ACTIVEPIECES/packages/server/api/test/integration/ce/user/platform-user-community.test.ts
rohit cd823a2d9e
Some checks failed
Crowdin Action / synchronize-with-crowdin (push) Has been cancelled
Release Pieces / Release-Pieces (push) Has been cancelled
automaton layer
2025-07-05 23:59:03 +05:30

282 lines
8.8 KiB
TypeScript

import {
apId,
PlatformRole,
PrincipalType,
UserStatus,
} from '@activepieces/shared'
import { FastifyInstance } from 'fastify'
import { StatusCodes } from 'http-status-codes'
import { initializeDatabase } from '../../../../src/app/database'
import { databaseConnection } from '../../../../src/app/database/database-connection'
import { setupServer } from '../../../../src/app/server'
import { generateMockToken } from '../../../helpers/auth'
import {
mockAndSaveBasicSetup,
mockBasicUser,
} from '../../../helpers/mocks'
let app: FastifyInstance | null = null
beforeAll(async () => {
await initializeDatabase({ runMigrations: false })
app = await setupServer()
})
afterAll(async () => {
await databaseConnection().destroy()
await app?.close()
})
describe('User API', () => {
describe('List users endpoint', () => {
it('Returns a list of users', async () => {
// arrange
const { mockPlatform: mockPlatformOne, mockOwner: mockOwnerOne } = await mockAndSaveBasicSetup()
// Create Another setup
await mockAndSaveBasicSetup()
const testToken = await generateMockToken({
id: mockOwnerOne.id,
type: PrincipalType.USER,
platform: {
id: mockPlatformOne.id,
},
})
// act
const response = await app?.inject({
method: 'GET',
url: '/v1/users',
query: {
platformId: mockPlatformOne.id,
},
headers: {
authorization: `Bearer ${testToken}`,
},
})
// assert
expect(response?.statusCode).toBe(StatusCodes.OK)
const responseBody = response?.json()
expect(Object.keys(responseBody)).toHaveLength(3)
expect(responseBody.data).toHaveLength(1)
expect(responseBody.data[0].id).toBe(mockOwnerOne.id)
expect(responseBody.data[0].password).toBeUndefined()
})
it('Requires principal to be platform owner', async () => {
// arrange
const { mockPlatform } = await mockAndSaveBasicSetup()
const { mockOwner: otherMockUser } = await mockAndSaveBasicSetup()
const testToken = await generateMockToken({
id: otherMockUser.id,
type: PrincipalType.USER,
platform: {
id: mockPlatform.id,
},
})
// act
const response = await app?.inject({
method: 'GET',
url: '/v1/users',
query: {
platformId: mockPlatform.id,
},
headers: {
authorization: `Bearer ${testToken}`,
},
})
// assert
expect(response?.statusCode).toBe(StatusCodes.FORBIDDEN)
const responseBody = response?.json()
expect(responseBody?.code).toBe('AUTHORIZATION')
})
})
describe('Update user endpoint', () => {
it('Updates user status to be INACTIVE', async () => {
// arrange
const { mockOwner, mockPlatform } = await mockAndSaveBasicSetup()
const { mockUser } = await mockBasicUser({
user: {
platformId: mockPlatform.id,
status: UserStatus.ACTIVE,
},
})
const testToken = await generateMockToken({
id: mockOwner.id,
type: PrincipalType.USER,
platform: {
id: mockPlatform.id,
},
})
// act
const response = await app?.inject({
method: 'POST',
url: `/v1/users/${mockUser.id}`,
headers: {
authorization: `Bearer ${testToken}`,
},
body: {
status: UserStatus.INACTIVE,
},
})
// assert
expect(response?.statusCode).toBe(StatusCodes.OK)
const responseJson = response?.json()
expect(responseJson.id).toBe(mockUser.id)
expect(responseJson.password).toBeUndefined()
expect(responseJson.status).toBe(UserStatus.INACTIVE)
})
it('Fails if user doesn\'t exist', async () => {
const { mockPlatform } = await mockAndSaveBasicSetup()
const { mockUser } = await mockBasicUser({
user: {
platformId: mockPlatform.id,
platformRole: PlatformRole.ADMIN,
},
})
// arrange
const nonExistentUserId = apId()
const testToken = await generateMockToken({
type: PrincipalType.USER,
platform: {
id: mockPlatform.id,
},
id: mockUser.id,
})
// act
const response = await app?.inject({
method: 'POST',
url: `/v1/users/${nonExistentUserId}`,
headers: {
authorization: `Bearer ${testToken}`,
},
body: {
status: UserStatus.INACTIVE,
},
})
// assert
expect(response?.statusCode).toBe(StatusCodes.NOT_FOUND)
})
it('Requires principal to be platform owner', async () => {
// arrange
const { mockPlatform } = await mockAndSaveBasicSetup()
const { mockUser } = await mockBasicUser({
user: {
platformId: mockPlatform.id,
platformRole: PlatformRole.MEMBER,
},
})
const testToken = await generateMockToken({
id: mockUser.id,
type: PrincipalType.USER,
platform: {
id: mockPlatform.id,
},
})
// act
const response = await app?.inject({
method: 'POST',
url: `/v1/users/${mockUser.id}`,
headers: {
authorization: `Bearer ${testToken}`,
},
body: {
status: UserStatus.INACTIVE,
},
})
// assert
expect(response?.statusCode).toBe(StatusCodes.FORBIDDEN)
const responseBody = response?.json()
expect(responseBody?.code).toBe('AUTHORIZATION')
})
})
describe('Delete user endpoint', () => {
it('Removes a user', async () => {
// arrange
const { mockOwner, mockPlatform } = await mockAndSaveBasicSetup()
const { mockUser: mockEditor } = await mockBasicUser({
user: {
platformId: mockPlatform.id,
platformRole: PlatformRole.MEMBER,
},
})
const mockOwnerToken = await generateMockToken({
id: mockOwner.id,
type: PrincipalType.USER,
platform: {
id: mockPlatform.id,
},
})
// act
const response = await app?.inject({
method: 'DELETE',
url: `/v1/users/${mockEditor.id}`,
headers: {
authorization: `Bearer ${mockOwnerToken}`,
},
})
// assert
expect(response?.statusCode).toBe(StatusCodes.NO_CONTENT)
})
it('Fails if user is not platform owner', async () => {
// arrange
const { mockPlatform } = await mockAndSaveBasicSetup()
const { mockUser } = await mockBasicUser({
user: {
platformId: mockPlatform.id,
platformRole: PlatformRole.MEMBER,
},
})
const mockUserToken = await generateMockToken({
id: mockUser.id,
type: PrincipalType.USER,
platform: {
id: mockPlatform.id,
},
})
// act
const response = await app?.inject({
method: 'DELETE',
url: `/v1/users/${mockUser.id}`,
headers: {
authorization: `Bearer ${mockUserToken}`,
},
})
// assert
expect(response?.statusCode).toBe(StatusCodes.FORBIDDEN)
const responseBody = response?.json()
expect(responseBody?.code).toBe('AUTHORIZATION')
})
})
})