@@ -65,18 +65,31 @@ func TestTokensService_CreatePersonalAccessTokenWithoutFeatureFlag(t *testing.T)
65
65
66
66
func TestTokensService_GetPersonalAccessToken (t * testing.T ) {
67
67
user := newUser (& protocol.User {})
68
+ user2 := newUser (& protocol.User {})
68
69
69
- t .Run ("permission denied when feature flag is disabled" , func (t * testing.T ) {
70
- serverMock , _ , client := setupTokensService (t , withTokenFeatureDisabled )
70
+ t .Run ("get correct token" , func (t * testing.T ) {
71
+ serverMock , dbConn , client := setupTokensService (t , withTokenFeatureEnabled )
72
+
73
+ tokens := dbtest .CreatePersonalAccessTokenRecords (t , dbConn ,
74
+ dbtest .NewPersonalAccessToken (t , db.PersonalAccessToken {
75
+ UserID : uuid .MustParse (user .ID ),
76
+ }),
77
+ dbtest .NewPersonalAccessToken (t , db.PersonalAccessToken {
78
+ UserID : uuid .MustParse (user2 .ID ),
79
+ }),
80
+ )
71
81
72
82
serverMock .EXPECT ().GetLoggedInUser (gomock .Any ()).Return (user , nil )
73
83
74
- _ , err := client .GetPersonalAccessToken (context .Background (), connect .NewRequest (& v1.GetPersonalAccessTokenRequest {
75
- Id : uuid . New () .String (),
84
+ response , err := client .GetPersonalAccessToken (context .Background (), connect .NewRequest (& v1.GetPersonalAccessTokenRequest {
85
+ Id : tokens [ 0 ]. ID .String (),
76
86
}))
77
87
78
- require .Error (t , err , "This feature is currently in beta. If you would like to be part of the beta, please contact us." )
79
- require .Equal (t , connect .CodePermissionDenied , connect .CodeOf (err ))
88
+ require .NoError (t , err )
89
+
90
+ requireEqualProto (t , & v1.GetPersonalAccessTokenResponse {
91
+ Token : personalAccessTokenToAPI (tokens [0 ], "" ),
92
+ }, response .Msg )
80
93
})
81
94
82
95
t .Run ("invalid argument when Token ID is empty" , func (t * testing.T ) {
@@ -97,16 +110,35 @@ func TestTokensService_GetPersonalAccessToken(t *testing.T) {
97
110
require .Equal (t , connect .CodeInvalidArgument , connect .CodeOf (err ))
98
111
})
99
112
100
- t .Run ("unimplemented when feature flag enabled" , func (t * testing.T ) {
101
- serverMock , _ , client := setupTokensService (t , withTokenFeatureEnabled )
113
+ t .Run ("responds with not found when token is not found" , func (t * testing.T ) {
114
+ serverMock , dbConn , client := setupTokensService (t , withTokenFeatureEnabled )
115
+
116
+ dbtest .CreatePersonalAccessTokenRecords (t , dbConn ,
117
+ dbtest .NewPersonalAccessToken (t , db.PersonalAccessToken {
118
+ UserID : uuid .MustParse (user .ID ),
119
+ }),
120
+ )
102
121
103
122
serverMock .EXPECT ().GetLoggedInUser (gomock .Any ()).Return (user , nil )
104
123
105
124
_ , err := client .GetPersonalAccessToken (context .Background (), connect .NewRequest (& v1.GetPersonalAccessTokenRequest {
106
125
Id : uuid .New ().String (),
107
126
}))
108
127
109
- require .Equal (t , connect .CodeUnimplemented , connect .CodeOf (err ))
128
+ require .Equal (t , connect .CodeNotFound , connect .CodeOf (err ))
129
+ })
130
+
131
+ t .Run ("permission denied when feature flag disabled" , func (t * testing.T ) {
132
+ serverMock , _ , client := setupTokensService (t , withTokenFeatureDisabled )
133
+
134
+ serverMock .EXPECT ().GetLoggedInUser (gomock .Any ()).Return (user , nil )
135
+
136
+ _ , err := client .GetPersonalAccessToken (context .Background (), connect .NewRequest (& v1.GetPersonalAccessTokenRequest {
137
+ Id : uuid .New ().String (),
138
+ }))
139
+
140
+ require .Error (t , err , "This feature is currently in beta. If you would like to be part of the beta, please contact us." )
141
+ require .Equal (t , connect .CodePermissionDenied , connect .CodeOf (err ))
110
142
})
111
143
}
112
144
0 commit comments