Skip to content

Commit 102af8a

Browse files
committed
Fix user unit tests
1 parent 592a62b commit 102af8a

File tree

2 files changed

+9
-8
lines changed

2 files changed

+9
-8
lines changed

coderd/authzquery/user.go

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,9 @@ import (
1515
// which is problematic since we don't want to leak information about users.
1616

1717
func (q *AuthzQuerier) DeleteAPIKeysByUserID(ctx context.Context, userID uuid.UUID) error {
18-
err := q.authorizeContext(ctx, rbac.ActionUpdate,
19-
rbac.ResourceUserData.WithOwner(userID.String()).WithID(userID))
18+
// TODO: This is not 100% correct because it omits apikey IDs.
19+
err := q.authorizeContext(ctx, rbac.ActionDelete,
20+
rbac.ResourceAPIKey.WithOwner(userID.String()))
2021
if err != nil {
2122
return err
2223
}
@@ -158,7 +159,7 @@ func (q *AuthzQuerier) UpdateUserLastSeenAt(ctx context.Context, arg database.Up
158159
}
159160

160161
func (q *AuthzQuerier) UpdateUserProfile(ctx context.Context, arg database.UpdateUserProfileParams) (database.User, error) {
161-
u, err := q.GetUserByID(ctx, arg.ID)
162+
u, err := q.database.GetUserByID(ctx, arg.ID)
162163
if err != nil {
163164
return database.User{}, err
164165
}

coderd/authzquery/user_test.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ func (s *MethodTestSuite) TestUser() {
1414
s.Run("DeleteAPIKeysByUserID", func() {
1515
s.RunMethodTest(func(t *testing.T, db database.Store) MethodCase {
1616
u := dbgen.User(t, db, database.User{})
17-
return methodCase(inputs(u.ID), asserts(u.UserDataRBACObject(), rbac.ActionUpdate))
17+
return methodCase(inputs(u.ID), asserts(rbac.ResourceAPIKey.WithOwner(u.ID.String()), rbac.ActionDelete))
1818
})
1919
})
2020
s.Run("GetQuotaAllowanceForUser", func() {
@@ -82,7 +82,7 @@ func (s *MethodTestSuite) TestUser() {
8282
return methodCase(inputs(database.InsertUserParams{
8383
ID: uuid.New(),
8484
LoginType: database.LoginTypePassword,
85-
}), asserts(rbac.ResourceUser, rbac.ActionCreate))
85+
}), asserts(rbac.ResourceRoleAssignment, rbac.ActionCreate, rbac.ResourceUser, rbac.ActionCreate))
8686
})
8787
})
8888
s.Run("InsertUserLink", func() {
@@ -114,7 +114,7 @@ func (s *MethodTestSuite) TestUser() {
114114
u := dbgen.User(t, db, database.User{})
115115
return methodCase(inputs(database.UpdateUserHashedPasswordParams{
116116
ID: u.ID,
117-
}), asserts(u, rbac.ActionUpdate))
117+
}), asserts(u.UserDataRBACObject(), rbac.ActionUpdate))
118118
})
119119
})
120120
s.Run("UpdateUserLastSeenAt", func() {
@@ -185,14 +185,14 @@ func (s *MethodTestSuite) TestUser() {
185185
return methodCase(inputs(database.InsertGitAuthLinkParams{
186186
ProviderID: uuid.NewString(),
187187
UserID: u.ID,
188-
}), asserts(rbac.ResourceUserData.WithOwner(u.ID.String()).WithID(u.ID), rbac.ActionRead))
188+
}), asserts(rbac.ResourceUserData.WithOwner(u.ID.String()).WithID(u.ID), rbac.ActionCreate))
189189
})
190190
})
191191
s.Run("UpdateGitAuthLink", func() {
192192
s.RunMethodTest(func(t *testing.T, db database.Store) MethodCase {
193193
link := dbgen.GitAuthLink(t, db, database.GitAuthLink{})
194194
return methodCase(inputs(database.UpdateGitAuthLinkParams{
195-
ProviderID: uuid.NewString(),
195+
ProviderID: link.ProviderID,
196196
UserID: link.UserID,
197197
}), asserts(link, rbac.ActionUpdate))
198198
})

0 commit comments

Comments
 (0)