Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitb615cb1

Browse files
committed
chore: format
1 parent52c9044 commitb615cb1

File tree

1 file changed

+109
-109
lines changed

1 file changed

+109
-109
lines changed

‎coderd/database/dbauthz/dbauthz_test.go‎

Lines changed: 109 additions & 109 deletions
Original file line numberDiff line numberDiff line change
@@ -3783,67 +3783,67 @@ func (s *MethodTestSuite) TestTailnetFunctions() {
37833783
}
37843784

37853785
func (s*MethodTestSuite)TestDBCrypt() {
3786-
s.Run("GetDBCryptKeys",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3787-
dbm.EXPECT().GetDBCryptKeys(gomock.Any()).Return([]database.DBCryptKey{},nil).AnyTimes()
3788-
check.Args().
3789-
Asserts(rbac.ResourceSystem,policy.ActionRead).
3790-
Returns([]database.DBCryptKey{})
3791-
}))
3792-
s.Run("InsertDBCryptKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3793-
dbm.EXPECT().InsertDBCryptKey(gomock.Any(), database.InsertDBCryptKeyParams{}).Return(nil).AnyTimes()
3794-
check.Args(database.InsertDBCryptKeyParams{}).
3795-
Asserts(rbac.ResourceSystem,policy.ActionCreate).
3796-
Returns()
3797-
}))
3798-
s.Run("RevokeDBCryptKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3799-
dbm.EXPECT().RevokeDBCryptKey(gomock.Any(),"revoke me").Return(nil).AnyTimes()
3800-
check.Args("revoke me").
3801-
Asserts(rbac.ResourceSystem,policy.ActionUpdate).
3802-
Returns()
3803-
}))
3786+
s.Run("GetDBCryptKeys",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3787+
dbm.EXPECT().GetDBCryptKeys(gomock.Any()).Return([]database.DBCryptKey{},nil).AnyTimes()
3788+
check.Args().
3789+
Asserts(rbac.ResourceSystem,policy.ActionRead).
3790+
Returns([]database.DBCryptKey{})
3791+
}))
3792+
s.Run("InsertDBCryptKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3793+
dbm.EXPECT().InsertDBCryptKey(gomock.Any(), database.InsertDBCryptKeyParams{}).Return(nil).AnyTimes()
3794+
check.Args(database.InsertDBCryptKeyParams{}).
3795+
Asserts(rbac.ResourceSystem,policy.ActionCreate).
3796+
Returns()
3797+
}))
3798+
s.Run("RevokeDBCryptKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3799+
dbm.EXPECT().RevokeDBCryptKey(gomock.Any(),"revoke me").Return(nil).AnyTimes()
3800+
check.Args("revoke me").
3801+
Asserts(rbac.ResourceSystem,policy.ActionUpdate).
3802+
Returns()
3803+
}))
38043804
}
38053805

38063806
func (s*MethodTestSuite)TestCryptoKeys() {
3807-
s.Run("GetCryptoKeys",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3808-
dbm.EXPECT().GetCryptoKeys(gomock.Any()).Return([]database.CryptoKey{},nil).AnyTimes()
3809-
check.Args().
3810-
Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3811-
}))
3812-
s.Run("InsertCryptoKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3813-
arg:= database.InsertCryptoKeyParams{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey}
3814-
dbm.EXPECT().InsertCryptoKey(gomock.Any(),arg).Return(database.CryptoKey{},nil).AnyTimes()
3815-
check.Args(arg).
3816-
Asserts(rbac.ResourceCryptoKey,policy.ActionCreate)
3817-
}))
3818-
s.Run("DeleteCryptoKey",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3819-
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3820-
arg:= database.DeleteCryptoKeyParams{Feature:key.Feature,Sequence:key.Sequence}
3821-
dbm.EXPECT().DeleteCryptoKey(gomock.Any(),arg).Return(key,nil).AnyTimes()
3822-
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionDelete)
3823-
}))
3824-
s.Run("GetCryptoKeyByFeatureAndSequence",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3825-
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3826-
arg:= database.GetCryptoKeyByFeatureAndSequenceParams{Feature:key.Feature,Sequence:key.Sequence}
3827-
dbm.EXPECT().GetCryptoKeyByFeatureAndSequence(gomock.Any(),arg).Return(key,nil).AnyTimes()
3828-
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionRead).Returns(key)
3829-
}))
3830-
s.Run("GetLatestCryptoKeyByFeature",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3831-
feature:=database.CryptoKeyFeatureWorkspaceAppsAPIKey
3832-
dbm.EXPECT().GetLatestCryptoKeyByFeature(gomock.Any(),feature).Return(database.CryptoKey{},nil).AnyTimes()
3833-
check.Args(feature).Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3834-
}))
3835-
s.Run("UpdateCryptoKeyDeletesAt",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3836-
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3837-
arg:= database.UpdateCryptoKeyDeletesAtParams{Feature:key.Feature,Sequence:key.Sequence,DeletesAt: sql.NullTime{Time:time.Now(),Valid:true}}
3838-
dbm.EXPECT().UpdateCryptoKeyDeletesAt(gomock.Any(),arg).Return(key,nil).AnyTimes()
3839-
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionUpdate)
3840-
}))
3841-
s.Run("GetCryptoKeysByFeature",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3842-
feature:=database.CryptoKeyFeatureWorkspaceAppsAPIKey
3843-
dbm.EXPECT().GetCryptoKeysByFeature(gomock.Any(),feature).Return([]database.CryptoKey{},nil).AnyTimes()
3844-
check.Args(feature).
3845-
Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3846-
}))
3807+
s.Run("GetCryptoKeys",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3808+
dbm.EXPECT().GetCryptoKeys(gomock.Any()).Return([]database.CryptoKey{},nil).AnyTimes()
3809+
check.Args().
3810+
Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3811+
}))
3812+
s.Run("InsertCryptoKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3813+
arg:= database.InsertCryptoKeyParams{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey}
3814+
dbm.EXPECT().InsertCryptoKey(gomock.Any(),arg).Return(database.CryptoKey{},nil).AnyTimes()
3815+
check.Args(arg).
3816+
Asserts(rbac.ResourceCryptoKey,policy.ActionCreate)
3817+
}))
3818+
s.Run("DeleteCryptoKey",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3819+
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3820+
arg:= database.DeleteCryptoKeyParams{Feature:key.Feature,Sequence:key.Sequence}
3821+
dbm.EXPECT().DeleteCryptoKey(gomock.Any(),arg).Return(key,nil).AnyTimes()
3822+
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionDelete)
3823+
}))
3824+
s.Run("GetCryptoKeyByFeatureAndSequence",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3825+
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3826+
arg:= database.GetCryptoKeyByFeatureAndSequenceParams{Feature:key.Feature,Sequence:key.Sequence}
3827+
dbm.EXPECT().GetCryptoKeyByFeatureAndSequence(gomock.Any(),arg).Return(key,nil).AnyTimes()
3828+
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionRead).Returns(key)
3829+
}))
3830+
s.Run("GetLatestCryptoKeyByFeature",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3831+
feature:=database.CryptoKeyFeatureWorkspaceAppsAPIKey
3832+
dbm.EXPECT().GetLatestCryptoKeyByFeature(gomock.Any(),feature).Return(database.CryptoKey{},nil).AnyTimes()
3833+
check.Args(feature).Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3834+
}))
3835+
s.Run("UpdateCryptoKeyDeletesAt",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3836+
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3837+
arg:= database.UpdateCryptoKeyDeletesAtParams{Feature:key.Feature,Sequence:key.Sequence,DeletesAt: sql.NullTime{Time:time.Now(),Valid:true}}
3838+
dbm.EXPECT().UpdateCryptoKeyDeletesAt(gomock.Any(),arg).Return(key,nil).AnyTimes()
3839+
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionUpdate)
3840+
}))
3841+
s.Run("GetCryptoKeysByFeature",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3842+
feature:=database.CryptoKeyFeatureWorkspaceAppsAPIKey
3843+
dbm.EXPECT().GetCryptoKeysByFeature(gomock.Any(),feature).Return([]database.CryptoKey{},nil).AnyTimes()
3844+
check.Args(feature).
3845+
Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3846+
}))
38473847
}
38483848

38493849
func (s*MethodTestSuite)TestSystemFunctions() {
@@ -5736,55 +5736,55 @@ func (s *MethodTestSuite) TestAuthorizePrebuiltWorkspace() {
57365736
}
57375737

57385738
func (s*MethodTestSuite)TestUserSecrets() {
5739-
s.Run("GetUserSecretByUserIDAndName",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5740-
user:=testutil.Fake(s.T(),faker, database.User{})
5741-
secret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5742-
arg:= database.GetUserSecretByUserIDAndNameParams{UserID:user.ID,Name:secret.Name}
5743-
dbm.EXPECT().GetUserSecretByUserIDAndName(gomock.Any(),arg).Return(secret,nil).AnyTimes()
5744-
check.Args(arg).
5745-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionRead).
5746-
Returns(secret)
5747-
}))
5748-
s.Run("GetUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5749-
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5750-
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5751-
check.Args(secret.ID).
5752-
Asserts(secret,policy.ActionRead).
5753-
Returns(secret)
5754-
}))
5755-
s.Run("ListUserSecrets",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5756-
user:=testutil.Fake(s.T(),faker, database.User{})
5757-
secret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5758-
dbm.EXPECT().ListUserSecrets(gomock.Any(),user.ID).Return([]database.UserSecret{secret},nil).AnyTimes()
5759-
check.Args(user.ID).
5760-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionRead).
5761-
Returns([]database.UserSecret{secret})
5762-
}))
5763-
s.Run("CreateUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5764-
user:=testutil.Fake(s.T(),faker, database.User{})
5765-
arg:= database.CreateUserSecretParams{UserID:user.ID}
5766-
ret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5767-
dbm.EXPECT().CreateUserSecret(gomock.Any(),arg).Return(ret,nil).AnyTimes()
5768-
check.Args(arg).
5769-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionCreate).
5770-
Returns(ret)
5771-
}))
5772-
s.Run("UpdateUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5773-
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5774-
updated:=testutil.Fake(s.T(),faker, database.UserSecret{ID:secret.ID})
5775-
arg:= database.UpdateUserSecretParams{ID:secret.ID}
5776-
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5777-
dbm.EXPECT().UpdateUserSecret(gomock.Any(),arg).Return(updated,nil).AnyTimes()
5778-
check.Args(arg).
5779-
Asserts(secret,policy.ActionUpdate).
5780-
Returns(updated)
5781-
}))
5782-
s.Run("DeleteUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5783-
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5784-
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5785-
dbm.EXPECT().DeleteUserSecret(gomock.Any(),secret.ID).Return(nil).AnyTimes()
5786-
check.Args(secret.ID).
5787-
Asserts(secret,policy.ActionRead,secret,policy.ActionDelete).
5788-
Returns()
5789-
}))
5739+
s.Run("GetUserSecretByUserIDAndName",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5740+
user:=testutil.Fake(s.T(),faker, database.User{})
5741+
secret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5742+
arg:= database.GetUserSecretByUserIDAndNameParams{UserID:user.ID,Name:secret.Name}
5743+
dbm.EXPECT().GetUserSecretByUserIDAndName(gomock.Any(),arg).Return(secret,nil).AnyTimes()
5744+
check.Args(arg).
5745+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionRead).
5746+
Returns(secret)
5747+
}))
5748+
s.Run("GetUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5749+
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5750+
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5751+
check.Args(secret.ID).
5752+
Asserts(secret,policy.ActionRead).
5753+
Returns(secret)
5754+
}))
5755+
s.Run("ListUserSecrets",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5756+
user:=testutil.Fake(s.T(),faker, database.User{})
5757+
secret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5758+
dbm.EXPECT().ListUserSecrets(gomock.Any(),user.ID).Return([]database.UserSecret{secret},nil).AnyTimes()
5759+
check.Args(user.ID).
5760+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionRead).
5761+
Returns([]database.UserSecret{secret})
5762+
}))
5763+
s.Run("CreateUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5764+
user:=testutil.Fake(s.T(),faker, database.User{})
5765+
arg:= database.CreateUserSecretParams{UserID:user.ID}
5766+
ret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5767+
dbm.EXPECT().CreateUserSecret(gomock.Any(),arg).Return(ret,nil).AnyTimes()
5768+
check.Args(arg).
5769+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionCreate).
5770+
Returns(ret)
5771+
}))
5772+
s.Run("UpdateUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5773+
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5774+
updated:=testutil.Fake(s.T(),faker, database.UserSecret{ID:secret.ID})
5775+
arg:= database.UpdateUserSecretParams{ID:secret.ID}
5776+
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5777+
dbm.EXPECT().UpdateUserSecret(gomock.Any(),arg).Return(updated,nil).AnyTimes()
5778+
check.Args(arg).
5779+
Asserts(secret,policy.ActionUpdate).
5780+
Returns(updated)
5781+
}))
5782+
s.Run("DeleteUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5783+
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5784+
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5785+
dbm.EXPECT().DeleteUserSecret(gomock.Any(),secret.ID).Return(nil).AnyTimes()
5786+
check.Args(secret.ID).
5787+
Asserts(secret,policy.ActionRead,secret,policy.ActionDelete).
5788+
Returns()
5789+
}))
57905790
}

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp