mirror of
https://github.com/Alfresco/alfresco-ng2-components.git
synced 2025-05-12 17:04:57 +00:00
* remove useless module * upgrade to angular 8 * upgrade material to v8 * upgrade adf libs * migrate demo shell to v8 * upgrade to angular 9 * upgrade material to v9 * remove hammer * upgrade nx * upgrade datetime picker * upgrade flex layout * update core api * remove entry components * code fixes * upgrade testbed usage * code fixes * remove unnecessary core-js from tests * upgrade CLI * ts config fixes * fix builds * fix testing config * compile fixes * fix demo shell dev setup * fix core tests * fix card view import * upgrade nx * disable smart builds for now * remove fdescribe * restore smart builds * fix issues * unify tsconfigs and fix newly found issues * fix configuration and cleanup package scripts * improved production build from the same config * use ADF libs directly instead of node_modules * disable smart build * single app configuration (angular) * fix core build * fix build scripts * lint fixes * fix linting setup * fix linting rules * various fixes * disable affected libs for unit tests * cleanup insights package.json * simplify smart-build * fix content tests * fix tests * test fixes * fix tests * fix test * fix tests * disable AppExtensionsModule (monaco example) * remove monaco extension module * upgrade bundle check rules * fix insights tests and karma config * fix protractor config * e2e workaround * upgrade puppeteer and split linting and build * reusable resources config * update protractor config * fix after rebase * fix protractor config * fix e2e tsconfig * update e2e setup * Save demoshell artifact on S3 and remove travis cache * Push the libs on S3 and fetch before releasing it * Add deps * Add dependencies among libs and run only affected unit test and build * fix the travis stage name * fix after renaming dev to demoshell * force the order of the projects * remove unused dependencies * fix content e2e script * exit codes fix * add extra exit codes to core e2e * postinstall hook and package cleanup * cleanup packages * remove deprecated code and dependency on router * improve bundle analyzer script * minor code fixes * update spec * fix code after rebase * upgrade protractor after rebase * fix e2e mapping lib * Update tsconfig.e2e.json * update e2e tsconfig * fix angular config * fix protractor runs * cache dist folder for libs * update material selectors for dropdowns * selector fixes * remove duplicated e2e that have unit tests already * fix login selector * fix e2e * fix test * fix import issues * fix selector * cleanup old monaco extension files * cleanup demo shell login * add protractor max retries * disable customisations of protractor * fix login validation * fix after rebase * fix after rebase, disable latest versions of libs * Hide the report tab and rollback the localstorage * rename protractor config back to js * restore lint as part of build * cleanup code * do not copy anything to node_modules on dist test * fix unit tests * config fixes * fix code * fix code after rebase * fix tests * remove existing words from spellcheck * remove useless directive decorators * update package.json after rebase * add js-api back * code fixes * add missing export * update configs * fix code * try fix the sso login test * fix * remove puppeteer unit * fix e2e script * fix * make provider easy * fix routes module before upgrade * fix unit tests * upgrade angular cli * upgrade to angular 10 Co-authored-by: maurizio vitale <maurizio.vitale@alfresco.com> Co-authored-by: Eugenio Romano <eugenio.romano@alfresco.com> Co-authored-by: Eugenio Romano <eromano@users.noreply.github.com>
173 lines
7.5 KiB
TypeScript
173 lines
7.5 KiB
TypeScript
/*!
|
|
* @license
|
|
* Copyright 2019 Alfresco Software, Ltd.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
import { TestBed } from '@angular/core/testing';
|
|
import { ContentService } from './content.service';
|
|
import { AppConfigService } from '../app-config/app-config.service';
|
|
import { AuthenticationService } from './authentication.service';
|
|
import { StorageService } from './storage.service';
|
|
import { setupTestBed } from '../testing/setup-test-bed';
|
|
import { Node } from '@alfresco/js-api';
|
|
import { CoreTestingModule } from '../testing';
|
|
import { TranslateModule } from '@ngx-translate/core';
|
|
|
|
declare let jasmine: any;
|
|
|
|
describe('ContentService', () => {
|
|
|
|
let contentService: ContentService;
|
|
let authService: AuthenticationService;
|
|
let storage: StorageService;
|
|
let node: any;
|
|
|
|
const nodeId = 'fake-node-id';
|
|
|
|
setupTestBed({
|
|
imports: [
|
|
TranslateModule.forRoot(),
|
|
CoreTestingModule
|
|
]
|
|
});
|
|
|
|
beforeEach(() => {
|
|
authService = TestBed.inject(AuthenticationService);
|
|
contentService = TestBed.inject(ContentService);
|
|
storage = TestBed.inject(StorageService);
|
|
storage.clear();
|
|
|
|
node = {
|
|
entry: {
|
|
id: nodeId
|
|
}
|
|
};
|
|
|
|
jasmine.Ajax.install();
|
|
|
|
const appConfig: AppConfigService = TestBed.inject(AppConfigService);
|
|
appConfig.config = {
|
|
ecmHost: 'http://localhost:9876/ecm',
|
|
provider: 'ECM'
|
|
};
|
|
});
|
|
|
|
afterEach(() => {
|
|
jasmine.Ajax.uninstall();
|
|
});
|
|
|
|
it('should return a valid content URL', (done) => {
|
|
authService.login('fake-username', 'fake-password').subscribe(() => {
|
|
expect(contentService.getContentUrl(node)).toContain('/ecm/alfresco/api/' +
|
|
'-default-/public/alfresco/versions/1/nodes/fake-node-id/content?attachment=false&alf_ticket=fake-post-ticket');
|
|
done();
|
|
});
|
|
|
|
jasmine.Ajax.requests.mostRecent().respondWith({
|
|
'status': 201,
|
|
contentType: 'application/json',
|
|
responseText: JSON.stringify({ 'entry': { 'id': 'fake-post-ticket', 'userId': 'admin' } })
|
|
});
|
|
});
|
|
|
|
it('should return a valid thumbnail URL', (done) => {
|
|
authService.login('fake-username', 'fake-password').subscribe(() => {
|
|
expect(contentService.getDocumentThumbnailUrl(node))
|
|
.toContain('/ecm/alfresco/api/-default-/public/alfresco' +
|
|
'/versions/1/nodes/fake-node-id/renditions/doclib/content?attachment=false&alf_ticket=fake-post-ticket');
|
|
done();
|
|
});
|
|
|
|
jasmine.Ajax.requests.mostRecent().respondWith({
|
|
'status': 201,
|
|
contentType: 'application/json',
|
|
responseText: JSON.stringify({ 'entry': { 'id': 'fake-post-ticket', 'userId': 'admin' } })
|
|
});
|
|
});
|
|
|
|
describe('AllowableOperations', () => {
|
|
|
|
it('should hasAllowableOperations be false if allowableOperation is not present in the node', () => {
|
|
const permissionNode = new Node({});
|
|
expect(contentService.hasAllowableOperations(permissionNode, 'create')).toBeFalsy();
|
|
});
|
|
|
|
it('should hasAllowableOperations be true if allowableOperation is present and you have the permission for the request operation', () => {
|
|
const permissionNode = new Node({ allowableOperations: ['delete', 'update', 'create', 'updatePermissions'] });
|
|
|
|
expect(contentService.hasAllowableOperations(permissionNode, 'create')).toBeTruthy();
|
|
});
|
|
|
|
it('should hasAllowableOperations be false if allowableOperation is present but you don\'t have the permission for the request operation', () => {
|
|
const permissionNode = new Node({ allowableOperations: ['delete', 'update', 'updatePermissions'] });
|
|
expect(contentService.hasAllowableOperations(permissionNode, 'create')).toBeFalsy();
|
|
});
|
|
|
|
it('should hasAllowableOperations works in the opposite way with negate value', () => {
|
|
const permissionNode = new Node({ allowableOperations: ['delete', 'update', 'updatePermissions'] });
|
|
expect(contentService.hasAllowableOperations(permissionNode, '!create')).toBeTruthy();
|
|
});
|
|
|
|
it('should hasAllowableOperations return false if no permission parameter are passed', () => {
|
|
const permissionNode = new Node({ allowableOperations: ['delete', 'update', 'updatePermissions'] });
|
|
expect(contentService.hasAllowableOperations(permissionNode, null)).toBeFalsy();
|
|
});
|
|
|
|
it('should havePermission return true if permission parameter is copy', () => {
|
|
const permissionNode = null;
|
|
expect(contentService.hasAllowableOperations(permissionNode, 'copy')).toBeTruthy();
|
|
});
|
|
});
|
|
|
|
describe('Permissions', () => {
|
|
|
|
it('should havePermission be false if allowableOperation is not present in the node', () => {
|
|
const permissionNode = new Node({});
|
|
expect(contentService.hasPermissions(permissionNode, 'manager')).toBeFalsy();
|
|
});
|
|
|
|
it('should havePermission be true if permissions is present and you have the permission for the request operation', () => {
|
|
const permissionNode = new Node({ permissions: { locallySet: [{ name: 'manager' }, { name: 'collaborator' }, { name: 'consumer' }] } });
|
|
|
|
expect(contentService.hasPermissions(permissionNode, 'manager')).toBeTruthy();
|
|
});
|
|
|
|
it('should havePermission be false if permissions is present but you don\'t have the permission for the request operation', () => {
|
|
const permissionNode = new Node({ permissions: { locallySet: [{ name: 'collaborator' }, { name: 'consumer' }] } });
|
|
expect(contentService.hasPermissions(permissionNode, 'manager')).toBeFalsy();
|
|
});
|
|
|
|
it('should havePermission works in the opposite way with negate value', () => {
|
|
const permissionNode = new Node({ permissions: { locallySet: [{ name: 'collaborator' }, { name: 'consumer' }] } });
|
|
expect(contentService.hasPermissions(permissionNode, '!manager')).toBeTruthy();
|
|
});
|
|
|
|
it('should havePermission return false if no permission parameter are passed', () => {
|
|
const permissionNode = new Node({ permissions: { locallySet: [{ name: 'collaborator' }, { name: 'consumer' }] } });
|
|
expect(contentService.hasPermissions(permissionNode, null)).toBeFalsy();
|
|
});
|
|
|
|
it('should havePermission return true if the permissions is empty and the permission to check is Consumer', () => {
|
|
const permissionNode = new Node({ permissions: [] });
|
|
expect(contentService.hasPermissions(permissionNode, 'Consumer')).toBeTruthy();
|
|
});
|
|
|
|
it('should havePermission return false if the permissions is empty and the permission to check is not Consumer', () => {
|
|
const permissionNode = new Node({ permissions: [] });
|
|
expect(contentService.hasPermissions(permissionNode, '!Consumer')).toBeFalsy();
|
|
});
|
|
});
|
|
});
|