mirror of
https://github.com/hasura/graphql-engine.git
synced 2024-12-14 08:02:15 +03:00
c2cb07f7e8
We use a helper service to start a webhook-based authentication service for some tests. This moves the initialization of the service out of _test-server.sh_ and into the Python test harness, as a fixture. In order to do this, I had to make a few changes. The main deviation is that we no longer run _all_ tests against an HGE with this authentication service, just a few (those in _test_webhook.py_). Because this reduced coverage, I have added some more tests there, which actually cover some areas not exacerbated elsewhere (mainly trying to use webhook credentials to talk to an admin-only endpoint). The webhook service can run both with and without TLS, and decide whether it's necessary to skip one of these based on the arguments passed and how HGE is started, according to the following logic: * If a TLS CA certificate is passed in, it will run with TLS, otherwise it will skip it. * If HGE was started externally and a TLS certificate is provided, it will skip running without TLS, as it will assume that HGE was configured to talk to a webhook over HTTPS. * Some tests should only be run with TLS; this is marked with a `tls_webhook_server` marker. * Some tests should only be run _without_ TLS; this is marked with a `no_tls_webhook_server` marker. The actual parameterization of the webhook service configuration is done through test subclasses, because normal pytest parameterization doesn't work with the `hge_fixture_env` hack that we use. Because `hge_fixture_env` is not a sanctioned way of conveying data between fixtures (and, unfortunately, there isn't a sanctioned way of doing this when the fixtures in question may not know about each other directly), parameterizing the `webhook_server` fixture doesn't actually parameterize `hge_server` properly. Subclassing forces this to work correctly. The certificate generation is moved to a Python fixture, so that we don't have to revoke the CA certificate for _test_webhook_insecure.py_; we can just generate a bogus certificate instead. The CA certificate is still generated in the _test-server.sh_ script, as it needs to be installed into the OS certificate store. Interestingly, the CA certificate installation wasn't actually working, because the certificates were written to the wrong location. This didn't cause any failures, as we weren't actually testing this behavior. This is now fixed with the other changes. PR-URL: https://github.com/hasura/graphql-engine-mono/pull/6363 GitOrigin-RevId: 0f277d374daa64f657257ed2a4c2057c74b911db
153 lines
4.8 KiB
Python
153 lines
4.8 KiB
Python
import pytest
|
|
from validate import check_query
|
|
import validate
|
|
from context import GQLWsClient
|
|
|
|
usefixtures = pytest.mark.usefixtures
|
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
class TestV1Alpha1GraphQLErrors:
|
|
|
|
@classmethod
|
|
def dir(cls):
|
|
return 'queries/graphql_query/v1alpha1/errors'
|
|
|
|
def test_v1alpha1_authorization_error(self, hge_ctx):
|
|
gql_query = """
|
|
query {
|
|
author {
|
|
id
|
|
name
|
|
}
|
|
}
|
|
"""
|
|
http_conf = {
|
|
'url': '/v1alpha1/graphql',
|
|
'status': 200,
|
|
'query': {'query': gql_query},
|
|
}
|
|
|
|
if hge_ctx.hge_key is not None and not hge_ctx.webhook and hge_ctx.hge_jwt_key is None:
|
|
# Test whether it is forbidden when incorrect/no admin_secret is specified
|
|
validate.test_forbidden_when_admin_secret_reqd(hge_ctx, http_conf)
|
|
elif hge_ctx.webhook:
|
|
# Check whether the output is also forbidden when webhook returns forbidden
|
|
validate.test_forbidden_webhook(hge_ctx, http_conf)
|
|
else:
|
|
assert True
|
|
|
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
|
def test_v1alpha1_validation_error(self, hge_ctx, transport):
|
|
gql_query = """
|
|
query {
|
|
author {
|
|
id
|
|
name
|
|
notPresentCol
|
|
}
|
|
}
|
|
"""
|
|
http_conf = {
|
|
'url': '/v1alpha1/graphql',
|
|
'status': 400,
|
|
'query': {'query': gql_query},
|
|
'response': {
|
|
"errors": [{
|
|
"extensions": {
|
|
"path": "$.selectionSet.author.selectionSet.notPresentCol",
|
|
"code": "validation-failed"
|
|
},
|
|
"message": "field 'notPresentCol' not found in type: 'author'"
|
|
}]
|
|
}
|
|
}
|
|
ws_conf = {
|
|
'url': '/v1alpha1/graphql',
|
|
'query': {'query': gql_query},
|
|
'response': {
|
|
"path": "$.selectionSet.author.selectionSet.notPresentCol",
|
|
"code": "validation-failed",
|
|
"error": "field 'notPresentCol' not found in type: 'author'"
|
|
}
|
|
}
|
|
|
|
if transport == 'http':
|
|
check_query(hge_ctx, http_conf, transport)
|
|
elif transport == 'websocket':
|
|
check_query(hge_ctx, ws_conf, transport)
|
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
|
def test_v1alpha1_execution_error(self, hge_ctx, transport):
|
|
mutation = """
|
|
mutation {
|
|
insert_article (objects: [
|
|
{
|
|
title: "test 3"
|
|
content: "test 3 content"
|
|
author_id: 44
|
|
is_published: false
|
|
}
|
|
]) {
|
|
returning {
|
|
id
|
|
}
|
|
}
|
|
}
|
|
"""
|
|
http_conf = {
|
|
'url': '/v1alpha1/graphql',
|
|
'status': 400,
|
|
'query': {'query': mutation},
|
|
'response': {
|
|
"errors": [{
|
|
"extensions": {
|
|
"path": "$.selectionSet.insert_article.args.objects",
|
|
"code": "constraint-violation"
|
|
},
|
|
"message": "Foreign key violation. insert or update on table \"article\" violates foreign key constraint \"article_author_id_fkey\""
|
|
}]
|
|
}
|
|
|
|
}
|
|
|
|
ws_conf = {
|
|
'url': '/v1alpha1/graphql',
|
|
'query': {'query': mutation},
|
|
'response': {
|
|
'data': None,
|
|
"errors": [{
|
|
"path": "$.selectionSet.insert_article.args.objects",
|
|
"error": "Foreign key violation. insert or update on table \"article\" violates foreign key constraint \"article_author_id_fkey\"",
|
|
"code": "constraint-violation"
|
|
}]
|
|
}
|
|
}
|
|
|
|
if transport == 'http':
|
|
check_query(hge_ctx, http_conf, transport)
|
|
elif transport == 'websocket':
|
|
check_query(hge_ctx, ws_conf, transport)
|
|
|
|
|
|
def test_v1alpha1_ws_start_error(self, hge_ctx):
|
|
ws_client = GQLWsClient(hge_ctx, '/v1alpha1/graphql')
|
|
query = {'query': '{ author { name } }'}
|
|
frame = {
|
|
'id': '1',
|
|
'type': 'start',
|
|
'payload': query
|
|
}
|
|
ws_client.ws_active_query_ids.add('1')
|
|
ws_client.send(frame)
|
|
resp = ws_client.get_ws_query_event('1', 10)
|
|
print(resp)
|
|
assert 'type' in resp
|
|
assert resp['type'] == 'error'
|
|
assert 'payload' in resp
|
|
assert resp['payload'] == {
|
|
'path': '$',
|
|
'error': 'start received before the connection is initialised',
|
|
'code': 'start-failed'
|
|
}
|