ci(core): Reduce memory usage in tests (part-1) (no-changelog) (#7654)

This commit is contained in:
कारतोफ्फेलस्क्रिप्ट™
2023-11-08 16:29:39 +01:00
committed by GitHub
parent 6a53c2a375
commit 0346b211a7
58 changed files with 1223 additions and 1189 deletions

View File

@@ -11,6 +11,8 @@ import { LOGGED_OUT_RESPONSE_BODY } from './shared/constants';
import { randomValidPassword } from './shared/random';
import * as testDb from './shared/testDb';
import * as utils from './shared/utils/';
import { getGlobalMemberRole, getGlobalOwnerRole } from './shared/db/roles';
import { createUser, createUserShell } from './shared/db/users';
let globalOwnerRole: Role;
let globalMemberRole: Role;
@@ -21,8 +23,8 @@ const ownerPassword = randomValidPassword();
const testServer = utils.setupTestServer({ endpointGroups: ['auth'] });
beforeAll(async () => {
globalOwnerRole = await testDb.getGlobalOwnerRole();
globalMemberRole = await testDb.getGlobalMemberRole();
globalOwnerRole = await getGlobalOwnerRole();
globalMemberRole = await getGlobalMemberRole();
});
beforeEach(async () => {
@@ -33,7 +35,7 @@ beforeEach(async () => {
describe('POST /login', () => {
beforeEach(async () => {
owner = await testDb.createUser({
owner = await createUser({
password: ownerPassword,
globalRole: globalOwnerRole,
});
@@ -69,7 +71,7 @@ describe('POST /login', () => {
test('should throw AuthError for non-owner if not within users limit quota', async () => {
jest.spyOn(Container.get(License), 'isWithinUsersLimit').mockReturnValueOnce(false);
const password = 'testpassword';
const member = await testDb.createUser({
const member = await createUser({
password,
});
@@ -82,7 +84,7 @@ describe('POST /login', () => {
test('should not throw AuthError for owner if not within users limit quota', async () => {
jest.spyOn(Container.get(License), 'isWithinUsersLimit').mockReturnValueOnce(false);
const ownerUser = await testDb.createUser({
const ownerUser = await createUser({
password: randomValidPassword(),
globalRole: globalOwnerRole,
isOwner: true,
@@ -104,7 +106,7 @@ describe('GET /login', () => {
});
test('should return cookie if UM is disabled and no cookie is already set', async () => {
await testDb.createUserShell(globalOwnerRole);
await createUserShell(globalOwnerRole);
await utils.setInstanceOwnerSetUp(false);
const response = await testServer.authlessAgent.get('/login');
@@ -127,7 +129,7 @@ describe('GET /login', () => {
});
test('should return logged-in owner shell', async () => {
const ownerShell = await testDb.createUserShell(globalOwnerRole);
const ownerShell = await createUserShell(globalOwnerRole);
const response = await testServer.authAgentFor(ownerShell).get('/login');
@@ -153,7 +155,7 @@ describe('GET /login', () => {
});
test('should return logged-in member shell', async () => {
const memberShell = await testDb.createUserShell(globalMemberRole);
const memberShell = await createUserShell(globalMemberRole);
const response = await testServer.authAgentFor(memberShell).get('/login');
@@ -179,7 +181,7 @@ describe('GET /login', () => {
});
test('should return logged-in owner', async () => {
const owner = await testDb.createUser({ globalRole: globalOwnerRole });
const owner = await createUser({ globalRole: globalOwnerRole });
const response = await testServer.authAgentFor(owner).get('/login');
@@ -205,7 +207,7 @@ describe('GET /login', () => {
});
test('should return logged-in member', async () => {
const member = await testDb.createUser({ globalRole: globalMemberRole });
const member = await createUser({ globalRole: globalMemberRole });
const response = await testServer.authAgentFor(member).get('/login');
@@ -233,7 +235,7 @@ describe('GET /login', () => {
describe('GET /resolve-signup-token', () => {
beforeEach(async () => {
owner = await testDb.createUser({
owner = await createUser({
password: ownerPassword,
globalRole: globalOwnerRole,
});
@@ -241,7 +243,7 @@ describe('GET /resolve-signup-token', () => {
});
test('should validate invite token', async () => {
const memberShell = await testDb.createUserShell(globalMemberRole);
const memberShell = await createUserShell(globalMemberRole);
const response = await authOwnerAgent
.get('/resolve-signup-token')
@@ -261,7 +263,7 @@ describe('GET /resolve-signup-token', () => {
test('should return 403 if user quota reached', async () => {
jest.spyOn(Container.get(License), 'isWithinUsersLimit').mockReturnValueOnce(false);
const memberShell = await testDb.createUserShell(globalMemberRole);
const memberShell = await createUserShell(globalMemberRole);
const response = await authOwnerAgent
.get('/resolve-signup-token')
@@ -272,7 +274,7 @@ describe('GET /resolve-signup-token', () => {
});
test('should fail with invalid inputs', async () => {
const { id: inviteeId } = await testDb.createUser({ globalRole: globalMemberRole });
const { id: inviteeId } = await createUser({ globalRole: globalMemberRole });
const first = await authOwnerAgent.get('/resolve-signup-token').query({ inviterId: owner.id });
@@ -304,7 +306,7 @@ describe('GET /resolve-signup-token', () => {
describe('POST /logout', () => {
test('should log user out', async () => {
const owner = await testDb.createUser({ globalRole: globalOwnerRole });
const owner = await createUser({ globalRole: globalOwnerRole });
const response = await testServer.authAgentFor(owner).post('/logout');