tercul-backend/internal/adapters/graphql/author_resolvers_test.go
Damir Mukimov 24d48396ca
Update GitHub Actions workflows to 2025 best practices (#29)
* Fix workflow triggers to use 'main' branch instead of 'master'

* Switch to semantic version tags for GitHub Actions instead of SHAs for better maintainability

* Fix golangci-lint by adding go mod tidy and specifying paths ./... for linting

* feat: Restructure workflows following Single Responsibility Principle

- Remove old monolithic workflows (ci.yml, ci-cd.yml, cd.yml)
- Add focused workflows: lint.yml, test.yml, build.yml, security.yml, docker-build.yml, deploy.yml
- Each workflow has a single, clear responsibility
- Follow 2025 best practices with semantic versioning, OIDC auth, build attestations
- Add comprehensive README.md with workflow documentation
- Configure Dependabot for automated dependency updates

Workflows now run independently and can be triggered separately for better CI/CD control.

* fix: Resolve CI/CD workflow failures and GraphQL integration test issues

- Fix Application struct mismatch in application_builder.go
- Add global config.Cfg variable and BleveIndexPath field
- Regenerate GraphQL code to fix ProcessArgField errors
- Add search.InitBleve() call in main.go
- Fix all errcheck issues (12 total) in main.go files and test files
- Fix staticcheck issues (deprecated handler.NewDefaultServer, tagged switch)
- Remove all unused code (50 unused items including mock implementations)
- Fix GraphQL 'transport not supported' error in integration tests
- Add comprehensive database cleanup for integration tests
- Update GraphQL server setup with proper error presenter

* feat: Complete backend CI/CD workflow setup

- Add comprehensive GitHub Actions workflows for Go backend
- Build workflow with binary compilation and attestation
- Test workflow with coverage reporting and race detection
- Lint workflow with golangci-lint and security scanning
- Docker build workflow with multi-architecture support
- Deploy workflow for production deployment
- Security workflow with vulnerability scanning
- All workflows follow Single Responsibility Principle
- Use semantic versioning and latest action versions
- Enable security features: OIDC auth, attestations, minimal permissions

* fix: correct Go build path to ./cmd/api

- Fix build workflow to target ./cmd/api instead of ./cmd
- The main.go file is located in cmd/api/ subdirectory

* fix: correct Dockerfile build path to ./cmd/api

- Fix Docker build to target ./cmd/api instead of root directory
- The main.go file is located in cmd/api/ subdirectory
2025-11-27 07:08:08 +01:00

132 lines
3.5 KiB
Go

package graphql_test
import (
"context"
"os"
"tercul/internal/adapters/graphql"
"tercul/internal/adapters/graphql/model"
"tercul/internal/app/auth"
"tercul/internal/domain"
platform_auth "tercul/internal/platform/auth"
"tercul/internal/testutil"
"testing"
"github.com/stretchr/testify/suite"
)
type AuthorResolversTestSuite struct {
testutil.IntegrationTestSuite
queryResolver graphql.QueryResolver
mutationResolver graphql.MutationResolver
}
func TestAuthorResolvers(t *testing.T) {
suite.Run(t, new(AuthorResolversTestSuite))
}
func (s *AuthorResolversTestSuite) SetupSuite() {
s.IntegrationTestSuite.SetupSuite(&testutil.TestConfig{
DBPath: "author_resolvers_test.db",
})
}
func (s *AuthorResolversTestSuite) TearDownSuite() {
s.IntegrationTestSuite.TearDownSuite()
_ = os.Remove("author_resolvers_test.db")
}
func (s *AuthorResolversTestSuite) SetupTest() {
s.IntegrationTestSuite.SetupTest()
resolver := &graphql.Resolver{App: s.App}
s.queryResolver = resolver.Query()
s.mutationResolver = resolver.Mutation()
}
// Helper to create a user for tests
func (s *AuthorResolversTestSuite) createUser(username, email, password string, role domain.UserRole) *domain.User {
resp, err := s.App.Auth.Commands.Register(context.Background(), auth.RegisterInput{
Username: username,
Email: email,
Password: password,
})
s.Require().NoError(err)
user, err := s.App.User.Queries.User(context.Background(), resp.User.ID)
s.Require().NoError(err)
if role != user.Role {
user.Role = role
err = s.DB.Save(user).Error
s.Require().NoError(err)
}
return user
}
// Helper to create a context with JWT claims
func (s *AuthorResolversTestSuite) contextWithClaims(user *domain.User) context.Context {
return testutil.ContextWithClaims(context.Background(), &platform_auth.Claims{
UserID: user.ID,
Role: string(user.Role),
})
}
func (s *AuthorResolversTestSuite) TestAuthorMutations() {
user := s.createUser("author-creator", "author-creator@test.com", "password", domain.UserRoleContributor)
ctx := s.contextWithClaims(user)
var authorID string
s.Run("Create Author", func() {
input := model.AuthorInput{
Name: "J.R.R. Tolkien",
}
author, err := s.mutationResolver.CreateAuthor(ctx, input)
s.Require().NoError(err)
s.Require().NotNil(author)
s.Equal("J.R.R. Tolkien", author.Name)
authorID = author.ID
})
s.Run("Update Author", func() {
input := model.AuthorInput{
Name: "John Ronald Reuel Tolkien",
}
author, err := s.mutationResolver.UpdateAuthor(s.AdminCtx, authorID, input)
s.Require().NoError(err)
s.Require().NotNil(author)
s.Equal("John Ronald Reuel Tolkien", author.Name)
})
s.Run("Delete Author", func() {
ok, err := s.mutationResolver.DeleteAuthor(s.AdminCtx, authorID)
s.Require().NoError(err)
s.True(ok)
})
}
func (s *AuthorResolversTestSuite) TestAuthorQueries() {
user := s.createUser("author-reader", "author-reader@test.com", "password", domain.UserRoleReader)
ctx := s.contextWithClaims(user)
// Create an author to query
input := model.AuthorInput{
Name: "George Orwell",
}
createdAuthor, err := s.mutationResolver.CreateAuthor(ctx, input)
s.Require().NoError(err)
s.Run("Get Author by ID", func() {
author, err := s.queryResolver.Author(ctx, createdAuthor.ID)
s.Require().NoError(err)
s.Require().NotNil(author)
s.Equal("George Orwell", author.Name)
})
s.Run("List Authors", func() {
authors, err := s.queryResolver.Authors(ctx, nil, nil, nil, nil)
s.Require().NoError(err)
s.Require().NotNil(authors)
s.True(len(authors) >= 1)
})
}