Skip to content

Commit 6170823

Browse files
authored
rename ProjectRoles (and friends) to ProjectRole (#1220)
1 parent e8059d5 commit 6170823

File tree

11 files changed

+118
-118
lines changed

11 files changed

+118
-118
lines changed

nexus/src/app/iam.rs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ impl super::Nexus {
2323
pub async fn fleet_fetch_policy(
2424
&self,
2525
opctx: &OpContext,
26-
) -> LookupResult<shared::Policy<authz::FleetRoles>> {
26+
) -> LookupResult<shared::Policy<authz::FleetRole>> {
2727
let role_assignments = self
2828
.db_datastore
2929
.role_assignment_fetch_visible(opctx, &authz::FLEET)
@@ -38,8 +38,8 @@ impl super::Nexus {
3838
pub async fn fleet_update_policy(
3939
&self,
4040
opctx: &OpContext,
41-
policy: &shared::Policy<authz::FleetRoles>,
42-
) -> UpdateResult<shared::Policy<authz::FleetRoles>> {
41+
policy: &shared::Policy<authz::FleetRole>,
42+
) -> UpdateResult<shared::Policy<authz::FleetRole>> {
4343
let role_assignments = self
4444
.db_datastore
4545
.role_assignment_replace_visible(

nexus/src/app/organization.rs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ impl super::Nexus {
9797
&self,
9898
opctx: &OpContext,
9999
organization_name: &Name,
100-
) -> LookupResult<shared::Policy<authz::OrganizationRoles>> {
100+
) -> LookupResult<shared::Policy<authz::OrganizationRole>> {
101101
let (.., authz_org) = LookupPath::new(opctx, &self.db_datastore)
102102
.organization_name(organization_name)
103103
.lookup_for(authz::Action::ReadPolicy)
@@ -117,8 +117,8 @@ impl super::Nexus {
117117
&self,
118118
opctx: &OpContext,
119119
organization_name: &Name,
120-
policy: &shared::Policy<authz::OrganizationRoles>,
121-
) -> UpdateResult<shared::Policy<authz::OrganizationRoles>> {
120+
policy: &shared::Policy<authz::OrganizationRole>,
121+
) -> UpdateResult<shared::Policy<authz::OrganizationRole>> {
122122
let (.., authz_org) = LookupPath::new(opctx, &self.db_datastore)
123123
.organization_name(organization_name)
124124
.lookup_for(authz::Action::ModifyPolicy)

nexus/src/app/project.rs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ impl super::Nexus {
156156
opctx: &OpContext,
157157
organization_name: &Name,
158158
project_name: &Name,
159-
) -> LookupResult<shared::Policy<authz::ProjectRoles>> {
159+
) -> LookupResult<shared::Policy<authz::ProjectRole>> {
160160
let (.., authz_project) = LookupPath::new(opctx, &self.db_datastore)
161161
.organization_name(organization_name)
162162
.project_name(project_name)
@@ -178,8 +178,8 @@ impl super::Nexus {
178178
opctx: &OpContext,
179179
organization_name: &Name,
180180
project_name: &Name,
181-
policy: &shared::Policy<authz::ProjectRoles>,
182-
) -> UpdateResult<shared::Policy<authz::ProjectRoles>> {
181+
policy: &shared::Policy<authz::ProjectRole>,
182+
) -> UpdateResult<shared::Policy<authz::ProjectRole>> {
183183
let (.., authz_project) = LookupPath::new(opctx, &self.db_datastore)
184184
.organization_name(organization_name)
185185
.project_name(project_name)

nexus/src/app/silo.rs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ impl super::Nexus {
8282
&self,
8383
opctx: &OpContext,
8484
silo_name: &Name,
85-
) -> LookupResult<shared::Policy<authz::SiloRoles>> {
85+
) -> LookupResult<shared::Policy<authz::SiloRole>> {
8686
let (.., authz_silo) = LookupPath::new(opctx, &self.db_datastore)
8787
.silo_name(silo_name)
8888
.lookup_for(authz::Action::ReadPolicy)
@@ -102,8 +102,8 @@ impl super::Nexus {
102102
&self,
103103
opctx: &OpContext,
104104
silo_name: &Name,
105-
policy: &shared::Policy<authz::SiloRoles>,
106-
) -> UpdateResult<shared::Policy<authz::SiloRoles>> {
105+
policy: &shared::Policy<authz::SiloRole>,
106+
) -> UpdateResult<shared::Policy<authz::SiloRole>> {
107107
let (.., authz_silo) = LookupPath::new(opctx, &self.db_datastore)
108108
.silo_name(silo_name)
109109
.lookup_for(authz::Action::ModifyPolicy)

nexus/src/authz/api_resources.rs

Lines changed: 44 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -202,38 +202,38 @@ impl ApiResourceWithRoles for Fleet {
202202
}
203203

204204
impl ApiResourceWithRolesType for Fleet {
205-
type AllowedRoles = FleetRoles;
205+
type AllowedRoles = FleetRole;
206206
}
207207

208208
#[derive(
209209
Clone, Copy, Debug, Deserialize, Eq, PartialEq, Serialize, JsonSchema,
210210
)]
211211
#[cfg_attr(test, derive(EnumIter))]
212212
#[serde(rename_all = "snake_case")]
213-
pub enum FleetRoles {
213+
pub enum FleetRole {
214214
Admin,
215215
Collaborator,
216216
Viewer,
217217
// There are other Fleet roles, but they are not externally-visible and so
218218
// they do not show up in this enum.
219219
}
220220

221-
impl db::model::DatabaseString for FleetRoles {
221+
impl db::model::DatabaseString for FleetRole {
222222
type Error = anyhow::Error;
223223

224224
fn to_database_string(&self) -> &str {
225225
match self {
226-
FleetRoles::Admin => "admin",
227-
FleetRoles::Collaborator => "collaborator",
228-
FleetRoles::Viewer => "viewer",
226+
FleetRole::Admin => "admin",
227+
FleetRole::Collaborator => "collaborator",
228+
FleetRole::Viewer => "viewer",
229229
}
230230
}
231231

232232
fn from_database_string(s: &str) -> Result<Self, Self::Error> {
233233
match s {
234-
"admin" => Ok(FleetRoles::Admin),
235-
"collaborator" => Ok(FleetRoles::Collaborator),
236-
"viewer" => Ok(FleetRoles::Viewer),
234+
"admin" => Ok(FleetRole::Admin),
235+
"collaborator" => Ok(FleetRole::Collaborator),
236+
"viewer" => Ok(FleetRole::Viewer),
237237
_ => Err(anyhow!("unsupported Fleet role from database: {:?}", s)),
238238
}
239239
}
@@ -370,7 +370,7 @@ authz_resource! {
370370
}
371371

372372
impl ApiResourceWithRolesType for Organization {
373-
type AllowedRoles = OrganizationRoles;
373+
type AllowedRoles = OrganizationRole;
374374
}
375375

376376
#[derive(
@@ -388,28 +388,28 @@ impl ApiResourceWithRolesType for Organization {
388388
#[cfg_attr(test, derive(EnumIter))]
389389
#[display(style = "kebab-case")]
390390
#[serde(rename_all = "snake_case")]
391-
pub enum OrganizationRoles {
391+
pub enum OrganizationRole {
392392
Admin,
393393
Collaborator,
394394
Viewer,
395395
}
396396

397-
impl db::model::DatabaseString for OrganizationRoles {
397+
impl db::model::DatabaseString for OrganizationRole {
398398
type Error = anyhow::Error;
399399

400400
fn to_database_string(&self) -> &str {
401401
match self {
402-
OrganizationRoles::Admin => "admin",
403-
OrganizationRoles::Collaborator => "collaborator",
404-
OrganizationRoles::Viewer => "viewer",
402+
OrganizationRole::Admin => "admin",
403+
OrganizationRole::Collaborator => "collaborator",
404+
OrganizationRole::Viewer => "viewer",
405405
}
406406
}
407407

408408
fn from_database_string(s: &str) -> Result<Self, Self::Error> {
409409
match s {
410-
"admin" => Ok(OrganizationRoles::Admin),
411-
"collaborator" => Ok(OrganizationRoles::Collaborator),
412-
"viewer" => Ok(OrganizationRoles::Viewer),
410+
"admin" => Ok(OrganizationRole::Admin),
411+
"collaborator" => Ok(OrganizationRole::Collaborator),
412+
"viewer" => Ok(OrganizationRole::Viewer),
413413
_ => Err(anyhow!(
414414
"unsupported Organization role from database: {:?}",
415415
s
@@ -427,7 +427,7 @@ authz_resource! {
427427
}
428428

429429
impl ApiResourceWithRolesType for Project {
430-
type AllowedRoles = ProjectRoles;
430+
type AllowedRoles = ProjectRole;
431431
}
432432

433433
#[derive(
@@ -445,28 +445,28 @@ impl ApiResourceWithRolesType for Project {
445445
#[cfg_attr(test, derive(EnumIter))]
446446
#[display(style = "kebab-case")]
447447
#[serde(rename_all = "snake_case")]
448-
pub enum ProjectRoles {
448+
pub enum ProjectRole {
449449
Admin,
450450
Collaborator,
451451
Viewer,
452452
}
453453

454-
impl db::model::DatabaseString for ProjectRoles {
454+
impl db::model::DatabaseString for ProjectRole {
455455
type Error = anyhow::Error;
456456

457457
fn to_database_string(&self) -> &str {
458458
match self {
459-
ProjectRoles::Admin => "admin",
460-
ProjectRoles::Collaborator => "collaborator",
461-
ProjectRoles::Viewer => "viewer",
459+
ProjectRole::Admin => "admin",
460+
ProjectRole::Collaborator => "collaborator",
461+
ProjectRole::Viewer => "viewer",
462462
}
463463
}
464464

465465
fn from_database_string(s: &str) -> Result<Self, Self::Error> {
466466
match s {
467-
"admin" => Ok(ProjectRoles::Admin),
468-
"collaborator" => Ok(ProjectRoles::Collaborator),
469-
"viewer" => Ok(ProjectRoles::Viewer),
467+
"admin" => Ok(ProjectRole::Admin),
468+
"collaborator" => Ok(ProjectRole::Collaborator),
469+
"viewer" => Ok(ProjectRole::Viewer),
470470
_ => {
471471
Err(anyhow!("unsupported Project role from database: {:?}", s))
472472
}
@@ -573,7 +573,7 @@ authz_resource! {
573573
}
574574

575575
impl ApiResourceWithRolesType for Silo {
576-
type AllowedRoles = SiloRoles;
576+
type AllowedRoles = SiloRole;
577577
}
578578

579579
#[derive(
@@ -591,28 +591,28 @@ impl ApiResourceWithRolesType for Silo {
591591
#[cfg_attr(test, derive(EnumIter))]
592592
#[display(style = "kebab-case")]
593593
#[serde(rename_all = "snake_case")]
594-
pub enum SiloRoles {
594+
pub enum SiloRole {
595595
Admin,
596596
Collaborator,
597597
Viewer,
598598
}
599599

600-
impl db::model::DatabaseString for SiloRoles {
600+
impl db::model::DatabaseString for SiloRole {
601601
type Error = anyhow::Error;
602602

603603
fn to_database_string(&self) -> &str {
604604
match self {
605-
SiloRoles::Admin => "admin",
606-
SiloRoles::Collaborator => "collaborator",
607-
SiloRoles::Viewer => "viewer",
605+
SiloRole::Admin => "admin",
606+
SiloRole::Collaborator => "collaborator",
607+
SiloRole::Viewer => "viewer",
608608
}
609609
}
610610

611611
fn from_database_string(s: &str) -> Result<Self, Self::Error> {
612612
match s {
613-
"admin" => Ok(SiloRoles::Admin),
614-
"collaborator" => Ok(SiloRoles::Collaborator),
615-
"viewer" => Ok(SiloRoles::Viewer),
613+
"admin" => Ok(SiloRole::Admin),
614+
"collaborator" => Ok(SiloRole::Collaborator),
615+
"viewer" => Ok(SiloRole::Viewer),
616616
_ => Err(anyhow!("unsupported Silo role from database: {:?}", s)),
617617
}
618618
}
@@ -676,24 +676,24 @@ authz_resource! {
676676

677677
#[cfg(test)]
678678
mod test {
679-
use super::FleetRoles;
680-
use super::OrganizationRoles;
681-
use super::ProjectRoles;
682-
use super::SiloRoles;
679+
use super::FleetRole;
680+
use super::OrganizationRole;
681+
use super::ProjectRole;
682+
use super::SiloRole;
683683
use crate::db::model::test_database_string_impl;
684684

685685
#[test]
686686
fn test_roles_database_strings() {
687-
test_database_string_impl::<FleetRoles, _>(
687+
test_database_string_impl::<FleetRole, _>(
688688
"tests/output/authz-roles-fleet.txt",
689689
);
690-
test_database_string_impl::<SiloRoles, _>(
690+
test_database_string_impl::<SiloRole, _>(
691691
"tests/output/authz-roles-silo.txt",
692692
);
693-
test_database_string_impl::<OrganizationRoles, _>(
693+
test_database_string_impl::<OrganizationRole, _>(
694694
"tests/output/authz-roles-organization.txt",
695695
);
696-
test_database_string_impl::<ProjectRoles, _>(
696+
test_database_string_impl::<ProjectRole, _>(
697697
"tests/output/authz-roles-project.txt",
698698
);
699699
}

nexus/src/db/fixed_data/role_builtin.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -104,12 +104,12 @@ mod test {
104104
// resource must have a corresponding entry in BUILTIN_ROLES above.
105105
// The reverse is not necessarily true because we have some internal
106106
// roles that are not exposed to end users.
107-
check_public_roles::<authz::FleetRoles>(ResourceType::Fleet);
108-
check_public_roles::<authz::SiloRoles>(ResourceType::Silo);
109-
check_public_roles::<authz::OrganizationRoles>(
107+
check_public_roles::<authz::FleetRole>(ResourceType::Fleet);
108+
check_public_roles::<authz::SiloRole>(ResourceType::Silo);
109+
check_public_roles::<authz::OrganizationRole>(
110110
ResourceType::Organization,
111111
);
112-
check_public_roles::<authz::ProjectRoles>(ResourceType::Project);
112+
check_public_roles::<authz::ProjectRole>(ResourceType::Project);
113113
}
114114

115115
fn check_public_roles<T>(resource_type: ResourceType)

nexus/src/external_api/http_entrypoints.rs

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ pub fn external_api() -> NexusApiDescription {
264264
}]
265265
async fn policy_get(
266266
rqctx: Arc<RequestContext<Arc<ServerContext>>>,
267-
) -> Result<HttpResponseOk<shared::Policy<authz::FleetRoles>>, HttpError> {
267+
) -> Result<HttpResponseOk<shared::Policy<authz::FleetRole>>, HttpError> {
268268
let apictx = rqctx.context();
269269
let nexus = &apictx.nexus;
270270

@@ -284,8 +284,8 @@ async fn policy_get(
284284
}]
285285
async fn policy_put(
286286
rqctx: Arc<RequestContext<Arc<ServerContext>>>,
287-
new_policy: TypedBody<shared::Policy<authz::FleetRoles>>,
288-
) -> Result<HttpResponseOk<shared::Policy<authz::FleetRoles>>, HttpError> {
287+
new_policy: TypedBody<shared::Policy<authz::FleetRole>>,
288+
) -> Result<HttpResponseOk<shared::Policy<authz::FleetRole>>, HttpError> {
289289
let apictx = rqctx.context();
290290
let nexus = &apictx.nexus;
291291
let new_policy = new_policy.into_inner();
@@ -421,7 +421,7 @@ async fn silos_delete_silo(
421421
async fn silos_get_silo_policy(
422422
rqctx: Arc<RequestContext<Arc<ServerContext>>>,
423423
path_params: Path<SiloPathParam>,
424-
) -> Result<HttpResponseOk<shared::Policy<authz::SiloRoles>>, HttpError> {
424+
) -> Result<HttpResponseOk<shared::Policy<authz::SiloRole>>, HttpError> {
425425
let apictx = rqctx.context();
426426
let nexus = &apictx.nexus;
427427
let path = path_params.into_inner();
@@ -444,8 +444,8 @@ async fn silos_get_silo_policy(
444444
async fn silos_put_silo_policy(
445445
rqctx: Arc<RequestContext<Arc<ServerContext>>>,
446446
path_params: Path<SiloPathParam>,
447-
new_policy: TypedBody<shared::Policy<authz::SiloRoles>>,
448-
) -> Result<HttpResponseOk<shared::Policy<authz::SiloRoles>>, HttpError> {
447+
new_policy: TypedBody<shared::Policy<authz::SiloRole>>,
448+
) -> Result<HttpResponseOk<shared::Policy<authz::SiloRole>>, HttpError> {
449449
let apictx = rqctx.context();
450450
let nexus = &apictx.nexus;
451451
let path = path_params.into_inner();
@@ -725,7 +725,7 @@ async fn organizations_put_organization(
725725
async fn organization_get_policy(
726726
rqctx: Arc<RequestContext<Arc<ServerContext>>>,
727727
path_params: Path<OrganizationPathParam>,
728-
) -> Result<HttpResponseOk<shared::Policy<authz::OrganizationRoles>>, HttpError>
728+
) -> Result<HttpResponseOk<shared::Policy<authz::OrganizationRole>>, HttpError>
729729
{
730730
let apictx = rqctx.context();
731731
let nexus = &apictx.nexus;
@@ -750,8 +750,8 @@ async fn organization_get_policy(
750750
async fn organization_put_policy(
751751
rqctx: Arc<RequestContext<Arc<ServerContext>>>,
752752
path_params: Path<OrganizationPathParam>,
753-
new_policy: TypedBody<shared::Policy<authz::OrganizationRoles>>,
754-
) -> Result<HttpResponseOk<shared::Policy<authz::OrganizationRoles>>, HttpError>
753+
new_policy: TypedBody<shared::Policy<authz::OrganizationRole>>,
754+
) -> Result<HttpResponseOk<shared::Policy<authz::OrganizationRole>>, HttpError>
755755
{
756756
let apictx = rqctx.context();
757757
let nexus = &apictx.nexus;
@@ -957,7 +957,7 @@ async fn organization_projects_put_project(
957957
async fn organization_projects_get_project_policy(
958958
rqctx: Arc<RequestContext<Arc<ServerContext>>>,
959959
path_params: Path<ProjectPathParam>,
960-
) -> Result<HttpResponseOk<shared::Policy<authz::ProjectRoles>>, HttpError> {
960+
) -> Result<HttpResponseOk<shared::Policy<authz::ProjectRole>>, HttpError> {
961961
let apictx = rqctx.context();
962962
let nexus = &apictx.nexus;
963963
let path = path_params.into_inner();
@@ -983,8 +983,8 @@ async fn organization_projects_get_project_policy(
983983
async fn organization_projects_put_project_policy(
984984
rqctx: Arc<RequestContext<Arc<ServerContext>>>,
985985
path_params: Path<ProjectPathParam>,
986-
new_policy: TypedBody<shared::Policy<authz::ProjectRoles>>,
987-
) -> Result<HttpResponseOk<shared::Policy<authz::ProjectRoles>>, HttpError> {
986+
new_policy: TypedBody<shared::Policy<authz::ProjectRole>>,
987+
) -> Result<HttpResponseOk<shared::Policy<authz::ProjectRole>>, HttpError> {
988988
let apictx = rqctx.context();
989989
let nexus = &apictx.nexus;
990990
let path = path_params.into_inner();

0 commit comments

Comments
 (0)