Skip to content

Commit a83a11c

Browse files
committed
add beta flags
1 parent c8d742c commit a83a11c

File tree

2 files changed

+7
-1
lines changed

2 files changed

+7
-1
lines changed

CHANGELOG.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
## Enhancements
66
* Added BETA support for including `projects` relationship and `projects-count` attribute to policy_set on create by @hs26gill [#737](https://github.com/hashicorp/go-tfe/pull/737)
77
* Added BETA method `AddProjects` and `RemoveProjects` for attaching/detaching policy set to projects by @Netra2104 [#735](https://github.com/hashicorp/go-tfe/pull/735)
8-
* Added support for adding and updating custom permissions to `TeamProjectAccesses`. A `TeamProjectAccessType` of `"custom"` can set various permissions applied at
8+
* Added BETA support for adding and updating custom permissions to `TeamProjectAccesses`. A `TeamProjectAccessType` of `"custom"` can set various permissions applied at
99
the project level to the project itself (`ProjectAccessOptions`) and all of the workspaces in a project (`WorkspaceAccessOptions`).[#745](https://github.com/hashicorp/go-tfe/pull/745)
1010

1111
# v1.30.0

team_project_access_integration_test.go

+6
Original file line numberDiff line numberDiff line change
@@ -166,6 +166,7 @@ func TestTeamProjectAccessesAdd(t *testing.T) {
166166
})
167167

168168
t.Run("with valid options for all custom TeamProject permissions", func(t *testing.T) {
169+
skipUnlessBeta(t)
169170
options := TeamProjectAccessAddOptions{
170171
Access: *ProjectAccess(TeamProjectAccessCustom),
171172
Team: tmTest,
@@ -222,6 +223,7 @@ func TestTeamProjectAccessesAdd(t *testing.T) {
222223
})
223224

224225
t.Run("with valid options for some custom TeamProject permissions", func(t *testing.T) {
226+
skipUnlessBeta(t)
225227
options := TeamProjectAccessAddOptions{
226228
Access: *ProjectAccess(TeamProjectAccessCustom),
227229
Team: tmTest,
@@ -301,6 +303,7 @@ func TestTeamProjectAccessesAdd(t *testing.T) {
301303
})
302304

303305
t.Run("when invalid custom project permission is provided in options", func(t *testing.T) {
306+
skipUnlessBeta(t)
304307
tpa, err := client.TeamProjectAccess.Add(ctx, TeamProjectAccessAddOptions{
305308
Access: *ProjectAccess(TeamProjectAccessCustom),
306309
Team: tmTest,
@@ -352,6 +355,7 @@ func TestTeamProjectAccessesUpdate(t *testing.T) {
352355
})
353356

354357
t.Run("with valid custom permissions attributes for all permissions", func(t *testing.T) {
358+
skipUnlessBeta(t)
355359
options := TeamProjectAccessUpdateOptions{
356360
Access: ProjectAccess(TeamProjectAccessCustom),
357361
ProjectAccess: &ProjectAccessPermissionsOptions{
@@ -390,6 +394,7 @@ func TestTeamProjectAccessesUpdate(t *testing.T) {
390394
})
391395

392396
t.Run("with valid custom permissions attributes for some permissions", func(t *testing.T) {
397+
skipUnlessBeta(t)
393398
// create tpaCustomTest to verify unupdated attributes stay the same for custom permissions
394399
// because going from admin to read to custom changes the values of all custom permissions
395400
tm2Test, tm2TestCleanup := createTeam(t, client, orgTest)
@@ -430,6 +435,7 @@ func TestTeamProjectAccessesUpdate(t *testing.T) {
430435
assert.Equal(t, tpaCustomTest.WorkspaceAccess.WorkspaceStateVersionsPermission, tpa.WorkspaceAccess.WorkspaceStateVersionsPermission)
431436
})
432437
t.Run("with invalid custom permissions attributes", func(t *testing.T) {
438+
skipUnlessBeta(t)
433439
options := TeamProjectAccessUpdateOptions{
434440
Access: ProjectAccess(TeamProjectAccessCustom),
435441
ProjectAccess: &ProjectAccessPermissionsOptions{

0 commit comments

Comments
 (0)