Skip to content

Commit d5f03c2

Browse files
committed
chore: format
1 parent a49b396 commit d5f03c2

File tree

1 file changed

+109
-109
lines changed

1 file changed

+109
-109
lines changed

coderd/database/dbauthz/dbauthz_test.go

Lines changed: 109 additions & 109 deletions
Original file line numberDiff line numberDiff line change
@@ -3714,67 +3714,67 @@ func (s *MethodTestSuite) TestTailnetFunctions() {
37143714
}
37153715

37163716
func (s *MethodTestSuite) TestDBCrypt() {
3717-
s.Run("GetDBCryptKeys", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3718-
dbm.EXPECT().GetDBCryptKeys(gomock.Any()).Return([]database.DBCryptKey{}, nil).AnyTimes()
3719-
check.Args().
3720-
Asserts(rbac.ResourceSystem, policy.ActionRead).
3721-
Returns([]database.DBCryptKey{})
3722-
}))
3723-
s.Run("InsertDBCryptKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3724-
dbm.EXPECT().InsertDBCryptKey(gomock.Any(), database.InsertDBCryptKeyParams{}).Return(nil).AnyTimes()
3725-
check.Args(database.InsertDBCryptKeyParams{}).
3726-
Asserts(rbac.ResourceSystem, policy.ActionCreate).
3727-
Returns()
3728-
}))
3729-
s.Run("RevokeDBCryptKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3730-
dbm.EXPECT().RevokeDBCryptKey(gomock.Any(), "revoke me").Return(nil).AnyTimes()
3731-
check.Args("revoke me").
3732-
Asserts(rbac.ResourceSystem, policy.ActionUpdate).
3733-
Returns()
3734-
}))
3717+
s.Run("GetDBCryptKeys", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3718+
dbm.EXPECT().GetDBCryptKeys(gomock.Any()).Return([]database.DBCryptKey{}, nil).AnyTimes()
3719+
check.Args().
3720+
Asserts(rbac.ResourceSystem, policy.ActionRead).
3721+
Returns([]database.DBCryptKey{})
3722+
}))
3723+
s.Run("InsertDBCryptKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3724+
dbm.EXPECT().InsertDBCryptKey(gomock.Any(), database.InsertDBCryptKeyParams{}).Return(nil).AnyTimes()
3725+
check.Args(database.InsertDBCryptKeyParams{}).
3726+
Asserts(rbac.ResourceSystem, policy.ActionCreate).
3727+
Returns()
3728+
}))
3729+
s.Run("RevokeDBCryptKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3730+
dbm.EXPECT().RevokeDBCryptKey(gomock.Any(), "revoke me").Return(nil).AnyTimes()
3731+
check.Args("revoke me").
3732+
Asserts(rbac.ResourceSystem, policy.ActionUpdate).
3733+
Returns()
3734+
}))
37353735
}
37363736

37373737
func (s *MethodTestSuite) TestCryptoKeys() {
3738-
s.Run("GetCryptoKeys", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3739-
dbm.EXPECT().GetCryptoKeys(gomock.Any()).Return([]database.CryptoKey{}, nil).AnyTimes()
3740-
check.Args().
3741-
Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3742-
}))
3743-
s.Run("InsertCryptoKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3744-
arg := database.InsertCryptoKeyParams{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey}
3745-
dbm.EXPECT().InsertCryptoKey(gomock.Any(), arg).Return(database.CryptoKey{}, nil).AnyTimes()
3746-
check.Args(arg).
3747-
Asserts(rbac.ResourceCryptoKey, policy.ActionCreate)
3748-
}))
3749-
s.Run("DeleteCryptoKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3750-
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3751-
arg := database.DeleteCryptoKeyParams{Feature: key.Feature, Sequence: key.Sequence}
3752-
dbm.EXPECT().DeleteCryptoKey(gomock.Any(), arg).Return(key, nil).AnyTimes()
3753-
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionDelete)
3754-
}))
3755-
s.Run("GetCryptoKeyByFeatureAndSequence", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3756-
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3757-
arg := database.GetCryptoKeyByFeatureAndSequenceParams{Feature: key.Feature, Sequence: key.Sequence}
3758-
dbm.EXPECT().GetCryptoKeyByFeatureAndSequence(gomock.Any(), arg).Return(key, nil).AnyTimes()
3759-
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionRead).Returns(key)
3760-
}))
3761-
s.Run("GetLatestCryptoKeyByFeature", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3762-
feature := database.CryptoKeyFeatureWorkspaceAppsAPIKey
3763-
dbm.EXPECT().GetLatestCryptoKeyByFeature(gomock.Any(), feature).Return(database.CryptoKey{}, nil).AnyTimes()
3764-
check.Args(feature).Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3765-
}))
3766-
s.Run("UpdateCryptoKeyDeletesAt", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3767-
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3768-
arg := database.UpdateCryptoKeyDeletesAtParams{Feature: key.Feature, Sequence: key.Sequence, DeletesAt: sql.NullTime{Time: time.Now(), Valid: true}}
3769-
dbm.EXPECT().UpdateCryptoKeyDeletesAt(gomock.Any(), arg).Return(key, nil).AnyTimes()
3770-
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionUpdate)
3771-
}))
3772-
s.Run("GetCryptoKeysByFeature", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3773-
feature := database.CryptoKeyFeatureWorkspaceAppsAPIKey
3774-
dbm.EXPECT().GetCryptoKeysByFeature(gomock.Any(), feature).Return([]database.CryptoKey{}, nil).AnyTimes()
3775-
check.Args(feature).
3776-
Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3777-
}))
3738+
s.Run("GetCryptoKeys", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3739+
dbm.EXPECT().GetCryptoKeys(gomock.Any()).Return([]database.CryptoKey{}, nil).AnyTimes()
3740+
check.Args().
3741+
Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3742+
}))
3743+
s.Run("InsertCryptoKey", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3744+
arg := database.InsertCryptoKeyParams{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey}
3745+
dbm.EXPECT().InsertCryptoKey(gomock.Any(), arg).Return(database.CryptoKey{}, nil).AnyTimes()
3746+
check.Args(arg).
3747+
Asserts(rbac.ResourceCryptoKey, policy.ActionCreate)
3748+
}))
3749+
s.Run("DeleteCryptoKey", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3750+
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3751+
arg := database.DeleteCryptoKeyParams{Feature: key.Feature, Sequence: key.Sequence}
3752+
dbm.EXPECT().DeleteCryptoKey(gomock.Any(), arg).Return(key, nil).AnyTimes()
3753+
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionDelete)
3754+
}))
3755+
s.Run("GetCryptoKeyByFeatureAndSequence", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3756+
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3757+
arg := database.GetCryptoKeyByFeatureAndSequenceParams{Feature: key.Feature, Sequence: key.Sequence}
3758+
dbm.EXPECT().GetCryptoKeyByFeatureAndSequence(gomock.Any(), arg).Return(key, nil).AnyTimes()
3759+
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionRead).Returns(key)
3760+
}))
3761+
s.Run("GetLatestCryptoKeyByFeature", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3762+
feature := database.CryptoKeyFeatureWorkspaceAppsAPIKey
3763+
dbm.EXPECT().GetLatestCryptoKeyByFeature(gomock.Any(), feature).Return(database.CryptoKey{}, nil).AnyTimes()
3764+
check.Args(feature).Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3765+
}))
3766+
s.Run("UpdateCryptoKeyDeletesAt", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
3767+
key := testutil.Fake(s.T(), faker, database.CryptoKey{Feature: database.CryptoKeyFeatureWorkspaceAppsAPIKey, Sequence: 4})
3768+
arg := database.UpdateCryptoKeyDeletesAtParams{Feature: key.Feature, Sequence: key.Sequence, DeletesAt: sql.NullTime{Time: time.Now(), Valid: true}}
3769+
dbm.EXPECT().UpdateCryptoKeyDeletesAt(gomock.Any(), arg).Return(key, nil).AnyTimes()
3770+
check.Args(arg).Asserts(rbac.ResourceCryptoKey, policy.ActionUpdate)
3771+
}))
3772+
s.Run("GetCryptoKeysByFeature", s.Mocked(func(dbm *dbmock.MockStore, _ *gofakeit.Faker, check *expects) {
3773+
feature := database.CryptoKeyFeatureWorkspaceAppsAPIKey
3774+
dbm.EXPECT().GetCryptoKeysByFeature(gomock.Any(), feature).Return([]database.CryptoKey{}, nil).AnyTimes()
3775+
check.Args(feature).
3776+
Asserts(rbac.ResourceCryptoKey, policy.ActionRead)
3777+
}))
37783778
}
37793779

37803780
func (s *MethodTestSuite) TestSystemFunctions() {
@@ -5661,55 +5661,55 @@ func (s *MethodTestSuite) TestAuthorizePrebuiltWorkspace() {
56615661
}
56625662

56635663
func (s *MethodTestSuite) TestUserSecrets() {
5664-
s.Run("GetUserSecretByUserIDAndName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5665-
user := testutil.Fake(s.T(), faker, database.User{})
5666-
secret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5667-
arg := database.GetUserSecretByUserIDAndNameParams{UserID: user.ID, Name: secret.Name}
5668-
dbm.EXPECT().GetUserSecretByUserIDAndName(gomock.Any(), arg).Return(secret, nil).AnyTimes()
5669-
check.Args(arg).
5670-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionRead).
5671-
Returns(secret)
5672-
}))
5673-
s.Run("GetUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5674-
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5675-
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5676-
check.Args(secret.ID).
5677-
Asserts(secret, policy.ActionRead).
5678-
Returns(secret)
5679-
}))
5680-
s.Run("ListUserSecrets", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5681-
user := testutil.Fake(s.T(), faker, database.User{})
5682-
secret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5683-
dbm.EXPECT().ListUserSecrets(gomock.Any(), user.ID).Return([]database.UserSecret{secret}, nil).AnyTimes()
5684-
check.Args(user.ID).
5685-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionRead).
5686-
Returns([]database.UserSecret{secret})
5687-
}))
5688-
s.Run("CreateUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5689-
user := testutil.Fake(s.T(), faker, database.User{})
5690-
arg := database.CreateUserSecretParams{UserID: user.ID}
5691-
ret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5692-
dbm.EXPECT().CreateUserSecret(gomock.Any(), arg).Return(ret, nil).AnyTimes()
5693-
check.Args(arg).
5694-
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionCreate).
5695-
Returns(ret)
5696-
}))
5697-
s.Run("UpdateUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5698-
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5699-
updated := testutil.Fake(s.T(), faker, database.UserSecret{ID: secret.ID})
5700-
arg := database.UpdateUserSecretParams{ID: secret.ID}
5701-
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5702-
dbm.EXPECT().UpdateUserSecret(gomock.Any(), arg).Return(updated, nil).AnyTimes()
5703-
check.Args(arg).
5704-
Asserts(secret, policy.ActionUpdate).
5705-
Returns(updated)
5706-
}))
5707-
s.Run("DeleteUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5708-
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5709-
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5710-
dbm.EXPECT().DeleteUserSecret(gomock.Any(), secret.ID).Return(nil).AnyTimes()
5711-
check.Args(secret.ID).
5712-
Asserts(secret, policy.ActionRead, secret, policy.ActionDelete).
5713-
Returns()
5714-
}))
5664+
s.Run("GetUserSecretByUserIDAndName", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5665+
user := testutil.Fake(s.T(), faker, database.User{})
5666+
secret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5667+
arg := database.GetUserSecretByUserIDAndNameParams{UserID: user.ID, Name: secret.Name}
5668+
dbm.EXPECT().GetUserSecretByUserIDAndName(gomock.Any(), arg).Return(secret, nil).AnyTimes()
5669+
check.Args(arg).
5670+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionRead).
5671+
Returns(secret)
5672+
}))
5673+
s.Run("GetUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5674+
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5675+
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5676+
check.Args(secret.ID).
5677+
Asserts(secret, policy.ActionRead).
5678+
Returns(secret)
5679+
}))
5680+
s.Run("ListUserSecrets", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5681+
user := testutil.Fake(s.T(), faker, database.User{})
5682+
secret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5683+
dbm.EXPECT().ListUserSecrets(gomock.Any(), user.ID).Return([]database.UserSecret{secret}, nil).AnyTimes()
5684+
check.Args(user.ID).
5685+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionRead).
5686+
Returns([]database.UserSecret{secret})
5687+
}))
5688+
s.Run("CreateUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5689+
user := testutil.Fake(s.T(), faker, database.User{})
5690+
arg := database.CreateUserSecretParams{UserID: user.ID}
5691+
ret := testutil.Fake(s.T(), faker, database.UserSecret{UserID: user.ID})
5692+
dbm.EXPECT().CreateUserSecret(gomock.Any(), arg).Return(ret, nil).AnyTimes()
5693+
check.Args(arg).
5694+
Asserts(rbac.ResourceUserSecret.WithOwner(user.ID.String()), policy.ActionCreate).
5695+
Returns(ret)
5696+
}))
5697+
s.Run("UpdateUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5698+
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5699+
updated := testutil.Fake(s.T(), faker, database.UserSecret{ID: secret.ID})
5700+
arg := database.UpdateUserSecretParams{ID: secret.ID}
5701+
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5702+
dbm.EXPECT().UpdateUserSecret(gomock.Any(), arg).Return(updated, nil).AnyTimes()
5703+
check.Args(arg).
5704+
Asserts(secret, policy.ActionUpdate).
5705+
Returns(updated)
5706+
}))
5707+
s.Run("DeleteUserSecret", s.Mocked(func(dbm *dbmock.MockStore, faker *gofakeit.Faker, check *expects) {
5708+
secret := testutil.Fake(s.T(), faker, database.UserSecret{})
5709+
dbm.EXPECT().GetUserSecret(gomock.Any(), secret.ID).Return(secret, nil).AnyTimes()
5710+
dbm.EXPECT().DeleteUserSecret(gomock.Any(), secret.ID).Return(nil).AnyTimes()
5711+
check.Args(secret.ID).
5712+
Asserts(secret, policy.ActionRead, secret, policy.ActionDelete).
5713+
Returns()
5714+
}))
57155715
}

0 commit comments

Comments
 (0)