Skip to content

Commit b615cb1

Browse files
committed
chore: format
1 parent 52c9044 commit b615cb1

File tree

1 file changed

+109
-109
lines changed

1 file changed

+109
-109
lines changed

coderd/database/dbauthz/dbauthz_test.go

Lines changed: 109 additions & 109 deletions
Original file line numberDiff line numberDiff line change
@@ -3783,67 +3783,67 @@ func (s *MethodTestSuite) TestTailnetFunctions() {
37833783
}
37843784

37853785
func (s *MethodTestSuite) TestDBCrypt() {
3786-
s.Run("GetDBCryptKeys", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3787-
dbm.EXPECT().GetDBCryptKeys(gomock.Any()).Return([]database.DBCryptKey{}, nil).AnyTimes()
3788-
check.Args().
3789-
Asserts(rbac.ResourceSystem, policy.ActionRead).
3790-
Returns([]database.DBCryptKey{})
3791-
}))
3792-
s.Run("InsertDBCryptKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3793-
dbm.EXPECT().InsertDBCryptKey(gomock.Any(), database.InsertDBCryptKeyParams{}).Return(nil).AnyTimes()
3794-
check.Args(database.InsertDBCryptKeyParams{}).
3795-
Asserts(rbac.ResourceSystem, policy.ActionCreate).
3796-
Returns()
3797-
}))
3798-
s.Run("RevokeDBCryptKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3799-
dbm.EXPECT().RevokeDBCryptKey(gomock.Any(), "revoke me").Return(nil).AnyTimes()
3800-
check.Args("revoke me").
3801-
Asserts(rbac.ResourceSystem, policy.ActionUpdate).
3802-
Returns()
3803-
}))
3786+
s.Run("GetDBCryptKeys", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3787+
dbm.EXPECT().GetDBCryptKeys(gomock.Any()).Return([]database.DBCryptKey{}, nil).AnyTimes()
3788+
check.Args().
3789+
Asserts(rbac.ResourceSystem, policy.ActionRead).
3790+
Returns([]database.DBCryptKey{})
3791+
}))
3792+
s.Run("InsertDBCryptKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3793+
dbm.EXPECT().InsertDBCryptKey(gomock.Any(), database.InsertDBCryptKeyParams{}).Return(nil).AnyTimes()
3794+
check.Args(database.InsertDBCryptKeyParams{}).
3795+
Asserts(rbac.ResourceSystem, policy.ActionCreate).
3796+
Returns()
3797+
}))
3798+
s.Run("RevokeDBCryptKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3799+
dbm.EXPECT().RevokeDBCryptKey(gomock.Any(), "revoke me").Return(nil).AnyTimes()
3800+
check.Args("revoke me").
3801+
Asserts(rbac.ResourceSystem, policy.ActionUpdate).
3802+
Returns()
3803+
}))
38043804
}
38053805

38063806
func (s *MethodTestSuite) TestCryptoKeys() {
3807-
s.Run("GetCryptoKeys", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3808-
dbm.EXPECT().GetCryptoKeys(gomock.Any()).Return([]database.CryptoKey{}, nil).AnyTimes()
3809-
check.Args().
3810-
Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3811-
}))
3812-
s.Run("InsertCryptoKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3813-
arg := database.InsertCryptoKeyParams{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey}
3814-
dbm.EXPECT().InsertCryptoKey(gomock.Any(), arg).Return(database.CryptoKey{}, nil).AnyTimes()
3815-
check.Args(arg).
3816-
Asserts(rbac.ResourceCryptoKey, policy.ActionCreate)
3817-
}))
3818-
s.Run("DeleteCryptoKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3819-
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3820-
arg := database.DeleteCryptoKeyParams{Feature: key.Feature, Sequence: key.Sequence}
3821-
dbm.EXPECT().DeleteCryptoKey(gomock.Any(), arg).Return(key, nil).AnyTimes()
3822-
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionDelete)
3823-
}))
3824-
s.Run("GetCryptoKeyByFeatureAndSequence", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3825-
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3826-
arg := database.GetCryptoKeyByFeatureAndSequenceParams{Feature: key.Feature, Sequence: key.Sequence}
3827-
dbm.EXPECT().GetCryptoKeyByFeatureAndSequence(gomock.Any(), arg).Return(key, nil).AnyTimes()
3828-
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionRead).Returns(key)
3829-
}))
3830-
s.Run("GetLatestCryptoKeyByFeature", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3831-
feature := database.CryptoKeyFeatureWorkspaceAppsAPIKey
3832-
dbm.EXPECT().GetLatestCryptoKeyByFeature(gomock.Any(), feature).Return(database.CryptoKey{}, nil).AnyTimes()
3833-
check.Args(feature).Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3834-
}))
3835-
s.Run("UpdateCryptoKeyDeletesAt", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3836-
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3837-
arg := database.UpdateCryptoKeyDeletesAtParams{Feature: key.Feature, Sequence: key.Sequence, DeletesAt: sql.NullTime{Time: time.Now(), Valid: true}}
3838-
dbm.EXPECT().UpdateCryptoKeyDeletesAt(gomock.Any(), arg).Return(key, nil).AnyTimes()
3839-
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionUpdate)
3840-
}))
3841-
s.Run("GetCryptoKeysByFeature", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3842-
feature := database.CryptoKeyFeatureWorkspaceAppsAPIKey
3843-
dbm.EXPECT().GetCryptoKeysByFeature(gomock.Any(), feature).Return([]database.CryptoKey{}, nil).AnyTimes()
3844-
check.Args(feature).
3845-
Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3846-
}))
3807+
s.Run("GetCryptoKeys", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3808+
dbm.EXPECT().GetCryptoKeys(gomock.Any()).Return([]database.CryptoKey{}, nil).AnyTimes()
3809+
check.Args().
3810+
Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3811+
}))
3812+
s.Run("InsertCryptoKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3813+
arg := database.InsertCryptoKeyParams{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey}
3814+
dbm.EXPECT().InsertCryptoKey(gomock.Any(), arg).Return(database.CryptoKey{}, nil).AnyTimes()
3815+
check.Args(arg).
3816+
Asserts(rbac.ResourceCryptoKey, policy.ActionCreate)
3817+
}))
3818+
s.Run("DeleteCryptoKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3819+
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3820+
arg := database.DeleteCryptoKeyParams{Feature: key.Feature, Sequence: key.Sequence}
3821+
dbm.EXPECT().DeleteCryptoKey(gomock.Any(), arg).Return(key, nil).AnyTimes()
3822+
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionDelete)
3823+
}))
3824+
s.Run("GetCryptoKeyByFeatureAndSequence", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3825+
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3826+
arg := database.GetCryptoKeyByFeatureAndSequenceParams{Feature: key.Feature, Sequence: key.Sequence}
3827+
dbm.EXPECT().GetCryptoKeyByFeatureAndSequence(gomock.Any(), arg).Return(key, nil).AnyTimes()
3828+
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionRead).Returns(key)
3829+
}))
3830+
s.Run("GetLatestCryptoKeyByFeature", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3831+
feature := database.CryptoKeyFeatureWorkspaceAppsAPIKey
3832+
dbm.EXPECT().GetLatestCryptoKeyByFeature(gomock.Any(), feature).Return(database.CryptoKey{}, nil).AnyTimes()
3833+
check.Args(feature).Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3834+
}))
3835+
s.Run("UpdateCryptoKeyDeletesAt", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3836+
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3837+
arg := database.UpdateCryptoKeyDeletesAtParams{Feature: key.Feature, Sequence: key.Sequence, DeletesAt: sql.NullTime{Time: time.Now(), Valid: true}}
3838+
dbm.EXPECT().UpdateCryptoKeyDeletesAt(gomock.Any(), arg).Return(key, nil).AnyTimes()
3839+
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionUpdate)
3840+
}))
3841+
s.Run("GetCryptoKeysByFeature", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3842+
feature := database.CryptoKeyFeatureWorkspaceAppsAPIKey
3843+
dbm.EXPECT().GetCryptoKeysByFeature(gomock.Any(), feature).Return([]database.CryptoKey{}, nil).AnyTimes()
3844+
check.Args(feature).
3845+
Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3846+
}))
38473847
}
38483848

38493849
func (s *MethodTestSuite) TestSystemFunctions() {
@@ -5736,55 +5736,55 @@ func (s *MethodTestSuite) TestAuthorizePrebuiltWorkspace() {
57365736
}
57375737

57385738
func (s *MethodTestSuite) TestUserSecrets() {
5739-
s.Run("GetUserSecretByUserIDAndName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5740-
user := testutil.Fake(s.T(), faker, database.User{})
5741-
secret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5742-
arg := database.GetUserSecretByUserIDAndNameParams{UserID: user.ID, Name: secret.Name}
5743-
dbm.EXPECT().GetUserSecretByUserIDAndName(gomock.Any(), arg).Return(secret, nil).AnyTimes()
5744-
check.Args(arg).
5745-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionRead).
5746-
Returns(secret)
5747-
}))
5748-
s.Run("GetUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5749-
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5750-
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5751-
check.Args(secret.ID).
5752-
Asserts(secret, policy.ActionRead).
5753-
Returns(secret)
5754-
}))
5755-
s.Run("ListUserSecrets", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5756-
user := testutil.Fake(s.T(), faker, database.User{})
5757-
secret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5758-
dbm.EXPECT().ListUserSecrets(gomock.Any(), user.ID).Return([]database.UserSecret{secret}, nil).AnyTimes()
5759-
check.Args(user.ID).
5760-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionRead).
5761-
Returns([]database.UserSecret{secret})
5762-
}))
5763-
s.Run("CreateUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5764-
user := testutil.Fake(s.T(), faker, database.User{})
5765-
arg := database.CreateUserSecretParams{UserID: user.ID}
5766-
ret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5767-
dbm.EXPECT().CreateUserSecret(gomock.Any(), arg).Return(ret, nil).AnyTimes()
5768-
check.Args(arg).
5769-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionCreate).
5770-
Returns(ret)
5771-
}))
5772-
s.Run("UpdateUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5773-
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5774-
updated := testutil.Fake(s.T(), faker, database.UserSecret{ID: secret.ID})
5775-
arg := database.UpdateUserSecretParams{ID: secret.ID}
5776-
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5777-
dbm.EXPECT().UpdateUserSecret(gomock.Any(), arg).Return(updated, nil).AnyTimes()
5778-
check.Args(arg).
5779-
Asserts(secret, policy.ActionUpdate).
5780-
Returns(updated)
5781-
}))
5782-
s.Run("DeleteUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5783-
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5784-
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5785-
dbm.EXPECT().DeleteUserSecret(gomock.Any(), secret.ID).Return(nil).AnyTimes()
5786-
check.Args(secret.ID).
5787-
Asserts(secret, policy.ActionRead, secret, policy.ActionDelete).
5788-
Returns()
5789-
}))
5739+
s.Run("GetUserSecretByUserIDAndName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5740+
user := testutil.Fake(s.T(), faker, database.User{})
5741+
secret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5742+
arg := database.GetUserSecretByUserIDAndNameParams{UserID: user.ID, Name: secret.Name}
5743+
dbm.EXPECT().GetUserSecretByUserIDAndName(gomock.Any(), arg).Return(secret, nil).AnyTimes()
5744+
check.Args(arg).
5745+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionRead).
5746+
Returns(secret)
5747+
}))
5748+
s.Run("GetUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5749+
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5750+
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5751+
check.Args(secret.ID).
5752+
Asserts(secret, policy.ActionRead).
5753+
Returns(secret)
5754+
}))
5755+
s.Run("ListUserSecrets", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5756+
user := testutil.Fake(s.T(), faker, database.User{})
5757+
secret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5758+
dbm.EXPECT().ListUserSecrets(gomock.Any(), user.ID).Return([]database.UserSecret{secret}, nil).AnyTimes()
5759+
check.Args(user.ID).
5760+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionRead).
5761+
Returns([]database.UserSecret{secret})
5762+
}))
5763+
s.Run("CreateUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5764+
user := testutil.Fake(s.T(), faker, database.User{})
5765+
arg := database.CreateUserSecretParams{UserID: user.ID}
5766+
ret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5767+
dbm.EXPECT().CreateUserSecret(gomock.Any(), arg).Return(ret, nil).AnyTimes()
5768+
check.Args(arg).
5769+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionCreate).
5770+
Returns(ret)
5771+
}))
5772+
s.Run("UpdateUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5773+
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5774+
updated := testutil.Fake(s.T(), faker, database.UserSecret{ID: secret.ID})
5775+
arg := database.UpdateUserSecretParams{ID: secret.ID}
5776+
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5777+
dbm.EXPECT().UpdateUserSecret(gomock.Any(), arg).Return(updated, nil).AnyTimes()
5778+
check.Args(arg).
5779+
Asserts(secret, policy.ActionUpdate).
5780+
Returns(updated)
5781+
}))
5782+
s.Run("DeleteUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5783+
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5784+
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5785+
dbm.EXPECT().DeleteUserSecret(gomock.Any(), secret.ID).Return(nil).AnyTimes()
5786+
check.Args(secret.ID).
5787+
Asserts(secret, policy.ActionRead, secret, policy.ActionDelete).
5788+
Returns()
5789+
}))
57905790
}

0 commit comments

Comments
 (0)