mirror of
https://github.com/hasura/graphql-engine.git
synced 2024-12-15 01:12:56 +03:00
1a5aaae9cf
This argument allows the user to specify how to run HGE, rather than starting it beforehand. The runner will start a new instance of HGE for each test class. This does not provide isolation, as the database is still re-used, but it helps us get closer. You can try it yourself by executing: ``` $ cabal build graphql-engine:exe:graphql-engine $ ./server/tests-py/run-new.sh ``` This doesn't affect CI at all. I also fixed a few warnings flagged by Pylance. PR-URL: https://github.com/hasura/graphql-engine-mono/pull/5881 GitOrigin-RevId: ea6f0fd631a2c278b2c6b50e9dbdd9d804ebc9d4
64 lines
2.5 KiB
Python
64 lines
2.5 KiB
Python
import ruamel.yaml as yaml
|
|
import re
|
|
import json
|
|
|
|
class TestConfigAPI():
|
|
def test_config_api_user_role_error(self, hge_ctx):
|
|
admin_secret = hge_ctx.hge_key
|
|
auth_hook = hge_ctx.hge_webhook
|
|
jwt_conf = hge_ctx.hge_jwt_conf
|
|
if jwt_conf is not None:
|
|
jwt_conf_dict = json.loads(hge_ctx.hge_jwt_conf)
|
|
|
|
headers = { 'x-hasura-role': 'user' }
|
|
if admin_secret is not None:
|
|
headers['x-hasura-admin-secret'] = admin_secret
|
|
|
|
resp = hge_ctx.http.get(hge_ctx.hge_url + '/v1alpha1/config', headers=headers)
|
|
|
|
assert resp.status_code == 400, resp
|
|
|
|
def test_config_api(self, hge_ctx):
|
|
admin_secret = hge_ctx.hge_key
|
|
auth_hook = hge_ctx.hge_webhook
|
|
jwt_conf = hge_ctx.hge_jwt_conf
|
|
if jwt_conf is not None:
|
|
jwt_conf_dict = json.loads(hge_ctx.hge_jwt_conf)
|
|
else:
|
|
jwt_conf_dict = None
|
|
|
|
headers = { 'x-hasura-role': 'admin' }
|
|
if admin_secret is not None:
|
|
headers['x-hasura-admin-secret'] = admin_secret
|
|
|
|
resp = hge_ctx.http.get(hge_ctx.hge_url + '/v1alpha1/config', headers=headers)
|
|
|
|
assert resp.status_code == 200, resp
|
|
|
|
body = resp.json()
|
|
assert body['is_admin_secret_set'] == (admin_secret is not None)
|
|
assert body['is_auth_hook_set'] == (auth_hook is not None)
|
|
assert body['is_jwt_set'] == (jwt_conf is not None)
|
|
|
|
if jwt_conf_dict:
|
|
claims_format = "json"
|
|
if 'claims_namespace_path' in jwt_conf_dict:
|
|
assert body['jwt']['claims_namespace_path'] == jwt_conf_dict['claims_namespace_path']
|
|
assert body['jwt']['claims_format'] == claims_format
|
|
else:
|
|
claims_namespace = "https://hasura.io/jwt/claims"
|
|
if 'claims_namespace' in jwt_conf_dict:
|
|
claims_namespace = jwt_conf_dict['claims_namespace']
|
|
if 'claims_format' in jwt_conf_dict:
|
|
claims_format = jwt_conf_dict['claims_format']
|
|
assert body['jwt']['claims_namespace'] == claims_namespace
|
|
assert body['jwt']['claims_format'] == claims_format
|
|
else:
|
|
assert body['jwt'] == []
|
|
|
|
# test if the request fails without auth headers if admin secret is set
|
|
if admin_secret is not None:
|
|
resp = hge_ctx.http.get(hge_ctx.hge_url + '/v1alpha1/config')
|
|
body = resp.json()
|
|
assert ((resp.status_code == 401) or (resp.status_code == 400))
|