Skip to content

Commit 64ed64a

Browse files
easyCZroboquat
authored andcommitted
[pat] Remove description field
1 parent 10ede9c commit 64ed64a

File tree

8 files changed

+147
-185
lines changed

8 files changed

+147
-185
lines changed

components/gitpod-db/go/dbtest/personal_access_token.go

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ func NewPersonalAccessToken(t *testing.T, record db.PersonalAccessToken) db.Pers
2626
UserID: uuid.New(),
2727
Hash: "some-secure-hash",
2828
Name: "some-name",
29-
Description: "some-description",
3029
Scopes: []string{"read", "write"},
3130
ExpirationTime: now.Add(5 * time.Hour),
3231
CreatedAt: now,
@@ -49,10 +48,6 @@ func NewPersonalAccessToken(t *testing.T, record db.PersonalAccessToken) db.Pers
4948
result.Name = record.Name
5049
}
5150

52-
if record.Description != "" {
53-
result.Description = record.Description
54-
}
55-
5651
if len(record.Scopes) == 0 {
5752
result.Scopes = record.Scopes
5853
}

components/gitpod-db/go/personal_access_token.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@ type PersonalAccessToken struct {
2121
UserID uuid.UUID `gorm:"column:userId;type:varchar;size:255;" json:"userId"`
2222
Hash string `gorm:"column:hash;type:varchar;size:255;" json:"hash"`
2323
Name string `gorm:"column:name;type:varchar;size:255;" json:"name"`
24-
Description string `gorm:"column:description;type:varchar;size:255;" json:"description"`
2524
Scopes Scopes `gorm:"column:scopes;type:text;size:65535;" json:"scopes"`
2625
ExpirationTime time.Time `gorm:"column:expirationTime;type:timestamp;" json:"expirationTime"`
2726
CreatedAt time.Time `gorm:"column:createdAt;type:timestamp;default:CURRENT_TIMESTAMP(6);" json:"createdAt"`
@@ -72,7 +71,6 @@ func CreatePersonalAccessToken(ctx context.Context, conn *gorm.DB, req PersonalA
7271
UserID: req.UserID,
7372
Hash: req.Hash,
7473
Name: req.Name,
75-
Description: req.Description,
7674
Scopes: req.Scopes,
7775
ExpirationTime: req.ExpirationTime,
7876
CreatedAt: now,

components/gitpod-db/go/personal_access_token_test.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,6 @@ func TestPersonalAccessToken_Create(t *testing.T) {
6161
UserID: uuid.New(),
6262
Hash: "another-secure-hash",
6363
Name: "another-name",
64-
Description: "another-description",
6564
Scopes: []string{"read", "write"},
6665
ExpirationTime: time.Now().Add(5),
6766
CreatedAt: time.Now(),
@@ -112,7 +111,6 @@ func TestPersonalAccessToken_UpdateHash(t *testing.T) {
112111
require.Equal(t, token.UserID, returned.UserID)
113112
require.Equal(t, newHash, returned.Hash)
114113
require.Equal(t, token.Name, returned.Name)
115-
require.Equal(t, token.Description, returned.Description)
116114
require.Equal(t, token.Scopes, returned.Scopes)
117115
require.Equal(t, newExpirationTime, returned.ExpirationTime)
118116
require.Equal(t, token.CreatedAt, returned.CreatedAt)

components/public-api-server/pkg/apiv1/tokens.go

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,6 @@ func (s *TokensService) CreatePersonalAccessToken(ctx context.Context, req *conn
5050
return nil, connect.NewError(connect.CodeInvalidArgument, errors.New("Token Name is a required parameter."))
5151
}
5252

53-
description := strings.TrimSpace(tokenReq.GetDescription())
54-
5553
expiry := tokenReq.GetExpirationTime()
5654
if !expiry.IsValid() {
5755
return nil, connect.NewError(connect.CodeInvalidArgument, errors.New("Received invalid Expiration Time, it is a required parameter."))
@@ -88,7 +86,6 @@ func (s *TokensService) CreatePersonalAccessToken(ctx context.Context, req *conn
8886
UserID: userID,
8987
Hash: hash,
9088
Name: name,
91-
Description: description,
9289
Scopes: scopes,
9390
ExpirationTime: expiry.AsTime().UTC(),
9491
})
@@ -326,7 +323,6 @@ func personalAccessTokenToAPI(t db.PersonalAccessToken, value string) *v1.Person
326323
// value is only present when the token is first created, or regenerated. It's empty for all subsequent requests.
327324
Value: value,
328325
Name: t.Name,
329-
Description: t.Description,
330326
Scopes: t.Scopes,
331327
ExpirationTime: timestamppb.New(t.ExpirationTime),
332328
CreatedAt: timestamppb.New(t.CreatedAt),

components/public-api-server/pkg/apiv1/tokens_test.go

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,6 @@ func TestTokensService_CreatePersonalAccessTokenWithoutFeatureFlag(t *testing.T)
106106

107107
token := &v1.PersonalAccessToken{
108108
Name: "my-token",
109-
Description: "my description",
110109
ExpirationTime: timestamppb.Now(),
111110
}
112111

@@ -122,7 +121,6 @@ func TestTokensService_CreatePersonalAccessTokenWithoutFeatureFlag(t *testing.T)
122121

123122
require.NotEmpty(t, created.GetId())
124123
require.Equal(t, token.Name, created.GetName())
125-
require.Equal(t, token.Description, created.GetDescription())
126124
require.Equal(t, token.Scopes, created.GetScopes())
127125
requireEqualProto(t, token.GetExpirationTime(), created.GetExpirationTime())
128126

@@ -425,7 +423,6 @@ func TestTokensService_RegeneratePersonalAccessToken(t *testing.T) {
425423
require.Equal(t, origResponse.Msg.Token.Id, response.Msg.Token.Id)
426424
require.NotEqual(t, "", response.Msg.Token.Value)
427425
require.Equal(t, origResponse.Msg.Token.Name, response.Msg.Token.Name)
428-
require.Equal(t, origResponse.Msg.Token.Description, response.Msg.Token.Description)
429426
require.Equal(t, origResponse.Msg.Token.Scopes, response.Msg.Token.Scopes)
430427
require.Equal(t, newTimestamp.AsTime(), response.Msg.Token.ExpirationTime.AsTime())
431428
require.Equal(t, origResponse.Msg.Token.CreatedAt, response.Msg.Token.CreatedAt)

components/public-api/gitpod/experimental/v1/tokens.proto

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,20 +22,17 @@ message PersonalAccessToken {
2222
// name is the name of the token for humans, set by the user
2323
string name = 3;
2424

25-
// description is the description of the token set by the user
26-
string description = 4;
27-
2825
// expiration_time is the time when the token expires
2926
// Read only.
30-
google.protobuf.Timestamp expiration_time = 5;
27+
google.protobuf.Timestamp expiration_time = 4;
3128

3229
// scopes are the permission scopes attached to this token.
3330
// By default, no scopes are attached and therefore no access is granted to this token.
3431
// Specifying '*' grants all permissions the owner of the token has.
35-
repeated string scopes = 6;
32+
repeated string scopes = 5;
3633

3734
// created_time is the time when the token was first created.
38-
google.protobuf.Timestamp created_at = 7;
35+
google.protobuf.Timestamp created_at = 6;
3936
}
4037

4138
service TokensService {

0 commit comments

Comments
 (0)