124 lines
3.4 KiB
JavaScript
124 lines
3.4 KiB
JavaScript
import { describe, it, expect, beforeEach } from 'vitest';
|
|
import request from 'supertest';
|
|
import Crypto from 'crypto';
|
|
import app from '../../../../app.js';
|
|
import createAuthTokenByUserId from '../../../../helpers/create-auth-token-by-user-id.js';
|
|
import { createUser } from '../../../../../test/factories/user.js';
|
|
import { createConnection } from '../../../../../test/factories/connection.js';
|
|
import { createPermission } from '../../../../../test/factories/permission.js';
|
|
|
|
describe('POST /api/v1/connections/:connectionId/test', () => {
|
|
let currentUser, currentUserRole, token;
|
|
|
|
beforeEach(async () => {
|
|
currentUser = await createUser();
|
|
currentUserRole = await currentUser.$relatedQuery('role');
|
|
|
|
token = await createAuthTokenByUserId(currentUser.id);
|
|
});
|
|
|
|
it('should update the connection as not verified for current user', async () => {
|
|
const currentUserConnection = await createConnection({
|
|
userId: currentUser.id,
|
|
key: 'deepl',
|
|
verified: true,
|
|
});
|
|
|
|
await createPermission({
|
|
action: 'read',
|
|
subject: 'Connection',
|
|
roleId: currentUserRole.id,
|
|
conditions: ['isCreator'],
|
|
});
|
|
|
|
await createPermission({
|
|
action: 'update',
|
|
subject: 'Connection',
|
|
roleId: currentUserRole.id,
|
|
conditions: ['isCreator'],
|
|
});
|
|
|
|
const response = await request(app)
|
|
.post(`/api/v1/connections/${currentUserConnection.id}/test`)
|
|
.set('Authorization', token)
|
|
.expect(200);
|
|
|
|
expect(response.body.data.verified).toEqual(false);
|
|
});
|
|
|
|
it('should update the connection as not verified for another user', async () => {
|
|
const anotherUser = await createUser();
|
|
|
|
const anotherUserConnection = await createConnection({
|
|
userId: anotherUser.id,
|
|
key: 'deepl',
|
|
verified: true,
|
|
});
|
|
|
|
await createPermission({
|
|
action: 'read',
|
|
subject: 'Connection',
|
|
roleId: currentUserRole.id,
|
|
conditions: [],
|
|
});
|
|
|
|
await createPermission({
|
|
action: 'update',
|
|
subject: 'Connection',
|
|
roleId: currentUserRole.id,
|
|
conditions: [],
|
|
});
|
|
|
|
const response = await request(app)
|
|
.post(`/api/v1/connections/${anotherUserConnection.id}/test`)
|
|
.set('Authorization', token)
|
|
.expect(200);
|
|
|
|
expect(response.body.data.verified).toEqual(false);
|
|
});
|
|
|
|
it('should return not found response for not existing connection UUID', async () => {
|
|
const notExistingConnectionUUID = Crypto.randomUUID();
|
|
|
|
await createPermission({
|
|
action: 'read',
|
|
subject: 'Connection',
|
|
roleId: currentUserRole.id,
|
|
conditions: ['isCreator'],
|
|
});
|
|
|
|
await createPermission({
|
|
action: 'update',
|
|
subject: 'Connection',
|
|
roleId: currentUserRole.id,
|
|
conditions: ['isCreator'],
|
|
});
|
|
|
|
await request(app)
|
|
.post(`/api/v1/connections/${notExistingConnectionUUID}/test`)
|
|
.set('Authorization', token)
|
|
.expect(404);
|
|
});
|
|
|
|
it('should return bad request response for invalid UUID', async () => {
|
|
await createPermission({
|
|
action: 'read',
|
|
subject: 'Connection',
|
|
roleId: currentUserRole.id,
|
|
conditions: ['isCreator'],
|
|
});
|
|
|
|
await createPermission({
|
|
action: 'update',
|
|
subject: 'Connection',
|
|
roleId: currentUserRole.id,
|
|
conditions: ['isCreator'],
|
|
});
|
|
|
|
await request(app)
|
|
.post('/api/v1/connections/invalidConnectionUUID/test')
|
|
.set('Authorization', token)
|
|
.expect(400);
|
|
});
|
|
});
|