2023-04-17 13:27:32 +00:00
|
|
|
#[allow(unused_imports, dead_code)]
|
|
|
|
mod api_integration {
|
|
|
|
use serde::Deserialize;
|
|
|
|
use serde::Serialize;
|
|
|
|
use serde_json::json;
|
|
|
|
use std::borrow::Cow;
|
|
|
|
use std::ops::Bound;
|
2023-04-19 08:46:37 +00:00
|
|
|
use surrealdb::error::Api as ApiError;
|
|
|
|
use surrealdb::error::Db as DbError;
|
2023-04-17 13:27:32 +00:00
|
|
|
use surrealdb::opt::auth::Database;
|
|
|
|
use surrealdb::opt::auth::Jwt;
|
|
|
|
use surrealdb::opt::auth::Namespace;
|
|
|
|
use surrealdb::opt::auth::Root;
|
|
|
|
use surrealdb::opt::auth::Scope;
|
|
|
|
use surrealdb::opt::PatchOp;
|
2023-04-28 11:20:57 +00:00
|
|
|
use surrealdb::opt::Resource;
|
2023-04-17 13:27:32 +00:00
|
|
|
use surrealdb::sql::statements::BeginStatement;
|
|
|
|
use surrealdb::sql::statements::CommitStatement;
|
|
|
|
use surrealdb::sql::thing;
|
|
|
|
use surrealdb::sql::Thing;
|
2023-04-28 11:20:57 +00:00
|
|
|
use surrealdb::sql::Value;
|
2023-04-19 08:46:37 +00:00
|
|
|
use surrealdb::Error;
|
2023-04-17 13:27:32 +00:00
|
|
|
use surrealdb::Surreal;
|
|
|
|
use ulid::Ulid;
|
|
|
|
|
|
|
|
const NS: &str = "test-ns";
|
|
|
|
const ROOT_USER: &str = "root";
|
|
|
|
const ROOT_PASS: &str = "root";
|
|
|
|
|
|
|
|
#[derive(Debug, Serialize)]
|
|
|
|
struct Record<'a> {
|
|
|
|
name: &'a str,
|
|
|
|
}
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[derive(Debug, Deserialize)]
|
|
|
|
struct RecordId {
|
|
|
|
id: Thing,
|
|
|
|
}
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[derive(Debug, Deserialize)]
|
|
|
|
struct RecordName {
|
|
|
|
name: String,
|
|
|
|
}
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[derive(Debug, Deserialize, Eq, PartialEq, Ord, PartialOrd)]
|
|
|
|
struct RecordBuf {
|
|
|
|
id: Thing,
|
|
|
|
name: String,
|
|
|
|
}
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[derive(Debug, Serialize, Deserialize)]
|
|
|
|
struct AuthParams<'a> {
|
|
|
|
email: &'a str,
|
|
|
|
pass: &'a str,
|
2022-12-30 08:23:19 +00:00
|
|
|
}
|
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[cfg(feature = "protocol-ws")]
|
|
|
|
mod ws {
|
|
|
|
use super::*;
|
|
|
|
use surrealdb::engine::remote::ws::Client;
|
|
|
|
use surrealdb::engine::remote::ws::Ws;
|
|
|
|
|
|
|
|
async fn new_db() -> Surreal<Client> {
|
|
|
|
let db = Surreal::new::<Ws>("127.0.0.1:8000").await.unwrap();
|
|
|
|
db.signin(Root {
|
|
|
|
username: ROOT_USER,
|
|
|
|
password: ROOT_PASS,
|
|
|
|
})
|
|
|
|
.await
|
|
|
|
.unwrap();
|
|
|
|
db
|
|
|
|
}
|
|
|
|
|
|
|
|
include!("api/mod.rs");
|
|
|
|
}
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[cfg(feature = "protocol-http")]
|
|
|
|
mod http {
|
|
|
|
use super::*;
|
|
|
|
use surrealdb::engine::remote::http::Client;
|
|
|
|
use surrealdb::engine::remote::http::Http;
|
|
|
|
|
|
|
|
async fn new_db() -> Surreal<Client> {
|
|
|
|
let db = Surreal::new::<Http>("127.0.0.1:8000").await.unwrap();
|
|
|
|
db.signin(Root {
|
|
|
|
username: ROOT_USER,
|
|
|
|
password: ROOT_PASS,
|
|
|
|
})
|
|
|
|
.await
|
|
|
|
.unwrap();
|
|
|
|
db
|
|
|
|
}
|
|
|
|
|
|
|
|
include!("api/mod.rs");
|
|
|
|
include!("api/backup.rs");
|
2022-12-30 08:23:19 +00:00
|
|
|
}
|
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[cfg(feature = "kv-mem")]
|
|
|
|
mod mem {
|
|
|
|
use super::*;
|
|
|
|
use surrealdb::engine::any;
|
|
|
|
use surrealdb::engine::local::Db;
|
|
|
|
use surrealdb::engine::local::Mem;
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
async fn new_db() -> Surreal<Db> {
|
2023-06-09 13:45:07 +00:00
|
|
|
let root = Root {
|
|
|
|
username: ROOT_USER,
|
|
|
|
password: ROOT_PASS,
|
|
|
|
};
|
|
|
|
let db = Surreal::new::<Mem>(root).await.unwrap();
|
|
|
|
db.signin(root).await.unwrap();
|
|
|
|
db
|
2023-04-17 13:27:32 +00:00
|
|
|
}
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn memory_allowed_as_address() {
|
|
|
|
any::connect("memory").await.unwrap();
|
|
|
|
}
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-06-09 13:45:07 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn signin_first_not_necessary() {
|
|
|
|
let db = Surreal::new::<Mem>(()).await.unwrap();
|
|
|
|
db.use_ns("namespace").use_db("database").await.unwrap();
|
|
|
|
let Some(record): Option<RecordId> = db.create(("item", "foo")).await.unwrap() else {
|
|
|
|
panic!("record not found");
|
|
|
|
};
|
|
|
|
assert_eq!(record.id.to_string(), "item:foo");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn cant_sign_into_default_root_account() {
|
|
|
|
let db = Surreal::new::<Mem>(()).await.unwrap();
|
|
|
|
let Error::Db(DbError::InvalidAuth) = db.signin(Root {
|
|
|
|
username: ROOT_USER,
|
|
|
|
password: ROOT_PASS,
|
|
|
|
})
|
|
|
|
.await
|
|
|
|
.unwrap_err() else {
|
|
|
|
panic!("unexpected successful login");
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn credentials_activate_authentication() {
|
|
|
|
let db = Surreal::new::<Mem>(Root {
|
|
|
|
username: ROOT_USER,
|
|
|
|
password: ROOT_PASS,
|
|
|
|
})
|
|
|
|
.await
|
|
|
|
.unwrap();
|
|
|
|
db.use_ns("namespace").use_db("database").await.unwrap();
|
|
|
|
let Error::Db(DbError::QueryPermissions) = db.create(Resource::from("item:foo")).await.unwrap_err() else {
|
|
|
|
panic!("record not found");
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
include!("api/mod.rs");
|
|
|
|
include!("api/backup.rs");
|
2022-12-30 23:53:45 +00:00
|
|
|
}
|
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[cfg(feature = "kv-rocksdb")]
|
|
|
|
mod file {
|
|
|
|
use super::*;
|
|
|
|
use surrealdb::engine::local::Db;
|
|
|
|
use surrealdb::engine::local::File;
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
async fn new_db() -> Surreal<Db> {
|
|
|
|
let path = format!("/tmp/{}.db", Ulid::new());
|
2023-06-09 13:45:07 +00:00
|
|
|
let root = Root {
|
|
|
|
username: ROOT_USER,
|
|
|
|
password: ROOT_PASS,
|
|
|
|
};
|
|
|
|
let db = Surreal::new::<File>((path.as_str(), root)).await.unwrap();
|
|
|
|
db.signin(root).await.unwrap();
|
|
|
|
db
|
2023-04-17 13:27:32 +00:00
|
|
|
}
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-05-31 12:35:41 +00:00
|
|
|
include!("api/mod.rs");
|
|
|
|
include!("api/backup.rs");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(feature = "kv-rocksdb")]
|
|
|
|
mod rocksdb {
|
|
|
|
use super::*;
|
|
|
|
use surrealdb::engine::local::Db;
|
|
|
|
use surrealdb::engine::local::RocksDb;
|
|
|
|
|
|
|
|
async fn new_db() -> Surreal<Db> {
|
|
|
|
let path = format!("/tmp/{}.db", Ulid::new());
|
|
|
|
Surreal::new::<RocksDb>(path.as_str()).await.unwrap()
|
|
|
|
}
|
|
|
|
|
|
|
|
include!("api/mod.rs");
|
|
|
|
include!("api/backup.rs");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(feature = "kv-speedb")]
|
|
|
|
mod speedb {
|
|
|
|
use super::*;
|
|
|
|
use surrealdb::engine::local::Db;
|
|
|
|
use surrealdb::engine::local::SpeeDb;
|
|
|
|
|
|
|
|
async fn new_db() -> Surreal<Db> {
|
|
|
|
let path = format!("/tmp/{}.db", Ulid::new());
|
|
|
|
Surreal::new::<SpeeDb>(path.as_str()).await.unwrap()
|
|
|
|
}
|
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
include!("api/mod.rs");
|
|
|
|
include!("api/backup.rs");
|
2022-12-30 08:23:19 +00:00
|
|
|
}
|
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[cfg(feature = "kv-tikv")]
|
|
|
|
mod tikv {
|
|
|
|
use super::*;
|
|
|
|
use surrealdb::engine::local::Db;
|
|
|
|
use surrealdb::engine::local::TiKv;
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
async fn new_db() -> Surreal<Db> {
|
2023-06-09 13:45:07 +00:00
|
|
|
let root = Root {
|
|
|
|
username: ROOT_USER,
|
|
|
|
password: ROOT_PASS,
|
|
|
|
};
|
|
|
|
let db = Surreal::new::<TiKv>(("127.0.0.1:2379", root)).await.unwrap();
|
|
|
|
db.signin(root).await.unwrap();
|
|
|
|
db
|
2023-04-17 13:27:32 +00:00
|
|
|
}
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
include!("api/mod.rs");
|
|
|
|
include!("api/backup.rs");
|
2022-12-30 08:23:19 +00:00
|
|
|
}
|
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[cfg(feature = "kv-fdb")]
|
|
|
|
mod fdb {
|
|
|
|
use super::*;
|
|
|
|
use surrealdb::engine::local::Db;
|
|
|
|
use surrealdb::engine::local::FDb;
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
async fn new_db() -> Surreal<Db> {
|
2023-06-09 13:45:07 +00:00
|
|
|
let root = Root {
|
|
|
|
username: ROOT_USER,
|
|
|
|
password: ROOT_PASS,
|
|
|
|
};
|
2023-06-13 20:55:38 +00:00
|
|
|
let db = Surreal::new::<FDb>(("/etc/foundationdb/fdb.cluster", root)).await.unwrap();
|
2023-06-09 13:45:07 +00:00
|
|
|
db.signin(root).await.unwrap();
|
|
|
|
db
|
2023-04-17 13:27:32 +00:00
|
|
|
}
|
2022-12-30 08:23:19 +00:00
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
include!("api/mod.rs");
|
|
|
|
include!("api/backup.rs");
|
2022-12-30 08:23:19 +00:00
|
|
|
}
|
|
|
|
|
2023-04-17 13:27:32 +00:00
|
|
|
#[cfg(feature = "protocol-http")]
|
|
|
|
mod any {
|
|
|
|
use super::*;
|
|
|
|
use surrealdb::engine::any::Any;
|
|
|
|
|
|
|
|
async fn new_db() -> Surreal<Any> {
|
|
|
|
let db = surrealdb::engine::any::connect("http://127.0.0.1:8000").await.unwrap();
|
|
|
|
db.signin(Root {
|
|
|
|
username: ROOT_USER,
|
|
|
|
password: ROOT_PASS,
|
|
|
|
})
|
|
|
|
.await
|
|
|
|
.unwrap();
|
|
|
|
db
|
|
|
|
}
|
|
|
|
|
|
|
|
include!("api/mod.rs");
|
|
|
|
include!("api/backup.rs");
|
2022-12-30 08:23:19 +00:00
|
|
|
}
|
|
|
|
}
|