diff --git a/internal/credential/vault/jobs_test.go b/internal/credential/vault/jobs_test.go index b6f16e73e6..e739d3dfba 100644 --- a/internal/credential/vault/jobs_test.go +++ b/internal/credential/vault/jobs_test.go @@ -238,6 +238,7 @@ func TestTokenRenewalJob_RunLimits(t *testing.T) { kmsCache := kms.TestKms(t, conn, wrapper) _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) v := NewTestVaultServer(t) + sche := scheduler.TestScheduler(t, conn, wrapper) count := 5 tests := []struct { @@ -273,9 +274,10 @@ func TestTokenRenewalJob_RunLimits(t *testing.T) { _, token := v.CreateToken(t) in, err := NewCredentialStore(prj.GetPublicId(), v.Addr, []byte(token)) require.NoError(err) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kmsCache, sche) require.NoError(err) + err = RegisterJobs(context.Background(), sche, rw, rw, kmsCache) + require.NoError(err) cs, err := repo.CreateCredentialStore(context.Background(), in) require.NoError(err) @@ -330,17 +332,17 @@ func TestTokenRenewalJob_Run(t *testing.T) { in, err := NewCredentialStore(prj.GetPublicId(), v.Addr, []byte(token)) require.NoError(err) sche := scheduler.TestScheduler(t, conn, wrapper) - repo, err := NewRepository(rw, rw, kmsCache, sche) - require.NoError(err) - cs, err := repo.CreateCredentialStore(context.Background(), in) - require.NoError(err) r, err := newTokenRenewalJob(rw, rw, kmsCache) require.NoError(err) - err = sche.RegisterJob(context.Background(), r) require.NoError(err) + repo, err := NewRepository(rw, rw, kmsCache, sche) + require.NoError(err) + cs, err := repo.CreateCredentialStore(context.Background(), in) + require.NoError(err) + err = r.Run(context.Background()) require.NoError(err) // No tokens should have been renewed since token expiration is 24 hours by default @@ -474,6 +476,7 @@ func TestTokenRenewalJob_NextRunIn(t *testing.T) { wrapper := db.TestWrapper(t) kmsCache := kms.TestKms(t, conn, wrapper) _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) + sche := scheduler.TestScheduler(t, conn, wrapper) v := NewTestVaultServer(t) @@ -562,9 +565,10 @@ func TestTokenRenewalJob_NextRunIn(t *testing.T) { _, token := v.CreateToken(t) in, err := NewCredentialStore(prj.GetPublicId(), v.Addr, []byte(token)) require.NoError(err) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kmsCache, sche) require.NoError(err) + err = RegisterJobs(context.Background(), sche, rw, rw, kmsCache) + require.NoError(err) cs, err := repo.CreateCredentialStore(context.Background(), in) require.NoError(err) @@ -682,6 +686,7 @@ func TestTokenRevocationJob_RunLimits(t *testing.T) { wrapper := db.TestWrapper(t) kmsCache := kms.TestKms(t, conn, wrapper) _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) + sche := scheduler.TestScheduler(t, conn, wrapper) v := NewTestVaultServer(t) @@ -719,9 +724,11 @@ func TestTokenRevocationJob_RunLimits(t *testing.T) { _, token := v.CreateToken(t) in, err := NewCredentialStore(prj.GetPublicId(), v.Addr, []byte(token)) require.NoError(err) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kmsCache, sche) require.NoError(err) + err = RegisterJobs(context.Background(), sche, rw, rw, kmsCache) + require.NoError(err) + cs, err := repo.CreateCredentialStore(context.Background(), in) require.NoError(err) @@ -777,6 +784,12 @@ func TestTokenRevocationJob_Run(t *testing.T) { sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kmsCache, sche) require.NoError(err) + + j, err := newTokenRenewalJob(rw, rw, kmsCache) + require.NoError(err) + err = sche.RegisterJob(context.Background(), j) + require.NoError(err) + cs, err := repo.CreateCredentialStore(context.Background(), in) require.NoError(err) @@ -992,6 +1005,12 @@ func TestCredentialRenewalJob_RunLimits(t *testing.T) { sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kmsCache, sche) require.NoError(t, err) + + j, err := newTokenRenewalJob(rw, rw, kmsCache) + require.NoError(t, err) + err = sche.RegisterJob(context.Background(), j) + require.NoError(t, err) + cs, err := repo.CreateCredentialStore(context.Background(), in) require.NoError(t, err) @@ -1103,6 +1122,10 @@ func TestCredentialRenewalJob_Run(t *testing.T) { _, token := v.CreateToken(t, WithPolicies([]string{"default", "boundary-controller", "database"})) credStoreIn, err := NewCredentialStore(prj.GetPublicId(), v.Addr, []byte(token)) require.NoError(err) + j, err := newTokenRenewalJob(rw, rw, kmsCache) + require.NoError(err) + err = sche.RegisterJob(context.Background(), j) + require.NoError(err) cs, err := repo.CreateCredentialStore(context.Background(), credStoreIn) require.NoError(err) @@ -1209,6 +1232,10 @@ func TestCredentialRenewalJob_RunExpired(t *testing.T) { _, token := v.CreateToken(t, WithPolicies([]string{"default", "boundary-controller", "database"})) credStoreIn, err := NewCredentialStore(prj.GetPublicId(), v.Addr, []byte(token)) require.NoError(err) + j, err := newTokenRenewalJob(rw, rw, kmsCache) + require.NoError(err) + err = sche.RegisterJob(context.Background(), j) + require.NoError(err) cs, err := repo.CreateCredentialStore(context.Background(), credStoreIn) require.NoError(err) @@ -1282,6 +1309,10 @@ func TestCredentialRenewalJob_NextRunIn(t *testing.T) { sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kmsCache, sche) require.NoError(t, err) + j, err := newTokenRenewalJob(rw, rw, kmsCache) + require.NoError(t, err) + err = sche.RegisterJob(context.Background(), j) + require.NoError(t, err) cs, err := repo.CreateCredentialStore(context.Background(), in) require.NoError(t, err) @@ -1519,6 +1550,10 @@ func TestCredentialRevocationJob_RunLimits(t *testing.T) { sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kmsCache, sche) require.NoError(t, err) + j, err := newTokenRenewalJob(rw, rw, kmsCache) + require.NoError(t, err) + err = sche.RegisterJob(context.Background(), j) + require.NoError(t, err) cs, err := repo.CreateCredentialStore(context.Background(), in) require.NoError(t, err) @@ -1632,6 +1667,10 @@ func TestCredentialRevocationJob_Run(t *testing.T) { _, token := v.CreateToken(t, WithPolicies([]string{"default", "boundary-controller", "database"})) credStoreIn, err := NewCredentialStore(prj.GetPublicId(), v.Addr, []byte(token)) require.NoError(err) + j, err := newTokenRenewalJob(rw, rw, kmsCache) + require.NoError(err) + err = sche.RegisterJob(context.Background(), j) + require.NoError(err) cs, err := repo.CreateCredentialStore(context.Background(), credStoreIn) require.NoError(err) @@ -1722,6 +1761,10 @@ func TestCredentialRevocationJob_RunDeleted(t *testing.T) { _, token := v.CreateToken(t, WithPolicies([]string{"default", "boundary-controller", "database"})) credStoreIn, err := NewCredentialStore(prj.GetPublicId(), v.Addr, []byte(token)) require.NoError(err) + j, err := newTokenRenewalJob(rw, rw, kmsCache) + require.NoError(err) + err = sche.RegisterJob(context.Background(), j) + require.NoError(err) cs, err := repo.CreateCredentialStore(context.Background(), credStoreIn) require.NoError(err) @@ -1907,6 +1950,10 @@ func TestCredentialStoreCleanupJob_Run(t *testing.T) { in, err := NewCredentialStore(prj.GetPublicId(), v.Addr, []byte(ct)) require.NoError(err) sche := scheduler.TestScheduler(t, conn, wrapper) + j, err := newTokenRenewalJob(rw, rw, kmsCache) + require.NoError(err) + err = sche.RegisterJob(context.Background(), j) + require.NoError(err) repo, err := NewRepository(rw, rw, kmsCache, sche) require.NoError(err) cs1, err := repo.CreateCredentialStore(context.Background(), in) @@ -1941,6 +1988,12 @@ func TestCredentialStoreCleanupJob_Run(t *testing.T) { require.NoError(err) assert.Equal(0, r.numStores) + // Register token revocation job needed for delete + j1, err := newTokenRevocationJob(rw, rw, kmsCache) + require.NoError(err) + err = sche.RegisterJob(context.Background(), j1) + require.NoError(err) + // Soft delete both credential stores count, err := repo.DeleteCredentialStore(context.Background(), cs1.PublicId) require.NoError(err) @@ -2100,6 +2153,10 @@ func TestCredentialCleanupJob_Run(t *testing.T) { _, token := v.CreateToken(t, WithPolicies([]string{"default", "boundary-controller", "database"})) credStoreIn, err := NewCredentialStore(prj.GetPublicId(), v.Addr, []byte(token)) require.NoError(err) + j, err := newTokenRenewalJob(rw, rw, kmsCache) + require.NoError(err) + err = sche.RegisterJob(context.Background(), j) + require.NoError(err) cs, err := repo.CreateCredentialStore(context.Background(), credStoreIn) require.NoError(err) diff --git a/internal/credential/vault/private_library_test.go b/internal/credential/vault/private_library_test.go index 7fd2b787cf..b2f925b082 100644 --- a/internal/credential/vault/private_library_test.go +++ b/internal/credential/vault/private_library_test.go @@ -18,6 +18,7 @@ func TestRepository_getPrivateLibraries(t *testing.T) { conn, _ := db.TestSetup(t, "postgres") rw := db.New(conn) wrapper := db.TestWrapper(t) + sche := scheduler.TestScheduler(t, conn, wrapper) tests := []struct { name string @@ -44,10 +45,11 @@ func TestRepository_getPrivateLibraries(t *testing.T) { _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) require.NoError(err) require.NotNil(repo) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) var opts []Option if tt.tls == TestServerTLS { diff --git a/internal/credential/vault/private_store_test.go b/internal/credential/vault/private_store_test.go index 6f99080602..c6e8a95232 100644 --- a/internal/credential/vault/private_store_test.go +++ b/internal/credential/vault/private_store_test.go @@ -17,6 +17,7 @@ func TestRepository_lookupPrivateStore(t *testing.T) { conn, _ := db.TestSetup(t, "postgres") rw := db.New(conn) wrapper := db.TestWrapper(t) + sche := scheduler.TestScheduler(t, conn, wrapper) tests := []struct { name string @@ -40,10 +41,12 @@ func TestRepository_lookupPrivateStore(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) require.NoError(err) require.NotNil(repo) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) + _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) v := NewTestVaultServer(t, WithTestVaultTLS(tt.tls)) diff --git a/internal/credential/vault/repository_credential_store_test.go b/internal/credential/vault/repository_credential_store_test.go index 2b7f72484c..657975b6fc 100644 --- a/internal/credential/vault/repository_credential_store_test.go +++ b/internal/credential/vault/repository_credential_store_test.go @@ -30,16 +30,18 @@ func TestRepository_CreateCredentialStoreResource(t *testing.T) { conn, _ := db.TestSetup(t, "postgres") rw := db.New(conn) wrapper := db.TestWrapper(t) + sche := scheduler.TestScheduler(t, conn, wrapper) t.Run("invalid-duplicate-names", func(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) require.NoError(err) require.NotNil(repo) _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) v := NewTestVaultServer(t) _, token := v.CreateToken(t) @@ -68,11 +70,12 @@ func TestRepository_CreateCredentialStoreResource(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) require.NoError(err) require.NotNil(repo) org, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) v := NewTestVaultServer(t) @@ -123,6 +126,7 @@ func TestRepository_CreateCredentialStoreNonResource(t *testing.T) { conn, _ := db.TestSetup(t, "postgres") rw := db.New(conn) wrapper := db.TestWrapper(t) + sche := scheduler.TestScheduler(t, conn, wrapper) tests := []struct { name string @@ -168,11 +172,12 @@ func TestRepository_CreateCredentialStoreNonResource(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) require.NoError(err) require.NotNil(repo) _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) v := NewTestVaultServer(t, WithTestVaultTLS(tt.tls)) _, token := v.CreateToken(t, tt.tokenOpts...) @@ -226,6 +231,7 @@ func TestRepository_LookupCredentialStore(t *testing.T) { conn, _ := db.TestSetup(t, "postgres") rw := db.New(conn) wrapper := db.TestWrapper(t) + sche := scheduler.TestScheduler(t, conn, wrapper) _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) stores := TestCredentialStores(t, conn, wrapper, prj.PublicId, 2) @@ -278,10 +284,11 @@ func TestRepository_LookupCredentialStore(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) assert.NoError(err) require.NotNil(repo) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) got, err := repo.LookupCredentialStore(ctx, tt.id) if tt.wantErr != 0 { @@ -314,6 +321,7 @@ func TestRepository_UpdateCredentialStore_Attributes(t *testing.T) { conn, _ := db.TestSetup(t, "postgres") rw := db.New(conn) wrapper := db.TestWrapper(t) + sche := scheduler.TestScheduler(t, conn, wrapper) changeNamespace := func(n string) func(*CredentialStore) *CredentialStore { return func(cs *CredentialStore) *CredentialStore { @@ -716,10 +724,11 @@ func TestRepository_UpdateCredentialStore_Attributes(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) assert.NoError(err) require.NotNil(repo) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) tt.orig.ScopeId = prj.GetPublicId() @@ -796,10 +805,11 @@ func TestRepository_UpdateCredentialStore_Attributes(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) assert.NoError(err) require.NotNil(repo) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) vs := NewTestVaultServer(t) _, token := vs.CreateToken(t) @@ -847,10 +857,11 @@ func TestRepository_UpdateCredentialStore_Attributes(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) assert.NoError(err) require.NotNil(repo) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) vs := NewTestVaultServer(t, WithTestVaultTLS(TestServerTLS)) @@ -896,10 +907,11 @@ func TestRepository_UpdateCredentialStore_Attributes(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) assert.NoError(err) require.NotNil(repo) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) name := "test-dup-name" _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) @@ -926,10 +938,11 @@ func TestRepository_UpdateCredentialStore_Attributes(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) assert.NoError(err) require.NotNil(repo) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) vs := NewTestVaultServer(t) @@ -975,10 +988,11 @@ func TestRepository_UpdateCredentialStore_Attributes(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) assert.NoError(err) require.NotNil(repo) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) iamRepo := iam.TestRepo(t, conn, wrapper) _, prj1 := iam.TestScopes(t, iamRepo) @@ -1004,6 +1018,7 @@ func TestRepository_UpdateCredentialStore_VaultToken(t *testing.T) { conn, _ := db.TestSetup(t, "postgres") rw := db.New(conn) wrapper := db.TestWrapper(t) + sche := scheduler.TestScheduler(t, conn, wrapper) tests := []struct { name string @@ -1044,11 +1059,12 @@ func TestRepository_UpdateCredentialStore_VaultToken(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) require.NoError(err) require.NotNil(repo) _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) v := NewTestVaultServer(t) _, origToken := v.CreateToken(t) @@ -1100,6 +1116,7 @@ func TestRepository_UpdateCredentialStore_ClientCert(t *testing.T) { conn, _ := db.TestSetup(t, "postgres") rw := db.New(conn) wrapper := db.TestWrapper(t) + sche := scheduler.TestScheduler(t, conn, wrapper) existingClientCert := func(t *testing.T, v *TestVaultServer) *ClientCertificate { clientCert, err := NewClientCertificate(v.ClientCert, v.ClientKey) @@ -1176,11 +1193,12 @@ func TestRepository_UpdateCredentialStore_ClientCert(t *testing.T) { assert, require := assert.New(t), require.New(t) ctx := context.Background() kms := kms.TestKms(t, conn, wrapper) - sche := scheduler.TestScheduler(t, conn, wrapper) repo, err := NewRepository(rw, rw, kms, sche) require.NoError(err) require.NotNil(repo) _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) + err = RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) v := NewTestVaultServer(t, WithTestVaultTLS(tt.tls)) @@ -1244,6 +1262,8 @@ func TestRepository_ListCredentialStores_Multiple_Scopes(t *testing.T) { repo, err := NewRepository(rw, rw, kms, sche) assert.NoError(err) require.NotNil(repo) + err = RegisterJobs(context.Background(), sche, rw, rw, kms) + require.NoError(err) const numPerScope = 10 var prjs []string @@ -1279,6 +1299,8 @@ func TestRepository_DeleteCredentialStore(t *testing.T) { repo, err := NewRepository(rw, rw, kms, sche) require.NoError(t, err) require.NotNil(t, repo) + err = RegisterJobs(context.Background(), sche, rw, rw, kms) + require.NoError(t, err) _, prj := iam.TestScopes(t, iam.TestRepo(t, conn, wrapper)) scopeId = prj.GetPublicId() diff --git a/internal/credential/vault/repository_credentials_test.go b/internal/credential/vault/repository_credentials_test.go index 20f9d1cc53..91f8245bb6 100644 --- a/internal/credential/vault/repository_credentials_test.go +++ b/internal/credential/vault/repository_credentials_test.go @@ -41,6 +41,8 @@ func TestRepository_IssueCredentials(t *testing.T) { repo, err := vault.NewRepository(rw, rw, kms, sche) require.NoError(err) require.NotNil(repo) + err = vault.RegisterJobs(ctx, sche, rw, rw, kms) + require.NoError(err) _, token := v.CreateToken(t, vault.WithPolicies([]string{"default", "boundary-controller", "database", "pki"})) diff --git a/internal/servers/controller/handlers/credentialstores/credentialstore_service_test.go b/internal/servers/controller/handlers/credentialstores/credentialstore_service_test.go index bfa43c54b4..bd6508304d 100644 --- a/internal/servers/controller/handlers/credentialstores/credentialstore_service_test.go +++ b/internal/servers/controller/handlers/credentialstores/credentialstore_service_test.go @@ -1,6 +1,7 @@ package credentialstores import ( + "context" "crypto/ecdsa" "crypto/elliptic" "crypto/rand" @@ -52,6 +53,8 @@ func TestList(t *testing.T) { kms := kms.TestKms(t, conn, wrapper) sche := scheduler.TestScheduler(t, conn, wrapper) rw := db.New(conn) + err := vault.RegisterJobs(context.Background(), sche, rw, rw, kms) + require.NoError(t, err) iamRepo := iam.TestRepo(t, conn, wrapper) iamRepoFn := func() (*iam.Repository, error) { @@ -156,6 +159,8 @@ func TestCreate(t *testing.T) { kms := kms.TestKms(t, conn, wrapper) sche := scheduler.TestScheduler(t, conn, wrapper) rw := db.New(conn) + err := vault.RegisterJobs(context.Background(), sche, rw, rw, kms) + require.NoError(t, err) iamRepo := iam.TestRepo(t, conn, wrapper) iamRepoFn := func() (*iam.Repository, error) { @@ -655,6 +660,8 @@ func TestDelete(t *testing.T) { kms := kms.TestKms(t, conn, wrapper) sche := scheduler.TestScheduler(t, conn, wrapper) rw := db.New(conn) + err := vault.RegisterJobs(context.Background(), sche, rw, rw, kms) + require.NoError(t, err) iamRepo := iam.TestRepo(t, conn, wrapper) iamRepoFn := func() (*iam.Repository, error) { @@ -714,6 +721,8 @@ func TestUpdate(t *testing.T) { kms := kms.TestKms(t, conn, wrapper) sche := scheduler.TestScheduler(t, conn, wrapper) rw := db.New(conn) + err := vault.RegisterJobs(context.Background(), sche, rw, rw, kms) + require.NoError(t, err) iamRepo := iam.TestRepo(t, conn, wrapper) iamRepoFn := func() (*iam.Repository, error) { diff --git a/internal/servers/controller/handlers/targets/target_service_test.go b/internal/servers/controller/handlers/targets/target_service_test.go index 8b1e20558a..37b7329d2d 100644 --- a/internal/servers/controller/handlers/targets/target_service_test.go +++ b/internal/servers/controller/handlers/targets/target_service_test.go @@ -2471,6 +2471,9 @@ func TestAuthorizeSession(t *testing.T) { kms := kms.TestKms(t, conn, wrapper) sche := scheduler.TestScheduler(t, conn, wrapper) + err := vault.RegisterJobs(context.Background(), sche, rw, rw, kms) + require.NoError(t, err) + repoFn := func() (*target.Repository, error) { return target.NewRepository(rw, rw, kms) } @@ -2641,6 +2644,9 @@ func TestAuthorizeSession_Errors(t *testing.T) { kms := kms.TestKms(t, conn, wrapper) sche := scheduler.TestScheduler(t, conn, wrapper) + err := vault.RegisterJobs(context.Background(), sche, rw, rw, kms) + require.NoError(t, err) + repoFn := func() (*target.Repository, error) { return target.NewRepository(rw, rw, kms) }