-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
test: removes e2e tests in favor of the sdk-test suite #131
Changes from all commits
de1e6af
0109b5d
d62f059
1c6b829
387b088
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,82 +1,13 @@ | ||
package passage_test | ||
|
||
import ( | ||
"crypto/rand" | ||
"fmt" | ||
"os" | ||
"strings" | ||
"sync" | ||
"testing" | ||
|
||
"github.com/joho/godotenv" | ||
"github.com/passageidentity/passage-go/v2" | ||
"github.com/stretchr/testify/assert" | ||
"github.com/stretchr/testify/require" | ||
) | ||
|
||
var ( | ||
PassageAppID string | ||
PassageApiKey string | ||
PassageUserID string | ||
PassageAuthToken string | ||
RandomEmail = generateRandomEmail(14) | ||
CreatedUser passage.PassageUser | ||
) | ||
|
||
func generateRandomEmail(prefixLength int) string { | ||
n := prefixLength | ||
randomChars := make([]byte, n) | ||
if _, err := rand.Read(randomChars); err != nil { | ||
panic(err) | ||
} | ||
email := fmt.Sprintf("%[email protected]", randomChars) | ||
return strings.ToLower(email) | ||
} | ||
|
||
func TestMain(m *testing.M) { | ||
_ = godotenv.Load(".env") | ||
|
||
PassageAppID = os.Getenv("PASSAGE_APP_ID") | ||
PassageApiKey = os.Getenv("PASSAGE_API_KEY") | ||
PassageUserID = os.Getenv("PASSAGE_USER_ID") | ||
PassageAuthToken = os.Getenv("PASSAGE_AUTH_TOKEN") | ||
|
||
exitVal := m.Run() | ||
os.Exit(exitVal) | ||
} | ||
|
||
func passageUserNotFoundAsserts(t *testing.T, err error) { | ||
splitError := strings.Split(err.Error(), ", ") | ||
assert.Len(t, splitError, 3) | ||
assert.Equal(t, "PassageError - message: User not found", splitError[0]) | ||
assert.Equal(t, "errorCode: user_not_found", splitError[1]) | ||
assert.Equal(t, "statusCode: 404", splitError[2]) | ||
} | ||
|
||
func passageCouldNotFindUserByIdentifierAsserts(t *testing.T, err error) { | ||
splitError := strings.Split(err.Error(), ", ") | ||
assert.Len(t, splitError, 3) | ||
assert.Equal(t, "PassageError - message: Could not find user with that identifier.", splitError[0]) | ||
assert.Equal(t, "errorCode: user_not_found", splitError[1]) | ||
assert.Equal(t, "statusCode: 404", splitError[2]) | ||
} | ||
|
||
func passageUnauthorizedAsserts(t *testing.T, err error) { | ||
splitError := strings.Split(err.Error(), ", ") | ||
assert.Len(t, splitError, 3) | ||
assert.Equal(t, "PassageError - message: Invalid access token", splitError[0]) | ||
assert.Equal(t, "errorCode: invalid_access_token", splitError[1]) | ||
assert.Equal(t, "statusCode: 401", splitError[2]) | ||
} | ||
|
||
func passageBadRequestAsserts(t *testing.T, err error, message string) { | ||
splitError := strings.Split(err.Error(), ", ") | ||
assert.Len(t, splitError, 3) | ||
assert.Equal(t, "PassageError - message: "+message, splitError[0]) | ||
assert.Equal(t, "errorCode: invalid_request", splitError[1]) | ||
assert.Equal(t, "statusCode: 400", splitError[2]) | ||
} | ||
|
||
// should be run with the -race flag, i.e. `go test -race -run TestAppJWKSCacheWriteConcurrency` | ||
func TestAppJWKSCacheWriteConcurrency(t *testing.T) { | ||
goRoutineCount := 2 | ||
|
@@ -88,7 +19,8 @@ func TestAppJWKSCacheWriteConcurrency(t *testing.T) { | |
go func() { | ||
defer wg.Done() | ||
|
||
_, err := passage.New(PassageAppID, PassageApiKey) | ||
// a network call is made upon initialization to retrieve the JWKs from a real source | ||
_, err := passage.New("passage", "some-api-key") | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. figured this is the safest and easiest way to keep this test functional There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Does this test require the app ID to be valid? If not, maybe having There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. the app ID must be valid so it can reach out and cache the JWKS There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 👍 makes sense. Is this initialization behavior unique to this SDK? It might be helpful to add a comment here noting that a real network request will be made with the app ID to cache the JWKs. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. no, all SDKs try to get the JWKs immediately upon initialization. added a comment in 387b088 |
||
require.Nil(t, err) | ||
}() | ||
} | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thought it would be better to leave this test in this repo since the issue was raised here and it's easier to understand the regression at this level