@@ -25,6 +25,7 @@ async fn should_allow_generating_a_new_random_auth_key() {
25
25
let request_id = Uuid :: new_v4 ( ) ;
26
26
27
27
let response = Client :: new ( env. get_connection_info ( ) )
28
+ . unwrap ( )
28
29
. add_auth_key (
29
30
AddKeyForm {
30
31
opt_key : None ,
@@ -56,6 +57,7 @@ async fn should_allow_uploading_a_preexisting_auth_key() {
56
57
let request_id = Uuid :: new_v4 ( ) ;
57
58
58
59
let response = Client :: new ( env. get_connection_info ( ) )
60
+ . unwrap ( )
59
61
. add_auth_key (
60
62
AddKeyForm {
61
63
opt_key : Some ( "Xc1L4PbQJSFGlrgSRZl8wxSFAuMa21z5" . to_string ( ) ) ,
@@ -87,6 +89,7 @@ async fn should_not_allow_generating_a_new_auth_key_for_unauthenticated_users()
87
89
let request_id = Uuid :: new_v4 ( ) ;
88
90
89
91
let response = Client :: new ( connection_with_invalid_token ( env. get_connection_info ( ) . origin ) )
92
+ . unwrap ( )
90
93
. add_auth_key (
91
94
AddKeyForm {
92
95
opt_key : None ,
@@ -106,6 +109,7 @@ async fn should_not_allow_generating_a_new_auth_key_for_unauthenticated_users()
106
109
let request_id = Uuid :: new_v4 ( ) ;
107
110
108
111
let response = Client :: new ( connection_with_no_token ( env. get_connection_info ( ) . origin ) )
112
+ . unwrap ( )
109
113
. add_auth_key (
110
114
AddKeyForm {
111
115
opt_key : None ,
@@ -136,6 +140,7 @@ async fn should_fail_when_the_auth_key_cannot_be_generated() {
136
140
let request_id = Uuid :: new_v4 ( ) ;
137
141
138
142
let response = Client :: new ( env. get_connection_info ( ) )
143
+ . unwrap ( )
139
144
. add_auth_key (
140
145
AddKeyForm {
141
146
opt_key : None ,
@@ -173,6 +178,7 @@ async fn should_allow_deleting_an_auth_key() {
173
178
let request_id = Uuid :: new_v4 ( ) ;
174
179
175
180
let response = Client :: new ( env. get_connection_info ( ) )
181
+ . unwrap ( )
176
182
. delete_auth_key ( & auth_key. key . to_string ( ) , Some ( headers_with_request_id ( request_id) ) )
177
183
. await ;
178
184
@@ -207,6 +213,7 @@ async fn should_fail_generating_a_new_auth_key_when_the_provided_key_is_invalid(
207
213
let request_id = Uuid :: new_v4 ( ) ;
208
214
209
215
let response = Client :: new ( env. get_connection_info ( ) )
216
+ . unwrap ( )
210
217
. post_form (
211
218
"keys" ,
212
219
& InvalidAddKeyForm {
@@ -246,6 +253,7 @@ async fn should_fail_generating_a_new_auth_key_when_the_key_duration_is_invalid(
246
253
let request_id = Uuid :: new_v4 ( ) ;
247
254
248
255
let response = Client :: new ( env. get_connection_info ( ) )
256
+ . unwrap ( )
249
257
. post_form (
250
258
"keys" ,
251
259
& InvalidAddKeyForm {
@@ -282,6 +290,7 @@ async fn should_fail_deleting_an_auth_key_when_the_key_id_is_invalid() {
282
290
let request_id = Uuid :: new_v4 ( ) ;
283
291
284
292
let response = Client :: new ( env. get_connection_info ( ) )
293
+ . unwrap ( )
285
294
. delete_auth_key ( invalid_auth_key, Some ( headers_with_request_id ( request_id) ) )
286
295
. await ;
287
296
@@ -311,6 +320,7 @@ async fn should_fail_when_the_auth_key_cannot_be_deleted() {
311
320
let request_id = Uuid :: new_v4 ( ) ;
312
321
313
322
let response = Client :: new ( env. get_connection_info ( ) )
323
+ . unwrap ( )
314
324
. delete_auth_key ( & auth_key. key . to_string ( ) , Some ( headers_with_request_id ( request_id) ) )
315
325
. await ;
316
326
@@ -344,6 +354,7 @@ async fn should_not_allow_deleting_an_auth_key_for_unauthenticated_users() {
344
354
let request_id = Uuid :: new_v4 ( ) ;
345
355
346
356
let response = Client :: new ( connection_with_invalid_token ( env. get_connection_info ( ) . origin ) )
357
+ . unwrap ( )
347
358
. delete_auth_key ( & auth_key. key . to_string ( ) , Some ( headers_with_request_id ( request_id) ) )
348
359
. await ;
349
360
@@ -366,6 +377,7 @@ async fn should_not_allow_deleting_an_auth_key_for_unauthenticated_users() {
366
377
let request_id = Uuid :: new_v4 ( ) ;
367
378
368
379
let response = Client :: new ( connection_with_no_token ( env. get_connection_info ( ) . origin ) )
380
+ . unwrap ( )
369
381
. delete_auth_key ( & auth_key. key . to_string ( ) , Some ( headers_with_request_id ( request_id) ) )
370
382
. await ;
371
383
@@ -396,6 +408,7 @@ async fn should_allow_reloading_keys() {
396
408
let request_id = Uuid :: new_v4 ( ) ;
397
409
398
410
let response = Client :: new ( env. get_connection_info ( ) )
411
+ . unwrap ( )
399
412
. reload_keys ( Some ( headers_with_request_id ( request_id) ) )
400
413
. await ;
401
414
@@ -423,6 +436,7 @@ async fn should_fail_when_keys_cannot_be_reloaded() {
423
436
force_database_error ( & env. container . tracker_core_container . database ) ;
424
437
425
438
let response = Client :: new ( env. get_connection_info ( ) )
439
+ . unwrap ( )
426
440
. reload_keys ( Some ( headers_with_request_id ( request_id) ) )
427
441
. await ;
428
442
@@ -453,6 +467,7 @@ async fn should_not_allow_reloading_keys_for_unauthenticated_users() {
453
467
let request_id = Uuid :: new_v4 ( ) ;
454
468
455
469
let response = Client :: new ( connection_with_invalid_token ( env. get_connection_info ( ) . origin ) )
470
+ . unwrap ( )
456
471
. reload_keys ( Some ( headers_with_request_id ( request_id) ) )
457
472
. await ;
458
473
@@ -466,6 +481,7 @@ async fn should_not_allow_reloading_keys_for_unauthenticated_users() {
466
481
let request_id = Uuid :: new_v4 ( ) ;
467
482
468
483
let response = Client :: new ( connection_with_no_token ( env. get_connection_info ( ) . origin ) )
484
+ . unwrap ( )
469
485
. reload_keys ( Some ( headers_with_request_id ( request_id) ) )
470
486
. await ;
471
487
@@ -504,6 +520,7 @@ mod deprecated_generate_key_endpoint {
504
520
let seconds_valid = 60 ;
505
521
506
522
let response = Client :: new ( env. get_connection_info ( ) )
523
+ . unwrap ( )
507
524
. generate_auth_key ( seconds_valid, None )
508
525
. await ;
509
526
@@ -530,12 +547,14 @@ mod deprecated_generate_key_endpoint {
530
547
let seconds_valid = 60 ;
531
548
532
549
let response = Client :: new ( connection_with_invalid_token ( env. get_connection_info ( ) . origin ) )
550
+ . unwrap ( )
533
551
. generate_auth_key ( seconds_valid, Some ( headers_with_request_id ( request_id) ) )
534
552
. await ;
535
553
536
554
assert_token_not_valid ( response) . await ;
537
555
538
556
let response = Client :: new ( connection_with_no_token ( env. get_connection_info ( ) . origin ) )
557
+ . unwrap ( )
539
558
. generate_auth_key ( seconds_valid, None )
540
559
. await ;
541
560
@@ -563,6 +582,7 @@ mod deprecated_generate_key_endpoint {
563
582
564
583
for invalid_key_duration in invalid_key_durations {
565
584
let response = Client :: new ( env. get_connection_info ( ) )
585
+ . unwrap ( )
566
586
. post_empty ( & format ! ( "key/{invalid_key_duration}" ) , None )
567
587
. await ;
568
588
@@ -583,6 +603,7 @@ mod deprecated_generate_key_endpoint {
583
603
let request_id = Uuid :: new_v4 ( ) ;
584
604
let seconds_valid = 60 ;
585
605
let response = Client :: new ( env. get_connection_info ( ) )
606
+ . unwrap ( )
586
607
. generate_auth_key ( seconds_valid, Some ( headers_with_request_id ( request_id) ) )
587
608
. await ;
588
609
0 commit comments