@@ -3714,67 +3714,67 @@ func (s *MethodTestSuite) TestTailnetFunctions() {
3714
3714
}
3715
3715
3716
3716
func (s * MethodTestSuite ) TestDBCrypt () {
3717
- s .Run ("GetDBCryptKeys" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3718
- dbm .EXPECT ().GetDBCryptKeys (gomock .Any ()).Return ([]database.DBCryptKey {}, nil ).AnyTimes ()
3719
- check .Args ().
3720
- Asserts (rbac .ResourceSystem , policy .ActionRead ).
3721
- Returns ([]database.DBCryptKey {})
3722
- }))
3723
- s .Run ("InsertDBCryptKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3724
- dbm .EXPECT ().InsertDBCryptKey (gomock .Any (), database.InsertDBCryptKeyParams {}).Return (nil ).AnyTimes ()
3725
- check .Args (database.InsertDBCryptKeyParams {}).
3726
- Asserts (rbac .ResourceSystem , policy .ActionCreate ).
3727
- Returns ()
3728
- }))
3729
- s .Run ("RevokeDBCryptKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3730
- dbm .EXPECT ().RevokeDBCryptKey (gomock .Any (), "revoke me" ).Return (nil ).AnyTimes ()
3731
- check .Args ("revoke me" ).
3732
- Asserts (rbac .ResourceSystem , policy .ActionUpdate ).
3733
- Returns ()
3734
- }))
3717
+ s .Run ("GetDBCryptKeys" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3718
+ dbm .EXPECT ().GetDBCryptKeys (gomock .Any ()).Return ([]database.DBCryptKey {}, nil ).AnyTimes ()
3719
+ check .Args ().
3720
+ Asserts (rbac .ResourceSystem , policy .ActionRead ).
3721
+ Returns ([]database.DBCryptKey {})
3722
+ }))
3723
+ s .Run ("InsertDBCryptKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3724
+ dbm .EXPECT ().InsertDBCryptKey (gomock .Any (), database.InsertDBCryptKeyParams {}).Return (nil ).AnyTimes ()
3725
+ check .Args (database.InsertDBCryptKeyParams {}).
3726
+ Asserts (rbac .ResourceSystem , policy .ActionCreate ).
3727
+ Returns ()
3728
+ }))
3729
+ s .Run ("RevokeDBCryptKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3730
+ dbm .EXPECT ().RevokeDBCryptKey (gomock .Any (), "revoke me" ).Return (nil ).AnyTimes ()
3731
+ check .Args ("revoke me" ).
3732
+ Asserts (rbac .ResourceSystem , policy .ActionUpdate ).
3733
+ Returns ()
3734
+ }))
3735
3735
}
3736
3736
3737
3737
func (s * MethodTestSuite ) TestCryptoKeys () {
3738
- s .Run ("GetCryptoKeys" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3739
- dbm .EXPECT ().GetCryptoKeys (gomock .Any ()).Return ([]database.CryptoKey {}, nil ).AnyTimes ()
3740
- check .Args ().
3741
- Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3742
- }))
3743
- s .Run ("InsertCryptoKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3744
- arg := database.InsertCryptoKeyParams {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey }
3745
- dbm .EXPECT ().InsertCryptoKey (gomock .Any (), arg ).Return (database.CryptoKey {}, nil ).AnyTimes ()
3746
- check .Args (arg ).
3747
- Asserts (rbac .ResourceCryptoKey , policy .ActionCreate )
3748
- }))
3749
- s .Run ("DeleteCryptoKey" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3750
- key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3751
- arg := database.DeleteCryptoKeyParams {Feature : key .Feature , Sequence : key .Sequence }
3752
- dbm .EXPECT ().DeleteCryptoKey (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3753
- check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionDelete )
3754
- }))
3755
- s .Run ("GetCryptoKeyByFeatureAndSequence" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3756
- key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3757
- arg := database.GetCryptoKeyByFeatureAndSequenceParams {Feature : key .Feature , Sequence : key .Sequence }
3758
- dbm .EXPECT ().GetCryptoKeyByFeatureAndSequence (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3759
- check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionRead ).Returns (key )
3760
- }))
3761
- s .Run ("GetLatestCryptoKeyByFeature" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3762
- feature := database .CryptoKeyFeatureWorkspaceAppsAPIKey
3763
- dbm .EXPECT ().GetLatestCryptoKeyByFeature (gomock .Any (), feature ).Return (database.CryptoKey {}, nil ).AnyTimes ()
3764
- check .Args (feature ).Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3765
- }))
3766
- s .Run ("UpdateCryptoKeyDeletesAt" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3767
- key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3768
- arg := database.UpdateCryptoKeyDeletesAtParams {Feature : key .Feature , Sequence : key .Sequence , DeletesAt : sql.NullTime {Time : time .Now (), Valid : true }}
3769
- dbm .EXPECT ().UpdateCryptoKeyDeletesAt (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3770
- check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionUpdate )
3771
- }))
3772
- s .Run ("GetCryptoKeysByFeature" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3773
- feature := database .CryptoKeyFeatureWorkspaceAppsAPIKey
3774
- dbm .EXPECT ().GetCryptoKeysByFeature (gomock .Any (), feature ).Return ([]database.CryptoKey {}, nil ).AnyTimes ()
3775
- check .Args (feature ).
3776
- Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3777
- }))
3738
+ s .Run ("GetCryptoKeys" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3739
+ dbm .EXPECT ().GetCryptoKeys (gomock .Any ()).Return ([]database.CryptoKey {}, nil ).AnyTimes ()
3740
+ check .Args ().
3741
+ Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3742
+ }))
3743
+ s .Run ("InsertCryptoKey" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3744
+ arg := database.InsertCryptoKeyParams {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey }
3745
+ dbm .EXPECT ().InsertCryptoKey (gomock .Any (), arg ).Return (database.CryptoKey {}, nil ).AnyTimes ()
3746
+ check .Args (arg ).
3747
+ Asserts (rbac .ResourceCryptoKey , policy .ActionCreate )
3748
+ }))
3749
+ s .Run ("DeleteCryptoKey" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3750
+ key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3751
+ arg := database.DeleteCryptoKeyParams {Feature : key .Feature , Sequence : key .Sequence }
3752
+ dbm .EXPECT ().DeleteCryptoKey (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3753
+ check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionDelete )
3754
+ }))
3755
+ s .Run ("GetCryptoKeyByFeatureAndSequence" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3756
+ key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3757
+ arg := database.GetCryptoKeyByFeatureAndSequenceParams {Feature : key .Feature , Sequence : key .Sequence }
3758
+ dbm .EXPECT ().GetCryptoKeyByFeatureAndSequence (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3759
+ check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionRead ).Returns (key )
3760
+ }))
3761
+ s .Run ("GetLatestCryptoKeyByFeature" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3762
+ feature := database .CryptoKeyFeatureWorkspaceAppsAPIKey
3763
+ dbm .EXPECT ().GetLatestCryptoKeyByFeature (gomock .Any (), feature ).Return (database.CryptoKey {}, nil ).AnyTimes ()
3764
+ check .Args (feature ).Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3765
+ }))
3766
+ s .Run ("UpdateCryptoKeyDeletesAt" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
3767
+ key := testutil .Fake (s .T (), faker , database.CryptoKey {Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey , Sequence : 4 })
3768
+ arg := database.UpdateCryptoKeyDeletesAtParams {Feature : key .Feature , Sequence : key .Sequence , DeletesAt : sql.NullTime {Time : time .Now (), Valid : true }}
3769
+ dbm .EXPECT ().UpdateCryptoKeyDeletesAt (gomock .Any (), arg ).Return (key , nil ).AnyTimes ()
3770
+ check .Args (arg ).Asserts (rbac .ResourceCryptoKey , policy .ActionUpdate )
3771
+ }))
3772
+ s .Run ("GetCryptoKeysByFeature" , s .Mocked (func (dbm * dbmock.MockStore , _ * gofakeit.Faker , check * expects ) {
3773
+ feature := database .CryptoKeyFeatureWorkspaceAppsAPIKey
3774
+ dbm .EXPECT ().GetCryptoKeysByFeature (gomock .Any (), feature ).Return ([]database.CryptoKey {}, nil ).AnyTimes ()
3775
+ check .Args (feature ).
3776
+ Asserts (rbac .ResourceCryptoKey , policy .ActionRead )
3777
+ }))
3778
3778
}
3779
3779
3780
3780
func (s * MethodTestSuite ) TestSystemFunctions () {
@@ -5661,55 +5661,55 @@ func (s *MethodTestSuite) TestAuthorizePrebuiltWorkspace() {
5661
5661
}
5662
5662
5663
5663
func (s * MethodTestSuite ) TestUserSecrets () {
5664
- s .Run ("GetUserSecretByUserIDAndName" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5665
- user := testutil .Fake (s .T (), faker , database.User {})
5666
- secret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5667
- arg := database.GetUserSecretByUserIDAndNameParams {UserID : user .ID , Name : secret .Name }
5668
- dbm .EXPECT ().GetUserSecretByUserIDAndName (gomock .Any (), arg ).Return (secret , nil ).AnyTimes ()
5669
- check .Args (arg ).
5670
- Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionRead ).
5671
- Returns (secret )
5672
- }))
5673
- s .Run ("GetUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5674
- secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5675
- dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5676
- check .Args (secret .ID ).
5677
- Asserts (secret , policy .ActionRead ).
5678
- Returns (secret )
5679
- }))
5680
- s .Run ("ListUserSecrets" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5681
- user := testutil .Fake (s .T (), faker , database.User {})
5682
- secret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5683
- dbm .EXPECT ().ListUserSecrets (gomock .Any (), user .ID ).Return ([]database.UserSecret {secret }, nil ).AnyTimes ()
5684
- check .Args (user .ID ).
5685
- Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionRead ).
5686
- Returns ([]database.UserSecret {secret })
5687
- }))
5688
- s .Run ("CreateUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5689
- user := testutil .Fake (s .T (), faker , database.User {})
5690
- arg := database.CreateUserSecretParams {UserID : user .ID }
5691
- ret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5692
- dbm .EXPECT ().CreateUserSecret (gomock .Any (), arg ).Return (ret , nil ).AnyTimes ()
5693
- check .Args (arg ).
5694
- Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionCreate ).
5695
- Returns (ret )
5696
- }))
5697
- s .Run ("UpdateUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5698
- secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5699
- updated := testutil .Fake (s .T (), faker , database.UserSecret {ID : secret .ID })
5700
- arg := database.UpdateUserSecretParams {ID : secret .ID }
5701
- dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5702
- dbm .EXPECT ().UpdateUserSecret (gomock .Any (), arg ).Return (updated , nil ).AnyTimes ()
5703
- check .Args (arg ).
5704
- Asserts (secret , policy .ActionUpdate ).
5705
- Returns (updated )
5706
- }))
5707
- s .Run ("DeleteUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5708
- secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5709
- dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5710
- dbm .EXPECT ().DeleteUserSecret (gomock .Any (), secret .ID ).Return (nil ).AnyTimes ()
5711
- check .Args (secret .ID ).
5712
- Asserts (secret , policy .ActionRead , secret , policy .ActionDelete ).
5713
- Returns ()
5714
- }))
5664
+ s .Run ("GetUserSecretByUserIDAndName" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5665
+ user := testutil .Fake (s .T (), faker , database.User {})
5666
+ secret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5667
+ arg := database.GetUserSecretByUserIDAndNameParams {UserID : user .ID , Name : secret .Name }
5668
+ dbm .EXPECT ().GetUserSecretByUserIDAndName (gomock .Any (), arg ).Return (secret , nil ).AnyTimes ()
5669
+ check .Args (arg ).
5670
+ Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionRead ).
5671
+ Returns (secret )
5672
+ }))
5673
+ s .Run ("GetUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5674
+ secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5675
+ dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5676
+ check .Args (secret .ID ).
5677
+ Asserts (secret , policy .ActionRead ).
5678
+ Returns (secret )
5679
+ }))
5680
+ s .Run ("ListUserSecrets" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5681
+ user := testutil .Fake (s .T (), faker , database.User {})
5682
+ secret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5683
+ dbm .EXPECT ().ListUserSecrets (gomock .Any (), user .ID ).Return ([]database.UserSecret {secret }, nil ).AnyTimes ()
5684
+ check .Args (user .ID ).
5685
+ Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionRead ).
5686
+ Returns ([]database.UserSecret {secret })
5687
+ }))
5688
+ s .Run ("CreateUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5689
+ user := testutil .Fake (s .T (), faker , database.User {})
5690
+ arg := database.CreateUserSecretParams {UserID : user .ID }
5691
+ ret := testutil .Fake (s .T (), faker , database.UserSecret {UserID : user .ID })
5692
+ dbm .EXPECT ().CreateUserSecret (gomock .Any (), arg ).Return (ret , nil ).AnyTimes ()
5693
+ check .Args (arg ).
5694
+ Asserts (rbac .ResourceUserSecret .WithOwner (user .ID .String ()), policy .ActionCreate ).
5695
+ Returns (ret )
5696
+ }))
5697
+ s .Run ("UpdateUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5698
+ secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5699
+ updated := testutil .Fake (s .T (), faker , database.UserSecret {ID : secret .ID })
5700
+ arg := database.UpdateUserSecretParams {ID : secret .ID }
5701
+ dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5702
+ dbm .EXPECT ().UpdateUserSecret (gomock .Any (), arg ).Return (updated , nil ).AnyTimes ()
5703
+ check .Args (arg ).
5704
+ Asserts (secret , policy .ActionUpdate ).
5705
+ Returns (updated )
5706
+ }))
5707
+ s .Run ("DeleteUserSecret" , s .Mocked (func (dbm * dbmock.MockStore , faker * gofakeit.Faker , check * expects ) {
5708
+ secret := testutil .Fake (s .T (), faker , database.UserSecret {})
5709
+ dbm .EXPECT ().GetUserSecret (gomock .Any (), secret .ID ).Return (secret , nil ).AnyTimes ()
5710
+ dbm .EXPECT ().DeleteUserSecret (gomock .Any (), secret .ID ).Return (nil ).AnyTimes ()
5711
+ check .Args (secret .ID ).
5712
+ Asserts (secret , policy .ActionRead , secret , policy .ActionDelete ).
5713
+ Returns ()
5714
+ }))
5715
5715
}
0 commit comments