@@ -24,7 +24,6 @@ type mockLsStore struct {
2424 org * entity.Organization
2525 orgs []entity.Organization
2626 workspaces []entity.Workspace
27- accessToken string
2827 authTokens * entity.AuthTokens
2928 workspaceOrgID string
3029 currentUserCalls int
@@ -36,26 +35,26 @@ func (m *mockLsStore) GetCurrentUser() (*entity.User, error) {
3635 return m .user , nil
3736}
3837
39- func (m * mockLsStore ) GetAccessToken () (string , error ) {
40- if m .accessToken != "" {
41- return m .accessToken , nil
42- }
43- return "tok" , nil
44- }
45-
4638func (m * mockLsStore ) GetAuthTokens () (* entity.AuthTokens , error ) {
4739 return m .authTokens , nil
4840}
4941
42+ func (m * mockLsStore ) GetAccessToken () (string , error ) {
43+ return "tok" , nil
44+ }
45+
5046func (m * mockLsStore ) GetWorkspace (_ string ) (* entity.Workspace , error ) {
5147 return nil , nil
5248}
5349
5450func (m * mockLsStore ) GetActiveOrganizationOrDefault () (* entity.Organization , error ) {
55- return m .org , nil
56- }
57-
58- func (m * mockLsStore ) GetCachedActiveOrganizationOrNil () (* entity.Organization , error ) {
51+ if m .authTokens != nil && authpkg .IsBrevAPIKey (m .authTokens .APIKey ) {
52+ orgID , err := authpkg .GetAPIKeyOrgID (m )
53+ if err != nil {
54+ return nil , err
55+ }
56+ return & entity.Organization {ID : orgID , Name : m .org .Name }, nil
57+ }
5958 return m .org , nil
6059}
6160
@@ -99,7 +98,6 @@ func newTestStore() *mockLsStore {
9998
10099func TestRunLs_APIKeyJSONSkipsUserAndOrgList (t * testing.T ) {
101100 s := newTestStore ()
102- s .accessToken = testAPIKey
103101 s .authTokens = & entity.AuthTokens {APIKey : testAPIKey , APIKeyOrgID : "org1" }
104102 s .workspaces = []entity.Workspace {
105103 {
@@ -143,7 +141,6 @@ func TestRunLs_APIKeyJSONSkipsUserAndOrgList(t *testing.T) {
143141
144142func TestRunLs_APIKeyUsesCredentialOrgNotCachedActiveOrg (t * testing.T ) {
145143 s := newTestStore ()
146- s .accessToken = testAPIKey
147144 s .authTokens = & entity.AuthTokens {APIKey : testAPIKey , APIKeyOrgID : "org-login" }
148145 s .org = & entity.Organization {ID : "org-set" , Name : "set-org" }
149146 s .workspaces = []entity.Workspace {
@@ -171,9 +168,25 @@ func TestRunLs_APIKeyUsesCredentialOrgNotCachedActiveOrg(t *testing.T) {
171168 }
172169}
173170
171+ func TestGetOrgForRunLs_APIKeyUsesActiveOrgDisplayName (t * testing.T ) {
172+ s := newTestStore ()
173+ s .authTokens = & entity.AuthTokens {APIKey : testAPIKey , APIKeyOrgID : "org-login" }
174+ s .org = & entity.Organization {ID : "org-login" , Name : "friendly-org" }
175+
176+ org , err := getOrgForRunLs (s , "" , true )
177+ if err != nil {
178+ t .Fatalf ("getOrgForRunLs returned error: %v" , err )
179+ }
180+ if org .ID != "org-login" {
181+ t .Fatalf ("expected org-login, got %s" , org .ID )
182+ }
183+ if org .Name != "friendly-org" {
184+ t .Fatalf ("expected friendly org name, got %s" , org .Name )
185+ }
186+ }
187+
174188func TestRunLs_APIKeyRequiresCredentialOrg (t * testing.T ) {
175189 s := newTestStore ()
176- s .accessToken = testAPIKey
177190 s .authTokens = & entity.AuthTokens {APIKey : testAPIKey }
178191 term := terminal .New ()
179192
0 commit comments