mirror of
https://github.com/Alfresco/alfresco-ng2-components.git
synced 2025-07-24 17:32:15 +00:00
[PRODENG-211] integrate JS-API with monorepo (part 1) (#9081)
* integrate JS-API with monorepo * [ci:force] fix token issue [ci:force] migrate docs folder [ci:force] clean personal tokens * [ci:force] gha workflow support * [ci:force] npm publish target * fix js-api test linting * [ci:force] fix test linting, mocks, https scheme * [ci:force] fix https scheme * [ci:force] typescript mappings * [ci:force] update scripts * lint fixes * linting fixes * fix linting * [ci:force] linting fixes * linting fixes * [ci:force] remove js-api upstream and corresponding scripts * [ci:force] jsdoc fixes * fix jsdoc linting * [ci:force] jsdoc fixes * [ci:force] jsdoc fixes * jsdoc fixes * jsdoc fixes * jsdoc fixes * [ci:force] fix jsdoc * [ci:force] reduce code duplication * replace 'chai' expect with node.js assert * replace 'chai' expect with node.js assert * [ci:force] remove chai and chai-spies for js-api testing * [ci:force] cleanup and fix imports * [ci:force] fix linting * [ci:force] fix unit test * [ci:force] fix sonar linting findings * [ci:force] switch activiti api models to interfaces (-2.5% reduction of bundle) * [ci:force] switch activiti api models to interfaces * [ci:force] switch AGS api models to interfaces * [ci:force] switch AGS api models to interfaces * [ci:force] switch search api models to interfaces * [ci:force] switch content api models to interfaces where applicable
This commit is contained in:
188
lib/js-api/test/oauth2AuthImplicitFlow.spec.ts
Normal file
188
lib/js-api/test/oauth2AuthImplicitFlow.spec.ts
Normal file
@@ -0,0 +1,188 @@
|
||||
/*!
|
||||
* @license
|
||||
* Copyright © 2005-2023 Hyland Software, Inc. and its affiliates. All rights reserved.
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
import assert from 'assert';
|
||||
import { AlfrescoApi, Oauth2Auth } from '../src';
|
||||
|
||||
declare let window: any;
|
||||
const globalAny: any = global;
|
||||
|
||||
describe('Oauth2 Implicit flow test', () => {
|
||||
let oauth2Auth: Oauth2Auth;
|
||||
let alfrescoJsApi: AlfrescoApi;
|
||||
|
||||
beforeEach(() => {
|
||||
alfrescoJsApi = new AlfrescoApi({
|
||||
hostEcm: ''
|
||||
});
|
||||
});
|
||||
|
||||
it('should throw an error if redirectUri is not present', (done) => {
|
||||
try {
|
||||
oauth2Auth = new Oauth2Auth(
|
||||
{
|
||||
oauth2: {
|
||||
host: 'https://myOauthUrl:30081/auth/realms/springboot',
|
||||
clientId: 'activiti',
|
||||
secret: '',
|
||||
scope: 'openid',
|
||||
implicitFlow: true,
|
||||
redirectUri: undefined
|
||||
}
|
||||
},
|
||||
alfrescoJsApi
|
||||
);
|
||||
} catch (error) {
|
||||
assert.equal(error.message, 'Missing redirectUri required parameter');
|
||||
done();
|
||||
}
|
||||
});
|
||||
|
||||
it('should redirect to login if access token is not valid', (done) => {
|
||||
window = globalAny.window = { location: {} };
|
||||
globalAny.document = {
|
||||
getElementById: () => ''
|
||||
};
|
||||
|
||||
oauth2Auth = new Oauth2Auth(
|
||||
{
|
||||
oauth2: {
|
||||
host: 'https://myOauthUrl:30081/auth/realms/springboot',
|
||||
clientId: 'activiti',
|
||||
secret: '',
|
||||
scope: 'openid',
|
||||
implicitFlow: true,
|
||||
redirectUri: 'redirectUri'
|
||||
}
|
||||
},
|
||||
alfrescoJsApi
|
||||
);
|
||||
|
||||
oauth2Auth.on('implicit_redirect', () => {
|
||||
assert.equal(window.location.href.includes('https://myOauthUrl:30081/auth/realms/springboot/protocol/openid-connect/auth?'), true);
|
||||
done();
|
||||
});
|
||||
|
||||
oauth2Auth.implicitLogin();
|
||||
});
|
||||
|
||||
it('should not loop over redirection when redirectUri contains hash and token is not valid ', (done) => {
|
||||
window = globalAny.window = { location: {} };
|
||||
globalAny.document = {
|
||||
getElementById: () => ''
|
||||
};
|
||||
oauth2Auth = new Oauth2Auth(
|
||||
{
|
||||
oauth2: {
|
||||
host: 'https://myOauthUrl:30081/auth/realms/springboot',
|
||||
clientId: 'activiti',
|
||||
secret: '',
|
||||
scope: 'openid',
|
||||
implicitFlow: true,
|
||||
redirectUri: '#/redirectUri'
|
||||
}
|
||||
},
|
||||
alfrescoJsApi
|
||||
);
|
||||
|
||||
let setItemCalled = false;
|
||||
alfrescoJsApi.storage.setItem = () => (setItemCalled = true);
|
||||
|
||||
oauth2Auth.on('implicit_redirect', () => {
|
||||
assert.equal(window.location.href.includes('https://myOauthUrl:30081/auth/realms/springboot/protocol/openid-connect/auth?'), true);
|
||||
assert.equal(setItemCalled, true);
|
||||
done();
|
||||
});
|
||||
|
||||
oauth2Auth.implicitLogin();
|
||||
});
|
||||
|
||||
it('should not redirect to login if access token is valid', (done) => {
|
||||
window = globalAny.window = { location: {} };
|
||||
globalAny.document = {
|
||||
getElementById: () => ''
|
||||
};
|
||||
oauth2Auth = new Oauth2Auth(
|
||||
{
|
||||
oauth2: {
|
||||
host: 'https://myOauthUrl:30081/auth/realms/springboot',
|
||||
clientId: 'activiti',
|
||||
secret: '',
|
||||
scope: 'openid',
|
||||
implicitFlow: true,
|
||||
redirectUri: 'redirectUri'
|
||||
}
|
||||
},
|
||||
alfrescoJsApi
|
||||
);
|
||||
|
||||
oauth2Auth.isValidAccessToken = () => true;
|
||||
oauth2Auth.isValidToken = () => true;
|
||||
|
||||
oauth2Auth.on('token_issued', () => {
|
||||
assert.equal(window.location.url, undefined);
|
||||
done();
|
||||
});
|
||||
|
||||
oauth2Auth.setToken('new_token', 'new_refresh_token');
|
||||
|
||||
oauth2Auth.implicitLogin();
|
||||
});
|
||||
|
||||
it('should set the loginFragment to redirect after the login if it is present', (done) => {
|
||||
window = globalAny.window = {};
|
||||
globalAny.document = {
|
||||
getElementById: () => ''
|
||||
};
|
||||
window.location = <Location>{ hash: 'asfasfasfa' };
|
||||
|
||||
Object.defineProperty(window.location, 'hash', {
|
||||
writable: true,
|
||||
value: '#/redirect-path&session_state=eqfqwfqwf'
|
||||
});
|
||||
|
||||
Object.defineProperty(window.location, 'href', {
|
||||
writable: true,
|
||||
value: 'https://stoca/#/redirect-path&session_state=eqfqwfqwf'
|
||||
});
|
||||
|
||||
oauth2Auth = new Oauth2Auth(
|
||||
{
|
||||
oauth2: {
|
||||
host: 'https://myOauthUrl:30081/auth/realms/springboot',
|
||||
clientId: 'activiti',
|
||||
secret: '',
|
||||
scope: 'openid',
|
||||
implicitFlow: true,
|
||||
redirectUri: 'redirectUri'
|
||||
}
|
||||
},
|
||||
alfrescoJsApi
|
||||
);
|
||||
|
||||
let lastValues: [string, any];
|
||||
alfrescoJsApi.storage.setItem = (key, value) => (lastValues = [key, value]);
|
||||
|
||||
oauth2Auth.on('implicit_redirect', () => {
|
||||
assert.equal(window.location.href.includes('https://myOauthUrl:30081/auth/realms/springboot/protocol/openid-connect/auth?'), true);
|
||||
assert.deepEqual(lastValues, ['loginFragment', '/redirect-path&session_state=eqfqwfqwf']);
|
||||
done();
|
||||
});
|
||||
|
||||
oauth2Auth.implicitLogin();
|
||||
});
|
||||
});
|
Reference in New Issue
Block a user