@@ -53,7 +53,7 @@ import (
5353 headerv1 "github.com/gravitational/teleport/api/gen/proto/go/teleport/header/v1"
5454 identitycenterv1 "github.com/gravitational/teleport/api/gen/proto/go/teleport/identitycenter/v1"
5555 mfav1 "github.com/gravitational/teleport/api/gen/proto/go/teleport/mfa/v1"
56- accessv1 "github.com/gravitational/teleport/api/gen/proto/go/teleport/scopes/access/v1"
56+ scopedaccessv1 "github.com/gravitational/teleport/api/gen/proto/go/teleport/scopes/access/v1"
5757 trustpb "github.com/gravitational/teleport/api/gen/proto/go/teleport/trust/v1"
5858 userpreferencesv1 "github.com/gravitational/teleport/api/gen/proto/go/userpreferences/v1"
5959 "github.com/gravitational/teleport/api/metadata"
@@ -82,7 +82,7 @@ import (
8282 "github.com/gravitational/teleport/lib/modules"
8383 "github.com/gravitational/teleport/lib/modules/modulestest"
8484 "github.com/gravitational/teleport/lib/okta/oktatest"
85- scopedrole "github.com/gravitational/teleport/lib/scopes/roles "
85+ scopedaccess "github.com/gravitational/teleport/lib/scopes/access "
8686 "github.com/gravitational/teleport/lib/services"
8787 "github.com/gravitational/teleport/lib/services/local"
8888 "github.com/gravitational/teleport/lib/session"
@@ -9937,10 +9937,10 @@ func TestScopedRoleEvents(t *testing.T) {
99379937 watcher , err := client .NewWatcher (ctx , types.Watch {
99389938 Kinds : []types.WatchKind {
99399939 {
9940- Kind : scopedrole .KindScopedRole ,
9940+ Kind : scopedaccess .KindScopedRole ,
99419941 },
99429942 {
9943- Kind : scopedrole .KindScopedRoleAssignment ,
9943+ Kind : scopedaccess .KindScopedRoleAssignment ,
99449944 },
99459945 },
99469946 })
@@ -9969,31 +9969,31 @@ func TestScopedRoleEvents(t *testing.T) {
99699969 require .Equal (t , types .OpInit , event .Type )
99709970
99719971 // Create a ScopedRole and verify create event is well-formed.
9972- role := & accessv1 .ScopedRole {
9973- Kind : scopedrole .KindScopedRole ,
9972+ role := & scopedaccessv1 .ScopedRole {
9973+ Kind : scopedaccess .KindScopedRole ,
99749974 Metadata : & headerv1.Metadata {
99759975 Name : "test-role" ,
99769976 },
99779977 Scope : "/" ,
9978- Spec : & accessv1 .ScopedRoleSpec {
9978+ Spec : & scopedaccessv1 .ScopedRoleSpec {
99799979 AssignableScopes : []string {"/foo" , "/bar" },
99809980 },
99819981 Version : types .V1 ,
99829982 }
99839983
9984- crsp , err := service .CreateScopedRole (ctx , & accessv1 .CreateScopedRoleRequest {
9984+ crsp , err := service .CreateScopedRole (ctx , & scopedaccessv1 .CreateScopedRoleRequest {
99859985 Role : role ,
99869986 })
99879987 require .NoError (t , err )
99889988
99899989 event = getNextEvent ()
99909990 require .Equal (t , types .OpPut , event .Type )
99919991
9992- resource := (event .Resource ).(types.Resource153UnwrapperT [* accessv1 .ScopedRole ]).UnwrapT ()
9992+ resource := (event .Resource ).(types.Resource153UnwrapperT [* scopedaccessv1 .ScopedRole ]).UnwrapT ()
99939993 require .Empty (t , cmp .Diff (crsp .Role , resource , protocmp .Transform () /* deliberately not ignoring revision */ ))
99949994
99959995 // delete the role and verify delete event is well-formed.
9996- _ , err = service .DeleteScopedRole (ctx , & accessv1 .DeleteScopedRoleRequest {
9996+ _ , err = service .DeleteScopedRole (ctx , & scopedaccessv1 .DeleteScopedRoleRequest {
99979997 Name : role .Metadata .Name ,
99989998 })
99999999 require .NoError (t , err )
@@ -10002,29 +10002,29 @@ func TestScopedRoleEvents(t *testing.T) {
1000210002 require .Equal (t , types .OpDelete , event .Type )
1000310003
1000410004 require .Empty (t , cmp .Diff (& types.ResourceHeader {
10005- Kind : scopedrole .KindScopedRole ,
10005+ Kind : scopedaccess .KindScopedRole ,
1000610006 Metadata : types.Metadata {
1000710007 Name : role .Metadata .Name ,
1000810008 },
1000910009 }, event .Resource .(* types.ResourceHeader ), protocmp .Transform ()))
1001010010
1001110011 // recreate scoped role so that we can use it for testing assignment events
10012- crsp , err = service .CreateScopedRole (ctx , & accessv1 .CreateScopedRoleRequest {
10012+ crsp , err = service .CreateScopedRole (ctx , & scopedaccessv1 .CreateScopedRoleRequest {
1001310013 Role : role ,
1001410014 })
1001510015 require .NoError (t , err )
1001610016
1001710017 _ = getNextEvent () // drain the role create event
1001810018
10019- assignment := & accessv1 .ScopedRoleAssignment {
10020- Kind : scopedrole .KindScopedRoleAssignment ,
10019+ assignment := & scopedaccessv1 .ScopedRoleAssignment {
10020+ Kind : scopedaccess .KindScopedRoleAssignment ,
1002110021 Metadata : & headerv1.Metadata {
1002210022 Name : uuid .New ().String (),
1002310023 },
1002410024 Scope : "/" ,
10025- Spec : & accessv1 .ScopedRoleAssignmentSpec {
10025+ Spec : & scopedaccessv1 .ScopedRoleAssignmentSpec {
1002610026 User : "alice" ,
10027- Assignments : []* accessv1 .Assignment {
10027+ Assignments : []* scopedaccessv1 .Assignment {
1002810028 {
1002910029 Role : role .Metadata .Name ,
1003010030 Scope : "/foo" ,
@@ -10034,7 +10034,7 @@ func TestScopedRoleEvents(t *testing.T) {
1003410034 Version : types .V1 ,
1003510035 }
1003610036
10037- acrsp , err := service .CreateScopedRoleAssignment (ctx , & accessv1 .CreateScopedRoleAssignmentRequest {
10037+ acrsp , err := service .CreateScopedRoleAssignment (ctx , & scopedaccessv1 .CreateScopedRoleAssignmentRequest {
1003810038 Assignment : assignment ,
1003910039 RoleRevisions : map [string ]string {
1004010040 role .Metadata .Name : crsp .Role .Metadata .Revision ,
@@ -10044,11 +10044,11 @@ func TestScopedRoleEvents(t *testing.T) {
1004410044
1004510045 event = getNextEvent ()
1004610046 require .Equal (t , types .OpPut , event .Type )
10047- assignmentResource := (event .Resource ).(types.Resource153UnwrapperT [* accessv1 .ScopedRoleAssignment ]).UnwrapT ()
10047+ assignmentResource := (event .Resource ).(types.Resource153UnwrapperT [* scopedaccessv1 .ScopedRoleAssignment ]).UnwrapT ()
1004810048 require .Empty (t , cmp .Diff (acrsp .Assignment , assignmentResource , protocmp .Transform () /* deliberately not ignoring revision */ ))
1004910049
1005010050 // delete the assignment and verify delete event is well-formed.
10051- _ , err = service .DeleteScopedRoleAssignment (ctx , & accessv1 .DeleteScopedRoleAssignmentRequest {
10051+ _ , err = service .DeleteScopedRoleAssignment (ctx , & scopedaccessv1 .DeleteScopedRoleAssignmentRequest {
1005210052 Name : assignment .Metadata .Name ,
1005310053 })
1005410054 require .NoError (t , err )
@@ -10057,7 +10057,7 @@ func TestScopedRoleEvents(t *testing.T) {
1005710057 require .Equal (t , types .OpDelete , event .Type )
1005810058
1005910059 require .Empty (t , cmp .Diff (& types.ResourceHeader {
10060- Kind : scopedrole .KindScopedRoleAssignment ,
10060+ Kind : scopedaccess .KindScopedRoleAssignment ,
1006110061 Metadata : types.Metadata {
1006210062 Name : assignment .Metadata .Name ,
1006310063 },
0 commit comments