mirror of
https://github.com/meilisearch/MeiliSearch
synced 2024-12-29 16:01:40 +01:00
5d48f72ade
2065: MeiliSearch v0.25.0: `stable` -> `main` r=curquiza a=curquiza Co-authored-by: Clémentine Urquizar <clementine@meilisearch.com> Co-authored-by: Clément Renault <clement@meilisearch.com> Co-authored-by: bors[bot] <26634292+bors[bot]@users.noreply.github.com> Co-authored-by: many <maxime@meilisearch.com> Co-authored-by: Marin Postma <postma.marin@protonmail.com> Co-authored-by: Maxime Legendre <maximelegendre@MacBook-Pro-de-Maxime.local> Co-authored-by: Maxime Legendre <maximelegendre@mbp-de-maxime.home> Co-authored-by: Tamo <tamo@meilisearch.com> Co-authored-by: ManyTheFish <many@meilisearch.com>
640 lines
22 KiB
Rust
640 lines
22 KiB
Rust
use crate::common::Server;
|
|
use chrono::{Duration, Utc};
|
|
use maplit::hashmap;
|
|
use once_cell::sync::Lazy;
|
|
use serde_json::{json, Value};
|
|
use std::collections::{HashMap, HashSet};
|
|
|
|
static AUTHORIZATIONS: Lazy<HashMap<(&'static str, &'static str), &'static str>> =
|
|
Lazy::new(|| {
|
|
hashmap! {
|
|
("POST", "/indexes/products/search") => "search",
|
|
("GET", "/indexes/products/search") => "search",
|
|
("POST", "/indexes/products/documents") => "documents.add",
|
|
("GET", "/indexes/products/documents") => "documents.get",
|
|
("GET", "/indexes/products/documents/0") => "documents.get",
|
|
("DELETE", "/indexes/products/documents/0") => "documents.delete",
|
|
("GET", "/tasks") => "tasks.get",
|
|
("GET", "/indexes/products/tasks") => "tasks.get",
|
|
("GET", "/indexes/products/tasks/0") => "tasks.get",
|
|
("PUT", "/indexes/products/") => "indexes.update",
|
|
("GET", "/indexes/products/") => "indexes.get",
|
|
("DELETE", "/indexes/products/") => "indexes.delete",
|
|
("POST", "/indexes") => "indexes.create",
|
|
("GET", "/indexes") => "indexes.get",
|
|
("GET", "/indexes/products/settings") => "settings.get",
|
|
("GET", "/indexes/products/settings/displayed-attributes") => "settings.get",
|
|
("GET", "/indexes/products/settings/distinct-attribute") => "settings.get",
|
|
("GET", "/indexes/products/settings/filterable-attributes") => "settings.get",
|
|
("GET", "/indexes/products/settings/ranking-rules") => "settings.get",
|
|
("GET", "/indexes/products/settings/searchable-attributes") => "settings.get",
|
|
("GET", "/indexes/products/settings/sortable-attributes") => "settings.get",
|
|
("GET", "/indexes/products/settings/stop-words") => "settings.get",
|
|
("GET", "/indexes/products/settings/synonyms") => "settings.get",
|
|
("DELETE", "/indexes/products/settings") => "settings.update",
|
|
("POST", "/indexes/products/settings") => "settings.update",
|
|
("POST", "/indexes/products/settings/displayed-attributes") => "settings.update",
|
|
("POST", "/indexes/products/settings/distinct-attribute") => "settings.update",
|
|
("POST", "/indexes/products/settings/filterable-attributes") => "settings.update",
|
|
("POST", "/indexes/products/settings/ranking-rules") => "settings.update",
|
|
("POST", "/indexes/products/settings/searchable-attributes") => "settings.update",
|
|
("POST", "/indexes/products/settings/sortable-attributes") => "settings.update",
|
|
("POST", "/indexes/products/settings/stop-words") => "settings.update",
|
|
("POST", "/indexes/products/settings/synonyms") => "settings.update",
|
|
("GET", "/indexes/products/stats") => "stats.get",
|
|
("GET", "/stats") => "stats.get",
|
|
("POST", "/dumps") => "dumps.create",
|
|
("GET", "/dumps/0/status") => "dumps.get",
|
|
("GET", "/version") => "version",
|
|
}
|
|
});
|
|
|
|
static ALL_ACTIONS: Lazy<HashSet<&'static str>> =
|
|
Lazy::new(|| AUTHORIZATIONS.values().cloned().collect());
|
|
|
|
static INVALID_RESPONSE: Lazy<Value> = Lazy::new(|| {
|
|
json!({"message": "The provided API key is invalid.",
|
|
"code": "invalid_api_key",
|
|
"type": "auth",
|
|
"link": "https://docs.meilisearch.com/errors#invalid_api_key"
|
|
})
|
|
});
|
|
|
|
#[actix_rt::test]
|
|
#[cfg_attr(target_os = "windows", ignore)]
|
|
async fn error_access_expired_key() {
|
|
use std::{thread, time};
|
|
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
let content = json!({
|
|
"indexes": ["products"],
|
|
"actions": ALL_ACTIONS.clone(),
|
|
"expiresAt": (Utc::now() + Duration::seconds(1)),
|
|
});
|
|
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
// wait until the key is expired.
|
|
thread::sleep(time::Duration::new(1, 0));
|
|
|
|
for (method, route) in AUTHORIZATIONS.keys() {
|
|
let (response, code) = server.dummy_request(method, route).await;
|
|
|
|
assert_eq!(response, INVALID_RESPONSE.clone());
|
|
assert_eq!(code, 403);
|
|
}
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
#[cfg_attr(target_os = "windows", ignore)]
|
|
async fn error_access_unauthorized_index() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
let content = json!({
|
|
"indexes": ["sales"],
|
|
"actions": ALL_ACTIONS.clone(),
|
|
"expiresAt": Utc::now() + Duration::hours(1),
|
|
});
|
|
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
for (method, route) in AUTHORIZATIONS
|
|
.keys()
|
|
// filter `products` index routes
|
|
.filter(|(_, route)| route.starts_with("/indexes/products"))
|
|
{
|
|
let (response, code) = server.dummy_request(method, route).await;
|
|
|
|
assert_eq!(response, INVALID_RESPONSE.clone());
|
|
assert_eq!(code, 403);
|
|
}
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
#[cfg_attr(target_os = "windows", ignore)]
|
|
async fn error_access_unauthorized_action() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
let content = json!({
|
|
"indexes": ["products"],
|
|
"actions": [],
|
|
"expiresAt": Utc::now() + Duration::hours(1),
|
|
});
|
|
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
for ((method, route), action) in AUTHORIZATIONS.iter() {
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
// Patch API key letting all rights but the needed one.
|
|
let content = json!({
|
|
"actions": ALL_ACTIONS.iter().cloned().filter(|a| a != action).collect::<Vec<_>>(),
|
|
});
|
|
let (_, code) = server.patch_api_key(&key, content).await;
|
|
assert_eq!(code, 200);
|
|
|
|
server.use_api_key(&key);
|
|
let (response, code) = server.dummy_request(method, route).await;
|
|
|
|
assert_eq!(response, INVALID_RESPONSE.clone());
|
|
assert_eq!(code, 403);
|
|
}
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
#[cfg_attr(target_os = "windows", ignore)]
|
|
async fn access_authorized_restricted_index() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
let content = json!({
|
|
"indexes": ["products"],
|
|
"actions": [],
|
|
"expiresAt": Utc::now() + Duration::hours(1),
|
|
});
|
|
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
for ((method, route), action) in AUTHORIZATIONS.iter() {
|
|
// Patch API key letting only the needed action.
|
|
let content = json!({
|
|
"actions": [action],
|
|
});
|
|
|
|
server.use_api_key("MASTER_KEY");
|
|
let (_, code) = server.patch_api_key(&key, content).await;
|
|
assert_eq!(code, 200);
|
|
|
|
server.use_api_key(&key);
|
|
let (response, code) = server.dummy_request(method, route).await;
|
|
|
|
assert_ne!(response, INVALID_RESPONSE.clone());
|
|
assert_ne!(code, 403);
|
|
|
|
// Patch API key using action all action.
|
|
let content = json!({
|
|
"actions": ["*"],
|
|
});
|
|
|
|
server.use_api_key("MASTER_KEY");
|
|
let (_, code) = server.patch_api_key(&key, content).await;
|
|
assert_eq!(code, 200);
|
|
|
|
server.use_api_key(&key);
|
|
let (response, code) = server.dummy_request(method, route).await;
|
|
|
|
assert_ne!(response, INVALID_RESPONSE.clone());
|
|
assert_ne!(code, 403);
|
|
}
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
#[cfg_attr(target_os = "windows", ignore)]
|
|
async fn access_authorized_no_index_restriction() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
let content = json!({
|
|
"indexes": ["*"],
|
|
"actions": [],
|
|
"expiresAt": Utc::now() + Duration::hours(1),
|
|
});
|
|
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
for ((method, route), action) in AUTHORIZATIONS.iter() {
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
// Patch API key letting only the needed action.
|
|
let content = json!({
|
|
"actions": [action],
|
|
});
|
|
let (_, code) = server.patch_api_key(&key, content).await;
|
|
assert_eq!(code, 200);
|
|
|
|
server.use_api_key(&key);
|
|
let (response, code) = server.dummy_request(method, route).await;
|
|
|
|
assert_ne!(response, INVALID_RESPONSE.clone());
|
|
assert_ne!(code, 403);
|
|
|
|
// Patch API key using action all action.
|
|
let content = json!({
|
|
"actions": ["*"],
|
|
});
|
|
|
|
server.use_api_key("MASTER_KEY");
|
|
let (_, code) = server.patch_api_key(&key, content).await;
|
|
assert_eq!(code, 200);
|
|
|
|
server.use_api_key(&key);
|
|
let (response, code) = server.dummy_request(method, route).await;
|
|
|
|
assert_ne!(response, INVALID_RESPONSE.clone());
|
|
assert_ne!(code, 403);
|
|
}
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
#[cfg_attr(target_os = "windows", ignore)]
|
|
async fn access_authorized_stats_restricted_index() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
// create index `test`
|
|
let index = server.index("test");
|
|
let (_, code) = index.create(Some("id")).await;
|
|
assert_eq!(code, 202);
|
|
// create index `products`
|
|
let index = server.index("products");
|
|
let (_, code) = index.create(Some("product_id")).await;
|
|
assert_eq!(code, 202);
|
|
index.wait_task(0).await;
|
|
|
|
// create key with access on `products` index only.
|
|
let content = json!({
|
|
"indexes": ["products"],
|
|
"actions": ["stats.get"],
|
|
"expiresAt": Utc::now() + Duration::hours(1),
|
|
});
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
// use created key.
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
let (response, code) = server.stats().await;
|
|
assert_eq!(code, 200);
|
|
|
|
// key should have access on `products` index.
|
|
assert!(response["indexes"].get("products").is_some());
|
|
|
|
// key should not have access on `test` index.
|
|
assert!(response["indexes"].get("test").is_none());
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
#[cfg_attr(target_os = "windows", ignore)]
|
|
async fn access_authorized_stats_no_index_restriction() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
// create index `test`
|
|
let index = server.index("test");
|
|
let (_, code) = index.create(Some("id")).await;
|
|
assert_eq!(code, 202);
|
|
// create index `products`
|
|
let index = server.index("products");
|
|
let (_, code) = index.create(Some("product_id")).await;
|
|
assert_eq!(code, 202);
|
|
index.wait_task(0).await;
|
|
|
|
// create key with access on all indexes.
|
|
let content = json!({
|
|
"indexes": ["*"],
|
|
"actions": ["stats.get"],
|
|
"expiresAt": Utc::now() + Duration::hours(1),
|
|
});
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
// use created key.
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
let (response, code) = server.stats().await;
|
|
assert_eq!(code, 200);
|
|
|
|
// key should have access on `products` index.
|
|
assert!(response["indexes"].get("products").is_some());
|
|
|
|
// key should have access on `test` index.
|
|
assert!(response["indexes"].get("test").is_some());
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
#[cfg_attr(target_os = "windows", ignore)]
|
|
async fn list_authorized_indexes_restricted_index() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
// create index `test`
|
|
let index = server.index("test");
|
|
let (_, code) = index.create(Some("id")).await;
|
|
assert_eq!(code, 202);
|
|
// create index `products`
|
|
let index = server.index("products");
|
|
let (_, code) = index.create(Some("product_id")).await;
|
|
assert_eq!(code, 202);
|
|
index.wait_task(0).await;
|
|
|
|
// create key with access on `products` index only.
|
|
let content = json!({
|
|
"indexes": ["products"],
|
|
"actions": ["indexes.get"],
|
|
"expiresAt": Utc::now() + Duration::hours(1),
|
|
});
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
// use created key.
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
let (response, code) = server.list_indexes().await;
|
|
assert_eq!(code, 200);
|
|
|
|
let response = response.as_array().unwrap();
|
|
// key should have access on `products` index.
|
|
assert!(response.iter().any(|index| index["uid"] == "products"));
|
|
|
|
// key should not have access on `test` index.
|
|
assert!(!response.iter().any(|index| index["uid"] == "test"));
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
#[cfg_attr(target_os = "windows", ignore)]
|
|
async fn list_authorized_indexes_no_index_restriction() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
// create index `test`
|
|
let index = server.index("test");
|
|
let (_, code) = index.create(Some("id")).await;
|
|
assert_eq!(code, 202);
|
|
// create index `products`
|
|
let index = server.index("products");
|
|
let (_, code) = index.create(Some("product_id")).await;
|
|
assert_eq!(code, 202);
|
|
index.wait_task(0).await;
|
|
|
|
// create key with access on all indexes.
|
|
let content = json!({
|
|
"indexes": ["*"],
|
|
"actions": ["indexes.get"],
|
|
"expiresAt": Utc::now() + Duration::hours(1),
|
|
});
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
// use created key.
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
let (response, code) = server.list_indexes().await;
|
|
assert_eq!(code, 200);
|
|
|
|
let response = response.as_array().unwrap();
|
|
// key should have access on `products` index.
|
|
assert!(response.iter().any(|index| index["uid"] == "products"));
|
|
|
|
// key should have access on `test` index.
|
|
assert!(response.iter().any(|index| index["uid"] == "test"));
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
async fn list_authorized_tasks_restricted_index() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
// create index `test`
|
|
let index = server.index("test");
|
|
let (_, code) = index.create(Some("id")).await;
|
|
assert_eq!(code, 202);
|
|
// create index `products`
|
|
let index = server.index("products");
|
|
let (_, code) = index.create(Some("product_id")).await;
|
|
assert_eq!(code, 202);
|
|
index.wait_task(0).await;
|
|
|
|
// create key with access on `products` index only.
|
|
let content = json!({
|
|
"indexes": ["products"],
|
|
"actions": ["tasks.get"],
|
|
"expiresAt": Utc::now() + Duration::hours(1),
|
|
});
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
// use created key.
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
let (response, code) = server.service.get("/tasks").await;
|
|
assert_eq!(code, 200);
|
|
println!("{}", response);
|
|
let response = response["results"].as_array().unwrap();
|
|
// key should have access on `products` index.
|
|
assert!(response.iter().any(|task| task["indexUid"] == "products"));
|
|
|
|
// key should not have access on `test` index.
|
|
assert!(!response.iter().any(|task| task["indexUid"] == "test"));
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
async fn list_authorized_tasks_no_index_restriction() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
// create index `test`
|
|
let index = server.index("test");
|
|
let (_, code) = index.create(Some("id")).await;
|
|
assert_eq!(code, 202);
|
|
// create index `products`
|
|
let index = server.index("products");
|
|
let (_, code) = index.create(Some("product_id")).await;
|
|
assert_eq!(code, 202);
|
|
index.wait_task(0).await;
|
|
|
|
// create key with access on all indexes.
|
|
let content = json!({
|
|
"indexes": ["*"],
|
|
"actions": ["tasks.get"],
|
|
"expiresAt": Utc::now() + Duration::hours(1),
|
|
});
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
// use created key.
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
let (response, code) = server.service.get("/tasks").await;
|
|
assert_eq!(code, 200);
|
|
|
|
let response = response["results"].as_array().unwrap();
|
|
// key should have access on `products` index.
|
|
assert!(response.iter().any(|task| task["indexUid"] == "products"));
|
|
|
|
// key should have access on `test` index.
|
|
assert!(response.iter().any(|task| task["indexUid"] == "test"));
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
async fn error_creating_index_without_action() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
// create key with access on all indexes.
|
|
let content = json!({
|
|
"indexes": ["*"],
|
|
"actions": ALL_ACTIONS.iter().cloned().filter(|a| *a != "indexes.create").collect::<Vec<_>>(),
|
|
"expiresAt": "2050-11-13T00:00:00Z"
|
|
});
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
// use created key.
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
let expected_error = json!({
|
|
"message": "Index `test` not found.",
|
|
"code": "index_not_found",
|
|
"type": "invalid_request",
|
|
"link": "https://docs.meilisearch.com/errors#index_not_found"
|
|
});
|
|
|
|
// try to create a index via add documents route
|
|
let index = server.index("test");
|
|
let documents = json!([
|
|
{
|
|
"id": 1,
|
|
"content": "foo",
|
|
}
|
|
]);
|
|
|
|
let (response, code) = index.add_documents(documents, None).await;
|
|
assert_eq!(code, 202, "{:?}", response);
|
|
let task_id = response["uid"].as_u64().unwrap();
|
|
|
|
let response = index.wait_task(task_id).await;
|
|
assert_eq!(response["status"], "failed");
|
|
assert_eq!(response["error"], expected_error.clone());
|
|
|
|
// try to create a index via add settings route
|
|
let settings = json!({ "distinctAttribute": "test"});
|
|
|
|
let (response, code) = index.update_settings(settings).await;
|
|
assert_eq!(code, 202);
|
|
let task_id = response["uid"].as_u64().unwrap();
|
|
|
|
let response = index.wait_task(task_id).await;
|
|
|
|
assert_eq!(response["status"], "failed");
|
|
assert_eq!(response["error"], expected_error.clone());
|
|
|
|
// try to create a index via add specialized settings route
|
|
let (response, code) = index.update_distinct_attribute(json!("test")).await;
|
|
assert_eq!(code, 202);
|
|
let task_id = response["uid"].as_u64().unwrap();
|
|
|
|
let response = index.wait_task(task_id).await;
|
|
|
|
assert_eq!(response["status"], "failed");
|
|
assert_eq!(response["error"], expected_error.clone());
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
async fn lazy_create_index() {
|
|
let mut server = Server::new_auth().await;
|
|
server.use_api_key("MASTER_KEY");
|
|
|
|
// create key with access on all indexes.
|
|
let content = json!({
|
|
"indexes": ["*"],
|
|
"actions": ["*"],
|
|
"expiresAt": "2050-11-13T00:00:00Z"
|
|
});
|
|
|
|
let (response, code) = server.add_api_key(content).await;
|
|
assert_eq!(code, 201);
|
|
assert!(response["key"].is_string());
|
|
|
|
// use created key.
|
|
let key = response["key"].as_str().unwrap();
|
|
server.use_api_key(&key);
|
|
|
|
// try to create a index via add documents route
|
|
let index = server.index("test");
|
|
let documents = json!([
|
|
{
|
|
"id": 1,
|
|
"content": "foo",
|
|
}
|
|
]);
|
|
|
|
let (response, code) = index.add_documents(documents, None).await;
|
|
assert_eq!(code, 202, "{:?}", response);
|
|
let task_id = response["uid"].as_u64().unwrap();
|
|
|
|
index.wait_task(task_id).await;
|
|
|
|
let (response, code) = index.get_task(task_id).await;
|
|
assert_eq!(code, 200);
|
|
assert_eq!(response["status"], "succeeded");
|
|
|
|
// try to create a index via add settings route
|
|
let index = server.index("test1");
|
|
let settings = json!({ "distinctAttribute": "test"});
|
|
|
|
let (response, code) = index.update_settings(settings).await;
|
|
assert_eq!(code, 202);
|
|
let task_id = response["uid"].as_u64().unwrap();
|
|
|
|
index.wait_task(task_id).await;
|
|
|
|
let (response, code) = index.get_task(task_id).await;
|
|
assert_eq!(code, 200);
|
|
assert_eq!(response["status"], "succeeded");
|
|
|
|
// try to create a index via add specialized settings route
|
|
let index = server.index("test2");
|
|
let (response, code) = index.update_distinct_attribute(json!("test")).await;
|
|
assert_eq!(code, 202);
|
|
let task_id = response["uid"].as_u64().unwrap();
|
|
|
|
index.wait_task(task_id).await;
|
|
|
|
let (response, code) = index.get_task(task_id).await;
|
|
assert_eq!(code, 200);
|
|
assert_eq!(response["status"], "succeeded");
|
|
}
|