Skip to content

Commit 37fd121

Browse files
committed
rbac
1 parent c610ea0 commit 37fd121

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

src/tests/e2e/rbac.e2e.spec.ts

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ test('Permission check e2e test', async (t) => {
1414
try {
1515
logger.info('initial setup of objects');
1616
const document = await permit.api.resources.create({
17-
key: 'document',
17+
key: 'document_test_rbac',
1818
name: 'Document',
1919
urn: 'prn:gdrive:document',
2020
description: 'google drive document',
@@ -35,7 +35,7 @@ test('Permission check e2e test', async (t) => {
3535
// verify create output
3636
t.not(document, null);
3737
t.not(document.id, null);
38-
t.is(document.key, 'document');
38+
t.is(document.key, 'document_test_rbac');
3939
t.is(document.name, 'Document');
4040
t.is(document.description, 'google drive document');
4141
t.is(document.urn, 'prn:gdrive:document');
@@ -56,14 +56,14 @@ test('Permission check e2e test', async (t) => {
5656

5757
// create admin role
5858
const admin = await permit.api.roles.create({
59-
key: 'admin',
59+
key: 'admin_test_rbac',
6060
name: 'Admin',
6161
description: 'an admin role',
6262
permissions: ['document:create', 'document:read'],
6363
});
6464

6565
t.not(admin, null);
66-
t.is(admin.key, 'admin');
66+
t.is(admin.key, 'admin_test_rbac');
6767
t.is(admin.name, 'Admin');
6868
t.is(admin.description, 'an admin role');
6969
t.not(admin.permissions, undefined);
@@ -72,13 +72,13 @@ test('Permission check e2e test', async (t) => {
7272

7373
// create viewer role
7474
const viewer = await permit.api.roles.create({
75-
key: 'viewer',
75+
key: 'viewer_test_rbac',
7676
name: 'Viewer',
7777
description: 'an viewer role',
7878
});
7979

8080
t.not(viewer, null);
81-
t.is(viewer.key, 'viewer');
81+
t.is(viewer.key, 'viewer_test_rbac');
8282
t.is(viewer.name, 'Viewer');
8383
t.is(viewer.description, 'an viewer role');
8484
t.not(viewer.permissions, undefined);
@@ -94,12 +94,12 @@ test('Permission check e2e test', async (t) => {
9494

9595
// create a tenant
9696
const tenant = await permit.api.tenants.create({
97-
key: 'tesla',
97+
key: 'tesla_test_rbac',
9898
name: 'Tesla Inc',
9999
description: 'The car company',
100100
});
101101

102-
t.is(tenant.key, 'tesla');
102+
t.is(tenant.key, 'tesla_test_rbac');
103103
t.is(tenant.name, 'Tesla Inc');
104104
t.is(tenant.description, 'The car company');
105105
t.is(tenant.attributes, null);
@@ -152,7 +152,7 @@ test('Permission check e2e test', async (t) => {
152152
'auth0|elon',
153153
'read',
154154
// a 'document' belonging to 'tesla' (ownership based on tenant)
155-
{ type: 'document', tenant: 'tesla', attributes: resourceAttributes },
155+
{ type: 'document_test_rbac', tenant: 'tesla_test_rbac', attributes: resourceAttributes },
156156
),
157157
);
158158

@@ -229,10 +229,10 @@ test('Permission check e2e test', async (t) => {
229229
// cleanup
230230
try {
231231
await permit.api.users.delete('auth0|elon');
232-
await permit.api.tenants.delete('tesla');
233-
await permit.api.roles.delete('admin');
234-
await permit.api.roles.delete('viewer');
235-
await permit.api.resources.delete('document');
232+
await permit.api.tenants.delete('tesla_test_rbac');
233+
await permit.api.roles.delete('admin_test_rbac');
234+
await permit.api.roles.delete('viewer_test_rbac');
235+
await permit.api.resources.delete('document_test_rbac');
236236
t.is((await permit.api.resources.list()).length, 0);
237237
t.is((await permit.api.roles.list()).length, 0);
238238
t.is((await permit.api.tenants.list()).length, 1); // the default tenant

0 commit comments

Comments
 (0)