Page MenuHomeSealhub

registration-intents.subtest.ts
No OneTemporary

registration-intents.subtest.ts

import axios from "axios";
import assert from "assert";
import { assertThrowsAsync } from "../../test_utils/assert-throws-async";
import { withRunningApp } from "../../test_utils/with-test-app";
import { Policies, Policy } from "../../main";
import { TestAppType } from "../../test_utils/test-app";
import UserRoles from "./user-roles";
import { DateTime } from "../base-chips/field-types/field-types";
const extend = (policy: Policy) => (t: TestAppType) =>
class extends t {
collections = {
...t.BaseCollections,
"user-roles": new UserRoles().setPolicy("create", policy),
};
};
describe("registration-intents", () => {
it("doesn't allow setting a role for registration intention when the user in context can't create user-roles", async () =>
withRunningApp(
extend(new Policies.Noone()),
async ({ app, base_url }) => {
await assertThrowsAsync(
() =>
axios.post(
`${base_url}/api/v1/collections/registration-intents`,
{
email: "cunning@fox.com",
role: "admin",
}
),
(e: any) => {
assert.equal(
e.response.data.data.role.message,
app.i18n("policy_users_who_can_deny", [
"create",
"user-roles",
app.i18n("policy_noone_deny"),
])
);
}
);
}
));
it("allows setting a role for registration intention when the user in context can create user-roles", async () =>
withRunningApp(
extend(new Policies.Public()),
async ({ app, base_url }) => {
const intent = (
await axios.post(
`${base_url}/api/v1/collections/registration-intents`,
{
email: "genuine@fox.com",
role: "admin",
}
)
).data;
assert.equal(intent.role, "admin");
const role = (
await app.collections["registration-intents"].suGetByID(
intent.id
)
).get("role");
assert.equal(role, "admin");
}
));
});

File Metadata

Mime Type
text/x-java
Expires
Wed, May 7, 19:37 (1 d, 18 h)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
662080
Default Alt Text
registration-intents.subtest.ts (1 KB)

Event Timeline