@@ -11,9 +11,6 @@ import (
11
11
12
12
"github.com/coder/coder/v2/coderd/httpmw"
13
13
"github.com/coder/coder/v2/codersdk"
14
- "github.com/coder/coder/v2/enterprise/coderd/coderdenttest"
15
- "github.com/coder/coder/v2/enterprise/coderd/license"
16
- "github.com/coder/coder/v2/testutil"
17
14
)
18
15
19
16
func TestExtractProvisionerDaemonAuthenticated (t * testing.T ) {
@@ -148,75 +145,75 @@ func TestExtractProvisionerDaemonAuthenticated(t *testing.T) {
148
145
})
149
146
}
150
147
151
- t .Run ("ProvisionerKey" , func (t * testing.T ) {
152
- t .Parallel ()
153
-
154
- ctx , cancel := context .WithTimeout (context .Background (), testutil .WaitShort )
155
- defer cancel ()
156
- client , db , user := coderdenttest .NewWithDatabase (t , & coderdenttest.Options {
157
- LicenseOptions : & coderdenttest.LicenseOptions {
158
- Features : license.Features {
159
- codersdk .FeatureExternalProvisionerDaemons : 1 ,
160
- },
161
- },
162
- })
163
- // nolint:gocritic // test
164
- key , err := client .CreateProvisionerKey (ctx , user .OrganizationID , codersdk.CreateProvisionerKeyRequest {
165
- Name : "dont-TEST-me" ,
166
- })
167
- require .NoError (t , err )
168
-
169
- routeCtx := chi .NewRouteContext ()
170
- r := httptest .NewRequest (http .MethodGet , "/" , nil )
171
- r = r .WithContext (context .WithValue (r .Context (), chi .RouteCtxKey , routeCtx ))
172
- res := httptest .NewRecorder ()
173
-
174
- r .Header .Set (codersdk .ProvisionerDaemonKey , key .Key )
175
-
176
- httpmw .ExtractProvisionerDaemonAuthenticated (httpmw.ExtractProvisionerAuthConfig {
177
- DB : db ,
178
- Optional : false ,
179
- })(http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {
180
- w .WriteHeader (http .StatusOK )
181
- })).ServeHTTP (res , r )
182
-
183
- require .Equal (t , http .StatusOK , res .Result ().StatusCode )
184
- })
185
-
186
- t .Run ("ProvisionerKey_NotFound" , func (t * testing.T ) {
187
- t .Parallel ()
188
-
189
- ctx , cancel := context .WithTimeout (context .Background (), testutil .WaitShort )
190
- defer cancel ()
191
- client , db , user := coderdenttest .NewWithDatabase (t , & coderdenttest.Options {
192
- LicenseOptions : & coderdenttest.LicenseOptions {
193
- Features : license.Features {
194
- codersdk .FeatureExternalProvisionerDaemons : 1 ,
195
- },
196
- },
197
- })
198
- // nolint:gocritic // test
199
- _ , err := client .CreateProvisionerKey (ctx , user .OrganizationID , codersdk.CreateProvisionerKeyRequest {
200
- Name : "dont-TEST-me" ,
201
- })
202
- require .NoError (t , err )
203
-
204
- routeCtx := chi .NewRouteContext ()
205
- r := httptest .NewRequest (http .MethodGet , "/" , nil )
206
- r = r .WithContext (context .WithValue (r .Context (), chi .RouteCtxKey , routeCtx ))
207
- res := httptest .NewRecorder ()
208
-
209
- r .Header .Set (codersdk .ProvisionerDaemonKey , "5Hl2Qw9kX3nM7vB4jR8pY6tA1cF0eD5uI2oL9gN3mZ4" )
210
-
211
- httpmw .ExtractProvisionerDaemonAuthenticated (httpmw.ExtractProvisionerAuthConfig {
212
- DB : db ,
213
- Optional : false ,
214
- })(http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {
215
- w .WriteHeader (http .StatusOK )
216
- })).ServeHTTP (res , r )
217
-
218
- require .Equal (t , http .StatusUnauthorized , res .Result ().StatusCode )
219
- require .Contains (t , res .Body .String (), "provisioner daemon key invalid" )
220
- })
148
+ // t.Run("ProvisionerKey", func(t *testing.T) {
149
+ // t.Parallel()
150
+
151
+ // ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitShort)
152
+ // defer cancel()
153
+ // client, db, user := coderdenttest.NewWithDatabase(t, &coderdenttest.Options{
154
+ // LicenseOptions: &coderdenttest.LicenseOptions{
155
+ // Features: license.Features{
156
+ // codersdk.FeatureExternalProvisionerDaemons: 1,
157
+ // },
158
+ // },
159
+ // })
160
+ // // nolint:gocritic // test
161
+ // key, err := client.CreateProvisionerKey(ctx, user.OrganizationID, codersdk.CreateProvisionerKeyRequest{
162
+ // Name: "dont-TEST-me",
163
+ // })
164
+ // require.NoError(t, err)
165
+
166
+ // routeCtx := chi.NewRouteContext()
167
+ // r := httptest.NewRequest(http.MethodGet, "/", nil)
168
+ // r = r.WithContext(context.WithValue(r.Context(), chi.RouteCtxKey, routeCtx))
169
+ // res := httptest.NewRecorder()
170
+
171
+ // r.Header.Set(codersdk.ProvisionerDaemonKey, key.Key)
172
+
173
+ // httpmw.ExtractProvisionerDaemonAuthenticated(httpmw.ExtractProvisionerAuthConfig{
174
+ // DB: db,
175
+ // Optional: false,
176
+ // })(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
177
+ // w.WriteHeader(http.StatusOK)
178
+ // })).ServeHTTP(res, r)
179
+
180
+ // require.Equal(t, http.StatusOK, res.Result().StatusCode)
181
+ // })
182
+
183
+ // t.Run("ProvisionerKey_NotFound", func(t *testing.T) {
184
+ // t.Parallel()
185
+
186
+ // ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitShort)
187
+ // defer cancel()
188
+ // client, db, user := coderdenttest.NewWithDatabase(t, &coderdenttest.Options{
189
+ // LicenseOptions: &coderdenttest.LicenseOptions{
190
+ // Features: license.Features{
191
+ // codersdk.FeatureExternalProvisionerDaemons: 1,
192
+ // },
193
+ // },
194
+ // })
195
+ // // nolint:gocritic // test
196
+ // _, err := client.CreateProvisionerKey(ctx, user.OrganizationID, codersdk.CreateProvisionerKeyRequest{
197
+ // Name: "dont-TEST-me",
198
+ // })
199
+ // require.NoError(t, err)
200
+
201
+ // routeCtx := chi.NewRouteContext()
202
+ // r := httptest.NewRequest(http.MethodGet, "/", nil)
203
+ // r = r.WithContext(context.WithValue(r.Context(), chi.RouteCtxKey, routeCtx))
204
+ // res := httptest.NewRecorder()
205
+
206
+ // r.Header.Set(codersdk.ProvisionerDaemonKey, "5Hl2Qw9kX3nM7vB4jR8pY6tA1cF0eD5uI2oL9gN3mZ4")
207
+
208
+ // httpmw.ExtractProvisionerDaemonAuthenticated(httpmw.ExtractProvisionerAuthConfig{
209
+ // DB: db,
210
+ // Optional: false,
211
+ // })(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
212
+ // w.WriteHeader(http.StatusOK)
213
+ // })).ServeHTTP(res, r)
214
+
215
+ // require.Equal(t, http.StatusUnauthorized, res.Result().StatusCode)
216
+ // require.Contains(t, res.Body.String(), "provisioner daemon key invalid")
217
+ // })
221
218
222
219
}
0 commit comments