@@ -14,7 +14,7 @@ test('Permission check e2e test', async (t) => {
14
14
try {
15
15
logger . info ( 'initial setup of objects' ) ;
16
16
const document = await permit . api . resources . create ( {
17
- key : 'document ' ,
17
+ key : 'document_test_rbac ' ,
18
18
name : 'Document' ,
19
19
urn : 'prn:gdrive:document' ,
20
20
description : 'google drive document' ,
@@ -35,7 +35,7 @@ test('Permission check e2e test', async (t) => {
35
35
// verify create output
36
36
t . not ( document , null ) ;
37
37
t . not ( document . id , null ) ;
38
- t . is ( document . key , 'document ' ) ;
38
+ t . is ( document . key , 'document_test_rbac ' ) ;
39
39
t . is ( document . name , 'Document' ) ;
40
40
t . is ( document . description , 'google drive document' ) ;
41
41
t . is ( document . urn , 'prn:gdrive:document' ) ;
@@ -56,14 +56,14 @@ test('Permission check e2e test', async (t) => {
56
56
57
57
// create admin role
58
58
const admin = await permit . api . roles . create ( {
59
- key : 'admin ' ,
59
+ key : 'admin_test_rbac ' ,
60
60
name : 'Admin' ,
61
61
description : 'an admin role' ,
62
62
permissions : [ 'document:create' , 'document:read' ] ,
63
63
} ) ;
64
64
65
65
t . not ( admin , null ) ;
66
- t . is ( admin . key , 'admin ' ) ;
66
+ t . is ( admin . key , 'admin_test_rbac ' ) ;
67
67
t . is ( admin . name , 'Admin' ) ;
68
68
t . is ( admin . description , 'an admin role' ) ;
69
69
t . not ( admin . permissions , undefined ) ;
@@ -72,13 +72,13 @@ test('Permission check e2e test', async (t) => {
72
72
73
73
// create viewer role
74
74
const viewer = await permit . api . roles . create ( {
75
- key : 'viewer ' ,
75
+ key : 'viewer_test_rbac ' ,
76
76
name : 'Viewer' ,
77
77
description : 'an viewer role' ,
78
78
} ) ;
79
79
80
80
t . not ( viewer , null ) ;
81
- t . is ( viewer . key , 'viewer ' ) ;
81
+ t . is ( viewer . key , 'viewer_test_rbac ' ) ;
82
82
t . is ( viewer . name , 'Viewer' ) ;
83
83
t . is ( viewer . description , 'an viewer role' ) ;
84
84
t . not ( viewer . permissions , undefined ) ;
@@ -94,12 +94,12 @@ test('Permission check e2e test', async (t) => {
94
94
95
95
// create a tenant
96
96
const tenant = await permit . api . tenants . create ( {
97
- key : 'tesla ' ,
97
+ key : 'tesla_test_rbac ' ,
98
98
name : 'Tesla Inc' ,
99
99
description : 'The car company' ,
100
100
} ) ;
101
101
102
- t . is ( tenant . key , 'tesla ' ) ;
102
+ t . is ( tenant . key , 'tesla_test_rbac ' ) ;
103
103
t . is ( tenant . name , 'Tesla Inc' ) ;
104
104
t . is ( tenant . description , 'The car company' ) ;
105
105
t . is ( tenant . attributes , null ) ;
@@ -152,7 +152,7 @@ test('Permission check e2e test', async (t) => {
152
152
'auth0|elon' ,
153
153
'read' ,
154
154
// a 'document' belonging to 'tesla' (ownership based on tenant)
155
- { type : 'document ' , tenant : 'tesla ' , attributes : resourceAttributes } ,
155
+ { type : 'document_test_rbac ' , tenant : 'tesla_test_rbac ' , attributes : resourceAttributes } ,
156
156
) ,
157
157
) ;
158
158
@@ -229,10 +229,10 @@ test('Permission check e2e test', async (t) => {
229
229
// cleanup
230
230
try {
231
231
await permit . api . users . delete ( 'auth0|elon' ) ;
232
- await permit . api . tenants . delete ( 'tesla ' ) ;
233
- await permit . api . roles . delete ( 'admin ' ) ;
234
- await permit . api . roles . delete ( 'viewer ' ) ;
235
- await permit . api . resources . delete ( 'document ' ) ;
232
+ await permit . api . tenants . delete ( 'tesla_test_rbac ' ) ;
233
+ await permit . api . roles . delete ( 'admin_test_rbac ' ) ;
234
+ await permit . api . roles . delete ( 'viewer_test_rbac ' ) ;
235
+ await permit . api . resources . delete ( 'document_test_rbac ' ) ;
236
236
t . is ( ( await permit . api . resources . list ( ) ) . length , 0 ) ;
237
237
t . is ( ( await permit . api . roles . list ( ) ) . length , 0 ) ;
238
238
t . is ( ( await permit . api . tenants . list ( ) ) . length , 1 ) ; // the default tenant
0 commit comments