@@ -3783,67 +3783,67 @@ func (s *MethodTestSuite) TestTailnetFunctions() {
3783
3783
}
3784
3784
3785
3785
func (s * MethodTestSuite ) TestDBCrypt () {
3786
- s .Run ("GetDBCryptKeys" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3787
- dbm .EXPECT ().GetDBCryptKeys (gomock .Any ()).Return ([]database.DBCryptKey {}, nil ).AnyTimes ()
3788
- check .Args ().
3789
- Asserts (rbac .ResourceSystem , policy .ActionRead ).
3790
- Returns ([]database.DBCryptKey {})
3791
- }))
3792
- s .Run ("InsertDBCryptKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3793
- dbm .EXPECT ().InsertDBCryptKey (gomock .Any (), database.InsertDBCryptKeyParams {}).Return (nil ).AnyTimes ()
3794
- check .Args (database.InsertDBCryptKeyParams {}).
3795
- Asserts (rbac .ResourceSystem , policy .ActionCreate ).
3796
- Returns ()
3797
- }))
3798
- s .Run ("RevokeDBCryptKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3799
- dbm .EXPECT ().RevokeDBCryptKey (gomock .Any (), "revoke me" ).Return (nil ).AnyTimes ()
3800
- check .Args ("revoke me" ).
3801
- Asserts (rbac .ResourceSystem , policy .ActionUpdate ).
3802
- Returns ()
3803
- }))
3786
+ s .Run ("GetDBCryptKeys" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3787
+ dbm .EXPECT ().GetDBCryptKeys (gomock .Any ()).Return ([]database.DBCryptKey {}, nil ).AnyTimes ()
3788
+ check .Args ().
3789
+ Asserts (rbac .ResourceSystem , policy .ActionRead ).
3790
+ Returns ([]database.DBCryptKey {})
3791
+ }))
3792
+ s .Run ("InsertDBCryptKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3793
+ dbm .EXPECT ().InsertDBCryptKey (gomock .Any (), database.InsertDBCryptKeyParams {}).Return (nil ).AnyTimes ()
3794
+ check .Args (database.InsertDBCryptKeyParams {}).
3795
+ Asserts (rbac .ResourceSystem , policy .ActionCreate ).
3796
+ Returns ()
3797
+ }))
3798
+ s .Run ("RevokeDBCryptKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3799
+ dbm .EXPECT ().RevokeDBCryptKey (gomock .Any (), "revoke me" ).Return (nil ).AnyTimes ()
3800
+ check .Args ("revoke me" ).
3801
+ Asserts (rbac .ResourceSystem , policy .ActionUpdate ).
3802
+ Returns ()
3803
+ }))
3804
3804
}
3805
3805
3806
3806
func (s * MethodTestSuite ) TestCryptoKeys () {
3807
- s .Run ("GetCryptoKeys" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3808
- dbm .EXPECT ().GetCryptoKeys (gomock .Any ()).Return ([]database.CryptoKey {}, nil ).AnyTimes ()
3809
- check .Args ().
3810
- Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3811
- }))
3812
- s .Run ("InsertCryptoKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3813
- arg := database.InsertCryptoKeyParams {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey }
3814
- dbm .EXPECT ().InsertCryptoKey (gomock .Any (), arg ).Return (database.CryptoKey {}, nil ).AnyTimes ()
3815
- check .Args (arg ).
3816
- Asserts (rbac .ResourceCryptoKey , policy .ActionCreate )
3817
- }))
3818
- s .Run ("DeleteCryptoKey" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3819
- key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3820
- arg := database.DeleteCryptoKeyParams {Feature : key .Feature , Sequence : key .Sequence }
3821
- dbm .EXPECT ().DeleteCryptoKey (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3822
- check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionDelete )
3823
- }))
3824
- s .Run ("GetCryptoKeyByFeatureAndSequence" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3825
- key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3826
- arg := database.GetCryptoKeyByFeatureAndSequenceParams {Feature : key .Feature , Sequence : key .Sequence }
3827
- dbm .EXPECT ().GetCryptoKeyByFeatureAndSequence (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3828
- check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionRead ).Returns (key )
3829
- }))
3830
- s .Run ("GetLatestCryptoKeyByFeature" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3831
- feature := database .CryptoKeyFeatureWorkspaceAppsAPIKey
3832
- dbm .EXPECT ().GetLatestCryptoKeyByFeature (gomock .Any (), feature ).Return (database.CryptoKey {}, nil ).AnyTimes ()
3833
- check .Args (feature ).Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3834
- }))
3835
- s .Run ("UpdateCryptoKeyDeletesAt" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3836
- key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3837
- arg := database.UpdateCryptoKeyDeletesAtParams {Feature : key .Feature , Sequence : key .Sequence , DeletesAt : sql.NullTime {Time : time .Now (), Valid : true }}
3838
- dbm .EXPECT ().UpdateCryptoKeyDeletesAt (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3839
- check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionUpdate )
3840
- }))
3841
- s .Run ("GetCryptoKeysByFeature" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3842
- feature := database .CryptoKeyFeatureWorkspaceAppsAPIKey
3843
- dbm .EXPECT ().GetCryptoKeysByFeature (gomock .Any (), feature ).Return ([]database.CryptoKey {}, nil ).AnyTimes ()
3844
- check .Args (feature ).
3845
- Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3846
- }))
3807
+ s .Run ("GetCryptoKeys" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3808
+ dbm .EXPECT ().GetCryptoKeys (gomock .Any ()).Return ([]database.CryptoKey {}, nil ).AnyTimes ()
3809
+ check .Args ().
3810
+ Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3811
+ }))
3812
+ s .Run ("InsertCryptoKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3813
+ arg := database.InsertCryptoKeyParams {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey }
3814
+ dbm .EXPECT ().InsertCryptoKey (gomock .Any (), arg ).Return (database.CryptoKey {}, nil ).AnyTimes ()
3815
+ check .Args (arg ).
3816
+ Asserts (rbac .ResourceCryptoKey , policy .ActionCreate )
3817
+ }))
3818
+ s .Run ("DeleteCryptoKey" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3819
+ key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3820
+ arg := database.DeleteCryptoKeyParams {Feature : key .Feature , Sequence : key .Sequence }
3821
+ dbm .EXPECT ().DeleteCryptoKey (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3822
+ check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionDelete )
3823
+ }))
3824
+ s .Run ("GetCryptoKeyByFeatureAndSequence" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3825
+ key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3826
+ arg := database.GetCryptoKeyByFeatureAndSequenceParams {Feature : key .Feature , Sequence : key .Sequence }
3827
+ dbm .EXPECT ().GetCryptoKeyByFeatureAndSequence (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3828
+ check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionRead ).Returns (key )
3829
+ }))
3830
+ s .Run ("GetLatestCryptoKeyByFeature" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3831
+ feature := database .CryptoKeyFeatureWorkspaceAppsAPIKey
3832
+ dbm .EXPECT ().GetLatestCryptoKeyByFeature (gomock .Any (), feature ).Return (database.CryptoKey {}, nil ).AnyTimes ()
3833
+ check .Args (feature ).Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3834
+ }))
3835
+ s .Run ("UpdateCryptoKeyDeletesAt" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3836
+ key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3837
+ arg := database.UpdateCryptoKeyDeletesAtParams {Feature : key .Feature , Sequence : key .Sequence , DeletesAt : sql.NullTime {Time : time .Now (), Valid : true }}
3838
+ dbm .EXPECT ().UpdateCryptoKeyDeletesAt (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3839
+ check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionUpdate )
3840
+ }))
3841
+ s .Run ("GetCryptoKeysByFeature" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3842
+ feature := database .CryptoKeyFeatureWorkspaceAppsAPIKey
3843
+ dbm .EXPECT ().GetCryptoKeysByFeature (gomock .Any (), feature ).Return ([]database.CryptoKey {}, nil ).AnyTimes ()
3844
+ check .Args (feature ).
3845
+ Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3846
+ }))
3847
3847
}
3848
3848
3849
3849
func (s * MethodTestSuite ) TestSystemFunctions () {
@@ -5736,55 +5736,55 @@ func (s *MethodTestSuite) TestAuthorizePrebuiltWorkspace() {
5736
5736
}
5737
5737
5738
5738
func (s * MethodTestSuite ) TestUserSecrets () {
5739
- s .Run ("GetUserSecretByUserIDAndName" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5740
- user := testutil .Fake (s .T (), faker , database.User {})
5741
- secret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5742
- arg := database.GetUserSecretByUserIDAndNameParams {UserID : user .ID , Name : secret .Name }
5743
- dbm .EXPECT ().GetUserSecretByUserIDAndName (gomock .Any (), arg ).Return (secret , nil ).AnyTimes ()
5744
- check .Args (arg ).
5745
- Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionRead ).
5746
- Returns (secret )
5747
- }))
5748
- s .Run ("GetUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5749
- secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5750
- dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5751
- check .Args (secret .ID ).
5752
- Asserts (secret , policy .ActionRead ).
5753
- Returns (secret )
5754
- }))
5755
- s .Run ("ListUserSecrets" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5756
- user := testutil .Fake (s .T (), faker , database.User {})
5757
- secret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5758
- dbm .EXPECT ().ListUserSecrets (gomock .Any (), user .ID ).Return ([]database.UserSecret {secret }, nil ).AnyTimes ()
5759
- check .Args (user .ID ).
5760
- Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionRead ).
5761
- Returns ([]database.UserSecret {secret })
5762
- }))
5763
- s .Run ("CreateUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5764
- user := testutil .Fake (s .T (), faker , database.User {})
5765
- arg := database.CreateUserSecretParams {UserID : user .ID }
5766
- ret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5767
- dbm .EXPECT ().CreateUserSecret (gomock .Any (), arg ).Return (ret , nil ).AnyTimes ()
5768
- check .Args (arg ).
5769
- Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionCreate ).
5770
- Returns (ret )
5771
- }))
5772
- s .Run ("UpdateUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5773
- secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5774
- updated := testutil .Fake (s .T (), faker , database.UserSecret {ID : secret .ID })
5775
- arg := database.UpdateUserSecretParams {ID : secret .ID }
5776
- dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5777
- dbm .EXPECT ().UpdateUserSecret (gomock .Any (), arg ).Return (updated , nil ).AnyTimes ()
5778
- check .Args (arg ).
5779
- Asserts (secret , policy .ActionUpdate ).
5780
- Returns (updated )
5781
- }))
5782
- s .Run ("DeleteUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5783
- secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5784
- dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5785
- dbm .EXPECT ().DeleteUserSecret (gomock .Any (), secret .ID ).Return (nil ).AnyTimes ()
5786
- check .Args (secret .ID ).
5787
- Asserts (secret , policy .ActionRead , secret , policy .ActionDelete ).
5788
- Returns ()
5789
- }))
5739
+ s .Run ("GetUserSecretByUserIDAndName" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5740
+ user := testutil .Fake (s .T (), faker , database.User {})
5741
+ secret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5742
+ arg := database.GetUserSecretByUserIDAndNameParams {UserID : user .ID , Name : secret .Name }
5743
+ dbm .EXPECT ().GetUserSecretByUserIDAndName (gomock .Any (), arg ).Return (secret , nil ).AnyTimes ()
5744
+ check .Args (arg ).
5745
+ Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionRead ).
5746
+ Returns (secret )
5747
+ }))
5748
+ s .Run ("GetUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5749
+ secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5750
+ dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5751
+ check .Args (secret .ID ).
5752
+ Asserts (secret , policy .ActionRead ).
5753
+ Returns (secret )
5754
+ }))
5755
+ s .Run ("ListUserSecrets" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5756
+ user := testutil .Fake (s .T (), faker , database.User {})
5757
+ secret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5758
+ dbm .EXPECT ().ListUserSecrets (gomock .Any (), user .ID ).Return ([]database.UserSecret {secret }, nil ).AnyTimes ()
5759
+ check .Args (user .ID ).
5760
+ Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionRead ).
5761
+ Returns ([]database.UserSecret {secret })
5762
+ }))
5763
+ s .Run ("CreateUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5764
+ user := testutil .Fake (s .T (), faker , database.User {})
5765
+ arg := database.CreateUserSecretParams {UserID : user .ID }
5766
+ ret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5767
+ dbm .EXPECT ().CreateUserSecret (gomock .Any (), arg ).Return (ret , nil ).AnyTimes ()
5768
+ check .Args (arg ).
5769
+ Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionCreate ).
5770
+ Returns (ret )
5771
+ }))
5772
+ s .Run ("UpdateUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5773
+ secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5774
+ updated := testutil .Fake (s .T (), faker , database.UserSecret {ID : secret .ID })
5775
+ arg := database.UpdateUserSecretParams {ID : secret .ID }
5776
+ dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5777
+ dbm .EXPECT ().UpdateUserSecret (gomock .Any (), arg ).Return (updated , nil ).AnyTimes ()
5778
+ check .Args (arg ).
5779
+ Asserts (secret , policy .ActionUpdate ).
5780
+ Returns (updated )
5781
+ }))
5782
+ s .Run ("DeleteUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5783
+ secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5784
+ dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5785
+ dbm .EXPECT ().DeleteUserSecret (gomock .Any (), secret .ID ).Return (nil ).AnyTimes ()
5786
+ check .Args (secret .ID ).
5787
+ Asserts (secret , policy .ActionRead , secret , policy .ActionDelete ).
5788
+ Returns ()
5789
+ }))
5790
5790
}
0 commit comments