mirror of
https://github.com/bitwarden/server.git
synced 2024-11-22 12:15:36 +01:00
Fix Most Test Warnings (#4612)
* Add Collections Tests * Update CollectionRepository Implementation * Test Adding And Deleting Through Replace * Format * Fix Most Test Warnings * Format
This commit is contained in:
parent
2096923853
commit
aa34bbb0e6
@ -15,7 +15,7 @@ public class StaticClientStoreTests
|
|||||||
}
|
}
|
||||||
|
|
||||||
[Params("mobile", "connector", "invalid", "a_much_longer_invalid_value_that_i_am_making_up", "WEB", "")]
|
[Params("mobile", "connector", "invalid", "a_much_longer_invalid_value_that_i_am_making_up", "WEB", "")]
|
||||||
public string? ClientId { get; set; }
|
public string ClientId { get; set; } = null!;
|
||||||
|
|
||||||
[Benchmark]
|
[Benchmark]
|
||||||
public Client? TryGetValue()
|
public Client? TryGetValue()
|
||||||
|
@ -21,8 +21,10 @@ public class MembersControllerTests : IClassFixture<ApiApplicationFactory>, IAsy
|
|||||||
private readonly HttpClient _client;
|
private readonly HttpClient _client;
|
||||||
private readonly ApiApplicationFactory _factory;
|
private readonly ApiApplicationFactory _factory;
|
||||||
private readonly LoginHelper _loginHelper;
|
private readonly LoginHelper _loginHelper;
|
||||||
private Organization _organization;
|
|
||||||
private string _ownerEmail;
|
// These will get set in `InitializeAsync` which is ran before all tests
|
||||||
|
private Organization _organization = null!;
|
||||||
|
private string _ownerEmail = null!;
|
||||||
|
|
||||||
public MembersControllerTests(ApiApplicationFactory factory)
|
public MembersControllerTests(ApiApplicationFactory factory)
|
||||||
{
|
{
|
||||||
@ -74,7 +76,7 @@ public class MembersControllerTests : IClassFixture<ApiApplicationFactory>, IAsy
|
|||||||
m.Email == _ownerEmail && m.Type == OrganizationUserType.Owner));
|
m.Email == _ownerEmail && m.Type == OrganizationUserType.Owner));
|
||||||
|
|
||||||
// The custom user
|
// The custom user
|
||||||
var user1Result = result.Data.SingleOrDefault(m => m.Email == userEmail1);
|
var user1Result = result.Data.Single(m => m.Email == userEmail1);
|
||||||
Assert.Equal(OrganizationUserType.Custom, user1Result.Type);
|
Assert.Equal(OrganizationUserType.Custom, user1Result.Type);
|
||||||
AssertHelper.AssertPropertyEqual(
|
AssertHelper.AssertPropertyEqual(
|
||||||
new PermissionsModel { AccessImportExport = true, ManagePolicies = true, AccessReports = true },
|
new PermissionsModel { AccessImportExport = true, ManagePolicies = true, AccessReports = true },
|
||||||
@ -156,6 +158,7 @@ public class MembersControllerTests : IClassFixture<ApiApplicationFactory>, IAsy
|
|||||||
var organizationUserRepository = _factory.GetService<IOrganizationUserRepository>();
|
var organizationUserRepository = _factory.GetService<IOrganizationUserRepository>();
|
||||||
var orgUser = await organizationUserRepository.GetByIdAsync(result.Id);
|
var orgUser = await organizationUserRepository.GetByIdAsync(result.Id);
|
||||||
|
|
||||||
|
Assert.NotNull(orgUser);
|
||||||
Assert.Equal(email, orgUser.Email);
|
Assert.Equal(email, orgUser.Email);
|
||||||
Assert.Equal(OrganizationUserType.Custom, orgUser.Type);
|
Assert.Equal(OrganizationUserType.Custom, orgUser.Type);
|
||||||
Assert.Equal("myCustomUser", orgUser.ExternalId);
|
Assert.Equal("myCustomUser", orgUser.ExternalId);
|
||||||
@ -201,6 +204,7 @@ public class MembersControllerTests : IClassFixture<ApiApplicationFactory>, IAsy
|
|||||||
var organizationUserRepository = _factory.GetService<IOrganizationUserRepository>();
|
var organizationUserRepository = _factory.GetService<IOrganizationUserRepository>();
|
||||||
var updatedOrgUser = await organizationUserRepository.GetByIdAsync(result.Id);
|
var updatedOrgUser = await organizationUserRepository.GetByIdAsync(result.Id);
|
||||||
|
|
||||||
|
Assert.NotNull(updatedOrgUser);
|
||||||
Assert.Equal(OrganizationUserType.Custom, updatedOrgUser.Type);
|
Assert.Equal(OrganizationUserType.Custom, updatedOrgUser.Type);
|
||||||
Assert.Equal("example", updatedOrgUser.ExternalId);
|
Assert.Equal("example", updatedOrgUser.ExternalId);
|
||||||
Assert.Equal(OrganizationUserStatusType.Confirmed, updatedOrgUser.Status);
|
Assert.Equal(OrganizationUserStatusType.Confirmed, updatedOrgUser.Status);
|
||||||
@ -240,6 +244,7 @@ public class MembersControllerTests : IClassFixture<ApiApplicationFactory>, IAsy
|
|||||||
var organizationUserRepository = _factory.GetService<IOrganizationUserRepository>();
|
var organizationUserRepository = _factory.GetService<IOrganizationUserRepository>();
|
||||||
var updatedOrgUser = await organizationUserRepository.GetByIdAsync(result.Id);
|
var updatedOrgUser = await organizationUserRepository.GetByIdAsync(result.Id);
|
||||||
|
|
||||||
|
Assert.NotNull(updatedOrgUser);
|
||||||
Assert.Equal(OrganizationUserType.Custom, updatedOrgUser.Type);
|
Assert.Equal(OrganizationUserType.Custom, updatedOrgUser.Type);
|
||||||
AssertHelper.AssertPropertyEqual(
|
AssertHelper.AssertPropertyEqual(
|
||||||
new Permissions { CreateNewCollections = true, ManageScim = true, ManageGroups = true, ManageUsers = true },
|
new Permissions { CreateNewCollections = true, ManageScim = true, ManageGroups = true, ManageUsers = true },
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
using Bit.Api.IntegrationTest.Factories;
|
using System.Diagnostics;
|
||||||
|
using Bit.Api.IntegrationTest.Factories;
|
||||||
using Bit.Core.AdminConsole.Entities;
|
using Bit.Core.AdminConsole.Entities;
|
||||||
using Bit.Core.Billing.Enums;
|
using Bit.Core.Billing.Enums;
|
||||||
using Bit.Core.Entities;
|
using Bit.Core.Entities;
|
||||||
@ -38,6 +39,8 @@ public static class OrganizationTestHelpers
|
|||||||
PaymentMethodType = paymentMethod
|
PaymentMethodType = paymentMethod
|
||||||
});
|
});
|
||||||
|
|
||||||
|
Debug.Assert(signUpResult.organizationUser is not null);
|
||||||
|
|
||||||
return new Tuple<Organization, OrganizationUser>(signUpResult.organization, signUpResult.organizationUser);
|
return new Tuple<Organization, OrganizationUser>(signUpResult.organization, signUpResult.organizationUser);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -57,6 +60,7 @@ public static class OrganizationTestHelpers
|
|||||||
var organizationUserRepository = factory.GetService<IOrganizationUserRepository>();
|
var organizationUserRepository = factory.GetService<IOrganizationUserRepository>();
|
||||||
|
|
||||||
var user = await userRepository.GetByEmailAsync(userEmail);
|
var user = await userRepository.GetByEmailAsync(userEmail);
|
||||||
|
Debug.Assert(user is not null);
|
||||||
|
|
||||||
var orgUser = new OrganizationUser
|
var orgUser = new OrganizationUser
|
||||||
{
|
{
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
using Bit.Api.IntegrationTest.Factories;
|
using System.Diagnostics;
|
||||||
|
using Bit.Api.IntegrationTest.Factories;
|
||||||
using Bit.Api.IntegrationTest.Helpers;
|
using Bit.Api.IntegrationTest.Helpers;
|
||||||
using Bit.Core.AdminConsole.Entities;
|
using Bit.Core.AdminConsole.Entities;
|
||||||
using Bit.Core.Entities;
|
using Bit.Core.Entities;
|
||||||
@ -35,7 +36,8 @@ public class SecretsManagerOrganizationHelper
|
|||||||
|
|
||||||
public async Task<(Organization organization, OrganizationUser owner)> Initialize(bool useSecrets, bool ownerAccessSecrets, bool organizationEnabled)
|
public async Task<(Organization organization, OrganizationUser owner)> Initialize(bool useSecrets, bool ownerAccessSecrets, bool organizationEnabled)
|
||||||
{
|
{
|
||||||
(_organization, _owner) = await OrganizationTestHelpers.SignUpAsync(_factory, ownerEmail: _ownerEmail, billingEmail: _ownerEmail);
|
(_organization, _owner!) = await OrganizationTestHelpers.SignUpAsync(_factory, ownerEmail: _ownerEmail, billingEmail: _ownerEmail);
|
||||||
|
Debug.Assert(_owner is not null);
|
||||||
|
|
||||||
if (useSecrets || !organizationEnabled)
|
if (useSecrets || !organizationEnabled)
|
||||||
{
|
{
|
||||||
|
@ -20,6 +20,8 @@ using Microsoft.AspNetCore.Authorization;
|
|||||||
using NSubstitute;
|
using NSubstitute;
|
||||||
using Xunit;
|
using Xunit;
|
||||||
|
|
||||||
|
#nullable enable
|
||||||
|
|
||||||
namespace Bit.Api.Test.AdminConsole.Controllers;
|
namespace Bit.Api.Test.AdminConsole.Controllers;
|
||||||
|
|
||||||
[ControllerCustomize(typeof(GroupsController))]
|
[ControllerCustomize(typeof(GroupsController))]
|
||||||
@ -305,7 +307,7 @@ public class GroupsControllerPutTests
|
|||||||
.Returns(new Tuple<Group, ICollection<CollectionAccessSelection>>(group, currentCollectionAccess ?? []));
|
.Returns(new Tuple<Group, ICollection<CollectionAccessSelection>>(group, currentCollectionAccess ?? []));
|
||||||
if (savingUser != null)
|
if (savingUser != null)
|
||||||
{
|
{
|
||||||
sutProvider.GetDependency<IOrganizationUserRepository>().GetByOrganizationAsync(orgId, savingUser.UserId.Value)
|
sutProvider.GetDependency<IOrganizationUserRepository>().GetByOrganizationAsync(orgId, savingUser.UserId!.Value)
|
||||||
.Returns(savingUser);
|
.Returns(savingUser);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -129,7 +129,7 @@ public class SyncControllerTests
|
|||||||
// Asserts
|
// Asserts
|
||||||
// Assert that methods are called
|
// Assert that methods are called
|
||||||
var hasEnabledOrgs = organizationUserDetails.Any(o => o.Enabled);
|
var hasEnabledOrgs = organizationUserDetails.Any(o => o.Enabled);
|
||||||
this.AssertMethodsCalledAsync(userService, organizationUserRepository, providerUserRepository, folderRepository,
|
await this.AssertMethodsCalledAsync(userService, organizationUserRepository, providerUserRepository, folderRepository,
|
||||||
cipherRepository, sendRepository, collectionRepository, collectionCipherRepository, hasEnabledOrgs);
|
cipherRepository, sendRepository, collectionRepository, collectionCipherRepository, hasEnabledOrgs);
|
||||||
|
|
||||||
Assert.IsType<SyncResponseModel>(result);
|
Assert.IsType<SyncResponseModel>(result);
|
||||||
@ -216,7 +216,7 @@ public class SyncControllerTests
|
|||||||
// Assert that methods are called
|
// Assert that methods are called
|
||||||
|
|
||||||
var hasEnabledOrgs = organizationUserDetails.Any(o => o.Enabled);
|
var hasEnabledOrgs = organizationUserDetails.Any(o => o.Enabled);
|
||||||
this.AssertMethodsCalledAsync(userService, organizationUserRepository, providerUserRepository, folderRepository,
|
await this.AssertMethodsCalledAsync(userService, organizationUserRepository, providerUserRepository, folderRepository,
|
||||||
cipherRepository, sendRepository, collectionRepository, collectionCipherRepository, hasEnabledOrgs);
|
cipherRepository, sendRepository, collectionRepository, collectionCipherRepository, hasEnabledOrgs);
|
||||||
|
|
||||||
Assert.IsType<SyncResponseModel>(result);
|
Assert.IsType<SyncResponseModel>(result);
|
||||||
@ -293,7 +293,7 @@ public class SyncControllerTests
|
|||||||
// Assert that methods are called
|
// Assert that methods are called
|
||||||
|
|
||||||
var hasEnabledOrgs = organizationUserDetails.Any(o => o.Enabled);
|
var hasEnabledOrgs = organizationUserDetails.Any(o => o.Enabled);
|
||||||
this.AssertMethodsCalledAsync(userService, organizationUserRepository, providerUserRepository, folderRepository,
|
await this.AssertMethodsCalledAsync(userService, organizationUserRepository, providerUserRepository, folderRepository,
|
||||||
cipherRepository, sendRepository, collectionRepository, collectionCipherRepository, hasEnabledOrgs);
|
cipherRepository, sendRepository, collectionRepository, collectionCipherRepository, hasEnabledOrgs);
|
||||||
|
|
||||||
Assert.IsType<SyncResponseModel>(result);
|
Assert.IsType<SyncResponseModel>(result);
|
||||||
|
@ -1115,7 +1115,7 @@ OrganizationUserInvite invite, SutProvider<OrganizationService> sutProvider)
|
|||||||
|
|
||||||
await sutProvider.Sut.InviteUsersAsync(organization.Id, savingUser.Id, systemUser: null, invites);
|
await sutProvider.Sut.InviteUsersAsync(organization.Id, savingUser.Id, systemUser: null, invites);
|
||||||
|
|
||||||
sutProvider.GetDependency<IUpdateSecretsManagerSubscriptionCommand>().Received(1)
|
await sutProvider.GetDependency<IUpdateSecretsManagerSubscriptionCommand>().Received(1)
|
||||||
.UpdateSubscriptionAsync(Arg.Is<SecretsManagerSubscriptionUpdate>(update =>
|
.UpdateSubscriptionAsync(Arg.Is<SecretsManagerSubscriptionUpdate>(update =>
|
||||||
update.SmSeats == organization.SmSeats + invitedSmUsers &&
|
update.SmSeats == organization.SmSeats + invitedSmUsers &&
|
||||||
!update.SmServiceAccountsChanged &&
|
!update.SmServiceAccountsChanged &&
|
||||||
@ -1158,7 +1158,7 @@ OrganizationUserInvite invite, SutProvider<OrganizationService> sutProvider)
|
|||||||
// OrgUser is reverted
|
// OrgUser is reverted
|
||||||
// Note: we don't know what their guids are so comparing length is the best we can do
|
// Note: we don't know what their guids are so comparing length is the best we can do
|
||||||
var invitedEmails = invites.SelectMany(i => i.invite.Emails);
|
var invitedEmails = invites.SelectMany(i => i.invite.Emails);
|
||||||
sutProvider.GetDependency<IOrganizationUserRepository>().Received(1).DeleteManyAsync(
|
await sutProvider.GetDependency<IOrganizationUserRepository>().Received(1).DeleteManyAsync(
|
||||||
Arg.Is<IEnumerable<Guid>>(ids => ids.Count() == invitedEmails.Count()));
|
Arg.Is<IEnumerable<Guid>>(ids => ids.Count() == invitedEmails.Count()));
|
||||||
|
|
||||||
Received.InOrder(() =>
|
Received.InOrder(() =>
|
||||||
|
@ -57,7 +57,7 @@ public class AddSecretsManagerSubscriptionCommandTests
|
|||||||
|
|
||||||
// TODO: call ReferenceEventService - see AC-1481
|
// TODO: call ReferenceEventService - see AC-1481
|
||||||
|
|
||||||
sutProvider.GetDependency<IOrganizationService>().Received(1).ReplaceAndUpdateCacheAsync(Arg.Is<Organization>(c =>
|
await sutProvider.GetDependency<IOrganizationService>().Received(1).ReplaceAndUpdateCacheAsync(Arg.Is<Organization>(c =>
|
||||||
c.SmSeats == plan.SecretsManager.BaseSeats + additionalSmSeats &&
|
c.SmSeats == plan.SecretsManager.BaseSeats + additionalSmSeats &&
|
||||||
c.SmServiceAccounts == plan.SecretsManager.BaseServiceAccount + additionalServiceAccounts &&
|
c.SmServiceAccounts == plan.SecretsManager.BaseServiceAccount + additionalServiceAccounts &&
|
||||||
c.UseSecretsManager == true));
|
c.UseSecretsManager == true));
|
||||||
|
@ -663,8 +663,8 @@ public class UpdateSecretsManagerSubscriptionCommandTests
|
|||||||
.SendOrganizationMaxSeatLimitReachedEmailAsync(Arg.Any<Organization>(), Arg.Any<int>(),
|
.SendOrganizationMaxSeatLimitReachedEmailAsync(Arg.Any<Organization>(), Arg.Any<int>(),
|
||||||
Arg.Any<IEnumerable<string>>());
|
Arg.Any<IEnumerable<string>>());
|
||||||
|
|
||||||
sutProvider.GetDependency<IOrganizationRepository>().DidNotReceiveWithAnyArgs().ReplaceAsync(default);
|
await sutProvider.GetDependency<IOrganizationRepository>().DidNotReceiveWithAnyArgs().ReplaceAsync(default);
|
||||||
sutProvider.GetDependency<IApplicationCacheService>().DidNotReceiveWithAnyArgs().UpsertOrganizationAbilityAsync(default);
|
await sutProvider.GetDependency<IApplicationCacheService>().DidNotReceiveWithAnyArgs().UpsertOrganizationAbilityAsync(default);
|
||||||
}
|
}
|
||||||
|
|
||||||
private void AssertUpdatedOrganization(Func<Organization> organizationMatcher, SutProvider<UpdateSecretsManagerSubscriptionCommand> sutProvider)
|
private void AssertUpdatedOrganization(Func<Organization> organizationMatcher, SutProvider<UpdateSecretsManagerSubscriptionCommand> sutProvider)
|
||||||
|
@ -165,7 +165,7 @@ public class UpgradeOrganizationPlanCommandTests
|
|||||||
var exception = await Assert.ThrowsAsync<BadRequestException>(() => sutProvider.Sut.UpgradePlanAsync(organization.Id, upgrade));
|
var exception = await Assert.ThrowsAsync<BadRequestException>(() => sutProvider.Sut.UpgradePlanAsync(organization.Id, upgrade));
|
||||||
Assert.Contains("Your organization currently has 2 Secrets Manager seats filled. Your new plan only has", exception.Message);
|
Assert.Contains("Your organization currently has 2 Secrets Manager seats filled. Your new plan only has", exception.Message);
|
||||||
|
|
||||||
sutProvider.GetDependency<IOrganizationService>().DidNotReceiveWithAnyArgs().ReplaceAndUpdateCacheAsync(default);
|
await sutProvider.GetDependency<IOrganizationService>().DidNotReceiveWithAnyArgs().ReplaceAndUpdateCacheAsync(default);
|
||||||
}
|
}
|
||||||
|
|
||||||
[Theory, FreeOrganizationUpgradeCustomize]
|
[Theory, FreeOrganizationUpgradeCustomize]
|
||||||
@ -194,6 +194,6 @@ public class UpgradeOrganizationPlanCommandTests
|
|||||||
var exception = await Assert.ThrowsAsync<BadRequestException>(() => sutProvider.Sut.UpgradePlanAsync(organization.Id, upgrade));
|
var exception = await Assert.ThrowsAsync<BadRequestException>(() => sutProvider.Sut.UpgradePlanAsync(organization.Id, upgrade));
|
||||||
Assert.Contains($"Your organization currently has {currentServiceAccounts} machine accounts. Your new plan only allows", exception.Message);
|
Assert.Contains($"Your organization currently has {currentServiceAccounts} machine accounts. Your new plan only allows", exception.Message);
|
||||||
|
|
||||||
sutProvider.GetDependency<IOrganizationService>().DidNotReceiveWithAnyArgs().ReplaceAndUpdateCacheAsync(default);
|
await sutProvider.GetDependency<IOrganizationService>().DidNotReceiveWithAnyArgs().ReplaceAndUpdateCacheAsync(default);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -62,11 +62,12 @@ public class BulkAuthorizationHandlerTests
|
|||||||
|
|
||||||
private class TestBulkAuthorizationHandler : BulkAuthorizationHandler<TestOperationRequirement, TestResource>
|
private class TestBulkAuthorizationHandler : BulkAuthorizationHandler<TestOperationRequirement, TestResource>
|
||||||
{
|
{
|
||||||
protected override async Task HandleRequirementAsync(AuthorizationHandlerContext context,
|
protected override Task HandleRequirementAsync(AuthorizationHandlerContext context,
|
||||||
TestOperationRequirement requirement,
|
TestOperationRequirement requirement,
|
||||||
ICollection<TestResource> resources)
|
ICollection<TestResource> resources)
|
||||||
{
|
{
|
||||||
context.Succeed(requirement);
|
context.Succeed(requirement);
|
||||||
|
return Task.CompletedTask;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -86,7 +86,7 @@ public class AccountsControllerTests : IDisposable
|
|||||||
Kdf = KdfType.PBKDF2_SHA256,
|
Kdf = KdfType.PBKDF2_SHA256,
|
||||||
KdfIterations = AuthConstants.PBKDF2_ITERATIONS.Default
|
KdfIterations = AuthConstants.PBKDF2_ITERATIONS.Default
|
||||||
};
|
};
|
||||||
_userRepository.GetKdfInformationByEmailAsync(Arg.Any<string>()).Returns(Task.FromResult(userKdfInfo));
|
_userRepository.GetKdfInformationByEmailAsync(Arg.Any<string>()).Returns(userKdfInfo);
|
||||||
|
|
||||||
var response = await _sut.PostPrelogin(new PreloginRequestModel { Email = "user@example.com" });
|
var response = await _sut.PostPrelogin(new PreloginRequestModel { Email = "user@example.com" });
|
||||||
|
|
||||||
@ -97,7 +97,7 @@ public class AccountsControllerTests : IDisposable
|
|||||||
[Fact]
|
[Fact]
|
||||||
public async Task PostPrelogin_WhenUserDoesNotExist_ShouldDefaultToPBKDF()
|
public async Task PostPrelogin_WhenUserDoesNotExist_ShouldDefaultToPBKDF()
|
||||||
{
|
{
|
||||||
_userRepository.GetKdfInformationByEmailAsync(Arg.Any<string>()).Returns(Task.FromResult<UserKdfInformation>(null!));
|
_userRepository.GetKdfInformationByEmailAsync(Arg.Any<string>()).Returns(Task.FromResult<UserKdfInformation?>(null));
|
||||||
|
|
||||||
var response = await _sut.PostPrelogin(new PreloginRequestModel { Email = "user@example.com" });
|
var response = await _sut.PostPrelogin(new PreloginRequestModel { Email = "user@example.com" });
|
||||||
|
|
||||||
|
@ -38,6 +38,7 @@ public class OrganizationUserRepositoryTests
|
|||||||
await organizationUserRepository.DeleteAsync(orgUser);
|
await organizationUserRepository.DeleteAsync(orgUser);
|
||||||
|
|
||||||
var newUser = await userRepository.GetByIdAsync(user.Id);
|
var newUser = await userRepository.GetByIdAsync(user.Id);
|
||||||
|
Assert.NotNull(newUser);
|
||||||
Assert.NotEqual(newUser.AccountRevisionDate, user.AccountRevisionDate);
|
Assert.NotEqual(newUser.AccountRevisionDate, user.AccountRevisionDate);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -90,7 +91,9 @@ public class OrganizationUserRepositoryTests
|
|||||||
});
|
});
|
||||||
|
|
||||||
var updatedUser1 = await userRepository.GetByIdAsync(user1.Id);
|
var updatedUser1 = await userRepository.GetByIdAsync(user1.Id);
|
||||||
|
Assert.NotNull(updatedUser1);
|
||||||
var updatedUser2 = await userRepository.GetByIdAsync(user2.Id);
|
var updatedUser2 = await userRepository.GetByIdAsync(user2.Id);
|
||||||
|
Assert.NotNull(updatedUser2);
|
||||||
|
|
||||||
Assert.NotEqual(updatedUser1.AccountRevisionDate, user1.AccountRevisionDate);
|
Assert.NotEqual(updatedUser1.AccountRevisionDate, user1.AccountRevisionDate);
|
||||||
Assert.NotEqual(updatedUser2.AccountRevisionDate, user2.AccountRevisionDate);
|
Assert.NotEqual(updatedUser2.AccountRevisionDate, user2.AccountRevisionDate);
|
||||||
|
@ -165,12 +165,15 @@ public class AuthRequestRepositoryTests
|
|||||||
|
|
||||||
// Assert that the unchanged auth request is still unchanged
|
// Assert that the unchanged auth request is still unchanged
|
||||||
var skippedAuthRequest = await authRequestRepository.GetByIdAsync(authRequestNotToBeUpdated.Id);
|
var skippedAuthRequest = await authRequestRepository.GetByIdAsync(authRequestNotToBeUpdated.Id);
|
||||||
|
Assert.NotNull(skippedAuthRequest);
|
||||||
Assert.True(AuthRequestEquals(skippedAuthRequest, authRequestNotToBeUpdated));
|
Assert.True(AuthRequestEquals(skippedAuthRequest, authRequestNotToBeUpdated));
|
||||||
|
|
||||||
// Assert that the values updated on the changed auth requests were updated, and no others
|
// Assert that the values updated on the changed auth requests were updated, and no others
|
||||||
var updatedAuthRequest1 = await authRequestRepository.GetByIdAsync(authRequestToBeUpdated1.Id);
|
var updatedAuthRequest1 = await authRequestRepository.GetByIdAsync(authRequestToBeUpdated1.Id);
|
||||||
|
Assert.NotNull(updatedAuthRequest1);
|
||||||
Assert.True(AuthRequestEquals(authRequestToBeUpdated1, updatedAuthRequest1));
|
Assert.True(AuthRequestEquals(authRequestToBeUpdated1, updatedAuthRequest1));
|
||||||
var updatedAuthRequest2 = await authRequestRepository.GetByIdAsync(authRequestToBeUpdated2.Id);
|
var updatedAuthRequest2 = await authRequestRepository.GetByIdAsync(authRequestToBeUpdated2.Id);
|
||||||
|
Assert.NotNull(updatedAuthRequest2);
|
||||||
Assert.True(AuthRequestEquals(authRequestToBeUpdated2, updatedAuthRequest2));
|
Assert.True(AuthRequestEquals(authRequestToBeUpdated2, updatedAuthRequest2));
|
||||||
|
|
||||||
// Assert that the auth request we never created is not created by
|
// Assert that the auth request we never created is not created by
|
||||||
|
@ -39,6 +39,7 @@ public class EmergencyAccessRepositoriesTests
|
|||||||
|
|
||||||
var updatedGrantee = await userRepository.GetByIdAsync(granteeUser.Id);
|
var updatedGrantee = await userRepository.GetByIdAsync(granteeUser.Id);
|
||||||
|
|
||||||
|
Assert.NotNull(updatedGrantee);
|
||||||
Assert.NotEqual(updatedGrantee.AccountRevisionDate, granteeUser.AccountRevisionDate);
|
Assert.NotEqual(updatedGrantee.AccountRevisionDate, granteeUser.AccountRevisionDate);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -21,9 +21,9 @@ public static class ConfigurationExtensions
|
|||||||
public static Database[] GetDatabases(this IConfiguration config)
|
public static Database[] GetDatabases(this IConfiguration config)
|
||||||
{
|
{
|
||||||
var typedConfig = config.Get<TypedConfig>();
|
var typedConfig = config.Get<TypedConfig>();
|
||||||
if (typedConfig.Databases == null)
|
if (typedConfig?.Databases == null)
|
||||||
{
|
{
|
||||||
return Array.Empty<Database>();
|
return [];
|
||||||
}
|
}
|
||||||
|
|
||||||
return typedConfig.Databases.Where(d => d.Enabled).ToArray();
|
return typedConfig.Databases.Where(d => d.Enabled).ToArray();
|
||||||
|
@ -27,6 +27,7 @@ public class SendRepositoryTests
|
|||||||
Assert.Equal(expirationDate, createdSend.ExpirationDate!.Value, LaxDateTimeComparer.Default);
|
Assert.Equal(expirationDate, createdSend.ExpirationDate!.Value, LaxDateTimeComparer.Default);
|
||||||
|
|
||||||
var sendFromDatabase = await sendRepository.GetByIdAsync(createdSend.Id);
|
var sendFromDatabase = await sendRepository.GetByIdAsync(createdSend.Id);
|
||||||
|
Assert.NotNull(sendFromDatabase);
|
||||||
Assert.Equal(expirationDate, sendFromDatabase.ExpirationDate!.Value, LaxDateTimeComparer.Default);
|
Assert.Equal(expirationDate, sendFromDatabase.ExpirationDate!.Value, LaxDateTimeComparer.Default);
|
||||||
Assert.Equal(SendType.Text, sendFromDatabase.Type);
|
Assert.Equal(SendType.Text, sendFromDatabase.Type);
|
||||||
Assert.Equal(0, sendFromDatabase.AccessCount);
|
Assert.Equal(0, sendFromDatabase.AccessCount);
|
||||||
|
@ -40,6 +40,7 @@ public class CipherRepositoryTests
|
|||||||
|
|
||||||
Assert.Null(deletedCipher);
|
Assert.Null(deletedCipher);
|
||||||
var updatedUser = await userRepository.GetByIdAsync(user.Id);
|
var updatedUser = await userRepository.GetByIdAsync(user.Id);
|
||||||
|
Assert.NotNull(updatedUser);
|
||||||
Assert.NotEqual(updatedUser.AccountRevisionDate, user.AccountRevisionDate);
|
Assert.NotEqual(updatedUser.AccountRevisionDate, user.AccountRevisionDate);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -61,6 +62,7 @@ public class CipherRepositoryTests
|
|||||||
});
|
});
|
||||||
|
|
||||||
user = await userRepository.GetByIdAsync(user.Id);
|
user = await userRepository.GetByIdAsync(user.Id);
|
||||||
|
Assert.NotNull(user);
|
||||||
|
|
||||||
var organization = await organizationRepository.CreateAsync(new Organization
|
var organization = await organizationRepository.CreateAsync(new Organization
|
||||||
{
|
{
|
||||||
@ -110,6 +112,7 @@ public class CipherRepositoryTests
|
|||||||
|
|
||||||
var updatedUser = await userRepository.GetByIdAsync(user.Id);
|
var updatedUser = await userRepository.GetByIdAsync(user.Id);
|
||||||
|
|
||||||
|
Assert.NotNull(updatedUser);
|
||||||
Assert.True(updatedUser.AccountRevisionDate - user.AccountRevisionDate > TimeSpan.Zero,
|
Assert.True(updatedUser.AccountRevisionDate - user.AccountRevisionDate > TimeSpan.Zero,
|
||||||
"The AccountRevisionDate is expected to be changed");
|
"The AccountRevisionDate is expected to be changed");
|
||||||
|
|
||||||
@ -135,6 +138,7 @@ public class CipherRepositoryTests
|
|||||||
|
|
||||||
|
|
||||||
user = await userRepository.GetByIdAsync(user.Id);
|
user = await userRepository.GetByIdAsync(user.Id);
|
||||||
|
Assert.NotNull(user);
|
||||||
|
|
||||||
// Create cipher in personal vault
|
// Create cipher in personal vault
|
||||||
var createdCipher = await cipherRepository.CreateAsync(new Cipher
|
var createdCipher = await cipherRepository.CreateAsync(new Cipher
|
||||||
@ -176,6 +180,7 @@ public class CipherRepositoryTests
|
|||||||
|
|
||||||
var updatedCipher = await cipherRepository.GetByIdAsync(createdCipher.Id);
|
var updatedCipher = await cipherRepository.GetByIdAsync(createdCipher.Id);
|
||||||
|
|
||||||
|
Assert.NotNull(updatedCipher);
|
||||||
Assert.Null(updatedCipher.UserId);
|
Assert.Null(updatedCipher.UserId);
|
||||||
Assert.Equal(organization.Id, updatedCipher.OrganizationId);
|
Assert.Equal(organization.Id, updatedCipher.OrganizationId);
|
||||||
Assert.NotNull(updatedCipher.Folders);
|
Assert.NotNull(updatedCipher.Folders);
|
||||||
|
Loading…
Reference in New Issue
Block a user