Skip to content

Commit 8e1069c

Browse files
committed
enable passing tests
1 parent 349f2bc commit 8e1069c

9 files changed

+35
-35
lines changed

spec/ParseAPI.spec.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ describe('miscellaneous', function() {
113113
.catch(done);
114114
});
115115

116-
it('ensure that email is uniquely indexed', done => {
116+
it_exclude_dbs(['postgres'])('ensure that email is uniquely indexed', done => {
117117
let numFailed = 0;
118118
let numCreated = 0;
119119
let user1 = new Parse.User();

spec/ParseObject.spec.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1060,7 +1060,7 @@ describe('Parse.Object testing', () => {
10601060
});
10611061
});
10621062

1063-
it_exclude_dbs(['postgres'])("saving children in an array", function(done) {
1063+
it("saving children in an array", function(done) {
10641064
var Parent = Parse.Object.extend("Parent");
10651065
var Child = Parse.Object.extend("Child");
10661066

spec/ParseQuery.spec.js

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ describe('Parse.Query testing', () => {
150150
});
151151
});
152152

153-
it_exclude_dbs(['postgres'])("containedIn object array queries", function(done) {
153+
it("containedIn object array queries", function(done) {
154154
var messageList = [];
155155
for (var i = 0; i < 4; ++i) {
156156
var message = new TestObject({});
@@ -1160,7 +1160,7 @@ describe('Parse.Query testing', () => {
11601160
});
11611161
});
11621162

1163-
it_exclude_dbs(['postgres'])("matches string", function(done) {
1163+
it("matches string", function(done) {
11641164
var thing1 = new TestObject();
11651165
thing1.set("myString", "football");
11661166
var thing2 = new TestObject();
@@ -1576,7 +1576,7 @@ describe('Parse.Query testing', () => {
15761576
})
15771577
});
15781578

1579-
it('properly includes array of mixed objects', (done) => {
1579+
it_exclude_dbs(['postgres'])('properly includes array of mixed objects', (done) => {
15801580
let objects = [];
15811581
let total = 0;
15821582
while(objects.length != 5) {

spec/ParseRole.spec.js

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ var Auth = require("../src/Auth").Auth;
77
var Config = require("../src/Config");
88

99
describe('Parse Role testing', () => {
10-
it_exclude_dbs(['postgres'])('Do a bunch of basic role testing', done => {
10+
it('Do a bunch of basic role testing', done => {
1111
var user;
1212
var role;
1313

@@ -76,7 +76,7 @@ describe('Parse Role testing', () => {
7676
return role.save({}, { useMasterKey: true });
7777
};
7878

79-
it_exclude_dbs(['postgres'])("should not recursively load the same role multiple times", (done) => {
79+
it("should not recursively load the same role multiple times", (done) => {
8080
var rootRole = "RootRole";
8181
var roleNames = ["FooRole", "BarRole", "BazRole"];
8282
var allRoles = [rootRole].concat(roleNames);
@@ -142,7 +142,7 @@ describe('Parse Role testing', () => {
142142

143143
});
144144

145-
it_exclude_dbs(['postgres'])("should recursively load roles", (done) => {
145+
it("should recursively load roles", (done) => {
146146
var rolesNames = ["FooRole", "BarRole", "BazRole"];
147147
var roleIds = {};
148148
createTestUser().then( (user) => {
@@ -174,7 +174,7 @@ describe('Parse Role testing', () => {
174174
});
175175
});
176176

177-
it_exclude_dbs(['postgres'])("_Role object should not save without name.", (done) => {
177+
it("_Role object should not save without name.", (done) => {
178178
var role = new Parse.Role();
179179
role.save(null,{useMasterKey:true})
180180
.then((r) => {
@@ -245,7 +245,7 @@ describe('Parse Role testing', () => {
245245

246246
});
247247

248-
it_exclude_dbs(['postgres'])('can create role and query empty users', (done)=> {
248+
it('can create role and query empty users', (done)=> {
249249
var roleACL = new Parse.ACL();
250250
roleACL.setPublicReadAccess(true);
251251
var role = new Parse.Role('subscribers', roleACL);
@@ -265,7 +265,7 @@ describe('Parse Role testing', () => {
265265
});
266266

267267
// Based on various scenarios described in issues #827 and #683,
268-
it_exclude_dbs(['postgres'])('should properly handle role permissions on objects', (done) => {
268+
it('should properly handle role permissions on objects', (done) => {
269269
var user, user2, user3;
270270
var role, role2, role3;
271271
var obj, obj2;

spec/ParseUser.spec.js

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ describe('Parse.User testing', () => {
8888
});
8989
});
9090

91-
it_exclude_dbs(['postgres'])('should respect ACL without locking user out', (done) => {
91+
it('should respect ACL without locking user out', (done) => {
9292
let user = new Parse.User();
9393
let ACL = new Parse.ACL();
9494
ACL.setPublicReadAccess(false);
@@ -491,7 +491,7 @@ describe('Parse.User testing', () => {
491491
return promise._thenRunCallbacks(optionsOrCallback);
492492
}
493493

494-
it_exclude_dbs(['postgres'])("contained in user array queries", (done) => {
494+
it("contained in user array queries", (done) => {
495495
var USERS = 4;
496496
var MESSAGES = 5;
497497

@@ -591,7 +591,7 @@ describe('Parse.User testing', () => {
591591
});
592592
});
593593

594-
it_exclude_dbs(['postgres'])("count users", (done) => {
594+
it("count users", (done) => {
595595
var james = new Parse.User();
596596
james.set("username", "james");
597597
james.set("password", "mypass");
@@ -1591,7 +1591,7 @@ describe('Parse.User testing', () => {
15911591
});
15921592
});
15931593

1594-
it_exclude_dbs(['postgres'])('should fail linking with existing', (done) => {
1594+
it('should fail linking with existing', (done) => {
15951595
var provider = getMockFacebookProvider();
15961596
Parse.User._registerAuthenticationProvider(provider);
15971597
Parse.User._logInWith("facebook", {
@@ -2667,7 +2667,7 @@ describe('Parse.User testing', () => {
26672667
});
26682668
});
26692669

2670-
it_exclude_dbs(['postgres'])('should not fail querying non existing relations', done => {
2670+
it('should not fail querying non existing relations', done => {
26712671
let user = new Parse.User();
26722672
user.set({
26732673
username: 'hello',

spec/PointerPermissions.spec.js

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -465,7 +465,7 @@ describe('Pointer Permissions', () => {
465465
});
466466
});
467467

468-
it_exclude_dbs(['postgres'])('tests CLP / Pointer Perms / ACL read (PP/ACL OK)', (done) => {
468+
it('tests CLP / Pointer Perms / ACL read (PP/ACL OK)', (done) => {
469469
/*
470470
tests:
471471
CLP: find/get open ({"*": true})
@@ -512,7 +512,7 @@ describe('Pointer Permissions', () => {
512512
});
513513
});
514514

515-
it_exclude_dbs(['postgres'])('tests CLP / Pointer Perms / ACL read (ACL locked)', (done) => {
515+
it('tests CLP / Pointer Perms / ACL read (ACL locked)', (done) => {
516516
/*
517517
tests:
518518
CLP: find/get open ({"*": true})
@@ -557,7 +557,7 @@ describe('Pointer Permissions', () => {
557557
});
558558
});
559559

560-
it_exclude_dbs(['postgres'])('should let master key find objects', (done) => {
560+
it('should let master key find objects', (done) => {
561561
let config = new Config(Parse.applicationId);
562562
let user = new Parse.User();
563563
let object = new Parse.Object('AnObject');
@@ -587,7 +587,7 @@ describe('Pointer Permissions', () => {
587587
})
588588
});
589589

590-
it_exclude_dbs(['postgres'])('should let master key get objects', (done) => {
590+
it('should let master key get objects', (done) => {
591591
let config = new Config(Parse.applicationId);
592592
let user = new Parse.User();
593593
let object = new Parse.Object('AnObject');
@@ -619,7 +619,7 @@ describe('Pointer Permissions', () => {
619619
});
620620

621621

622-
it_exclude_dbs(['postgres'])('should let master key update objects', (done) => {
622+
it('should let master key update objects', (done) => {
623623
let config = new Config(Parse.applicationId);
624624
let user = new Parse.User();
625625
let object = new Parse.Object('AnObject');
@@ -647,7 +647,7 @@ describe('Pointer Permissions', () => {
647647
})
648648
});
649649

650-
it_exclude_dbs(['postgres'])('should let master key delete objects', (done) => {
650+
it('should let master key delete objects', (done) => {
651651
let config = new Config(Parse.applicationId);
652652
let user = new Parse.User();
653653
let object = new Parse.Object('AnObject');

spec/Schema.spec.js

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ describe('SchemaController', () => {
9999
});
100100
});
101101

102-
it_exclude_dbs(['postgres'])('class-level permissions test user', (done) => {
102+
it('class-level permissions test user', (done) => {
103103
var user;
104104
createTestUser().then((u) => {
105105
user = u;
@@ -124,7 +124,7 @@ describe('SchemaController', () => {
124124
});
125125
});
126126

127-
it_exclude_dbs(['postgres'])('class-level permissions test get', (done) => {
127+
it('class-level permissions test get', (done) => {
128128
var obj;
129129
createTestUser()
130130
.then(user => {
@@ -163,7 +163,7 @@ describe('SchemaController', () => {
163163
});
164164
});
165165

166-
it_exclude_dbs(['postgres'])('can add classes without needing an object', done => {
166+
it('can add classes without needing an object', done => {
167167
config.database.loadSchema()
168168
.then(schema => schema.addClassIfNotExists('NewClass', {
169169
foo: {type: 'String'}
@@ -388,7 +388,7 @@ describe('SchemaController', () => {
388388
});
389389
});
390390

391-
it_exclude_dbs(['postgres'])('will create classes', done => {
391+
it('will create classes', done => {
392392
config.database.loadSchema()
393393
.then(schema => schema.addClassIfNotExists('NewClass', {
394394
aNumber: {type: 'Number'},
@@ -436,7 +436,7 @@ describe('SchemaController', () => {
436436
});
437437
});
438438

439-
it_exclude_dbs(['postgres'])('creates the default fields for non-custom classes', done => {
439+
it('creates the default fields for non-custom classes', done => {
440440
config.database.loadSchema()
441441
.then(schema => schema.addClassIfNotExists('_Installation', {
442442
foo: {type: 'Number'},
@@ -478,7 +478,7 @@ describe('SchemaController', () => {
478478
});
479479
});
480480

481-
it_exclude_dbs(['postgres'])('creates non-custom classes which include relation field', done => {
481+
it('creates non-custom classes which include relation field', done => {
482482
config.database.loadSchema()
483483
.then(schema => schema.addClassIfNotExists('_Role', {}))
484484
.then(actualSchema => {
@@ -507,7 +507,7 @@ describe('SchemaController', () => {
507507
});
508508
});
509509

510-
it_exclude_dbs(['postgres'])('creates non-custom classes which include pointer field', done => {
510+
it('creates non-custom classes which include pointer field', done => {
511511
config.database.loadSchema()
512512
.then(schema => schema.addClassIfNotExists('_Session', {}))
513513
.then(actualSchema => {

spec/Uniqueness.spec.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ describe('Uniqueness', function() {
5252
});
5353
});
5454

55-
it_exclude_dbs(['postgres'])('fails when attempting to ensure uniqueness of fields that are not currently unique', done => {
55+
it('fails when attempting to ensure uniqueness of fields that are not currently unique', done => {
5656
let o1 = new Parse.Object('UniqueFail');
5757
o1.set('key', 'val');
5858
let o2 = new Parse.Object('UniqueFail');

spec/ValidationAndPasswordsReset.spec.js

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ describe("Custom Pages, Email Verification, Password Reset", () => {
271271
});
272272
});
273273

274-
it_exclude_dbs(['postgres'])('allows user to login only after user clicks on the link to confirm email address if preventLoginWithUnverifiedEmail is set to true', done => {
274+
it('allows user to login only after user clicks on the link to confirm email address if preventLoginWithUnverifiedEmail is set to true', done => {
275275
var user = new Parse.User();
276276
var sendEmailOptions;
277277
var emailAdapter = {
@@ -359,7 +359,7 @@ describe("Custom Pages, Email Verification, Password Reset", () => {
359359
});
360360
});
361361

362-
it_exclude_dbs(['postgres'])('fails if you include an emailAdapter, set a publicServerURL, but have no appName and send a password reset email', done => {
362+
it('fails if you include an emailAdapter, set a publicServerURL, but have no appName and send a password reset email', done => {
363363
reconfigureServer({
364364
appName: undefined,
365365
publicServerURL: 'http://localhost:1337/1',
@@ -391,7 +391,7 @@ describe("Custom Pages, Email Verification, Password Reset", () => {
391391
});
392392
});
393393

394-
it_exclude_dbs(['postgres'])('fails if you include an emailAdapter, have an appName, but have no publicServerURL and send a password reset email', done => {
394+
it('fails if you include an emailAdapter, have an appName, but have no publicServerURL and send a password reset email', done => {
395395
reconfigureServer({
396396
appName: undefined,
397397
emailAdapter: MockEmailAdapterWithOptions({
@@ -422,7 +422,7 @@ describe("Custom Pages, Email Verification, Password Reset", () => {
422422
});
423423
});
424424

425-
it_exclude_dbs(['postgres'])('fails if you set a publicServerURL, have an appName, but no emailAdapter and send a password reset email', done => {
425+
it('fails if you set a publicServerURL, have an appName, but no emailAdapter and send a password reset email', done => {
426426
reconfigureServer({
427427
appName: 'unused',
428428
publicServerURL: 'http://localhost:1337/1',
@@ -450,7 +450,7 @@ describe("Custom Pages, Email Verification, Password Reset", () => {
450450
});
451451
});
452452

453-
it_exclude_dbs(['postgres'])('succeeds sending a password reset email if appName, publicServerURL, and email adapter are prodvided', done => {
453+
it('succeeds sending a password reset email if appName, publicServerURL, and email adapter are prodvided', done => {
454454
reconfigureServer({
455455
appName: 'coolapp',
456456
publicServerURL: 'http://localhost:1337/1',

0 commit comments

Comments
 (0)