statement in seperate file * move handlers * move query/old to query * handler * read models * bulk works * cleanup * contrib * rename readmodel to projection * rename read_models schema to projections * rename read_models schema to projections * search query as func, bulk iterates as long as new events * add event sequence less query * update checks for events between current sequence and sequence of first statement if it has previous sequence 0 * cleanup crdb projection * refactor projection handler * start with testing * tests for handler * remove todo * refactor statement: remove table name, add tests * improve projection handler shutdown, no savepoint if noop stmt, tests for stmt handler * tests * start failed events * seperate branch for contrib * move statement constructors to crdb pkg * correct import * Subscribe for eventtypes (#1800) * fix: is default (#1737) * fix: use email as username on global org (#1738) * fix: use email as username on global org * Update user_human.go * Update register_handler.go * chore(deps): update docusaurus (#1739) * chore: remove PAT and use GH Token (#1716) * chore: remove PAT and use GH Token * fix env * fix env * fix env * md lint * trigger ci * change user * fix GH bug * replace login part * chore: add GH Token to sem rel (#1746) * chore: add GH Token to sem rel * try branch * add GH Token * remove test branch again * docs: changes acme to acme-caos (#1744) * changes acme to acme-caos * Apply suggestions from code review Co-authored-by: Florian Forster <florian@caos.ch> Co-authored-by: Maximilian Panne <maximilian.panne@gmail.com> Co-authored-by: Florian Forster <florian@caos.ch> * feat: add additional origins on applications (#1691) * feat: add additional origins on applications * app additional redirects * chore(deps-dev): bump @angular/cli from 11.2.8 to 11.2.11 in /console (#1706) * fix: show org with regex (#1688) * fix: flag mapping (#1699) * chore(deps-dev): bump @angular/cli from 11.2.8 to 11.2.11 in /console Bumps [@angular/cli](https://github.com/angular/angular-cli) from 11.2.8 to 11.2.11. - [Release notes](https://github.com/angular/angular-cli/releases) - [Commits](https://github.com/angular/angular-cli/compare/v11.2.8...v11.2.11) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: Silvan <silvan.reusser@gmail.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> * chore(deps-dev): bump stylelint from 13.10.0 to 13.13.1 in /console (#1703) * fix: show org with regex (#1688) * fix: flag mapping (#1699) * chore(deps-dev): bump stylelint from 13.10.0 to 13.13.1 in /console Bumps [stylelint](https://github.com/stylelint/stylelint) from 13.10.0 to 13.13.1. - [Release notes](https://github.com/stylelint/stylelint/releases) - [Changelog](https://github.com/stylelint/stylelint/blob/master/CHANGELOG.md) - [Commits](https://github.com/stylelint/stylelint/compare/13.10.0...13.13.1) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: Silvan <silvan.reusser@gmail.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> * chore(deps-dev): bump @types/node from 14.14.37 to 15.0.1 in /console (#1702) * fix: show org with regex (#1688) * fix: flag mapping (#1699) * chore(deps-dev): bump @types/node from 14.14.37 to 15.0.1 in /console Bumps [@types/node](https://github.com/DefinitelyTyped/DefinitelyTyped/tree/HEAD/types/node) from 14.14.37 to 15.0.1. - [Release notes](https://github.com/DefinitelyTyped/DefinitelyTyped/releases) - [Commits](https://github.com/DefinitelyTyped/DefinitelyTyped/commits/HEAD/types/node) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: Silvan <silvan.reusser@gmail.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> * chore(deps): bump ts-protoc-gen from 0.14.0 to 0.15.0 in /console (#1701) * fix: show org with regex (#1688) * fix: flag mapping (#1699) * chore(deps): bump ts-protoc-gen from 0.14.0 to 0.15.0 in /console Bumps [ts-protoc-gen](https://github.com/improbable-eng/ts-protoc-gen) from 0.14.0 to 0.15.0. - [Release notes](https://github.com/improbable-eng/ts-protoc-gen/releases) - [Changelog](https://github.com/improbable-eng/ts-protoc-gen/blob/master/CHANGELOG.md) - [Commits](https://github.com/improbable-eng/ts-protoc-gen/compare/0.14.0...0.15.0) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: Silvan <silvan.reusser@gmail.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> * chore(deps-dev): bump @types/jasmine from 3.6.9 to 3.6.10 in /console (#1682) Bumps [@types/jasmine](https://github.com/DefinitelyTyped/DefinitelyTyped/tree/HEAD/types/jasmine) from 3.6.9 to 3.6.10. - [Release notes](https://github.com/DefinitelyTyped/DefinitelyTyped/releases) - [Commits](https://github.com/DefinitelyTyped/DefinitelyTyped/commits/HEAD/types/jasmine) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> * chore(deps): bump @types/google-protobuf in /console (#1681) Bumps [@types/google-protobuf](https://github.com/DefinitelyTyped/DefinitelyTyped/tree/HEAD/types/google-protobuf) from 3.7.4 to 3.15.2. - [Release notes](https://github.com/DefinitelyTyped/DefinitelyTyped/releases) - [Commits](https://github.com/DefinitelyTyped/DefinitelyTyped/commits/HEAD/types/google-protobuf) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> * chore(deps): bump grpc from 1.24.5 to 1.24.7 in /console (#1666) Bumps [grpc](https://github.com/grpc/grpc-node) from 1.24.5 to 1.24.7. - [Release notes](https://github.com/grpc/grpc-node/releases) - [Commits](https://github.com/grpc/grpc-node/compare/grpc@1.24.5...grpc@1.24.7) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> * lock * chore(deps-dev): bump @angular/language-service from 11.2.9 to 11.2.12 in /console (#1704) * fix: show org with regex (#1688) * fix: flag mapping (#1699) * chore(deps-dev): bump @angular/language-service in /console Bumps [@angular/language-service](https://github.com/angular/angular/tree/HEAD/packages/language-service) from 11.2.9 to 11.2.12. - [Release notes](https://github.com/angular/angular/releases) - [Changelog](https://github.com/angular/angular/blob/master/CHANGELOG.md) - [Commits](https://github.com/angular/angular/commits/11.2.12/packages/language-service) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: Silvan <silvan.reusser@gmail.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> * package lock * downgrade grpc * downgrade protobuf types * revert npm packs 🥸 Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Silvan <silvan.reusser@gmail.com> * docs: update run and start section texts (#1745) * update run and start section texts * adds showcase Co-authored-by: Maximilian Panne <maximilian.panne@gmail.com> * fix: additional origin list (#1753) * fix: handle api configs in authz handler (#1755) * fix(console): add model for api keys, fix toast, binding (#1757) * fix: add model for api keys, fix toast, binding * show api clientid * fix: missing patchvalue (#1758) * feat: refresh token (#1728) * begin refresh tokens * refresh tokens * list and revoke refresh tokens * handle remove * tests for refresh tokens * uniqueness and default expiration * rename oidc token methods * cleanup * migration version * Update internal/static/i18n/en.yaml Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * fixes * feat: update oidc pkg for refresh tokens Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * fix: correct json name of clientId in key.json (#1760) * fix: migration version (#1767) * start subscription * eventtypes * fix(login): links (#1778) * fix(login): href for help * fix(login): correct link to tos * fix: access tokens for service users and refresh token infos (#1779) * fix: access token for service user * handle info from refresh request * uniqueness * postpone access token uniqueness change * chore(coc): recommend code of conduct (#1782) * subscribe for events * feat(console): refresh toggle out of granttype context (#1785) * refresh toggle * disable if not code flow, lint * lint * fix: change oidc config order * accept refresh option within flow Co-authored-by: Livio Amstutz <livio.a@gmail.com> * fix: refresh token activation (#1795) * fix: oidc grant type check * docs: add offline_access scope * docs: update refresh token status in supported grant types * fix: update oidc pkg * fix: check refresh token grant type (#1796) * configuration structs * org admins * failed events * fixes Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: Livio Amstutz <livio.a@gmail.com> Co-authored-by: Florian Forster <florian@caos.ch> Co-authored-by: mffap <mpa@caos.ch> Co-authored-by: Maximilian Panne <maximilian.panne@gmail.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * remove comment * aggregate reducer * remove eventtypes * add protoc-get-validate to mod * fix transaltion * upsert * add gender on org admins, allow to retry failed stmts after configurable time * remove if * sub queries * fix: tests * add builder to tests * new search query * rename searchquerybuilder to builder * remove comment from code * test with multiple queries * add filters test * current sequences * make org and org_admins work again * add aggregate type to current sequence * fix(contibute): listing * add validate module * fix: search queries * feat(eventstore): previous aggregate root sequence (#1810) * feat(eventstore): previous aggregate root sequence * fix tests * fix: eventstore v1 test * add col to all mocked rows * next try * fix mig * rename aggregate root to aggregate type * update comment Co-authored-by: Livio Amstutz <livio.a@gmail.com> Co-authored-by: Livio Amstutz <livio.a@gmail.com> * small refactorings * allow update multiple current sequences * unique log id * fix migrations * rename org admin to org owner * improve error handling and logging * fix(migration): optimize prev agg root seq * fix: projection handler test * fix: sub queries * small fixes * additional event types * correct org owner projection * fix primary key * feat(eventstore): jobs for projections (#2026) * fix: template names in login (#1974) * fix: template names in login * fix: error.html * fix: check for features on mgmt only (#1976) * fix: add sentry in ui, http and projection handlers (#1977) * fix: add sentry in ui, http and projection handlers * fix test * fix(eventstore): sub queries (#1805) * sub queries * fix: tests * add builder to tests * new search query * rename searchquerybuilder to builder * remove comment from code * test with multiple queries * add filters test * fix(contibute): listing * add validate module * fix: search queries * remove unused event type in query * ignore query if error in marshal * go mod tidy * update privacy policy query * update queries Co-authored-by: Livio Amstutz <livio.a@gmail.com> * feat: Extend oidc idp with oauth endpoints (#1980) * feat: add oauth attributes to oidc idp configuration * feat: return idpconfig id on create idp * feat: tests * feat: descriptions * feat: docs * feat: tests * docs: update to beta 3 (#1984) * fix: role assertion (#1986) * fix: enum to display access token role assertion * improve assertion descriptions * fix nil pointer * docs: eventstore (#1982) * docs: eventstore * Apply suggestions from code review Co-authored-by: Florian Forster <florian@caos.ch> Co-authored-by: Florian Forster <florian@caos.ch> * fix(sentry): trigger sentry release (#1989) * feat(send sentry release): send sentry release * fix(moved step and added releasetag): moved step and added releasetag * fix: set version for sentry release (#1990) * feat(send sentry release): send sentry release * fix(moved step and added releasetag): moved step and added releasetag * fix(corrected var name): corrected var name Co-authored-by: Livio Amstutz <livio.a@gmail.com> * fix: log error reason on terminate session (#1973) * fix: return default language file, if requested lang does not exist for default login texts (#1988) * fix: return default language file, if requested lang doesnt exists * feat: read default translation file * feat: docs * fix: race condition in auth request unmarshalling (#1993) * feat: handle ui_locales in login (#1994) * fix: handle ui_locales in login * move supportedlanguage func into i18n package * update oidc pkg * fix: handle closed channels on unsubscribe (#1995) * fix: give restore more time (#1997) * fix: translation file read (#2009) * feat: translation file read * feat: readme * fix: enable idp add button for iam users (#2010) * fix: filter event_data (#2011) * feat: Custom message files (#1992) * feat: add get custom message text to admin api * feat: read custom message texts from files * feat: get languages in apis * feat: get languages in apis * feat: get languages in apis * feat: pr feedback * feat: docs * feat: merge main * fix: sms notification (#2013) * fix: phone verifications * feat: fix password reset as sms * fix: phone verification * fix: grpc status in sentry and validation interceptors (#2012) * fix: remove oauth endpoints from oidc config proto (#2014) * try with view * fix(console): disable sw (#2021) * fix: disable sw * angular.json disable sw * project projections * fix typos * customize projections * customizable projections, add change date to projects Co-authored-by: Livio Amstutz <livio.a@gmail.com> Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> Co-authored-by: Florian Forster <florian@caos.ch> Co-authored-by: mffap <mpa@caos.ch> Co-authored-by: Christian Jakob <47860090+thesephirot@users.noreply.github.com> Co-authored-by: Elio Bischof <eliobischof@gmail.com> * env file * typo * correct users * correct migration * fix: merge fail * fix test * fix(tests): unordered matcher * improve currentSequenceMatcher * correct certs * correct certs * add zitadel database on database list * refctor switch in match * enable all handlers * Delete io.env * cleanup * add handlers * rename view to projection * rename view to projection * fix type typo * remove unnecessary logs * refactor stmts * simplify interval calculation * fix tests * fix unlock test * fix migration * migs * fix(operator): update cockroach and flyway versions (#2138) * chore(deps): bump k8s.io/apiextensions-apiserver from 0.19.2 to 0.21.3 Bumps [k8s.io/apiextensions-apiserver](https://github.com/kubernetes/apiextensions-apiserver) from 0.19.2 to 0.21.3. - [Release notes](https://github.com/kubernetes/apiextensions-apiserver/releases) - [Commits](https://github.com/kubernetes/apiextensions-apiserver/compare/v0.19.2...v0.21.3) --- updated-dependencies: - dependency-name: k8s.io/apiextensions-apiserver dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> * chore(deps): bump google.golang.org/api from 0.34.0 to 0.52.0 Bumps [google.golang.org/api](https://github.com/googleapis/google-api-go-client) from 0.34.0 to 0.52.0. - [Release notes](https://github.com/googleapis/google-api-go-client/releases) - [Changelog](https://github.com/googleapis/google-api-go-client/blob/master/CHANGES.md) - [Commits](https://github.com/googleapis/google-api-go-client/compare/v0.34.0...v0.52.0) --- updated-dependencies: - dependency-name: google.golang.org/api dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> * start update dependencies * update mods and otlp * fix(build): update to go 1.16 * old version for k8s mods * update k8s versions * update orbos * fix(operator): update cockroach and flyway version * Update images.go Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Stefan Benz <stefan@caos.ch> * fix import * fix typo * fix(migration): add org projection * fix(projection): correct table for org events in org owners * better insert stmt * fix typo * fix typo * set max connection lifetime * set max conns and conn lifetime in eventstore v1 * configure sql connection settings * add mig for agg type index * fix replace tab in yaml * check requeue at least 500ms * split column in column and condition * remove useless comment * mig versions * fix migs Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: Livio Amstutz <livio.a@gmail.com> Co-authored-by: Florian Forster <florian@caos.ch> Co-authored-by: mffap <mpa@caos.ch> Co-authored-by: Maximilian Panne <maximilian.panne@gmail.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> Co-authored-by: Christian Jakob <47860090+thesephirot@users.noreply.github.com> Co-authored-by: Elio Bischof <eliobischof@gmail.com> Co-authored-by: Stefan Benz <stefan@caos.ch>
844 lines
24 KiB
Go
844 lines
24 KiB
Go
package sql
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"database/sql/driver"
|
|
"reflect"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/DATA-DOG/go-sqlmock"
|
|
"github.com/caos/zitadel/internal/errors"
|
|
"github.com/caos/zitadel/internal/eventstore/repository"
|
|
"github.com/lib/pq"
|
|
)
|
|
|
|
func Test_getCondition(t *testing.T) {
|
|
type args struct {
|
|
filter *repository.Filter
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want string
|
|
}{
|
|
{
|
|
name: "equals",
|
|
args: args{filter: repository.NewFilter(repository.FieldAggregateID, "", repository.OperationEquals)},
|
|
want: "aggregate_id = ?",
|
|
},
|
|
{
|
|
name: "greater",
|
|
args: args{filter: repository.NewFilter(repository.FieldSequence, 0, repository.OperationGreater)},
|
|
want: "event_sequence > ?",
|
|
},
|
|
{
|
|
name: "less",
|
|
args: args{filter: repository.NewFilter(repository.FieldSequence, 5000, repository.OperationLess)},
|
|
want: "event_sequence < ?",
|
|
},
|
|
{
|
|
name: "in list",
|
|
args: args{filter: repository.NewFilter(repository.FieldAggregateType, []repository.AggregateType{"movies", "actors"}, repository.OperationIn)},
|
|
want: "aggregate_type = ANY(?)",
|
|
},
|
|
{
|
|
name: "invalid operation",
|
|
args: args{filter: repository.NewFilter(repository.FieldAggregateType, []repository.AggregateType{"movies", "actors"}, repository.Operation(-1))},
|
|
want: "",
|
|
},
|
|
{
|
|
name: "invalid field",
|
|
args: args{filter: repository.NewFilter(repository.Field(-1), []repository.AggregateType{"movies", "actors"}, repository.OperationEquals)},
|
|
want: "",
|
|
},
|
|
{
|
|
name: "invalid field and operation",
|
|
args: args{filter: repository.NewFilter(repository.Field(-1), []repository.AggregateType{"movies", "actors"}, repository.Operation(-1))},
|
|
want: "",
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
db := &CRDB{}
|
|
if got := getCondition(db, tt.args.filter); got != tt.want {
|
|
t.Errorf("getCondition() = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func Test_prepareColumns(t *testing.T) {
|
|
type fields struct {
|
|
dbRow []interface{}
|
|
}
|
|
type args struct {
|
|
columns repository.Columns
|
|
dest interface{}
|
|
dbErr error
|
|
}
|
|
type res struct {
|
|
query string
|
|
expected interface{}
|
|
dbErr func(error) bool
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
res res
|
|
fields fields
|
|
}{
|
|
{
|
|
name: "invalid columns",
|
|
args: args{columns: repository.Columns(-1)},
|
|
res: res{
|
|
query: "",
|
|
dbErr: func(err error) bool { return err == nil },
|
|
},
|
|
},
|
|
{
|
|
name: "max column",
|
|
args: args{
|
|
columns: repository.ColumnsMaxSequence,
|
|
dest: new(Sequence),
|
|
},
|
|
res: res{
|
|
query: "SELECT MAX(event_sequence) FROM eventstore.events",
|
|
expected: Sequence(5),
|
|
},
|
|
fields: fields{
|
|
dbRow: []interface{}{Sequence(5)},
|
|
},
|
|
},
|
|
{
|
|
name: "max sequence wrong dest type",
|
|
args: args{
|
|
columns: repository.ColumnsMaxSequence,
|
|
dest: new(uint64),
|
|
},
|
|
res: res{
|
|
query: "SELECT MAX(event_sequence) FROM eventstore.events",
|
|
dbErr: errors.IsErrorInvalidArgument,
|
|
},
|
|
},
|
|
{
|
|
name: "events",
|
|
args: args{
|
|
columns: repository.ColumnsEvent,
|
|
dest: &[]*repository.Event{},
|
|
},
|
|
res: res{
|
|
query: "SELECT creation_date, event_type, event_sequence, previous_aggregate_sequence, previous_aggregate_type_sequence, event_data, editor_service, editor_user, resource_owner, aggregate_type, aggregate_id, aggregate_version FROM eventstore.events",
|
|
expected: []*repository.Event{
|
|
{AggregateID: "hodor", AggregateType: "user", Sequence: 5, Data: make(Data, 0)},
|
|
},
|
|
},
|
|
fields: fields{
|
|
dbRow: []interface{}{time.Time{}, repository.EventType(""), uint64(5), Sequence(0), Sequence(0), Data(nil), "", "", "", repository.AggregateType("user"), "hodor", repository.Version("")},
|
|
},
|
|
},
|
|
{
|
|
name: "events wrong dest type",
|
|
args: args{
|
|
columns: repository.ColumnsEvent,
|
|
dest: []*repository.Event{},
|
|
},
|
|
res: res{
|
|
query: "SELECT creation_date, event_type, event_sequence, previous_aggregate_sequence, previous_aggregate_type_sequence, event_data, editor_service, editor_user, resource_owner, aggregate_type, aggregate_id, aggregate_version FROM eventstore.events",
|
|
dbErr: errors.IsErrorInvalidArgument,
|
|
},
|
|
},
|
|
{
|
|
name: "event query error",
|
|
args: args{
|
|
columns: repository.ColumnsEvent,
|
|
dest: &[]*repository.Event{},
|
|
dbErr: sql.ErrConnDone,
|
|
},
|
|
res: res{
|
|
query: "SELECT creation_date, event_type, event_sequence, previous_aggregate_sequence, previous_aggregate_type_sequence, event_data, editor_service, editor_user, resource_owner, aggregate_type, aggregate_id, aggregate_version FROM eventstore.events",
|
|
dbErr: errors.IsInternal,
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
crdb := &CRDB{}
|
|
query, rowScanner := prepareColumns(crdb, tt.args.columns)
|
|
if query != tt.res.query {
|
|
t.Errorf("prepareColumns() got = %s, want %s", query, tt.res.query)
|
|
}
|
|
if tt.res.query == "" && rowScanner != nil {
|
|
t.Errorf("row scanner should be nil")
|
|
}
|
|
if rowScanner == nil {
|
|
return
|
|
}
|
|
err := rowScanner(prepareTestScan(tt.args.dbErr, tt.fields.dbRow), tt.args.dest)
|
|
if err != nil && tt.res.dbErr == nil || err != nil && !tt.res.dbErr(err) || err == nil && tt.res.dbErr != nil {
|
|
t.Errorf("wrong error type in rowScanner got: %v", err)
|
|
return
|
|
}
|
|
if tt.res.dbErr != nil && tt.res.dbErr(err) {
|
|
return
|
|
}
|
|
if !reflect.DeepEqual(reflect.Indirect(reflect.ValueOf(tt.args.dest)).Interface(), tt.res.expected) {
|
|
t.Errorf("unexpected result from rowScanner \nwant: %+v \ngot: %+v", tt.fields.dbRow, reflect.Indirect(reflect.ValueOf(tt.args.dest)).Interface())
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func prepareTestScan(err error, res []interface{}) scan {
|
|
return func(dests ...interface{}) error {
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if len(dests) != len(res) {
|
|
return errors.ThrowInvalidArgumentf(nil, "SQL-NML1q", "expected len %d got %d", len(res), len(dests))
|
|
}
|
|
for i, r := range res {
|
|
reflect.ValueOf(dests[i]).Elem().Set(reflect.ValueOf(r))
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func Test_prepareCondition(t *testing.T) {
|
|
type args struct {
|
|
filters [][]*repository.Filter
|
|
}
|
|
type res struct {
|
|
clause string
|
|
values []interface{}
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
res res
|
|
}{
|
|
{
|
|
name: "nil filters",
|
|
args: args{
|
|
filters: nil,
|
|
},
|
|
res: res{
|
|
clause: "",
|
|
values: nil,
|
|
},
|
|
},
|
|
{
|
|
name: "empty filters",
|
|
args: args{
|
|
filters: [][]*repository.Filter{},
|
|
},
|
|
res: res{
|
|
clause: "",
|
|
values: nil,
|
|
},
|
|
},
|
|
{
|
|
name: "invalid condition",
|
|
args: args{
|
|
filters: [][]*repository.Filter{
|
|
{
|
|
repository.NewFilter(repository.FieldAggregateID, "wrong", repository.Operation(-1)),
|
|
},
|
|
},
|
|
},
|
|
res: res{
|
|
clause: "",
|
|
values: nil,
|
|
},
|
|
},
|
|
{
|
|
name: "array as condition value",
|
|
args: args{
|
|
filters: [][]*repository.Filter{
|
|
{
|
|
repository.NewFilter(repository.FieldAggregateType, []repository.AggregateType{"user", "org"}, repository.OperationIn),
|
|
},
|
|
},
|
|
},
|
|
res: res{
|
|
clause: " WHERE ( aggregate_type = ANY(?) )",
|
|
values: []interface{}{pq.Array([]repository.AggregateType{"user", "org"})},
|
|
},
|
|
},
|
|
{
|
|
name: "multiple filters",
|
|
args: args{
|
|
filters: [][]*repository.Filter{
|
|
{
|
|
repository.NewFilter(repository.FieldAggregateType, []repository.AggregateType{"user", "org"}, repository.OperationIn),
|
|
repository.NewFilter(repository.FieldAggregateID, "1234", repository.OperationEquals),
|
|
repository.NewFilter(repository.FieldEventType, []repository.EventType{"user.created", "org.created"}, repository.OperationIn),
|
|
},
|
|
},
|
|
},
|
|
res: res{
|
|
clause: " WHERE ( aggregate_type = ANY(?) AND aggregate_id = ? AND event_type = ANY(?) )",
|
|
values: []interface{}{pq.Array([]repository.AggregateType{"user", "org"}), "1234", pq.Array([]repository.EventType{"user.created", "org.created"})},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
crdb := &CRDB{}
|
|
gotClause, gotValues := prepareCondition(crdb, tt.args.filters)
|
|
if gotClause != tt.res.clause {
|
|
t.Errorf("prepareCondition() gotClause = %v, want %v", gotClause, tt.res.clause)
|
|
}
|
|
if len(gotValues) != len(tt.res.values) {
|
|
t.Errorf("wrong length of gotten values got = %d, want %d", len(gotValues), len(tt.res.values))
|
|
return
|
|
}
|
|
for i, value := range gotValues {
|
|
if !reflect.DeepEqual(value, tt.res.values[i]) {
|
|
t.Errorf("prepareCondition() gotValues = %v, want %v", gotValues, tt.res.values)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func Test_query_events_with_crdb(t *testing.T) {
|
|
type args struct {
|
|
searchQuery *repository.SearchQuery
|
|
}
|
|
type fields struct {
|
|
existingEvents []*repository.Event
|
|
client *sql.DB
|
|
}
|
|
type res struct {
|
|
eventCount int
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
args args
|
|
res res
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "aggregate type filter no events",
|
|
args: args{
|
|
searchQuery: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
repository.NewFilter(repository.FieldAggregateType, "not found", repository.OperationEquals),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
client: testCRDBClient,
|
|
existingEvents: []*repository.Event{
|
|
generateEvent(t, "300"),
|
|
generateEvent(t, "300"),
|
|
generateEvent(t, "300"),
|
|
},
|
|
},
|
|
res: res{
|
|
eventCount: 0,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "aggregate type filter events found",
|
|
args: args{
|
|
searchQuery: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
repository.NewFilter(repository.FieldAggregateType, t.Name(), repository.OperationEquals),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
client: testCRDBClient,
|
|
existingEvents: []*repository.Event{
|
|
generateEvent(t, "301"),
|
|
generateEvent(t, "302"),
|
|
generateEvent(t, "302"),
|
|
generateEvent(t, "303", func(e *repository.Event) { e.AggregateType = "not in list" }),
|
|
},
|
|
},
|
|
res: res{
|
|
eventCount: 3,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "aggregate type and id filter events found",
|
|
args: args{
|
|
searchQuery: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
repository.NewFilter(repository.FieldAggregateType, t.Name(), repository.OperationEquals),
|
|
repository.NewFilter(repository.FieldAggregateID, "303", repository.OperationEquals),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
client: testCRDBClient,
|
|
existingEvents: []*repository.Event{
|
|
generateEvent(t, "303"),
|
|
generateEvent(t, "303"),
|
|
generateEvent(t, "303"),
|
|
generateEvent(t, "304", func(e *repository.Event) { e.AggregateType = "not in list" }),
|
|
generateEvent(t, "305"),
|
|
},
|
|
},
|
|
res: res{
|
|
eventCount: 3,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "resource owner filter events found",
|
|
args: args{
|
|
searchQuery: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
repository.NewFilter(repository.FieldResourceOwner, "caos", repository.OperationEquals),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
client: testCRDBClient,
|
|
existingEvents: []*repository.Event{
|
|
generateEvent(t, "306", func(e *repository.Event) { e.ResourceOwner = "caos" }),
|
|
generateEvent(t, "307", func(e *repository.Event) { e.ResourceOwner = "caos" }),
|
|
generateEvent(t, "308", func(e *repository.Event) { e.ResourceOwner = "caos" }),
|
|
generateEvent(t, "309", func(e *repository.Event) { e.ResourceOwner = "orgID" }),
|
|
generateEvent(t, "309", func(e *repository.Event) { e.ResourceOwner = "orgID" }),
|
|
},
|
|
},
|
|
res: res{
|
|
eventCount: 3,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "editor service filter events found",
|
|
args: args{
|
|
searchQuery: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
repository.NewFilter(repository.FieldEditorService, "MANAGEMENT-API", repository.OperationEquals),
|
|
repository.NewFilter(repository.FieldEditorService, "ADMIN-API", repository.OperationEquals),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
client: testCRDBClient,
|
|
existingEvents: []*repository.Event{
|
|
generateEvent(t, "307", func(e *repository.Event) { e.EditorService = "MANAGEMENT-API" }),
|
|
generateEvent(t, "307", func(e *repository.Event) { e.EditorService = "MANAGEMENT-API" }),
|
|
generateEvent(t, "308", func(e *repository.Event) { e.EditorService = "ADMIN-API" }),
|
|
generateEvent(t, "309", func(e *repository.Event) { e.EditorService = "AUTHAPI" }),
|
|
generateEvent(t, "309", func(e *repository.Event) { e.EditorService = "AUTHAPI" }),
|
|
},
|
|
},
|
|
res: res{
|
|
eventCount: 3,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "editor user filter events found",
|
|
args: args{
|
|
searchQuery: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
repository.NewFilter(repository.FieldEditorUser, "adlerhurst", repository.OperationEquals),
|
|
repository.NewFilter(repository.FieldEditorUser, "nobody", repository.OperationEquals),
|
|
repository.NewFilter(repository.FieldEditorUser, "", repository.OperationEquals),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
client: testCRDBClient,
|
|
existingEvents: []*repository.Event{
|
|
generateEvent(t, "310", func(e *repository.Event) { e.EditorUser = "adlerhurst" }),
|
|
generateEvent(t, "310", func(e *repository.Event) { e.EditorUser = "adlerhurst" }),
|
|
generateEvent(t, "310", func(e *repository.Event) { e.EditorUser = "nobody" }),
|
|
generateEvent(t, "311", func(e *repository.Event) { e.EditorUser = "" }),
|
|
generateEvent(t, "311", func(e *repository.Event) { e.EditorUser = "" }),
|
|
generateEvent(t, "312", func(e *repository.Event) { e.EditorUser = "fforootd" }),
|
|
generateEvent(t, "312", func(e *repository.Event) { e.EditorUser = "fforootd" }),
|
|
},
|
|
},
|
|
res: res{
|
|
eventCount: 5,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "event type filter events found",
|
|
args: args{
|
|
searchQuery: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
repository.NewFilter(repository.FieldEventType, repository.EventType("user.created"), repository.OperationEquals),
|
|
repository.NewFilter(repository.FieldEventType, repository.EventType("user.updated"), repository.OperationEquals),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
client: testCRDBClient,
|
|
existingEvents: []*repository.Event{
|
|
generateEvent(t, "311", func(e *repository.Event) { e.Type = "user.created" }),
|
|
generateEvent(t, "311", func(e *repository.Event) { e.Type = "user.updated" }),
|
|
generateEvent(t, "311", func(e *repository.Event) { e.Type = "user.deactivated" }),
|
|
generateEvent(t, "311", func(e *repository.Event) { e.Type = "user.locked" }),
|
|
generateEvent(t, "312", func(e *repository.Event) { e.Type = "user.created" }),
|
|
generateEvent(t, "312", func(e *repository.Event) { e.Type = "user.updated" }),
|
|
generateEvent(t, "312", func(e *repository.Event) { e.Type = "user.deactivated" }),
|
|
generateEvent(t, "312", func(e *repository.Event) { e.Type = "user.reactivated" }),
|
|
generateEvent(t, "313", func(e *repository.Event) { e.Type = "user.locked" }),
|
|
},
|
|
},
|
|
res: res{
|
|
eventCount: 7,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "fail because no filter",
|
|
args: args{
|
|
searchQuery: &repository.SearchQuery{},
|
|
},
|
|
fields: fields{
|
|
client: testCRDBClient,
|
|
existingEvents: []*repository.Event{},
|
|
},
|
|
res: res{
|
|
eventCount: 0,
|
|
},
|
|
wantErr: true,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
db := &CRDB{
|
|
client: tt.fields.client,
|
|
}
|
|
|
|
// setup initial data for query
|
|
if err := db.Push(context.Background(), tt.fields.existingEvents); err != nil {
|
|
t.Errorf("error in setup = %v", err)
|
|
return
|
|
}
|
|
|
|
events := []*repository.Event{}
|
|
if err := query(context.Background(), db, tt.args.searchQuery, &events); (err != nil) != tt.wantErr {
|
|
t.Errorf("CRDB.query() error = %v, wantErr %v", err, tt.wantErr)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func Test_query_events_mocked(t *testing.T) {
|
|
type args struct {
|
|
query *repository.SearchQuery
|
|
dest interface{}
|
|
}
|
|
type res struct {
|
|
wantErr bool
|
|
}
|
|
type fields struct {
|
|
mock *dbMock
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
fields fields
|
|
res res
|
|
}{
|
|
{
|
|
name: "with order by desc",
|
|
args: args{
|
|
dest: &[]*repository.Event{},
|
|
query: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Desc: true,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
{
|
|
Field: repository.FieldAggregateType,
|
|
Value: repository.AggregateType("user"),
|
|
Operation: repository.OperationEquals,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
mock: newMockClient(t).expectQuery(t,
|
|
`SELECT creation_date, event_type, event_sequence, previous_aggregate_sequence, previous_aggregate_type_sequence, event_data, editor_service, editor_user, resource_owner, aggregate_type, aggregate_id, aggregate_version FROM eventstore.events WHERE \( aggregate_type = \$1 \) ORDER BY event_sequence DESC`,
|
|
[]driver.Value{repository.AggregateType("user")},
|
|
),
|
|
},
|
|
res: res{
|
|
wantErr: false,
|
|
},
|
|
},
|
|
{
|
|
name: "with limit",
|
|
args: args{
|
|
dest: &[]*repository.Event{},
|
|
query: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Desc: false,
|
|
Limit: 5,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
{
|
|
Field: repository.FieldAggregateType,
|
|
Value: repository.AggregateType("user"),
|
|
Operation: repository.OperationEquals,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
mock: newMockClient(t).expectQuery(t,
|
|
`SELECT creation_date, event_type, event_sequence, previous_aggregate_sequence, previous_aggregate_type_sequence, event_data, editor_service, editor_user, resource_owner, aggregate_type, aggregate_id, aggregate_version FROM eventstore.events WHERE \( aggregate_type = \$1 \) ORDER BY event_sequence LIMIT \$2`,
|
|
[]driver.Value{repository.AggregateType("user"), uint64(5)},
|
|
),
|
|
},
|
|
res: res{
|
|
wantErr: false,
|
|
},
|
|
},
|
|
{
|
|
name: "with limit and order by desc",
|
|
args: args{
|
|
dest: &[]*repository.Event{},
|
|
query: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Desc: true,
|
|
Limit: 5,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
{
|
|
Field: repository.FieldAggregateType,
|
|
Value: repository.AggregateType("user"),
|
|
Operation: repository.OperationEquals,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
mock: newMockClient(t).expectQuery(t,
|
|
`SELECT creation_date, event_type, event_sequence, previous_aggregate_sequence, previous_aggregate_type_sequence, event_data, editor_service, editor_user, resource_owner, aggregate_type, aggregate_id, aggregate_version FROM eventstore.events WHERE \( aggregate_type = \$1 \) ORDER BY event_sequence DESC LIMIT \$2`,
|
|
[]driver.Value{repository.AggregateType("user"), uint64(5)},
|
|
),
|
|
},
|
|
res: res{
|
|
wantErr: false,
|
|
},
|
|
},
|
|
{
|
|
name: "error sql conn closed",
|
|
args: args{
|
|
dest: &[]*repository.Event{},
|
|
query: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Desc: true,
|
|
Limit: 0,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
{
|
|
Field: repository.FieldAggregateType,
|
|
Value: repository.AggregateType("user"),
|
|
Operation: repository.OperationEquals,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
mock: newMockClient(t).expectQueryErr(t,
|
|
`SELECT creation_date, event_type, event_sequence, previous_aggregate_sequence, previous_aggregate_type_sequence, event_data, editor_service, editor_user, resource_owner, aggregate_type, aggregate_id, aggregate_version FROM eventstore.events WHERE \( aggregate_type = \$1 \) ORDER BY event_sequence DESC`,
|
|
[]driver.Value{repository.AggregateType("user")},
|
|
sql.ErrConnDone),
|
|
},
|
|
res: res{
|
|
wantErr: true,
|
|
},
|
|
},
|
|
{
|
|
name: "error unexpected dest",
|
|
args: args{
|
|
dest: nil,
|
|
query: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Desc: true,
|
|
Limit: 0,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
{
|
|
Field: repository.FieldAggregateType,
|
|
Value: repository.AggregateType("user"),
|
|
Operation: repository.OperationEquals,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
mock: newMockClient(t).expectQuery(t,
|
|
`SELECT creation_date, event_type, event_sequence, previous_aggregate_sequence, previous_aggregate_type_sequence, event_data, editor_service, editor_user, resource_owner, aggregate_type, aggregate_id, aggregate_version FROM eventstore.events WHERE \( aggregate_type = \$1 \) ORDER BY event_sequence DESC`,
|
|
[]driver.Value{repository.AggregateType("user")},
|
|
&repository.Event{Sequence: 100}),
|
|
},
|
|
res: res{
|
|
wantErr: true,
|
|
},
|
|
},
|
|
{
|
|
name: "error no columns",
|
|
args: args{
|
|
query: &repository.SearchQuery{
|
|
Columns: repository.Columns(-1),
|
|
},
|
|
},
|
|
res: res{
|
|
wantErr: true,
|
|
},
|
|
},
|
|
{
|
|
name: "invalid condition",
|
|
args: args{
|
|
query: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
{},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
res: res{
|
|
wantErr: true,
|
|
},
|
|
},
|
|
{
|
|
name: "with subqueries",
|
|
args: args{
|
|
dest: &[]*repository.Event{},
|
|
query: &repository.SearchQuery{
|
|
Columns: repository.ColumnsEvent,
|
|
Desc: true,
|
|
Limit: 5,
|
|
Filters: [][]*repository.Filter{
|
|
{
|
|
{
|
|
Field: repository.FieldAggregateType,
|
|
Value: repository.AggregateType("user"),
|
|
Operation: repository.OperationEquals,
|
|
},
|
|
},
|
|
{
|
|
{
|
|
Field: repository.FieldAggregateType,
|
|
Value: repository.AggregateType("org"),
|
|
Operation: repository.OperationEquals,
|
|
},
|
|
{
|
|
Field: repository.FieldAggregateID,
|
|
Value: "asdf42",
|
|
Operation: repository.OperationEquals,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
fields: fields{
|
|
mock: newMockClient(t).expectQuery(t,
|
|
`SELECT creation_date, event_type, event_sequence, previous_aggregate_sequence, previous_aggregate_type_sequence, event_data, editor_service, editor_user, resource_owner, aggregate_type, aggregate_id, aggregate_version FROM eventstore.events WHERE \( aggregate_type = \$1 \) OR \( aggregate_type = \$2 AND aggregate_id = \$3 \) ORDER BY event_sequence DESC LIMIT \$4`,
|
|
[]driver.Value{repository.AggregateType("user"), repository.AggregateType("org"), "asdf42", uint64(5)},
|
|
),
|
|
},
|
|
res: res{
|
|
wantErr: false,
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
crdb := &CRDB{}
|
|
if tt.fields.mock != nil {
|
|
crdb.client = tt.fields.mock.client
|
|
}
|
|
|
|
err := query(context.Background(), crdb, tt.args.query, tt.args.dest)
|
|
if (err != nil) != tt.res.wantErr {
|
|
t.Errorf("query() error = %v, wantErr %v", err, tt.res.wantErr)
|
|
}
|
|
|
|
if tt.fields.mock == nil {
|
|
return
|
|
}
|
|
|
|
if err := tt.fields.mock.mock.ExpectationsWereMet(); err != nil {
|
|
t.Errorf("not all expectaions met: %v", err)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
type dbMock struct {
|
|
mock sqlmock.Sqlmock
|
|
client *sql.DB
|
|
}
|
|
|
|
func (m *dbMock) expectQuery(t *testing.T, expectedQuery string, args []driver.Value, events ...*repository.Event) *dbMock {
|
|
query := m.mock.ExpectQuery(expectedQuery).WithArgs(args...)
|
|
rows := sqlmock.NewRows([]string{"event_sequence"})
|
|
for _, event := range events {
|
|
rows = rows.AddRow(event.Sequence)
|
|
}
|
|
query.WillReturnRows(rows).RowsWillBeClosed()
|
|
return m
|
|
}
|
|
|
|
func (m *dbMock) expectQueryErr(t *testing.T, expectedQuery string, args []driver.Value, err error) *dbMock {
|
|
m.mock.ExpectQuery(expectedQuery).WithArgs(args...).WillReturnError(err)
|
|
return m
|
|
}
|
|
|
|
func newMockClient(t *testing.T) *dbMock {
|
|
t.Helper()
|
|
db, mock, err := sqlmock.New()
|
|
if err != nil {
|
|
t.Errorf("unable to create mock client: %v", err)
|
|
t.FailNow()
|
|
return nil
|
|
}
|
|
|
|
return &dbMock{
|
|
mock: mock,
|
|
client: db,
|
|
}
|
|
}
|