mirror of
https://github.com/Azure/cosmos-explorer.git
synced 2025-08-14 07:53:35 +01:00
* Acquire token for NoSQL account prior to running tests. * Change client id to user assigned managed identity. * Change to use managed identity. Add token variables for gremlin and tables. * Add RBAC details to test README. * Add token for SQL readonly database. Skip resource token tests when RBAC enabled. * Use hardcoded account name for sql readonly. * Use specific tag for sql readonly. * Remove comment.
61 lines
2.5 KiB
TypeScript
61 lines
2.5 KiB
TypeScript
import { expect, test } from "@playwright/test";
|
|
|
|
import { CosmosDBManagementClient } from "@azure/arm-cosmosdb";
|
|
import { CosmosClient, PermissionMode } from "@azure/cosmos";
|
|
import { AzureIdentityCredentialAdapter } from "@azure/ms-rest-js";
|
|
import {
|
|
DataExplorer,
|
|
TestAccount,
|
|
generateUniqueName,
|
|
getAccountName,
|
|
getAzureCLICredentials,
|
|
resourceGroupName,
|
|
subscriptionId,
|
|
} from "../fx";
|
|
|
|
test("SQL account using Resource token", async ({ page }) => {
|
|
const nosqlAccountRbacToken = process.env.NOSQL_TESTACCOUNT_TOKEN || "";
|
|
test.skip(nosqlAccountRbacToken.length > 0, "Resource tokens not supported when using data plane RBAC.");
|
|
|
|
const credentials = getAzureCLICredentials();
|
|
const adaptedCredentials = new AzureIdentityCredentialAdapter(credentials);
|
|
const armClient = new CosmosDBManagementClient(adaptedCredentials, subscriptionId);
|
|
const accountName = getAccountName(TestAccount.SQL);
|
|
const account = await armClient.databaseAccounts.get(resourceGroupName, accountName);
|
|
const keys = await armClient.databaseAccounts.listKeys(resourceGroupName, accountName);
|
|
const dbId = generateUniqueName("db");
|
|
const collectionId = "testcollection";
|
|
const client = new CosmosClient({
|
|
endpoint: account.documentEndpoint!,
|
|
key: keys.primaryMasterKey,
|
|
});
|
|
const { database } = await client.databases.createIfNotExists({ id: dbId });
|
|
const { container } = await database.containers.createIfNotExists({ id: collectionId });
|
|
const { user } = await database.users.upsert({ id: "testUser" });
|
|
const { resource: containerPermission } = await user.permissions.upsert({
|
|
id: "partitionLevelPermission",
|
|
permissionMode: PermissionMode.All,
|
|
resource: container.url,
|
|
});
|
|
await expect(containerPermission).toBeDefined();
|
|
|
|
const resourceTokenConnectionString = `AccountEndpoint=${account.documentEndpoint};DatabaseId=${
|
|
database.id
|
|
};CollectionId=${container.id};${containerPermission!._token}`;
|
|
|
|
await page.goto("https://localhost:1234/hostedExplorer.html");
|
|
const switchConnectionLink = page.getByTestId("Link:SwitchConnectionType");
|
|
await switchConnectionLink.waitFor();
|
|
await switchConnectionLink.click();
|
|
await page.getByPlaceholder("Please enter a connection string").fill(resourceTokenConnectionString);
|
|
await page.getByRole("button", { name: "Connect" }).click();
|
|
|
|
const explorer = await DataExplorer.waitForExplorer(page);
|
|
|
|
const collectionNode = explorer.treeNode(`${collectionId}`);
|
|
await collectionNode.element.waitFor();
|
|
await expect(collectionNode.element).toBeAttached();
|
|
|
|
await database.delete();
|
|
});
|