#### Does this PR need a docs update or release note? - [x] ⛔ No #### Type of change <!--- Please check the type of change your PR introduces: ---> - [x] 🌻 Feature #### Issue(s) * #3989 #### Test Plan - [x] 💪 Manual - [x] ⚡ Unit test
109 lines
3.3 KiB
Go
109 lines
3.3 KiB
Go
package restore
|
|
|
|
import (
|
|
"bytes"
|
|
"testing"
|
|
|
|
"github.com/alcionai/clues"
|
|
"github.com/spf13/cobra"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"github.com/stretchr/testify/suite"
|
|
|
|
"github.com/alcionai/corso/src/cli/flags"
|
|
"github.com/alcionai/corso/src/cli/utils"
|
|
"github.com/alcionai/corso/src/cli/utils/testdata"
|
|
"github.com/alcionai/corso/src/internal/tester"
|
|
)
|
|
|
|
type GroupsUnitSuite struct {
|
|
tester.Suite
|
|
}
|
|
|
|
func TestGroupsUnitSuite(t *testing.T) {
|
|
suite.Run(t, &GroupsUnitSuite{Suite: tester.NewUnitSuite(t)})
|
|
}
|
|
|
|
func (suite *GroupsUnitSuite) TestAddGroupsCommands() {
|
|
expectUse := groupsServiceCommand + " " + groupsServiceCommandUseSuffix
|
|
|
|
table := []struct {
|
|
name string
|
|
use string
|
|
expectUse string
|
|
expectShort string
|
|
expectRunE func(*cobra.Command, []string) error
|
|
}{
|
|
{"restore groups", restoreCommand, expectUse, groupsRestoreCmd().Short, restoreGroupsCmd},
|
|
}
|
|
for _, test := range table {
|
|
suite.Run(test.name, func() {
|
|
t := suite.T()
|
|
|
|
cmd := &cobra.Command{Use: test.use}
|
|
|
|
// normally a persistent flag from the root.
|
|
// required to ensure a dry run.
|
|
flags.AddRunModeFlag(cmd, true)
|
|
|
|
c := addGroupsCommands(cmd)
|
|
require.NotNil(t, c)
|
|
|
|
cmds := cmd.Commands()
|
|
require.Len(t, cmds, 1)
|
|
|
|
child := cmds[0]
|
|
assert.Equal(t, test.expectUse, child.Use)
|
|
assert.Equal(t, test.expectShort, child.Short)
|
|
tester.AreSameFunc(t, test.expectRunE, child.RunE)
|
|
|
|
cmd.SetArgs([]string{
|
|
"groups",
|
|
"--" + flags.RunModeFN, flags.RunModeFlagTest,
|
|
"--" + flags.BackupFN, testdata.BackupInput,
|
|
|
|
"--" + flags.CollisionsFN, testdata.Collisions,
|
|
"--" + flags.DestinationFN, testdata.Destination,
|
|
"--" + flags.ToResourceFN, testdata.ToResource,
|
|
|
|
"--" + flags.AWSAccessKeyFN, testdata.AWSAccessKeyID,
|
|
"--" + flags.AWSSecretAccessKeyFN, testdata.AWSSecretAccessKey,
|
|
"--" + flags.AWSSessionTokenFN, testdata.AWSSessionToken,
|
|
|
|
"--" + flags.AzureClientIDFN, testdata.AzureClientID,
|
|
"--" + flags.AzureClientTenantFN, testdata.AzureTenantID,
|
|
"--" + flags.AzureClientSecretFN, testdata.AzureClientSecret,
|
|
|
|
"--" + flags.CorsoPassphraseFN, testdata.CorsoPassphrase,
|
|
|
|
// bool flags
|
|
"--" + flags.RestorePermissionsFN,
|
|
})
|
|
|
|
cmd.SetOut(new(bytes.Buffer)) // drop output
|
|
cmd.SetErr(new(bytes.Buffer)) // drop output
|
|
err := cmd.Execute()
|
|
// assert.NoError(t, err, clues.ToCore(err))
|
|
assert.ErrorIs(t, err, utils.ErrNotYetImplemented, clues.ToCore(err))
|
|
|
|
opts := utils.MakeGroupsOpts(cmd)
|
|
assert.Equal(t, testdata.BackupInput, flags.BackupIDFV)
|
|
|
|
assert.Equal(t, testdata.Collisions, opts.RestoreCfg.Collisions)
|
|
assert.Equal(t, testdata.Destination, opts.RestoreCfg.Destination)
|
|
assert.Equal(t, testdata.ToResource, opts.RestoreCfg.ProtectedResource)
|
|
|
|
assert.Equal(t, testdata.AWSAccessKeyID, flags.AWSAccessKeyFV)
|
|
assert.Equal(t, testdata.AWSSecretAccessKey, flags.AWSSecretAccessKeyFV)
|
|
assert.Equal(t, testdata.AWSSessionToken, flags.AWSSessionTokenFV)
|
|
|
|
assert.Equal(t, testdata.AzureClientID, flags.AzureClientIDFV)
|
|
assert.Equal(t, testdata.AzureTenantID, flags.AzureClientTenantFV)
|
|
assert.Equal(t, testdata.AzureClientSecret, flags.AzureClientSecretFV)
|
|
|
|
assert.Equal(t, testdata.CorsoPassphrase, flags.CorsoPassphraseFV)
|
|
assert.True(t, flags.RestorePermissionsFV)
|
|
})
|
|
}
|
|
}
|