ToolJet/server/test/test.helper.ts
Kiran Ashok b66d38cf45
Feature :: onboarding self hosted users (#4933)
* fix :: keystroke not taken initially

* fix :: trim company name

* fix :: setting autocomplete to off

* removing redirectsso and confirmation page as its unused now

* few ui corrections , laoding states

* Fixed organization login sso issue

* Add db transaction wrap

* refactoring the code

* flow changes

* Added db tranxn wrap to auth services

* adding accept invite screen

* added verify organization token route

* fixes

* adding disable_multiworkspace to default config

* cleanup

* intermediate commit :: revamping organization page , api integration

* fixes

* feat :: organization token send in invite from org account setup

* fix :: making orgtoken conditional and ui changes / functional updates organization invte

* removed unwanted code

* fix :: login/account setup for sso user in single workspace flow

* fixes

* fix :: CTA loader misaligned

* fix :: sso login single workspace

* fix

* fix :: role check db

* fix :: role check DB

* fix :: setting fallback screen for organizational invite

* feat :: org signup

* fix :: loading states bug

* fix :: loading bug

* fixes

* added password length validation

* fixes

* fix: sub path for static asset serve (#4665)

* fix: sub path for static asset serve

* fix: sub path for static asset serve

* fix: sub path for static asset serve (#4668)

* Bugfix :: Sort event fired on sort removal (#4542)

* onsort applied on sort removal

* bugcheck

* removing unused toast

* Feature :: Table image column type addition (#4547)

* feat :: adding column type image

* feat :: adding image fit property

* Fix :: Closing of textarea ontype Table widget (#4549)

* fix :: closing of textarea ontype

* fix :: bug not able to clear value

* bug fixed : generate file in text is not supported (#4346)

* add eslintignore for frontend (#4669)

* [cypress] Fix failing manage SSO spec in single workspace #4390 (#4509)

* added  [data-cy=login-page-logo] also removed one dropdown of same name

* Revert command.js

* call loginpagelogo

* Fixed toast test case

* updated text

* remove timer

* revert linting

* Github text fixed

* Replaced the woocommerce connection screenshot from dark to light one (#4654)

Signed-off-by: Pakeetharan Balasubramaniam <bpakee@gmail.com>

Signed-off-by: Pakeetharan Balasubramaniam <bpakee@gmail.com>

* gifs for Keyboard Shortcuts Added (#4643)

* Fix. Image to button group docs (#4630) (#4631)

* Add. Image to button group docs (#4630)

* Update docs/docs/widgets/button-group.md

Co-authored-by: Shubhendra Singh Chauhan <withshubh@gmail.com>

* [added] Translated global strings in french #4169 (#4232)

* [added] Translated global strings in french 

Added global strings translated to French language , Issue: #4169

* [localization ] Fixed the Proposed Changes in French Translation

* [localization ] Fixed the Remaining Proposed Changes in French Translation v2

* Update selectHost

Co-authored-by: roiLeo <medina.leo42@gmail.com>

Co-authored-by: Shubhendra Singh Chauhan <withshubh@gmail.com>
Co-authored-by: roiLeo <medina.leo42@gmail.com>

* [localization] issue-4188 added spanish keys for card app (#4229)

* issue-4188 added spanish keys for card app

* IT-4188 fixed PR

* Improve toast message shortcut on component deletion (#4513)

* Improve toast message shortcut

* Improved user agent check

Co-authored-by: Kavin Venkatachalam <50441969+kavinvenkatachalam@users.noreply.github.com>

* Improved user agent check

Co-authored-by: Kavin Venkatachalam <50441969+kavinvenkatachalam@users.noreply.github.com>

* feat: Add DTO for organization create (#4651)

* feat: Add DTO for organization create

* chore: fix eslint error

* chore: eslint ...

* Fixed failing manage SSO spec in multi workspace (#4658)

* Fixed failing manage SSO spec in multi workspace

* github to gitHib

* persist data without saving the query (#4649)

* Fixed failing dashboard specs (#4667)

* Add and modify data-cy

* Fix failing manage users spec in multiworkspace

* Fix failing user permission spec in multi workspace

* Fix failing dashboard spec

* Fix failing manage group spec

* Fix failing manage users spec in single workspace

* Fix failing user permission spec in single workspace

* indentation changes

* Remove wait

* [Marketplace] AWS S3 (#4670)

* fix: sub path for static asset serve (#4665)

* fix: sub path for static asset serve

* fix: sub path for static asset serve

* marketplace: s3

* rename operations file to query_operations

* fix: crash on click of existing plugin

* remove unused console

* adds missing async await

* add isoptional for repo

* plugin card ui style fixes

* update plugin name

Co-authored-by: Gandharv <gandharvkumargarg@gmail.com>

* fix: Added a modal with warning message on disabling password (#4552)

* Copy to clipboard (#4588)

* Update EventManager.jsx

* Update EventManager.jsx

* Update EventManager.jsx

* fix :: adding sso configs based on org id

* loader and password check

* multiworkspace invite flow updated

* restrict only active users

* fix

* added error message for password length check

* fix :: password trim

* fix :: all happy flows tested , single and multi exept sso

* fix: message on invalid password

* revert: package-lock.json file

* feat :: changing ui for user present for org invite in  multi workspace

* fix :: remove password check for existing user multiworkspace

* fix :: added fallback

* fix :: typo

* fix :: adding checks

* fix

* feat :: for single workspace user logged in directly

* fix :: code meaning fix

* fix

* fixes

* fix

* fix

* fix

* fix :: sso fix and bug updates

* fix :: json resolution for only single workspace

* token :: app level

* fix

* fix

* fixes

* fix

* ui fixes , removed loading and added checks

* showing sso options

* fix :: back to

* fix single workspace

* adding sso check ui

* sso single workspace fix

* code refactoring

* fix :: bugfix on click enter submit in signup and signin

* qa fix :: typo

* fix for sending welcome email on invite

* bug fixes

* fix

* qa bug fixes and translations

* switch workspace fixes

* fix :: company name taking empty spaces

* adding some more translations

* making all screens center aligned

* fix :: login page not loading

* fix :: singup conditional

* fixes

* typo fix

* fix :: for diabled cases of sso , password login , disabled signup

* fix

* fix :: added max input length for workspace name

* fix

* fix :: missing validation on edit email

* fix :: all screens vertically aligned

* fix :: alignment link expiry screen

* fix

* fix :: styling terms and condition

* fix :: for redirect url loginto workspace fixed according to new design

* typo

* feat :: removed onboarding modal , redundant

* typo fix

* fix

* name is now mandatory for sign up

* fix for password retry count not updating

* showing onboarding questions for sign up users

* fix :: spaces in password in diff screens

* fix :: darkmode initial

* fix for accept organization invite success message

* fix :: dark mode

* fix :: dark mode

* feat :: updating all dark mode images

* bugfix img

* bugfix ::img

* dark mode :: improvements

* single workspace signup fix

* updating images

* stylefix

* self review :: bugfixes

* sign up page fix

* fix for asking password for single ws activation

* or separator fix for signup page

* fix

* feat :: updating cta images

* fix :: loader bugs

* hiding sso options in org invite, sign in via sso

* fix :: dark mode img

* bugfixes :: cta changed

* Fix :: onboarding styles fixes (#4773)

* fix: styling in authWrappers

* cleanup

Co-authored-by: Vijaykant Yadav <vjy239@gmail.com>

* fix :: conflicting styles

* fix :: loaders , and added header to link expired screen , style fixes

* fix :: mobile onboarding btn

* fix :: loading onboarding completion

* fix :: subpath not taking img path

* fix :: path

* fix :: removing trailing img / for subpath

* fix :: cta img

* fix :: remove scrollbar

* last name as undefined in comments

* fixed loading bug and cursor of company input onboard form

* comments fixes

* fix :: removing verify email screen on org invite

* comments fix

* fix :: no login methods

* fix :: bug in expired  org invite verification link

* fix :: edge case name being empty when user types multiple spaces

* fix :: comments breaking

* fix :: notification breaking

* fix :: user groups table lastname

* fix for sso redirection

* fix :: empty first and last name during org invite

* bug fixed :On updating any permissions under permission tab, currentTab switches to app tab (#4734)

* fix: popout editor closing for tables (#4674)

Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com>

* Added default value for backgroundColor In NumberInput (#4378)

* fix: added background styles for number input

* fix: removed additional f from the background color property

* fix: added backgroundColor property from styles

* fixes: default bg color for dark mode

Co-authored-by: arpitnath <arpitnath42@gmail.com>
Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com>

* Added the hover effects on datasources (#4303)

Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com>

* Added Background Color to Text Input (#4194)

* Added Background Color to Text Input

* Added Default Value for Background Color

* added default value and make background of text input consistent with the dark theme

Co-authored-by: manishkushare <kushare.manish9@gmail.com>
Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com>

* feat: Add update version button on installable plugin (#4766)

* feat: Add update version button on installable plugin

* use id from update method

* removes redundant check

* use plugin id for fetching files from s3

* fetch latest plugins once updated

* disable update and remove buttons while update in progress

* replace href with link-span cx + send body in patch request

* fix: Dark mode on table's `Striped` and `Striped & Bordered` table type mode (#4611)

* [ Hotfix ] :: Hard to resize table columns  (#4438)

* fix :: hard to resize , scrollbar should not be visible

* fix :: resizer not working in pewview

* Enhancement : [RangeSlider widget] Bind onChange event (#4192)

* add onChange event and its handler

* add handler for slider change as well

* fix lint

* added onChange fire event when slider value is changed

Co-authored-by: manishkushare <kushare.manish9@gmail.com>

* Added data-cy for table widget elements (#4792)

* Add data-cy to tooltip label

* Add data-cy to table filter pop-over

* Add data-cy to table elements

* Add review changes

* [docs] Widget updates (#4793)

* widget updates

* minor update

* Update README.md (#4784)

* Update README.md

* Update README.md

* Update README.md

* Update README.md

* Update README.md

* Fixed grammatical errors in localization doc (#4800)

* [docs] widget property updates (#4806)

* fixes

* added resend invite API

* Onboarding revamp test cases (#4770)

* fix: test cases for oauth

* fix: app controller test cases

* fix: test cases for oauth

* fix: app controller test cases

* remove: unused vars

* fix: test cases for oauth

* fix: app controller test cases

* remove: unused vars

* chore: PR fixes and cleanup

* fix: single workspace test cases

* fix: test cases for oauth

* fix: app controller test cases

* remove: unused vars

* chore: PR fixes and cleanup

* fix: test cases for oauth

* fix: single workspace test cases

* add: test cases for invitation links

* add: test cases for sso

* fix: test cases for oauth

* fix: app controller test cases

* remove: unused vars

* chore: PR fixes and cleanup

* fix: test cases for oauth

* fix: single workspace test cases

* add: test cases for invitation links

* fix: test cases for oauth

* fix: app controller test cases

* chore: PR fixes and cleanup

* add: test cases for sso

* fix: app test cases

* fix: linting in files

* fix: test cases for oauth

* fix: app controller test cases

* remove: unused vars

* chore: PR fixes and cleanup

* fix: test cases for oauth

* fix: single workspace test cases

* add: test cases for invitation links

* fix: test cases for oauth

* fix: app controller test cases

* chore: PR fixes and cleanup

* add: test cases for sso

* fix: app test cases

* fix: test cases for oauth

* fix: linting in files

* rebase: from feature/onboarding-revamp

Co-authored-by: Vijaykant Yadav <vjy239@gmail.com>

* feat :: api update resend invite

* loading state resend mail

* adding loading state

* checkpoints shown only till tablet

* fix: failing test cases for sso

* pr:: changes changed all imports and removed unwanted fragments

* pr changes

* fix :: naming images

* fix :: style organized for onboarding

* fix for user seed issue

* removing unwanted styles

* Setting darkmode from props :: onboarding (#4885)

* passing darkmode as props to components

* error toast

* Review comment :: rename env variable

* Pr :: changes , code cleanup onborading form

* develop merge

* init :: CE setup page

* pr changes ::form splitted to components

* admin , worspace ui :: init save

* password warning added

* chore :: lint folder renaming

* chore :: lint fix

* review comments

* fixes

* fix for test cases failure

* changes :: removed empty divs

* cleanup

* feat :: onboarding setup completed

* updates

* first-user setup account

* fixes

* add guard for first user sign up api

* validation changes

* feat :: api integration

* workspace is mandatory for first user

* fix :: code cleanup , darkmode

* feat :: signup not enable info card

* fix code cleanup

* Fixed all e2e test cases

* Fixed an issue

* added style changes , signup status

* deisgn review style changes

* self review :: code improvements

* pr review changes

* removed unwanted state

* typo fixes

* feat :: improved ux on form , autofocus and enter key support, removing warnings

* pr review changes :: common constants and helpers moved

Signed-off-by: Pakeetharan Balasubramaniam <bpakee@gmail.com>
Co-authored-by: Muhsin Shah <muhsinshah21@gmail.com>
Co-authored-by: gsmithun4 <gsmithun4@gmail.com>
Co-authored-by: Gandharv <gandharvkumargarg@gmail.com>
Co-authored-by: Manish Kushare <kushare.manish9@gmail.com>
Co-authored-by: Akshay <akshaysasidharan93@gmail.com>
Co-authored-by: alammoiz <moixalam@gmail.com>
Co-authored-by: Pakeetharan Balasubramaniam <bpakee@gmail.com>
Co-authored-by: Akhilesh Kumar Mishra <79476272+iamakhileshmishra@users.noreply.github.com>
Co-authored-by: Hemanth Kumar <49117799+Hemanthhari2000@users.noreply.github.com>
Co-authored-by: Shubhendra Singh Chauhan <withshubh@gmail.com>
Co-authored-by: akk312000 <akk312000@gmail.com>
Co-authored-by: roiLeo <medina.leo42@gmail.com>
Co-authored-by: Jose Morales <jmoralesmnz@gmail.com>
Co-authored-by: 3t8 <62209650+3t8@users.noreply.github.com>
Co-authored-by: Kavin Venkatachalam <50441969+kavinvenkatachalam@users.noreply.github.com>
Co-authored-by: Santosh Bhandari <bsantosh909@gmail.com>
Co-authored-by: Arpit <arpitnath42@gmail.com>
Co-authored-by: Ajith KV <ajith.jaban@gmail.com>
Co-authored-by: Akarsh Jain <72064462+akarsh-jain-790@users.noreply.github.com>
Co-authored-by: Utsav Paul <91927689+Smartmind12@users.noreply.github.com>
Co-authored-by: Vijaykant Yadav <vjaris42@Vijaykants-MacBook-Pro.local>
Co-authored-by: Vijaykant Yadav <vjy239@gmail.com>
Co-authored-by: geisterfurz007 <geisterfurz007@users.noreply.github.com>
Co-authored-by: Kavin Venkatachalam <kavin.saratha@gmail.com>
Co-authored-by: Abhushan Gautam <carefreeav09@gmail.com>
Co-authored-by: Syed Ansar <82027712+Syed-Ansar@users.noreply.github.com>
Co-authored-by: Rahul Sunil <rahulsunil2@gmail.com>
Co-authored-by: Srisuma Atluri <40341173+Srisuma13@users.noreply.github.com>
Co-authored-by: Midhun Kumar E <midhun752@gmail.com>
Co-authored-by: Navaneeth Pk <navaneeth@tooljet.io>
Co-authored-by: Akasshhg <91525166+gogoiakash2311@users.noreply.github.com>
2022-12-21 00:13:18 +05:30

650 lines
20 KiB
TypeScript

/* eslint-disable prefer-const */
import { JwtService } from '@nestjs/jwt';
import { ConfigService } from '@nestjs/config';
import { getConnection, getManager, Repository } from 'typeorm';
import { OrganizationUser } from 'src/entities/organization_user.entity';
import { Organization } from 'src/entities/organization.entity';
import { User } from 'src/entities/user.entity';
import { App } from 'src/entities/app.entity';
import { File } from 'src/entities/file.entity';
import { Plugin } from 'src/entities/plugin.entity';
import { INestApplication, ValidationPipe } from '@nestjs/common';
import { Test } from '@nestjs/testing';
import { AppModule } from 'src/app.module';
import { AppVersion } from 'src/entities/app_version.entity';
import { DataQuery } from 'src/entities/data_query.entity';
import { DataSource } from 'src/entities/data_source.entity';
import { PluginsService } from 'src/services/plugins.service';
import { DataSourcesService } from 'src/services/data_sources.service';
import { PluginsModule } from 'src/modules/plugins/plugins.module';
import { DataSourcesModule } from 'src/modules/data_sources/data_sources.module';
import { ThreadRepository } from 'src/repositories/thread.repository';
import { GroupPermission } from 'src/entities/group_permission.entity';
import { UserGroupPermission } from 'src/entities/user_group_permission.entity';
import { AppGroupPermission } from 'src/entities/app_group_permission.entity';
import { AllExceptionsFilter } from 'src/all-exceptions-filter';
import { Logger } from 'nestjs-pino';
import { WsAdapter } from '@nestjs/platform-ws';
import { AppsModule } from 'src/modules/apps/apps.module';
import { LibraryAppCreationService } from '@services/library_app_creation.service';
import { createMock, DeepMocked } from '@golevelup/ts-jest';
import { v4 as uuidv4 } from 'uuid';
import { CreateFileDto } from '@dto/create-file.dto';
import { CreatePluginDto } from '@dto/create-plugin.dto';
import * as request from 'supertest';
export async function createNestAppInstance(): Promise<INestApplication> {
let app: INestApplication;
const moduleRef = await Test.createTestingModule({
imports: [AppModule],
providers: [],
}).compile();
app = moduleRef.createNestApplication();
app.setGlobalPrefix('api');
app.useGlobalFilters(new AllExceptionsFilter(moduleRef.get(Logger)));
app.useWebSocketAdapter(new WsAdapter(app));
app.useGlobalPipes(new ValidationPipe({ whitelist: true, transform: true }));
await app.init();
return app;
}
export async function createNestAppInstanceWithEnvMock(): Promise<{
app: INestApplication;
mockConfig: DeepMocked<ConfigService>;
}> {
let app: INestApplication;
const moduleRef = await Test.createTestingModule({
imports: [AppModule],
providers: [
{
provide: ConfigService,
useValue: createMock<ConfigService>(),
},
],
}).compile();
app = moduleRef.createNestApplication();
app.setGlobalPrefix('api');
app.useGlobalFilters(new AllExceptionsFilter(moduleRef.get(Logger)));
app.useGlobalPipes(new ValidationPipe({ whitelist: true, transform: true }));
app.useWebSocketAdapter(new WsAdapter(app));
await app.init();
return { app, mockConfig: moduleRef.get(ConfigService) };
}
export function authHeaderForUser(user: User, organizationId?: string, isPasswordLogin = true): string {
const configService = new ConfigService();
const jwtService = new JwtService({
secret: configService.get<string>('SECRET_KEY_BASE'),
});
const authPayload = {
username: user.id,
sub: user.email,
organizationId: organizationId || user.defaultOrganizationId,
isPasswordLogin,
};
const authToken = jwtService.sign(authPayload);
return `Bearer ${authToken}`;
}
export async function clearDB() {
const entities = getConnection().entityMetadatas;
for (const entity of entities) {
const repository = getConnection().getRepository(entity.name);
await repository.query(`TRUNCATE ${entity.tableName} RESTART IDENTITY CASCADE;`);
}
}
export async function createApplication(nestApp, { name, user, isPublic, slug }: any) {
let appRepository: Repository<App>;
appRepository = nestApp.get('AppRepository');
user = user || (await (await createUser(nestApp, {})).user);
const newApp = await appRepository.save(
appRepository.create({
name,
user,
slug,
isPublic: isPublic || false,
organizationId: user.organizationId,
createdAt: new Date(),
updatedAt: new Date(),
})
);
await maybeCreateAdminAppGroupPermissions(nestApp, newApp);
await maybeCreateAllUsersAppGroupPermissions(nestApp, newApp);
return newApp;
}
export async function importAppFromTemplates(nestApp, user, identifier) {
const service = nestApp.select(AppsModule).get(LibraryAppCreationService);
return service.perform(user, identifier);
}
export async function createApplicationVersion(nestApp, application, { name = 'v0', definition = null } = {}) {
let appVersionsRepository: Repository<AppVersion>;
appVersionsRepository = nestApp.get('AppVersionRepository');
return await appVersionsRepository.save(
appVersionsRepository.create({
app: application,
name,
definition,
})
);
}
export async function createUser(
nestApp,
{
firstName,
lastName,
email,
groups,
organization,
status,
invitationToken,
formLoginStatus = true,
organizationName = 'Test Organization',
ssoConfigs = [],
enableSignUp = false,
}: {
firstName?: string;
lastName?: string;
email?: string;
groups?: Array<string>;
organization?: Organization;
status?: string;
invitationToken?: string;
formLoginStatus?: boolean;
organizationName?: string;
ssoConfigs?: Array<any>;
enableSignUp?: boolean;
},
existingUser?: User
) {
let userRepository: Repository<User>;
let organizationRepository: Repository<Organization>;
let organizationUsersRepository: Repository<OrganizationUser>;
userRepository = nestApp.get('UserRepository');
organizationRepository = nestApp.get('OrganizationRepository');
organizationUsersRepository = nestApp.get('OrganizationUserRepository');
organization =
organization ||
(await organizationRepository.save(
organizationRepository.create({
name: organizationName,
enableSignUp,
createdAt: new Date(),
updatedAt: new Date(),
ssoConfigs: [
{
sso: 'form',
enabled: formLoginStatus,
},
...ssoConfigs,
],
})
));
let user: User;
if (!existingUser) {
user = await userRepository.save(
userRepository.create({
firstName: firstName || 'test',
lastName: lastName || 'test',
email: email || 'dev@tooljet.io',
password: 'password',
invitationToken,
defaultOrganizationId: organization.id,
createdAt: new Date(),
updatedAt: new Date(),
status: invitationToken ? 'invited' : 'active',
})
);
} else {
user = existingUser;
}
user.organizationId = organization.id;
const orgUser = await organizationUsersRepository.save(
organizationUsersRepository.create({
user: user,
organization,
invitationToken: status === 'invited' ? uuidv4() : null,
status: status || 'active',
role: 'all_users',
createdAt: new Date(),
updatedAt: new Date(),
})
);
await maybeCreateDefaultGroupPermissions(nestApp, user.organizationId);
await createUserGroupPermissions(
nestApp,
user,
groups || ['all_users', 'admin'] // default groups
);
return { organization, user, orgUser };
}
export async function createUserGroupPermissions(nestApp, user, groups) {
const groupPermissionRepository: Repository<GroupPermission> = nestApp.get('GroupPermissionRepository');
const userGroupPermissionRepository: Repository<UserGroupPermission> = nestApp.get('UserGroupPermissionRepository');
let userGroupPermissions = [];
for (const group of groups) {
let groupPermission: GroupPermission;
if (group == 'admin' || group == 'all_users') {
groupPermission = await groupPermissionRepository.findOneOrFail({
where: {
organizationId: user.organizationId,
group: group,
},
});
} else {
groupPermission =
(await groupPermissionRepository.findOne({
where: {
organizationId: user.organizationId,
group: group,
},
})) ||
groupPermissionRepository.create({
organizationId: user.organizationId,
group: group,
});
await groupPermissionRepository.save(groupPermission);
}
const userGroupPermission = userGroupPermissionRepository.create({
groupPermissionId: groupPermission.id,
userId: user.id,
});
await userGroupPermissionRepository.save(userGroupPermission);
userGroupPermissions.push(userGroupPermission);
}
return userGroupPermissions;
}
export async function createAppGroupPermission(nestApp, app, groupId, permissions) {
const appGroupPermissionRepository: Repository<AppGroupPermission> = nestApp.get('AppGroupPermissionRepository');
const appGroupPermission = appGroupPermissionRepository.create({
groupPermissionId: groupId,
appId: app.id,
...permissions,
});
await appGroupPermissionRepository.save(appGroupPermission);
return appGroupPermission;
}
export async function createGroupPermission(nestApp, params) {
const groupPermissionRepository: Repository<GroupPermission> = nestApp.get('GroupPermissionRepository');
let groupPermission = groupPermissionRepository.create({
...params,
});
await groupPermissionRepository.save(groupPermission);
return groupPermission;
}
export async function maybeCreateDefaultGroupPermissions(nestApp, organizationId) {
const groupPermissionRepository: Repository<GroupPermission> = nestApp.get('GroupPermissionRepository');
const defaultGroups = ['all_users', 'admin'];
for (let group of defaultGroups) {
const orgDefaultGroupPermissions = await groupPermissionRepository.find({
where: {
organizationId: organizationId,
group: group,
},
});
if (orgDefaultGroupPermissions.length == 0) {
const groupPermission = groupPermissionRepository.create({
organizationId: organizationId,
group: group,
appCreate: group == 'admin',
appDelete: group == 'admin',
folderCreate: group == 'admin',
orgEnvironmentVariableCreate: group == 'admin',
orgEnvironmentVariableUpdate: group == 'admin',
orgEnvironmentVariableDelete: group == 'admin',
folderUpdate: group == 'admin',
folderDelete: group == 'admin',
});
await groupPermissionRepository.save(groupPermission);
}
}
}
export async function maybeCreateAdminAppGroupPermissions(nestApp, app) {
const groupPermissionRepository: Repository<GroupPermission> = nestApp.get('GroupPermissionRepository');
const appGroupPermissionRepository: Repository<AppGroupPermission> = nestApp.get('AppGroupPermissionRepository');
const orgAdminGroupPermissions = await groupPermissionRepository.findOne({
where: {
organizationId: app.organizationId,
group: 'admin',
},
});
if (orgAdminGroupPermissions) {
const adminGroupPermissions = {
read: true,
update: true,
delete: true,
};
const appGroupPermission = appGroupPermissionRepository.create({
groupPermissionId: orgAdminGroupPermissions.id,
appId: app.id,
...adminGroupPermissions,
});
await appGroupPermissionRepository.save(appGroupPermission);
}
}
export async function maybeCreateAllUsersAppGroupPermissions(nestApp, app) {
const groupPermissionRepository: Repository<GroupPermission> = nestApp.get('GroupPermissionRepository');
const appGroupPermissionRepository: Repository<AppGroupPermission> = nestApp.get('AppGroupPermissionRepository');
const allUsersGroup = await groupPermissionRepository.findOne({
where: {
organizationId: app.organizationId,
group: 'all_users',
},
});
if (allUsersGroup) {
const permissions = {
read: false,
update: false,
delete: false,
};
const appGroupPermission = appGroupPermissionRepository.create({
groupPermissionId: allUsersGroup.id,
appId: app.id,
...permissions,
});
await appGroupPermissionRepository.save(appGroupPermission);
}
}
export async function addAppToGroupPermission(app: App, groupPermission: GroupPermission, permissions = {}) {
getManager().create(AppGroupPermission, {
groupPermissionId: groupPermission.id,
appId: app.id,
...permissions,
});
}
export async function addAllUsersGroupToUser(nestApp, user) {
const groupPermissionRepository: Repository<GroupPermission> = nestApp.get('GroupPermissionRepository');
const userGroupPermissionRepository: Repository<UserGroupPermission> = nestApp.get('UserGroupPermissionRepository');
const orgDefaultGroupPermissions = await groupPermissionRepository.findOneOrFail({
where: {
organizationId: user.organizationId,
group: 'all_users',
},
});
const userGroupPermission = userGroupPermissionRepository.create({
groupPermissionId: orgDefaultGroupPermissions.id,
userId: user.id,
});
await userGroupPermissionRepository.save(userGroupPermission);
return user;
}
export async function createDataSource(nestApp, { name, application, kind, options, appVersion }: any) {
let dataSourceRepository: Repository<DataSource>;
dataSourceRepository = nestApp.get('DataSourceRepository');
const dataSourcesService = nestApp.select(DataSourcesModule).get(DataSourcesService);
return await dataSourceRepository.save(
dataSourceRepository.create({
name,
options: await dataSourcesService.parseOptionsForCreate(options),
app: application,
kind,
appVersion,
createdAt: new Date(),
updatedAt: new Date(),
})
);
}
export async function createDataQuery(nestApp, { application, name, kind, dataSource, options, appVersion }: any) {
let dataQueryRepository: Repository<DataQuery>;
dataQueryRepository = nestApp.get('DataQueryRepository');
return await dataQueryRepository.save(
dataQueryRepository.create({
options,
name,
dataSource,
createdAt: new Date(),
updatedAt: new Date(),
})
);
}
export async function createFile(nestApp: any) {
let fileRepository: Repository<File>;
fileRepository = nestApp.get('FileRepository');
const createFileDto = new CreateFileDto();
createFileDto.filename = 'testfile';
createFileDto.data = Buffer.from([1, 2, 3, 4]);
return await fileRepository.save(fileRepository.create(createFileDto));
}
export async function installPlugin(nestApp: any, { name, description, id, version }: any) {
let pluginRepository: Repository<Plugin>;
pluginRepository = nestApp.get('PluginRepository');
const createPluginDto = new CreatePluginDto();
createPluginDto.id = id;
createPluginDto.name = name;
createPluginDto.version = version;
createPluginDto.description = description;
const pluginsService = nestApp.select(PluginsModule).get(PluginsService);
return await pluginRepository.save(pluginsService.install(createPluginDto));
}
export async function createThread(_nestApp, { appId, x, y, userId, organizationId, appVersionsId }: any) {
const threadRepository = new ThreadRepository();
return await threadRepository.createThread(
{
appId,
x,
y,
isResolved: false,
organizationId,
appVersionsId,
pageId: 'placeholder',
},
userId,
organizationId
);
}
export async function setupOrganization(nestApp) {
const adminUserData = await createUser(nestApp, {
email: 'admin@tooljet.io',
groups: ['all_users', 'admin'],
});
const adminUser = adminUserData.user;
const organization = adminUserData.organization;
const defaultUserData = await createUser(nestApp, {
email: 'developer@tooljet.io',
groups: ['all_users'],
organization,
});
const defaultUser = defaultUserData.user;
const app = await createApplication(nestApp, {
user: adminUser,
name: 'sample app',
isPublic: false,
});
return { adminUser, defaultUser, app };
}
export const generateRedirectUrl = async (
email: string,
current_organization?: Organization,
isOrgInvitation?: boolean,
isSSO = true
) => {
const manager = getManager();
const user = await manager.findOneOrFail(User, { where: { email: email } });
const organizationToken = user.organizationUsers?.find(
(ou) => ou.organizationId === current_organization?.id
)?.invitationToken;
return `${process.env['TOOLJET_HOST']}${
isOrgInvitation ? `/organization-invitations/${organizationToken}` : `/invitations/${user.invitationToken}`
}${
organizationToken
? `${!isOrgInvitation ? `/workspaces/${organizationToken}` : ''}?oid=${current_organization?.id}&`
: isSSO
? '?'
: ''
}${isSSO ? 'source=sso' : ''}`;
};
export const createSSOMockConfig = (mockConfig) => {
jest.spyOn(mockConfig, 'get').mockImplementation((key: string) => {
switch (key) {
case 'SSO_GOOGLE_OAUTH2_CLIENT_ID':
return 'google-client-id';
case 'SSO_GIT_OAUTH2_CLIENT_ID':
return 'git-client-id';
case 'SSO_GIT_OAUTH2_CLIENT_SECRET':
return 'git-secret';
case 'SSO_ACCEPTED_DOMAINS':
return 'tooljet.io,tooljet.com';
default:
return process.env[key];
}
});
};
export const verifyInviteToken = async (app: INestApplication, user: User, verifyForSignup = false) => {
let organizationUsersRepository: Repository<OrganizationUser>;
organizationUsersRepository = app.get('OrganizationUserRepository');
const { invitationToken } = user;
const { invitationToken: orgInviteToken } = await organizationUsersRepository.findOneOrFail({
where: { userId: user.id },
});
const response = await request(app.getHttpServer()).get(
`/api/verify-invite-token?token=${invitationToken}${
!verifyForSignup && orgInviteToken ? `&organizationToken=${orgInviteToken}` : ''
}`
);
const {
body: { onboarding_details },
status,
} = response;
expect(status).toBe(200);
expect(Object.keys(onboarding_details)).toEqual(['password', 'questions']);
await user.reload();
expect(user.status).toBe('verified');
return response;
};
export const setUpAccountFromToken = async (app: INestApplication, user: User, org: Organization, payload) => {
const response = await request(app.getHttpServer()).post('/api/setup-account-from-token').send(payload);
const { status } = response;
expect(status).toBe(201);
const {
email,
first_name,
last_name,
admin,
group_permissions,
app_group_permissions,
organization_id,
organization,
} = response.body;
expect(email).toEqual(user.email);
expect(first_name).toEqual(user.firstName);
expect(last_name).toEqual(user.lastName);
expect(admin).toBeTruthy();
expect(organization_id).toBe(org.id);
expect(organization).toBe(org.name);
expect(group_permissions).toHaveLength(2);
expect(group_permissions.some((gp) => gp.group === 'all_users')).toBeTruthy();
expect(group_permissions.some((gp) => gp.group === 'admin')).toBeTruthy();
expect(Object.keys(group_permissions[0]).sort()).toEqual(
[
'id',
'organization_id',
'group',
'app_create',
'app_delete',
'updated_at',
'created_at',
'folder_create',
'org_environment_variable_create',
'org_environment_variable_update',
'org_environment_variable_delete',
'folder_delete',
'folder_update',
].sort()
);
expect(app_group_permissions).toHaveLength(0);
await user.reload();
expect(user.status).toBe('active');
expect(user.defaultOrganizationId).toBe(org.id);
};
export const getPathFromUrl = (url) => {
return url.split('?')[0];
};
export const createFirstUser = async (app: INestApplication) => {
let userRepository: Repository<User> = app.get('UserRepository');
await request(app.getHttpServer())
.post('/api/setup-admin')
.send({ email: 'firstuser@tooljet.com', name: 'Admin', password: 'password', workspace: 'tooljet' });
return await userRepository.findOneOrFail({
where: { email: 'firstuser@tooljet.com' },
relations: ['organizationUsers'],
});
};