Skip to content

Commit c72a88f

Browse files
author
Laurie T. Malau
committed
m
1 parent 806e295 commit c72a88f

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

components/public-api-server/pkg/apiv1/tokens.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,9 +83,9 @@ func (s *TokensService) GetPersonalAccessToken(ctx context.Context, req *connect
8383
}
8484

8585
return connect.NewResponse(&v1.GetPersonalAccessTokenResponse{Token: &v1.PersonalAccessToken{
86-
Id: response.Id,
86+
Id: response.ID,
8787
Hash: response.Hash,
88-
Name: response.Hash,
88+
Name: response.Name,
8989
Description: response.Description,
9090
ExpirationTime: timestamppb.New(response.ExpirationTime),
9191
Scopes: response.Scopes,

components/public-api-server/pkg/apiv1/tokens_test.go

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -100,15 +100,15 @@ func TestTokensService_GetPersonalAccessToken(t *testing.T) {
100100
})
101101

102102
t.Run("invalid argument when Token ID is empty", func(t *testing.T) {
103-
_, client := setupTokensService(t, withTokenFeatureEnabled)
103+
_, _, client := setupTokensService(t, withTokenFeatureEnabled)
104104

105105
_, err := client.GetPersonalAccessToken(context.Background(), connect.NewRequest(&v1.GetPersonalAccessTokenRequest{}))
106106

107107
require.Equal(t, connect.CodeInvalidArgument, connect.CodeOf(err))
108108
})
109109

110110
t.Run("invalid argument when Token ID is not a valid UUID", func(t *testing.T) {
111-
_, client := setupTokensService(t, withTokenFeatureEnabled)
111+
_, _, client := setupTokensService(t, withTokenFeatureEnabled)
112112

113113
_, err := client.GetPersonalAccessToken(context.Background(), connect.NewRequest(&v1.GetPersonalAccessTokenRequest{
114114
Id: "foo-bar",
@@ -172,15 +172,15 @@ func TestTokensService_RegeneratePersonalAccessToken(t *testing.T) {
172172
})
173173

174174
t.Run("invalid argument when Token ID is empty", func(t *testing.T) {
175-
_, client := setupTokensService(t, withTokenFeatureEnabled)
175+
_, _, client := setupTokensService(t, withTokenFeatureEnabled)
176176

177177
_, err := client.RegeneratePersonalAccessToken(context.Background(), connect.NewRequest(&v1.RegeneratePersonalAccessTokenRequest{}))
178178

179179
require.Equal(t, connect.CodeInvalidArgument, connect.CodeOf(err))
180180
})
181181

182182
t.Run("invalid argument when Token ID is not a valid UUID", func(t *testing.T) {
183-
_, client := setupTokensService(t, withTokenFeatureEnabled)
183+
_, _, client := setupTokensService(t, withTokenFeatureEnabled)
184184

185185
_, err := client.RegeneratePersonalAccessToken(context.Background(), connect.NewRequest(&v1.RegeneratePersonalAccessTokenRequest{
186186
Id: "foo-bar",
@@ -221,15 +221,15 @@ func TestTokensService_UpdatePersonalAccessToken(t *testing.T) {
221221
})
222222

223223
t.Run("invalid argument when Token ID is empty", func(t *testing.T) {
224-
_, client := setupTokensService(t, withTokenFeatureEnabled)
224+
_, _, client := setupTokensService(t, withTokenFeatureEnabled)
225225

226226
_, err := client.UpdatePersonalAccessToken(context.Background(), connect.NewRequest(&v1.UpdatePersonalAccessTokenRequest{}))
227227

228228
require.Equal(t, connect.CodeInvalidArgument, connect.CodeOf(err))
229229
})
230230

231231
t.Run("invalid argument when Token ID is not a valid UUID", func(t *testing.T) {
232-
_, client := setupTokensService(t, withTokenFeatureEnabled)
232+
_, _, client := setupTokensService(t, withTokenFeatureEnabled)
233233

234234
_, err := client.UpdatePersonalAccessToken(context.Background(), connect.NewRequest(&v1.UpdatePersonalAccessTokenRequest{
235235
Token: &v1.PersonalAccessToken{
@@ -272,15 +272,15 @@ func TestTokensService_DeletePersonalAccessToken(t *testing.T) {
272272
})
273273

274274
t.Run("invalid argument when Token ID is empty", func(t *testing.T) {
275-
_, client := setupTokensService(t, withTokenFeatureEnabled)
275+
_, _, client := setupTokensService(t, withTokenFeatureEnabled)
276276

277277
_, err := client.DeletePersonalAccessToken(context.Background(), connect.NewRequest(&v1.DeletePersonalAccessTokenRequest{}))
278278

279279
require.Equal(t, connect.CodeInvalidArgument, connect.CodeOf(err))
280280
})
281281

282282
t.Run("invalid argument when Token ID is not a valid UUID", func(t *testing.T) {
283-
_, client := setupTokensService(t, withTokenFeatureEnabled)
283+
_, _, client := setupTokensService(t, withTokenFeatureEnabled)
284284

285285
_, err := client.DeletePersonalAccessToken(context.Background(), connect.NewRequest(&v1.DeletePersonalAccessTokenRequest{
286286
Id: "foo-bar",

0 commit comments

Comments
 (0)