Page Menu
Home
Sealhub
Search
Configure Global Search
Log In
Files
F995463
and.test.ts
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Flag For Later
Size
3 KB
Referenced Files
None
Subscribers
None
and.test.ts
View Options
import
assert
from
"assert"
;
import
Bluebird
from
"bluebird"
;
import
{
App
,
Collection
,
FieldTypes
,
Policies
}
from
"../../main.js"
;
import
{
TestAppConstructor
,
withRunningApp
,
}
from
"../../test_utils/with-test-app.js"
;
import
create_policies
from
"../../test_utils/policy-types/create-policies-with-complex-pipeline.js"
;
import
And
from
"./and.js"
;
import
{
assertThrowsAsync
}
from
"../../test_utils/assert-throws-async.js"
;
import
{
TestApp
}
from
"../../test_utils/test-app.js"
;
const
[
ComplexDenyPipeline
,
ComplexAllowPipeline
]
=
create_policies
.
allowDeny
();
const
collections_to_create
=
[
{
name
:
"collection-and(nested-and(allow,public),nested-or(allow,noone))"
,
policies
:
[
new
And
([
new
ComplexAllowPipeline
(),
new
Policies
.
Public
()]),
new
Policies
.
Or
([
new
ComplexAllowPipeline
(),
new
Policies
.
Noone
()]),
],
},
{
name
:
"collection-and(ComplexAllowPipeline,noone)"
,
policies
:
[
new
ComplexAllowPipeline
(),
new
Policies
.
Noone
()],
},
{
name
:
"collection-and(ComplexAllowPipeline,public)"
,
policies
:
[
new
ComplexAllowPipeline
(),
new
Policies
.
Public
()],
},
{
name
:
"collection-and(complexDenyPipeline,public)"
,
policies
:
[
new
ComplexDenyPipeline
(),
new
Policies
.
Public
()],
},
];
function
extend
(
t
:
TestAppConstructor
)
{
const
collections
:
{
[
name
:
string
]
:
Collection
}
=
{};
for
(
const
{
name
,
policies
}
of
collections_to_create
)
{
collections
[
name
]
=
new
(
class
extends
Collection
{
name
=
name
;
fields
=
{
number
:
new
FieldTypes
.
SingleReference
(
"numbers"
),
};
policies
=
{
list
:
new
And
(
policies
),
show
:
new
And
(
policies
),
create
:
new
Policies
.
Public
(),
};
})();
}
return
class
extends
t
{
collections
=
{
...
TestApp
.
BaseCollections
,
...
collections
,
numbers
:
new
(
class
extends
Collection
{
name
=
"numbers"
;
fields
=
{
number
:
new
FieldTypes
.
Int
(),
};
})(),
};
};
}
describe
(
"AndPolicy"
,
()
=>
{
async
function
setup
(
app
:
App
)
{
let
numbers
=
await
Bluebird
.
map
([
0
,
1
,
2
],
(
n
)
=>
app
.
collections
.
numbers
.
suCreate
({
number
:
n
,
})
);
for
(
const
number
of
numbers
)
{
await
Bluebird
.
map
(
collections_to_create
,
({
name
})
=>
app
.
collections
[
name
].
suCreate
({
number
:
number
.
id
,
})
);
}
}
it
(
"return everything for collection-and(nested-and(allow,public),nested-or(allow,noone))"
,
()
=>
withRunningApp
(
extend
,
async
({
app
,
rest_api
})
=>
{
await
setup
(
app
);
return
rest_api
.
get
(
"/api/v1/collections/collection-and(nested-and(allow,public),nested-or(allow,noone))"
)
.
then
(({
items
}
:
{
items
:
any
[]
})
=>
assert
.
equal
(
items
.
length
,
3
)
);
}));
it
(
"returns nothing for and(ComplexAllowPipeline,noone)"
,
()
=>
withRunningApp
(
extend
,
async
({
app
,
rest_api
})
=>
{
await
setup
(
app
);
await
assertThrowsAsync
(
()
=>
rest_api
.
get
(
"/api/v1/collections/collection-and(ComplexAllowPipeline,noone)"
),
(
e
)
=>
{
assert
.
equal
(
e
.
response
.
data
.
message
,
app
.
i18n
(
"policy_noone_deny"
)
);
}
);
}));
it
(
"returns everything for and(ComplexAllowPipeline,public)"
,
()
=>
withRunningApp
(
extend
,
async
({
app
,
rest_api
})
=>
{
await
setup
(
app
);
const
{
items
}
=
await
rest_api
.
get
(
"/api/v1/collections/collection-and(ComplexAllowPipeline,public)"
);
assert
.
strictEqual
(
items
.
length
,
3
);
}));
it
(
"returns nothing for and(complex-deny-pipeline,public)"
,
()
=>
withRunningApp
(
extend
,
async
({
app
,
rest_api
})
=>
{
await
setup
(
app
);
const
{
items
}
=
await
rest_api
.
get
(
"/api/v1/collections/collection-and(complexDenyPipeline,public)"
);
assert
.
strictEqual
(
items
.
length
,
0
);
}));
describe
(
".isItemSensitive()"
,
()
=>
{
it
(
"Properly makes the decision about isItemSensitive when one of the policies uses async isItemSensitive"
,
()
=>
withRunningApp
(
extend
,
async
({
app
})
=>
{
const
policy
=
new
Policies
.
And
([
new
Policies
.
Public
()]);
assert
.
equal
(
await
policy
.
isItemSensitive
(
new
app
.
Context
()),
false
);
}));
});
});
File Metadata
Details
Attached
Mime Type
text/x-java
Expires
Mon, Dec 23, 05:18 (18 h, 39 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
556013
Default Alt Text
and.test.ts (3 KB)
Attached To
Mode
rS Sealious
Attached
Detach File
Event Timeline
Log In to Comment