@@ -1041,6 +1041,10 @@ func (q *querier) DeleteCoordinator(ctx context.Context, id uuid.UUID) error {
1041
1041
return q .db .DeleteCoordinator (ctx , id )
1042
1042
}
1043
1043
1044
+ func (q * querier ) DeleteCryptoKey (ctx context.Context , arg database.DeleteCryptoKeyParams ) (database.CryptoKey , error ) {
1045
+ panic ("not implemented" )
1046
+ }
1047
+
1044
1048
func (q * querier ) DeleteCustomRole (ctx context.Context , arg database.DeleteCustomRoleParams ) error {
1045
1049
if arg .OrganizationID .UUID != uuid .Nil {
1046
1050
if err := q .authorizeContext (ctx , policy .ActionDelete , rbac .ResourceAssignOrgRole .InOrg (arg .OrganizationID .UUID )); err != nil {
@@ -1078,10 +1082,6 @@ func (q *querier) DeleteGroupMemberFromGroup(ctx context.Context, arg database.D
1078
1082
return update (q .log , q .auth , fetch , q .db .DeleteGroupMemberFromGroup )(ctx , arg )
1079
1083
}
1080
1084
1081
- func (q * querier ) DeleteKey (ctx context.Context , arg database.DeleteKeyParams ) error {
1082
- panic ("not implemented" )
1083
- }
1084
-
1085
1085
func (q * querier ) DeleteLicense (ctx context.Context , id int32 ) (int32 , error ) {
1086
1086
err := deleteQ (q .log , q .auth , q .db .GetLicenseByID , func (ctx context.Context , id int32 ) error {
1087
1087
_ , err := q .db .DeleteLicense (ctx , id )
@@ -1387,6 +1387,14 @@ func (q *querier) GetCoordinatorResumeTokenSigningKey(ctx context.Context) (stri
1387
1387
return q .db .GetCoordinatorResumeTokenSigningKey (ctx )
1388
1388
}
1389
1389
1390
+ func (q * querier ) GetCryptoKeyByFeatureAndSequence (ctx context.Context , arg database.GetCryptoKeyByFeatureAndSequenceParams ) (database.CryptoKey , error ) {
1391
+ panic ("not implemented" )
1392
+ }
1393
+
1394
+ func (q * querier ) GetCryptoKeys (ctx context.Context ) ([]database.CryptoKey , error ) {
1395
+ panic ("not implemented" )
1396
+ }
1397
+
1390
1398
func (q * querier ) GetDBCryptKeys (ctx context.Context ) ([]database.DBCryptKey , error ) {
1391
1399
if err := q .authorizeContext (ctx , policy .ActionRead , rbac .ResourceSystem ); err != nil {
1392
1400
return nil , err
@@ -1546,21 +1554,17 @@ func (q *querier) GetJFrogXrayScanByWorkspaceAndAgentID(ctx context.Context, arg
1546
1554
return q .db .GetJFrogXrayScanByWorkspaceAndAgentID (ctx , arg )
1547
1555
}
1548
1556
1549
- func (q * querier ) GetKeyByFeatureAndSequence (ctx context.Context , arg database.GetKeyByFeatureAndSequenceParams ) (database.Key , error ) {
1550
- panic ("not implemented" )
1551
- }
1552
-
1553
- func (q * querier ) GetKeys (ctx context.Context ) ([]database.Key , error ) {
1554
- panic ("not implemented" )
1555
- }
1556
-
1557
1557
func (q * querier ) GetLastUpdateCheck (ctx context.Context ) (string , error ) {
1558
1558
if err := q .authorizeContext (ctx , policy .ActionRead , rbac .ResourceSystem ); err != nil {
1559
1559
return "" , err
1560
1560
}
1561
1561
return q .db .GetLastUpdateCheck (ctx )
1562
1562
}
1563
1563
1564
+ func (q * querier ) GetLatestCryptoKeyByFeature (ctx context.Context , feature database.CryptoKeyFeature ) (database.CryptoKey , error ) {
1565
+ panic ("not implemented" )
1566
+ }
1567
+
1564
1568
func (q * querier ) GetLatestWorkspaceBuildByWorkspaceID (ctx context.Context , workspaceID uuid.UUID ) (database.WorkspaceBuild , error ) {
1565
1569
if _ , err := q .GetWorkspaceByID (ctx , workspaceID ); err != nil {
1566
1570
return database.WorkspaceBuild {}, err
@@ -2666,6 +2670,10 @@ func (q *querier) InsertAuditLog(ctx context.Context, arg database.InsertAuditLo
2666
2670
return insert (q .log , q .auth , rbac .ResourceAuditLog , q .db .InsertAuditLog )(ctx , arg )
2667
2671
}
2668
2672
2673
+ func (q * querier ) InsertCryptoKey (ctx context.Context , arg database.InsertCryptoKeyParams ) (database.CryptoKey , error ) {
2674
+ panic ("not implemented" )
2675
+ }
2676
+
2669
2677
func (q * querier ) InsertCustomRole (ctx context.Context , arg database.InsertCustomRoleParams ) (database.CustomRole , error ) {
2670
2678
// Org and site role upsert share the same query. So switch the assertion based on the org uuid.
2671
2679
if arg .OrganizationID .UUID != uuid .Nil {
@@ -2738,10 +2746,6 @@ func (q *querier) InsertGroupMember(ctx context.Context, arg database.InsertGrou
2738
2746
return update (q .log , q .auth , fetch , q .db .InsertGroupMember )(ctx , arg )
2739
2747
}
2740
2748
2741
- func (q * querier ) InsertKey (ctx context.Context , arg database.InsertKeyParams ) error {
2742
- panic ("not implemented" )
2743
- }
2744
-
2745
2749
func (q * querier ) InsertLicense (ctx context.Context , arg database.InsertLicenseParams ) (database.License , error ) {
2746
2750
if err := q .authorizeContext (ctx , policy .ActionCreate , rbac .ResourceLicense ); err != nil {
2747
2751
return database.License {}, err
@@ -3173,6 +3177,10 @@ func (q *querier) UpdateAPIKeyByID(ctx context.Context, arg database.UpdateAPIKe
3173
3177
return update (q .log , q .auth , fetch , q .db .UpdateAPIKeyByID )(ctx , arg )
3174
3178
}
3175
3179
3180
+ func (q * querier ) UpdateCryptoKeyDeletesAt (ctx context.Context , arg database.UpdateCryptoKeyDeletesAtParams ) (database.CryptoKey , error ) {
3181
+ panic ("not implemented" )
3182
+ }
3183
+
3176
3184
func (q * querier ) UpdateCustomRole (ctx context.Context , arg database.UpdateCustomRoleParams ) (database.CustomRole , error ) {
3177
3185
if arg .OrganizationID .UUID != uuid .Nil {
3178
3186
if err := q .authorizeContext (ctx , policy .ActionUpdate , rbac .ResourceAssignOrgRole .InOrg (arg .OrganizationID .UUID )); err != nil {
@@ -3228,10 +3236,6 @@ func (q *querier) UpdateInactiveUsersToDormant(ctx context.Context, lastSeenAfte
3228
3236
return q .db .UpdateInactiveUsersToDormant (ctx , lastSeenAfter )
3229
3237
}
3230
3238
3231
- func (q * querier ) UpdateKeyDeletesAt (ctx context.Context , arg database.UpdateKeyDeletesAtParams ) error {
3232
- panic ("not implemented" )
3233
- }
3234
-
3235
3239
func (q * querier ) UpdateMemberRoles (ctx context.Context , arg database.UpdateMemberRolesParams ) (database.OrganizationMember , error ) {
3236
3240
// Authorized fetch will check that the actor has read access to the org member since the org member is returned.
3237
3241
member , err := database .ExpectOne (q .OrganizationMembers (ctx , database.OrganizationMembersParams {
0 commit comments