Skip to content

Commit 6ed29fe

Browse files
committed
Fixup tests and remove beta flag since feature is now released
1 parent d423935 commit 6ed29fe

3 files changed

+12
-16
lines changed

CHANGELOG.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
## Enhancements
66
* Added BETA support for including `projects` relationship and `projects-count` attribute to policy_set on create by @hs26gill [#737](https://github.com/hashicorp/go-tfe/pull/737)
77
* Added BETA method `AddProjects` and `RemoveProjects` for attaching/detaching policy set to projects by @Netra2104 [#735](https://github.com/hashicorp/go-tfe/pull/735)
8-
* Added BETA support for adding and updating custom permissions to `TeamProjectAccesses`. A `TeamProjectAccessType` of `"custom"` can set various permissions applied at
8+
* Added support for adding and updating custom permissions to `TeamProjectAccesses`. A `TeamProjectAccessType` of `"custom"` can set various permissions applied at
99
the project level to the project itself (`ProjectAccessOptions`) and all of the workspaces in a project (`WorkspaceAccessOptions`).[#745](https://github.com/hashicorp/go-tfe/pull/745)
1010

1111
# v1.30.0

team_project_access.go

+5-5
Original file line numberDiff line numberDiff line change
@@ -150,11 +150,11 @@ type WorkspaceAccessPermissionsOptions struct {
150150
SentinelMocks *WorkspaceSentinelMocksPermissionType `json:"sentinel-mocks,omitempty"`
151151
StateVersions *WorkspaceStateVersionsPermissionType `json:"state-versions,omitempty"`
152152
Variables *WorkspaceVariablesPermissionType `json:"variables,omitempty"`
153-
Create bool `json:"create,omitempty"`
154-
Locking bool `json:"locking,omitempty"`
155-
Move bool `json:"move,omitempty"`
156-
Delete bool `json:"delete,omitempty"`
157-
RunTasks bool `json:"run-tasks,omitempty"`
153+
Create bool `json:"create"`
154+
Locking bool `json:"locking"`
155+
Move bool `json:"move"`
156+
Delete bool `json:"delete"`
157+
RunTasks bool `json:"run-tasks"`
158158
}
159159

160160
// TeamProjectAccessListOptions represents the options for listing team project accesses

team_project_access_integration_test.go

+6-10
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,6 @@ func TestTeamProjectAccessesAdd(t *testing.T) {
166166
})
167167

168168
t.Run("with valid options for all custom TeamProject permissions", func(t *testing.T) {
169-
skipUnlessBeta(t)
170169
options := TeamProjectAccessAddOptions{
171170
Access: *ProjectAccess(TeamProjectAccessCustom),
172171
Team: tmTest,
@@ -223,7 +222,6 @@ func TestTeamProjectAccessesAdd(t *testing.T) {
223222
})
224223

225224
t.Run("with valid options for some custom TeamProject permissions", func(t *testing.T) {
226-
skipUnlessBeta(t)
227225
options := TeamProjectAccessAddOptions{
228226
Access: *ProjectAccess(TeamProjectAccessCustom),
229227
Team: tmTest,
@@ -237,12 +235,12 @@ func TestTeamProjectAccessesAdd(t *testing.T) {
237235
}
238236

239237
tpa, err := client.TeamProjectAccess.Add(ctx, options)
240-
defer func() {
238+
t.Cleanup(func() {
241239
err := client.TeamProjectAccess.Remove(ctx, tpa.ID)
242240
if err != nil {
243241
t.Logf("error removing team access (%s): %s", tpa.ID, err)
244242
}
245-
}()
243+
})
246244

247245
require.NoError(t, err)
248246

@@ -303,7 +301,6 @@ func TestTeamProjectAccessesAdd(t *testing.T) {
303301
})
304302

305303
t.Run("when invalid custom project permission is provided in options", func(t *testing.T) {
306-
skipUnlessBeta(t)
307304
tpa, err := client.TeamProjectAccess.Add(ctx, TeamProjectAccessAddOptions{
308305
Access: *ProjectAccess(TeamProjectAccessCustom),
309306
Team: tmTest,
@@ -355,7 +352,6 @@ func TestTeamProjectAccessesUpdate(t *testing.T) {
355352
})
356353

357354
t.Run("with valid custom permissions attributes for all permissions", func(t *testing.T) {
358-
skipUnlessBeta(t)
359355
options := TeamProjectAccessUpdateOptions{
360356
Access: ProjectAccess(TeamProjectAccessCustom),
361357
ProjectAccess: &ProjectAccessPermissionsOptions{
@@ -377,7 +373,8 @@ func TestTeamProjectAccessesUpdate(t *testing.T) {
377373

378374
tpa, err := client.TeamProjectAccess.Update(ctx, tpaTest.ID, options)
379375
require.NoError(t, err)
380-
376+
require.NotNil(t, options.ProjectAccess)
377+
require.NotNil(t, options.WorkspaceAccess)
381378
assert.Equal(t, tpa.Access, TeamProjectAccessCustom)
382379
assert.Equal(t, *options.ProjectAccess.Teams, tpa.ProjectAccess.ProjectTeamsPermission)
383380
assert.Equal(t, *options.ProjectAccess.Settings, tpa.ProjectAccess.ProjectSettingsPermission)
@@ -407,7 +404,6 @@ func TestTeamProjectAccessesUpdate(t *testing.T) {
407404
tpaCustomTest, err := client.TeamProjectAccess.Add(ctx, TpaOptions)
408405
require.NoError(t, err)
409406

410-
skipUnlessBeta(t)
411407
options := TeamProjectAccessUpdateOptions{
412408
Access: ProjectAccess(TeamProjectAccessCustom),
413409
ProjectAccess: &ProjectAccessPermissionsOptions{
@@ -420,7 +416,8 @@ func TestTeamProjectAccessesUpdate(t *testing.T) {
420416

421417
tpa, err := client.TeamProjectAccess.Update(ctx, tpaCustomTest.ID, options)
422418
require.NoError(t, err)
423-
419+
require.NotNil(t, options.ProjectAccess)
420+
require.NotNil(t, options.WorkspaceAccess)
424421
assert.Equal(t, *options.ProjectAccess.Teams, tpa.ProjectAccess.ProjectTeamsPermission)
425422
assert.Equal(t, false, tpa.WorkspaceAccess.WorkspaceCreatePermission)
426423
// assert that other attributes remain the same
@@ -433,7 +430,6 @@ func TestTeamProjectAccessesUpdate(t *testing.T) {
433430
assert.Equal(t, tpaCustomTest.WorkspaceAccess.WorkspaceStateVersionsPermission, tpa.WorkspaceAccess.WorkspaceStateVersionsPermission)
434431
})
435432
t.Run("with invalid custom permissions attributes", func(t *testing.T) {
436-
skipUnlessBeta(t)
437433
options := TeamProjectAccessUpdateOptions{
438434
Access: ProjectAccess(TeamProjectAccessCustom),
439435
ProjectAccess: &ProjectAccessPermissionsOptions{

0 commit comments

Comments
 (0)