-
Notifications
You must be signed in to change notification settings - Fork 51
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
PR(TEST): Add P2P <> Doc Actor Relationship Tests
CI TEMP
- Loading branch information
1 parent
f5c312d
commit f9ed0ca
Showing
2 changed files
with
444 additions
and
0 deletions.
There are no files selected for viewing
219 changes: 219 additions & 0 deletions
219
tests/integration/acp/p2p/replicator_with_doc_actor_relationship_test.go
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,219 @@ | ||
// Copyright 2024 Democratized Data Foundation | ||
// | ||
// Use of this software is governed by the Business Source License | ||
// included in the file licenses/BSL.txt. | ||
// | ||
// As of the Change Date specified in that file, in accordance with | ||
// the Business Source License, use of this software will be governed | ||
// by the Apache License, Version 2.0, included in the file | ||
// licenses/APL.txt. | ||
|
||
package test_acp_p2p | ||
|
||
import ( | ||
"fmt" | ||
"testing" | ||
|
||
"github.com/sourcenetwork/immutable" | ||
|
||
testUtils "github.com/sourcenetwork/defradb/tests/integration" | ||
) | ||
|
||
func TestACP_P2PReplicatorWithPermissionedCollectionCreateDocActorRelationship_SourceHubACP(t *testing.T) { | ||
expectedPolicyID := "fc56b7509c20ac8ce682b3b9b4fdaad868a9c70dda6ec16720298be64f16e9a4" | ||
|
||
test := testUtils.TestCase{ | ||
|
||
Description: "Test acp, p2p replicator with collection that has a policy, create a new doc-actor relationship", | ||
|
||
SupportedACPTypes: immutable.Some( | ||
[]testUtils.ACPType{ | ||
testUtils.SourceHubACPType, | ||
}, | ||
), | ||
|
||
Actions: []any{ | ||
testUtils.RandomNetworkingConfig(), | ||
|
||
testUtils.RandomNetworkingConfig(), | ||
|
||
testUtils.AddPolicy{ | ||
|
||
Identity: immutable.Some(1), | ||
|
||
Policy: ` | ||
name: Test Policy | ||
description: A Policy | ||
actor: | ||
name: actor | ||
resources: | ||
users: | ||
permissions: | ||
read: | ||
expr: owner + reader + writer | ||
write: | ||
expr: owner + writer | ||
nothing: | ||
expr: dummy | ||
relations: | ||
owner: | ||
types: | ||
- actor | ||
reader: | ||
types: | ||
- actor | ||
writer: | ||
types: | ||
- actor | ||
admin: | ||
manages: | ||
- reader | ||
types: | ||
- actor | ||
dummy: | ||
types: | ||
- actor | ||
`, | ||
|
||
ExpectedPolicyID: expectedPolicyID, | ||
}, | ||
|
||
testUtils.SchemaUpdate{ | ||
Schema: fmt.Sprintf(` | ||
type Users @policy( | ||
id: "%s", | ||
resource: "users" | ||
) { | ||
name: String | ||
age: Int | ||
} | ||
`, | ||
expectedPolicyID, | ||
), | ||
}, | ||
|
||
testUtils.ConfigureReplicator{ | ||
SourceNodeID: 0, | ||
|
||
TargetNodeID: 1, | ||
}, | ||
|
||
testUtils.CreateDoc{ | ||
Identity: immutable.Some(1), | ||
|
||
NodeID: immutable.Some(0), | ||
|
||
CollectionID: 0, | ||
|
||
DocMap: map[string]any{ | ||
"name": "Shahzad", | ||
}, | ||
}, | ||
|
||
testUtils.WaitForSync{}, | ||
|
||
testUtils.Request{ | ||
// Ensure that the document is hidden on all nodes to an unauthorized actor | ||
Identity: immutable.Some(2), | ||
|
||
Request: ` | ||
query { | ||
Users { | ||
name | ||
} | ||
} | ||
`, | ||
|
||
Results: map[string]any{ | ||
"Users": []map[string]any{}, | ||
}, | ||
}, | ||
|
||
testUtils.AddDocActorRelationship{ | ||
NodeID: immutable.Some(0), | ||
|
||
RequestorIdentity: 1, | ||
|
||
TargetIdentity: 2, | ||
|
||
CollectionID: 0, | ||
|
||
DocID: 0, | ||
|
||
Relation: "reader", | ||
|
||
ExpectedExistence: false, | ||
}, | ||
|
||
testUtils.AddDocActorRelationship{ | ||
NodeID: immutable.Some(1), // Note: Different node than the previous | ||
|
||
RequestorIdentity: 1, | ||
|
||
TargetIdentity: 2, | ||
|
||
CollectionID: 0, | ||
|
||
DocID: 0, | ||
|
||
Relation: "reader", | ||
|
||
ExpectedExistence: true, // Making the same relation through any node should be a no-op | ||
}, | ||
|
||
testUtils.Request{ | ||
// Ensure that the document is now accessible on all nodes to the newly authorized actor. | ||
Identity: immutable.Some(2), | ||
|
||
Request: ` | ||
query { | ||
Users { | ||
name | ||
} | ||
} | ||
`, | ||
|
||
Results: map[string]any{ | ||
"Users": []map[string]any{ | ||
{ | ||
"name": "Shahzad", | ||
}, | ||
}, | ||
}, | ||
}, | ||
|
||
testUtils.Request{ | ||
// Ensure that the document is still accessible on all nodes to the owner. | ||
Identity: immutable.Some(1), | ||
|
||
Request: ` | ||
query { | ||
Users { | ||
name | ||
} | ||
} | ||
`, | ||
|
||
Results: map[string]any{ | ||
"Users": []map[string]any{ | ||
{ | ||
"name": "Shahzad", | ||
}, | ||
}, | ||
}, | ||
}, | ||
}, | ||
} | ||
|
||
testUtils.ExecuteTestCase(t, test) | ||
} |
Oops, something went wrong.