mirror of
https://github.com/Kong/insomnia
synced 2024-11-08 06:39:48 +00:00
6ef9a46814
* Add support for multiple remote projects per Team (#6009) * update fetching of teams * create and delete remote projects * backend project sync using the new teamProjectId in the API * indicator * use team api to get organization data * handle logged out state * remove remote from duplicate modal * remaining insomnia fetch fixes * fix ts issues * fix ts log issue * fix ts error * fix ts update * fix tests * remove log * add types to insomniaFetch * named arguments in vcs --------- Co-authored-by: jackkav <jackkav@gmail.com> * Project Presence (#6079) * fix ts log issue * fix ts update * update fetching of teams * create and delete remote projects * real-time * update api changes * check for successful response * get user profile * cleanup * update fetch * update network status * fix for insomniaFetch new api * insomnia fetch from window * fix missing stat * fix project dropdown * update avatar * update presence when closing the app * update the presence every minute * cleanup presence * use eventsource and improve debugging * Cloud only projects (#6167) * Add support for multiple remote projects per Team (#6009) * update fetching of teams * create and delete remote projects * backend project sync using the new teamProjectId in the API * indicator * use team api to get organization data * handle logged out state * remove remote from duplicate modal * remaining insomnia fetch fixes * fix ts issues * fix ts log issue * fix ts error * fix ts update * fix tests * remove log * add types to insomniaFetch * named arguments in vcs --------- Co-authored-by: jackkav <jackkav@gmail.com> * login routes * cleanup logged in state * update organizations * fixes * update migration * auto init sync on workspaces without git * fix auto init sync * checkpoint * update import options in empty project pane * responsive styles * update package-lock * join an org in sidebar * readability improvements * move modals and root loader to org * cleanup root * expire session take 1 * cleanup default org id * fix ts issue --------- Co-authored-by: jackkav <jackkav@gmail.com> * Add Scratch Pad collection (#6221) * add scratchpad collection * filter scratchpad from cloud migration * disable sync for scratchpad * update settings for scratchpad * log in rename * check if user is logged in or has logged in before * use organization api * organizations api fixes * update urls * move modals to root * update org navbar links * lint fix * type-check * Add form for setting up the staging env * add autolinking * onboarding * remove default org id * staging urls * avatar styles * update urls * use display name for orgs * update settings modal with dev * proper project deletions * fix api calls perf * sidebar improvements * layout styles * disable tests for now * fix boolean * fix data migration * dev settings styles * test init * organization names * link styles * improve scratchpad banner styles * http colors * url bar styles * spinner styles * breadcrumbs styles * help and feedback links * settings to root * onboarding * fetch remote projects on org nav * update avatar styles * use name initials in avatars * don't allow to delete default organization project * add scratchpad checks * tests * workspace settings tabs types * export all workspaces * fix types and personal org * project permission checks * continue with sso * organization avatars * project presence avatars * fix privacy/terms links * add the no-wrap classname * update user name and email in the app * fix delete action * ai fetching * generate tests in sequence to help with rate limiting * wip testing * wip test * improve test and migration script * fix ts * local to cloud projects test * set local-to-cloud-projects.test as slow * fix e2e tests * update settings tests * update more apis that changed from teams -> organizations * simplify remote project migration * org.branding can be undefined * fix imports issue in sr * remove .only * remove unused gql query * fix onboarding height jump * trust some rnd and upload artifacts on failure * fix env vars replacement on prod * fix constant name * bring back checks * fix inso test * add temp changes * fix inconsistent response handling * handle bad auth code errors * show email when logged in * remove the concept of default_project * cleanup auth styles * fix: use scratchpad constants wherever needed and remove seed * fix sentry lint error * migrate with update * add scratch pad fixture and typing * refactor pushSnapshotOnInitialize to always work * remove console.log * remove account from preferences * improve trail-lines styles * fix project sidebar scroll issue * only create diff of projects * fix lint * sync * feat: add plan upgrading modal for git sync (#6516) * feat: add plan upgrading modal for git sync * feat: add plan upgrading modal to project git menu and grid menu * fix: use JSON.parse for getting flag value * update ask modal * remove git option from workspace settings --------- Co-authored-by: gatzjames <jamesgatzos@gmail.com> * sort projectswith default at top * create local copies of remotes * update presence exit update * renames * fix deleting/renaming projects with remoteId * remoteId instead of projectId * remote-collections * fix initializeProjectForTeam * fix missing parentId in remote projects * add missing billing api * add migration page and check for migrations * cleanup project sync logic * fix remote projects updating * add notes * fix backend-project test * fix: use features API for fetching feature list (#6538) * members -> collaborators * remove dev settings * use shouldRunMigrations in onboarding * fix empty pane styles * remove beforeUnload for presence * show expiry info * better error for upgrade in new project action * extend retry period * fallback and control revalidate * add pending indicator for switching organizations * fix exports (#6553) * Sync Organizations (#6551) * organization cache and updates * error handling in org sync * sort organizations * clean up sort * org sort and avatar fallback --------- Co-authored-by: jackkav <jackkav@gmail.com> * Presence updates (#6552) * use remoteId for presence * use project loader for the active project * fix in present users * logic clean * match remoteId checks --------- Co-authored-by: jackkav <jackkav@gmail.com> * add default color to loading indicator * fix redirect loop when there are no projects * scratchpad fallback on initial route load * re-enable ai check * update error in renameProject * db query to get projects in workspace * review fix * comments * remove initModelFrom magic * fix lint issue --------- Co-authored-by: jackkav <jackkav@gmail.com> Co-authored-by: Mark Kim <mark.kim@konghq.com> Co-authored-by: Filipe Freire <livrofubia@gmail.com> Co-authored-by: Hexxa <hexxa@outlook.com>
169 lines
7.3 KiB
TypeScript
169 lines
7.3 KiB
TypeScript
import { expect } from '@playwright/test';
|
|
|
|
import { loadFixture } from '../../playwright/paths';
|
|
import { test } from '../../playwright/test';
|
|
|
|
test('can make oauth2 requests', async ({ app, page }) => {
|
|
if (process.platform === 'darwin') {
|
|
test.setTimeout(6 * 60 * 1000);
|
|
} else {
|
|
test.slow();
|
|
}
|
|
|
|
const sendButton = page.locator('[data-testid="request-pane"] button:has-text("Send")');
|
|
const statusTag = page.locator('[data-testid="response-status-tag"]:visible');
|
|
const responseBody = page.locator('[data-testid="CodeEditor"]:visible', {
|
|
has: page.locator('.CodeMirror-activeline'),
|
|
});
|
|
|
|
const projectView = page.locator('#wrapper');
|
|
await projectView.getByRole('button', { name: 'Create in project' }).click();
|
|
|
|
const text = await loadFixture('oauth.yaml');
|
|
await app.evaluate(async ({ clipboard }, text) => clipboard.writeText(text), text);
|
|
|
|
await page.getByRole('menuitemradio', { name: 'Import' }).click();
|
|
await page.locator('[data-test-id="import-from-clipboard"]').click();
|
|
await page.getByRole('button', { name: 'Scan' }).click();
|
|
await page.getByRole('dialog').getByRole('button', { name: 'Import' }).click();
|
|
await page.getByText('CollectionOAuth Testingjust now').click();
|
|
|
|
// Authorization code
|
|
await projectView.getByLabel('Request Collection').getByRole('row', { name: 'Authorization Code' }).click();
|
|
|
|
// No PKCE
|
|
await projectView.getByLabel('Request Collection').getByRole('row', { name: 'No PKCE' }).click();
|
|
await expect(page.locator('.app')).toContainText('http://127.0.0.1:4010/oidc/me');
|
|
|
|
const [authorizationCodePage] = await Promise.all([
|
|
app.waitForEvent('window'),
|
|
sendButton.click(),
|
|
]);
|
|
|
|
await authorizationCodePage.waitForLoadState();
|
|
await authorizationCodePage.waitForFunction("document.cookie !== ''");
|
|
await authorizationCodePage.locator('[name="login"]').fill('admin');
|
|
await authorizationCodePage.locator('[name="password"]').fill('admin');
|
|
await authorizationCodePage.locator('button:has-text("Sign-in")').click();
|
|
|
|
await expect(statusTag).toContainText('200 OK');
|
|
await expect(responseBody).toContainText('"sub": "admin"');
|
|
|
|
// Navigate to the OAuth2 Tab and refresh the token from there
|
|
await page.getByRole('tab', { name: 'OAuth 2' }).click();
|
|
|
|
const tokenInput = page.locator('[for="Access-Token"] > input');
|
|
const prevToken = await tokenInput.inputValue();
|
|
await page.locator('button:has-text("Refresh Token")').click();
|
|
await expect(tokenInput).not.toHaveValue(prevToken);
|
|
|
|
// Clear the session and tokens and fetch a token manually
|
|
await page.locator('text=Advanced Options').click();
|
|
await page.locator('button:has-text("Clear OAuth 2 session")').click();
|
|
await page.locator('button:text-is("Clear")').click();
|
|
|
|
const [refreshPage] = await Promise.all([
|
|
app.waitForEvent('window'),
|
|
page.locator('button:has-text("Fetch Tokens")').click(),
|
|
]);
|
|
|
|
await refreshPage.waitForLoadState();
|
|
// expect an _interaction cookie to be set with the sign in form
|
|
await refreshPage.waitForFunction("document.cookie !== ''");
|
|
await refreshPage.locator('[name="login"]').fill('admin');
|
|
await refreshPage.locator('[name="password"]').fill('admin');
|
|
await refreshPage.locator('button:has-text("Sign-in")').click();
|
|
|
|
await expect(tokenInput).not.toHaveValue('');
|
|
|
|
// PKCE SHA256
|
|
await page.getByLabel('Request Collection').getByRole('row', { name: 'PKCE SHA256' }).click();
|
|
await expect(page.locator('.app')).toContainText('http://127.0.0.1:4010/oidc/me');
|
|
await expect(page.locator('#Grant-Type')).toHaveValue('authorization_code');
|
|
await expect(page.locator('#Code-Challenge-Method')).toHaveValue('S256');
|
|
await sendButton.click();
|
|
await expect(statusTag).toContainText('200 OK');
|
|
await expect(responseBody).toContainText('"sub": "admin"');
|
|
|
|
// PKCE Plain
|
|
await page.getByLabel('Request Collection').getByRole('row', { name: 'PKCE Plain' }).click();
|
|
await expect(page.locator('.app')).toContainText('http://127.0.0.1:4010/oidc/me');
|
|
await expect(page.locator('#Grant-Type')).toHaveValue('authorization_code');
|
|
await expect(page.locator('#Code-Challenge-Method')).toHaveValue('plain');
|
|
await sendButton.click();
|
|
await expect(statusTag).toContainText('200 OK');
|
|
await expect(responseBody).toContainText('"sub": "admin"');
|
|
|
|
// Reset the OAuth 2 session from Preferences
|
|
if (process.platform === 'darwin') {
|
|
await page.keyboard.press('Meta+,');
|
|
} else {
|
|
await page.keyboard.press('Control+,');
|
|
}
|
|
await page.locator('button:has-text("Clear OAuth 2 session")').click();
|
|
await page.keyboard.press('Escape');
|
|
|
|
// Implicit
|
|
await page.getByLabel('Request Collection').getByRole('row', { name: 'Implicit' }).click();
|
|
|
|
// ID Token
|
|
await page.getByLabel('Request Collection').getByRole('row', { name: 'ID Token' }).click();
|
|
await expect(page.locator('.app')).toContainText('http://127.0.0.1:4010/oidc/id-token');
|
|
await expect(page.locator('#Grant-Type')).toHaveValue('implicit');
|
|
|
|
const [implicitPage] = await Promise.all([
|
|
app.waitForEvent('window'),
|
|
sendButton.click(),
|
|
]);
|
|
await implicitPage.waitForLoadState();
|
|
await implicitPage.waitForFunction("document.cookie !== ''");
|
|
await implicitPage.locator('[name="login"]').fill('admin');
|
|
await implicitPage.locator('[name="password"]').fill('admin');
|
|
await implicitPage.locator('button:has-text("Sign-in")').click();
|
|
|
|
await expect(statusTag).toContainText('200 OK');
|
|
await expect(responseBody).toContainText('"sub": "admin"');
|
|
|
|
// ID and Access Token
|
|
await page.getByLabel('Request Collection').getByRole('row', { name: 'ID and Access Token' }).click();
|
|
await expect(page.locator('.app')).toContainText('http://127.0.0.1:4010/oidc/me');
|
|
await expect(page.locator('#Grant-Type')).toHaveValue('implicit');
|
|
await sendButton.click();
|
|
await expect(statusTag).toContainText('200 OK');
|
|
await expect(responseBody).toContainText('"sub": "admin"');
|
|
|
|
// Reset the OAuth 2 session from Preferences
|
|
if (process.platform === 'darwin') {
|
|
await page.keyboard.press('Meta+,');
|
|
} else {
|
|
await page.keyboard.press('Control+,');
|
|
}
|
|
await page.locator('button:has-text("Clear OAuth 2 session")').click();
|
|
await page.keyboard.press('Escape');
|
|
|
|
// Client Credentials
|
|
await page.getByLabel('Request Collection').getByRole('row', { name: 'Client Credentials' }).click();
|
|
await expect(page.locator('.app')).toContainText('http://127.0.0.1:4010/oidc/client-credential');
|
|
await expect(page.locator('#Grant-Type')).toHaveValue('client_credentials');
|
|
await sendButton.click();
|
|
await expect(statusTag).toContainText('200 OK');
|
|
await expect(responseBody).toContainText('"clientId": "client_credentials"');
|
|
|
|
// Reset the OAuth 2 session from Preferences
|
|
if (process.platform === 'darwin') {
|
|
await page.keyboard.press('Meta+,');
|
|
} else {
|
|
await page.keyboard.press('Control+,');
|
|
}
|
|
await page.locator('button:has-text("Clear OAuth 2 session")').click();
|
|
await page.keyboard.press('Escape');
|
|
|
|
// Resource Owner Password Credentials
|
|
await page.getByLabel('Request Collection').getByRole('row', { name: 'Resource Owner Password Credentials' }).click();
|
|
await expect(page.locator('.app')).toContainText('http://127.0.0.1:4010/oidc/me');
|
|
await expect(page.locator('#Grant-Type')).toHaveValue('password');
|
|
await sendButton.click();
|
|
await expect(statusTag).toContainText('200 OK');
|
|
await expect(responseBody).toContainText('"sub": "foo"');
|
|
});
|