1
0
mirror of https://github.com/sasjs/server.git synced 2025-12-11 03:34:35 +00:00

chore: fix specs

This commit is contained in:
2022-07-30 00:18:02 +05:00
parent 8a3054e19a
commit b7dff341f0

View File

@@ -7,7 +7,6 @@ import {
DriveController, DriveController,
UserController, UserController,
GroupController, GroupController,
ClientController,
PermissionController, PermissionController,
PrincipalType, PrincipalType,
PermissionSetting PermissionSetting
@@ -69,7 +68,6 @@ const group = {
const userController = new UserController() const userController = new UserController()
const groupController = new GroupController() const groupController = new GroupController()
const clientController = new ClientController()
const permissionController = new PermissionController() const permissionController = new PermissionController()
describe('permission', () => { describe('permission', () => {
@@ -478,16 +476,16 @@ describe('permission', () => {
expect(res.body).toHaveLength(2) expect(res.body).toHaveLength(2)
}) })
it('should give a list of all permissions when user is not admin', async () => { it(`should give a list of user's own permissions when user is not admin`, async () => {
const dbUser = await userController.createUser({ const nonAdminUser = await userController.createUser({
...user, ...user,
username: 'get' + user.username username: 'get' + user.username
}) })
const accessToken = await generateAndSaveToken(dbUser.id) const accessToken = await generateAndSaveToken(nonAdminUser.id)
await permissionController.createPermission({ await permissionController.createPermission({
uri: '/SASjsApi/permission', uri: '/test-1',
principalType: PrincipalType.user, principalType: PrincipalType.user,
principalId: dbUser.id, principalId: nonAdminUser.id,
setting: PermissionSetting.grant setting: PermissionSetting.grant
}) })
@@ -497,11 +495,11 @@ describe('permission', () => {
.send() .send()
.expect(200) .expect(200)
expect(res.body).toHaveLength(3) expect(res.body).toHaveLength(1)
}) })
}) })
describe.only('verify', () => { describe('verify', () => {
beforeAll(async () => { beforeAll(async () => {
await permissionController.createPermission({ await permissionController.createPermission({
...permission, ...permission,