mirror of
https://github.com/gravitl/netmaker.git
synced 2025-02-25 08:34:47 +08:00
fixed UpdateNetwork/InvalidAddress
This commit is contained in:
parent
c62dc50d46
commit
1c7dbd42c9
3 changed files with 33 additions and 74 deletions
|
@ -308,12 +308,6 @@ func updateNetwork(w http.ResponseWriter, r *http.Request) {
|
||||||
networkChange.NetID = network.NetID
|
networkChange.NetID = network.NetID
|
||||||
}
|
}
|
||||||
|
|
||||||
//err = validateNetwork("update", networkChange)
|
|
||||||
if err != nil {
|
|
||||||
returnErrorResponse(w, r, formatError(err, "internal"))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
err = validateNetworkUpdate(networkChange)
|
err = validateNetworkUpdate(networkChange)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
returnErrorResponse(w, r, formatError(err, "badrequest"))
|
returnErrorResponse(w, r, formatError(err, "badrequest"))
|
||||||
|
@ -326,7 +320,7 @@ func updateNetwork(w http.ResponseWriter, r *http.Request) {
|
||||||
returnErrorResponse(w, r, formatError(errors.New("NetID is not editable"), "badrequest"))
|
returnErrorResponse(w, r, formatError(errors.New("NetID is not editable"), "badrequest"))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
//MRK: I think this code block is redundant. valdiateNetworkUpdate(networkChange) covers this
|
||||||
if networkChange.AddressRange != "" {
|
if networkChange.AddressRange != "" {
|
||||||
|
|
||||||
network.AddressRange = networkChange.AddressRange
|
network.AddressRange = networkChange.AddressRange
|
||||||
|
|
|
@ -12,7 +12,7 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestCreateNetwork(t *testing.T) {
|
func TestCreateNetwork(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
network := models.Network{}
|
network := models.Network{}
|
||||||
network.NetID = "skynet"
|
network.NetID = "skynet"
|
||||||
network.AddressRange = "10.71.0.0/16"
|
network.AddressRange = "10.71.0.0/16"
|
||||||
|
@ -57,7 +57,7 @@ func TestCreateNetwork(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestGetNetworks(t *testing.T) {
|
func TestGetNetworks(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
t.Run("ValidToken", func(t *testing.T) {
|
t.Run("ValidToken", func(t *testing.T) {
|
||||||
response, err := api(t, "", http.MethodGet, baseURL+"/api/networks", "secretkey")
|
response, err := api(t, "", http.MethodGet, baseURL+"/api/networks", "secretkey")
|
||||||
assert.Nil(t, err, err)
|
assert.Nil(t, err, err)
|
||||||
|
@ -80,7 +80,7 @@ func TestGetNetworks(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestGetNetwork(t *testing.T) {
|
func TestGetNetwork(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
t.Run("ValidToken", func(t *testing.T) {
|
t.Run("ValidToken", func(t *testing.T) {
|
||||||
var network models.Network
|
var network models.Network
|
||||||
response, err := api(t, "", http.MethodGet, baseURL+"/api/networks/skynet", "secretkey")
|
response, err := api(t, "", http.MethodGet, baseURL+"/api/networks/skynet", "secretkey")
|
||||||
|
@ -116,7 +116,7 @@ func TestGetNetwork(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestGetnetworkNodeNumber(t *testing.T) {
|
func TestGetnetworkNodeNumber(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
//not part of api anymore
|
//not part of api anymore
|
||||||
t.Run("ValidKey", func(t *testing.T) {
|
t.Run("ValidKey", func(t *testing.T) {
|
||||||
response, err := api(t, "", http.MethodGet, baseURL+"/api/networks/skynet/numnodes", "secretkey")
|
response, err := api(t, "", http.MethodGet, baseURL+"/api/networks/skynet/numnodes", "secretkey")
|
||||||
|
@ -152,7 +152,7 @@ func TestGetnetworkNodeNumber(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestDeletenetwork(t *testing.T) {
|
func TestDeletenetwork(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
t.Run("InvalidKey", func(t *testing.T) {
|
t.Run("InvalidKey", func(t *testing.T) {
|
||||||
response, err := api(t, "", http.MethodDelete, baseURL+"/api/networks/skynet", "badkey")
|
response, err := api(t, "", http.MethodDelete, baseURL+"/api/networks/skynet", "badkey")
|
||||||
assert.Nil(t, err, err)
|
assert.Nil(t, err, err)
|
||||||
|
@ -186,12 +186,12 @@ func TestDeletenetwork(t *testing.T) {
|
||||||
assert.Equal(t, http.StatusNotFound, response.StatusCode)
|
assert.Equal(t, http.StatusNotFound, response.StatusCode)
|
||||||
})
|
})
|
||||||
t.Run("NodesExist", func(t *testing.T) {
|
t.Run("NodesExist", func(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestCreateAccessKey(t *testing.T) {
|
func TestCreateAccessKey(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
if !networkExists(t) {
|
if !networkExists(t) {
|
||||||
createNetwork(t)
|
createNetwork(t)
|
||||||
}
|
}
|
||||||
|
@ -213,7 +213,7 @@ func TestCreateAccessKey(t *testing.T) {
|
||||||
})
|
})
|
||||||
deleteKey(t, "skynet", "skynet")
|
deleteKey(t, "skynet", "skynet")
|
||||||
t.Run("ZeroUse", func(t *testing.T) {
|
t.Run("ZeroUse", func(t *testing.T) {
|
||||||
//t.Skip()
|
//
|
||||||
key.Uses = 0
|
key.Uses = 0
|
||||||
response, err := api(t, key, http.MethodPost, baseURL+"/api/networks/skynet/keys", "secretkey")
|
response, err := api(t, key, http.MethodPost, baseURL+"/api/networks/skynet/keys", "secretkey")
|
||||||
assert.Nil(t, err, err)
|
assert.Nil(t, err, err)
|
||||||
|
@ -258,7 +258,7 @@ func TestCreateAccessKey(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestDeleteKey(t *testing.T) {
|
func TestDeleteKey(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
t.Run("KeyValid", func(t *testing.T) {
|
t.Run("KeyValid", func(t *testing.T) {
|
||||||
//fails -- deletecount not returned
|
//fails -- deletecount not returned
|
||||||
response, err := api(t, "", http.MethodDelete, baseURL+"/api/networks/skynet/keys/skynet", "secretkey")
|
response, err := api(t, "", http.MethodDelete, baseURL+"/api/networks/skynet/keys/skynet", "secretkey")
|
||||||
|
@ -274,7 +274,7 @@ func TestDeleteKey(t *testing.T) {
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
t.Run("InValidKey", func(t *testing.T) {
|
t.Run("InValidKey", func(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
//responds ok, will nil record returned.. should be an error.
|
//responds ok, will nil record returned.. should be an error.
|
||||||
response, err := api(t, "", http.MethodDelete, baseURL+"/api/networks/skynet/keys/badkey", "secretkey")
|
response, err := api(t, "", http.MethodDelete, baseURL+"/api/networks/skynet/keys/badkey", "secretkey")
|
||||||
assert.Nil(t, err, err)
|
assert.Nil(t, err, err)
|
||||||
|
@ -309,7 +309,7 @@ func TestDeleteKey(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestGetKeys(t *testing.T) {
|
func TestGetKeys(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
createKey(t)
|
createKey(t)
|
||||||
t.Run("Valid", func(t *testing.T) {
|
t.Run("Valid", func(t *testing.T) {
|
||||||
response, err := api(t, "", http.MethodGet, baseURL+"/api/networks/skynet/keys", "secretkey")
|
response, err := api(t, "", http.MethodGet, baseURL+"/api/networks/skynet/keys", "secretkey")
|
||||||
|
@ -344,8 +344,7 @@ func TestGetKeys(t *testing.T) {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestUpdatenetwork(t *testing.T) {
|
func TestUpdateNetwork(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
//ensure we are working with known networks
|
//ensure we are working with known networks
|
||||||
deleteNetworks(t)
|
deleteNetworks(t)
|
||||||
createNetwork(t)
|
createNetwork(t)
|
||||||
|
@ -366,21 +365,6 @@ func TestUpdatenetwork(t *testing.T) {
|
||||||
assert.Equal(t, http.StatusBadRequest, message.Code)
|
assert.Equal(t, http.StatusBadRequest, message.Code)
|
||||||
assert.Equal(t, "NetID is not editable", message.Message)
|
assert.Equal(t, "NetID is not editable", message.Message)
|
||||||
})
|
})
|
||||||
t.Run("NetIDInvalidCredentials", func(t *testing.T) {
|
|
||||||
type Network struct {
|
|
||||||
NetID string
|
|
||||||
}
|
|
||||||
var network Network
|
|
||||||
network.NetID = "wirecat"
|
|
||||||
response, err := api(t, network, http.MethodPut, baseURL+"/api/networks/skynet", "badkey")
|
|
||||||
assert.Nil(t, err, err)
|
|
||||||
var message models.ErrorResponse
|
|
||||||
err = json.NewDecoder(response.Body).Decode(&message)
|
|
||||||
assert.Nil(t, err, err)
|
|
||||||
assert.Equal(t, http.StatusUnauthorized, message.Code)
|
|
||||||
assert.Equal(t, "W1R3: You are unauthorized to access this endpoint.", message.Message)
|
|
||||||
assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
|
|
||||||
})
|
|
||||||
t.Run("Invalidnetwork", func(t *testing.T) {
|
t.Run("Invalidnetwork", func(t *testing.T) {
|
||||||
type Network struct {
|
type Network struct {
|
||||||
NetID string
|
NetID string
|
||||||
|
@ -397,19 +381,6 @@ func TestUpdatenetwork(t *testing.T) {
|
||||||
assert.Equal(t, "W1R3: This network does not exist.", message.Message)
|
assert.Equal(t, "W1R3: This network does not exist.", message.Message)
|
||||||
assert.Equal(t, http.StatusNotFound, response.StatusCode)
|
assert.Equal(t, http.StatusNotFound, response.StatusCode)
|
||||||
})
|
})
|
||||||
t.Run("UpdateNetIDTooLong", func(t *testing.T) {
|
|
||||||
// ---- needs fixing -----
|
|
||||||
// succeeds for some reason
|
|
||||||
t.Skip()
|
|
||||||
type Network struct {
|
|
||||||
NetID string
|
|
||||||
}
|
|
||||||
var network Network
|
|
||||||
network.NetID = "wirecat-skynet"
|
|
||||||
response, err := api(t, network, http.MethodPut, baseURL+"/api/networks/skynet", "secretkey")
|
|
||||||
assert.Nil(t, err, err)
|
|
||||||
assert.Equal(t, http.StatusUnprocessableEntity, response.StatusCode)
|
|
||||||
})
|
|
||||||
t.Run("UpdateAddress", func(t *testing.T) {
|
t.Run("UpdateAddress", func(t *testing.T) {
|
||||||
type Network struct {
|
type Network struct {
|
||||||
AddressRange string
|
AddressRange string
|
||||||
|
@ -432,13 +403,13 @@ func TestUpdatenetwork(t *testing.T) {
|
||||||
network.AddressRange = "10.0.0.1/36"
|
network.AddressRange = "10.0.0.1/36"
|
||||||
response, err := api(t, network, http.MethodPut, baseURL+"/api/networks/skynet", "secretkey")
|
response, err := api(t, network, http.MethodPut, baseURL+"/api/networks/skynet", "secretkey")
|
||||||
assert.Nil(t, err, err)
|
assert.Nil(t, err, err)
|
||||||
assert.Equal(t, http.StatusInternalServerError, response.StatusCode)
|
assert.Equal(t, http.StatusBadRequest, response.StatusCode)
|
||||||
defer response.Body.Close()
|
defer response.Body.Close()
|
||||||
var message models.ErrorResponse
|
var message models.ErrorResponse
|
||||||
err = json.NewDecoder(response.Body).Decode(&message)
|
err = json.NewDecoder(response.Body).Decode(&message)
|
||||||
assert.Nil(t, err, err)
|
assert.Nil(t, err, err)
|
||||||
assert.Equal(t, http.StatusInternalServerError, message.Code)
|
assert.Equal(t, http.StatusBadRequest, message.Code)
|
||||||
assert.Contains(t, message.Message, "Invalid Range")
|
assert.Contains(t, message.Message, "validation for 'AddressRange' failed")
|
||||||
|
|
||||||
})
|
})
|
||||||
t.Run("UpdateDisplayName", func(t *testing.T) {
|
t.Run("UpdateDisplayName", func(t *testing.T) {
|
||||||
|
@ -459,7 +430,7 @@ func TestUpdatenetwork(t *testing.T) {
|
||||||
t.Run("UpdateDisplayNameInvalidName", func(t *testing.T) {
|
t.Run("UpdateDisplayNameInvalidName", func(t *testing.T) {
|
||||||
// -----needs fixing ----
|
// -----needs fixing ----
|
||||||
// fails silently
|
// fails silently
|
||||||
t.Skip()
|
|
||||||
type Network struct {
|
type Network struct {
|
||||||
DisplayName string
|
DisplayName string
|
||||||
}
|
}
|
||||||
|
@ -511,7 +482,7 @@ func TestUpdatenetwork(t *testing.T) {
|
||||||
t.Run("UpdateListenPortInvalidPort", func(t *testing.T) {
|
t.Run("UpdateListenPortInvalidPort", func(t *testing.T) {
|
||||||
// ---needs fixing -----
|
// ---needs fixing -----
|
||||||
// value is updated anyways
|
// value is updated anyways
|
||||||
t.Skip()
|
|
||||||
type Network struct {
|
type Network struct {
|
||||||
DefaultListenPort int32
|
DefaultListenPort int32
|
||||||
}
|
}
|
||||||
|
@ -544,7 +515,7 @@ func TestUpdatenetwork(t *testing.T) {
|
||||||
// -------needs fixing ------
|
// -------needs fixing ------
|
||||||
// mismatch in models.Network between struc name and json/bson name
|
// mismatch in models.Network between struc name and json/bson name
|
||||||
// does not get updated.
|
// does not get updated.
|
||||||
t.Skip()
|
|
||||||
type Network struct {
|
type Network struct {
|
||||||
DefaultPostDown string
|
DefaultPostDown string
|
||||||
}
|
}
|
||||||
|
@ -575,7 +546,7 @@ func TestUpdatenetwork(t *testing.T) {
|
||||||
t.Run("UpdateKeepAliveTooBig", func(t *testing.T) {
|
t.Run("UpdateKeepAliveTooBig", func(t *testing.T) {
|
||||||
//fails silently
|
//fails silently
|
||||||
// ----- needs fixing -----
|
// ----- needs fixing -----
|
||||||
t.Skip()
|
|
||||||
type Network struct {
|
type Network struct {
|
||||||
DefaultKeepAlive int32
|
DefaultKeepAlive int32
|
||||||
}
|
}
|
||||||
|
@ -592,7 +563,7 @@ func TestUpdatenetwork(t *testing.T) {
|
||||||
})
|
})
|
||||||
t.Run("UpdateSaveConfig", func(t *testing.T) {
|
t.Run("UpdateSaveConfig", func(t *testing.T) {
|
||||||
//causes panic
|
//causes panic
|
||||||
t.Skip()
|
|
||||||
type Network struct {
|
type Network struct {
|
||||||
DefaultSaveConfig *bool
|
DefaultSaveConfig *bool
|
||||||
}
|
}
|
||||||
|
@ -608,7 +579,7 @@ func TestUpdatenetwork(t *testing.T) {
|
||||||
assert.Equal(t, *network.DefaultSaveConfig, *returnedNetwork.DefaultSaveConfig)
|
assert.Equal(t, *network.DefaultSaveConfig, *returnedNetwork.DefaultSaveConfig)
|
||||||
})
|
})
|
||||||
t.Run("UpdateManualSignUP", func(t *testing.T) {
|
t.Run("UpdateManualSignUP", func(t *testing.T) {
|
||||||
t.Skip()
|
|
||||||
type Network struct {
|
type Network struct {
|
||||||
AllowManualSignUp *bool
|
AllowManualSignUp *bool
|
||||||
}
|
}
|
||||||
|
@ -627,7 +598,7 @@ func TestUpdatenetwork(t *testing.T) {
|
||||||
})
|
})
|
||||||
t.Run("DefaultCheckInterval", func(t *testing.T) {
|
t.Run("DefaultCheckInterval", func(t *testing.T) {
|
||||||
//value is not returned in struct ---
|
//value is not returned in struct ---
|
||||||
t.Skip()
|
|
||||||
type Network struct {
|
type Network struct {
|
||||||
DefaultCheckInInterval int32
|
DefaultCheckInInterval int32
|
||||||
}
|
}
|
||||||
|
@ -643,7 +614,7 @@ func TestUpdatenetwork(t *testing.T) {
|
||||||
})
|
})
|
||||||
t.Run("DefaultCheckIntervalTooBig", func(t *testing.T) {
|
t.Run("DefaultCheckIntervalTooBig", func(t *testing.T) {
|
||||||
//value is not returned in struct ---
|
//value is not returned in struct ---
|
||||||
t.Skip()
|
|
||||||
type Network struct {
|
type Network struct {
|
||||||
DefaultCheckInInterval int32
|
DefaultCheckInInterval int32
|
||||||
}
|
}
|
||||||
|
|
|
@ -11,7 +11,6 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestAdminCreation(t *testing.T) {
|
func TestAdminCreation(t *testing.T) {
|
||||||
|
|
||||||
var admin models.UserAuthParams
|
var admin models.UserAuthParams
|
||||||
var user models.User
|
var user models.User
|
||||||
admin.UserName = "admin"
|
admin.UserName = "admin"
|
||||||
|
@ -41,32 +40,25 @@ func TestAdminCreation(t *testing.T) {
|
||||||
defer response.Body.Close()
|
defer response.Body.Close()
|
||||||
var message models.ErrorResponse
|
var message models.ErrorResponse
|
||||||
err = json.NewDecoder(response.Body).Decode(&message)
|
err = json.NewDecoder(response.Body).Decode(&message)
|
||||||
t.Log(message)
|
|
||||||
assert.Nil(t, err, err)
|
assert.Nil(t, err, err)
|
||||||
assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
|
assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
|
||||||
assert.Equal(t, http.StatusUnauthorized, message.Code)
|
assert.Equal(t, http.StatusUnauthorized, message.Code)
|
||||||
assert.Equal(t, "W1R3: Admin already exists! ", message.Message)
|
assert.Equal(t, "W1R3: Admin already exists! ", message.Message)
|
||||||
data, _ := ioutil.ReadAll(response.Body)
|
|
||||||
t.Log(string(data))
|
|
||||||
})
|
})
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestGetUser(t *testing.T) {
|
func TestGetUser(t *testing.T) {
|
||||||
|
|
||||||
if !adminExists(t) {
|
if !adminExists(t) {
|
||||||
t.Log("no admin - creating")
|
t.Log("no admin - creating")
|
||||||
addAdmin(t)
|
addAdmin(t)
|
||||||
} else {
|
} else {
|
||||||
t.Log("admin exists")
|
t.Log("admin exists")
|
||||||
}
|
}
|
||||||
|
|
||||||
t.Run("GetUserWithValidToken", func(t *testing.T) {
|
t.Run("GetUserWithValidToken", func(t *testing.T) {
|
||||||
|
|
||||||
token, err := authenticate(t)
|
token, err := authenticate(t)
|
||||||
assert.Nil(t, err, err)
|
assert.Nil(t, err, err)
|
||||||
response, err := api(t, "", http.MethodGet, "http://localhost:8081/api/users/admin", token)
|
response, err := api(t, "", http.MethodGet, "http://localhost:8081/api/users/admin", token)
|
||||||
t.Log(response)
|
|
||||||
assert.Nil(t, err, err)
|
assert.Nil(t, err, err)
|
||||||
defer response.Body.Close()
|
defer response.Body.Close()
|
||||||
var user models.User
|
var user models.User
|
||||||
|
@ -76,15 +68,20 @@ func TestGetUser(t *testing.T) {
|
||||||
assert.Equal(t, true, user.IsAdmin)
|
assert.Equal(t, true, user.IsAdmin)
|
||||||
})
|
})
|
||||||
t.Run("GetUserWithInvalidToken", func(t *testing.T) {
|
t.Run("GetUserWithInvalidToken", func(t *testing.T) {
|
||||||
response, err := api(t, "", http.MethodGet, "http://localhost:8081/api/users/admin", "secretkey")
|
response, err := api(t, "", http.MethodGet, "http://localhost:8081/api/users/admin", "badkey")
|
||||||
assert.Nil(t, err, err)
|
assert.Nil(t, err, err)
|
||||||
defer response.Body.Close()
|
defer response.Body.Close()
|
||||||
t.Log(response.Body)
|
var message models.ErrorResponse
|
||||||
|
err = json.NewDecoder(response.Body).Decode(&message)
|
||||||
|
assert.Nil(t, err, err)
|
||||||
|
assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
|
||||||
|
assert.Equal(t, http.StatusUnauthorized, message.Code)
|
||||||
|
assert.Equal(t, "W1R3: Error Verifying Auth Token.", message.Message)
|
||||||
|
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestUpdateUser(t *testing.T) {
|
func TestUpdateUser(t *testing.T) {
|
||||||
|
|
||||||
if !adminExists(t) {
|
if !adminExists(t) {
|
||||||
addAdmin(t)
|
addAdmin(t)
|
||||||
}
|
}
|
||||||
|
@ -96,7 +93,7 @@ func TestUpdateUser(t *testing.T) {
|
||||||
t.Run("UpdateWrongToken", func(t *testing.T) {
|
t.Run("UpdateWrongToken", func(t *testing.T) {
|
||||||
admin.UserName = "admin"
|
admin.UserName = "admin"
|
||||||
admin.Password = "admin"
|
admin.Password = "admin"
|
||||||
response, err := api(t, admin, http.MethodPut, "http://localhost:8081/api/users/admin", "secretkey")
|
response, err := api(t, admin, http.MethodPut, "http://localhost:8081/api/users/admin", "badkey")
|
||||||
assert.Nil(t, err, err)
|
assert.Nil(t, err, err)
|
||||||
defer response.Body.Close()
|
defer response.Body.Close()
|
||||||
err = json.NewDecoder(response.Body).Decode(&message)
|
err = json.NewDecoder(response.Body).Decode(&message)
|
||||||
|
@ -116,7 +113,6 @@ func TestUpdateUser(t *testing.T) {
|
||||||
assert.Equal(t, true, user.IsAdmin)
|
assert.Equal(t, true, user.IsAdmin)
|
||||||
assert.Equal(t, http.StatusOK, response.StatusCode)
|
assert.Equal(t, http.StatusOK, response.StatusCode)
|
||||||
})
|
})
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestDeleteUser(t *testing.T) {
|
func TestDeleteUser(t *testing.T) {
|
||||||
|
@ -154,7 +150,6 @@ func TestDeleteUser(t *testing.T) {
|
||||||
assert.Equal(t, http.StatusBadRequest, message.Code)
|
assert.Equal(t, http.StatusBadRequest, message.Code)
|
||||||
assert.Equal(t, "Delete unsuccessful.", message.Message)
|
assert.Equal(t, "Delete unsuccessful.", message.Message)
|
||||||
})
|
})
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestAuthenticateUser(t *testing.T) {
|
func TestAuthenticateUser(t *testing.T) {
|
||||||
|
@ -201,7 +196,6 @@ func TestAuthenticateUser(t *testing.T) {
|
||||||
errMessage: "W1R3: Device Admin Authorized",
|
errMessage: "W1R3: Device Admin Authorized",
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
if !adminExists(t) {
|
if !adminExists(t) {
|
||||||
addAdmin(t)
|
addAdmin(t)
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue