@@ -47,7 +47,7 @@ impl From<PolicyQueried> for Policy {
47
47
schema_name : value. schema_name ,
48
48
is_permissive : value. is_permissive == "PERMISSIVE" ,
49
49
command : PolicyCommand :: from ( value. command ) ,
50
- role_names : value. role_names . unwrap_or ( vec ! [ ] ) ,
50
+ role_names : value. role_names . unwrap_or_default ( ) ,
51
51
security_qualification : value. security_qualification ,
52
52
with_check : value. with_check ,
53
53
}
@@ -187,7 +187,7 @@ mod tests {
187
187
. unwrap ( ) ;
188
188
assert_eq ! ( public_policy. table_name, "users" ) ;
189
189
assert_eq ! ( public_policy. schema_name, "public" ) ;
190
- assert_eq ! ( public_policy. is_permissive, true ) ;
190
+ assert ! ( public_policy. is_permissive) ;
191
191
assert_eq ! ( public_policy. command, PolicyCommand :: Select ) ;
192
192
assert_eq ! ( public_policy. role_names, vec![ "public" ] ) ;
193
193
assert_eq ! ( public_policy. security_qualification, Some ( "true" . into( ) ) ) ;
@@ -200,7 +200,7 @@ mod tests {
200
200
. unwrap ( ) ;
201
201
assert_eq ! ( admin_policy. table_name, "users" ) ;
202
202
assert_eq ! ( admin_policy. schema_name, "public" ) ;
203
- assert_eq ! ( admin_policy. is_permissive, true ) ;
203
+ assert ! ( admin_policy. is_permissive) ;
204
204
assert_eq ! ( admin_policy. command, PolicyCommand :: All ) ;
205
205
assert_eq ! ( admin_policy. role_names, vec![ "admin" ] ) ;
206
206
assert_eq ! ( admin_policy. security_qualification, None ) ;
@@ -213,7 +213,7 @@ mod tests {
213
213
. unwrap ( ) ;
214
214
assert_eq ! ( owner_policy. table_name, "properties" ) ;
215
215
assert_eq ! ( owner_policy. schema_name, "real_estate" ) ;
216
- assert_eq ! ( owner_policy. is_permissive, true ) ;
216
+ assert ! ( owner_policy. is_permissive) ;
217
217
assert_eq ! ( owner_policy. command, PolicyCommand :: Update ) ;
218
218
assert_eq ! ( owner_policy. role_names, vec![ "owner" ] ) ;
219
219
assert_eq ! (
0 commit comments