@trailmix-cms/cms 0.4.4 → 0.7.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (266) hide show
  1. package/dist/auth.guard.d.ts +5 -13
  2. package/dist/auth.guard.d.ts.map +1 -1
  3. package/dist/auth.guard.js +23 -91
  4. package/dist/auth.guard.js.map +1 -1
  5. package/dist/collections/account.collection.d.ts +5 -3
  6. package/dist/collections/account.collection.d.ts.map +1 -1
  7. package/dist/collections/account.collection.js +15 -8
  8. package/dist/collections/account.collection.js.map +1 -1
  9. package/dist/collections/api-key.collection.d.ts +54 -0
  10. package/dist/collections/api-key.collection.d.ts.map +1 -0
  11. package/dist/collections/api-key.collection.js +142 -0
  12. package/dist/collections/api-key.collection.js.map +1 -0
  13. package/dist/collections/index.d.ts +4 -2
  14. package/dist/collections/index.d.ts.map +1 -1
  15. package/dist/collections/index.js +9 -5
  16. package/dist/collections/index.js.map +1 -1
  17. package/dist/collections/organization.collection.d.ts +20 -0
  18. package/dist/collections/organization.collection.d.ts.map +1 -0
  19. package/dist/collections/{file.collection.js → organization.collection.js} +17 -17
  20. package/dist/collections/organization.collection.js.map +1 -0
  21. package/dist/collections/role.collection.d.ts +32 -0
  22. package/dist/collections/role.collection.d.ts.map +1 -0
  23. package/dist/collections/role.collection.js +90 -0
  24. package/dist/collections/role.collection.js.map +1 -0
  25. package/dist/collections/security-audit.collection.d.ts +30 -0
  26. package/dist/collections/security-audit.collection.d.ts.map +1 -0
  27. package/dist/collections/security-audit.collection.js +79 -0
  28. package/dist/collections/security-audit.collection.js.map +1 -0
  29. package/dist/constants/cms-collection-names.d.ts +4 -2
  30. package/dist/constants/cms-collection-names.d.ts.map +1 -1
  31. package/dist/constants/cms-collection-names.js +4 -2
  32. package/dist/constants/cms-collection-names.js.map +1 -1
  33. package/dist/constants/provider-symbols.d.ts +10 -12
  34. package/dist/constants/provider-symbols.d.ts.map +1 -1
  35. package/dist/constants/provider-symbols.js +10 -12
  36. package/dist/constants/provider-symbols.js.map +1 -1
  37. package/dist/controllers/account.controller.d.ts +11 -15
  38. package/dist/controllers/account.controller.d.ts.map +1 -1
  39. package/dist/controllers/account.controller.js +69 -13
  40. package/dist/controllers/account.controller.js.map +1 -1
  41. package/dist/controllers/api-keys.controller.d.ts +13 -0
  42. package/dist/controllers/api-keys.controller.d.ts.map +1 -0
  43. package/dist/controllers/api-keys.controller.js +125 -0
  44. package/dist/controllers/api-keys.controller.js.map +1 -0
  45. package/dist/controllers/audit.controller.d.ts.map +1 -1
  46. package/dist/controllers/audit.controller.js +3 -3
  47. package/dist/controllers/audit.controller.js.map +1 -1
  48. package/dist/controllers/audits.controller.d.ts +10 -0
  49. package/dist/controllers/audits.controller.d.ts.map +1 -0
  50. package/dist/controllers/audits.controller.js +107 -0
  51. package/dist/controllers/audits.controller.js.map +1 -0
  52. package/dist/controllers/global-roles.controller.d.ts +16 -0
  53. package/dist/controllers/global-roles.controller.d.ts.map +1 -0
  54. package/dist/controllers/global-roles.controller.js +137 -0
  55. package/dist/controllers/global-roles.controller.js.map +1 -0
  56. package/dist/controllers/index.d.ts +6 -1
  57. package/dist/controllers/index.d.ts.map +1 -1
  58. package/dist/controllers/index.js +6 -1
  59. package/dist/controllers/index.js.map +1 -1
  60. package/dist/controllers/organization-roles.controller.d.ts +16 -0
  61. package/dist/controllers/organization-roles.controller.d.ts.map +1 -0
  62. package/dist/controllers/organization-roles.controller.js +145 -0
  63. package/dist/controllers/organization-roles.controller.js.map +1 -0
  64. package/dist/controllers/organizations.controller.d.ts +65 -0
  65. package/dist/controllers/organizations.controller.d.ts.map +1 -0
  66. package/dist/controllers/organizations.controller.js +140 -0
  67. package/dist/controllers/organizations.controller.js.map +1 -0
  68. package/dist/controllers/security-audits.controller.d.ts +11 -0
  69. package/dist/controllers/security-audits.controller.d.ts.map +1 -0
  70. package/dist/controllers/security-audits.controller.js +130 -0
  71. package/dist/controllers/security-audits.controller.js.map +1 -0
  72. package/dist/decorators/account.decorator.d.ts +1 -3
  73. package/dist/decorators/account.decorator.d.ts.map +1 -1
  74. package/dist/decorators/account.decorator.js +3 -10
  75. package/dist/decorators/account.decorator.js.map +1 -1
  76. package/dist/decorators/audit-context.decorator.d.ts +6 -0
  77. package/dist/decorators/audit-context.decorator.d.ts.map +1 -1
  78. package/dist/decorators/audit-context.decorator.js +12 -3
  79. package/dist/decorators/audit-context.decorator.js.map +1 -1
  80. package/dist/decorators/auth.decorator.d.ts +5 -3
  81. package/dist/decorators/auth.decorator.d.ts.map +1 -1
  82. package/dist/decorators/auth.decorator.js +38 -3
  83. package/dist/decorators/auth.decorator.js.map +1 -1
  84. package/dist/decorators/index.d.ts +4 -0
  85. package/dist/decorators/index.d.ts.map +1 -0
  86. package/dist/decorators/index.js +20 -0
  87. package/dist/decorators/index.js.map +1 -0
  88. package/dist/dto/account.dto.d.ts +33 -0
  89. package/dist/dto/account.dto.d.ts.map +1 -0
  90. package/dist/dto/account.dto.js +14 -0
  91. package/dist/dto/account.dto.js.map +1 -0
  92. package/dist/dto/api-key.dto.d.ts +89 -0
  93. package/dist/dto/api-key.dto.d.ts.map +1 -0
  94. package/dist/dto/api-key.dto.js +27 -0
  95. package/dist/dto/api-key.dto.js.map +1 -0
  96. package/dist/dto/audit.dto.d.ts +11 -5
  97. package/dist/dto/audit.dto.d.ts.map +1 -1
  98. package/dist/dto/audit.dto.js +1 -1
  99. package/dist/dto/audit.dto.js.map +1 -1
  100. package/dist/dto/global-role.dto.d.ts +99 -0
  101. package/dist/dto/global-role.dto.d.ts.map +1 -0
  102. package/dist/dto/global-role.dto.js +26 -0
  103. package/dist/dto/global-role.dto.js.map +1 -0
  104. package/dist/dto/organization-role.dto.d.ts +107 -0
  105. package/dist/dto/organization-role.dto.d.ts.map +1 -0
  106. package/dist/dto/organization-role.dto.js +26 -0
  107. package/dist/dto/organization-role.dto.js.map +1 -0
  108. package/dist/dto/organization.dto.d.ts +57 -0
  109. package/dist/dto/organization.dto.d.ts.map +1 -0
  110. package/dist/dto/organization.dto.js +32 -0
  111. package/dist/dto/organization.dto.js.map +1 -0
  112. package/dist/dto/security-audit.dto.d.ts +95 -0
  113. package/dist/dto/security-audit.dto.d.ts.map +1 -0
  114. package/dist/dto/security-audit.dto.js +26 -0
  115. package/dist/dto/security-audit.dto.js.map +1 -0
  116. package/dist/index.d.ts +7 -2
  117. package/dist/index.d.ts.map +1 -1
  118. package/dist/index.js +8 -3
  119. package/dist/index.js.map +1 -1
  120. package/dist/managers/global-role.manager.d.ts +42 -0
  121. package/dist/managers/global-role.manager.d.ts.map +1 -0
  122. package/dist/managers/global-role.manager.js +117 -0
  123. package/dist/managers/global-role.manager.js.map +1 -0
  124. package/dist/managers/index.d.ts +4 -0
  125. package/dist/managers/index.d.ts.map +1 -0
  126. package/dist/managers/index.js +20 -0
  127. package/dist/managers/index.js.map +1 -0
  128. package/dist/managers/organization-role.manager.d.ts +47 -0
  129. package/dist/managers/organization-role.manager.d.ts.map +1 -0
  130. package/dist/managers/organization-role.manager.js +218 -0
  131. package/dist/managers/organization-role.manager.js.map +1 -0
  132. package/dist/managers/organization.manager.d.ts +39 -0
  133. package/dist/managers/organization.manager.d.ts.map +1 -0
  134. package/dist/managers/organization.manager.js +196 -0
  135. package/dist/managers/organization.manager.js.map +1 -0
  136. package/dist/module.d.ts +92 -0
  137. package/dist/module.d.ts.map +1 -0
  138. package/dist/module.js +137 -0
  139. package/dist/module.js.map +1 -0
  140. package/dist/pipes/api-key.pipe.d.ts +8 -0
  141. package/dist/pipes/api-key.pipe.d.ts.map +1 -0
  142. package/dist/pipes/api-key.pipe.js +28 -0
  143. package/dist/pipes/api-key.pipe.js.map +1 -0
  144. package/dist/pipes/organization.pipe.d.ts +8 -0
  145. package/dist/pipes/organization.pipe.d.ts.map +1 -0
  146. package/dist/pipes/organization.pipe.js +28 -0
  147. package/dist/pipes/organization.pipe.js.map +1 -0
  148. package/dist/pipes/role.pipe.d.ts +8 -0
  149. package/dist/pipes/{file.pipe.d.ts.map → role.pipe.d.ts.map} +1 -1
  150. package/dist/pipes/{file.pipe.js → role.pipe.js} +8 -8
  151. package/dist/pipes/{file.pipe.js.map → role.pipe.js.map} +1 -1
  152. package/dist/services/account.service.d.ts +0 -2
  153. package/dist/services/account.service.d.ts.map +1 -1
  154. package/dist/services/account.service.js +1 -37
  155. package/dist/services/account.service.js.map +1 -1
  156. package/dist/services/api-key.service.d.ts +42 -0
  157. package/dist/services/api-key.service.d.ts.map +1 -0
  158. package/dist/services/api-key.service.js +306 -0
  159. package/dist/services/api-key.service.js.map +1 -0
  160. package/dist/services/auth.service.d.ts +40 -0
  161. package/dist/services/auth.service.d.ts.map +1 -0
  162. package/dist/services/auth.service.js +227 -0
  163. package/dist/services/auth.service.js.map +1 -0
  164. package/dist/services/authorization.service.d.ts +44 -9
  165. package/dist/services/authorization.service.d.ts.map +1 -1
  166. package/dist/services/authorization.service.js +107 -41
  167. package/dist/services/authorization.service.js.map +1 -1
  168. package/dist/services/feature.service.d.ts +23 -0
  169. package/dist/services/feature.service.d.ts.map +1 -0
  170. package/dist/services/feature.service.js +49 -0
  171. package/dist/services/feature.service.js.map +1 -0
  172. package/dist/services/global-role.service.d.ts +17 -0
  173. package/dist/services/global-role.service.d.ts.map +1 -0
  174. package/dist/services/global-role.service.js +99 -0
  175. package/dist/services/global-role.service.js.map +1 -0
  176. package/dist/services/index.d.ts +9 -0
  177. package/dist/services/index.d.ts.map +1 -0
  178. package/dist/services/index.js +25 -0
  179. package/dist/services/index.js.map +1 -0
  180. package/dist/services/organization-role.service.d.ts +33 -0
  181. package/dist/services/organization-role.service.d.ts.map +1 -0
  182. package/dist/services/organization-role.service.js +102 -0
  183. package/dist/services/organization-role.service.js.map +1 -0
  184. package/dist/services/organization.service.d.ts +29 -0
  185. package/dist/services/organization.service.d.ts.map +1 -0
  186. package/dist/services/organization.service.js +95 -0
  187. package/dist/services/organization.service.js.map +1 -0
  188. package/dist/types/feature-config.d.ts +9 -0
  189. package/dist/types/feature-config.d.ts.map +1 -0
  190. package/dist/types/feature-config.js +3 -0
  191. package/dist/types/feature-config.js.map +1 -0
  192. package/dist/types/hooks/auth-guard-hook.d.ts.map +1 -0
  193. package/dist/types/hooks/auth-guard-hook.js.map +1 -0
  194. package/dist/types/hooks/index.d.ts +3 -0
  195. package/dist/types/hooks/index.d.ts.map +1 -0
  196. package/dist/types/hooks/index.js +19 -0
  197. package/dist/types/hooks/index.js.map +1 -0
  198. package/dist/types/hooks/organization-delete-hook.d.ts +20 -0
  199. package/dist/types/hooks/organization-delete-hook.d.ts.map +1 -0
  200. package/dist/types/hooks/organization-delete-hook.js +3 -0
  201. package/dist/types/hooks/organization-delete-hook.js.map +1 -0
  202. package/dist/types/index.d.ts +5 -0
  203. package/dist/types/index.d.ts.map +1 -0
  204. package/dist/types/index.js +21 -0
  205. package/dist/types/index.js.map +1 -0
  206. package/dist/types/request-principal.d.ts +9 -0
  207. package/dist/types/request-principal.d.ts.map +1 -0
  208. package/dist/types/request-principal.js +3 -0
  209. package/dist/types/request-principal.js.map +1 -0
  210. package/dist/utils/provider-helpers.d.ts +6 -1
  211. package/dist/utils/provider-helpers.d.ts.map +1 -1
  212. package/dist/utils/provider-helpers.js +11 -1
  213. package/dist/utils/provider-helpers.js.map +1 -1
  214. package/package.json +52 -17
  215. package/test/unit/collections/api-key.collection.spec.ts +416 -0
  216. package/test/unit/managers/global-role.manager.spec.ts +269 -0
  217. package/test/unit/managers/organization-role.manager.spec.ts +632 -0
  218. package/test/unit/managers/organization.manager.spec.ts +395 -0
  219. package/test/unit/module.spec.ts +596 -0
  220. package/test/unit/services/account.service.spec.ts +90 -0
  221. package/test/unit/services/api-key.service.spec.ts +1244 -0
  222. package/test/unit/services/auth.service.spec.ts +790 -0
  223. package/test/unit/services/authorization.service.spec.ts +636 -0
  224. package/test/unit/services/feature.service.spec.ts +56 -0
  225. package/test/unit/services/global-role.service.spec.ts +289 -0
  226. package/test/unit/services/organization-role.service.spec.ts +300 -0
  227. package/test/unit/services/organization.service.spec.ts +385 -0
  228. package/test/utils/auth-guard.ts +114 -0
  229. package/test/utils/base.ts +16 -0
  230. package/test/utils/entities/account.ts +13 -0
  231. package/test/utils/entities/api-key.ts +15 -0
  232. package/test/utils/entities/audit.ts +18 -0
  233. package/test/utils/entities/index.ts +6 -0
  234. package/test/utils/entities/mapping.ts +20 -0
  235. package/test/utils/entities/organization.ts +13 -0
  236. package/test/utils/entities/role.ts +21 -0
  237. package/test/utils/entities/security-audit.ts +16 -0
  238. package/test/utils/index.ts +4 -0
  239. package/test/utils/models/audit-context.ts +10 -0
  240. package/test/utils/models/authorization.ts +7 -0
  241. package/test/utils/models/global-role.ts +22 -0
  242. package/test/utils/models/index.ts +5 -0
  243. package/test/utils/models/organization-role.ts +23 -0
  244. package/test/utils/models/publishable.ts +7 -0
  245. package/tsconfig.build.json +36 -0
  246. package/tsconfig.build.tsbuildinfo +1 -0
  247. package/dist/auth-guard-hook.d.ts.map +0 -1
  248. package/dist/auth-guard-hook.js.map +0 -1
  249. package/dist/cms.module.d.ts +0 -8
  250. package/dist/cms.module.d.ts.map +0 -1
  251. package/dist/cms.module.js +0 -44
  252. package/dist/cms.module.js.map +0 -1
  253. package/dist/cms.providers.d.ts +0 -120
  254. package/dist/cms.providers.d.ts.map +0 -1
  255. package/dist/cms.providers.js +0 -126
  256. package/dist/cms.providers.js.map +0 -1
  257. package/dist/collections/file.collection.d.ts +0 -21
  258. package/dist/collections/file.collection.d.ts.map +0 -1
  259. package/dist/collections/file.collection.js.map +0 -1
  260. package/dist/collections/text.collection.d.ts +0 -20
  261. package/dist/collections/text.collection.d.ts.map +0 -1
  262. package/dist/collections/text.collection.js +0 -56
  263. package/dist/collections/text.collection.js.map +0 -1
  264. package/dist/pipes/file.pipe.d.ts +0 -8
  265. /package/dist/{auth-guard-hook.d.ts → types/hooks/auth-guard-hook.d.ts} +0 -0
  266. /package/dist/{auth-guard-hook.js → types/hooks/auth-guard-hook.js} +0 -0
@@ -0,0 +1,395 @@
1
+ import { Test, TestingModule } from '@nestjs/testing';
2
+ import { NotFoundException, ForbiddenException, InternalServerErrorException, Logger } from '@nestjs/common';
3
+ import { ObjectId } from 'mongodb';
4
+ import * as trailmixModels from '@trailmix-cms/models';
5
+
6
+ import * as TestUtils from '../../utils';
7
+
8
+ import { OrganizationManager } from '@/managers';
9
+ import { OrganizationCollection, SecurityAuditCollection } from '@/collections';
10
+ import { AuthorizationService, OrganizationRoleService, OrganizationService } from '@/services';
11
+ import { RequestPrincipal } from '@/types';
12
+ import { createAuditContextForPrincipal } from '@/decorators/audit-context.decorator';
13
+
14
+ describe('OrganizationManager', () => {
15
+ let manager: OrganizationManager;
16
+ let organizationCollection: jest.Mocked<OrganizationCollection>;
17
+ let authorizationService: jest.Mocked<AuthorizationService>;
18
+ let organizationRoleService: jest.Mocked<OrganizationRoleService>;
19
+ let organizationService: jest.Mocked<OrganizationService>;
20
+ let securityAuditCollection: jest.Mocked<SecurityAuditCollection>;
21
+
22
+ const accountEntity = TestUtils.Entities.createAccount();
23
+ const accountPrincipal: RequestPrincipal = {
24
+ principal_type: trailmixModels.Principal.Account,
25
+ entity: accountEntity,
26
+ };
27
+ const auditContext = createAuditContextForPrincipal(accountPrincipal);
28
+ const organizationId = new ObjectId();
29
+
30
+ beforeEach(async () => {
31
+ // Mock Logger methods to prevent console output during tests
32
+ jest.spyOn(Logger.prototype, 'log').mockImplementation();
33
+ jest.spyOn(Logger.prototype, 'error').mockImplementation();
34
+ jest.spyOn(Logger.prototype, 'warn').mockImplementation();
35
+ jest.spyOn(Logger.prototype, 'debug').mockImplementation();
36
+ jest.spyOn(Logger.prototype, 'verbose').mockImplementation();
37
+
38
+ const mockOrganizationCollection = {
39
+ find: jest.fn(),
40
+ get: jest.fn(),
41
+ findOneAndUpdate: jest.fn(),
42
+ };
43
+
44
+ const mockAuthorizationService = {
45
+ isGlobalAdmin: jest.fn(),
46
+ resolveAuthorization: jest.fn(),
47
+ resolveOrganizationAuthorization: jest.fn(),
48
+ };
49
+
50
+ const mockOrganizationRoleService = {
51
+ find: jest.fn(),
52
+ };
53
+
54
+ const mockOrganizationService = {
55
+ deleteOrganization: jest.fn(),
56
+ };
57
+
58
+ const mockSecurityAuditCollection = {
59
+ insertOne: jest.fn().mockResolvedValue(undefined),
60
+ };
61
+
62
+ const module: TestingModule = await Test.createTestingModule({
63
+ providers: [
64
+ OrganizationManager,
65
+ {
66
+ provide: OrganizationCollection,
67
+ useValue: mockOrganizationCollection,
68
+ },
69
+ {
70
+ provide: AuthorizationService,
71
+ useValue: mockAuthorizationService,
72
+ },
73
+ {
74
+ provide: OrganizationRoleService,
75
+ useValue: mockOrganizationRoleService,
76
+ },
77
+ {
78
+ provide: OrganizationService,
79
+ useValue: mockOrganizationService,
80
+ },
81
+ {
82
+ provide: SecurityAuditCollection,
83
+ useValue: mockSecurityAuditCollection,
84
+ },
85
+ ],
86
+ }).compile();
87
+
88
+ manager = module.get<OrganizationManager>(OrganizationManager);
89
+ organizationCollection = module.get(OrganizationCollection);
90
+ authorizationService = module.get(AuthorizationService);
91
+ organizationRoleService = module.get(OrganizationRoleService);
92
+ organizationService = module.get(OrganizationService);
93
+ securityAuditCollection = module.get(SecurityAuditCollection);
94
+ });
95
+
96
+ afterEach(() => {
97
+ jest.clearAllMocks();
98
+ });
99
+
100
+ afterAll(() => {
101
+ jest.restoreAllMocks();
102
+ });
103
+
104
+ describe('find', () => {
105
+ const filter = {};
106
+
107
+ it('returns all organizations when user is global admin (ensuring global admin can view all organizations)', async () => {
108
+ const organizations = [
109
+ TestUtils.Entities.createOrganization(),
110
+ TestUtils.Entities.createOrganization(),
111
+ ];
112
+ authorizationService.isGlobalAdmin.mockResolvedValue(true);
113
+ organizationCollection.find.mockResolvedValue(organizations);
114
+
115
+ const result = await manager.find(filter, accountPrincipal);
116
+
117
+ expect(authorizationService.isGlobalAdmin).toHaveBeenCalledWith(
118
+ accountEntity._id,
119
+ accountPrincipal.principal_type,
120
+ );
121
+ expect(organizationCollection.find).toHaveBeenCalledWith(filter);
122
+ expect(result).toEqual(organizations);
123
+ });
124
+
125
+ it('returns only organizations user belongs to when user is not global admin (ensuring non-global admin can only view organizations they belong to)', async () => {
126
+ const organization1 = TestUtils.Entities.createOrganization({ _id: organizationId });
127
+ const organizationRoles = [
128
+ TestUtils.Models.createOrganizationRoleModel({
129
+ organization_id: organizationId,
130
+ principal_id: accountEntity._id,
131
+ principal_type: accountPrincipal.principal_type,
132
+ role: trailmixModels.RoleValue.User,
133
+ }),
134
+ ];
135
+ authorizationService.isGlobalAdmin.mockResolvedValue(false);
136
+ organizationRoleService.find.mockResolvedValue(organizationRoles);
137
+ organizationCollection.find.mockResolvedValue([organization1]);
138
+
139
+ const result = await manager.find(filter, accountPrincipal);
140
+
141
+ expect(authorizationService.isGlobalAdmin).toHaveBeenCalled();
142
+ expect(organizationRoleService.find).toHaveBeenCalledWith({
143
+ principal_id: accountEntity._id,
144
+ principal_type: accountPrincipal.principal_type,
145
+ role: {
146
+ $in: [
147
+ trailmixModels.RoleValue.Owner,
148
+ trailmixModels.RoleValue.Admin,
149
+ trailmixModels.RoleValue.User,
150
+ trailmixModels.RoleValue.Reader,
151
+ ],
152
+ },
153
+ });
154
+ expect(organizationCollection.find).toHaveBeenCalledWith({
155
+ ...filter,
156
+ _id: { $in: [organizationId] },
157
+ });
158
+ expect(result).toEqual([organization1]);
159
+ });
160
+
161
+ it('returns empty array when user has no organization roles (ensuring no organizations are returned when user has no organization roles)', async () => {
162
+ authorizationService.isGlobalAdmin.mockResolvedValue(false);
163
+ organizationRoleService.find.mockResolvedValue([]);
164
+
165
+ const result = await manager.find(filter, accountPrincipal);
166
+
167
+ expect(organizationRoleService.find).toHaveBeenCalled();
168
+ expect(organizationCollection.find).not.toHaveBeenCalled();
169
+ expect(result).toEqual([]);
170
+ });
171
+ });
172
+
173
+ describe('get', () => {
174
+ const organization = TestUtils.Entities.createOrganization({ _id: organizationId });
175
+
176
+ it('successfully gets an organization when user has reader access (ensuring reader access allows viewing organizations)', async () => {
177
+ const readerRole = TestUtils.Models.createOrganizationRoleModel({
178
+ principal_id: accountEntity._id,
179
+ principal_type: accountPrincipal.principal_type,
180
+ organization_id: organizationId,
181
+ role: trailmixModels.RoleValue.Reader,
182
+ });
183
+ authorizationService.resolveOrganizationAuthorization.mockResolvedValue({
184
+ hasAccess: true,
185
+ isGlobalAdmin: false,
186
+ globalRoles: [],
187
+ organizationRoles: [readerRole],
188
+ });
189
+
190
+ const result = await manager.get(organization, accountPrincipal);
191
+
192
+ expect(authorizationService.resolveOrganizationAuthorization).toHaveBeenCalledWith({
193
+ principal: accountPrincipal,
194
+ rolesAllowList: [
195
+ trailmixModels.RoleValue.Owner,
196
+ trailmixModels.RoleValue.Admin,
197
+ trailmixModels.RoleValue.User,
198
+ trailmixModels.RoleValue.Reader,
199
+ ],
200
+ principalTypeAllowList: [trailmixModels.Principal.Account, trailmixModels.Principal.ApiKey],
201
+ organizationId: organizationId,
202
+ });
203
+ expect(result).toEqual(organization);
204
+ });
205
+
206
+ it('throws NotFoundException when user does not have access (ensuring user with no access is rejected)', async () => {
207
+ authorizationService.resolveOrganizationAuthorization.mockResolvedValue({
208
+ hasAccess: false,
209
+ isGlobalAdmin: false,
210
+ globalRoles: [],
211
+ organizationRoles: [],
212
+ });
213
+
214
+ await expect(
215
+ manager.get(organization, accountPrincipal)
216
+ ).rejects.toThrow(NotFoundException);
217
+
218
+ expect(authorizationService.resolveOrganizationAuthorization).toHaveBeenCalled();
219
+ expect(securityAuditCollection.insertOne).toHaveBeenCalled();
220
+ });
221
+ });
222
+
223
+ describe('update', () => {
224
+ const organization = TestUtils.Entities.createOrganization({ _id: organizationId });
225
+ const update = { name: 'Updated Organization Name' };
226
+
227
+ it('successfully updates an organization when user has admin access (ensuring admin access allows updating organizations)', async () => {
228
+ const updatedOrganization = TestUtils.Entities.createOrganization({
229
+ _id: organizationId,
230
+ name: 'Updated Organization Name',
231
+ });
232
+ const adminRole = TestUtils.Models.createOrganizationRoleModel({
233
+ principal_id: accountEntity._id,
234
+ principal_type: accountPrincipal.principal_type,
235
+ organization_id: organizationId,
236
+ role: trailmixModels.RoleValue.Admin,
237
+ });
238
+ authorizationService.resolveOrganizationAuthorization.mockResolvedValue({
239
+ hasAccess: true,
240
+ isGlobalAdmin: false,
241
+ globalRoles: [],
242
+ organizationRoles: [adminRole],
243
+ });
244
+ organizationCollection.findOneAndUpdate.mockResolvedValue(updatedOrganization);
245
+
246
+ const result = await manager.update(organization, update, accountPrincipal, auditContext);
247
+
248
+ expect(authorizationService.resolveOrganizationAuthorization).toHaveBeenCalledWith({
249
+ principal: accountPrincipal,
250
+ rolesAllowList: [trailmixModels.RoleValue.Admin, trailmixModels.RoleValue.Owner],
251
+ principalTypeAllowList: [trailmixModels.Principal.Account, trailmixModels.Principal.ApiKey],
252
+ organizationId: organizationId,
253
+ });
254
+ expect(organizationCollection.findOneAndUpdate).toHaveBeenCalledWith(
255
+ { _id: organizationId },
256
+ update,
257
+ auditContext,
258
+ );
259
+ expect(result).toEqual(updatedOrganization);
260
+ });
261
+
262
+ it('throws ForbiddenException when user has organization access but not admin role (ensuring only admins can update organizations)', async () => {
263
+ const readerRole = TestUtils.Models.createOrganizationRoleModel({
264
+ principal_id: accountEntity._id,
265
+ principal_type: accountPrincipal.principal_type,
266
+ organization_id: organizationId,
267
+ role: trailmixModels.RoleValue.Reader,
268
+ });
269
+ authorizationService.resolveOrganizationAuthorization.mockResolvedValue({
270
+ hasAccess: false,
271
+ isGlobalAdmin: false,
272
+ globalRoles: [],
273
+ organizationRoles: [readerRole],
274
+ });
275
+
276
+ await expect(
277
+ manager.update(organization, update, accountPrincipal, auditContext)
278
+ ).rejects.toThrow(ForbiddenException);
279
+
280
+ expect(authorizationService.resolveOrganizationAuthorization).toHaveBeenCalled();
281
+ expect(organizationCollection.findOneAndUpdate).not.toHaveBeenCalled();
282
+ expect(securityAuditCollection.insertOne).toHaveBeenCalled();
283
+ });
284
+
285
+ it('throws NotFoundException when user has no organization access (ensuring user with no access is rejected)', async () => {
286
+ authorizationService.resolveOrganizationAuthorization.mockResolvedValue({
287
+ hasAccess: false,
288
+ isGlobalAdmin: false,
289
+ globalRoles: [],
290
+ organizationRoles: [],
291
+ });
292
+
293
+ await expect(
294
+ manager.update(organization, update, accountPrincipal, auditContext)
295
+ ).rejects.toThrow(NotFoundException);
296
+
297
+ expect(authorizationService.resolveOrganizationAuthorization).toHaveBeenCalled();
298
+ expect(organizationCollection.findOneAndUpdate).not.toHaveBeenCalled();
299
+ });
300
+
301
+ it('throws InternalServerErrorException when organization is not found after update (unlikely race condition)', async () => {
302
+ const adminRole = TestUtils.Models.createOrganizationRoleModel({
303
+ principal_id: accountEntity._id,
304
+ principal_type: accountPrincipal.principal_type,
305
+ organization_id: organizationId,
306
+ role: trailmixModels.RoleValue.Admin,
307
+ });
308
+ authorizationService.resolveOrganizationAuthorization.mockResolvedValue({
309
+ hasAccess: true,
310
+ isGlobalAdmin: false,
311
+ globalRoles: [],
312
+ organizationRoles: [adminRole],
313
+ });
314
+ organizationCollection.findOneAndUpdate.mockResolvedValue(undefined as any);
315
+
316
+ await expect(
317
+ manager.update(organization, update, accountPrincipal, auditContext)
318
+ ).rejects.toThrow(InternalServerErrorException);
319
+
320
+ expect(organizationCollection.findOneAndUpdate).toHaveBeenCalled();
321
+ });
322
+ });
323
+
324
+ describe('delete', () => {
325
+ const organization = TestUtils.Entities.createOrganization({ _id: organizationId });
326
+
327
+ it('successfully deletes an organization when user has admin access (ensuring admin access allows deleting organizations)', async () => {
328
+ const adminRole = TestUtils.Models.createOrganizationRoleModel({
329
+ principal_id: accountEntity._id,
330
+ principal_type: accountPrincipal.principal_type,
331
+ organization_id: organizationId,
332
+ role: trailmixModels.RoleValue.Admin,
333
+ });
334
+ authorizationService.resolveOrganizationAuthorization.mockResolvedValue({
335
+ hasAccess: true,
336
+ isGlobalAdmin: false,
337
+ globalRoles: [],
338
+ organizationRoles: [adminRole],
339
+ });
340
+ organizationService.deleteOrganization.mockResolvedValue({
341
+ organizationDeleted: true,
342
+ rolesDeletedCount: 2,
343
+ });
344
+
345
+ await manager.delete(organization, accountPrincipal, auditContext);
346
+
347
+ expect(authorizationService.resolveOrganizationAuthorization).toHaveBeenCalledWith({
348
+ principal: accountPrincipal,
349
+ rolesAllowList: [trailmixModels.RoleValue.Admin, trailmixModels.RoleValue.Owner],
350
+ principalTypeAllowList: [trailmixModels.Principal.Account, trailmixModels.Principal.ApiKey],
351
+ organizationId: organizationId,
352
+ });
353
+ expect(organizationService.deleteOrganization).toHaveBeenCalledWith(organizationId, auditContext);
354
+ });
355
+
356
+ it('throws ForbiddenException when user has organization access but not admin role (ensuring only admins can delete organizations)', async () => {
357
+ const readerRole = TestUtils.Models.createOrganizationRoleModel({
358
+ principal_id: accountEntity._id,
359
+ principal_type: accountPrincipal.principal_type,
360
+ organization_id: organizationId,
361
+ role: trailmixModels.RoleValue.Reader,
362
+ });
363
+ authorizationService.resolveOrganizationAuthorization.mockResolvedValue({
364
+ hasAccess: false,
365
+ isGlobalAdmin: false,
366
+ globalRoles: [],
367
+ organizationRoles: [readerRole],
368
+ });
369
+
370
+ await expect(
371
+ manager.delete(organization, accountPrincipal, auditContext)
372
+ ).rejects.toThrow(ForbiddenException);
373
+
374
+ expect(authorizationService.resolveOrganizationAuthorization).toHaveBeenCalled();
375
+ expect(organizationService.deleteOrganization).not.toHaveBeenCalled();
376
+ expect(securityAuditCollection.insertOne).toHaveBeenCalled();
377
+ });
378
+
379
+ it('throws NotFoundException when user has no organization access (ensuring user with no access is rejected)', async () => {
380
+ authorizationService.resolveOrganizationAuthorization.mockResolvedValue({
381
+ hasAccess: false,
382
+ isGlobalAdmin: false,
383
+ globalRoles: [],
384
+ organizationRoles: [],
385
+ });
386
+
387
+ await expect(
388
+ manager.delete(organization, accountPrincipal, auditContext)
389
+ ).rejects.toThrow(NotFoundException);
390
+
391
+ expect(authorizationService.resolveOrganizationAuthorization).toHaveBeenCalled();
392
+ expect(organizationService.deleteOrganization).not.toHaveBeenCalled();
393
+ });
394
+ });
395
+ });