forked from stmcginnis/gofish
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathprivilegeregistry_test.go
94 lines (88 loc) · 1.81 KB
/
privilegeregistry_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
//
// SPDX-License-Identifier: BSD-3-Clause
//
package redfish
import (
"encoding/json"
"strings"
"testing"
)
var privilegeRegistryBody = `{
"@odata.type": "#PrivilegeRegistry.v1_1_4.PrivilegeRegistry",
"Id": "Contoso_1.0.1_PrivilegeRegistry",
"Name": "Privilege Map",
"PrivilegesUsed": [
"Login",
"ConfigureManager",
"ConfigureUsers",
"ConfigureComponents",
"ConfigureSelf"
],
"OEMPrivilegesUsed": [],
"Mappings": [
{
"Entity": "Manager",
"OperationMap": {
"GET": [
{
"Privilege": [
"Login"
]
}
],
"HEAD": [
{
"Privilege": [
"Login"
]
}
],
"PATCH": [
{
"Privilege": [
"ConfigureManager"
]
}
],
"POST": [
{
"Privilege": [
"ConfigureManager"
]
}
],
"PUT": [
{
"Privilege": [
"ConfigureManager"
]
}
],
"DELETE": [
{
"Privilege": [
"ConfigureManager"
]
}
]
}
}
],
"@odata.id": "/redfish/v1/JobService"
}`
// TestPrivilegeRegistry tests the parsing of PrivilegeRegistry objects.
func TestPrivilegeRegistry(t *testing.T) {
var result PrivilegeRegistry
err := json.NewDecoder(strings.NewReader(privilegeRegistryBody)).Decode(&result)
if err != nil {
t.Errorf("Error decoding JSON: %s", err)
}
assertEquals(t, "Contoso_1.0.1_PrivilegeRegistry", result.ID)
assertEquals(t, "Privilege Map", result.Name)
assertEquals(t, "Login", string(result.PrivilegesUsed[0]))
assertEquals(t, "ConfigureComponents", string(result.PrivilegesUsed[3]))
assertEquals(t, "ConfigureSelf", string(result.PrivilegesUsed[4]))
assertEquals(t, "Manager", result.Mappings[0].Entity)
assertEquals(t, "Login", result.Mappings[0].OperationMap.GET[0].Privilege[0])
assertEquals(t, "ConfigureManager", result.Mappings[0].OperationMap.DELETE[0].Privilege[0])
}