Some checks are pending
Automatisch Backend Tests / test (push) Waiting to run
Automatisch CI / linter (push) Waiting to run
Automatisch CI / start-backend-server (push) Waiting to run
Automatisch CI / start-backend-worker (push) Waiting to run
Automatisch CI / build-web (push) Waiting to run
Automatisch UI Tests / test (push) Waiting to run
85 lines
3.5 KiB
JavaScript
85 lines
3.5 KiB
JavaScript
const { publicTest, expect } = require('../../fixtures/index');
|
|
const { pgPool } = require('../../fixtures/postgres-config');
|
|
const { DateTime } = require('luxon');
|
|
|
|
publicTest.describe('Accept invitation page', () => {
|
|
publicTest('should not be able to set the password if token is empty', async ({ acceptInvitationPage }) => {
|
|
await acceptInvitationPage.open('');
|
|
await acceptInvitationPage.excpectSubmitButtonToBeDisabled();
|
|
await acceptInvitationPage.fillPasswordField('something');
|
|
await acceptInvitationPage.excpectSubmitButtonToBeDisabled();
|
|
});
|
|
|
|
publicTest('should not be able to set the password if token is not in db', async ({ acceptInvitationPage }) => {
|
|
await acceptInvitationPage.open('abc');
|
|
await acceptInvitationPage.acceptInvitation('something');
|
|
await acceptInvitationPage.expectAlertToBeVisible();
|
|
});
|
|
|
|
publicTest.describe('Accept invitation page - users', () => {
|
|
const expiredTokenDate = DateTime.now().minus({ days: 3 }).toISO();
|
|
const token = (Math.random() + 1).toString(36).substring(2);
|
|
|
|
publicTest('should not be able to set the password if token is expired', async ({ acceptInvitationPage, adminCreateUserPage }) => {
|
|
adminCreateUserPage.seed(Math.ceil(Math.random() * Number.MAX_SAFE_INTEGER));
|
|
const user = adminCreateUserPage.generateUser();
|
|
|
|
const queryRole = {
|
|
text: 'SELECT * FROM roles WHERE name = $1',
|
|
values: ['Admin']
|
|
};
|
|
|
|
try {
|
|
const queryRoleIdResult = await pgPool.query(queryRole);
|
|
expect(queryRoleIdResult.rowCount).toEqual(1);
|
|
|
|
const insertUser = {
|
|
text: 'INSERT INTO users (email, full_name, role_id, status, invitation_token, invitation_token_sent_at) VALUES ($1, $2, $3, $4, $5, $6)',
|
|
values: [user.email, user.fullName, queryRoleIdResult.rows[0].id, 'invited', token, expiredTokenDate],
|
|
};
|
|
|
|
const insertUserResult = await pgPool.query(insertUser);
|
|
expect(insertUserResult.rowCount).toBe(1);
|
|
expect(insertUserResult.command).toBe('INSERT');
|
|
} catch (err) {
|
|
console.error(err.message);
|
|
throw err;
|
|
}
|
|
await acceptInvitationPage.open(token);
|
|
await acceptInvitationPage.acceptInvitation('something');
|
|
await acceptInvitationPage.expectAlertToBeVisible();
|
|
});
|
|
|
|
publicTest('should not be able to accept invitation if user was soft deleted', async ({ acceptInvitationPage, adminCreateUserPage }) => {
|
|
const dateNow = DateTime.now().toISO();
|
|
const user = adminCreateUserPage.generateUser();
|
|
|
|
const queryRole = {
|
|
text: 'SELECT * FROM roles WHERE name = $1',
|
|
values: ['Admin']
|
|
};
|
|
|
|
try {
|
|
const queryRoleIdResult = await pgPool.query(queryRole);
|
|
expect(queryRoleIdResult.rowCount).toEqual(1);
|
|
|
|
const insertUser = {
|
|
text: 'INSERT INTO users (email, full_name, deleted_at, role_id, status, invitation_token, invitation_token_sent_at) VALUES ($1, $2, $3, $4, $5, $6, $7)',
|
|
values: [user.email, user.fullName, dateNow, queryRoleIdResult.rows[0].id, 'invited', token, dateNow],
|
|
};
|
|
|
|
const insertUserResult = await pgPool.query(insertUser);
|
|
expect(insertUserResult.rowCount).toBe(1);
|
|
expect(insertUserResult.command).toBe('INSERT');
|
|
} catch (err) {
|
|
console.error(err.message);
|
|
throw err;
|
|
}
|
|
|
|
await acceptInvitationPage.open(token);
|
|
await acceptInvitationPage.acceptInvitation('something');
|
|
await acceptInvitationPage.expectAlertToBeVisible();
|
|
});
|
|
});
|
|
});
|