@@ -100,15 +100,15 @@ func TestTokensService_GetPersonalAccessToken(t *testing.T) {
100
100
})
101
101
102
102
t .Run ("invalid argument when Token ID is empty" , func (t * testing.T ) {
103
- _ , client := setupTokensService (t , withTokenFeatureEnabled )
103
+ _ , _ , client := setupTokensService (t , withTokenFeatureEnabled )
104
104
105
105
_ , err := client .GetPersonalAccessToken (context .Background (), connect .NewRequest (& v1.GetPersonalAccessTokenRequest {}))
106
106
107
107
require .Equal (t , connect .CodeInvalidArgument , connect .CodeOf (err ))
108
108
})
109
109
110
110
t .Run ("invalid argument when Token ID is not a valid UUID" , func (t * testing.T ) {
111
- _ , client := setupTokensService (t , withTokenFeatureEnabled )
111
+ _ , _ , client := setupTokensService (t , withTokenFeatureEnabled )
112
112
113
113
_ , err := client .GetPersonalAccessToken (context .Background (), connect .NewRequest (& v1.GetPersonalAccessTokenRequest {
114
114
Id : "foo-bar" ,
@@ -172,15 +172,15 @@ func TestTokensService_RegeneratePersonalAccessToken(t *testing.T) {
172
172
})
173
173
174
174
t .Run ("invalid argument when Token ID is empty" , func (t * testing.T ) {
175
- _ , client := setupTokensService (t , withTokenFeatureEnabled )
175
+ _ , _ , client := setupTokensService (t , withTokenFeatureEnabled )
176
176
177
177
_ , err := client .RegeneratePersonalAccessToken (context .Background (), connect .NewRequest (& v1.RegeneratePersonalAccessTokenRequest {}))
178
178
179
179
require .Equal (t , connect .CodeInvalidArgument , connect .CodeOf (err ))
180
180
})
181
181
182
182
t .Run ("invalid argument when Token ID is not a valid UUID" , func (t * testing.T ) {
183
- _ , client := setupTokensService (t , withTokenFeatureEnabled )
183
+ _ , _ , client := setupTokensService (t , withTokenFeatureEnabled )
184
184
185
185
_ , err := client .RegeneratePersonalAccessToken (context .Background (), connect .NewRequest (& v1.RegeneratePersonalAccessTokenRequest {
186
186
Id : "foo-bar" ,
@@ -221,15 +221,15 @@ func TestTokensService_UpdatePersonalAccessToken(t *testing.T) {
221
221
})
222
222
223
223
t .Run ("invalid argument when Token ID is empty" , func (t * testing.T ) {
224
- _ , client := setupTokensService (t , withTokenFeatureEnabled )
224
+ _ , _ , client := setupTokensService (t , withTokenFeatureEnabled )
225
225
226
226
_ , err := client .UpdatePersonalAccessToken (context .Background (), connect .NewRequest (& v1.UpdatePersonalAccessTokenRequest {}))
227
227
228
228
require .Equal (t , connect .CodeInvalidArgument , connect .CodeOf (err ))
229
229
})
230
230
231
231
t .Run ("invalid argument when Token ID is not a valid UUID" , func (t * testing.T ) {
232
- _ , client := setupTokensService (t , withTokenFeatureEnabled )
232
+ _ , _ , client := setupTokensService (t , withTokenFeatureEnabled )
233
233
234
234
_ , err := client .UpdatePersonalAccessToken (context .Background (), connect .NewRequest (& v1.UpdatePersonalAccessTokenRequest {
235
235
Token : & v1.PersonalAccessToken {
@@ -272,15 +272,15 @@ func TestTokensService_DeletePersonalAccessToken(t *testing.T) {
272
272
})
273
273
274
274
t .Run ("invalid argument when Token ID is empty" , func (t * testing.T ) {
275
- _ , client := setupTokensService (t , withTokenFeatureEnabled )
275
+ _ , _ , client := setupTokensService (t , withTokenFeatureEnabled )
276
276
277
277
_ , err := client .DeletePersonalAccessToken (context .Background (), connect .NewRequest (& v1.DeletePersonalAccessTokenRequest {}))
278
278
279
279
require .Equal (t , connect .CodeInvalidArgument , connect .CodeOf (err ))
280
280
})
281
281
282
282
t .Run ("invalid argument when Token ID is not a valid UUID" , func (t * testing.T ) {
283
- _ , client := setupTokensService (t , withTokenFeatureEnabled )
283
+ _ , _ , client := setupTokensService (t , withTokenFeatureEnabled )
284
284
285
285
_ , err := client .DeletePersonalAccessToken (context .Background (), connect .NewRequest (& v1.DeletePersonalAccessTokenRequest {
286
286
Id : "foo-bar" ,
0 commit comments