forked from google/go-github
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathorgs_credential_authorizations_test.go
103 lines (87 loc) · 3.03 KB
/
orgs_credential_authorizations_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
// Copyright 2023 The go-github AUTHORS. All rights reserved.
//
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package github
import (
"context"
"fmt"
"net/http"
"testing"
"time"
"github.com/google/go-cmp/cmp"
)
func TestOrganizationsService_ListCredentialAuthorizations(t *testing.T) {
t.Parallel()
client, mux, _ := setup(t)
mux.HandleFunc("/orgs/o/credential-authorizations", func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
testFormValues(t, r, values{"per_page": "2", "page": "2", "login": "l"})
fmt.Fprint(w, `[
{
"login": "l",
"credential_id": 1,
"credential_type": "t",
"credential_authorized_at": "2017-01-21T00:00:00Z",
"credential_accessed_at": "2017-01-21T00:00:00Z",
"authorized_credential_id": 1
}
]`)
})
opts := &CredentialAuthorizationsListOptions{
ListOptions: ListOptions{Page: 2, PerPage: 2},
Login: "l",
}
ctx := context.Background()
creds, _, err := client.Organizations.ListCredentialAuthorizations(ctx, "o", opts)
if err != nil {
t.Errorf("Organizations.ListCredentialAuthorizations returned error: %v", err)
}
ts := time.Date(2017, time.January, 21, 0, 0, 0, 0, time.UTC)
want := []*CredentialAuthorization{
{
Login: String("l"),
CredentialID: Int64(1),
CredentialType: String("t"),
CredentialAuthorizedAt: &Timestamp{ts},
CredentialAccessedAt: &Timestamp{ts},
AuthorizedCredentialID: Int64(1),
},
}
if !cmp.Equal(creds, want) {
t.Errorf("Organizations.ListCredentialAuthorizations returned %+v, want %+v", creds, want)
}
const methodName = "ListCredentialAuthorizations"
testBadOptions(t, methodName, func() (err error) {
_, _, err = client.Organizations.ListCredentialAuthorizations(ctx, "\n", opts)
return err
})
testNewRequestAndDoFailure(t, methodName, client, func() (*Response, error) {
_, resp, err := client.Organizations.ListCredentialAuthorizations(ctx, "o", opts)
return resp, err
})
}
func TestOrganizationsService_RemoveCredentialAuthorization(t *testing.T) {
t.Parallel()
client, mux, _ := setup(t)
mux.HandleFunc("/orgs/o/credential-authorizations/1", func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodDelete)
w.WriteHeader(http.StatusNoContent)
})
ctx := context.Background()
resp, err := client.Organizations.RemoveCredentialAuthorization(ctx, "o", 1)
if err != nil {
t.Errorf("Organizations.RemoveCredentialAuthorization returned error: %v", err)
}
if resp.StatusCode != http.StatusNoContent {
t.Errorf("Organizations.RemoveCredentialAuthorization returned %v, want %v", resp.StatusCode, http.StatusNoContent)
}
const methodName = "RemoveCredentialAuthorization"
testBadOptions(t, methodName, func() (err error) {
_, err = client.Organizations.RemoveCredentialAuthorization(ctx, "\n", 0)
return err
})
testNewRequestAndDoFailure(t, methodName, client, func() (*Response, error) {
return client.Organizations.RemoveCredentialAuthorization(ctx, "o", 1)
})
}