1
0
Fork 0
mirror of synced 2024-06-03 02:55:14 +12:00
budibase/packages/server/src/tests/utilities/TestConfiguration.js

331 lines
8 KiB
JavaScript
Raw Normal View History

const { BUILTIN_ROLE_IDS } = require("../../utilities/security/roles")
const env = require("../../environment")
2021-03-04 07:41:49 +13:00
const {
basicTable,
basicRow,
basicRole,
basicAutomation,
2021-03-04 23:05:50 +13:00
basicDatasource,
basicQuery,
2021-03-09 03:49:19 +13:00
basicScreen,
basicLayout,
basicWebhook,
2021-03-04 07:41:49 +13:00
} = require("./structures")
2021-03-04 23:05:50 +13:00
const controllers = require("./controllers")
const supertest = require("supertest")
const { cleanup } = require("../../utilities/fileSystem")
const { Cookies } = require("@budibase/auth").constants
2021-04-24 01:58:06 +12:00
const { jwt } = require("@budibase/auth").auth
const EMAIL = "babs@babs.com"
const PASSWORD = "babs_password"
class TestConfiguration {
constructor(openServer = true) {
if (openServer) {
env.PORT = 4002
this.server = require("../../app")
// we need the request for logging in, involves cookies, hard to fake
this.request = supertest(this.server)
}
this.appId = null
this.allApps = []
}
getRequest() {
return this.request
}
getAppId() {
return this.appId
}
async _req(config, params, controlFunc) {
const request = {}
// fake cookies, we don't need them
request.cookies = { set: () => {}, get: () => {} }
request.config = { jwtSecret: env.JWT_SECRET }
request.appId = this.appId
request.user = { appId: this.appId }
request.request = {
body: config,
}
if (params) {
request.params = params
}
await controlFunc(request)
return request.body
}
async init(appName = "test_application") {
return this.createApp(appName)
}
end() {
if (this.server) {
this.server.close()
}
cleanup(this.allApps.map(app => app._id))
}
defaultHeaders() {
const user = {
userId: "ro_ta_user_us_uuid1",
builder: {
global: true,
},
}
const app = {
roleId: BUILTIN_ROLE_IDS.BUILDER,
appId: this.appId,
}
const authToken = jwt.sign(user, env.JWT_SECRET)
const appToken = jwt.sign(app, env.JWT_SECRET)
const headers = {
Accept: "application/json",
Cookie: [
`${Cookies.Auth}=${authToken}`,
`${Cookies.CurrentApp}=${appToken}`,
],
}
if (this.appId) {
headers["x-budibase-app-id"] = this.appId
}
return headers
}
publicHeaders() {
const headers = {
Accept: "application/json",
}
if (this.appId) {
headers["x-budibase-app-id"] = this.appId
}
return headers
}
async roleHeaders(email = EMAIL, roleId = BUILTIN_ROLE_IDS.ADMIN) {
let user
2021-03-09 03:49:19 +13:00
try {
user = await this.createUser(email, PASSWORD, roleId)
2021-03-09 03:49:19 +13:00
} catch (err) {
// allow errors here
}
return this.login(email, PASSWORD, { roleId, userId: user._id })
2021-03-09 03:49:19 +13:00
}
async createApp(appName) {
2021-03-04 23:05:50 +13:00
this.app = await this._req({ name: appName }, null, controllers.app.create)
this.appId = this.app._id
this.allApps.push(this.app)
return this.app
}
async updateTable(config = null) {
config = config || basicTable()
2021-03-04 23:05:50 +13:00
this.table = await this._req(config, null, controllers.table.save)
return this.table
}
async createTable(config = null) {
if (config != null && config._id) {
delete config._id
}
return this.updateTable(config)
}
2021-03-05 03:36:59 +13:00
async getTable(tableId = null) {
tableId = tableId || this.table._id
return this._req(null, { id: tableId }, controllers.table.find)
}
async createLinkedTable(relationshipType = null, links = ["link"]) {
2021-03-05 02:07:33 +13:00
if (!this.table) {
throw "Must have created a table first."
}
const tableConfig = basicTable()
tableConfig.primaryDisplay = "name"
for (let link of links) {
tableConfig.schema[link] = {
type: "link",
fieldName: link,
tableId: this.table._id,
name: link,
}
if (relationshipType) {
tableConfig.schema[link].relationshipType = relationshipType
}
}
2021-03-05 02:07:33 +13:00
const linkedTable = await this.createTable(tableConfig)
this.linkedTable = linkedTable
return linkedTable
}
async createAttachmentTable() {
const table = basicTable()
table.schema.attachment = {
type: "attachment",
}
return this.createTable(table)
}
async createRow(config = null) {
if (!this.table) {
throw "Test requires table to be configured."
}
const tableId = (config && config.tableId) || this.table._id
config = config || basicRow(tableId)
return this._req(config, { tableId }, controllers.row.save)
}
async getRow(tableId, rowId) {
return this._req(null, { tableId, rowId }, controllers.row.find)
}
async getRows(tableId) {
if (!tableId && this.table) {
tableId = this.table._id
}
return this._req(null, { tableId }, controllers.row.fetchTableRows)
}
async createRole(config = null) {
config = config || basicRole()
2021-03-04 23:05:50 +13:00
return this._req(config, null, controllers.role.save)
}
async addPermission(roleId, resourceId, level = "read") {
return this._req(
null,
{
roleId,
resourceId,
level,
},
2021-03-04 23:05:50 +13:00
controllers.perms.addPermission
)
}
async createView(config) {
if (!this.table) {
throw "Test requires table to be configured."
}
const view = config || {
map: "function(doc) { emit(doc[doc.key], doc._id); } ",
tableId: this.table._id,
name: "ViewTest",
}
2021-03-04 23:05:50 +13:00
return this._req(view, null, controllers.view.save)
}
2021-03-04 07:41:49 +13:00
async createAutomation(config) {
config = config || basicAutomation()
if (config._rev) {
delete config._rev
}
this.automation = (
2021-03-04 23:05:50 +13:00
await this._req(config, null, controllers.automation.create)
2021-03-04 07:41:49 +13:00
).automation
return this.automation
}
async getAllAutomations() {
2021-03-04 23:05:50 +13:00
return this._req(null, null, controllers.automation.fetch)
2021-03-04 07:41:49 +13:00
}
2021-03-04 23:05:50 +13:00
async deleteAutomation(automation = null) {
2021-03-04 07:41:49 +13:00
automation = automation || this.automation
if (!automation) {
return
}
return this._req(
null,
{ id: automation._id, rev: automation._rev },
2021-03-04 23:05:50 +13:00
controllers.automation.destroy
2021-03-04 07:41:49 +13:00
)
}
2021-03-04 23:05:50 +13:00
async createDatasource(config = null) {
config = config || basicDatasource()
this.datasource = await this._req(config, null, controllers.datasource.save)
return this.datasource
}
async createQuery(config = null) {
if (!this.datasource && !config) {
throw "No data source created for query."
}
config = config || basicQuery(this.datasource._id)
return this._req(config, null, controllers.query.save)
}
2021-03-09 03:49:19 +13:00
async createScreen(config = null) {
config = config || basicScreen()
return this._req(config, null, controllers.screen.save)
}
async createWebhook(config = null) {
if (!this.automation) {
throw "Must create an automation before creating webhook."
}
config = config || basicWebhook(this.automation._id)
return (await this._req(config, null, controllers.webhook.save)).webhook
}
async createLayout(config = null) {
config = config || basicLayout()
return await this._req(config, null, controllers.layout.save)
}
async createUser(
email = EMAIL,
password = PASSWORD,
roleId = BUILTIN_ROLE_IDS.POWER
) {
return this._req(
{
email,
password,
roleId,
},
null,
controllers.user.createMetadata
)
}
async login(email, password, { roleId, userId } = {}) {
if (!roleId) {
roleId = BUILTIN_ROLE_IDS.BUILDER
}
if (!this.request) {
throw "Server has not been opened, cannot login."
}
if (!email || !password) {
await this.createUser()
}
// have to fake this
const user = {
userId: userId || `us_uuid1`,
email: email || EMAIL,
}
const app = {
roleId: roleId,
appId: this.appId,
}
const authToken = jwt.sign(user, env.JWT_SECRET)
const appToken = jwt.sign(app, env.JWT_SECRET)
// returning necessary request headers
return {
Accept: "application/json",
Cookie: [
`${Cookies.Auth}=${authToken}`,
`${Cookies.CurrentApp}=${appToken}`,
],
2021-03-09 03:49:19 +13:00
"x-budibase-app-id": this.appId,
}
}
}
module.exports = TestConfiguration