From 0618877d58ab6f8c537b7d9560ecc797aed36e73 Mon Sep 17 00:00:00 2001 From: Ali BARIN Date: Mon, 30 Sep 2024 14:12:57 +0000 Subject: [PATCH] test(models/saml-auth-providers-role-mapping): assert model properties --- ...uth-providers-role-mapping.ee.test.js.snap | 41 +++++++++++++++++++ ...aml-auth-providers-role-mapping.ee.test.js | 33 +++++++++++++++ 2 files changed, 74 insertions(+) create mode 100644 packages/backend/src/models/__snapshots__/saml-auth-providers-role-mapping.ee.test.js.snap create mode 100644 packages/backend/src/models/saml-auth-providers-role-mapping.ee.test.js diff --git a/packages/backend/src/models/__snapshots__/saml-auth-providers-role-mapping.ee.test.js.snap b/packages/backend/src/models/__snapshots__/saml-auth-providers-role-mapping.ee.test.js.snap new file mode 100644 index 00000000..76d1f436 --- /dev/null +++ b/packages/backend/src/models/__snapshots__/saml-auth-providers-role-mapping.ee.test.js.snap @@ -0,0 +1,41 @@ +// Vitest Snapshot v1, https://vitest.dev/guide/snapshot.html + +exports[`SamlAuthProvidersRoleMapping model > jsonSchema should have the correct schema 1`] = ` +{ + "properties": { + "id": { + "format": "uuid", + "type": "string", + }, + "remoteRoleName": { + "minLength": 1, + "type": "string", + }, + "roleId": { + "format": "uuid", + "type": "string", + }, + "samlAuthProviderId": { + "format": "uuid", + "type": "string", + }, + }, + "required": [ + "samlAuthProviderId", + "roleId", + "remoteRoleName", + ], + "type": "object", +} +`; + +exports[`SamlAuthProvidersRoleMapping model > relationMappings should have samlAuthProvider relation 1`] = ` +{ + "join": { + "from": "saml_auth_providers_role_mappings.saml_auth_provider_id", + "to": "saml_auth_providers.id", + }, + "modelClass": [Function], + "relation": [Function], +} +`; diff --git a/packages/backend/src/models/saml-auth-providers-role-mapping.ee.test.js b/packages/backend/src/models/saml-auth-providers-role-mapping.ee.test.js new file mode 100644 index 00000000..2fe26e90 --- /dev/null +++ b/packages/backend/src/models/saml-auth-providers-role-mapping.ee.test.js @@ -0,0 +1,33 @@ +import { describe, it, expect } from 'vitest'; +import SamlAuthProvidersRoleMapping from '../models/saml-auth-providers-role-mapping.ee'; +import SamlAuthProvider from './saml-auth-provider.ee'; +import Base from './base'; + +describe('SamlAuthProvidersRoleMapping model', () => { + it('tableName should return correct name', () => { + expect(SamlAuthProvidersRoleMapping.tableName).toBe( + 'saml_auth_providers_role_mappings' + ); + }); + + it('jsonSchema should have the correct schema', () => { + expect(SamlAuthProvidersRoleMapping.jsonSchema).toMatchSnapshot(); + }); + + it('relationMappings should return correct associations', () => { + const relationMappings = SamlAuthProvidersRoleMapping.relationMappings(); + + const expectedRelations = { + samlAuthProvider: { + relation: Base.BelongsToOneRelation, + modelClass: SamlAuthProvider, + join: { + from: 'saml_auth_providers_role_mappings.saml_auth_provider_id', + to: 'saml_auth_providers.id', + }, + }, + }; + + expect(relationMappings).toStrictEqual(expectedRelations); + }); +});