Skip to content

chore: create type for unique role names #13506

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 16 commits into from
Jun 11, 2024
Prev Previous commit
Next Next commit
linting
  • Loading branch information
Emyrk committed Jun 10, 2024
commit dce7f0970f72b1edf9d80f09e53c45a8d6d6aab5
4 changes: 2 additions & 2 deletions coderd/database/dbauthz/dbauthz.go
Original file line number Diff line number Diff line change
Expand Up @@ -584,7 +584,7 @@ func (q *querier) authorizeUpdateFileTemplate(ctx context.Context, file database

// convertToOrganizationRoles converts a set of scoped role names to their unique
// scoped names.
func (q *querier) convertToOrganizationRoles(organizationID uuid.UUID, names []string) ([]rbac.RoleIdentifier, error) {
func (*querier) convertToOrganizationRoles(organizationID uuid.UUID, names []string) ([]rbac.RoleIdentifier, error) {
uniques := make([]rbac.RoleIdentifier, 0, len(names))
for _, name := range names {
// This check is a developer safety check. Old code might try to invoke this code path with
Expand All @@ -600,7 +600,7 @@ func (q *querier) convertToOrganizationRoles(organizationID uuid.UUID, names []s
}

// convertToDeploymentRoles converts string role names into deployment wide roles.
func (q *querier) convertToDeploymentRoles(names []string) []rbac.RoleIdentifier {
func (*querier) convertToDeploymentRoles(names []string) []rbac.RoleIdentifier {
uniques := make([]rbac.RoleIdentifier, 0, len(names))
for _, name := range names {
uniques = append(uniques, rbac.RoleIdentifier{Name: name})
Expand Down
8 changes: 4 additions & 4 deletions coderd/rbac/roles.go
Original file line number Diff line number Diff line change
Expand Up @@ -96,11 +96,11 @@ func (r RoleIdentifier) String() string {
return r.Name
}

func (p *RoleIdentifier) MarshalJSON() ([]byte, error) {
return json.Marshal(p.String())
func (r *RoleIdentifier) MarshalJSON() ([]byte, error) {
return json.Marshal(r.String())
}

func (p *RoleIdentifier) UnmarshalJSON(data []byte) error {
func (r *RoleIdentifier) UnmarshalJSON(data []byte) error {
var str string
err := json.Unmarshal(data, &str)
if err != nil {
Expand All @@ -112,7 +112,7 @@ func (p *RoleIdentifier) UnmarshalJSON(data []byte) error {
return err
}

*p = v
*r = v
return nil
}

Expand Down
24 changes: 12 additions & 12 deletions coderd/roles_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -52,10 +52,10 @@ func TestListRoles(t *testing.T) {
return x, err
},
ExpectedRoles: convertRoles(map[rbac.RoleIdentifier]bool{
rbac.RoleIdentifier{Name: codersdk.RoleOwner}: false,
rbac.RoleIdentifier{Name: codersdk.RoleAuditor}: false,
rbac.RoleIdentifier{Name: codersdk.RoleTemplateAdmin}: false,
rbac.RoleIdentifier{Name: codersdk.RoleUserAdmin}: false,
{Name: codersdk.RoleOwner}: false,
{Name: codersdk.RoleAuditor}: false,
{Name: codersdk.RoleTemplateAdmin}: false,
{Name: codersdk.RoleUserAdmin}: false,
}),
},
{
Expand All @@ -81,10 +81,10 @@ func TestListRoles(t *testing.T) {
return orgAdmin.ListSiteRoles(ctx)
},
ExpectedRoles: convertRoles(map[rbac.RoleIdentifier]bool{
rbac.RoleIdentifier{Name: codersdk.RoleOwner}: false,
rbac.RoleIdentifier{Name: codersdk.RoleAuditor}: false,
rbac.RoleIdentifier{Name: codersdk.RoleTemplateAdmin}: false,
rbac.RoleIdentifier{Name: codersdk.RoleUserAdmin}: false,
{Name: codersdk.RoleOwner}: false,
{Name: codersdk.RoleAuditor}: false,
{Name: codersdk.RoleTemplateAdmin}: false,
{Name: codersdk.RoleUserAdmin}: false,
}),
},
{
Expand All @@ -110,10 +110,10 @@ func TestListRoles(t *testing.T) {
return client.ListSiteRoles(ctx)
},
ExpectedRoles: convertRoles(map[rbac.RoleIdentifier]bool{
rbac.RoleIdentifier{Name: codersdk.RoleOwner}: true,
rbac.RoleIdentifier{Name: codersdk.RoleAuditor}: true,
rbac.RoleIdentifier{Name: codersdk.RoleTemplateAdmin}: true,
rbac.RoleIdentifier{Name: codersdk.RoleUserAdmin}: true,
{Name: codersdk.RoleOwner}: true,
{Name: codersdk.RoleAuditor}: true,
{Name: codersdk.RoleTemplateAdmin}: true,
{Name: codersdk.RoleUserAdmin}: true,
}),
},
{
Expand Down