-
Notifications
You must be signed in to change notification settings - Fork 2k
Expand file tree
/
Copy pathrevokeTableOrViewAccess.test.js
More file actions
113 lines (96 loc) · 2.93 KB
/
revokeTableOrViewAccess.test.js
File metadata and controls
113 lines (96 loc) · 2.93 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
// Copyright 2025 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
'use strict';
const {describe, it, beforeEach, afterEach} = require('mocha');
const assert = require('assert');
const sinon = require('sinon');
const {revokeAccessToTableOrView} = require('../revokeTableOrViewAccess');
const {grantAccessToTableOrView} = require('../grantAccessToTableOrView');
const {setupBeforeAll, cleanupResources} = require('./config');
describe('revokeTableOrViewAccess', () => {
let datasetId = null;
let tableId = null;
let entityId = null;
const projectId = process.env.GCLOUD_PROJECT;
const roleId = 'roles/bigquery.dataViewer';
beforeEach(async () => {
const response = await setupBeforeAll();
datasetId = response.datasetId;
tableId = response.tableId;
entityId = response.entityId;
sinon.stub(console, 'log');
sinon.stub(console, 'error');
});
afterEach(async () => {
await cleanupResources(datasetId);
console.log.restore();
console.error.restore();
});
it('should revoke access to a table for a specific role', async () => {
const principalId = `group:${entityId}`;
// Grant access first.
await grantAccessToTableOrView(
projectId,
datasetId,
tableId,
principalId,
roleId
);
// Reset console log history.
console.log.resetHistory();
// Revoke access for the role.
await revokeAccessToTableOrView(
projectId,
datasetId,
tableId,
roleId,
null
);
// Check that the right message was logged.
assert.strictEqual(
console.log.calledWith(
`Role '${roleId}' revoked for all principals on resource '${datasetId}.${tableId}'.`
),
true
);
});
it('should revoke access to a table for a specific principal', async () => {
const principalId = `group:${entityId}`;
// Grant access first.
await grantAccessToTableOrView(
projectId,
datasetId,
tableId,
principalId,
roleId
);
// Reset console log history.
console.log.resetHistory();
// Revoke access for the principal.
await revokeAccessToTableOrView(
projectId,
datasetId,
tableId,
null,
principalId
);
// Check that the right message was logged.
assert.strictEqual(
console.log.calledWith(
`Access revoked for principal '${principalId}' on resource '${datasetId}.${tableId}'.`
),
true
);
});
});