Postgres exclude failing tests (#2081)

* reload the right data

More passing postgres tests

Handle schema updates, and $in for non array columns

remove authdata from user and implement ensureUniqueness

Make some tests work, detect existing classes

Throw proper error for unique index violation

fix findOneAndUpdate

Support more types

support more type

Support boolean, fix _rperm/_wperm, add TODO

Support string types and also simplify tests

Move operator flattening into Parse Server and out of mongo adapters

Move authdata transform for create into Parse Server

Move authdata transforms completely in to Parse Server

Fix test setup

inline addSchema

Inject default schema to response from DB adapter

* Mark tests that don't work in Postgres

* Exclude one more test

* Exclude some more failing tests

* Exclude more tests
This commit is contained in:
Drew
2016-06-17 09:59:16 -07:00
committed by Florent Vilmart
parent 7da4debbe0
commit ab06055369
47 changed files with 817 additions and 801 deletions

View File

@@ -4,7 +4,7 @@ var Schema = require('../src/Controllers/SchemaController');
var Config = require('../src/Config');
describe('Pointer Permissions', () => {
it('should work with find', (done) => {
it_exclude_dbs(['postgres'])('should work with find', (done) => {
let config = new Config(Parse.applicationId);
let user = new Parse.User();
let user2 = new Parse.User();
@@ -43,7 +43,7 @@ describe('Pointer Permissions', () => {
});
it('should work with write', (done) => {
it_exclude_dbs(['postgres'])('should work with write', (done) => {
let config = new Config(Parse.applicationId);
let user = new Parse.User();
let user2 = new Parse.User();
@@ -108,7 +108,7 @@ describe('Pointer Permissions', () => {
})
});
it('should let a proper user find', (done) => {
it_exclude_dbs(['postgres'])('should let a proper user find', (done) => {
let config = new Config(Parse.applicationId);
let user = new Parse.User();
let user2 = new Parse.User();
@@ -168,7 +168,7 @@ describe('Pointer Permissions', () => {
})
});
it('should not allow creating objects', (done) => {
it_exclude_dbs(['postgres'])('should not allow creating objects', (done) => {
let config = new Config(Parse.applicationId);
let user = new Parse.User();
user.set({
@@ -194,7 +194,7 @@ describe('Pointer Permissions', () => {
})
});
it('should handle multiple writeUserFields', done => {
it_exclude_dbs(['postgres'])('should handle multiple writeUserFields', done => {
let config = new Config(Parse.applicationId);
let user = new Parse.User();
let user2 = new Parse.User();
@@ -276,7 +276,7 @@ describe('Pointer Permissions', () => {
})
});
it('tests CLP / Pointer Perms / ACL write (PP Locked)', (done) => {
it_exclude_dbs(['postgres'])('tests CLP / Pointer Perms / ACL write (PP Locked)', (done) => {
/*
tests:
CLP: update closed ({})
@@ -323,7 +323,7 @@ describe('Pointer Permissions', () => {
});
});
it('tests CLP / Pointer Perms / ACL write (ACL Locked)', (done) => {
it_exclude_dbs(['postgres'])('tests CLP / Pointer Perms / ACL write (ACL Locked)', (done) => {
/*
tests:
CLP: update closed ({})
@@ -368,7 +368,7 @@ describe('Pointer Permissions', () => {
});
});
it('tests CLP / Pointer Perms / ACL write (ACL/PP OK)', (done) => {
it_exclude_dbs(['postgres'])('tests CLP / Pointer Perms / ACL write (ACL/PP OK)', (done) => {
/*
tests:
CLP: update closed ({})
@@ -413,7 +413,7 @@ describe('Pointer Permissions', () => {
});
});
it('tests CLP / Pointer Perms / ACL read (PP locked)', (done) => {
it_exclude_dbs(['postgres'])('tests CLP / Pointer Perms / ACL read (PP locked)', (done) => {
/*
tests:
CLP: find/get open ({})
@@ -460,7 +460,7 @@ describe('Pointer Permissions', () => {
});
});
it('tests CLP / Pointer Perms / ACL read (PP/ACL OK)', (done) => {
it_exclude_dbs(['postgres'])('tests CLP / Pointer Perms / ACL read (PP/ACL OK)', (done) => {
/*
tests:
CLP: find/get open ({"*": true})
@@ -507,7 +507,7 @@ describe('Pointer Permissions', () => {
});
});
it('tests CLP / Pointer Perms / ACL read (ACL locked)', (done) => {
it_exclude_dbs(['postgres'])('tests CLP / Pointer Perms / ACL read (ACL locked)', (done) => {
/*
tests:
CLP: find/get open ({"*": true})
@@ -552,7 +552,7 @@ describe('Pointer Permissions', () => {
});
});
it('should let master key find objects', (done) => {
it_exclude_dbs(['postgres'])('should let master key find objects', (done) => {
let config = new Config(Parse.applicationId);
let user = new Parse.User();
let object = new Parse.Object('AnObject');
@@ -582,7 +582,7 @@ describe('Pointer Permissions', () => {
})
});
it('should let master key get objects', (done) => {
it_exclude_dbs(['postgres'])('should let master key get objects', (done) => {
let config = new Config(Parse.applicationId);
let user = new Parse.User();
let object = new Parse.Object('AnObject');
@@ -614,7 +614,7 @@ describe('Pointer Permissions', () => {
});
it('should let master key update objects', (done) => {
it_exclude_dbs(['postgres'])('should let master key update objects', (done) => {
let config = new Config(Parse.applicationId);
let user = new Parse.User();
let object = new Parse.Object('AnObject');
@@ -642,7 +642,7 @@ describe('Pointer Permissions', () => {
})
});
it('should let master key delete objects', (done) => {
it_exclude_dbs(['postgres'])('should let master key delete objects', (done) => {
let config = new Config(Parse.applicationId);
let user = new Parse.User();
let object = new Parse.Object('AnObject');
@@ -690,5 +690,4 @@ describe('Pointer Permissions', () => {
done();
});
})
});