|
24 | 24 | describe "#update user password" do |
25 | 25 | let(:user) { 'useruser' } |
26 | 26 | let(:pass) { 'passpass' } |
27 | | - let(:query) { "SET PASSWORD FOR #{user} = '#{pass}'" } |
| 27 | + let(:query) { "SET PASSWORD FOR \"#{user}\" = '#{pass}'" } |
28 | 28 |
|
29 | 29 | it "should GET to update user password" do |
30 | 30 | expect(subject.update_user_password(user, pass)).to be_a(Net::HTTPOK) |
|
35 | 35 | let(:user) { 'useruser' } |
36 | 36 | let(:perm) { :write } |
37 | 37 | let(:db) { 'foo' } |
38 | | - let(:query) { "GRANT #{perm.to_s.upcase} ON #{db} TO #{user}" } |
| 38 | + let(:query) { "GRANT #{perm.to_s.upcase} ON \"#{db}\" TO \"#{user}\"" } |
39 | 39 |
|
40 | 40 | it "should GET to grant privileges for a user on a database" do |
41 | 41 | expect(subject.grant_user_privileges(user, db, perm)).to be_a(Net::HTTPOK) |
|
44 | 44 |
|
45 | 45 | describe "#grant_user_admin_privileges" do |
46 | 46 | let(:user) { 'useruser' } |
47 | | - let(:query) { "GRANT ALL PRIVILEGES TO #{user}" } |
| 47 | + let(:query) { "GRANT ALL PRIVILEGES TO \"#{user}\"" } |
48 | 48 |
|
49 | 49 | it "should GET to grant privileges for a user on a database" do |
50 | 50 | expect(subject.grant_user_admin_privileges(user)).to be_a(Net::HTTPOK) |
|
55 | 55 | let(:user) { 'useruser' } |
56 | 56 | let(:perm) { :write } |
57 | 57 | let(:db) { 'foo' } |
58 | | - let(:query) { "REVOKE #{perm.to_s.upcase} ON #{db} FROM #{user}" } |
| 58 | + let(:query) { "REVOKE #{perm.to_s.upcase} ON \"#{db}\" FROM \"#{user}\"" } |
59 | 59 |
|
60 | 60 | it "should GET to revoke privileges from a user on a database" do |
61 | 61 | expect(subject.revoke_user_privileges(user, db, perm)).to be_a(Net::HTTPOK) |
|
66 | 66 | let(:user) { 'useruser' } |
67 | 67 | let(:pass) { 'passpass' } |
68 | 68 | let(:db) { 'foo' } |
69 | | - let(:query) { "CREATE user #{user} WITH PASSWORD '#{pass}'; GRANT ALL ON #{db} TO #{user}" } |
| 69 | + let(:query) { "CREATE user \"#{user}\" WITH PASSWORD '#{pass}'; GRANT ALL ON \"#{db}\" TO \"#{user}\"" } |
70 | 70 |
|
71 | 71 | context "without specifying permissions" do |
72 | 72 | it "should GET to create a new database user with all permissions" do |
|
76 | 76 |
|
77 | 77 | context "with passing permission as argument" do |
78 | 78 | let(:permission) { :read } |
79 | | - let(:query) { "CREATE user #{user} WITH PASSWORD '#{pass}'; GRANT #{permission.to_s.upcase} ON #{db} TO #{user}" } |
| 79 | + let(:query) { "CREATE user \"#{user}\" WITH PASSWORD '#{pass}'; GRANT #{permission.to_s.upcase} ON \"#{db}\" TO \"#{user}\"" } |
80 | 80 |
|
81 | 81 | it "should GET to create a new database user with permission set" do |
82 | 82 | expect(subject.create_database_user(db, user, pass, permissions: permission)).to be_a(Net::HTTPOK) |
|
86 | 86 |
|
87 | 87 | describe "#delete_user" do |
88 | 88 | let(:user) { 'useruser' } |
89 | | - let(:query) { "DROP USER #{user}" } |
| 89 | + let(:query) { "DROP USER \"#{user}\"" } |
90 | 90 |
|
91 | 91 | it "should GET to delete a user" do |
92 | 92 | expect(subject.delete_user(user)).to be_a(Net::HTTPOK) |
|
105 | 105 |
|
106 | 106 | describe "#list_user_grants" do |
107 | 107 | let(:user) { 'useruser' } |
108 | | - let(:list_query) { "SHOW GRANTS FOR #{user}" } |
| 108 | + let(:list_query) { "SHOW GRANTS FOR \"#{user}\"" } |
109 | 109 |
|
110 | 110 | before do |
111 | 111 | stub_request(:get, "http://influxdb.test:9999/query") |
|
0 commit comments