Skip to main content
Glama
routes.test.ts7.13 kB
// SPDX-FileCopyrightText: Copyright Orangebot, Inc. and Medplum contributors // SPDX-License-Identifier: Apache-2.0 import { ContentType, createReference } from '@medplum/core'; import type { AccessPolicy } from '@medplum/fhirtypes'; import { randomUUID } from 'crypto'; import express from 'express'; import request from 'supertest'; import { initApp, shutdownApp } from '../app'; import { registerNew } from '../auth/register'; import { loadTestConfig } from '../config/loader'; import { getSystemRepo } from '../fhir/repo'; import { addTestUser, withTestContext } from '../test.setup'; describe('SCIM Routes', () => { const app = express(); const systemRepo = getSystemRepo(); let accessToken: string; beforeAll(async () => { const config = await loadTestConfig(); await initApp(app, config); // First, Alice creates a project const registration = await registerNew({ firstName: 'Alice', lastName: 'Smith', projectName: 'Alice Project', email: `alice${randomUUID()}@example.com`, password: 'password!@#', }); accessToken = registration.accessToken; // Create default access policy const accessPolicy = await systemRepo.createResource<AccessPolicy>({ resourceType: 'AccessPolicy', resource: [{ resourceType: 'Patient' }], }); // Update project with default access policy await systemRepo.updateResource({ ...registration.project, defaultPatientAccessPolicy: createReference(accessPolicy), }); }); afterAll(async () => { await shutdownApp(); }); test('Search users', async () => { const res = await request(app) .get(`/scim/v2/Users`) .set('Authorization', 'Bearer ' + accessToken); expect(res.status).toBe(200); const result = res.body; expect(result.totalResults).toBeDefined(); expect(result.Resources).toBeDefined(); }); test('Create and update user', async () => { const res1 = await request(app) .post(`/scim/v2/Users`) .set('Authorization', 'Bearer ' + accessToken) .set('Content-Type', ContentType.SCIM_JSON) .send({ schemas: ['urn:ietf:params:scim:schemas:core:2.0:User'], userType: 'Patient', name: { givenName: 'SCIM', familyName: 'User', }, emails: [{ value: randomUUID() + '@example.com' }], }); expect(res1.status).toBe(201); const readResponse = await request(app) .get(`/scim/v2/Users/${res1.body.id}`) .set('Authorization', 'Bearer ' + accessToken); expect(readResponse.status).toBe(200); expect(readResponse.body.id).toBe(res1.body.id); const searchResponse = await request(app) .get(`/scim/v2/Users`) .set('Authorization', 'Bearer ' + accessToken); expect(searchResponse.status).toBe(200); const searchCheck = searchResponse.body.Resources.find((user: any) => user.id === res1.body.id); expect(searchCheck).toBeDefined(); const updateResponse = await request(app) .put(`/scim/v2/Users/${res1.body.id}`) .set('Authorization', 'Bearer ' + accessToken) .set('Content-Type', ContentType.SCIM_JSON) .send({ ...res1.body, externalId: randomUUID(), }); expect(updateResponse.status).toBe(200); expect(updateResponse.body.externalId).toBeDefined(); const deleteResponse = await request(app) .delete(`/scim/v2/Users/${res1.body.id}`) .set('Authorization', 'Bearer ' + accessToken); expect(deleteResponse.status).toBe(204); const searchResponse2 = await request(app) .get(`/scim/v2/Users`) .set('Authorization', 'Bearer ' + accessToken); expect(searchResponse2.status).toBe(200); const searchCheck2 = searchResponse2.body.Resources.find((user: any) => user.id === res1.body.id); expect(searchCheck2).toBeUndefined(); }); test('Create and patch user', async () => { const res1 = await request(app) .post(`/scim/v2/Users`) .set('Authorization', 'Bearer ' + accessToken) .set('Content-Type', ContentType.SCIM_JSON) .send({ schemas: ['urn:ietf:params:scim:schemas:core:2.0:User'], userType: 'Patient', name: { givenName: 'SCIM', familyName: 'User', }, emails: [{ value: randomUUID() + '@example.com' }], }); expect(res1.status).toBe(201); const readResponse = await request(app) .get(`/scim/v2/Users/${res1.body.id}`) .set('Authorization', 'Bearer ' + accessToken); expect(readResponse.status).toBe(200); expect(readResponse.body.id).toBe(res1.body.id); expect(readResponse.body.active).toBe(true); const searchResponse = await request(app) .get(`/scim/v2/Users`) .set('Authorization', 'Bearer ' + accessToken); expect(searchResponse.status).toBe(200); const searchCheck = searchResponse.body.Resources.find((user: any) => user.id === res1.body.id); expect(searchCheck).toBeDefined(); const patchResponse = await request(app) .patch(`/scim/v2/Users/${res1.body.id}`) .set('Authorization', 'Bearer ' + accessToken) .set('Content-Type', ContentType.SCIM_JSON) .send({ schemas: ['urn:ietf:params:scim:api:messages:2.0:PatchOp'], Operations: [ { op: 'replace', value: { active: false, }, }, ], }); expect(patchResponse.status).toBe(200); expect(patchResponse.body.active).toBe(false); }); test('Create, missing medplum user type, creates a Practitioner', async () => { const res = await request(app) .post(`/scim/v2/Users`) .set('Authorization', 'Bearer ' + accessToken) .set('Content-Type', ContentType.SCIM_JSON) .send({ schemas: ['urn:ietf:params:scim:schemas:core:2.0:User'], name: { givenName: 'SCIM', familyName: 'User', }, emails: [{ value: randomUUID() + '@example.com' }], }); expect(res.status).toBe(201); expect(res.body.userType).toBe('Practitioner'); }); test('Search users as super admin', async () => { // Create new project const registration = await withTestContext(async () => { const reg = await registerNew({ firstName: 'Alice', lastName: 'Smith', projectName: 'Alice Project', email: `alice${randomUUID()}@example.com`, password: 'password!@#', }); // Make the project super admin await systemRepo.updateResource({ ...reg.project, superAdmin: true, }); return reg; }); // Add another user // This user is a super admin // This user is not a project admin // They should still be allowed to use SCIM const { accessToken } = await addTestUser(registration.project); const res = await request(app) .get(`/scim/v2/Users`) .set('Authorization', 'Bearer ' + accessToken); expect(res.status).toBe(200); const result = res.body; expect(result.totalResults).toBeDefined(); expect(result.Resources).toBeDefined(); }); });

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/medplum/medplum'

If you have feedback or need assistance with the MCP directory API, please join our Discord server