mirror of
https://github.com/toeverything/AFFiNE.git
synced 2024-12-22 10:21:37 +03:00
251 lines
7.0 KiB
TypeScript
251 lines
7.0 KiB
TypeScript
import type { INestApplication } from '@nestjs/common';
|
|
import { PrismaClient } from '@prisma/client';
|
|
import type { TestFn } from 'ava';
|
|
import ava from 'ava';
|
|
import request from 'supertest';
|
|
|
|
import { AppModule } from '../src/app.module';
|
|
import {
|
|
acceptInviteById,
|
|
createTestingApp,
|
|
createWorkspace,
|
|
getWorkspacePublicPages,
|
|
inviteUser,
|
|
publishPage,
|
|
revokePublicPage,
|
|
signUp,
|
|
updateWorkspace,
|
|
} from './utils';
|
|
|
|
const test = ava as TestFn<{
|
|
app: INestApplication;
|
|
client: PrismaClient;
|
|
}>;
|
|
|
|
test.beforeEach(async t => {
|
|
const { app } = await createTestingApp({
|
|
imports: [AppModule],
|
|
});
|
|
|
|
t.context.client = app.get(PrismaClient);
|
|
t.context.app = app;
|
|
});
|
|
|
|
test.afterEach.always(async t => {
|
|
await t.context.app.close();
|
|
});
|
|
|
|
test('should register a user', async t => {
|
|
const user = await signUp(t.context.app, 'u1', 'u1@affine.pro', '123456');
|
|
t.is(typeof user.id, 'string', 'user.id is not a string');
|
|
t.is(user.name, 'u1', 'user.name is not valid');
|
|
t.is(user.email, 'u1@affine.pro', 'user.email is not valid');
|
|
});
|
|
|
|
test('should create a workspace', async t => {
|
|
const { app } = t.context;
|
|
const user = await signUp(app, 'u1', 'u1@affine.pro', '1');
|
|
|
|
const workspace = await createWorkspace(app, user.token.token);
|
|
t.is(typeof workspace.id, 'string', 'workspace.id is not a string');
|
|
});
|
|
|
|
test('should can publish workspace', async t => {
|
|
const { app } = t.context;
|
|
const user = await signUp(app, 'u1', 'u1@affine.pro', '1');
|
|
const workspace = await createWorkspace(app, user.token.token);
|
|
|
|
const isPublic = await updateWorkspace(
|
|
app,
|
|
user.token.token,
|
|
workspace.id,
|
|
true
|
|
);
|
|
t.true(isPublic, 'failed to publish workspace');
|
|
|
|
const isPrivate = await updateWorkspace(
|
|
app,
|
|
user.token.token,
|
|
workspace.id,
|
|
false
|
|
);
|
|
t.false(isPrivate, 'failed to unpublish workspace');
|
|
});
|
|
|
|
test('should share a page', async t => {
|
|
const { app } = t.context;
|
|
const u1 = await signUp(app, 'u1', 'u1@affine.pro', '1');
|
|
const u2 = await signUp(app, 'u2', 'u2@affine.pro', '1');
|
|
|
|
const workspace = await createWorkspace(app, u1.token.token);
|
|
|
|
const share = await publishPage(app, u1.token.token, workspace.id, 'page1');
|
|
t.is(share.id, 'page1', 'failed to share page');
|
|
const pages = await getWorkspacePublicPages(
|
|
app,
|
|
u1.token.token,
|
|
workspace.id
|
|
);
|
|
t.is(pages.length, 1, 'failed to get shared pages');
|
|
t.deepEqual(
|
|
pages[0],
|
|
{ id: 'page1', mode: 'Page' },
|
|
'failed to get shared page: page1'
|
|
);
|
|
|
|
const resp1 = await request(app.getHttpServer())
|
|
.get(`/api/workspaces/${workspace.id}/docs/${workspace.id}`)
|
|
.auth(u1.token.token, { type: 'bearer' });
|
|
t.is(resp1.statusCode, 200, 'failed to get root doc with u1 token');
|
|
const resp2 = await request(app.getHttpServer()).get(
|
|
`/api/workspaces/${workspace.id}/docs/${workspace.id}`
|
|
);
|
|
t.is(resp2.statusCode, 200, 'failed to get root doc with public pages');
|
|
|
|
const resp3 = await request(app.getHttpServer())
|
|
.get(`/api/workspaces/${workspace.id}/docs/page1`)
|
|
.auth(u1.token.token, { type: 'bearer' });
|
|
// 404 because we don't put the page doc to server
|
|
t.is(resp3.statusCode, 404, 'failed to get shared doc with u1 token');
|
|
const resp4 = await request(app.getHttpServer()).get(
|
|
`/api/workspaces/${workspace.id}/docs/page1`
|
|
);
|
|
// 404 because we don't put the page doc to server
|
|
t.is(resp4.statusCode, 404, 'should not get shared doc without token');
|
|
|
|
const msg1 = await publishPage(app, u2.token.token, 'not_exists_ws', 'page2');
|
|
t.is(
|
|
msg1,
|
|
'You do not have permission to access Space not_exists_ws.',
|
|
'unauthorized user can share page'
|
|
);
|
|
const msg2 = await revokePublicPage(
|
|
app,
|
|
u2.token.token,
|
|
'not_exists_ws',
|
|
'page2'
|
|
);
|
|
t.is(
|
|
msg2,
|
|
'You do not have permission to access Space not_exists_ws.',
|
|
'unauthorized user can share page'
|
|
);
|
|
|
|
await acceptInviteById(
|
|
app,
|
|
workspace.id,
|
|
await inviteUser(app, u1.token.token, workspace.id, u2.email, 'Admin')
|
|
);
|
|
const invited = await publishPage(app, u2.token.token, workspace.id, 'page2');
|
|
t.is(invited.id, 'page2', 'failed to share page');
|
|
|
|
const revoke = await revokePublicPage(
|
|
app,
|
|
u1.token.token,
|
|
workspace.id,
|
|
'page1'
|
|
);
|
|
t.false(revoke.public, 'failed to revoke page');
|
|
const pages2 = await getWorkspacePublicPages(
|
|
app,
|
|
u1.token.token,
|
|
workspace.id
|
|
);
|
|
t.is(pages2.length, 1, 'failed to get shared pages');
|
|
t.is(pages2[0].id, 'page2', 'failed to get shared page: page2');
|
|
|
|
const msg3 = await revokePublicPage(
|
|
app,
|
|
u1.token.token,
|
|
workspace.id,
|
|
'page3'
|
|
);
|
|
t.is(msg3, 'Page is not public');
|
|
|
|
const msg4 = await revokePublicPage(
|
|
app,
|
|
u1.token.token,
|
|
workspace.id,
|
|
'page2'
|
|
);
|
|
t.false(msg4.public, 'failed to revoke page');
|
|
const page3 = await getWorkspacePublicPages(
|
|
app,
|
|
u1.token.token,
|
|
workspace.id
|
|
);
|
|
t.is(page3.length, 0, 'failed to get shared pages');
|
|
});
|
|
|
|
test('should can get workspace doc', async t => {
|
|
const { app } = t.context;
|
|
const u1 = await signUp(app, 'u1', 'u1@affine.pro', '1');
|
|
const u2 = await signUp(app, 'u2', 'u2@affine.pro', '2');
|
|
const workspace = await createWorkspace(app, u1.token.token);
|
|
|
|
const res1 = await request(app.getHttpServer())
|
|
.get(`/api/workspaces/${workspace.id}/docs/${workspace.id}`)
|
|
.auth(u1.token.token, { type: 'bearer' })
|
|
.expect(200)
|
|
.type('application/octet-stream');
|
|
|
|
t.deepEqual(
|
|
res1.body,
|
|
Buffer.from([0, 0]),
|
|
'failed to get doc with u1 token'
|
|
);
|
|
|
|
await request(app.getHttpServer())
|
|
.get(`/api/workspaces/${workspace.id}/docs/${workspace.id}`)
|
|
.expect(403);
|
|
await request(app.getHttpServer())
|
|
.get(`/api/workspaces/${workspace.id}/docs/${workspace.id}`)
|
|
.auth(u2.token.token, { type: 'bearer' })
|
|
.expect(403);
|
|
|
|
await request(app.getHttpServer())
|
|
.get(`/api/workspaces/${workspace.id}/docs/${workspace.id}`)
|
|
.auth(u2.token.token, { type: 'bearer' })
|
|
.expect(403);
|
|
|
|
await acceptInviteById(
|
|
app,
|
|
workspace.id,
|
|
await inviteUser(app, u1.token.token, workspace.id, u2.email, 'Admin')
|
|
);
|
|
|
|
const res2 = await request(app.getHttpServer())
|
|
.get(`/api/workspaces/${workspace.id}/docs/${workspace.id}`)
|
|
.auth(u2.token.token, { type: 'bearer' })
|
|
.expect(200)
|
|
.type('application/octet-stream');
|
|
|
|
t.deepEqual(
|
|
res2.body,
|
|
Buffer.from([0, 0]),
|
|
'failed to get doc with u2 token'
|
|
);
|
|
});
|
|
|
|
test('should be able to get public workspace doc', async t => {
|
|
const { app } = t.context;
|
|
const user = await signUp(app, 'u1', 'u1@affine.pro', '1');
|
|
const workspace = await createWorkspace(app, user.token.token);
|
|
|
|
const isPublic = await updateWorkspace(
|
|
app,
|
|
user.token.token,
|
|
workspace.id,
|
|
true
|
|
);
|
|
|
|
t.true(isPublic, 'failed to publish workspace');
|
|
|
|
const res = await request(app.getHttpServer())
|
|
.get(`/api/workspaces/${workspace.id}/docs/${workspace.id}`)
|
|
.expect(200)
|
|
.type('application/octet-stream');
|
|
|
|
t.deepEqual(res.body, Buffer.from([0, 0]), 'failed to get public doc');
|
|
});
|