github.com/cs3org/reva/v2@v2.27.7/pkg/storage/utils/decomposedfs/permissions/mocks/PermissionsChecker.go (about)

     1  // Copyright 2018-2022 CERN
     2  //
     3  // Licensed under the Apache License, Version 2.0 (the "License");
     4  // you may not use this file except in compliance with the License.
     5  // You may obtain a copy of the License at
     6  //
     7  //     http://www.apache.org/licenses/LICENSE-2.0
     8  //
     9  // Unless required by applicable law or agreed to in writing, software
    10  // distributed under the License is distributed on an "AS IS" BASIS,
    11  // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    12  // See the License for the specific language governing permissions and
    13  // limitations under the License.
    14  //
    15  // In applying this license, CERN does not waive the privileges and immunities
    16  // granted to it by virtue of its status as an Intergovernmental Organization
    17  // or submit itself to any jurisdiction.
    18  
    19  // Code generated by mockery v2.40.2. DO NOT EDIT.
    20  
    21  package mocks
    22  
    23  import (
    24  	context "context"
    25  
    26  	node "github.com/cs3org/reva/v2/pkg/storage/utils/decomposedfs/node"
    27  	mock "github.com/stretchr/testify/mock"
    28  
    29  	providerv1beta1 "github.com/cs3org/go-cs3apis/cs3/storage/provider/v1beta1"
    30  )
    31  
    32  // PermissionsChecker is an autogenerated mock type for the PermissionsChecker type
    33  type PermissionsChecker struct {
    34  	mock.Mock
    35  }
    36  
    37  type PermissionsChecker_Expecter struct {
    38  	mock *mock.Mock
    39  }
    40  
    41  func (_m *PermissionsChecker) EXPECT() *PermissionsChecker_Expecter {
    42  	return &PermissionsChecker_Expecter{mock: &_m.Mock}
    43  }
    44  
    45  // AssemblePermissions provides a mock function with given fields: ctx, n
    46  func (_m *PermissionsChecker) AssemblePermissions(ctx context.Context, n *node.Node) (*providerv1beta1.ResourcePermissions, error) {
    47  	ret := _m.Called(ctx, n)
    48  
    49  	if len(ret) == 0 {
    50  		panic("no return value specified for AssemblePermissions")
    51  	}
    52  
    53  	var r0 *providerv1beta1.ResourcePermissions
    54  	var r1 error
    55  	if rf, ok := ret.Get(0).(func(context.Context, *node.Node) (*providerv1beta1.ResourcePermissions, error)); ok {
    56  		return rf(ctx, n)
    57  	}
    58  	if rf, ok := ret.Get(0).(func(context.Context, *node.Node) *providerv1beta1.ResourcePermissions); ok {
    59  		r0 = rf(ctx, n)
    60  	} else {
    61  		if ret.Get(0) != nil {
    62  			r0 = ret.Get(0).(*providerv1beta1.ResourcePermissions)
    63  		}
    64  	}
    65  
    66  	if rf, ok := ret.Get(1).(func(context.Context, *node.Node) error); ok {
    67  		r1 = rf(ctx, n)
    68  	} else {
    69  		r1 = ret.Error(1)
    70  	}
    71  
    72  	return r0, r1
    73  }
    74  
    75  // PermissionsChecker_AssemblePermissions_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'AssemblePermissions'
    76  type PermissionsChecker_AssemblePermissions_Call struct {
    77  	*mock.Call
    78  }
    79  
    80  // AssemblePermissions is a helper method to define mock.On call
    81  //   - ctx context.Context
    82  //   - n *node.Node
    83  func (_e *PermissionsChecker_Expecter) AssemblePermissions(ctx interface{}, n interface{}) *PermissionsChecker_AssemblePermissions_Call {
    84  	return &PermissionsChecker_AssemblePermissions_Call{Call: _e.mock.On("AssemblePermissions", ctx, n)}
    85  }
    86  
    87  func (_c *PermissionsChecker_AssemblePermissions_Call) Run(run func(ctx context.Context, n *node.Node)) *PermissionsChecker_AssemblePermissions_Call {
    88  	_c.Call.Run(func(args mock.Arguments) {
    89  		run(args[0].(context.Context), args[1].(*node.Node))
    90  	})
    91  	return _c
    92  }
    93  
    94  func (_c *PermissionsChecker_AssemblePermissions_Call) Return(ap *providerv1beta1.ResourcePermissions, err error) *PermissionsChecker_AssemblePermissions_Call {
    95  	_c.Call.Return(ap, err)
    96  	return _c
    97  }
    98  
    99  func (_c *PermissionsChecker_AssemblePermissions_Call) RunAndReturn(run func(context.Context, *node.Node) (*providerv1beta1.ResourcePermissions, error)) *PermissionsChecker_AssemblePermissions_Call {
   100  	_c.Call.Return(run)
   101  	return _c
   102  }
   103  
   104  // AssembleTrashPermissions provides a mock function with given fields: ctx, n
   105  func (_m *PermissionsChecker) AssembleTrashPermissions(ctx context.Context, n *node.Node) (*providerv1beta1.ResourcePermissions, error) {
   106  	ret := _m.Called(ctx, n)
   107  
   108  	if len(ret) == 0 {
   109  		panic("no return value specified for AssembleTrashPermissions")
   110  	}
   111  
   112  	var r0 *providerv1beta1.ResourcePermissions
   113  	var r1 error
   114  	if rf, ok := ret.Get(0).(func(context.Context, *node.Node) (*providerv1beta1.ResourcePermissions, error)); ok {
   115  		return rf(ctx, n)
   116  	}
   117  	if rf, ok := ret.Get(0).(func(context.Context, *node.Node) *providerv1beta1.ResourcePermissions); ok {
   118  		r0 = rf(ctx, n)
   119  	} else {
   120  		if ret.Get(0) != nil {
   121  			r0 = ret.Get(0).(*providerv1beta1.ResourcePermissions)
   122  		}
   123  	}
   124  
   125  	if rf, ok := ret.Get(1).(func(context.Context, *node.Node) error); ok {
   126  		r1 = rf(ctx, n)
   127  	} else {
   128  		r1 = ret.Error(1)
   129  	}
   130  
   131  	return r0, r1
   132  }
   133  
   134  // PermissionsChecker_AssembleTrashPermissions_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'AssembleTrashPermissions'
   135  type PermissionsChecker_AssembleTrashPermissions_Call struct {
   136  	*mock.Call
   137  }
   138  
   139  // AssembleTrashPermissions is a helper method to define mock.On call
   140  //   - ctx context.Context
   141  //   - n *node.Node
   142  func (_e *PermissionsChecker_Expecter) AssembleTrashPermissions(ctx interface{}, n interface{}) *PermissionsChecker_AssembleTrashPermissions_Call {
   143  	return &PermissionsChecker_AssembleTrashPermissions_Call{Call: _e.mock.On("AssembleTrashPermissions", ctx, n)}
   144  }
   145  
   146  func (_c *PermissionsChecker_AssembleTrashPermissions_Call) Run(run func(ctx context.Context, n *node.Node)) *PermissionsChecker_AssembleTrashPermissions_Call {
   147  	_c.Call.Run(func(args mock.Arguments) {
   148  		run(args[0].(context.Context), args[1].(*node.Node))
   149  	})
   150  	return _c
   151  }
   152  
   153  func (_c *PermissionsChecker_AssembleTrashPermissions_Call) Return(ap *providerv1beta1.ResourcePermissions, err error) *PermissionsChecker_AssembleTrashPermissions_Call {
   154  	_c.Call.Return(ap, err)
   155  	return _c
   156  }
   157  
   158  func (_c *PermissionsChecker_AssembleTrashPermissions_Call) RunAndReturn(run func(context.Context, *node.Node) (*providerv1beta1.ResourcePermissions, error)) *PermissionsChecker_AssembleTrashPermissions_Call {
   159  	_c.Call.Return(run)
   160  	return _c
   161  }
   162  
   163  // NewPermissionsChecker creates a new instance of PermissionsChecker. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
   164  // The first argument is typically a *testing.T value.
   165  func NewPermissionsChecker(t interface {
   166  	mock.TestingT
   167  	Cleanup(func())
   168  }) *PermissionsChecker {
   169  	mock := &PermissionsChecker{}
   170  	mock.Mock.Test(t)
   171  
   172  	t.Cleanup(func() { mock.AssertExpectations(t) })
   173  
   174  	return mock
   175  }