mirror of
https://github.com/n8n-io/n8n.git
synced 2024-11-15 17:14:05 -08:00
596c472ecc
Signed-off-by: Oleg Ivaniv <me@olegivaniv.com> Co-authored-by: Val <68596159+valya@users.noreply.github.com> Co-authored-by: कारतोफ्फेलस्क्रिप्ट™ <aditya@netroy.in> Co-authored-by: Valya Bullions <valya@n8n.io> Co-authored-by: Danny Martini <danny@n8n.io> Co-authored-by: Danny Martini <despair.blue@gmail.com> Co-authored-by: Iván Ovejero <ivov.src@gmail.com> Co-authored-by: Omar Ajoue <krynble@gmail.com> Co-authored-by: oleg <me@olegivaniv.com> Co-authored-by: Michael Kret <michael.k@radency.com> Co-authored-by: Michael Kret <88898367+michael-radency@users.noreply.github.com> Co-authored-by: Elias Meire <elias@meire.dev> Co-authored-by: Giulio Andreini <andreini@netseven.it> Co-authored-by: Giulio Andreini <g.andreini@gmail.com> Co-authored-by: Ayato Hayashi <go12limchangyong@gmail.com>
96 lines
3.3 KiB
TypeScript
96 lines
3.3 KiB
TypeScript
import { Container } from 'typedi';
|
|
import { In } from '@n8n/typeorm';
|
|
import { mock } from 'jest-mock-extended';
|
|
import { hasScope } from '@n8n/permissions';
|
|
|
|
import type { User } from '@db/entities/User';
|
|
import type { CredentialsEntity } from '@db/entities/CredentialsEntity';
|
|
import { SharedCredentials } from '@db/entities/SharedCredentials';
|
|
import { SharedCredentialsRepository } from '@db/repositories/sharedCredentials.repository';
|
|
import { GLOBAL_MEMBER_SCOPES, GLOBAL_OWNER_SCOPES } from '@/permissions/global-roles';
|
|
import { mockEntityManager } from '../../shared/mocking';
|
|
|
|
describe('SharedCredentialsRepository', () => {
|
|
const entityManager = mockEntityManager(SharedCredentials);
|
|
const repository = Container.get(SharedCredentialsRepository);
|
|
|
|
describe('findCredentialForUser', () => {
|
|
const credentialsId = 'cred_123';
|
|
const sharedCredential = mock<SharedCredentials>();
|
|
sharedCredential.credentials = mock<CredentialsEntity>({ id: credentialsId });
|
|
const owner = mock<User>({
|
|
isOwner: true,
|
|
hasGlobalScope: (scope) =>
|
|
hasScope(scope, {
|
|
global: GLOBAL_OWNER_SCOPES,
|
|
}),
|
|
});
|
|
const member = mock<User>({
|
|
isOwner: false,
|
|
id: 'test',
|
|
hasGlobalScope: (scope) =>
|
|
hasScope(scope, {
|
|
global: GLOBAL_MEMBER_SCOPES,
|
|
}),
|
|
});
|
|
|
|
beforeEach(() => {
|
|
jest.resetAllMocks();
|
|
});
|
|
|
|
test('should allow instance owner access to all credentials', async () => {
|
|
entityManager.findOne.mockResolvedValueOnce(sharedCredential);
|
|
const credential = await repository.findCredentialForUser(credentialsId, owner, [
|
|
'credential:read',
|
|
]);
|
|
expect(entityManager.findOne).toHaveBeenCalledWith(SharedCredentials, {
|
|
relations: { credentials: { shared: { project: { projectRelations: { user: true } } } } },
|
|
where: { credentialsId },
|
|
});
|
|
expect(credential).toEqual(sharedCredential.credentials);
|
|
});
|
|
|
|
test('should allow members', async () => {
|
|
entityManager.findOne.mockResolvedValueOnce(sharedCredential);
|
|
const credential = await repository.findCredentialForUser(credentialsId, member, [
|
|
'credential:read',
|
|
]);
|
|
expect(entityManager.findOne).toHaveBeenCalledWith(SharedCredentials, {
|
|
relations: { credentials: { shared: { project: { projectRelations: { user: true } } } } },
|
|
where: {
|
|
credentialsId,
|
|
role: In(['credential:owner', 'credential:user']),
|
|
project: {
|
|
projectRelations: {
|
|
role: In(['project:admin', 'project:personalOwner', 'project:editor']),
|
|
userId: member.id,
|
|
},
|
|
},
|
|
},
|
|
});
|
|
expect(credential).toEqual(sharedCredential.credentials);
|
|
});
|
|
|
|
test('should return null when no shared credential is found', async () => {
|
|
entityManager.findOne.mockResolvedValueOnce(null);
|
|
const credential = await repository.findCredentialForUser(credentialsId, member, [
|
|
'credential:read',
|
|
]);
|
|
expect(entityManager.findOne).toHaveBeenCalledWith(SharedCredentials, {
|
|
relations: { credentials: { shared: { project: { projectRelations: { user: true } } } } },
|
|
where: {
|
|
credentialsId,
|
|
role: In(['credential:owner', 'credential:user']),
|
|
project: {
|
|
projectRelations: {
|
|
role: In(['project:admin', 'project:personalOwner', 'project:editor']),
|
|
userId: member.id,
|
|
},
|
|
},
|
|
},
|
|
});
|
|
expect(credential).toEqual(null);
|
|
});
|
|
});
|
|
});
|