@@ -243,7 +243,7 @@ func TestUserOAuth2Github(t *testing.T) {
243
243
},
244
244
},
245
245
})
246
- numLogs := len (auditor .AuditLogs )
246
+ numLogs := len (auditor .AuditLogs () )
247
247
248
248
resp := oauth2Callback (t , client )
249
249
numLogs ++ // add an audit log for login
@@ -257,9 +257,9 @@ func TestUserOAuth2Github(t *testing.T) {
257
257
require .Equal (t , "kyle" , user .Username )
258
258
require .Equal (t , "/hello-world" , user .AvatarURL )
259
259
260
- require .Len (t , auditor .AuditLogs , numLogs )
261
- require .NotEqual (t , auditor .AuditLogs [numLogs - 1 ].UserID , uuid .Nil )
262
- require .Equal (t , database .AuditActionLogin , auditor .AuditLogs [numLogs - 1 ].Action )
260
+ require .Len (t , auditor .AuditLogs () , numLogs )
261
+ require .NotEqual (t , auditor .AuditLogs () [numLogs - 1 ].UserID , uuid .Nil )
262
+ require .Equal (t , database .AuditActionLogin , auditor .AuditLogs () [numLogs - 1 ].Action )
263
263
})
264
264
t .Run ("SignupAllowedTeam" , func (t * testing.T ) {
265
265
t .Parallel ()
@@ -296,14 +296,14 @@ func TestUserOAuth2Github(t *testing.T) {
296
296
},
297
297
},
298
298
})
299
- numLogs := len (auditor .AuditLogs )
299
+ numLogs := len (auditor .AuditLogs () )
300
300
301
301
resp := oauth2Callback (t , client )
302
302
numLogs ++ // add an audit log for login
303
303
304
304
require .Equal (t , http .StatusTemporaryRedirect , resp .StatusCode )
305
- require .Len (t , auditor .AuditLogs , numLogs )
306
- require .Equal (t , database .AuditActionLogin , auditor .AuditLogs [numLogs - 1 ].Action )
305
+ require .Len (t , auditor .AuditLogs () , numLogs )
306
+ require .Equal (t , database .AuditActionLogin , auditor .AuditLogs () [numLogs - 1 ].Action )
307
307
})
308
308
t .Run ("SignupAllowedTeamInFirstOrganization" , func (t * testing.T ) {
309
309
t .Parallel ()
@@ -348,14 +348,14 @@ func TestUserOAuth2Github(t *testing.T) {
348
348
},
349
349
},
350
350
})
351
- numLogs := len (auditor .AuditLogs )
351
+ numLogs := len (auditor .AuditLogs () )
352
352
353
353
resp := oauth2Callback (t , client )
354
354
numLogs ++ // add an audit log for login
355
355
356
356
require .Equal (t , http .StatusTemporaryRedirect , resp .StatusCode )
357
- require .Len (t , auditor .AuditLogs , numLogs )
358
- require .Equal (t , database .AuditActionLogin , auditor .AuditLogs [numLogs - 1 ].Action )
357
+ require .Len (t , auditor .AuditLogs () , numLogs )
358
+ require .Equal (t , database .AuditActionLogin , auditor .AuditLogs () [numLogs - 1 ].Action )
359
359
})
360
360
t .Run ("SignupAllowedTeamInSecondOrganization" , func (t * testing.T ) {
361
361
t .Parallel ()
@@ -400,14 +400,14 @@ func TestUserOAuth2Github(t *testing.T) {
400
400
},
401
401
},
402
402
})
403
- numLogs := len (auditor .AuditLogs )
403
+ numLogs := len (auditor .AuditLogs () )
404
404
405
405
resp := oauth2Callback (t , client )
406
406
numLogs ++ // add an audit log for login
407
407
408
408
require .Equal (t , http .StatusTemporaryRedirect , resp .StatusCode )
409
- require .Len (t , auditor .AuditLogs , numLogs )
410
- require .Equal (t , database .AuditActionLogin , auditor .AuditLogs [numLogs - 1 ].Action )
409
+ require .Len (t , auditor .AuditLogs () , numLogs )
410
+ require .Equal (t , database .AuditActionLogin , auditor .AuditLogs () [numLogs - 1 ].Action )
411
411
})
412
412
t .Run ("SignupAllowEveryone" , func (t * testing.T ) {
413
413
t .Parallel ()
@@ -438,14 +438,14 @@ func TestUserOAuth2Github(t *testing.T) {
438
438
},
439
439
},
440
440
})
441
- numLogs := len (auditor .AuditLogs )
441
+ numLogs := len (auditor .AuditLogs () )
442
442
443
443
resp := oauth2Callback (t , client )
444
444
numLogs ++ // add an audit log for login
445
445
446
446
require .Equal (t , http .StatusTemporaryRedirect , resp .StatusCode )
447
- require .Len (t , auditor .AuditLogs , numLogs )
448
- require .Equal (t , database .AuditActionLogin , auditor .AuditLogs [numLogs - 1 ].Action )
447
+ require .Len (t , auditor .AuditLogs () , numLogs )
448
+ require .Equal (t , database .AuditActionLogin , auditor .AuditLogs () [numLogs - 1 ].Action )
449
449
})
450
450
t .Run ("SignupFailedInactiveInOrg" , func (t * testing.T ) {
451
451
t .Parallel ()
@@ -659,7 +659,7 @@ func TestUserOIDC(t *testing.T) {
659
659
Auditor : auditor ,
660
660
OIDCConfig : config ,
661
661
})
662
- numLogs := len (auditor .AuditLogs )
662
+ numLogs := len (auditor .AuditLogs () )
663
663
664
664
resp := oidcCallback (t , client , conf .EncodeClaims (t , tc .IDTokenClaims ))
665
665
numLogs ++ // add an audit log for login
@@ -673,9 +673,9 @@ func TestUserOIDC(t *testing.T) {
673
673
require .NoError (t , err )
674
674
require .Equal (t , tc .Username , user .Username )
675
675
676
- require .Len (t , auditor .AuditLogs , numLogs )
677
- require .NotEqual (t , auditor .AuditLogs [numLogs - 1 ].UserID , uuid .Nil )
678
- require .Equal (t , database .AuditActionLogin , auditor .AuditLogs [numLogs - 1 ].Action )
676
+ require .Len (t , auditor .AuditLogs () , numLogs )
677
+ require .NotEqual (t , auditor .AuditLogs () [numLogs - 1 ].UserID , uuid .Nil )
678
+ require .Equal (t , database .AuditActionLogin , auditor .AuditLogs () [numLogs - 1 ].Action )
679
679
}
680
680
681
681
if tc .AvatarURL != "" {
@@ -684,8 +684,8 @@ func TestUserOIDC(t *testing.T) {
684
684
require .NoError (t , err )
685
685
require .Equal (t , tc .AvatarURL , user .AvatarURL )
686
686
687
- require .Len (t , auditor .AuditLogs , numLogs )
688
- require .Equal (t , database .AuditActionLogin , auditor .AuditLogs [numLogs - 1 ].Action )
687
+ require .Len (t , auditor .AuditLogs () , numLogs )
688
+ require .Equal (t , database .AuditActionLogin , auditor .AuditLogs () [numLogs - 1 ].Action )
689
689
}
690
690
})
691
691
}
@@ -702,7 +702,7 @@ func TestUserOIDC(t *testing.T) {
702
702
Auditor : auditor ,
703
703
OIDCConfig : config ,
704
704
})
705
- numLogs := len (auditor .AuditLogs )
705
+ numLogs := len (auditor .AuditLogs () )
706
706
707
707
code := conf .EncodeClaims (t , jwt.MapClaims {
708
708
"email" : "jon@coder.com" ,
@@ -735,8 +735,8 @@ func TestUserOIDC(t *testing.T) {
735
735
require .NoError (t , err )
736
736
require .True (t , strings .HasPrefix (user .Username , "jon-" ), "username %q should have prefix %q" , user .Username , "jon-" )
737
737
738
- require .Len (t , auditor .AuditLogs , numLogs )
739
- require .Equal (t , database .AuditActionLogin , auditor .AuditLogs [numLogs - 1 ].Action )
738
+ require .Len (t , auditor .AuditLogs () , numLogs )
739
+ require .Equal (t , database .AuditActionLogin , auditor .AuditLogs () [numLogs - 1 ].Action )
740
740
})
741
741
742
742
t .Run ("Disabled" , func (t * testing.T ) {
0 commit comments