aboutsummaryrefslogtreecommitdiff
path: root/internal/route/lfs/route_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'internal/route/lfs/route_test.go')
-rw-r--r--internal/route/lfs/route_test.go34
1 files changed, 17 insertions, 17 deletions
diff --git a/internal/route/lfs/route_test.go b/internal/route/lfs/route_test.go
index cc6fb1be..dd8f5cde 100644
--- a/internal/route/lfs/route_test.go
+++ b/internal/route/lfs/route_test.go
@@ -52,12 +52,12 @@ func Test_authenticate(t *testing.T) {
"Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
},
mockUsersStore: func() db.UsersStore {
- mock := db.NewMockUsersStore()
+ mock := NewMockUsersStore()
mock.AuthenticateFunc.SetDefaultReturn(&db.User{}, nil)
return mock
},
mockTwoFactorsStore: func() db.TwoFactorsStore {
- mock := db.NewMockTwoFactorsStore()
+ mock := NewMockTwoFactorsStore()
mock.IsUserEnabledFunc.SetDefaultReturn(true)
return mock
},
@@ -71,12 +71,12 @@ func Test_authenticate(t *testing.T) {
"Authorization": []string{"Basic dXNlcm5hbWU="},
},
mockUsersStore: func() db.UsersStore {
- mock := db.NewMockUsersStore()
+ mock := NewMockUsersStore()
mock.AuthenticateFunc.SetDefaultReturn(nil, auth.ErrBadCredentials{})
return mock
},
mockAccessTokensStore: func() db.AccessTokensStore {
- mock := db.NewMockAccessTokensStore()
+ mock := NewMockAccessTokensStore()
mock.GetBySHA1Func.SetDefaultReturn(nil, db.ErrAccessTokenNotExist{})
return mock
},
@@ -94,12 +94,12 @@ func Test_authenticate(t *testing.T) {
"Authorization": []string{"Basic dXNlcm5hbWU6cGFzc3dvcmQ="},
},
mockUsersStore: func() db.UsersStore {
- mock := db.NewMockUsersStore()
+ mock := NewMockUsersStore()
mock.AuthenticateFunc.SetDefaultReturn(&db.User{ID: 1, Name: "unknwon"}, nil)
return mock
},
mockTwoFactorsStore: func() db.TwoFactorsStore {
- mock := db.NewMockTwoFactorsStore()
+ mock := NewMockTwoFactorsStore()
mock.IsUserEnabledFunc.SetDefaultReturn(false)
return mock
},
@@ -113,13 +113,13 @@ func Test_authenticate(t *testing.T) {
"Authorization": []string{"Basic dXNlcm5hbWU="},
},
mockUsersStore: func() db.UsersStore {
- mock := db.NewMockUsersStore()
+ mock := NewMockUsersStore()
mock.AuthenticateFunc.SetDefaultReturn(nil, auth.ErrBadCredentials{})
mock.GetByIDFunc.SetDefaultReturn(&db.User{ID: 1, Name: "unknwon"}, nil)
return mock
},
mockAccessTokensStore: func() db.AccessTokensStore {
- mock := db.NewMockAccessTokensStore()
+ mock := NewMockAccessTokensStore()
mock.GetBySHA1Func.SetDefaultReturn(&db.AccessToken{}, nil)
return mock
},
@@ -176,7 +176,7 @@ func Test_authorize(t *testing.T) {
name: "user does not exist",
authroize: authorize(db.AccessModeNone),
mockUsersStore: func() db.UsersStore {
- mock := db.NewMockUsersStore()
+ mock := NewMockUsersStore()
mock.GetByUsernameFunc.SetDefaultReturn(nil, db.ErrUserNotExist{})
return mock
},
@@ -186,14 +186,14 @@ func Test_authorize(t *testing.T) {
name: "repository does not exist",
authroize: authorize(db.AccessModeNone),
mockUsersStore: func() db.UsersStore {
- mock := db.NewMockUsersStore()
+ mock := NewMockUsersStore()
mock.GetByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*db.User, error) {
return &db.User{Name: username}, nil
})
return mock
},
mockReposStore: func() db.ReposStore {
- mock := db.NewMockReposStore()
+ mock := NewMockReposStore()
mock.GetByNameFunc.SetDefaultReturn(nil, db.ErrRepoNotExist{})
return mock
},
@@ -203,21 +203,21 @@ func Test_authorize(t *testing.T) {
name: "actor is not authorized",
authroize: authorize(db.AccessModeWrite),
mockUsersStore: func() db.UsersStore {
- mock := db.NewMockUsersStore()
+ mock := NewMockUsersStore()
mock.GetByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*db.User, error) {
return &db.User{Name: username}, nil
})
return mock
},
mockReposStore: func() db.ReposStore {
- mock := db.NewMockReposStore()
+ mock := NewMockReposStore()
mock.GetByNameFunc.SetDefaultHook(func(ctx context.Context, ownerID int64, name string) (*db.Repository, error) {
return &db.Repository{Name: name}, nil
})
return mock
},
mockPermsStore: func() db.PermsStore {
- mock := db.NewMockPermsStore()
+ mock := NewMockPermsStore()
mock.AuthorizeFunc.SetDefaultHook(func(ctx context.Context, userID int64, repoID int64, desired db.AccessMode, opts db.AccessModeOptions) bool {
return desired <= db.AccessModeRead
})
@@ -230,21 +230,21 @@ func Test_authorize(t *testing.T) {
name: "actor is authorized",
authroize: authorize(db.AccessModeRead),
mockUsersStore: func() db.UsersStore {
- mock := db.NewMockUsersStore()
+ mock := NewMockUsersStore()
mock.GetByUsernameFunc.SetDefaultHook(func(ctx context.Context, username string) (*db.User, error) {
return &db.User{Name: username}, nil
})
return mock
},
mockReposStore: func() db.ReposStore {
- mock := db.NewMockReposStore()
+ mock := NewMockReposStore()
mock.GetByNameFunc.SetDefaultHook(func(ctx context.Context, ownerID int64, name string) (*db.Repository, error) {
return &db.Repository{Name: name}, nil
})
return mock
},
mockPermsStore: func() db.PermsStore {
- mock := db.NewMockPermsStore()
+ mock := NewMockPermsStore()
mock.AuthorizeFunc.SetDefaultHook(func(ctx context.Context, userID int64, repoID int64, desired db.AccessMode, opts db.AccessModeOptions) bool {
return desired <= db.AccessModeRead
})