2021-10-11 15:15:58 +00:00
|
|
|
import * as request from 'supertest';
|
|
|
|
|
import { INestApplication } from '@nestjs/common';
|
2023-04-06 11:12:58 +00:00
|
|
|
import { clearDB, createUser, createNestAppInstance, createApplication, authenticateUser } from '../test.helper';
|
2021-10-11 15:15:58 +00:00
|
|
|
import { getManager } from 'typeorm';
|
|
|
|
|
import { AppGroupPermission } from 'src/entities/app_group_permission.entity';
|
|
|
|
|
import { UserGroupPermission } from 'src/entities/user_group_permission.entity';
|
|
|
|
|
import { GroupPermission } from 'src/entities/group_permission.entity';
|
|
|
|
|
|
|
|
|
|
describe('group permissions controller', () => {
|
|
|
|
|
let nestApp: INestApplication;
|
|
|
|
|
|
|
|
|
|
beforeEach(async () => {
|
|
|
|
|
await clearDB();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
beforeAll(async () => {
|
|
|
|
|
nestApp = await createNestAppInstance();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe('POST /group_permissions', () => {
|
|
|
|
|
it('should not allow non admin to create group permission', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { defaultUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp, 'developer@tooljet.io');
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', defaultUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(403);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should be able to create group permission for authenticated admin', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser, organization },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(201);
|
2022-08-19 07:54:52 +00:00
|
|
|
|
|
|
|
|
const updatedGroup: GroupPermission = await getManager().findOneOrFail(GroupPermission, {
|
|
|
|
|
where: {
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
group: 'avengers',
|
|
|
|
|
},
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
expect(updatedGroup.group).toBe('avengers');
|
|
|
|
|
expect(updatedGroup.organizationId).toBe(organization.id);
|
|
|
|
|
expect(updatedGroup.createdAt).toBeDefined();
|
|
|
|
|
expect(updatedGroup.updatedAt).toBeDefined();
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
|
2022-05-13 07:48:26 +00:00
|
|
|
it('should not allow to create system defined group names', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2022-05-13 07:48:26 +00:00
|
|
|
const reservedGroups = ['All Users', 'Admin'];
|
|
|
|
|
|
|
|
|
|
for (let i = 0; i < reservedGroups.length; i += 1) {
|
|
|
|
|
const response = await request(nestApp.getHttpServer())
|
|
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2022-05-13 07:48:26 +00:00
|
|
|
.send({ group: reservedGroups[i] });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(400);
|
|
|
|
|
expect(response.body.message).toBe('Group name already exist');
|
|
|
|
|
}
|
|
|
|
|
});
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
it('should validate uniqueness of group permission group name', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
let response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(201);
|
|
|
|
|
|
|
|
|
|
response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
2022-05-04 10:58:02 +00:00
|
|
|
expect(response.statusCode).toBe(409);
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should allow different organization to have same group name', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser },
|
|
|
|
|
anotherOrganization: { anotherAdminUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
let loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
adminUser['tokenCookie'] = loggedUser.tokenCookie;
|
|
|
|
|
|
|
|
|
|
loggedUser = await authenticateUser(nestApp, anotherAdminUser.email);
|
|
|
|
|
anotherAdminUser['tokenCookie'] = loggedUser.tokenCookie;
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
let response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', adminUser['tokenCookie'])
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(201);
|
|
|
|
|
|
|
|
|
|
response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', anotherAdminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', anotherAdminUser['tokenCookie'])
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(201);
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe('GET /group_permissions/:id', () => {
|
2022-06-29 19:19:45 +00:00
|
|
|
it('should not allow unauthenticated admin', async () => {
|
2021-10-11 15:15:58 +00:00
|
|
|
const {
|
|
|
|
|
organization: { defaultUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp, 'developer@tooljet.io');
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.get('/api/group_permissions/id')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', defaultUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(403);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should get group permission for authenticated admin within organization', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser, organization },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
let response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
2022-08-19 07:54:52 +00:00
|
|
|
expect(response.statusCode).toBe(201);
|
|
|
|
|
|
|
|
|
|
const updatedGroup: GroupPermission = await getManager().findOneOrFail(GroupPermission, {
|
|
|
|
|
where: {
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
group: 'avengers',
|
|
|
|
|
},
|
|
|
|
|
});
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
response = await request(nestApp.getHttpServer())
|
2022-08-19 07:54:52 +00:00
|
|
|
.get(`/api/group_permissions/${updatedGroup.id}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
expect(response.body.group).toBe('avengers');
|
|
|
|
|
expect(response.body.organization_id).toBe(organization.id);
|
|
|
|
|
expect(response.body.id).toBeDefined();
|
|
|
|
|
expect(response.body.created_at).toBeDefined();
|
|
|
|
|
expect(response.body.updated_at).toBeDefined();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should not get group permission for authenticated admin not within organization', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser },
|
|
|
|
|
anotherOrganization: { anotherAdminUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
let loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
adminUser['tokenCookie'] = loggedUser.tokenCookie;
|
|
|
|
|
|
|
|
|
|
loggedUser = await authenticateUser(nestApp, anotherAdminUser.email);
|
|
|
|
|
anotherAdminUser['tokenCookie'] = loggedUser.tokenCookie;
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
let response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', adminUser['tokenCookie'])
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
const groupPermissionId = response.body.id;
|
|
|
|
|
|
|
|
|
|
response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post(`/api/group_permissions/${groupPermissionId}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', anotherAdminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', anotherAdminUser['tokenCookie'])
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(404);
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe('PUT /group_permissions/:id', () => {
|
2022-06-29 19:19:45 +00:00
|
|
|
it('should not allow unauthenticated admin', async () => {
|
2021-10-11 15:15:58 +00:00
|
|
|
const {
|
|
|
|
|
organization: { defaultUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp, 'developer@tooljet.io');
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.put('/api/group_permissions/id')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', defaultUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(403);
|
|
|
|
|
});
|
|
|
|
|
|
2022-07-12 18:57:32 +00:00
|
|
|
it('should allow admin to update a group name', async () => {
|
|
|
|
|
const {
|
2022-08-19 07:54:52 +00:00
|
|
|
organization: { adminUser, organization },
|
2022-07-12 18:57:32 +00:00
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2022-07-12 18:57:32 +00:00
|
|
|
const createResponse = await request(nestApp.getHttpServer())
|
|
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2022-07-12 18:57:32 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(createResponse.statusCode).toBe(201);
|
|
|
|
|
|
2022-08-19 07:54:52 +00:00
|
|
|
let updatedGroup: GroupPermission = await getManager().findOneOrFail(GroupPermission, {
|
|
|
|
|
where: {
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
group: 'avengers',
|
|
|
|
|
},
|
|
|
|
|
});
|
|
|
|
|
|
2022-07-12 18:57:32 +00:00
|
|
|
//update a group name
|
|
|
|
|
const updateResponse = await request(nestApp.getHttpServer())
|
2022-08-19 07:54:52 +00:00
|
|
|
.put(`/api/group_permissions/${updatedGroup.id}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2022-07-12 18:57:32 +00:00
|
|
|
.send({ name: 'titans' });
|
|
|
|
|
|
|
|
|
|
expect(updateResponse.statusCode).toBe(200);
|
|
|
|
|
|
2022-08-19 07:54:52 +00:00
|
|
|
updatedGroup = await getManager().findOne(GroupPermission, updatedGroup.id);
|
2022-07-12 18:57:32 +00:00
|
|
|
expect(updatedGroup.group).toEqual('titans');
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should not be able to update a group name with existing names', async () => {
|
|
|
|
|
const {
|
2022-08-19 07:54:52 +00:00
|
|
|
organization: { adminUser, organization },
|
2022-07-12 18:57:32 +00:00
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2022-07-12 18:57:32 +00:00
|
|
|
const createResponse = await request(nestApp.getHttpServer())
|
|
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2022-07-12 18:57:32 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(createResponse.statusCode).toBe(201);
|
|
|
|
|
|
2022-08-19 07:54:52 +00:00
|
|
|
const updatedGroup: GroupPermission = await getManager().findOneOrFail(GroupPermission, {
|
|
|
|
|
where: {
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
group: 'avengers',
|
|
|
|
|
},
|
|
|
|
|
});
|
|
|
|
|
|
2022-07-12 18:57:32 +00:00
|
|
|
//update a group name
|
|
|
|
|
const updateResponse = await request(nestApp.getHttpServer())
|
2022-08-19 07:54:52 +00:00
|
|
|
.put(`/api/group_permissions/${updatedGroup.id}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2022-07-12 18:57:32 +00:00
|
|
|
.send({ name: 'All users' });
|
|
|
|
|
|
|
|
|
|
expect(updateResponse.statusCode).toBe(400);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should not be able to update a default group name', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser, organization },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2022-07-12 18:57:32 +00:00
|
|
|
const adminGroup = await getManager().findOne(GroupPermission, {
|
|
|
|
|
where: { group: 'admin', organizationId: organization.id },
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
//update a group name
|
|
|
|
|
const updateResponse = await request(nestApp.getHttpServer())
|
|
|
|
|
.put(`/api/group_permissions/${adminGroup.id}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2022-07-12 18:57:32 +00:00
|
|
|
.send({ name: 'titans' });
|
|
|
|
|
|
|
|
|
|
expect(updateResponse.statusCode).toBe(400);
|
|
|
|
|
});
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
it('should allow admin to add and remove apps to group permission', async () => {
|
|
|
|
|
const {
|
2022-08-19 07:54:52 +00:00
|
|
|
organization: { adminUser, app, organization },
|
2021-10-11 15:15:58 +00:00
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
let response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
2022-08-19 07:54:52 +00:00
|
|
|
expect(response.statusCode).toBe(201);
|
|
|
|
|
|
|
|
|
|
const updatedGroup: GroupPermission = await getManager().findOneOrFail(GroupPermission, {
|
|
|
|
|
where: {
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
group: 'avengers',
|
|
|
|
|
},
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
const groupPermissionId = updatedGroup.id;
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.put(`/api/group_permissions/${groupPermissionId}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ add_apps: [app.id] });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
|
|
|
|
|
const manager = getManager();
|
|
|
|
|
let appsInGroup = await manager.find(AppGroupPermission, {
|
|
|
|
|
where: { groupPermissionId },
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
expect(appsInGroup).toHaveLength(1);
|
|
|
|
|
|
|
|
|
|
const addedApp = appsInGroup[0];
|
|
|
|
|
|
|
|
|
|
expect(addedApp.appId).toBe(app.id);
|
|
|
|
|
expect(addedApp.read).toBe(true);
|
|
|
|
|
expect(addedApp.update).toBe(false);
|
|
|
|
|
expect(addedApp.delete).toBe(false);
|
|
|
|
|
|
|
|
|
|
response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.put(`/api/group_permissions/${groupPermissionId}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ remove_apps: [app.id] });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
|
|
|
|
|
appsInGroup = await manager.find(AppGroupPermission, {
|
|
|
|
|
where: { groupPermissionId },
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
expect(appsInGroup).toHaveLength(0);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should allow admin to add and remove users to group permission', async () => {
|
|
|
|
|
const {
|
2022-08-19 07:54:52 +00:00
|
|
|
organization: { adminUser, defaultUser, organization },
|
2021-10-11 15:15:58 +00:00
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
let response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
2022-08-19 07:54:52 +00:00
|
|
|
const updatedGroup: GroupPermission = await getManager().findOneOrFail(GroupPermission, {
|
|
|
|
|
where: {
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
group: 'avengers',
|
|
|
|
|
},
|
|
|
|
|
});
|
|
|
|
|
const groupPermissionId = updatedGroup.id;
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.put(`/api/group_permissions/${groupPermissionId}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ add_users: [defaultUser.id] });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
|
|
|
|
|
const manager = getManager();
|
|
|
|
|
let usersInGroup = await manager.find(UserGroupPermission, {
|
|
|
|
|
where: { groupPermissionId },
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
expect(usersInGroup).toHaveLength(1);
|
|
|
|
|
|
|
|
|
|
const addedUser = usersInGroup[0];
|
|
|
|
|
|
|
|
|
|
expect(addedUser.userId).toBe(defaultUser.id);
|
|
|
|
|
|
|
|
|
|
response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.put(`/api/group_permissions/${groupPermissionId}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ remove_users: [defaultUser.id] });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
|
|
|
|
|
usersInGroup = await manager.find(UserGroupPermission, {
|
|
|
|
|
where: { groupPermissionId },
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
expect(usersInGroup).toHaveLength(0);
|
|
|
|
|
});
|
|
|
|
|
|
2022-06-29 19:19:45 +00:00
|
|
|
it('should not allow to remove users from admin group permission without any at least one active admin', async () => {
|
2022-05-05 07:08:42 +00:00
|
|
|
const { user, organization } = await createUser(nestApp, {
|
|
|
|
|
email: 'admin@tooljet.io',
|
|
|
|
|
});
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
const manager = getManager();
|
2022-05-05 07:08:42 +00:00
|
|
|
const adminGroupPermission = await manager.findOneOrFail(GroupPermission, {
|
2022-01-28 06:14:44 +00:00
|
|
|
where: {
|
|
|
|
|
group: 'admin',
|
2022-05-05 07:08:42 +00:00
|
|
|
organizationId: organization.id,
|
2022-01-28 06:14:44 +00:00
|
|
|
},
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.put(`/api/group_permissions/${adminGroupPermission.id}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', user.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2022-05-05 07:08:42 +00:00
|
|
|
.send({ remove_users: [user.id] });
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(400);
|
|
|
|
|
expect(response.body.message).toBe('Atleast one active admin is required.');
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should not allow to remove any users from all_users group permission', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser, defaultUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
adminUser['tokenCookie'] = loggedUser.tokenCookie;
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const manager = getManager();
|
2022-05-05 07:08:42 +00:00
|
|
|
const adminGroupPermission = await manager.findOneOrFail(GroupPermission, {
|
2022-01-28 06:14:44 +00:00
|
|
|
where: {
|
|
|
|
|
group: 'all_users',
|
|
|
|
|
organizationId: adminUser.organizationId,
|
|
|
|
|
},
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-12-10 03:13:05 +00:00
|
|
|
.put(`/api/group_permissions/${adminGroupPermission.id}/`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', adminUser['tokenCookie'])
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ remove_users: [defaultUser.id] });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(400);
|
|
|
|
|
expect(response.body.message).toBe('Cannot remove user from default group.');
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe('GET /group_permissions', () => {
|
2022-06-29 19:19:45 +00:00
|
|
|
it('should not allow unauthenticated admin', async () => {
|
2021-10-11 15:15:58 +00:00
|
|
|
const {
|
|
|
|
|
organization: { defaultUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp, 'developer@tooljet.io');
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.get('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', defaultUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(403);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should allow admin to list group permission', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser, defaultUser, app, organization },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
// create group permission
|
|
|
|
|
let response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(201);
|
|
|
|
|
|
2022-08-19 07:54:52 +00:00
|
|
|
const updatedGroup: GroupPermission = await getManager().findOneOrFail(GroupPermission, {
|
|
|
|
|
where: {
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
group: 'avengers',
|
|
|
|
|
},
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
const groupPermissionId = updatedGroup.id;
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
// add apps and users to group permission
|
|
|
|
|
response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.put(`/api/group_permissions/${groupPermissionId}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ add_apps: [app.id], add_users: [defaultUser.id] });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
|
|
|
|
|
// list group permission
|
|
|
|
|
response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.get('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
|
|
|
|
|
const groupPermissions = response.body.group_permissions;
|
|
|
|
|
const groups = groupPermissions.map((gp) => gp.group);
|
|
|
|
|
const organizationId = [...new Set(groupPermissions.map((gp) => gp.organization_id))];
|
|
|
|
|
|
|
|
|
|
expect(new Set(groups)).toEqual(new Set(['avengers', 'all_users', 'admin']));
|
|
|
|
|
expect(organizationId).toEqual([organization.id]);
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe('GET /group_permissions/:id/apps', () => {
|
2022-06-29 19:19:45 +00:00
|
|
|
it('should not allow unauthenticated admin', async () => {
|
2021-10-11 15:15:58 +00:00
|
|
|
const {
|
|
|
|
|
organization: { defaultUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp, 'developer@tooljet.io');
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.get('/api/group_permissions/id/apps')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', defaultUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(403);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should allow admin to list apps in group permission', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser, organization },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const manager = getManager();
|
2022-05-05 07:08:42 +00:00
|
|
|
const adminGroupPermission = await manager.findOneOrFail(GroupPermission, {
|
2022-01-28 06:14:44 +00:00
|
|
|
where: {
|
|
|
|
|
group: 'admin',
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
},
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.get(`/api/group_permissions/${adminGroupPermission.id}/apps`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
|
|
|
|
|
const apps = response.body.apps;
|
|
|
|
|
const sampleApp = apps[0];
|
|
|
|
|
|
|
|
|
|
expect(apps).toHaveLength(1);
|
|
|
|
|
expect(sampleApp.organization_id).toBe(organization.id);
|
|
|
|
|
expect(sampleApp.name).toBe('sample app');
|
|
|
|
|
|
|
|
|
|
expect(sampleApp.group_permissions).toHaveLength(1);
|
|
|
|
|
expect(sampleApp.group_permissions[0].group).toBe('admin');
|
|
|
|
|
|
|
|
|
|
expect(sampleApp.app_group_permissions).toHaveLength(1);
|
|
|
|
|
expect(sampleApp.app_group_permissions[0].group_permission_id).toBe(sampleApp.group_permissions[0].id);
|
|
|
|
|
expect(sampleApp.app_group_permissions[0].read).toBe(true);
|
|
|
|
|
expect(sampleApp.app_group_permissions[0].update).toBe(true);
|
|
|
|
|
expect(sampleApp.app_group_permissions[0].delete).toBe(true);
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe('GET /group_permissions/:id/addable_apps', () => {
|
2022-06-29 19:19:45 +00:00
|
|
|
it('should not allow unauthenticated admin', async () => {
|
2021-10-11 15:15:58 +00:00
|
|
|
const {
|
|
|
|
|
organization: { defaultUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp, 'developer@tooljet.io');
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.get('/api/group_permissions/id/addable_apps')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', defaultUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(403);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should allow admin to list apps not in group permission', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser, organization },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
// create group permission
|
|
|
|
|
let response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(201);
|
|
|
|
|
|
2022-08-19 07:54:52 +00:00
|
|
|
const manager = getManager();
|
|
|
|
|
const groupPermission: GroupPermission = await manager.findOneOrFail(GroupPermission, {
|
|
|
|
|
where: {
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
group: 'avengers',
|
|
|
|
|
},
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
const groupPermissionId = groupPermission.id;
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.get(`/api/group_permissions/${groupPermissionId}/addable_apps`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
|
|
|
|
|
const apps = response.body.apps;
|
|
|
|
|
const sampleApp = apps[0];
|
|
|
|
|
|
|
|
|
|
expect(apps).toHaveLength(1);
|
|
|
|
|
expect(sampleApp.organization_id).toBe(organization.id);
|
|
|
|
|
expect(sampleApp.name).toBe('sample app');
|
|
|
|
|
expect(sampleApp.group_permissions).toHaveLength(2);
|
|
|
|
|
|
|
|
|
|
const adminGroupPermission = sampleApp.group_permissions.find((a) => a.group == 'admin');
|
|
|
|
|
const adminAppGroupPermission = sampleApp.app_group_permissions.find(
|
|
|
|
|
(a) => a.group_permission_id == adminGroupPermission.id
|
|
|
|
|
);
|
|
|
|
|
expect(adminAppGroupPermission.read).toBe(true);
|
|
|
|
|
expect(adminAppGroupPermission.update).toBe(true);
|
|
|
|
|
expect(adminAppGroupPermission.delete).toBe(true);
|
|
|
|
|
|
|
|
|
|
const userGroupPermission = sampleApp.group_permissions.find((a) => a.group == 'all_users');
|
|
|
|
|
const userAppGroupPermission = sampleApp.app_group_permissions.find(
|
|
|
|
|
(a) => a.group_permission_id == userGroupPermission.id
|
|
|
|
|
);
|
2022-01-31 05:45:44 +00:00
|
|
|
expect(userAppGroupPermission.read).toBe(false);
|
2021-10-11 15:15:58 +00:00
|
|
|
expect(userAppGroupPermission.update).toBe(false);
|
|
|
|
|
expect(userAppGroupPermission.delete).toBe(false);
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe('GET /group_permissions/:id/users', () => {
|
2022-06-29 19:19:45 +00:00
|
|
|
it('should not allow unauthenticated admin', async () => {
|
2021-10-11 15:15:58 +00:00
|
|
|
const {
|
|
|
|
|
organization: { defaultUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp, 'developer@tooljet.io');
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.get('/api/group_permissions/id/users')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', defaultUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(403);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should allow admin to list users in group permission', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser, organization },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const manager = getManager();
|
2022-05-05 07:08:42 +00:00
|
|
|
const adminGroupPermission = await manager.findOneOrFail(GroupPermission, {
|
2022-01-28 06:14:44 +00:00
|
|
|
where: {
|
|
|
|
|
group: 'admin',
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
},
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.get(`/api/group_permissions/${adminGroupPermission.id}/users`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
|
|
|
|
|
const users = response.body.users;
|
2022-05-05 07:08:42 +00:00
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const user = users[0];
|
|
|
|
|
|
|
|
|
|
expect(users).toHaveLength(1);
|
2022-09-29 10:13:14 +00:00
|
|
|
expect(Object.keys(user).sort()).toEqual(['id', 'email', 'first_name', 'last_name'].sort());
|
2021-10-11 15:15:58 +00:00
|
|
|
expect(user.email).toBe('admin@tooljet.io');
|
2022-09-29 10:13:14 +00:00
|
|
|
expect(user.first_name).toBe('test');
|
|
|
|
|
expect(user.last_name).toBe('test');
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe('GET /group_permissions/:id/addable_users', () => {
|
2022-06-29 19:19:45 +00:00
|
|
|
it('should not allow unauthenticated admin', async () => {
|
2021-10-11 15:15:58 +00:00
|
|
|
const {
|
|
|
|
|
organization: { defaultUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp, 'developer@tooljet.io');
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.get('/api/group_permissions/id/addable_users')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', defaultUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(403);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should allow admin to list users not in group permission', async () => {
|
2022-05-05 07:08:42 +00:00
|
|
|
const adminUser = await createUser(nestApp, { email: 'admin@tooljet.io' });
|
|
|
|
|
const userone = await createUser(nestApp, {
|
|
|
|
|
email: 'userone@tooljet.io',
|
|
|
|
|
groups: ['all_users'],
|
|
|
|
|
organization: adminUser.organization,
|
|
|
|
|
});
|
2021-10-11 15:15:58 +00:00
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const manager = getManager();
|
2022-05-05 07:08:42 +00:00
|
|
|
const adminGroupPermission = await manager.findOneOrFail(GroupPermission, {
|
2022-01-28 06:14:44 +00:00
|
|
|
where: {
|
|
|
|
|
group: 'admin',
|
2022-05-05 07:08:42 +00:00
|
|
|
organizationId: adminUser.organization.id,
|
2022-01-28 06:14:44 +00:00
|
|
|
},
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
const groupPermissionId = adminGroupPermission.id;
|
|
|
|
|
const response = await request(nestApp.getHttpServer())
|
2022-12-07 06:41:48 +00:00
|
|
|
.get(`/api/group_permissions/${groupPermissionId}/addable_users?input=userone@tooljet.io`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.user.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie);
|
2021-10-11 15:15:58 +00:00
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
|
|
|
|
|
const users = response.body.users;
|
|
|
|
|
const user = users[0];
|
|
|
|
|
|
|
|
|
|
expect(users).toHaveLength(1);
|
2022-08-03 08:20:47 +00:00
|
|
|
expect(user.first_name).toBe('test');
|
|
|
|
|
expect(user.last_name).toBe('test');
|
|
|
|
|
expect(user.id).toBe(userone.user.id);
|
2022-12-07 06:41:48 +00:00
|
|
|
expect(Object.keys(user).sort()).toEqual(['first_name', 'last_name', 'id', 'email'].sort());
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
describe('PUT /group_permissions/:id/app_group_permissions/:appGroupPermisionId', () => {
|
2022-06-29 19:19:45 +00:00
|
|
|
it('should not allow unauthenticated admin', async () => {
|
2021-10-11 15:15:58 +00:00
|
|
|
const {
|
|
|
|
|
organization: { defaultUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp, 'developer@tooljet.io');
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.put('/api/group_permissions/id/app_group_permissions/id')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', defaultUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ read: true });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(403);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should allow admin to update app group permission', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser, organization },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const manager = getManager();
|
2022-05-05 07:08:42 +00:00
|
|
|
const groupPermission = await manager.findOneOrFail(GroupPermission, {
|
2021-10-11 15:15:58 +00:00
|
|
|
where: {
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
group: 'all_users',
|
|
|
|
|
},
|
|
|
|
|
});
|
2021-10-25 08:35:32 +00:00
|
|
|
const groupPermissionId = groupPermission.id;
|
2022-05-05 07:08:42 +00:00
|
|
|
const appGroupPermission = await manager.findOneOrFail(AppGroupPermission, {
|
2022-01-28 06:14:44 +00:00
|
|
|
where: {
|
|
|
|
|
groupPermissionId,
|
|
|
|
|
},
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
const appGroupPermissionId = appGroupPermission.id;
|
|
|
|
|
|
2022-01-31 05:45:44 +00:00
|
|
|
expect(appGroupPermission.read).toBe(false);
|
2021-10-11 15:15:58 +00:00
|
|
|
expect(appGroupPermission.update).toBe(false);
|
|
|
|
|
|
|
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.put(`/api/group_permissions/${groupPermissionId}/app_group_permissions/${appGroupPermissionId}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ actions: { read: false, update: true } });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
|
|
|
|
|
await appGroupPermission.reload();
|
|
|
|
|
|
|
|
|
|
expect(appGroupPermission.read).toBe(false);
|
|
|
|
|
expect(appGroupPermission.update).toBe(true);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should not allow admin to update app group permission of different organization', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { organization },
|
|
|
|
|
anotherOrganization: { anotherAdminUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp, anotherAdminUser.email);
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
const manager = getManager();
|
2022-05-05 07:08:42 +00:00
|
|
|
const groupPermission = await manager.findOneOrFail(GroupPermission, {
|
2021-10-11 15:15:58 +00:00
|
|
|
where: {
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
group: 'all_users',
|
|
|
|
|
},
|
|
|
|
|
});
|
2021-10-25 08:35:32 +00:00
|
|
|
const groupPermissionId = groupPermission.id;
|
2022-05-05 07:08:42 +00:00
|
|
|
const appGroupPermission = await manager.findOneOrFail(AppGroupPermission, {
|
2022-01-28 06:14:44 +00:00
|
|
|
where: {
|
|
|
|
|
groupPermissionId,
|
|
|
|
|
},
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
const appGroupPermissionId = appGroupPermission.id;
|
|
|
|
|
|
2022-01-31 05:45:44 +00:00
|
|
|
expect(appGroupPermission.read).toBe(false);
|
2021-10-11 15:15:58 +00:00
|
|
|
expect(appGroupPermission.update).toBe(false);
|
|
|
|
|
|
|
|
|
|
const response = await request(nestApp.getHttpServer())
|
2021-10-15 09:05:11 +00:00
|
|
|
.put(`/api/group_permissions/${groupPermissionId}/app_group_permissions/${appGroupPermissionId}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', anotherAdminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2021-10-11 15:15:58 +00:00
|
|
|
.send({ actions: { read: false, update: true } });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(400);
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
2022-08-19 07:54:52 +00:00
|
|
|
describe('DELETE /group_permissions/:id', () => {
|
2022-10-11 08:16:40 +00:00
|
|
|
it('should not allow unauthenticated admin', async () => {
|
2022-08-19 07:54:52 +00:00
|
|
|
const {
|
|
|
|
|
organization: { defaultUser },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
2023-04-06 11:12:58 +00:00
|
|
|
|
|
|
|
|
const loggedUser = await authenticateUser(nestApp, defaultUser.email);
|
|
|
|
|
|
2022-08-19 07:54:52 +00:00
|
|
|
const response = await request(nestApp.getHttpServer())
|
|
|
|
|
.del('/api/group_permissions/id')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', defaultUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2022-08-19 07:54:52 +00:00
|
|
|
.send({ read: true });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(403);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should allow admin to delete group', async () => {
|
|
|
|
|
const {
|
|
|
|
|
organization: { adminUser, organization },
|
|
|
|
|
} = await setupOrganizations(nestApp);
|
|
|
|
|
|
2023-04-06 11:12:58 +00:00
|
|
|
const loggedUser = await authenticateUser(nestApp);
|
|
|
|
|
|
2022-08-19 07:54:52 +00:00
|
|
|
await request(nestApp.getHttpServer())
|
|
|
|
|
.post('/api/group_permissions')
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2022-08-19 07:54:52 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
const manager = getManager();
|
|
|
|
|
const groupPermission: GroupPermission = await manager.findOneOrFail(GroupPermission, {
|
|
|
|
|
where: {
|
|
|
|
|
organizationId: organization.id,
|
|
|
|
|
group: 'avengers',
|
|
|
|
|
},
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
const response = await request(nestApp.getHttpServer())
|
|
|
|
|
.del(`/api/group_permissions/${groupPermission.id}`)
|
2023-04-06 11:12:58 +00:00
|
|
|
.set('tj-workspace-id', adminUser.defaultOrganizationId)
|
|
|
|
|
.set('Cookie', loggedUser.tokenCookie)
|
2022-08-19 07:54:52 +00:00
|
|
|
.send({ group: 'avengers' });
|
|
|
|
|
|
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
2021-10-11 15:15:58 +00:00
|
|
|
async function setupOrganizations(nestApp) {
|
|
|
|
|
const adminUserData = await createUser(nestApp, {
|
|
|
|
|
email: 'admin@tooljet.io',
|
|
|
|
|
groups: ['all_users', 'admin'],
|
|
|
|
|
});
|
|
|
|
|
const adminUser = adminUserData.user;
|
|
|
|
|
const organization = adminUserData.organization;
|
|
|
|
|
const defaultUserData = await createUser(nestApp, {
|
|
|
|
|
email: 'developer@tooljet.io',
|
|
|
|
|
groups: ['all_users'],
|
|
|
|
|
organization,
|
|
|
|
|
});
|
|
|
|
|
const defaultUser = defaultUserData.user;
|
|
|
|
|
|
|
|
|
|
const app = await createApplication(nestApp, {
|
|
|
|
|
user: adminUser,
|
|
|
|
|
name: 'sample app',
|
|
|
|
|
isPublic: false,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
const anotherAdminUserData = await createUser(nestApp, {
|
|
|
|
|
email: 'another_admin@tooljet.io',
|
|
|
|
|
groups: ['all_users', 'admin'],
|
|
|
|
|
});
|
|
|
|
|
const anotherAdminUser = anotherAdminUserData.user;
|
|
|
|
|
const anotherOrganization = anotherAdminUserData.organization;
|
|
|
|
|
const anotherDefaultUserData = await createUser(nestApp, {
|
|
|
|
|
email: 'another_developer@tooljet.io',
|
|
|
|
|
groups: ['all_users'],
|
2022-05-05 07:08:42 +00:00
|
|
|
organization: anotherOrganization,
|
2021-10-11 15:15:58 +00:00
|
|
|
});
|
|
|
|
|
const anotherDefaultUser = anotherDefaultUserData.user;
|
|
|
|
|
|
|
|
|
|
const anotherApp = await createApplication(nestApp, {
|
|
|
|
|
user: anotherAdminUser,
|
|
|
|
|
name: 'another app',
|
|
|
|
|
isPublic: false,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
return {
|
|
|
|
|
organization: { adminUser, defaultUser, organization, app },
|
|
|
|
|
anotherOrganization: {
|
|
|
|
|
anotherAdminUser,
|
|
|
|
|
anotherDefaultUser,
|
|
|
|
|
anotherOrganization,
|
|
|
|
|
anotherApp,
|
|
|
|
|
},
|
|
|
|
|
};
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
afterAll(async () => {
|
|
|
|
|
await nestApp.close();
|
|
|
|
|
});
|
|
|
|
|
});
|