Test: new modifications in filesystem pkg

pull/1056/head
HFO4 2021-11-16 20:54:21 +08:00
parent fcd9eddc54
commit 532bff820a
13 changed files with 170 additions and 110 deletions

View File

@ -6,7 +6,7 @@ import (
"github.com/cloudreve/Cloudreve/v3/pkg/aria2/common" "github.com/cloudreve/Cloudreve/v3/pkg/aria2/common"
"github.com/cloudreve/Cloudreve/v3/pkg/auth" "github.com/cloudreve/Cloudreve/v3/pkg/auth"
"github.com/cloudreve/Cloudreve/v3/pkg/cluster" "github.com/cloudreve/Cloudreve/v3/pkg/cluster"
"github.com/cloudreve/Cloudreve/v3/pkg/mocks" "github.com/cloudreve/Cloudreve/v3/pkg/mocks/controllermock"
"github.com/gin-gonic/gin" "github.com/gin-gonic/gin"
"github.com/jinzhu/gorm" "github.com/jinzhu/gorm"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
@ -82,7 +82,7 @@ func TestUseSlaveAria2Instance(t *testing.T) {
// MasterSiteID not set // MasterSiteID not set
{ {
testController := &mocks.SlaveControllerMock{} testController := &controllermock.SlaveControllerMock{}
useSlaveAria2InstanceFunc := UseSlaveAria2Instance(testController) useSlaveAria2InstanceFunc := UseSlaveAria2Instance(testController)
c, _ := gin.CreateTestContext(httptest.NewRecorder()) c, _ := gin.CreateTestContext(httptest.NewRecorder())
c.Request = httptest.NewRequest("GET", "/", nil) c.Request = httptest.NewRequest("GET", "/", nil)
@ -92,7 +92,7 @@ func TestUseSlaveAria2Instance(t *testing.T) {
// Cannot get aria2 instances // Cannot get aria2 instances
{ {
testController := &mocks.SlaveControllerMock{} testController := &controllermock.SlaveControllerMock{}
useSlaveAria2InstanceFunc := UseSlaveAria2Instance(testController) useSlaveAria2InstanceFunc := UseSlaveAria2Instance(testController)
c, _ := gin.CreateTestContext(httptest.NewRecorder()) c, _ := gin.CreateTestContext(httptest.NewRecorder())
c.Request = httptest.NewRequest("GET", "/", nil) c.Request = httptest.NewRequest("GET", "/", nil)
@ -105,7 +105,7 @@ func TestUseSlaveAria2Instance(t *testing.T) {
// Success // Success
{ {
testController := &mocks.SlaveControllerMock{} testController := &controllermock.SlaveControllerMock{}
useSlaveAria2InstanceFunc := UseSlaveAria2Instance(testController) useSlaveAria2InstanceFunc := UseSlaveAria2Instance(testController)
c, _ := gin.CreateTestContext(httptest.NewRecorder()) c, _ := gin.CreateTestContext(httptest.NewRecorder())
c.Request = httptest.NewRequest("GET", "/", nil) c.Request = httptest.NewRequest("GET", "/", nil)

View File

@ -6,6 +6,7 @@ import (
"encoding/json" "encoding/json"
"errors" "errors"
"fmt" "fmt"
"github.com/cloudreve/Cloudreve/v3/pkg/conf"
"io" "io"
"io/ioutil" "io/ioutil"
"net/http" "net/http"
@ -573,7 +574,7 @@ func sysError(err error) *RespError {
func (client *Client) request(ctx context.Context, method string, url string, body io.Reader, option ...request.Option) (string, *RespError) { func (client *Client) request(ctx context.Context, method string, url string, body io.Reader, option ...request.Option) (string, *RespError) {
// 获取凭证 // 获取凭证
err := client.UpdateCredential(ctx) err := client.UpdateCredential(ctx, conf.SystemConfig.Mode == "slave")
if err != nil { if err != nil {
return "", sysError(err) return "", sysError(err)
} }

View File

@ -2,6 +2,7 @@ package onedrive
import ( import (
"errors" "errors"
"github.com/cloudreve/Cloudreve/v3/pkg/cluster"
model "github.com/cloudreve/Cloudreve/v3/models" model "github.com/cloudreve/Cloudreve/v3/models"
"github.com/cloudreve/Cloudreve/v3/pkg/request" "github.com/cloudreve/Cloudreve/v3/pkg/request"
@ -28,7 +29,8 @@ type Client struct {
ClientSecret string ClientSecret string
Redirect string Redirect string
Request request.Client Request request.Client
ClusterController cluster.Controller
} }
// Endpoints OneDrive客户端相关设置 // Endpoints OneDrive客户端相关设置
@ -51,11 +53,12 @@ func NewClient(policy *model.Policy) (*Client, error) {
Credential: &Credential{ Credential: &Credential{
RefreshToken: policy.AccessKey, RefreshToken: policy.AccessKey,
}, },
Policy: policy, Policy: policy,
ClientID: policy.BucketName, ClientID: policy.BucketName,
ClientSecret: policy.SecretKey, ClientSecret: policy.SecretKey,
Redirect: policy.OptionsSerialized.OdRedirect, Redirect: policy.OptionsSerialized.OdRedirect,
Request: request.NewClient(), Request: request.NewClient(),
ClusterController: cluster.DefaultController,
} }
if client.Endpoints.DriverResource == "" { if client.Endpoints.DriverResource == "" {

View File

@ -3,7 +3,6 @@ package onedrive
import ( import (
"context" "context"
"encoding/json" "encoding/json"
"github.com/cloudreve/Cloudreve/v3/pkg/cluster"
"io/ioutil" "io/ioutil"
"net/http" "net/http"
"net/url" "net/url"
@ -11,7 +10,6 @@ import (
"time" "time"
"github.com/cloudreve/Cloudreve/v3/pkg/cache" "github.com/cloudreve/Cloudreve/v3/pkg/cache"
"github.com/cloudreve/Cloudreve/v3/pkg/conf"
"github.com/cloudreve/Cloudreve/v3/pkg/request" "github.com/cloudreve/Cloudreve/v3/pkg/request"
"github.com/cloudreve/Cloudreve/v3/pkg/util" "github.com/cloudreve/Cloudreve/v3/pkg/util"
) )
@ -125,8 +123,8 @@ func (client *Client) ObtainToken(ctx context.Context, opts ...Option) (*Credent
} }
// UpdateCredential 更新凭证,并检查有效期 // UpdateCredential 更新凭证,并检查有效期
func (client *Client) UpdateCredential(ctx context.Context) error { func (client *Client) UpdateCredential(ctx context.Context, isSlave bool) error {
if conf.SystemConfig.Mode == "slave" { if isSlave {
return client.fetchCredentialFromMaster(ctx) return client.fetchCredentialFromMaster(ctx)
} }
@ -179,7 +177,7 @@ func (client *Client) UpdateCredential(ctx context.Context) error {
// UpdateCredential 更新凭证,并检查有效期 // UpdateCredential 更新凭证,并检查有效期
func (client *Client) fetchCredentialFromMaster(ctx context.Context) error { func (client *Client) fetchCredentialFromMaster(ctx context.Context) error {
res, err := cluster.DefaultController.GetOneDriveToken(client.Policy.MasterID, client.Policy.ID) res, err := client.ClusterController.GetOneDriveToken(client.Policy.MasterID, client.Policy.ID)
if err != nil { if err != nil {
return err return err
} }

View File

@ -4,6 +4,7 @@ import (
"context" "context"
"database/sql" "database/sql"
"errors" "errors"
"github.com/cloudreve/Cloudreve/v3/pkg/mocks/controllermock"
"io" "io"
"io/ioutil" "io/ioutil"
"net/http" "net/http"
@ -269,10 +270,10 @@ func TestClient_UpdateCredential(t *testing.T) {
// 无有效的RefreshToken // 无有效的RefreshToken
{ {
err := client.UpdateCredential(context.Background()) err := client.UpdateCredential(context.Background(), false)
asserts.Equal(ErrInvalidRefreshToken, err) asserts.Equal(ErrInvalidRefreshToken, err)
client.Credential = nil client.Credential = nil
err = client.UpdateCredential(context.Background()) err = client.UpdateCredential(context.Background(), false)
asserts.Equal(ErrInvalidRefreshToken, err) asserts.Equal(ErrInvalidRefreshToken, err)
} }
@ -299,7 +300,7 @@ func TestClient_UpdateCredential(t *testing.T) {
mock.ExpectBegin() mock.ExpectBegin()
mock.ExpectExec("UPDATE(.+)").WillReturnResult(sqlmock.NewResult(1, 1)) mock.ExpectExec("UPDATE(.+)").WillReturnResult(sqlmock.NewResult(1, 1))
mock.ExpectCommit() mock.ExpectCommit()
err := client.UpdateCredential(context.Background()) err := client.UpdateCredential(context.Background(), false)
clientMock.AssertExpectations(t) clientMock.AssertExpectations(t)
asserts.NoError(mock.ExpectationsWereMet()) asserts.NoError(mock.ExpectationsWereMet())
asserts.NoError(err) asserts.NoError(err)
@ -331,7 +332,7 @@ func TestClient_UpdateCredential(t *testing.T) {
client.Credential = &Credential{ client.Credential = &Credential{
RefreshToken: "old_refresh_token", RefreshToken: "old_refresh_token",
} }
err := client.UpdateCredential(context.Background()) err := client.UpdateCredential(context.Background(), false)
clientMock.AssertExpectations(t) clientMock.AssertExpectations(t)
asserts.Error(err) asserts.Error(err)
} }
@ -346,7 +347,7 @@ func TestClient_UpdateCredential(t *testing.T) {
client.Credential = &Credential{ client.Credential = &Credential{
RefreshToken: "old_refresh_token", RefreshToken: "old_refresh_token",
} }
err := client.UpdateCredential(context.Background()) err := client.UpdateCredential(context.Background(), false)
asserts.NoError(err) asserts.NoError(err)
asserts.Equal("AccessToken", client.Credential.AccessToken) asserts.Equal("AccessToken", client.Credential.AccessToken)
asserts.Equal("RefreshToken", client.Credential.RefreshToken) asserts.Equal("RefreshToken", client.Credential.RefreshToken)
@ -359,8 +360,27 @@ func TestClient_UpdateCredential(t *testing.T) {
AccessToken: "AccessToken2", AccessToken: "AccessToken2",
ExpiresIn: time.Now().Add(time.Duration(10) * time.Second).Unix(), ExpiresIn: time.Now().Add(time.Duration(10) * time.Second).Unix(),
} }
err := client.UpdateCredential(context.Background()) err := client.UpdateCredential(context.Background(), false)
asserts.NoError(err) asserts.NoError(err)
asserts.Equal("AccessToken2", client.Credential.AccessToken) asserts.Equal("AccessToken2", client.Credential.AccessToken)
} }
// slave failed
{
mockController := &controllermock.SlaveControllerMock{}
mockController.On("GetOneDriveToken", testMock.Anything, testMock.Anything).Return("", errors.New("error"))
client.ClusterController = mockController
err := client.UpdateCredential(context.Background(), true)
asserts.Error(err)
}
// slave success
{
mockController := &controllermock.SlaveControllerMock{}
mockController.On("GetOneDriveToken", testMock.Anything, testMock.Anything).Return("AccessToken3", nil)
client.ClusterController = mockController
err := client.UpdateCredential(context.Background(), true)
asserts.NoError(err)
asserts.Equal("AccessToken3", client.Credential.AccessToken)
}
} }

View File

@ -105,7 +105,7 @@ func TestHandler_Source(t *testing.T) {
// 解析失败 自定义CDN // 解析失败 自定义CDN
{ {
handler := Driver{ handler := Driver{
Policy: &model.Policy{Server: "/", BaseURL: string(0x7f)}, Policy: &model.Policy{Server: "/", BaseURL: string([]byte{0x7f})},
AuthInstance: auth.HMACAuth{}, AuthInstance: auth.HMACAuth{},
} }
file := model.File{ file := model.File{

View File

@ -228,25 +228,25 @@ func TestFileSystem_deleteGroupedFile(t *testing.T) {
}, },
} }
// 全部失败 // 全部不存在
{ {
failed := fs.deleteGroupedFile(ctx, fs.GroupFileByPolicy(ctx, files)) failed := fs.deleteGroupedFile(ctx, fs.GroupFileByPolicy(ctx, files))
asserts.Equal(map[uint][]string{ asserts.Equal(map[uint][]string{
1: {"1_1.txt", "1_2.txt"}, 1: {},
2: {"2_1.txt", "2_2.txt"}, 2: {},
3: {"3_1.txt"}, 3: {},
}, failed) }, failed)
} }
// 部分失败 // 部分不存在
{ {
file, err := os.Create(util.RelativePath("1_1.txt")) file, err := os.Create(util.RelativePath("1_1.txt"))
asserts.NoError(err) asserts.NoError(err)
_ = file.Close() _ = file.Close()
failed := fs.deleteGroupedFile(ctx, fs.GroupFileByPolicy(ctx, files)) failed := fs.deleteGroupedFile(ctx, fs.GroupFileByPolicy(ctx, files))
asserts.Equal(map[uint][]string{ asserts.Equal(map[uint][]string{
1: {"1_2.txt"}, 1: {},
2: {"2_1.txt", "2_2.txt"}, 2: {},
3: {"3_1.txt"}, 3: {},
}, failed) }, failed)
} }
// 部分失败,包含整组未知存储策略导致的失败 // 部分失败,包含整组未知存储策略导致的失败
@ -259,9 +259,9 @@ func TestFileSystem_deleteGroupedFile(t *testing.T) {
files[3].Policy.Type = "unknown" files[3].Policy.Type = "unknown"
failed := fs.deleteGroupedFile(ctx, fs.GroupFileByPolicy(ctx, files)) failed := fs.deleteGroupedFile(ctx, fs.GroupFileByPolicy(ctx, files))
asserts.Equal(map[uint][]string{ asserts.Equal(map[uint][]string{
1: {"1_2.txt"}, 1: {},
2: {"2_1.txt", "2_2.txt"}, 2: {"2_1.txt", "2_2.txt"},
3: {"3_1.txt"}, 3: {},
}, failed) }, failed)
} }
} }

View File

@ -1,6 +1,9 @@
package filesystem package filesystem
import ( import (
"github.com/cloudreve/Cloudreve/v3/pkg/cluster"
"github.com/cloudreve/Cloudreve/v3/pkg/filesystem/driver/shadow/masterinslave"
"github.com/cloudreve/Cloudreve/v3/pkg/filesystem/driver/shadow/slaveinmaster"
"net/http/httptest" "net/http/httptest"
"github.com/DATA-DOG/go-sqlmock" "github.com/DATA-DOG/go-sqlmock"
@ -104,6 +107,10 @@ func TestDispatchHandler(t *testing.T) {
err = fs.DispatchHandler() err = fs.DispatchHandler()
asserts.NoError(err) asserts.NoError(err)
fs.Policy = &model.Policy{Type: "cos"}
err = fs.DispatchHandler()
asserts.NoError(err)
fs.Policy = &model.Policy{Type: "s3"} fs.Policy = &model.Policy{Type: "s3"}
err = fs.DispatchHandler() err = fs.DispatchHandler()
asserts.NoError(err) asserts.NoError(err)
@ -262,3 +269,40 @@ func TestFileSystem_SetTargetByInterface(t *testing.T) {
asserts.Len(fs.FileTarget, 1) asserts.Len(fs.FileTarget, 1)
} }
} }
func TestFileSystem_SwitchToSlaveHandler(t *testing.T) {
a := assert.New(t)
fs := FileSystem{
User: &model.User{},
}
mockNode := &cluster.MasterNode{
Model: &model.Node{},
}
fs.SwitchToSlaveHandler(mockNode)
a.IsType(&slaveinmaster.Driver{}, fs.Handler)
}
func TestFileSystem_SwitchToShadowHandler(t *testing.T) {
a := assert.New(t)
fs := FileSystem{
User: &model.User{},
Policy: &model.Policy{},
}
mockNode := &cluster.MasterNode{
Model: &model.Node{},
}
// remote to local
{
fs.Policy.Type = "remote"
fs.SwitchToShadowHandler(mockNode, "", "")
a.IsType(&masterinslave.Driver{}, fs.Handler)
}
// local to remote
{
fs.Policy.Type = "local"
fs.SwitchToShadowHandler(mockNode, "", "")
a.IsType(&masterinslave.Driver{}, fs.Handler)
}
}

View File

@ -708,3 +708,29 @@ func TestHookGiveBackCapacity(t *testing.T) {
asserts.EqualValues(7, fs.User.Storage) asserts.EqualValues(7, fs.User.Storage)
} }
} }
func TestHookValidateCapacityWithoutIncrease(t *testing.T) {
a := assert.New(t)
fs := &FileSystem{
User: &model.User{
Model: gorm.Model{ID: 1},
Storage: 10,
Group: model.Group{},
},
}
ctx := context.WithValue(context.Background(), fsctx.FileHeaderCtx, local.FileStream{Size: 1})
// not enough
{
fs.User.Group.MaxStorage = 10
a.Error(HookValidateCapacityWithoutIncrease(ctx, fs))
a.EqualValues(10, fs.User.Storage)
}
// enough
{
fs.User.Group.MaxStorage = 11
a.NoError(HookValidateCapacityWithoutIncrease(ctx, fs))
a.EqualValues(10, fs.User.Storage)
}
}

View File

@ -356,47 +356,6 @@ func TestFileSystem_Delete(t *testing.T) {
}} }}
ctx := context.Background() ctx := context.Background()
//全部未成功
{
// 列出要删除的目录
mock.ExpectQuery("SELECT(.+)").
WillReturnRows(
sqlmock.NewRows([]string{"id"}).
AddRow(1).
AddRow(2).
AddRow(3),
)
mock.ExpectQuery("SELECT(.+)").
WithArgs(1, 2, 3).
WillReturnRows(
sqlmock.NewRows([]string{"id", "name", "source_name", "policy_id", "size"}).
AddRow(4, "1.txt", "1.txt", 2, 1),
)
// 查询顶级的文件
mock.ExpectQuery("SELECT(.+)").WillReturnRows(sqlmock.NewRows([]string{"id", "name", "source_name", "policy_id", "size"}).AddRow(1, "1.txt", "1.txt", 603, 2))
mock.ExpectQuery("SELECT(.+)files(.+)").
WillReturnRows(sqlmock.NewRows([]string{"id", "policy_id", "source_name"}))
// 查找软连接
mock.ExpectQuery("SELECT(.+)").WillReturnRows(sqlmock.NewRows([]string{"id"}))
// 查询上传策略
mock.ExpectQuery("SELECT(.+)").WillReturnRows(sqlmock.NewRows([]string{"id", "type"}).AddRow(603, "local"))
// 删除文件记录
mock.ExpectBegin()
mock.ExpectExec("DELETE(.+)files").
WillReturnResult(sqlmock.NewResult(0, 3))
mock.ExpectCommit()
// 删除对应分享
mock.ExpectBegin()
mock.ExpectExec("UPDATE(.+)shares").
WillReturnResult(sqlmock.NewResult(0, 3))
mock.ExpectCommit()
err := fs.Delete(ctx, []uint{1}, []uint{1}, false)
asserts.Error(err)
asserts.Equal(203, err.(serializer.AppError).Code)
asserts.Equal(uint64(3), fs.User.Storage)
asserts.NoError(mock.ExpectationsWereMet())
}
//全部未成功,强制 //全部未成功,强制
{ {
fs.CleanTargets() fs.CleanTargets()

View File

@ -0,0 +1,43 @@
package controllermock
import (
"github.com/cloudreve/Cloudreve/v3/pkg/aria2/common"
"github.com/cloudreve/Cloudreve/v3/pkg/cluster"
"github.com/cloudreve/Cloudreve/v3/pkg/mq"
"github.com/cloudreve/Cloudreve/v3/pkg/serializer"
"github.com/stretchr/testify/mock"
)
type SlaveControllerMock struct {
mock.Mock
}
func (s SlaveControllerMock) HandleHeartBeat(pingReq *serializer.NodePingReq) (serializer.NodePingResp, error) {
args := s.Called(pingReq)
return args.Get(0).(serializer.NodePingResp), args.Error(1)
}
func (s SlaveControllerMock) GetAria2Instance(s2 string) (common.Aria2, error) {
args := s.Called(s2)
return args.Get(0).(common.Aria2), args.Error(1)
}
func (s SlaveControllerMock) SendNotification(s3 string, s2 string, message mq.Message) error {
args := s.Called(s3, s2, message)
return args.Error(0)
}
func (s SlaveControllerMock) SubmitTask(s3 string, i interface{}, s2 string, f func(interface{})) error {
args := s.Called(s3, i, s2, f)
return args.Error(0)
}
func (s SlaveControllerMock) GetMasterInfo(s2 string) (*cluster.MasterInfo, error) {
args := s.Called(s2)
return args.Get(0).(*cluster.MasterInfo), args.Error(1)
}
func (s SlaveControllerMock) GetOneDriveToken(s2 string, u uint) (string, error) {
args := s.Called(s2, u)
return args.String(0), args.Error(1)
}

View File

@ -7,7 +7,6 @@ import (
"github.com/cloudreve/Cloudreve/v3/pkg/auth" "github.com/cloudreve/Cloudreve/v3/pkg/auth"
"github.com/cloudreve/Cloudreve/v3/pkg/balancer" "github.com/cloudreve/Cloudreve/v3/pkg/balancer"
"github.com/cloudreve/Cloudreve/v3/pkg/cluster" "github.com/cloudreve/Cloudreve/v3/pkg/cluster"
"github.com/cloudreve/Cloudreve/v3/pkg/mq"
"github.com/cloudreve/Cloudreve/v3/pkg/request" "github.com/cloudreve/Cloudreve/v3/pkg/request"
"github.com/cloudreve/Cloudreve/v3/pkg/serializer" "github.com/cloudreve/Cloudreve/v3/pkg/serializer"
"github.com/cloudreve/Cloudreve/v3/pkg/task" "github.com/cloudreve/Cloudreve/v3/pkg/task"
@ -15,40 +14,6 @@ import (
"io" "io"
) )
type SlaveControllerMock struct {
testMock.Mock
}
func (s SlaveControllerMock) HandleHeartBeat(pingReq *serializer.NodePingReq) (serializer.NodePingResp, error) {
args := s.Called(pingReq)
return args.Get(0).(serializer.NodePingResp), args.Error(1)
}
func (s SlaveControllerMock) GetAria2Instance(s2 string) (common.Aria2, error) {
args := s.Called(s2)
return args.Get(0).(common.Aria2), args.Error(1)
}
func (s SlaveControllerMock) SendNotification(s3 string, s2 string, message mq.Message) error {
args := s.Called(s3, s2, message)
return args.Error(0)
}
func (s SlaveControllerMock) SubmitTask(s3 string, i interface{}, s2 string, f func(interface{})) error {
args := s.Called(s3, i, s2, f)
return args.Error(0)
}
func (s SlaveControllerMock) GetMasterInfo(s2 string) (*cluster.MasterInfo, error) {
args := s.Called(s2)
return args.Get(0).(*cluster.MasterInfo), args.Error(1)
}
func (s SlaveControllerMock) GetOneDriveToken(s2 string, u uint) (string, error) {
args := s.Called(s2, u)
return args.String(0), args.Error(1)
}
type NodePoolMock struct { type NodePoolMock struct {
testMock.Mock testMock.Mock
} }

View File

@ -4,6 +4,7 @@ import (
"encoding/gob" "encoding/gob"
model "github.com/cloudreve/Cloudreve/v3/models" model "github.com/cloudreve/Cloudreve/v3/models"
"github.com/cloudreve/Cloudreve/v3/pkg/cluster" "github.com/cloudreve/Cloudreve/v3/pkg/cluster"
"github.com/cloudreve/Cloudreve/v3/pkg/conf"
"github.com/cloudreve/Cloudreve/v3/pkg/filesystem/driver/onedrive" "github.com/cloudreve/Cloudreve/v3/pkg/filesystem/driver/onedrive"
"github.com/cloudreve/Cloudreve/v3/pkg/mq" "github.com/cloudreve/Cloudreve/v3/pkg/mq"
"github.com/cloudreve/Cloudreve/v3/pkg/serializer" "github.com/cloudreve/Cloudreve/v3/pkg/serializer"
@ -54,7 +55,7 @@ func (s *OneDriveCredentialService) Get(c *gin.Context) serializer.Response {
return serializer.Err(serializer.CodeInternalSetting, "Cannot initialize OneDrive client", err) return serializer.Err(serializer.CodeInternalSetting, "Cannot initialize OneDrive client", err)
} }
if err := client.UpdateCredential(c); err != nil { if err := client.UpdateCredential(c, conf.SystemConfig.Mode == "slave"); err != nil {
return serializer.Err(serializer.CodeInternalSetting, "Cannot refresh OneDrive credential", err) return serializer.Err(serializer.CodeInternalSetting, "Cannot refresh OneDrive credential", err)
} }