mirror of
https://github.com/labring/FastGPT.git
synced 2026-05-07 01:02:55 +08:00
76d6234de6
* Agent features (#6345) * Test agent (#6220) * squash: compress all commits into one * feat: plan response in ui * response ui * perf: agent config * merge * tool select ux * perf: chat ui * perf: agent editform * tmp code * feat: save chat * Complete agent parent (#6049) * add role and tools filling * add: file-upload --------- Co-authored-by: xxyyh <2289112474@qq> * perf: top agent code * top agent (#6062) Co-authored-by: xxyyh <2289112474@qq> * fix: ts * skill editor ui * ui * perf: rewrite type with zod * skill edit ui * skill agent (#6089) * cp skill chat * rebasefdf933dand add skill chat * 1. skill 的 CRUD 2. skill 的信息渲染到前端界面 * solve comment * remove chatid and chatItemId * skill match * perf: skill manage * fix: ts --------- Co-authored-by: xxyyh <2289112474@qq> Co-authored-by: archer <545436317@qq.com> * fix: ts * fix: loop import * skill tool config (#6114) Co-authored-by: xxyyh <2289112474@qq> * feat: load tool in agent * skill memory (#6126) Co-authored-by: xxyyh <2289112474@qq> * perf: agent skill editor * perf: helperbot ui * agent code * perf: context * fix: request context * agent usage * perf: agent context and pause * perf: plan response * Test agent sigle skill (#6184) * feat:top box fill * prompt fix --------- Co-authored-by: xxyyh <2289112474@qq> * perf: agent chat ui * Test agent new (#6219) * have-replan * agent --------- Co-authored-by: xxyyh <2289112474@qq> * fix: ts --------- Co-authored-by: YeYuheng <57035043+YYH211@users.noreply.github.com> Co-authored-by: xxyyh <2289112474@qq> * feat: consolidate agent and MCP improvements This commit consolidates 17 commits including: - MCP tools enhancements and fixes - Agent system improvements and optimizations - Auth limit and prompt updates - Tool response compression and error tracking - Simple app adaptation - Code quality improvements (TypeScript, ESLint, Zod) - Version type migration to schema - Remove deprecated useRequest2 - Add LLM error tracking - Toolset ID validation fixes --------- Co-authored-by: YeYuheng <57035043+YYH211@users.noreply.github.com> Co-authored-by: xxyyh <2289112474@qq> * fix: transform avatar copy;perf: filter invalid tool * update llm response storage time * fix: openapi schema * update skill desc * feat: cache hit data * i18n * lock * chat logs support error filter & user search (#6373) * chat log support searching by user name * support error filter * fix * fix overflow * optimize * fix init script * fix * perf: get log users * updat ecomment * fix: ts * fix: test --------- Co-authored-by: archer <545436317@qq.com> * Fix: agent (#6376) * Agent features (#6345) * Test agent (#6220) * squash: compress all commits into one * feat: plan response in ui * response ui * perf: agent config * merge * tool select ux * perf: chat ui * perf: agent editform * tmp code * feat: save chat * Complete agent parent (#6049) * add role and tools filling * add: file-upload --------- Co-authored-by: xxyyh <2289112474@qq> * perf: top agent code * top agent (#6062) Co-authored-by: xxyyh <2289112474@qq> * fix: ts * skill editor ui * ui * perf: rewrite type with zod * skill edit ui * skill agent (#6089) * cp skill chat * rebasefdf933dand add skill chat * 1. skill 的 CRUD 2. skill 的信息渲染到前端界面 * solve comment * remove chatid and chatItemId * skill match * perf: skill manage * fix: ts --------- Co-authored-by: xxyyh <2289112474@qq> Co-authored-by: archer <545436317@qq.com> * fix: ts * fix: loop import * skill tool config (#6114) Co-authored-by: xxyyh <2289112474@qq> * feat: load tool in agent * skill memory (#6126) Co-authored-by: xxyyh <2289112474@qq> * perf: agent skill editor * perf: helperbot ui * agent code * perf: context * fix: request context * agent usage * perf: agent context and pause * perf: plan response * Test agent sigle skill (#6184) * feat:top box fill * prompt fix --------- Co-authored-by: xxyyh <2289112474@qq> * perf: agent chat ui * Test agent new (#6219) * have-replan * agent --------- Co-authored-by: xxyyh <2289112474@qq> * fix: ts --------- Co-authored-by: YeYuheng <57035043+YYH211@users.noreply.github.com> Co-authored-by: xxyyh <2289112474@qq> * feat: consolidate agent and MCP improvements This commit consolidates 17 commits including: - MCP tools enhancements and fixes - Agent system improvements and optimizations - Auth limit and prompt updates - Tool response compression and error tracking - Simple app adaptation - Code quality improvements (TypeScript, ESLint, Zod) - Version type migration to schema - Remove deprecated useRequest2 - Add LLM error tracking - Toolset ID validation fixes --------- Co-authored-by: YeYuheng <57035043+YYH211@users.noreply.github.com> Co-authored-by: xxyyh <2289112474@qq> * 1. 把辅助生成前端上的 system prompt 加入到上下文中 2. mcp工具的前端渲染(图标) 3. 文件读取工具和文件上传进行关联 4. 添加了辅助生成返回格式出错的重试方案 5. ask 不出现在 plan 步骤中 6. 添加了辅助生成的头像和交互 UI * fix:read_file * helperbot ui * ts error * helper ui * delete Unused import * perf: helper bot * lock --------- Co-authored-by: Archer <545436317@qq.com> Co-authored-by: xxyyh <2289112474@qq> * fix date variable required & model auth (#6386) * fix date variable required & model auth * doc * feat: add chat id to finish callback * fix: iphone safari shareId (#6387) * fix: iphone safari shareId * fix: mcp file list can't setting * fix: reason output field * fix: skip JSON validation for HTTP tool body with variable (#6392) * fix: skip JSON validation for HTTP tool body with variable * doc * workflow fitview * perf: selecting memory * perf: cp api * ui * perf: toolcall auto adapt * fix: catch workflow error * fix: ts * perf: pagination type * remove * ignore * update doc * fix: simple app tool select * add default avatar to logs user * perf: loading user * select dataset ui * rename version * feat: add global/common test * perf: packages/global/common test * feat: package/global/ai,app test * add global/chat test * global/core test * global/core test * feat: packages/global all test * perf: test * add server api test * perf: init shell * perf: init4150 shell * remove invalid code * update doc * remove log * fix: chat effect * fix: plan fake tool (#6398) * 1. 提示词防注入功能 2. 无工具不进入 plan,防止虚拟工具生成 * Agent-dataset * dataset * dataset presetInfo * prefix * perf: prompt --------- Co-authored-by: xxyyh <2289112474@qq> Co-authored-by: archer <545436317@qq.com> * fix: review * adapt kimi2.5 think toolcall * feat: invoke fastgpt user info (#6403) feat: invoke fastgpt user info * fix: invoke fastgpt user info return orgs (#6404) * skill and version * retry helperbot (#6405) Co-authored-by: xxyyh <2289112474@qq> * update template * remove log * doc * update doc * doc * perf: internal ip check * adapt get paginationRecords * tool call adapt * fix: test * doc * fix: agent initial version * adapt completions v1 * feat: instrumentation check * rename skill * add workflow demo mode tracks (#6407) * chore: 统一 skills 目录命名为小写 将 .claude/Skills/ 重命名为 .claude/skills/ 以保持命名一致性。 Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * add workflow demo mode tracks * code * optimize * fix: improve workflowDemoTrack based on PR review - Add comment to empty catch block for maintainability - Add @param docs to onDemoChange clarifying nodeCount usage - Replace silent .catch with console.debug for dev debugging - Handle appId changes by reporting old data before re-init Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> --------- Co-authored-by: archer <545436317@qq.com> Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com> * remove repeat skill * fix(workflow): filter out orphan edges to prevent runtime errors (#6399) * fix(workflow): filter out orphan edges to prevent runtime errors Runtime edges that reference non-existent nodes (orphan edges) can cause unexpected behavior or crashes during workflow dispatch. This change adds a pre-check to filter out such edges before execution begins, ensuring system stability even with inconsistent graph data. * fix(workflow): enhance orphan edge filtering with logging and tests - Refactor: Extract logic to 'filterOrphanEdges' in utils.ts for better reusability - Feat: Add performance monitoring (warn if >100ms) and comprehensive logging - Feat: Support detailed edge inspection in debug mode - Docs: Add JSDoc explaining causes of orphan edges (migration, manual edits) - Test: Add unit tests covering edge cases and performance (1000 edges) Addresses PR review feedback regarding logging, variable naming, and testing." * move code * move code * add more unit test --------- Co-authored-by: archer <545436317@qq.com> * test * perf: test * add server/common/string test * fix: resolve $ref references in MCP tool input schemas (#6395) (#6409) * fix: resolve $ref references in MCP tool input schemas (#6395) * add test code --------- Co-authored-by: archer <545436317@qq.com> * chore(docs): add fastgpt, fastgpt-plugin version choice guide (#6411) * chore(doc): add fastgpt version description * doc * doc --------- Co-authored-by: archer <545436317@qq.com> * fix:dataset cite and description info (#6410) * 1. 添加知识库引用(plan 步骤和直接知识库调用) 2. 提示词框中的@知识库工具 3. plan 中 step 的 description dataset_search 改为中文 * fix: i18n * prompt * prompt --------- Co-authored-by: xxyyh <2289112474@qq> * fix: tool call * perf: workflow props * fix: merge ECharts toolbox options instead of overwriting (#6269) (#6412) * feat: integrate logtape and otel (#6400) * fix: deps * feat(logger): integrate logtape and otel * wip(log): add basic infras logs * wip(log): add request id and inject it into context * wip(log): add basic tx logs * wip(log): migrate * wip(log): category * wip(log): more sub category * fix: type * fix: sessionRun * fix: export getLogger from client.ts * chore: improve logs * docs: update signoz and changelog * change type * fix: ts * remove skill.md * fix: lockfile specifier * fix: test --------- Co-authored-by: archer <545436317@qq.com> * init log * doc * remove invalid log * fix: review * template * replace new log * fix: ts * remove log * chore: migrate all addLog to logtape * move skill * chore: migrate all addLog to logtape (#6417) * update skill * remove log * fix: tool check --------- Co-authored-by: YeYuheng <57035043+YYH211@users.noreply.github.com> Co-authored-by: xxyyh <2289112474@qq> Co-authored-by: heheer <heheer@sealos.io> Co-authored-by: Finley Ge <32237950+FinleyGe@users.noreply.github.com> Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com> Co-authored-by: xuyafei1996 <54217479+xuyafei1996@users.noreply.github.com> Co-authored-by: ToukoYui <2331631097@qq.com> Co-authored-by: roy <whoeverimf5@gmail.com>
520 lines
18 KiB
TypeScript
520 lines
18 KiB
TypeScript
import { describe, expect, it, vi, beforeEach } from 'vitest';
|
|
import { Permission } from '@fastgpt/global/support/permission/controller';
|
|
import {
|
|
CommonPerList,
|
|
CommonRoleList,
|
|
CommonRolePerMap,
|
|
NullPermissionVal,
|
|
NullRoleVal,
|
|
OwnerPermissionVal,
|
|
OwnerRoleVal,
|
|
ReadRoleVal,
|
|
WriteRoleVal,
|
|
ManageRoleVal
|
|
} from '@fastgpt/global/support/permission/constant';
|
|
|
|
describe('Permission Class', () => {
|
|
describe('constructor', () => {
|
|
it('should create Permission instance with default values', () => {
|
|
const perm = new Permission();
|
|
|
|
expect(perm.role).toBe(NullRoleVal);
|
|
expect(perm.isOwner).toBe(false);
|
|
expect(perm.hasManagePer).toBe(false);
|
|
expect(perm.hasWritePer).toBe(false);
|
|
expect(perm.hasReadPer).toBe(false);
|
|
expect(perm.hasManageRole).toBe(false);
|
|
expect(perm.hasWriteRole).toBe(false);
|
|
expect(perm.hasReadRole).toBe(false);
|
|
});
|
|
|
|
it('should create Permission instance with read role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
|
|
expect(perm.role).toBe(ReadRoleVal);
|
|
expect(perm.isOwner).toBe(false);
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(false);
|
|
expect(perm.hasManagePer).toBe(false);
|
|
expect(perm.hasReadRole).toBe(true);
|
|
expect(perm.hasWriteRole).toBe(false);
|
|
expect(perm.hasManageRole).toBe(false);
|
|
});
|
|
|
|
it('should create Permission instance with write role', () => {
|
|
const perm = new Permission({ role: WriteRoleVal });
|
|
|
|
expect(perm.role).toBe(WriteRoleVal);
|
|
expect(perm.isOwner).toBe(false);
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(true);
|
|
expect(perm.hasManagePer).toBe(false);
|
|
expect(perm.hasReadRole).toBe(false);
|
|
expect(perm.hasWriteRole).toBe(true);
|
|
expect(perm.hasManageRole).toBe(false);
|
|
});
|
|
|
|
it('should create Permission instance with manage role', () => {
|
|
const perm = new Permission({ role: ManageRoleVal });
|
|
|
|
expect(perm.role).toBe(ManageRoleVal);
|
|
expect(perm.isOwner).toBe(false);
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(true);
|
|
expect(perm.hasManagePer).toBe(true);
|
|
expect(perm.hasReadRole).toBe(false);
|
|
expect(perm.hasWriteRole).toBe(false);
|
|
expect(perm.hasManageRole).toBe(true);
|
|
});
|
|
|
|
it('should create Permission instance with isOwner flag', () => {
|
|
const perm = new Permission({ isOwner: true });
|
|
|
|
expect(perm.role).toBe(OwnerRoleVal);
|
|
expect(perm.isOwner).toBe(true);
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(true);
|
|
expect(perm.hasManagePer).toBe(true);
|
|
expect(perm.hasReadRole).toBe(true);
|
|
expect(perm.hasWriteRole).toBe(true);
|
|
expect(perm.hasManageRole).toBe(true);
|
|
});
|
|
|
|
it('should override role when isOwner is true', () => {
|
|
const perm = new Permission({ role: ReadRoleVal, isOwner: true });
|
|
|
|
expect(perm.role).toBe(OwnerRoleVal);
|
|
expect(perm.isOwner).toBe(true);
|
|
});
|
|
|
|
it('should accept custom roleList, perList, and rolePerMap', () => {
|
|
const customRoleList = { ...CommonRoleList };
|
|
const customPerList = { ...CommonPerList };
|
|
const customRolePerMap = new Map(CommonRolePerMap);
|
|
|
|
const perm = new Permission({
|
|
roleList: customRoleList,
|
|
perList: customPerList,
|
|
rolePerMap: customRolePerMap
|
|
});
|
|
|
|
expect(perm.roleList).toBe(customRoleList);
|
|
expect(perm.perList).toBe(customPerList);
|
|
expect(perm.rolePerMap).toBe(customRolePerMap);
|
|
});
|
|
|
|
it('should create Permission with combined roles', () => {
|
|
const combinedRole = ReadRoleVal | WriteRoleVal;
|
|
const perm = new Permission({ role: combinedRole });
|
|
|
|
expect(perm.role).toBe(combinedRole);
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(true);
|
|
expect(perm.hasManagePer).toBe(false);
|
|
});
|
|
});
|
|
|
|
describe('addRole', () => {
|
|
it('should add a single role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
perm.addRole(WriteRoleVal);
|
|
|
|
expect(perm.role).toBe(ReadRoleVal | WriteRoleVal);
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(true);
|
|
expect(perm.hasReadRole).toBe(true);
|
|
expect(perm.hasWriteRole).toBe(true);
|
|
});
|
|
|
|
it('should add multiple roles at once', () => {
|
|
const perm = new Permission({ role: NullRoleVal });
|
|
perm.addRole(ReadRoleVal, WriteRoleVal);
|
|
|
|
expect(perm.role).toBe(ReadRoleVal | WriteRoleVal);
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(true);
|
|
});
|
|
|
|
it('should add all three roles', () => {
|
|
const perm = new Permission({ role: NullRoleVal });
|
|
perm.addRole(ReadRoleVal, WriteRoleVal, ManageRoleVal);
|
|
|
|
expect(perm.role).toBe(ReadRoleVal | WriteRoleVal | ManageRoleVal);
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(true);
|
|
expect(perm.hasManagePer).toBe(true);
|
|
});
|
|
|
|
it('should not change role when adding existing role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
const originalRole = perm.role;
|
|
perm.addRole(ReadRoleVal);
|
|
|
|
expect(perm.role).toBe(originalRole);
|
|
});
|
|
|
|
it('should return this for method chaining', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
const result = perm.addRole(WriteRoleVal);
|
|
|
|
expect(result).toBe(perm);
|
|
});
|
|
|
|
it('should not add role when user is owner', () => {
|
|
const perm = new Permission({ isOwner: true });
|
|
const originalRole = perm.role;
|
|
perm.addRole(ReadRoleVal);
|
|
|
|
expect(perm.role).toBe(originalRole);
|
|
expect(perm.role).toBe(OwnerRoleVal);
|
|
});
|
|
|
|
it('should update permissions after adding role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
expect(perm.hasWritePer).toBe(false);
|
|
|
|
perm.addRole(WriteRoleVal);
|
|
expect(perm.hasWritePer).toBe(true);
|
|
});
|
|
});
|
|
|
|
describe('removeRole', () => {
|
|
it('should remove a single role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal | WriteRoleVal });
|
|
perm.removeRole(WriteRoleVal);
|
|
|
|
expect(perm.role).toBe(ReadRoleVal);
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(false);
|
|
expect(perm.hasWriteRole).toBe(false);
|
|
});
|
|
|
|
it('should remove multiple roles at once', () => {
|
|
const perm = new Permission({ role: ReadRoleVal | WriteRoleVal | ManageRoleVal });
|
|
perm.removeRole(WriteRoleVal, ManageRoleVal);
|
|
|
|
expect(perm.role).toBe(ReadRoleVal);
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(false);
|
|
expect(perm.hasManagePer).toBe(false);
|
|
});
|
|
|
|
it('should handle removing non-existent role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
const originalRole = perm.role;
|
|
perm.removeRole(WriteRoleVal);
|
|
|
|
expect(perm.role).toBe(originalRole);
|
|
});
|
|
|
|
it('should return this for method chaining', () => {
|
|
const perm = new Permission({ role: ReadRoleVal | WriteRoleVal });
|
|
const result = perm.removeRole(WriteRoleVal);
|
|
|
|
expect(result).toBe(perm);
|
|
});
|
|
|
|
it('should not remove role when user is owner', () => {
|
|
const perm = new Permission({ isOwner: true });
|
|
const originalRole = perm.role;
|
|
perm.removeRole(ReadRoleVal);
|
|
|
|
expect(perm.role).toBe(originalRole);
|
|
expect(perm.role).toBe(OwnerRoleVal);
|
|
});
|
|
|
|
it('should update permissions after removing role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal | WriteRoleVal });
|
|
expect(perm.hasWritePer).toBe(true);
|
|
|
|
perm.removeRole(WriteRoleVal);
|
|
expect(perm.hasWritePer).toBe(false);
|
|
});
|
|
|
|
it('should remove all roles', () => {
|
|
const perm = new Permission({ role: ReadRoleVal | WriteRoleVal | ManageRoleVal });
|
|
perm.removeRole(ReadRoleVal, WriteRoleVal, ManageRoleVal);
|
|
|
|
expect(perm.role).toBe(NullRoleVal);
|
|
expect(perm.hasReadPer).toBe(false);
|
|
expect(perm.hasWritePer).toBe(false);
|
|
expect(perm.hasManagePer).toBe(false);
|
|
});
|
|
});
|
|
|
|
describe('checkPer', () => {
|
|
it('should return true for read permission with read role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
expect(perm.checkPer(CommonPerList.read)).toBe(true);
|
|
});
|
|
|
|
it('should return false for write permission with read role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
expect(perm.checkPer(CommonPerList.write)).toBe(false);
|
|
});
|
|
|
|
it('should return true for read and write permissions with write role', () => {
|
|
const perm = new Permission({ role: WriteRoleVal });
|
|
expect(perm.checkPer(CommonPerList.read)).toBe(true);
|
|
expect(perm.checkPer(CommonPerList.write)).toBe(true);
|
|
});
|
|
|
|
it('should return true for all permissions with manage role', () => {
|
|
const perm = new Permission({ role: ManageRoleVal });
|
|
expect(perm.checkPer(CommonPerList.read)).toBe(true);
|
|
expect(perm.checkPer(CommonPerList.write)).toBe(true);
|
|
expect(perm.checkPer(CommonPerList.manage)).toBe(true);
|
|
});
|
|
|
|
it('should return true for owner permission only when user is owner', () => {
|
|
const ownerPerm = new Permission({ isOwner: true });
|
|
const normalPerm = new Permission({ role: ManageRoleVal });
|
|
|
|
expect(ownerPerm.checkPer(OwnerPermissionVal)).toBe(true);
|
|
expect(normalPerm.checkPer(OwnerPermissionVal)).toBe(false);
|
|
});
|
|
|
|
it('should return false for null permission', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
expect(perm.checkPer(NullPermissionVal)).toBe(true); // 0 & anything = 0, so it matches
|
|
});
|
|
|
|
it('should check combined permissions', () => {
|
|
const perm = new Permission({ role: WriteRoleVal });
|
|
const combinedPer = CommonPerList.read | CommonPerList.write;
|
|
expect(perm.checkPer(combinedPer)).toBe(true);
|
|
});
|
|
|
|
it('should return false for combined permissions when not all are present', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
const combinedPer = CommonPerList.read | CommonPerList.write;
|
|
expect(perm.checkPer(combinedPer)).toBe(false);
|
|
});
|
|
});
|
|
|
|
describe('checkRole', () => {
|
|
it('should return true for read role when user has read role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
expect(perm.checkRole(ReadRoleVal)).toBe(true);
|
|
});
|
|
|
|
it('should return false for write role when user has only read role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
expect(perm.checkRole(WriteRoleVal)).toBe(false);
|
|
});
|
|
|
|
it('should return true for read role when user has combined roles', () => {
|
|
const perm = new Permission({ role: ReadRoleVal | WriteRoleVal });
|
|
expect(perm.checkRole(ReadRoleVal)).toBe(true);
|
|
expect(perm.checkRole(WriteRoleVal)).toBe(true);
|
|
});
|
|
|
|
it('should return true for owner role only when user is owner', () => {
|
|
const ownerPerm = new Permission({ isOwner: true });
|
|
const normalPerm = new Permission({ role: ManageRoleVal });
|
|
|
|
expect(ownerPerm.checkRole(OwnerRoleVal)).toBe(true);
|
|
expect(normalPerm.checkRole(OwnerRoleVal)).toBe(false);
|
|
});
|
|
|
|
it('should return false for combined roles when not all are present', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
const combinedRole = ReadRoleVal | WriteRoleVal;
|
|
expect(perm.checkRole(combinedRole)).toBe(false);
|
|
});
|
|
|
|
it('should return true for combined roles when all are present', () => {
|
|
const perm = new Permission({ role: ReadRoleVal | WriteRoleVal });
|
|
const combinedRole = ReadRoleVal | WriteRoleVal;
|
|
expect(perm.checkRole(combinedRole)).toBe(true);
|
|
});
|
|
|
|
it('should return true for null role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
expect(perm.checkRole(NullRoleVal)).toBe(true); // 0 & anything = 0, so it matches
|
|
});
|
|
});
|
|
|
|
describe('setUpdatePermissionCallback', () => {
|
|
it('should call callback immediately when set', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
const callback = vi.fn();
|
|
|
|
perm.setUpdatePermissionCallback(callback);
|
|
|
|
expect(callback).toHaveBeenCalledTimes(1);
|
|
});
|
|
|
|
it('should call callback when permissions are updated via addRole', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
const callback = vi.fn();
|
|
|
|
perm.setUpdatePermissionCallback(callback);
|
|
callback.mockClear(); // Clear the initial call
|
|
|
|
perm.addRole(WriteRoleVal);
|
|
|
|
expect(callback).toHaveBeenCalledTimes(1);
|
|
});
|
|
|
|
it('should call callback when permissions are updated via removeRole', () => {
|
|
const perm = new Permission({ role: ReadRoleVal | WriteRoleVal });
|
|
const callback = vi.fn();
|
|
|
|
perm.setUpdatePermissionCallback(callback);
|
|
callback.mockClear();
|
|
|
|
perm.removeRole(WriteRoleVal);
|
|
|
|
expect(callback).toHaveBeenCalledTimes(1);
|
|
});
|
|
|
|
it('should not call callback when owner adds role', () => {
|
|
const perm = new Permission({ isOwner: true });
|
|
const callback = vi.fn();
|
|
|
|
perm.setUpdatePermissionCallback(callback);
|
|
callback.mockClear();
|
|
|
|
perm.addRole(ReadRoleVal);
|
|
|
|
expect(callback).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should replace previous callback', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
const callback1 = vi.fn();
|
|
const callback2 = vi.fn();
|
|
|
|
perm.setUpdatePermissionCallback(callback1);
|
|
callback1.mockClear();
|
|
|
|
perm.setUpdatePermissionCallback(callback2);
|
|
callback1.mockClear();
|
|
callback2.mockClear();
|
|
|
|
perm.addRole(WriteRoleVal);
|
|
|
|
expect(callback1).not.toHaveBeenCalled();
|
|
expect(callback2).toHaveBeenCalledTimes(1);
|
|
});
|
|
});
|
|
|
|
describe('permission calculation', () => {
|
|
it('should calculate correct permissions for single role', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(false);
|
|
expect(perm.hasManagePer).toBe(false);
|
|
});
|
|
|
|
it('should calculate correct permissions for multiple roles', () => {
|
|
const perm = new Permission({ role: ReadRoleVal | WriteRoleVal });
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(true);
|
|
expect(perm.hasManagePer).toBe(false);
|
|
});
|
|
|
|
it('should calculate correct permissions for all roles', () => {
|
|
const perm = new Permission({ role: ReadRoleVal | WriteRoleVal | ManageRoleVal });
|
|
expect(perm.hasReadPer).toBe(true);
|
|
expect(perm.hasWritePer).toBe(true);
|
|
expect(perm.hasManagePer).toBe(true);
|
|
});
|
|
|
|
it('should set isOwner correctly for owner role', () => {
|
|
const perm = new Permission({ isOwner: true });
|
|
expect(perm.isOwner).toBe(true);
|
|
});
|
|
|
|
it('should not set isOwner for non-owner roles', () => {
|
|
const perm = new Permission({ role: ManageRoleVal });
|
|
expect(perm.isOwner).toBe(false);
|
|
});
|
|
});
|
|
|
|
describe('role flags', () => {
|
|
it('should set hasReadRole correctly', () => {
|
|
const readPerm = new Permission({ role: ReadRoleVal });
|
|
const writePerm = new Permission({ role: WriteRoleVal });
|
|
|
|
expect(readPerm.hasReadRole).toBe(true);
|
|
expect(writePerm.hasReadRole).toBe(false);
|
|
});
|
|
|
|
it('should set hasWriteRole correctly', () => {
|
|
const readPerm = new Permission({ role: ReadRoleVal });
|
|
const writePerm = new Permission({ role: WriteRoleVal });
|
|
|
|
expect(readPerm.hasWriteRole).toBe(false);
|
|
expect(writePerm.hasWriteRole).toBe(true);
|
|
});
|
|
|
|
it('should set hasManageRole correctly', () => {
|
|
const readPerm = new Permission({ role: ReadRoleVal });
|
|
const managePerm = new Permission({ role: ManageRoleVal });
|
|
|
|
expect(readPerm.hasManageRole).toBe(false);
|
|
expect(managePerm.hasManageRole).toBe(true);
|
|
});
|
|
|
|
it('should set all role flags for combined roles', () => {
|
|
const perm = new Permission({ role: ReadRoleVal | WriteRoleVal | ManageRoleVal });
|
|
|
|
expect(perm.hasReadRole).toBe(true);
|
|
expect(perm.hasWriteRole).toBe(true);
|
|
expect(perm.hasManageRole).toBe(true);
|
|
});
|
|
});
|
|
|
|
describe('edge cases', () => {
|
|
it('should handle zero role', () => {
|
|
const perm = new Permission({ role: 0 });
|
|
|
|
expect(perm.role).toBe(0);
|
|
expect(perm.hasReadPer).toBe(false);
|
|
expect(perm.hasWritePer).toBe(false);
|
|
expect(perm.hasManagePer).toBe(false);
|
|
});
|
|
|
|
it('should handle method chaining for addRole and removeRole', () => {
|
|
const perm = new Permission({ role: ReadRoleVal });
|
|
|
|
const result = perm.addRole(WriteRoleVal).addRole(ManageRoleVal).removeRole(ReadRoleVal);
|
|
|
|
expect(result).toBe(perm);
|
|
expect(perm.role).toBe(WriteRoleVal | ManageRoleVal);
|
|
});
|
|
|
|
it('should have readonly properties', () => {
|
|
const perm = new Permission();
|
|
|
|
// Verify readonly properties are set correctly
|
|
expect(perm.roleList).toBe(CommonRoleList);
|
|
expect(perm.perList).toBe(CommonPerList);
|
|
expect(perm.rolePerMap).toBe(CommonRolePerMap);
|
|
|
|
// Readonly properties should be defined
|
|
expect(perm.roleList).toBeDefined();
|
|
expect(perm.perList).toBeDefined();
|
|
expect(perm.rolePerMap).toBeDefined();
|
|
});
|
|
|
|
it('should handle custom role-permission mappings', () => {
|
|
const customRolePerMap = new Map([
|
|
[0b1000, 0b1000], // Custom role with custom permission
|
|
[ReadRoleVal, CommonPerList.read],
|
|
[WriteRoleVal, CommonPerList.write | CommonPerList.read],
|
|
[ManageRoleVal, CommonPerList.manage | CommonPerList.write | CommonPerList.read]
|
|
]);
|
|
|
|
const perm = new Permission({
|
|
role: 0b1000,
|
|
rolePerMap: customRolePerMap
|
|
});
|
|
|
|
expect(perm.checkPer(0b1000)).toBe(true);
|
|
});
|
|
});
|
|
});
|