UNPKG

@speckle/shared

Version:

Shared code between various Speckle JS packages

272 lines (247 loc) 8.18 kB
import { describe, expect, it } from 'vitest' import { Roles } from '../../../../core/constants.js' import { parseFeatureFlags } from '../../../../environment/index.js' import { canCreateAutomationPolicy } from './canCreate.js' import { ProjectNoAccessError, ProjectNotEnoughPermissionsError, ProjectNotFoundError, ServerNoAccessError, ServerNoSessionError, ServerNotEnoughPermissionsError, WorkspaceNoAccessError, WorkspaceSsoSessionNoAccessError } from '../../../domain/authErrors.js' import { TIME_MS } from '../../../../core/index.js' import { ProjectVisibility } from '../../../domain/projects/types.js' import { getWorkspaceFake } from '../../../../tests/fakes.js' const buildCanCreatePolicy = ( overrides?: Partial<Parameters<typeof canCreateAutomationPolicy>[0]> ) => canCreateAutomationPolicy({ getEnv: async () => parseFeatureFlags({ FF_WORKSPACES_MODULE_ENABLED: 'true' }), getProject: async () => ({ id: 'project-id', workspaceId: null, visibility: ProjectVisibility.Private, allowPublicComments: false }), getProjectRole: async () => Roles.Stream.Owner, getServerRole: async () => Roles.Server.User, getWorkspace: async () => null, getWorkspaceRole: async () => null, getWorkspaceSsoProvider: async () => null, getWorkspaceSsoSession: async () => null, ...overrides }) describe('canCreateAutomation', () => { it('returns error if user is not logged in', async () => { const canCreateAutomation = buildCanCreatePolicy() const result = await canCreateAutomation({ userId: undefined, projectId: 'project-id' }) expect(result).toBeAuthErrorResult({ code: ServerNoSessionError.code }) }) it('returns error if user is not found', async () => { const canCreateAutomation = buildCanCreatePolicy({ getServerRole: async () => null }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthErrorResult({ code: ServerNoAccessError.code }) }) it('returns error if user is a server guest', async () => { const canCreateAutomation = buildCanCreatePolicy({ getServerRole: async () => Roles.Server.Guest }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthErrorResult({ code: ServerNotEnoughPermissionsError.code }) }) it('returns error project not found', async () => { const canCreateAutomation = buildCanCreatePolicy({ getProject: async () => null }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthErrorResult({ code: ProjectNotFoundError.code }) }) it('returns error if no role at all', async () => { const canCreateAutomation = buildCanCreatePolicy({ getProjectRole: async () => null }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthErrorResult({ code: ProjectNoAccessError.code }) }) it('returns error if not owner', async () => { const canCreateAutomation = buildCanCreatePolicy({ getProjectRole: async () => Roles.Stream.Reviewer }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthErrorResult({ code: ProjectNotEnoughPermissionsError.code }) }) it('returns ok if permissible', async () => { const canCreateAutomation = buildCanCreatePolicy() const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthOKResult() }) describe('with workspace project', () => { const overrides = { getProject: async () => ({ id: 'project-id', workspaceId: 'workspace-id', visibility: ProjectVisibility.Private, allowPublicComments: false }), getWorkspace: getWorkspaceFake({ id: 'workspace-id', slug: 'workspace-slug' }), getWorkspaceRole: async () => Roles.Workspace.Member, getWorkspaceSsoProvider: async () => ({ providerId: 'provider-id' }), getWorkspaceSsoSession: async () => { const validUntil = new Date() validUntil.setDate(validUntil.getDate() + 7) return { userId: 'user-id', providerId: 'provider-id', validUntil } } } it('returns ok if permissible', async () => { const canCreateAutomation = buildCanCreatePolicy(overrides) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthOKResult() }) it('returns ok with implicit owner role', async () => { const canCreateAutomation = buildCanCreatePolicy({ ...overrides, getWorkspaceRole: async () => Roles.Workspace.Admin, getProjectRole: async () => null }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthOKResult() }) it('returns error with implicit member role', async () => { const canCreateAutomation = buildCanCreatePolicy({ ...overrides, getWorkspaceRole: async () => Roles.Workspace.Member, getProjectRole: async () => null }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthErrorResult({ code: ProjectNoAccessError.code }) }) it('returns error if no workspace role, even w/ valid project role', async () => { const canCreateAutomation = buildCanCreatePolicy({ ...overrides, getWorkspaceRole: async () => null, getProjectRole: async () => Roles.Stream.Owner }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthErrorResult({ code: WorkspaceNoAccessError.code }) }) it('returns error if invalid workspace and project role', async () => { const canCreateAutomation = buildCanCreatePolicy({ ...overrides, getWorkspaceRole: async () => Roles.Workspace.Member, getProjectRole: async () => Roles.Stream.Contributor }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthErrorResult({ code: ProjectNotEnoughPermissionsError.code }) }) it('returns ok if no sso configured', async () => { const canCreateAutomation = buildCanCreatePolicy({ ...overrides, getWorkspaceSsoProvider: async () => null, getWorkspaceSsoSession: async () => null }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthOKResult() }) it('returns error if no sso session', async () => { const canCreateAutomation = buildCanCreatePolicy({ ...overrides, getWorkspaceSsoSession: async () => null }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthErrorResult({ code: WorkspaceSsoSessionNoAccessError.code }) }) it('returns error if sso expired', async () => { const canCreateAutomation = buildCanCreatePolicy({ ...overrides, getWorkspaceSsoSession: async () => ({ userId: 'user-id', providerId: 'provider-id', validUntil: new Date(new Date().getTime() - TIME_MS.second) }) }) const result = await canCreateAutomation({ userId: 'user-id', projectId: 'project-id' }) expect(result).toBeAuthErrorResult({ code: WorkspaceSsoSessionNoAccessError.code }) }) }) })