refactor: zones => topics

This commit is contained in:
Andy Burke 2025-09-10 12:51:27 -07:00
parent 20a5d1bc88
commit fac8f409f4
26 changed files with 470 additions and 469 deletions

View file

@ -2,10 +2,10 @@ import { api, API_CLIENT } from '../../../utils/api.ts';
import * as asserts from '@std/assert';
import { EPHEMERAL_SERVER, get_ephemeral_listen_server, get_new_user, set_user_permissions } from '../../helpers.ts';
import { generateTotp } from '../../../utils/totp.ts';
import { clear_zone_events_cache } from '../../../models/event.ts';
import { clear_topic_events_cache } from '../../../models/event.ts';
Deno.test({
name: 'API - ZONES - Create',
name: 'API - TOPICS - Create',
permissions: {
env: true,
read: true,
@ -25,7 +25,7 @@ Deno.test({
const user_info = await get_new_user(client);
try {
const _permission_denied_zone = await client.fetch('/zones', {
const _permission_denied_topic = await client.fetch('/topics', {
method: 'POST',
headers: {
'x-session_id': user_info.session.id,
@ -36,15 +36,15 @@ Deno.test({
}
});
asserts.fail('allowed creation of a zone without zone creation permissions');
asserts.fail('allowed creation of a topic without topic creation permissions');
} catch (error) {
asserts.assertEquals((error as Error).cause, 'permission_denied');
}
await set_user_permissions(client, user_info.user, user_info.session, [...user_info.user.permissions, 'zones.create']);
await set_user_permissions(client, user_info.user, user_info.session, [...user_info.user.permissions, 'topics.create']);
try {
const _too_long_name_zone = await client.fetch('/zones', {
const _too_long_name_topic = await client.fetch('/topics', {
method: 'POST',
headers: {
'x-session_id': user_info.session.id,
@ -55,25 +55,25 @@ Deno.test({
}
});
asserts.fail('allowed creation of a zone with an excessively long name');
asserts.fail('allowed creation of a topic with an excessively long name');
} catch (error) {
asserts.assertEquals((error as Error).cause, 'invalid_zone_name');
asserts.assertEquals((error as Error).cause, 'invalid_topic_name');
}
const new_zone = await client.fetch('/zones', {
const new_topic = await client.fetch('/topics', {
method: 'POST',
headers: {
'x-session_id': user_info.session.id,
'x-totp': await generateTotp(user_info.session.secret)
},
json: {
name: 'test zone'
name: 'test topic'
}
});
asserts.assert(new_zone);
asserts.assert(new_topic);
} finally {
clear_zone_events_cache();
clear_topic_events_cache();
if (test_server_info) {
await test_server_info?.server?.stop();
}

View file

@ -2,10 +2,10 @@ import { api, API_CLIENT } from '../../../utils/api.ts';
import * as asserts from '@std/assert';
import { EPHEMERAL_SERVER, get_ephemeral_listen_server, get_new_user, set_user_permissions } from '../../helpers.ts';
import { generateTotp } from '../../../utils/totp.ts';
import { clear_zone_events_cache } from '../../../models/event.ts';
import { clear_topic_events_cache } from '../../../models/event.ts';
Deno.test({
name: 'API - ZONES - Delete',
name: 'API - TOPICS - Delete',
permissions: {
env: true,
read: true,
@ -24,22 +24,22 @@ Deno.test({
const user_info = await get_new_user(client);
await set_user_permissions(client, user_info.user, user_info.session, [...user_info.user.permissions, 'zones.create']);
await set_user_permissions(client, user_info.user, user_info.session, [...user_info.user.permissions, 'topics.create']);
const new_zone = await client.fetch('/zones', {
const new_topic = await client.fetch('/topics', {
method: 'POST',
headers: {
'x-session_id': user_info.session.id,
'x-totp': await generateTotp(user_info.session.secret)
},
json: {
name: 'test delete zone'
name: 'test delete topic'
}
});
asserts.assert(new_zone);
asserts.assert(new_topic);
const deleted_zone = await client.fetch(`/zones/${new_zone.id}`, {
const deleted_topic = await client.fetch(`/topics/${new_topic.id}`, {
method: 'DELETE',
headers: {
'x-session_id': user_info.session.id,
@ -47,9 +47,9 @@ Deno.test({
}
});
asserts.assert(deleted_zone);
asserts.assert(deleted_topic);
} finally {
clear_zone_events_cache();
clear_topic_events_cache();
if (test_server_info) {
await test_server_info?.server?.stop();
}

View file

@ -2,10 +2,10 @@ import * as asserts from '@std/assert';
import { EPHEMERAL_SERVER, get_ephemeral_listen_server, get_new_user, set_user_permissions } from '../../../helpers.ts';
import { api, API_CLIENT } from '../../../../utils/api.ts';
import { generateTotp } from '../../../../utils/totp.ts';
import { clear_zone_events_cache } from '../../../../models/event.ts';
import { clear_topic_events_cache } from '../../../../models/event.ts';
Deno.test({
name: 'API - ZONES - EVENTS - Create',
name: 'API - TOPICS - EVENTS - Create',
permissions: {
env: true,
read: true,
@ -24,25 +24,25 @@ Deno.test({
const owner_info = await get_new_user(client);
await set_user_permissions(client, owner_info.user, owner_info.session, [...owner_info.user.permissions, 'zones.create']);
await set_user_permissions(client, owner_info.user, owner_info.session, [...owner_info.user.permissions, 'topics.create']);
const zone = await client.fetch('/zones', {
const topic = await client.fetch('/topics', {
method: 'POST',
headers: {
'x-session_id': owner_info.session.id,
'x-totp': await generateTotp(owner_info.session.secret)
},
json: {
name: 'test events zone',
name: 'test events topic',
permissions: {
write_events: [owner_info.user.id]
}
}
});
asserts.assert(zone);
asserts.assert(topic);
const event_from_owner = await client.fetch(`/zones/${zone.id}/events`, {
const event_from_owner = await client.fetch(`/topics/${topic.id}/events`, {
method: 'POST',
headers: {
'x-session_id': owner_info.session.id,
@ -61,7 +61,7 @@ Deno.test({
const other_user_info = await get_new_user(client);
try {
const _permission_denied_zone = await client.fetch(`/zones/${zone.id}/events`, {
const _permission_denied_topic = await client.fetch(`/topics/${topic.id}/events`, {
method: 'POST',
headers: {
'x-session_id': other_user_info.session.id,
@ -75,13 +75,13 @@ Deno.test({
}
});
asserts.fail('allowed adding an event to a zone without permission');
asserts.fail('allowed adding an event to a topic without permission');
} catch (error) {
asserts.assertEquals((error as Error).cause, 'permission_denied');
}
// make the zone public write
const updated_by_owner_zone = await client.fetch(`/zones/${zone.id}`, {
// make the topic public write
const updated_by_owner_topic = await client.fetch(`/topics/${topic.id}`, {
method: 'PUT',
headers: {
'x-session_id': owner_info.session.id,
@ -89,16 +89,16 @@ Deno.test({
},
json: {
permissions: {
...zone.permissions,
...topic.permissions,
write_events: []
}
}
});
asserts.assert(updated_by_owner_zone);
asserts.assertEquals(updated_by_owner_zone.permissions.write_events, []);
asserts.assert(updated_by_owner_topic);
asserts.assertEquals(updated_by_owner_topic.permissions.write_events, []);
const event_from_other_user = await client.fetch(`/zones/${zone.id}/events`, {
const event_from_other_user = await client.fetch(`/topics/${topic.id}/events`, {
method: 'POST',
headers: {
'x-session_id': other_user_info.session.id,
@ -114,7 +114,7 @@ Deno.test({
asserts.assert(event_from_other_user);
} finally {
clear_zone_events_cache();
clear_topic_events_cache();
if (test_server_info) {
await test_server_info?.server?.stop();
}

View file

@ -2,10 +2,10 @@ import * as asserts from '@std/assert';
import { EPHEMERAL_SERVER, get_ephemeral_listen_server, get_new_user, set_user_permissions } from '../../../helpers.ts';
import { api, API_CLIENT } from '../../../../utils/api.ts';
import { generateTotp } from '../../../../utils/totp.ts';
import { clear_zone_events_cache } from '../../../../models/event.ts';
import { clear_topic_events_cache } from '../../../../models/event.ts';
Deno.test({
name: 'API - ZONES - EVENTS - Get',
name: 'API - TOPICS - EVENTS - Get',
permissions: {
env: true,
read: true,
@ -29,25 +29,25 @@ Deno.test({
const owner_info = await get_new_user(client);
await set_user_permissions(client, owner_info.user, owner_info.session, [...owner_info.user.permissions, 'zones.create']);
await set_user_permissions(client, owner_info.user, owner_info.session, [...owner_info.user.permissions, 'topics.create']);
const zone = await client.fetch('/zones', {
const topic = await client.fetch('/topics', {
method: 'POST',
headers: {
'x-session_id': owner_info.session.id,
'x-totp': await generateTotp(owner_info.session.secret)
},
json: {
name: 'test get events zone'
name: 'test get events topic'
}
});
asserts.assert(zone);
asserts.assert(topic);
const NUM_INITIAL_EVENTS = 5;
const events_initial_batch: any[] = [];
for (let i = 0; i < NUM_INITIAL_EVENTS; ++i) {
const event = await client.fetch(`/zones/${zone.id}/events`, {
const event = await client.fetch(`/topics/${topic.id}/events`, {
method: 'POST',
headers: {
'x-session_id': owner_info.session.id,
@ -69,7 +69,7 @@ Deno.test({
const other_user_info = await get_new_user(client);
const events_from_server = await client.fetch(`/zones/${zone.id}/events`, {
const events_from_server = await client.fetch(`/topics/${topic.id}/events`, {
method: 'GET',
headers: {
'x-session_id': other_user_info.session.id,
@ -82,7 +82,7 @@ Deno.test({
const newest_event = events_from_server[0];
asserts.assert(newest_event);
const long_poll_request_promise = client.fetch(`/zones/${zone.id}/events?wait=true&after_id=${newest_event.id}`, {
const long_poll_request_promise = client.fetch(`/topics/${topic.id}/events?wait=true&after_id=${newest_event.id}`, {
method: 'GET',
headers: {
'x-session_id': other_user_info.session.id,
@ -92,7 +92,7 @@ Deno.test({
const wait_and_then_create_an_event = new Promise((resolve) => {
setTimeout(async () => {
await client.fetch(`/zones/${zone.id}/events`, {
await client.fetch(`/topics/${topic.id}/events`, {
method: 'POST',
headers: {
'x-session_id': owner_info.session.id,
@ -117,7 +117,7 @@ Deno.test({
asserts.assertEquals(long_polled_events[0].data?.i, 12345);
});
} finally {
clear_zone_events_cache();
clear_topic_events_cache();
if (test_server_info) {
await test_server_info.server.stop();
}

View file

@ -2,10 +2,10 @@ import * as asserts from '@std/assert';
import { EPHEMERAL_SERVER, get_ephemeral_listen_server, get_new_user, set_user_permissions } from '../../../helpers.ts';
import { api, API_CLIENT } from '../../../../utils/api.ts';
import { generateTotp } from '../../../../utils/totp.ts';
import { clear_zone_events_cache } from '../../../../models/event.ts';
import { clear_topic_events_cache } from '../../../../models/event.ts';
Deno.test({
name: 'API - ZONES - EVENTS - Update',
name: 'API - TOPICS - EVENTS - Update',
permissions: {
env: true,
read: true,
@ -24,22 +24,22 @@ Deno.test({
const owner_info = await get_new_user(client);
await set_user_permissions(client, owner_info.user, owner_info.session, [...owner_info.user.permissions, 'zones.create']);
await set_user_permissions(client, owner_info.user, owner_info.session, [...owner_info.user.permissions, 'topics.create']);
const zone = await client.fetch('/zones', {
const topic = await client.fetch('/topics', {
method: 'POST',
headers: {
'x-session_id': owner_info.session.id,
'x-totp': await generateTotp(owner_info.session.secret)
},
json: {
name: 'test update events zone'
name: 'test update events topic'
}
});
asserts.assert(zone);
asserts.assert(topic);
const event_from_owner = await client.fetch(`/zones/${zone.id}/events`, {
const event_from_owner = await client.fetch(`/topics/${topic.id}/events`, {
method: 'POST',
headers: {
'x-session_id': owner_info.session.id,
@ -55,7 +55,7 @@ Deno.test({
asserts.assert(event_from_owner);
const fetched_event_from_owner = await client.fetch(`/zones/${zone.id}/events/${event_from_owner.id}`, {
const fetched_event_from_owner = await client.fetch(`/topics/${topic.id}/events/${event_from_owner.id}`, {
method: 'GET',
headers: {
'x-session_id': owner_info.session.id,
@ -65,7 +65,7 @@ Deno.test({
asserts.assertEquals(fetched_event_from_owner, event_from_owner);
const updated_event_from_owner = await client.fetch(`/zones/${zone.id}/events/${event_from_owner.id}`, {
const updated_event_from_owner = await client.fetch(`/topics/${topic.id}/events/${event_from_owner.id}`, {
method: 'PUT',
headers: {
'x-session_id': owner_info.session.id,
@ -83,7 +83,7 @@ Deno.test({
asserts.assertEquals(updated_event_from_owner.type, 'other');
asserts.assertEquals(updated_event_from_owner.data.foo, 'baz');
const fetched_updated_event_from_owner = await client.fetch(`/zones/${zone.id}/events/${event_from_owner.id}`, {
const fetched_updated_event_from_owner = await client.fetch(`/topics/${topic.id}/events/${event_from_owner.id}`, {
method: 'GET',
headers: {
'x-session_id': owner_info.session.id,
@ -97,7 +97,7 @@ Deno.test({
const other_user_info = await get_new_user(client);
const event_from_other_user = await client.fetch(`/zones/${zone.id}/events`, {
const event_from_other_user = await client.fetch(`/topics/${topic.id}/events`, {
method: 'POST',
headers: {
'x-session_id': other_user_info.session.id,
@ -113,7 +113,7 @@ Deno.test({
asserts.assert(event_from_other_user);
const fetched_event_from_other_user = await client.fetch(`/zones/${zone.id}/events/${event_from_other_user.id}`, {
const fetched_event_from_other_user = await client.fetch(`/topics/${topic.id}/events/${event_from_other_user.id}`, {
method: 'GET',
headers: {
'x-session_id': other_user_info.session.id,
@ -123,7 +123,7 @@ Deno.test({
asserts.assertEquals(fetched_event_from_other_user, event_from_other_user);
const updated_event_from_other_user = await client.fetch(`/zones/${zone.id}/events/${event_from_other_user.id}`, {
const updated_event_from_other_user = await client.fetch(`/topics/${topic.id}/events/${event_from_other_user.id}`, {
method: 'PUT',
headers: {
'x-session_id': other_user_info.session.id,
@ -141,7 +141,7 @@ Deno.test({
asserts.assertEquals(updated_event_from_other_user.type, 'other');
asserts.assertEquals(updated_event_from_other_user.data.other_user, 'bloop');
const fetched_updated_event_from_other_user = await client.fetch(`/zones/${zone.id}/events/${event_from_other_user.id}`, {
const fetched_updated_event_from_other_user = await client.fetch(`/topics/${topic.id}/events/${event_from_other_user.id}`, {
method: 'GET',
headers: {
'x-session_id': other_user_info.session.id,
@ -153,7 +153,7 @@ Deno.test({
asserts.assertNotEquals(fetched_updated_event_from_other_user, fetched_event_from_other_user);
asserts.assertEquals(fetched_updated_event_from_other_user, updated_event_from_other_user);
const updated_by_owner_zone = await client.fetch(`/zones/${zone.id}`, {
const updated_by_owner_topic = await client.fetch(`/topics/${topic.id}`, {
method: 'PUT',
headers: {
'x-session_id': owner_info.session.id,
@ -161,16 +161,16 @@ Deno.test({
},
json: {
permissions: {
...zone.permissions,
...topic.permissions,
write_events: [owner_info.user.id]
}
}
});
asserts.assertEquals(updated_by_owner_zone.permissions.write_events, [owner_info.user.id]);
asserts.assertEquals(updated_by_owner_topic.permissions.write_events, [owner_info.user.id]);
try {
await client.fetch(`/zones/${zone.id}/events/${event_from_other_user.id}`, {
await client.fetch(`/topics/${topic.id}/events/${event_from_other_user.id}`, {
method: 'PUT',
headers: {
'x-session_id': other_user_info.session.id,
@ -181,13 +181,13 @@ Deno.test({
}
});
asserts.fail('allowed updating an event in a zone with a write_events allowed only by owner');
asserts.fail('allowed updating an event in a topic with a write_events allowed only by owner');
} catch (error) {
asserts.assertEquals((error as Error).cause, 'permission_denied');
}
try {
await client.fetch(`/zones/${zone.id}/events/${event_from_other_user.id}`, {
await client.fetch(`/topics/${topic.id}/events/${event_from_other_user.id}`, {
method: 'DELETE',
headers: {
'x-session_id': other_user_info.session.id,
@ -195,12 +195,12 @@ Deno.test({
}
});
asserts.fail('allowed deleting an event in a zone with a write_events allowed only by owner');
asserts.fail('allowed deleting an event in a topic with a write_events allowed only by owner');
} catch (error) {
asserts.assertEquals((error as Error).cause, 'permission_denied');
}
const publicly_writable_zone = await client.fetch(`/zones/${zone.id}`, {
const publicly_writable_topic = await client.fetch(`/topics/${topic.id}`, {
method: 'PUT',
headers: {
'x-session_id': owner_info.session.id,
@ -208,15 +208,15 @@ Deno.test({
},
json: {
permissions: {
...zone.permissions,
...topic.permissions,
write_events: []
}
}
});
asserts.assertEquals(publicly_writable_zone.permissions.write_events, []);
asserts.assertEquals(publicly_writable_topic.permissions.write_events, []);
const delete_other_user_event_response = await client.fetch(`/zones/${zone.id}/events/${event_from_other_user.id}`, {
const delete_other_user_event_response = await client.fetch(`/topics/${topic.id}/events/${event_from_other_user.id}`, {
method: 'DELETE',
headers: {
'x-session_id': other_user_info.session.id,
@ -226,7 +226,7 @@ Deno.test({
asserts.assertEquals(delete_other_user_event_response.deleted, true);
const delete_owner_event_response = await client.fetch(`/zones/${zone.id}/events/${event_from_owner.id}`, {
const delete_owner_event_response = await client.fetch(`/topics/${topic.id}/events/${event_from_owner.id}`, {
method: 'DELETE',
headers: {
'x-session_id': owner_info.session.id,
@ -236,7 +236,7 @@ Deno.test({
asserts.assertEquals(delete_owner_event_response.deleted, true);
} finally {
clear_zone_events_cache();
clear_topic_events_cache();
if (test_server_info) {
await test_server_info?.server?.stop();
}

View file

@ -2,10 +2,10 @@ import * as asserts from '@std/assert';
import { EPHEMERAL_SERVER, get_ephemeral_listen_server, get_new_user, set_user_permissions } from '../../../helpers.ts';
import { api, API_CLIENT } from '../../../../utils/api.ts';
import { generateTotp } from '../../../../utils/totp.ts';
import { clear_zone_events_cache } from '../../../../models/event.ts';
import { clear_topic_events_cache } from '../../../../models/event.ts';
Deno.test({
name: 'API - ZONES - EVENTS - Update (APPEND_ONLY_EVENTS)',
name: 'API - TOPICS - EVENTS - Update (APPEND_ONLY_EVENTS)',
permissions: {
env: true,
read: true,
@ -27,22 +27,22 @@ Deno.test({
const owner_info = await get_new_user(client);
await set_user_permissions(client, owner_info.user, owner_info.session, [...owner_info.user.permissions, 'zones.create']);
await set_user_permissions(client, owner_info.user, owner_info.session, [...owner_info.user.permissions, 'topics.create']);
const zone = await client.fetch('/zones', {
const topic = await client.fetch('/topics', {
method: 'POST',
headers: {
'x-session_id': owner_info.session.id,
'x-totp': await generateTotp(owner_info.session.secret)
},
json: {
name: 'test update events zone in append only mode'
name: 'test update events topic in append only mode'
}
});
asserts.assert(zone);
asserts.assert(topic);
const event_from_owner = await client.fetch(`/zones/${zone.id}/events`, {
const event_from_owner = await client.fetch(`/topics/${topic.id}/events`, {
method: 'POST',
headers: {
'x-session_id': owner_info.session.id,
@ -58,7 +58,7 @@ Deno.test({
asserts.assert(event_from_owner);
const fetched_event_from_owner = await client.fetch(`/zones/${zone.id}/events/${event_from_owner.id}`, {
const fetched_event_from_owner = await client.fetch(`/topics/${topic.id}/events/${event_from_owner.id}`, {
method: 'GET',
headers: {
'x-session_id': owner_info.session.id,
@ -69,7 +69,7 @@ Deno.test({
asserts.assertEquals(fetched_event_from_owner, event_from_owner);
try {
await client.fetch(`/zones/${zone.id}/events/${event_from_owner.id}`, {
await client.fetch(`/topics/${topic.id}/events/${event_from_owner.id}`, {
method: 'PUT',
headers: {
'x-session_id': owner_info.session.id,
@ -80,13 +80,13 @@ Deno.test({
}
});
asserts.fail('allowed updating an event in a zone with APPEND_ONLY_EVENTS on');
asserts.fail('allowed updating an event in a topic with APPEND_ONLY_EVENTS on');
} catch (error) {
asserts.assertEquals((error as Error).cause, 'append_only_events');
}
try {
await client.fetch(`/zones/${zone.id}/events/${event_from_owner.id}`, {
await client.fetch(`/topics/${topic.id}/events/${event_from_owner.id}`, {
method: 'DELETE',
headers: {
'x-session_id': owner_info.session.id,
@ -94,14 +94,14 @@ Deno.test({
}
});
asserts.fail('allowed deleting an event in a zone with APPEND_ONLY_EVENTS on');
asserts.fail('allowed deleting an event in a topic with APPEND_ONLY_EVENTS on');
} catch (error) {
asserts.assertEquals((error as Error).cause, 'append_only_events');
}
const other_user_info = await get_new_user(client);
const event_from_other_user = await client.fetch(`/zones/${zone.id}/events`, {
const event_from_other_user = await client.fetch(`/topics/${topic.id}/events`, {
method: 'POST',
headers: {
'x-session_id': other_user_info.session.id,
@ -117,7 +117,7 @@ Deno.test({
asserts.assert(event_from_other_user);
const fetched_event_from_other_user = await client.fetch(`/zones/${zone.id}/events/${event_from_other_user.id}`, {
const fetched_event_from_other_user = await client.fetch(`/topics/${topic.id}/events/${event_from_other_user.id}`, {
method: 'GET',
headers: {
'x-session_id': other_user_info.session.id,
@ -128,7 +128,7 @@ Deno.test({
asserts.assertEquals(fetched_event_from_other_user, event_from_other_user);
try {
await client.fetch(`/zones/${zone.id}/events/${event_from_other_user.id}`, {
await client.fetch(`/topics/${topic.id}/events/${event_from_other_user.id}`, {
method: 'PUT',
headers: {
'x-session_id': other_user_info.session.id,
@ -139,13 +139,13 @@ Deno.test({
}
});
asserts.fail('allowed updating an event in a zone with APPEND_ONLY_EVENTS on');
asserts.fail('allowed updating an event in a topic with APPEND_ONLY_EVENTS on');
} catch (error) {
asserts.assertEquals((error as Error).cause, 'append_only_events');
}
try {
await client.fetch(`/zones/${zone.id}/events/${event_from_other_user.id}`, {
await client.fetch(`/topics/${topic.id}/events/${event_from_other_user.id}`, {
method: 'DELETE',
headers: {
'x-session_id': other_user_info.session.id,
@ -153,14 +153,14 @@ Deno.test({
}
});
asserts.fail('allowed deleting an event in a zone with APPEND_ONLY_EVENTS on');
asserts.fail('allowed deleting an event in a topic with APPEND_ONLY_EVENTS on');
} catch (error) {
asserts.assertEquals((error as Error).cause, 'append_only_events');
}
} finally {
Deno.env.delete('APPEND_ONLY_EVENTS');
clear_zone_events_cache();
clear_topic_events_cache();
if (test_server_info) {
await test_server_info?.server?.stop();
}

View file

@ -2,10 +2,10 @@ import { api, API_CLIENT } from '../../../utils/api.ts';
import * as asserts from '@std/assert';
import { EPHEMERAL_SERVER, get_ephemeral_listen_server, get_new_user, set_user_permissions } from '../../helpers.ts';
import { generateTotp } from '../../../utils/totp.ts';
import { clear_zone_events_cache } from '../../../models/event.ts';
import { clear_topic_events_cache } from '../../../models/event.ts';
Deno.test({
name: 'API - ZONES - Update',
name: 'API - TOPICS - Update',
permissions: {
env: true,
read: true,
@ -24,25 +24,25 @@ Deno.test({
const user_info = await get_new_user(client);
await set_user_permissions(client, user_info.user, user_info.session, [...user_info.user.permissions, 'zones.create']);
await set_user_permissions(client, user_info.user, user_info.session, [...user_info.user.permissions, 'topics.create']);
const new_zone = await client.fetch('/zones', {
const new_topic = await client.fetch('/topics', {
method: 'POST',
headers: {
'x-session_id': user_info.session.id,
'x-totp': await generateTotp(user_info.session.secret)
},
json: {
name: 'test update zone'
name: 'test update topic'
}
});
asserts.assert(new_zone);
asserts.assert(new_topic);
const other_user_info = await get_new_user(client);
try {
const _permission_denied_zone = await client.fetch(`/zones/${new_zone.id}`, {
const _permission_denied_topic = await client.fetch(`/topics/${new_topic.id}`, {
method: 'PUT',
headers: {
'x-session_id': other_user_info.session.id,
@ -53,12 +53,12 @@ Deno.test({
}
});
asserts.fail('allowed updating a zone owned by someone else');
asserts.fail('allowed updating a topic owned by someone else');
} catch (error) {
asserts.assertEquals((error as Error).cause, 'permission_denied');
}
const updated_by_owner_zone = await client.fetch(`/zones/${new_zone.id}`, {
const updated_by_owner_topic = await client.fetch(`/topics/${new_topic.id}`, {
method: 'PUT',
headers: {
'x-session_id': user_info.session.id,
@ -67,17 +67,17 @@ Deno.test({
json: {
topic: 'this is a new topic',
permissions: {
...new_zone.permissions,
write: [...new_zone.permissions.write, other_user_info.user.id]
...new_topic.permissions,
write: [...new_topic.permissions.write, other_user_info.user.id]
}
}
});
asserts.assert(updated_by_owner_zone);
asserts.assertEquals(updated_by_owner_zone.topic, 'this is a new topic');
asserts.assertEquals(updated_by_owner_zone.permissions.write, [user_info.user.id, other_user_info.user.id]);
asserts.assert(updated_by_owner_topic);
asserts.assertEquals(updated_by_owner_topic.topic, 'this is a new topic');
asserts.assertEquals(updated_by_owner_topic.permissions.write, [user_info.user.id, other_user_info.user.id]);
const updated_by_other_user_zone = await client.fetch(`/zones/${new_zone.id}`, {
const updated_by_other_user_topic = await client.fetch(`/topics/${new_topic.id}`, {
method: 'PUT',
headers: {
'x-session_id': other_user_info.session.id,
@ -88,11 +88,11 @@ Deno.test({
}
});
asserts.assert(updated_by_other_user_zone);
asserts.assertEquals(updated_by_other_user_zone.topic, 'this is a newer topic');
asserts.assertEquals(updated_by_other_user_zone.permissions.write, [user_info.user.id, other_user_info.user.id]);
asserts.assert(updated_by_other_user_topic);
asserts.assertEquals(updated_by_other_user_topic.topic, 'this is a newer topic');
asserts.assertEquals(updated_by_other_user_topic.permissions.write, [user_info.user.id, other_user_info.user.id]);
} finally {
clear_zone_events_cache();
clear_topic_events_cache();
if (test_server_info) {
await test_server_info?.server?.stop();
}