* Chore: Convert tests to standard Go lib
Signed-off-by: Arve Knudsen <arve.knudsen@gmail.com>
Co-authored-by: Will Browne <wbrowne@users.noreply.github.com>
adminLogoutUserScenario("Should not be allowed when calling POST on","/api/admin/users/1/logout","/api/admin/users/:id/logout",func(sc*scenarioContext){
adminLogoutUserScenario("Should return not found when calling POST on","/api/admin/users/200/logout","/api/admin/users/:id/logout",func(sc*scenarioContext){
adminRevokeUserAuthTokenScenario("Should return not found when calling POST on","/api/admin/users/200/revoke-auth-token","/api/admin/users/:id/revoke-auth-token",cmd,func(sc*scenarioContext){
adminGetUserAuthTokensScenario("Should return not found when calling GET on","/api/admin/users/200/auth-tokens","/api/admin/users/:id/auth-tokens",func(sc*scenarioContext){
adminDisableUserScenario("Should return user not found on a POST request","enable","/api/admin/users/42/enable","/api/admin/users/:id/enable",func(sc*scenarioContext){
adminDisableUserScenario("Should return user not found on a POST request","disable","/api/admin/users/42/disable","/api/admin/users/:id/disable",func(sc*scenarioContext){
adminDisableUserScenario("Should return Could not disable external user error","disable","/api/admin/users/42/disable","/api/admin/users/:id/disable",func(sc*scenarioContext){
adminDisableUserScenario("Should return Could not enable external user error","enable","/api/admin/users/42/enable","/api/admin/users/:id/enable",func(sc*scenarioContext){
loggedInUserScenarioWithRole("When calling GET on","GET","/api/alerts?dashboardId=1&dashboardId=2&folderId=3&dashboardTag=abc&dashboardQuery=dbQuery&limit=5&query=alertQuery","/api/alerts",models.ROLE_EDITOR,func(sc*scenarioContext){
loggedInUserScenarioWithRole(t,"When calling GET on","GET",
loggedInUserScenarioWithRole("When calling GET on","GET","/api/alert-notifications/1","/alert-notifications/:notificationId",models.ROLE_ADMIN,func(sc*scenarioContext){
loggedInUserScenarioWithRole(t,"When calling GET on","GET","/api/alert-notifications/1",
deleteAnnotationsScenario("When calling POST on","/api/annotations/mass-delete","/api/annotations/mass-delete",role,deleteCmd,func(sc*scenarioContext){
deleteAnnotationsScenario(t,"When calling POST on","/api/annotations/mass-delete",
loggedInUserScenarioWithRole("When calling GET on","GET","/api/dashboards/id/1/permissions","/api/dashboards/id/:id/permissions",models.ROLE_EDITOR,func(sc*scenarioContext){
loggedInUserScenarioWithRole(t,"When calling GET on","GET","/api/dashboards/id/1/permissions",
updateDashboardPermissionScenario("When calling POST on","/api/dashboards/id/1/permissions","/api/dashboards/id/:id/permissions",cmd,func(sc*scenarioContext){
updateDashboardPermissionScenario(t,"When calling POST on","/api/dashboards/id/1/permissions",
loggedInUserScenarioWithRole("When calling GET on","GET","/api/dashboards/id/1/permissions","/api/dashboards/id/:id/permissions",models.ROLE_EDITOR,func(sc*scenarioContext){
loggedInUserScenarioWithRole(t,"When calling GET on","GET","/api/dashboards/id/1/permissions",
updateDashboardPermissionScenario("When calling POST on","/api/dashboards/id/1/permissions","/api/dashboards/id/:id/permissions",cmd,func(sc*scenarioContext){
updateDashboardPermissionScenario(t,"When calling POST on","/api/dashboards/id/1/permissions",
loggedInUserScenarioWithRole("When calling GET on","GET","/api/dashboards/id/1/permissions","/api/dashboards/id/:id/permissions",models.ROLE_ADMIN,func(sc*scenarioContext){
loggedInUserScenarioWithRole(t,"When calling GET on","GET","/api/dashboards/id/1/permissions",
updateDashboardPermissionScenario("When calling POST on","/api/dashboards/id/1/permissions","/api/dashboards/id/:id/permissions",cmd,func(sc*scenarioContext){
updateDashboardPermissionScenario(t,"When calling POST on","/api/dashboards/id/1/permissions",
updateDashboardPermissionScenario("When calling POST on","/api/dashboards/id/1/permissions","/api/dashboards/id/:id/permissions",cmd,func(sc*scenarioContext){
updateDashboardPermissionScenario(t,"When calling POST on","/api/dashboards/id/1/permissions",
updateDashboardPermissionScenario("When calling POST on","/api/dashboards/id/1/permissions","/api/dashboards/id/:id/permissions",cmd,func(sc*scenarioContext){
updateDashboardPermissionScenario(t,"When calling POST on","/api/dashboards/id/1/permissions",
t.Run("Given folder not exists",func(t*testing.T){
mock:=&fakeFolderService{
GetFolderByUIDError:models.ErrFolderNotFound,
}
origNewFolderService:=dashboards.NewFolderService
t.Cleanup(func(){
dashboards.NewFolderService=origNewFolderService
})
mockFolderService(mock)
loggedInUserScenarioWithRole("When calling GET on","GET","/api/folders/uid/permissions","/api/folders/:uid/permissions",models.ROLE_EDITOR,func(sc*scenarioContext){
loggedInUserScenarioWithRole(t,"When calling GET on","GET","/api/folders/uid/permissions","/api/folders/:uid/permissions",models.ROLE_EDITOR,func(sc*scenarioContext){
loggedInUserScenarioWithRole("When calling GET on","GET","/api/folders/uid/permissions","/api/folders/:uid/permissions",models.ROLE_EDITOR,func(sc*scenarioContext){
loggedInUserScenarioWithRole(t,"When calling GET on","GET","/api/folders/uid/permissions","/api/folders/:uid/permissions",models.ROLE_EDITOR,func(sc*scenarioContext){
loggedInUserScenarioWithRole("When calling GET on","GET","/api/folders/uid/permissions","/api/folders/:uid/permissions",models.ROLE_ADMIN,func(sc*scenarioContext){
loggedInUserScenarioWithRole(t,"When calling GET on","GET","/api/folders/uid/permissions","/api/folders/:uid/permissions",models.ROLE_ADMIN,func(sc*scenarioContext){
createFolderScenario(fmt.Sprintf("Expect '%s' error when calling POST on",tc.Error.Error()),"/api/folders","/api/folders",mock,cmd,func(sc*scenarioContext){
createFolderScenario(t,fmt.Sprintf("Expect '%s' error when calling POST on",tc.Error.Error()),
updateFolderScenario(fmt.Sprintf("Expect '%s' error when calling PUT on",tc.Error.Error()),"/api/folders/uid","/api/folders/:uid",mock,cmd,func(sc*scenarioContext){
updateFolderScenario(t,fmt.Sprintf("Expect '%s' error when calling PUT on",tc.Error.Error()),
revokeUserAuthTokenScenario("Should return not found when calling POST on","/api/user/revoke-auth-token","/api/user/revoke-auth-token",cmd,200,func(sc*scenarioContext){
Convey("When current user gets auth tokens for a non-existing user",t,func(){
userId:=int64(0)
t.Run("When current user gets auth tokens for a non-existing user",func(t*testing.T){
getUserAuthTokensScenario(t,"Should return not found when calling GET on","/api/user/auth-tokens","/api/user/auth-tokens",200,func(sc*scenarioContext){