@@ -66,7 +66,7 @@ func TestUserOIDC(t *testing.T) {
66
66
cfg .AllowSignups = true
67
67
cfg .UserRoleField = "roles"
68
68
cfg .UserRoleMapping = map [string ][]string {
69
- oidcRoleName : {rbac .RoleTemplateAdmin ()},
69
+ oidcRoleName : {rbac .RoleTemplateAdmin (). String () },
70
70
}
71
71
},
72
72
})
@@ -79,7 +79,7 @@ func TestUserOIDC(t *testing.T) {
79
79
"roles" : oidcRoleName ,
80
80
})
81
81
require .Equal (t , http .StatusOK , resp .StatusCode )
82
- runner .AssertRoles (t , "alice" , []string {rbac .RoleTemplateAdmin ()})
82
+ runner .AssertRoles (t , "alice" , []string {rbac .RoleTemplateAdmin (). String () })
83
83
})
84
84
85
85
// A user has some roles, then on an oauth refresh will lose said
@@ -92,23 +92,23 @@ func TestUserOIDC(t *testing.T) {
92
92
93
93
const oidcRoleName = "TemplateAuthor"
94
94
runner := setupOIDCTest (t , oidcTestConfig {
95
- Userinfo : jwt.MapClaims {oidcRoleName : []string {rbac .RoleTemplateAdmin (), rbac .RoleUserAdmin ()}},
95
+ Userinfo : jwt.MapClaims {oidcRoleName : []string {rbac .RoleTemplateAdmin (). String () , rbac .RoleUserAdmin (). String ()}},
96
96
Config : func (cfg * coderd.OIDCConfig ) {
97
97
cfg .AllowSignups = true
98
98
cfg .UserRoleField = "roles"
99
99
cfg .UserRoleMapping = map [string ][]string {
100
- oidcRoleName : {rbac .RoleTemplateAdmin (), rbac .RoleUserAdmin ()},
100
+ oidcRoleName : {rbac .RoleTemplateAdmin (). String () , rbac .RoleUserAdmin (). String ()},
101
101
}
102
102
},
103
103
})
104
104
105
105
// User starts with the owner role
106
106
client , resp := runner .Login (t , jwt.MapClaims {
107
107
"email" : "alice@coder.com" ,
108
- "roles" : []string {"random" , oidcRoleName , rbac .RoleOwner ()},
108
+ "roles" : []string {"random" , oidcRoleName , rbac .RoleOwner (). String () },
109
109
})
110
110
require .Equal (t , http .StatusOK , resp .StatusCode )
111
- runner .AssertRoles (t , "alice" , []string {rbac .RoleTemplateAdmin (), rbac .RoleUserAdmin (), rbac .RoleOwner ()})
111
+ runner .AssertRoles (t , "alice" , []string {rbac .RoleTemplateAdmin (). String () , rbac .RoleUserAdmin (). String () , rbac .RoleOwner (). String ()})
112
112
113
113
// Now refresh the oauth, and check the roles are removed.
114
114
// Force a refresh, and assert nothing has changes
@@ -126,23 +126,23 @@ func TestUserOIDC(t *testing.T) {
126
126
127
127
const oidcRoleName = "TemplateAuthor"
128
128
runner := setupOIDCTest (t , oidcTestConfig {
129
- Userinfo : jwt.MapClaims {oidcRoleName : []string {rbac .RoleTemplateAdmin (), rbac .RoleUserAdmin ()}},
129
+ Userinfo : jwt.MapClaims {oidcRoleName : []string {rbac .RoleTemplateAdmin (). String () , rbac .RoleUserAdmin (). String ()}},
130
130
Config : func (cfg * coderd.OIDCConfig ) {
131
131
cfg .AllowSignups = true
132
132
cfg .UserRoleField = "roles"
133
133
cfg .UserRoleMapping = map [string ][]string {
134
- oidcRoleName : {rbac .RoleTemplateAdmin (), rbac .RoleUserAdmin ()},
134
+ oidcRoleName : {rbac .RoleTemplateAdmin (). String () , rbac .RoleUserAdmin (). String ()},
135
135
}
136
136
},
137
137
})
138
138
139
139
// User starts with the owner role
140
140
_ , resp := runner .Login (t , jwt.MapClaims {
141
141
"email" : "alice@coder.com" ,
142
- "roles" : []string {"random" , oidcRoleName , rbac .RoleOwner ()},
142
+ "roles" : []string {"random" , oidcRoleName , rbac .RoleOwner (). String () },
143
143
})
144
144
require .Equal (t , http .StatusOK , resp .StatusCode )
145
- runner .AssertRoles (t , "alice" , []string {rbac .RoleTemplateAdmin (), rbac .RoleUserAdmin (), rbac .RoleOwner ()})
145
+ runner .AssertRoles (t , "alice" , []string {rbac .RoleTemplateAdmin (). String () , rbac .RoleUserAdmin (). String () , rbac .RoleOwner (). String ()})
146
146
147
147
// Now login with oauth again, and check the roles are removed.
148
148
_ , resp = runner .Login (t , jwt.MapClaims {
@@ -175,7 +175,7 @@ func TestUserOIDC(t *testing.T) {
175
175
ctx := testutil .Context (t , testutil .WaitShort )
176
176
_ , err := runner .AdminClient .UpdateUserRoles (ctx , "alice" , codersdk.UpdateRoles {
177
177
Roles : []string {
178
- rbac .RoleTemplateAdmin (),
178
+ rbac .RoleTemplateAdmin (). String () ,
179
179
},
180
180
})
181
181
require .Error (t , err )
0 commit comments