unleash-server
Version:
Unleash is an enterprise ready feature toggles service. It provides different strategies for handling feature toggles.
213 lines • 7.67 kB
JavaScript
"use strict";
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod };
};
Object.defineProperty(exports, "__esModule", { value: true });
const test_helper_1 = require("../../helpers/test-helper");
const database_init_1 = __importDefault(require("../../helpers/database-init"));
const no_logger_1 = __importDefault(require("../../../fixtures/no-logger"));
const model_1 = require("../../../../lib/types/model");
let stores;
let db;
jest.mock('../../../../lib/util/flag-resolver', () => {
return jest.fn().mockImplementation(() => {
return {
getAll: jest.fn(),
isEnabled: jest.fn().mockResolvedValue(true),
};
});
});
beforeEach(async () => {
db = await (0, database_init_1.default)('test', no_logger_1.default);
stores = db.stores;
});
afterEach(async () => {
await stores.publicSignupTokenStore.deleteAll();
await stores.eventStore.deleteAll();
await stores.userStore.deleteAll();
});
afterAll(async () => {
if (db) {
await db.destroy();
}
});
const expireAt = (addDays = 7) => {
let now = new Date();
now.setDate(now.getDate() + addDays);
return now;
};
test('admin users should be able to create a token', async () => {
expect.assertions(3);
const preHook = (app, config, { userService, accessService }) => {
app.use('/api/admin/', async (req, res, next) => {
const role = await accessService.getRootRole(model_1.RoleName.ADMIN);
const user = await userService.createUser({
email: 'admin@example.com',
rootRole: role.id,
});
req.user = user;
next();
});
};
const { request, destroy } = await (0, test_helper_1.setupAppWithCustomAuth)(stores, preHook);
const tokenCreate = {
name: 'some-name',
expiresAt: expireAt().toISOString(),
};
await request
.post('/api/admin/invite-link/tokens')
.send(tokenCreate)
.expect('Content-Type', /json/)
.expect(201)
.expect((res) => {
expect(res.body.name).toBe('some-name');
expect(res.body.secret).not.toBeNull();
expect(res.body.url).not.toBeNull();
});
await destroy();
});
test('no permission to validate a token', async () => {
const preHook = (app, config, { userService, accessService }) => {
app.use('/api/admin/', async (req, res, next) => {
const admin = await accessService.getRootRole(model_1.RoleName.ADMIN);
await userService.createUser({
email: 'admin@example.com',
username: 'admin@example.com',
rootRole: admin.id,
});
next();
});
};
const { request, destroy } = await (0, test_helper_1.setupAppWithCustomAuth)(stores, preHook);
await stores.publicSignupTokenStore.insert({
name: 'some-name',
expiresAt: expireAt(),
secret: 'some-secret',
createAt: new Date(),
createdBy: 'admin@example.com',
roleId: 3,
});
await request.get('/invite/some-secret/validate').expect(200);
await destroy();
});
test('should return 400 if token can not be validate', async () => {
const preHook = (app, config, { userService, accessService }) => {
app.use('/api/admin/', async (req, res, next) => {
const admin = await accessService.getRootRole(model_1.RoleName.ADMIN);
await userService.createUser({
email: 'admin@example.com',
username: 'admin@example.com',
rootRole: admin.id,
});
next();
});
};
const { request, destroy } = await (0, test_helper_1.setupAppWithCustomAuth)(stores, preHook);
await request.get('/invite/some-invalid-secret/validate').expect(400);
await destroy();
});
test('users can signup with invite-link', async () => {
expect.assertions(1);
const preHook = (app, config, { userService, accessService }) => {
app.use('/api/admin/', async (req, res, next) => {
const admin = await accessService.getRootRole(model_1.RoleName.ADMIN);
await userService.createUser({
email: 'admin@example.com',
username: 'admin@example.com',
rootRole: admin.id,
});
next();
});
};
const { request, destroy } = await (0, test_helper_1.setupAppWithCustomAuth)(stores, preHook);
await stores.publicSignupTokenStore.insert({
name: 'some-name',
expiresAt: expireAt(),
secret: 'some-secret',
url: 'http://localhost:4242/invite/some-secret/signup',
createAt: new Date(),
createdBy: 'admin@example.com',
roleId: 3,
});
const createUser = {
name: 'some-username',
email: 'some@example.com',
password: 'eweggwEG',
};
await request
.post('/invite/some-secret/signup')
.send(createUser)
.expect(201)
.expect((res) => {
const user = res.body;
expect(user.name).toBe('some-username');
});
await destroy();
});
test('can get a token with users', async () => {
expect.assertions(1);
const preHook = (app, config, { userService, accessService }) => {
app.use('/api/admin/', async (req, res, next) => {
const role = await accessService.getRootRole(model_1.RoleName.ADMIN);
const user = await userService.createUser({
email: 'admin@example.com',
rootRole: role.id,
});
req.user = user;
next();
});
};
const { request, destroy } = await (0, test_helper_1.setupAppWithCustomAuth)(stores, preHook);
await stores.publicSignupTokenStore.insert({
name: 'some-name',
expiresAt: expireAt(),
secret: 'some-secret',
createAt: new Date(),
createdBy: 'admin@example.com',
roleId: 3,
});
const user = await stores.userStore.insert({
username: 'some-username',
email: 'some@example.com',
password: 'eweggwEG',
sendEmail: false,
rootRole: 3,
});
await stores.publicSignupTokenStore.addTokenUser('some-secret', user.id);
await request
.get('/api/admin/invite-link/tokens/some-secret')
.expect(200)
.expect((res) => {
const token = res.body;
expect(token.users.length).toEqual(1);
});
await destroy();
});
test('should not be able to set expiry further than 1 month', async () => {
const preHook = (app, config, { userService, accessService }) => {
app.use('/api/admin/', async (req, res, next) => {
const role = await accessService.getRootRole(model_1.RoleName.ADMIN);
const user = await userService.createUser({
email: 'admin@example.com',
rootRole: role.id,
});
req.user = user;
next();
});
};
const { request, destroy } = await (0, test_helper_1.setupAppWithCustomAuth)(stores, preHook);
const tokenCreate = {
name: 'some-name',
expiresAt: expireAt(100).toISOString(),
};
await request
.post('/api/admin/invite-link/tokens')
.send(tokenCreate)
.expect('Content-Type', /json/)
.expect(201)
.expect((res) => {
expect(new Date(res.body.expiresAt).getTime()).toBeLessThan(expireAt(31).getTime());
});
await destroy();
});
//# sourceMappingURL=public-signup-token.e2e.test.js.map