mirror of
https://github.com/Alfresco/alfresco-ng2-components.git
synced 2025-05-12 17:04:57 +00:00
* Migrate to NG17 * [ci:force] - fixed deps * [ci:force] - fixed build for testing 1 * Fixed build for all the packages * [ci:force] - fixing lint * [ci:force] - Fixed lint * AAE-26163 Fix infinite loop when authentication error event occured (#10272) * AAE-26163 Logout user after 3 login attempts failed, avoiding infinite loop when an authentication error occured, like when a user machine clock is significantly out of sync * AAE-26163 Wait to discovery document to be loaded and user not authenticated to perform a ssoLogin, logout user if login fails after 3 attempts * AAE-26163 Fix missed id_token_hint invoking logout when a login error occured due to a clock significantly out of sync * AAE-26163 Add fake observable to unit test * AAE-26163 Show oauth event logs if showDebugInformation is enabled, remove auth items if access token is not valid * AAE-26163 Improve tryLogin error message * AAE-26163 Check if token has expired to fix case when user access the application after the token is expired and with a clock significantly out of sync * AAE-26163 Test logout when clock is out of sync * AAE-26163 Create a service to check if local machine time is out of sync * AAE-26163 Update oauthErrorEvent$ and combinedOAuthErrorsStream$ to return errors * AAE-26163 Output error within combined oauth error event subscription * AAE-26163 Fix lint problems * AAE-26163 Logout user when token refresh error happens for the second time, if the token is not refreshed properly after first refresh error * AAE-26163 Logout user once an oauth error event occur due to clock out of sync * AAE-26163 Fix retry login error message if the OAuthErrorEvent doesn t return reason * AAE-26163 Fix the issue where the logout API call is canceled by the authorize call when login fails due to clock synchronization problems, causing an infinite loop. * remove console.log * AAE-26163 Fix retry login error message if the OAuthErrorEvent reason is an empty object * Cherry picked commit from oidc and run fix lint * [MIGRATION] - fixed build and lint * [MIGRATION] - Added injectionContext to avoid error NG0203 for unit tests * [MIGRATION] - Moving mocha to jest * [MIGRATION] - Fixing failing migrated tests * [MIGRATION] - Migrating to Jest - working but some tests fails * Trying to fix js-api unit tests * Removing testing lib to sync with develop * Fixed two excluded unit tests * Removed unused project parts * Removed unused project parts * Reduced tserrors on building storybook * Fixed sonarqube errors * Removing temporarily eslint rule from publishing * [MIGRATION] - Fixed lint * [MIGRATION] - Fixed type * [MIGRATION] - Rebased * [MIGRATION] - Readded removed action * [MIGRATION] - Checking deps * [MIGRATION] - updated lock * [ACS-9052] manage versions close button is too low (#10466) * [ci:force] - Fixed lint * [ACS-9052] Fixed close button in version manager position * [ACS-9052] Reverted unwanted changes --------- Co-authored-by: VitoAlbano <vito.albano.123@gmail.com> * [MIGRATION] - fixed storybook builds * [MIGRATION] - Checking if now eslint is releasable * [MIGRATION] - Changing the building executor for eslint-rules * Readded rule for peer deps * Fixed wrong rule * [ACS-9075] Fixed incorrect buttons labels color (#10489) * Update package.json * Fix ACA pipeline * [ACS-9084] Fixed incorrect color for notification bell icon (#10513) * Change dialog label padding * [AAE-26767] - Fixed lint * [AAE-26767] - Fixed lint * updated dependencies * AAE-30733 Fix incorrect alignment of icons in permission list header * [MIGRATION] - sync package-lock * [MIGRATION] - Fixed package on core lib * [MIGRATION] - Removed unused lock * Fixed licence * [MIGRATION] - sync lock file * [MIGRATION] - fixed lint issues * [ACS-9271][ACA] Login page input labels are cut if the input is not empty (#10637) * AAE-31453 Override card-view-textitem readonly color --------- Co-authored-by: Amedeo Lepore <amedeo.lepore@hyland.com> Co-authored-by: Ehsan Rezaei <ehsan.rezaei@hyland.com> Co-authored-by: AleksanderSklorz <115619721+AleksanderSklorz@users.noreply.github.com> Co-authored-by: DominikIwanek <dominik.iwanek@hyland.com> Co-authored-by: swapnil-verma-gl <92505353+swapnil-verma-gl@users.noreply.github.com> Co-authored-by: Wojciech Duda <69160975+wojd0@users.noreply.github.com> Co-authored-by: dominikiwanekhyland <141320833+dominikiwanekhyland@users.noreply.github.com>
522 lines
19 KiB
TypeScript
522 lines
19 KiB
TypeScript
/*!
|
|
* @license
|
|
* Copyright © 2005-2025 Hyland Software, Inc. and its affiliates. All rights reserved.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
import assert from 'assert';
|
|
import { EcmAuthMock, BpmAuthMock, NodeMock, ProfileMock } from './mockObjects';
|
|
import { NodesApi, UserProfileApi, AlfrescoApi } from '../src';
|
|
|
|
const NOOP = () => {
|
|
/* empty */
|
|
};
|
|
const ECM_HOST = 'https://127.0.0.1:8080';
|
|
const BPM_HOST = 'https://127.0.0.1:9999';
|
|
|
|
interface ErrorResponse {
|
|
status: number;
|
|
}
|
|
|
|
describe('Auth', () => {
|
|
describe('ECM Provider config', () => {
|
|
let authResponseEcmMock: EcmAuthMock;
|
|
let nodeMock: NodeMock;
|
|
let nodesApi: NodesApi;
|
|
|
|
beforeEach(() => {
|
|
authResponseEcmMock = new EcmAuthMock(ECM_HOST);
|
|
nodeMock = new NodeMock(ECM_HOST);
|
|
});
|
|
|
|
afterEach(() => {
|
|
authResponseEcmMock.cleanAll();
|
|
nodeMock.cleanAll();
|
|
});
|
|
|
|
describe('With Authentication', () => {
|
|
let alfrescoJsApi: AlfrescoApi;
|
|
|
|
beforeEach(() => {
|
|
alfrescoJsApi = new AlfrescoApi({
|
|
hostEcm: ECM_HOST
|
|
});
|
|
|
|
nodesApi = new NodesApi(alfrescoJsApi);
|
|
});
|
|
|
|
describe('login', () => {
|
|
it('should return the Ticket if all is ok', async () => {
|
|
authResponseEcmMock.get201Response();
|
|
|
|
const data = await alfrescoJsApi.login('admin', 'admin');
|
|
assert.equal(data, 'TICKET_4479f4d3bb155195879bfbb8d5206f433488a1b1');
|
|
});
|
|
|
|
it('should return an error if wrong credential are used 403 the login fails', (done) => {
|
|
authResponseEcmMock.get403Response();
|
|
|
|
alfrescoJsApi.login('wrong', 'name').then(NOOP, (error: ErrorResponse) => {
|
|
assert.equal(error.status, 403);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('isLoggedIn', () => {
|
|
it('should return true if the api is logged in', async () => {
|
|
authResponseEcmMock.get201Response();
|
|
|
|
await alfrescoJsApi.login('admin', 'admin');
|
|
assert.equal(alfrescoJsApi.isLoggedIn(), true);
|
|
});
|
|
|
|
it('should return false if the api is logged out', async () => {
|
|
authResponseEcmMock.get201Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin').catch(NOOP);
|
|
|
|
authResponseEcmMock.get204ResponseLogout();
|
|
|
|
await alfrescoJsApi.logout();
|
|
assert.equal(alfrescoJsApi.isLoggedIn(), false);
|
|
});
|
|
});
|
|
|
|
describe('Events ', () => {
|
|
it('should login fire an event if is unauthorized 401', (done) => {
|
|
authResponseEcmMock.get401Response();
|
|
|
|
const authPromise: any = alfrescoJsApi.login('wrong', 'name');
|
|
|
|
authPromise.catch(NOOP);
|
|
authPromise.on('unauthorized', () => {
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should login fire success event if is all ok 201', (done) => {
|
|
authResponseEcmMock.get201Response();
|
|
|
|
const authPromise: any = alfrescoJsApi.login('admin', 'admin');
|
|
|
|
authPromise.catch(NOOP);
|
|
authPromise.on('success', () => {
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should login fire logout event if the logout is successfull', (done) => {
|
|
authResponseEcmMock.get201Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin');
|
|
|
|
authResponseEcmMock.get204ResponseLogout();
|
|
|
|
const authPromise: any = alfrescoJsApi.logout();
|
|
|
|
authPromise.catch(NOOP);
|
|
authPromise.on('logout', () => {
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('With Ticket Authentication', () => {
|
|
it('should Ticket be present in the client', () => {
|
|
authResponseEcmMock.get400Response();
|
|
|
|
const api = new AlfrescoApi({
|
|
ticketEcm: 'TICKET_4479f4d3bb155195879bfbb8d5206f433488a1b1',
|
|
hostEcm: ECM_HOST
|
|
});
|
|
|
|
assert.equal('TICKET_4479f4d3bb155195879bfbb8d5206f433488a1b1', api.contentClient.authentications.basicAuth.password);
|
|
});
|
|
|
|
it('should Ticket login be validate against the server if is valid', (done) => {
|
|
const ticket = 'TICKET_4479f4d3bb155195879bfbb8d5206f433488a1b1';
|
|
|
|
authResponseEcmMock.get200ValidTicket(ticket);
|
|
|
|
alfrescoJsApi.loginTicket(ticket, null).then((data: string) => {
|
|
assert.equal(alfrescoJsApi.contentAuth.authentications.basicAuth.password, ticket);
|
|
assert.equal(data, ticket);
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should Ticket login be validate against the server d is NOT valid', (done) => {
|
|
const ticket = 'TICKET_4479f4d3bb155195879bfbb8d5206f433488a1b1';
|
|
|
|
authResponseEcmMock.get400Response();
|
|
|
|
alfrescoJsApi.loginTicket(ticket, null).then(NOOP, () => {
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('Logout Api', () => {
|
|
beforeEach(async () => {
|
|
authResponseEcmMock.get201Response('TICKET_22d7a5a83d78b9cc9666ec4e412475e5455b33bd');
|
|
await alfrescoJsApi.login('admin', 'admin');
|
|
});
|
|
|
|
it('should Ticket be absent in the client and the resolve promise should be called', (done) => {
|
|
authResponseEcmMock.get204ResponseLogout();
|
|
|
|
alfrescoJsApi.logout().then(() => {
|
|
assert.equal(alfrescoJsApi.config.ticket, undefined);
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should Logout be rejected if the Ticket is already expired', (done) => {
|
|
authResponseEcmMock.get404ResponseLogout();
|
|
alfrescoJsApi.logout().then(NOOP, (error: any) => {
|
|
assert.equal(error.error.toString(), 'Error: Not Found');
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('Unauthorized', () => {
|
|
beforeEach((done) => {
|
|
authResponseEcmMock.get201Response('TICKET_22d7a5a83d78b9cc9666ec4e412475e5455b33bd');
|
|
|
|
alfrescoJsApi.login('admin', 'admin').then(() => {
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should 401 invalidate the ticket', (done) => {
|
|
nodeMock.get401CreationFolder();
|
|
|
|
nodesApi.createFolder('newFolder', null, null).then(NOOP, () => {
|
|
assert.equal(alfrescoJsApi.contentAuth.authentications.basicAuth.password, null);
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should 401 invalidate the session and logout', (done) => {
|
|
nodeMock.get401CreationFolder();
|
|
|
|
nodesApi.createFolder('newFolder', null, null).then(NOOP, () => {
|
|
assert.equal(alfrescoJsApi.isLoggedIn(), false);
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should emit an error event if a failing call is executed', (done) => {
|
|
alfrescoJsApi.on('error', () => {
|
|
done();
|
|
});
|
|
|
|
nodeMock.get401CreationFolder();
|
|
|
|
nodesApi.createFolder('newFolder', null, null).then(NOOP);
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('BPM Provider config', () => {
|
|
let profileMock: ProfileMock;
|
|
let authResponseBpmMock: BpmAuthMock;
|
|
let alfrescoJsApi: AlfrescoApi;
|
|
let profileApi: UserProfileApi;
|
|
|
|
beforeEach(() => {
|
|
profileMock = new ProfileMock(BPM_HOST);
|
|
authResponseBpmMock = new BpmAuthMock(BPM_HOST);
|
|
|
|
alfrescoJsApi = new AlfrescoApi({
|
|
hostBpm: BPM_HOST,
|
|
provider: 'BPM'
|
|
});
|
|
|
|
profileApi = new UserProfileApi(alfrescoJsApi);
|
|
});
|
|
|
|
describe('With Authentication', () => {
|
|
describe('login', () => {
|
|
it('should return the Ticket if all is ok', (done) => {
|
|
authResponseBpmMock.get200Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin').then((data: string) => {
|
|
assert.equal(data, 'Basic YWRtaW46YWRtaW4=');
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should return an error if wrong credential are used 401 the login fails', (done) => {
|
|
authResponseBpmMock.get401Response();
|
|
|
|
alfrescoJsApi.login('wrong', 'name').then(NOOP, (error: ErrorResponse) => {
|
|
assert.equal(error.status, 401);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('isLoggedIn', () => {
|
|
it('should return true if the api is logged in', (done) => {
|
|
authResponseBpmMock.get200Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin').then(() => {
|
|
assert.equal(alfrescoJsApi.isLoggedIn(), true);
|
|
done();
|
|
}, NOOP);
|
|
});
|
|
|
|
it('should return false if the api is logged out', (done) => {
|
|
authResponseBpmMock.get200Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin');
|
|
|
|
authResponseBpmMock.get200ResponseLogout();
|
|
|
|
alfrescoJsApi.logout().then(() => {
|
|
assert.equal(alfrescoJsApi.isLoggedIn(), false);
|
|
done();
|
|
}, NOOP);
|
|
});
|
|
});
|
|
|
|
describe('Events ', () => {
|
|
it('should login fire an event if is unauthorized 401', (done) => {
|
|
authResponseBpmMock.get401Response();
|
|
|
|
const authPromise: any = alfrescoJsApi.login('wrong', 'name');
|
|
|
|
authPromise.catch(NOOP);
|
|
|
|
authPromise.on('unauthorized', () => {
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should the Api fire success event if is all ok 201', (done) => {
|
|
authResponseBpmMock.get200Response();
|
|
|
|
const authPromise: any = alfrescoJsApi.login('admin', 'admin');
|
|
|
|
authPromise.catch(NOOP);
|
|
|
|
authPromise.on('success', () => {
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should the Api fire logout event if the logout is successfull', (done) => {
|
|
authResponseBpmMock.get200Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin');
|
|
|
|
authResponseBpmMock.get200ResponseLogout();
|
|
|
|
const authPromise: any = alfrescoJsApi.logout();
|
|
|
|
authPromise.catch(NOOP);
|
|
authPromise.on('logout', () => {
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('Unauthorized', () => {
|
|
beforeEach((done) => {
|
|
authResponseBpmMock.get200Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin').then(() => {
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should 401 invalidate the ticket', (done) => {
|
|
profileMock.get401getProfile();
|
|
|
|
profileApi.getProfile().then(NOOP, () => {
|
|
assert.equal(alfrescoJsApi.processAuth.authentications.basicAuth.ticket, null);
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should 401 invalidate the session and logout', (done) => {
|
|
profileMock.get401getProfile();
|
|
|
|
profileApi.getProfile().then(
|
|
() => NOOP,
|
|
() => {
|
|
assert.equal(alfrescoJsApi.isLoggedIn(), false);
|
|
done();
|
|
}
|
|
);
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('BPM and ECM Provider config', () => {
|
|
let authResponseEcmMock: EcmAuthMock;
|
|
let authResponseBpmMock: BpmAuthMock;
|
|
let alfrescoJsApi: AlfrescoApi;
|
|
|
|
beforeEach(() => {
|
|
authResponseEcmMock = new EcmAuthMock(ECM_HOST);
|
|
authResponseBpmMock = new BpmAuthMock(BPM_HOST);
|
|
|
|
authResponseEcmMock.cleanAll();
|
|
authResponseBpmMock.cleanAll();
|
|
|
|
alfrescoJsApi = new AlfrescoApi({
|
|
hostEcm: ECM_HOST,
|
|
hostBpm: BPM_HOST,
|
|
provider: 'ALL'
|
|
});
|
|
});
|
|
|
|
describe('With Authentication', () => {
|
|
it('should Ticket be present in the client', () => {
|
|
authResponseBpmMock.get200Response();
|
|
authResponseEcmMock.get201Response();
|
|
|
|
const api = new AlfrescoApi({
|
|
ticketEcm: 'TICKET_4479f4d3bb155195879bfbb8d5206f433488a1b1',
|
|
ticketBpm: 'Basic YWRtaW46YWRtaW4=',
|
|
hostEcm: ECM_HOST,
|
|
hostBpm: BPM_HOST,
|
|
provider: 'ALL'
|
|
});
|
|
|
|
assert.equal('Basic YWRtaW46YWRtaW4=', api.processClient.authentications.basicAuth.ticket);
|
|
assert.equal('TICKET_4479f4d3bb155195879bfbb8d5206f433488a1b1', api.contentClient.authentications.basicAuth.password);
|
|
});
|
|
|
|
describe('login', () => {
|
|
it('should return the Ticket if all is ok', (done) => {
|
|
authResponseBpmMock.get200Response();
|
|
authResponseEcmMock.get201Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin').then((data: string[]) => {
|
|
assert.equal(data[0], 'TICKET_4479f4d3bb155195879bfbb8d5206f433488a1b1');
|
|
assert.equal(data[1], 'Basic YWRtaW46YWRtaW4=');
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail if only ECM fail', (done) => {
|
|
authResponseBpmMock.get200Response();
|
|
authResponseEcmMock.get401Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin').then(NOOP, () => {
|
|
done();
|
|
});
|
|
|
|
authResponseEcmMock.cleanAll();
|
|
});
|
|
|
|
it('should fail if only BPM fail', (done) => {
|
|
authResponseBpmMock.get401Response();
|
|
authResponseEcmMock.get201Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin').then(NOOP, () => {
|
|
done();
|
|
});
|
|
|
|
authResponseBpmMock.cleanAll();
|
|
});
|
|
});
|
|
|
|
describe('isLoggedIn', () => {
|
|
it('should return false if the api is logged out', (done) => {
|
|
authResponseBpmMock.get200Response();
|
|
authResponseEcmMock.get201Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin');
|
|
|
|
authResponseBpmMock.get200ResponseLogout();
|
|
authResponseEcmMock.get204ResponseLogout();
|
|
|
|
alfrescoJsApi.logout().then(() => {
|
|
assert.equal(alfrescoJsApi.isLoggedIn(), false);
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should return an error if wrong credential are used 401 the login fails', (done) => {
|
|
authResponseBpmMock.get401Response();
|
|
authResponseEcmMock.get401Response();
|
|
|
|
alfrescoJsApi.login('wrong', 'name').then(NOOP, (error: ErrorResponse) => {
|
|
assert.equal(error.status, 401);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
it('should return true if the api is logged in', (done) => {
|
|
authResponseBpmMock.get200Response();
|
|
authResponseEcmMock.get201Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin').then(() => {
|
|
assert.equal(alfrescoJsApi.isLoggedIn(), true);
|
|
done();
|
|
});
|
|
});
|
|
|
|
describe('Events ', () => {
|
|
it('should login fire an event if is unauthorized 401', (done) => {
|
|
authResponseBpmMock.get401Response();
|
|
authResponseEcmMock.get401Response();
|
|
|
|
const authPromise: any = alfrescoJsApi.login('wrong', 'name');
|
|
|
|
authPromise.catch(NOOP);
|
|
authPromise.on('unauthorized', () => {
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should The Api fire success event if is all ok 201', (done) => {
|
|
authResponseBpmMock.get200Response();
|
|
authResponseEcmMock.get201Response();
|
|
|
|
const authPromise: any = alfrescoJsApi.login('admin', 'admin');
|
|
|
|
authPromise.catch(NOOP);
|
|
authPromise.on('success', () => {
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should The Api fire logout event if the logout is successful', (done) => {
|
|
authResponseBpmMock.get200Response();
|
|
authResponseEcmMock.get201Response();
|
|
|
|
alfrescoJsApi.login('admin', 'admin');
|
|
|
|
authResponseBpmMock.get200ResponseLogout();
|
|
authResponseEcmMock.get204ResponseLogout();
|
|
|
|
(alfrescoJsApi.logout() as any).on('logout', () => {
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
});
|
|
});
|
|
});
|