mirror of
https://github.com/ToolJet/ToolJet
synced 2026-05-20 07:28:20 +00:00
* fix :: keystroke not taken initially * fix :: trim company name * fix :: setting autocomplete to off * removing redirectsso and confirmation page as its unused now * few ui corrections , laoding states * Fixed organization login sso issue * Add db transaction wrap * refactoring the code * flow changes * Added db tranxn wrap to auth services * adding accept invite screen * added verify organization token route * fixes * adding disable_multiworkspace to default config * cleanup * intermediate commit :: revamping organization page , api integration * fixes * feat :: organization token send in invite from org account setup * fix :: making orgtoken conditional and ui changes / functional updates organization invte * removed unwanted code * fix :: login/account setup for sso user in single workspace flow * fixes * fix :: CTA loader misaligned * fix :: sso login single workspace * fix * fix :: role check db * fix :: role check DB * fix :: setting fallback screen for organizational invite * feat :: org signup * fix :: loading states bug * fix :: loading bug * fixes * added password length validation * fixes * fix: sub path for static asset serve (#4665) * fix: sub path for static asset serve * fix: sub path for static asset serve * fix: sub path for static asset serve (#4668) * Bugfix :: Sort event fired on sort removal (#4542) * onsort applied on sort removal * bugcheck * removing unused toast * Feature :: Table image column type addition (#4547) * feat :: adding column type image * feat :: adding image fit property * Fix :: Closing of textarea ontype Table widget (#4549) * fix :: closing of textarea ontype * fix :: bug not able to clear value * bug fixed : generate file in text is not supported (#4346) * add eslintignore for frontend (#4669) * [cypress] Fix failing manage SSO spec in single workspace #4390 (#4509) * added [data-cy=login-page-logo] also removed one dropdown of same name * Revert command.js * call loginpagelogo * Fixed toast test case * updated text * remove timer * revert linting * Github text fixed * Replaced the woocommerce connection screenshot from dark to light one (#4654) Signed-off-by: Pakeetharan Balasubramaniam <bpakee@gmail.com> Signed-off-by: Pakeetharan Balasubramaniam <bpakee@gmail.com> * gifs for Keyboard Shortcuts Added (#4643) * Fix. Image to button group docs (#4630) (#4631) * Add. Image to button group docs (#4630) * Update docs/docs/widgets/button-group.md Co-authored-by: Shubhendra Singh Chauhan <withshubh@gmail.com> * [added] Translated global strings in french #4169 (#4232) * [added] Translated global strings in french Added global strings translated to French language , Issue: #4169 * [localization ] Fixed the Proposed Changes in French Translation * [localization ] Fixed the Remaining Proposed Changes in French Translation v2 * Update selectHost Co-authored-by: roiLeo <medina.leo42@gmail.com> Co-authored-by: Shubhendra Singh Chauhan <withshubh@gmail.com> Co-authored-by: roiLeo <medina.leo42@gmail.com> * [localization] issue-4188 added spanish keys for card app (#4229) * issue-4188 added spanish keys for card app * IT-4188 fixed PR * Improve toast message shortcut on component deletion (#4513) * Improve toast message shortcut * Improved user agent check Co-authored-by: Kavin Venkatachalam <50441969+kavinvenkatachalam@users.noreply.github.com> * Improved user agent check Co-authored-by: Kavin Venkatachalam <50441969+kavinvenkatachalam@users.noreply.github.com> * feat: Add DTO for organization create (#4651) * feat: Add DTO for organization create * chore: fix eslint error * chore: eslint ... * Fixed failing manage SSO spec in multi workspace (#4658) * Fixed failing manage SSO spec in multi workspace * github to gitHib * persist data without saving the query (#4649) * Fixed failing dashboard specs (#4667) * Add and modify data-cy * Fix failing manage users spec in multiworkspace * Fix failing user permission spec in multi workspace * Fix failing dashboard spec * Fix failing manage group spec * Fix failing manage users spec in single workspace * Fix failing user permission spec in single workspace * indentation changes * Remove wait * [Marketplace] AWS S3 (#4670) * fix: sub path for static asset serve (#4665) * fix: sub path for static asset serve * fix: sub path for static asset serve * marketplace: s3 * rename operations file to query_operations * fix: crash on click of existing plugin * remove unused console * adds missing async await * add isoptional for repo * plugin card ui style fixes * update plugin name Co-authored-by: Gandharv <gandharvkumargarg@gmail.com> * fix: Added a modal with warning message on disabling password (#4552) * Copy to clipboard (#4588) * Update EventManager.jsx * Update EventManager.jsx * Update EventManager.jsx * fix :: adding sso configs based on org id * loader and password check * multiworkspace invite flow updated * restrict only active users * fix * added error message for password length check * fix :: password trim * fix :: all happy flows tested , single and multi exept sso * fix: message on invalid password * revert: package-lock.json file * feat :: changing ui for user present for org invite in multi workspace * fix :: remove password check for existing user multiworkspace * fix :: added fallback * fix :: typo * fix :: adding checks * fix * feat :: for single workspace user logged in directly * fix :: code meaning fix * fix * fixes * fix * fix * fix * fix :: sso fix and bug updates * fix :: json resolution for only single workspace * token :: app level * fix * fix * fixes * fix * ui fixes , removed loading and added checks * showing sso options * fix :: back to * fix single workspace * adding sso check ui * sso single workspace fix * code refactoring * fix :: bugfix on click enter submit in signup and signin * qa fix :: typo * fix for sending welcome email on invite * bug fixes * fix * qa bug fixes and translations * switch workspace fixes * fix :: company name taking empty spaces * adding some more translations * making all screens center aligned * fix :: login page not loading * fix :: singup conditional * fixes * typo fix * fix :: for diabled cases of sso , password login , disabled signup * fix * fix :: added max input length for workspace name * fix * fix :: missing validation on edit email * fix :: all screens vertically aligned * fix :: alignment link expiry screen * fix * fix :: styling terms and condition * fix :: for redirect url loginto workspace fixed according to new design * typo * feat :: removed onboarding modal , redundant * typo fix * fix * name is now mandatory for sign up * fix for password retry count not updating * showing onboarding questions for sign up users * fix :: spaces in password in diff screens * fix :: darkmode initial * fix for accept organization invite success message * fix :: dark mode * fix :: dark mode * feat :: updating all dark mode images * bugfix img * bugfix ::img * dark mode :: improvements * single workspace signup fix * updating images * stylefix * self review :: bugfixes * sign up page fix * fix for asking password for single ws activation * or separator fix for signup page * fix * feat :: updating cta images * fix :: loader bugs * hiding sso options in org invite, sign in via sso * fix :: dark mode img * bugfixes :: cta changed * Fix :: onboarding styles fixes (#4773) * fix: styling in authWrappers * cleanup Co-authored-by: Vijaykant Yadav <vjy239@gmail.com> * fix :: conflicting styles * fix :: loaders , and added header to link expired screen , style fixes * fix :: mobile onboarding btn * fix :: loading onboarding completion * fix :: subpath not taking img path * fix :: path * fix :: removing trailing img / for subpath * fix :: cta img * fix :: remove scrollbar * last name as undefined in comments * fixed loading bug and cursor of company input onboard form * comments fixes * fix :: removing verify email screen on org invite * comments fix * fix :: no login methods * fix :: bug in expired org invite verification link * fix :: edge case name being empty when user types multiple spaces * fix :: comments breaking * fix :: notification breaking * fix :: user groups table lastname * fix for sso redirection * fix :: empty first and last name during org invite * bug fixed :On updating any permissions under permission tab, currentTab switches to app tab (#4734) * fix: popout editor closing for tables (#4674) Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com> * Added default value for backgroundColor In NumberInput (#4378) * fix: added background styles for number input * fix: removed additional f from the background color property * fix: added backgroundColor property from styles * fixes: default bg color for dark mode Co-authored-by: arpitnath <arpitnath42@gmail.com> Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com> * Added the hover effects on datasources (#4303) Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com> * Added Background Color to Text Input (#4194) * Added Background Color to Text Input * Added Default Value for Background Color * added default value and make background of text input consistent with the dark theme Co-authored-by: manishkushare <kushare.manish9@gmail.com> Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com> * feat: Add update version button on installable plugin (#4766) * feat: Add update version button on installable plugin * use id from update method * removes redundant check * use plugin id for fetching files from s3 * fetch latest plugins once updated * disable update and remove buttons while update in progress * replace href with link-span cx + send body in patch request * fix: Dark mode on table's `Striped` and `Striped & Bordered` table type mode (#4611) * [ Hotfix ] :: Hard to resize table columns (#4438) * fix :: hard to resize , scrollbar should not be visible * fix :: resizer not working in pewview * Enhancement : [RangeSlider widget] Bind onChange event (#4192) * add onChange event and its handler * add handler for slider change as well * fix lint * added onChange fire event when slider value is changed Co-authored-by: manishkushare <kushare.manish9@gmail.com> * Added data-cy for table widget elements (#4792) * Add data-cy to tooltip label * Add data-cy to table filter pop-over * Add data-cy to table elements * Add review changes * [docs] Widget updates (#4793) * widget updates * minor update * Update README.md (#4784) * Update README.md * Update README.md * Update README.md * Update README.md * Update README.md * Fixed grammatical errors in localization doc (#4800) * [docs] widget property updates (#4806) * fixes * added resend invite API * Onboarding revamp test cases (#4770) * fix: test cases for oauth * fix: app controller test cases * fix: test cases for oauth * fix: app controller test cases * remove: unused vars * fix: test cases for oauth * fix: app controller test cases * remove: unused vars * chore: PR fixes and cleanup * fix: single workspace test cases * fix: test cases for oauth * fix: app controller test cases * remove: unused vars * chore: PR fixes and cleanup * fix: test cases for oauth * fix: single workspace test cases * add: test cases for invitation links * add: test cases for sso * fix: test cases for oauth * fix: app controller test cases * remove: unused vars * chore: PR fixes and cleanup * fix: test cases for oauth * fix: single workspace test cases * add: test cases for invitation links * fix: test cases for oauth * fix: app controller test cases * chore: PR fixes and cleanup * add: test cases for sso * fix: app test cases * fix: linting in files * fix: test cases for oauth * fix: app controller test cases * remove: unused vars * chore: PR fixes and cleanup * fix: test cases for oauth * fix: single workspace test cases * add: test cases for invitation links * fix: test cases for oauth * fix: app controller test cases * chore: PR fixes and cleanup * add: test cases for sso * fix: app test cases * fix: test cases for oauth * fix: linting in files * rebase: from feature/onboarding-revamp Co-authored-by: Vijaykant Yadav <vjy239@gmail.com> * feat :: api update resend invite * loading state resend mail * adding loading state * checkpoints shown only till tablet * fix: failing test cases for sso * pr:: changes changed all imports and removed unwanted fragments * pr changes * fix :: naming images * fix :: style organized for onboarding * fix for user seed issue * removing unwanted styles * Setting darkmode from props :: onboarding (#4885) * passing darkmode as props to components * error toast * Review comment :: rename env variable * Pr :: changes , code cleanup onborading form * develop merge * init :: CE setup page * pr changes ::form splitted to components * admin , worspace ui :: init save * password warning added * chore :: lint folder renaming * chore :: lint fix * review comments * fixes * fix for test cases failure * changes :: removed empty divs * cleanup * feat :: onboarding setup completed * updates * first-user setup account * fixes * add guard for first user sign up api * validation changes * feat :: api integration * workspace is mandatory for first user * fix :: code cleanup , darkmode * feat :: signup not enable info card * fix code cleanup * Fixed all e2e test cases * Fixed an issue * added style changes , signup status * deisgn review style changes * self review :: code improvements * pr review changes * removed unwanted state * typo fixes * feat :: improved ux on form , autofocus and enter key support, removing warnings * pr review changes :: common constants and helpers moved Signed-off-by: Pakeetharan Balasubramaniam <bpakee@gmail.com> Co-authored-by: Muhsin Shah <muhsinshah21@gmail.com> Co-authored-by: gsmithun4 <gsmithun4@gmail.com> Co-authored-by: Gandharv <gandharvkumargarg@gmail.com> Co-authored-by: Manish Kushare <kushare.manish9@gmail.com> Co-authored-by: Akshay <akshaysasidharan93@gmail.com> Co-authored-by: alammoiz <moixalam@gmail.com> Co-authored-by: Pakeetharan Balasubramaniam <bpakee@gmail.com> Co-authored-by: Akhilesh Kumar Mishra <79476272+iamakhileshmishra@users.noreply.github.com> Co-authored-by: Hemanth Kumar <49117799+Hemanthhari2000@users.noreply.github.com> Co-authored-by: Shubhendra Singh Chauhan <withshubh@gmail.com> Co-authored-by: akk312000 <akk312000@gmail.com> Co-authored-by: roiLeo <medina.leo42@gmail.com> Co-authored-by: Jose Morales <jmoralesmnz@gmail.com> Co-authored-by: 3t8 <62209650+3t8@users.noreply.github.com> Co-authored-by: Kavin Venkatachalam <50441969+kavinvenkatachalam@users.noreply.github.com> Co-authored-by: Santosh Bhandari <bsantosh909@gmail.com> Co-authored-by: Arpit <arpitnath42@gmail.com> Co-authored-by: Ajith KV <ajith.jaban@gmail.com> Co-authored-by: Akarsh Jain <72064462+akarsh-jain-790@users.noreply.github.com> Co-authored-by: Utsav Paul <91927689+Smartmind12@users.noreply.github.com> Co-authored-by: Vijaykant Yadav <vjaris42@Vijaykants-MacBook-Pro.local> Co-authored-by: Vijaykant Yadav <vjy239@gmail.com> Co-authored-by: geisterfurz007 <geisterfurz007@users.noreply.github.com> Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com> Co-authored-by: Abhushan Gautam <carefreeav09@gmail.com> Co-authored-by: Syed Ansar <82027712+Syed-Ansar@users.noreply.github.com> Co-authored-by: Rahul Sunil <rahulsunil2@gmail.com> Co-authored-by: Srisuma Atluri <40341173+Srisuma13@users.noreply.github.com> Co-authored-by: Midhun Kumar E <midhun752@gmail.com> Co-authored-by: Navaneeth Pk <navaneeth@tooljet.io> Co-authored-by: Akasshhg <91525166+gogoiakash2311@users.noreply.github.com>
460 lines
16 KiB
TypeScript
460 lines
16 KiB
TypeScript
import * as request from 'supertest';
|
|
import { INestApplication } from '@nestjs/common';
|
|
import { Organization } from 'src/entities/organization.entity';
|
|
import { OrganizationUser } from 'src/entities/organization_user.entity';
|
|
import { User } from 'src/entities/user.entity';
|
|
import {
|
|
authHeaderForUser,
|
|
clearDB,
|
|
createFirstUser,
|
|
createNestAppInstanceWithEnvMock,
|
|
createSSOMockConfig,
|
|
createUser,
|
|
generateRedirectUrl,
|
|
getPathFromUrl,
|
|
setUpAccountFromToken,
|
|
verifyInviteToken,
|
|
} from '../../test.helper';
|
|
import { getManager, Repository } from 'typeorm';
|
|
import { mocked } from 'ts-jest/utils';
|
|
import got from 'got';
|
|
|
|
jest.mock('got');
|
|
const mockedGot = mocked(got);
|
|
|
|
describe('Git Onboarding', () => {
|
|
let app: INestApplication;
|
|
let userRepository: Repository<User>;
|
|
let orgRepository: Repository<Organization>;
|
|
let orgUserRepository: Repository<OrganizationUser>;
|
|
let current_user: User;
|
|
let current_organization: Organization;
|
|
let org_user: User;
|
|
let org_user_organization: Organization;
|
|
let signupUrl: string;
|
|
let ssoRedirectUrl: string;
|
|
let mockConfig;
|
|
|
|
beforeAll(async () => {
|
|
({ app, mockConfig } = await createNestAppInstanceWithEnvMock());
|
|
userRepository = app.get('UserRepository');
|
|
orgRepository = app.get('OrganizationRepository');
|
|
orgUserRepository = app.get('OrganizationUserRepository');
|
|
});
|
|
|
|
afterEach(() => {
|
|
jest.resetAllMocks();
|
|
jest.clearAllMocks();
|
|
});
|
|
|
|
describe('Multi Organization Operations', () => {
|
|
const token = 'some-token';
|
|
|
|
beforeEach(() => {
|
|
createSSOMockConfig(mockConfig);
|
|
});
|
|
|
|
describe('Signup and invite users', () => {
|
|
describe('should signup admin user', () => {
|
|
it("should return redirect url when user doesn't exist", async () => {
|
|
const gitAuthResponse = jest.fn();
|
|
gitAuthResponse.mockImplementation(() => {
|
|
return {
|
|
json: () => {
|
|
return {
|
|
access_token: 'some-access-token',
|
|
scope: 'scope',
|
|
token_type: 'bearer',
|
|
};
|
|
},
|
|
};
|
|
});
|
|
const gitGetUserResponse = jest.fn();
|
|
gitGetUserResponse.mockImplementation(() => {
|
|
return {
|
|
json: () => {
|
|
return {
|
|
name: 'SSO UserGit',
|
|
email: 'ssousergit@tooljet.com',
|
|
};
|
|
},
|
|
};
|
|
});
|
|
|
|
mockedGot.mockImplementationOnce(gitAuthResponse);
|
|
mockedGot.mockImplementationOnce(gitGetUserResponse);
|
|
|
|
const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token });
|
|
|
|
const manager = getManager();
|
|
const user = await manager.findOneOrFail(User, {
|
|
where: { email: 'ssousergit@tooljet.com' },
|
|
relations: ['organization'],
|
|
});
|
|
current_user = user;
|
|
current_organization = user.organization;
|
|
|
|
const redirect_url = `${process.env['TOOLJET_HOST']}/invitations/${user.invitationToken}?source=sso`;
|
|
|
|
expect(response.statusCode).toBe(201);
|
|
expect(response.body.redirect_url).toEqual(redirect_url);
|
|
});
|
|
|
|
it('should return user info while verifying invitation token', async () => {
|
|
const { body } = await verifyInviteToken(app, current_user, true);
|
|
expect(body?.email).toEqual('ssousergit@tooljet.com');
|
|
expect(body?.name).toEqual('SSO UserGit');
|
|
});
|
|
|
|
it('should setup user account with invitation token', async () => {
|
|
const { invitationToken } = current_user;
|
|
const payload = {
|
|
token: invitationToken,
|
|
password: 'password',
|
|
};
|
|
await setUpAccountFromToken(app, current_user, current_organization, payload);
|
|
});
|
|
|
|
it('should allow user to view apps', async () => {
|
|
const response = await request(app.getHttpServer())
|
|
.get(`/api/apps`)
|
|
.set('Authorization', authHeaderForUser(current_user));
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
});
|
|
});
|
|
|
|
describe("Invite User that doesn't exists in an organization", () => {
|
|
it('should send invitation link to the user', async () => {
|
|
const response = await request(app.getHttpServer())
|
|
.post('/api/organization_users')
|
|
.send({ email: 'org_user@tooljet.com', first_name: 'test', last_name: 'test' })
|
|
.set('Authorization', authHeaderForUser(current_user));
|
|
const { status } = response;
|
|
expect(status).toBe(201);
|
|
});
|
|
|
|
it('should verify token', async () => {
|
|
const user = await userRepository.findOneOrFail({ where: { email: 'org_user@tooljet.com' } });
|
|
org_user = user;
|
|
const { body } = await verifyInviteToken(app, org_user);
|
|
expect(body?.email).toEqual('org_user@tooljet.com');
|
|
expect(body?.name).toEqual('test test');
|
|
});
|
|
|
|
it('should setup user account using invitation token (setup-account-from-token)', async () => {
|
|
const { invitationToken } = org_user;
|
|
const { invitationToken: orgInviteToken } = await orgUserRepository.findOneOrFail({
|
|
where: { userId: org_user.id },
|
|
});
|
|
const organization = await orgRepository.findOneOrFail({
|
|
where: { id: org_user?.organizationUsers?.[0]?.organizationId },
|
|
});
|
|
|
|
org_user_organization = organization;
|
|
const payload = {
|
|
token: invitationToken,
|
|
organization_token: orgInviteToken,
|
|
password: 'password',
|
|
source: 'sso',
|
|
};
|
|
await setUpAccountFromToken(app, org_user, org_user_organization, payload);
|
|
});
|
|
|
|
it('should allow user to view apps', async () => {
|
|
const response = await request(app.getHttpServer())
|
|
.get(`/api/apps`)
|
|
.set('Authorization', authHeaderForUser(org_user));
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
});
|
|
});
|
|
|
|
describe('Invite user that already exist in an organization', () => {
|
|
let orgInvitationToken: string;
|
|
let invitedUser: User;
|
|
|
|
it('should send invitation link to the user', async () => {
|
|
const response = await request(app.getHttpServer())
|
|
.post('/api/organization_users')
|
|
.send({ email: 'ssousergit@tooljet.com' })
|
|
.set('Authorization', authHeaderForUser(org_user));
|
|
const { status } = response;
|
|
expect(status).toBe(201);
|
|
});
|
|
|
|
it('should verify organization token (verify-organization-token)', async () => {
|
|
const { user, invitationToken } = await orgUserRepository.findOneOrFail({
|
|
where: {
|
|
userId: current_user.id,
|
|
organizationId: org_user_organization.id,
|
|
},
|
|
relations: ['user'],
|
|
});
|
|
orgInvitationToken = invitationToken;
|
|
invitedUser = user;
|
|
|
|
const response = await request(app.getHttpServer()).get(
|
|
`/api/verify-organization-token?token=${invitationToken}`
|
|
);
|
|
const {
|
|
body: { email, name, onboarding_details },
|
|
status,
|
|
} = response;
|
|
|
|
expect(status).toBe(200);
|
|
expect(Object.keys(onboarding_details)).toEqual(['password']);
|
|
await invitedUser.reload();
|
|
expect(invitedUser.status).toBe('active');
|
|
expect(email).toEqual('ssousergit@tooljet.com');
|
|
expect(name).toEqual('SSO UserGit');
|
|
});
|
|
|
|
it('should accept invite and add user to the organization (accept-invite)', async () => {
|
|
await request(app.getHttpServer()).post(`/api/accept-invite`).send({ token: orgInvitationToken }).expect(201);
|
|
});
|
|
|
|
it('should allow the new user to view apps', async () => {
|
|
const response = await request(app.getHttpServer())
|
|
.get(`/api/apps`)
|
|
.set('Authorization', authHeaderForUser(invitedUser));
|
|
|
|
expect(response.statusCode).toBe(200);
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('Signup and invite url should work unless one of them is consumed', () => {
|
|
describe('Redirect url should be same as signup url', () => {
|
|
beforeAll(async () => {
|
|
await clearDB();
|
|
});
|
|
|
|
it('should signup a user', async () => {
|
|
await createFirstUser(app);
|
|
const response = await request(app.getHttpServer())
|
|
.post('/api/signup')
|
|
.send({ email: 'admin@tooljet.com', name: 'admin admin', password: 'password' });
|
|
expect(response.statusCode).toBe(201);
|
|
|
|
const user = await userRepository.findOneOrFail({
|
|
where: { email: 'admin@tooljet.com' },
|
|
relations: ['organizationUsers'],
|
|
});
|
|
current_user = user;
|
|
|
|
const organization = await orgRepository.findOneOrFail({
|
|
where: { id: user?.organizationUsers?.[0]?.organizationId },
|
|
});
|
|
current_organization = organization;
|
|
|
|
expect(user.defaultOrganizationId).toBe(user?.organizationUsers?.[0]?.organizationId);
|
|
expect(user.status).toBe('invited');
|
|
expect(user.source).toBe('signup');
|
|
});
|
|
|
|
it('should signup the same user using sso', async () => {
|
|
const gitAuthResponse = jest.fn();
|
|
gitAuthResponse.mockImplementation(() => {
|
|
return {
|
|
json: () => {
|
|
return {
|
|
access_token: 'some-access-token',
|
|
scope: 'scope',
|
|
token_type: 'bearer',
|
|
};
|
|
},
|
|
};
|
|
});
|
|
const gitGetUserResponse = jest.fn();
|
|
gitGetUserResponse.mockImplementation(() => {
|
|
return {
|
|
json: () => {
|
|
return {
|
|
name: 'SSO UserGit',
|
|
email: 'admin@tooljet.com',
|
|
};
|
|
},
|
|
};
|
|
});
|
|
|
|
mockedGot.mockImplementationOnce(gitAuthResponse);
|
|
mockedGot.mockImplementationOnce(gitGetUserResponse);
|
|
|
|
const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token });
|
|
|
|
ssoRedirectUrl = await generateRedirectUrl('admin@tooljet.com');
|
|
expect(response.statusCode).toBe(201);
|
|
expect(response.body.redirect_url).toEqual(ssoRedirectUrl);
|
|
});
|
|
|
|
it('should verify if base signup url and redirect url are equal', async () => {
|
|
signupUrl = await generateRedirectUrl('admin@tooljet.com', undefined, undefined, false);
|
|
expect(getPathFromUrl(ssoRedirectUrl)).toEqual(signupUrl);
|
|
});
|
|
});
|
|
|
|
describe('Setup account should work from sso link', () => {
|
|
beforeAll(async () => {
|
|
await clearDB();
|
|
});
|
|
|
|
it('should signup the user using sso', async () => {
|
|
const gitAuthResponse = jest.fn();
|
|
gitAuthResponse.mockImplementation(() => {
|
|
return {
|
|
json: () => {
|
|
return {
|
|
access_token: 'some-access-token',
|
|
scope: 'scope',
|
|
token_type: 'bearer',
|
|
};
|
|
},
|
|
};
|
|
});
|
|
const gitGetUserResponse = jest.fn();
|
|
gitGetUserResponse.mockImplementation(() => {
|
|
return {
|
|
json: () => {
|
|
return {
|
|
name: 'SSO UserGit',
|
|
email: 'admin@tooljet.com',
|
|
};
|
|
},
|
|
};
|
|
});
|
|
|
|
mockedGot.mockImplementationOnce(gitAuthResponse);
|
|
mockedGot.mockImplementationOnce(gitGetUserResponse);
|
|
|
|
const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token });
|
|
|
|
ssoRedirectUrl = await generateRedirectUrl('admin@tooljet.com');
|
|
expect(response.statusCode).toBe(201);
|
|
expect(response.body.redirect_url).toEqual(ssoRedirectUrl);
|
|
|
|
const user = await userRepository.findOneOrFail({
|
|
where: { email: 'admin@tooljet.com' },
|
|
relations: ['organizationUsers'],
|
|
});
|
|
current_user = user;
|
|
|
|
const organization = await orgRepository.findOneOrFail({
|
|
where: { id: user?.organizationUsers?.[0]?.organizationId },
|
|
});
|
|
current_organization = organization;
|
|
|
|
expect(user.defaultOrganizationId).toBe(user?.organizationUsers?.[0]?.organizationId);
|
|
expect(user.status).toBe('verified');
|
|
expect(user.source).toBe('git');
|
|
});
|
|
|
|
it('should not signup same user', async () => {
|
|
const response = await request(app.getHttpServer())
|
|
.post('/api/signup')
|
|
.send({ email: 'admin@tooljet.com', name: 'admin admin', password: 'password' });
|
|
expect(response.statusCode).toBe(406);
|
|
});
|
|
|
|
it('should setup account for user using sso link', async () => {
|
|
const { invitationToken } = current_user;
|
|
const organization = await orgRepository.findOneOrFail({
|
|
where: { id: current_user?.organizationUsers?.[0]?.organizationId },
|
|
});
|
|
|
|
current_organization = organization;
|
|
const payload = {
|
|
token: invitationToken,
|
|
password: 'password',
|
|
source: 'sso',
|
|
};
|
|
await setUpAccountFromToken(app, current_user, current_organization, payload);
|
|
});
|
|
});
|
|
|
|
describe('Invite link should work after setting up account through sso signup', () => {
|
|
beforeAll(async () => {
|
|
await clearDB();
|
|
const { user, organization } = await createUser(app, {
|
|
firstName: 'admin',
|
|
lastName: 'admin',
|
|
email: 'admin@tooljet.com',
|
|
status: 'active',
|
|
});
|
|
current_user = user;
|
|
current_organization = organization;
|
|
});
|
|
|
|
it('should send invitation link to the user', async () => {
|
|
const response = await request(app.getHttpServer())
|
|
.post('/api/organization_users')
|
|
.send({ email: 'org_user@tooljet.com', first_name: 'test', last_name: 'test' })
|
|
.set('Authorization', authHeaderForUser(current_user));
|
|
const { status } = response;
|
|
expect(status).toBe(201);
|
|
});
|
|
|
|
it('should signup the user using sso', async () => {
|
|
const gitAuthResponse = jest.fn();
|
|
gitAuthResponse.mockImplementation(() => {
|
|
return {
|
|
json: () => {
|
|
return {
|
|
access_token: 'some-access-token',
|
|
scope: 'scope',
|
|
token_type: 'bearer',
|
|
};
|
|
},
|
|
};
|
|
});
|
|
const gitGetUserResponse = jest.fn();
|
|
gitGetUserResponse.mockImplementation(() => {
|
|
return {
|
|
json: () => {
|
|
return {
|
|
name: 'SSO UserGit',
|
|
email: 'org_user@tooljet.com',
|
|
};
|
|
},
|
|
};
|
|
});
|
|
|
|
mockedGot.mockImplementationOnce(gitAuthResponse);
|
|
mockedGot.mockImplementationOnce(gitGetUserResponse);
|
|
|
|
const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token });
|
|
|
|
ssoRedirectUrl = await generateRedirectUrl('org_user@tooljet.com');
|
|
expect(response.statusCode).toBe(201);
|
|
expect(response.body.redirect_url).toEqual(ssoRedirectUrl);
|
|
});
|
|
|
|
it('should setup account for user using sso link', async () => {
|
|
const user = await userRepository.findOneOrFail({ where: { email: 'org_user@tooljet.com' } });
|
|
org_user = user;
|
|
const { invitationToken } = org_user;
|
|
const { invitationToken: orgInviteToken } = await orgUserRepository.findOneOrFail({
|
|
where: { userId: org_user.id },
|
|
});
|
|
const organization = await orgRepository.findOneOrFail({
|
|
where: { id: org_user?.organizationUsers?.[0]?.organizationId },
|
|
});
|
|
|
|
org_user_organization = organization;
|
|
const payload = {
|
|
token: invitationToken,
|
|
organization_token: orgInviteToken,
|
|
password: 'password',
|
|
source: 'sso',
|
|
};
|
|
await setUpAccountFromToken(app, org_user, org_user_organization, payload);
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
afterAll(async () => {
|
|
await clearDB();
|
|
await app.close();
|
|
});
|
|
});
|