Skip to main content
Glama

mcp-google-sheets

oauth-app.test.ts8 kB
import { UpsertOAuth2AppRequest } from '@activepieces/ee-shared' import { PlatformRole, PrincipalType } from '@activepieces/shared' import { faker } from '@faker-js/faker' import { FastifyInstance } from 'fastify' import { StatusCodes } from 'http-status-codes' import { initializeDatabase } from '../../../../src/app/database' import { databaseConnection } from '../../../../src/app/database/database-connection' import { setupServer } from '../../../../src/app/server' import { generateMockToken } from '../../../helpers/auth' import { createMockOAuthApp, mockAndSaveBasicSetup, mockBasicUser, } from '../../../helpers/mocks' let app: FastifyInstance | null = null const upsertRequest: UpsertOAuth2AppRequest = { pieceName: faker.lorem.word(), clientId: faker.lorem.word(), clientSecret: faker.lorem.word(), } beforeAll(async () => { await initializeDatabase({ runMigrations: false }) app = await setupServer() }) afterAll(async () => { await databaseConnection().destroy() await app?.close() }) describe('OAuth App API', () => { describe('Upsert OAuth APP API', () => { it('new OAuth App', async () => { const { mockOwner, mockPlatform } = await mockAndSaveBasicSetup() const testToken = await generateMockToken({ type: PrincipalType.USER, id: mockOwner.id, platform: { id: mockPlatform.id }, }) const response = await app?.inject({ method: 'POST', url: '/v1/oauth-apps', body: upsertRequest, headers: { authorization: `Bearer ${testToken}`, }, }) // assert const responseBody = response?.json() expect(response?.statusCode).toBe(StatusCodes.OK) expect(responseBody.id).toHaveLength(21) expect(responseBody.platformId).toBe(mockPlatform.id) expect(responseBody.pieceName).toBe(upsertRequest.pieceName) expect(responseBody.clientId).toBe(upsertRequest.clientId) expect(responseBody.clientSecret).toBeUndefined() }) it('Fails if user is not platform owner', async () => { // arrange const { mockPlatform } = await mockAndSaveBasicSetup() const { mockUser } = await mockBasicUser({ user: { platformId: mockPlatform.id, platformRole: PlatformRole.MEMBER, }, }) const testToken = await generateMockToken({ type: PrincipalType.USER, id: mockUser.id, platform: { id: mockPlatform.id }, }) const response = await app?.inject({ method: 'POST', url: '/v1/oauth-apps', body: upsertRequest, headers: { authorization: `Bearer ${testToken}`, }, }) // assert expect(response?.statusCode).toBe(StatusCodes.FORBIDDEN) }) }) describe('Delete OAuth App', () => { it('Forbid by Non Owner', async () => { // arrange const { mockOwner: mockUserTwo, mockPlatform: mockPlatformTwo } = await mockAndSaveBasicSetup() const mockOAuthApp = await createMockOAuthApp({ platformId: mockPlatformTwo.id, }) await databaseConnection().getRepository('user').update(mockUserTwo.id, { platformRole: PlatformRole.MEMBER, }) await databaseConnection().getRepository('oauth_app').save(mockOAuthApp) const testToken = await generateMockToken({ type: PrincipalType.USER, id: mockUserTwo.id, platform: { id: mockPlatformTwo.id }, }) // act const response = await app?.inject({ method: 'DELETE', url: `/v1/oauth-apps/${mockOAuthApp.id}`, headers: { authorization: `Bearer ${testToken}`, }, }) expect(response?.statusCode).toBe(StatusCodes.FORBIDDEN) }) it('By Id', async () => { // arrange const { mockOwner, mockPlatform } = await mockAndSaveBasicSetup() const mockOAuthApp = await createMockOAuthApp({ platformId: mockPlatform.id, }) await databaseConnection().getRepository('oauth_app').save(mockOAuthApp) const testToken = await generateMockToken({ type: PrincipalType.USER, id: mockOwner.id, platform: { id: mockPlatform.id }, }) // act const response = await app?.inject({ method: 'DELETE', url: `/v1/oauth-apps/${mockOAuthApp.id}`, headers: { authorization: `Bearer ${testToken}`, }, }) expect(response?.statusCode).toBe(StatusCodes.OK) }) }) describe('List OAuth Apps endpoint', () => { it('should list OAuth Apps by platform owner', async () => { // arrange const { mockOwner: mockUserOne, mockPlatform: mockPlatformOne } = await mockAndSaveBasicSetup() const mockOAuthAppsOne = await createMockOAuthApp({ platformId: mockPlatformOne.id, }) await databaseConnection() .getRepository('oauth_app') .save([mockOAuthAppsOne]) const testToken = await generateMockToken({ type: PrincipalType.USER, id: mockUserOne.id, platform: { id: mockPlatformOne.id }, }) // act const response = await app?.inject({ method: 'GET', url: '/v1/oauth-apps', headers: { authorization: `Bearer ${testToken}`, }, }) // assert const responseBody = response?.json() expect(response?.statusCode).toBe(StatusCodes.OK) expect(responseBody.data).toHaveLength(1) expect(responseBody.data[0].id).toBe(mockOAuthAppsOne.id) expect(responseBody.data[0].clientSecret).toBeUndefined() }) it('should list OAuth Apps by platform member', async () => { // arrange const { mockPlatform: mockPlatformOne } = await mockAndSaveBasicSetup() const { mockOwner: mockUserTwo, mockPlatform: mockPlatformTwo } = await mockAndSaveBasicSetup() const mockOAuthAppsOne = await createMockOAuthApp({ platformId: mockPlatformOne.id, }) const mockOAuthAppsTwo = await createMockOAuthApp({ platformId: mockPlatformTwo.id, }) await databaseConnection() .getRepository('oauth_app') .save([mockOAuthAppsOne, mockOAuthAppsTwo]) const testToken = await generateMockToken({ type: PrincipalType.USER, id: mockUserTwo.id, platform: { id: mockPlatformOne.id }, }) // act const response = await app?.inject({ method: 'GET', url: '/v1/oauth-apps', headers: { authorization: `Bearer ${testToken}`, }, }) // assert const responseBody = response?.json() expect(response?.statusCode).toBe(StatusCodes.OK) expect(responseBody.data).toHaveLength(1) expect(responseBody.data[0].id).toBe(mockOAuthAppsOne.id) expect(responseBody.data[0].clientSecret).toBeUndefined() }) }) })

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/activepieces/activepieces'

If you have feedback or need assistance with the MCP directory API, please join our Discord server