* WIP - got one API test to pass yay * adds group update endpoint * added group policies * adds groups.list API * adds groups.info * remove comment * WIP * tests for delete * adds group membership list * adds tests for groups list * add and remove user endpoints for group * ask some questions * fix up some issues around primary keys * remove export from group permissions Co-Authored-By: Tom Moor <tom.moor@gmail.com> * remove random file * only create events on actual updates, add tests to ensure * adds uniqueness validation to group name * throw validation errors on model and let it pass through the controller * fix linting * WIP * WIP * WIP * WIP * WIP basic edit and delete * basic CRUD for groups and memberships in place * got member counts working * add member count and limit the number of users sent over teh wire to 6 * factor avatar with AvatarWithPresence into its own class * wip * WIP avatars in group lists * WIP collection groups * add and remove group endpoints * wip add collection groups * wip get group adding to collections to work * wip get updating collection group memberships to work * wip get new group modal working * add tests for collection index * include collection groups in the withmemberships scope * tie permissions to group memberships * remove unused import * Update app/components/GroupListItem.js update title copy Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update server/migrations/20191211044318-create-groups.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update server/api/groups.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update server/api/groups.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update app/menus/CollectionMenu.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update server/models/Group.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * minor fixes * Update app/scenes/CollectionMembers/AddGroupsToCollection.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update app/menus/GroupMenu.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update app/menus/GroupMenu.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update app/menus/GroupMenu.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update app/scenes/Collection.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update app/scenes/CollectionMembers/CollectionMembers.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update app/scenes/GroupNew.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update app/scenes/GroupNew.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update app/scenes/Settings/Groups.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update server/api/documents.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * Update app/scenes/CollectionMembers/components/CollectionGroupMemberListItem.js Co-Authored-By: Tom Moor <tom.moor@gmail.com> * address comments * WIP - getting websocket stuff up and running * socket event for group deletion * wrapped up cascading deletes * lint * flow * fix: UI feedback * fix: Facepile size * fix: Lots of missing await's * Allow clicking facepile on group list item to open members * remove unused route push, grammar * fix: Remove bad analytics events feat: Add group events to audit log * collection. -> collections. * Add groups to entity websocket events (sync create/update/delete) between clients * fix: Users should not be able to see groups they are not a member of * fix: Not caching errors in UI when changing group memberships * fix: Hide unusable UI * test * fix: Tweak language * feat: Automatically open 'add member' modal after creating group Co-authored-by: Tom Moor <tom.moor@gmail.com>
1103 lines
32 KiB
JavaScript
1103 lines
32 KiB
JavaScript
/* eslint-disable flowtype/require-valid-file-annotation */
|
|
import TestServer from 'fetch-test-server';
|
|
import app from '../app';
|
|
import { flushdb, seed } from '../test/support';
|
|
import { buildUser, buildGroup, buildCollection } from '../test/factories';
|
|
import { Collection, CollectionUser, CollectionGroup } from '../models';
|
|
const server = new TestServer(app.callback());
|
|
|
|
beforeEach(flushdb);
|
|
afterAll(server.close);
|
|
|
|
describe('#collections.list', async () => {
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.list');
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(401);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should return collections', async () => {
|
|
const { user, collection } = await seed();
|
|
const res = await server.post('/api/collections.list', {
|
|
body: { token: user.getJwtToken() },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.length).toEqual(1);
|
|
expect(body.data[0].id).toEqual(collection.id);
|
|
expect(body.policies.length).toEqual(1);
|
|
expect(body.policies[0].abilities.read).toEqual(true);
|
|
});
|
|
|
|
it('should not return private collections actor is not a member of', async () => {
|
|
const { user, collection } = await seed();
|
|
await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
});
|
|
const res = await server.post('/api/collections.list', {
|
|
body: { token: user.getJwtToken() },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.length).toEqual(1);
|
|
expect(body.data[0].id).toEqual(collection.id);
|
|
});
|
|
|
|
it('should return private collections actor is a member of', async () => {
|
|
const user = await buildUser();
|
|
await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
userId: user.id,
|
|
});
|
|
await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
userId: user.id,
|
|
});
|
|
|
|
const res = await server.post('/api/collections.list', {
|
|
body: { token: user.getJwtToken() },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.length).toEqual(2);
|
|
expect(body.policies.length).toEqual(2);
|
|
expect(body.policies[0].abilities.read).toEqual(true);
|
|
});
|
|
|
|
it('should return private collections actor is a group-member of', async () => {
|
|
const user = await buildUser();
|
|
await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
userId: user.id,
|
|
});
|
|
|
|
const collection = await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
});
|
|
|
|
const group = await buildGroup({ teamId: user.teamId });
|
|
await group.addUser(user, { through: { createdById: user.id } });
|
|
|
|
await collection.addGroup(group, {
|
|
through: { permission: 'read', createdById: user.id },
|
|
});
|
|
|
|
const res = await server.post('/api/collections.list', {
|
|
body: { token: user.getJwtToken() },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.length).toEqual(2);
|
|
expect(body.policies.length).toEqual(2);
|
|
expect(body.policies[0].abilities.read).toEqual(true);
|
|
});
|
|
});
|
|
|
|
describe('#collections.export', async () => {
|
|
it('should now allow export of private collection not a member', async () => {
|
|
const { user } = await seed();
|
|
const collection = await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
});
|
|
const res = await server.post('/api/collections.export', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
|
|
it('should allow export of private collection when the actor is a member', async () => {
|
|
const { user, collection } = await seed();
|
|
collection.private = true;
|
|
await collection.save();
|
|
|
|
await CollectionUser.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
permission: 'read',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.export', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
|
|
expect(res.status).toEqual(200);
|
|
});
|
|
|
|
it('should allow export of private collection when the actor is a group member', async () => {
|
|
const user = await buildUser();
|
|
const collection = await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
});
|
|
|
|
const group = await buildGroup({ teamId: user.teamId });
|
|
await group.addUser(user, { through: { createdById: user.id } });
|
|
|
|
await collection.addGroup(group, {
|
|
through: { permission: 'read', createdById: user.id },
|
|
});
|
|
|
|
const res = await server.post('/api/collections.export', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
|
|
expect(res.status).toEqual(200);
|
|
});
|
|
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.export');
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(401);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should return success', async () => {
|
|
const { user, collection } = await seed();
|
|
const res = await server.post('/api/collections.export', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
|
|
expect(res.status).toEqual(200);
|
|
});
|
|
});
|
|
|
|
describe('#collections.exportAll', async () => {
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.exportAll');
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(401);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should require authorization', async () => {
|
|
const user = await buildUser();
|
|
const res = await server.post('/api/collections.exportAll', {
|
|
body: { token: user.getJwtToken() },
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
|
|
it('should return success', async () => {
|
|
const { admin } = await seed();
|
|
const res = await server.post('/api/collections.exportAll', {
|
|
body: { token: admin.getJwtToken() },
|
|
});
|
|
|
|
expect(res.status).toEqual(200);
|
|
});
|
|
|
|
it('should allow downloading directly', async () => {
|
|
const { admin } = await seed();
|
|
const res = await server.post('/api/collections.exportAll', {
|
|
body: { token: admin.getJwtToken(), download: true },
|
|
});
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(res.headers.get('content-type')).toEqual(
|
|
'application/force-download'
|
|
);
|
|
});
|
|
});
|
|
|
|
describe('#collections.add_user', async () => {
|
|
it('should add user to collection', async () => {
|
|
const user = await buildUser();
|
|
const collection = await buildCollection({
|
|
teamId: user.teamId,
|
|
userId: user.id,
|
|
private: true,
|
|
});
|
|
const anotherUser = await buildUser({ teamId: user.teamId });
|
|
const res = await server.post('/api/collections.add_user', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
userId: anotherUser.id,
|
|
},
|
|
});
|
|
|
|
const users = await collection.getUsers();
|
|
expect(res.status).toEqual(200);
|
|
expect(users.length).toEqual(2);
|
|
});
|
|
|
|
it('should require user in team', async () => {
|
|
const user = await buildUser();
|
|
const collection = await buildCollection({
|
|
teamId: user.teamId,
|
|
private: true,
|
|
});
|
|
const anotherUser = await buildUser();
|
|
const res = await server.post('/api/collections.add_user', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
userId: anotherUser.id,
|
|
},
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(403);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.add_user');
|
|
|
|
expect(res.status).toEqual(401);
|
|
});
|
|
|
|
it('should require authorization', async () => {
|
|
const { collection } = await seed();
|
|
const user = await buildUser();
|
|
const anotherUser = await buildUser({ teamId: user.teamId });
|
|
|
|
const res = await server.post('/api/collections.add_user', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
userId: anotherUser.id,
|
|
},
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
});
|
|
|
|
describe('#collections.add_group', async () => {
|
|
it('should add group to collection', async () => {
|
|
const user = await buildUser({ isAdmin: true });
|
|
const collection = await buildCollection({
|
|
teamId: user.teamId,
|
|
userId: user.id,
|
|
private: true,
|
|
});
|
|
const group = await buildGroup({ teamId: user.teamId });
|
|
const res = await server.post('/api/collections.add_group', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
groupId: group.id,
|
|
},
|
|
});
|
|
|
|
const groups = await collection.getGroups();
|
|
expect(groups.length).toEqual(1);
|
|
expect(res.status).toEqual(200);
|
|
});
|
|
|
|
it('should require group in team', async () => {
|
|
const user = await buildUser();
|
|
const collection = await buildCollection({
|
|
teamId: user.teamId,
|
|
userId: user.id,
|
|
private: true,
|
|
});
|
|
const group = await buildGroup();
|
|
const res = await server.post('/api/collections.add_group', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
groupId: group.id,
|
|
},
|
|
});
|
|
|
|
const body = await res.json();
|
|
expect(res.status).toEqual(403);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.add_group');
|
|
expect(res.status).toEqual(401);
|
|
});
|
|
|
|
it('should require authorization', async () => {
|
|
const collection = await buildCollection();
|
|
const user = await buildUser();
|
|
const group = await buildGroup({ teamId: user.teamId });
|
|
const res = await server.post('/api/collections.add_group', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
groupId: group.id,
|
|
},
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
});
|
|
|
|
describe('#collections.remove_group', async () => {
|
|
it('should remove group from collection', async () => {
|
|
const user = await buildUser({ isAdmin: true });
|
|
const collection = await buildCollection({
|
|
teamId: user.teamId,
|
|
userId: user.id,
|
|
private: true,
|
|
});
|
|
const group = await buildGroup({ teamId: user.teamId });
|
|
|
|
await server.post('/api/collections.add_group', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
groupId: group.id,
|
|
},
|
|
});
|
|
|
|
let users = await collection.getGroups();
|
|
expect(users.length).toEqual(1);
|
|
|
|
const res = await server.post('/api/collections.remove_group', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
groupId: group.id,
|
|
},
|
|
});
|
|
|
|
users = await collection.getGroups();
|
|
expect(res.status).toEqual(200);
|
|
expect(users.length).toEqual(0);
|
|
});
|
|
|
|
it('should require group in team', async () => {
|
|
const user = await buildUser();
|
|
const collection = await buildCollection({
|
|
teamId: user.teamId,
|
|
private: true,
|
|
});
|
|
const group = await buildGroup();
|
|
const res = await server.post('/api/collections.remove_group', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
groupId: group.id,
|
|
},
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(403);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.remove_group');
|
|
|
|
expect(res.status).toEqual(401);
|
|
});
|
|
|
|
it('should require authorization', async () => {
|
|
const { collection } = await seed();
|
|
const user = await buildUser();
|
|
const group = await buildGroup({ teamId: user.teamId });
|
|
|
|
const res = await server.post('/api/collections.remove_group', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
groupId: group.id,
|
|
},
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
});
|
|
|
|
describe('#collections.remove_user', async () => {
|
|
it('should remove user from collection', async () => {
|
|
const user = await buildUser();
|
|
const collection = await buildCollection({
|
|
teamId: user.teamId,
|
|
userId: user.id,
|
|
private: true,
|
|
});
|
|
const anotherUser = await buildUser({ teamId: user.teamId });
|
|
|
|
await server.post('/api/collections.add_user', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
userId: anotherUser.id,
|
|
},
|
|
});
|
|
|
|
const res = await server.post('/api/collections.remove_user', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
userId: anotherUser.id,
|
|
},
|
|
});
|
|
|
|
const users = await collection.getUsers();
|
|
expect(res.status).toEqual(200);
|
|
expect(users.length).toEqual(1);
|
|
});
|
|
|
|
it('should require user in team', async () => {
|
|
const user = await buildUser();
|
|
const collection = await buildCollection({
|
|
teamId: user.teamId,
|
|
private: true,
|
|
});
|
|
const anotherUser = await buildUser();
|
|
const res = await server.post('/api/collections.remove_user', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
userId: anotherUser.id,
|
|
},
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(403);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.remove_user');
|
|
|
|
expect(res.status).toEqual(401);
|
|
});
|
|
|
|
it('should require authorization', async () => {
|
|
const { collection } = await seed();
|
|
const user = await buildUser();
|
|
const anotherUser = await buildUser({ teamId: user.teamId });
|
|
|
|
const res = await server.post('/api/collections.remove_user', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
userId: anotherUser.id,
|
|
},
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
});
|
|
|
|
describe('#collections.users', async () => {
|
|
it('should return users in private collection', async () => {
|
|
const { collection, user } = await seed();
|
|
collection.private = true;
|
|
await collection.save();
|
|
|
|
await CollectionUser.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
permission: 'read',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.users', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.length).toEqual(1);
|
|
});
|
|
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.users');
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(401);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should require authorization', async () => {
|
|
const { collection } = await seed();
|
|
const user = await buildUser();
|
|
const res = await server.post('/api/collections.users', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
});
|
|
|
|
describe('#collections.group_memberships', async () => {
|
|
it('should return groups in private collection', async () => {
|
|
const user = await buildUser();
|
|
const group = await buildGroup({ teamId: user.teamId });
|
|
const collection = await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
});
|
|
|
|
await CollectionUser.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
permission: 'read_write',
|
|
});
|
|
|
|
await CollectionGroup.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
groupId: group.id,
|
|
permission: 'read_write',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.group_memberships', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.groups.length).toEqual(1);
|
|
expect(body.data.groups[0].id).toEqual(group.id);
|
|
expect(body.data.collectionGroupMemberships.length).toEqual(1);
|
|
expect(body.data.collectionGroupMemberships[0].permission).toEqual(
|
|
'read_write'
|
|
);
|
|
});
|
|
|
|
it('should allow filtering groups in collection by name', async () => {
|
|
const user = await buildUser();
|
|
const group = await buildGroup({ name: 'will find', teamId: user.teamId });
|
|
const group2 = await buildGroup({ name: 'wont find', teamId: user.teamId });
|
|
const collection = await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
});
|
|
|
|
await CollectionUser.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
permission: 'read_write',
|
|
});
|
|
|
|
await CollectionGroup.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
groupId: group.id,
|
|
permission: 'read_write',
|
|
});
|
|
|
|
await CollectionGroup.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
groupId: group2.id,
|
|
permission: 'read_write',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.group_memberships', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
query: 'will',
|
|
},
|
|
});
|
|
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.groups.length).toEqual(1);
|
|
expect(body.data.groups[0].id).toEqual(group.id);
|
|
});
|
|
|
|
it('should allow filtering groups in collection by permission', async () => {
|
|
const user = await buildUser();
|
|
const group = await buildGroup({ teamId: user.teamId });
|
|
const group2 = await buildGroup({ teamId: user.teamId });
|
|
const collection = await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
});
|
|
|
|
await CollectionUser.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
permission: 'read_write',
|
|
});
|
|
|
|
await CollectionGroup.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
groupId: group.id,
|
|
permission: 'read_write',
|
|
});
|
|
|
|
await CollectionGroup.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
groupId: group2.id,
|
|
permission: 'maintainer',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.group_memberships', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
permission: 'maintainer',
|
|
},
|
|
});
|
|
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.groups.length).toEqual(1);
|
|
expect(body.data.groups[0].id).toEqual(group2.id);
|
|
});
|
|
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.group_memberships');
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(401);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should require authorization', async () => {
|
|
const user = await buildUser();
|
|
const collection = await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
});
|
|
|
|
const res = await server.post('/api/collections.group_memberships', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
});
|
|
|
|
describe('#collections.memberships', async () => {
|
|
it('should return members in private collection', async () => {
|
|
const { collection, user } = await seed();
|
|
collection.private = true;
|
|
await collection.save();
|
|
|
|
await CollectionUser.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
permission: 'read_write',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.memberships', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.users.length).toEqual(1);
|
|
expect(body.data.users[0].id).toEqual(user.id);
|
|
expect(body.data.memberships.length).toEqual(1);
|
|
expect(body.data.memberships[0].permission).toEqual('read_write');
|
|
});
|
|
|
|
it('should allow filtering members in collection by name', async () => {
|
|
const { collection, user } = await seed();
|
|
const user2 = await buildUser({ name: "Won't find" });
|
|
await CollectionUser.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
permission: 'read_write',
|
|
});
|
|
await CollectionUser.create({
|
|
createdById: user2.id,
|
|
collectionId: collection.id,
|
|
userId: user2.id,
|
|
permission: 'read_write',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.memberships', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
query: user.name.slice(0, 3),
|
|
},
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.users.length).toEqual(1);
|
|
expect(body.data.users[0].id).toEqual(user.id);
|
|
});
|
|
|
|
it('should allow filtering members in collection by permission', async () => {
|
|
const { collection, user } = await seed();
|
|
const user2 = await buildUser();
|
|
await CollectionUser.create({
|
|
createdById: user.id,
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
permission: 'read_write',
|
|
});
|
|
await CollectionUser.create({
|
|
createdById: user2.id,
|
|
collectionId: collection.id,
|
|
userId: user2.id,
|
|
permission: 'maintainer',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.memberships', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
permission: 'maintainer',
|
|
},
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.users.length).toEqual(1);
|
|
expect(body.data.users[0].id).toEqual(user2.id);
|
|
});
|
|
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.memberships');
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(401);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should require authorization', async () => {
|
|
const { collection } = await seed();
|
|
const user = await buildUser();
|
|
const res = await server.post('/api/collections.memberships', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
});
|
|
|
|
describe('#collections.info', async () => {
|
|
it('should return collection', async () => {
|
|
const { user, collection } = await seed();
|
|
const res = await server.post('/api/collections.info', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.id).toEqual(collection.id);
|
|
});
|
|
|
|
it('should require user member of collection', async () => {
|
|
const { user, collection } = await seed();
|
|
collection.private = true;
|
|
await collection.save();
|
|
|
|
const res = await server.post('/api/collections.info', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
|
|
it('should allow user member of collection', async () => {
|
|
const { user, collection } = await seed();
|
|
collection.private = true;
|
|
await collection.save();
|
|
|
|
await CollectionUser.create({
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
createdById: user.id,
|
|
permission: 'read',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.info', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.id).toEqual(collection.id);
|
|
});
|
|
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.info');
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(401);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should require authorization', async () => {
|
|
const { collection } = await seed();
|
|
const user = await buildUser();
|
|
const res = await server.post('/api/collections.info', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
});
|
|
|
|
describe('#collections.create', async () => {
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.create');
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(401);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should create collection', async () => {
|
|
const { user } = await seed();
|
|
const res = await server.post('/api/collections.create', {
|
|
body: { token: user.getJwtToken(), name: 'Test' },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.id).toBeTruthy();
|
|
expect(body.data.name).toBe('Test');
|
|
expect(body.policies.length).toBe(1);
|
|
expect(body.policies[0].abilities.read).toBeTruthy();
|
|
expect(body.policies[0].abilities.export).toBeTruthy();
|
|
});
|
|
|
|
it('should return correct policies with private collection', async () => {
|
|
const { user } = await seed();
|
|
const res = await server.post('/api/collections.create', {
|
|
body: { token: user.getJwtToken(), name: 'Test', private: true },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.private).toBeTruthy();
|
|
expect(body.policies.length).toBe(1);
|
|
expect(body.policies[0].abilities.read).toBeTruthy();
|
|
expect(body.policies[0].abilities.export).toBeTruthy();
|
|
});
|
|
});
|
|
|
|
describe('#collections.update', async () => {
|
|
it('should require authentication', async () => {
|
|
const collection = await buildCollection();
|
|
const res = await server.post('/api/collections.update', {
|
|
body: { id: collection.id, name: 'Test' },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(401);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should require authorization', async () => {
|
|
const { collection } = await seed();
|
|
const user = await buildUser();
|
|
const res = await server.post('/api/collections.update', {
|
|
body: { token: user.getJwtToken(), id: collection.id, name: 'Test' },
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
|
|
it('allows editing non-private collection', async () => {
|
|
const { user, collection } = await seed();
|
|
const res = await server.post('/api/collections.update', {
|
|
body: { token: user.getJwtToken(), id: collection.id, name: 'Test' },
|
|
});
|
|
const body = await res.json();
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.name).toBe('Test');
|
|
expect(body.policies.length).toBe(1);
|
|
});
|
|
|
|
it('allows editing from non-private to private collection', async () => {
|
|
const { user, collection } = await seed();
|
|
const res = await server.post('/api/collections.update', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
private: true,
|
|
name: 'Test',
|
|
},
|
|
});
|
|
const body = await res.json();
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.name).toBe('Test');
|
|
expect(body.data.private).toBe(true);
|
|
|
|
// ensure we return with a write level policy
|
|
expect(body.policies.length).toBe(1);
|
|
expect(body.policies[0].abilities.update).toBe(true);
|
|
});
|
|
|
|
it('allows editing from private to non-private collection', async () => {
|
|
const { user, collection } = await seed();
|
|
collection.private = true;
|
|
await collection.save();
|
|
|
|
await CollectionUser.create({
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
createdById: user.id,
|
|
permission: 'read_write',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.update', {
|
|
body: {
|
|
token: user.getJwtToken(),
|
|
id: collection.id,
|
|
private: false,
|
|
name: 'Test',
|
|
},
|
|
});
|
|
const body = await res.json();
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.name).toBe('Test');
|
|
expect(body.data.private).toBe(false);
|
|
|
|
// ensure we return with a write level policy
|
|
expect(body.policies.length).toBe(1);
|
|
expect(body.policies[0].abilities.update).toBe(true);
|
|
});
|
|
|
|
it('allows editing by read-write collection user', async () => {
|
|
const { user, collection } = await seed();
|
|
collection.private = true;
|
|
await collection.save();
|
|
|
|
await CollectionUser.create({
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
createdById: user.id,
|
|
permission: 'read_write',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.update', {
|
|
body: { token: user.getJwtToken(), id: collection.id, name: 'Test' },
|
|
});
|
|
const body = await res.json();
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.name).toBe('Test');
|
|
expect(body.policies.length).toBe(1);
|
|
});
|
|
|
|
it('allows editing by read-write collection group user', async () => {
|
|
const user = await buildUser();
|
|
const collection = await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
});
|
|
|
|
const group = await buildGroup({ teamId: user.teamId });
|
|
await group.addUser(user, { through: { createdById: user.id } });
|
|
|
|
await collection.addGroup(group, {
|
|
through: { permission: 'read_write', createdById: user.id },
|
|
});
|
|
|
|
const res = await server.post('/api/collections.update', {
|
|
body: { token: user.getJwtToken(), id: collection.id, name: 'Test' },
|
|
});
|
|
const body = await res.json();
|
|
expect(res.status).toEqual(200);
|
|
expect(body.data.name).toBe('Test');
|
|
expect(body.policies.length).toBe(1);
|
|
});
|
|
|
|
it('does not allow editing by read-only collection user', async () => {
|
|
const { user, collection } = await seed();
|
|
collection.private = true;
|
|
await collection.save();
|
|
|
|
await CollectionUser.create({
|
|
collectionId: collection.id,
|
|
userId: user.id,
|
|
createdById: user.id,
|
|
permission: 'read',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.update', {
|
|
body: { token: user.getJwtToken(), id: collection.id, name: 'Test' },
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
});
|
|
|
|
describe('#collections.delete', async () => {
|
|
it('should require authentication', async () => {
|
|
const res = await server.post('/api/collections.delete');
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(401);
|
|
expect(body).toMatchSnapshot();
|
|
});
|
|
|
|
it('should require authorization', async () => {
|
|
const { collection } = await seed();
|
|
const user = await buildUser();
|
|
const res = await server.post('/api/collections.delete', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
expect(res.status).toEqual(403);
|
|
});
|
|
|
|
it('should not allow deleting last collection', async () => {
|
|
const { user, collection } = await seed();
|
|
const res = await server.post('/api/collections.delete', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
expect(res.status).toEqual(400);
|
|
});
|
|
|
|
it('should delete collection', async () => {
|
|
const { user, collection } = await seed();
|
|
await Collection.create({
|
|
name: 'Blah',
|
|
urlId: 'blah',
|
|
teamId: user.teamId,
|
|
creatorId: user.id,
|
|
type: 'atlas',
|
|
});
|
|
|
|
const res = await server.post('/api/collections.delete', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.success).toBe(true);
|
|
});
|
|
|
|
it('allows deleting by read-write collection group user', async () => {
|
|
const user = await buildUser();
|
|
const collection = await buildCollection({
|
|
private: true,
|
|
teamId: user.teamId,
|
|
});
|
|
await buildCollection({
|
|
teamId: user.teamId,
|
|
});
|
|
|
|
const group = await buildGroup({ teamId: user.teamId });
|
|
await group.addUser(user, { through: { createdById: user.id } });
|
|
|
|
await collection.addGroup(group, {
|
|
through: { permission: 'read_write', createdById: user.id },
|
|
});
|
|
|
|
const res = await server.post('/api/collections.delete', {
|
|
body: { token: user.getJwtToken(), id: collection.id },
|
|
});
|
|
const body = await res.json();
|
|
|
|
expect(res.status).toEqual(200);
|
|
expect(body.success).toBe(true);
|
|
});
|
|
});
|