YANG QIA 24601aa66f
feat(auth): support custom authentication (#2007)
* feat(auth): init auth package & collection

* feat(auth): register

* feat(auth): use authenticator

* feat(auth): mapRoles

* feat(auth): refactor

* feat(auth): base auth class

* feat(auth): add plugin

* chore(auth): test

* chore(auth): add test cases

* feat(auth): authenticators pane

* chore(auth): custom hook useAuthTypes

* feat(auth): authenticator pane

* chore(auth): store options schema using context

* feat(auth): signInPage provider

* feat(auth): signUpPage provider

* chore(auth): solve build errors

* chore(auth): add dependency

* chore(auth): remove dependency cycles

* chore(auth): add plugin-auth to preset

* chore(auth): fix test

* feat(auth): authenticator enable status

* fix(test): fix test using new authentication

* feat(auth): migration, set up basic auth

* chore(auth): can set options ui by component

* fix(test): workflow manunal.test

* fix(test): typo

* feat(auth): support multi-language

* chore(auth): imporve code

* chore(auth): hide button if no configuration

* chore(auth): readme

* chore(auth): remove allowSignup prop

* chore(auth): move configure pane to edit form

* fix(auth): jwt options bug

* feat(auth): init sms-auth

* chore(auth): at least authenticator required

* chore(auth): add test

* feat(auth): support sms auth

* fix(auth): fix test

* chore(auth): move findOrCreateUser to AuthModel

* chore(auth): history compatible processing

* feat(auth): support SAML auth

* chore(auth): saml auth list

* chore(saml-auth): improve ui

* Merge branch 'main' into feat/authentication

* chore(auth): improve code

* fix(saml-auth): fix bug

* fix(saml-auth): fix saml options

* chore(saml-auth): compatible processing && ut

* fix(auth): signin page bug

* chore(auth): saml compatible processing

* feat(auth): oidc-auth

* fix(oidc-auth): bug

* fix(oidc-auth): bug

* fix(auth): fix test

* chore(auth): filter enabled authenticator

* chore(oidc): add field map

* chore(auth): update readme

* docs(auth): create sms-auth readme

* feat(auth): allow signup config

* test(auth): fix test

* feat(auth): allow saml and oidc use http

* chore(oidc-auth): extends timeout

* docs(auth): update readme

* feat(auth): support sort

* docs(saml): update readme

* feat(auth): support sort all authenticator

* Merge branch 'main' into feat/authentication

* Merge branch 'main' into feat/authentication

* feat: improve code

* docs(auth): add doc

* Merge branch 'main' into feat/authentication

* chore: update yarn.lock

* feat: improve code

* chore(acl): write role to acl if it exists in database and not found … (#2001)

* chore(acl): write role to acl if it exists in database and not found in acl

* fix: test

* fix: eager load with nested association (#2002)

* chore: upgrade vitest

* chore: edit

* refactor: auth class

* fix: set options

* chore(acl): write role to acl if it exists in database and not found … (#2001)

* chore(acl): write role to acl if it exists in database and not found in acl

* fix: test

* fix: eager load with nested association (#2002)

* chore: upgrade vitest

* chore: add migrations

* test: fix api-client test

* chore: add sms-auth

* feat: avoid no permission after auth type disabled

* fix: translation

---------

Co-authored-by: chenos <chenlinxh@gmail.com>
2023-06-07 23:46:42 +08:00

137 lines
3.2 KiB
TypeScript

import Database from '@nocobase/database';
import { MockServer } from '@nocobase/test';
import { prepareApp } from './prepare';
describe('actions', () => {
let app: MockServer;
let db: Database;
let adminUser;
let agent;
let adminAgent;
let pluginUser;
beforeEach(async () => {
process.env.INIT_ROOT_EMAIL = 'test@nocobase.com';
process.env.INIT_ROOT_PASSWORD = '123456';
process.env.INIT_ROOT_NICKNAME = 'Test';
app = await prepareApp();
db = app.db;
pluginUser = app.getPlugin('users');
adminUser = await db.getRepository('users').findOne({
filter: {
email: process.env.INIT_ROOT_EMAIL,
},
appends: ['roles'],
});
agent = app.agent();
adminAgent = app.agent().login(adminUser);
});
afterEach(async () => {
await db.close();
});
it('update profile with roles', async () => {
const res2 = await adminAgent.resource('users').updateProfile({
filterByTk: adminUser.id,
values: {
nickname: 'a',
roles: adminUser.roles,
},
});
expect(res2.status).toBe(200);
});
it('can destroy users role', async () => {
const role2 = await db.getRepository('roles').create({
values: {
name: 'test',
},
});
const users2 = await db.getRepository('users').create({
values: {
email: 'test2@nocobase.com',
name: 'test2',
password: '123456',
roles: [
{
name: 'test',
},
],
},
});
let response = await agent.post('/auth:signIn').send({
email: 'test2@nocobase.com',
password: '123456',
});
expect(response.statusCode).toEqual(200);
const token = response.body.data.token;
const loggedAgent = app.agent().auth(token, { type: 'bearer' });
const rolesCheckResponse = (await loggedAgent.set('Accept', 'application/json').get('/roles:check')) as any;
expect(rolesCheckResponse.statusCode).toEqual(200);
await db.getRepository('roles').destroy({
filterByTk: 'test',
});
response = await agent.post('/auth:signIn').send({
email: 'test2@nocobase.com',
password: '123456',
});
expect(response.statusCode).toEqual(200);
const rolesCheckResponse2 = (await loggedAgent.set('Accept', 'application/json').get('/roles:check')) as any;
expect(rolesCheckResponse2.status).toEqual(500);
expect(rolesCheckResponse2.body.errors[0].message).toEqual('User role not found');
});
it('should destroy through table record when destroy role', async () => {
await db.getRepository('roles').create({
values: {
name: 'test',
},
});
const users2 = await db.getRepository('users').create({
values: {
email: 'test2@nocobase.com',
name: 'test2',
password: '123456',
roles: [
{
name: 'test',
},
],
},
});
expect(await users2.countRoles()).toEqual(1);
await db.getRepository('roles').destroy({
filterByTk: 'test',
});
expect(await users2.countRoles()).toEqual(0);
await db.getRepository('roles').create({
values: {
name: 'test',
},
});
expect(await users2.countRoles()).toEqual(0);
});
});