mirror of
https://github.com/netbirdio/netbird.git
synced 2025-01-10 16:08:14 +01:00
ddc365f7a0
--------- Co-authored-by: Pascal Fischer <32096965+pascal-fischer@users.noreply.github.com> Co-authored-by: bcmmbaga <bethuelmbaga12@gmail.com> Co-authored-by: Maycon Santos <mlsmaycon@gmail.com> Co-authored-by: Zoltan Papp <zoltan.pmail@gmail.com>
255 lines
8.6 KiB
Go
255 lines
8.6 KiB
Go
package networks
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/netbirdio/netbird/management/server/groups"
|
|
"github.com/netbirdio/netbird/management/server/mock_server"
|
|
"github.com/netbirdio/netbird/management/server/networks/resources"
|
|
"github.com/netbirdio/netbird/management/server/networks/routers"
|
|
"github.com/netbirdio/netbird/management/server/networks/types"
|
|
"github.com/netbirdio/netbird/management/server/permissions"
|
|
"github.com/netbirdio/netbird/management/server/store"
|
|
)
|
|
|
|
func Test_GetAllNetworksReturnsNetworks(t *testing.T) {
|
|
ctx := context.Background()
|
|
accountID := "testAccountId"
|
|
userID := "allowedUser"
|
|
|
|
s, cleanUp, err := store.NewTestStoreFromSQL(context.Background(), "../testdata/networks.sql", t.TempDir())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
t.Cleanup(cleanUp)
|
|
am := mock_server.MockAccountManager{}
|
|
permissionsManager := permissions.NewManagerMock()
|
|
groupsManager := groups.NewManagerMock()
|
|
routerManager := routers.NewManagerMock()
|
|
resourcesManager := resources.NewManager(s, permissionsManager, groupsManager, &am)
|
|
manager := NewManager(s, permissionsManager, resourcesManager, routerManager, &am)
|
|
|
|
networks, err := manager.GetAllNetworks(ctx, accountID, userID)
|
|
require.NoError(t, err)
|
|
require.Len(t, networks, 1)
|
|
require.Equal(t, "testNetworkId", networks[0].ID)
|
|
}
|
|
|
|
func Test_GetAllNetworksReturnsPermissionDenied(t *testing.T) {
|
|
ctx := context.Background()
|
|
accountID := "testAccountId"
|
|
userID := "invalidUser"
|
|
|
|
s, cleanUp, err := store.NewTestStoreFromSQL(context.Background(), "../testdata/networks.sql", t.TempDir())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
t.Cleanup(cleanUp)
|
|
am := mock_server.MockAccountManager{}
|
|
permissionsManager := permissions.NewManagerMock()
|
|
groupsManager := groups.NewManagerMock()
|
|
routerManager := routers.NewManagerMock()
|
|
resourcesManager := resources.NewManager(s, permissionsManager, groupsManager, &am)
|
|
manager := NewManager(s, permissionsManager, resourcesManager, routerManager, &am)
|
|
|
|
networks, err := manager.GetAllNetworks(ctx, accountID, userID)
|
|
require.Error(t, err)
|
|
require.Nil(t, networks)
|
|
}
|
|
|
|
func Test_GetNetworkReturnsNetwork(t *testing.T) {
|
|
ctx := context.Background()
|
|
accountID := "testAccountId"
|
|
userID := "allowedUser"
|
|
networkID := "testNetworkId"
|
|
|
|
s, cleanUp, err := store.NewTestStoreFromSQL(context.Background(), "../testdata/networks.sql", t.TempDir())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
t.Cleanup(cleanUp)
|
|
am := mock_server.MockAccountManager{}
|
|
permissionsManager := permissions.NewManagerMock()
|
|
groupsManager := groups.NewManagerMock()
|
|
routerManager := routers.NewManagerMock()
|
|
resourcesManager := resources.NewManager(s, permissionsManager, groupsManager, &am)
|
|
manager := NewManager(s, permissionsManager, resourcesManager, routerManager, &am)
|
|
|
|
networks, err := manager.GetNetwork(ctx, accountID, userID, networkID)
|
|
require.NoError(t, err)
|
|
require.Equal(t, "testNetworkId", networks.ID)
|
|
}
|
|
|
|
func Test_GetNetworkReturnsPermissionDenied(t *testing.T) {
|
|
ctx := context.Background()
|
|
accountID := "testAccountId"
|
|
userID := "invalidUser"
|
|
networkID := "testNetworkId"
|
|
|
|
s, cleanUp, err := store.NewTestStoreFromSQL(context.Background(), "../testdata/networks.sql", t.TempDir())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
t.Cleanup(cleanUp)
|
|
am := mock_server.MockAccountManager{}
|
|
permissionsManager := permissions.NewManagerMock()
|
|
groupsManager := groups.NewManagerMock()
|
|
routerManager := routers.NewManagerMock()
|
|
resourcesManager := resources.NewManager(s, permissionsManager, groupsManager, &am)
|
|
manager := NewManager(s, permissionsManager, resourcesManager, routerManager, &am)
|
|
|
|
network, err := manager.GetNetwork(ctx, accountID, userID, networkID)
|
|
require.Error(t, err)
|
|
require.Nil(t, network)
|
|
}
|
|
|
|
func Test_CreateNetworkSuccessfully(t *testing.T) {
|
|
ctx := context.Background()
|
|
userID := "allowedUser"
|
|
network := &types.Network{
|
|
AccountID: "testAccountId",
|
|
Name: "new-network",
|
|
}
|
|
|
|
s, cleanUp, err := store.NewTestStoreFromSQL(context.Background(), "../testdata/networks.sql", t.TempDir())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
t.Cleanup(cleanUp)
|
|
am := mock_server.MockAccountManager{}
|
|
permissionsManager := permissions.NewManagerMock()
|
|
groupsManager := groups.NewManagerMock()
|
|
routerManager := routers.NewManagerMock()
|
|
resourcesManager := resources.NewManager(s, permissionsManager, groupsManager, &am)
|
|
manager := NewManager(s, permissionsManager, resourcesManager, routerManager, &am)
|
|
|
|
createdNetwork, err := manager.CreateNetwork(ctx, userID, network)
|
|
require.NoError(t, err)
|
|
require.Equal(t, network.Name, createdNetwork.Name)
|
|
}
|
|
|
|
func Test_CreateNetworkFailsWithPermissionDenied(t *testing.T) {
|
|
ctx := context.Background()
|
|
userID := "invalidUser"
|
|
network := &types.Network{
|
|
AccountID: "testAccountId",
|
|
Name: "new-network",
|
|
}
|
|
|
|
s, cleanUp, err := store.NewTestStoreFromSQL(context.Background(), "../testdata/networks.sql", t.TempDir())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
t.Cleanup(cleanUp)
|
|
am := mock_server.MockAccountManager{}
|
|
permissionsManager := permissions.NewManagerMock()
|
|
groupsManager := groups.NewManagerMock()
|
|
routerManager := routers.NewManagerMock()
|
|
resourcesManager := resources.NewManager(s, permissionsManager, groupsManager, &am)
|
|
manager := NewManager(s, permissionsManager, resourcesManager, routerManager, &am)
|
|
|
|
createdNetwork, err := manager.CreateNetwork(ctx, userID, network)
|
|
require.Error(t, err)
|
|
require.Nil(t, createdNetwork)
|
|
}
|
|
|
|
func Test_DeleteNetworkSuccessfully(t *testing.T) {
|
|
ctx := context.Background()
|
|
accountID := "testAccountId"
|
|
userID := "allowedUser"
|
|
networkID := "testNetworkId"
|
|
|
|
s, cleanUp, err := store.NewTestStoreFromSQL(context.Background(), "../testdata/networks.sql", t.TempDir())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
t.Cleanup(cleanUp)
|
|
am := mock_server.MockAccountManager{}
|
|
permissionsManager := permissions.NewManagerMock()
|
|
groupsManager := groups.NewManagerMock()
|
|
routerManager := routers.NewManagerMock()
|
|
resourcesManager := resources.NewManager(s, permissionsManager, groupsManager, &am)
|
|
manager := NewManager(s, permissionsManager, resourcesManager, routerManager, &am)
|
|
|
|
err = manager.DeleteNetwork(ctx, accountID, userID, networkID)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func Test_DeleteNetworkFailsWithPermissionDenied(t *testing.T) {
|
|
ctx := context.Background()
|
|
accountID := "testAccountId"
|
|
userID := "invalidUser"
|
|
networkID := "testNetworkId"
|
|
|
|
s, cleanUp, err := store.NewTestStoreFromSQL(context.Background(), "../testdata/networks.sql", t.TempDir())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
t.Cleanup(cleanUp)
|
|
am := mock_server.MockAccountManager{}
|
|
permissionsManager := permissions.NewManagerMock()
|
|
groupsManager := groups.NewManagerMock()
|
|
routerManager := routers.NewManagerMock()
|
|
resourcesManager := resources.NewManager(s, permissionsManager, groupsManager, &am)
|
|
manager := NewManager(s, permissionsManager, resourcesManager, routerManager, &am)
|
|
|
|
err = manager.DeleteNetwork(ctx, accountID, userID, networkID)
|
|
require.Error(t, err)
|
|
}
|
|
|
|
func Test_UpdateNetworkSuccessfully(t *testing.T) {
|
|
ctx := context.Background()
|
|
userID := "allowedUser"
|
|
network := &types.Network{
|
|
AccountID: "testAccountId",
|
|
ID: "testNetworkId",
|
|
Name: "new-network",
|
|
}
|
|
|
|
s, cleanUp, err := store.NewTestStoreFromSQL(context.Background(), "../testdata/networks.sql", t.TempDir())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
t.Cleanup(cleanUp)
|
|
am := mock_server.MockAccountManager{}
|
|
permissionsManager := permissions.NewManagerMock()
|
|
groupsManager := groups.NewManagerMock()
|
|
routerManager := routers.NewManagerMock()
|
|
resourcesManager := resources.NewManager(s, permissionsManager, groupsManager, &am)
|
|
manager := NewManager(s, permissionsManager, resourcesManager, routerManager, &am)
|
|
|
|
updatedNetwork, err := manager.UpdateNetwork(ctx, userID, network)
|
|
require.NoError(t, err)
|
|
require.Equal(t, network.Name, updatedNetwork.Name)
|
|
}
|
|
|
|
func Test_UpdateNetworkFailsWithPermissionDenied(t *testing.T) {
|
|
ctx := context.Background()
|
|
userID := "invalidUser"
|
|
network := &types.Network{
|
|
AccountID: "testAccountId",
|
|
ID: "testNetworkId",
|
|
Name: "new-network",
|
|
}
|
|
|
|
s, cleanUp, err := store.NewTestStoreFromSQL(context.Background(), "../testdata/networks.sql", t.TempDir())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
t.Cleanup(cleanUp)
|
|
|
|
am := mock_server.MockAccountManager{}
|
|
permissionsManager := permissions.NewManagerMock()
|
|
groupsManager := groups.NewManagerMock()
|
|
routerManager := routers.NewManagerMock()
|
|
resourcesManager := resources.NewManager(s, permissionsManager, groupsManager, &am)
|
|
manager := NewManager(s, permissionsManager, resourcesManager, routerManager, &am)
|
|
|
|
updatedNetwork, err := manager.UpdateNetwork(ctx, userID, network)
|
|
require.Error(t, err)
|
|
require.Nil(t, updatedNetwork)
|
|
}
|