Compare commits
No commits in common. "3e940c2db58bfbb6d03ae3b543ab8692c456acad" and "ed53627bbe6960c087c9a80dae67e3830c9d7915" have entirely different histories.
3e940c2db5
...
ed53627bbe
@ -28,7 +28,6 @@
|
|||||||
"class-validator": "^0.12.2",
|
"class-validator": "^0.12.2",
|
||||||
"class-validator-jsonschema": "^2.0.3",
|
"class-validator-jsonschema": "^2.0.3",
|
||||||
"consola": "^2.15.0",
|
"consola": "^2.15.0",
|
||||||
"cookie": "^0.4.1",
|
|
||||||
"cookie-parser": "^1.4.5",
|
"cookie-parser": "^1.4.5",
|
||||||
"cors": "^2.8.5",
|
"cors": "^2.8.5",
|
||||||
"csvtojson": "^2.0.10",
|
"csvtojson": "^2.0.10",
|
||||||
|
@ -1,72 +1,51 @@
|
|||||||
import cookie from "cookie";
|
|
||||||
import * as jwt from "jsonwebtoken";
|
import * as jwt from "jsonwebtoken";
|
||||||
import { Action } from "routing-controllers";
|
import { Action } from "routing-controllers";
|
||||||
import { getConnectionManager } from 'typeorm';
|
import { getConnectionManager } from 'typeorm';
|
||||||
import { config } from './config';
|
import { config } from './config';
|
||||||
import { IllegalJWTError, NoPermissionError, UserNonexistantOrRefreshtokenInvalidError } from './errors/AuthError';
|
import { IllegalJWTError, NoPermissionError, UserNonexistantOrRefreshtokenInvalidError } from './errors/AuthError';
|
||||||
import { JwtCreator, JwtUser } from './jwtcreator';
|
|
||||||
import { User } from './models/entities/User';
|
import { User } from './models/entities/User';
|
||||||
|
// -----------
|
||||||
/**
|
const authchecker = async (action: Action, permissions: string | string[]) => {
|
||||||
* Handels authorisation verification via jwt's for all api endpoints using the @Authorized decorator.
|
let required_permissions = undefined
|
||||||
* @param action Routing-Controllers action object that provides request and response objects among other stuff.
|
|
||||||
* @param permissions The permissions that the endpoint using @Authorized requires.
|
|
||||||
*/
|
|
||||||
const authchecker = async (action: Action, permissions: string[] | string) => {
|
|
||||||
let required_permissions = undefined;
|
|
||||||
if (typeof permissions === "string") {
|
if (typeof permissions === "string") {
|
||||||
required_permissions = [permissions]
|
required_permissions = [permissions]
|
||||||
} else {
|
} else {
|
||||||
required_permissions = permissions
|
required_permissions = permissions
|
||||||
}
|
}
|
||||||
|
// const token = action.request.headers["authorization"];
|
||||||
|
const provided_token = action.request.query["auth"];
|
||||||
let jwtPayload = undefined
|
let jwtPayload = undefined
|
||||||
try {
|
try {
|
||||||
let provided_token = "" + action.request.headers["authorization"].replace("Bearer ", "");
|
|
||||||
jwtPayload = <any>jwt.verify(provided_token, config.jwt_secret);
|
jwtPayload = <any>jwt.verify(provided_token, config.jwt_secret);
|
||||||
jwtPayload = jwtPayload["userdetails"];
|
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
jwtPayload = await refresh(action);
|
throw new IllegalJWTError()
|
||||||
}
|
}
|
||||||
|
const count = await getConnectionManager().get().getRepository(User).count({ id: jwtPayload["userdetails"]["id"], refreshTokenCount: jwtPayload["userdetails"]["refreshTokenCount"] })
|
||||||
const user = await getConnectionManager().get().getRepository(User).findOne({ id: jwtPayload["id"], refreshTokenCount: jwtPayload["refreshTokenCount"] }, { relations: ['permissions'] })
|
if (count !== 1) {
|
||||||
if (!user) { throw new UserNonexistantOrRefreshtokenInvalidError() }
|
throw new UserNonexistantOrRefreshtokenInvalidError()
|
||||||
if (!jwtPayload["permissions"]) { throw new NoPermissionError(); }
|
|
||||||
|
|
||||||
action.response.local = {}
|
|
||||||
action.response.local.jwtPayload = jwtPayload;
|
|
||||||
for (let required_permission of required_permissions) {
|
|
||||||
if (!(jwtPayload["permissions"].includes(required_permission))) { return false; }
|
|
||||||
}
|
}
|
||||||
return true;
|
if (jwtPayload.permissions) {
|
||||||
}
|
action.response.local = {}
|
||||||
|
action.response.local.jwtPayload = jwtPayload.permissions
|
||||||
/**
|
required_permissions.forEach(r => {
|
||||||
* Handels soft-refreshing of access-tokens.
|
const permission_key = r.split(":")[0]
|
||||||
* @param action Routing-Controllers action object that provides request and response objects among other stuff.
|
const actual_accesslevel_for_permission = jwtPayload.permissions[permission_key]
|
||||||
*/
|
const permission_access_level = r.split(":")[1]
|
||||||
const refresh = async (action: Action) => {
|
if (actual_accesslevel_for_permission.includes(permission_access_level)) {
|
||||||
let refresh_token = undefined;
|
return true;
|
||||||
|
} else {
|
||||||
|
throw new NoPermissionError()
|
||||||
|
}
|
||||||
|
});
|
||||||
|
} else {
|
||||||
|
throw new NoPermissionError()
|
||||||
|
}
|
||||||
|
//
|
||||||
try {
|
try {
|
||||||
refresh_token = cookie.parse(action.request.headers["cookie"])["lfk_backend__refresh_token"];
|
jwt.verify(provided_token, config.jwt_secret);
|
||||||
}
|
return true
|
||||||
catch {
|
|
||||||
throw new IllegalJWTError();
|
|
||||||
}
|
|
||||||
|
|
||||||
let jwtPayload = undefined;
|
|
||||||
try {
|
|
||||||
jwtPayload = <any>jwt.verify(refresh_token, config.jwt_secret);
|
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
throw new IllegalJWTError();
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
const user = await getConnectionManager().get().getRepository(User).findOne({ id: jwtPayload["id"], refreshTokenCount: jwtPayload["refreshTokenCount"] }, { relations: ['permissions', 'groups', 'groups.permissions'] })
|
|
||||||
if (!user) { throw new UserNonexistantOrRefreshtokenInvalidError() }
|
|
||||||
|
|
||||||
let newAccess = JwtCreator.createAccess(user);
|
|
||||||
action.response.header("authorization", "Bearer " + newAccess);
|
|
||||||
|
|
||||||
return await new JwtUser(user);
|
|
||||||
}
|
}
|
||||||
export default authchecker
|
export default authchecker
|
@ -1,5 +1,5 @@
|
|||||||
import csv from 'csvtojson';
|
import csv from 'csvtojson';
|
||||||
import { Authorized, Body, ContentType, Controller, Param, Post, QueryParam, Req, UseBefore } from 'routing-controllers';
|
import { Body, ContentType, Controller, Param, Post, QueryParam, Req, UseBefore } from 'routing-controllers';
|
||||||
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
||||||
import { RunnerGroupNeededError } from '../errors/RunnerErrors';
|
import { RunnerGroupNeededError } from '../errors/RunnerErrors';
|
||||||
import { RunnerGroupNotFoundError } from '../errors/RunnerGroupErrors';
|
import { RunnerGroupNotFoundError } from '../errors/RunnerGroupErrors';
|
||||||
@ -9,8 +9,7 @@ import { ResponseRunner } from '../models/responses/ResponseRunner';
|
|||||||
import { RunnerController } from './RunnerController';
|
import { RunnerController } from './RunnerController';
|
||||||
|
|
||||||
@Controller()
|
@Controller()
|
||||||
@Authorized(["RUNNER:IMPORT", "TEAM:IMPORT"])
|
//@Authorized("IMPORT:read")
|
||||||
@OpenAPI({ security: [{ "AuthToken": [] }] })
|
|
||||||
export class ImportController {
|
export class ImportController {
|
||||||
private runnerController: RunnerController;
|
private runnerController: RunnerController;
|
||||||
|
|
||||||
|
@ -1,118 +0,0 @@
|
|||||||
import { Authorized, Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put, QueryParam } from 'routing-controllers';
|
|
||||||
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
|
||||||
import { getConnectionManager, Repository } from 'typeorm';
|
|
||||||
import { PermissionIdsNotMatchingError, PermissionNeedsPrincipalError, PermissionNotFoundError } from '../errors/PermissionErrors';
|
|
||||||
import { PrincipalNotFoundError } from '../errors/PrincipalErrors';
|
|
||||||
import { CreatePermission } from '../models/actions/CreatePermission';
|
|
||||||
import { UpdatePermission } from '../models/actions/UpdatePermission';
|
|
||||||
import { Permission } from '../models/entities/Permission';
|
|
||||||
import { ResponseEmpty } from '../models/responses/ResponseEmpty';
|
|
||||||
import { ResponsePermission } from '../models/responses/ResponsePermission';
|
|
||||||
import { ResponsePrincipal } from '../models/responses/ResponsePrincipal';
|
|
||||||
|
|
||||||
|
|
||||||
@JsonController('/permissions')
|
|
||||||
@OpenAPI({ security: [{ "AuthToken": [] }] })
|
|
||||||
export class PermissionController {
|
|
||||||
private permissionRepository: Repository<Permission>;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Gets the repository of this controller's model/entity.
|
|
||||||
*/
|
|
||||||
constructor() {
|
|
||||||
this.permissionRepository = getConnectionManager().get().getRepository(Permission);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Get()
|
|
||||||
@Authorized("PERMISSION:GET")
|
|
||||||
@ResponseSchema(ResponsePermission, { isArray: true })
|
|
||||||
@OpenAPI({ description: 'Lists all permissions.' })
|
|
||||||
async getAll() {
|
|
||||||
let responsePermissions: ResponsePermission[] = new Array<ResponsePermission>();
|
|
||||||
const permissions = await this.permissionRepository.find({ relations: ['principal'] });
|
|
||||||
permissions.forEach(permission => {
|
|
||||||
responsePermissions.push(new ResponsePermission(permission));
|
|
||||||
});
|
|
||||||
return responsePermissions;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
@Get('/:id')
|
|
||||||
@Authorized("PERMISSION:GET")
|
|
||||||
@ResponseSchema(ResponsePermission)
|
|
||||||
@ResponseSchema(PermissionNotFoundError, { statusCode: 404 })
|
|
||||||
@OnUndefined(PermissionNotFoundError)
|
|
||||||
@OpenAPI({ description: 'Returns a permissions of a specified id (if it exists)' })
|
|
||||||
async getOne(@Param('id') id: number) {
|
|
||||||
let permission = await this.permissionRepository.findOne({ id: id }, { relations: ['principal'] });
|
|
||||||
if (!permission) { throw new PermissionNotFoundError(); }
|
|
||||||
return new ResponsePermission(permission);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
@Post()
|
|
||||||
@Authorized("PERMISSION:CREATE")
|
|
||||||
@ResponseSchema(ResponsePermission)
|
|
||||||
@ResponseSchema(PrincipalNotFoundError, { statusCode: 404 })
|
|
||||||
@OpenAPI({ description: 'Create a new runnerTeam object (id will be generated automagicly).' })
|
|
||||||
async post(@Body({ validate: true }) createPermission: CreatePermission) {
|
|
||||||
let permission;
|
|
||||||
try {
|
|
||||||
permission = await createPermission.toPermission();
|
|
||||||
} catch (error) {
|
|
||||||
throw error;
|
|
||||||
}
|
|
||||||
let existingPermission = await this.permissionRepository.findOne({ target: permission.target, action: permission.action, principal: permission.principal }, { relations: ['principal'] });
|
|
||||||
if (existingPermission) { return new ResponsePermission(existingPermission); }
|
|
||||||
|
|
||||||
permission = await this.permissionRepository.save(permission);
|
|
||||||
permission = await this.permissionRepository.findOne(permission, { relations: ['principal'] });
|
|
||||||
|
|
||||||
return new ResponsePermission(permission);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
@Put('/:id')
|
|
||||||
@Authorized("PERMISSION:UPDATE")
|
|
||||||
@ResponseSchema(ResponsePrincipal)
|
|
||||||
@ResponseSchema(PermissionNotFoundError, { statusCode: 404 })
|
|
||||||
@ResponseSchema(PrincipalNotFoundError, { statusCode: 404 })
|
|
||||||
@ResponseSchema(PermissionIdsNotMatchingError, { statusCode: 406 })
|
|
||||||
@ResponseSchema(PermissionNeedsPrincipalError, { statusCode: 406 })
|
|
||||||
@OpenAPI({ description: "Update a permission object (id can't be changed)." })
|
|
||||||
async put(@Param('id') id: number, @Body({ validate: true }) permission: UpdatePermission) {
|
|
||||||
let oldPermission = await this.permissionRepository.findOne({ id: id }, { relations: ['principal'] });
|
|
||||||
|
|
||||||
if (!oldPermission) {
|
|
||||||
throw new PermissionNotFoundError();
|
|
||||||
}
|
|
||||||
|
|
||||||
if (oldPermission.id != permission.id) {
|
|
||||||
throw new PermissionIdsNotMatchingError();
|
|
||||||
}
|
|
||||||
let existingPermission = await this.permissionRepository.findOne({ target: permission.target, action: permission.action, principal: permission.principal }, { relations: ['principal'] });
|
|
||||||
if (existingPermission) {
|
|
||||||
await this.remove(permission.id, true);
|
|
||||||
return new ResponsePermission(existingPermission);
|
|
||||||
}
|
|
||||||
|
|
||||||
await this.permissionRepository.update(oldPermission, await permission.toPermission());
|
|
||||||
|
|
||||||
return new ResponsePermission(await this.permissionRepository.findOne({ id: permission.id }, { relations: ['principal'] }));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Delete('/:id')
|
|
||||||
@Authorized("PERMISSION:DELETE")
|
|
||||||
@ResponseSchema(ResponsePermission)
|
|
||||||
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
|
||||||
@OnUndefined(204)
|
|
||||||
@OpenAPI({ description: 'Delete a specified permission (if it exists).' })
|
|
||||||
async remove(@Param("id") id: number, @QueryParam("force") force: boolean) {
|
|
||||||
let permission = await this.permissionRepository.findOne({ id: id }, { relations: ['principal'] });
|
|
||||||
if (!permission) { return null; }
|
|
||||||
|
|
||||||
const responsePermission = new ResponsePermission(permission);
|
|
||||||
await this.permissionRepository.delete(permission);
|
|
||||||
return responsePermission;
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,4 +1,4 @@
|
|||||||
import { Authorized, Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put, QueryParam } from 'routing-controllers';
|
import { Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put, QueryParam } from 'routing-controllers';
|
||||||
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
||||||
import { getConnectionManager, Repository } from 'typeorm';
|
import { getConnectionManager, Repository } from 'typeorm';
|
||||||
import { RunnerGroupNeededError, RunnerIdsNotMatchingError, RunnerNotFoundError } from '../errors/RunnerErrors';
|
import { RunnerGroupNeededError, RunnerIdsNotMatchingError, RunnerNotFoundError } from '../errors/RunnerErrors';
|
||||||
@ -10,7 +10,7 @@ import { ResponseEmpty } from '../models/responses/ResponseEmpty';
|
|||||||
import { ResponseRunner } from '../models/responses/ResponseRunner';
|
import { ResponseRunner } from '../models/responses/ResponseRunner';
|
||||||
|
|
||||||
@JsonController('/runners')
|
@JsonController('/runners')
|
||||||
@OpenAPI({ security: [{ "AuthToken": [] }] })
|
//@Authorized('RUNNERS:read')
|
||||||
export class RunnerController {
|
export class RunnerController {
|
||||||
private runnerRepository: Repository<Runner>;
|
private runnerRepository: Repository<Runner>;
|
||||||
|
|
||||||
@ -22,7 +22,6 @@ export class RunnerController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Get()
|
@Get()
|
||||||
@Authorized("RUNNER:GET")
|
|
||||||
@ResponseSchema(ResponseRunner, { isArray: true })
|
@ResponseSchema(ResponseRunner, { isArray: true })
|
||||||
@OpenAPI({ description: 'Lists all runners.' })
|
@OpenAPI({ description: 'Lists all runners.' })
|
||||||
async getAll() {
|
async getAll() {
|
||||||
@ -35,7 +34,6 @@ export class RunnerController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Get('/:id')
|
@Get('/:id')
|
||||||
@Authorized("RUNNER:GET")
|
|
||||||
@ResponseSchema(ResponseRunner)
|
@ResponseSchema(ResponseRunner)
|
||||||
@ResponseSchema(RunnerNotFoundError, { statusCode: 404 })
|
@ResponseSchema(RunnerNotFoundError, { statusCode: 404 })
|
||||||
@OnUndefined(RunnerNotFoundError)
|
@OnUndefined(RunnerNotFoundError)
|
||||||
@ -47,7 +45,6 @@ export class RunnerController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Post()
|
@Post()
|
||||||
@Authorized("RUNNER:CREATE")
|
|
||||||
@ResponseSchema(ResponseRunner)
|
@ResponseSchema(ResponseRunner)
|
||||||
@ResponseSchema(RunnerGroupNeededError)
|
@ResponseSchema(RunnerGroupNeededError)
|
||||||
@ResponseSchema(RunnerGroupNotFoundError)
|
@ResponseSchema(RunnerGroupNotFoundError)
|
||||||
@ -65,7 +62,6 @@ export class RunnerController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Put('/:id')
|
@Put('/:id')
|
||||||
@Authorized("RUNNER:UPDATE")
|
|
||||||
@ResponseSchema(ResponseRunner)
|
@ResponseSchema(ResponseRunner)
|
||||||
@ResponseSchema(RunnerNotFoundError, { statusCode: 404 })
|
@ResponseSchema(RunnerNotFoundError, { statusCode: 404 })
|
||||||
@ResponseSchema(RunnerIdsNotMatchingError, { statusCode: 406 })
|
@ResponseSchema(RunnerIdsNotMatchingError, { statusCode: 406 })
|
||||||
@ -86,7 +82,6 @@ export class RunnerController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Delete('/:id')
|
@Delete('/:id')
|
||||||
@Authorized("RUNNER:DELETE")
|
|
||||||
@ResponseSchema(ResponseRunner)
|
@ResponseSchema(ResponseRunner)
|
||||||
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
||||||
@OnUndefined(204)
|
@OnUndefined(204)
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
import { Authorized, Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put, QueryParam } from 'routing-controllers';
|
import { Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put, QueryParam } from 'routing-controllers';
|
||||||
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
||||||
import { getConnectionManager, Repository } from 'typeorm';
|
import { getConnectionManager, Repository } from 'typeorm';
|
||||||
import { EntityFromBody } from 'typeorm-routing-controllers-extensions';
|
import { EntityFromBody } from 'typeorm-routing-controllers-extensions';
|
||||||
@ -12,7 +12,7 @@ import { RunnerTeamController } from './RunnerTeamController';
|
|||||||
|
|
||||||
|
|
||||||
@JsonController('/organisations')
|
@JsonController('/organisations')
|
||||||
@OpenAPI({ security: [{ "AuthToken": [] }] })
|
//@Authorized('RUNNERS:read')
|
||||||
export class RunnerOrganisationController {
|
export class RunnerOrganisationController {
|
||||||
private runnerOrganisationRepository: Repository<RunnerOrganisation>;
|
private runnerOrganisationRepository: Repository<RunnerOrganisation>;
|
||||||
|
|
||||||
@ -24,7 +24,6 @@ export class RunnerOrganisationController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Get()
|
@Get()
|
||||||
@Authorized("ORGANISATION:GET")
|
|
||||||
@ResponseSchema(ResponseRunnerOrganisation, { isArray: true })
|
@ResponseSchema(ResponseRunnerOrganisation, { isArray: true })
|
||||||
@OpenAPI({ description: 'Lists all runnerOrganisations.' })
|
@OpenAPI({ description: 'Lists all runnerOrganisations.' })
|
||||||
async getAll() {
|
async getAll() {
|
||||||
@ -37,7 +36,6 @@ export class RunnerOrganisationController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Get('/:id')
|
@Get('/:id')
|
||||||
@Authorized("ORGANISATION:GET")
|
|
||||||
@ResponseSchema(ResponseRunnerOrganisation)
|
@ResponseSchema(ResponseRunnerOrganisation)
|
||||||
@ResponseSchema(RunnerOrganisationNotFoundError, { statusCode: 404 })
|
@ResponseSchema(RunnerOrganisationNotFoundError, { statusCode: 404 })
|
||||||
@OnUndefined(RunnerOrganisationNotFoundError)
|
@OnUndefined(RunnerOrganisationNotFoundError)
|
||||||
@ -49,7 +47,6 @@ export class RunnerOrganisationController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Post()
|
@Post()
|
||||||
@Authorized("ORGANISATION:CREATE")
|
|
||||||
@ResponseSchema(ResponseRunnerOrganisation)
|
@ResponseSchema(ResponseRunnerOrganisation)
|
||||||
@OpenAPI({ description: 'Create a new runnerOrganisation object (id will be generated automagicly).' })
|
@OpenAPI({ description: 'Create a new runnerOrganisation object (id will be generated automagicly).' })
|
||||||
async post(@Body({ validate: true }) createRunnerOrganisation: CreateRunnerOrganisation) {
|
async post(@Body({ validate: true }) createRunnerOrganisation: CreateRunnerOrganisation) {
|
||||||
@ -66,7 +63,6 @@ export class RunnerOrganisationController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Put('/:id')
|
@Put('/:id')
|
||||||
@Authorized("ORGANISATION:UPDATE")
|
|
||||||
@ResponseSchema(ResponseRunnerOrganisation)
|
@ResponseSchema(ResponseRunnerOrganisation)
|
||||||
@ResponseSchema(RunnerOrganisationNotFoundError, { statusCode: 404 })
|
@ResponseSchema(RunnerOrganisationNotFoundError, { statusCode: 404 })
|
||||||
@ResponseSchema(RunnerOrganisationIdsNotMatchingError, { statusCode: 406 })
|
@ResponseSchema(RunnerOrganisationIdsNotMatchingError, { statusCode: 406 })
|
||||||
@ -89,7 +85,6 @@ export class RunnerOrganisationController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Delete('/:id')
|
@Delete('/:id')
|
||||||
@Authorized("ORGANISATION:DELETE")
|
|
||||||
@ResponseSchema(ResponseRunnerOrganisation)
|
@ResponseSchema(ResponseRunnerOrganisation)
|
||||||
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
||||||
@ResponseSchema(RunnerOrganisationHasTeamsError, { statusCode: 406 })
|
@ResponseSchema(RunnerOrganisationHasTeamsError, { statusCode: 406 })
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
import { Authorized, Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put, QueryParam } from 'routing-controllers';
|
import { Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put, QueryParam } from 'routing-controllers';
|
||||||
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
||||||
import { getConnectionManager, Repository } from 'typeorm';
|
import { getConnectionManager, Repository } from 'typeorm';
|
||||||
import { RunnerTeamHasRunnersError, RunnerTeamIdsNotMatchingError, RunnerTeamNotFoundError } from '../errors/RunnerTeamErrors';
|
import { RunnerTeamHasRunnersError, RunnerTeamIdsNotMatchingError, RunnerTeamNotFoundError } from '../errors/RunnerTeamErrors';
|
||||||
@ -11,7 +11,7 @@ import { RunnerController } from './RunnerController';
|
|||||||
|
|
||||||
|
|
||||||
@JsonController('/teams')
|
@JsonController('/teams')
|
||||||
@OpenAPI({ security: [{ "AuthToken": [] }] })
|
//@Authorized('RUNNERS:read')
|
||||||
export class RunnerTeamController {
|
export class RunnerTeamController {
|
||||||
private runnerTeamRepository: Repository<RunnerTeam>;
|
private runnerTeamRepository: Repository<RunnerTeam>;
|
||||||
|
|
||||||
@ -23,7 +23,6 @@ export class RunnerTeamController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Get()
|
@Get()
|
||||||
@Authorized("TEAM:GET")
|
|
||||||
@ResponseSchema(ResponseRunnerTeam, { isArray: true })
|
@ResponseSchema(ResponseRunnerTeam, { isArray: true })
|
||||||
@OpenAPI({ description: 'Lists all runnerTeams.' })
|
@OpenAPI({ description: 'Lists all runnerTeams.' })
|
||||||
async getAll() {
|
async getAll() {
|
||||||
@ -36,7 +35,6 @@ export class RunnerTeamController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Get('/:id')
|
@Get('/:id')
|
||||||
@Authorized("TEAM:GET")
|
|
||||||
@ResponseSchema(ResponseRunnerTeam)
|
@ResponseSchema(ResponseRunnerTeam)
|
||||||
@ResponseSchema(RunnerTeamNotFoundError, { statusCode: 404 })
|
@ResponseSchema(RunnerTeamNotFoundError, { statusCode: 404 })
|
||||||
@OnUndefined(RunnerTeamNotFoundError)
|
@OnUndefined(RunnerTeamNotFoundError)
|
||||||
@ -48,7 +46,6 @@ export class RunnerTeamController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Post()
|
@Post()
|
||||||
@Authorized("TEAM:CREATE")
|
|
||||||
@ResponseSchema(ResponseRunnerTeam)
|
@ResponseSchema(ResponseRunnerTeam)
|
||||||
@OpenAPI({ description: 'Create a new runnerTeam object (id will be generated automagicly).' })
|
@OpenAPI({ description: 'Create a new runnerTeam object (id will be generated automagicly).' })
|
||||||
async post(@Body({ validate: true }) createRunnerTeam: CreateRunnerTeam) {
|
async post(@Body({ validate: true }) createRunnerTeam: CreateRunnerTeam) {
|
||||||
@ -66,7 +63,6 @@ export class RunnerTeamController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Put('/:id')
|
@Put('/:id')
|
||||||
@Authorized("TEAM:UPDATE")
|
|
||||||
@ResponseSchema(ResponseRunnerTeam)
|
@ResponseSchema(ResponseRunnerTeam)
|
||||||
@ResponseSchema(RunnerTeamNotFoundError, { statusCode: 404 })
|
@ResponseSchema(RunnerTeamNotFoundError, { statusCode: 404 })
|
||||||
@ResponseSchema(RunnerTeamIdsNotMatchingError, { statusCode: 406 })
|
@ResponseSchema(RunnerTeamIdsNotMatchingError, { statusCode: 406 })
|
||||||
@ -88,7 +84,6 @@ export class RunnerTeamController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Delete('/:id')
|
@Delete('/:id')
|
||||||
@Authorized("TEAM:DELETE")
|
|
||||||
@ResponseSchema(ResponseRunnerTeam)
|
@ResponseSchema(ResponseRunnerTeam)
|
||||||
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
||||||
@ResponseSchema(RunnerTeamHasRunnersError, { statusCode: 406 })
|
@ResponseSchema(RunnerTeamHasRunnersError, { statusCode: 406 })
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
import { Authorized, Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put } from 'routing-controllers';
|
import { Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put } from 'routing-controllers';
|
||||||
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
||||||
import { getConnectionManager, Repository } from 'typeorm';
|
import { getConnectionManager, Repository } from 'typeorm';
|
||||||
import { EntityFromBody } from 'typeorm-routing-controllers-extensions';
|
import { EntityFromBody } from 'typeorm-routing-controllers-extensions';
|
||||||
@ -9,7 +9,7 @@ import { ResponseEmpty } from '../models/responses/ResponseEmpty';
|
|||||||
import { ResponseTrack } from '../models/responses/ResponseTrack';
|
import { ResponseTrack } from '../models/responses/ResponseTrack';
|
||||||
|
|
||||||
@JsonController('/tracks')
|
@JsonController('/tracks')
|
||||||
@OpenAPI({ security: [{ "AuthToken": [] }] })
|
//@Authorized("TRACKS:read")
|
||||||
export class TrackController {
|
export class TrackController {
|
||||||
private trackRepository: Repository<Track>;
|
private trackRepository: Repository<Track>;
|
||||||
|
|
||||||
@ -21,8 +21,8 @@ export class TrackController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Get()
|
@Get()
|
||||||
@Authorized("TRACK:GET")
|
|
||||||
@ResponseSchema(ResponseTrack, { isArray: true })
|
@ResponseSchema(ResponseTrack, { isArray: true })
|
||||||
|
@OpenAPI({ description: "Lists all tracks." })
|
||||||
async getAll() {
|
async getAll() {
|
||||||
let responseTracks: ResponseTrack[] = new Array<ResponseTrack>();
|
let responseTracks: ResponseTrack[] = new Array<ResponseTrack>();
|
||||||
const tracks = await this.trackRepository.find();
|
const tracks = await this.trackRepository.find();
|
||||||
@ -33,7 +33,6 @@ export class TrackController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Get('/:id')
|
@Get('/:id')
|
||||||
@Authorized("TRACK:GET")
|
|
||||||
@ResponseSchema(ResponseTrack)
|
@ResponseSchema(ResponseTrack)
|
||||||
@ResponseSchema(TrackNotFoundError, { statusCode: 404 })
|
@ResponseSchema(TrackNotFoundError, { statusCode: 404 })
|
||||||
@OnUndefined(TrackNotFoundError)
|
@OnUndefined(TrackNotFoundError)
|
||||||
@ -45,7 +44,6 @@ export class TrackController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Post()
|
@Post()
|
||||||
@Authorized("TRACK:CREATE")
|
|
||||||
@ResponseSchema(ResponseTrack)
|
@ResponseSchema(ResponseTrack)
|
||||||
@OpenAPI({ description: "Create a new track object (id will be generated automagicly)." })
|
@OpenAPI({ description: "Create a new track object (id will be generated automagicly)." })
|
||||||
async post(
|
async post(
|
||||||
@ -56,7 +54,6 @@ export class TrackController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Put('/:id')
|
@Put('/:id')
|
||||||
@Authorized("TRACK:UPDATE")
|
|
||||||
@ResponseSchema(ResponseTrack)
|
@ResponseSchema(ResponseTrack)
|
||||||
@ResponseSchema(TrackNotFoundError, { statusCode: 404 })
|
@ResponseSchema(TrackNotFoundError, { statusCode: 404 })
|
||||||
@ResponseSchema(TrackIdsNotMatchingError, { statusCode: 406 })
|
@ResponseSchema(TrackIdsNotMatchingError, { statusCode: 406 })
|
||||||
@ -77,7 +74,6 @@ export class TrackController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Delete('/:id')
|
@Delete('/:id')
|
||||||
@Authorized("TRACK:DELETE")
|
|
||||||
@ResponseSchema(ResponseTrack)
|
@ResponseSchema(ResponseTrack)
|
||||||
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
||||||
@OnUndefined(204)
|
@OnUndefined(204)
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
import { Authorized, Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put, QueryParam } from 'routing-controllers';
|
import { Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put } from 'routing-controllers';
|
||||||
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
||||||
import { getConnectionManager, Repository } from 'typeorm';
|
import { getConnectionManager, Repository } from 'typeorm';
|
||||||
import { EntityFromBody } from 'typeorm-routing-controllers-extensions';
|
import { EntityFromBody } from 'typeorm-routing-controllers-extensions';
|
||||||
@ -7,12 +7,9 @@ import { UserGroupNotFoundError } from '../errors/UserGroupErrors';
|
|||||||
import { CreateUser } from '../models/actions/CreateUser';
|
import { CreateUser } from '../models/actions/CreateUser';
|
||||||
import { User } from '../models/entities/User';
|
import { User } from '../models/entities/User';
|
||||||
import { ResponseEmpty } from '../models/responses/ResponseEmpty';
|
import { ResponseEmpty } from '../models/responses/ResponseEmpty';
|
||||||
import { ResponseUser } from '../models/responses/ResponseUser';
|
|
||||||
import { PermissionController } from './PermissionController';
|
|
||||||
|
|
||||||
|
|
||||||
@JsonController('/users')
|
@JsonController('/users')
|
||||||
@OpenAPI({ security: [{ "AuthToken": [] }] })
|
|
||||||
export class UserController {
|
export class UserController {
|
||||||
private userRepository: Repository<User>;
|
private userRepository: Repository<User>;
|
||||||
|
|
||||||
@ -24,32 +21,22 @@ export class UserController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Get()
|
@Get()
|
||||||
@Authorized("USER:GET")
|
|
||||||
@ResponseSchema(User, { isArray: true })
|
@ResponseSchema(User, { isArray: true })
|
||||||
@OpenAPI({ description: 'Lists all users.' })
|
@OpenAPI({ description: 'Lists all users.' })
|
||||||
async getAll() {
|
getAll() {
|
||||||
let responseUsers: ResponseUser[] = new Array<ResponseUser>();
|
return this.userRepository.find();
|
||||||
const users = await this.userRepository.find({ relations: ['permissions', 'groups'] });
|
|
||||||
users.forEach(user => {
|
|
||||||
responseUsers.push(new ResponseUser(user));
|
|
||||||
});
|
|
||||||
return responseUsers;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Get('/:id')
|
@Get('/:id')
|
||||||
@Authorized("USER:GET")
|
|
||||||
@ResponseSchema(User)
|
@ResponseSchema(User)
|
||||||
@ResponseSchema(UserNotFoundError, { statusCode: 404 })
|
@ResponseSchema(UserNotFoundError, { statusCode: 404 })
|
||||||
@OnUndefined(UserNotFoundError)
|
@OnUndefined(UserNotFoundError)
|
||||||
@OpenAPI({ description: 'Returns a user of a specified id (if it exists)' })
|
@OpenAPI({ description: 'Returns a user of a specified id (if it exists)' })
|
||||||
async getOne(@Param('id') id: number) {
|
getOne(@Param('id') id: number) {
|
||||||
let user = await this.userRepository.findOne({ id: id }, { relations: ['permissions', 'groups'] })
|
return this.userRepository.findOne({ id: id });
|
||||||
if (!user) { throw new UserNotFoundError(); }
|
|
||||||
return new ResponseUser(user);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post()
|
@Post()
|
||||||
@Authorized("USER:CREATE")
|
|
||||||
@ResponseSchema(User)
|
@ResponseSchema(User)
|
||||||
@ResponseSchema(UserGroupNotFoundError)
|
@ResponseSchema(UserGroupNotFoundError)
|
||||||
@OpenAPI({ description: 'Create a new user object (id will be generated automagicly).' })
|
@OpenAPI({ description: 'Create a new user object (id will be generated automagicly).' })
|
||||||
@ -61,18 +48,16 @@ export class UserController {
|
|||||||
throw error;
|
throw error;
|
||||||
}
|
}
|
||||||
|
|
||||||
user = await this.userRepository.save(user)
|
return this.userRepository.save(user);
|
||||||
return new ResponseUser(await this.userRepository.findOne(user, { relations: ['permissions', 'groups'] }));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Put('/:id')
|
@Put('/:id')
|
||||||
@Authorized("USER:UPDATE")
|
|
||||||
@ResponseSchema(User)
|
@ResponseSchema(User)
|
||||||
@ResponseSchema(UserNotFoundError, { statusCode: 404 })
|
@ResponseSchema(UserNotFoundError, { statusCode: 404 })
|
||||||
@ResponseSchema(UserIdsNotMatchingError, { statusCode: 406 })
|
@ResponseSchema(UserIdsNotMatchingError, { statusCode: 406 })
|
||||||
@OpenAPI({ description: "Update a user object (id can't be changed)." })
|
@OpenAPI({ description: "Update a user object (id can't be changed)." })
|
||||||
async put(@Param('id') id: number, @EntityFromBody() user: User) {
|
async put(@Param('id') id: number, @EntityFromBody() user: User) {
|
||||||
let oldUser = await this.userRepository.findOne({ id: id }, { relations: ['permissions', 'groups'] });
|
let oldUser = await this.userRepository.findOne({ id: id });
|
||||||
|
|
||||||
if (!oldUser) {
|
if (!oldUser) {
|
||||||
throw new UserNotFoundError();
|
throw new UserNotFoundError();
|
||||||
@ -83,26 +68,21 @@ export class UserController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
await this.userRepository.update(oldUser, user);
|
await this.userRepository.update(oldUser, user);
|
||||||
return new ResponseUser(await this.userRepository.findOne({ id: id }, { relations: ['permissions', 'groups'] }));
|
return user;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Delete('/:id')
|
@Delete('/:id')
|
||||||
@Authorized("USER:DELETE")
|
|
||||||
@ResponseSchema(User)
|
@ResponseSchema(User)
|
||||||
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
||||||
@OnUndefined(204)
|
@OnUndefined(204)
|
||||||
@OpenAPI({ description: 'Delete a specified runner (if it exists).' })
|
@OpenAPI({ description: 'Delete a specified runner (if it exists).' })
|
||||||
async remove(@Param("id") id: number, @QueryParam("force") force: boolean) {
|
async remove(@Param("id") id: number) {
|
||||||
let user = await this.userRepository.findOne({ id: id });
|
let user = await this.userRepository.findOne({ id: id });
|
||||||
if (!user) { return null; }
|
if (!user) {
|
||||||
const responseUser = await this.userRepository.findOne({ id: id }, { relations: ['permissions', 'groups'] });;
|
return null;
|
||||||
|
|
||||||
const permissionControler = new PermissionController();
|
|
||||||
for (let permission of responseUser.permissions) {
|
|
||||||
await permissionControler.remove(permission.id, true);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
await this.userRepository.delete(user);
|
await this.userRepository.delete(user);
|
||||||
return new ResponseUser(responseUser);
|
return user;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
import { Authorized, Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put, QueryParam } from 'routing-controllers';
|
import { Body, Delete, Get, JsonController, OnUndefined, Param, Post, Put } from 'routing-controllers';
|
||||||
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
||||||
import { getConnectionManager, Repository } from 'typeorm';
|
import { getConnectionManager, Repository } from 'typeorm';
|
||||||
import { EntityFromBody } from 'typeorm-routing-controllers-extensions';
|
import { EntityFromBody } from 'typeorm-routing-controllers-extensions';
|
||||||
@ -6,12 +6,9 @@ import { UserGroupIdsNotMatchingError, UserGroupNotFoundError } from '../errors/
|
|||||||
import { CreateUserGroup } from '../models/actions/CreateUserGroup';
|
import { CreateUserGroup } from '../models/actions/CreateUserGroup';
|
||||||
import { UserGroup } from '../models/entities/UserGroup';
|
import { UserGroup } from '../models/entities/UserGroup';
|
||||||
import { ResponseEmpty } from '../models/responses/ResponseEmpty';
|
import { ResponseEmpty } from '../models/responses/ResponseEmpty';
|
||||||
import { ResponseUserGroup } from '../models/responses/ResponseUserGroup';
|
|
||||||
import { PermissionController } from './PermissionController';
|
|
||||||
|
|
||||||
|
|
||||||
@JsonController('/usergroups')
|
@JsonController('/usergroups')
|
||||||
@OpenAPI({ security: [{ "AuthToken": [] }] })
|
|
||||||
export class UserGroupController {
|
export class UserGroupController {
|
||||||
private userGroupsRepository: Repository<UserGroup>;
|
private userGroupsRepository: Repository<UserGroup>;
|
||||||
|
|
||||||
@ -23,7 +20,6 @@ export class UserGroupController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Get()
|
@Get()
|
||||||
@Authorized("USERGROUP:GET")
|
|
||||||
@ResponseSchema(UserGroup, { isArray: true })
|
@ResponseSchema(UserGroup, { isArray: true })
|
||||||
@OpenAPI({ description: 'Lists all usergroups.' })
|
@OpenAPI({ description: 'Lists all usergroups.' })
|
||||||
getAll() {
|
getAll() {
|
||||||
@ -31,7 +27,6 @@ export class UserGroupController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Get('/:id')
|
@Get('/:id')
|
||||||
@Authorized("USERGROUP:GET")
|
|
||||||
@ResponseSchema(UserGroup)
|
@ResponseSchema(UserGroup)
|
||||||
@ResponseSchema(UserGroupNotFoundError, { statusCode: 404 })
|
@ResponseSchema(UserGroupNotFoundError, { statusCode: 404 })
|
||||||
@OnUndefined(UserGroupNotFoundError)
|
@OnUndefined(UserGroupNotFoundError)
|
||||||
@ -41,7 +36,6 @@ export class UserGroupController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Post()
|
@Post()
|
||||||
@Authorized("USERGROUP:CREATE")
|
|
||||||
@ResponseSchema(UserGroup)
|
@ResponseSchema(UserGroup)
|
||||||
@ResponseSchema(UserGroupNotFoundError)
|
@ResponseSchema(UserGroupNotFoundError)
|
||||||
@OpenAPI({ description: 'Create a new usergroup object (id will be generated automagicly).' })
|
@OpenAPI({ description: 'Create a new usergroup object (id will be generated automagicly).' })
|
||||||
@ -57,7 +51,6 @@ export class UserGroupController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Put('/:id')
|
@Put('/:id')
|
||||||
@Authorized("USERGROUP:UPDATE")
|
|
||||||
@ResponseSchema(UserGroup)
|
@ResponseSchema(UserGroup)
|
||||||
@ResponseSchema(UserGroupNotFoundError, { statusCode: 404 })
|
@ResponseSchema(UserGroupNotFoundError, { statusCode: 404 })
|
||||||
@ResponseSchema(UserGroupIdsNotMatchingError, { statusCode: 406 })
|
@ResponseSchema(UserGroupIdsNotMatchingError, { statusCode: 406 })
|
||||||
@ -78,22 +71,17 @@ export class UserGroupController {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Delete('/:id')
|
@Delete('/:id')
|
||||||
@Authorized("USERGROUP:DELETE")
|
@ResponseSchema(UserGroup)
|
||||||
@ResponseSchema(ResponseUserGroup)
|
|
||||||
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
@ResponseSchema(ResponseEmpty, { statusCode: 204 })
|
||||||
@OnUndefined(204)
|
@OnUndefined(204)
|
||||||
@OpenAPI({ description: 'Delete a specified usergroup (if it exists).' })
|
@OpenAPI({ description: 'Delete a specified usergroup (if it exists).' })
|
||||||
async remove(@Param("id") id: number, @QueryParam("force") force: boolean) {
|
async remove(@Param("id") id: number) {
|
||||||
let group = await this.userGroupsRepository.findOne({ id: id });
|
let group = await this.userGroupsRepository.findOne({ id: id });
|
||||||
if (!group) { return null; }
|
if (!group) {
|
||||||
const responseGroup = await this.userGroupsRepository.findOne({ id: id }, { relations: ['permissions'] });;
|
return null;
|
||||||
|
|
||||||
const permissionControler = new PermissionController();
|
|
||||||
for (let permission of responseGroup.permissions) {
|
|
||||||
await permissionControler.remove(permission.id, true);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
await this.userGroupsRepository.delete(group);
|
await this.userGroupsRepository.delete(group);
|
||||||
return new ResponseUserGroup(responseGroup);
|
return group;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,36 +0,0 @@
|
|||||||
import { IsString } from 'class-validator';
|
|
||||||
import { NotAcceptableError, NotFoundError } from 'routing-controllers';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Error to throw when a permission couldn't be found.
|
|
||||||
*/
|
|
||||||
export class PermissionNotFoundError extends NotFoundError {
|
|
||||||
@IsString()
|
|
||||||
name = "PermissionNotFoundError"
|
|
||||||
|
|
||||||
@IsString()
|
|
||||||
message = "Permission not found!"
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Error to throw when two permission' ids don't match.
|
|
||||||
* Usually occurs when a user tries to change a permission's id.
|
|
||||||
*/
|
|
||||||
export class PermissionIdsNotMatchingError extends NotAcceptableError {
|
|
||||||
@IsString()
|
|
||||||
name = "PermissionIdsNotMatchingError"
|
|
||||||
|
|
||||||
@IsString()
|
|
||||||
message = "The id's don't match!! \n And if you wanted to change a permission's id: This isn't allowed"
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Error to throw when a permission get's provided without a principal.
|
|
||||||
*/
|
|
||||||
export class PermissionNeedsPrincipalError extends NotAcceptableError {
|
|
||||||
@IsString()
|
|
||||||
name = "PermissionNeedsPrincipalError"
|
|
||||||
|
|
||||||
@IsString()
|
|
||||||
message = "You provided no principal for this permission."
|
|
||||||
}
|
|
@ -1,24 +0,0 @@
|
|||||||
import { IsString } from 'class-validator';
|
|
||||||
import { NotAcceptableError, NotFoundError } from 'routing-controllers';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Error to throw when a user couldn't be found.
|
|
||||||
*/
|
|
||||||
export class PrincipalNotFoundError extends NotFoundError {
|
|
||||||
@IsString()
|
|
||||||
name = "PrincipalNotFoundError"
|
|
||||||
|
|
||||||
@IsString()
|
|
||||||
message = "Principal not found!"
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Error to throw, when a provided runnerOrganisation doesn't belong to the accepted types.
|
|
||||||
*/
|
|
||||||
export class PrincipalWrongTypeError extends NotAcceptableError {
|
|
||||||
@IsString()
|
|
||||||
name = "PrincipalWrongTypeError"
|
|
||||||
|
|
||||||
@IsString()
|
|
||||||
message = "The princial must have an existing principal's id. \n You provided a object of another type."
|
|
||||||
}
|
|
@ -1,114 +0,0 @@
|
|||||||
import { IsBoolean, IsEmail, IsInt, IsNotEmpty, IsOptional, IsString, IsUUID } from 'class-validator';
|
|
||||||
import * as jsonwebtoken from "jsonwebtoken";
|
|
||||||
import { config } from './config';
|
|
||||||
import { User } from './models/entities/User';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class is responsible for all things JWT creation.
|
|
||||||
*/
|
|
||||||
export class JwtCreator {
|
|
||||||
/**
|
|
||||||
* Creates a new refresh token for a given user
|
|
||||||
* @param user User entity that the refresh token shall be created for
|
|
||||||
* @param expiry_timestamp Timestamp for the token expiry. Will be generated if not provided.
|
|
||||||
*/
|
|
||||||
public static createRefresh(user: User, expiry_timestamp?: number) {
|
|
||||||
if (!expiry_timestamp) { expiry_timestamp = Math.floor(Date.now() / 1000) + 10 * 36000; }
|
|
||||||
return jsonwebtoken.sign({
|
|
||||||
refreshTokenCount: user.refreshTokenCount,
|
|
||||||
id: user.id,
|
|
||||||
exp: expiry_timestamp
|
|
||||||
}, config.jwt_secret)
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates a new access token for a given user
|
|
||||||
* @param user User entity that the access token shall be created for
|
|
||||||
* @param expiry_timestamp Timestamp for the token expiry. Will be generated if not provided.
|
|
||||||
*/
|
|
||||||
public static createAccess(user: User, expiry_timestamp?: number) {
|
|
||||||
if (!expiry_timestamp) { expiry_timestamp = Math.floor(Date.now() / 1000) + 10 * 36000; }
|
|
||||||
return jsonwebtoken.sign({
|
|
||||||
userdetails: new JwtUser(user),
|
|
||||||
exp: expiry_timestamp
|
|
||||||
}, config.jwt_secret)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Special variant of the user class that
|
|
||||||
*/
|
|
||||||
export class JwtUser {
|
|
||||||
@IsInt()
|
|
||||||
id: number;
|
|
||||||
|
|
||||||
@IsUUID(4)
|
|
||||||
uuid: string;
|
|
||||||
|
|
||||||
@IsOptional()
|
|
||||||
@IsEmail()
|
|
||||||
email?: string;
|
|
||||||
|
|
||||||
@IsOptional()
|
|
||||||
@IsString()
|
|
||||||
username?: string;
|
|
||||||
|
|
||||||
@IsString()
|
|
||||||
@IsNotEmpty()
|
|
||||||
firstname: string;
|
|
||||||
|
|
||||||
@IsString()
|
|
||||||
@IsOptional()
|
|
||||||
middlename?: string;
|
|
||||||
|
|
||||||
@IsString()
|
|
||||||
@IsNotEmpty()
|
|
||||||
lastname: string;
|
|
||||||
|
|
||||||
permissions: string[];
|
|
||||||
|
|
||||||
@IsBoolean()
|
|
||||||
enabled: boolean;
|
|
||||||
|
|
||||||
@IsInt()
|
|
||||||
@IsNotEmpty()
|
|
||||||
refreshTokenCount?: number;
|
|
||||||
|
|
||||||
@IsString()
|
|
||||||
@IsOptional()
|
|
||||||
profilePic?: string;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates a new instance of this class based on a provided user entity.
|
|
||||||
* @param user User entity that shall be encapsulated in a jwt.
|
|
||||||
*/
|
|
||||||
public constructor(user: User) {
|
|
||||||
this.id = user.id;
|
|
||||||
this.firstname = user.firstname;
|
|
||||||
this.middlename = user.middlename;
|
|
||||||
this.lastname = user.lastname;
|
|
||||||
this.username = user.username;
|
|
||||||
this.email = user.email;
|
|
||||||
this.refreshTokenCount = user.refreshTokenCount;
|
|
||||||
this.uuid = user.uuid;
|
|
||||||
this.profilePic = user.profilePic;
|
|
||||||
this.permissions = this.getPermissions(user);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Handels getting the permissions granted to this user (direct or indirect).
|
|
||||||
* @param user User which's permissions shall be gotten.
|
|
||||||
*/
|
|
||||||
public getPermissions(user: User): string[] {
|
|
||||||
let returnPermissions: string[] = new Array<string>();
|
|
||||||
for (let permission of user.permissions) {
|
|
||||||
returnPermissions.push(permission.toString());
|
|
||||||
}
|
|
||||||
for (let group of user.groups) {
|
|
||||||
for (let permission of group.permissions) {
|
|
||||||
returnPermissions.push(permission.toString());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return Array.from(new Set(returnPermissions));
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,9 +1,10 @@
|
|||||||
import * as argon2 from "argon2";
|
import * as argon2 from "argon2";
|
||||||
import { IsEmail, IsOptional, IsString } from 'class-validator';
|
import { IsEmail, IsOptional, IsString } from 'class-validator';
|
||||||
|
import * as jsonwebtoken from 'jsonwebtoken';
|
||||||
import { getConnectionManager } from 'typeorm';
|
import { getConnectionManager } from 'typeorm';
|
||||||
|
import { config } from '../../config';
|
||||||
import { InvalidCredentialsError, PasswordNeededError, UserNotFoundError } from '../../errors/AuthError';
|
import { InvalidCredentialsError, PasswordNeededError, UserNotFoundError } from '../../errors/AuthError';
|
||||||
import { UsernameOrEmailNeededError } from '../../errors/UserErrors';
|
import { UsernameOrEmailNeededError } from '../../errors/UserErrors';
|
||||||
import { JwtCreator } from '../../jwtcreator';
|
|
||||||
import { User } from '../entities/User';
|
import { User } from '../entities/User';
|
||||||
import { Auth } from '../responses/ResponseAuth';
|
import { Auth } from '../responses/ResponseAuth';
|
||||||
|
|
||||||
@ -25,24 +26,34 @@ export class CreateAuth {
|
|||||||
throw new UsernameOrEmailNeededError();
|
throw new UsernameOrEmailNeededError();
|
||||||
}
|
}
|
||||||
if (!this.password) {
|
if (!this.password) {
|
||||||
throw new PasswordNeededError();
|
throw new PasswordNeededError()
|
||||||
}
|
}
|
||||||
const found_user = await getConnectionManager().get().getRepository(User).findOne({ relations: ['groups', 'permissions', 'groups.permissions'], where: [{ username: this.username }, { email: this.email }] });
|
const found_users = await getConnectionManager().get().getRepository(User).find({ relations: ['groups', 'permissions'], where: [{ username: this.username }, { email: this.email }] });
|
||||||
if (!found_user) {
|
if (found_users.length === 0) {
|
||||||
throw new UserNotFoundError();
|
throw new UserNotFoundError()
|
||||||
|
} else {
|
||||||
|
const found_user = found_users[0]
|
||||||
|
if (await argon2.verify(found_user.password, this.password + found_user.uuid)) {
|
||||||
|
const timestamp_accesstoken_expiry = Math.floor(Date.now() / 1000) + 5 * 60
|
||||||
|
found_user.permissions = found_user.permissions || []
|
||||||
|
delete found_user.password;
|
||||||
|
newAuth.access_token = jsonwebtoken.sign({
|
||||||
|
userdetails: found_user,
|
||||||
|
exp: timestamp_accesstoken_expiry
|
||||||
|
}, config.jwt_secret)
|
||||||
|
newAuth.access_token_expires_at = timestamp_accesstoken_expiry
|
||||||
|
//
|
||||||
|
const timestamp_refresh_expiry = Math.floor(Date.now() / 1000) + 10 * 36000
|
||||||
|
newAuth.refresh_token = jsonwebtoken.sign({
|
||||||
|
refreshtokencount: found_user.refreshTokenCount,
|
||||||
|
userid: found_user.id,
|
||||||
|
exp: timestamp_refresh_expiry
|
||||||
|
}, config.jwt_secret)
|
||||||
|
newAuth.refresh_token_expires_at = timestamp_refresh_expiry
|
||||||
|
} else {
|
||||||
|
throw new InvalidCredentialsError()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if (!(await argon2.verify(found_user.password, this.password + found_user.uuid))) {
|
|
||||||
throw new InvalidCredentialsError();
|
|
||||||
}
|
|
||||||
|
|
||||||
//Create the access token
|
|
||||||
const timestamp_accesstoken_expiry = Math.floor(Date.now() / 1000) + 5 * 60
|
|
||||||
newAuth.access_token = JwtCreator.createAccess(found_user, timestamp_accesstoken_expiry);
|
|
||||||
newAuth.access_token_expires_at = timestamp_accesstoken_expiry
|
|
||||||
//Create the refresh token
|
|
||||||
const timestamp_refresh_expiry = Math.floor(Date.now() / 1000) + 10 * 36000
|
|
||||||
newAuth.refresh_token = JwtCreator.createRefresh(found_user, timestamp_refresh_expiry);
|
|
||||||
newAuth.refresh_token_expires_at = timestamp_refresh_expiry
|
|
||||||
return newAuth;
|
return newAuth;
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,57 +0,0 @@
|
|||||||
import {
|
|
||||||
IsEnum,
|
|
||||||
IsInt,
|
|
||||||
IsNotEmpty
|
|
||||||
} from "class-validator";
|
|
||||||
import { getConnectionManager } from 'typeorm';
|
|
||||||
import { PrincipalNotFoundError } from '../../errors/PrincipalErrors';
|
|
||||||
import { Permission } from '../entities/Permission';
|
|
||||||
import { Principal } from '../entities/Principal';
|
|
||||||
import { PermissionAction } from '../enums/PermissionAction';
|
|
||||||
import { PermissionTarget } from '../enums/PermissionTargets';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Defines a track of given length.
|
|
||||||
*/
|
|
||||||
export class CreatePermission {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The permissions's principal's id.
|
|
||||||
*/
|
|
||||||
@IsInt()
|
|
||||||
@IsNotEmpty()
|
|
||||||
principal: number;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The permissions's target.
|
|
||||||
*/
|
|
||||||
@IsNotEmpty()
|
|
||||||
@IsEnum(PermissionTarget)
|
|
||||||
target: PermissionTarget;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The permissions's action.
|
|
||||||
*/
|
|
||||||
@IsNotEmpty()
|
|
||||||
@IsEnum(PermissionAction)
|
|
||||||
action: PermissionAction;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Converts a Permission object based on this.
|
|
||||||
*/
|
|
||||||
public async toPermission(): Promise<Permission> {
|
|
||||||
let newPermission: Permission = new Permission();
|
|
||||||
|
|
||||||
newPermission.principal = await this.getPrincipal();
|
|
||||||
newPermission.target = this.target;
|
|
||||||
newPermission.action = this.action;
|
|
||||||
|
|
||||||
return newPermission;
|
|
||||||
}
|
|
||||||
|
|
||||||
public async getPrincipal(): Promise<Principal> {
|
|
||||||
let principal = await getConnectionManager().get().getRepository(Principal).findOne({ id: this.principal })
|
|
||||||
if (!principal) { throw new PrincipalNotFoundError(); }
|
|
||||||
return principal;
|
|
||||||
}
|
|
||||||
}
|
|
@ -67,7 +67,7 @@ export class CreateUser {
|
|||||||
* Optional.
|
* Optional.
|
||||||
*/
|
*/
|
||||||
@IsOptional()
|
@IsOptional()
|
||||||
group?: number[] | number
|
groupId?: number[] | number
|
||||||
|
|
||||||
//TODO: ProfilePics
|
//TODO: ProfilePics
|
||||||
|
|
||||||
@ -81,6 +81,30 @@ export class CreateUser {
|
|||||||
throw new UsernameOrEmailNeededError();
|
throw new UsernameOrEmailNeededError();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (this.groupId) {
|
||||||
|
if (!Array.isArray(this.groupId)) {
|
||||||
|
this.groupId = [this.groupId]
|
||||||
|
}
|
||||||
|
const groupIDs: number[] = this.groupId
|
||||||
|
let errors = 0
|
||||||
|
const validateusergroups = async () => {
|
||||||
|
let foundgroups = []
|
||||||
|
for (const g of groupIDs) {
|
||||||
|
const found = await getConnectionManager().get().getRepository(UserGroup).find({ id: g });
|
||||||
|
if (found.length === 0) {
|
||||||
|
errors++
|
||||||
|
} else {
|
||||||
|
foundgroups.push(found[0])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
newUser.groups = foundgroups
|
||||||
|
}
|
||||||
|
await validateusergroups()
|
||||||
|
if (errors !== 0) {
|
||||||
|
throw new UserGroupNotFoundError();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
newUser.email = this.email
|
newUser.email = this.email
|
||||||
newUser.username = this.username
|
newUser.username = this.username
|
||||||
newUser.firstname = this.firstname
|
newUser.firstname = this.firstname
|
||||||
@ -89,23 +113,8 @@ export class CreateUser {
|
|||||||
newUser.uuid = uuid.v4()
|
newUser.uuid = uuid.v4()
|
||||||
newUser.phone = this.phone
|
newUser.phone = this.phone
|
||||||
newUser.password = await argon2.hash(this.password + newUser.uuid);
|
newUser.password = await argon2.hash(this.password + newUser.uuid);
|
||||||
newUser.groups = await this.getGroups();
|
|
||||||
//TODO: ProfilePics
|
//TODO: ProfilePics
|
||||||
|
|
||||||
return newUser;
|
return newUser;
|
||||||
}
|
}
|
||||||
|
|
||||||
public async getGroups() {
|
|
||||||
if (!this.group) { return null; }
|
|
||||||
let groups = new Array<UserGroup>();
|
|
||||||
if (!Array.isArray(this.group)) {
|
|
||||||
this.group = [this.group]
|
|
||||||
}
|
|
||||||
for (let group of this.group) {
|
|
||||||
let found = await getConnectionManager().get().getRepository(UserGroup).findOne({ id: group });
|
|
||||||
if (!found) { throw new UserGroupNotFoundError(); }
|
|
||||||
groups.push(found);
|
|
||||||
}
|
|
||||||
return groups;
|
|
||||||
}
|
|
||||||
}
|
}
|
@ -23,11 +23,11 @@ export class HandleLogout {
|
|||||||
throw new IllegalJWTError()
|
throw new IllegalJWTError()
|
||||||
}
|
}
|
||||||
logout.timestamp = Math.floor(Date.now() / 1000)
|
logout.timestamp = Math.floor(Date.now() / 1000)
|
||||||
let found_user: User = await getConnectionManager().get().getRepository(User).findOne({ id: decoded["id"] });
|
let found_user: User = await getConnectionManager().get().getRepository(User).findOne({ id: decoded["userid"] });
|
||||||
if (!found_user) {
|
if (!found_user) {
|
||||||
throw new UserNotFoundError()
|
throw new UserNotFoundError()
|
||||||
}
|
}
|
||||||
if (found_user.refreshTokenCount !== decoded["refreshTokenCount"]) {
|
if (found_user.refreshTokenCount !== decoded["refreshtokencount"]) {
|
||||||
throw new RefreshTokenCountInvalidError()
|
throw new RefreshTokenCountInvalidError()
|
||||||
}
|
}
|
||||||
found_user.refreshTokenCount++;
|
found_user.refreshTokenCount++;
|
||||||
|
@ -3,7 +3,6 @@ import * as jsonwebtoken from 'jsonwebtoken';
|
|||||||
import { getConnectionManager } from 'typeorm';
|
import { getConnectionManager } from 'typeorm';
|
||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
import { IllegalJWTError, JwtNotProvidedError, RefreshTokenCountInvalidError, UserNotFoundError } from '../../errors/AuthError';
|
import { IllegalJWTError, JwtNotProvidedError, RefreshTokenCountInvalidError, UserNotFoundError } from '../../errors/AuthError';
|
||||||
import { JwtCreator } from "../../jwtcreator";
|
|
||||||
import { User } from '../entities/User';
|
import { User } from '../entities/User';
|
||||||
import { Auth } from '../responses/ResponseAuth';
|
import { Auth } from '../responses/ResponseAuth';
|
||||||
|
|
||||||
@ -23,21 +22,31 @@ export class RefreshAuth {
|
|||||||
} catch (error) {
|
} catch (error) {
|
||||||
throw new IllegalJWTError()
|
throw new IllegalJWTError()
|
||||||
}
|
}
|
||||||
const found_user = await getConnectionManager().get().getRepository(User).findOne({ id: decoded["id"] }, { relations: ['groups', 'permissions', 'groups.permissions'] });
|
const found_user = await getConnectionManager().get().getRepository(User).findOne({ id: decoded["userid"] }, { relations: ['groups', 'permissions'] });
|
||||||
if (!found_user) {
|
if (!found_user) {
|
||||||
throw new UserNotFoundError()
|
throw new UserNotFoundError()
|
||||||
}
|
}
|
||||||
if (found_user.refreshTokenCount !== decoded["refreshTokenCount"]) {
|
if (found_user.refreshTokenCount !== decoded["refreshtokencount"]) {
|
||||||
throw new RefreshTokenCountInvalidError()
|
throw new RefreshTokenCountInvalidError()
|
||||||
}
|
}
|
||||||
//Create the auth token
|
found_user.permissions = found_user.permissions || []
|
||||||
|
delete found_user.password;
|
||||||
const timestamp_accesstoken_expiry = Math.floor(Date.now() / 1000) + 5 * 60
|
const timestamp_accesstoken_expiry = Math.floor(Date.now() / 1000) + 5 * 60
|
||||||
newAuth.access_token = JwtCreator.createAccess(found_user, timestamp_accesstoken_expiry);
|
delete found_user.password;
|
||||||
|
newAuth.access_token = jsonwebtoken.sign({
|
||||||
|
userdetails: found_user,
|
||||||
|
exp: timestamp_accesstoken_expiry
|
||||||
|
}, config.jwt_secret)
|
||||||
newAuth.access_token_expires_at = timestamp_accesstoken_expiry
|
newAuth.access_token_expires_at = timestamp_accesstoken_expiry
|
||||||
//Create the refresh token
|
//
|
||||||
const timestamp_refresh_expiry = Math.floor(Date.now() / 1000) + 10 * 36000
|
const timestamp_refresh_expiry = Math.floor(Date.now() / 1000) + 10 * 36000
|
||||||
newAuth.refresh_token = JwtCreator.createRefresh(found_user, timestamp_refresh_expiry);
|
newAuth.refresh_token = jsonwebtoken.sign({
|
||||||
newAuth.refresh_token_expires_at = timestamp_refresh_expiry;
|
refreshtokencount: found_user.refreshTokenCount,
|
||||||
|
userid: found_user.id,
|
||||||
|
exp: timestamp_refresh_expiry
|
||||||
|
}, config.jwt_secret)
|
||||||
|
newAuth.refresh_token_expires_at = timestamp_refresh_expiry
|
||||||
|
|
||||||
return newAuth;
|
return newAuth;
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,65 +0,0 @@
|
|||||||
import { IsInt, IsNotEmpty, IsObject } from 'class-validator';
|
|
||||||
import { getConnectionManager } from 'typeorm';
|
|
||||||
import { PermissionNeedsPrincipalError } from '../../errors/PermissionErrors';
|
|
||||||
import { PrincipalNotFoundError, PrincipalWrongTypeError } from '../../errors/PrincipalErrors';
|
|
||||||
import { Permission } from '../entities/Permission';
|
|
||||||
import { Principal } from '../entities/Principal';
|
|
||||||
import { PermissionAction } from '../enums/PermissionAction';
|
|
||||||
import { PermissionTarget } from '../enums/PermissionTargets';
|
|
||||||
|
|
||||||
export class UpdatePermission {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The updated runner's id.
|
|
||||||
*/
|
|
||||||
@IsInt()
|
|
||||||
id: number;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The permissions's principal's id.
|
|
||||||
*/
|
|
||||||
@IsObject()
|
|
||||||
@IsNotEmpty()
|
|
||||||
principal: Principal;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The permissions's target.
|
|
||||||
*/
|
|
||||||
@IsNotEmpty()
|
|
||||||
target: PermissionTarget;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The permissions's action.
|
|
||||||
*/
|
|
||||||
@IsNotEmpty()
|
|
||||||
action: PermissionAction;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Converts a Permission object based on this.
|
|
||||||
*/
|
|
||||||
public async toPermission(): Promise<Permission> {
|
|
||||||
let newPermission: Permission = new Permission();
|
|
||||||
|
|
||||||
newPermission.principal = await this.getPrincipal();
|
|
||||||
newPermission.target = this.target;
|
|
||||||
newPermission.action = this.action;
|
|
||||||
|
|
||||||
return newPermission;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Manages all the different ways a group can be provided.
|
|
||||||
*/
|
|
||||||
public async getPrincipal(): Promise<Principal> {
|
|
||||||
if (this.principal === undefined) {
|
|
||||||
throw new PermissionNeedsPrincipalError();
|
|
||||||
}
|
|
||||||
if (!isNaN(this.principal.id)) {
|
|
||||||
let principal = await getConnectionManager().get().getRepository(Principal).findOne({ id: this.principal.id });
|
|
||||||
if (!principal) { throw new PrincipalNotFoundError(); }
|
|
||||||
return principal;
|
|
||||||
}
|
|
||||||
|
|
||||||
throw new PrincipalWrongTypeError();
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,17 +1,17 @@
|
|||||||
import {
|
import {
|
||||||
IsEnum,
|
|
||||||
IsInt,
|
IsInt,
|
||||||
IsNotEmpty
|
IsNotEmpty,
|
||||||
|
|
||||||
|
IsString
|
||||||
} from "class-validator";
|
} from "class-validator";
|
||||||
import { Column, Entity, ManyToOne, PrimaryGeneratedColumn } from "typeorm";
|
import { Column, Entity, OneToMany, PrimaryGeneratedColumn } from "typeorm";
|
||||||
import { PermissionAction } from '../enums/PermissionAction';
|
import { User } from './User';
|
||||||
import { PermissionTarget } from '../enums/PermissionTargets';
|
import { UserGroup } from './UserGroup';
|
||||||
import { Principal } from './Principal';
|
|
||||||
/**
|
/**
|
||||||
* Defines the Permission interface.
|
* Defines the Permission interface.
|
||||||
*/
|
*/
|
||||||
@Entity()
|
@Entity()
|
||||||
export class Permission {
|
export abstract class Permission {
|
||||||
/**
|
/**
|
||||||
* Autogenerated unique id (primary key).
|
* Autogenerated unique id (primary key).
|
||||||
*/
|
*/
|
||||||
@ -20,30 +20,30 @@ export class Permission {
|
|||||||
id: number;
|
id: number;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The permissions principal
|
* users
|
||||||
*/
|
*/
|
||||||
@ManyToOne(() => Principal, principal => principal.permissions)
|
@OneToMany(() => User, user => user.permissions, { nullable: true })
|
||||||
principal: Principal;
|
users: User[]
|
||||||
|
|
||||||
|
/**
|
||||||
|
* groups
|
||||||
|
*/
|
||||||
|
@OneToMany(() => UserGroup, group => group.permissions, { nullable: true })
|
||||||
|
groups: UserGroup[]
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The target
|
* The target
|
||||||
*/
|
*/
|
||||||
@Column({ type: 'varchar' })
|
@Column()
|
||||||
@IsNotEmpty()
|
@IsNotEmpty()
|
||||||
@IsEnum(PermissionTarget)
|
@IsString()
|
||||||
target: PermissionTarget;
|
target: string;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The action type
|
* The action type
|
||||||
*/
|
*/
|
||||||
@Column({ type: 'varchar' })
|
@Column()
|
||||||
@IsEnum(PermissionAction)
|
@IsNotEmpty()
|
||||||
action: PermissionAction;
|
@IsString()
|
||||||
|
action: string;
|
||||||
/**
|
|
||||||
* Turn this into a string for exporting (and jwts).
|
|
||||||
*/
|
|
||||||
public toString(): string {
|
|
||||||
return this.target + ":" + this.action;
|
|
||||||
}
|
|
||||||
}
|
}
|
@ -1,26 +0,0 @@
|
|||||||
import { IsInt } from 'class-validator';
|
|
||||||
import { Entity, OneToMany, PrimaryGeneratedColumn, TableInheritance } from 'typeorm';
|
|
||||||
import { ResponsePrincipal } from '../responses/ResponsePrincipal';
|
|
||||||
import { Permission } from './Permission';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Defines a admin user.
|
|
||||||
*/
|
|
||||||
@Entity()
|
|
||||||
@TableInheritance({ column: { name: "type", type: "varchar" } })
|
|
||||||
export abstract class Principal {
|
|
||||||
/**
|
|
||||||
* autogenerated unique id (primary key).
|
|
||||||
*/
|
|
||||||
@PrimaryGeneratedColumn()
|
|
||||||
@IsInt()
|
|
||||||
id: number;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* permissions
|
|
||||||
*/
|
|
||||||
@OneToMany(() => Permission, permission => permission.principal, { nullable: true })
|
|
||||||
permissions: Permission[];
|
|
||||||
|
|
||||||
public abstract toResponse(): ResponsePrincipal;
|
|
||||||
}
|
|
@ -1,17 +1,22 @@
|
|||||||
import { IsBoolean, IsEmail, IsInt, IsNotEmpty, IsOptional, IsPhoneNumber, IsString, IsUUID } from "class-validator";
|
import { IsBoolean, IsEmail, IsInt, IsNotEmpty, IsOptional, IsPhoneNumber, IsString, IsUUID } from "class-validator";
|
||||||
import { ChildEntity, Column, JoinTable, ManyToMany, OneToMany } from "typeorm";
|
import { Column, Entity, JoinTable, ManyToMany, ManyToOne, OneToMany, PrimaryGeneratedColumn } from "typeorm";
|
||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
import { ResponsePrincipal } from '../responses/ResponsePrincipal';
|
import { Permission } from './Permission';
|
||||||
import { ResponseUser } from '../responses/ResponseUser';
|
|
||||||
import { Principal } from './Principal';
|
|
||||||
import { UserAction } from './UserAction';
|
import { UserAction } from './UserAction';
|
||||||
import { UserGroup } from './UserGroup';
|
import { UserGroup } from './UserGroup';
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Defines a admin user.
|
* Defines a admin user.
|
||||||
*/
|
*/
|
||||||
@ChildEntity()
|
@Entity()
|
||||||
export class User extends Principal {
|
export class User {
|
||||||
|
/**
|
||||||
|
* autogenerated unique id (primary key).
|
||||||
|
*/
|
||||||
|
@PrimaryGeneratedColumn()
|
||||||
|
@IsInt()
|
||||||
|
id: number;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* uuid
|
* uuid
|
||||||
*/
|
*/
|
||||||
@ -73,6 +78,13 @@ export class User extends Principal {
|
|||||||
@IsNotEmpty()
|
@IsNotEmpty()
|
||||||
password: string;
|
password: string;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* permissions
|
||||||
|
*/
|
||||||
|
@IsOptional()
|
||||||
|
@ManyToOne(() => Permission, permission => permission.users, { nullable: true })
|
||||||
|
permissions?: Permission[];
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* groups
|
* groups
|
||||||
*/
|
*/
|
||||||
@ -111,9 +123,20 @@ export class User extends Principal {
|
|||||||
actions: UserAction[]
|
actions: UserAction[]
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Turn this into a response.
|
* calculate all permissions
|
||||||
*/
|
*/
|
||||||
public toResponse(): ResponsePrincipal {
|
public get calc_permissions(): Permission[] {
|
||||||
return new ResponseUser(this);
|
let final_permissions = []
|
||||||
|
this.groups.forEach((permission) => {
|
||||||
|
if (!final_permissions.includes(permission)) {
|
||||||
|
final_permissions.push(permission)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
this.permissions.forEach((permission) => {
|
||||||
|
if (!final_permissions.includes(permission)) {
|
||||||
|
final_permissions.push(permission)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
return final_permissions
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,18 +1,29 @@
|
|||||||
import {
|
import {
|
||||||
|
IsInt,
|
||||||
IsNotEmpty,
|
IsNotEmpty,
|
||||||
IsOptional,
|
IsOptional,
|
||||||
IsString
|
IsString
|
||||||
} from "class-validator";
|
} from "class-validator";
|
||||||
import { ChildEntity, Column } from "typeorm";
|
import { Column, Entity, ManyToOne, PrimaryGeneratedColumn } from "typeorm";
|
||||||
import { ResponsePrincipal } from '../responses/ResponsePrincipal';
|
import { Permission } from "./Permission";
|
||||||
import { ResponseUserGroup } from '../responses/ResponseUserGroup';
|
|
||||||
import { Principal } from './Principal';
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Defines the UserGroup interface.
|
* Defines the UserGroup interface.
|
||||||
*/
|
*/
|
||||||
@ChildEntity()
|
@Entity()
|
||||||
export class UserGroup extends Principal {
|
export class UserGroup {
|
||||||
|
/**
|
||||||
|
* Autogenerated unique id (primary key).
|
||||||
|
*/
|
||||||
|
@PrimaryGeneratedColumn()
|
||||||
|
@IsInt()
|
||||||
|
id: number;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* permissions
|
||||||
|
*/
|
||||||
|
@ManyToOne(() => Permission, permission => permission.groups, { nullable: true })
|
||||||
|
permissions: Permission[];
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The group's name
|
* The group's name
|
||||||
@ -29,8 +40,4 @@ export class UserGroup extends Principal {
|
|||||||
@IsOptional()
|
@IsOptional()
|
||||||
@IsString()
|
@IsString()
|
||||||
description?: string;
|
description?: string;
|
||||||
|
|
||||||
public toResponse(): ResponsePrincipal {
|
|
||||||
return new ResponseUserGroup(this);
|
|
||||||
}
|
|
||||||
}
|
}
|
@ -1,7 +0,0 @@
|
|||||||
export enum PermissionAction {
|
|
||||||
GET = 'GET',
|
|
||||||
CREATE = 'CREATE',
|
|
||||||
UPDATE = 'UPDATE',
|
|
||||||
DELETE = 'DELETE',
|
|
||||||
IMPORT = 'IMPORT'
|
|
||||||
}
|
|
@ -1,9 +0,0 @@
|
|||||||
export enum PermissionTarget {
|
|
||||||
RUNNER = 'RUNNER',
|
|
||||||
ORGANISATION = 'ORGANISATION',
|
|
||||||
TEAM = 'TEAM',
|
|
||||||
TRACK = 'TRACK',
|
|
||||||
USER = 'USER',
|
|
||||||
GROUP = 'USERGROUP',
|
|
||||||
PERMISSION = 'PERMISSION'
|
|
||||||
}
|
|
@ -15,7 +15,7 @@ export abstract class ResponseParticipant {
|
|||||||
* Autogenerated unique id (primary key).
|
* Autogenerated unique id (primary key).
|
||||||
*/
|
*/
|
||||||
@IsInt()
|
@IsInt()
|
||||||
id: number;
|
id: number;;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The participant's first name.
|
* The participant's first name.
|
||||||
|
@ -1,49 +0,0 @@
|
|||||||
import {
|
|
||||||
IsEnum,
|
|
||||||
IsInt,
|
|
||||||
IsNotEmpty,
|
|
||||||
IsObject
|
|
||||||
} from "class-validator";
|
|
||||||
import { Permission } from '../entities/Permission';
|
|
||||||
import { PermissionAction } from '../enums/PermissionAction';
|
|
||||||
import { PermissionTarget } from '../enums/PermissionTargets';
|
|
||||||
import { ResponsePrincipal } from './ResponsePrincipal';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Defines a track of given length.
|
|
||||||
*/
|
|
||||||
export class ResponsePermission {
|
|
||||||
/**
|
|
||||||
* Autogenerated unique id (primary key).
|
|
||||||
*/
|
|
||||||
@IsInt()
|
|
||||||
id: number;;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The permissions's principal.
|
|
||||||
*/
|
|
||||||
@IsObject()
|
|
||||||
@IsNotEmpty()
|
|
||||||
principal: ResponsePrincipal;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The permissions's target.
|
|
||||||
*/
|
|
||||||
@IsNotEmpty()
|
|
||||||
@IsEnum(PermissionTarget)
|
|
||||||
target: PermissionTarget;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The permissions's action.
|
|
||||||
*/
|
|
||||||
@IsNotEmpty()
|
|
||||||
@IsEnum(PermissionAction)
|
|
||||||
action: PermissionAction;
|
|
||||||
|
|
||||||
public constructor(permission: Permission) {
|
|
||||||
this.id = permission.id;
|
|
||||||
this.principal = permission.principal.toResponse();
|
|
||||||
this.target = permission.target;
|
|
||||||
this.action = permission.action;
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,20 +0,0 @@
|
|||||||
import {
|
|
||||||
IsInt
|
|
||||||
} from "class-validator";
|
|
||||||
import { Principal } from '../entities/Principal';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Defines Principal's response class.
|
|
||||||
*/
|
|
||||||
export abstract class ResponsePrincipal {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Autogenerated unique id (primary key).
|
|
||||||
*/
|
|
||||||
@IsInt()
|
|
||||||
id: number;
|
|
||||||
|
|
||||||
public constructor(principal: Principal) {
|
|
||||||
this.id = principal.id;
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,89 +0,0 @@
|
|||||||
import {
|
|
||||||
IsArray,
|
|
||||||
IsBoolean,
|
|
||||||
|
|
||||||
IsOptional,
|
|
||||||
IsString
|
|
||||||
} from "class-validator";
|
|
||||||
import { Permission } from '../entities/Permission';
|
|
||||||
import { User } from '../entities/User';
|
|
||||||
import { UserGroup } from '../entities/UserGroup';
|
|
||||||
import { ResponsePrincipal } from './ResponsePrincipal';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Defines a user response.
|
|
||||||
*/
|
|
||||||
export class ResponseUser extends ResponsePrincipal {
|
|
||||||
/**
|
|
||||||
* The user's first name.
|
|
||||||
*/
|
|
||||||
@IsString()
|
|
||||||
firstname: string;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The user's middle name.
|
|
||||||
* Optional.
|
|
||||||
*/
|
|
||||||
@IsString()
|
|
||||||
middlename?: string;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The user's last name.
|
|
||||||
*/
|
|
||||||
@IsString()
|
|
||||||
lastname: string;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The user's phone number.
|
|
||||||
* Optional.
|
|
||||||
*/
|
|
||||||
@IsString()
|
|
||||||
phone?: string;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The user's e-mail address.
|
|
||||||
* Optional.
|
|
||||||
*/
|
|
||||||
@IsString()
|
|
||||||
email?: string;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* is user enabled?
|
|
||||||
*/
|
|
||||||
@IsBoolean()
|
|
||||||
enabled: boolean = true;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* profilepic
|
|
||||||
*/
|
|
||||||
@IsString()
|
|
||||||
@IsOptional()
|
|
||||||
profilePic?: string;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Groups
|
|
||||||
*/
|
|
||||||
@IsArray()
|
|
||||||
@IsOptional()
|
|
||||||
groups: UserGroup[];
|
|
||||||
|
|
||||||
/**
|
|
||||||
* permissions
|
|
||||||
*/
|
|
||||||
@IsArray()
|
|
||||||
@IsOptional()
|
|
||||||
permissions: Permission[];
|
|
||||||
|
|
||||||
public constructor(user: User) {
|
|
||||||
super(user);
|
|
||||||
this.firstname = user.firstname;
|
|
||||||
this.middlename = user.middlename;
|
|
||||||
this.lastname = user.lastname;
|
|
||||||
this.phone = user.phone;
|
|
||||||
this.email = user.email;
|
|
||||||
this.enabled = user.enabled;
|
|
||||||
this.profilePic = user.profilePic;
|
|
||||||
this.groups = user.groups;
|
|
||||||
this.permissions = user.permissions;
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,45 +0,0 @@
|
|||||||
import {
|
|
||||||
IsArray,
|
|
||||||
|
|
||||||
|
|
||||||
IsNotEmpty,
|
|
||||||
|
|
||||||
IsOptional,
|
|
||||||
IsString
|
|
||||||
} from "class-validator";
|
|
||||||
import { Permission } from '../entities/Permission';
|
|
||||||
import { UserGroup } from '../entities/UserGroup';
|
|
||||||
import { ResponsePrincipal } from './ResponsePrincipal';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Defines a user response.
|
|
||||||
*/
|
|
||||||
export class ResponseUserGroup extends ResponsePrincipal {
|
|
||||||
/**
|
|
||||||
* The group's name
|
|
||||||
*/
|
|
||||||
@IsNotEmpty()
|
|
||||||
@IsString()
|
|
||||||
name: string;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The group's description
|
|
||||||
*/
|
|
||||||
@IsOptional()
|
|
||||||
@IsString()
|
|
||||||
description?: string;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* permissions
|
|
||||||
*/
|
|
||||||
@IsArray()
|
|
||||||
@IsOptional()
|
|
||||||
permissions: Permission[];
|
|
||||||
|
|
||||||
public constructor(group: UserGroup) {
|
|
||||||
super(group);
|
|
||||||
this.name = group.name;
|
|
||||||
this.description = group.description;
|
|
||||||
this.permissions = group.permissions;
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,48 +1,20 @@
|
|||||||
import { Connection } from 'typeorm';
|
import { Connection } from 'typeorm';
|
||||||
import { Factory, Seeder } from 'typeorm-seeding';
|
import { Factory, Seeder } from 'typeorm-seeding';
|
||||||
import { CreatePermission } from '../models/actions/CreatePermission';
|
|
||||||
import { CreateUser } from '../models/actions/CreateUser';
|
import { CreateUser } from '../models/actions/CreateUser';
|
||||||
import { CreateUserGroup } from '../models/actions/CreateUserGroup';
|
|
||||||
import { Permission } from '../models/entities/Permission';
|
|
||||||
import { User } from '../models/entities/User';
|
import { User } from '../models/entities/User';
|
||||||
import { UserGroup } from '../models/entities/UserGroup';
|
|
||||||
import { PermissionAction } from '../models/enums/PermissionAction';
|
|
||||||
import { PermissionTarget } from '../models/enums/PermissionTargets';
|
|
||||||
|
|
||||||
export default class SeedUsers implements Seeder {
|
export default class SeedUsers implements Seeder {
|
||||||
public async run(factory: Factory, connection: Connection): Promise<any> {
|
public async run(factory: Factory, connection: Connection): Promise<any> {
|
||||||
let adminGroup: UserGroup = await this.createAdminGroup(connection);
|
|
||||||
await this.createUser(connection, adminGroup.id);
|
|
||||||
await this.createPermissions(connection, adminGroup.id);
|
|
||||||
}
|
|
||||||
|
|
||||||
public async createAdminGroup(connection: Connection) {
|
|
||||||
let adminGroup = new CreateUserGroup();
|
|
||||||
adminGroup.name = "ADMINS";
|
|
||||||
adminGroup.description = "Has all possible permissions";
|
|
||||||
return await connection.getRepository(UserGroup).save(await adminGroup.toUserGroup());
|
|
||||||
}
|
|
||||||
|
|
||||||
public async createUser(connection: Connection, group: number) {
|
|
||||||
let initialUser = new CreateUser();
|
let initialUser = new CreateUser();
|
||||||
initialUser.firstname = "demo";
|
initialUser.firstname = "demo";
|
||||||
initialUser.lastname = "demo";
|
initialUser.lastname = "demo";
|
||||||
initialUser.username = "demo";
|
initialUser.username = "demo";
|
||||||
initialUser.password = "demo";
|
initialUser.password = "demo";
|
||||||
initialUser.group = group;
|
await connection
|
||||||
return await connection.getRepository(User).save(await initialUser.toUser());
|
.createQueryBuilder()
|
||||||
}
|
.insert()
|
||||||
|
.into(User)
|
||||||
public async createPermissions(connection: Connection, principal: number) {
|
.values([await initialUser.toUser()])
|
||||||
let repo = await connection.getRepository(Permission);
|
.execute()
|
||||||
for (let target in PermissionTarget) {
|
|
||||||
for (let action in PermissionAction) {
|
|
||||||
let permission = new CreatePermission;
|
|
||||||
permission.target = <PermissionTarget>target;
|
|
||||||
permission.action = <PermissionAction>action;
|
|
||||||
permission.principal = principal;
|
|
||||||
await repo.save(await permission.toPermission());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -2,18 +2,6 @@ import axios from 'axios';
|
|||||||
import { config } from '../config';
|
import { config } from '../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
describe('GET /api/openapi.json', () => {
|
describe('GET /api/openapi.json', () => {
|
||||||
it('is http 200', async () => {
|
it('is http 200', async () => {
|
||||||
const res = await axios.get(base + '/api/openapi.json');
|
const res = await axios.get(base + '/api/openapi.json');
|
||||||
@ -22,13 +10,13 @@ describe('GET /api/openapi.json', () => {
|
|||||||
});
|
});
|
||||||
describe('GET /', () => {
|
describe('GET /', () => {
|
||||||
it('is http 404', async () => {
|
it('is http 404', async () => {
|
||||||
const res = await axios.get(base + '/', axios_config);
|
const res = await axios.get(base + '/', { validateStatus: undefined });
|
||||||
expect(res.status).toEqual(404);
|
expect(res.status).toEqual(404);
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
describe('GET /api/teams', () => {
|
describe('GET /api/teams', () => {
|
||||||
it('is http 200 && is json', async () => {
|
it('is http 200 && is json', async () => {
|
||||||
const res = await axios.get(base + '/api/teams', axios_config);
|
const res = await axios.get(base + '/api/teams', { validateStatus: undefined });
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
|
@ -2,21 +2,9 @@ import axios from 'axios';
|
|||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
describe('GET /api/organisations', () => {
|
describe('GET /api/organisations', () => {
|
||||||
it('basic get should return 200', async () => {
|
it('basic get should return 200', async () => {
|
||||||
const res = await axios.get(base + '/api/organisations', axios_config);
|
const res = await axios.get(base + '/api/organisations');
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -26,14 +14,14 @@ describe('POST /api/organisations', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res = await axios.post(base + '/api/organisations', {
|
const res = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('creating a new org with without a name should return 400', async () => {
|
it('creating a new org with without a name should return 400', async () => {
|
||||||
const res = await axios.post(base + '/api/organisations', {
|
const res = await axios.post(base + '/api/organisations', {
|
||||||
"name": null
|
"name": null
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res.status).toEqual(400);
|
expect(res.status).toEqual(400);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -43,12 +31,12 @@ describe('adding + getting from all orgs', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res = await axios.post(base + '/api/organisations', {
|
const res = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('check if org was added', async () => {
|
it('check if org was added', async () => {
|
||||||
const res = await axios.get(base + '/api/organisations', axios_config);
|
const res = await axios.get(base + '/api/organisations');
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
let added_org = res.data[res.data.length - 1]
|
let added_org = res.data[res.data.length - 1]
|
||||||
@ -67,14 +55,14 @@ describe('adding + getting explicitly', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
let added_org = res1.data
|
let added_org = res1.data
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
expect(res1.headers['content-type']).toContain("application/json")
|
expect(res1.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('check if org was added', async () => {
|
it('check if org was added', async () => {
|
||||||
const res2 = await axios.get(base + '/api/organisations/' + added_org_id, axios_config);
|
const res2 = await axios.get(base + '/api/organisations/' + added_org_id);
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
let added_org2 = res2.data
|
let added_org2 = res2.data
|
||||||
|
@ -2,22 +2,10 @@ import axios from 'axios';
|
|||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
// ---------------
|
// ---------------
|
||||||
describe('adding + deletion (non-existant)', () => {
|
describe('adding + deletion (non-existant)', () => {
|
||||||
it('delete', async () => {
|
it('delete', async () => {
|
||||||
const res2 = await axios.delete(base + '/api/organisations/0', axios_config);
|
const res2 = await axios.delete(base + '/api/organisations/0', { validateStatus: undefined });
|
||||||
expect(res2.status).toEqual(204);
|
expect(res2.status).toEqual(204);
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
@ -28,14 +16,14 @@ describe('adding + deletion (successfull)', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org = res1.data
|
added_org = res1.data
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
expect(res1.headers['content-type']).toContain("application/json")
|
expect(res1.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('delete', async () => {
|
it('delete', async () => {
|
||||||
const res2 = await axios.delete(base + '/api/organisations/' + added_org_id, axios_config);
|
const res2 = await axios.delete(base + '/api/organisations/' + added_org_id);
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
let added_org2 = res2.data
|
let added_org2 = res2.data
|
||||||
@ -49,7 +37,7 @@ describe('adding + deletion (successfull)', () => {
|
|||||||
});
|
});
|
||||||
});
|
});
|
||||||
it('check if org really was deleted', async () => {
|
it('check if org really was deleted', async () => {
|
||||||
const res3 = await axios.get(base + '/api/organisations/' + added_org_id, axios_config);
|
const res3 = await axios.get(base + '/api/organisations/' + added_org_id, { validateStatus: undefined });
|
||||||
expect(res3.status).toEqual(404);
|
expect(res3.status).toEqual(404);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -63,7 +51,7 @@ describe('adding + deletion with teams still existing (without force)', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org = res1.data;
|
added_org = res1.data;
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -73,14 +61,14 @@ describe('adding + deletion with teams still existing (without force)', () => {
|
|||||||
const res2 = await axios.post(base + '/api/teams', {
|
const res2 = await axios.post(base + '/api/teams', {
|
||||||
"name": "test123",
|
"name": "test123",
|
||||||
"parentGroup": added_org_id
|
"parentGroup": added_org_id
|
||||||
}, axios_config);
|
});
|
||||||
added_team = res2.data;
|
added_team = res2.data;
|
||||||
added_team_id = added_team.id;
|
added_team_id = added_team.id;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('delete org - this should fail with a 406', async () => {
|
it('delete org - this should fail with a 406', async () => {
|
||||||
const res2 = await axios.delete(base + '/api/organisations/' + added_org_id, axios_config);
|
const res2 = await axios.delete(base + '/api/organisations/' + added_org_id, { validateStatus: undefined });
|
||||||
expect(res2.status).toEqual(406);
|
expect(res2.status).toEqual(406);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -94,7 +82,7 @@ describe('adding + deletion with teams still existing (with force)', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org = res1.data;
|
added_org = res1.data;
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -104,14 +92,14 @@ describe('adding + deletion with teams still existing (with force)', () => {
|
|||||||
const res2 = await axios.post(base + '/api/teams', {
|
const res2 = await axios.post(base + '/api/teams', {
|
||||||
"name": "test123",
|
"name": "test123",
|
||||||
"parentGroup": added_org_id
|
"parentGroup": added_org_id
|
||||||
}, axios_config);
|
});
|
||||||
added_team = res2.data;
|
added_team = res2.data;
|
||||||
added_team_id = added_team.id;
|
added_team_id = added_team.id;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('delete', async () => {
|
it('delete', async () => {
|
||||||
const res2 = await axios.delete(base + '/api/organisations/' + added_org_id + '?force=true', axios_config);
|
const res2 = await axios.delete(base + '/api/organisations/' + added_org_id + '?force=true');
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
let added_org2 = res2.data
|
let added_org2 = res2.data
|
||||||
@ -125,7 +113,7 @@ describe('adding + deletion with teams still existing (with force)', () => {
|
|||||||
});
|
});
|
||||||
});
|
});
|
||||||
it('check if org really was deleted', async () => {
|
it('check if org really was deleted', async () => {
|
||||||
const res3 = await axios.get(base + '/api/organisations/' + added_org_id, axios_config);
|
const res3 = await axios.get(base + '/api/organisations/' + added_org_id, { validateStatus: undefined });
|
||||||
expect(res3.status).toEqual(404);
|
expect(res3.status).toEqual(404);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
|
@ -2,21 +2,9 @@ import axios from 'axios';
|
|||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
describe('GET /api/organisations', () => {
|
describe('GET /api/organisations', () => {
|
||||||
it('basic get should return 200', async () => {
|
it('basic get should return 200', async () => {
|
||||||
const res = await axios.get(base + '/api/organisations', axios_config);
|
const res = await axios.get(base + '/api/organisations');
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -24,7 +12,7 @@ describe('GET /api/organisations', () => {
|
|||||||
// ---------------
|
// ---------------
|
||||||
describe('GET /api/organisations/0', () => {
|
describe('GET /api/organisations/0', () => {
|
||||||
it('basic get should return 404', async () => {
|
it('basic get should return 404', async () => {
|
||||||
const res = await axios.get(base + '/api/runners/0', axios_config);
|
const res = await axios.get(base + '/api/runners/0', { validateStatus: undefined });
|
||||||
expect(res.status).toEqual(404);
|
expect(res.status).toEqual(404);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
|
@ -2,18 +2,6 @@ import axios from 'axios';
|
|||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
// ---------------
|
// ---------------
|
||||||
describe('adding + updating name', () => {
|
describe('adding + updating name', () => {
|
||||||
let added_org_id
|
let added_org_id
|
||||||
@ -21,7 +9,7 @@ describe('adding + updating name', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org = res1.data
|
added_org = res1.data
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -33,7 +21,7 @@ describe('adding + updating name', () => {
|
|||||||
"name": "testlelele",
|
"name": "testlelele",
|
||||||
"contact": null,
|
"contact": null,
|
||||||
"address": null,
|
"address": null,
|
||||||
}, axios_config);
|
});
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
let added_org2 = res2.data
|
let added_org2 = res2.data
|
||||||
@ -54,7 +42,7 @@ describe('adding + try updating id (should return 406)', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org = res1.data
|
added_org = res1.data
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -66,7 +54,7 @@ describe('adding + try updating id (should return 406)', () => {
|
|||||||
"name": "testlelele",
|
"name": "testlelele",
|
||||||
"contact": null,
|
"contact": null,
|
||||||
"address": null,
|
"address": null,
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res2.status).toEqual(406);
|
expect(res2.status).toEqual(406);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
|
@ -2,21 +2,9 @@ import axios from 'axios';
|
|||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
describe('GET /api/teams', () => {
|
describe('GET /api/teams', () => {
|
||||||
it('basic get should return 200', async () => {
|
it('basic get should return 200', async () => {
|
||||||
const res = await axios.get(base + '/api/teams', axios_config);
|
const res = await axios.get(base + '/api/teams');
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -24,7 +12,7 @@ describe('GET /api/teams', () => {
|
|||||||
// ---------------
|
// ---------------
|
||||||
describe('GET /api/teams/0', () => {
|
describe('GET /api/teams/0', () => {
|
||||||
it('basic get should return 404', async () => {
|
it('basic get should return 404', async () => {
|
||||||
const res = await axios.get(base + '/api/teams/0', axios_config);
|
const res = await axios.get(base + '/api/teams/0', { validateStatus: undefined });
|
||||||
expect(res.status).toEqual(404);
|
expect(res.status).toEqual(404);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -34,14 +22,14 @@ describe('POST /api/teams with errors', () => {
|
|||||||
it('creating a new team without a name should return 400', async () => {
|
it('creating a new team without a name should return 400', async () => {
|
||||||
const res1 = await axios.post(base + '/api/teams', {
|
const res1 = await axios.post(base + '/api/teams', {
|
||||||
"name": null
|
"name": null
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res1.status).toEqual(400);
|
expect(res1.status).toEqual(400);
|
||||||
expect(res1.headers['content-type']).toContain("application/json")
|
expect(res1.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('creating a new team without a org should return 400', async () => {
|
it('creating a new team without a org should return 400', async () => {
|
||||||
const res2 = await axios.post(base + '/api/teams', {
|
const res2 = await axios.post(base + '/api/teams', {
|
||||||
"name": "test_team"
|
"name": "test_team"
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res2.status).toEqual(400);
|
expect(res2.status).toEqual(400);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -49,7 +37,7 @@ describe('POST /api/teams with errors', () => {
|
|||||||
const res3 = await axios.post(base + '/api/teams', {
|
const res3 = await axios.post(base + '/api/teams', {
|
||||||
"name": "test_team",
|
"name": "test_team",
|
||||||
"parentGroup": -1
|
"parentGroup": -1
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res3.status).toEqual(404);
|
expect(res3.status).toEqual(404);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -60,7 +48,7 @@ describe('POST /api/teams working', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
let added_org = res1.data
|
let added_org = res1.data
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -70,7 +58,7 @@ describe('POST /api/teams working', () => {
|
|||||||
const res2 = await axios.post(base + '/api/teams', {
|
const res2 = await axios.post(base + '/api/teams', {
|
||||||
"name": "test_team",
|
"name": "test_team",
|
||||||
"parentGroup": added_org_id
|
"parentGroup": added_org_id
|
||||||
}, axios_config);
|
});
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
|
@ -2,18 +2,6 @@ import axios from 'axios';
|
|||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
// ---------------
|
// ---------------
|
||||||
describe('adding org', () => {
|
describe('adding org', () => {
|
||||||
let added_org;
|
let added_org;
|
||||||
@ -23,7 +11,7 @@ describe('adding org', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org = res1.data;
|
added_org = res1.data;
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -33,14 +21,14 @@ describe('adding org', () => {
|
|||||||
const res2 = await axios.post(base + '/api/teams', {
|
const res2 = await axios.post(base + '/api/teams', {
|
||||||
"name": "test123",
|
"name": "test123",
|
||||||
"parentGroup": added_org_id
|
"parentGroup": added_org_id
|
||||||
}, axios_config);
|
});
|
||||||
added_team = res2.data;
|
added_team = res2.data;
|
||||||
added_team_id = added_team.id;
|
added_team_id = added_team.id;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('delete team', async () => {
|
it('delete team', async () => {
|
||||||
const res2 = await axios.delete(base + '/api/teams/' + added_team_id, axios_config);
|
const res2 = await axios.delete(base + '/api/teams/' + added_team_id);
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
let deleted_team = res2.data
|
let deleted_team = res2.data
|
||||||
@ -52,7 +40,7 @@ describe('adding org', () => {
|
|||||||
});
|
});
|
||||||
});
|
});
|
||||||
it('check if team really was deleted', async () => {
|
it('check if team really was deleted', async () => {
|
||||||
const res3 = await axios.get(base + '/api/teams/' + added_team_id, axios_config);
|
const res3 = await axios.get(base + '/api/teams/' + added_team_id, { validateStatus: undefined });
|
||||||
expect(res3.status).toEqual(404);
|
expect(res3.status).toEqual(404);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -60,7 +48,7 @@ describe('adding org', () => {
|
|||||||
// ---------------
|
// ---------------
|
||||||
describe('adding + deletion (non-existant)', () => {
|
describe('adding + deletion (non-existant)', () => {
|
||||||
it('delete', async () => {
|
it('delete', async () => {
|
||||||
const res2 = await axios.delete(base + '/api/teams/0', axios_config);
|
const res2 = await axios.delete(base + '/api/teams/0', { validateStatus: undefined });
|
||||||
expect(res2.status).toEqual(204);
|
expect(res2.status).toEqual(204);
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
@ -2,21 +2,9 @@ import axios from 'axios';
|
|||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
describe('GET /api/teams', () => {
|
describe('GET /api/teams', () => {
|
||||||
it('basic get should return 200', async () => {
|
it('basic get should return 200', async () => {
|
||||||
const res = await axios.get(base + '/api/teams', axios_config);
|
const res = await axios.get(base + '/api/teams');
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -24,7 +12,7 @@ describe('GET /api/teams', () => {
|
|||||||
// ---------------
|
// ---------------
|
||||||
describe('GET /api/teams/0', () => {
|
describe('GET /api/teams/0', () => {
|
||||||
it('basic get should return 404', async () => {
|
it('basic get should return 404', async () => {
|
||||||
const res = await axios.get(base + '/api/teams/0', axios_config);
|
const res = await axios.get(base + '/api/teams/0', { validateStatus: undefined });
|
||||||
expect(res.status).toEqual(404);
|
expect(res.status).toEqual(404);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
|
@ -2,17 +2,6 @@ import axios from 'axios';
|
|||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
// ---------------
|
// ---------------
|
||||||
describe('adding + updating name', () => {
|
describe('adding + updating name', () => {
|
||||||
let added_org;
|
let added_org;
|
||||||
@ -22,7 +11,7 @@ describe('adding + updating name', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org = res1.data;
|
added_org = res1.data;
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -32,7 +21,7 @@ describe('adding + updating name', () => {
|
|||||||
const res2 = await axios.post(base + '/api/teams', {
|
const res2 = await axios.post(base + '/api/teams', {
|
||||||
"name": "test123",
|
"name": "test123",
|
||||||
"parentGroup": added_org_id
|
"parentGroup": added_org_id
|
||||||
}, axios_config);
|
});
|
||||||
added_team = res2.data;
|
added_team = res2.data;
|
||||||
added_team_id = added_team.id;
|
added_team_id = added_team.id;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
@ -44,7 +33,7 @@ describe('adding + updating name', () => {
|
|||||||
"name": "testlelele",
|
"name": "testlelele",
|
||||||
"contact": null,
|
"contact": null,
|
||||||
"parentGroup": added_org
|
"parentGroup": added_org
|
||||||
}, axios_config);
|
});
|
||||||
expect(res3.status).toEqual(200);
|
expect(res3.status).toEqual(200);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
let updated_team = res3.data;
|
let updated_team = res3.data;
|
||||||
@ -61,7 +50,7 @@ describe('adding + try updating id (should return 406)', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org = res1.data;
|
added_org = res1.data;
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -71,7 +60,7 @@ describe('adding + try updating id (should return 406)', () => {
|
|||||||
const res2 = await axios.post(base + '/api/teams', {
|
const res2 = await axios.post(base + '/api/teams', {
|
||||||
"name": "test123",
|
"name": "test123",
|
||||||
"parentGroup": added_org_id
|
"parentGroup": added_org_id
|
||||||
}, axios_config);
|
});
|
||||||
added_team = res2.data;
|
added_team = res2.data;
|
||||||
added_team_id = added_team.id;
|
added_team_id = added_team.id;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
@ -79,7 +68,7 @@ describe('adding + try updating id (should return 406)', () => {
|
|||||||
});
|
});
|
||||||
it('update team', async () => {
|
it('update team', async () => {
|
||||||
added_team.id = added_team.id + 1;
|
added_team.id = added_team.id + 1;
|
||||||
const res3 = await axios.put(base + '/api/teams/' + added_team_id, added_team, axios_config);
|
const res3 = await axios.put(base + '/api/teams/' + added_team_id, added_team, { validateStatus: undefined });
|
||||||
expect(res3.status).toEqual(406);
|
expect(res3.status).toEqual(406);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -93,7 +82,7 @@ describe('add+update parent org (valid)', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org = res1.data;
|
added_org = res1.data;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
expect(res1.headers['content-type']).toContain("application/json")
|
expect(res1.headers['content-type']).toContain("application/json")
|
||||||
@ -102,7 +91,7 @@ describe('add+update parent org (valid)', () => {
|
|||||||
const res2 = await axios.post(base + '/api/teams', {
|
const res2 = await axios.post(base + '/api/teams', {
|
||||||
"name": "test123",
|
"name": "test123",
|
||||||
"parentGroup": added_org.id
|
"parentGroup": added_org.id
|
||||||
}, axios_config);
|
});
|
||||||
added_team = res2.data;
|
added_team = res2.data;
|
||||||
added_team_id = added_team.id;
|
added_team_id = added_team.id;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
@ -111,14 +100,14 @@ describe('add+update parent org (valid)', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res3 = await axios.post(base + '/api/organisations', {
|
const res3 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org2 = res3.data;
|
added_org2 = res3.data;
|
||||||
expect(res3.status).toEqual(200);
|
expect(res3.status).toEqual(200);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('update team', async () => {
|
it('update team', async () => {
|
||||||
added_team.parentGroup = added_org2;
|
added_team.parentGroup = added_org2;
|
||||||
const res4 = await axios.put(base + '/api/teams/' + added_team_id, added_team, axios_config);
|
const res4 = await axios.put(base + '/api/teams/' + added_team_id, added_team, { validateStatus: undefined });
|
||||||
let updated_team = res4.data;
|
let updated_team = res4.data;
|
||||||
expect(res4.status).toEqual(200);
|
expect(res4.status).toEqual(200);
|
||||||
expect(res4.headers['content-type']).toContain("application/json")
|
expect(res4.headers['content-type']).toContain("application/json")
|
||||||
|
@ -2,21 +2,9 @@ import axios from 'axios';
|
|||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
describe('GET /api/runners', () => {
|
describe('GET /api/runners', () => {
|
||||||
it('basic get should return 200', async () => {
|
it('basic get should return 200', async () => {
|
||||||
const res = await axios.get(base + '/api/runners', axios_config);
|
const res = await axios.get(base + '/api/runners');
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -24,7 +12,7 @@ describe('GET /api/runners', () => {
|
|||||||
// ---------------
|
// ---------------
|
||||||
describe('GET /api/runners/0', () => {
|
describe('GET /api/runners/0', () => {
|
||||||
it('basic get should return 404', async () => {
|
it('basic get should return 404', async () => {
|
||||||
const res = await axios.get(base + '/api/runners/0', axios_config);
|
const res = await axios.get(base + '/api/runners/0', { validateStatus: undefined });
|
||||||
expect(res.status).toEqual(404);
|
expect(res.status).toEqual(404);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -32,7 +20,7 @@ describe('GET /api/runners/0', () => {
|
|||||||
// ---------------
|
// ---------------
|
||||||
describe('POST /api/runners with errors', () => {
|
describe('POST /api/runners with errors', () => {
|
||||||
it('creating a new runner without any parameters should return 400', async () => {
|
it('creating a new runner without any parameters should return 400', async () => {
|
||||||
const res1 = await axios.post(base + '/api/runners', null, axios_config);
|
const res1 = await axios.post(base + '/api/runners', null, { validateStatus: undefined });
|
||||||
expect(res1.status).toEqual(400);
|
expect(res1.status).toEqual(400);
|
||||||
expect(res1.headers['content-type']).toContain("application/json")
|
expect(res1.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -41,7 +29,7 @@ describe('POST /api/runners with errors', () => {
|
|||||||
"firstname": "first",
|
"firstname": "first",
|
||||||
"middlename": "middle",
|
"middlename": "middle",
|
||||||
"lastname": "last"
|
"lastname": "last"
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res2.status).toEqual(400);
|
expect(res2.status).toEqual(400);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -51,7 +39,7 @@ describe('POST /api/runners with errors', () => {
|
|||||||
"middlename": "middle",
|
"middlename": "middle",
|
||||||
"lastname": "last",
|
"lastname": "last",
|
||||||
"group": 0
|
"group": 0
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res2.status).toEqual(404);
|
expect(res2.status).toEqual(404);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -61,7 +49,7 @@ describe('POST /api/runners with errors', () => {
|
|||||||
"middlename": "middle",
|
"middlename": "middle",
|
||||||
"lastname": "last",
|
"lastname": "last",
|
||||||
"phone": "123"
|
"phone": "123"
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res2.status).toEqual(400);
|
expect(res2.status).toEqual(400);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -71,7 +59,7 @@ describe('POST /api/runners with errors', () => {
|
|||||||
"middlename": "middle",
|
"middlename": "middle",
|
||||||
"lastname": "last",
|
"lastname": "last",
|
||||||
"email ": "123"
|
"email ": "123"
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res2.status).toEqual(400);
|
expect(res2.status).toEqual(400);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -82,7 +70,7 @@ describe('POST /api/runners working', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
let added_org = res1.data
|
let added_org = res1.data
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -93,7 +81,7 @@ describe('POST /api/runners working', () => {
|
|||||||
"firstname": "first",
|
"firstname": "first",
|
||||||
"lastname": "last",
|
"lastname": "last",
|
||||||
"group": added_org_id
|
"group": added_org_id
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -105,7 +93,7 @@ describe('POST /api/runners working', () => {
|
|||||||
"email": "test@example.com",
|
"email": "test@example.com",
|
||||||
"phone": "+4909123123456789",
|
"phone": "+4909123123456789",
|
||||||
"group": added_org_id
|
"group": added_org_id
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res3.status).toEqual(200);
|
expect(res3.status).toEqual(200);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
|
@ -2,21 +2,9 @@ import axios from 'axios';
|
|||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
describe('adding + deletion (non-existant)', () => {
|
describe('adding + deletion (non-existant)', () => {
|
||||||
it('delete', async () => {
|
it('delete', async () => {
|
||||||
const res2 = await axios.delete(base + '/api/runners/0', axios_config);
|
const res2 = await axios.delete(base + '/api/runners/0', { validateStatus: undefined });
|
||||||
expect(res2.status).toEqual(204);
|
expect(res2.status).toEqual(204);
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
@ -27,7 +15,7 @@ describe('add+delete', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
let added_org = res1.data
|
let added_org = res1.data
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -38,20 +26,20 @@ describe('add+delete', () => {
|
|||||||
"firstname": "first",
|
"firstname": "first",
|
||||||
"lastname": "last",
|
"lastname": "last",
|
||||||
"group": added_org_id
|
"group": added_org_id
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
added_runner = res2.data;
|
added_runner = res2.data;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('delete runner', async () => {
|
it('delete runner', async () => {
|
||||||
const res3 = await axios.delete(base + '/api/runners/' + added_runner.id, axios_config);
|
const res3 = await axios.delete(base + '/api/runners/' + added_runner.id);
|
||||||
expect(res3.status).toEqual(200);
|
expect(res3.status).toEqual(200);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
let deleted_runner = res3.data
|
let deleted_runner = res3.data
|
||||||
expect(deleted_runner).toEqual(added_runner);
|
expect(deleted_runner).toEqual(added_runner);
|
||||||
});
|
});
|
||||||
it('check if team really was deleted', async () => {
|
it('check if team really was deleted', async () => {
|
||||||
const res4 = await axios.get(base + '/api/runners/' + added_runner.id, axios_config);
|
const res4 = await axios.get(base + '/api/runners/' + added_runner.id, { validateStatus: undefined });
|
||||||
expect(res4.status).toEqual(404);
|
expect(res4.status).toEqual(404);
|
||||||
expect(res4.headers['content-type']).toContain("application/json")
|
expect(res4.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
|
@ -1,21 +1,10 @@
|
|||||||
import axios from 'axios';
|
import axios from 'axios';
|
||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
describe('GET /api/runners', () => {
|
describe('GET /api/runners', () => {
|
||||||
it('basic get should return 200', async () => {
|
it('basic get should return 200', async () => {
|
||||||
const res = await axios.get(base + '/api/runners', axios_config);
|
const res = await axios.get(base + '/api/runners');
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -23,7 +12,7 @@ describe('GET /api/runners', () => {
|
|||||||
// ---------------
|
// ---------------
|
||||||
describe('GET /api/runners/0', () => {
|
describe('GET /api/runners/0', () => {
|
||||||
it('basic get should return 404', async () => {
|
it('basic get should return 404', async () => {
|
||||||
const res = await axios.get(base + '/api/runners/0', axios_config);
|
const res = await axios.get(base + '/api/runners/0', { validateStatus: undefined });
|
||||||
expect(res.status).toEqual(404);
|
expect(res.status).toEqual(404);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -35,7 +24,7 @@ describe('GET /api/runners after adding', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
let added_org = res1.data
|
let added_org = res1.data
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -46,20 +35,20 @@ describe('GET /api/runners after adding', () => {
|
|||||||
"firstname": "first",
|
"firstname": "first",
|
||||||
"lastname": "last",
|
"lastname": "last",
|
||||||
"group": added_org_id
|
"group": added_org_id
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
added_runner = res2.data;
|
added_runner = res2.data;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('explicit get should return 200', async () => {
|
it('explicit get should return 200', async () => {
|
||||||
const res3 = await axios.get(base + '/api/runners/' + added_runner.id, axios_config);
|
const res3 = await axios.get(base + '/api/runners/' + added_runner.id, { validateStatus: undefined });
|
||||||
expect(res3.status).toEqual(200);
|
expect(res3.status).toEqual(200);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
let gotten_runner = res3.data
|
let gotten_runner = res3.data
|
||||||
expect(gotten_runner).toEqual(added_runner);
|
expect(gotten_runner).toEqual(added_runner);
|
||||||
});
|
});
|
||||||
it('get from all runners should return 200', async () => {
|
it('get from all runners should return 200', async () => {
|
||||||
const res4 = await axios.get(base + '/api/runners/', axios_config);
|
const res4 = await axios.get(base + '/api/runners/', { validateStatus: undefined });
|
||||||
expect(res4.status).toEqual(200);
|
expect(res4.status).toEqual(200);
|
||||||
expect(res4.headers['content-type']).toContain("application/json")
|
expect(res4.headers['content-type']).toContain("application/json")
|
||||||
let gotten_runners = res4.data
|
let gotten_runners = res4.data
|
||||||
|
@ -2,17 +2,6 @@ import axios from 'axios';
|
|||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
describe('Update runner name after adding', () => {
|
describe('Update runner name after adding', () => {
|
||||||
let added_org_id;
|
let added_org_id;
|
||||||
@ -21,7 +10,7 @@ describe('Update runner name after adding', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
let added_org = res1.data
|
let added_org = res1.data
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -32,7 +21,7 @@ describe('Update runner name after adding', () => {
|
|||||||
"firstname": "first",
|
"firstname": "first",
|
||||||
"lastname": "last",
|
"lastname": "last",
|
||||||
"group": added_org_id
|
"group": added_org_id
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
added_runner = res2.data;
|
added_runner = res2.data;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
@ -40,7 +29,7 @@ describe('Update runner name after adding', () => {
|
|||||||
it('valid update should return 200', async () => {
|
it('valid update should return 200', async () => {
|
||||||
let runnercopy = added_runner
|
let runnercopy = added_runner
|
||||||
runnercopy.firstname = "second"
|
runnercopy.firstname = "second"
|
||||||
const res3 = await axios.put(base + '/api/runners/' + added_runner.id, runnercopy, axios_config);
|
const res3 = await axios.put(base + '/api/runners/' + added_runner.id, runnercopy, { validateStatus: undefined });
|
||||||
expect(res3.status).toEqual(200);
|
expect(res3.status).toEqual(200);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
updated_runner = res3.data
|
updated_runner = res3.data
|
||||||
@ -56,7 +45,7 @@ describe('Update runner group after adding', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
let added_org = res1.data
|
let added_org = res1.data
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -67,7 +56,7 @@ describe('Update runner group after adding', () => {
|
|||||||
"firstname": "first",
|
"firstname": "first",
|
||||||
"lastname": "last",
|
"lastname": "last",
|
||||||
"group": added_org_id
|
"group": added_org_id
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
added_runner = res2.data;
|
added_runner = res2.data;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
@ -75,7 +64,7 @@ describe('Update runner group after adding', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res3 = await axios.post(base + '/api/organisations', {
|
const res3 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org_2 = res3.data
|
added_org_2 = res3.data
|
||||||
delete added_org_2.address;
|
delete added_org_2.address;
|
||||||
delete added_org_2.contact;
|
delete added_org_2.contact;
|
||||||
@ -85,7 +74,7 @@ describe('Update runner group after adding', () => {
|
|||||||
});
|
});
|
||||||
it('valid update should return 200', async () => {
|
it('valid update should return 200', async () => {
|
||||||
added_runner.group = added_org_2;
|
added_runner.group = added_org_2;
|
||||||
const res3 = await axios.put(base + '/api/runners/' + added_runner.id, added_runner, axios_config);
|
const res3 = await axios.put(base + '/api/runners/' + added_runner.id, added_runner, { validateStatus: undefined });
|
||||||
expect(res3.status).toEqual(200);
|
expect(res3.status).toEqual(200);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
updated_runner = res3.data
|
updated_runner = res3.data
|
||||||
@ -100,7 +89,7 @@ describe('Update runner id after adding(should fail)', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
let added_org = res1.data
|
let added_org = res1.data
|
||||||
added_org_id = added_org.id;
|
added_org_id = added_org.id;
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
@ -111,7 +100,7 @@ describe('Update runner id after adding(should fail)', () => {
|
|||||||
"firstname": "first",
|
"firstname": "first",
|
||||||
"lastname": "last",
|
"lastname": "last",
|
||||||
"group": added_org_id
|
"group": added_org_id
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
added_runner = res2.data;
|
added_runner = res2.data;
|
||||||
added_runner_id = added_runner.id;
|
added_runner_id = added_runner.id;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
@ -119,7 +108,7 @@ describe('Update runner id after adding(should fail)', () => {
|
|||||||
});
|
});
|
||||||
it('invalid update should return 406', async () => {
|
it('invalid update should return 406', async () => {
|
||||||
added_runner.id++;
|
added_runner.id++;
|
||||||
const res3 = await axios.put(base + '/api/runners/' + added_runner_id, added_runner, axios_config);
|
const res3 = await axios.put(base + '/api/runners/' + added_runner_id, added_runner, { validateStatus: undefined });
|
||||||
expect(res3.status).toEqual(406);
|
expect(res3.status).toEqual(406);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -131,7 +120,7 @@ describe('Update runner group with invalid group after adding', () => {
|
|||||||
it('creating a new org with just a name should return 200', async () => {
|
it('creating a new org with just a name should return 200', async () => {
|
||||||
const res1 = await axios.post(base + '/api/organisations', {
|
const res1 = await axios.post(base + '/api/organisations', {
|
||||||
"name": "test123"
|
"name": "test123"
|
||||||
}, axios_config);
|
});
|
||||||
added_org = res1.data
|
added_org = res1.data
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
expect(res1.headers['content-type']).toContain("application/json")
|
expect(res1.headers['content-type']).toContain("application/json")
|
||||||
@ -141,7 +130,7 @@ describe('Update runner group with invalid group after adding', () => {
|
|||||||
"firstname": "first",
|
"firstname": "first",
|
||||||
"lastname": "last",
|
"lastname": "last",
|
||||||
"group": added_org.id
|
"group": added_org.id
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
added_runner = res2.data;
|
added_runner = res2.data;
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
@ -149,7 +138,7 @@ describe('Update runner group with invalid group after adding', () => {
|
|||||||
it('invalid update should return 404', async () => {
|
it('invalid update should return 404', async () => {
|
||||||
added_org.id = 0;
|
added_org.id = 0;
|
||||||
added_runner.group = added_org;
|
added_runner.group = added_org;
|
||||||
const res3 = await axios.put(base + '/api/runners/' + added_runner.id, added_runner, axios_config);
|
const res3 = await axios.put(base + '/api/runners/' + added_runner.id, added_runner, { validateStatus: undefined });
|
||||||
expect(res3.status).toEqual(404);
|
expect(res3.status).toEqual(404);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
|
@ -2,21 +2,9 @@ import axios from 'axios';
|
|||||||
import { config } from '../config';
|
import { config } from '../config';
|
||||||
const base = "http://localhost:" + config.internal_port
|
const base = "http://localhost:" + config.internal_port
|
||||||
|
|
||||||
let access_token;
|
|
||||||
let axios_config;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
|
||||||
const res = await axios.post(base + '/api/auth/login', { username: "demo", password: "demo" });
|
|
||||||
access_token = res.data["access_token"];
|
|
||||||
axios_config = {
|
|
||||||
headers: { "authorization": "Bearer " + access_token },
|
|
||||||
validateStatus: undefined
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
describe('GET /api/tracks', () => {
|
describe('GET /api/tracks', () => {
|
||||||
it('basic get should return 200', async () => {
|
it('basic get should return 200', async () => {
|
||||||
const res = await axios.get(base + '/api/tracks', axios_config);
|
const res = await axios.get(base + '/api/tracks');
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -24,7 +12,7 @@ describe('GET /api/tracks', () => {
|
|||||||
const res = await axios.post(base + '/api/tracks', {
|
const res = await axios.post(base + '/api/tracks', {
|
||||||
"name": "string",
|
"name": "string",
|
||||||
"distance": 400
|
"distance": 400
|
||||||
}, axios_config);
|
});
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -35,7 +23,7 @@ describe('POST /api/tracks', () => {
|
|||||||
const res = await axios.post(base + '/api/tracks', {
|
const res = await axios.post(base + '/api/tracks', {
|
||||||
"name": "string",
|
"name": "string",
|
||||||
"distance": -1
|
"distance": -1
|
||||||
}, axios_config);
|
}, { validateStatus: undefined });
|
||||||
expect(res.status).toEqual(400);
|
expect(res.status).toEqual(400);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -43,7 +31,7 @@ describe('POST /api/tracks', () => {
|
|||||||
const res = await axios.post(base + '/api/tracks', {
|
const res = await axios.post(base + '/api/tracks', {
|
||||||
"name": "string",
|
"name": "string",
|
||||||
"distance": 400
|
"distance": 400
|
||||||
}, axios_config);
|
});
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
@ -54,12 +42,12 @@ describe('adding + getting tracks', () => {
|
|||||||
const res = await axios.post(base + '/api/tracks', {
|
const res = await axios.post(base + '/api/tracks', {
|
||||||
"name": "string",
|
"name": "string",
|
||||||
"distance": 1000
|
"distance": 1000
|
||||||
}, axios_config);
|
});
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('check if track was added', async () => {
|
it('check if track was added', async () => {
|
||||||
const res = await axios.get(base + '/api/tracks', axios_config);
|
const res = await axios.get(base + '/api/tracks');
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
let added_track = res.data[res.data.length - 1]
|
let added_track = res.data[res.data.length - 1]
|
||||||
@ -77,12 +65,12 @@ describe('adding + getting + updating', () => {
|
|||||||
const res = await axios.post(base + '/api/tracks', {
|
const res = await axios.post(base + '/api/tracks', {
|
||||||
"name": "string",
|
"name": "string",
|
||||||
"distance": 1500
|
"distance": 1500
|
||||||
}, axios_config);
|
});
|
||||||
expect(res.status).toEqual(200);
|
expect(res.status).toEqual(200);
|
||||||
expect(res.headers['content-type']).toContain("application/json")
|
expect(res.headers['content-type']).toContain("application/json")
|
||||||
});
|
});
|
||||||
it('get should return 200', async () => {
|
it('get should return 200', async () => {
|
||||||
const res1 = await axios.get(base + '/api/tracks', axios_config);
|
const res1 = await axios.get(base + '/api/tracks');
|
||||||
expect(res1.status).toEqual(200);
|
expect(res1.status).toEqual(200);
|
||||||
expect(res1.headers['content-type']).toContain("application/json")
|
expect(res1.headers['content-type']).toContain("application/json")
|
||||||
let added_track = res1.data[res1.data.length - 1]
|
let added_track = res1.data[res1.data.length - 1]
|
||||||
@ -98,12 +86,12 @@ describe('adding + getting + updating', () => {
|
|||||||
"id": added_track_id,
|
"id": added_track_id,
|
||||||
"name": "apitrack",
|
"name": "apitrack",
|
||||||
"distance": 5100
|
"distance": 5100
|
||||||
}, axios_config);
|
});
|
||||||
expect(res2.status).toEqual(200);
|
expect(res2.status).toEqual(200);
|
||||||
expect(res2.headers['content-type']).toContain("application/json")
|
expect(res2.headers['content-type']).toContain("application/json")
|
||||||
})
|
})
|
||||||
it('get should return 200', async () => {
|
it('get should return 200', async () => {
|
||||||
const res3 = await axios.get(base + '/api/tracks', axios_config);
|
const res3 = await axios.get(base + '/api/tracks');
|
||||||
expect(res3.status).toEqual(200);
|
expect(res3.status).toEqual(200);
|
||||||
expect(res3.headers['content-type']).toContain("application/json")
|
expect(res3.headers['content-type']).toContain("application/json")
|
||||||
let added_track2 = res3.data[res3.data.length - 1]
|
let added_track2 = res3.data[res3.data.length - 1]
|
||||||
|
Loading…
x
Reference in New Issue
Block a user