File: connection_test.go

package info (click to toggle)
gh 2.46.0-4
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 15,548 kB
  • sloc: sh: 227; makefile: 117
file content (81 lines) | stat: -rw-r--r-- 2,980 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
package connection

import (
	"context"
	"reflect"
	"testing"

	"github.com/cli/cli/v2/internal/codespaces/api"
	"github.com/microsoft/dev-tunnels/go/tunnels"
)

func TestNewCodespaceConnection(t *testing.T) {
	ctx := context.Background()

	// Create a mock codespace
	connection := api.CodespaceConnection{
		TunnelProperties: api.TunnelProperties{
			ConnectAccessToken:     "connect-token",
			ManagePortsAccessToken: "manage-ports-token",
			ServiceUri:             "http://global.rel.tunnels.api.visualstudio.com/",
			TunnelId:               "tunnel-id",
			ClusterId:              "usw2",
			Domain:                 "domain.com",
		},
	}
	allowedPortPrivacySettings := []string{"public", "private"}
	codespace := &api.Codespace{
		Connection:         connection,
		RuntimeConstraints: api.RuntimeConstraints{AllowedPortPrivacySettings: allowedPortPrivacySettings},
	}

	// Create the mock HTTP client
	httpClient, err := NewMockHttpClient()
	if err != nil {
		t.Fatalf("NewHttpClient returned an error: %v", err)
	}

	// Create the connection
	conn, err := NewCodespaceConnection(ctx, codespace, httpClient)
	if err != nil {
		t.Fatalf("NewCodespaceConnection returned an error: %v", err)
	}

	// Verify closing before connected doesn't throw
	err = conn.Close()
	if err != nil {
		t.Fatalf("Close returned an error: %v", err)
	}

	// Check that the connection was created successfully
	if conn == nil {
		t.Fatal("NewCodespaceConnection returned nil")
	}

	// Verify that the connection contains the expected tunnel properties
	if conn.tunnelProperties != connection.TunnelProperties {
		t.Fatalf("NewCodespaceConnection returned a connection with unexpected tunnel properties: %+v", conn.tunnelProperties)
	}

	// Verify that the connection contains the expected tunnel
	expectedTunnel := &tunnels.Tunnel{
		AccessTokens: map[tunnels.TunnelAccessScope]string{tunnels.TunnelAccessScopeConnect: connection.TunnelProperties.ConnectAccessToken, tunnels.TunnelAccessScopeManagePorts: connection.TunnelProperties.ManagePortsAccessToken},
		TunnelID:     connection.TunnelProperties.TunnelId,
		ClusterID:    connection.TunnelProperties.ClusterId,
		Domain:       connection.TunnelProperties.Domain,
	}
	if !reflect.DeepEqual(conn.Tunnel, expectedTunnel) {
		t.Fatalf("NewCodespaceConnection returned a connection with unexpected tunnel: %+v", conn.Tunnel)
	}

	// Verify that the connection contains the expected tunnel options
	expectedOptions := &tunnels.TunnelRequestOptions{IncludePorts: true}
	if !reflect.DeepEqual(conn.Options, expectedOptions) {
		t.Fatalf("NewCodespaceConnection returned a connection with unexpected options: %+v", conn.Options)
	}

	// Verify that the connection contains the expected allowed port privacy settings
	if !reflect.DeepEqual(conn.AllowedPortPrivacySettings, allowedPortPrivacySettings) {
		t.Fatalf("NewCodespaceConnection returned a connection with unexpected allowed port privacy settings: %+v", conn.AllowedPortPrivacySettings)
	}
}