Skip to content

Commit 463fe6b

Browse files
clippy
1 parent 4767efd commit 463fe6b

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

crates/pgt_schema_cache/src/policies.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ impl From<PolicyQueried> for Policy {
4747
schema_name: value.schema_name,
4848
is_permissive: value.is_permissive == "PERMISSIVE",
4949
command: PolicyCommand::from(value.command),
50-
role_names: value.role_names.unwrap_or(vec![]),
50+
role_names: value.role_names.unwrap_or_default(),
5151
security_qualification: value.security_qualification,
5252
with_check: value.with_check,
5353
}
@@ -187,7 +187,7 @@ mod tests {
187187
.unwrap();
188188
assert_eq!(public_policy.table_name, "users");
189189
assert_eq!(public_policy.schema_name, "public");
190-
assert_eq!(public_policy.is_permissive, true);
190+
assert!(public_policy.is_permissive);
191191
assert_eq!(public_policy.command, PolicyCommand::Select);
192192
assert_eq!(public_policy.role_names, vec!["public"]);
193193
assert_eq!(public_policy.security_qualification, Some("true".into()));
@@ -200,7 +200,7 @@ mod tests {
200200
.unwrap();
201201
assert_eq!(admin_policy.table_name, "users");
202202
assert_eq!(admin_policy.schema_name, "public");
203-
assert_eq!(admin_policy.is_permissive, true);
203+
assert!(admin_policy.is_permissive);
204204
assert_eq!(admin_policy.command, PolicyCommand::All);
205205
assert_eq!(admin_policy.role_names, vec!["admin"]);
206206
assert_eq!(admin_policy.security_qualification, None);
@@ -213,7 +213,7 @@ mod tests {
213213
.unwrap();
214214
assert_eq!(owner_policy.table_name, "properties");
215215
assert_eq!(owner_policy.schema_name, "real_estate");
216-
assert_eq!(owner_policy.is_permissive, true);
216+
assert!(owner_policy.is_permissive);
217217
assert_eq!(owner_policy.command, PolicyCommand::Update);
218218
assert_eq!(owner_policy.role_names, vec!["owner"]);
219219
assert_eq!(

0 commit comments

Comments
 (0)