1
1
import { initSeed } from 'testkit/seed' ;
2
- import { ResourceAssignmentMode } from '../../testkit/gql/graphql' ;
2
+ import { ResourceAssignmentModeType } from '../../testkit/gql/graphql' ;
3
3
import { getServiceHost } from '../../testkit/utils' ;
4
4
5
5
test ( '/:targetId > operation is accepted with wildcard access token' , async ( ) => {
@@ -12,7 +12,7 @@ test('/:targetId > operation is accepted with wildcard access token', async () =
12
12
const accessToken = await createOrganizationAccessToken ( {
13
13
permissions : [ 'usage:report' ] ,
14
14
resources : {
15
- mode : ResourceAssignmentMode . All ,
15
+ mode : ResourceAssignmentModeType . All ,
16
16
} ,
17
17
} ) ;
18
18
@@ -71,12 +71,12 @@ test('/:targetId > operation is denied without access to target', async () => {
71
71
const accessToken = await createOrganizationAccessToken ( {
72
72
permissions : [ 'usage:report' ] ,
73
73
resources : {
74
- mode : ResourceAssignmentMode . Granular ,
74
+ mode : ResourceAssignmentModeType . Granular ,
75
75
projects : [
76
76
{
77
77
projectId : project . id ,
78
78
targets : {
79
- mode : ResourceAssignmentMode . Granular ,
79
+ mode : ResourceAssignmentModeType . Granular ,
80
80
targets : [ ] ,
81
81
} ,
82
82
} ,
@@ -133,22 +133,22 @@ test('/:targetId > operation is accepted with specific access to target', async
133
133
const accessToken = await createOrganizationAccessToken ( {
134
134
permissions : [ 'usage:report' ] ,
135
135
resources : {
136
- mode : ResourceAssignmentMode . Granular ,
136
+ mode : ResourceAssignmentModeType . Granular ,
137
137
projects : [
138
138
{
139
139
projectId : project . id ,
140
140
targets : {
141
- mode : ResourceAssignmentMode . Granular ,
141
+ mode : ResourceAssignmentModeType . Granular ,
142
142
targets : [
143
143
{
144
144
targetId : target . id ,
145
145
services : {
146
146
services : [ ] ,
147
- mode : ResourceAssignmentMode . Granular ,
147
+ mode : ResourceAssignmentModeType . Granular ,
148
148
} ,
149
149
appDeployments : {
150
150
appDeployments : [ ] ,
151
- mode : ResourceAssignmentMode . Granular ,
151
+ mode : ResourceAssignmentModeType . Granular ,
152
152
} ,
153
153
} ,
154
154
] ,
@@ -213,7 +213,7 @@ test('/:orgSlug/:projectSlug/:targetSlug > operation is accepted with wildcard a
213
213
const accessToken = await createOrganizationAccessToken ( {
214
214
permissions : [ 'usage:report' ] ,
215
215
resources : {
216
- mode : ResourceAssignmentMode . All ,
216
+ mode : ResourceAssignmentModeType . All ,
217
217
} ,
218
218
} ) ;
219
219
@@ -275,12 +275,12 @@ test('/:orgSlug/:projectSlug/:targetSlug > operation is denied without access to
275
275
const accessToken = await createOrganizationAccessToken ( {
276
276
permissions : [ 'usage:report' ] ,
277
277
resources : {
278
- mode : ResourceAssignmentMode . Granular ,
278
+ mode : ResourceAssignmentModeType . Granular ,
279
279
projects : [
280
280
{
281
281
projectId : project . id ,
282
282
targets : {
283
- mode : ResourceAssignmentMode . Granular ,
283
+ mode : ResourceAssignmentModeType . Granular ,
284
284
targets : [ ] ,
285
285
} ,
286
286
} ,
@@ -340,22 +340,22 @@ test('/:orgSlug/:projectSlug/:targetSlug > operation is accepted with specific a
340
340
const accessToken = await createOrganizationAccessToken ( {
341
341
permissions : [ 'usage:report' ] ,
342
342
resources : {
343
- mode : ResourceAssignmentMode . Granular ,
343
+ mode : ResourceAssignmentModeType . Granular ,
344
344
projects : [
345
345
{
346
346
projectId : project . id ,
347
347
targets : {
348
- mode : ResourceAssignmentMode . Granular ,
348
+ mode : ResourceAssignmentModeType . Granular ,
349
349
targets : [
350
350
{
351
351
targetId : target . id ,
352
352
services : {
353
353
services : [ ] ,
354
- mode : ResourceAssignmentMode . Granular ,
354
+ mode : ResourceAssignmentModeType . Granular ,
355
355
} ,
356
356
appDeployments : {
357
357
appDeployments : [ ] ,
358
- mode : ResourceAssignmentMode . Granular ,
358
+ mode : ResourceAssignmentModeType . Granular ,
359
359
} ,
360
360
} ,
361
361
] ,
0 commit comments