Advanced pgTAP Testing
While basic pgTAP provides excellent testing capabilities, you can enhance the testing workflow using database development tools and helper packages. This guide covers advanced testing techniques using database.dev and community-maintained test helpers.
Using database.dev
Database.dev is a package manager for Postgres that allows installation and use of community-maintained packages, including testing utilities.
Setting up dbdev
To use database development tools and packages, install some prerequisites:
1create extension if not exists http with schema extensions;2create extension if not exists pg_tle;3drop extension if exists "supabase-dbdev";4select pgtle.uninstall_extension_if_exists('supabase-dbdev');5select6 pgtle.install_extension(7 'supabase-dbdev',8 resp.contents ->> 'version',9 'PostgreSQL package manager',10 resp.contents ->> 'sql'11 )12from extensions.http(13 (14 'GET',15 'https://api.database.dev/rest/v1/'16 || 'package_versions?select=sql,version'17 || '&package_name=eq.supabase-dbdev'18 || '&order=version.desc'19 || '&limit=1',20 array[21 ('apiKey', 'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJzdXBhYmFzZSIsInJlZiI6InhtdXB0cHBsZnZpaWZyYndtbXR2Iiwicm9sZSI6ImFub24iLCJpYXQiOjE2ODAxMDczNzIsImV4cCI6MTk5NTY4MzM3Mn0.z2CN0mvO2No8wSi46Gw59DFGCTJrzM0AQKsu_5k134s')::extensions.http_header22 ],23 null,24 null25 )26) x,27lateral (28 select29 ((row_to_json(x) -> 'content') #>> '{}')::json -> 030) resp(contents);31create extension "supabase-dbdev";32select dbdev.install('supabase-dbdev');3334-- Drop and recreate the extension to ensure a clean installation35drop extension if exists "supabase-dbdev";36create extension "supabase-dbdev";Installing test helpers
The Test Helpers package provides utilities that simplify testing Supabase-specific features:
1select dbdev.install('basejump-supabase_test_helpers');2create extension if not exists "basejump-supabase_test_helpers" version '0.0.6';Test helper benefits
The test helpers package provides several advantages over writing raw pgTAP tests:
-
Simplified User Management
- Create test users with
tests.create_supabase_user() - Switch contexts with
tests.authenticate_as() - Retrieve user IDs using
tests.get_supabase_uid()
- Create test users with
-
Row Level Security (RLS) Testing Utilities
- Verify RLS status with
tests.rls_enabled() - Test policy enforcement
- Simulate different user contexts
- Verify RLS status with
-
Reduced Boilerplate
- No need to manually insert auth.users
- Simplified JWT claim management
- Clean test setup and cleanup
Schema-wide Row Level Security testing
When working with Row Level Security, it's crucial to ensure that RLS is enabled on all tables that need it. Create a simple test to verify RLS is enabled across an entire schema:
1begin;2select plan(1);34-- Verify RLS is enabled on all tables in the public schema5select tests.rls_enabled('public');67select * from finish();8rollback;Test file organization
When working with multiple test files that share common setup requirements, it's beneficial to create a single "pre-test" file that handles the global environment setup. This approach reduces duplication and ensures consistent test environments.
Creating a pre-test hook
Since pgTAP test files are executed in alphabetical order, create a setup file that runs first by using a naming convention like 000-setup-tests-hooks.sql:
1supabase test new 000-setup-tests-hooksThis setup file should contain:
- All shared extensions and dependencies
- Common test utilities
- A simple always green test to verify the setup
Here's an example setup file:
1-- install tests utilities2-- install pgtap extension for testing3create extension if not exists pgtap with schema extensions;4/*5---------------------6---- install dbdev ----7----------------------8Requires:9 - pg_tle: https://github.com/aws/pg_tle10 - pgsql-http: https://github.com/pramsey/pgsql-http11*/12create extension if not exists http with schema extensions;13create extension if not exists pg_tle;14drop extension if exists "supabase-dbdev";15select pgtle.uninstall_extension_if_exists('supabase-dbdev');16select17 pgtle.install_extension(18 'supabase-dbdev',19 resp.contents ->> 'version',20 'PostgreSQL package manager',21 resp.contents ->> 'sql'22 )23from extensions.http(24 (25 'GET',26 'https://api.database.dev/rest/v1/'27 || 'package_versions?select=sql,version'28 || '&package_name=eq.supabase-dbdev'29 || '&order=version.desc'30 || '&limit=1',31 array[32 ('apiKey', 'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJzdXBhYmFzZSIsInJlZiI6InhtdXB0cHBsZnZpaWZyYndtbXR2Iiwicm9sZSI6ImFub24iLCJpYXQiOjE2ODAxMDczNzIsImV4cCI6MTk5NTY4MzM3Mn0.z2CN0mvO2No8wSi46Gw59DFGCTJrzM0AQKsu_5k134s')::extensions.http_header33 ],34 null,35 null36 )37) x,38lateral (39 select40 ((row_to_json(x) -> 'content') #>> '{}')::json -> 041) resp(contents);42create extension "supabase-dbdev";43select dbdev.install('supabase-dbdev');44drop extension if exists "supabase-dbdev";45create extension "supabase-dbdev";46-- Install test helpers47select dbdev.install('basejump-supabase_test_helpers');48create extension if not exists "basejump-supabase_test_helpers" version '0.0.6';4950-- Verify setup with a no-op test51begin;52select plan(1);53select ok(true, 'Pre-test hook completed successfully');54select * from finish();55rollback;Benefits
This approach provides several advantages:
- Reduces code duplication across test files
- Ensures consistent test environment setup
- Makes it easier to maintain and update shared dependencies
- Provides immediate feedback if the setup process fails
Your subsequent test files (001-auth-tests.sql, 002-rls-tests.sql) can focus solely on their specific test cases, knowing that the environment is properly configured.
Example: Advanced RLS testing
Here's a complete example using test helpers to verify RLS policies putting it all together:
1begin;2-- Assuming 000-setup-tests-hooks.sql file is present to use tests helpers3select plan(4);45-- Set up test data67-- Create test supabase users8select tests.create_supabase_user('user1@test.com');9select tests.create_supabase_user('user2@test.com');1011-- Create test data12insert into public.todos (task, user_id) values13 ('User 1 Task 1', tests.get_supabase_uid('user1@test.com')),14 ('User 1 Task 2', tests.get_supabase_uid('user1@test.com')),15 ('User 2 Task 1', tests.get_supabase_uid('user2@test.com'));1617-- Test as User 118select tests.authenticate_as('user1@test.com');1920-- Test 1: User 1 should only see their own todos21select results_eq(22 'select count(*) from todos',23 ARRAY[2::bigint],24 'User 1 should only see their 2 todos'25);2627-- Test 2: User 1 can create their own todo28select lives_ok(29 $$insert into todos (task, user_id) values ('New Task', tests.get_supabase_uid('user1@test.com'))$$,30 'User 1 can create their own todo'31);3233-- Test as User 234select tests.authenticate_as('user2@test.com');3536-- Test 3: User 2 should only see their own todos37select results_eq(38 'select count(*) from todos',39 ARRAY[1::bigint],40 'User 2 should only see their 1 todo'41);4243-- Test 4: User 2 cannot modify User 1's todo44SELECT results_ne(45 $$ update todos set task = 'Hacked!' where user_id = tests.get_supabase_uid('user1@test.com') returning 1 $$,46 $$ values(1) $$,47 'User 2 cannot modify User 1 todos'48);4950select * from finish();51rollback;Not another todo app: Testing complex organizations
Todo apps are great for learning, but this section explores testing a more realistic scenario: a multi-tenant content publishing platform. This example demonstrates testing complex permissions, plan restrictions, and content management.
System overview
This demo app implements:
- Organizations with tiered plans (free/pro/enterprise)
- Role-based access (owner/admin/editor/viewer)
- Content management (posts/comments)
- Premium content restrictions
- Plan-based limitations
What makes this complex?
-
Layered Permissions
- Role hierarchies affect access rights
- Plan types influence user capabilities
- Content state (draft/published) affects permissions
-
Business Rules
- Free plan post limits
- Premium content visibility
- Cross-organization security
Testing focus areas
When writing tests, verify:
- Organization member access control
- Content visibility across roles
- Plan limitation enforcement
- Cross-organization data isolation
1. App schema definitions
The app schema tables are defined like this:
1create table public.profiles (2 id uuid references auth.users(id) primary key,3 username text unique not null,4 full_name text,5 bio text,6 created_at timestamptz default now(),7 updated_at timestamptz default now()8);910create table public.organizations (11 id bigint primary key generated always as identity,12 name text not null,13 slug text unique not null,14 plan_type text not null check (plan_type in ('free', 'pro', 'enterprise')),15 max_posts int not null default 5,16 created_at timestamptz default now()17);1819create table public.org_members (20 org_id bigint references public.organizations(id) on delete cascade,21 user_id uuid references auth.users(id) on delete cascade,22 role text not null check (role in ('owner', 'admin', 'editor', 'viewer')),23 created_at timestamptz default now(),24 primary key (org_id, user_id)25);2627create table public.posts (28 id bigint primary key generated always as identity,29 title text not null,30 content text not null,31 author_id uuid references public.profiles(id) not null,32 org_id bigint references public.organizations(id),33 status text not null check (status in ('draft', 'published', 'archived')),34 is_premium boolean default false,35 scheduled_for timestamptz,36 category text,37 view_count int default 0,38 published_at timestamptz,39 created_at timestamptz default now(),40 updated_at timestamptz default now()41);4243create table public.comments (44 id bigint primary key generated always as identity,45 post_id bigint references public.posts(id) on delete cascade,46 author_id uuid references public.profiles(id),47 content text not null,48 is_deleted boolean default false,49 created_at timestamptz default now(),50 updated_at timestamptz default now()51);2. RLS policies declaration
Now to setup the RLS policies for each tables:
1-- Create a private schema to store all security definer functions utils2-- As such functions should never be in a API exposed schema3create schema if not exists private;4-- Helper function for role checks5create or replace function private.get_user_org_role(org_id bigint, user_id uuid)6returns text7set search_path = ''8as $$9 select role from public.org_members10 where org_id = $1 and user_id = $2;11-- Note the use of security definer to avoid RLS checking recursion issue12-- see: https://supabase.com/docs/guides/database/postgres/row-level-security#use-security-definer-functions13$$ language sql security definer;14-- Helper utils to check if an org is below the max post limit15create or replace function private.can_add_post(org_id bigint)16returns boolean17set search_path = ''18as $$19 select (select count(*)20 from public.posts p21 where p.org_id = $1) < o.max_posts22 from public.organizations o23 where o.id = $124$$ language sql security definer;252627-- Enable RLS for all tables28alter table public.profiles enable row level security;29alter table public.organizations enable row level security;30alter table public.org_members enable row level security;31alter table public.posts enable row level security;32alter table public.comments enable row level security;3334-- Profiles policies35create policy "Public profiles are viewable by everyone"36 on public.profiles for select using (true);3738create policy "Users can insert their own profile"39 on public.profiles for insert with check ((select auth.uid()) = id);4041create policy "Users can update their own profile"42 on public.profiles for update using ((select auth.uid()) = id)43 with check ((select auth.uid()) = id);4445-- Organizations policies46create policy "Public org info visible to all"47 on public.organizations for select using (true);4849create policy "Org management restricted to owners"50 on public.organizations for all using (51 private.get_user_org_role(id, (select auth.uid())) = 'owner'52 );5354-- Org Members policies55create policy "Members visible to org members"56 on public.org_members for select using (57 private.get_user_org_role(org_id, (select auth.uid())) is not null58 );5960create policy "Member management restricted to admins and owners"61 on public.org_members for all using (62 private.get_user_org_role(org_id, (select auth.uid())) in ('owner', 'admin')63 );6465-- Posts policies66create policy "Complex post visibility"67 on public.posts for select using (68 -- Published non-premium posts are visible to all69 (status = 'published' and not is_premium)70 or71 -- Premium posts visible to org members only72 (status = 'published' and is_premium and73 private.get_user_org_role(org_id, (select auth.uid())) is not null)74 or75 -- All posts visible to editors and above76 private.get_user_org_role(org_id, (select auth.uid())) in ('owner', 'admin', 'editor')77 );7879create policy "Post creation rules"80 on public.posts for insert with check (81 -- Must be org member with appropriate role82 private.get_user_org_role(org_id, (select auth.uid())) in ('owner', 'admin', 'editor')83 and84 -- Check org post limits for free plans85 (86 (select o.plan_type != 'free'87 from organizations o88 where o.id = org_id)89 or90 (select private.can_add_post(org_id))91 )92 );9394create policy "Post update rules"95 on public.posts for update using (96 exists (97 select 198 where99 -- Editors can update non-published posts100 (private.get_user_org_role(org_id, (select auth.uid())) = 'editor' and status != 'published')101 or102 -- Admins and owners can update any post103 private.get_user_org_role(org_id, (select auth.uid())) in ('owner', 'admin')104 )105 );106107-- Comments policies108create policy "Comments on published posts are viewable by everyone"109 on public.comments for select using (110 exists (111 select 1 from public.posts112 where id = post_id113 and status = 'published'114 )115 and not is_deleted116 );117118create policy "Authenticated users can create comments"119 on public.comments for insert with check ((select auth.uid()) = author_id);120121create policy "Users can update their own comments"122 on public.comments for update using (author_id = (select auth.uid()));3. Test cases:
Now everything is setup, let's write RLS test cases, note that each section could be in its own test:
1-- Assuming we already have: 000-setup-tests-hooks.sql file we can use tests helpers2begin;3-- Declare total number of tests4select plan(10);56-- Create test users7select tests.create_supabase_user('org_owner', 'owner@test.com');8select tests.create_supabase_user('org_admin', 'admin@test.com');9select tests.create_supabase_user('org_editor', 'editor@test.com');10select tests.create_supabase_user('premium_user', 'premium@test.com');11select tests.create_supabase_user('free_user', 'free@test.com');12select tests.create_supabase_user('scheduler', 'scheduler@test.com');13select tests.create_supabase_user('free_author', 'free_author@test.com');1415-- Create profiles for test users16insert into profiles (id, username, full_name)17values18 (tests.get_supabase_uid('org_owner'), 'org_owner', 'Organization Owner'),19 (tests.get_supabase_uid('org_admin'), 'org_admin', 'Organization Admin'),20 (tests.get_supabase_uid('org_editor'), 'org_editor', 'Organization Editor'),21 (tests.get_supabase_uid('premium_user'), 'premium_user', 'Premium User'),22 (tests.get_supabase_uid('free_user'), 'free_user', 'Free User'),23 (tests.get_supabase_uid('scheduler'), 'scheduler', 'Scheduler User'),24 (tests.get_supabase_uid('free_author'), 'free_author', 'Free Author');2526-- First authenticate as service role to bypass RLS for initial setup27select tests.authenticate_as_service_role();2829-- Create test organizations and setup data30with new_org as (31 insert into organizations (name, slug, plan_type, max_posts)32 values33 ('Test Org', 'test-org', 'pro', 100),34 ('Premium Org', 'premium-org', 'enterprise', 1000),35 ('Schedule Org', 'schedule-org', 'pro', 100),36 ('Free Org', 'free-org', 'free', 2)37 returning id, slug38),39-- Setup members and posts40member_setup as (41 insert into org_members (org_id, user_id, role)42 select43 org.id,44 user_id,45 role46 from new_org org cross join (47 values48 (tests.get_supabase_uid('org_owner'), 'owner'),49 (tests.get_supabase_uid('org_admin'), 'admin'),50 (tests.get_supabase_uid('org_editor'), 'editor'),51 (tests.get_supabase_uid('premium_user'), 'viewer'),52 (tests.get_supabase_uid('scheduler'), 'editor'),53 (tests.get_supabase_uid('free_author'), 'editor')54 ) as members(user_id, role)55 where org.slug = 'test-org'56 or (org.slug = 'premium-org' and role = 'viewer')57 or (org.slug = 'schedule-org' and role = 'editor')58 or (org.slug = 'free-org' and role = 'editor')59)60-- Setup initial posts61insert into posts (title, content, org_id, author_id, status, is_premium, scheduled_for)62select63 title,64 content,65 org.id,66 author_id,67 status,68 is_premium,69 scheduled_for70from new_org org cross join (71 values72 ('Premium Post', 'Premium content', tests.get_supabase_uid('premium_user'), 'published', true, null),73 ('Free Post', 'Free content', tests.get_supabase_uid('premium_user'), 'published', false, null),74 ('Future Post', 'Future content', tests.get_supabase_uid('scheduler'), 'published', false, '2024-01-02 12:00:00+00'::timestamptz)75) as posts(title, content, author_id, status, is_premium, scheduled_for)76where org.slug in ('premium-org', 'schedule-org');7778-- Test owner privileges79select tests.authenticate_as('org_owner');80select lives_ok(81 $$82 update organizations83 set name = 'Updated Org'84 where id = (select id from organizations limit 1)85 $$,86 'Owner can update organization'87);8889-- Test admin privileges90select tests.authenticate_as('org_admin');91select results_eq(92 $$select count(*) from org_members$$,93 ARRAY[6::bigint],94 'Admin can view all members'95);9697-- Test editor restrictions98select tests.authenticate_as('org_editor');99select throws_ok(100 $$101 insert into org_members (org_id, user_id, role)102 values (103 (select id from organizations limit 1),104 (select tests.get_supabase_uid('org_editor')),105 'viewer'106 )107 $$,108 '42501',109 'new row violates row-level security policy for table "org_members"',110 'Editor cannot manage members'111);112113-- Premium Content Access Tests114select tests.authenticate_as('premium_user');115select results_eq(116 $$select count(*) from posts where org_id = (select id from organizations where slug = 'premium-org')$$,117 ARRAY[3::bigint],118 'Premium user can see all posts'119);120121select tests.clear_authentication();122select results_eq(123 $$select count(*) from posts where org_id = (select id from organizations where slug = 'premium-org')$$,124 ARRAY[2::bigint],125 'Anonymous users can only see free posts'126);127128-- Time-Based Publishing Tests129select tests.authenticate_as('scheduler');130select tests.freeze_time('2024-01-01 12:00:00+00'::timestamptz);131132select results_eq(133 $$select count(*) from posts where scheduled_for > now() and org_id = (select id from organizations where slug = 'schedule-org')$$,134 ARRAY[1::bigint],135 'Can see scheduled posts'136);137138select tests.freeze_time('2024-01-02 13:00:00+00'::timestamptz);139140select results_eq(141 $$select count(*) from posts where scheduled_for < now() and org_id = (select id from organizations where slug = 'schedule-org')$$,142 ARRAY[1::bigint],143 'Can see posts after schedule time'144);145146select tests.unfreeze_time();147148-- Plan Limit Tests149select tests.authenticate_as('free_author');150151select lives_ok(152 $$153 insert into posts (title, content, org_id, author_id, status)154 select 'Post 1', 'Content 1', id, auth.uid(), 'draft'155 from organizations where slug = 'free-org' limit 1156 $$,157 'First post creates successfully'158);159160select lives_ok(161 $$162 insert into posts (title, content, org_id, author_id, status)163 select 'Post 2', 'Content 2', id, auth.uid(), 'draft'164 from organizations where slug = 'free-org' limit 1165 $$,166 'Second post creates successfully'167);168169select throws_ok(170 $$171 insert into posts (title, content, org_id, author_id, status)172 select 'Post 3', 'Content 3', id, auth.uid(), 'draft'173 from organizations where slug = 'free-org' limit 1174 $$,175 '42501',176 'new row violates row-level security policy for table "posts"',177 'Cannot exceed free plan post limit'178);179180select * from finish();181rollback;