import * as request from 'supertest'; import { INestApplication } from '@nestjs/common'; import { clearDB, createUser, createNestAppInstanceWithEnvMock } from '../../../test.helper'; import { mocked } from 'jest-mock'; import got from 'got'; import { Organization } from 'src/entities/organization.entity'; import { Repository } from 'typeorm'; import { OrganizationUser } from 'src/entities/organization_user.entity'; import { User } from 'src/entities/user.entity'; jest.mock('got'); const mockedGot = mocked(got); describe('oauth controller', () => { let app: INestApplication; let userRepository: Repository; let orgUserRepository: Repository; let mockConfig; const token = 'some-Token'; let current_organization: Organization; let current_user: User; beforeEach(async () => { await clearDB(); }); beforeAll(async () => { ({ app, mockConfig } = await createNestAppInstanceWithEnvMock()); userRepository = app.get('UserRepository'); orgUserRepository = app.get('OrganizationUserRepository'); }); afterEach(() => { jest.resetAllMocks(); jest.clearAllMocks(); }); describe('SSO Login', () => { beforeEach(() => { jest.spyOn(mockConfig, 'get').mockImplementation((key: string) => { switch (key) { case 'SSO_GOOGLE_OAUTH2_CLIENT_ID': return 'google-client-id'; case 'SSO_GIT_OAUTH2_CLIENT_ID': return 'git-client-id'; case 'SSO_GIT_OAUTH2_CLIENT_SECRET': return 'git-secret'; default: return process.env[key]; } }); }); describe('Multi-Workspace instance level SSO: Setup first user', () => { it('First user should be super admin', async () => { const gitAuthResponse = jest.fn(); gitAuthResponse.mockImplementation(() => { return { json: () => { return { access_token: 'some-access-token', scope: 'scope', token_type: 'bearer', }; }, }; }); const gitGetUserResponse = jest.fn(); gitGetUserResponse.mockImplementation(() => { return { json: () => { return { name: 'SSO UserGit', email: 'ssousergit@tooljet.io', }; }, }; }); (mockedGot as unknown as jest.Mock)(gitAuthResponse); (mockedGot as unknown as jest.Mock)(gitGetUserResponse); const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token }); expect(response.statusCode).toBe(201); expect(Object.keys(response.body).sort()).toEqual(['redirect_url']); }); it('Second user should not be super admin', async () => { await createUser(app, { email: 'anotherUser@tooljet.io', userType: 'instance', }); const gitAuthResponse = jest.fn(); gitAuthResponse.mockImplementation(() => { return { json: () => { return { access_token: 'some-access-token', scope: 'scope', token_type: 'bearer', }; }, }; }); const gitGetUserResponse = jest.fn(); gitGetUserResponse.mockImplementation(() => { return { json: () => { return { name: 'SSO UserGit', email: 'ssousergit@tooljet.io', }; }, }; }); (mockedGot as unknown as jest.Mock)(gitAuthResponse); (mockedGot as unknown as jest.Mock)(gitGetUserResponse); const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token }); expect(response.statusCode).toBe(201); expect(Object.keys(response.body).sort()).toEqual(['redirect_url']); }); }); describe('Multi-Workspace instance level SSO', () => { beforeEach(async () => { const { organization, user } = await createUser(app, { email: 'superadmin@tooljet.io', userType: 'instance', }); current_organization = organization; current_user = user; }); describe('sign in via Git OAuth', () => { it('Workspace Login - should return 201 when the super admin log in', async () => { const gitAuthResponse = jest.fn(); gitAuthResponse.mockImplementation(() => { return { json: () => { return { access_token: 'some-access-token', scope: 'scope', token_type: 'bearer', }; }, }; }); const gitGetUserResponse = jest.fn(); gitGetUserResponse.mockImplementation(() => { return { json: () => { return { name: 'SSO UserGit', email: 'superadmin@tooljet.io', }; }, }; }); (mockedGot as unknown as jest.Mock)(gitAuthResponse); (mockedGot as unknown as jest.Mock)(gitGetUserResponse); await request(app.getHttpServer()) .post('/api/oauth/sign-in/common/git') .send({ token, organizationId: current_organization.id }) .expect(201); const orgCount = await orgUserRepository.count({ userId: current_user.id }); expect(orgCount).toBe(1); // Should not create new workspace }); it('Workspace Login - should return 201 when the super admin status is invited in the organization', async () => { const adminUser = await userRepository.findOneOrFail({ email: 'superadmin@tooljet.io', }); await orgUserRepository.update({ userId: adminUser.id }, { status: 'invited' }); const gitAuthResponse = jest.fn(); gitAuthResponse.mockImplementation(() => { return { json: () => { return { access_token: 'some-access-token', scope: 'scope', token_type: 'bearer', }; }, }; }); const gitGetUserResponse = jest.fn(); gitGetUserResponse.mockImplementation(() => { return { json: () => { return { name: 'SSO UserGit', email: 'superadmin@tooljet.io', }; }, }; }); (mockedGot as unknown as jest.Mock)(gitAuthResponse); (mockedGot as unknown as jest.Mock)(gitGetUserResponse); await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token }).expect(201); const orgCount = await orgUserRepository.count({ userId: current_user.id }); expect(orgCount).toBe(2); // Should not create new workspace }); it('Workspace Login - should return 201 when the super admin status is archived in the organization', async () => { const adminUser = await userRepository.findOneOrFail({ email: 'superadmin@tooljet.io', }); await orgUserRepository.update({ userId: adminUser.id }, { status: 'archived' }); const gitAuthResponse = jest.fn(); gitAuthResponse.mockImplementation(() => { return { json: () => { return { access_token: 'some-access-token', scope: 'scope', token_type: 'bearer', }; }, }; }); const gitGetUserResponse = jest.fn(); gitGetUserResponse.mockImplementation(() => { return { json: () => { return { name: 'SSO UserGit', email: 'superadmin@tooljet.io', }; }, }; }); (mockedGot as unknown as jest.Mock)(gitAuthResponse); (mockedGot as unknown as jest.Mock)(gitGetUserResponse); await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token }).expect(201); const orgCount = await orgUserRepository.count({ userId: current_user.id }); expect(orgCount).toBe(2); // Should not create new workspace }); it('Workspace Login - should return 401 when the super admin status is archived', async () => { await userRepository.update({ email: 'superadmin@tooljet.io' }, { status: 'archived' }); const gitAuthResponse = jest.fn(); gitAuthResponse.mockImplementation(() => { return { json: () => { return { access_token: 'some-access-token', scope: 'scope', token_type: 'bearer', }; }, }; }); const gitGetUserResponse = jest.fn(); gitGetUserResponse.mockImplementation(() => { return { json: () => { return { name: 'SSO UserGit', email: 'superadmin@tooljet.io', }; }, }; }); (mockedGot as unknown as jest.Mock)(gitAuthResponse); (mockedGot as unknown as jest.Mock)(gitGetUserResponse); await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token }).expect(406); }); }); }); }); afterAll(async () => { await app.close(); }); });