From 7598a97d1e26e82df75e7825afff0de07a4b7575 Mon Sep 17 00:00:00 2001 From: Simon Alexander Alsing Date: Sat, 24 Aug 2024 13:14:30 +0200 Subject: [PATCH] update list member roles test with up to date data --- member_roles_test.go | 34 ++++++++++++--------------------- testdata/list_member_roles.json | 32 +++++++++++++++++++++++++++++-- 2 files changed, 42 insertions(+), 24 deletions(-) diff --git a/member_roles_test.go b/member_roles_test.go index 85b30cb7c..894784fdb 100644 --- a/member_roles_test.go +++ b/member_roles_test.go @@ -22,30 +22,20 @@ func TestListMemberRoles(t *testing.T) { want := []*MemberRole{ { - ID: 1, - Name: "GuestCodeReader", - Description: "A Guest user that can read code", - GroupId: 1, - BaseAccessLevel: 10, // Guest Base Level - AdminMergeRequests: false, - AdminVulnerability: false, - ReadCode: true, - ReadDependency: false, - ReadVulnerability: false, - ManageProjectAccessToken: false, + ID: 1, + Name: "GuestCodeReader", + Description: "A Guest user that can read code", + GroupId: 1, + BaseAccessLevel: 10, // Guest Base Level + ReadCode: true, }, { - ID: 2, - Name: "GuestVulnerabilityReader", - Description: "A Guest user that can read vulnerabilities", - GroupId: 1, - BaseAccessLevel: 10, // Guest Base Level - AdminMergeRequests: false, - AdminVulnerability: false, - ReadCode: false, - ReadDependency: false, - ReadVulnerability: true, - ManageProjectAccessToken: false, + ID: 2, + Name: "GuestVulnerabilityReader", + Description: "A Guest user that can read vulnerabilities", + GroupId: 1, + BaseAccessLevel: 10, // Guest Base Level + ReadVulnerability: true, }, } diff --git a/testdata/list_member_roles.json b/testdata/list_member_roles.json index b0843b798..850213fa6 100644 --- a/testdata/list_member_roles.json +++ b/testdata/list_member_roles.json @@ -5,12 +5,26 @@ "description": "A Guest user that can read code", "group_id": 1, "base_access_level": 10, + "admin_cicd_variables": false, + "admin_compliance_framework": false, + "admin_group_member": false, "admin_merge_request": false, + "admin_push_rules": false, + "admin_terraform_state": false, "admin_vulnerability": false, + "admin_web_hook": false, + "archive_project": false, + "manage_deploy_tokens": false, + "manage_group_access_tokens": false, + "manage_merge_request_settings": false, + "manage_project_access_tokens": false, + "manage_security_policy_link": false, "read_code": true, + "read_runners": false, "read_dependency": false, "read_vulnerability": false, - "manage_project_access_token": false + "remove_group": false, + "remove_project": false }, { "id": 2, @@ -18,11 +32,25 @@ "description": "A Guest user that can read vulnerabilities", "group_id": 1, "base_access_level": 10, + "admin_cicd_variables": false, + "admin_compliance_framework": false, + "admin_group_member": false, "admin_merge_request": false, + "admin_push_rules": false, + "admin_terraform_state": false, "admin_vulnerability": false, + "admin_web_hook": false, + "archive_project": false, + "manage_deploy_tokens": false, + "manage_group_access_tokens": false, + "manage_merge_request_settings": false, + "manage_project_access_tokens": false, + "manage_security_policy_link": false, "read_code": false, + "read_runners": false, "read_dependency": false, "read_vulnerability": true, - "manage_project_access_token": false + "remove_group": false, + "remove_project": false } ]