ToolJet/server/test/controllers/onboarding/git-sso-auth.e2e-spec.ts
Kiran Ashok b66d38cf45
Feature :: onboarding self hosted users (#4933)
* fix :: keystroke not taken initially

* fix :: trim company name

* fix :: setting autocomplete to off

* removing redirectsso and confirmation page as its unused now

* few ui corrections , laoding states

* Fixed organization login sso issue

* Add db transaction wrap

* refactoring the code

* flow changes

* Added db tranxn wrap to auth services

* adding accept invite screen

* added verify organization token route

* fixes

* adding disable_multiworkspace to default config

* cleanup

* intermediate commit :: revamping organization page , api integration

* fixes

* feat :: organization token send in invite from org account setup

* fix :: making orgtoken conditional and ui changes / functional updates organization invte

* removed unwanted code

* fix :: login/account setup for sso user in single workspace flow

* fixes

* fix :: CTA loader misaligned

* fix :: sso login single workspace

* fix

* fix :: role check db

* fix :: role check DB

* fix :: setting fallback screen for organizational invite

* feat :: org signup

* fix :: loading states bug

* fix :: loading bug

* fixes

* added password length validation

* fixes

* fix: sub path for static asset serve (#4665)

* fix: sub path for static asset serve

* fix: sub path for static asset serve

* fix: sub path for static asset serve (#4668)

* Bugfix :: Sort event fired on sort removal (#4542)

* onsort applied on sort removal

* bugcheck

* removing unused toast

* Feature :: Table image column type addition (#4547)

* feat :: adding column type image

* feat :: adding image fit property

* Fix :: Closing of textarea ontype Table widget (#4549)

* fix :: closing of textarea ontype

* fix :: bug not able to clear value

* bug fixed : generate file in text is not supported (#4346)

* add eslintignore for frontend (#4669)

* [cypress] Fix failing manage SSO spec in single workspace #4390 (#4509)

* added  [data-cy=login-page-logo] also removed one dropdown of same name

* Revert command.js

* call loginpagelogo

* Fixed toast test case

* updated text

* remove timer

* revert linting

* Github text fixed

* Replaced the woocommerce connection screenshot from dark to light one (#4654)

Signed-off-by: Pakeetharan Balasubramaniam <bpakee@gmail.com>

Signed-off-by: Pakeetharan Balasubramaniam <bpakee@gmail.com>

* gifs for Keyboard Shortcuts Added (#4643)

* Fix. Image to button group docs (#4630) (#4631)

* Add. Image to button group docs (#4630)

* Update docs/docs/widgets/button-group.md

Co-authored-by: Shubhendra Singh Chauhan <withshubh@gmail.com>

* [added] Translated global strings in french #4169 (#4232)

* [added] Translated global strings in french 

Added global strings translated to French language , Issue: #4169

* [localization ] Fixed the Proposed Changes in French Translation

* [localization ] Fixed the Remaining Proposed Changes in French Translation v2

* Update selectHost

Co-authored-by: roiLeo <medina.leo42@gmail.com>

Co-authored-by: Shubhendra Singh Chauhan <withshubh@gmail.com>
Co-authored-by: roiLeo <medina.leo42@gmail.com>

* [localization] issue-4188 added spanish keys for card app (#4229)

* issue-4188 added spanish keys for card app

* IT-4188 fixed PR

* Improve toast message shortcut on component deletion (#4513)

* Improve toast message shortcut

* Improved user agent check

Co-authored-by: Kavin Venkatachalam <50441969+kavinvenkatachalam@users.noreply.github.com>

* Improved user agent check

Co-authored-by: Kavin Venkatachalam <50441969+kavinvenkatachalam@users.noreply.github.com>

* feat: Add DTO for organization create (#4651)

* feat: Add DTO for organization create

* chore: fix eslint error

* chore: eslint ...

* Fixed failing manage SSO spec in multi workspace (#4658)

* Fixed failing manage SSO spec in multi workspace

* github to gitHib

* persist data without saving the query (#4649)

* Fixed failing dashboard specs (#4667)

* Add and modify data-cy

* Fix failing manage users spec in multiworkspace

* Fix failing user permission spec in multi workspace

* Fix failing dashboard spec

* Fix failing manage group spec

* Fix failing manage users spec in single workspace

* Fix failing user permission spec in single workspace

* indentation changes

* Remove wait

* [Marketplace] AWS S3 (#4670)

* fix: sub path for static asset serve (#4665)

* fix: sub path for static asset serve

* fix: sub path for static asset serve

* marketplace: s3

* rename operations file to query_operations

* fix: crash on click of existing plugin

* remove unused console

* adds missing async await

* add isoptional for repo

* plugin card ui style fixes

* update plugin name

Co-authored-by: Gandharv <gandharvkumargarg@gmail.com>

* fix: Added a modal with warning message on disabling password (#4552)

* Copy to clipboard (#4588)

* Update EventManager.jsx

* Update EventManager.jsx

* Update EventManager.jsx

* fix :: adding sso configs based on org id

* loader and password check

* multiworkspace invite flow updated

* restrict only active users

* fix

* added error message for password length check

* fix :: password trim

* fix :: all happy flows tested , single and multi exept sso

* fix: message on invalid password

* revert: package-lock.json file

* feat :: changing ui for user present for org invite in  multi workspace

* fix :: remove password check for existing user multiworkspace

* fix :: added fallback

* fix :: typo

* fix :: adding checks

* fix

* feat :: for single workspace user logged in directly

* fix :: code meaning fix

* fix

* fixes

* fix

* fix

* fix

* fix :: sso fix and bug updates

* fix :: json resolution for only single workspace

* token :: app level

* fix

* fix

* fixes

* fix

* ui fixes , removed loading and added checks

* showing sso options

* fix :: back to

* fix single workspace

* adding sso check ui

* sso single workspace fix

* code refactoring

* fix :: bugfix on click enter submit in signup and signin

* qa fix :: typo

* fix for sending welcome email on invite

* bug fixes

* fix

* qa bug fixes and translations

* switch workspace fixes

* fix :: company name taking empty spaces

* adding some more translations

* making all screens center aligned

* fix :: login page not loading

* fix :: singup conditional

* fixes

* typo fix

* fix :: for diabled cases of sso , password login , disabled signup

* fix

* fix :: added max input length for workspace name

* fix

* fix :: missing validation on edit email

* fix :: all screens vertically aligned

* fix :: alignment link expiry screen

* fix

* fix :: styling terms and condition

* fix :: for redirect url loginto workspace fixed according to new design

* typo

* feat :: removed onboarding modal , redundant

* typo fix

* fix

* name is now mandatory for sign up

* fix for password retry count not updating

* showing onboarding questions for sign up users

* fix :: spaces in password in diff screens

* fix :: darkmode initial

* fix for accept organization invite success message

* fix :: dark mode

* fix :: dark mode

* feat :: updating all dark mode images

* bugfix img

* bugfix ::img

* dark mode :: improvements

* single workspace signup fix

* updating images

* stylefix

* self review :: bugfixes

* sign up page fix

* fix for asking password for single ws activation

* or separator fix for signup page

* fix

* feat :: updating cta images

* fix :: loader bugs

* hiding sso options in org invite, sign in via sso

* fix :: dark mode img

* bugfixes :: cta changed

* Fix :: onboarding styles fixes (#4773)

* fix: styling in authWrappers

* cleanup

Co-authored-by: Vijaykant Yadav <vjy239@gmail.com>

* fix :: conflicting styles

* fix :: loaders , and added header to link expired screen , style fixes

* fix :: mobile onboarding btn

* fix :: loading onboarding completion

* fix :: subpath not taking img path

* fix :: path

* fix :: removing trailing img / for subpath

* fix :: cta img

* fix :: remove scrollbar

* last name as undefined in comments

* fixed loading bug and cursor of company input onboard form

* comments fixes

* fix :: removing verify email screen on org invite

* comments fix

* fix :: no login methods

* fix :: bug in expired  org invite verification link

* fix :: edge case name being empty when user types multiple spaces

* fix :: comments breaking

* fix :: notification breaking

* fix :: user groups table lastname

* fix for sso redirection

* fix :: empty first and last name during org invite

* bug fixed :On updating any permissions under permission tab, currentTab switches to app tab (#4734)

* fix: popout editor closing for tables (#4674)

Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com>

* Added default value for backgroundColor In NumberInput (#4378)

* fix: added background styles for number input

* fix: removed additional f from the background color property

* fix: added backgroundColor property from styles

* fixes: default bg color for dark mode

Co-authored-by: arpitnath <arpitnath42@gmail.com>
Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com>

* Added the hover effects on datasources (#4303)

Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com>

* Added Background Color to Text Input (#4194)

* Added Background Color to Text Input

* Added Default Value for Background Color

* added default value and make background of text input consistent with the dark theme

Co-authored-by: manishkushare <kushare.manish9@gmail.com>
Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com>

* feat: Add update version button on installable plugin (#4766)

* feat: Add update version button on installable plugin

* use id from update method

* removes redundant check

* use plugin id for fetching files from s3

* fetch latest plugins once updated

* disable update and remove buttons while update in progress

* replace href with link-span cx + send body in patch request

* fix: Dark mode on table's `Striped` and `Striped & Bordered` table type mode (#4611)

* [ Hotfix ] :: Hard to resize table columns  (#4438)

* fix :: hard to resize , scrollbar should not be visible

* fix :: resizer not working in pewview

* Enhancement : [RangeSlider widget] Bind onChange event (#4192)

* add onChange event and its handler

* add handler for slider change as well

* fix lint

* added onChange fire event when slider value is changed

Co-authored-by: manishkushare <kushare.manish9@gmail.com>

* Added data-cy for table widget elements (#4792)

* Add data-cy to tooltip label

* Add data-cy to table filter pop-over

* Add data-cy to table elements

* Add review changes

* [docs] Widget updates (#4793)

* widget updates

* minor update

* Update README.md (#4784)

* Update README.md

* Update README.md

* Update README.md

* Update README.md

* Update README.md

* Fixed grammatical errors in localization doc (#4800)

* [docs] widget property updates (#4806)

* fixes

* added resend invite API

* Onboarding revamp test cases (#4770)

* fix: test cases for oauth

* fix: app controller test cases

* fix: test cases for oauth

* fix: app controller test cases

* remove: unused vars

* fix: test cases for oauth

* fix: app controller test cases

* remove: unused vars

* chore: PR fixes and cleanup

* fix: single workspace test cases

* fix: test cases for oauth

* fix: app controller test cases

* remove: unused vars

* chore: PR fixes and cleanup

* fix: test cases for oauth

* fix: single workspace test cases

* add: test cases for invitation links

* add: test cases for sso

* fix: test cases for oauth

* fix: app controller test cases

* remove: unused vars

* chore: PR fixes and cleanup

* fix: test cases for oauth

* fix: single workspace test cases

* add: test cases for invitation links

* fix: test cases for oauth

* fix: app controller test cases

* chore: PR fixes and cleanup

* add: test cases for sso

* fix: app test cases

* fix: linting in files

* fix: test cases for oauth

* fix: app controller test cases

* remove: unused vars

* chore: PR fixes and cleanup

* fix: test cases for oauth

* fix: single workspace test cases

* add: test cases for invitation links

* fix: test cases for oauth

* fix: app controller test cases

* chore: PR fixes and cleanup

* add: test cases for sso

* fix: app test cases

* fix: test cases for oauth

* fix: linting in files

* rebase: from feature/onboarding-revamp

Co-authored-by: Vijaykant Yadav <vjy239@gmail.com>

* feat :: api update resend invite

* loading state resend mail

* adding loading state

* checkpoints shown only till tablet

* fix: failing test cases for sso

* pr:: changes changed all imports and removed unwanted fragments

* pr changes

* fix :: naming images

* fix :: style organized for onboarding

* fix for user seed issue

* removing unwanted styles

* Setting darkmode from props :: onboarding (#4885)

* passing darkmode as props to components

* error toast

* Review comment :: rename env variable

* Pr :: changes , code cleanup onborading form

* develop merge

* init :: CE setup page

* pr changes ::form splitted to components

* admin , worspace ui :: init save

* password warning added

* chore :: lint folder renaming

* chore :: lint fix

* review comments

* fixes

* fix for test cases failure

* changes :: removed empty divs

* cleanup

* feat :: onboarding setup completed

* updates

* first-user setup account

* fixes

* add guard for first user sign up api

* validation changes

* feat :: api integration

* workspace is mandatory for first user

* fix :: code cleanup , darkmode

* feat :: signup not enable info card

* fix code cleanup

* Fixed all e2e test cases

* Fixed an issue

* added style changes , signup status

* deisgn review style changes

* self review :: code improvements

* pr review changes

* removed unwanted state

* typo fixes

* feat :: improved ux on form , autofocus and enter key support, removing warnings

* pr review changes :: common constants and helpers moved

Signed-off-by: Pakeetharan Balasubramaniam <bpakee@gmail.com>
Co-authored-by: Muhsin Shah <muhsinshah21@gmail.com>
Co-authored-by: gsmithun4 <gsmithun4@gmail.com>
Co-authored-by: Gandharv <gandharvkumargarg@gmail.com>
Co-authored-by: Manish Kushare <kushare.manish9@gmail.com>
Co-authored-by: Akshay <akshaysasidharan93@gmail.com>
Co-authored-by: alammoiz <moixalam@gmail.com>
Co-authored-by: Pakeetharan Balasubramaniam <bpakee@gmail.com>
Co-authored-by: Akhilesh Kumar Mishra <79476272+iamakhileshmishra@users.noreply.github.com>
Co-authored-by: Hemanth Kumar <49117799+Hemanthhari2000@users.noreply.github.com>
Co-authored-by: Shubhendra Singh Chauhan <withshubh@gmail.com>
Co-authored-by: akk312000 <akk312000@gmail.com>
Co-authored-by: roiLeo <medina.leo42@gmail.com>
Co-authored-by: Jose Morales <jmoralesmnz@gmail.com>
Co-authored-by: 3t8 <62209650+3t8@users.noreply.github.com>
Co-authored-by: Kavin Venkatachalam <50441969+kavinvenkatachalam@users.noreply.github.com>
Co-authored-by: Santosh Bhandari <bsantosh909@gmail.com>
Co-authored-by: Arpit <arpitnath42@gmail.com>
Co-authored-by: Ajith KV <ajith.jaban@gmail.com>
Co-authored-by: Akarsh Jain <72064462+akarsh-jain-790@users.noreply.github.com>
Co-authored-by: Utsav Paul <91927689+Smartmind12@users.noreply.github.com>
Co-authored-by: Vijaykant Yadav <vjaris42@Vijaykants-MacBook-Pro.local>
Co-authored-by: Vijaykant Yadav <vjy239@gmail.com>
Co-authored-by: geisterfurz007 <geisterfurz007@users.noreply.github.com>
Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com>
Co-authored-by: Abhushan Gautam <carefreeav09@gmail.com>
Co-authored-by: Syed Ansar <82027712+Syed-Ansar@users.noreply.github.com>
Co-authored-by: Rahul Sunil <rahulsunil2@gmail.com>
Co-authored-by: Srisuma Atluri <40341173+Srisuma13@users.noreply.github.com>
Co-authored-by: Midhun Kumar E <midhun752@gmail.com>
Co-authored-by: Navaneeth Pk <navaneeth@tooljet.io>
Co-authored-by: Akasshhg <91525166+gogoiakash2311@users.noreply.github.com>
2022-12-21 00:13:18 +05:30

460 lines
16 KiB
TypeScript

import * as request from 'supertest';
import { INestApplication } from '@nestjs/common';
import { Organization } from 'src/entities/organization.entity';
import { OrganizationUser } from 'src/entities/organization_user.entity';
import { User } from 'src/entities/user.entity';
import {
authHeaderForUser,
clearDB,
createFirstUser,
createNestAppInstanceWithEnvMock,
createSSOMockConfig,
createUser,
generateRedirectUrl,
getPathFromUrl,
setUpAccountFromToken,
verifyInviteToken,
} from '../../test.helper';
import { getManager, Repository } from 'typeorm';
import { mocked } from 'ts-jest/utils';
import got from 'got';
jest.mock('got');
const mockedGot = mocked(got);
describe('Git Onboarding', () => {
let app: INestApplication;
let userRepository: Repository<User>;
let orgRepository: Repository<Organization>;
let orgUserRepository: Repository<OrganizationUser>;
let current_user: User;
let current_organization: Organization;
let org_user: User;
let org_user_organization: Organization;
let signupUrl: string;
let ssoRedirectUrl: string;
let mockConfig;
beforeAll(async () => {
({ app, mockConfig } = await createNestAppInstanceWithEnvMock());
userRepository = app.get('UserRepository');
orgRepository = app.get('OrganizationRepository');
orgUserRepository = app.get('OrganizationUserRepository');
});
afterEach(() => {
jest.resetAllMocks();
jest.clearAllMocks();
});
describe('Multi Organization Operations', () => {
const token = 'some-token';
beforeEach(() => {
createSSOMockConfig(mockConfig);
});
describe('Signup and invite users', () => {
describe('should signup admin user', () => {
it("should return redirect url when user doesn't exist", async () => {
const gitAuthResponse = jest.fn();
gitAuthResponse.mockImplementation(() => {
return {
json: () => {
return {
access_token: 'some-access-token',
scope: 'scope',
token_type: 'bearer',
};
},
};
});
const gitGetUserResponse = jest.fn();
gitGetUserResponse.mockImplementation(() => {
return {
json: () => {
return {
name: 'SSO UserGit',
email: 'ssousergit@tooljet.com',
};
},
};
});
mockedGot.mockImplementationOnce(gitAuthResponse);
mockedGot.mockImplementationOnce(gitGetUserResponse);
const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token });
const manager = getManager();
const user = await manager.findOneOrFail(User, {
where: { email: 'ssousergit@tooljet.com' },
relations: ['organization'],
});
current_user = user;
current_organization = user.organization;
const redirect_url = `${process.env['TOOLJET_HOST']}/invitations/${user.invitationToken}?source=sso`;
expect(response.statusCode).toBe(201);
expect(response.body.redirect_url).toEqual(redirect_url);
});
it('should return user info while verifying invitation token', async () => {
const { body } = await verifyInviteToken(app, current_user, true);
expect(body?.email).toEqual('ssousergit@tooljet.com');
expect(body?.name).toEqual('SSO UserGit');
});
it('should setup user account with invitation token', async () => {
const { invitationToken } = current_user;
const payload = {
token: invitationToken,
password: 'password',
};
await setUpAccountFromToken(app, current_user, current_organization, payload);
});
it('should allow user to view apps', async () => {
const response = await request(app.getHttpServer())
.get(`/api/apps`)
.set('Authorization', authHeaderForUser(current_user));
expect(response.statusCode).toBe(200);
});
});
describe("Invite User that doesn't exists in an organization", () => {
it('should send invitation link to the user', async () => {
const response = await request(app.getHttpServer())
.post('/api/organization_users')
.send({ email: 'org_user@tooljet.com', first_name: 'test', last_name: 'test' })
.set('Authorization', authHeaderForUser(current_user));
const { status } = response;
expect(status).toBe(201);
});
it('should verify token', async () => {
const user = await userRepository.findOneOrFail({ where: { email: 'org_user@tooljet.com' } });
org_user = user;
const { body } = await verifyInviteToken(app, org_user);
expect(body?.email).toEqual('org_user@tooljet.com');
expect(body?.name).toEqual('test test');
});
it('should setup user account using invitation token (setup-account-from-token)', async () => {
const { invitationToken } = org_user;
const { invitationToken: orgInviteToken } = await orgUserRepository.findOneOrFail({
where: { userId: org_user.id },
});
const organization = await orgRepository.findOneOrFail({
where: { id: org_user?.organizationUsers?.[0]?.organizationId },
});
org_user_organization = organization;
const payload = {
token: invitationToken,
organization_token: orgInviteToken,
password: 'password',
source: 'sso',
};
await setUpAccountFromToken(app, org_user, org_user_organization, payload);
});
it('should allow user to view apps', async () => {
const response = await request(app.getHttpServer())
.get(`/api/apps`)
.set('Authorization', authHeaderForUser(org_user));
expect(response.statusCode).toBe(200);
});
});
describe('Invite user that already exist in an organization', () => {
let orgInvitationToken: string;
let invitedUser: User;
it('should send invitation link to the user', async () => {
const response = await request(app.getHttpServer())
.post('/api/organization_users')
.send({ email: 'ssousergit@tooljet.com' })
.set('Authorization', authHeaderForUser(org_user));
const { status } = response;
expect(status).toBe(201);
});
it('should verify organization token (verify-organization-token)', async () => {
const { user, invitationToken } = await orgUserRepository.findOneOrFail({
where: {
userId: current_user.id,
organizationId: org_user_organization.id,
},
relations: ['user'],
});
orgInvitationToken = invitationToken;
invitedUser = user;
const response = await request(app.getHttpServer()).get(
`/api/verify-organization-token?token=${invitationToken}`
);
const {
body: { email, name, onboarding_details },
status,
} = response;
expect(status).toBe(200);
expect(Object.keys(onboarding_details)).toEqual(['password']);
await invitedUser.reload();
expect(invitedUser.status).toBe('active');
expect(email).toEqual('ssousergit@tooljet.com');
expect(name).toEqual('SSO UserGit');
});
it('should accept invite and add user to the organization (accept-invite)', async () => {
await request(app.getHttpServer()).post(`/api/accept-invite`).send({ token: orgInvitationToken }).expect(201);
});
it('should allow the new user to view apps', async () => {
const response = await request(app.getHttpServer())
.get(`/api/apps`)
.set('Authorization', authHeaderForUser(invitedUser));
expect(response.statusCode).toBe(200);
});
});
});
describe('Signup and invite url should work unless one of them is consumed', () => {
describe('Redirect url should be same as signup url', () => {
beforeAll(async () => {
await clearDB();
});
it('should signup a user', async () => {
await createFirstUser(app);
const response = await request(app.getHttpServer())
.post('/api/signup')
.send({ email: 'admin@tooljet.com', name: 'admin admin', password: 'password' });
expect(response.statusCode).toBe(201);
const user = await userRepository.findOneOrFail({
where: { email: 'admin@tooljet.com' },
relations: ['organizationUsers'],
});
current_user = user;
const organization = await orgRepository.findOneOrFail({
where: { id: user?.organizationUsers?.[0]?.organizationId },
});
current_organization = organization;
expect(user.defaultOrganizationId).toBe(user?.organizationUsers?.[0]?.organizationId);
expect(user.status).toBe('invited');
expect(user.source).toBe('signup');
});
it('should signup the same user using sso', async () => {
const gitAuthResponse = jest.fn();
gitAuthResponse.mockImplementation(() => {
return {
json: () => {
return {
access_token: 'some-access-token',
scope: 'scope',
token_type: 'bearer',
};
},
};
});
const gitGetUserResponse = jest.fn();
gitGetUserResponse.mockImplementation(() => {
return {
json: () => {
return {
name: 'SSO UserGit',
email: 'admin@tooljet.com',
};
},
};
});
mockedGot.mockImplementationOnce(gitAuthResponse);
mockedGot.mockImplementationOnce(gitGetUserResponse);
const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token });
ssoRedirectUrl = await generateRedirectUrl('admin@tooljet.com');
expect(response.statusCode).toBe(201);
expect(response.body.redirect_url).toEqual(ssoRedirectUrl);
});
it('should verify if base signup url and redirect url are equal', async () => {
signupUrl = await generateRedirectUrl('admin@tooljet.com', undefined, undefined, false);
expect(getPathFromUrl(ssoRedirectUrl)).toEqual(signupUrl);
});
});
describe('Setup account should work from sso link', () => {
beforeAll(async () => {
await clearDB();
});
it('should signup the user using sso', async () => {
const gitAuthResponse = jest.fn();
gitAuthResponse.mockImplementation(() => {
return {
json: () => {
return {
access_token: 'some-access-token',
scope: 'scope',
token_type: 'bearer',
};
},
};
});
const gitGetUserResponse = jest.fn();
gitGetUserResponse.mockImplementation(() => {
return {
json: () => {
return {
name: 'SSO UserGit',
email: 'admin@tooljet.com',
};
},
};
});
mockedGot.mockImplementationOnce(gitAuthResponse);
mockedGot.mockImplementationOnce(gitGetUserResponse);
const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token });
ssoRedirectUrl = await generateRedirectUrl('admin@tooljet.com');
expect(response.statusCode).toBe(201);
expect(response.body.redirect_url).toEqual(ssoRedirectUrl);
const user = await userRepository.findOneOrFail({
where: { email: 'admin@tooljet.com' },
relations: ['organizationUsers'],
});
current_user = user;
const organization = await orgRepository.findOneOrFail({
where: { id: user?.organizationUsers?.[0]?.organizationId },
});
current_organization = organization;
expect(user.defaultOrganizationId).toBe(user?.organizationUsers?.[0]?.organizationId);
expect(user.status).toBe('verified');
expect(user.source).toBe('git');
});
it('should not signup same user', async () => {
const response = await request(app.getHttpServer())
.post('/api/signup')
.send({ email: 'admin@tooljet.com', name: 'admin admin', password: 'password' });
expect(response.statusCode).toBe(406);
});
it('should setup account for user using sso link', async () => {
const { invitationToken } = current_user;
const organization = await orgRepository.findOneOrFail({
where: { id: current_user?.organizationUsers?.[0]?.organizationId },
});
current_organization = organization;
const payload = {
token: invitationToken,
password: 'password',
source: 'sso',
};
await setUpAccountFromToken(app, current_user, current_organization, payload);
});
});
describe('Invite link should work after setting up account through sso signup', () => {
beforeAll(async () => {
await clearDB();
const { user, organization } = await createUser(app, {
firstName: 'admin',
lastName: 'admin',
email: 'admin@tooljet.com',
status: 'active',
});
current_user = user;
current_organization = organization;
});
it('should send invitation link to the user', async () => {
const response = await request(app.getHttpServer())
.post('/api/organization_users')
.send({ email: 'org_user@tooljet.com', first_name: 'test', last_name: 'test' })
.set('Authorization', authHeaderForUser(current_user));
const { status } = response;
expect(status).toBe(201);
});
it('should signup the user using sso', async () => {
const gitAuthResponse = jest.fn();
gitAuthResponse.mockImplementation(() => {
return {
json: () => {
return {
access_token: 'some-access-token',
scope: 'scope',
token_type: 'bearer',
};
},
};
});
const gitGetUserResponse = jest.fn();
gitGetUserResponse.mockImplementation(() => {
return {
json: () => {
return {
name: 'SSO UserGit',
email: 'org_user@tooljet.com',
};
},
};
});
mockedGot.mockImplementationOnce(gitAuthResponse);
mockedGot.mockImplementationOnce(gitGetUserResponse);
const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/git').send({ token });
ssoRedirectUrl = await generateRedirectUrl('org_user@tooljet.com');
expect(response.statusCode).toBe(201);
expect(response.body.redirect_url).toEqual(ssoRedirectUrl);
});
it('should setup account for user using sso link', async () => {
const user = await userRepository.findOneOrFail({ where: { email: 'org_user@tooljet.com' } });
org_user = user;
const { invitationToken } = org_user;
const { invitationToken: orgInviteToken } = await orgUserRepository.findOneOrFail({
where: { userId: org_user.id },
});
const organization = await orgRepository.findOneOrFail({
where: { id: org_user?.organizationUsers?.[0]?.organizationId },
});
org_user_organization = organization;
const payload = {
token: invitationToken,
organization_token: orgInviteToken,
password: 'password',
source: 'sso',
};
await setUpAccountFromToken(app, org_user, org_user_organization, payload);
});
});
});
});
afterAll(async () => {
await clearDB();
await app.close();
});
});