mirror of
https://github.com/node-red/node-red.git
synced 2025-03-01 10:36:34 +00:00
Fix type checking in unit tests
This commit is contained in:
@@ -20,37 +20,37 @@ var permissions = require("../../../../red/api/auth/permissions");
|
||||
describe("Auth permissions", function() {
|
||||
describe("hasPermission", function() {
|
||||
it('a user with no permissions',function() {
|
||||
permissions.hasPermission([],"*").should.be.false;
|
||||
permissions.hasPermission([],"*").should.be.false();
|
||||
});
|
||||
it('a user with global permissions',function() {
|
||||
permissions.hasPermission("*","read").should.be.true;
|
||||
permissions.hasPermission(["*"],"write").should.be.true;
|
||||
permissions.hasPermission("*","read").should.be.true();
|
||||
permissions.hasPermission(["*"],"write").should.be.true();
|
||||
});
|
||||
it('a user with read permissions',function() {
|
||||
permissions.hasPermission(["read"],"read").should.be.true;
|
||||
permissions.hasPermission(["read"],"node.read").should.be.true;
|
||||
permissions.hasPermission(["read"],"write").should.be.false;
|
||||
permissions.hasPermission(["read"],"node.write").should.be.false;
|
||||
permissions.hasPermission(["*.read"],"read").should.be.true;
|
||||
permissions.hasPermission(["*.read"],"node.read").should.be.true;
|
||||
permissions.hasPermission(["*.read"],"write").should.be.false;
|
||||
permissions.hasPermission(["*.read"],"node.write").should.be.false;
|
||||
permissions.hasPermission(["read"],"read").should.be.true();
|
||||
permissions.hasPermission(["read"],"node.read").should.be.true();
|
||||
permissions.hasPermission(["read"],"write").should.be.false();
|
||||
permissions.hasPermission(["read"],"node.write").should.be.false();
|
||||
permissions.hasPermission(["*.read"],"read").should.be.true();
|
||||
permissions.hasPermission(["*.read"],"node.read").should.be.true();
|
||||
permissions.hasPermission(["*.read"],"write").should.be.false();
|
||||
permissions.hasPermission(["*.read"],"node.write").should.be.false();
|
||||
});
|
||||
it('a user with foo permissions',function() {
|
||||
permissions.hasPermission("foo","foo").should.be.true;
|
||||
permissions.hasPermission("foo","foo").should.be.true();
|
||||
});
|
||||
it('an array of permissions', function() {
|
||||
permissions.hasPermission(["*"],["foo.read","foo.write"]).should.be.true;
|
||||
permissions.hasPermission("read",["foo.read","foo.write"]).should.be.false;
|
||||
permissions.hasPermission("read",["foo.read","bar.read"]).should.be.true;
|
||||
permissions.hasPermission(["flows.read"],["flows.read"]).should.be.true;
|
||||
permissions.hasPermission(["flows.read"],["flows.write"]).should.be.false;
|
||||
permissions.hasPermission(["flows.read","nodes.write"],["flows.write"]).should.be.false;
|
||||
permissions.hasPermission(["flows.read","nodes.write"],["nodes.write"]).should.be.true;
|
||||
permissions.hasPermission(["*"],["foo.read","foo.write"]).should.be.true();
|
||||
permissions.hasPermission("read",["foo.read","foo.write"]).should.be.false();
|
||||
permissions.hasPermission("read",["foo.read","bar.read"]).should.be.true();
|
||||
permissions.hasPermission(["flows.read"],["flows.read"]).should.be.true();
|
||||
permissions.hasPermission(["flows.read"],["flows.write"]).should.be.false();
|
||||
permissions.hasPermission(["flows.read","nodes.write"],["flows.write"]).should.be.false();
|
||||
permissions.hasPermission(["flows.read","nodes.write"],["nodes.write"]).should.be.true();
|
||||
});
|
||||
it('permits an empty permission', function() {
|
||||
permissions.hasPermission("*","").should.be.true;
|
||||
permissions.hasPermission("read",[""]).should.be.true;
|
||||
permissions.hasPermission("*","").should.be.true();
|
||||
permissions.hasPermission("read",[""]).should.be.true();
|
||||
});
|
||||
});
|
||||
});
|
||||
|
@@ -44,7 +44,7 @@ describe("Auth strategies", function() {
|
||||
strategies.passwordTokenExchange({},"user","password","scope",function(err,token) {
|
||||
try {
|
||||
should.not.exist(err);
|
||||
token.should.be.false;
|
||||
token.should.be.false();
|
||||
done();
|
||||
} catch(e) {
|
||||
done(e);
|
||||
@@ -60,7 +60,7 @@ describe("Auth strategies", function() {
|
||||
strategies.passwordTokenExchange({},"user","password","*",function(err,token) {
|
||||
try {
|
||||
should.not.exist(err);
|
||||
token.should.be.false;
|
||||
token.should.be.false();
|
||||
done();
|
||||
} catch(e) {
|
||||
done(e);
|
||||
@@ -138,7 +138,7 @@ describe("Auth strategies", function() {
|
||||
strategies.bearerStrategy("1234",function(err,user) {
|
||||
try {
|
||||
should.not.exist(err);
|
||||
user.should.be.false;
|
||||
user.should.be.false();
|
||||
done();
|
||||
} catch(e) {
|
||||
done(e);
|
||||
@@ -221,7 +221,7 @@ describe("Auth strategies", function() {
|
||||
strategies.clientPasswordStrategy(testClient.id,"invalid_secret",function(err,client) {
|
||||
try {
|
||||
should.not.exist(err);
|
||||
client.should.be.false;
|
||||
client.should.be.false();
|
||||
done();
|
||||
} catch(e) {
|
||||
done(e);
|
||||
@@ -237,7 +237,7 @@ describe("Auth strategies", function() {
|
||||
strategies.clientPasswordStrategy("invalid_id","invalid_secret",function(err,client) {
|
||||
try {
|
||||
should.not.exist(err);
|
||||
client.should.be.false;
|
||||
client.should.be.false();
|
||||
done();
|
||||
} catch(e) {
|
||||
done(e);
|
||||
@@ -259,7 +259,7 @@ describe("Auth strategies", function() {
|
||||
strategies.passwordTokenExchange({},"user","badpassword","scope",function(err,token) {
|
||||
try {
|
||||
err.toString().should.equal("Error: Too many login attempts. Wait 10 minutes and try again");
|
||||
token.should.be.false;
|
||||
token.should.be.false();
|
||||
done();
|
||||
} catch(e) {
|
||||
done(e);
|
||||
|
@@ -79,7 +79,7 @@ describe("Tokens", function() {
|
||||
Tokens.get("1234").then(function(token) {
|
||||
try {
|
||||
should.not.exist(token);
|
||||
saveSessions.calledOnce.should.be.true;
|
||||
saveSessions.calledOnce.should.be.true();
|
||||
done();
|
||||
} catch(err) {
|
||||
done(err);
|
||||
|
Reference in New Issue
Block a user