Compare commits
107 Commits
@nhost/das
...
@nhost/vue
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
11b4d12f12 | ||
|
|
12301e6551 | ||
|
|
74e52cac2d | ||
|
|
f17823760a | ||
|
|
bb8803a1e3 | ||
|
|
b846291331 | ||
|
|
2b2fb94f00 | ||
|
|
551760c4f0 | ||
|
|
5ae5a8e77d | ||
|
|
56aae0c964 | ||
|
|
a0e093d77b | ||
|
|
5e82e1b3da | ||
|
|
e618b705e7 | ||
|
|
a232c9f0f6 | ||
|
|
bf4644ea10 | ||
|
|
0aca907ea4 | ||
|
|
394f4c4174 | ||
|
|
8fef08a150 | ||
|
|
1bd2c37301 | ||
|
|
5cdb70bd81 | ||
|
|
1a5f80e1b6 | ||
|
|
59e0cb00c5 | ||
|
|
406b0f2cb7 | ||
|
|
d329b6218f | ||
|
|
335b58670e | ||
|
|
efa2d89067 | ||
|
|
77ce4bd738 | ||
|
|
017adea700 | ||
|
|
378284faa8 | ||
|
|
e5e2d114b1 | ||
|
|
5e3dbdeb7d | ||
|
|
98b777491a | ||
|
|
71de870cb0 | ||
|
|
74d4deba28 | ||
|
|
cb248f0d30 | ||
|
|
09e4f1eb34 | ||
|
|
19818e2b59 | ||
|
|
6e1f03eaee | ||
|
|
b3eeec82ef | ||
|
|
34ff254696 | ||
|
|
867c807699 | ||
|
|
1c4806bf51 | ||
|
|
2fb82ec97d | ||
|
|
d0673d7825 | ||
|
|
106f23dcfa | ||
|
|
0c994a9651 | ||
|
|
83ef755822 | ||
|
|
b7703ffd70 | ||
|
|
4713cecfc2 | ||
|
|
340ea5b115 | ||
|
|
f79eebadbf | ||
|
|
ac174b5e51 | ||
|
|
dc9ddfc9ae | ||
|
|
3bdd9f570c | ||
|
|
94477be998 | ||
|
|
568577e8ca | ||
|
|
e93b06ab8f | ||
|
|
c75bf46ba1 | ||
|
|
63a1fd09b5 | ||
|
|
630d44ad6e | ||
|
|
d7db521974 | ||
|
|
90e4053f0a | ||
|
|
8e9d5d1b38 | ||
|
|
43c86fef14 | ||
|
|
6b97340cf4 | ||
|
|
1605756362 | ||
|
|
6437544384 | ||
|
|
b4dcd1996d | ||
|
|
7fb73dbb1b | ||
|
|
a66b11d245 | ||
|
|
912ed76c64 | ||
|
|
b47c0d1af7 | ||
|
|
b97ab2be2f | ||
|
|
f12cb666ff | ||
|
|
c3b2b1cd02 | ||
|
|
c0b71102d4 | ||
|
|
5f68ae95c4 | ||
|
|
2d1b7bb292 | ||
|
|
ee154d4eca | ||
|
|
58ef9bbe02 | ||
|
|
f3f35beefd | ||
|
|
d31330e6c0 | ||
|
|
c3dda79d95 | ||
|
|
7c1273725d | ||
|
|
70be0e1ab4 | ||
|
|
4f5870cfd7 | ||
|
|
623607476e | ||
|
|
1e232713d9 | ||
|
|
1ed647c4e9 | ||
|
|
b666a173b1 | ||
|
|
caba147b32 | ||
|
|
ca365fc8e7 | ||
|
|
d88cdedb26 | ||
|
|
1de08cecaf | ||
|
|
47bb997036 | ||
|
|
4e4d962f30 | ||
|
|
883fb82c77 | ||
|
|
c9f5634ac2 | ||
|
|
6ee9a589fb | ||
|
|
e2d733cf34 | ||
|
|
a0d7327c8d | ||
|
|
c7c8a20334 | ||
|
|
ce4b655c55 | ||
|
|
dc57d31ec9 | ||
|
|
ea29fd6b73 | ||
|
|
d8e4073957 | ||
|
|
3f399a54a3 |
@@ -23,9 +23,7 @@ runs:
|
||||
- uses: actions/cache@v3
|
||||
id: pnpm-cache
|
||||
with:
|
||||
path: |
|
||||
${{ steps.pnpm-cache-dir.outputs.dir }}
|
||||
~/.cache/Cypress
|
||||
path: ${{ steps.pnpm-cache-dir.outputs.dir }}
|
||||
key: ${{ runner.os }}-node-${{ hashFiles('pnpm-lock.yaml') }}
|
||||
restore-keys: ${{ runner.os }}-node-
|
||||
- name: Use Node.js 16
|
||||
|
||||
32
.github/workflows/ci.yaml
vendored
32
.github/workflows/ci.yaml
vendored
@@ -24,6 +24,7 @@ env:
|
||||
NHOST_TEST_PROJECT_NAME: ${{ vars.NHOST_TEST_PROJECT_NAME }}
|
||||
NHOST_TEST_USER_EMAIL: ${{ secrets.NHOST_TEST_USER_EMAIL }}
|
||||
NHOST_TEST_USER_PASSWORD: ${{ secrets.NHOST_TEST_USER_PASSWORD }}
|
||||
NHOST_TEST_PROJECT_ADMIN_SECRET: ${{ secrets.NHOST_TEST_PROJECT_ADMIN_SECRET }}
|
||||
|
||||
jobs:
|
||||
build:
|
||||
@@ -128,21 +129,34 @@ jobs:
|
||||
- name: Install Nhost CLI
|
||||
if: hashFiles(format('{0}/nhost/config.yaml', matrix.package.path)) != ''
|
||||
uses: ./.github/actions/nhost-cli
|
||||
- name: Fetch Dashboard Preview URL
|
||||
id: fetch-dashboard-preview-url
|
||||
uses: zentered/vercel-preview-url@v1.1.9
|
||||
if: github.ref_name != 'main'
|
||||
env:
|
||||
VERCEL_TOKEN: ${{ secrets.DASHBOARD_VERCEL_DEPLOY_TOKEN }}
|
||||
GITHUB_REF: ${{ github.ref_name }}
|
||||
GITHUB_REPOSITORY: ${{ github.repository }}
|
||||
with:
|
||||
vercel_team_id: ${{ secrets.DASHBOARD_VERCEL_TEAM_ID }}
|
||||
vercel_project_id: ${{ secrets.DASHBOARD_STAGING_VERCEL_PROJECT_ID }}
|
||||
vercel_state: BUILDING,READY,INITIALIZING
|
||||
- name: Set Dashboard Preview URL
|
||||
if: steps.fetch-dashboard-preview-url.outputs.preview_url != ''
|
||||
run: echo "NHOST_TEST_DASHBOARD_URL=https://${{ steps.fetch-dashboard-preview-url.outputs.preview_url }}" >> $GITHUB_ENV
|
||||
# * Run the `ci` script of the current package of the matrix. Dependencies build is cached by Turborepo
|
||||
- name: Run e2e test
|
||||
- name: Run e2e tests
|
||||
run: pnpm --filter="${{ matrix.package.name }}" run e2e
|
||||
- id: file-name
|
||||
if: ${{ failure() }}
|
||||
name: Tranform package name into a valid file name
|
||||
name: Transform package name into a valid file name
|
||||
run: |
|
||||
PACKAGE_FILE_NAME=$(echo "${{ matrix.package.name }}" | sed 's/@//g; s/\//-/g')
|
||||
echo "fileName=$PACKAGE_FILE_NAME" >> $GITHUB_OUTPUT
|
||||
# * Run this step only if the previous step failed, and some Cypress screenshots/videos exist
|
||||
- name: Upload Cypress videos and screenshots
|
||||
if: ${{ failure() && hashFiles(format('{0}/cypress/screenshots/**', matrix.package.path), format('{0}/cypress/videos/**', matrix.package.path)) != ''}}
|
||||
# * Run this step only if the previous step failed, and Playwright generated a report
|
||||
- name: Upload Playwright Report
|
||||
if: ${{ failure() && hashFiles(format('{0}/playwright-report/**', matrix.package.path)) != ''}}
|
||||
uses: actions/upload-artifact@v3
|
||||
with:
|
||||
name: cypress-${{ steps.file-name.outputs.fileName }}
|
||||
path: |
|
||||
${{format('{0}/cypress/screenshots/**', matrix.package.path)}}
|
||||
${{format('{0}/cypress/videos/**', matrix.package.path)}}
|
||||
name: playwright-${{ steps.file-name.outputs.fileName }}
|
||||
path: ${{format('{0}/playwright-report/**', matrix.package.path)}}
|
||||
|
||||
@@ -23,8 +23,8 @@ module.exports = {
|
||||
'e2e/**/*.ts',
|
||||
'e2e/**/*.d.ts'
|
||||
],
|
||||
plugins: ['@typescript-eslint', 'cypress'],
|
||||
extends: ['plugin:cypress/recommended'],
|
||||
plugins: ['@typescript-eslint'],
|
||||
extends: [],
|
||||
parserOptions: {
|
||||
ecmaVersion: 2020,
|
||||
sourceType: 'module'
|
||||
|
||||
@@ -51,7 +51,7 @@ export const decorators = [
|
||||
(Story) => (
|
||||
<NhostApolloProvider
|
||||
fetchPolicy="cache-first"
|
||||
graphqlUrl="http://localhost:1337/v1/graphql"
|
||||
graphqlUrl="https://local.graphql.nhost.run/v1"
|
||||
>
|
||||
<Story />
|
||||
</NhostApolloProvider>
|
||||
|
||||
@@ -1,5 +1,48 @@
|
||||
# @nhost/dashboard
|
||||
|
||||
## 0.14.1
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- @nhost/react-apollo@5.0.15
|
||||
- @nhost/nextjs@1.13.19
|
||||
|
||||
## 0.14.0
|
||||
|
||||
### Minor Changes
|
||||
|
||||
- 6e1f03ea: feat(dashboard): add support for the Azure AD provider
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- 1bd2c373: chore(deps): bump `turbo` to 1.8.6
|
||||
- d329b621: chore(deps): bump `@types/react` to 18.0.30
|
||||
- cb248f0d: fix(tests): avoid name collision in database tests
|
||||
- 867c8076: chore(deps): bump `@types/react` to 18.0.29
|
||||
|
||||
## 0.13.10
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- e93b06ab: fix(dashboard): remove left margin from workspace list on mobile
|
||||
- 1c4806bf: chore(deps): bump `sharp` to 0.32.0
|
||||
- @nhost/react-apollo@5.0.14
|
||||
- @nhost/nextjs@1.13.18
|
||||
|
||||
## 0.13.9
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- 912ed76c: chore(dashboard): bump `@apollo/client` to 3.7.10
|
||||
- Updated dependencies [912ed76c]
|
||||
- @nhost/react-apollo@5.0.13
|
||||
|
||||
## 0.13.8
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- 7c127372: chore(dashboard): bump `react-error-boundary` to v4
|
||||
|
||||
## 0.13.7
|
||||
|
||||
### Patch Changes
|
||||
|
||||
@@ -3,7 +3,7 @@ RUN apk add --no-cache libc6-compat
|
||||
RUN apk update
|
||||
WORKDIR /app
|
||||
|
||||
RUN yarn global add turbo@1.8.3
|
||||
RUN yarn global add turbo@1.8.6
|
||||
COPY . .
|
||||
RUN turbo prune --scope="@nhost/dashboard" --docker
|
||||
|
||||
|
||||
@@ -128,4 +128,5 @@ NHOST_TEST_USER_EMAIL=<test_user_email>
|
||||
NHOST_TEST_USER_PASSWORD=<test_user_password>
|
||||
NHOST_TEST_WORKSPACE_NAME=<test_workspace_name>
|
||||
NHOST_TEST_PROJECT_NAME=<test_project_name>
|
||||
NHOST_TEST_PROJECT_ADMIN_SECRET=<test_project_admin_secret>
|
||||
```
|
||||
|
||||
@@ -1,11 +1,11 @@
|
||||
import type { Page } from '@playwright/test';
|
||||
import { expect, test } from '@playwright/test';
|
||||
import {
|
||||
TEST_DASHBOARD_URL,
|
||||
TEST_PROJECT_NAME,
|
||||
TEST_PROJECT_SLUG,
|
||||
TEST_WORKSPACE_SLUG,
|
||||
} from './env';
|
||||
} from '@/e2e/env';
|
||||
import { openProject } from '@/e2e/utils';
|
||||
import type { Page } from '@playwright/test';
|
||||
import { expect, test } from '@playwright/test';
|
||||
|
||||
let page: Page;
|
||||
|
||||
@@ -14,20 +14,21 @@ test.describe.configure({ mode: 'serial' });
|
||||
test.beforeAll(async ({ browser }) => {
|
||||
page = await browser.newPage();
|
||||
|
||||
await page.goto(TEST_DASHBOARD_URL);
|
||||
await page.getByRole('link', { name: TEST_PROJECT_NAME }).click();
|
||||
await page.waitForURL(
|
||||
`${TEST_DASHBOARD_URL}/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}`,
|
||||
);
|
||||
await page.goto('/');
|
||||
|
||||
await openProject({
|
||||
page,
|
||||
projectName: TEST_PROJECT_NAME,
|
||||
workspaceSlug: TEST_WORKSPACE_SLUG,
|
||||
projectSlug: TEST_PROJECT_SLUG,
|
||||
});
|
||||
|
||||
await page
|
||||
.getByRole('navigation', { name: /main navigation/i })
|
||||
.getByRole('link', { name: /auth/i })
|
||||
.click();
|
||||
|
||||
await page.waitForURL(
|
||||
`${TEST_DASHBOARD_URL}/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/users`,
|
||||
);
|
||||
await page.waitForURL(`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/users`);
|
||||
});
|
||||
|
||||
test.afterAll(async () => {
|
||||
280
dashboard/e2e/database/create-table.test.ts
Normal file
280
dashboard/e2e/database/create-table.test.ts
Normal file
@@ -0,0 +1,280 @@
|
||||
import {
|
||||
TEST_PROJECT_NAME,
|
||||
TEST_PROJECT_SLUG,
|
||||
TEST_WORKSPACE_SLUG,
|
||||
} from '@/e2e/env';
|
||||
import { openProject, prepareTable } from '@/e2e/utils';
|
||||
import { faker } from '@faker-js/faker';
|
||||
import type { Page } from '@playwright/test';
|
||||
import { expect, test } from '@playwright/test';
|
||||
import { snakeCase } from 'snake-case';
|
||||
|
||||
let page: Page;
|
||||
|
||||
test.beforeAll(async ({ browser }) => {
|
||||
page = await browser.newPage();
|
||||
});
|
||||
|
||||
test.beforeEach(async () => {
|
||||
await page.goto('/');
|
||||
|
||||
await openProject({
|
||||
page,
|
||||
projectName: TEST_PROJECT_NAME,
|
||||
workspaceSlug: TEST_WORKSPACE_SLUG,
|
||||
projectSlug: TEST_PROJECT_SLUG,
|
||||
});
|
||||
|
||||
await page
|
||||
.getByRole('navigation', { name: /main navigation/i })
|
||||
.getByRole('link', { name: /database/i })
|
||||
.click();
|
||||
});
|
||||
|
||||
test.afterAll(async () => {
|
||||
await page.close();
|
||||
});
|
||||
|
||||
test('should create a simple table', async () => {
|
||||
await page.getByRole('button', { name: /new table/i }).click();
|
||||
await expect(page.getByText(/create a new table/i)).toBeVisible();
|
||||
|
||||
const tableName = snakeCase(faker.lorem.words(3));
|
||||
|
||||
await prepareTable({
|
||||
page,
|
||||
name: tableName,
|
||||
primaryKey: 'id',
|
||||
columns: [
|
||||
{ name: 'id', type: 'uuid', defaultValue: 'gen_random_uuid()' },
|
||||
{ name: 'title', type: 'text' },
|
||||
],
|
||||
});
|
||||
|
||||
// create table
|
||||
await page.getByRole('button', { name: /create/i }).click();
|
||||
|
||||
await page.waitForURL(
|
||||
`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/database/browser/default/public/${tableName}`,
|
||||
);
|
||||
|
||||
await expect(
|
||||
page.getByRole('link', { name: tableName, exact: true }),
|
||||
).toBeVisible();
|
||||
});
|
||||
|
||||
test('should create a table with unique constraints', async () => {
|
||||
await page.getByRole('button', { name: /new table/i }).click();
|
||||
await expect(page.getByText(/create a new table/i)).toBeVisible();
|
||||
|
||||
const tableName = snakeCase(faker.lorem.words(3));
|
||||
|
||||
await prepareTable({
|
||||
page,
|
||||
name: tableName,
|
||||
primaryKey: 'id',
|
||||
columns: [
|
||||
{ name: 'id', type: 'uuid', defaultValue: 'gen_random_uuid()' },
|
||||
{ name: 'title', type: 'text', unique: true },
|
||||
{ name: 'isbn', type: 'text', unique: true },
|
||||
],
|
||||
});
|
||||
|
||||
// create table
|
||||
await page.getByRole('button', { name: /create/i }).click();
|
||||
|
||||
await page.waitForURL(
|
||||
`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/database/browser/default/public/${tableName}`,
|
||||
);
|
||||
|
||||
await expect(
|
||||
page.getByRole('link', { name: tableName, exact: true }),
|
||||
).toBeVisible();
|
||||
});
|
||||
|
||||
test('should create a table with nullable columns', async () => {
|
||||
await page.getByRole('button', { name: /new table/i }).click();
|
||||
await expect(page.getByText(/create a new table/i)).toBeVisible();
|
||||
|
||||
const tableName = snakeCase(faker.lorem.words(3));
|
||||
|
||||
await prepareTable({
|
||||
page,
|
||||
name: tableName,
|
||||
primaryKey: 'id',
|
||||
columns: [
|
||||
{ name: 'id', type: 'uuid', defaultValue: 'gen_random_uuid()' },
|
||||
{ name: 'title', type: 'text', nullable: true },
|
||||
{ name: 'description', type: 'text', nullable: true },
|
||||
],
|
||||
});
|
||||
|
||||
// create table
|
||||
await page.getByRole('button', { name: /create/i }).click();
|
||||
|
||||
await page.waitForURL(
|
||||
`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/database/browser/default/public/${tableName}`,
|
||||
);
|
||||
|
||||
await expect(
|
||||
page.getByRole('link', { name: tableName, exact: true }),
|
||||
).toBeVisible();
|
||||
});
|
||||
|
||||
test('should create a table with an identity column', async () => {
|
||||
await page.getByRole('button', { name: /new table/i }).click();
|
||||
await expect(page.getByText(/create a new table/i)).toBeVisible();
|
||||
|
||||
const tableName = snakeCase(faker.lorem.words(3));
|
||||
|
||||
await prepareTable({
|
||||
page,
|
||||
name: tableName,
|
||||
primaryKey: 'id',
|
||||
columns: [
|
||||
{ name: 'id', type: 'int4' },
|
||||
{ name: 'title', type: 'text', nullable: true },
|
||||
{ name: 'description', type: 'text', nullable: true },
|
||||
],
|
||||
});
|
||||
|
||||
await page.getByRole('button', { name: /identity/i }).click();
|
||||
await page.getByRole('option', { name: /id/i }).click();
|
||||
|
||||
// create table
|
||||
await page.getByRole('button', { name: /create/i }).click();
|
||||
|
||||
await page.waitForURL(
|
||||
`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/database/browser/default/public/${tableName}`,
|
||||
);
|
||||
|
||||
await expect(
|
||||
page.getByRole('link', { name: tableName, exact: true }),
|
||||
).toBeVisible();
|
||||
});
|
||||
|
||||
test('should create table with foreign key constraint', async () => {
|
||||
await page.getByRole('button', { name: /new table/i }).click();
|
||||
await expect(page.getByText(/create a new table/i)).toBeVisible();
|
||||
|
||||
const firstTableName = snakeCase(faker.lorem.words(3));
|
||||
|
||||
await prepareTable({
|
||||
page,
|
||||
name: firstTableName,
|
||||
primaryKey: 'id',
|
||||
columns: [
|
||||
{ name: 'id', type: 'uuid', defaultValue: 'gen_random_uuid()' },
|
||||
{ name: 'name', type: 'text' },
|
||||
],
|
||||
});
|
||||
|
||||
// create table
|
||||
await page.getByRole('button', { name: /create/i }).click();
|
||||
|
||||
await page.waitForURL(
|
||||
`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/database/browser/default/public/${firstTableName}`,
|
||||
);
|
||||
|
||||
await page.getByRole('button', { name: /new table/i }).click();
|
||||
await expect(page.getByText(/create a new table/i)).toBeVisible();
|
||||
|
||||
const secondTableName = snakeCase(faker.lorem.words(3));
|
||||
|
||||
await prepareTable({
|
||||
page,
|
||||
name: secondTableName,
|
||||
primaryKey: 'id',
|
||||
columns: [
|
||||
{ name: 'id', type: 'uuid', defaultValue: 'gen_random_uuid()' },
|
||||
{ name: 'title', type: 'text' },
|
||||
{ name: 'author_id', type: 'uuid' },
|
||||
],
|
||||
});
|
||||
|
||||
await page.getByRole('button', { name: /add foreign key/i }).click();
|
||||
|
||||
// select column in current table
|
||||
await page
|
||||
.getByRole('button', { name: /column/i })
|
||||
.first()
|
||||
.click();
|
||||
await page.getByRole('option', { name: /author_id/i }).click();
|
||||
|
||||
// select reference schema
|
||||
await page.getByRole('button', { name: /schema/i }).click();
|
||||
await page.getByRole('option', { name: /public/i }).click();
|
||||
|
||||
// select reference table
|
||||
await page.getByRole('button', { name: /table/i }).click();
|
||||
await page.getByRole('option', { name: firstTableName, exact: true }).click();
|
||||
|
||||
// select reference column
|
||||
await page
|
||||
.getByRole('button', { name: /column/i })
|
||||
.nth(1)
|
||||
.click();
|
||||
await page.getByRole('option', { name: /id/i }).click();
|
||||
|
||||
await page.getByRole('button', { name: /add/i }).click();
|
||||
|
||||
await expect(
|
||||
page.getByText(`public.${firstTableName}.id`, { exact: true }),
|
||||
).toBeVisible();
|
||||
|
||||
// create table
|
||||
await page.getByRole('button', { name: /create/i }).click();
|
||||
|
||||
await page.waitForURL(
|
||||
`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/database/browser/default/public/${secondTableName}`,
|
||||
);
|
||||
|
||||
await expect(
|
||||
page.getByRole('link', { name: secondTableName, exact: true }),
|
||||
).toBeVisible();
|
||||
});
|
||||
|
||||
test('should not be able to create a table with a name that already exists', async () => {
|
||||
await page.getByRole('button', { name: /new table/i }).click();
|
||||
await expect(page.getByText(/create a new table/i)).toBeVisible();
|
||||
|
||||
const tableName = snakeCase(faker.lorem.words(3));
|
||||
|
||||
await prepareTable({
|
||||
page,
|
||||
name: tableName,
|
||||
primaryKey: 'id',
|
||||
columns: [
|
||||
{ name: 'id', type: 'uuid', defaultValue: 'gen_random_uuid()' },
|
||||
{ name: 'name', type: 'text' },
|
||||
],
|
||||
});
|
||||
|
||||
// create table
|
||||
await page.getByRole('button', { name: /create/i }).click();
|
||||
|
||||
await page.waitForURL(
|
||||
`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/database/browser/default/public/${tableName}`,
|
||||
);
|
||||
|
||||
await page.getByRole('button', { name: /new table/i }).click();
|
||||
await expect(page.getByText(/create a new table/i)).toBeVisible();
|
||||
|
||||
await prepareTable({
|
||||
page,
|
||||
name: tableName,
|
||||
primaryKey: 'id',
|
||||
columns: [
|
||||
{ name: 'id', type: 'uuid', defaultValue: 'gen_random_uuid()' },
|
||||
{ name: 'title', type: 'text' },
|
||||
{ name: 'author_id', type: 'uuid' },
|
||||
],
|
||||
});
|
||||
|
||||
// create table
|
||||
await page.getByRole('button', { name: /create/i }).click();
|
||||
|
||||
await expect(
|
||||
page.getByText(/error: a table with this name already exists/i),
|
||||
).toBeVisible();
|
||||
});
|
||||
165
dashboard/e2e/database/delete-table.test.ts
Normal file
165
dashboard/e2e/database/delete-table.test.ts
Normal file
@@ -0,0 +1,165 @@
|
||||
import {
|
||||
TEST_PROJECT_NAME,
|
||||
TEST_PROJECT_SLUG,
|
||||
TEST_WORKSPACE_SLUG,
|
||||
} from '@/e2e/env';
|
||||
import { deleteTable, openProject, prepareTable } from '@/e2e/utils';
|
||||
import { faker } from '@faker-js/faker';
|
||||
import type { Page } from '@playwright/test';
|
||||
import { expect, test } from '@playwright/test';
|
||||
import { snakeCase } from 'snake-case';
|
||||
|
||||
let page: Page;
|
||||
|
||||
test.beforeAll(async ({ browser }) => {
|
||||
page = await browser.newPage();
|
||||
});
|
||||
|
||||
test.beforeEach(async () => {
|
||||
await page.goto('/');
|
||||
|
||||
await openProject({
|
||||
page,
|
||||
projectName: TEST_PROJECT_NAME,
|
||||
workspaceSlug: TEST_WORKSPACE_SLUG,
|
||||
projectSlug: TEST_PROJECT_SLUG,
|
||||
});
|
||||
|
||||
await page
|
||||
.getByRole('navigation', { name: /main navigation/i })
|
||||
.getByRole('link', { name: /database/i })
|
||||
.click();
|
||||
});
|
||||
|
||||
test.afterAll(async () => {
|
||||
await page.close();
|
||||
});
|
||||
|
||||
test('should delete a table', async () => {
|
||||
const tableName = snakeCase(faker.lorem.words(3));
|
||||
|
||||
await page.getByRole('button', { name: /new table/i }).click();
|
||||
|
||||
await prepareTable({
|
||||
page,
|
||||
name: tableName,
|
||||
primaryKey: 'id',
|
||||
columns: [
|
||||
{ name: 'id', type: 'uuid', defaultValue: 'gen_random_uuid()' },
|
||||
{ name: 'title', type: 'text' },
|
||||
],
|
||||
});
|
||||
|
||||
await page.getByRole('button', { name: /create/i }).click();
|
||||
|
||||
await page.waitForURL(
|
||||
`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/database/browser/default/public/${tableName}`,
|
||||
);
|
||||
|
||||
await deleteTable({
|
||||
page,
|
||||
name: tableName,
|
||||
});
|
||||
|
||||
// navigate to next URL
|
||||
await page.waitForURL(
|
||||
`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/database/browser/default/public/**`,
|
||||
);
|
||||
|
||||
await expect(
|
||||
page.getByRole('link', { name: tableName, exact: true }),
|
||||
).not.toBeVisible();
|
||||
});
|
||||
|
||||
test('should not be able to delete a table if other tables have foreign keys referencing it', async () => {
|
||||
await page.getByRole('button', { name: /new table/i }).click();
|
||||
await expect(page.getByText(/create a new table/i)).toBeVisible();
|
||||
|
||||
const firstTableName = snakeCase(faker.lorem.words(3));
|
||||
|
||||
await prepareTable({
|
||||
page,
|
||||
name: firstTableName,
|
||||
primaryKey: 'id',
|
||||
columns: [
|
||||
{ name: 'id', type: 'uuid', defaultValue: 'gen_random_uuid()' },
|
||||
{ name: 'name', type: 'text' },
|
||||
],
|
||||
});
|
||||
|
||||
// create table
|
||||
await page.getByRole('button', { name: /create/i }).click();
|
||||
|
||||
await page.waitForURL(
|
||||
`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/database/browser/default/public/${firstTableName}`,
|
||||
);
|
||||
|
||||
await page.getByRole('button', { name: /new table/i }).click();
|
||||
await expect(page.getByText(/create a new table/i)).toBeVisible();
|
||||
|
||||
const secondTableName = snakeCase(faker.lorem.words(3));
|
||||
|
||||
await prepareTable({
|
||||
page,
|
||||
name: secondTableName,
|
||||
primaryKey: 'id',
|
||||
columns: [
|
||||
{ name: 'id', type: 'uuid', defaultValue: 'gen_random_uuid()' },
|
||||
{ name: 'title', type: 'text' },
|
||||
{ name: 'author_id', type: 'uuid' },
|
||||
],
|
||||
});
|
||||
|
||||
await page.getByRole('button', { name: /add foreign key/i }).click();
|
||||
|
||||
// select column in current table
|
||||
await page
|
||||
.getByRole('button', { name: /column/i })
|
||||
.first()
|
||||
.click();
|
||||
await page.getByRole('option', { name: /author_id/i }).click();
|
||||
|
||||
// select reference schema
|
||||
await page.getByRole('button', { name: /schema/i }).click();
|
||||
await page.getByRole('option', { name: /public/i }).click();
|
||||
|
||||
// select reference table
|
||||
await page.getByRole('button', { name: /table/i }).click();
|
||||
await page.getByRole('option', { name: firstTableName, exact: true }).click();
|
||||
|
||||
// select reference column
|
||||
await page
|
||||
.getByRole('button', { name: /column/i })
|
||||
.nth(1)
|
||||
.click();
|
||||
await page.getByRole('option', { name: /id/i }).click();
|
||||
|
||||
await page.getByRole('button', { name: /add/i }).click();
|
||||
|
||||
await expect(
|
||||
page.getByText(`public.${firstTableName}.id`, { exact: true }),
|
||||
).toBeVisible();
|
||||
|
||||
// create table
|
||||
await page.getByRole('button', { name: /create/i }).click();
|
||||
|
||||
await page.waitForURL(
|
||||
`/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}/database/browser/default/public/${secondTableName}`,
|
||||
);
|
||||
|
||||
await expect(
|
||||
page.getByRole('link', { name: secondTableName, exact: true }),
|
||||
).toBeVisible();
|
||||
|
||||
// try to delete the first table that is referenced by the second table
|
||||
await deleteTable({
|
||||
page,
|
||||
name: firstTableName,
|
||||
});
|
||||
|
||||
await expect(
|
||||
page.getByText(
|
||||
/constraint [a-zA-Z_]+ on table [a-zA-Z_]+ depends on table [a-zA-Z_]+/i,
|
||||
),
|
||||
).toBeVisible();
|
||||
});
|
||||
@@ -31,6 +31,12 @@ export const TEST_PROJECT_SLUG = slugify(TEST_PROJECT_NAME, {
|
||||
strict: true,
|
||||
});
|
||||
|
||||
/**
|
||||
* Hasura admin secret of the test project to use.
|
||||
*/
|
||||
export const TEST_PROJECT_ADMIN_SECRET =
|
||||
process.env.NHOST_TEST_PROJECT_ADMIN_SECRET;
|
||||
|
||||
/**
|
||||
* Email of the test account to use.
|
||||
*/
|
||||
|
||||
@@ -1,23 +1,25 @@
|
||||
import type { Page } from '@playwright/test';
|
||||
import { expect, test } from '@playwright/test';
|
||||
import {
|
||||
TEST_DASHBOARD_URL,
|
||||
TEST_PROJECT_NAME,
|
||||
TEST_PROJECT_SLUG,
|
||||
TEST_WORKSPACE_NAME,
|
||||
TEST_WORKSPACE_SLUG,
|
||||
} from './env';
|
||||
} from '@/e2e/env';
|
||||
import { openProject } from '@/e2e/utils';
|
||||
import type { Page } from '@playwright/test';
|
||||
import { expect, test } from '@playwright/test';
|
||||
|
||||
let page: Page;
|
||||
|
||||
test.beforeAll(async ({ browser }) => {
|
||||
page = await browser.newPage();
|
||||
|
||||
await page.goto(TEST_DASHBOARD_URL);
|
||||
await page.getByRole('link', { name: TEST_PROJECT_NAME }).click();
|
||||
await page.waitForURL(
|
||||
`${TEST_DASHBOARD_URL}/${TEST_WORKSPACE_SLUG}/${TEST_PROJECT_SLUG}`,
|
||||
);
|
||||
await page.goto('/');
|
||||
await openProject({
|
||||
page,
|
||||
projectName: TEST_PROJECT_NAME,
|
||||
workspaceSlug: TEST_WORKSPACE_SLUG,
|
||||
projectSlug: TEST_PROJECT_SLUG,
|
||||
});
|
||||
});
|
||||
|
||||
test.afterAll(async () => {
|
||||
150
dashboard/e2e/utils.ts
Normal file
150
dashboard/e2e/utils.ts
Normal file
@@ -0,0 +1,150 @@
|
||||
import type { Page } from '@playwright/test';
|
||||
|
||||
/**
|
||||
* Open a project by navigating to the project's overview page.
|
||||
*
|
||||
* @param page - The Playwright page object.
|
||||
* @param workspaceSlug - The slug of the workspace that contains the project.
|
||||
* @param projectSlug - The slug of the project to open.
|
||||
* @param projectName - The name of the project to open.
|
||||
* @returns A promise that resolves when the project is opened.
|
||||
*/
|
||||
export async function openProject({
|
||||
page,
|
||||
projectName,
|
||||
workspaceSlug,
|
||||
projectSlug,
|
||||
}: {
|
||||
page: Page;
|
||||
workspaceSlug: string;
|
||||
projectSlug: string;
|
||||
projectName: string;
|
||||
}) {
|
||||
await page.getByRole('link', { name: projectName }).click();
|
||||
await page.waitForURL(`/${workspaceSlug}/${projectSlug}`);
|
||||
}
|
||||
|
||||
/**
|
||||
* Prepares a table by filling out the form.
|
||||
*
|
||||
* @param page - The Playwright page object.
|
||||
* @param name - The name of the table to create.
|
||||
* @param columns - The columns to create in the table.
|
||||
* @returns A promise that resolves when the table is prepared.
|
||||
*/
|
||||
export async function prepareTable({
|
||||
page,
|
||||
name: tableName,
|
||||
primaryKey,
|
||||
columns,
|
||||
}: {
|
||||
page: Page;
|
||||
name: string;
|
||||
primaryKey: string;
|
||||
columns: Array<{
|
||||
name: string;
|
||||
type: string;
|
||||
nullable?: boolean;
|
||||
unique?: boolean;
|
||||
defaultValue?: string;
|
||||
}>;
|
||||
}) {
|
||||
if (!columns.some(({ name }) => name === primaryKey)) {
|
||||
throw new Error('Primary key must be one of the columns.');
|
||||
}
|
||||
|
||||
await page.getByRole('textbox', { name: /name/i }).first().fill(tableName);
|
||||
|
||||
await Promise.all(
|
||||
columns.map(
|
||||
async (
|
||||
{ name: columnName, type, nullable, unique, defaultValue },
|
||||
index,
|
||||
) => {
|
||||
// set name
|
||||
await page.getByPlaceholder(/name/i).nth(index).fill(columnName);
|
||||
|
||||
// set type
|
||||
await page
|
||||
.getByRole('table')
|
||||
.getByRole('combobox', { name: /type/i })
|
||||
.nth(index)
|
||||
.type(type);
|
||||
await page
|
||||
.getByRole('table')
|
||||
.getByRole('option', { name: type })
|
||||
.first()
|
||||
.click();
|
||||
|
||||
// optionally set default value
|
||||
if (defaultValue) {
|
||||
await page
|
||||
.getByRole('table')
|
||||
.getByRole('combobox', { name: /default value/i })
|
||||
.nth(index)
|
||||
.type(defaultValue);
|
||||
await page
|
||||
.getByRole('table')
|
||||
.getByRole('option', { name: defaultValue })
|
||||
.first()
|
||||
.click();
|
||||
}
|
||||
|
||||
// optionally check unique
|
||||
if (unique) {
|
||||
await page
|
||||
.getByRole('checkbox', { name: /unique/i })
|
||||
.nth(index)
|
||||
.check();
|
||||
}
|
||||
|
||||
// optionally check nullable
|
||||
if (nullable) {
|
||||
await page
|
||||
.getByRole('checkbox', { name: /nullable/i })
|
||||
.nth(index)
|
||||
.check();
|
||||
}
|
||||
|
||||
// add new column if not last
|
||||
if (index < columns.length - 1) {
|
||||
await page.getByRole('button', { name: /add column/i }).click();
|
||||
}
|
||||
},
|
||||
),
|
||||
);
|
||||
|
||||
// select the first column as primary key
|
||||
await page.getByRole('button', { name: /primary key/i }).click();
|
||||
await page.getByRole('option', { name: primaryKey, exact: true }).click();
|
||||
}
|
||||
|
||||
/**
|
||||
* Deletes a table with the given name.
|
||||
*
|
||||
* @param page - The Playwright page object.
|
||||
* @param name - The name of the table to delete.
|
||||
* @returns A promise that resolves when the table is deleted.
|
||||
*/
|
||||
export async function deleteTable({
|
||||
page,
|
||||
name,
|
||||
}: {
|
||||
page: Page;
|
||||
name: string;
|
||||
}) {
|
||||
const tableLink = page.getByRole('link', {
|
||||
name,
|
||||
exact: true,
|
||||
});
|
||||
|
||||
await tableLink.hover();
|
||||
await page
|
||||
.getByRole('listitem')
|
||||
.filter({ hasText: name })
|
||||
.getByRole('button')
|
||||
.click();
|
||||
|
||||
await page.getByRole('menuitem', { name: /delete table/i }).click();
|
||||
await page.getByRole('button', { name: /delete/i }).click();
|
||||
}
|
||||
@@ -1,19 +1,19 @@
|
||||
import { chromium } from '@playwright/test';
|
||||
import {
|
||||
TEST_DASHBOARD_URL,
|
||||
TEST_USER_EMAIL,
|
||||
TEST_USER_PASSWORD,
|
||||
} from './e2e/env';
|
||||
} from '@/e2e/env';
|
||||
import { chromium } from '@playwright/test';
|
||||
|
||||
async function globalSetup() {
|
||||
const browser = await chromium.launch();
|
||||
const page = await browser.newPage();
|
||||
const page = await browser.newPage({ baseURL: TEST_DASHBOARD_URL });
|
||||
|
||||
await page.goto(TEST_DASHBOARD_URL);
|
||||
await page.waitForURL(`${TEST_DASHBOARD_URL}/signin`);
|
||||
await page.goto('/');
|
||||
await page.waitForURL('/signin');
|
||||
await page.getByRole('link', { name: /continue with email/i }).click();
|
||||
|
||||
await page.waitForURL(`${TEST_DASHBOARD_URL}/signin/email`);
|
||||
await page.waitForURL('/signin/email');
|
||||
await page.getByLabel('Email').fill(TEST_USER_EMAIL);
|
||||
await page.getByLabel('Password').fill(TEST_USER_PASSWORD);
|
||||
await page.getByRole('button', { name: /sign in/i }).click();
|
||||
|
||||
66
dashboard/global-teardown.ts
Normal file
66
dashboard/global-teardown.ts
Normal file
@@ -0,0 +1,66 @@
|
||||
import {
|
||||
TEST_DASHBOARD_URL,
|
||||
TEST_PROJECT_ADMIN_SECRET,
|
||||
TEST_PROJECT_NAME,
|
||||
TEST_PROJECT_SLUG,
|
||||
TEST_WORKSPACE_SLUG,
|
||||
} from '@/e2e/env';
|
||||
import { openProject } from '@/e2e/utils';
|
||||
import { chromium } from '@playwright/test';
|
||||
|
||||
async function globalTeardown() {
|
||||
const browser = await chromium.launch();
|
||||
|
||||
const context = await browser.newContext({
|
||||
baseURL: TEST_DASHBOARD_URL,
|
||||
storageState: 'storageState.json',
|
||||
});
|
||||
|
||||
const page = await context.newPage();
|
||||
|
||||
await page.goto('/');
|
||||
|
||||
await openProject({
|
||||
page,
|
||||
projectName: TEST_PROJECT_NAME,
|
||||
workspaceSlug: TEST_WORKSPACE_SLUG,
|
||||
projectSlug: TEST_PROJECT_SLUG,
|
||||
});
|
||||
|
||||
const pagePromise = context.waitForEvent('page');
|
||||
|
||||
await page.getByRole('link', { name: /hasura/i }).click();
|
||||
await page.getByRole('link', { name: /open hasura/i }).click();
|
||||
|
||||
const hasuraPage = await pagePromise;
|
||||
await hasuraPage.waitForLoadState();
|
||||
|
||||
const adminSecretInput = hasuraPage.getByPlaceholder(/enter admin-secret/i);
|
||||
|
||||
// note: a more ideal way would be to paste from clipboard, but Playwright
|
||||
// doesn't support that yet
|
||||
await adminSecretInput.fill(TEST_PROJECT_ADMIN_SECRET);
|
||||
await adminSecretInput.press('Enter');
|
||||
|
||||
// note: getByRole doesn't work here
|
||||
await hasuraPage.locator('a', { hasText: /data/i }).click();
|
||||
await hasuraPage.getByRole('link', { name: /sql/i }).click();
|
||||
|
||||
await hasuraPage.getByRole('textbox').fill(`
|
||||
DO $$ DECLARE
|
||||
tablename text;
|
||||
BEGIN
|
||||
FOR tablename IN
|
||||
SELECT table_name FROM information_schema.tables
|
||||
WHERE table_schema = 'public'
|
||||
LOOP
|
||||
EXECUTE 'DROP TABLE IF EXISTS public.' || quote_ident(tablename) || ' CASCADE';
|
||||
END LOOP;
|
||||
END $$;
|
||||
`);
|
||||
|
||||
await hasuraPage.getByRole('button', { name: /run!/i }).click();
|
||||
await hasuraPage.getByText(/sql executed!/i).waitFor();
|
||||
}
|
||||
|
||||
export default globalTeardown;
|
||||
@@ -1,5 +1,5 @@
|
||||
schema:
|
||||
- http://localhost:1337/v1/graphql:
|
||||
- https://local.graphql.nhost.run/v1:
|
||||
headers:
|
||||
x-hasura-admin-secret: nhost-admin-secret
|
||||
generates:
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
{
|
||||
"name": "@nhost/dashboard",
|
||||
"version": "0.13.7",
|
||||
"version": "0.14.1",
|
||||
"private": true,
|
||||
"scripts": {
|
||||
"preinstall": "npx only-allow pnpm",
|
||||
@@ -18,7 +18,7 @@
|
||||
"e2e": "npx playwright@1.31.2 install --with-deps && playwright test"
|
||||
},
|
||||
"dependencies": {
|
||||
"@apollo/client": "^3.7.3",
|
||||
"@apollo/client": "^3.7.10",
|
||||
"@codemirror/language": "^6.3.0",
|
||||
"@emotion/cache": "^11.10.5",
|
||||
"@emotion/react": "^11.10.5",
|
||||
@@ -63,7 +63,7 @@
|
||||
"prettysize": "^2.0.0",
|
||||
"react": "18.2.0",
|
||||
"react-dom": "18.2.0",
|
||||
"react-error-boundary": "^3.1.4",
|
||||
"react-error-boundary": "^4.0.0",
|
||||
"react-hook-form": "^7.42.1",
|
||||
"react-hot-toast": "^2.4.0",
|
||||
"react-is": "18.2.0",
|
||||
@@ -71,7 +71,7 @@
|
||||
"react-merge-refs": "^1.1.0",
|
||||
"react-syntax-highlighter": "^15.4.5",
|
||||
"react-table": "^7.8.0",
|
||||
"sharp": "^0.31.2",
|
||||
"sharp": "^0.32.0",
|
||||
"slugify": "^1.6.5",
|
||||
"stripe": "^10.17.0",
|
||||
"tailwind-merge": "^1.8.0",
|
||||
@@ -82,6 +82,7 @@
|
||||
},
|
||||
"devDependencies": {
|
||||
"@babel/core": "^7.20.2",
|
||||
"@faker-js/faker": "^7.6.0",
|
||||
"@graphql-codegen/cli": "^3.0.0",
|
||||
"@graphql-codegen/typescript": "^3.0.0",
|
||||
"@graphql-codegen/typescript-graphql-request": "^4.5.1",
|
||||
@@ -105,7 +106,7 @@
|
||||
"@types/lodash.debounce": "^4.0.7",
|
||||
"@types/node": "^16.11.7",
|
||||
"@types/pluralize": "^0.0.29",
|
||||
"@types/react": "18.0.28",
|
||||
"@types/react": "18.0.30",
|
||||
"@types/react-dom": "18.0.11",
|
||||
"@types/react-table": "^7.7.12",
|
||||
"@types/testing-library__jest-dom": "^5.14.5",
|
||||
@@ -140,6 +141,7 @@
|
||||
"prettier-plugin-tailwindcss": "^0.2.0",
|
||||
"react-date-fns-hooks": "^0.9.4",
|
||||
"require-from-string": "^2.0.2",
|
||||
"snake-case": "^3.0.4",
|
||||
"storybook-addon-next-router": "^4.0.1",
|
||||
"tailwindcss": "^3.1.2",
|
||||
"ts-node": "^10.9.1",
|
||||
|
||||
@@ -12,53 +12,22 @@ export default defineConfig({
|
||||
timeout: 5000,
|
||||
},
|
||||
fullyParallel: true,
|
||||
/* Fail the build on CI if you accidentally left test.only in the source code. */
|
||||
forbidOnly: !!process.env.CI,
|
||||
/* Retry on CI only */
|
||||
retries: process.env.CI ? 2 : 0,
|
||||
/* Opt out of parallel tests on CI. */
|
||||
workers: process.env.CI ? 1 : undefined,
|
||||
reporter: 'html',
|
||||
globalSetup: require.resolve('./global-setup'),
|
||||
globalTeardown: require.resolve('./global-teardown'),
|
||||
use: {
|
||||
actionTimeout: 0,
|
||||
trace: 'on-first-retry',
|
||||
storageState: 'storageState.json',
|
||||
baseURL: process.env.NHOST_TEST_DASHBOARD_URL,
|
||||
},
|
||||
projects: [
|
||||
{
|
||||
name: 'chromium',
|
||||
use: { ...devices['Desktop Chrome'] },
|
||||
},
|
||||
|
||||
// {
|
||||
// name: 'firefox',
|
||||
// use: { ...devices['Desktop Firefox'] },
|
||||
// },
|
||||
|
||||
// {
|
||||
// name: 'webkit',
|
||||
// use: { ...devices['Desktop Safari'] },
|
||||
// },
|
||||
|
||||
/* Test against mobile viewports. */
|
||||
// {
|
||||
// name: 'Mobile Chrome',
|
||||
// use: { ...devices['Pixel 5'] },
|
||||
// },
|
||||
// {
|
||||
// name: 'Mobile Safari',
|
||||
// use: { ...devices['iPhone 12'] },
|
||||
// },
|
||||
|
||||
/* Test against branded browsers. */
|
||||
// {
|
||||
// name: 'Microsoft Edge',
|
||||
// use: { channel: 'msedge' },
|
||||
// },
|
||||
// {
|
||||
// name: 'Google Chrome',
|
||||
// use: { channel: 'chrome' },
|
||||
// },
|
||||
],
|
||||
});
|
||||
|
||||
12
dashboard/public/assets/brands/azuread.svg
Normal file
12
dashboard/public/assets/brands/azuread.svg
Normal file
File diff suppressed because one or more lines are too long
|
After Width: | Height: | Size: 16 KiB |
@@ -7,7 +7,7 @@ import Link from 'next/link';
|
||||
|
||||
export default function Sidebar() {
|
||||
return (
|
||||
<div className="grid grid-flow-row gap-8 mt-2 ml-10 w-full md:grid md:w-workspaceSidebar content-start">
|
||||
<div className="mt-2 grid w-full grid-flow-row content-start gap-8 md:ml-10 md:grid md:w-workspaceSidebar">
|
||||
<WorkspaceSection />
|
||||
<Resources />
|
||||
|
||||
|
||||
@@ -2,8 +2,9 @@ import { UserDataProvider } from '@/context/workspace1-context';
|
||||
import type { Project } from '@/types/application';
|
||||
import { ApplicationStatus } from '@/types/application';
|
||||
import type { Workspace } from '@/types/workspace';
|
||||
import nhostGraphQLLink from '@/utils/msw/mocks/graphql/nhostGraphQLLink';
|
||||
import { render, screen, waitForElementToBeRemoved } from '@/utils/testUtils';
|
||||
import { graphql, rest } from 'msw';
|
||||
import { rest } from 'msw';
|
||||
import { setupServer } from 'msw/node';
|
||||
import { afterAll, beforeAll, vi } from 'vitest';
|
||||
import OverviewDeployments from '.';
|
||||
@@ -73,13 +74,11 @@ const mockWorkspace: Workspace = {
|
||||
applications: [mockApplication],
|
||||
};
|
||||
|
||||
const mockGraphqlLink = graphql.link('http://localhost:1337/v1/graphql');
|
||||
|
||||
const server = setupServer(
|
||||
rest.get('http://localhost:1337/v1/graphql', (req, res, ctx) =>
|
||||
rest.get('https://local.graphql.nhost.run/v1', (_req, res, ctx) =>
|
||||
res(ctx.status(200)),
|
||||
),
|
||||
mockGraphqlLink.operation(async (req, res, ctx) =>
|
||||
nhostGraphQLLink.operation(async (_req, res, ctx) =>
|
||||
res(
|
||||
ctx.data({
|
||||
deployments: [],
|
||||
@@ -143,7 +142,7 @@ test('should render an empty state when GitHub is connected, but there are no de
|
||||
|
||||
test('should render a list of deployments', async () => {
|
||||
server.use(
|
||||
mockGraphqlLink.operation(async (req, res, ctx) => {
|
||||
nhostGraphQLLink.operation(async (req, res, ctx) => {
|
||||
const requestPayload = await req.json();
|
||||
|
||||
if (requestPayload.operationName === 'ScheduledOrPendingDeploymentsSub') {
|
||||
@@ -193,7 +192,7 @@ test('should render a list of deployments', async () => {
|
||||
|
||||
test('should disable redeployments if a deployment is already in progress', async () => {
|
||||
server.use(
|
||||
mockGraphqlLink.operation(async (req, res, ctx) => {
|
||||
nhostGraphQLLink.operation(async (req, res, ctx) => {
|
||||
const requestPayload = await req.json();
|
||||
|
||||
if (requestPayload.operationName === 'ScheduledOrPendingDeploymentsSub') {
|
||||
|
||||
@@ -0,0 +1,201 @@
|
||||
import Form from '@/components/common/Form';
|
||||
import SettingsContainer from '@/components/settings/SettingsContainer';
|
||||
import BaseProviderSettings from '@/components/settings/signInMethods/BaseProviderSettings';
|
||||
import { useUI } from '@/context/UIContext';
|
||||
import {
|
||||
GetSignInMethodsDocument,
|
||||
useGetSignInMethodsQuery,
|
||||
useUpdateConfigMutation,
|
||||
} from '@/generated/graphql';
|
||||
import { useCurrentWorkspaceAndApplication } from '@/hooks/useCurrentWorkspaceAndApplication';
|
||||
import ActivityIndicator from '@/ui/v2/ActivityIndicator';
|
||||
import IconButton from '@/ui/v2/IconButton';
|
||||
import CopyIcon from '@/ui/v2/icons/CopyIcon';
|
||||
import Input from '@/ui/v2/Input';
|
||||
import InputAdornment from '@/ui/v2/InputAdornment';
|
||||
import generateAppServiceUrl from '@/utils/common/generateAppServiceUrl';
|
||||
import { copy } from '@/utils/copy';
|
||||
import getServerError from '@/utils/settings/getServerError';
|
||||
import { getToastStyleProps } from '@/utils/settings/settingsConstants';
|
||||
import { yupResolver } from '@hookform/resolvers/yup';
|
||||
import { FormProvider, useForm } from 'react-hook-form';
|
||||
import { toast } from 'react-hot-toast';
|
||||
import { twMerge } from 'tailwind-merge';
|
||||
import * as Yup from 'yup';
|
||||
|
||||
const validationSchema = Yup.object({
|
||||
clientId: Yup.string()
|
||||
.label('Client ID')
|
||||
.when('enabled', {
|
||||
is: true,
|
||||
then: (schema) => schema.required(),
|
||||
}),
|
||||
clientSecret: Yup.string()
|
||||
.label('Client Secret')
|
||||
.when('enabled', {
|
||||
is: true,
|
||||
then: (schema) => schema.required(),
|
||||
}),
|
||||
tenant: Yup.string()
|
||||
.label('Tenant')
|
||||
.when('enabled', {
|
||||
is: true,
|
||||
then: (schema) => schema.required(),
|
||||
}),
|
||||
enabled: Yup.boolean(),
|
||||
});
|
||||
|
||||
export type AzureADProviderFormValues = Yup.InferType<typeof validationSchema>;
|
||||
|
||||
export default function AzureADProviderSettings() {
|
||||
const { maintenanceActive } = useUI();
|
||||
const { currentApplication } = useCurrentWorkspaceAndApplication();
|
||||
const [updateConfig] = useUpdateConfigMutation({
|
||||
refetchQueries: [GetSignInMethodsDocument],
|
||||
});
|
||||
|
||||
const { data, loading, error } = useGetSignInMethodsQuery({
|
||||
variables: { appId: currentApplication?.id },
|
||||
fetchPolicy: 'cache-only',
|
||||
});
|
||||
|
||||
const { clientId, clientSecret, tenant, enabled } =
|
||||
data?.config?.auth?.method?.oauth?.azuread || {};
|
||||
|
||||
const form = useForm<AzureADProviderFormValues>({
|
||||
reValidateMode: 'onSubmit',
|
||||
defaultValues: {
|
||||
clientId: clientId || '',
|
||||
clientSecret: clientSecret || '',
|
||||
tenant: tenant || '',
|
||||
enabled: enabled || false,
|
||||
},
|
||||
resolver: yupResolver(validationSchema),
|
||||
});
|
||||
|
||||
if (loading) {
|
||||
return (
|
||||
<ActivityIndicator
|
||||
delay={1000}
|
||||
label="Loading settings for Azure AD..."
|
||||
className="justify-center"
|
||||
/>
|
||||
);
|
||||
}
|
||||
|
||||
if (error) {
|
||||
throw error;
|
||||
}
|
||||
|
||||
const { register, formState, watch } = form;
|
||||
const authEnabled = watch('enabled');
|
||||
|
||||
const handleProviderUpdate = async (values: AzureADProviderFormValues) => {
|
||||
const updateConfigPromise = updateConfig({
|
||||
variables: {
|
||||
appId: currentApplication.id,
|
||||
config: {
|
||||
auth: {
|
||||
method: {
|
||||
oauth: {
|
||||
azuread: values,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
});
|
||||
|
||||
try {
|
||||
await toast.promise(
|
||||
updateConfigPromise,
|
||||
{
|
||||
loading: `Azure AD settings are being updated...`,
|
||||
success: `Azure AD settings have been updated successfully.`,
|
||||
error: getServerError(
|
||||
`An error occurred while trying to update the project's Azure AD settings.`,
|
||||
),
|
||||
},
|
||||
getToastStyleProps(),
|
||||
);
|
||||
|
||||
form.reset(values);
|
||||
} catch {
|
||||
// Note: The toast will handle the error.
|
||||
}
|
||||
};
|
||||
|
||||
return (
|
||||
<FormProvider {...form}>
|
||||
<Form onSubmit={handleProviderUpdate}>
|
||||
<SettingsContainer
|
||||
title="Azure AD"
|
||||
description="Allow users to sign in with Azure AD."
|
||||
slotProps={{
|
||||
submitButton: {
|
||||
disabled: !formState.isDirty || maintenanceActive,
|
||||
loading: formState.isSubmitting,
|
||||
},
|
||||
}}
|
||||
icon="/assets/brands/azuread.svg"
|
||||
switchId="enabled"
|
||||
showSwitch
|
||||
className={twMerge(
|
||||
'grid grid-flow-row grid-cols-2 gap-y-4 gap-x-3 px-4 py-2',
|
||||
!authEnabled && 'hidden',
|
||||
)}
|
||||
>
|
||||
<BaseProviderSettings providerName="azuread" />
|
||||
<Input
|
||||
{...register('tenant')}
|
||||
name="tenant"
|
||||
id="tenant"
|
||||
label="Tenant ID"
|
||||
placeholder="Tenant ID"
|
||||
className="col-span-2"
|
||||
fullWidth
|
||||
hideEmptyHelperText
|
||||
error={!!formState.errors?.tenant}
|
||||
helperText={formState.errors?.tenant?.message}
|
||||
/>
|
||||
<Input
|
||||
name="redirectUrl"
|
||||
id="redirectUrl"
|
||||
defaultValue={`${generateAppServiceUrl(
|
||||
currentApplication.subdomain,
|
||||
currentApplication.region.awsName,
|
||||
'auth',
|
||||
)}/signin/provider/azuread/callback`}
|
||||
className="col-span-2"
|
||||
fullWidth
|
||||
hideEmptyHelperText
|
||||
label="Redirect URL"
|
||||
disabled
|
||||
endAdornment={
|
||||
<InputAdornment position="end" className="absolute right-2">
|
||||
<IconButton
|
||||
sx={{ minWidth: 0, padding: 0 }}
|
||||
color="secondary"
|
||||
variant="borderless"
|
||||
onClick={(e) => {
|
||||
e.stopPropagation();
|
||||
copy(
|
||||
`${generateAppServiceUrl(
|
||||
currentApplication.subdomain,
|
||||
currentApplication.region.awsName,
|
||||
'auth',
|
||||
)}/signin/provider/azuread/callback`,
|
||||
'Redirect URL',
|
||||
);
|
||||
}}
|
||||
>
|
||||
<CopyIcon className="h-4 w-4" />
|
||||
</IconButton>
|
||||
</InputAdornment>
|
||||
}
|
||||
/>
|
||||
</SettingsContainer>
|
||||
</Form>
|
||||
</FormProvider>
|
||||
);
|
||||
}
|
||||
@@ -0,0 +1 @@
|
||||
export { default } from './AzureADProviderSettings';
|
||||
@@ -100,6 +100,12 @@ query GetSignInMethods($appId: uuid!) {
|
||||
connection
|
||||
organization
|
||||
}
|
||||
azuread {
|
||||
enabled
|
||||
clientId
|
||||
clientSecret
|
||||
tenant
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -2,6 +2,7 @@ import Container from '@/components/layout/Container';
|
||||
import SettingsLayout from '@/components/settings/SettingsLayout';
|
||||
import AnonymousSignInSettings from '@/components/settings/signInMethods/AnonymousSignInSettings';
|
||||
import AppleProviderSettings from '@/components/settings/signInMethods/AppleProviderSettings';
|
||||
import AzureADProviderSettings from '@/components/settings/signInMethods/AzureADProviderSettings';
|
||||
import DiscordProviderSettings from '@/components/settings/signInMethods/DiscordProviderSettings';
|
||||
import EmailAndPasswordSettings from '@/components/settings/signInMethods/EmailAndPasswordSettings';
|
||||
import FacebookProviderSettings from '@/components/settings/signInMethods/FacebookProviderSettings';
|
||||
@@ -56,6 +57,7 @@ export default function SettingsSignInMethodsPage() {
|
||||
<SMSSettings />
|
||||
{!currentApplication.providersUpdated && <ProvidersUpdatedAlert />}
|
||||
<AppleProviderSettings />
|
||||
<AzureADProviderSettings />
|
||||
<DiscordProviderSettings />
|
||||
<FacebookProviderSettings />
|
||||
<GitHubProviderSettings />
|
||||
|
||||
181
dashboard/src/utils/__generated__/graphql.ts
generated
181
dashboard/src/utils/__generated__/graphql.ts
generated
@@ -25,7 +25,9 @@ export type Scalars = {
|
||||
bpchar: any;
|
||||
bytea: any;
|
||||
citext: any;
|
||||
float64: any;
|
||||
jsonb: any;
|
||||
labels: any;
|
||||
smallint: any;
|
||||
timestamp: any;
|
||||
timestamptz: any;
|
||||
@@ -1035,7 +1037,9 @@ export type ConfigGlobalUpdateInput = {
|
||||
export type ConfigHasura = {
|
||||
__typename?: 'ConfigHasura';
|
||||
adminSecret: Scalars['String'];
|
||||
events?: Maybe<ConfigHasuraEvents>;
|
||||
jwtSecrets?: Maybe<Array<ConfigJwtSecret>>;
|
||||
logs?: Maybe<ConfigHasuraLogs>;
|
||||
resources?: Maybe<ConfigResources>;
|
||||
settings?: Maybe<ConfigHasuraSettings>;
|
||||
version?: Maybe<Scalars['String']>;
|
||||
@@ -1047,22 +1051,66 @@ export type ConfigHasuraComparisonExp = {
|
||||
_not?: InputMaybe<ConfigHasuraComparisonExp>;
|
||||
_or?: InputMaybe<Array<ConfigHasuraComparisonExp>>;
|
||||
adminSecret?: InputMaybe<ConfigStringComparisonExp>;
|
||||
events?: InputMaybe<ConfigHasuraEventsComparisonExp>;
|
||||
jwtSecrets?: InputMaybe<ConfigJwtSecretComparisonExp>;
|
||||
logs?: InputMaybe<ConfigHasuraLogsComparisonExp>;
|
||||
resources?: InputMaybe<ConfigResourcesComparisonExp>;
|
||||
settings?: InputMaybe<ConfigHasuraSettingsComparisonExp>;
|
||||
version?: InputMaybe<ConfigStringComparisonExp>;
|
||||
webhookSecret?: InputMaybe<ConfigStringComparisonExp>;
|
||||
};
|
||||
|
||||
export type ConfigHasuraEvents = {
|
||||
__typename?: 'ConfigHasuraEvents';
|
||||
httpPoolSize?: Maybe<Scalars['ConfigUint32']>;
|
||||
};
|
||||
|
||||
export type ConfigHasuraEventsComparisonExp = {
|
||||
_and?: InputMaybe<Array<ConfigHasuraEventsComparisonExp>>;
|
||||
_not?: InputMaybe<ConfigHasuraEventsComparisonExp>;
|
||||
_or?: InputMaybe<Array<ConfigHasuraEventsComparisonExp>>;
|
||||
httpPoolSize?: InputMaybe<ConfigUint32ComparisonExp>;
|
||||
};
|
||||
|
||||
export type ConfigHasuraEventsInsertInput = {
|
||||
httpPoolSize?: InputMaybe<Scalars['ConfigUint32']>;
|
||||
};
|
||||
|
||||
export type ConfigHasuraEventsUpdateInput = {
|
||||
httpPoolSize?: InputMaybe<Scalars['ConfigUint32']>;
|
||||
};
|
||||
|
||||
export type ConfigHasuraInsertInput = {
|
||||
adminSecret: Scalars['String'];
|
||||
events?: InputMaybe<ConfigHasuraEventsInsertInput>;
|
||||
jwtSecrets?: InputMaybe<Array<ConfigJwtSecretInsertInput>>;
|
||||
logs?: InputMaybe<ConfigHasuraLogsInsertInput>;
|
||||
resources?: InputMaybe<ConfigResourcesInsertInput>;
|
||||
settings?: InputMaybe<ConfigHasuraSettingsInsertInput>;
|
||||
version?: InputMaybe<Scalars['String']>;
|
||||
webhookSecret: Scalars['String'];
|
||||
};
|
||||
|
||||
export type ConfigHasuraLogs = {
|
||||
__typename?: 'ConfigHasuraLogs';
|
||||
level?: Maybe<Scalars['String']>;
|
||||
};
|
||||
|
||||
export type ConfigHasuraLogsComparisonExp = {
|
||||
_and?: InputMaybe<Array<ConfigHasuraLogsComparisonExp>>;
|
||||
_not?: InputMaybe<ConfigHasuraLogsComparisonExp>;
|
||||
_or?: InputMaybe<Array<ConfigHasuraLogsComparisonExp>>;
|
||||
level?: InputMaybe<ConfigStringComparisonExp>;
|
||||
};
|
||||
|
||||
export type ConfigHasuraLogsInsertInput = {
|
||||
level?: InputMaybe<Scalars['String']>;
|
||||
};
|
||||
|
||||
export type ConfigHasuraLogsUpdateInput = {
|
||||
level?: InputMaybe<Scalars['String']>;
|
||||
};
|
||||
|
||||
export type ConfigHasuraSettings = {
|
||||
__typename?: 'ConfigHasuraSettings';
|
||||
enableRemoteSchemaPermissions?: Maybe<Scalars['Boolean']>;
|
||||
@@ -1085,7 +1133,9 @@ export type ConfigHasuraSettingsUpdateInput = {
|
||||
|
||||
export type ConfigHasuraUpdateInput = {
|
||||
adminSecret?: InputMaybe<Scalars['String']>;
|
||||
events?: InputMaybe<ConfigHasuraEventsUpdateInput>;
|
||||
jwtSecrets?: InputMaybe<Array<ConfigJwtSecretUpdateInput>>;
|
||||
logs?: InputMaybe<ConfigHasuraLogsUpdateInput>;
|
||||
resources?: InputMaybe<ConfigResourcesUpdateInput>;
|
||||
settings?: InputMaybe<ConfigHasuraSettingsUpdateInput>;
|
||||
version?: InputMaybe<Scalars['String']>;
|
||||
@@ -1639,6 +1689,24 @@ export type Log = {
|
||||
timestamp: Scalars['Timestamp'];
|
||||
};
|
||||
|
||||
export type Metrics = {
|
||||
__typename?: 'Metrics';
|
||||
rows: Array<RowMetric>;
|
||||
};
|
||||
|
||||
export type RowMetric = {
|
||||
__typename?: 'RowMetric';
|
||||
labels?: Maybe<Scalars['labels']>;
|
||||
time: Scalars['Timestamp'];
|
||||
value?: Maybe<Scalars['float64']>;
|
||||
};
|
||||
|
||||
export type StatsLiveApps = {
|
||||
__typename?: 'StatsLiveApps';
|
||||
appID: Array<Scalars['uuid']>;
|
||||
count: Scalars['Int'];
|
||||
};
|
||||
|
||||
/** Boolean expression to compare columns of type "String". All fields are combined with logical 'AND'. */
|
||||
export type String_Comparison_Exp = {
|
||||
_eq?: InputMaybe<Scalars['String']>;
|
||||
@@ -4878,6 +4946,7 @@ export type Backups = {
|
||||
appId: Scalars['uuid'];
|
||||
completedAt?: Maybe<Scalars['timestamptz']>;
|
||||
createdAt: Scalars['timestamptz'];
|
||||
expiresAt?: Maybe<Scalars['timestamptz']>;
|
||||
id: Scalars['uuid'];
|
||||
size: Scalars['bigint'];
|
||||
};
|
||||
@@ -4965,6 +5034,7 @@ export type Backups_Bool_Exp = {
|
||||
appId?: InputMaybe<Uuid_Comparison_Exp>;
|
||||
completedAt?: InputMaybe<Timestamptz_Comparison_Exp>;
|
||||
createdAt?: InputMaybe<Timestamptz_Comparison_Exp>;
|
||||
expiresAt?: InputMaybe<Timestamptz_Comparison_Exp>;
|
||||
id?: InputMaybe<Uuid_Comparison_Exp>;
|
||||
size?: InputMaybe<Bigint_Comparison_Exp>;
|
||||
};
|
||||
@@ -4986,6 +5056,7 @@ export type Backups_Insert_Input = {
|
||||
appId?: InputMaybe<Scalars['uuid']>;
|
||||
completedAt?: InputMaybe<Scalars['timestamptz']>;
|
||||
createdAt?: InputMaybe<Scalars['timestamptz']>;
|
||||
expiresAt?: InputMaybe<Scalars['timestamptz']>;
|
||||
id?: InputMaybe<Scalars['uuid']>;
|
||||
size?: InputMaybe<Scalars['bigint']>;
|
||||
};
|
||||
@@ -4996,6 +5067,7 @@ export type Backups_Max_Fields = {
|
||||
appId?: Maybe<Scalars['uuid']>;
|
||||
completedAt?: Maybe<Scalars['timestamptz']>;
|
||||
createdAt?: Maybe<Scalars['timestamptz']>;
|
||||
expiresAt?: Maybe<Scalars['timestamptz']>;
|
||||
id?: Maybe<Scalars['uuid']>;
|
||||
size?: Maybe<Scalars['bigint']>;
|
||||
};
|
||||
@@ -5005,6 +5077,7 @@ export type Backups_Max_Order_By = {
|
||||
appId?: InputMaybe<Order_By>;
|
||||
completedAt?: InputMaybe<Order_By>;
|
||||
createdAt?: InputMaybe<Order_By>;
|
||||
expiresAt?: InputMaybe<Order_By>;
|
||||
id?: InputMaybe<Order_By>;
|
||||
size?: InputMaybe<Order_By>;
|
||||
};
|
||||
@@ -5015,6 +5088,7 @@ export type Backups_Min_Fields = {
|
||||
appId?: Maybe<Scalars['uuid']>;
|
||||
completedAt?: Maybe<Scalars['timestamptz']>;
|
||||
createdAt?: Maybe<Scalars['timestamptz']>;
|
||||
expiresAt?: Maybe<Scalars['timestamptz']>;
|
||||
id?: Maybe<Scalars['uuid']>;
|
||||
size?: Maybe<Scalars['bigint']>;
|
||||
};
|
||||
@@ -5024,6 +5098,7 @@ export type Backups_Min_Order_By = {
|
||||
appId?: InputMaybe<Order_By>;
|
||||
completedAt?: InputMaybe<Order_By>;
|
||||
createdAt?: InputMaybe<Order_By>;
|
||||
expiresAt?: InputMaybe<Order_By>;
|
||||
id?: InputMaybe<Order_By>;
|
||||
size?: InputMaybe<Order_By>;
|
||||
};
|
||||
@@ -5050,6 +5125,7 @@ export type Backups_Order_By = {
|
||||
appId?: InputMaybe<Order_By>;
|
||||
completedAt?: InputMaybe<Order_By>;
|
||||
createdAt?: InputMaybe<Order_By>;
|
||||
expiresAt?: InputMaybe<Order_By>;
|
||||
id?: InputMaybe<Order_By>;
|
||||
size?: InputMaybe<Order_By>;
|
||||
};
|
||||
@@ -5068,6 +5144,8 @@ export enum Backups_Select_Column {
|
||||
/** column name */
|
||||
CreatedAt = 'createdAt',
|
||||
/** column name */
|
||||
ExpiresAt = 'expiresAt',
|
||||
/** column name */
|
||||
Id = 'id',
|
||||
/** column name */
|
||||
Size = 'size'
|
||||
@@ -5078,6 +5156,7 @@ export type Backups_Set_Input = {
|
||||
appId?: InputMaybe<Scalars['uuid']>;
|
||||
completedAt?: InputMaybe<Scalars['timestamptz']>;
|
||||
createdAt?: InputMaybe<Scalars['timestamptz']>;
|
||||
expiresAt?: InputMaybe<Scalars['timestamptz']>;
|
||||
id?: InputMaybe<Scalars['uuid']>;
|
||||
size?: InputMaybe<Scalars['bigint']>;
|
||||
};
|
||||
@@ -5128,6 +5207,7 @@ export type Backups_Stream_Cursor_Value_Input = {
|
||||
appId?: InputMaybe<Scalars['uuid']>;
|
||||
completedAt?: InputMaybe<Scalars['timestamptz']>;
|
||||
createdAt?: InputMaybe<Scalars['timestamptz']>;
|
||||
expiresAt?: InputMaybe<Scalars['timestamptz']>;
|
||||
id?: InputMaybe<Scalars['uuid']>;
|
||||
size?: InputMaybe<Scalars['bigint']>;
|
||||
};
|
||||
@@ -5152,6 +5232,8 @@ export enum Backups_Update_Column {
|
||||
/** column name */
|
||||
CreatedAt = 'createdAt',
|
||||
/** column name */
|
||||
ExpiresAt = 'expiresAt',
|
||||
/** column name */
|
||||
Id = 'id',
|
||||
/** column name */
|
||||
Size = 'size'
|
||||
@@ -9150,6 +9232,7 @@ export type Mutation_Root = {
|
||||
/** insert a single row into the table: "regions" */
|
||||
insert_regions_one?: Maybe<Regions>;
|
||||
migrateRDSToPostgres: Scalars['Boolean'];
|
||||
pauseInactiveApps: Array<Scalars['String']>;
|
||||
resetPostgresPassword: Scalars['Boolean'];
|
||||
restoreApplicationDatabase: Scalars['Boolean'];
|
||||
/** update single row of the table: "apps" */
|
||||
@@ -9338,9 +9421,16 @@ export type Mutation_Root = {
|
||||
};
|
||||
|
||||
|
||||
/** mutation root */
|
||||
export type Mutation_RootBackupAllApplicationsDatabaseArgs = {
|
||||
expireInDays?: InputMaybe<Scalars['Int']>;
|
||||
};
|
||||
|
||||
|
||||
/** mutation root */
|
||||
export type Mutation_RootBackupApplicationDatabaseArgs = {
|
||||
appID: Scalars['String'];
|
||||
expireInDays?: InputMaybe<Scalars['Int']>;
|
||||
};
|
||||
|
||||
|
||||
@@ -11947,6 +12037,41 @@ export type Query_Root = {
|
||||
files: Array<Files>;
|
||||
/** fetch aggregated fields from the table: "storage.files" */
|
||||
filesAggregate: Files_Aggregate;
|
||||
/**
|
||||
* Returns CPU metrics for a given application.
|
||||
* If `from` and `to` are not provided, they default to an hour ago and now, respectively.
|
||||
*
|
||||
* CPU usage is calculated as the average CPU usage over the period of 1m.
|
||||
*
|
||||
* Unit returned is millicores.
|
||||
*/
|
||||
getCPUMetrics: Metrics;
|
||||
/**
|
||||
* Returns memory metrics for a given application.
|
||||
* If `from` and `to` are not provided, they default to an hour ago and now, respectively.
|
||||
*
|
||||
* Memory usage is returned in MiB.
|
||||
*/
|
||||
getMemoryMetrics: Metrics;
|
||||
/**
|
||||
* Returns disk capacity for the volume used by postgres to store the database.
|
||||
* If `from` and `to` are not provided, they default to an hour ago and now, respectively.
|
||||
*
|
||||
* Disk usage is returned in MiB.
|
||||
*/
|
||||
getPostgresVolumeCapacity: Metrics;
|
||||
/**
|
||||
* Returns disk usage for the volume used by postgres to store the database.
|
||||
* If `from` and `to` are not provided, they default to an hour ago and now, respectively.
|
||||
*
|
||||
* Disk usage is returned in MiB.
|
||||
*/
|
||||
getPostgresVolumeUsage: Metrics;
|
||||
/**
|
||||
* Return requests per second for a given application by service.
|
||||
* If `from` and `to` are not provided, they default to an hour ago and now, respectively.
|
||||
*/
|
||||
getRequestsPerSecond: Metrics;
|
||||
/** fetch data from the table: "github_app_installations" using primary key columns */
|
||||
githubAppInstallation?: Maybe<GithubAppInstallations>;
|
||||
/** fetch data from the table: "github_app_installations" */
|
||||
@@ -11982,6 +12107,13 @@ export type Query_Root = {
|
||||
regions_aggregate: Regions_Aggregate;
|
||||
/** fetch data from the table: "regions" using primary key columns */
|
||||
regions_by_pk?: Maybe<Regions>;
|
||||
/**
|
||||
* Returns lists of apps that have some live traffic in the give time range.
|
||||
* From defaults to 24 hours ago and to defaults to now.
|
||||
*
|
||||
* Requests that returned a 4xx or 5xx status code are not counted as live traffic.
|
||||
*/
|
||||
statsLiveApps: StatsLiveApps;
|
||||
systemConfig?: Maybe<ConfigSystemConfig>;
|
||||
systemConfigs: Array<ConfigAppSystemConfig>;
|
||||
/** fetch data from the table: "auth.users" using primary key columns */
|
||||
@@ -12511,6 +12643,41 @@ export type Query_RootFilesAggregateArgs = {
|
||||
};
|
||||
|
||||
|
||||
export type Query_RootGetCpuMetricsArgs = {
|
||||
appID: Scalars['String'];
|
||||
from?: InputMaybe<Scalars['Timestamp']>;
|
||||
to?: InputMaybe<Scalars['Timestamp']>;
|
||||
};
|
||||
|
||||
|
||||
export type Query_RootGetMemoryMetricsArgs = {
|
||||
appID: Scalars['String'];
|
||||
from?: InputMaybe<Scalars['Timestamp']>;
|
||||
to?: InputMaybe<Scalars['Timestamp']>;
|
||||
};
|
||||
|
||||
|
||||
export type Query_RootGetPostgresVolumeCapacityArgs = {
|
||||
appID: Scalars['String'];
|
||||
from?: InputMaybe<Scalars['Timestamp']>;
|
||||
to?: InputMaybe<Scalars['Timestamp']>;
|
||||
};
|
||||
|
||||
|
||||
export type Query_RootGetPostgresVolumeUsageArgs = {
|
||||
appID: Scalars['String'];
|
||||
from?: InputMaybe<Scalars['Timestamp']>;
|
||||
to?: InputMaybe<Scalars['Timestamp']>;
|
||||
};
|
||||
|
||||
|
||||
export type Query_RootGetRequestsPerSecondArgs = {
|
||||
appID: Scalars['String'];
|
||||
from?: InputMaybe<Scalars['Timestamp']>;
|
||||
to?: InputMaybe<Scalars['Timestamp']>;
|
||||
};
|
||||
|
||||
|
||||
export type Query_RootGithubAppInstallationArgs = {
|
||||
id: Scalars['uuid'];
|
||||
};
|
||||
@@ -12634,6 +12801,12 @@ export type Query_RootRegions_By_PkArgs = {
|
||||
};
|
||||
|
||||
|
||||
export type Query_RootStatsLiveAppsArgs = {
|
||||
from?: InputMaybe<Scalars['Timestamp']>;
|
||||
to?: InputMaybe<Scalars['Timestamp']>;
|
||||
};
|
||||
|
||||
|
||||
export type Query_RootSystemConfigArgs = {
|
||||
appID: Scalars['uuid'];
|
||||
};
|
||||
@@ -16480,7 +16653,7 @@ export type GetSignInMethodsQueryVariables = Exact<{
|
||||
}>;
|
||||
|
||||
|
||||
export type GetSignInMethodsQuery = { __typename?: 'query_root', config?: { __typename: 'ConfigConfig', id: 'ConfigConfig', provider?: { __typename: 'ConfigProvider', id: 'ConfigProvider', sms?: { __typename?: 'ConfigSms', accountSid: string, authToken: string, messagingServiceId: string, provider?: string | null } | null } | null, auth?: { __typename: 'ConfigAuth', id: 'ConfigAuth', method?: { __typename?: 'ConfigAuthMethod', emailPassword?: { __typename?: 'ConfigAuthMethodEmailPassword', emailVerificationRequired?: boolean | null, hibpEnabled?: boolean | null } | null, emailPasswordless?: { __typename?: 'ConfigAuthMethodEmailPasswordless', enabled?: boolean | null } | null, smsPasswordless?: { __typename?: 'ConfigAuthMethodSmsPasswordless', enabled?: boolean | null } | null, anonymous?: { __typename?: 'ConfigAuthMethodAnonymous', enabled?: boolean | null } | null, webauthn?: { __typename?: 'ConfigAuthMethodWebauthn', enabled?: boolean | null } | null, oauth?: { __typename?: 'ConfigAuthMethodOauth', apple?: { __typename?: 'ConfigAuthMethodOauthApple', enabled?: boolean | null, clientId?: string | null, keyId?: string | null, teamId?: string | null, privateKey?: string | null } | null, discord?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, facebook?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, github?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, google?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, linkedin?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, spotify?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, twitch?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, twitter?: { __typename?: 'ConfigAuthMethodOauthTwitter', enabled?: boolean | null, consumerKey?: string | null, consumerSecret?: string | null } | null, windowslive?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, workos?: { __typename?: 'ConfigAuthMethodOauthWorkos', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, connection?: string | null, organization?: string | null } | null } | null } | null } | null } | null };
|
||||
export type GetSignInMethodsQuery = { __typename?: 'query_root', config?: { __typename: 'ConfigConfig', id: 'ConfigConfig', provider?: { __typename: 'ConfigProvider', id: 'ConfigProvider', sms?: { __typename?: 'ConfigSms', accountSid: string, authToken: string, messagingServiceId: string, provider?: string | null } | null } | null, auth?: { __typename: 'ConfigAuth', id: 'ConfigAuth', method?: { __typename?: 'ConfigAuthMethod', emailPassword?: { __typename?: 'ConfigAuthMethodEmailPassword', emailVerificationRequired?: boolean | null, hibpEnabled?: boolean | null } | null, emailPasswordless?: { __typename?: 'ConfigAuthMethodEmailPasswordless', enabled?: boolean | null } | null, smsPasswordless?: { __typename?: 'ConfigAuthMethodSmsPasswordless', enabled?: boolean | null } | null, anonymous?: { __typename?: 'ConfigAuthMethodAnonymous', enabled?: boolean | null } | null, webauthn?: { __typename?: 'ConfigAuthMethodWebauthn', enabled?: boolean | null } | null, oauth?: { __typename?: 'ConfigAuthMethodOauth', apple?: { __typename?: 'ConfigAuthMethodOauthApple', enabled?: boolean | null, clientId?: string | null, keyId?: string | null, teamId?: string | null, privateKey?: string | null } | null, discord?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, facebook?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, github?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, google?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, linkedin?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, spotify?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, twitch?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, twitter?: { __typename?: 'ConfigAuthMethodOauthTwitter', enabled?: boolean | null, consumerKey?: string | null, consumerSecret?: string | null } | null, windowslive?: { __typename?: 'ConfigStandardOauthProviderWithScope', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, scope?: Array<string> | null } | null, workos?: { __typename?: 'ConfigAuthMethodOauthWorkos', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, connection?: string | null, organization?: string | null } | null, azuread?: { __typename?: 'ConfigAuthMethodOauthAzuread', enabled?: boolean | null, clientId?: string | null, clientSecret?: string | null, tenant?: string | null } | null } | null } | null } | null } | null };
|
||||
|
||||
export type GetSmtpSettingsQueryVariables = Exact<{
|
||||
appId: Scalars['uuid'];
|
||||
@@ -18282,6 +18455,12 @@ export const GetSignInMethodsDocument = gql`
|
||||
connection
|
||||
organization
|
||||
}
|
||||
azuread {
|
||||
enabled
|
||||
clientId
|
||||
clientSecret
|
||||
tenant
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
import { graphql } from 'msw';
|
||||
|
||||
const nhostGraphQLLink = graphql.link('http://localhost:1337/v1/graphql');
|
||||
const nhostGraphQLLink = graphql.link('https://local.graphql.nhost.run/v1');
|
||||
|
||||
export default nhostGraphQLLink;
|
||||
|
||||
@@ -79,7 +79,7 @@ function Providers({ children }: PropsWithChildren<{}>) {
|
||||
<NhostApolloProvider
|
||||
nhost={nhost}
|
||||
link={createHttpLink({
|
||||
uri: 'http://localhost:1337/v1/graphql',
|
||||
uri: 'https://local.graphql.nhost.run/v1',
|
||||
})}
|
||||
>
|
||||
<WorkspaceProvider>
|
||||
|
||||
@@ -19,6 +19,7 @@
|
||||
"baseUrl": "./src",
|
||||
"useUnknownInCatchVariables": false,
|
||||
"paths": {
|
||||
"@/e2e/*": ["../e2e/*"],
|
||||
"@/components/*": ["components/*"],
|
||||
"@/hooks/*": ["hooks/*"],
|
||||
"@/utils/*": ["utils/*"],
|
||||
|
||||
@@ -4,6 +4,7 @@
|
||||
"jsx": "react-jsx",
|
||||
"types": ["vitest/globals"],
|
||||
"paths": {
|
||||
"@/e2e/*": ["../e2e/*"],
|
||||
"@/components/*": ["components/*"],
|
||||
"@/hooks/*": ["hooks/*"],
|
||||
"@/utils/*": ["utils/*"],
|
||||
|
||||
@@ -16,9 +16,9 @@
|
||||
},
|
||||
"dependencies": {
|
||||
"@algolia/client-search": "^4.9.1",
|
||||
"@docusaurus/core": "2.3.1",
|
||||
"@docusaurus/plugin-sitemap": "2.3.1",
|
||||
"@docusaurus/preset-classic": "2.3.1",
|
||||
"@docusaurus/core": "2.4.0",
|
||||
"@docusaurus/plugin-sitemap": "2.4.0",
|
||||
"@docusaurus/preset-classic": "2.4.0",
|
||||
"@mdx-js/react": "^1.6.22",
|
||||
"clsx": "^1.2.1",
|
||||
"docusaurus-plugin-image-zoom": "^0.1.1",
|
||||
@@ -30,7 +30,7 @@
|
||||
"unist-util-visit": "^2.0.0"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@docusaurus/module-type-aliases": "2.3.1",
|
||||
"@docusaurus/module-type-aliases": "2.4.0",
|
||||
"@tsconfig/docusaurus": "^1.0.6",
|
||||
"typescript": "^4.8.4"
|
||||
},
|
||||
|
||||
@@ -13,7 +13,7 @@ services:
|
||||
postgres_password: postgres
|
||||
postgres_user: postgres
|
||||
auth:
|
||||
image: nhost/hasura-auth:0.16.1
|
||||
image: nhost/hasura-auth:0.16.2
|
||||
storage:
|
||||
image: nhost/hasura-storage:0.3.0
|
||||
auth:
|
||||
|
||||
@@ -13,7 +13,7 @@ services:
|
||||
postgres_password: postgres
|
||||
postgres_user: postgres
|
||||
auth:
|
||||
image: nhost/hasura-auth:0.16.1
|
||||
image: nhost/hasura-auth:0.16.2
|
||||
storage:
|
||||
image: nhost/hasura-storage:0.3.0
|
||||
auth:
|
||||
|
||||
@@ -13,7 +13,7 @@ services:
|
||||
postgres_password: postgres
|
||||
postgres_user: postgres
|
||||
auth:
|
||||
image: nhost/hasura-auth:0.16.1
|
||||
image: nhost/hasura-auth:0.16.2
|
||||
storage:
|
||||
image: nhost/hasura-storage:0.3.0
|
||||
auth:
|
||||
|
||||
@@ -1,9 +1,5 @@
|
||||
module.exports = {
|
||||
extends: [
|
||||
'../../config/.eslintrc.js',
|
||||
'plugin:react/jsx-runtime',
|
||||
'plugin:@next/next/recommended'
|
||||
],
|
||||
extends: ['../../config/.eslintrc.js', 'plugin:@next/next/recommended'],
|
||||
rules: {
|
||||
'react/react-in-jsx-scope': 'off'
|
||||
}
|
||||
|
||||
6
examples/react-apollo/.gitignore
vendored
6
examples/react-apollo/.gitignore
vendored
@@ -25,5 +25,7 @@ yarn-error.log*
|
||||
.nhost
|
||||
functions/node_modules
|
||||
|
||||
cypress/videos
|
||||
cypress/screenshots
|
||||
/test-results/
|
||||
/playwright-report/
|
||||
/playwright/.cache/
|
||||
storageState.json
|
||||
@@ -1,5 +1,11 @@
|
||||
# @nhost-examples/react-apollo
|
||||
|
||||
## 0.1.10
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- caba147b: chore(examples): improve tests of the React Apollo example
|
||||
|
||||
## 0.1.9
|
||||
|
||||
### Patch Changes
|
||||
|
||||
@@ -1,16 +0,0 @@
|
||||
import { defineConfig } from 'cypress'
|
||||
|
||||
export default defineConfig({
|
||||
e2e: {
|
||||
baseUrl: 'http://localhost:3000',
|
||||
chromeWebSecurity: false,
|
||||
// * for some reason, the mailhog API is not systematically available
|
||||
// * when using `localhost` instead of `127.0.0.1`
|
||||
mailHogUrl: 'http://127.0.0.1:8025',
|
||||
env: {
|
||||
backendUrl: 'http://localhost:1337'
|
||||
},
|
||||
defaultCommandTimeout: 20000,
|
||||
requestTimeout: 20000
|
||||
}
|
||||
} as Cypress.ConfigOptions)
|
||||
@@ -1,8 +0,0 @@
|
||||
context('Authentication guards', () => {
|
||||
it('should redirect to /sign-in when not authenticated', () => {
|
||||
cy.visit('/')
|
||||
cy.location('pathname').should('equal', '/sign-in')
|
||||
cy.visit('/apollo')
|
||||
cy.location('pathname').should('equal', '/sign-in')
|
||||
})
|
||||
})
|
||||
@@ -1,21 +0,0 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
|
||||
context('Forgot password', () => {
|
||||
it('should reset password', () => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password(8)
|
||||
|
||||
cy.signUpEmailPassword(email, password)
|
||||
cy.contains('Verification email sent').should('be.visible')
|
||||
|
||||
cy.visit('/sign-in')
|
||||
cy.findByRole('button', { name: /Continue with email \+ password/i }).click()
|
||||
cy.findByRole('button', { name: /Forgot Password?/i }).click()
|
||||
|
||||
cy.findByPlaceholderText('Email Address').type(email)
|
||||
cy.findByRole('button', { name: /Reset your password/i }).click()
|
||||
|
||||
cy.confirmEmail(email)
|
||||
cy.contains('Profile page')
|
||||
})
|
||||
})
|
||||
@@ -1,51 +0,0 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
|
||||
context('Anonymous users', () => {
|
||||
beforeEach(() => {
|
||||
cy.signInAnonymous()
|
||||
})
|
||||
|
||||
it('should sign-up anonymously', () => {
|
||||
cy.contains('You signed in anonymously')
|
||||
})
|
||||
|
||||
it('should deanonymise with email+password', () => {
|
||||
cy.fetchUserData()
|
||||
.its('id')
|
||||
.then((id) => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
cy.signUpEmailPassword(email, password)
|
||||
cy.contains('Verification email sent').should('be.visible')
|
||||
cy.confirmEmail(email)
|
||||
cy.contains('You signed in anonymously').should('not.exist')
|
||||
|
||||
cy.fetchUserData().then((user) => {
|
||||
cy.wrap(user).its('id').should('equal', id)
|
||||
cy.wrap(user).its('email').should('equal', email)
|
||||
})
|
||||
})
|
||||
})
|
||||
|
||||
it('should deanonymise with a magic link', () => {
|
||||
cy.fetchUserData()
|
||||
.its('id')
|
||||
.then((id) => {
|
||||
const email = faker.internet.email()
|
||||
cy.signUpEmailPasswordless(email)
|
||||
cy.contains('Verification email sent').should('be.visible')
|
||||
cy.confirmEmail(email)
|
||||
cy.goToHomePage()
|
||||
cy.contains('You signed in anonymously').should('not.exist')
|
||||
|
||||
cy.fetchUserData().then((user) => {
|
||||
cy.wrap(user).its('id').should('equal', id)
|
||||
cy.wrap(user).its('email').should('equal', email)
|
||||
})
|
||||
})
|
||||
})
|
||||
|
||||
// TODO implement deanonymisation with Oauth?
|
||||
// TODO forbid email/password change, MFA activation, and password reset when the following PR is released
|
||||
// * https://github.com/nhost/hasura-auth/pull/190
|
||||
})
|
||||
@@ -1,28 +0,0 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
|
||||
context('Sign up with email+password', () => {
|
||||
it('should sign-up with email and password', () => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
cy.signUpEmailPassword(email, password)
|
||||
cy.contains('Verification email sent').should('be.visible')
|
||||
cy.confirmEmail(email)
|
||||
cy.contains('You are authenticated')
|
||||
})
|
||||
|
||||
it('shoud raise an error when trying to sign up with an existing email', () => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password(10)
|
||||
cy.signUpEmailPassword(email, password)
|
||||
cy.contains('Verification email sent').should('be.visible')
|
||||
cy.signUpEmailPassword(email, password)
|
||||
cy.contains('Email already in use').should('be.visible')
|
||||
})
|
||||
|
||||
// TODO implement in the UI
|
||||
it.skip('should fail when network is not available', () => {
|
||||
cy.disconnectBackend()
|
||||
cy.signUpEmailPassword(faker.internet.email(), faker.internet.password())
|
||||
cy.contains('Error').should('be.visible')
|
||||
})
|
||||
})
|
||||
@@ -1,17 +0,0 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
|
||||
context('Sign up with a magic link', () => {
|
||||
it('should sign-up with a magic link', () => {
|
||||
const email = faker.internet.email()
|
||||
cy.signUpEmailPasswordless(email)
|
||||
cy.contains('Verification email sent').should('be.visible')
|
||||
cy.confirmEmail(email)
|
||||
cy.contains('Profile page')
|
||||
})
|
||||
|
||||
it('should fail when network is not available', () => {
|
||||
cy.disconnectBackend()
|
||||
cy.signUpEmailPasswordless(faker.internet.email())
|
||||
cy.contains('Error').should('be.visible')
|
||||
})
|
||||
})
|
||||
@@ -1,74 +0,0 @@
|
||||
import totp from 'totp-generator'
|
||||
|
||||
import { faker } from '@faker-js/faker'
|
||||
import { Decoder } from '@nuintun/qrcode'
|
||||
|
||||
context('Sign in with email+password', () => {
|
||||
it('should sign-in with email and password', () => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
cy.signUpEmailPassword(email, password)
|
||||
cy.contains('Verification email sent').should('be.visible')
|
||||
cy.confirmEmail(email)
|
||||
cy.signOut()
|
||||
cy.contains('Sign in to the Application').should('be.visible')
|
||||
cy.signInEmailPassword(email, password)
|
||||
|
||||
cy.contains('You are authenticated')
|
||||
})
|
||||
|
||||
// TODO implement in the UI
|
||||
it.skip('should fail when network is not available', () => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
cy.disconnectBackend()
|
||||
cy.signInEmailPassword(email, password)
|
||||
cy.contains('Error').should('be.visible')
|
||||
})
|
||||
|
||||
it('should activate and sign-in with MFA', () => {
|
||||
// * Sign-up with email+password
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.email()
|
||||
cy.signUpEmailPassword(email, password)
|
||||
cy.contains('Verification email sent').should('be.visible')
|
||||
cy.confirmEmail(email)
|
||||
|
||||
cy.getNavBar()
|
||||
.findByRole('button', { name: /Profile/i })
|
||||
.click()
|
||||
|
||||
cy.findByText(/Activate 2-step verification/i)
|
||||
.parent()
|
||||
.findByRole('button')
|
||||
.click()
|
||||
|
||||
cy.findAllByAltText(/qrcode/i).then(async (img) => {
|
||||
// * Activate MFA
|
||||
const result = await new Decoder().scan(img.prop('src'))
|
||||
const [, params] = result.data.split('?')
|
||||
const { secret, algorithm, digits, period } = Object.fromEntries(new URLSearchParams(params))
|
||||
const code = totp(secret, {
|
||||
algorithm: algorithm.replace('SHA1', 'SHA-1'),
|
||||
digits: parseInt(digits),
|
||||
period: parseInt(period)
|
||||
})
|
||||
cy.findByPlaceholderText('Enter activation code').type(code)
|
||||
cy.findByRole('button', { name: /Activate/i }).click()
|
||||
cy.contains('MFA has been activated!!!')
|
||||
cy.signOut()
|
||||
|
||||
// * Sign-in with MFA
|
||||
cy.visit('/sign-in')
|
||||
cy.findByRole('button', { name: /Continue with email \+ password/i }).click()
|
||||
cy.findByPlaceholderText('Email Address').type(email)
|
||||
cy.findByPlaceholderText('Password').type(password)
|
||||
cy.findByRole('button', { name: /Sign in/i }).click()
|
||||
cy.contains('Send 2-step verification code')
|
||||
const newCode = totp(secret, { timestamp: Date.now() })
|
||||
cy.findByPlaceholderText('One-time password').type(newCode)
|
||||
cy.findByRole('button', { name: /Send 2-step verification code/i }).click()
|
||||
cy.contains('You are authenticated')
|
||||
})
|
||||
})
|
||||
})
|
||||
@@ -1,22 +0,0 @@
|
||||
context('Automatic sign-in with a refresh token', () => {
|
||||
it('should sign in automatically with a refresh token', () => {
|
||||
cy.signUpAndConfirmEmail()
|
||||
cy.contains('Profile page')
|
||||
cy.clearLocalStorage()
|
||||
cy.reload()
|
||||
cy.contains('Sign in to the Application')
|
||||
cy.visitPathWithRefreshToken('/profile')
|
||||
cy.contains('Profile page')
|
||||
})
|
||||
|
||||
it('should fail automatic sign-in when network is not available', () => {
|
||||
cy.signUpAndConfirmEmail()
|
||||
cy.contains('Profile page')
|
||||
cy.disconnectBackend()
|
||||
cy.clearLocalStorage()
|
||||
cy.reload()
|
||||
cy.contains('Sign in to the Application')
|
||||
cy.visitPathWithRefreshToken('/profile')
|
||||
cy.contains('Could not sign in automatically. Retrying to get user information..')
|
||||
})
|
||||
})
|
||||
@@ -1,45 +0,0 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
|
||||
context('Apollo', () => {
|
||||
const addItemTest = (sentence: string) => {
|
||||
cy.getNavBar()
|
||||
.findByRole('button', { name: /Apollo/i })
|
||||
.click()
|
||||
cy.contains('Todo list')
|
||||
cy.focused().type(sentence)
|
||||
cy.findByRole('button', { name: /Add/i }).click()
|
||||
}
|
||||
|
||||
it('should add an item to the todo list when normally authenticated', () => {
|
||||
cy.signUpAndConfirmEmail()
|
||||
const sentence = faker.lorem.sentence()
|
||||
addItemTest(sentence)
|
||||
cy.get('li').contains(sentence)
|
||||
})
|
||||
|
||||
it('should add an item to the todo list when anonymous', () => {
|
||||
cy.signInAnonymous()
|
||||
const sentence = faker.lorem.sentence()
|
||||
addItemTest(sentence)
|
||||
cy.get('li').contains(sentence)
|
||||
})
|
||||
|
||||
it('should add an item to the todo list after a token refresh', () => {
|
||||
// * This test has a limitation: Hasura's clock is not changing, so the previous JWT will still be valid.
|
||||
cy.signUpAndConfirmEmail()
|
||||
const now = Date.now()
|
||||
cy.clock(now)
|
||||
cy.tick(4 * 7 * 24 * 60 * 60 * 1000)
|
||||
const sentence = faker.lorem.sentence()
|
||||
addItemTest(sentence)
|
||||
cy.get('li').contains(sentence)
|
||||
})
|
||||
|
||||
it('should not add an item when backend is disconnected', () => {
|
||||
cy.signUpAndConfirmEmail()
|
||||
cy.disconnectBackend()
|
||||
addItemTest(faker.lorem.sentence())
|
||||
cy.contains('Network error')
|
||||
cy.get('ul').should('be.empty')
|
||||
})
|
||||
})
|
||||
@@ -1,30 +0,0 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
|
||||
context('Change email', () => {
|
||||
it('should change email', () => {
|
||||
const newEmail = faker.internet.email()
|
||||
cy.signUpAndConfirmEmail()
|
||||
cy.findByPlaceholderText('New email').type(newEmail)
|
||||
cy.findByText(/Change Email/i)
|
||||
.parent()
|
||||
.findByRole('button')
|
||||
.click()
|
||||
cy.contains('Please check your inbox and follow the link to confirm the email change').should(
|
||||
'be.visible'
|
||||
)
|
||||
cy.signOut()
|
||||
cy.confirmEmail(newEmail)
|
||||
cy.contains('Profile page')
|
||||
})
|
||||
|
||||
it('should not accept an invalid email', () => {
|
||||
const newEmail = faker.random.alphaNumeric()
|
||||
cy.signUpAndConfirmEmail()
|
||||
cy.findByPlaceholderText('New email').type(newEmail)
|
||||
cy.findByText(/Change Email/i)
|
||||
.parent()
|
||||
.findByRole('button')
|
||||
.click()
|
||||
cy.contains('Email is incorrectly formatted').should('be.visible')
|
||||
})
|
||||
})
|
||||
@@ -1,29 +0,0 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
|
||||
context('Change password', () => {
|
||||
it('should change password', () => {
|
||||
const email = faker.internet.email()
|
||||
const newPassword = faker.internet.password()
|
||||
cy.signUpAndConfirmEmail(email)
|
||||
cy.findByPlaceholderText('New password').type(newPassword)
|
||||
cy.findByText(/Change Password/i)
|
||||
.parent()
|
||||
.findByRole('button')
|
||||
.click()
|
||||
cy.contains('Password changed successfully').should('be.visible')
|
||||
cy.signOut()
|
||||
cy.signInEmailPassword(email, newPassword)
|
||||
cy.contains('You are authenticated')
|
||||
})
|
||||
|
||||
it('should not accept an invalid password', () => {
|
||||
const newPassword = faker.random.alphaNumeric(2)
|
||||
cy.signUpAndConfirmEmail()
|
||||
cy.findByPlaceholderText('New password').type(newPassword)
|
||||
cy.findByText(/Change Password/i)
|
||||
.parent()
|
||||
.findByRole('button')
|
||||
.click()
|
||||
cy.contains('Password is incorrectly formatted').should('be.visible')
|
||||
})
|
||||
})
|
||||
@@ -1,75 +0,0 @@
|
||||
context('File uploads', () => {
|
||||
it('should upload a single file', () => {
|
||||
cy.signUpAndConfirmEmail()
|
||||
cy.findByRole('button', { name: /Storage/i }).click()
|
||||
cy.findByRole('button', { name: /Drag a file here or click to select/i })
|
||||
.children('input[type=file]')
|
||||
.selectFile(
|
||||
{
|
||||
contents: Cypress.Buffer.from('file contents'),
|
||||
fileName: 'file.txt',
|
||||
mimeType: 'text/plain',
|
||||
lastModified: Date.now()
|
||||
},
|
||||
{ force: true }
|
||||
)
|
||||
.parent()
|
||||
.contains('Successfully uploaded')
|
||||
})
|
||||
|
||||
it('should upload two files using the same single file uploader', () => {
|
||||
cy.signUpAndConfirmEmail()
|
||||
cy.findByRole('button', { name: /Storage/i }).click()
|
||||
cy.findByRole('button', { name: /Drag a file here or click to select/i })
|
||||
.children('input[type=file]')
|
||||
.selectFile(
|
||||
{
|
||||
contents: Cypress.Buffer.from('file contents'),
|
||||
fileName: 'file.txt',
|
||||
mimeType: 'text/plain',
|
||||
lastModified: Date.now()
|
||||
},
|
||||
{ force: true }
|
||||
)
|
||||
.selectFile(
|
||||
{
|
||||
contents: Cypress.Buffer.from('file contents'),
|
||||
fileName: 'file.txt',
|
||||
mimeType: 'text/plain',
|
||||
lastModified: Date.now()
|
||||
},
|
||||
{ force: true }
|
||||
)
|
||||
.parent()
|
||||
.contains('Successfully uploaded')
|
||||
})
|
||||
|
||||
it('should upload multiple files', () => {
|
||||
const files: Required<Cypress.FileReferenceObject>[] = [
|
||||
{
|
||||
contents: Cypress.Buffer.from('file contents'),
|
||||
fileName: 'file1.txt',
|
||||
mimeType: 'text/plain',
|
||||
lastModified: Date.now()
|
||||
},
|
||||
{
|
||||
contents: Cypress.Buffer.from('file contents'),
|
||||
fileName: 'file2.txt',
|
||||
mimeType: 'text/plain',
|
||||
lastModified: Date.now()
|
||||
}
|
||||
]
|
||||
cy.signUpAndConfirmEmail()
|
||||
cy.findByRole('button', { name: /Storage/i }).click()
|
||||
cy.findByRole('button', { name: /Drag files here or click to select/i })
|
||||
.children('input[type=file]')
|
||||
.selectFile(files, { force: true })
|
||||
cy.findByRole('button', { name: /Upload/i }).click()
|
||||
cy.findByRole('button', { name: /Successfully uploaded/i }).should('be.visible')
|
||||
cy.findByRole('table').within(() => {
|
||||
files.forEach((file) => {
|
||||
cy.contains(file.fileName).parent().findByTitle('success').should('exist')
|
||||
})
|
||||
})
|
||||
})
|
||||
})
|
||||
@@ -1,13 +0,0 @@
|
||||
context('Sign out', () => {
|
||||
beforeEach(() => {
|
||||
cy.signUpAndConfirmEmail()
|
||||
})
|
||||
|
||||
it('should sign out', () => {
|
||||
cy.visitPathWithRefreshToken()
|
||||
cy.goToProfilePage()
|
||||
cy.contains('Profile page')
|
||||
cy.signOut()
|
||||
cy.contains('Sign in to the Application')
|
||||
})
|
||||
})
|
||||
@@ -1,30 +0,0 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
|
||||
context('Token refresh', () => {
|
||||
it('should refresh token one minute before it expires', () => {
|
||||
const email = faker.internet.email()
|
||||
cy.signUpEmailPasswordless(email)
|
||||
cy.contains('Verification email sent').should('be.visible')
|
||||
const now = Date.now()
|
||||
cy.clock(now)
|
||||
cy.confirmEmail(email)
|
||||
|
||||
cy.intercept(Cypress.env('backendUrl') + '/v1/auth/token').as('tokenRequest')
|
||||
cy.tick(14 * 60 * 1000)
|
||||
cy.wait('@tokenRequest').its('response.statusCode').should('eq', 200)
|
||||
})
|
||||
|
||||
it('should refresh session from localStorage after 4 weeks of inactivity', () => {
|
||||
const email = faker.internet.email()
|
||||
cy.signUpEmailPasswordless(email)
|
||||
cy.contains('Verification email sent').should('be.visible')
|
||||
const now = Date.now()
|
||||
cy.clock(now)
|
||||
cy.confirmEmail(email)
|
||||
cy.contains('Profile page')
|
||||
|
||||
cy.tick(4 * 7 * 24 * 60 * 60 * 1000)
|
||||
cy.reload()
|
||||
cy.contains('Profile page')
|
||||
})
|
||||
})
|
||||
@@ -1,139 +0,0 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import { User } from '@nhost/react'
|
||||
|
||||
import '@testing-library/cypress/add-commands'
|
||||
import 'cypress-mailhog'
|
||||
declare module 'mocha' {
|
||||
export interface Context {
|
||||
refreshToken?: string
|
||||
}
|
||||
}
|
||||
declare global {
|
||||
namespace Cypress {
|
||||
interface Chainable {
|
||||
signUpEmailPassword(email: string, password: string): Chainable<Element>
|
||||
signUpEmailPasswordless(email: string): Chainable<Element>
|
||||
signInEmailPassword(email: string, password: string): Chainable<Element>
|
||||
signInAnonymous(): Chainable<Element>
|
||||
/** Sign in from the refresh token stored in the global state */
|
||||
visitPathWithRefreshToken(path?: string): Chainable<Element>
|
||||
/** Click on the 'Sign Out' item of the left side menu to sign out the current user */
|
||||
signOut(): Chainable<Element>
|
||||
/** Run a sign-up + authentication sequence with passwordless to use an authenticated user in other tests */
|
||||
signUpAndConfirmEmail(email?: string): Chainable<Element>
|
||||
/** Gets a confirmation email and click on the link */
|
||||
confirmEmail(email: string): Chainable<Element>
|
||||
/** Save the refresh token in the global state so it can be reused with `this.refreshToken` */
|
||||
saveRefreshToken(): Chainable<Element>
|
||||
/** Make the Nhost backend unavailable */
|
||||
disconnectBackend(): Chainable<Element>
|
||||
/** Get the left side navigation bar */
|
||||
getNavBar(): Chainable<Element>
|
||||
/** Go to the profile page */
|
||||
goToProfilePage(): Chainable<Element>
|
||||
/** Go to the home page */
|
||||
goToHomePage(): Chainable<Element>
|
||||
/** Go getch the user ID in the profile page*/
|
||||
fetchUserData(): Chainable<User>
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
Cypress.Commands.add('signUpEmailPassword', (email, password) => {
|
||||
cy.visit('/sign-up')
|
||||
cy.findByRole('button', { name: /Continue with email \+ password/i }).click()
|
||||
cy.findByPlaceholderText('First name').type(faker.name.firstName())
|
||||
cy.findByPlaceholderText('Last name').type(faker.name.lastName())
|
||||
cy.findByPlaceholderText('Email Address').type(email)
|
||||
cy.findByPlaceholderText('Password').type(password)
|
||||
cy.findByPlaceholderText('Confirm Password').type(password)
|
||||
cy.findByRole('button', { name: /Continue with email \+ password/i }).click()
|
||||
})
|
||||
|
||||
Cypress.Commands.add('signUpEmailPasswordless', (email) => {
|
||||
cy.visit('/sign-up')
|
||||
cy.findByRole('button', { name: /Continue with a magic link/i }).click()
|
||||
cy.findByPlaceholderText('Email Address').type(email)
|
||||
cy.findByRole('button', { name: /Continue with email/i }).click()
|
||||
})
|
||||
|
||||
Cypress.Commands.add('signInEmailPassword', (email, password) => {
|
||||
cy.visit('/sign-in')
|
||||
cy.findByRole('button', { name: /Continue with email \+ password/i }).click()
|
||||
cy.findByPlaceholderText('Email Address').type(email)
|
||||
cy.findByPlaceholderText('Password').type(password)
|
||||
cy.findByRole('button', { name: /Sign in/i }).click()
|
||||
cy.saveRefreshToken()
|
||||
})
|
||||
|
||||
Cypress.Commands.add('signInAnonymous', () => {
|
||||
cy.visit('/sign-in')
|
||||
cy.findByRole('link', { name: /sign in anonymously/i }).click()
|
||||
cy.saveRefreshToken()
|
||||
})
|
||||
|
||||
Cypress.Commands.add('visitPathWithRefreshToken', function (path = '/') {
|
||||
cy.visit(path + '#refreshToken=' + this.refreshToken)
|
||||
})
|
||||
|
||||
Cypress.Commands.add('signOut', () => {
|
||||
cy.getNavBar()
|
||||
.findByRole('button', { name: /Sign Out/i })
|
||||
.click()
|
||||
})
|
||||
|
||||
Cypress.Commands.add('confirmEmail', (email) => {
|
||||
cy.mhGetMailsByRecipient(email, 1)
|
||||
.should('have.length', 1)
|
||||
.then(([message]) => {
|
||||
cy.visit(message.Content.Headers['X-Link'][0])
|
||||
cy.saveRefreshToken()
|
||||
})
|
||||
})
|
||||
|
||||
Cypress.Commands.add('signUpAndConfirmEmail', (givenEmail) => {
|
||||
const email = givenEmail || faker.internet.email()
|
||||
cy.signUpEmailPasswordless(email)
|
||||
cy.contains('Verification email sent').should('be.visible')
|
||||
cy.confirmEmail(email)
|
||||
})
|
||||
|
||||
Cypress.Commands.add('saveRefreshToken', () => {
|
||||
cy.getNavBar()
|
||||
.findByRole('button', { name: /Sign Out/i })
|
||||
.then(() => localStorage.getItem('nhostRefreshToken'))
|
||||
.as('refreshToken')
|
||||
})
|
||||
|
||||
Cypress.Commands.add('disconnectBackend', () => {
|
||||
cy.intercept(Cypress.env('backendUrl') + '/**', {
|
||||
forceNetworkError: true
|
||||
})
|
||||
})
|
||||
|
||||
Cypress.Commands.add('getNavBar', () => {
|
||||
cy.findByRole(`navigation`, { name: /main navigation/i })
|
||||
})
|
||||
|
||||
Cypress.Commands.add('goToProfilePage', () => {
|
||||
cy.getNavBar()
|
||||
.findByRole('button', { name: /Profile/i })
|
||||
.click()
|
||||
})
|
||||
|
||||
Cypress.Commands.add('goToHomePage', () => {
|
||||
cy.getNavBar().findByRole('button', { name: /Home/i }).click()
|
||||
})
|
||||
|
||||
Cypress.Commands.add('fetchUserData', () => {
|
||||
cy.goToProfilePage()
|
||||
cy.findByText('User information')
|
||||
.parent()
|
||||
.within(() => {
|
||||
cy.get('pre')
|
||||
.invoke('text')
|
||||
.then((text) => JSON.parse(text))
|
||||
.as('user')
|
||||
})
|
||||
return cy.get<User>('@user')
|
||||
})
|
||||
52
examples/react-apollo/e2e/authenticated/apollo.test.ts
Normal file
52
examples/react-apollo/e2e/authenticated/apollo.test.ts
Normal file
@@ -0,0 +1,52 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import { expect, test } from '@playwright/test'
|
||||
import { signInAnonymously, signUpWithEmailAndPassword, verifyEmail } from '../utils'
|
||||
|
||||
test('should add an item to the todo list when authenticated with email and password', async ({
|
||||
page
|
||||
}) => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
const sentence = faker.lorem.sentence()
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const newPage = await verifyEmail({ page, email, context: page.context() })
|
||||
await newPage.getByRole('button', { name: /apollo/i }).click()
|
||||
await expect(newPage.getByText(/todo list/i)).toBeVisible()
|
||||
await newPage.getByRole('textbox').fill(sentence)
|
||||
await newPage.getByRole('button', { name: /add/i }).click()
|
||||
await expect(newPage.getByRole('listitem').first()).toHaveText(sentence)
|
||||
})
|
||||
|
||||
test('should add an item to the todo list when authenticated anonymously', async ({ page }) => {
|
||||
const sentence = faker.lorem.sentence()
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signInAnonymously({ page })
|
||||
await page.getByRole('button', { name: /apollo/i }).click()
|
||||
await expect(page.getByText(/todo list/i)).toBeVisible()
|
||||
await page.getByRole('textbox').fill(sentence)
|
||||
await page.getByRole('button', { name: /add/i }).click()
|
||||
await expect(page.getByRole('listitem').first()).toHaveText(sentence)
|
||||
})
|
||||
|
||||
test('should fail when network is not available', async ({ page }) => {
|
||||
const sentence = faker.lorem.sentence()
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signInAnonymously({ page })
|
||||
await page.getByRole('button', { name: /apollo/i }).click()
|
||||
await expect(page.getByText(/todo list/i)).toBeVisible()
|
||||
|
||||
await page.route('**', (route) => route.abort('internetdisconnected'))
|
||||
await page.getByRole('textbox').fill(sentence)
|
||||
await page.getByRole('button', { name: /add/i }).click()
|
||||
|
||||
await expect(page.getByText(/network error/i)).toBeVisible()
|
||||
})
|
||||
56
examples/react-apollo/e2e/authenticated/change-email.test.ts
Normal file
56
examples/react-apollo/e2e/authenticated/change-email.test.ts
Normal file
@@ -0,0 +1,56 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import { expect, test } from '@playwright/test'
|
||||
import { signUpWithEmailAndPassword, verifyEmail } from '../utils'
|
||||
|
||||
test('should be able to change email', async ({ page }) => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const newPage = await verifyEmail({ page, email, context: page.context() })
|
||||
await newPage.getByRole('button', { name: /profile/i }).click()
|
||||
|
||||
const newEmail = faker.internet.email()
|
||||
|
||||
await newPage.getByPlaceholder(/new email/i).fill(newEmail)
|
||||
await newPage.locator('h1:has-text("Change email") + div button:has-text("Change")').click()
|
||||
|
||||
await expect(
|
||||
newPage.getByText(/please check your inbox and follow the link to confirm the email change/i)
|
||||
).toBeVisible()
|
||||
|
||||
await newPage.getByRole('button', { name: /sign out/i }).click()
|
||||
|
||||
const updatedEmailPage = await verifyEmail({
|
||||
page: newPage,
|
||||
email: newEmail,
|
||||
context: page.context(),
|
||||
linkText: /change email/i
|
||||
})
|
||||
|
||||
await expect(updatedEmailPage.getByText(/profile page/i)).toBeVisible()
|
||||
})
|
||||
|
||||
test('should not accept an invalid email', async ({ page }) => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const newPage = await verifyEmail({ page, email, context: page.context() })
|
||||
await newPage.getByRole('button', { name: /profile/i }).click()
|
||||
|
||||
const newEmail = faker.random.alphaNumeric()
|
||||
|
||||
await newPage.getByPlaceholder(/new email/i).fill(newEmail)
|
||||
await newPage.locator('h1:has-text("Change email") + div button:has-text("Change")').click()
|
||||
|
||||
await expect(newPage.getByText(/email is incorrectly formatted/i)).toBeVisible()
|
||||
})
|
||||
@@ -0,0 +1,47 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import { expect, test } from '@playwright/test'
|
||||
import { signInWithEmailAndPassword, signUpWithEmailAndPassword, verifyEmail } from '../utils'
|
||||
|
||||
test('should be able to change password', async ({ page }) => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const newPage = await verifyEmail({ page, email, context: page.context() })
|
||||
await newPage.getByRole('button', { name: /profile/i }).click()
|
||||
|
||||
const newPassword = faker.internet.password()
|
||||
|
||||
await newPage.getByPlaceholder(/new password/i).fill(newPassword)
|
||||
await newPage.locator('h1:has-text("Change password") + div button:has-text("Change")').click()
|
||||
await expect(newPage.getByText(/password changed successfully/i)).toBeVisible()
|
||||
|
||||
await newPage.getByRole('button', { name: /sign out/i }).click()
|
||||
|
||||
await signInWithEmailAndPassword({ page: newPage, email, password: newPassword })
|
||||
await expect(newPage.getByText(/you are authenticated/i)).toBeVisible()
|
||||
})
|
||||
|
||||
test('should not accept an invalid email', async ({ page }) => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const newPage = await verifyEmail({ page, email, context: page.context() })
|
||||
await newPage.getByRole('button', { name: /profile/i }).click()
|
||||
|
||||
const newPassword = faker.internet.password(2)
|
||||
|
||||
await newPage.getByPlaceholder(/new password/i).fill(newPassword)
|
||||
await newPage.locator('h1:has-text("Change password") + div button:has-text("Change")').click()
|
||||
|
||||
await expect(newPage.getByText(/password is incorrectly formatted/i)).toBeVisible()
|
||||
})
|
||||
97
examples/react-apollo/e2e/authenticated/file-upload.test.ts
Normal file
97
examples/react-apollo/e2e/authenticated/file-upload.test.ts
Normal file
@@ -0,0 +1,97 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import { expect, test } from '@playwright/test'
|
||||
import { signUpWithEmailAndPassword, verifyEmail } from '../utils'
|
||||
|
||||
test('should upload a single file', async ({ page }) => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const newPage = await verifyEmail({ page, email, context: page.context() })
|
||||
await newPage.getByRole('button', { name: /storage/i }).click()
|
||||
|
||||
await newPage
|
||||
.getByRole('button', { name: /drag a file here or click to select/i })
|
||||
.locator('input[type=file]')
|
||||
.setInputFiles({
|
||||
buffer: Buffer.from('file contents', 'utf-8'),
|
||||
name: 'file.txt',
|
||||
mimeType: 'text/plain'
|
||||
})
|
||||
|
||||
await expect(newPage.getByText(/successfully uploaded/i)).toBeVisible()
|
||||
})
|
||||
|
||||
test('should upload two files using the same single file uploader', async ({ page }) => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const newPage = await verifyEmail({ page, email, context: page.context() })
|
||||
await newPage.getByRole('button', { name: /storage/i }).click()
|
||||
|
||||
await newPage
|
||||
.getByRole('button', { name: /drag a file here or click to select/i })
|
||||
.locator('input[type=file]')
|
||||
.setInputFiles({
|
||||
buffer: Buffer.from('file contents 1', 'utf-8'),
|
||||
name: 'file1.txt',
|
||||
mimeType: 'text/plain'
|
||||
})
|
||||
|
||||
await expect(newPage.getByText(/successfully uploaded/i)).toBeVisible()
|
||||
|
||||
await newPage
|
||||
.getByRole('button', { name: /successfully uploaded/i })
|
||||
.locator('input[type=file]')
|
||||
.setInputFiles({
|
||||
buffer: Buffer.from('file contents 2', 'utf-8'),
|
||||
name: 'file2.txt',
|
||||
mimeType: 'text/plain'
|
||||
})
|
||||
|
||||
await expect(newPage.getByText(/successfully uploaded/i)).toBeVisible()
|
||||
})
|
||||
|
||||
test('should upload multiple files at once', async ({ page }) => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const newPage = await verifyEmail({ page, email, context: page.context() })
|
||||
await newPage.getByRole('button', { name: /storage/i }).click()
|
||||
|
||||
await newPage
|
||||
.getByRole('button', { name: /drag files here or click to select/i })
|
||||
.locator('input[type=file]')
|
||||
.setInputFiles([
|
||||
{
|
||||
buffer: Buffer.from('file contents 1', 'utf-8'),
|
||||
name: 'file1.txt',
|
||||
mimeType: 'text/plain'
|
||||
},
|
||||
{
|
||||
buffer: Buffer.from('file contents 2', 'utf-8'),
|
||||
name: 'file2.txt',
|
||||
mimeType: 'text/plain'
|
||||
}
|
||||
])
|
||||
|
||||
await expect(newPage.getByRole('row').nth(0)).toHaveText('file1.txt')
|
||||
await expect(newPage.getByRole('row').nth(1)).toHaveText('file2.txt')
|
||||
await newPage.getByRole('button', { name: /upload/i }).click()
|
||||
|
||||
await expect(newPage.getByText(/successfully uploaded/i)).toBeVisible()
|
||||
})
|
||||
3
examples/react-apollo/e2e/config.ts
Normal file
3
examples/react-apollo/e2e/config.ts
Normal file
@@ -0,0 +1,3 @@
|
||||
export const baseURL = 'http://localhost:3000'
|
||||
export const mailhogURL = 'http://localhost:8025'
|
||||
export const authBackendURL = 'https://local.auth.nhost.run'
|
||||
72
examples/react-apollo/e2e/sign-in/auto-sign-in.test.ts
Normal file
72
examples/react-apollo/e2e/sign-in/auto-sign-in.test.ts
Normal file
@@ -0,0 +1,72 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import { expect, test } from '@playwright/test'
|
||||
import { authBackendURL, baseURL } from '../config'
|
||||
import {
|
||||
clearStorage,
|
||||
getValueFromLocalStorage,
|
||||
signUpWithEmailAndPassword,
|
||||
verifyEmail
|
||||
} from '../utils'
|
||||
|
||||
test('should sign in automatically with a refresh token', async ({ page }) => {
|
||||
await page.goto('/')
|
||||
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const newPage = await verifyEmail({ page, email, context: page.context() })
|
||||
|
||||
await expect(newPage.getByText(/you are authenticated/i)).toBeVisible()
|
||||
|
||||
const refreshToken = await getValueFromLocalStorage({
|
||||
page: newPage,
|
||||
origin: baseURL,
|
||||
key: 'nhostRefreshToken'
|
||||
})
|
||||
|
||||
// Clear storage and reload the page
|
||||
await clearStorage({ page: newPage })
|
||||
await newPage.reload()
|
||||
|
||||
await expect(newPage.getByText(/sign in to the application/i)).toBeVisible()
|
||||
|
||||
// User should be signed in automatically
|
||||
await newPage.goto(`${baseURL}/profile#refreshToken=${refreshToken}`)
|
||||
await expect(newPage.getByText(/profile page/i)).toBeVisible()
|
||||
})
|
||||
|
||||
test('should fail automatic sign-in when network is not available', async ({ page }) => {
|
||||
await page.goto('/')
|
||||
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const newPage = await verifyEmail({ page, email, context: page.context() })
|
||||
|
||||
await expect(newPage.getByText(/you are authenticated/i)).toBeVisible()
|
||||
|
||||
const refreshToken = await getValueFromLocalStorage({
|
||||
page: newPage,
|
||||
origin: baseURL,
|
||||
key: 'nhostRefreshToken'
|
||||
})
|
||||
|
||||
// Clear storage and reload the page
|
||||
await clearStorage({ page: newPage })
|
||||
await newPage.reload()
|
||||
|
||||
await expect(newPage.getByText(/sign in to the application/i)).toBeVisible()
|
||||
await newPage.route(`${authBackendURL}/**`, (route) => route.abort('internetdisconnected'))
|
||||
|
||||
// User should be signed in automatically
|
||||
await newPage.goto(`${baseURL}/profile#refreshToken=${refreshToken}`)
|
||||
await expect(
|
||||
newPage.getByText(/could not sign in automatically. retrying to get user information/i)
|
||||
).toBeVisible()
|
||||
})
|
||||
84
examples/react-apollo/e2e/sign-in/email-password.test.ts
Normal file
84
examples/react-apollo/e2e/sign-in/email-password.test.ts
Normal file
@@ -0,0 +1,84 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import type { Page } from '@playwright/test'
|
||||
import { expect, test } from '@playwright/test'
|
||||
import totp from 'totp-generator'
|
||||
import { baseURL } from '../config'
|
||||
import {
|
||||
decodeQRCode,
|
||||
signInWithEmailAndPassword,
|
||||
signUpWithEmailAndPassword,
|
||||
verifyEmail
|
||||
} from '../utils'
|
||||
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
let page: Page
|
||||
|
||||
test.describe.configure({ mode: 'serial' })
|
||||
|
||||
test.beforeAll(async ({ browser }) => {
|
||||
page = await browser.newPage()
|
||||
|
||||
await page.goto('/')
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const newPage = await verifyEmail({ page, email, context: page.context() })
|
||||
await expect(newPage.getByText(/you are authenticated/i)).toBeVisible()
|
||||
await newPage.getByRole('button', { name: /sign out/i }).click()
|
||||
|
||||
page = newPage
|
||||
})
|
||||
|
||||
test.afterEach(async () => {
|
||||
await page.getByRole('button', { name: /sign out/i }).click()
|
||||
})
|
||||
|
||||
test.afterAll(() => {
|
||||
page.close()
|
||||
})
|
||||
|
||||
test('should sign in with email and password', async () => {
|
||||
await page.goto('/')
|
||||
|
||||
await signInWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/you are authenticated/i)).toBeVisible()
|
||||
})
|
||||
|
||||
// TODO: Create email verification test
|
||||
|
||||
test('should activate and sign in with MFA', async () => {
|
||||
await page.goto('/')
|
||||
|
||||
await signInWithEmailAndPassword({ page, email, password })
|
||||
await page.waitForURL(baseURL)
|
||||
await page.getByRole('button', { name: /profile/i }).click()
|
||||
await page.getByRole('button', { name: /generate/i }).click()
|
||||
|
||||
const image = page.getByAltText(/qrcode/i)
|
||||
const src = await image.getAttribute('src')
|
||||
|
||||
const { secret, algorithm, digits, period } = decodeQRCode(src)
|
||||
|
||||
const code = totp(secret, {
|
||||
algorithm: algorithm.replace('SHA1', 'SHA-1'),
|
||||
digits: parseInt(digits),
|
||||
period: parseInt(period)
|
||||
})
|
||||
|
||||
await page.getByPlaceholder(/enter activation code/i).fill(code)
|
||||
await page.getByRole('button', { name: /activate/i }).click()
|
||||
await expect(page.getByText(/mfa has been activated/i)).toBeVisible()
|
||||
await page.getByRole('button', { name: /sign out/i }).click()
|
||||
|
||||
await page.getByRole('button', { name: /continue with email \+ password/i }).click()
|
||||
await signInWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/send 2-step verification code/i)).toBeVisible()
|
||||
|
||||
const newCode = totp(secret, { timestamp: Date.now() })
|
||||
|
||||
await page.getByPlaceholder(/one-time password/i).fill(newCode)
|
||||
await page.getByRole('button', { name: /send 2-step verification code/i }).click()
|
||||
await expect(page.getByText(/you are authenticated/i)).toBeVisible()
|
||||
})
|
||||
53
examples/react-apollo/e2e/sign-up/anonymous.test.ts
Normal file
53
examples/react-apollo/e2e/sign-up/anonymous.test.ts
Normal file
@@ -0,0 +1,53 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import { expect, test } from '@playwright/test'
|
||||
import {
|
||||
getUserData,
|
||||
signInAnonymously,
|
||||
signUpWithEmailAndPassword,
|
||||
signUpWithEmailPasswordless,
|
||||
verifyEmail,
|
||||
verifyMagicLink
|
||||
} from '../utils'
|
||||
|
||||
test('should deanonymize with email and password', async ({ page, context }) => {
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password(8)
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signInAnonymously({ page })
|
||||
await page.getByRole('button', { name: /profile/i }).click()
|
||||
|
||||
const userData = await getUserData(page)
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const authenticatedPage = await verifyEmail({ page, context, email })
|
||||
await authenticatedPage.getByRole('button', { name: /profile/i }).click()
|
||||
|
||||
const updatedUserData = await getUserData(authenticatedPage)
|
||||
expect(updatedUserData.id).toBe(userData.id)
|
||||
expect(updatedUserData.email).toBe(email)
|
||||
})
|
||||
|
||||
test('should deanonymize with a magic link', async ({ page, context }) => {
|
||||
const email = faker.internet.email()
|
||||
|
||||
await page.goto('/')
|
||||
|
||||
await signInAnonymously({ page })
|
||||
await page.getByRole('button', { name: /profile/i }).click()
|
||||
|
||||
const userData = await getUserData(page)
|
||||
|
||||
await signUpWithEmailPasswordless({ page, email })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const authenticatedPage = await verifyMagicLink({ page, context, email })
|
||||
await authenticatedPage.getByRole('button', { name: /profile/i }).click()
|
||||
|
||||
const updatedUserData = await getUserData(authenticatedPage)
|
||||
expect(updatedUserData.id).toBe(userData.id)
|
||||
expect(updatedUserData.email).toBe(email)
|
||||
})
|
||||
44
examples/react-apollo/e2e/sign-up/email-password.test.ts
Normal file
44
examples/react-apollo/e2e/sign-up/email-password.test.ts
Normal file
@@ -0,0 +1,44 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import { expect, test } from '@playwright/test'
|
||||
import { signUpWithEmailAndPassword, verifyEmail } from '../utils'
|
||||
|
||||
test('should sign up with email and password', async ({ page, context }) => {
|
||||
page.goto('/')
|
||||
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const authenticatedPage = await verifyEmail({ page, context, email })
|
||||
await expect(authenticatedPage.getByText(/you are authenticated/i)).toBeVisible()
|
||||
})
|
||||
|
||||
test('should raise an error when trying to sign up with an existing email', async ({ page }) => {
|
||||
page.goto('/')
|
||||
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
// close modal
|
||||
await page.getByRole('dialog').getByRole('button').click()
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/email already in use/i)).toBeVisible()
|
||||
})
|
||||
|
||||
test('should fail when network is not available', async ({ page }) => {
|
||||
await page.goto('/')
|
||||
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password()
|
||||
|
||||
await page.route('**', (route) => route.abort('internetdisconnected'))
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
|
||||
await expect(page.getByText(/network error/i)).toBeVisible()
|
||||
})
|
||||
27
examples/react-apollo/e2e/sign-up/email-passwordless.test.ts
Normal file
27
examples/react-apollo/e2e/sign-up/email-passwordless.test.ts
Normal file
@@ -0,0 +1,27 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import { expect, test } from '@playwright/test'
|
||||
import { signUpWithEmailPasswordless, verifyMagicLink } from '../utils'
|
||||
|
||||
test('should sign up with a magic link', async ({ page, context }) => {
|
||||
page.goto('/')
|
||||
|
||||
const email = faker.internet.email()
|
||||
|
||||
await signUpWithEmailPasswordless({ page, email })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
const authenticatedPage = await verifyMagicLink({ page, context, email })
|
||||
await authenticatedPage.getByRole('button', { name: /home/i }).click()
|
||||
await expect(authenticatedPage.getByText(/you are authenticated/i)).toBeVisible()
|
||||
})
|
||||
|
||||
test('should fail when network is not available', async ({ page }) => {
|
||||
await page.goto('/')
|
||||
|
||||
const email = faker.internet.email()
|
||||
|
||||
await page.route('**', (route) => route.abort('internetdisconnected'))
|
||||
await signUpWithEmailPasswordless({ page, email })
|
||||
|
||||
await expect(page.getByText(/network error/i)).toBeVisible()
|
||||
})
|
||||
@@ -0,0 +1,14 @@
|
||||
import { expect, test } from '@playwright/test'
|
||||
import { baseURL } from '../config'
|
||||
|
||||
test('should redirect to /sign-in when not authenticated', async ({ page }) => {
|
||||
await page.goto(`${baseURL}`)
|
||||
await page.waitForURL(`${baseURL}/sign-in`)
|
||||
|
||||
await expect(page.getByText(/sign in to the application/i)).toBeVisible()
|
||||
|
||||
await page.goto(`${baseURL}/apollo`)
|
||||
await page.waitForURL(`${baseURL}/sign-in`)
|
||||
|
||||
await expect(page.getByText(/sign in to the application/i)).toBeVisible()
|
||||
})
|
||||
@@ -0,0 +1,28 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import { expect, test } from '@playwright/test'
|
||||
import { baseURL } from '../config'
|
||||
import { resetPassword, signUpWithEmailAndPassword } from '../utils'
|
||||
|
||||
test('should reset password', async ({ page, context }) => {
|
||||
await page.goto('/')
|
||||
|
||||
const email = faker.internet.email()
|
||||
const password = faker.internet.password(8)
|
||||
|
||||
await signUpWithEmailAndPassword({ page, email, password })
|
||||
await expect(page.getByText(/verification email sent/i)).toBeVisible()
|
||||
|
||||
await page.goto(`${baseURL}/sign-in`)
|
||||
await page.getByRole('button', { name: /continue with email \+ password/i }).click()
|
||||
await page.getByRole('button', { name: /forgot password?/i }).click()
|
||||
|
||||
await page.getByPlaceholder('Email Address').type(email)
|
||||
await page.getByRole('button', { name: /reset your password/i }).click()
|
||||
|
||||
const authenticatedPage = await resetPassword({ page, context, email })
|
||||
|
||||
await authenticatedPage.waitForLoadState()
|
||||
await authenticatedPage.getByRole('button', { name: /profile/i }).click()
|
||||
|
||||
await expect(authenticatedPage.getByText(/profile page/i)).toBeVisible()
|
||||
})
|
||||
265
examples/react-apollo/e2e/utils.ts
Normal file
265
examples/react-apollo/e2e/utils.ts
Normal file
@@ -0,0 +1,265 @@
|
||||
import { faker } from '@faker-js/faker'
|
||||
import type { User } from '@nhost/react'
|
||||
import type { BrowserContext, Page } from '@playwright/test'
|
||||
import jsQR from 'jsqr'
|
||||
import { PNG } from 'pngjs'
|
||||
import { baseURL, mailhogURL } from './config'
|
||||
|
||||
/**
|
||||
* Returns the user data from the profile page.
|
||||
*
|
||||
* @param page - The page to get the user data from.
|
||||
* @returns The user data.
|
||||
*/
|
||||
export async function getUserData(page: Page) {
|
||||
const textContent = await page.locator('h1:has-text("User information") + div pre').textContent()
|
||||
const userData = textContent ? JSON.parse(textContent) : {}
|
||||
|
||||
return userData as User
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a promise that resolves when the sign up flow is completed.
|
||||
*
|
||||
* @param page - The page to sign up with.
|
||||
* @param email - The email address to sign up with.
|
||||
* @param password - The password to sign up with.
|
||||
*/
|
||||
export async function signUpWithEmailAndPassword({
|
||||
page,
|
||||
email,
|
||||
password
|
||||
}: {
|
||||
page: Page
|
||||
email: string
|
||||
password: string
|
||||
}) {
|
||||
await page.getByRole('button', { name: /home/i }).click()
|
||||
await page.getByRole('link', { name: /sign up/i }).click()
|
||||
await page.getByRole('button', { name: /continue with email \+ password/i }).click()
|
||||
await page.getByPlaceholder(/first name/i).type(faker.name.firstName())
|
||||
await page.getByPlaceholder(/last name/i).type(faker.name.lastName())
|
||||
await page.getByPlaceholder(/email address/i).type(email)
|
||||
await page.getByPlaceholder(/^password$/i).type(password)
|
||||
await page.getByPlaceholder(/confirm password/i).type(password)
|
||||
await page.getByRole('button', { name: /continue with email \+ password/i }).click()
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a promise that resolves when the sign in flow is completed.
|
||||
*
|
||||
* @param page - The page to sign in with.
|
||||
* @param email - The email address to sign in with.
|
||||
* @param password - The password to sign in with.
|
||||
*/
|
||||
export async function signInWithEmailAndPassword({
|
||||
page,
|
||||
email,
|
||||
password
|
||||
}: {
|
||||
page: Page
|
||||
email: string
|
||||
password: string
|
||||
}) {
|
||||
await page.getByRole('button', { name: /home/i }).click()
|
||||
await page.getByRole('button', { name: /continue with email \+ password/i }).click()
|
||||
await page.getByPlaceholder(/email address/i).type(email)
|
||||
await page.getByPlaceholder(/password/i).type(password)
|
||||
await page.getByRole('button', { name: /sign in/i }).click()
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a promise that resolves when the sign in flow is completed.
|
||||
*
|
||||
* @param page - The page to sign in with.
|
||||
*/
|
||||
export async function signInAnonymously({ page }: { page: Page }) {
|
||||
await page.getByRole('button', { name: /home/i }).click()
|
||||
await page.getByRole('link', { name: /sign in anonymously/i }).click()
|
||||
await page.waitForURL(baseURL)
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a promise that resolves when the sign up flow is completed.
|
||||
*
|
||||
* @param page - The page to sign up with.
|
||||
* @param email - The email address to sign up with.
|
||||
*/
|
||||
export async function signUpWithEmailPasswordless({ page, email }: { page: Page; email: string }) {
|
||||
await page.getByRole('button', { name: /home/i }).click()
|
||||
await page.getByRole('link', { name: /sign up/i }).click()
|
||||
await page.getByRole('button', { name: /continue with a magic link/i }).click()
|
||||
await page.getByPlaceholder(/email address/i).fill(email)
|
||||
await page.getByRole('button', { name: /continue with email/i }).click()
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a promise that resolves to a new page that is opened after clicking
|
||||
* the magic link in the email.
|
||||
*
|
||||
* @param email - The email address to reset the password for.
|
||||
* @param page - The page to click the magic link in.
|
||||
* @param context - The browser context.
|
||||
* @returns A promise that resolves to a new page.
|
||||
*/
|
||||
export async function verifyMagicLink({
|
||||
email,
|
||||
page,
|
||||
context
|
||||
}: {
|
||||
email: string
|
||||
page: Page
|
||||
context: BrowserContext
|
||||
}) {
|
||||
await page.goto(mailhogURL)
|
||||
await page.locator('.messages > .msglist-message', { hasText: email }).nth(0).click()
|
||||
|
||||
// Based on: https://playwright.dev/docs/pages#handling-new-pages
|
||||
const authenticatedPagePromise = context.waitForEvent('page')
|
||||
|
||||
await page
|
||||
.frameLocator('#preview-html')
|
||||
.getByRole('link', { name: /sign in/i })
|
||||
.click()
|
||||
|
||||
const authenticatedPage = await authenticatedPagePromise
|
||||
await authenticatedPage.waitForLoadState()
|
||||
|
||||
return authenticatedPage
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a promise that resolves to a new page that is opened after clicking
|
||||
* the reset password link in the email.
|
||||
*
|
||||
* @param email - The email address to reset the password for.
|
||||
* @param page - The page to click the reset password link in.
|
||||
* @param context - The browser context.
|
||||
* @returns A promise that resolves to a new page.
|
||||
*/
|
||||
export async function resetPassword({
|
||||
email,
|
||||
page,
|
||||
context
|
||||
}: {
|
||||
email: string
|
||||
page: Page
|
||||
context: BrowserContext
|
||||
}) {
|
||||
await page.goto(mailhogURL)
|
||||
await page.locator('.messages > .msglist-message', { hasText: email }).nth(0).click()
|
||||
|
||||
// Based on: https://playwright.dev/docs/pages#handling-new-pages
|
||||
const authenticatedPagePromise = context.waitForEvent('page')
|
||||
|
||||
await page
|
||||
.frameLocator('#preview-html')
|
||||
.getByRole('link', { name: /reset password/i })
|
||||
.click()
|
||||
|
||||
const authenticatedPage = await authenticatedPagePromise
|
||||
await authenticatedPage.waitForLoadState()
|
||||
|
||||
return authenticatedPage
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a promise that resolves to a new page that is opened after clicking
|
||||
* the verify email link in the email.
|
||||
*
|
||||
* @param email - The email address to verify.
|
||||
* @param page - The page to click the verify email link in.
|
||||
* @param context - The browser context.
|
||||
* @param linkText - The text of the link to click.
|
||||
* @returns A promise that resolves to a new page.
|
||||
*/
|
||||
export async function verifyEmail({
|
||||
email,
|
||||
page,
|
||||
context,
|
||||
linkText = /verify email/i
|
||||
}: {
|
||||
email: string
|
||||
page: Page
|
||||
context: BrowserContext
|
||||
linkText?: string | RegExp
|
||||
}) {
|
||||
await page.goto(mailhogURL)
|
||||
await page.locator('.messages > .msglist-message', { hasText: email }).nth(0).click()
|
||||
|
||||
// Based on: https://playwright.dev/docs/pages#handling-new-pages
|
||||
const authenticatedPagePromise = context.waitForEvent('page')
|
||||
|
||||
await page.frameLocator('#preview-html').getByRole('link', { name: linkText }).click()
|
||||
|
||||
const authenticatedPage = await authenticatedPagePromise
|
||||
await authenticatedPage.waitForLoadState()
|
||||
|
||||
return authenticatedPage
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns decoded data from a QR code.
|
||||
*
|
||||
* @param base64String - The base64 encoded string of the QR code.
|
||||
* @returns The decoded data.
|
||||
*/
|
||||
export function decodeQRCode(base64String?: string | null) {
|
||||
if (!base64String) {
|
||||
return {
|
||||
secret: '',
|
||||
algorithm: '',
|
||||
digits: '',
|
||||
period: ''
|
||||
}
|
||||
}
|
||||
|
||||
const buffer = Buffer.from(base64String.replace('data:image/png;base64,', ''), 'base64')
|
||||
const pngData = PNG.sync.read(buffer)
|
||||
|
||||
const decoded = jsQR(Uint8ClampedArray.from(pngData.data), pngData.width, pngData.height)
|
||||
const params = decoded?.data?.split('?').at(-1)
|
||||
|
||||
// note: we are decoding MFA here
|
||||
const { secret, algorithm, digits, period } = Object.fromEntries(new URLSearchParams(params))
|
||||
|
||||
return { secret, algorithm, digits, period }
|
||||
}
|
||||
|
||||
/**
|
||||
* Clears the local and session storage for a page.
|
||||
*
|
||||
* @param page - The page to clear the storage for.
|
||||
*/
|
||||
export async function clearStorage({ page }: { page: Page }) {
|
||||
await page.evaluate(() => {
|
||||
localStorage.clear()
|
||||
sessionStorage.clear()
|
||||
})
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a promise that resolves to the value of a key in local storage.
|
||||
*
|
||||
* @param page - The page to get the value from.
|
||||
* @param origin - The origin of the local storage.
|
||||
* @param key - The key to get the value for.
|
||||
* @returns The value of the key in local storage.
|
||||
*/
|
||||
export async function getValueFromLocalStorage({
|
||||
page,
|
||||
origin: externalOrigin,
|
||||
key
|
||||
}: {
|
||||
page: Page
|
||||
origin: string
|
||||
key: string
|
||||
}) {
|
||||
const storageState = await page.context().storageState()
|
||||
const localStorage = storageState.origins.find(
|
||||
({ origin }) => origin === externalOrigin
|
||||
)?.localStorage
|
||||
const value = localStorage?.find(({ name }) => name === key)?.value
|
||||
|
||||
return value || null
|
||||
}
|
||||
@@ -1,6 +1,6 @@
|
||||
{
|
||||
"name": "@nhost-examples/react-apollo",
|
||||
"version": "0.1.9",
|
||||
"version": "0.1.10",
|
||||
"private": true,
|
||||
"dependencies": {
|
||||
"@apollo/client": "^3.6.9",
|
||||
@@ -22,11 +22,10 @@
|
||||
"scripts": {
|
||||
"dev": "vite --host localhost --port 3000",
|
||||
"generate": "graphql-codegen --config graphql.config.yaml",
|
||||
"cypress": "cypress open",
|
||||
"e2e": "start-test e2e:backend http-get://localhost:9695 e2e:frontend 3000 e2e:test",
|
||||
"e2e:test": "cypress run",
|
||||
"e2e:backend": "nhost dev --no-browser",
|
||||
"e2e:frontend": "run-s build preview",
|
||||
"e2e": "start-test e2e:start-backend http-get://localhost:9695 e2e:test",
|
||||
"e2e:test": "npx playwright@1.31.2 install --with-deps && playwright test",
|
||||
"e2e:start-backend": "nhost dev --no-browser",
|
||||
"e2e:start-ui": "run-s build preview",
|
||||
"build": "vite build",
|
||||
"preview": "vite preview --host localhost --port 3000",
|
||||
"prettier": "prettier --check .",
|
||||
@@ -52,14 +51,16 @@
|
||||
"@faker-js/faker": "^7.6.0",
|
||||
"@graphql-codegen/cli": "^2.12.0",
|
||||
"@nuintun/qrcode": "^3.3.0",
|
||||
"@testing-library/cypress": "^8.0.3",
|
||||
"@playwright/test": "^1.31.2",
|
||||
"@types/pngjs": "^6.0.1",
|
||||
"@types/react": "^18.0.25",
|
||||
"@types/react-dom": "^18.0.9",
|
||||
"@types/totp-generator": "^0.0.4",
|
||||
"@vitejs/plugin-react": "^3.0.0",
|
||||
"@xstate/inspect": "^0.6.2",
|
||||
"cypress": "^10.7.0",
|
||||
"cypress-mailhog": "^1.6.0",
|
||||
"dotenv": "^16.0.3",
|
||||
"jsqr": "^1.4.0",
|
||||
"pngjs": "^7.0.0",
|
||||
"start-server-and-test": "^1.15.2",
|
||||
"totp-generator": "^0.0.13",
|
||||
"typescript": "^4.8.2",
|
||||
|
||||
32
examples/react-apollo/playwright.config.ts
Normal file
32
examples/react-apollo/playwright.config.ts
Normal file
@@ -0,0 +1,32 @@
|
||||
import { defineConfig, devices } from '@playwright/test'
|
||||
|
||||
import dotenv from 'dotenv'
|
||||
import path from 'path'
|
||||
|
||||
dotenv.config({ path: path.resolve(__dirname, '.env.test') })
|
||||
|
||||
export default defineConfig({
|
||||
testDir: './e2e',
|
||||
timeout: 30 * 1000,
|
||||
expect: {
|
||||
timeout: 5000
|
||||
},
|
||||
webServer: {
|
||||
command: 'pnpm e2e:start-ui',
|
||||
port: 3000
|
||||
},
|
||||
use: {
|
||||
baseURL: 'http://localhost:3000'
|
||||
},
|
||||
fullyParallel: true,
|
||||
forbidOnly: !!process.env.CI,
|
||||
retries: process.env.CI ? 2 : 0,
|
||||
workers: process.env.CI ? 1 : undefined,
|
||||
reporter: 'html',
|
||||
projects: [
|
||||
{
|
||||
name: 'chromium',
|
||||
use: { ...devices['Desktop Chrome'] }
|
||||
}
|
||||
]
|
||||
})
|
||||
@@ -14,7 +14,7 @@ if (devTools) {
|
||||
}
|
||||
|
||||
const nhost = new NhostClient({
|
||||
subdomain: import.meta.env.VITE_NHOST_SUBDOMAIN || 'localhost',
|
||||
subdomain: import.meta.env.VITE_NHOST_SUBDOMAIN || 'local',
|
||||
region: import.meta.env.VITE_NHOST_REGION,
|
||||
devTools
|
||||
})
|
||||
|
||||
@@ -15,8 +15,8 @@
|
||||
"resolveJsonModule": true,
|
||||
"isolatedModules": false,
|
||||
"noEmit": true,
|
||||
"types": ["node", "cypress", "@testing-library/cypress"],
|
||||
"types": ["node"],
|
||||
"jsx": "react-jsx"
|
||||
},
|
||||
"include": ["src", "cypress", "cypress.config.ts"]
|
||||
"include": ["src"]
|
||||
}
|
||||
|
||||
@@ -1,5 +1,24 @@
|
||||
# @nhost/apollo
|
||||
|
||||
## 5.2.0
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- Updated dependencies [a0e093d7]
|
||||
- @nhost/nhost-js@2.2.0
|
||||
|
||||
## 5.1.3
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- @nhost/nhost-js@2.1.2
|
||||
|
||||
## 5.1.2
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- 912ed76c: fix(apollo): retry subscriptions on error
|
||||
|
||||
## 5.1.1
|
||||
|
||||
### Patch Changes
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
{
|
||||
"name": "@nhost/apollo",
|
||||
"version": "5.1.1",
|
||||
"version": "5.2.0",
|
||||
"description": "Nhost Apollo Client library",
|
||||
"license": "MIT",
|
||||
"keywords": [
|
||||
@@ -59,15 +59,15 @@
|
||||
"verify:fix": "run-p prettier:fix lint:fix"
|
||||
},
|
||||
"peerDependencies": {
|
||||
"@nhost/nhost-js": "workspace:*",
|
||||
"@apollo/client": "^3.6.2"
|
||||
"@apollo/client": "^3.7.10",
|
||||
"@nhost/nhost-js": "workspace:*"
|
||||
},
|
||||
"dependencies": {
|
||||
"graphql": "16.6.0",
|
||||
"graphql-ws": "^5.10.1"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@nhost/nhost-js": "workspace:*",
|
||||
"@apollo/client": "^3.7.3"
|
||||
"@apollo/client": "^3.7.10",
|
||||
"@nhost/nhost-js": "workspace:*"
|
||||
}
|
||||
}
|
||||
@@ -1,6 +1,5 @@
|
||||
import {
|
||||
ApolloClient,
|
||||
ApolloClientOptions,
|
||||
createHttpLink,
|
||||
from,
|
||||
InMemoryCache,
|
||||
@@ -38,16 +37,19 @@ export const createApolloClient = ({
|
||||
connectToDevTools = isBrowser && process.env.NODE_ENV === 'development',
|
||||
onError,
|
||||
link: customLink
|
||||
}: NhostApolloClientOptions): ApolloClient<any> => {
|
||||
let backendUrl = graphqlUrl || nhost?.graphql.getUrl()
|
||||
}: NhostApolloClientOptions) => {
|
||||
const backendUrl = graphqlUrl || nhost?.graphql.httpUrl
|
||||
|
||||
if (!backendUrl) {
|
||||
throw Error("Can't initialize the Apollo Client: no backend Url has been provided")
|
||||
}
|
||||
|
||||
const uri = backendUrl
|
||||
const interpreter = nhost?.auth.client.interpreter
|
||||
|
||||
let token: string | null = null
|
||||
|
||||
const getAuthHeaders = () => {
|
||||
function getAuthHeaders() {
|
||||
// add headers
|
||||
const resHeaders = {
|
||||
...headers,
|
||||
@@ -66,33 +68,28 @@ export const createApolloClient = ({
|
||||
return resHeaders
|
||||
}
|
||||
|
||||
const uri = backendUrl
|
||||
|
||||
const wsClient =
|
||||
isBrowser &&
|
||||
createRestartableClient({
|
||||
url: uri.startsWith('https') ? uri.replace(/^https/, 'wss') : uri.replace(/^http/, 'ws'),
|
||||
connectionParams: () => ({
|
||||
headers: {
|
||||
...headers,
|
||||
...getAuthHeaders()
|
||||
}
|
||||
const wsClient = isBrowser
|
||||
? createRestartableClient({
|
||||
url: uri.startsWith('https') ? uri.replace(/^https/, 'wss') : uri.replace(/^http/, 'ws'),
|
||||
shouldRetry: () => true,
|
||||
retryAttempts: 10,
|
||||
connectionParams: () => ({
|
||||
headers: {
|
||||
...headers,
|
||||
...getAuthHeaders()
|
||||
}
|
||||
})
|
||||
})
|
||||
})
|
||||
const wsLink = wsClient && new GraphQLWsLink(wsClient)
|
||||
: null
|
||||
|
||||
const httpLink = setContext((_, { headers }) => {
|
||||
return {
|
||||
headers: {
|
||||
...headers,
|
||||
...getAuthHeaders()
|
||||
}
|
||||
const wsLink = wsClient ? new GraphQLWsLink(wsClient) : null
|
||||
|
||||
const httpLink = setContext((_, { headers }) => ({
|
||||
headers: {
|
||||
...headers,
|
||||
...getAuthHeaders()
|
||||
}
|
||||
}).concat(
|
||||
createHttpLink({
|
||||
uri
|
||||
})
|
||||
)
|
||||
})).concat(createHttpLink({ uri }))
|
||||
|
||||
const link = wsLink
|
||||
? split(
|
||||
@@ -112,7 +109,7 @@ export const createApolloClient = ({
|
||||
)
|
||||
: httpLink
|
||||
|
||||
const apolloClientOptions: ApolloClientOptions<any> = {
|
||||
const client = new ApolloClient({
|
||||
cache: cache || new InMemoryCache(),
|
||||
ssrMode: !isBrowser,
|
||||
defaultOptions: {
|
||||
@@ -120,34 +117,35 @@ export const createApolloClient = ({
|
||||
fetchPolicy
|
||||
}
|
||||
},
|
||||
connectToDevTools
|
||||
}
|
||||
|
||||
// add link
|
||||
if (customLink) {
|
||||
apolloClientOptions.link = from([customLink])
|
||||
} else {
|
||||
apolloClientOptions.link = typeof onError === 'function' ? from([onError, link]) : from([link])
|
||||
}
|
||||
|
||||
const client = new ApolloClient(apolloClientOptions)
|
||||
connectToDevTools,
|
||||
link: customLink
|
||||
? from([customLink])
|
||||
: from(typeof onError === 'function' ? [onError, link] : [link])
|
||||
})
|
||||
|
||||
interpreter?.onTransition(async (state, event) => {
|
||||
if (['SIGNOUT', 'SIGNED_IN', 'TOKEN_CHANGED'].includes(event.type)) {
|
||||
const newToken = state.context.accessToken.value
|
||||
token = newToken
|
||||
if (event.type === 'SIGNOUT') {
|
||||
token = null
|
||||
|
||||
try {
|
||||
await client.resetStore()
|
||||
} catch (error) {
|
||||
console.error('Error resetting Apollo client cache')
|
||||
console.error(error)
|
||||
}
|
||||
} else {
|
||||
if (isBrowser && wsClient && wsClient.started()) {
|
||||
wsClient.restart()
|
||||
}
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
// update token
|
||||
token = state.context.accessToken.value
|
||||
|
||||
if (!isBrowser) {
|
||||
return
|
||||
}
|
||||
|
||||
wsClient?.restart()
|
||||
}
|
||||
})
|
||||
|
||||
|
||||
@@ -3,7 +3,6 @@ import { Client, ClientOptions, createClient } from 'graphql-ws'
|
||||
|
||||
export interface RestartableClient extends Client {
|
||||
restart(): void
|
||||
started(): boolean
|
||||
}
|
||||
|
||||
export function createRestartableClient(options: ClientOptions): RestartableClient {
|
||||
@@ -11,18 +10,41 @@ export function createRestartableClient(options: ClientOptions): RestartableClie
|
||||
let restart = () => {
|
||||
restartRequested = true
|
||||
}
|
||||
let _started = false
|
||||
const started = () => _started
|
||||
let socket: WebSocket
|
||||
let timedOut: NodeJS.Timeout
|
||||
|
||||
const client = createClient({
|
||||
...options,
|
||||
on: {
|
||||
...options.on,
|
||||
connected: () => {
|
||||
_started = true
|
||||
error: (error) => {
|
||||
console.error(error)
|
||||
options.on?.error?.(error)
|
||||
|
||||
restart()
|
||||
},
|
||||
ping: (received) => {
|
||||
if (!received /* sent */) {
|
||||
timedOut = setTimeout(() => {
|
||||
// a close event `4499: Terminated` is issued to the current WebSocket and an
|
||||
// artificial `{ code: 4499, reason: 'Terminated', wasClean: false }` close-event-like
|
||||
// object is immediately emitted without waiting for the one coming from `WebSocket.onclose`
|
||||
//
|
||||
// calling terminate is not considered fatal and a connection retry will occur as expected
|
||||
//
|
||||
// see: https://github.com/enisdenjo/graphql-ws/discussions/290
|
||||
client.terminate()
|
||||
restart()
|
||||
}, 5_000)
|
||||
}
|
||||
},
|
||||
pong: (received) => {
|
||||
if (received) {
|
||||
clearTimeout(timedOut)
|
||||
}
|
||||
},
|
||||
opened: (originalSocket) => {
|
||||
const socket = originalSocket as WebSocket
|
||||
socket = originalSocket as WebSocket
|
||||
options.on?.opened?.(socket)
|
||||
|
||||
restart = () => {
|
||||
@@ -47,7 +69,6 @@ export function createRestartableClient(options: ClientOptions): RestartableClie
|
||||
|
||||
return {
|
||||
...client,
|
||||
restart: () => restart(),
|
||||
started
|
||||
restart: () => restart()
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,5 +1,27 @@
|
||||
# @nhost/react-apollo
|
||||
|
||||
## 5.0.15
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- @nhost/apollo@5.2.0
|
||||
- @nhost/react@2.0.13
|
||||
|
||||
## 5.0.14
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- @nhost/apollo@5.1.3
|
||||
- @nhost/react@2.0.12
|
||||
|
||||
## 5.0.13
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- 912ed76c: fix(apollo): retry subscriptions on error
|
||||
- Updated dependencies [912ed76c]
|
||||
- @nhost/apollo@5.1.2
|
||||
|
||||
## 5.0.12
|
||||
|
||||
### Patch Changes
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
{
|
||||
"name": "@nhost/react-apollo",
|
||||
"version": "5.0.12",
|
||||
"version": "5.0.15",
|
||||
"description": "Nhost React Apollo client",
|
||||
"license": "MIT",
|
||||
"keywords": [
|
||||
@@ -63,14 +63,14 @@
|
||||
"@nhost/apollo": "workspace:*"
|
||||
},
|
||||
"peerDependencies": {
|
||||
"@apollo/client": "^3.6.2",
|
||||
"@apollo/client": "^3.7.10",
|
||||
"@nhost/react": "workspace:*",
|
||||
"graphql": "^16.0.0",
|
||||
"react": "^17.0.0 || ^18.0.0",
|
||||
"react-dom": "^17.0.0 || ^18.0.0"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@apollo/client": "^3.7.1",
|
||||
"@apollo/client": "^3.7.10",
|
||||
"@nhost/react": "workspace:*",
|
||||
"@types/react": "^18.0.25",
|
||||
"graphql": "16.6.0",
|
||||
|
||||
@@ -9,7 +9,10 @@ import {
|
||||
} from '@apollo/client'
|
||||
import { useAuthenticated } from '@nhost/react'
|
||||
|
||||
export function useAuthQuery<TData = any, TVariables = OperationVariables>(
|
||||
export function useAuthQuery<
|
||||
TData = any,
|
||||
TVariables extends OperationVariables = OperationVariables
|
||||
>(
|
||||
query: DocumentNode | TypedDocumentNode<TData, TVariables>,
|
||||
options?: QueryHookOptions<TData, TVariables>
|
||||
) {
|
||||
@@ -18,7 +21,10 @@ export function useAuthQuery<TData = any, TVariables = OperationVariables>(
|
||||
return useQuery(query, newOptions)
|
||||
}
|
||||
|
||||
export function useAuthSubscription<TData = any, TVariables = OperationVariables>(
|
||||
export function useAuthSubscription<
|
||||
TData = any,
|
||||
TVariables extends OperationVariables = OperationVariables
|
||||
>(
|
||||
subscription: DocumentNode | TypedDocumentNode<TData, TVariables>,
|
||||
options?: SubscriptionHookOptions<TData, TVariables>
|
||||
) {
|
||||
|
||||
@@ -22,9 +22,7 @@ export const NhostApolloProvider: React.FC<PropsWithChildren<NhostApolloClientOp
|
||||
if (!client) {
|
||||
setClient(createApolloClient(options))
|
||||
}
|
||||
|
||||
// eslint-disable-next-line react-hooks/exhaustive-deps
|
||||
}, [])
|
||||
}, [client, options])
|
||||
|
||||
return <ApolloProvider client={client || mockApolloClient}>{children}</ApolloProvider>
|
||||
}
|
||||
|
||||
@@ -1,5 +1,17 @@
|
||||
# @nhost/react-urql
|
||||
|
||||
## 2.0.13
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- @nhost/react@2.0.13
|
||||
|
||||
## 2.0.12
|
||||
|
||||
### Patch Changes
|
||||
|
||||
- @nhost/react@2.0.12
|
||||
|
||||
## 2.0.11
|
||||
|
||||
### Patch Changes
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
{
|
||||
"name": "@nhost/react-urql",
|
||||
"version": "2.0.11",
|
||||
"version": "2.0.13",
|
||||
"description": "Nhost React URQL client",
|
||||
"license": "MIT",
|
||||
"keywords": [
|
||||
|
||||
@@ -65,7 +65,6 @@
|
||||
"@vitest/coverage-c8": "^0.29.0",
|
||||
"eslint": "^8.26.0",
|
||||
"eslint-config-react-app": "^7.0.1",
|
||||
"eslint-plugin-cypress": "^2.12.1",
|
||||
"eslint-plugin-flowtype": "^8.0.3",
|
||||
"eslint-plugin-import": "^2.26.0",
|
||||
"eslint-plugin-jsx-a11y": "^6.6.1",
|
||||
@@ -77,7 +76,7 @@
|
||||
"husky": "^8.0.1",
|
||||
"npm-run-all": "^4.1.5",
|
||||
"prettier": "^2.7.1",
|
||||
"turbo": "1.8.3",
|
||||
"turbo": "1.8.6",
|
||||
"typedoc": "^0.22.18",
|
||||
"typescript": "4.9.5",
|
||||
"vite": "^4.0.2",
|
||||
|
||||
@@ -1,5 +1,11 @@
|
||||
# @nhost/hasura-auth-js
|
||||
|
||||
## 2.1.0
|
||||
|
||||
### Minor Changes
|
||||
|
||||
- a0e093d7: fix(exports): don't use conflicting names in exports
|
||||
|
||||
## 2.0.2
|
||||
|
||||
### Patch Changes
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
{
|
||||
"name": "@nhost/hasura-auth-js",
|
||||
"version": "2.0.2",
|
||||
"version": "2.1.0",
|
||||
"description": "Hasura-auth client",
|
||||
"license": "MIT",
|
||||
"keywords": [
|
||||
@@ -43,7 +43,8 @@
|
||||
},
|
||||
"scripts": {
|
||||
"dev": "vite build --config ./vite.dev.config.js",
|
||||
"build": "run-p build:lib build:umd",
|
||||
"build": "run-p typecheck build:lib build:umd",
|
||||
"typecheck": "tsc --noEmit",
|
||||
"build:lib": "vite build",
|
||||
"build:umd": "vite build --config ../../config/vite.lib.umd.config.js",
|
||||
"test": "vitest run",
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
import { ErrorPayload } from './types'
|
||||
import { AuthErrorPayload } from './types'
|
||||
|
||||
export const NETWORK_ERROR_CODE = 0
|
||||
export const OTHER_ERROR_CODE = 1
|
||||
@@ -12,8 +12,8 @@ export const STATE_ERROR_CODE = 20
|
||||
* See https://github.com/statelyai/xstate/issues/3037
|
||||
*/
|
||||
export class CodifiedError extends Error {
|
||||
error: ErrorPayload
|
||||
constructor(original: Error | ErrorPayload) {
|
||||
error: AuthErrorPayload
|
||||
constructor(original: Error | AuthErrorPayload) {
|
||||
super(original.message)
|
||||
Error.captureStackTrace(this, this.constructor)
|
||||
if (original instanceof Error) {
|
||||
@@ -30,95 +30,95 @@ export class CodifiedError extends Error {
|
||||
}
|
||||
}
|
||||
|
||||
export type ValidationErrorPayload = ErrorPayload & { status: typeof VALIDATION_ERROR_CODE }
|
||||
export type ValidationAuthErrorPayload = AuthErrorPayload & { status: typeof VALIDATION_ERROR_CODE }
|
||||
|
||||
// TODO share with hasura-auth
|
||||
export const INVALID_EMAIL_ERROR: ValidationErrorPayload = {
|
||||
export const INVALID_EMAIL_ERROR: ValidationAuthErrorPayload = {
|
||||
status: VALIDATION_ERROR_CODE,
|
||||
error: 'invalid-email',
|
||||
message: 'Email is incorrectly formatted'
|
||||
}
|
||||
|
||||
export const INVALID_MFA_TYPE_ERROR: ValidationErrorPayload = {
|
||||
export const INVALID_MFA_TYPE_ERROR: ValidationAuthErrorPayload = {
|
||||
status: VALIDATION_ERROR_CODE,
|
||||
error: 'invalid-mfa-type',
|
||||
message: 'MFA type is invalid'
|
||||
}
|
||||
|
||||
export const INVALID_MFA_CODE_ERROR: ValidationErrorPayload = {
|
||||
export const INVALID_MFA_CODE_ERROR: ValidationAuthErrorPayload = {
|
||||
status: VALIDATION_ERROR_CODE,
|
||||
error: 'invalid-mfa-code',
|
||||
message: 'MFA code is invalid'
|
||||
}
|
||||
|
||||
export const INVALID_PASSWORD_ERROR: ValidationErrorPayload = {
|
||||
export const INVALID_PASSWORD_ERROR: ValidationAuthErrorPayload = {
|
||||
status: VALIDATION_ERROR_CODE,
|
||||
error: 'invalid-password',
|
||||
message: 'Password is incorrectly formatted'
|
||||
}
|
||||
|
||||
export const INVALID_PHONE_NUMBER_ERROR: ValidationErrorPayload = {
|
||||
export const INVALID_PHONE_NUMBER_ERROR: ValidationAuthErrorPayload = {
|
||||
status: VALIDATION_ERROR_CODE,
|
||||
error: 'invalid-phone-number',
|
||||
message: 'Phone number is incorrectly formatted'
|
||||
}
|
||||
|
||||
export const INVALID_MFA_TICKET_ERROR: ValidationErrorPayload = {
|
||||
export const INVALID_MFA_TICKET_ERROR: ValidationAuthErrorPayload = {
|
||||
status: VALIDATION_ERROR_CODE,
|
||||
error: 'invalid-mfa-ticket',
|
||||
message: 'MFA ticket is invalid'
|
||||
}
|
||||
|
||||
export const NO_MFA_TICKET_ERROR: ValidationErrorPayload = {
|
||||
export const NO_MFA_TICKET_ERROR: ValidationAuthErrorPayload = {
|
||||
status: VALIDATION_ERROR_CODE,
|
||||
error: 'no-mfa-ticket',
|
||||
message: 'No MFA ticket has been provided'
|
||||
}
|
||||
|
||||
export const NO_REFRESH_TOKEN: ValidationErrorPayload = {
|
||||
export const NO_REFRESH_TOKEN: ValidationAuthErrorPayload = {
|
||||
status: VALIDATION_ERROR_CODE,
|
||||
error: 'no-refresh-token',
|
||||
message: 'No refresh token has been provided'
|
||||
}
|
||||
|
||||
export const TOKEN_REFRESHER_RUNNING_ERROR: ErrorPayload = {
|
||||
export const TOKEN_REFRESHER_RUNNING_ERROR: AuthErrorPayload = {
|
||||
status: STATE_ERROR_CODE,
|
||||
error: 'refresher-already-running',
|
||||
message:
|
||||
'The token refresher is already running. You must wait until is has finished before submitting a new token.'
|
||||
}
|
||||
|
||||
export const USER_ALREADY_SIGNED_IN: ErrorPayload = {
|
||||
export const USER_ALREADY_SIGNED_IN: AuthErrorPayload = {
|
||||
status: STATE_ERROR_CODE,
|
||||
error: 'already-signed-in',
|
||||
message: 'User is already signed in'
|
||||
}
|
||||
|
||||
export const USER_UNAUTHENTICATED: ErrorPayload = {
|
||||
export const USER_UNAUTHENTICATED: AuthErrorPayload = {
|
||||
status: STATE_ERROR_CODE,
|
||||
error: 'unauthenticated-user',
|
||||
message: 'User is not authenticated'
|
||||
}
|
||||
|
||||
export const USER_NOT_ANONYMOUS: ErrorPayload = {
|
||||
export const USER_NOT_ANONYMOUS: AuthErrorPayload = {
|
||||
status: STATE_ERROR_CODE,
|
||||
error: 'user-not-anonymous',
|
||||
message: 'User is not anonymous'
|
||||
}
|
||||
|
||||
export const EMAIL_NEEDS_VERIFICATION: ErrorPayload = {
|
||||
export const EMAIL_NEEDS_VERIFICATION: AuthErrorPayload = {
|
||||
status: STATE_ERROR_CODE,
|
||||
error: 'unverified-user',
|
||||
message: 'Email needs verification'
|
||||
}
|
||||
|
||||
export const INVALID_REFRESH_TOKEN = {
|
||||
export const INVALID_REFRESH_TOKEN: AuthErrorPayload = {
|
||||
status: VALIDATION_ERROR_CODE,
|
||||
error: 'invalid-refresh-token',
|
||||
message: 'Invalid or expired refresh token'
|
||||
}
|
||||
|
||||
export const INVALID_SIGN_IN_METHOD = {
|
||||
export const INVALID_SIGN_IN_METHOD: AuthErrorPayload = {
|
||||
status: OTHER_ERROR_CODE,
|
||||
error: 'invalid-sign-in-method',
|
||||
message: 'Invalid sign-in method'
|
||||
|
||||
@@ -34,13 +34,13 @@ import {
|
||||
} from './promises'
|
||||
import {
|
||||
AuthChangedFunction,
|
||||
AuthErrorPayload,
|
||||
ChangeEmailParams,
|
||||
ChangeEmailResponse,
|
||||
ChangePasswordParams,
|
||||
ChangePasswordResponse,
|
||||
DeanonymizeParams,
|
||||
DeanonymizeResponse,
|
||||
ErrorPayload,
|
||||
JWTClaims,
|
||||
JWTHasuraClaims,
|
||||
NhostAuthConstructorParams,
|
||||
@@ -411,7 +411,7 @@ export class HasuraAuthClient {
|
||||
*/
|
||||
async addSecurityKey(
|
||||
nickname?: string
|
||||
): Promise<{ error: ErrorPayload | null; key?: SecurityKey }> {
|
||||
): Promise<{ error: AuthErrorPayload | null; key?: SecurityKey }> {
|
||||
const { error, key } = await addSecurityKeyPromise(this._client, nickname)
|
||||
return { error, key }
|
||||
}
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
import { ErrorPayload, User } from '../../types'
|
||||
import { AuthErrorPayload, User } from '../../types'
|
||||
|
||||
export type StateErrorTypes = 'registration' | 'authentication' | 'signout'
|
||||
|
||||
@@ -21,7 +21,7 @@ export type AuthContext = {
|
||||
}
|
||||
/** Number of times the user tried to get an access token from a refresh token but got a network error */
|
||||
importTokenAttempts: number
|
||||
errors: Partial<Record<StateErrorTypes, ErrorPayload>>
|
||||
errors: Partial<Record<StateErrorTypes, AuthErrorPayload>>
|
||||
}
|
||||
|
||||
export const INITIAL_MACHINE_CONTEXT: AuthContext = {
|
||||
|
||||
@@ -24,9 +24,9 @@ import {
|
||||
} from '../../errors'
|
||||
import { localStorageGetter, localStorageSetter } from '../../local-storage'
|
||||
import {
|
||||
AuthErrorPayload,
|
||||
AuthOptions,
|
||||
DeanonymizeResponse,
|
||||
ErrorPayload,
|
||||
NhostSession,
|
||||
NhostSessionResponse,
|
||||
PasswordlessEmailResponse,
|
||||
@@ -856,7 +856,7 @@ export const createAuthMachine = ({
|
||||
error: null
|
||||
}
|
||||
}
|
||||
let error: ErrorPayload | null = null
|
||||
let error: AuthErrorPayload | null = null
|
||||
if (autoSignIn) {
|
||||
const urlToken = getParameterByName('refreshToken') || null
|
||||
if (urlToken) {
|
||||
@@ -866,7 +866,7 @@ export const createAuthMachine = ({
|
||||
})
|
||||
return { session, error: null }
|
||||
} catch (exception) {
|
||||
error = (exception as { error: ErrorPayload }).error
|
||||
error = (exception as { error: AuthErrorPayload }).error
|
||||
}
|
||||
} else {
|
||||
const error = getParameterByName('error')
|
||||
@@ -890,7 +890,7 @@ export const createAuthMachine = ({
|
||||
})
|
||||
return { session, error: null }
|
||||
} catch (exception) {
|
||||
error = (exception as { error: ErrorPayload }).error
|
||||
error = (exception as { error: AuthErrorPayload }).error
|
||||
}
|
||||
}
|
||||
if (error) {
|
||||
|
||||
@@ -1,12 +1,12 @@
|
||||
import { assign, createMachine, send } from 'xstate'
|
||||
import { INVALID_EMAIL_ERROR } from '../errors'
|
||||
import { AuthClient } from '../internal-client'
|
||||
import { ChangeEmailOptions, ChangeEmailResponse, ErrorPayload } from '../types'
|
||||
import { AuthErrorPayload, ChangeEmailOptions, ChangeEmailResponse } from '../types'
|
||||
import { postFetch, rewriteRedirectTo } from '../utils'
|
||||
import { isValidEmail } from '../utils/validators'
|
||||
|
||||
export type ChangeEmailContext = {
|
||||
error: ErrorPayload | null
|
||||
error: AuthErrorPayload | null
|
||||
}
|
||||
|
||||
export type ChangeEmailEvents =
|
||||
@@ -16,7 +16,7 @@ export type ChangeEmailEvents =
|
||||
options?: ChangeEmailOptions
|
||||
}
|
||||
| { type: 'SUCCESS' }
|
||||
| { type: 'ERROR'; error: ErrorPayload | null }
|
||||
| { type: 'ERROR'; error: AuthErrorPayload | null }
|
||||
|
||||
export type ChangeEmailServices = {
|
||||
request: { data: ChangeEmailResponse }
|
||||
|
||||
@@ -16,9 +16,9 @@ export interface Typegen0 {
|
||||
}
|
||||
missingImplementations: {
|
||||
actions: never
|
||||
services: never
|
||||
guards: never
|
||||
delays: never
|
||||
guards: never
|
||||
services: never
|
||||
}
|
||||
eventsCausingActions: {
|
||||
reportError: 'error.platform.requestChange'
|
||||
@@ -26,13 +26,13 @@ export interface Typegen0 {
|
||||
saveInvalidEmailError: 'REQUEST'
|
||||
saveRequestError: 'error.platform.requestChange'
|
||||
}
|
||||
eventsCausingServices: {
|
||||
requestChange: 'REQUEST'
|
||||
}
|
||||
eventsCausingDelays: {}
|
||||
eventsCausingGuards: {
|
||||
invalidEmail: 'REQUEST'
|
||||
}
|
||||
eventsCausingDelays: {}
|
||||
eventsCausingServices: {
|
||||
requestChange: 'REQUEST'
|
||||
}
|
||||
matchesStates:
|
||||
| 'idle'
|
||||
| 'idle.error'
|
||||
|
||||
@@ -1,12 +1,12 @@
|
||||
import { assign, createMachine, send } from 'xstate'
|
||||
import { INVALID_PASSWORD_ERROR } from '../errors'
|
||||
import { AuthClient } from '../internal-client'
|
||||
import { ChangePasswordResponse, ErrorPayload } from '../types'
|
||||
import { AuthErrorPayload, ChangePasswordResponse } from '../types'
|
||||
import { postFetch } from '../utils'
|
||||
import { isValidPassword } from '../utils/validators'
|
||||
|
||||
export type ChangePasswordContext = {
|
||||
error: ErrorPayload | null
|
||||
error: AuthErrorPayload | null
|
||||
}
|
||||
export type ChangePasswordEvents =
|
||||
| {
|
||||
@@ -15,7 +15,7 @@ export type ChangePasswordEvents =
|
||||
ticket?: string
|
||||
}
|
||||
| { type: 'SUCCESS' }
|
||||
| { type: 'ERROR'; error: ErrorPayload | null }
|
||||
| { type: 'ERROR'; error: AuthErrorPayload | null }
|
||||
|
||||
export type ChangePasswordServices = {
|
||||
requestChange: { data: ChangePasswordResponse }
|
||||
|
||||
@@ -16,9 +16,9 @@ export interface Typegen0 {
|
||||
}
|
||||
missingImplementations: {
|
||||
actions: never
|
||||
services: never
|
||||
guards: never
|
||||
delays: never
|
||||
guards: never
|
||||
services: never
|
||||
}
|
||||
eventsCausingActions: {
|
||||
reportError: 'error.platform.requestChange'
|
||||
@@ -26,13 +26,13 @@ export interface Typegen0 {
|
||||
saveInvalidPasswordError: 'REQUEST'
|
||||
saveRequestError: 'error.platform.requestChange'
|
||||
}
|
||||
eventsCausingServices: {
|
||||
requestChange: 'REQUEST'
|
||||
}
|
||||
eventsCausingDelays: {}
|
||||
eventsCausingGuards: {
|
||||
invalidPassword: 'REQUEST'
|
||||
}
|
||||
eventsCausingDelays: {}
|
||||
eventsCausingServices: {
|
||||
requestChange: 'REQUEST'
|
||||
}
|
||||
matchesStates:
|
||||
| 'idle'
|
||||
| 'idle.error'
|
||||
|
||||
@@ -1,11 +1,11 @@
|
||||
import { assign, createMachine, send } from 'xstate'
|
||||
import { INVALID_MFA_CODE_ERROR, INVALID_MFA_TYPE_ERROR } from '../errors'
|
||||
import { AuthClient } from '../internal-client'
|
||||
import { ErrorPayload } from '../types'
|
||||
import { AuthErrorPayload } from '../types'
|
||||
import { getFetch, postFetch } from '../utils'
|
||||
|
||||
export type EnableMfaContext = {
|
||||
error: ErrorPayload | null
|
||||
error: AuthErrorPayload | null
|
||||
imageUrl: string | null
|
||||
secret: string | null
|
||||
}
|
||||
@@ -20,9 +20,9 @@ export type EnableMfaEvents =
|
||||
activeMfaType: 'totp'
|
||||
}
|
||||
| { type: 'GENERATED' }
|
||||
| { type: 'GENERATED_ERROR'; error: ErrorPayload | null }
|
||||
| { type: 'GENERATED_ERROR'; error: AuthErrorPayload | null }
|
||||
| { type: 'SUCCESS' }
|
||||
| { type: 'ERROR'; error: ErrorPayload | null }
|
||||
| { type: 'ERROR'; error: AuthErrorPayload | null }
|
||||
|
||||
export type EnableMfadMachine = ReturnType<typeof createEnableMfaMachine>
|
||||
|
||||
|
||||
@@ -23,9 +23,9 @@ export interface Typegen0 {
|
||||
}
|
||||
missingImplementations: {
|
||||
actions: never
|
||||
services: never
|
||||
guards: never
|
||||
delays: never
|
||||
guards: never
|
||||
services: never
|
||||
}
|
||||
eventsCausingActions: {
|
||||
reportError: 'error.platform.activate'
|
||||
@@ -37,15 +37,15 @@ export interface Typegen0 {
|
||||
saveInvalidMfaCodeError: 'ACTIVATE'
|
||||
saveInvalidMfaTypeError: 'ACTIVATE'
|
||||
}
|
||||
eventsCausingServices: {
|
||||
activate: 'ACTIVATE'
|
||||
generate: 'GENERATE'
|
||||
}
|
||||
eventsCausingDelays: {}
|
||||
eventsCausingGuards: {
|
||||
invalidMfaCode: 'ACTIVATE'
|
||||
invalidMfaType: 'ACTIVATE'
|
||||
}
|
||||
eventsCausingDelays: {}
|
||||
eventsCausingServices: {
|
||||
activate: 'ACTIVATE'
|
||||
generate: 'GENERATE'
|
||||
}
|
||||
matchesStates:
|
||||
| 'generated'
|
||||
| 'generated.activated'
|
||||
|
||||
@@ -1,12 +1,12 @@
|
||||
import { assign, createMachine, send } from 'xstate'
|
||||
import { INVALID_EMAIL_ERROR } from '../errors'
|
||||
import { AuthClient } from '../internal-client'
|
||||
import { ErrorPayload, ResetPasswordOptions, ResetPasswordResponse } from '../types'
|
||||
import { AuthErrorPayload, ResetPasswordOptions, ResetPasswordResponse } from '../types'
|
||||
import { postFetch, rewriteRedirectTo } from '../utils'
|
||||
import { isValidEmail } from '../utils/validators'
|
||||
|
||||
export type ResetPasswordContext = {
|
||||
error: ErrorPayload | null
|
||||
error: AuthErrorPayload | null
|
||||
}
|
||||
export type ResetPasswordEvents =
|
||||
| {
|
||||
@@ -15,7 +15,7 @@ export type ResetPasswordEvents =
|
||||
options?: ResetPasswordOptions
|
||||
}
|
||||
| { type: 'SUCCESS' }
|
||||
| { type: 'ERROR'; error: ErrorPayload | null }
|
||||
| { type: 'ERROR'; error: AuthErrorPayload | null }
|
||||
|
||||
export type ResetPasswordServices = {
|
||||
requestChange: { data: ResetPasswordResponse }
|
||||
|
||||
@@ -16,9 +16,9 @@ export interface Typegen0 {
|
||||
}
|
||||
missingImplementations: {
|
||||
actions: never
|
||||
services: never
|
||||
guards: never
|
||||
delays: never
|
||||
guards: never
|
||||
services: never
|
||||
}
|
||||
eventsCausingActions: {
|
||||
reportError: 'error.platform.requestChange'
|
||||
@@ -26,13 +26,13 @@ export interface Typegen0 {
|
||||
saveInvalidEmailError: 'REQUEST'
|
||||
saveRequestError: 'error.platform.requestChange'
|
||||
}
|
||||
eventsCausingServices: {
|
||||
requestChange: 'REQUEST'
|
||||
}
|
||||
eventsCausingDelays: {}
|
||||
eventsCausingGuards: {
|
||||
invalidEmail: 'REQUEST'
|
||||
}
|
||||
eventsCausingDelays: {}
|
||||
eventsCausingServices: {
|
||||
requestChange: 'REQUEST'
|
||||
}
|
||||
matchesStates:
|
||||
| 'idle'
|
||||
| 'idle.error'
|
||||
|
||||
@@ -1,12 +1,16 @@
|
||||
import { assign, createMachine, send } from 'xstate'
|
||||
import { INVALID_EMAIL_ERROR } from '../errors'
|
||||
import { AuthClient } from '../internal-client'
|
||||
import { ErrorPayload, SendVerificationEmailOptions, SendVerificationEmailResponse } from '../types'
|
||||
import {
|
||||
AuthErrorPayload,
|
||||
SendVerificationEmailOptions,
|
||||
SendVerificationEmailResponse
|
||||
} from '../types'
|
||||
import { postFetch, rewriteRedirectTo } from '../utils'
|
||||
import { isValidEmail } from '../utils/validators'
|
||||
|
||||
export type SendVerificationEmailContext = {
|
||||
error: ErrorPayload | null
|
||||
error: AuthErrorPayload | null
|
||||
}
|
||||
|
||||
export type SendVerificationEmailEvents =
|
||||
@@ -16,7 +20,7 @@ export type SendVerificationEmailEvents =
|
||||
options?: SendVerificationEmailOptions
|
||||
}
|
||||
| { type: 'SUCCESS' }
|
||||
| { type: 'ERROR'; error: ErrorPayload | null }
|
||||
| { type: 'ERROR'; error: AuthErrorPayload | null }
|
||||
|
||||
export type SendVerificationEmailServices = {
|
||||
request: { data: SendVerificationEmailResponse }
|
||||
|
||||
@@ -16,9 +16,9 @@ export interface Typegen0 {
|
||||
}
|
||||
missingImplementations: {
|
||||
actions: never
|
||||
services: never
|
||||
guards: never
|
||||
delays: never
|
||||
guards: never
|
||||
services: never
|
||||
}
|
||||
eventsCausingActions: {
|
||||
reportError: 'error.platform.request'
|
||||
@@ -26,13 +26,13 @@ export interface Typegen0 {
|
||||
saveInvalidEmailError: 'REQUEST'
|
||||
saveRequestError: 'error.platform.request'
|
||||
}
|
||||
eventsCausingServices: {
|
||||
request: 'REQUEST'
|
||||
}
|
||||
eventsCausingDelays: {}
|
||||
eventsCausingGuards: {
|
||||
invalidEmail: 'REQUEST'
|
||||
}
|
||||
eventsCausingDelays: {}
|
||||
eventsCausingServices: {
|
||||
request: 'REQUEST'
|
||||
}
|
||||
matchesStates:
|
||||
| 'idle'
|
||||
| 'idle.error'
|
||||
|
||||
@@ -6,14 +6,14 @@ import {
|
||||
import { postFetch } from '..'
|
||||
import { CodifiedError } from '../errors'
|
||||
import { AuthClient } from '../internal-client'
|
||||
import { ErrorPayload, SecurityKey } from '../types'
|
||||
import { ActionErrorState, ActionLoadingState, ActionSuccessState } from './types'
|
||||
import { AuthErrorPayload, SecurityKey } from '../types'
|
||||
import { AuthActionErrorState, AuthActionLoadingState, AuthActionSuccessState } from './types'
|
||||
|
||||
export interface AddSecurityKeyHandlerResult extends ActionErrorState, ActionSuccessState {
|
||||
export interface AddSecurityKeyHandlerResult extends AuthActionErrorState, AuthActionSuccessState {
|
||||
key?: SecurityKey
|
||||
}
|
||||
|
||||
export interface AddSecurityKeyState extends AddSecurityKeyHandlerResult, ActionLoadingState {}
|
||||
export interface AddSecurityKeyState extends AddSecurityKeyHandlerResult, AuthActionLoadingState {}
|
||||
|
||||
export const addSecurityKeyPromise = async (
|
||||
{ backendUrl, interpreter }: AuthClient,
|
||||
@@ -38,7 +38,7 @@ export const addSecurityKeyPromise = async (
|
||||
)
|
||||
return { key, isError: false, error: null, isSuccess: true }
|
||||
} catch (e) {
|
||||
const { error } = e as { error: ErrorPayload }
|
||||
const { error } = e as { error: AuthErrorPayload }
|
||||
return { isError: true, error, isSuccess: false }
|
||||
}
|
||||
}
|
||||
|
||||
@@ -3,10 +3,12 @@ import { InterpreterFrom } from 'xstate'
|
||||
import { ChangeEmailMachine } from '../machines'
|
||||
import { ChangeEmailOptions } from '../types'
|
||||
|
||||
import { ActionErrorState, ActionLoadingState, NeedsEmailVerificationState } from './types'
|
||||
export interface ChangeEmailHandlerResult extends ActionErrorState, NeedsEmailVerificationState {}
|
||||
import { AuthActionErrorState, AuthActionLoadingState, NeedsEmailVerificationState } from './types'
|
||||
export interface ChangeEmailHandlerResult
|
||||
extends AuthActionErrorState,
|
||||
NeedsEmailVerificationState {}
|
||||
|
||||
export interface ChangeEmailState extends ChangeEmailHandlerResult, ActionLoadingState {}
|
||||
export interface ChangeEmailState extends ChangeEmailHandlerResult, AuthActionLoadingState {}
|
||||
|
||||
export const changeEmailPromise = async (
|
||||
interpreter: InterpreterFrom<ChangeEmailMachine>,
|
||||
|
||||
@@ -2,11 +2,11 @@ import { InterpreterFrom } from 'xstate'
|
||||
|
||||
import { ChangePasswordMachine } from '../machines'
|
||||
|
||||
import { ActionErrorState, ActionLoadingState, ActionSuccessState } from './types'
|
||||
import { AuthActionErrorState, AuthActionLoadingState, AuthActionSuccessState } from './types'
|
||||
|
||||
export interface ChangePasswordState extends ChangePasswordHandlerResult, ActionLoadingState {}
|
||||
export interface ChangePasswordState extends ChangePasswordHandlerResult, AuthActionLoadingState {}
|
||||
|
||||
export interface ChangePasswordHandlerResult extends ActionErrorState, ActionSuccessState {}
|
||||
export interface ChangePasswordHandlerResult extends AuthActionErrorState, AuthActionSuccessState {}
|
||||
|
||||
export const changePasswordPromise = async (
|
||||
interpreter: InterpreterFrom<ChangePasswordMachine>,
|
||||
|
||||
@@ -2,9 +2,9 @@ import { InterpreterFrom } from 'xstate'
|
||||
|
||||
import { EnableMfadMachine } from '../machines'
|
||||
|
||||
import { ActionErrorState } from './types'
|
||||
import { AuthActionErrorState } from './types'
|
||||
|
||||
export interface GenerateQrCodeHandlerResult extends ActionErrorState {
|
||||
export interface GenerateQrCodeHandlerResult extends AuthActionErrorState {
|
||||
qrCodeDataUrl: string
|
||||
isGenerated: boolean
|
||||
}
|
||||
@@ -12,7 +12,7 @@ export interface GenerateQrCodeHandlerResult extends ActionErrorState {
|
||||
export interface GenerateQrCodeState extends GenerateQrCodeHandlerResult {
|
||||
isGenerating: boolean
|
||||
}
|
||||
export interface ActivateMfaHandlerResult extends ActionErrorState {
|
||||
export interface ActivateMfaHandlerResult extends AuthActionErrorState {
|
||||
isActivated: boolean
|
||||
}
|
||||
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user