forked from didirus/AstralRinth
* WIP end-of-day push * Authorize endpoint, accept endpoints, DB stuff for oauth clients, their redirects, and client authorizations * OAuth Client create route * Get user clients * Client delete * Edit oauth client * Include redirects in edit client route * Database stuff for tokens * Reorg oauth stuff out of auth/flows and into its own module * Impl OAuth get access token endpoint * Accept oauth access tokens as auth and update through AuthQueue * User OAuth authorization management routes * Forgot to actually add the routes lol * Bit o cleanup * Happy path test for OAuth and minor fixes for things it found * Add dummy data oauth client (and detect/handle dummy data version changes) * More tests * Another test * More tests and reject endpoint * Test oauth client and authorization management routes * cargo sqlx prepare * dead code warning * Auto clippy fixes * Uri refactoring * minor name improvement * Don't compile-time check the test sqlx queries * Trying to fix db concurrency problem to get tests to pass * Try fix from test PR * Fixes for updated sqlx * Prevent restricted scopes from being requested or issued * Get OAuth client(s) * Remove joined oauth client info from authorization returns * Add default conversion to OAuthError::error so we can use ? * Rework routes * Consolidate scopes into SESSION_ACCESS * Cargo sqlx prepare * Parse to OAuthClientId automatically through serde and actix * Cargo clippy * Remove validation requiring 1 redirect URI on oauth client creation * Use serde(flatten) on OAuthClientCreationResult
177 lines
5.6 KiB
Rust
177 lines
5.6 KiB
Rust
use actix_http::StatusCode;
|
|
use actix_web::{dev::ServiceResponse, test};
|
|
use labrinth::models::{
|
|
notifications::Notification,
|
|
teams::{OrganizationPermissions, ProjectPermissions, TeamMember},
|
|
};
|
|
use serde_json::json;
|
|
|
|
use crate::common::asserts::assert_status;
|
|
|
|
use super::ApiV2;
|
|
|
|
impl ApiV2 {
|
|
pub async fn get_team_members(&self, id_or_title: &str, pat: &str) -> ServiceResponse {
|
|
let req = test::TestRequest::get()
|
|
.uri(&format!("/v2/team/{id_or_title}/members"))
|
|
.append_header(("Authorization", pat))
|
|
.to_request();
|
|
self.call(req).await
|
|
}
|
|
|
|
pub async fn get_team_members_deserialized(
|
|
&self,
|
|
id_or_title: &str,
|
|
pat: &str,
|
|
) -> Vec<TeamMember> {
|
|
let resp = self.get_team_members(id_or_title, pat).await;
|
|
assert_eq!(resp.status(), 200);
|
|
test::read_body_json(resp).await
|
|
}
|
|
|
|
pub async fn get_project_members(&self, id_or_title: &str, pat: &str) -> ServiceResponse {
|
|
let req = test::TestRequest::get()
|
|
.uri(&format!("/v2/project/{id_or_title}/members"))
|
|
.append_header(("Authorization", pat))
|
|
.to_request();
|
|
self.call(req).await
|
|
}
|
|
|
|
pub async fn get_project_members_deserialized(
|
|
&self,
|
|
id_or_title: &str,
|
|
pat: &str,
|
|
) -> Vec<TeamMember> {
|
|
let resp = self.get_project_members(id_or_title, pat).await;
|
|
assert_eq!(resp.status(), 200);
|
|
test::read_body_json(resp).await
|
|
}
|
|
|
|
pub async fn get_organization_members(&self, id_or_title: &str, pat: &str) -> ServiceResponse {
|
|
let req = test::TestRequest::get()
|
|
.uri(&format!("/v2/organization/{id_or_title}/members"))
|
|
.append_header(("Authorization", pat))
|
|
.to_request();
|
|
self.call(req).await
|
|
}
|
|
|
|
pub async fn get_organization_members_deserialized(
|
|
&self,
|
|
id_or_title: &str,
|
|
pat: &str,
|
|
) -> Vec<TeamMember> {
|
|
let resp = self.get_organization_members(id_or_title, pat).await;
|
|
assert_eq!(resp.status(), 200);
|
|
test::read_body_json(resp).await
|
|
}
|
|
|
|
pub async fn join_team(&self, team_id: &str, pat: &str) -> ServiceResponse {
|
|
let req = test::TestRequest::post()
|
|
.uri(&format!("/v2/team/{team_id}/join"))
|
|
.append_header(("Authorization", pat))
|
|
.to_request();
|
|
self.call(req).await
|
|
}
|
|
|
|
pub async fn remove_from_team(
|
|
&self,
|
|
team_id: &str,
|
|
user_id: &str,
|
|
pat: &str,
|
|
) -> ServiceResponse {
|
|
let req = test::TestRequest::delete()
|
|
.uri(&format!("/v2/team/{team_id}/members/{user_id}"))
|
|
.append_header(("Authorization", pat))
|
|
.to_request();
|
|
self.call(req).await
|
|
}
|
|
|
|
pub async fn edit_team_member(
|
|
&self,
|
|
team_id: &str,
|
|
user_id: &str,
|
|
patch: serde_json::Value,
|
|
pat: &str,
|
|
) -> ServiceResponse {
|
|
let req = test::TestRequest::patch()
|
|
.uri(&format!("/v2/team/{team_id}/members/{user_id}"))
|
|
.append_header(("Authorization", pat))
|
|
.set_json(patch)
|
|
.to_request();
|
|
self.call(req).await
|
|
}
|
|
|
|
pub async fn transfer_team_ownership(
|
|
&self,
|
|
team_id: &str,
|
|
user_id: &str,
|
|
pat: &str,
|
|
) -> ServiceResponse {
|
|
let req = test::TestRequest::patch()
|
|
.uri(&format!("/v2/team/{team_id}/owner"))
|
|
.append_header(("Authorization", pat))
|
|
.set_json(json!({
|
|
"user_id": user_id,
|
|
}))
|
|
.to_request();
|
|
self.call(req).await
|
|
}
|
|
|
|
pub async fn get_user_notifications(&self, user_id: &str, pat: &str) -> ServiceResponse {
|
|
let req = test::TestRequest::get()
|
|
.uri(&format!("/v2/user/{user_id}/notifications"))
|
|
.append_header(("Authorization", pat))
|
|
.to_request();
|
|
self.call(req).await
|
|
}
|
|
|
|
pub async fn get_user_notifications_deserialized(
|
|
&self,
|
|
user_id: &str,
|
|
pat: &str,
|
|
) -> Vec<Notification> {
|
|
let resp = self.get_user_notifications(user_id, pat).await;
|
|
assert_status(&resp, StatusCode::OK);
|
|
test::read_body_json(resp).await
|
|
}
|
|
|
|
pub async fn mark_notification_read(
|
|
&self,
|
|
notification_id: &str,
|
|
pat: &str,
|
|
) -> ServiceResponse {
|
|
let req = test::TestRequest::patch()
|
|
.uri(&format!("/v2/notification/{notification_id}"))
|
|
.append_header(("Authorization", pat))
|
|
.to_request();
|
|
self.call(req).await
|
|
}
|
|
pub async fn add_user_to_team(
|
|
&self,
|
|
team_id: &str,
|
|
user_id: &str,
|
|
project_permissions: Option<ProjectPermissions>,
|
|
organization_permissions: Option<OrganizationPermissions>,
|
|
pat: &str,
|
|
) -> ServiceResponse {
|
|
let req = test::TestRequest::post()
|
|
.uri(&format!("/v2/team/{team_id}/members"))
|
|
.append_header(("Authorization", pat))
|
|
.set_json(json!( {
|
|
"user_id": user_id,
|
|
"permissions" : project_permissions.map(|p| p.bits()).unwrap_or_default(),
|
|
"organization_permissions" : organization_permissions.map(|p| p.bits()),
|
|
}))
|
|
.to_request();
|
|
self.call(req).await
|
|
}
|
|
|
|
pub async fn delete_notification(&self, notification_id: &str, pat: &str) -> ServiceResponse {
|
|
let req = test::TestRequest::delete()
|
|
.uri(&format!("/v2/notification/{notification_id}"))
|
|
.append_header(("Authorization", pat))
|
|
.to_request();
|
|
self.call(req).await
|
|
}
|
|
}
|