1
0
Fork 0
mirror of https://github.com/archtechx/tenancy.git synced 2026-02-05 14:34:04 +00:00

Delete temp action, improve tests

This commit is contained in:
lukinovec 2023-04-27 13:47:56 +02:00
parent 2745f824aa
commit a5d004132c
2 changed files with 25 additions and 96 deletions

View file

@ -1,71 +0,0 @@
<?php
declare(strict_types=1);
namespace Stancl\Tenancy\Actions;
use Illuminate\Console\Command;
use Illuminate\Support\Facades\DB;
use Illuminate\Support\Facades\Schema;
use Stancl\Tenancy\Database\Concerns\BelongsToPrimaryModel;
class CreateRLSPoliciesForTables
{
// protected $signature = 'tenants:create-rls-policies';
public static function handle()
{
$tenantModels = static::getTenantModels();
$tenantKey = config('tenancy.models.tenant_key_column');
foreach ($tenantModels as $model) {
$table = $model->getTable();
DB::statement("DROP POLICY IF EXISTS {$table}_rls_policy ON {$table}");
if (! Schema::hasColumn($table, $tenantKey)) {
// Table is not directly related to tenant
if (in_array(BelongsToPrimaryModel::class, class_uses_recursive($model::class))) {
$parentName = $model->getRelationshipToPrimaryModel();
$parentKey = $model->$parentName()->getForeignKeyName();
$parentModel = $model->$parentName()->make();
$parentTable = str($parentModel->getTable())->toString();
DB::statement("CREATE POLICY {$table}_rls_policy ON {$table} USING (
{$parentKey} IN (
SELECT id
FROM {$parentTable}
WHERE ({$tenantKey}::TEXT = (
SELECT {$tenantKey}
FROM {$parentTable}
WHERE id = {$parentKey}
))
)
)");
DB::statement("ALTER TABLE {$table} FORCE ROW LEVEL SECURITY");
return Command::SUCCESS;
} else {
$modelName = $model::class;
// $this->components->info("Table '$table' is not related to tenant. Make sure $modelName uses the BelongsToPrimaryModel trait.");
return Command::FAILURE;
}
}
DB::statement("CREATE POLICY {$table}_rls_policy ON {$table} USING ({$tenantKey}::TEXT = current_user);");
DB::statement("ALTER TABLE {$table} FORCE ROW LEVEL SECURITY");
// $this->components->info("Created RLS policy for table '$table'");
}
return Command::SUCCESS;
}
public static function getTenantModels(): array
{
return array_map(fn (string $modelName) => (new $modelName), config('tenancy.models.rls'));
}
}

View file

@ -15,6 +15,7 @@ beforeEach(function () {
config(['tenancy.models.tenant' => Tenant::class]);
// Drop all existing policies
foreach (DB::select('select * from pg_policies') as $policy) {
DB::statement("DROP POLICY IF EXISTS {$policy->policyname} ON {$policy->tablename};");
}
@ -48,7 +49,7 @@ test('postgres user can get deleted using the job', function() {
expect($tenantHasPostgresUser())->toBeFalse();
});
test('correct rls policies get created', function(bool $action) {
test('correct rls policies get created', function () {
config([
'tenancy.models.rls' => [
Post::class, // Primary model (directly belongs to tenant)
@ -63,8 +64,6 @@ test('correct rls policies get created', function(bool $action) {
Schema::create('tenants', function (Blueprint $table) {
$table->string('id')->primary();
// your custom columns may go here
$table->timestamps();
$table->json('data')->nullable();
});
@ -89,20 +88,18 @@ test('correct rls policies get created', function(bool $action) {
});
$getRlsPolicies = fn () => DB::select('select * from pg_policies');
$getModelTables = fn () => collect(config('tenancy.models.rls'))->map(fn (string $model) => (new $model)->getTable());
$getRlsModels = fn () => config('tenancy.models.rls');
$getModelTables = fn () => collect($getRlsModels())->map(fn (string $model) => (new $model)->getTable());
$getRlsTables = fn() => $getModelTables()->map(fn ($table) => DB::select('select relname, relrowsecurity, relforcerowsecurity from pg_class WHERE oid = ' . "'$table'::regclass"))->collapse();
expect($getRlsPolicies())->toHaveCount(0);
if ($action) {
CreateRLSPoliciesForTables::handle();
} else {
pest()->artisan('tenants:create-rls-policies');
}
pest()->artisan('tenants:create-rls-policies');
expect($getRlsPolicies())->toHaveCount(count(config('tenancy.models.rls'))); // 1
expect($getRlsTables())->toHaveCount(count(config('tenancy.models.rls'))); // 1
// Check if tables with policies are RLS protected
expect($getRlsPolicies())->toHaveCount(count($getRlsModels())); // 1
expect($getRlsTables())->toHaveCount(count($getRlsModels())); // 1
// Check if RLS is forced on tables with the policies
foreach ($getRlsTables() as $table) {
expect($getModelTables())->toContain($table->relname);
expect($table->relforcerowsecurity)->toBeTrue();
@ -111,25 +108,28 @@ test('correct rls policies get created', function(bool $action) {
config([
'tenancy.models.rls' => array_merge([
ScopedComment::class, // Add secondary model to RLS protected models (belongs to tenant through Post)
], config('tenancy.models.rls')),
], $getRlsModels()),
]);
if ($action) {
CreateRLSPoliciesForTables::handle();
} else {
pest()->artisan('tenants:create-rls-policies');
expect(count($getRlsModels()))->toBe(2); // Post::class + ScopedComment::class
// Drop all existing policies to check if the command creates policies for multiple tables
foreach ($getRlsPolicies() as $policy) {
DB::statement("DROP POLICY IF EXISTS {$policy->policyname} ON {$policy->tablename}");
}
// Check if tables with policies are RLS protected (even the ones not directly related to the tenant)
// Models related to tenant through some model must use the BelongsToPrimaryModel trait to work properly
expect($getRlsPolicies())->toHaveCount(count(config('tenancy.models.rls'))); // 2
expect($getRlsTables())->toHaveCount(count(config('tenancy.models.rls'))); // 2
expect($getRlsPolicies())->toHaveCount(0);
pest()->artisan('tenants:create-rls-policies');
// Check if all tables with policies are RLS protected (even the ones not directly related to the tenant)
// Models related to tenant through some model must use the BelongsToPrimaryModel trait
// For the command to create the policy correctly for the model's table
expect($getRlsPolicies())->toHaveCount(count($getRlsModels())); // 2
expect($getRlsTables())->toHaveCount(count($getRlsModels())); // 2
foreach ($getRlsTables() as $table) {
expect($getModelTables())->toContain($table->relname);
expect($table->relforcerowsecurity)->toBeTrue();
}
})->with([
'action' => true,
'command' => false
]);
});