ToolJet/server/test/controllers/oauth/super-admin/oauth-google-instance.e2e-spec.ts
2025-02-25 12:22:50 +05:30

201 lines
7.2 KiB
TypeScript

import * as request from 'supertest';
import { INestApplication } from '@nestjs/common';
import { clearDB, createUser, createNestAppInstanceWithEnvMock } from '../../../test.helper';
import { OAuth2Client } from 'google-auth-library';
import { Repository } from 'typeorm';
import { User } from 'src/entities/user.entity';
import { OrganizationUser } from 'src/entities/organization_user.entity';
describe('oauth controller', () => {
let app: INestApplication;
let userRepository: Repository<User>;
let orgUserRepository: Repository<OrganizationUser>;
let mockConfig;
const token = 'some-Token';
let current_user: User;
beforeEach(async () => {
await clearDB();
});
beforeAll(async () => {
({ app, mockConfig } = await createNestAppInstanceWithEnvMock());
userRepository = app.get('UserRepository');
orgUserRepository = app.get('OrganizationUserRepository');
});
afterEach(() => {
jest.resetAllMocks();
jest.clearAllMocks();
});
describe('SSO Login', () => {
beforeEach(() => {
jest.spyOn(mockConfig, 'get').mockImplementation((key: string) => {
switch (key) {
case 'SSO_GOOGLE_OAUTH2_CLIENT_ID':
return 'google-client-id';
case 'SSO_GIT_OAUTH2_CLIENT_ID':
return 'git-client-id';
case 'SSO_GIT_OAUTH2_CLIENT_SECRET':
return 'git-secret';
default:
return process.env[key];
}
});
});
describe('Multi-Workspace instance level SSO: Setup first user', () => {
it('First user should be super admin', async () => {
const googleVerifyMock = jest.spyOn(OAuth2Client.prototype, 'verifyIdToken');
googleVerifyMock.mockImplementation(() => ({
getPayload: () => ({
sub: 'someSSOId',
email: 'ssouser@tooljet.io',
name: 'SSO User',
hd: 'tooljet.io',
}),
}));
const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/google').send({ token });
expect(googleVerifyMock).toHaveBeenCalledWith({
idToken: token,
audience: 'google-client-id',
});
expect(response.statusCode).toBe(201);
expect(Object.keys(response.body).sort()).toEqual(['redirect_url']);
});
it('Second user should not be super admin', async () => {
await createUser(app, {
email: 'anotherUser@tooljet.io',
userType: 'instance',
});
const googleVerifyMock = jest.spyOn(OAuth2Client.prototype, 'verifyIdToken');
googleVerifyMock.mockImplementation(() => ({
getPayload: () => ({
sub: 'someSSOId',
email: 'ssouser@tooljet.io',
name: 'SSO User',
hd: 'tooljet.io',
}),
}));
const response = await request(app.getHttpServer()).post('/api/oauth/sign-in/common/google').send({ token });
expect(googleVerifyMock).toHaveBeenCalledWith({
idToken: token,
audience: 'google-client-id',
});
expect(response.statusCode).toBe(201);
expect(Object.keys(response.body).sort()).toEqual(['redirect_url']);
});
});
describe('Multi-Workspace instance level SSO', () => {
beforeEach(async () => {
const { user } = await createUser(app, {
email: 'superadmin@tooljet.io',
userType: 'instance',
});
current_user = user;
});
describe('sign in via Google OAuth', () => {
it('Workspace Login - should return 201 when the super admin log in', async () => {
const googleVerifyMock = jest.spyOn(OAuth2Client.prototype, 'verifyIdToken');
googleVerifyMock.mockImplementation(() => ({
getPayload: () => ({
sub: 'someSSOId',
email: 'ssouser@tooljet.io',
name: 'SSO User',
hd: 'tooljet.io',
}),
}));
await request(app.getHttpServer()).post('/api/oauth/sign-in/common/google').send({ token }).expect(201);
expect(googleVerifyMock).toHaveBeenCalledWith({
idToken: token,
audience: 'google-client-id',
});
const orgCount = await orgUserRepository.count({ userId: current_user.id });
expect(orgCount).toBe(1); // Should not create new workspace
});
it('Workspace Login - should return 401 when the super admin status is archived', async () => {
await userRepository.update({ email: 'superadmin@tooljet.io' }, { status: 'archived' });
const googleVerifyMock = jest.spyOn(OAuth2Client.prototype, 'verifyIdToken');
googleVerifyMock.mockImplementation(() => ({
getPayload: () => ({
sub: 'someSSOId',
email: 'superadmin@tooljet.io',
name: 'SSO User',
hd: 'tooljet.io',
}),
}));
await request(app.getHttpServer()).post('/api/oauth/sign-in/common/google').send({ token }).expect(406);
});
it('Workspace Login - should return 201 when the super admin status is invited in the organization', async () => {
const adminUser = await userRepository.findOneOrFail({
email: 'superadmin@tooljet.io',
});
await orgUserRepository.update({ userId: adminUser.id }, { status: 'invited' });
const googleVerifyMock = jest.spyOn(OAuth2Client.prototype, 'verifyIdToken');
googleVerifyMock.mockImplementation(() => ({
getPayload: () => ({
sub: 'someSSOId',
email: 'ssouser@tooljet.io',
name: 'SSO User',
hd: 'tooljet.io',
}),
}));
await request(app.getHttpServer()).post('/api/oauth/sign-in/common/google').send({ token }).expect(201);
expect(googleVerifyMock).toHaveBeenCalledWith({
idToken: token,
audience: 'google-client-id',
});
const orgCount = await orgUserRepository.count({ userId: current_user.id });
expect(orgCount).toBe(1); // Should not create new workspace
});
it('Workspace Login - should return 201 when the super admin status is archived in the organization', async () => {
const adminUser = await userRepository.findOneOrFail({
email: 'superadmin@tooljet.io',
});
await orgUserRepository.update({ userId: adminUser.id }, { status: 'archived' });
const googleVerifyMock = jest.spyOn(OAuth2Client.prototype, 'verifyIdToken');
googleVerifyMock.mockImplementation(() => ({
getPayload: () => ({
sub: 'someSSOId',
email: 'ssouser@tooljet.io',
name: 'SSO User',
hd: 'tooljet.io',
}),
}));
await request(app.getHttpServer()).post('/api/oauth/sign-in/common/google').send({ token }).expect(201);
expect(googleVerifyMock).toHaveBeenCalledWith({
idToken: token,
audience: 'google-client-id',
});
const orgCount = await orgUserRepository.count({ userId: current_user.id });
expect(orgCount).toBe(1); // Should not create new workspace
});
});
});
});
afterAll(async () => {
await app.close();
});
});