@@ -47,7 +47,7 @@ impl From<PolicyQueried> for Policy {
4747 schema_name : value. schema_name ,
4848 is_permissive : value. is_permissive == "PERMISSIVE" ,
4949 command : PolicyCommand :: from ( value. command ) ,
50- role_names : value. role_names . unwrap_or ( vec ! [ ] ) ,
50+ role_names : value. role_names . unwrap_or_default ( ) ,
5151 security_qualification : value. security_qualification ,
5252 with_check : value. with_check ,
5353 }
@@ -187,7 +187,7 @@ mod tests {
187187 . unwrap ( ) ;
188188 assert_eq ! ( public_policy. table_name, "users" ) ;
189189 assert_eq ! ( public_policy. schema_name, "public" ) ;
190- assert_eq ! ( public_policy. is_permissive, true ) ;
190+ assert ! ( public_policy. is_permissive) ;
191191 assert_eq ! ( public_policy. command, PolicyCommand :: Select ) ;
192192 assert_eq ! ( public_policy. role_names, vec![ "public" ] ) ;
193193 assert_eq ! ( public_policy. security_qualification, Some ( "true" . into( ) ) ) ;
@@ -200,7 +200,7 @@ mod tests {
200200 . unwrap ( ) ;
201201 assert_eq ! ( admin_policy. table_name, "users" ) ;
202202 assert_eq ! ( admin_policy. schema_name, "public" ) ;
203- assert_eq ! ( admin_policy. is_permissive, true ) ;
203+ assert ! ( admin_policy. is_permissive) ;
204204 assert_eq ! ( admin_policy. command, PolicyCommand :: All ) ;
205205 assert_eq ! ( admin_policy. role_names, vec![ "admin" ] ) ;
206206 assert_eq ! ( admin_policy. security_qualification, None ) ;
@@ -213,7 +213,7 @@ mod tests {
213213 . unwrap ( ) ;
214214 assert_eq ! ( owner_policy. table_name, "properties" ) ;
215215 assert_eq ! ( owner_policy. schema_name, "real_estate" ) ;
216- assert_eq ! ( owner_policy. is_permissive, true ) ;
216+ assert ! ( owner_policy. is_permissive) ;
217217 assert_eq ! ( owner_policy. command, PolicyCommand :: Update ) ;
218218 assert_eq ! ( owner_policy. role_names, vec![ "owner" ] ) ;
219219 assert_eq ! (
0 commit comments