Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitd5f03c2

Browse files
committed
chore: format
1 parenta49b396 commitd5f03c2

File tree

1 file changed

+109
-109
lines changed

1 file changed

+109
-109
lines changed

‎coderd/database/dbauthz/dbauthz_test.go‎

Lines changed: 109 additions & 109 deletions
Original file line numberDiff line numberDiff line change
@@ -3714,67 +3714,67 @@ func (s *MethodTestSuite) TestTailnetFunctions() {
37143714
}
37153715

37163716
func (s*MethodTestSuite)TestDBCrypt() {
3717-
s.Run("GetDBCryptKeys",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3718-
dbm.EXPECT().GetDBCryptKeys(gomock.Any()).Return([]database.DBCryptKey{},nil).AnyTimes()
3719-
check.Args().
3720-
Asserts(rbac.ResourceSystem,policy.ActionRead).
3721-
Returns([]database.DBCryptKey{})
3722-
}))
3723-
s.Run("InsertDBCryptKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3724-
dbm.EXPECT().InsertDBCryptKey(gomock.Any(), database.InsertDBCryptKeyParams{}).Return(nil).AnyTimes()
3725-
check.Args(database.InsertDBCryptKeyParams{}).
3726-
Asserts(rbac.ResourceSystem,policy.ActionCreate).
3727-
Returns()
3728-
}))
3729-
s.Run("RevokeDBCryptKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3730-
dbm.EXPECT().RevokeDBCryptKey(gomock.Any(),"revoke me").Return(nil).AnyTimes()
3731-
check.Args("revoke me").
3732-
Asserts(rbac.ResourceSystem,policy.ActionUpdate).
3733-
Returns()
3734-
}))
3717+
s.Run("GetDBCryptKeys",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3718+
dbm.EXPECT().GetDBCryptKeys(gomock.Any()).Return([]database.DBCryptKey{},nil).AnyTimes()
3719+
check.Args().
3720+
Asserts(rbac.ResourceSystem,policy.ActionRead).
3721+
Returns([]database.DBCryptKey{})
3722+
}))
3723+
s.Run("InsertDBCryptKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3724+
dbm.EXPECT().InsertDBCryptKey(gomock.Any(), database.InsertDBCryptKeyParams{}).Return(nil).AnyTimes()
3725+
check.Args(database.InsertDBCryptKeyParams{}).
3726+
Asserts(rbac.ResourceSystem,policy.ActionCreate).
3727+
Returns()
3728+
}))
3729+
s.Run("RevokeDBCryptKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3730+
dbm.EXPECT().RevokeDBCryptKey(gomock.Any(),"revoke me").Return(nil).AnyTimes()
3731+
check.Args("revoke me").
3732+
Asserts(rbac.ResourceSystem,policy.ActionUpdate).
3733+
Returns()
3734+
}))
37353735
}
37363736

37373737
func (s*MethodTestSuite)TestCryptoKeys() {
3738-
s.Run("GetCryptoKeys",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3739-
dbm.EXPECT().GetCryptoKeys(gomock.Any()).Return([]database.CryptoKey{},nil).AnyTimes()
3740-
check.Args().
3741-
Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3742-
}))
3743-
s.Run("InsertCryptoKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3744-
arg:= database.InsertCryptoKeyParams{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey}
3745-
dbm.EXPECT().InsertCryptoKey(gomock.Any(),arg).Return(database.CryptoKey{},nil).AnyTimes()
3746-
check.Args(arg).
3747-
Asserts(rbac.ResourceCryptoKey,policy.ActionCreate)
3748-
}))
3749-
s.Run("DeleteCryptoKey",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3750-
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3751-
arg:= database.DeleteCryptoKeyParams{Feature:key.Feature,Sequence:key.Sequence}
3752-
dbm.EXPECT().DeleteCryptoKey(gomock.Any(),arg).Return(key,nil).AnyTimes()
3753-
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionDelete)
3754-
}))
3755-
s.Run("GetCryptoKeyByFeatureAndSequence",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3756-
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3757-
arg:= database.GetCryptoKeyByFeatureAndSequenceParams{Feature:key.Feature,Sequence:key.Sequence}
3758-
dbm.EXPECT().GetCryptoKeyByFeatureAndSequence(gomock.Any(),arg).Return(key,nil).AnyTimes()
3759-
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionRead).Returns(key)
3760-
}))
3761-
s.Run("GetLatestCryptoKeyByFeature",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3762-
feature:=database.CryptoKeyFeatureWorkspaceAppsAPIKey
3763-
dbm.EXPECT().GetLatestCryptoKeyByFeature(gomock.Any(),feature).Return(database.CryptoKey{},nil).AnyTimes()
3764-
check.Args(feature).Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3765-
}))
3766-
s.Run("UpdateCryptoKeyDeletesAt",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3767-
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3768-
arg:= database.UpdateCryptoKeyDeletesAtParams{Feature:key.Feature,Sequence:key.Sequence,DeletesAt: sql.NullTime{Time:time.Now(),Valid:true}}
3769-
dbm.EXPECT().UpdateCryptoKeyDeletesAt(gomock.Any(),arg).Return(key,nil).AnyTimes()
3770-
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionUpdate)
3771-
}))
3772-
s.Run("GetCryptoKeysByFeature",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3773-
feature:=database.CryptoKeyFeatureWorkspaceAppsAPIKey
3774-
dbm.EXPECT().GetCryptoKeysByFeature(gomock.Any(),feature).Return([]database.CryptoKey{},nil).AnyTimes()
3775-
check.Args(feature).
3776-
Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3777-
}))
3738+
s.Run("GetCryptoKeys",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3739+
dbm.EXPECT().GetCryptoKeys(gomock.Any()).Return([]database.CryptoKey{},nil).AnyTimes()
3740+
check.Args().
3741+
Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3742+
}))
3743+
s.Run("InsertCryptoKey",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3744+
arg:= database.InsertCryptoKeyParams{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey}
3745+
dbm.EXPECT().InsertCryptoKey(gomock.Any(),arg).Return(database.CryptoKey{},nil).AnyTimes()
3746+
check.Args(arg).
3747+
Asserts(rbac.ResourceCryptoKey,policy.ActionCreate)
3748+
}))
3749+
s.Run("DeleteCryptoKey",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3750+
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3751+
arg:= database.DeleteCryptoKeyParams{Feature:key.Feature,Sequence:key.Sequence}
3752+
dbm.EXPECT().DeleteCryptoKey(gomock.Any(),arg).Return(key,nil).AnyTimes()
3753+
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionDelete)
3754+
}))
3755+
s.Run("GetCryptoKeyByFeatureAndSequence",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3756+
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3757+
arg:= database.GetCryptoKeyByFeatureAndSequenceParams{Feature:key.Feature,Sequence:key.Sequence}
3758+
dbm.EXPECT().GetCryptoKeyByFeatureAndSequence(gomock.Any(),arg).Return(key,nil).AnyTimes()
3759+
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionRead).Returns(key)
3760+
}))
3761+
s.Run("GetLatestCryptoKeyByFeature",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3762+
feature:=database.CryptoKeyFeatureWorkspaceAppsAPIKey
3763+
dbm.EXPECT().GetLatestCryptoKeyByFeature(gomock.Any(),feature).Return(database.CryptoKey{},nil).AnyTimes()
3764+
check.Args(feature).Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3765+
}))
3766+
s.Run("UpdateCryptoKeyDeletesAt",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
3767+
key:=testutil.Fake(s.T(),faker, database.CryptoKey{Feature:database.CryptoKeyFeatureWorkspaceAppsAPIKey,Sequence:4})
3768+
arg:= database.UpdateCryptoKeyDeletesAtParams{Feature:key.Feature,Sequence:key.Sequence,DeletesAt: sql.NullTime{Time:time.Now(),Valid:true}}
3769+
dbm.EXPECT().UpdateCryptoKeyDeletesAt(gomock.Any(),arg).Return(key,nil).AnyTimes()
3770+
check.Args(arg).Asserts(rbac.ResourceCryptoKey,policy.ActionUpdate)
3771+
}))
3772+
s.Run("GetCryptoKeysByFeature",s.Mocked(func(dbm*dbmock.MockStore,_*gofakeit.Faker,check*expects) {
3773+
feature:=database.CryptoKeyFeatureWorkspaceAppsAPIKey
3774+
dbm.EXPECT().GetCryptoKeysByFeature(gomock.Any(),feature).Return([]database.CryptoKey{},nil).AnyTimes()
3775+
check.Args(feature).
3776+
Asserts(rbac.ResourceCryptoKey,policy.ActionRead)
3777+
}))
37783778
}
37793779

37803780
func (s*MethodTestSuite)TestSystemFunctions() {
@@ -5661,55 +5661,55 @@ func (s *MethodTestSuite) TestAuthorizePrebuiltWorkspace() {
56615661
}
56625662

56635663
func (s*MethodTestSuite)TestUserSecrets() {
5664-
s.Run("GetUserSecretByUserIDAndName",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5665-
user:=testutil.Fake(s.T(),faker, database.User{})
5666-
secret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5667-
arg:= database.GetUserSecretByUserIDAndNameParams{UserID:user.ID,Name:secret.Name}
5668-
dbm.EXPECT().GetUserSecretByUserIDAndName(gomock.Any(),arg).Return(secret,nil).AnyTimes()
5669-
check.Args(arg).
5670-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionRead).
5671-
Returns(secret)
5672-
}))
5673-
s.Run("GetUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5674-
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5675-
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5676-
check.Args(secret.ID).
5677-
Asserts(secret,policy.ActionRead).
5678-
Returns(secret)
5679-
}))
5680-
s.Run("ListUserSecrets",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5681-
user:=testutil.Fake(s.T(),faker, database.User{})
5682-
secret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5683-
dbm.EXPECT().ListUserSecrets(gomock.Any(),user.ID).Return([]database.UserSecret{secret},nil).AnyTimes()
5684-
check.Args(user.ID).
5685-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionRead).
5686-
Returns([]database.UserSecret{secret})
5687-
}))
5688-
s.Run("CreateUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5689-
user:=testutil.Fake(s.T(),faker, database.User{})
5690-
arg:= database.CreateUserSecretParams{UserID:user.ID}
5691-
ret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5692-
dbm.EXPECT().CreateUserSecret(gomock.Any(),arg).Return(ret,nil).AnyTimes()
5693-
check.Args(arg).
5694-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionCreate).
5695-
Returns(ret)
5696-
}))
5697-
s.Run("UpdateUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5698-
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5699-
updated:=testutil.Fake(s.T(),faker, database.UserSecret{ID:secret.ID})
5700-
arg:= database.UpdateUserSecretParams{ID:secret.ID}
5701-
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5702-
dbm.EXPECT().UpdateUserSecret(gomock.Any(),arg).Return(updated,nil).AnyTimes()
5703-
check.Args(arg).
5704-
Asserts(secret,policy.ActionUpdate).
5705-
Returns(updated)
5706-
}))
5707-
s.Run("DeleteUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5708-
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5709-
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5710-
dbm.EXPECT().DeleteUserSecret(gomock.Any(),secret.ID).Return(nil).AnyTimes()
5711-
check.Args(secret.ID).
5712-
Asserts(secret,policy.ActionRead,secret,policy.ActionDelete).
5713-
Returns()
5714-
}))
5664+
s.Run("GetUserSecretByUserIDAndName",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5665+
user:=testutil.Fake(s.T(),faker, database.User{})
5666+
secret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5667+
arg:= database.GetUserSecretByUserIDAndNameParams{UserID:user.ID,Name:secret.Name}
5668+
dbm.EXPECT().GetUserSecretByUserIDAndName(gomock.Any(),arg).Return(secret,nil).AnyTimes()
5669+
check.Args(arg).
5670+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionRead).
5671+
Returns(secret)
5672+
}))
5673+
s.Run("GetUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5674+
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5675+
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5676+
check.Args(secret.ID).
5677+
Asserts(secret,policy.ActionRead).
5678+
Returns(secret)
5679+
}))
5680+
s.Run("ListUserSecrets",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5681+
user:=testutil.Fake(s.T(),faker, database.User{})
5682+
secret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5683+
dbm.EXPECT().ListUserSecrets(gomock.Any(),user.ID).Return([]database.UserSecret{secret},nil).AnyTimes()
5684+
check.Args(user.ID).
5685+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionRead).
5686+
Returns([]database.UserSecret{secret})
5687+
}))
5688+
s.Run("CreateUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5689+
user:=testutil.Fake(s.T(),faker, database.User{})
5690+
arg:= database.CreateUserSecretParams{UserID:user.ID}
5691+
ret:=testutil.Fake(s.T(),faker, database.UserSecret{UserID:user.ID})
5692+
dbm.EXPECT().CreateUserSecret(gomock.Any(),arg).Return(ret,nil).AnyTimes()
5693+
check.Args(arg).
5694+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()),policy.ActionCreate).
5695+
Returns(ret)
5696+
}))
5697+
s.Run("UpdateUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5698+
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5699+
updated:=testutil.Fake(s.T(),faker, database.UserSecret{ID:secret.ID})
5700+
arg:= database.UpdateUserSecretParams{ID:secret.ID}
5701+
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5702+
dbm.EXPECT().UpdateUserSecret(gomock.Any(),arg).Return(updated,nil).AnyTimes()
5703+
check.Args(arg).
5704+
Asserts(secret,policy.ActionUpdate).
5705+
Returns(updated)
5706+
}))
5707+
s.Run("DeleteUserSecret",s.Mocked(func(dbm*dbmock.MockStore,faker*gofakeit.Faker,check*expects) {
5708+
secret:=testutil.Fake(s.T(),faker, database.UserSecret{})
5709+
dbm.EXPECT().GetUserSecret(gomock.Any(),secret.ID).Return(secret,nil).AnyTimes()
5710+
dbm.EXPECT().DeleteUserSecret(gomock.Any(),secret.ID).Return(nil).AnyTimes()
5711+
check.Args(secret.ID).
5712+
Asserts(secret,policy.ActionRead,secret,policy.ActionDelete).
5713+
Returns()
5714+
}))
57155715
}

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp