mirror of
https://github.com/toeverything/AFFiNE.git
synced 2024-12-23 04:43:20 +03:00
fb3a0e7b8f
Remove `next-auth` and implement our own Authorization/Authentication system from scratch. ## Server - [x] tokens - [x] function - [x] encryption - [x] AuthController - [x] /api/auth/sign-in - [x] /api/auth/sign-out - [x] /api/auth/session - [x] /api/auth/session (WE SUPPORT MULTI-ACCOUNT!) - [x] OAuthPlugin - [x] OAuthController - [x] /oauth/login - [x] /oauth/callback - [x] Providers - [x] Google - [x] GitHub ## Client - [x] useSession - [x] cloudSignIn - [x] cloudSignOut ## NOTE: Tests will be adding in the future
210 lines
7.0 KiB
TypeScript
210 lines
7.0 KiB
TypeScript
/// <reference types="../src/global.d.ts" />
|
|
|
|
import { INestApplication, Injectable } from '@nestjs/common';
|
|
import { PrismaClient } from '@prisma/client';
|
|
import ava, { type TestFn } from 'ava';
|
|
|
|
import { AuthService } from '../src/core/auth/service';
|
|
import {
|
|
FeatureManagementService,
|
|
FeatureModule,
|
|
FeatureService,
|
|
FeatureType,
|
|
} from '../src/core/features';
|
|
import { UserType } from '../src/core/user/types';
|
|
import { WorkspaceResolver } from '../src/core/workspaces/resolvers';
|
|
import { Permission } from '../src/core/workspaces/types';
|
|
import { ConfigModule } from '../src/fundamentals/config';
|
|
import { createTestingApp } from './utils';
|
|
|
|
@Injectable()
|
|
class WorkspaceResolverMock {
|
|
constructor(private readonly prisma: PrismaClient) {}
|
|
|
|
async createWorkspace(user: UserType, _init: null) {
|
|
const workspace = await this.prisma.workspace.create({
|
|
data: {
|
|
public: false,
|
|
permissions: {
|
|
create: {
|
|
type: Permission.Owner,
|
|
user: {
|
|
connect: {
|
|
id: user.id,
|
|
},
|
|
},
|
|
accepted: true,
|
|
},
|
|
},
|
|
},
|
|
});
|
|
return workspace;
|
|
}
|
|
}
|
|
|
|
const test = ava as TestFn<{
|
|
auth: AuthService;
|
|
feature: FeatureService;
|
|
workspace: WorkspaceResolver;
|
|
management: FeatureManagementService;
|
|
app: INestApplication;
|
|
}>;
|
|
|
|
test.beforeEach(async t => {
|
|
const { app } = await createTestingApp({
|
|
imports: [
|
|
ConfigModule.forRoot({
|
|
host: 'example.org',
|
|
https: true,
|
|
featureFlags: {
|
|
earlyAccessPreview: true,
|
|
},
|
|
}),
|
|
FeatureModule,
|
|
],
|
|
providers: [WorkspaceResolver],
|
|
tapModule: module => {
|
|
module
|
|
.overrideProvider(WorkspaceResolver)
|
|
.useClass(WorkspaceResolverMock);
|
|
},
|
|
});
|
|
|
|
t.context.app = app;
|
|
t.context.auth = app.get(AuthService);
|
|
t.context.feature = app.get(FeatureService);
|
|
t.context.workspace = app.get(WorkspaceResolver);
|
|
t.context.management = app.get(FeatureManagementService);
|
|
});
|
|
|
|
test.afterEach.always(async t => {
|
|
await t.context.app.close();
|
|
});
|
|
|
|
test('should be able to set user feature', async t => {
|
|
const { auth, feature } = t.context;
|
|
|
|
const u1 = await auth.signUp('DarkSky', 'darksky@example.org', '123456');
|
|
|
|
const f1 = await feature.getUserFeatures(u1.id);
|
|
t.is(f1.length, 0, 'should be empty');
|
|
|
|
await feature.addUserFeature(u1.id, FeatureType.EarlyAccess, 2, 'test');
|
|
|
|
const f2 = await feature.getUserFeatures(u1.id);
|
|
t.is(f2.length, 1, 'should have 1 feature');
|
|
t.is(f2[0].feature.name, FeatureType.EarlyAccess, 'should be early access');
|
|
});
|
|
|
|
test('should be able to check early access', async t => {
|
|
const { auth, feature, management } = t.context;
|
|
const u1 = await auth.signUp('DarkSky', 'darksky@example.org', '123456');
|
|
|
|
const f1 = await management.canEarlyAccess(u1.email);
|
|
t.false(f1, 'should not have early access');
|
|
|
|
await management.addEarlyAccess(u1.id);
|
|
const f2 = await management.canEarlyAccess(u1.email);
|
|
t.true(f2, 'should have early access');
|
|
|
|
const f3 = await feature.listFeatureUsers(FeatureType.EarlyAccess);
|
|
t.is(f3.length, 1, 'should have 1 user');
|
|
t.is(f3[0].id, u1.id, 'should be the same user');
|
|
});
|
|
|
|
test('should be able revert user feature', async t => {
|
|
const { auth, feature, management } = t.context;
|
|
const u1 = await auth.signUp('DarkSky', 'darksky@example.org', '123456');
|
|
|
|
const f1 = await management.canEarlyAccess(u1.email);
|
|
t.false(f1, 'should not have early access');
|
|
|
|
await management.addEarlyAccess(u1.id);
|
|
const f2 = await management.canEarlyAccess(u1.email);
|
|
t.true(f2, 'should have early access');
|
|
const q1 = await management.listEarlyAccess();
|
|
t.is(q1.length, 1, 'should have 1 user');
|
|
t.is(q1[0].id, u1.id, 'should be the same user');
|
|
|
|
await management.removeEarlyAccess(u1.id);
|
|
const f3 = await management.canEarlyAccess(u1.email);
|
|
t.false(f3, 'should not have early access');
|
|
const q2 = await management.listEarlyAccess();
|
|
t.is(q2.length, 0, 'should have no user');
|
|
|
|
const q3 = await feature.getUserFeatures(u1.id);
|
|
t.is(q3.length, 1, 'should have 1 feature');
|
|
t.is(q3[0].feature.name, FeatureType.EarlyAccess, 'should be early access');
|
|
t.is(q3[0].activated, false, 'should be deactivated');
|
|
});
|
|
|
|
test('should be same instance after reset the user feature', async t => {
|
|
const { auth, feature, management } = t.context;
|
|
const u1 = await auth.signUp('DarkSky', 'darksky@example.org', '123456');
|
|
|
|
await management.addEarlyAccess(u1.id);
|
|
const f1 = (await feature.getUserFeatures(u1.id))[0];
|
|
|
|
await management.removeEarlyAccess(u1.id);
|
|
|
|
await management.addEarlyAccess(u1.id);
|
|
const f2 = (await feature.getUserFeatures(u1.id))[1];
|
|
|
|
t.is(f1.feature, f2.feature, 'should be same instance');
|
|
});
|
|
|
|
test('should be able to set workspace feature', async t => {
|
|
const { auth, feature, workspace } = t.context;
|
|
|
|
const u1 = await auth.signUp('DarkSky', 'darksky@example.org', '123456');
|
|
const w1 = await workspace.createWorkspace(u1, null);
|
|
|
|
const f1 = await feature.getWorkspaceFeatures(w1.id);
|
|
t.is(f1.length, 0, 'should be empty');
|
|
|
|
await feature.addWorkspaceFeature(w1.id, FeatureType.Copilot, 1, 'test');
|
|
|
|
const f2 = await feature.getWorkspaceFeatures(w1.id);
|
|
t.is(f2.length, 1, 'should have 1 feature');
|
|
t.is(f2[0].feature.name, FeatureType.Copilot, 'should be copilot');
|
|
});
|
|
|
|
test('should be able to check workspace feature', async t => {
|
|
const { auth, feature, workspace, management } = t.context;
|
|
const u1 = await auth.signUp('DarkSky', 'darksky@example.org', '123456');
|
|
const w1 = await workspace.createWorkspace(u1, null);
|
|
|
|
const f1 = await management.hasWorkspaceFeature(w1.id, FeatureType.Copilot);
|
|
t.false(f1, 'should not have copilot');
|
|
|
|
await management.addWorkspaceFeatures(w1.id, FeatureType.Copilot, 1, 'test');
|
|
const f2 = await management.hasWorkspaceFeature(w1.id, FeatureType.Copilot);
|
|
t.true(f2, 'should have copilot');
|
|
|
|
const f3 = await feature.listFeatureWorkspaces(FeatureType.Copilot);
|
|
t.is(f3.length, 1, 'should have 1 workspace');
|
|
t.is(f3[0].id, w1.id, 'should be the same workspace');
|
|
});
|
|
|
|
test('should be able revert workspace feature', async t => {
|
|
const { auth, feature, workspace, management } = t.context;
|
|
const u1 = await auth.signUp('DarkSky', 'darksky@example.org', '123456');
|
|
const w1 = await workspace.createWorkspace(u1, null);
|
|
|
|
const f1 = await management.hasWorkspaceFeature(w1.id, FeatureType.Copilot);
|
|
t.false(f1, 'should not have feature');
|
|
|
|
await management.addWorkspaceFeatures(w1.id, FeatureType.Copilot, 1, 'test');
|
|
const f2 = await management.hasWorkspaceFeature(w1.id, FeatureType.Copilot);
|
|
t.true(f2, 'should have feature');
|
|
|
|
await management.removeWorkspaceFeature(w1.id, FeatureType.Copilot);
|
|
const f3 = await management.hasWorkspaceFeature(w1.id, FeatureType.Copilot);
|
|
t.false(f3, 'should not have feature');
|
|
|
|
const q3 = await feature.getWorkspaceFeatures(w1.id);
|
|
t.is(q3.length, 1, 'should have 1 feature');
|
|
t.is(q3[0].feature.name, FeatureType.Copilot, 'should be copilot');
|
|
t.is(q3[0].activated, false, 'should be deactivated');
|
|
});
|