mirror of
https://github.com/formbricks/formbricks.git
synced 2025-12-23 06:30:51 -06:00
Compare commits
131 Commits
fix-back-b
...
3.17.2
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
3eee5bb50f | ||
|
|
d341370b0d | ||
|
|
391b3a3fb0 | ||
|
|
0bcd85d658 | ||
|
|
f59df49588 | ||
|
|
f08fabfb13 | ||
|
|
ee8af9dd74 | ||
|
|
1091b40bd1 | ||
|
|
87a2d727ed | ||
|
|
4786ab61e7 | ||
|
|
819380d21c | ||
|
|
fd3fedb6ed | ||
|
|
88b1e63771 | ||
|
|
3132fe74f1 | ||
|
|
a27a2a67c8 | ||
|
|
4a7ace5a0a | ||
|
|
43628caa3b | ||
|
|
9d84bc0c8d | ||
|
|
babc020085 | ||
|
|
95ee83ef31 | ||
|
|
d994af2dfd | ||
|
|
4b5b5bf59f | ||
|
|
62166dc4b1 | ||
|
|
ec6d88bf11 | ||
|
|
c0240d60a1 | ||
|
|
cd2884d83e | ||
|
|
f7aea2e706 | ||
|
|
e80fc2ee61 | ||
|
|
9b489b0682 | ||
|
|
2ee0efa1c2 | ||
|
|
9ffd67262c | ||
|
|
68dc63ce0b | ||
|
|
f239ee9697 | ||
|
|
282b3e070c | ||
|
|
b5f0bd8f9a | ||
|
|
3784bd6b5e | ||
|
|
41d27c2093 | ||
|
|
7400ce2e67 | ||
|
|
355782f404 | ||
|
|
de70e97940 | ||
|
|
287c45f996 | ||
|
|
3b07a6d013 | ||
|
|
0cc2606ec6 | ||
|
|
0fada94b80 | ||
|
|
a59ede20c7 | ||
|
|
84294f9df2 | ||
|
|
855e7c78ce | ||
|
|
6c506d90c7 | ||
|
|
53f6e02ca1 | ||
|
|
14de2eab42 | ||
|
|
ad1f80331a | ||
|
|
3527ac337b | ||
|
|
23c2d3dce9 | ||
|
|
da652bd860 | ||
|
|
6f88dde1a0 | ||
|
|
3b90223101 | ||
|
|
e29a67b1f6 | ||
|
|
78f5de2f35 | ||
|
|
b1a35d4a69 | ||
|
|
2166c44470 | ||
|
|
080cf741e9 | ||
|
|
8881691509 | ||
|
|
3045f4437f | ||
|
|
91ace0e821 | ||
|
|
6ef281647a | ||
|
|
0aaaaa54ee | ||
|
|
b1f78e7bf2 | ||
|
|
7086ce2ca3 | ||
|
|
8f8b549b1d | ||
|
|
28514487e0 | ||
|
|
ee20af54c3 | ||
|
|
d08ec4c9ab | ||
|
|
891c83e232 | ||
|
|
0b02b00b72 | ||
|
|
a217cdd501 | ||
|
|
ebe50a4821 | ||
|
|
cb68d9defc | ||
|
|
c42a706789 | ||
|
|
3803111b19 | ||
|
|
30fdcff737 | ||
|
|
e83cfa85a4 | ||
|
|
eee9ee8995 | ||
|
|
ed89f12af8 | ||
|
|
f043314537 | ||
|
|
2ce842dd8d | ||
|
|
43b43839c5 | ||
|
|
8b6e3fec37 | ||
|
|
31bcf98779 | ||
|
|
b35cabcbcc | ||
|
|
4f435f1a1f | ||
|
|
99c1e434df | ||
|
|
b13699801b | ||
|
|
ceb2e85d96 | ||
|
|
c5f8b5ec32 | ||
|
|
bdbd57c2fc | ||
|
|
d44aa17814 | ||
|
|
23d38b4c5b | ||
|
|
58213969e8 | ||
|
|
ef973c8995 | ||
|
|
bea02ba3b5 | ||
|
|
1c1e2ee09c | ||
|
|
2bf7fe6c54 | ||
|
|
9639402c39 | ||
|
|
53213b41ee | ||
|
|
b8b5eead7a | ||
|
|
a0044ce376 | ||
|
|
b3a1f24683 | ||
|
|
f06d48698a | ||
|
|
acd508ba19 | ||
|
|
e5591686b4 | ||
|
|
7be7466eee | ||
|
|
8af6c15998 | ||
|
|
17d60eb1e7 | ||
|
|
d6ecafbc23 | ||
|
|
599e847686 | ||
|
|
4e52556f7e | ||
|
|
492a59e7de | ||
|
|
e0be53805e | ||
|
|
5c2860d1a4 | ||
|
|
18ba5bbd8a | ||
|
|
572b613034 | ||
|
|
a9c7140ba6 | ||
|
|
7fa95cd74a | ||
|
|
8c7f36d496 | ||
|
|
42dcbd3e7e | ||
|
|
1c1cd99510 | ||
|
|
b0a7e212dd | ||
|
|
0c1f6f3c3a | ||
|
|
9399b526b8 | ||
|
|
cd60032bc9 | ||
|
|
a941f994ea |
@@ -18,7 +18,6 @@ apps/web/
|
|||||||
│ ├── (app)/ # Main application routes
|
│ ├── (app)/ # Main application routes
|
||||||
│ ├── (auth)/ # Authentication routes
|
│ ├── (auth)/ # Authentication routes
|
||||||
│ ├── api/ # API routes
|
│ ├── api/ # API routes
|
||||||
│ └── share/ # Public sharing routes
|
|
||||||
├── components/ # Shared components
|
├── components/ # Shared components
|
||||||
├── lib/ # Utility functions and services
|
├── lib/ # Utility functions and services
|
||||||
└── modules/ # Feature-specific modules
|
└── modules/ # Feature-specific modules
|
||||||
@@ -43,7 +42,6 @@ The application uses Next.js 13+ app router with route groups:
|
|||||||
### Dynamic Routes
|
### Dynamic Routes
|
||||||
- `[environmentId]` - Environment-specific routes
|
- `[environmentId]` - Environment-specific routes
|
||||||
- `[surveyId]` - Survey-specific routes
|
- `[surveyId]` - Survey-specific routes
|
||||||
- `[sharingKey]` - Public sharing routes
|
|
||||||
|
|
||||||
## Service Layer Pattern
|
## Service Layer Pattern
|
||||||
|
|
||||||
|
|||||||
232
.cursor/rules/github-actions-security.mdc
Normal file
232
.cursor/rules/github-actions-security.mdc
Normal file
@@ -0,0 +1,232 @@
|
|||||||
|
---
|
||||||
|
description: Security best practices and guidelines for writing GitHub Actions and workflows
|
||||||
|
globs: .github/workflows/*.yml,.github/workflows/*.yaml,.github/actions/*/action.yml,.github/actions/*/action.yaml
|
||||||
|
---
|
||||||
|
|
||||||
|
# GitHub Actions Security Best Practices
|
||||||
|
|
||||||
|
## Required Security Measures
|
||||||
|
|
||||||
|
### 1. Set Minimum GITHUB_TOKEN Permissions
|
||||||
|
|
||||||
|
Always explicitly set the minimum required permissions for GITHUB_TOKEN:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
# Only add additional permissions if absolutely necessary:
|
||||||
|
# pull-requests: write # for commenting on PRs
|
||||||
|
# issues: write # for creating/updating issues
|
||||||
|
# checks: write # for publishing check results
|
||||||
|
```
|
||||||
|
|
||||||
|
### 2. Add Harden-Runner as First Step
|
||||||
|
|
||||||
|
For **every job** on `ubuntu-latest`, add Harden-Runner as the first step:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
- name: Harden the runner
|
||||||
|
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
|
||||||
|
with:
|
||||||
|
egress-policy: audit # or 'block' for stricter security
|
||||||
|
```
|
||||||
|
|
||||||
|
### 3. Pin Actions to Full Commit SHA
|
||||||
|
|
||||||
|
**Always** pin third-party actions to their full commit SHA, not tags:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# ❌ BAD - uses mutable tag
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
|
||||||
|
# ✅ GOOD - pinned to immutable commit SHA
|
||||||
|
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
```
|
||||||
|
|
||||||
|
### 4. Secure Variable Handling
|
||||||
|
|
||||||
|
Prevent command injection by properly quoting variables:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# ❌ BAD - potential command injection
|
||||||
|
run: echo "Processing ${{ inputs.user_input }}"
|
||||||
|
|
||||||
|
# ✅ GOOD - properly quoted
|
||||||
|
env:
|
||||||
|
USER_INPUT: ${{ inputs.user_input }}
|
||||||
|
run: echo "Processing ${USER_INPUT}"
|
||||||
|
```
|
||||||
|
|
||||||
|
Use `${VARIABLE}` syntax in shell scripts instead of `$VARIABLE`.
|
||||||
|
|
||||||
|
### 5. Environment Variables for Secrets
|
||||||
|
|
||||||
|
Store sensitive data in environment variables, not inline:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# ❌ BAD
|
||||||
|
run: curl -H "Authorization: Bearer ${{ secrets.TOKEN }}" api.example.com
|
||||||
|
|
||||||
|
# ✅ GOOD
|
||||||
|
env:
|
||||||
|
API_TOKEN: ${{ secrets.TOKEN }}
|
||||||
|
run: curl -H "Authorization: Bearer ${API_TOKEN}" api.example.com
|
||||||
|
```
|
||||||
|
|
||||||
|
## Workflow Structure Best Practices
|
||||||
|
|
||||||
|
### Required Workflow Elements
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
name: "Descriptive Workflow Name"
|
||||||
|
|
||||||
|
on:
|
||||||
|
# Define specific triggers
|
||||||
|
push:
|
||||||
|
branches: [main]
|
||||||
|
pull_request:
|
||||||
|
branches: [main]
|
||||||
|
|
||||||
|
# Always set explicit permissions
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
job-name:
|
||||||
|
name: "Descriptive Job Name"
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
timeout-minutes: 30 # tune per job; standardize repo-wide
|
||||||
|
|
||||||
|
# Set job-level permissions if different from workflow level
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
|
steps:
|
||||||
|
# Always start with Harden-Runner on ubuntu-latest
|
||||||
|
- name: Harden the runner
|
||||||
|
uses: step-security/harden-runner@v2
|
||||||
|
with:
|
||||||
|
egress-policy: audit
|
||||||
|
|
||||||
|
# Pin all actions to commit SHA
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
```
|
||||||
|
|
||||||
|
### Input Validation for Actions
|
||||||
|
|
||||||
|
For composite actions, always validate inputs:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
inputs:
|
||||||
|
user_input:
|
||||||
|
description: "User provided input"
|
||||||
|
required: true
|
||||||
|
|
||||||
|
runs:
|
||||||
|
using: "composite"
|
||||||
|
steps:
|
||||||
|
- name: Validate input
|
||||||
|
shell: bash
|
||||||
|
run: |
|
||||||
|
# Harden shell and validate input format/content before use
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
USER_INPUT="${{ inputs.user_input }}"
|
||||||
|
|
||||||
|
if [[ ! "${USER_INPUT}" =~ ^[A-Za-z0-9._-]+$ ]]; then
|
||||||
|
echo "❌ Invalid input format"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
```
|
||||||
|
|
||||||
|
## Docker Security in Actions
|
||||||
|
|
||||||
|
### Pin Docker Images to Digests
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# ❌ BAD - mutable tag
|
||||||
|
container: node:18
|
||||||
|
|
||||||
|
# ✅ GOOD - pinned to digest
|
||||||
|
container: node:18@sha256:a1ba21bf0c92931d02a8416f0a54daad66cb36a85d6a37b82dfe1604c4c09cad
|
||||||
|
```
|
||||||
|
|
||||||
|
## Common Patterns
|
||||||
|
|
||||||
|
### Secure File Operations
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
- name: Process files securely
|
||||||
|
shell: bash
|
||||||
|
env:
|
||||||
|
FILE_PATH: ${{ inputs.file_path }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail # Fail on errors, undefined vars, pipe failures
|
||||||
|
|
||||||
|
# Use absolute paths and validate
|
||||||
|
SAFE_PATH=$(realpath "${FILE_PATH}")
|
||||||
|
if [[ "$SAFE_PATH" != "${GITHUB_WORKSPACE}"/* ]]; then
|
||||||
|
echo "❌ Path outside workspace"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
```
|
||||||
|
|
||||||
|
### Artifact Handling
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
- name: Upload artifacts securely
|
||||||
|
uses: actions/upload-artifact@50769540e7f4bd5e21e526ee35c689e35e0d6874 # v4.4.0
|
||||||
|
with:
|
||||||
|
name: build-artifacts
|
||||||
|
path: |
|
||||||
|
dist/
|
||||||
|
!dist/**/*.log # Exclude sensitive files
|
||||||
|
retention-days: 30
|
||||||
|
```
|
||||||
|
|
||||||
|
### GHCR authentication for pulls/scans
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Minimal permissions required for GHCR pulls/scans
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
packages: read
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- name: Log in to GitHub Container Registry
|
||||||
|
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
|
||||||
|
with:
|
||||||
|
registry: ghcr.io
|
||||||
|
username: ${{ github.actor }}
|
||||||
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Security Checklist
|
||||||
|
|
||||||
|
- [ ] Minimum GITHUB_TOKEN permissions set
|
||||||
|
- [ ] Harden-Runner added to all ubuntu-latest jobs
|
||||||
|
- [ ] All third-party actions pinned to commit SHA
|
||||||
|
- [ ] Input validation implemented for custom actions
|
||||||
|
- [ ] Variables properly quoted in shell scripts
|
||||||
|
- [ ] Secrets stored in environment variables
|
||||||
|
- [ ] Docker images pinned to digests (if used)
|
||||||
|
- [ ] Error handling with `set -euo pipefail`
|
||||||
|
- [ ] File paths validated and sanitized
|
||||||
|
- [ ] No sensitive data in logs or outputs
|
||||||
|
- [ ] GHCR login performed before pulls/scans (packages: read)
|
||||||
|
- [ ] Job timeouts configured (`timeout-minutes`)
|
||||||
|
|
||||||
|
## Recommended Additional Workflows
|
||||||
|
|
||||||
|
Consider adding these security-focused workflows to your repository:
|
||||||
|
|
||||||
|
1. **CodeQL Analysis** - Static Application Security Testing (SAST)
|
||||||
|
2. **Dependency Review** - Scan for vulnerable dependencies in PRs
|
||||||
|
3. **Dependabot Configuration** - Automated dependency updates
|
||||||
|
|
||||||
|
## Resources
|
||||||
|
|
||||||
|
- [GitHub Security Hardening Guide](https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions)
|
||||||
|
- [Step Security Harden-Runner](https://github.com/step-security/harden-runner)
|
||||||
|
- [Secure-Repo Best Practices](https://github.com/step-security/secure-repo)
|
||||||
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
description:
|
description: Migrate deprecated UI components to a unified component
|
||||||
globs:
|
globs:
|
||||||
alwaysApply: false
|
alwaysApply: false
|
||||||
---
|
---
|
||||||
177
.cursor/rules/storybook-create-new-story.mdc
Normal file
177
.cursor/rules/storybook-create-new-story.mdc
Normal file
@@ -0,0 +1,177 @@
|
|||||||
|
---
|
||||||
|
description: Create a story in Storybook for a given component
|
||||||
|
globs:
|
||||||
|
alwaysApply: false
|
||||||
|
---
|
||||||
|
|
||||||
|
# Formbricks Storybook Stories
|
||||||
|
|
||||||
|
## When generating Storybook stories for Formbricks components:
|
||||||
|
|
||||||
|
### 1. **File Structure**
|
||||||
|
- Create `stories.tsx` (not `.stories.tsx`) in component directory
|
||||||
|
- Use exact import: `import { Meta, StoryObj } from "@storybook/react-vite";`
|
||||||
|
- Import component from `"./index"`
|
||||||
|
|
||||||
|
### 2. **Story Structure Template**
|
||||||
|
```tsx
|
||||||
|
import { Meta, StoryObj } from "@storybook/react-vite";
|
||||||
|
import { ComponentName } from "./index";
|
||||||
|
|
||||||
|
// For complex components with configurable options
|
||||||
|
// consider this as an example the options need to reflect the props types
|
||||||
|
interface StoryOptions {
|
||||||
|
showIcon: boolean;
|
||||||
|
numberOfElements: number;
|
||||||
|
customLabels: string[];
|
||||||
|
}
|
||||||
|
|
||||||
|
type StoryProps = React.ComponentProps<typeof ComponentName> & StoryOptions;
|
||||||
|
|
||||||
|
const meta: Meta<StoryProps> = {
|
||||||
|
title: "UI/ComponentName",
|
||||||
|
component: ComponentName,
|
||||||
|
tags: ["autodocs"],
|
||||||
|
parameters: {
|
||||||
|
layout: "centered",
|
||||||
|
controls: { sort: "alpha", exclude: [] },
|
||||||
|
docs: {
|
||||||
|
description: {
|
||||||
|
component: "The **ComponentName** component provides [description].",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
argTypes: {
|
||||||
|
// Organize in exactly these categories: Behavior, Appearance, Content
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
export default meta;
|
||||||
|
type Story = StoryObj<typeof ComponentName> & { args: StoryOptions };
|
||||||
|
```
|
||||||
|
|
||||||
|
### 3. **ArgTypes Organization**
|
||||||
|
Organize ALL argTypes into exactly three categories:
|
||||||
|
- **Behavior**: disabled, variant, onChange, etc.
|
||||||
|
- **Appearance**: size, color, layout, styling, etc.
|
||||||
|
- **Content**: text, icons, numberOfElements, etc.
|
||||||
|
|
||||||
|
Format:
|
||||||
|
```tsx
|
||||||
|
argTypes: {
|
||||||
|
propName: {
|
||||||
|
control: "select" | "boolean" | "text" | "number",
|
||||||
|
options: ["option1", "option2"], // for select
|
||||||
|
description: "Clear description",
|
||||||
|
table: {
|
||||||
|
category: "Behavior" | "Appearance" | "Content",
|
||||||
|
type: { summary: "string" },
|
||||||
|
defaultValue: { summary: "default" },
|
||||||
|
},
|
||||||
|
order: 1,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### 4. **Required Stories**
|
||||||
|
Every component must include:
|
||||||
|
- `Default`: Most common use case
|
||||||
|
- `Disabled`: If component supports disabled state
|
||||||
|
- `WithIcon`: If component supports icons
|
||||||
|
- Variant stories for each variant (Primary, Secondary, Error, etc.)
|
||||||
|
- Edge case stories (ManyElements, LongText, CustomStyling)
|
||||||
|
|
||||||
|
### 5. **Story Format**
|
||||||
|
```tsx
|
||||||
|
export const Default: Story = {
|
||||||
|
args: {
|
||||||
|
// Props with realistic values
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
export const EdgeCase: Story = {
|
||||||
|
args: { /* ... */ },
|
||||||
|
parameters: {
|
||||||
|
docs: {
|
||||||
|
description: {
|
||||||
|
story: "Use this when [specific scenario].",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
};
|
||||||
|
```
|
||||||
|
|
||||||
|
### 6. **Dynamic Content Pattern**
|
||||||
|
For components with dynamic content, create render function:
|
||||||
|
```tsx
|
||||||
|
const renderComponent = (args: StoryProps) => {
|
||||||
|
const { numberOfElements, showIcon, customLabels } = args;
|
||||||
|
|
||||||
|
// Generate dynamic content
|
||||||
|
const elements = Array.from({ length: numberOfElements }, (_, i) => ({
|
||||||
|
id: `element-${i}`,
|
||||||
|
label: customLabels[i] || `Element ${i + 1}`,
|
||||||
|
icon: showIcon ? <IconComponent /> : undefined,
|
||||||
|
}));
|
||||||
|
|
||||||
|
return <ComponentName {...args} elements={elements} />;
|
||||||
|
};
|
||||||
|
|
||||||
|
export const Dynamic: Story = {
|
||||||
|
render: renderComponent,
|
||||||
|
args: {
|
||||||
|
numberOfElements: 3,
|
||||||
|
showIcon: true,
|
||||||
|
customLabels: ["First", "Second", "Third"],
|
||||||
|
},
|
||||||
|
};
|
||||||
|
```
|
||||||
|
|
||||||
|
### 7. **State Management**
|
||||||
|
For interactive components:
|
||||||
|
```tsx
|
||||||
|
import { useState } from "react";
|
||||||
|
|
||||||
|
const ComponentWithState = (args: any) => {
|
||||||
|
const [value, setValue] = useState(args.defaultValue);
|
||||||
|
|
||||||
|
return (
|
||||||
|
<ComponentName
|
||||||
|
{...args}
|
||||||
|
value={value}
|
||||||
|
onChange={(newValue) => {
|
||||||
|
setValue(newValue);
|
||||||
|
args.onChange?.(newValue);
|
||||||
|
}}
|
||||||
|
/>
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
|
export const Interactive: Story = {
|
||||||
|
render: ComponentWithState,
|
||||||
|
args: { defaultValue: "initial" },
|
||||||
|
};
|
||||||
|
```
|
||||||
|
|
||||||
|
### 8. **Quality Requirements**
|
||||||
|
- Include component description in parameters.docs
|
||||||
|
- Add story documentation for non-obvious use cases
|
||||||
|
- Test edge cases (overflow, empty states, many elements)
|
||||||
|
- Ensure no TypeScript errors
|
||||||
|
- Use realistic prop values
|
||||||
|
- Include at least 3-5 story variants
|
||||||
|
- Example values need to be in the context of survey application
|
||||||
|
|
||||||
|
### 9. **Naming Conventions**
|
||||||
|
- **Story titles**: "UI/ComponentName"
|
||||||
|
- **Story exports**: PascalCase (Default, WithIcon, ManyElements)
|
||||||
|
- **Categories**: "Behavior", "Appearance", "Content" (exact spelling)
|
||||||
|
- **Props**: camelCase matching component props
|
||||||
|
|
||||||
|
### 10. **Special Cases**
|
||||||
|
- **Generic components**: Remove `component` from meta if type conflicts
|
||||||
|
- **Form components**: Include Invalid, WithValue stories
|
||||||
|
- **Navigation**: Include ManyItems stories
|
||||||
|
- **Modals, Dropdowns and Popups **: Include trigger and content structure
|
||||||
|
|
||||||
|
## Generate stories that are comprehensive, well-documented, and reflect all component states and edge cases.
|
||||||
@@ -90,7 +90,7 @@ When testing hooks that use React Context:
|
|||||||
vi.mocked(useResponseFilter).mockReturnValue({
|
vi.mocked(useResponseFilter).mockReturnValue({
|
||||||
selectedFilter: {
|
selectedFilter: {
|
||||||
filter: [],
|
filter: [],
|
||||||
onlyComplete: false,
|
responseStatus: "all",
|
||||||
},
|
},
|
||||||
setSelectedFilter: vi.fn(),
|
setSelectedFilter: vi.fn(),
|
||||||
selectedOptions: {
|
selectedOptions: {
|
||||||
@@ -291,11 +291,6 @@ test("handles different modes", async () => {
|
|||||||
expect(vi.mocked(regularApi)).toHaveBeenCalled();
|
expect(vi.mocked(regularApi)).toHaveBeenCalled();
|
||||||
});
|
});
|
||||||
|
|
||||||
// Test sharing mode
|
|
||||||
vi.mocked(useParams).mockReturnValue({
|
|
||||||
surveyId: "123",
|
|
||||||
sharingKey: "share-123"
|
|
||||||
});
|
|
||||||
rerender();
|
rerender();
|
||||||
|
|
||||||
await waitFor(() => {
|
await waitFor(() => {
|
||||||
|
|||||||
@@ -189,15 +189,11 @@ ENTERPRISE_LICENSE_KEY=
|
|||||||
UNSPLASH_ACCESS_KEY=
|
UNSPLASH_ACCESS_KEY=
|
||||||
|
|
||||||
# The below is used for Next Caching (uses In-Memory from Next Cache if not provided)
|
# The below is used for Next Caching (uses In-Memory from Next Cache if not provided)
|
||||||
# You can also add more configuration to Redis using the redis.conf file in the root directory
|
|
||||||
REDIS_URL=redis://localhost:6379
|
REDIS_URL=redis://localhost:6379
|
||||||
|
|
||||||
# The below is used for Rate Limiting (uses In-Memory LRU Cache if not provided) (You can use a service like Webdis for this)
|
# The below is used for Rate Limiting (uses In-Memory LRU Cache if not provided) (You can use a service like Webdis for this)
|
||||||
# REDIS_HTTP_URL:
|
# REDIS_HTTP_URL:
|
||||||
|
|
||||||
# The below is used for Rate Limiting for management API
|
|
||||||
UNKEY_ROOT_KEY=
|
|
||||||
|
|
||||||
# INTERCOM_APP_ID=
|
# INTERCOM_APP_ID=
|
||||||
# INTERCOM_SECRET_KEY=
|
# INTERCOM_SECRET_KEY=
|
||||||
|
|
||||||
@@ -219,7 +215,7 @@ UNKEY_ROOT_KEY=
|
|||||||
# Configure the maximum age for the session in seconds. Default is 86400 (24 hours)
|
# Configure the maximum age for the session in seconds. Default is 86400 (24 hours)
|
||||||
# SESSION_MAX_AGE=86400
|
# SESSION_MAX_AGE=86400
|
||||||
|
|
||||||
# Audit logs options. Requires REDIS_URL env varibale. Default 0.
|
# Audit logs options. Default 0.
|
||||||
# AUDIT_LOG_ENABLED=0
|
# AUDIT_LOG_ENABLED=0
|
||||||
# If the ip should be added in the log or not. Default 0
|
# If the ip should be added in the log or not. Default 0
|
||||||
# AUDIT_LOG_GET_USER_IP=0
|
# AUDIT_LOG_GET_USER_IP=0
|
||||||
|
|||||||
1
.github/ISSUE_TEMPLATE/bug_report.yml
vendored
1
.github/ISSUE_TEMPLATE/bug_report.yml
vendored
@@ -1,6 +1,7 @@
|
|||||||
name: Bug report
|
name: Bug report
|
||||||
description: "Found a bug? Please fill out the sections below. \U0001F44D"
|
description: "Found a bug? Please fill out the sections below. \U0001F44D"
|
||||||
type: bug
|
type: bug
|
||||||
|
projects: "formbricks/8"
|
||||||
labels: ["bug"]
|
labels: ["bug"]
|
||||||
body:
|
body:
|
||||||
- type: textarea
|
- type: textarea
|
||||||
|
|||||||
2
.github/ISSUE_TEMPLATE/config.yml
vendored
2
.github/ISSUE_TEMPLATE/config.yml
vendored
@@ -1,4 +1,4 @@
|
|||||||
blank_issues_enabled: false
|
blank_issues_enabled: true
|
||||||
contact_links:
|
contact_links:
|
||||||
- name: Questions
|
- name: Questions
|
||||||
url: https://github.com/formbricks/formbricks/discussions
|
url: https://github.com/formbricks/formbricks/discussions
|
||||||
|
|||||||
312
.github/actions/build-and-push-docker/action.yml
vendored
Normal file
312
.github/actions/build-and-push-docker/action.yml
vendored
Normal file
@@ -0,0 +1,312 @@
|
|||||||
|
name: Build and Push Docker Image
|
||||||
|
description: |
|
||||||
|
Unified Docker build and push action for both ECR and GHCR registries.
|
||||||
|
|
||||||
|
Supports:
|
||||||
|
- ECR builds for Formbricks Cloud deployment
|
||||||
|
- GHCR builds for community self-hosting
|
||||||
|
- Automatic version resolution and tagging
|
||||||
|
- Conditional signing and deployment tags
|
||||||
|
|
||||||
|
inputs:
|
||||||
|
registry_type:
|
||||||
|
description: "Registry type: 'ecr' or 'ghcr'"
|
||||||
|
required: true
|
||||||
|
|
||||||
|
# Version input
|
||||||
|
version:
|
||||||
|
description: "Explicit version (SemVer only, e.g., 1.2.3). If provided, this version is used directly. If empty, version is auto-generated from branch name."
|
||||||
|
required: false
|
||||||
|
experimental_mode:
|
||||||
|
description: "Enable experimental timestamped versions"
|
||||||
|
required: false
|
||||||
|
default: "false"
|
||||||
|
|
||||||
|
# ECR specific inputs
|
||||||
|
ecr_registry:
|
||||||
|
description: "ECR registry URL (required for ECR builds)"
|
||||||
|
required: false
|
||||||
|
ecr_repository:
|
||||||
|
description: "ECR repository name (required for ECR builds)"
|
||||||
|
required: false
|
||||||
|
ecr_region:
|
||||||
|
description: "ECR AWS region (required for ECR builds)"
|
||||||
|
required: false
|
||||||
|
aws_role_arn:
|
||||||
|
description: "AWS role ARN for ECR authentication (required for ECR builds)"
|
||||||
|
required: false
|
||||||
|
|
||||||
|
# GHCR specific inputs
|
||||||
|
ghcr_image_name:
|
||||||
|
description: "GHCR image name (required for GHCR builds)"
|
||||||
|
required: false
|
||||||
|
|
||||||
|
# Deployment options
|
||||||
|
deploy_production:
|
||||||
|
description: "Tag image for production deployment"
|
||||||
|
required: false
|
||||||
|
default: "false"
|
||||||
|
deploy_staging:
|
||||||
|
description: "Tag image for staging deployment"
|
||||||
|
required: false
|
||||||
|
default: "false"
|
||||||
|
is_prerelease:
|
||||||
|
description: "Whether this is a prerelease (auto-tags for staging/production)"
|
||||||
|
required: false
|
||||||
|
default: "false"
|
||||||
|
|
||||||
|
# Build options
|
||||||
|
dockerfile:
|
||||||
|
description: "Path to Dockerfile"
|
||||||
|
required: false
|
||||||
|
default: "apps/web/Dockerfile"
|
||||||
|
context:
|
||||||
|
description: "Build context"
|
||||||
|
required: false
|
||||||
|
default: "."
|
||||||
|
|
||||||
|
outputs:
|
||||||
|
image_tag:
|
||||||
|
description: "Resolved image tag used for the build"
|
||||||
|
value: ${{ steps.version.outputs.version }}
|
||||||
|
registry_tags:
|
||||||
|
description: "Complete registry tags that were pushed"
|
||||||
|
value: ${{ steps.build.outputs.tags }}
|
||||||
|
image_digest:
|
||||||
|
description: "Image digest from the build"
|
||||||
|
value: ${{ steps.build.outputs.digest }}
|
||||||
|
|
||||||
|
runs:
|
||||||
|
using: "composite"
|
||||||
|
steps:
|
||||||
|
- name: Validate inputs
|
||||||
|
shell: bash
|
||||||
|
env:
|
||||||
|
REGISTRY_TYPE: ${{ inputs.registry_type }}
|
||||||
|
ECR_REGISTRY: ${{ inputs.ecr_registry }}
|
||||||
|
ECR_REPOSITORY: ${{ inputs.ecr_repository }}
|
||||||
|
ECR_REGION: ${{ inputs.ecr_region }}
|
||||||
|
AWS_ROLE_ARN: ${{ inputs.aws_role_arn }}
|
||||||
|
GHCR_IMAGE_NAME: ${{ inputs.ghcr_image_name }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
if [[ "$REGISTRY_TYPE" != "ecr" && "$REGISTRY_TYPE" != "ghcr" ]]; then
|
||||||
|
echo "ERROR: registry_type must be 'ecr' or 'ghcr', got: $REGISTRY_TYPE"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ "$REGISTRY_TYPE" == "ecr" ]]; then
|
||||||
|
if [[ -z "$ECR_REGISTRY" || -z "$ECR_REPOSITORY" || -z "$ECR_REGION" || -z "$AWS_ROLE_ARN" ]]; then
|
||||||
|
echo "ERROR: ECR builds require ecr_registry, ecr_repository, ecr_region, and aws_role_arn"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ "$REGISTRY_TYPE" == "ghcr" ]]; then
|
||||||
|
if [[ -z "$GHCR_IMAGE_NAME" ]]; then
|
||||||
|
echo "ERROR: GHCR builds require ghcr_image_name"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "SUCCESS: Input validation passed for $REGISTRY_TYPE build"
|
||||||
|
|
||||||
|
- name: Resolve Docker version
|
||||||
|
id: version
|
||||||
|
uses: ./.github/actions/resolve-docker-version
|
||||||
|
with:
|
||||||
|
version: ${{ inputs.version }}
|
||||||
|
current_branch: ${{ github.ref_name }}
|
||||||
|
experimental_mode: ${{ inputs.experimental_mode }}
|
||||||
|
|
||||||
|
- name: Update package.json version
|
||||||
|
uses: ./.github/actions/update-package-version
|
||||||
|
with:
|
||||||
|
version: ${{ steps.version.outputs.version }}
|
||||||
|
|
||||||
|
- name: Configure AWS credentials (ECR only)
|
||||||
|
if: ${{ inputs.registry_type == 'ecr' }}
|
||||||
|
uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.2.0
|
||||||
|
with:
|
||||||
|
role-to-assume: ${{ inputs.aws_role_arn }}
|
||||||
|
aws-region: ${{ inputs.ecr_region }}
|
||||||
|
|
||||||
|
- name: Log in to Amazon ECR (ECR only)
|
||||||
|
if: ${{ inputs.registry_type == 'ecr' }}
|
||||||
|
uses: aws-actions/amazon-ecr-login@062b18b96a7aff071d4dc91bc00c4c1a7945b076 # v2.0.1
|
||||||
|
|
||||||
|
- name: Set up Docker build tools
|
||||||
|
uses: ./.github/actions/docker-build-setup
|
||||||
|
with:
|
||||||
|
registry: ${{ inputs.registry_type == 'ghcr' && 'ghcr.io' || '' }}
|
||||||
|
setup_cosign: ${{ inputs.registry_type == 'ghcr' && 'true' || 'false' }}
|
||||||
|
skip_login_on_pr: ${{ inputs.registry_type == 'ghcr' && 'true' || 'false' }}
|
||||||
|
|
||||||
|
- name: Build ECR tag list
|
||||||
|
if: ${{ inputs.registry_type == 'ecr' }}
|
||||||
|
id: ecr-tags
|
||||||
|
shell: bash
|
||||||
|
env:
|
||||||
|
IMAGE_TAG: ${{ steps.version.outputs.version }}
|
||||||
|
ECR_REGISTRY: ${{ inputs.ecr_registry }}
|
||||||
|
ECR_REPOSITORY: ${{ inputs.ecr_repository }}
|
||||||
|
DEPLOY_PRODUCTION: ${{ inputs.deploy_production }}
|
||||||
|
DEPLOY_STAGING: ${{ inputs.deploy_staging }}
|
||||||
|
IS_PRERELEASE: ${{ inputs.is_prerelease }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
# Start with the base image tag
|
||||||
|
TAGS="${ECR_REGISTRY}/${ECR_REPOSITORY}:${IMAGE_TAG}"
|
||||||
|
|
||||||
|
# Handle automatic tagging based on release type
|
||||||
|
if [[ "${IS_PRERELEASE}" == "true" ]]; then
|
||||||
|
TAGS="${TAGS}\n${ECR_REGISTRY}/${ECR_REPOSITORY}:staging"
|
||||||
|
echo "Adding staging tag for prerelease"
|
||||||
|
elif [[ "${IS_PRERELEASE}" == "false" ]]; then
|
||||||
|
TAGS="${TAGS}\n${ECR_REGISTRY}/${ECR_REPOSITORY}:production"
|
||||||
|
echo "Adding production tag for stable release"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Handle manual deployment overrides
|
||||||
|
if [[ "${DEPLOY_PRODUCTION}" == "true" ]]; then
|
||||||
|
TAGS="${TAGS}\n${ECR_REGISTRY}/${ECR_REPOSITORY}:production"
|
||||||
|
echo "Adding production tag (manual override)"
|
||||||
|
fi
|
||||||
|
if [[ "${DEPLOY_STAGING}" == "true" ]]; then
|
||||||
|
TAGS="${TAGS}\n${ECR_REGISTRY}/${ECR_REPOSITORY}:staging"
|
||||||
|
echo "Adding staging tag (manual override)"
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "ECR tags generated:"
|
||||||
|
echo -e "${TAGS}"
|
||||||
|
|
||||||
|
{
|
||||||
|
echo "tags<<EOF"
|
||||||
|
echo -e "${TAGS}"
|
||||||
|
echo "EOF"
|
||||||
|
} >> "${GITHUB_OUTPUT}"
|
||||||
|
|
||||||
|
- name: Generate additional GHCR tags for releases
|
||||||
|
if: ${{ inputs.registry_type == 'ghcr' && inputs.experimental_mode == 'false' && (github.event_name == 'workflow_call' || github.event_name == 'release' || github.event_name == 'workflow_dispatch') }}
|
||||||
|
id: ghcr-extra-tags
|
||||||
|
shell: bash
|
||||||
|
env:
|
||||||
|
VERSION: ${{ steps.version.outputs.version }}
|
||||||
|
IMAGE_NAME: ${{ inputs.ghcr_image_name }}
|
||||||
|
IS_PRERELEASE: ${{ inputs.is_prerelease }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
# Start with base version tag
|
||||||
|
TAGS="ghcr.io/${IMAGE_NAME}:${VERSION}"
|
||||||
|
|
||||||
|
# For proper SemVer releases, add major.minor and major tags
|
||||||
|
if [[ "${VERSION}" =~ ^[0-9]+\.[0-9]+\.[0-9]+$ ]]; then
|
||||||
|
# Extract major and minor versions
|
||||||
|
MAJOR=$(echo "${VERSION}" | cut -d. -f1)
|
||||||
|
MINOR=$(echo "${VERSION}" | cut -d. -f2)
|
||||||
|
|
||||||
|
TAGS="${TAGS}\nghcr.io/${IMAGE_NAME}:${MAJOR}.${MINOR}"
|
||||||
|
TAGS="${TAGS}\nghcr.io/${IMAGE_NAME}:${MAJOR}"
|
||||||
|
|
||||||
|
echo "Added SemVer tags: ${MAJOR}.${MINOR}, ${MAJOR}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Add latest tag for stable releases
|
||||||
|
if [[ "${IS_PRERELEASE}" == "false" ]]; then
|
||||||
|
TAGS="${TAGS}\nghcr.io/${IMAGE_NAME}:latest"
|
||||||
|
echo "Added latest tag for stable release"
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "Generated GHCR tags:"
|
||||||
|
echo -e "${TAGS}"
|
||||||
|
|
||||||
|
# Debug: Show what will be passed to Docker build
|
||||||
|
echo "DEBUG: Tags for Docker build step:"
|
||||||
|
echo -e "${TAGS}"
|
||||||
|
|
||||||
|
{
|
||||||
|
echo "tags<<EOF"
|
||||||
|
echo -e "${TAGS}"
|
||||||
|
echo "EOF"
|
||||||
|
} >> "${GITHUB_OUTPUT}"
|
||||||
|
|
||||||
|
- name: Build GHCR metadata (experimental)
|
||||||
|
if: ${{ inputs.registry_type == 'ghcr' && inputs.experimental_mode == 'true' }}
|
||||||
|
id: ghcr-meta-experimental
|
||||||
|
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
||||||
|
with:
|
||||||
|
images: ghcr.io/${{ inputs.ghcr_image_name }}
|
||||||
|
tags: |
|
||||||
|
type=ref,event=branch
|
||||||
|
type=raw,value=${{ steps.version.outputs.version }}
|
||||||
|
|
||||||
|
- name: Debug Docker build tags
|
||||||
|
shell: bash
|
||||||
|
run: |
|
||||||
|
echo "=== DEBUG: Docker Build Configuration ==="
|
||||||
|
echo "Registry Type: ${{ inputs.registry_type }}"
|
||||||
|
echo "Experimental Mode: ${{ inputs.experimental_mode }}"
|
||||||
|
echo "Event Name: ${{ github.event_name }}"
|
||||||
|
echo "Is Prerelease: ${{ inputs.is_prerelease }}"
|
||||||
|
echo "Version: ${{ steps.version.outputs.version }}"
|
||||||
|
|
||||||
|
if [[ "${{ inputs.registry_type }}" == "ecr" ]]; then
|
||||||
|
echo "ECR Tags: ${{ steps.ecr-tags.outputs.tags }}"
|
||||||
|
elif [[ "${{ inputs.experimental_mode }}" == "true" ]]; then
|
||||||
|
echo "GHCR Experimental Tags: ${{ steps.ghcr-meta-experimental.outputs.tags }}"
|
||||||
|
else
|
||||||
|
echo "GHCR Extra Tags: ${{ steps.ghcr-extra-tags.outputs.tags }}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
- name: Build and push Docker image
|
||||||
|
id: build
|
||||||
|
uses: depot/build-push-action@636daae76684e38c301daa0c5eca1c095b24e780 # v1.14.0
|
||||||
|
with:
|
||||||
|
project: tw0fqmsx3c
|
||||||
|
token: ${{ env.DEPOT_PROJECT_TOKEN }}
|
||||||
|
context: ${{ inputs.context }}
|
||||||
|
file: ${{ inputs.dockerfile }}
|
||||||
|
platforms: linux/amd64,linux/arm64
|
||||||
|
push: ${{ github.event_name != 'pull_request' }}
|
||||||
|
tags: ${{ inputs.registry_type == 'ecr' && steps.ecr-tags.outputs.tags || (inputs.registry_type == 'ghcr' && inputs.experimental_mode == 'true' && steps.ghcr-meta-experimental.outputs.tags) || (inputs.registry_type == 'ghcr' && inputs.experimental_mode == 'false' && steps.ghcr-extra-tags.outputs.tags) || (inputs.registry_type == 'ghcr' && format('ghcr.io/{0}:{1}', inputs.ghcr_image_name, steps.version.outputs.version)) || (inputs.registry_type == 'ecr' && format('{0}/{1}:{2}', inputs.ecr_registry, inputs.ecr_repository, steps.version.outputs.version)) }}
|
||||||
|
labels: ${{ inputs.registry_type == 'ghcr' && inputs.experimental_mode == 'true' && steps.ghcr-meta-experimental.outputs.labels || '' }}
|
||||||
|
secrets: |
|
||||||
|
database_url=${{ env.DUMMY_DATABASE_URL }}
|
||||||
|
encryption_key=${{ env.DUMMY_ENCRYPTION_KEY }}
|
||||||
|
redis_url=${{ env.DUMMY_REDIS_URL }}
|
||||||
|
sentry_auth_token=${{ env.SENTRY_AUTH_TOKEN }}
|
||||||
|
env:
|
||||||
|
DEPOT_PROJECT_TOKEN: ${{ env.DEPOT_PROJECT_TOKEN }}
|
||||||
|
DUMMY_DATABASE_URL: ${{ env.DUMMY_DATABASE_URL }}
|
||||||
|
DUMMY_ENCRYPTION_KEY: ${{ env.DUMMY_ENCRYPTION_KEY }}
|
||||||
|
DUMMY_REDIS_URL: ${{ env.DUMMY_REDIS_URL }}
|
||||||
|
SENTRY_AUTH_TOKEN: ${{ env.SENTRY_AUTH_TOKEN }}
|
||||||
|
|
||||||
|
- name: Sign GHCR image (GHCR only)
|
||||||
|
if: ${{ inputs.registry_type == 'ghcr' && (github.event_name == 'workflow_call' || github.event_name == 'release' || github.event_name == 'workflow_dispatch') }}
|
||||||
|
shell: bash
|
||||||
|
env:
|
||||||
|
TAGS: ${{ inputs.experimental_mode == 'true' && steps.ghcr-meta-experimental.outputs.tags || steps.ghcr-extra-tags.outputs.tags }}
|
||||||
|
DIGEST: ${{ steps.build.outputs.digest }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
echo "${TAGS}" | xargs -I {} cosign sign --yes "{}@${DIGEST}"
|
||||||
|
|
||||||
|
- name: Output build summary
|
||||||
|
shell: bash
|
||||||
|
env:
|
||||||
|
REGISTRY_TYPE: ${{ inputs.registry_type }}
|
||||||
|
IMAGE_TAG: ${{ steps.version.outputs.version }}
|
||||||
|
VERSION_SOURCE: ${{ steps.version.outputs.source }}
|
||||||
|
run: |
|
||||||
|
echo "SUCCESS: Built and pushed Docker image to $REGISTRY_TYPE"
|
||||||
|
echo "Image Tag: $IMAGE_TAG (source: $VERSION_SOURCE)"
|
||||||
|
if [[ "$REGISTRY_TYPE" == "ecr" ]]; then
|
||||||
|
echo "ECR Registry: ${{ inputs.ecr_registry }}"
|
||||||
|
echo "ECR Repository: ${{ inputs.ecr_repository }}"
|
||||||
|
else
|
||||||
|
echo "GHCR Image: ghcr.io/${{ inputs.ghcr_image_name }}"
|
||||||
|
fi
|
||||||
4
.github/actions/cache-build-web/action.yml
vendored
4
.github/actions/cache-build-web/action.yml
vendored
@@ -62,10 +62,12 @@ runs:
|
|||||||
shell: bash
|
shell: bash
|
||||||
|
|
||||||
- name: Fill ENCRYPTION_KEY, ENTERPRISE_LICENSE_KEY and E2E_TESTING in .env
|
- name: Fill ENCRYPTION_KEY, ENTERPRISE_LICENSE_KEY and E2E_TESTING in .env
|
||||||
|
env:
|
||||||
|
E2E_TESTING_MODE: ${{ inputs.e2e_testing_mode }}
|
||||||
run: |
|
run: |
|
||||||
RANDOM_KEY=$(openssl rand -hex 32)
|
RANDOM_KEY=$(openssl rand -hex 32)
|
||||||
sed -i "s/ENCRYPTION_KEY=.*/ENCRYPTION_KEY=${RANDOM_KEY}/" .env
|
sed -i "s/ENCRYPTION_KEY=.*/ENCRYPTION_KEY=${RANDOM_KEY}/" .env
|
||||||
echo "E2E_TESTING=${{ inputs.e2e_testing_mode }}" >> .env
|
echo "E2E_TESTING=$E2E_TESTING_MODE" >> .env
|
||||||
shell: bash
|
shell: bash
|
||||||
|
|
||||||
- run: |
|
- run: |
|
||||||
|
|||||||
106
.github/actions/docker-build-setup/action.yml
vendored
Normal file
106
.github/actions/docker-build-setup/action.yml
vendored
Normal file
@@ -0,0 +1,106 @@
|
|||||||
|
name: Docker Build Setup
|
||||||
|
description: |
|
||||||
|
Sets up common Docker build tools and authentication with security validation.
|
||||||
|
|
||||||
|
Security Features:
|
||||||
|
- Registry URL validation
|
||||||
|
- Input sanitization
|
||||||
|
- Conditional setup based on event type
|
||||||
|
- Post-setup verification
|
||||||
|
|
||||||
|
Supports Depot CLI, Cosign signing, and Docker registry authentication.
|
||||||
|
|
||||||
|
inputs:
|
||||||
|
registry:
|
||||||
|
description: "Docker registry hostname to login to (e.g., ghcr.io, registry.example.com:5000). No paths allowed."
|
||||||
|
required: false
|
||||||
|
default: "ghcr.io"
|
||||||
|
setup_cosign:
|
||||||
|
description: "Whether to install cosign for image signing"
|
||||||
|
required: false
|
||||||
|
default: "true"
|
||||||
|
skip_login_on_pr:
|
||||||
|
description: "Whether to skip registry login on pull requests"
|
||||||
|
required: false
|
||||||
|
default: "true"
|
||||||
|
|
||||||
|
runs:
|
||||||
|
using: "composite"
|
||||||
|
steps:
|
||||||
|
- name: Validate inputs
|
||||||
|
shell: bash
|
||||||
|
env:
|
||||||
|
REGISTRY: ${{ inputs.registry }}
|
||||||
|
SETUP_COSIGN: ${{ inputs.setup_cosign }}
|
||||||
|
SKIP_LOGIN_ON_PR: ${{ inputs.skip_login_on_pr }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
# Security: Validate registry input - must be hostname[:port] only, no paths
|
||||||
|
# Allow empty registry for cases where login is handled externally (e.g., ECR)
|
||||||
|
if [[ -n "$REGISTRY" ]]; then
|
||||||
|
if [[ "$REGISTRY" =~ / ]]; then
|
||||||
|
echo "ERROR: Invalid registry format: $REGISTRY"
|
||||||
|
echo "Registry must be host[:port] with no path (e.g., 'ghcr.io' or 'registry.example.com:5000')"
|
||||||
|
echo "Path components like 'ghcr.io/org' are not allowed as they break docker login"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Validate hostname with optional port format
|
||||||
|
if [[ ! "$REGISTRY" =~ ^[a-zA-Z0-9.-]+(\:[0-9]+)?$ ]]; then
|
||||||
|
echo "ERROR: Invalid registry hostname format: $REGISTRY"
|
||||||
|
echo "Registry must be a valid hostname optionally with port (e.g., 'ghcr.io' or 'registry.example.com:5000')"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Validate boolean inputs
|
||||||
|
if [[ "$SETUP_COSIGN" != "true" && "$SETUP_COSIGN" != "false" ]]; then
|
||||||
|
echo "ERROR: setup_cosign must be 'true' or 'false', got: $SETUP_COSIGN"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ "$SKIP_LOGIN_ON_PR" != "true" && "$SKIP_LOGIN_ON_PR" != "false" ]]; then
|
||||||
|
echo "ERROR: skip_login_on_pr must be 'true' or 'false', got: $SKIP_LOGIN_ON_PR"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "SUCCESS: Input validation passed"
|
||||||
|
|
||||||
|
- name: Set up Depot CLI
|
||||||
|
uses: depot/setup-action@b0b1ea4f69e92ebf5dea3f8713a1b0c37b2126a5 # v1.6.0
|
||||||
|
|
||||||
|
- name: Install cosign
|
||||||
|
# Install cosign when requested AND when we might actually sign images
|
||||||
|
# (i.e., non-PR contexts or when we login on PRs)
|
||||||
|
if: ${{ inputs.setup_cosign == 'true' && (inputs.skip_login_on_pr == 'false' || github.event_name != 'pull_request') }}
|
||||||
|
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
|
||||||
|
|
||||||
|
- name: Log into registry
|
||||||
|
if: ${{ inputs.registry != '' && (inputs.skip_login_on_pr == 'false' || github.event_name != 'pull_request') }}
|
||||||
|
uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
||||||
|
with:
|
||||||
|
registry: ${{ inputs.registry }}
|
||||||
|
username: ${{ github.actor }}
|
||||||
|
password: ${{ github.token }}
|
||||||
|
|
||||||
|
- name: Verify setup completion
|
||||||
|
shell: bash
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
# Verify Depot CLI is available
|
||||||
|
if ! command -v depot >/dev/null 2>&1; then
|
||||||
|
echo "ERROR: Depot CLI not found in PATH"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Verify cosign if it should be installed (same conditions as install step)
|
||||||
|
if [[ "${{ inputs.setup_cosign }}" == "true" ]] && [[ "${{ inputs.skip_login_on_pr }}" == "false" || "${{ github.event_name }}" != "pull_request" ]]; then
|
||||||
|
if ! command -v cosign >/dev/null 2>&1; then
|
||||||
|
echo "ERROR: Cosign not found in PATH despite being requested"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "SUCCESS: Docker build setup completed successfully"
|
||||||
192
.github/actions/resolve-docker-version/action.yml
vendored
Normal file
192
.github/actions/resolve-docker-version/action.yml
vendored
Normal file
@@ -0,0 +1,192 @@
|
|||||||
|
name: Resolve Docker Version
|
||||||
|
description: |
|
||||||
|
Resolves and validates Docker-compatible SemVer versions for container builds with comprehensive security.
|
||||||
|
|
||||||
|
Security Features:
|
||||||
|
- Command injection protection
|
||||||
|
- Input sanitization and validation
|
||||||
|
- Docker tag character restrictions
|
||||||
|
- Length limits and boundary checks
|
||||||
|
- Safe branch name handling
|
||||||
|
|
||||||
|
Supports multiple modes: release, manual override, branch auto-detection, and experimental timestamped versions.
|
||||||
|
|
||||||
|
inputs:
|
||||||
|
version:
|
||||||
|
description: "Explicit version (SemVer only, e.g., 1.2.3-beta). If provided, this version is used directly. If empty, version is auto-generated from branch name."
|
||||||
|
required: false
|
||||||
|
current_branch:
|
||||||
|
description: "Current branch name for auto-detection"
|
||||||
|
required: true
|
||||||
|
experimental_mode:
|
||||||
|
description: "Enable experimental mode with timestamp-based versions"
|
||||||
|
required: false
|
||||||
|
default: "false"
|
||||||
|
|
||||||
|
outputs:
|
||||||
|
version:
|
||||||
|
description: "Resolved Docker-compatible SemVer version"
|
||||||
|
value: ${{ steps.resolve.outputs.version }}
|
||||||
|
source:
|
||||||
|
description: "Source of version (release|override|branch)"
|
||||||
|
value: ${{ steps.resolve.outputs.source }}
|
||||||
|
normalized:
|
||||||
|
description: "Whether the version was normalized (true/false)"
|
||||||
|
value: ${{ steps.resolve.outputs.normalized }}
|
||||||
|
|
||||||
|
runs:
|
||||||
|
using: "composite"
|
||||||
|
steps:
|
||||||
|
- name: Resolve and validate Docker version
|
||||||
|
id: resolve
|
||||||
|
shell: bash
|
||||||
|
env:
|
||||||
|
EXPLICIT_VERSION: ${{ inputs.version }}
|
||||||
|
CURRENT_BRANCH: ${{ inputs.current_branch }}
|
||||||
|
EXPERIMENTAL_MODE: ${{ inputs.experimental_mode }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
# Function to validate SemVer format (Docker-compatible, no '+' build metadata)
|
||||||
|
validate_semver() {
|
||||||
|
local version="$1"
|
||||||
|
local context="$2"
|
||||||
|
|
||||||
|
if [[ ! "$version" =~ ^[0-9]+\.[0-9]+\.[0-9]+(-[a-zA-Z0-9.-]+)?$ ]]; then
|
||||||
|
echo "ERROR: Invalid $context format. Must be semver without build metadata (e.g., 1.2.3, 1.2.3-alpha)"
|
||||||
|
echo "Provided: $version"
|
||||||
|
echo "Note: Docker tags cannot contain '+' characters. Use prerelease identifiers instead."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
# Function to generate branch-based version
|
||||||
|
generate_branch_version() {
|
||||||
|
local branch="$1"
|
||||||
|
local use_timestamp="${2:-true}"
|
||||||
|
local timestamp
|
||||||
|
|
||||||
|
if [[ "$use_timestamp" == "true" ]]; then
|
||||||
|
timestamp=$(date +%s)
|
||||||
|
else
|
||||||
|
timestamp=""
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Sanitize branch name for Docker compatibility
|
||||||
|
local sanitized_branch=$(echo "$branch" | sed 's/[^a-zA-Z0-9.-]/-/g' | sed 's/--*/-/g' | sed 's/^-\|-$//g')
|
||||||
|
|
||||||
|
# Additional safety: truncate if too long (reserve space for prefix and timestamp)
|
||||||
|
if (( ${#sanitized_branch} > 80 )); then
|
||||||
|
sanitized_branch="${sanitized_branch:0:80}"
|
||||||
|
echo "INFO: Branch name truncated for Docker compatibility" >&2
|
||||||
|
fi
|
||||||
|
local version
|
||||||
|
|
||||||
|
# Generate version based on branch name (unified approach)
|
||||||
|
# All branches get alpha versions with sanitized branch name
|
||||||
|
if [[ -n "$timestamp" ]]; then
|
||||||
|
version="0.0.0-alpha-$sanitized_branch-$timestamp"
|
||||||
|
echo "INFO: Branch '$branch' detected - alpha version: $version" >&2
|
||||||
|
else
|
||||||
|
version="0.0.0-alpha-$sanitized_branch"
|
||||||
|
echo "INFO: Branch '$branch' detected - alpha version: $version" >&2
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "$version"
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
# Input validation and sanitization
|
||||||
|
if [[ -z "$CURRENT_BRANCH" ]]; then
|
||||||
|
echo "ERROR: current_branch input is required"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Security: Validate inputs to prevent command injection
|
||||||
|
# Use grep to check for dangerous characters (more reliable than bash regex)
|
||||||
|
validate_input() {
|
||||||
|
local input="$1"
|
||||||
|
local name="$2"
|
||||||
|
|
||||||
|
# Check for dangerous characters using grep
|
||||||
|
if echo "$input" | grep -q '[;|&`$(){}\\[:space:]]'; then
|
||||||
|
echo "ERROR: $name contains potentially dangerous characters: $input"
|
||||||
|
echo "Input should only contain letters, numbers, hyphens, underscores, dots, and forward slashes"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
# Validate current branch
|
||||||
|
if ! validate_input "$CURRENT_BRANCH" "Branch name"; then
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Validate explicit version if provided
|
||||||
|
if [[ -n "$EXPLICIT_VERSION" ]] && ! validate_input "$EXPLICIT_VERSION" "Explicit version"; then
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Main resolution logic (ultra-simplified)
|
||||||
|
NORMALIZED="false"
|
||||||
|
|
||||||
|
if [[ -n "$EXPLICIT_VERSION" ]]; then
|
||||||
|
# Use provided explicit version (from either workflow_call or manual input)
|
||||||
|
validate_semver "$EXPLICIT_VERSION" "explicit version"
|
||||||
|
|
||||||
|
# Normalize to lowercase for Docker/ECR compatibility
|
||||||
|
RESOLVED_VERSION="${EXPLICIT_VERSION,,}"
|
||||||
|
if [[ "$EXPLICIT_VERSION" != "$RESOLVED_VERSION" ]]; then
|
||||||
|
NORMALIZED="true"
|
||||||
|
echo "INFO: Original version contained uppercase characters, normalized: $EXPLICIT_VERSION -> $RESOLVED_VERSION"
|
||||||
|
fi
|
||||||
|
|
||||||
|
SOURCE="explicit"
|
||||||
|
echo "INFO: Using explicit version: $RESOLVED_VERSION"
|
||||||
|
|
||||||
|
else
|
||||||
|
# Auto-generate version from branch name
|
||||||
|
if [[ "$EXPERIMENTAL_MODE" == "true" ]]; then
|
||||||
|
# Use timestamped version generation
|
||||||
|
echo "INFO: Experimental mode: generating timestamped version from branch: $CURRENT_BRANCH"
|
||||||
|
RESOLVED_VERSION=$(generate_branch_version "$CURRENT_BRANCH" "true")
|
||||||
|
SOURCE="experimental"
|
||||||
|
else
|
||||||
|
# Standard branch version (no timestamp)
|
||||||
|
echo "INFO: Auto-detecting version from branch: $CURRENT_BRANCH"
|
||||||
|
RESOLVED_VERSION=$(generate_branch_version "$CURRENT_BRANCH" "false")
|
||||||
|
SOURCE="branch"
|
||||||
|
fi
|
||||||
|
echo "Generated version: $RESOLVED_VERSION"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Final validation - ensure result is valid Docker tag
|
||||||
|
if [[ -z "$RESOLVED_VERSION" ]]; then
|
||||||
|
echo "ERROR: Failed to resolve version"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if (( ${#RESOLVED_VERSION} > 128 )); then
|
||||||
|
echo "ERROR: Version must be at most 128 characters (Docker limitation)"
|
||||||
|
echo "Generated version: $RESOLVED_VERSION (${#RESOLVED_VERSION} chars)"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ ! "$RESOLVED_VERSION" =~ ^[a-z0-9._-]+$ ]]; then
|
||||||
|
echo "ERROR: Version contains invalid characters for Docker tags"
|
||||||
|
echo "Version: $RESOLVED_VERSION"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ "$RESOLVED_VERSION" =~ ^[.-] || "$RESOLVED_VERSION" =~ [.-]$ ]]; then
|
||||||
|
echo "ERROR: Version must not start or end with '.' or '-'"
|
||||||
|
echo "Version: $RESOLVED_VERSION"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Output results
|
||||||
|
echo "SUCCESS: Resolved Docker version: $RESOLVED_VERSION (source: $SOURCE)"
|
||||||
|
echo "version=$RESOLVED_VERSION" >> $GITHUB_OUTPUT
|
||||||
|
echo "source=$SOURCE" >> $GITHUB_OUTPUT
|
||||||
|
echo "normalized=$NORMALIZED" >> $GITHUB_OUTPUT
|
||||||
160
.github/actions/update-package-version/action.yml
vendored
Normal file
160
.github/actions/update-package-version/action.yml
vendored
Normal file
@@ -0,0 +1,160 @@
|
|||||||
|
name: Update Package Version
|
||||||
|
description: |
|
||||||
|
Safely updates package.json version with comprehensive validation and atomic operations.
|
||||||
|
|
||||||
|
Security Features:
|
||||||
|
- Path traversal protection
|
||||||
|
- SemVer validation with length limits
|
||||||
|
- Atomic file operations with backup/recovery
|
||||||
|
- JSON validation before applying changes
|
||||||
|
|
||||||
|
This action is designed to be secure by default and prevent common attack vectors.
|
||||||
|
|
||||||
|
inputs:
|
||||||
|
version:
|
||||||
|
description: "Version to set in package.json (must be valid SemVer)"
|
||||||
|
required: true
|
||||||
|
package_path:
|
||||||
|
description: "Path to package.json file"
|
||||||
|
required: false
|
||||||
|
default: "./apps/web/package.json"
|
||||||
|
|
||||||
|
outputs:
|
||||||
|
updated_version:
|
||||||
|
description: "The version that was actually set in package.json"
|
||||||
|
value: ${{ steps.update.outputs.updated_version }}
|
||||||
|
|
||||||
|
runs:
|
||||||
|
using: "composite"
|
||||||
|
steps:
|
||||||
|
- name: Update and verify package.json version
|
||||||
|
id: update
|
||||||
|
shell: bash
|
||||||
|
env:
|
||||||
|
VERSION: ${{ inputs.version }}
|
||||||
|
PACKAGE_PATH: ${{ inputs.package_path }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
# Validate inputs
|
||||||
|
if [[ -z "$VERSION" ]]; then
|
||||||
|
echo "ERROR: version input is required"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Security: Validate package_path to prevent path traversal attacks
|
||||||
|
# Only allow paths within the workspace and must end with package.json
|
||||||
|
if [[ "$PACKAGE_PATH" =~ \.\./|^/|^~ ]]; then
|
||||||
|
echo "ERROR: Invalid package path - path traversal detected: $PACKAGE_PATH"
|
||||||
|
echo "Package path must be relative to workspace root and cannot contain '../', start with '/', or '~'"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ ! "$PACKAGE_PATH" =~ package\.json$ ]]; then
|
||||||
|
echo "ERROR: Package path must end with 'package.json': $PACKAGE_PATH"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Resolve to absolute path within workspace for additional security
|
||||||
|
WORKSPACE_ROOT="${GITHUB_WORKSPACE:-$(pwd)}"
|
||||||
|
|
||||||
|
# Use realpath to resolve both paths and handle symlinks properly
|
||||||
|
WORKSPACE_ROOT=$(realpath "$WORKSPACE_ROOT")
|
||||||
|
RESOLVED_PATH=$(realpath "${WORKSPACE_ROOT}/${PACKAGE_PATH}")
|
||||||
|
|
||||||
|
# Ensure WORKSPACE_ROOT has a trailing slash for proper prefix matching
|
||||||
|
WORKSPACE_ROOT="${WORKSPACE_ROOT}/"
|
||||||
|
|
||||||
|
# Use shell string matching to ensure RESOLVED_PATH is within workspace
|
||||||
|
# This is more secure than regex and handles edge cases properly
|
||||||
|
if [[ "$RESOLVED_PATH" != "$WORKSPACE_ROOT"* ]]; then
|
||||||
|
echo "ERROR: Resolved path is outside workspace: $RESOLVED_PATH"
|
||||||
|
echo "Workspace root: $WORKSPACE_ROOT"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ ! -f "$RESOLVED_PATH" ]]; then
|
||||||
|
echo "ERROR: package.json not found at: $RESOLVED_PATH"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Use resolved path for operations
|
||||||
|
PACKAGE_PATH="$RESOLVED_PATH"
|
||||||
|
|
||||||
|
# Validate SemVer format with additional security checks
|
||||||
|
if [[ ${#VERSION} -gt 128 ]]; then
|
||||||
|
echo "ERROR: Version string too long (${#VERSION} chars, max 128): $VERSION"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ ! "$VERSION" =~ ^[0-9]+\.[0-9]+\.[0-9]+(-[a-zA-Z0-9.-]+)?$ ]]; then
|
||||||
|
echo "ERROR: Invalid SemVer format: $VERSION"
|
||||||
|
echo "Expected format: MAJOR.MINOR.PATCH[-PRERELEASE]"
|
||||||
|
echo "Only alphanumeric characters, dots, and hyphens allowed in prerelease"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Additional validation: Check for reasonable version component sizes
|
||||||
|
# Extract base version (MAJOR.MINOR.PATCH) without prerelease/build metadata
|
||||||
|
if [[ "$VERSION" =~ ^([0-9]+\.[0-9]+\.[0-9]+) ]]; then
|
||||||
|
BASE_VERSION="${BASH_REMATCH[1]}"
|
||||||
|
else
|
||||||
|
echo "ERROR: Could not extract base version from: $VERSION"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Split version components safely
|
||||||
|
IFS='.' read -ra VERSION_PARTS <<< "$BASE_VERSION"
|
||||||
|
|
||||||
|
# Validate component sizes (should have exactly 3 parts due to regex above)
|
||||||
|
if (( ${VERSION_PARTS[0]} > 999 || ${VERSION_PARTS[1]} > 999 || ${VERSION_PARTS[2]} > 999 )); then
|
||||||
|
echo "ERROR: Version components too large (max 999 each): $VERSION"
|
||||||
|
echo "Components: ${VERSION_PARTS[0]}.${VERSION_PARTS[1]}.${VERSION_PARTS[2]}"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "Updating package.json version to: $VERSION"
|
||||||
|
|
||||||
|
# Create backup for atomic operations
|
||||||
|
BACKUP_PATH="${PACKAGE_PATH}.backup.$$"
|
||||||
|
cp "$PACKAGE_PATH" "$BACKUP_PATH"
|
||||||
|
|
||||||
|
# Use jq to safely update the version field with error handling
|
||||||
|
if ! jq --arg version "$VERSION" '.version = $version' "$PACKAGE_PATH" > "${PACKAGE_PATH}.tmp"; then
|
||||||
|
echo "ERROR: jq failed to process package.json"
|
||||||
|
rm -f "${PACKAGE_PATH}.tmp" "$BACKUP_PATH"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Validate the generated JSON before applying changes
|
||||||
|
if ! jq empty "${PACKAGE_PATH}.tmp" 2>/dev/null; then
|
||||||
|
echo "ERROR: Generated invalid JSON"
|
||||||
|
rm -f "${PACKAGE_PATH}.tmp" "$BACKUP_PATH"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Atomic move operation
|
||||||
|
if ! mv "${PACKAGE_PATH}.tmp" "$PACKAGE_PATH"; then
|
||||||
|
echo "ERROR: Failed to update package.json"
|
||||||
|
# Restore backup
|
||||||
|
mv "$BACKUP_PATH" "$PACKAGE_PATH"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Verify the update was successful
|
||||||
|
UPDATED_VERSION=$(jq -r '.version' "$PACKAGE_PATH" 2>/dev/null)
|
||||||
|
|
||||||
|
if [[ "$UPDATED_VERSION" != "$VERSION" ]]; then
|
||||||
|
echo "ERROR: Version update failed!"
|
||||||
|
echo "Expected: $VERSION"
|
||||||
|
echo "Actual: $UPDATED_VERSION"
|
||||||
|
# Restore backup
|
||||||
|
mv "$BACKUP_PATH" "$PACKAGE_PATH"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Clean up backup on success
|
||||||
|
rm -f "$BACKUP_PATH"
|
||||||
|
|
||||||
|
echo "SUCCESS: Updated package.json version to: $UPDATED_VERSION"
|
||||||
|
echo "updated_version=$UPDATED_VERSION" >> $GITHUB_OUTPUT
|
||||||
121
.github/actions/upload-sentry-sourcemaps/action.yml
vendored
121
.github/actions/upload-sentry-sourcemaps/action.yml
vendored
@@ -1,121 +0,0 @@
|
|||||||
name: 'Upload Sentry Sourcemaps'
|
|
||||||
description: 'Extract sourcemaps from Docker image and upload to Sentry'
|
|
||||||
|
|
||||||
inputs:
|
|
||||||
docker_image:
|
|
||||||
description: 'Docker image to extract sourcemaps from'
|
|
||||||
required: true
|
|
||||||
release_version:
|
|
||||||
description: 'Sentry release version (e.g., v1.2.3)'
|
|
||||||
required: true
|
|
||||||
sentry_auth_token:
|
|
||||||
description: 'Sentry authentication token'
|
|
||||||
required: true
|
|
||||||
|
|
||||||
runs:
|
|
||||||
using: 'composite'
|
|
||||||
steps:
|
|
||||||
- name: Checkout code
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
fetch-depth: 0
|
|
||||||
|
|
||||||
- name: Validate Sentry auth token
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
set -euo pipefail
|
|
||||||
echo "🔐 Validating Sentry authentication token..."
|
|
||||||
|
|
||||||
# Assign token to local variable for secure handling
|
|
||||||
SENTRY_TOKEN="${{ inputs.sentry_auth_token }}"
|
|
||||||
|
|
||||||
# Test the token by making a simple API call to Sentry
|
|
||||||
response=$(curl -s -w "%{http_code}" -o /tmp/sentry_response.json \
|
|
||||||
-H "Authorization: Bearer $SENTRY_TOKEN" \
|
|
||||||
"https://sentry.io/api/0/organizations/formbricks/")
|
|
||||||
|
|
||||||
http_code=$(echo "$response" | tail -n1)
|
|
||||||
|
|
||||||
if [ "$http_code" != "200" ]; then
|
|
||||||
echo "❌ Error: Invalid Sentry auth token (HTTP $http_code)"
|
|
||||||
echo "Please check your SENTRY_AUTH_TOKEN is correct and has the necessary permissions."
|
|
||||||
if [ -f /tmp/sentry_response.json ]; then
|
|
||||||
echo "Response body:"
|
|
||||||
cat /tmp/sentry_response.json
|
|
||||||
fi
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo "✅ Sentry auth token validated successfully"
|
|
||||||
|
|
||||||
# Clean up temp file
|
|
||||||
rm -f /tmp/sentry_response.json
|
|
||||||
|
|
||||||
- name: Extract sourcemaps from Docker image
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
set -euo pipefail
|
|
||||||
echo "📦 Extracting sourcemaps from Docker image: ${{ inputs.docker_image }}"
|
|
||||||
|
|
||||||
# Create temporary container from the image and capture its ID
|
|
||||||
echo "Creating temporary container..."
|
|
||||||
CONTAINER_ID=$(docker create "${{ inputs.docker_image }}")
|
|
||||||
echo "Container created with ID: $CONTAINER_ID"
|
|
||||||
|
|
||||||
# Set up cleanup function to ensure container is removed on script exit
|
|
||||||
cleanup_container() {
|
|
||||||
# Capture the current exit code to preserve it
|
|
||||||
local original_exit_code=$?
|
|
||||||
|
|
||||||
echo "🧹 Cleaning up Docker container..."
|
|
||||||
|
|
||||||
# Remove the container if it exists (ignore errors if already removed)
|
|
||||||
if [ -n "$CONTAINER_ID" ]; then
|
|
||||||
docker rm -f "$CONTAINER_ID" 2>/dev/null || true
|
|
||||||
echo "Container $CONTAINER_ID removed"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Exit with the original exit code to preserve script success/failure status
|
|
||||||
exit $original_exit_code
|
|
||||||
}
|
|
||||||
|
|
||||||
# Register cleanup function to run on script exit (success or failure)
|
|
||||||
trap cleanup_container EXIT
|
|
||||||
|
|
||||||
# Extract .next directory containing sourcemaps
|
|
||||||
docker cp "$CONTAINER_ID:/home/nextjs/apps/web/.next" ./extracted-next
|
|
||||||
|
|
||||||
# Verify sourcemaps exist
|
|
||||||
if [ ! -d "./extracted-next/static/chunks" ]; then
|
|
||||||
echo "❌ Error: .next/static/chunks directory not found in Docker image"
|
|
||||||
echo "Expected structure: /home/nextjs/apps/web/.next/static/chunks/"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
sourcemap_count=$(find ./extracted-next/static/chunks -name "*.map" | wc -l)
|
|
||||||
echo "✅ Found $sourcemap_count sourcemap files"
|
|
||||||
|
|
||||||
if [ "$sourcemap_count" -eq 0 ]; then
|
|
||||||
echo "❌ Error: No sourcemap files found. Check that productionBrowserSourceMaps is enabled."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
- name: Create Sentry release and upload sourcemaps
|
|
||||||
uses: getsentry/action-release@v3
|
|
||||||
env:
|
|
||||||
SENTRY_AUTH_TOKEN: ${{ inputs.sentry_auth_token }}
|
|
||||||
SENTRY_ORG: formbricks
|
|
||||||
SENTRY_PROJECT: formbricks-cloud
|
|
||||||
with:
|
|
||||||
environment: production
|
|
||||||
version: ${{ inputs.release_version }}
|
|
||||||
sourcemaps: './extracted-next/'
|
|
||||||
|
|
||||||
- name: Clean up extracted files
|
|
||||||
shell: bash
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
set -euo pipefail
|
|
||||||
# Clean up extracted files
|
|
||||||
rm -rf ./extracted-next
|
|
||||||
echo "🧹 Cleaned up extracted files"
|
|
||||||
82
.github/workflows/apply-issue-labels-to-pr.yml
vendored
82
.github/workflows/apply-issue-labels-to-pr.yml
vendored
@@ -1,82 +0,0 @@
|
|||||||
name: "Apply issue labels to PR"
|
|
||||||
|
|
||||||
on:
|
|
||||||
pull_request_target:
|
|
||||||
types:
|
|
||||||
- opened
|
|
||||||
|
|
||||||
permissions:
|
|
||||||
contents: read
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
label_on_pr:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
|
|
||||||
permissions:
|
|
||||||
contents: none
|
|
||||||
issues: read
|
|
||||||
pull-requests: write
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: Harden the runner (Audit all outbound calls)
|
|
||||||
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
|
|
||||||
with:
|
|
||||||
egress-policy: audit
|
|
||||||
|
|
||||||
- name: Apply labels from linked issue to PR
|
|
||||||
uses: actions/github-script@60a0d83039c74a4aee543508d2ffcb1c3799cdea # v7.0.1
|
|
||||||
with:
|
|
||||||
github-token: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
script: |
|
|
||||||
async function getLinkedIssues(owner, repo, prNumber) {
|
|
||||||
const query = `query GetLinkedIssues($owner: String!, $repo: String!, $prNumber: Int!) {
|
|
||||||
repository(owner: $owner, name: $repo) {
|
|
||||||
pullRequest(number: $prNumber) {
|
|
||||||
closingIssuesReferences(first: 10) {
|
|
||||||
nodes {
|
|
||||||
number
|
|
||||||
labels(first: 10) {
|
|
||||||
nodes {
|
|
||||||
name
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}`;
|
|
||||||
|
|
||||||
const variables = {
|
|
||||||
owner: owner,
|
|
||||||
repo: repo,
|
|
||||||
prNumber: prNumber,
|
|
||||||
};
|
|
||||||
|
|
||||||
const result = await github.graphql(query, variables);
|
|
||||||
return result.repository.pullRequest.closingIssuesReferences.nodes;
|
|
||||||
}
|
|
||||||
|
|
||||||
const pr = context.payload.pull_request;
|
|
||||||
const linkedIssues = await getLinkedIssues(
|
|
||||||
context.repo.owner,
|
|
||||||
context.repo.repo,
|
|
||||||
pr.number
|
|
||||||
);
|
|
||||||
|
|
||||||
const labelsToAdd = new Set();
|
|
||||||
for (const issue of linkedIssues) {
|
|
||||||
if (issue.labels && issue.labels.nodes) {
|
|
||||||
for (const label of issue.labels.nodes) {
|
|
||||||
labelsToAdd.add(label.name);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (labelsToAdd.size) {
|
|
||||||
await github.rest.issues.addLabels({
|
|
||||||
owner: context.repo.owner,
|
|
||||||
repo: context.repo.repo,
|
|
||||||
issue_number: pr.number,
|
|
||||||
labels: Array.from(labelsToAdd),
|
|
||||||
});
|
|
||||||
}
|
|
||||||
88
.github/workflows/build-and-push-ecr.yml
vendored
Normal file
88
.github/workflows/build-and-push-ecr.yml
vendored
Normal file
@@ -0,0 +1,88 @@
|
|||||||
|
name: Build Cloud Deployment Images
|
||||||
|
|
||||||
|
# This workflow builds Formbricks Docker images for ECR deployment:
|
||||||
|
# - workflow_call: Used by releases with explicit SemVer versions
|
||||||
|
# - workflow_dispatch: Auto-detects version from current branch or uses override
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_dispatch:
|
||||||
|
inputs:
|
||||||
|
version_override:
|
||||||
|
description: "Override version (SemVer only, e.g., 1.2.3). Leave empty to auto-detect from branch."
|
||||||
|
required: false
|
||||||
|
type: string
|
||||||
|
deploy_production:
|
||||||
|
description: "Tag image for production deployment"
|
||||||
|
required: false
|
||||||
|
default: false
|
||||||
|
type: boolean
|
||||||
|
deploy_staging:
|
||||||
|
description: "Tag image for staging deployment"
|
||||||
|
required: false
|
||||||
|
default: false
|
||||||
|
type: boolean
|
||||||
|
workflow_call:
|
||||||
|
inputs:
|
||||||
|
image_tag:
|
||||||
|
description: "Image tag to push (required for workflow_call)"
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
IS_PRERELEASE:
|
||||||
|
description: "Whether this is a prerelease (auto-tags for staging/production)"
|
||||||
|
required: false
|
||||||
|
type: boolean
|
||||||
|
default: false
|
||||||
|
outputs:
|
||||||
|
IMAGE_TAG:
|
||||||
|
description: "Normalized image tag used for the build"
|
||||||
|
value: ${{ jobs.build-and-push.outputs.IMAGE_TAG }}
|
||||||
|
TAGS:
|
||||||
|
description: "Newline-separated list of ECR tags pushed"
|
||||||
|
value: ${{ jobs.build-and-push.outputs.TAGS }}
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
id-token: write
|
||||||
|
|
||||||
|
env:
|
||||||
|
ECR_REGION: ${{ vars.ECR_REGION }}
|
||||||
|
# ECR settings are sourced from repository/environment variables for portability across envs/forks
|
||||||
|
ECR_REGISTRY: ${{ vars.ECR_REGISTRY }}
|
||||||
|
ECR_REPOSITORY: ${{ vars.ECR_REPOSITORY }}
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build-and-push:
|
||||||
|
name: Build and Push
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
timeout-minutes: 45
|
||||||
|
outputs:
|
||||||
|
IMAGE_TAG: ${{ steps.build.outputs.image_tag }}
|
||||||
|
TAGS: ${{ steps.build.outputs.registry_tags }}
|
||||||
|
steps:
|
||||||
|
- name: Harden the runner (Audit all outbound calls)
|
||||||
|
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
|
||||||
|
with:
|
||||||
|
egress-policy: audit
|
||||||
|
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
|
||||||
|
- name: Build and push cloud deployment image
|
||||||
|
id: build
|
||||||
|
uses: ./.github/actions/build-and-push-docker
|
||||||
|
with:
|
||||||
|
registry_type: "ecr"
|
||||||
|
ecr_registry: ${{ env.ECR_REGISTRY }}
|
||||||
|
ecr_repository: ${{ env.ECR_REPOSITORY }}
|
||||||
|
ecr_region: ${{ env.ECR_REGION }}
|
||||||
|
aws_role_arn: ${{ secrets.AWS_ECR_PUSH_ROLE_ARN }}
|
||||||
|
version: ${{ inputs.version_override || inputs.image_tag }}
|
||||||
|
deploy_production: ${{ inputs.deploy_production }}
|
||||||
|
deploy_staging: ${{ inputs.deploy_staging }}
|
||||||
|
is_prerelease: ${{ inputs.IS_PRERELEASE }}
|
||||||
|
env:
|
||||||
|
DEPOT_PROJECT_TOKEN: ${{ secrets.DEPOT_PROJECT_TOKEN }}
|
||||||
|
DUMMY_DATABASE_URL: ${{ secrets.DUMMY_DATABASE_URL }}
|
||||||
|
DUMMY_ENCRYPTION_KEY: ${{ secrets.DUMMY_ENCRYPTION_KEY }}
|
||||||
|
DUMMY_REDIS_URL: ${{ secrets.DUMMY_REDIS_URL }}
|
||||||
|
SENTRY_AUTH_TOKEN: ${{ secrets.SENTRY_AUTH_TOKEN }}
|
||||||
4
.github/workflows/chromatic.yml
vendored
4
.github/workflows/chromatic.yml
vendored
@@ -6,12 +6,14 @@ on:
|
|||||||
- main
|
- main
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
chromatic:
|
chromatic:
|
||||||
name: Run Chromatic
|
name: Run Chromatic
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
permissions:
|
permissions:
|
||||||
contents: read
|
|
||||||
packages: write
|
packages: write
|
||||||
id-token: write
|
id-token: write
|
||||||
actions: read
|
actions: read
|
||||||
|
|||||||
27
.github/workflows/dependency-review.yml
vendored
27
.github/workflows/dependency-review.yml
vendored
@@ -1,27 +0,0 @@
|
|||||||
# Dependency Review Action
|
|
||||||
#
|
|
||||||
# This Action will scan dependency manifest files that change as part of a Pull Request,
|
|
||||||
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
|
|
||||||
# Once installed, if the workflow run is marked as required,
|
|
||||||
# PRs introducing known-vulnerable packages will be blocked from merging.
|
|
||||||
#
|
|
||||||
# Source repository: https://github.com/actions/dependency-review-action
|
|
||||||
name: 'Dependency Review'
|
|
||||||
on: [pull_request]
|
|
||||||
|
|
||||||
permissions:
|
|
||||||
contents: read
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
dependency-review:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- name: Harden the runner (Audit all outbound calls)
|
|
||||||
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
|
|
||||||
with:
|
|
||||||
egress-policy: audit
|
|
||||||
|
|
||||||
- name: 'Checkout Repository'
|
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
||||||
- name: 'Dependency Review'
|
|
||||||
uses: actions/dependency-review-action@38ecb5b593bf0eb19e335c03f97670f792489a8b # v4.7.0
|
|
||||||
37
.github/workflows/deploy-formbricks-cloud.yml
vendored
37
.github/workflows/deploy-formbricks-cloud.yml
vendored
@@ -4,7 +4,7 @@ on:
|
|||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
inputs:
|
inputs:
|
||||||
VERSION:
|
VERSION:
|
||||||
description: "The version of the Docker image to release, full image tag if image tag is v0.0.0 enter v0.0.0."
|
description: "The version of the Docker image to release (clean SemVer, e.g., 1.2.3)"
|
||||||
required: true
|
required: true
|
||||||
type: string
|
type: string
|
||||||
REPOSITORY:
|
REPOSITORY:
|
||||||
@@ -17,8 +17,8 @@ on:
|
|||||||
required: true
|
required: true
|
||||||
type: choice
|
type: choice
|
||||||
options:
|
options:
|
||||||
- stage
|
- staging
|
||||||
- prod
|
- production
|
||||||
workflow_call:
|
workflow_call:
|
||||||
inputs:
|
inputs:
|
||||||
VERSION:
|
VERSION:
|
||||||
@@ -37,21 +37,27 @@ on:
|
|||||||
|
|
||||||
permissions:
|
permissions:
|
||||||
id-token: write
|
id-token: write
|
||||||
contents: write
|
contents: read
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
helmfile-deploy:
|
helmfile-deploy:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
|
- name: Harden the runner (Audit all outbound calls)
|
||||||
|
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
|
||||||
|
with:
|
||||||
|
egress-policy: audit
|
||||||
|
|
||||||
- name: Checkout
|
- name: Checkout
|
||||||
uses: actions/checkout@v4.2.2
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
|
||||||
- name: Tailscale
|
- name: Tailscale
|
||||||
uses: tailscale/github-action@v3
|
uses: tailscale/github-action@84a3f23bb4d843bcf4da6cf824ec1be473daf4de # v3.2.3
|
||||||
with:
|
with:
|
||||||
oauth-client-id: ${{ secrets.TS_OAUTH_CLIENT_ID }}
|
oauth-client-id: ${{ secrets.TS_OAUTH_CLIENT_ID }}
|
||||||
oauth-secret: ${{ secrets.TS_OAUTH_SECRET }}
|
oauth-secret: ${{ secrets.TS_OAUTH_SECRET }}
|
||||||
tags: tag:github
|
tags: tag:github
|
||||||
|
args: --accept-routes
|
||||||
|
|
||||||
- name: Configure AWS Credentials
|
- name: Configure AWS Credentials
|
||||||
uses: aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
|
uses: aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
|
||||||
@@ -65,9 +71,9 @@ jobs:
|
|||||||
env:
|
env:
|
||||||
AWS_REGION: eu-central-1
|
AWS_REGION: eu-central-1
|
||||||
|
|
||||||
- uses: helmfile/helmfile-action@v2
|
- uses: helmfile/helmfile-action@712000e3d4e28c72778ecc53857746082f555ef3 # v2.0.4
|
||||||
name: Deploy Formbricks Cloud Prod
|
name: Deploy Formbricks Cloud Production
|
||||||
if: inputs.ENVIRONMENT == 'prod'
|
if: inputs.ENVIRONMENT == 'production'
|
||||||
env:
|
env:
|
||||||
VERSION: ${{ inputs.VERSION }}
|
VERSION: ${{ inputs.VERSION }}
|
||||||
REPOSITORY: ${{ inputs.REPOSITORY }}
|
REPOSITORY: ${{ inputs.REPOSITORY }}
|
||||||
@@ -83,9 +89,9 @@ jobs:
|
|||||||
helmfile-auto-init: "false"
|
helmfile-auto-init: "false"
|
||||||
helmfile-workdirectory: infra/formbricks-cloud-helm
|
helmfile-workdirectory: infra/formbricks-cloud-helm
|
||||||
|
|
||||||
- uses: helmfile/helmfile-action@v2
|
- uses: helmfile/helmfile-action@712000e3d4e28c72778ecc53857746082f555ef3 # v2.0.4
|
||||||
name: Deploy Formbricks Cloud Stage
|
name: Deploy Formbricks Cloud Staging
|
||||||
if: inputs.ENVIRONMENT == 'stage'
|
if: inputs.ENVIRONMENT == 'staging'
|
||||||
env:
|
env:
|
||||||
VERSION: ${{ inputs.VERSION }}
|
VERSION: ${{ inputs.VERSION }}
|
||||||
REPOSITORY: ${{ inputs.REPOSITORY }}
|
REPOSITORY: ${{ inputs.REPOSITORY }}
|
||||||
@@ -101,19 +107,20 @@ jobs:
|
|||||||
helmfile-workdirectory: infra/formbricks-cloud-helm
|
helmfile-workdirectory: infra/formbricks-cloud-helm
|
||||||
|
|
||||||
- name: Purge Cloudflare Cache
|
- name: Purge Cloudflare Cache
|
||||||
if: ${{ inputs.ENVIRONMENT == 'prod' || inputs.ENVIRONMENT == 'stage' }}
|
if: ${{ inputs.ENVIRONMENT == 'production' || inputs.ENVIRONMENT == 'staging' }}
|
||||||
env:
|
env:
|
||||||
CF_ZONE_ID: ${{ secrets.CLOUDFLARE_ZONE_ID }}
|
CF_ZONE_ID: ${{ secrets.CLOUDFLARE_ZONE_ID }}
|
||||||
CF_API_TOKEN: ${{ secrets.CLOUDFLARE_API_TOKEN }}
|
CF_API_TOKEN: ${{ secrets.CLOUDFLARE_API_TOKEN }}
|
||||||
|
ENVIRONMENT: ${{ inputs.ENVIRONMENT }}
|
||||||
run: |
|
run: |
|
||||||
# Set hostname based on environment
|
# Set hostname based on environment
|
||||||
if [[ "${{ inputs.ENVIRONMENT }}" == "prod" ]]; then
|
if [[ "$ENVIRONMENT" == "production" ]]; then
|
||||||
PURGE_HOST="app.formbricks.com"
|
PURGE_HOST="app.formbricks.com"
|
||||||
else
|
else
|
||||||
PURGE_HOST="stage.app.formbricks.com"
|
PURGE_HOST="stage.app.formbricks.com"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
echo "Purging Cloudflare cache for host: $PURGE_HOST (environment: ${{ inputs.ENVIRONMENT }}, zone: $CF_ZONE_ID)"
|
echo "Purging Cloudflare cache for host: $PURGE_HOST (environment: $ENVIRONMENT, zone: $CF_ZONE_ID)"
|
||||||
|
|
||||||
# Prepare JSON payload for selective cache purge
|
# Prepare JSON payload for selective cache purge
|
||||||
json_payload=$(cat << EOF
|
json_payload=$(cat << EOF
|
||||||
|
|||||||
159
.github/workflows/docker-build-validation.yml
vendored
159
.github/workflows/docker-build-validation.yml
vendored
@@ -21,10 +21,10 @@ jobs:
|
|||||||
name: Validate Docker Build
|
name: Validate Docker Build
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
|
|
||||||
# Add PostgreSQL service container
|
# Add PostgreSQL and Redis service containers
|
||||||
services:
|
services:
|
||||||
postgres:
|
postgres:
|
||||||
image: pgvector/pgvector:pg17
|
image: pgvector/pgvector@sha256:9ae02a756ba16a2d69dd78058e25915e36e189bb36ddf01ceae86390d7ed786a
|
||||||
env:
|
env:
|
||||||
POSTGRES_USER: test
|
POSTGRES_USER: test
|
||||||
POSTGRES_PASSWORD: test
|
POSTGRES_PASSWORD: test
|
||||||
@@ -38,43 +38,98 @@ jobs:
|
|||||||
--health-timeout 5s
|
--health-timeout 5s
|
||||||
--health-retries 5
|
--health-retries 5
|
||||||
|
|
||||||
|
redis:
|
||||||
|
image: valkey/valkey@sha256:12ba4f45a7c3e1d0f076acd616cb230834e75a77e8516dde382720af32832d6d
|
||||||
|
ports:
|
||||||
|
- 6379:6379
|
||||||
|
|
||||||
steps:
|
steps:
|
||||||
|
- name: Harden the runner (Audit all outbound calls)
|
||||||
|
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
|
||||||
|
with:
|
||||||
|
egress-policy: audit
|
||||||
|
|
||||||
- name: Checkout Repository
|
- name: Checkout Repository
|
||||||
uses: actions/checkout@v4.2.2
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
with:
|
||||||
|
fetch-depth: 0
|
||||||
|
|
||||||
- name: Set up Docker Buildx
|
- name: Set up Docker Buildx
|
||||||
uses: docker/setup-buildx-action@v3
|
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
|
||||||
|
|
||||||
- name: Build Docker Image
|
- name: Build Docker Image
|
||||||
uses: docker/build-push-action@v6
|
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
|
||||||
|
env:
|
||||||
|
GITHUB_SHA: ${{ github.sha }}
|
||||||
with:
|
with:
|
||||||
context: .
|
context: .
|
||||||
file: ./apps/web/Dockerfile
|
file: ./apps/web/Dockerfile
|
||||||
push: false
|
push: false
|
||||||
load: true
|
load: true
|
||||||
tags: formbricks-test:${{ github.sha }}
|
tags: formbricks-test:${{ env.GITHUB_SHA }}
|
||||||
cache-from: type=gha
|
cache-from: type=gha
|
||||||
cache-to: type=gha,mode=max
|
cache-to: type=gha,mode=max
|
||||||
secrets: |
|
secrets: |
|
||||||
database_url=${{ secrets.DUMMY_DATABASE_URL }}
|
database_url=${{ secrets.DUMMY_DATABASE_URL }}
|
||||||
encryption_key=${{ secrets.DUMMY_ENCRYPTION_KEY }}
|
encryption_key=${{ secrets.DUMMY_ENCRYPTION_KEY }}
|
||||||
|
redis_url=redis://localhost:6379
|
||||||
|
|
||||||
- name: Verify PostgreSQL Connection
|
- name: Verify and Initialize PostgreSQL
|
||||||
run: |
|
run: |
|
||||||
echo "Verifying PostgreSQL connection..."
|
echo "Verifying PostgreSQL connection..."
|
||||||
# Install PostgreSQL client to test connection
|
# Install PostgreSQL client to test connection
|
||||||
sudo apt-get update && sudo apt-get install -y postgresql-client
|
sudo apt-get update && sudo apt-get install -y postgresql-client
|
||||||
|
|
||||||
# Test connection using psql
|
# Test connection using psql with timeout and proper error handling
|
||||||
PGPASSWORD=test psql -h localhost -U test -d formbricks -c "\dt" || echo "Failed to connect to PostgreSQL"
|
echo "Testing PostgreSQL connection with 30 second timeout..."
|
||||||
|
if timeout 30 bash -c 'until PGPASSWORD=test psql -h localhost -U test -d formbricks -c "\dt" >/dev/null 2>&1; do
|
||||||
|
echo "Waiting for PostgreSQL to be ready..."
|
||||||
|
sleep 2
|
||||||
|
done'; then
|
||||||
|
echo "✅ PostgreSQL connection successful"
|
||||||
|
PGPASSWORD=test psql -h localhost -U test -d formbricks -c "SELECT version();"
|
||||||
|
|
||||||
|
# Enable necessary extensions that might be required by migrations
|
||||||
|
echo "Enabling required PostgreSQL extensions..."
|
||||||
|
PGPASSWORD=test psql -h localhost -U test -d formbricks -c "CREATE EXTENSION IF NOT EXISTS vector;" || echo "Vector extension already exists or not available"
|
||||||
|
|
||||||
|
else
|
||||||
|
echo "❌ PostgreSQL connection failed after 30 seconds"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
# Show network configuration
|
# Show network configuration
|
||||||
echo "Network configuration:"
|
echo "Network configuration:"
|
||||||
ip addr show
|
|
||||||
netstat -tulpn | grep 5432 || echo "No process listening on port 5432"
|
netstat -tulpn | grep 5432 || echo "No process listening on port 5432"
|
||||||
|
|
||||||
|
- name: Verify Redis/Valkey Connection
|
||||||
|
run: |
|
||||||
|
echo "Verifying Redis/Valkey connection..."
|
||||||
|
# Install Redis client to test connection
|
||||||
|
sudo apt-get update && sudo apt-get install -y redis-tools
|
||||||
|
|
||||||
|
# Test connection using redis-cli with timeout and proper error handling
|
||||||
|
echo "Testing Redis connection with 30 second timeout..."
|
||||||
|
if timeout 30 bash -c 'until redis-cli -h localhost -p 6379 ping >/dev/null 2>&1; do
|
||||||
|
echo "Waiting for Redis to be ready..."
|
||||||
|
sleep 2
|
||||||
|
done'; then
|
||||||
|
echo "✅ Redis connection successful"
|
||||||
|
redis-cli -h localhost -p 6379 info server | head -5
|
||||||
|
else
|
||||||
|
echo "❌ Redis connection failed after 30 seconds"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Show network configuration for Redis
|
||||||
|
echo "Redis network configuration:"
|
||||||
|
netstat -tulpn | grep 6379 || echo "No process listening on port 6379"
|
||||||
|
|
||||||
- name: Test Docker Image with Health Check
|
- name: Test Docker Image with Health Check
|
||||||
shell: bash
|
shell: bash
|
||||||
|
env:
|
||||||
|
GITHUB_SHA: ${{ github.sha }}
|
||||||
|
DUMMY_ENCRYPTION_KEY: ${{ secrets.DUMMY_ENCRYPTION_KEY }}
|
||||||
run: |
|
run: |
|
||||||
echo "🧪 Testing if the Docker image starts correctly..."
|
echo "🧪 Testing if the Docker image starts correctly..."
|
||||||
|
|
||||||
@@ -86,29 +141,13 @@ jobs:
|
|||||||
$DOCKER_RUN_ARGS \
|
$DOCKER_RUN_ARGS \
|
||||||
-p 3000:3000 \
|
-p 3000:3000 \
|
||||||
-e DATABASE_URL="postgresql://test:test@host.docker.internal:5432/formbricks" \
|
-e DATABASE_URL="postgresql://test:test@host.docker.internal:5432/formbricks" \
|
||||||
-e ENCRYPTION_KEY="${{ secrets.DUMMY_ENCRYPTION_KEY }}" \
|
-e ENCRYPTION_KEY="$DUMMY_ENCRYPTION_KEY" \
|
||||||
-d formbricks-test:${{ github.sha }}
|
-e REDIS_URL="redis://host.docker.internal:6379" \
|
||||||
|
-d "formbricks-test:$GITHUB_SHA"
|
||||||
|
|
||||||
# Give it more time to start up
|
# Start health check polling immediately (every 5 seconds for up to 5 minutes)
|
||||||
echo "Waiting 45 seconds for application to start..."
|
echo "🏥 Polling /health endpoint every 5 seconds for up to 5 minutes..."
|
||||||
sleep 45
|
MAX_RETRIES=60 # 60 attempts × 5 seconds = 5 minutes
|
||||||
|
|
||||||
# Check if the container is running
|
|
||||||
if [ "$(docker inspect -f '{{.State.Running}}' formbricks-test)" != "true" ]; then
|
|
||||||
echo "❌ Container failed to start properly!"
|
|
||||||
docker logs formbricks-test
|
|
||||||
exit 1
|
|
||||||
else
|
|
||||||
echo "✅ Container started successfully!"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Try connecting to PostgreSQL from inside the container
|
|
||||||
echo "Testing PostgreSQL connection from inside container..."
|
|
||||||
docker exec formbricks-test sh -c 'apt-get update && apt-get install -y postgresql-client && PGPASSWORD=test psql -h host.docker.internal -U test -d formbricks -c "\dt" || echo "Failed to connect to PostgreSQL from container"'
|
|
||||||
|
|
||||||
# Try to access the health endpoint
|
|
||||||
echo "🏥 Testing /health endpoint..."
|
|
||||||
MAX_RETRIES=10
|
|
||||||
RETRY_COUNT=0
|
RETRY_COUNT=0
|
||||||
HEALTH_CHECK_SUCCESS=false
|
HEALTH_CHECK_SUCCESS=false
|
||||||
|
|
||||||
@@ -116,38 +155,32 @@ jobs:
|
|||||||
|
|
||||||
while [ $RETRY_COUNT -lt $MAX_RETRIES ]; do
|
while [ $RETRY_COUNT -lt $MAX_RETRIES ]; do
|
||||||
RETRY_COUNT=$((RETRY_COUNT + 1))
|
RETRY_COUNT=$((RETRY_COUNT + 1))
|
||||||
echo "Attempt $RETRY_COUNT of $MAX_RETRIES..."
|
|
||||||
|
# Check if container is still running
|
||||||
# Show container logs before each attempt to help debugging
|
if [ "$(docker inspect -f '{{.State.Running}}' formbricks-test 2>/dev/null)" != "true" ]; then
|
||||||
if [ $RETRY_COUNT -gt 1 ]; then
|
echo "❌ Container stopped running after $((RETRY_COUNT * 5)) seconds!"
|
||||||
echo "📋 Current container logs:"
|
echo "📋 Container logs:"
|
||||||
docker logs --tail 20 formbricks-test
|
docker logs formbricks-test
|
||||||
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Get detailed curl output for debugging
|
# Show progress and diagnostic info every 12 attempts (1 minute intervals)
|
||||||
HTTP_OUTPUT=$(curl -v -s -m 30 http://localhost:3000/health 2>&1)
|
if [ $((RETRY_COUNT % 12)) -eq 0 ] || [ $RETRY_COUNT -eq 1 ]; then
|
||||||
CURL_EXIT_CODE=$?
|
echo "Health check attempt $RETRY_COUNT of $MAX_RETRIES ($(($RETRY_COUNT * 5)) seconds elapsed)..."
|
||||||
|
echo "📋 Recent container logs:"
|
||||||
echo "Curl exit code: $CURL_EXIT_CODE"
|
docker logs --tail 10 formbricks-test
|
||||||
echo "Curl output: $HTTP_OUTPUT"
|
|
||||||
|
|
||||||
if [ $CURL_EXIT_CODE -eq 0 ]; then
|
|
||||||
STATUS_CODE=$(echo "$HTTP_OUTPUT" | grep -oP "HTTP/\d(\.\d)? \K\d+")
|
|
||||||
echo "Status code detected: $STATUS_CODE"
|
|
||||||
|
|
||||||
if [ "$STATUS_CODE" = "200" ]; then
|
|
||||||
echo "✅ Health check successful!"
|
|
||||||
HEALTH_CHECK_SUCCESS=true
|
|
||||||
break
|
|
||||||
else
|
|
||||||
echo "❌ Health check returned non-200 status code: $STATUS_CODE"
|
|
||||||
fi
|
|
||||||
else
|
|
||||||
echo "❌ Curl command failed with exit code: $CURL_EXIT_CODE"
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
echo "Waiting 15 seconds before next attempt..."
|
# Try health endpoint with shorter timeout for faster polling
|
||||||
sleep 15
|
# Use -f flag to make curl fail on HTTP error status codes (4xx, 5xx)
|
||||||
|
if curl -f -s -m 10 http://localhost:3000/health >/dev/null 2>&1; then
|
||||||
|
echo "✅ Health check successful after $((RETRY_COUNT * 5)) seconds!"
|
||||||
|
HEALTH_CHECK_SUCCESS=true
|
||||||
|
break
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Wait 5 seconds before next attempt
|
||||||
|
sleep 5
|
||||||
done
|
done
|
||||||
|
|
||||||
# Show full container logs for debugging
|
# Show full container logs for debugging
|
||||||
@@ -160,7 +193,7 @@ jobs:
|
|||||||
|
|
||||||
# Exit with failure if health check did not succeed
|
# Exit with failure if health check did not succeed
|
||||||
if [ "$HEALTH_CHECK_SUCCESS" != "true" ]; then
|
if [ "$HEALTH_CHECK_SUCCESS" != "true" ]; then
|
||||||
echo "❌ Health check failed after $MAX_RETRIES attempts"
|
echo "❌ Health check failed after $((MAX_RETRIES * 5)) seconds (5 minutes)"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
|||||||
70
.github/workflows/docker-security-scan.yml
vendored
Normal file
70
.github/workflows/docker-security-scan.yml
vendored
Normal file
@@ -0,0 +1,70 @@
|
|||||||
|
name: Docker Security Scan
|
||||||
|
|
||||||
|
on:
|
||||||
|
schedule:
|
||||||
|
- cron: "0 2 * * *" # Daily at 2 AM UTC
|
||||||
|
workflow_dispatch:
|
||||||
|
workflow_run:
|
||||||
|
workflows: ["Docker Release to Github"]
|
||||||
|
types: [completed]
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
packages: read
|
||||||
|
security-events: write
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
scan:
|
||||||
|
name: Vulnerability Scan
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
timeout-minutes: 30
|
||||||
|
steps:
|
||||||
|
- name: Harden the runner
|
||||||
|
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
|
||||||
|
with:
|
||||||
|
egress-policy: audit
|
||||||
|
|
||||||
|
- name: Checkout (for SARIF fingerprinting only)
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
with:
|
||||||
|
fetch-depth: 1
|
||||||
|
|
||||||
|
- name: Determine ref and commit for upload
|
||||||
|
id: gitref
|
||||||
|
shell: bash
|
||||||
|
env:
|
||||||
|
EVENT_NAME: ${{ github.event_name }}
|
||||||
|
HEAD_BRANCH: ${{ github.event.workflow_run.head_branch }}
|
||||||
|
HEAD_SHA: ${{ github.event.workflow_run.head_sha }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
if [[ "${EVENT_NAME}" == "workflow_run" ]]; then
|
||||||
|
echo "ref=refs/heads/${HEAD_BRANCH}" >> "$GITHUB_OUTPUT"
|
||||||
|
echo "sha=${HEAD_SHA}" >> "$GITHUB_OUTPUT"
|
||||||
|
else
|
||||||
|
echo "ref=${GITHUB_REF}" >> "$GITHUB_OUTPUT"
|
||||||
|
echo "sha=${GITHUB_SHA}" >> "$GITHUB_OUTPUT"
|
||||||
|
fi
|
||||||
|
- name: Log in to GitHub Container Registry
|
||||||
|
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
|
||||||
|
with:
|
||||||
|
registry: ghcr.io
|
||||||
|
username: ${{ github.actor }}
|
||||||
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|
||||||
|
- name: Run Trivy vulnerability scanner
|
||||||
|
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # v0.32.0
|
||||||
|
with:
|
||||||
|
image-ref: "ghcr.io/${{ github.repository }}:latest"
|
||||||
|
format: "sarif"
|
||||||
|
output: "trivy-results.sarif"
|
||||||
|
severity: "CRITICAL,HIGH,MEDIUM,LOW"
|
||||||
|
|
||||||
|
- name: Upload Trivy scan results to GitHub Security tab
|
||||||
|
uses: github/codeql-action/upload-sarif@a4e1a019f5e24960714ff6296aee04b736cbc3cf # v3.29.6
|
||||||
|
if: ${{ always() }}
|
||||||
|
with:
|
||||||
|
sarif_file: "trivy-results.sarif"
|
||||||
|
ref: ${{ steps.gitref.outputs.ref }}
|
||||||
|
sha: ${{ steps.gitref.outputs.sha }}
|
||||||
|
category: "trivy-container-scan"
|
||||||
9
.github/workflows/e2e.yml
vendored
9
.github/workflows/e2e.yml
vendored
@@ -89,6 +89,7 @@ jobs:
|
|||||||
sed -i "s/CRON_SECRET=.*/CRON_SECRET=${RANDOM_KEY}/" .env
|
sed -i "s/CRON_SECRET=.*/CRON_SECRET=${RANDOM_KEY}/" .env
|
||||||
sed -i "s/NEXTAUTH_SECRET=.*/NEXTAUTH_SECRET=${RANDOM_KEY}/" .env
|
sed -i "s/NEXTAUTH_SECRET=.*/NEXTAUTH_SECRET=${RANDOM_KEY}/" .env
|
||||||
sed -i "s/ENTERPRISE_LICENSE_KEY=.*/ENTERPRISE_LICENSE_KEY=${{ secrets.ENTERPRISE_LICENSE_KEY }}/" .env
|
sed -i "s/ENTERPRISE_LICENSE_KEY=.*/ENTERPRISE_LICENSE_KEY=${{ secrets.ENTERPRISE_LICENSE_KEY }}/" .env
|
||||||
|
sed -i "s|REDIS_URL=.*|REDIS_URL=redis://localhost:6379|" .env
|
||||||
echo "" >> .env
|
echo "" >> .env
|
||||||
echo "E2E_TESTING=1" >> .env
|
echo "E2E_TESTING=1" >> .env
|
||||||
shell: bash
|
shell: bash
|
||||||
@@ -102,6 +103,12 @@ jobs:
|
|||||||
# pnpm prisma migrate deploy
|
# pnpm prisma migrate deploy
|
||||||
pnpm db:migrate:dev
|
pnpm db:migrate:dev
|
||||||
|
|
||||||
|
- name: Run Rate Limiter Load Tests
|
||||||
|
run: |
|
||||||
|
echo "Running rate limiter load tests with Redis/Valkey..."
|
||||||
|
cd apps/web && pnpm vitest run modules/core/rate-limit/rate-limit-load.test.ts
|
||||||
|
shell: bash
|
||||||
|
|
||||||
- name: Check for Enterprise License
|
- name: Check for Enterprise License
|
||||||
run: |
|
run: |
|
||||||
LICENSE_KEY=$(grep '^ENTERPRISE_LICENSE_KEY=' .env | cut -d'=' -f2-)
|
LICENSE_KEY=$(grep '^ENTERPRISE_LICENSE_KEY=' .env | cut -d'=' -f2-)
|
||||||
@@ -175,4 +182,4 @@ jobs:
|
|||||||
|
|
||||||
- name: Output App Logs
|
- name: Output App Logs
|
||||||
if: failure()
|
if: failure()
|
||||||
run: cat app.log
|
run: cat app.log
|
||||||
97
.github/workflows/formbricks-release.yml
vendored
97
.github/workflows/formbricks-release.yml
vendored
@@ -1,56 +1,81 @@
|
|||||||
name: Build, release & deploy Formbricks images
|
name: Build, release & deploy Formbricks images
|
||||||
|
|
||||||
on:
|
on:
|
||||||
workflow_dispatch:
|
release:
|
||||||
push:
|
types: [published]
|
||||||
tags:
|
|
||||||
- "v*"
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
docker-build:
|
docker-build-community:
|
||||||
name: Build & release stable docker image
|
name: Build & release community docker image
|
||||||
if: startsWith(github.ref, 'refs/tags/v')
|
permissions:
|
||||||
|
contents: read
|
||||||
|
packages: write
|
||||||
|
id-token: write
|
||||||
uses: ./.github/workflows/release-docker-github.yml
|
uses: ./.github/workflows/release-docker-github.yml
|
||||||
secrets: inherit
|
secrets: inherit
|
||||||
|
with:
|
||||||
|
IS_PRERELEASE: ${{ github.event.release.prerelease }}
|
||||||
|
|
||||||
|
docker-build-cloud:
|
||||||
|
name: Build & push Formbricks Cloud to ECR
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
id-token: write
|
||||||
|
uses: ./.github/workflows/build-and-push-ecr.yml
|
||||||
|
secrets: inherit
|
||||||
|
with:
|
||||||
|
image_tag: ${{ needs.docker-build-community.outputs.VERSION }}
|
||||||
|
IS_PRERELEASE: ${{ github.event.release.prerelease }}
|
||||||
|
needs:
|
||||||
|
- docker-build-community
|
||||||
|
|
||||||
helm-chart-release:
|
helm-chart-release:
|
||||||
name: Release Helm Chart
|
name: Release Helm Chart
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
packages: write
|
||||||
uses: ./.github/workflows/release-helm-chart.yml
|
uses: ./.github/workflows/release-helm-chart.yml
|
||||||
secrets: inherit
|
secrets: inherit
|
||||||
needs:
|
needs:
|
||||||
- docker-build
|
- docker-build-community
|
||||||
with:
|
with:
|
||||||
VERSION: ${{ needs.docker-build.outputs.VERSION }}
|
VERSION: ${{ needs.docker-build-community.outputs.VERSION }}
|
||||||
|
|
||||||
deploy-formbricks-cloud:
|
verify-cloud-build:
|
||||||
name: Deploy Helm Chart to Formbricks Cloud
|
name: Verify Cloud Build Outputs
|
||||||
secrets: inherit
|
|
||||||
uses: ./.github/workflows/deploy-formbricks-cloud.yml
|
|
||||||
needs:
|
|
||||||
- docker-build
|
|
||||||
- helm-chart-release
|
|
||||||
with:
|
|
||||||
VERSION: v${{ needs.docker-build.outputs.VERSION }}
|
|
||||||
ENVIRONMENT: "prod"
|
|
||||||
|
|
||||||
upload-sentry-sourcemaps:
|
|
||||||
name: Upload Sentry Sourcemaps
|
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
permissions:
|
timeout-minutes: 5 # Simple verification should be quick
|
||||||
contents: read
|
|
||||||
needs:
|
needs:
|
||||||
- docker-build
|
- docker-build-cloud
|
||||||
- deploy-formbricks-cloud
|
|
||||||
steps:
|
steps:
|
||||||
- name: Checkout
|
- name: Harden the runner
|
||||||
uses: actions/checkout@v4.2.2
|
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
|
||||||
with:
|
with:
|
||||||
fetch-depth: 0
|
egress-policy: audit
|
||||||
|
|
||||||
- name: Upload Sentry Sourcemaps
|
- name: Display ECR build outputs
|
||||||
uses: ./.github/actions/upload-sentry-sourcemaps
|
env:
|
||||||
continue-on-error: true
|
IMAGE_TAG: ${{ needs.docker-build-cloud.outputs.IMAGE_TAG }}
|
||||||
with:
|
TAGS: ${{ needs.docker-build-cloud.outputs.TAGS }}
|
||||||
docker_image: ghcr.io/formbricks/formbricks:v${{ needs.docker-build.outputs.VERSION }}
|
run: |
|
||||||
release_version: v${{ needs.docker-build.outputs.VERSION }}
|
set -euo pipefail
|
||||||
sentry_auth_token: ${{ secrets.SENTRY_AUTH_TOKEN }}
|
|
||||||
|
echo "✅ ECR Build Completed Successfully"
|
||||||
|
echo "Image Tag: ${IMAGE_TAG}"
|
||||||
|
echo "ECR Tags:"
|
||||||
|
printf '%s\n' "${TAGS}"
|
||||||
|
|
||||||
|
move-stable-tag:
|
||||||
|
name: Move stable tag to release
|
||||||
|
permissions:
|
||||||
|
contents: write # Required for tag push operations in called workflow
|
||||||
|
uses: ./.github/workflows/move-stable-tag.yml
|
||||||
|
needs:
|
||||||
|
- docker-build-community # Ensure release is successful first
|
||||||
|
with:
|
||||||
|
release_tag: ${{ github.event.release.tag_name }}
|
||||||
|
commit_sha: ${{ github.sha }}
|
||||||
|
is_prerelease: ${{ github.event.release.prerelease }}
|
||||||
|
|||||||
96
.github/workflows/move-stable-tag.yml
vendored
Normal file
96
.github/workflows/move-stable-tag.yml
vendored
Normal file
@@ -0,0 +1,96 @@
|
|||||||
|
name: Move Stable Tag
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_call:
|
||||||
|
inputs:
|
||||||
|
release_tag:
|
||||||
|
description: "The release tag name (e.g., 1.2.3)"
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
commit_sha:
|
||||||
|
description: "The commit SHA to point the stable tag to"
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
is_prerelease:
|
||||||
|
description: "Whether this is a prerelease (stable tag won't be moved for prereleases)"
|
||||||
|
required: false
|
||||||
|
type: boolean
|
||||||
|
default: false
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
|
# Prevent concurrent stable tag operations to avoid race conditions
|
||||||
|
concurrency:
|
||||||
|
group: move-stable-tag-${{ github.repository }}
|
||||||
|
cancel-in-progress: true
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
move-stable-tag:
|
||||||
|
name: Move stable tag to release
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
timeout-minutes: 10 # Prevent hung git operations
|
||||||
|
permissions:
|
||||||
|
contents: write # Required to push tags
|
||||||
|
# Only move stable tag for non-prerelease versions
|
||||||
|
if: ${{ !inputs.is_prerelease }}
|
||||||
|
steps:
|
||||||
|
- name: Harden the runner
|
||||||
|
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
|
||||||
|
with:
|
||||||
|
egress-policy: audit
|
||||||
|
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
with:
|
||||||
|
fetch-depth: 0 # Full history needed for tag operations
|
||||||
|
|
||||||
|
- name: Validate inputs
|
||||||
|
env:
|
||||||
|
RELEASE_TAG: ${{ inputs.release_tag }}
|
||||||
|
COMMIT_SHA: ${{ inputs.commit_sha }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
# Validate release tag format
|
||||||
|
if [[ ! "$RELEASE_TAG" =~ ^[0-9]+\.[0-9]+\.[0-9]+(-[a-zA-Z0-9.-]+)?(\+[a-zA-Z0-9.-]+)?$ ]]; then
|
||||||
|
echo "❌ Error: Invalid release tag format. Expected format: 1.2.3, 1.2.3-alpha"
|
||||||
|
echo "Provided: $RELEASE_TAG"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Validate commit SHA format (40 character hex)
|
||||||
|
if [[ ! "$COMMIT_SHA" =~ ^[a-f0-9]{40}$ ]]; then
|
||||||
|
echo "❌ Error: Invalid commit SHA format. Expected 40 character hex string"
|
||||||
|
echo "Provided: $COMMIT_SHA"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "✅ Input validation passed"
|
||||||
|
echo "Release tag: $RELEASE_TAG"
|
||||||
|
echo "Commit SHA: $COMMIT_SHA"
|
||||||
|
|
||||||
|
- name: Move stable tag
|
||||||
|
env:
|
||||||
|
RELEASE_TAG: ${{ inputs.release_tag }}
|
||||||
|
COMMIT_SHA: ${{ inputs.commit_sha }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
# Configure git
|
||||||
|
git config user.name "github-actions[bot]"
|
||||||
|
git config user.email "github-actions[bot]@users.noreply.github.com"
|
||||||
|
|
||||||
|
# Verify the commit exists
|
||||||
|
if ! git cat-file -e "$COMMIT_SHA"; then
|
||||||
|
echo "❌ Error: Commit $COMMIT_SHA does not exist in this repository"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Move stable tag to the release commit
|
||||||
|
echo "📌 Moving stable tag to commit: $COMMIT_SHA (release: $RELEASE_TAG)"
|
||||||
|
git tag -f stable "$COMMIT_SHA"
|
||||||
|
git push origin stable --force
|
||||||
|
|
||||||
|
echo "✅ Successfully moved stable tag to release $RELEASE_TAG"
|
||||||
|
echo "🔗 Stable tag now points to: https://github.com/${{ github.repository }}/commit/$COMMIT_SHA"
|
||||||
2
.github/workflows/pr.yml
vendored
2
.github/workflows/pr.yml
vendored
@@ -10,8 +10,6 @@ permissions:
|
|||||||
|
|
||||||
on:
|
on:
|
||||||
pull_request:
|
pull_request:
|
||||||
branches:
|
|
||||||
- main
|
|
||||||
merge_group:
|
merge_group:
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
|
|
||||||
|
|||||||
@@ -1,99 +1,50 @@
|
|||||||
name: Docker Release to Github Experimental
|
name: Build Community Testing Images
|
||||||
|
|
||||||
# This workflow uses actions that are not certified by GitHub.
|
# This workflow builds experimental/testing versions of Formbricks for self-hosting customers
|
||||||
# They are provided by a third-party and are governed by
|
# to test fixes and features before official releases. Images are pushed to GHCR with
|
||||||
# separate terms of service, privacy policy, and support
|
# timestamped experimental versions for easy identification and testing.
|
||||||
# documentation.
|
|
||||||
|
|
||||||
on:
|
on:
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
|
inputs:
|
||||||
env:
|
version_override:
|
||||||
# Use docker.io for Docker Hub if empty
|
description: "Override version (SemVer only, e.g., 1.2.3-beta). Leave empty for auto-generated experimental version."
|
||||||
REGISTRY: ghcr.io
|
required: false
|
||||||
# github.repository as <account>/<repo>
|
type: string
|
||||||
IMAGE_NAME: ${{ github.repository }}-experimental
|
|
||||||
TURBO_TOKEN: ${{ secrets.TURBO_TOKEN }}
|
|
||||||
TURBO_TEAM: ${{ secrets.TURBO_TEAM }}
|
|
||||||
|
|
||||||
permissions:
|
permissions:
|
||||||
contents: read
|
contents: read
|
||||||
|
packages: write
|
||||||
|
id-token: write
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build:
|
build-community-testing:
|
||||||
|
name: Build Community Testing Image
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
permissions:
|
timeout-minutes: 45
|
||||||
contents: read
|
|
||||||
packages: write
|
|
||||||
# This is used to complete the identity challenge
|
|
||||||
# with sigstore/fulcio when running outside of PRs.
|
|
||||||
id-token: write
|
|
||||||
|
|
||||||
steps:
|
steps:
|
||||||
- name: Harden the runner (Audit all outbound calls)
|
- name: Harden the runner (Audit all outbound calls)
|
||||||
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
|
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
|
||||||
with:
|
with:
|
||||||
egress-policy: audit
|
egress-policy: audit
|
||||||
|
|
||||||
- name: Checkout repository
|
- name: Checkout repository
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
|
||||||
- name: Set up Depot CLI
|
|
||||||
uses: depot/setup-action@b0b1ea4f69e92ebf5dea3f8713a1b0c37b2126a5 # v1.6.0
|
|
||||||
|
|
||||||
# Install the cosign tool except on PR
|
|
||||||
# https://github.com/sigstore/cosign-installer
|
|
||||||
- name: Install cosign
|
|
||||||
if: github.event_name != 'pull_request'
|
|
||||||
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
|
|
||||||
|
|
||||||
# Login against a Docker registry except on PR
|
|
||||||
# https://github.com/docker/login-action
|
|
||||||
- name: Log into registry ${{ env.REGISTRY }}
|
|
||||||
if: github.event_name != 'pull_request'
|
|
||||||
uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
|
||||||
with:
|
with:
|
||||||
registry: ${{ env.REGISTRY }}
|
fetch-depth: 0
|
||||||
username: ${{ github.actor }}
|
|
||||||
password: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
|
|
||||||
# Extract metadata (tags, labels) for Docker
|
- name: Build and push community testing image
|
||||||
# https://github.com/docker/metadata-action
|
uses: ./.github/actions/build-and-push-docker
|
||||||
- name: Extract Docker metadata
|
|
||||||
id: meta
|
|
||||||
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
|
||||||
with:
|
with:
|
||||||
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
|
registry_type: "ghcr"
|
||||||
|
ghcr_image_name: "${{ github.repository }}-experimental"
|
||||||
# Build and push Docker image with Buildx (don't push on PR)
|
experimental_mode: "true"
|
||||||
# https://github.com/docker/build-push-action
|
version: ${{ inputs.version_override }}
|
||||||
- name: Build and push Docker image
|
|
||||||
id: build-and-push
|
|
||||||
uses: depot/build-push-action@636daae76684e38c301daa0c5eca1c095b24e780 # v1.14.0
|
|
||||||
with:
|
|
||||||
project: tw0fqmsx3c
|
|
||||||
token: ${{ secrets.DEPOT_PROJECT_TOKEN }}
|
|
||||||
context: .
|
|
||||||
file: ./apps/web/Dockerfile
|
|
||||||
platforms: linux/amd64,linux/arm64
|
|
||||||
push: ${{ github.event_name != 'pull_request' }}
|
|
||||||
tags: ${{ steps.meta.outputs.tags }}
|
|
||||||
labels: ${{ steps.meta.outputs.labels }}
|
|
||||||
secrets: |
|
|
||||||
database_url=${{ secrets.DUMMY_DATABASE_URL }}
|
|
||||||
encryption_key=${{ secrets.DUMMY_ENCRYPTION_KEY }}
|
|
||||||
|
|
||||||
# Sign the resulting Docker image digest except on PRs.
|
|
||||||
# This will only write to the public Rekor transparency log when the Docker
|
|
||||||
# repository is public to avoid leaking data. If you would like to publish
|
|
||||||
# transparency data even for private images, pass --force to cosign below.
|
|
||||||
# https://github.com/sigstore/cosign
|
|
||||||
- name: Sign the published Docker image
|
|
||||||
if: ${{ github.event_name != 'pull_request' }}
|
|
||||||
env:
|
env:
|
||||||
# https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
TAGS: ${{ steps.meta.outputs.tags }}
|
DEPOT_PROJECT_TOKEN: ${{ secrets.DEPOT_PROJECT_TOKEN }}
|
||||||
DIGEST: ${{ steps.build-and-push.outputs.digest }}
|
DUMMY_DATABASE_URL: ${{ secrets.DUMMY_DATABASE_URL }}
|
||||||
# This step uses the identity token to provision an ephemeral certificate
|
DUMMY_ENCRYPTION_KEY: ${{ secrets.DUMMY_ENCRYPTION_KEY }}
|
||||||
# against the sigstore community Fulcio instance.
|
DUMMY_REDIS_URL: ${{ secrets.DUMMY_REDIS_URL }}
|
||||||
run: echo "${TAGS}" | xargs -I {} cosign sign --yes {}@${DIGEST}
|
SENTRY_AUTH_TOKEN: ${{ secrets.SENTRY_AUTH_TOKEN }}
|
||||||
|
|||||||
126
.github/workflows/release-docker-github.yml
vendored
126
.github/workflows/release-docker-github.yml
vendored
@@ -1,4 +1,4 @@
|
|||||||
name: Docker Release to Github
|
name: Release Community Docker Images
|
||||||
|
|
||||||
# This workflow uses actions that are not certified by GitHub.
|
# This workflow uses actions that are not certified by GitHub.
|
||||||
# They are provided by a third-party and are governed by
|
# They are provided by a third-party and are governed by
|
||||||
@@ -7,6 +7,12 @@ name: Docker Release to Github
|
|||||||
|
|
||||||
on:
|
on:
|
||||||
workflow_call:
|
workflow_call:
|
||||||
|
inputs:
|
||||||
|
IS_PRERELEASE:
|
||||||
|
description: "Whether this is a prerelease (affects latest tag)"
|
||||||
|
required: false
|
||||||
|
type: boolean
|
||||||
|
default: false
|
||||||
outputs:
|
outputs:
|
||||||
VERSION:
|
VERSION:
|
||||||
description: release version
|
description: release version
|
||||||
@@ -17,12 +23,14 @@ env:
|
|||||||
REGISTRY: ghcr.io
|
REGISTRY: ghcr.io
|
||||||
# github.repository as <account>/<repo>
|
# github.repository as <account>/<repo>
|
||||||
IMAGE_NAME: ${{ github.repository }}
|
IMAGE_NAME: ${{ github.repository }}
|
||||||
TURBO_TOKEN: ${{ secrets.TURBO_TOKEN }}
|
|
||||||
TURBO_TEAM: ${{ secrets.TURBO_TEAM }}
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build:
|
build:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
|
timeout-minutes: 45
|
||||||
permissions:
|
permissions:
|
||||||
contents: read
|
contents: read
|
||||||
packages: write
|
packages: write
|
||||||
@@ -35,82 +43,60 @@ jobs:
|
|||||||
|
|
||||||
steps:
|
steps:
|
||||||
- name: Harden the runner (Audit all outbound calls)
|
- name: Harden the runner (Audit all outbound calls)
|
||||||
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
|
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
|
||||||
with:
|
with:
|
||||||
egress-policy: audit
|
egress-policy: audit
|
||||||
|
|
||||||
- name: Checkout repository
|
- name: Checkout repository
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
|
||||||
- name: Get Release Tag
|
- name: Extract release version from tag
|
||||||
id: extract_release_tag
|
id: extract_release_tag
|
||||||
run: |
|
run: |
|
||||||
TAG=${{ github.ref }}
|
set -euo pipefail
|
||||||
TAG=${TAG#refs/tags/v}
|
|
||||||
echo "RELEASE_TAG=$TAG" >> $GITHUB_ENV
|
# Extract tag name with fallback logic for different trigger contexts
|
||||||
|
if [[ -n "${RELEASE_TAG:-}" ]]; then
|
||||||
|
TAG="$RELEASE_TAG"
|
||||||
|
echo "Using RELEASE_TAG override: $TAG"
|
||||||
|
elif [[ "$GITHUB_REF_NAME" =~ ^[0-9]+\.[0-9]+\.[0-9]+(-[a-zA-Z0-9.-]+)?$ ]] || [[ "$GITHUB_REF_NAME" =~ ^v[0-9] ]]; then
|
||||||
|
TAG="$GITHUB_REF_NAME"
|
||||||
|
echo "Using GITHUB_REF_NAME (looks like tag): $TAG"
|
||||||
|
else
|
||||||
|
# Fallback: extract from GITHUB_REF for direct tag triggers
|
||||||
|
TAG="${GITHUB_REF#refs/tags/}"
|
||||||
|
if [[ -z "$TAG" || "$TAG" == "$GITHUB_REF" ]]; then
|
||||||
|
TAG="$GITHUB_REF_NAME"
|
||||||
|
echo "Using GITHUB_REF_NAME as final fallback: $TAG"
|
||||||
|
else
|
||||||
|
echo "Extracted from GITHUB_REF: $TAG"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Strip v-prefix if present (normalize to clean SemVer)
|
||||||
|
TAG=${TAG#[vV]}
|
||||||
|
|
||||||
|
# Validate SemVer format (supports prereleases like 4.0.0-rc.1)
|
||||||
|
if [[ ! "$TAG" =~ ^[0-9]+\.[0-9]+\.[0-9]+(-[a-zA-Z0-9.-]+)?$ ]]; then
|
||||||
|
echo "ERROR: Invalid tag format '$TAG'. Expected SemVer (e.g., 1.2.3, 4.0.0-rc.1)"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
echo "VERSION=$TAG" >> $GITHUB_OUTPUT
|
echo "VERSION=$TAG" >> $GITHUB_OUTPUT
|
||||||
|
echo "Using version: $TAG"
|
||||||
|
|
||||||
- name: Update package.json version
|
- name: Build and push community release image
|
||||||
run: |
|
id: build
|
||||||
sed -i "s/\"version\": \"0.0.0\"/\"version\": \"${{ env.RELEASE_TAG }}\"/" ./apps/web/package.json
|
uses: ./.github/actions/build-and-push-docker
|
||||||
cat ./apps/web/package.json | grep version
|
|
||||||
|
|
||||||
- name: Set up Depot CLI
|
|
||||||
uses: depot/setup-action@b0b1ea4f69e92ebf5dea3f8713a1b0c37b2126a5 # v1.6.0
|
|
||||||
|
|
||||||
# Install the cosign tool except on PR
|
|
||||||
# https://github.com/sigstore/cosign-installer
|
|
||||||
- name: Install cosign
|
|
||||||
if: github.event_name != 'pull_request'
|
|
||||||
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
|
|
||||||
|
|
||||||
# Login against a Docker registry except on PR
|
|
||||||
# https://github.com/docker/login-action
|
|
||||||
- name: Log into registry ${{ env.REGISTRY }}
|
|
||||||
if: github.event_name != 'pull_request'
|
|
||||||
uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
|
||||||
with:
|
with:
|
||||||
registry: ${{ env.REGISTRY }}
|
registry_type: "ghcr"
|
||||||
username: ${{ github.actor }}
|
ghcr_image_name: ${{ env.IMAGE_NAME }}
|
||||||
password: ${{ secrets.GITHUB_TOKEN }}
|
version: ${{ steps.extract_release_tag.outputs.VERSION }}
|
||||||
|
is_prerelease: ${{ inputs.IS_PRERELEASE }}
|
||||||
# Extract metadata (tags, labels) for Docker
|
|
||||||
# https://github.com/docker/metadata-action
|
|
||||||
- name: Extract Docker metadata
|
|
||||||
id: meta
|
|
||||||
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
|
||||||
with:
|
|
||||||
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
|
|
||||||
|
|
||||||
# Build and push Docker image with Buildx (don't push on PR)
|
|
||||||
# https://github.com/docker/build-push-action
|
|
||||||
- name: Build and push Docker image
|
|
||||||
id: build-and-push
|
|
||||||
uses: depot/build-push-action@636daae76684e38c301daa0c5eca1c095b24e780 # v1.14.0
|
|
||||||
with:
|
|
||||||
project: tw0fqmsx3c
|
|
||||||
token: ${{ secrets.DEPOT_PROJECT_TOKEN }}
|
|
||||||
context: .
|
|
||||||
file: ./apps/web/Dockerfile
|
|
||||||
platforms: linux/amd64,linux/arm64
|
|
||||||
push: ${{ github.event_name != 'pull_request' }}
|
|
||||||
tags: ${{ steps.meta.outputs.tags }}
|
|
||||||
labels: ${{ steps.meta.outputs.labels }}
|
|
||||||
secrets: |
|
|
||||||
database_url=${{ secrets.DUMMY_DATABASE_URL }}
|
|
||||||
encryption_key=${{ secrets.DUMMY_ENCRYPTION_KEY }}
|
|
||||||
|
|
||||||
# Sign the resulting Docker image digest except on PRs.
|
|
||||||
# This will only write to the public Rekor transparency log when the Docker
|
|
||||||
# repository is public to avoid leaking data. If you would like to publish
|
|
||||||
# transparency data even for private images, pass --force to cosign below.
|
|
||||||
# https://github.com/sigstore/cosign
|
|
||||||
- name: Sign the published Docker image
|
|
||||||
if: ${{ github.event_name != 'pull_request' }}
|
|
||||||
env:
|
env:
|
||||||
# https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
TAGS: ${{ steps.meta.outputs.tags }}
|
DEPOT_PROJECT_TOKEN: ${{ secrets.DEPOT_PROJECT_TOKEN }}
|
||||||
DIGEST: ${{ steps.build-and-push.outputs.digest }}
|
DUMMY_DATABASE_URL: ${{ secrets.DUMMY_DATABASE_URL }}
|
||||||
# This step uses the identity token to provision an ephemeral certificate
|
DUMMY_ENCRYPTION_KEY: ${{ secrets.DUMMY_ENCRYPTION_KEY }}
|
||||||
# against the sigstore community Fulcio instance.
|
DUMMY_REDIS_URL: ${{ secrets.DUMMY_REDIS_URL }}
|
||||||
run: echo "${TAGS}" | xargs -I {} cosign sign --yes {}@${DIGEST}
|
SENTRY_AUTH_TOKEN: ${{ secrets.SENTRY_AUTH_TOKEN }}
|
||||||
|
|||||||
53
.github/workflows/release-helm-chart.yml
vendored
53
.github/workflows/release-helm-chart.yml
vendored
@@ -19,15 +19,30 @@ jobs:
|
|||||||
contents: read
|
contents: read
|
||||||
steps:
|
steps:
|
||||||
- name: Harden the runner (Audit all outbound calls)
|
- name: Harden the runner (Audit all outbound calls)
|
||||||
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
|
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
|
||||||
with:
|
with:
|
||||||
egress-policy: audit
|
egress-policy: audit
|
||||||
|
|
||||||
- name: Checkout repository
|
- name: Checkout repository
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
|
||||||
- name: Extract release version
|
- name: Validate input version
|
||||||
run: echo "VERSION=${{ github.event.release.tag_name }}" >> $GITHUB_ENV
|
env:
|
||||||
|
INPUT_VERSION: ${{ inputs.VERSION }}
|
||||||
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
# Validate input version format (expects clean semver without 'v' prefix)
|
||||||
|
if [[ ! "$INPUT_VERSION" =~ ^[0-9]+\.[0-9]+\.[0-9]+(-[a-zA-Z0-9.-]+)?(\+[a-zA-Z0-9.-]+)?$ ]]; then
|
||||||
|
echo "❌ Error: Invalid version format. Must be clean semver (e.g., 1.2.3, 1.2.3-alpha)"
|
||||||
|
echo "Expected: clean version without 'v' prefix"
|
||||||
|
echo "Provided: $INPUT_VERSION"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Store validated version in environment variable
|
||||||
|
echo "VERSION<<EOF" >> $GITHUB_ENV
|
||||||
|
echo "$INPUT_VERSION" >> $GITHUB_ENV
|
||||||
|
echo "EOF" >> $GITHUB_ENV
|
||||||
|
|
||||||
- name: Set up Helm
|
- name: Set up Helm
|
||||||
uses: azure/setup-helm@5119fcb9089d432beecbf79bb2c7915207344b78 # v3.5
|
uses: azure/setup-helm@5119fcb9089d432beecbf79bb2c7915207344b78 # v3.5
|
||||||
@@ -35,20 +50,44 @@ jobs:
|
|||||||
version: latest
|
version: latest
|
||||||
|
|
||||||
- name: Log in to GitHub Container Registry
|
- name: Log in to GitHub Container Registry
|
||||||
run: echo "${{ secrets.GITHUB_TOKEN }}" | helm registry login ghcr.io --username ${{ github.actor }} --password-stdin
|
env:
|
||||||
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
GITHUB_ACTOR: ${{ github.actor }}
|
||||||
|
run: printf '%s' "$GITHUB_TOKEN" | helm registry login ghcr.io --username "$GITHUB_ACTOR" --password-stdin
|
||||||
|
|
||||||
- name: Install YQ
|
- name: Install YQ
|
||||||
uses: dcarbone/install-yq-action@4075b4dca348d74bd83f2bf82d30f25d7c54539b # v1.3.1
|
uses: dcarbone/install-yq-action@4075b4dca348d74bd83f2bf82d30f25d7c54539b # v1.3.1
|
||||||
|
|
||||||
- name: Update Chart.yaml with new version
|
- name: Update Chart.yaml with new version
|
||||||
|
env:
|
||||||
|
VERSION: ${{ env.VERSION }}
|
||||||
run: |
|
run: |
|
||||||
yq -i ".version = \"${{ inputs.VERSION }}\"" helm-chart/Chart.yaml
|
set -euo pipefail
|
||||||
yq -i ".appVersion = \"v${{ inputs.VERSION }}\"" helm-chart/Chart.yaml
|
|
||||||
|
echo "Updating Chart.yaml with version: ${VERSION}"
|
||||||
|
yq -i ".version = \"${VERSION}\"" helm-chart/Chart.yaml
|
||||||
|
yq -i ".appVersion = \"${VERSION}\"" helm-chart/Chart.yaml
|
||||||
|
|
||||||
|
echo "✅ Successfully updated Chart.yaml"
|
||||||
|
|
||||||
- name: Package Helm chart
|
- name: Package Helm chart
|
||||||
|
env:
|
||||||
|
VERSION: ${{ env.VERSION }}
|
||||||
run: |
|
run: |
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
echo "Packaging Helm chart version: ${VERSION}"
|
||||||
helm package ./helm-chart
|
helm package ./helm-chart
|
||||||
|
|
||||||
|
echo "✅ Successfully packaged formbricks-${VERSION}.tgz"
|
||||||
|
|
||||||
- name: Push Helm chart to GitHub Container Registry
|
- name: Push Helm chart to GitHub Container Registry
|
||||||
|
env:
|
||||||
|
VERSION: ${{ env.VERSION }}
|
||||||
run: |
|
run: |
|
||||||
helm push formbricks-${{ inputs.VERSION }}.tgz oci://ghcr.io/formbricks/helm-charts
|
set -euo pipefail
|
||||||
|
|
||||||
|
echo "Pushing Helm chart to registry: formbricks-${VERSION}.tgz"
|
||||||
|
helm push "formbricks-${VERSION}.tgz" oci://ghcr.io/formbricks/helm-charts
|
||||||
|
|
||||||
|
echo "✅ Successfully pushed Helm chart to registry"
|
||||||
|
|||||||
81
.github/workflows/scorecard.yml
vendored
81
.github/workflows/scorecard.yml
vendored
@@ -1,81 +0,0 @@
|
|||||||
# This workflow uses actions that are not certified by GitHub. They are provided
|
|
||||||
# by a third-party and are governed by separate terms of service, privacy
|
|
||||||
# policy, and support documentation.
|
|
||||||
|
|
||||||
name: Scorecard supply-chain security
|
|
||||||
on:
|
|
||||||
# For Branch-Protection check. Only the default branch is supported. See
|
|
||||||
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
|
|
||||||
branch_protection_rule:
|
|
||||||
# To guarantee Maintained check is occasionally updated. See
|
|
||||||
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained
|
|
||||||
schedule:
|
|
||||||
- cron: "17 17 * * 6"
|
|
||||||
push:
|
|
||||||
branches: ["main"]
|
|
||||||
workflow_dispatch:
|
|
||||||
|
|
||||||
# Declare default permissions as read only.
|
|
||||||
permissions: read-all
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
analysis:
|
|
||||||
name: Scorecard analysis
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
permissions:
|
|
||||||
# Needed to upload the results to code-scanning dashboard.
|
|
||||||
security-events: write
|
|
||||||
# Needed to publish results and get a badge (see publish_results below).
|
|
||||||
id-token: write
|
|
||||||
# Add this permission
|
|
||||||
actions: write # Required for artifact upload
|
|
||||||
# Uncomment the permissions below if installing in a private repository.
|
|
||||||
# contents: read
|
|
||||||
# actions: read
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: Harden the runner (Audit all outbound calls)
|
|
||||||
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
|
|
||||||
with:
|
|
||||||
egress-policy: audit
|
|
||||||
|
|
||||||
- name: "Checkout code"
|
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
||||||
with:
|
|
||||||
persist-credentials: false
|
|
||||||
|
|
||||||
- name: "Run analysis"
|
|
||||||
uses: ossf/scorecard-action@0864cf19026789058feabb7e87baa5f140aac736 # v2.3.1
|
|
||||||
with:
|
|
||||||
results_file: results.sarif
|
|
||||||
results_format: sarif
|
|
||||||
# (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
|
|
||||||
# - you want to enable the Branch-Protection check on a *public* repository, or
|
|
||||||
# - you are installing Scorecard on a *private* repository
|
|
||||||
# To create the PAT, follow the steps in https://github.com/ossf/scorecard-action?tab=readme-ov-file#authentication-with-fine-grained-pat-optional.
|
|
||||||
# repo_token: ${{ secrets.SCORECARD_TOKEN }}
|
|
||||||
|
|
||||||
# Public repositories:
|
|
||||||
# - Publish results to OpenSSF REST API for easy access by consumers
|
|
||||||
# - Allows the repository to include the Scorecard badge.
|
|
||||||
# - See https://github.com/ossf/scorecard-action#publishing-results.
|
|
||||||
# For private repositories:
|
|
||||||
# - `publish_results` will always be set to `false`, regardless
|
|
||||||
# of the value entered here.
|
|
||||||
publish_results: true
|
|
||||||
|
|
||||||
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
|
|
||||||
# format to the repository Actions tab.
|
|
||||||
- name: "Upload artifact"
|
|
||||||
uses: actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 # v4.6.0
|
|
||||||
with:
|
|
||||||
name: sarif
|
|
||||||
path: results.sarif
|
|
||||||
retention-days: 5
|
|
||||||
|
|
||||||
# Upload the results to GitHub's code scanning dashboard (optional).
|
|
||||||
# Commenting out will disable upload of results to your repo's Code Scanning dashboard
|
|
||||||
- name: "Upload to code-scanning"
|
|
||||||
uses: github/codeql-action/upload-sarif@b56ba49b26e50535fa1e7f7db0f4f7b4bf65d80d # v3.28.10
|
|
||||||
with:
|
|
||||||
sarif_file: results.sarif
|
|
||||||
8
.github/workflows/semantic-pull-requests.yml
vendored
8
.github/workflows/semantic-pull-requests.yml
vendored
@@ -56,11 +56,3 @@ jobs:
|
|||||||
```
|
```
|
||||||
${{ steps.lint_pr_title.outputs.error_message }}
|
${{ steps.lint_pr_title.outputs.error_message }}
|
||||||
```
|
```
|
||||||
|
|
||||||
# Delete a previous comment when the issue has been resolved
|
|
||||||
- if: ${{ steps.lint_pr_title.outputs.error_message == null }}
|
|
||||||
uses: marocchino/sticky-pull-request-comment@67d0dec7b07ed060a405f9b2a64b8ab319fdd7db # v2.9.2
|
|
||||||
with:
|
|
||||||
header: pr-title-lint-error
|
|
||||||
message: |
|
|
||||||
Thank you for following the naming conventions for pull request titles! 🙏
|
|
||||||
|
|||||||
1
.github/workflows/sonarqube.yml
vendored
1
.github/workflows/sonarqube.yml
vendored
@@ -43,6 +43,7 @@ jobs:
|
|||||||
sed -i "s/ENCRYPTION_KEY=.*/ENCRYPTION_KEY=${RANDOM_KEY}/" .env
|
sed -i "s/ENCRYPTION_KEY=.*/ENCRYPTION_KEY=${RANDOM_KEY}/" .env
|
||||||
sed -i "s/CRON_SECRET=.*/CRON_SECRET=${RANDOM_KEY}/" .env
|
sed -i "s/CRON_SECRET=.*/CRON_SECRET=${RANDOM_KEY}/" .env
|
||||||
sed -i "s/NEXTAUTH_SECRET=.*/NEXTAUTH_SECRET=${RANDOM_KEY}/" .env
|
sed -i "s/NEXTAUTH_SECRET=.*/NEXTAUTH_SECRET=${RANDOM_KEY}/" .env
|
||||||
|
sed -i "s|REDIS_URL=.*|REDIS_URL=|" .env
|
||||||
|
|
||||||
- name: Run tests with coverage
|
- name: Run tests with coverage
|
||||||
run: |
|
run: |
|
||||||
|
|||||||
@@ -14,12 +14,14 @@ on:
|
|||||||
paths:
|
paths:
|
||||||
- "infra/terraform/**"
|
- "infra/terraform/**"
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
terraform:
|
terraform:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
permissions:
|
permissions:
|
||||||
id-token: write
|
id-token: write
|
||||||
contents: read
|
|
||||||
pull-requests: write
|
pull-requests: write
|
||||||
env:
|
env:
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
@@ -33,7 +35,7 @@ jobs:
|
|||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
|
||||||
- name: Tailscale
|
- name: Tailscale
|
||||||
uses: tailscale/github-action@v3
|
uses: tailscale/github-action@84a3f23bb4d843bcf4da6cf824ec1be473daf4de # v3.2.3
|
||||||
with:
|
with:
|
||||||
oauth-client-id: ${{ secrets.TS_OAUTH_CLIENT_ID }}
|
oauth-client-id: ${{ secrets.TS_OAUTH_CLIENT_ID }}
|
||||||
oauth-secret: ${{ secrets.TS_OAUTH_SECRET }}
|
oauth-secret: ${{ secrets.TS_OAUTH_SECRET }}
|
||||||
|
|||||||
1
.github/workflows/test.yml
vendored
1
.github/workflows/test.yml
vendored
@@ -41,6 +41,7 @@ jobs:
|
|||||||
sed -i "s/ENCRYPTION_KEY=.*/ENCRYPTION_KEY=${RANDOM_KEY}/" .env
|
sed -i "s/ENCRYPTION_KEY=.*/ENCRYPTION_KEY=${RANDOM_KEY}/" .env
|
||||||
sed -i "s/CRON_SECRET=.*/CRON_SECRET=${RANDOM_KEY}/" .env
|
sed -i "s/CRON_SECRET=.*/CRON_SECRET=${RANDOM_KEY}/" .env
|
||||||
sed -i "s/NEXTAUTH_SECRET=.*/NEXTAUTH_SECRET=${RANDOM_KEY}/" .env
|
sed -i "s/NEXTAUTH_SECRET=.*/NEXTAUTH_SECRET=${RANDOM_KEY}/" .env
|
||||||
|
sed -i "s|REDIS_URL=.*|REDIS_URL=|" .env
|
||||||
|
|
||||||
- name: Test
|
- name: Test
|
||||||
run: pnpm test
|
run: pnpm test
|
||||||
|
|||||||
10
.github/workflows/tolgee.yml
vendored
10
.github/workflows/tolgee.yml
vendored
@@ -27,10 +27,18 @@ jobs:
|
|||||||
|
|
||||||
- name: Get source branch name
|
- name: Get source branch name
|
||||||
id: branch-name
|
id: branch-name
|
||||||
|
env:
|
||||||
|
RAW_BRANCH: ${{ github.head_ref }}
|
||||||
run: |
|
run: |
|
||||||
RAW_BRANCH="${{ github.head_ref }}"
|
# Validate and sanitize branch name - only allow alphanumeric, dots, underscores, hyphens, and forward slashes
|
||||||
SOURCE_BRANCH=$(echo "$RAW_BRANCH" | sed 's/[^a-zA-Z0-9._\/-]//g')
|
SOURCE_BRANCH=$(echo "$RAW_BRANCH" | sed 's/[^a-zA-Z0-9._\/-]//g')
|
||||||
|
|
||||||
|
# Additional validation - ensure branch name is not empty after sanitization
|
||||||
|
if [[ -z "$SOURCE_BRANCH" ]]; then
|
||||||
|
echo "❌ Error: Branch name is empty after sanitization"
|
||||||
|
echo "Original branch: $RAW_BRANCH"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
# Safely add to environment variables using GitHub's recommended method
|
# Safely add to environment variables using GitHub's recommended method
|
||||||
# This prevents environment variable injection attacks
|
# This prevents environment variable injection attacks
|
||||||
|
|||||||
46
.github/workflows/upload-sentry-sourcemaps.yml
vendored
46
.github/workflows/upload-sentry-sourcemaps.yml
vendored
@@ -1,46 +0,0 @@
|
|||||||
name: Upload Sentry Sourcemaps (Manual)
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
inputs:
|
|
||||||
docker_image:
|
|
||||||
description: "Docker image to extract sourcemaps from"
|
|
||||||
required: true
|
|
||||||
type: string
|
|
||||||
release_version:
|
|
||||||
description: "Release version (e.g., v1.2.3)"
|
|
||||||
required: true
|
|
||||||
type: string
|
|
||||||
tag_version:
|
|
||||||
description: "Docker image tag (leave empty to use release_version)"
|
|
||||||
required: false
|
|
||||||
type: string
|
|
||||||
|
|
||||||
permissions:
|
|
||||||
contents: read
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
upload-sourcemaps:
|
|
||||||
name: Upload Sourcemaps to Sentry
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v4.2.2
|
|
||||||
with:
|
|
||||||
fetch-depth: 0
|
|
||||||
|
|
||||||
- name: Set Docker Image
|
|
||||||
run: |
|
|
||||||
if [ -n "${{ inputs.tag_version }}" ]; then
|
|
||||||
echo "DOCKER_IMAGE=${{ inputs.docker_image }}:${{ inputs.tag_version }}" >> $GITHUB_ENV
|
|
||||||
else
|
|
||||||
echo "DOCKER_IMAGE=${{ inputs.docker_image }}:${{ inputs.release_version }}" >> $GITHUB_ENV
|
|
||||||
fi
|
|
||||||
|
|
||||||
- name: Upload Sourcemaps to Sentry
|
|
||||||
uses: ./.github/actions/upload-sentry-sourcemaps
|
|
||||||
with:
|
|
||||||
docker_image: ${{ env.DOCKER_IMAGE }}
|
|
||||||
release_version: ${{ inputs.release_version }}
|
|
||||||
sentry_auth_token: ${{ secrets.SENTRY_AUTH_TOKEN }}
|
|
||||||
32
.github/workflows/welcome-new-contributors.yml
vendored
32
.github/workflows/welcome-new-contributors.yml
vendored
@@ -1,32 +0,0 @@
|
|||||||
name: "Welcome new contributors"
|
|
||||||
|
|
||||||
on:
|
|
||||||
issues:
|
|
||||||
types: opened
|
|
||||||
pull_request_target:
|
|
||||||
types: opened
|
|
||||||
|
|
||||||
permissions:
|
|
||||||
pull-requests: write
|
|
||||||
issues: write
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
welcome-message:
|
|
||||||
name: Welcoming New Users
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
timeout-minutes: 10
|
|
||||||
if: github.event.action == 'opened'
|
|
||||||
steps:
|
|
||||||
- name: Harden the runner (Audit all outbound calls)
|
|
||||||
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
|
|
||||||
with:
|
|
||||||
egress-policy: audit
|
|
||||||
|
|
||||||
- uses: actions/first-interaction@3c71ce730280171fd1cfb57c00c774f8998586f7 # v1
|
|
||||||
with:
|
|
||||||
repo-token: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
pr-message: |-
|
|
||||||
Thank you so much for making your first Pull Request and taking the time to improve Formbricks! 🚀🙏❤️
|
|
||||||
Feel free to join the conversation on [Github Discussions](https://github.com/formbricks/formbricks/discussions) if you need any help or have any questions. 😊
|
|
||||||
issue-message: |
|
|
||||||
Thank you for opening your first issue! 🙏❤️ One of our team members will review it and get back to you as soon as it possible. 😊
|
|
||||||
@@ -31,6 +31,10 @@
|
|||||||
{
|
{
|
||||||
"language": "pt-PT",
|
"language": "pt-PT",
|
||||||
"path": "./apps/web/locales/pt-PT.json"
|
"path": "./apps/web/locales/pt-PT.json"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"language": "ro-RO",
|
||||||
|
"path": "./apps/web/locales/ro-RO.json"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"forceMode": "OVERRIDE"
|
"forceMode": "OVERRIDE"
|
||||||
|
|||||||
@@ -1,13 +1,16 @@
|
|||||||
import type { StorybookConfig } from "@storybook/react-vite";
|
import type { StorybookConfig } from "@storybook/react-vite";
|
||||||
|
import { createRequire } from "module";
|
||||||
import { dirname, join } from "path";
|
import { dirname, join } from "path";
|
||||||
|
|
||||||
|
const require = createRequire(import.meta.url);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This function is used to resolve the absolute path of a package.
|
* This function is used to resolve the absolute path of a package.
|
||||||
* It is needed in projects that use Yarn PnP or are set up within a monorepo.
|
* It is needed in projects that use Yarn PnP or are set up within a monorepo.
|
||||||
*/
|
*/
|
||||||
const getAbsolutePath = (value: string) => {
|
function getAbsolutePath(value: string): any {
|
||||||
return dirname(require.resolve(join(value, "package.json")));
|
return dirname(require.resolve(join(value, "package.json")));
|
||||||
};
|
}
|
||||||
|
|
||||||
const config: StorybookConfig = {
|
const config: StorybookConfig = {
|
||||||
stories: ["../src/**/*.mdx", "../../web/modules/ui/**/stories.@(js|jsx|mjs|ts|tsx)"],
|
stories: ["../src/**/*.mdx", "../../web/modules/ui/**/stories.@(js|jsx|mjs|ts|tsx)"],
|
||||||
|
|||||||
@@ -86,7 +86,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
OIDC_ISSUER: "https://mock-oidc-issuer.com",
|
OIDC_ISSUER: "https://mock-oidc-issuer.com",
|
||||||
OIDC_SIGNING_ALGORITHM: "RS256",
|
OIDC_SIGNING_ALGORITHM: "RS256",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "test-redis-url",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: true,
|
AUDIT_LOG_ENABLED: true,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -80,25 +80,25 @@ export const LandingSidebar = ({
|
|||||||
<DropdownMenuTrigger
|
<DropdownMenuTrigger
|
||||||
asChild
|
asChild
|
||||||
id="userDropdownTrigger"
|
id="userDropdownTrigger"
|
||||||
className="w-full rounded-br-xl border-t py-4 pl-4 transition-colors duration-200 hover:bg-slate-50 focus:outline-none">
|
className="w-full rounded-br-xl border-t p-4 transition-colors duration-200 hover:bg-slate-50 focus:outline-none">
|
||||||
<div tabIndex={0} className={cn("flex cursor-pointer flex-row items-center space-x-3")}>
|
<div tabIndex={0} className={cn("flex cursor-pointer flex-row items-center gap-3")}>
|
||||||
<ProfileAvatar userId={user.id} imageUrl={user.imageUrl} />
|
<ProfileAvatar userId={user.id} imageUrl={user.imageUrl} />
|
||||||
<>
|
<>
|
||||||
<div>
|
<div className="grow overflow-hidden">
|
||||||
<p
|
<p
|
||||||
title={user?.email}
|
title={user?.email}
|
||||||
className={cn(
|
className={cn(
|
||||||
"ph-no-capture ph-no-capture -mb-0.5 max-w-28 truncate text-sm font-bold text-slate-700"
|
"ph-no-capture ph-no-capture -mb-0.5 truncate text-sm font-bold text-slate-700"
|
||||||
)}>
|
)}>
|
||||||
{user?.name ? <span>{user?.name}</span> : <span>{user?.email}</span>}
|
{user?.name ? <span>{user?.name}</span> : <span>{user?.email}</span>}
|
||||||
</p>
|
</p>
|
||||||
<p
|
<p
|
||||||
title={capitalizeFirstLetter(organization?.name)}
|
title={capitalizeFirstLetter(organization?.name)}
|
||||||
className="max-w-28 truncate text-sm text-slate-500">
|
className="truncate text-sm text-slate-500">
|
||||||
{capitalizeFirstLetter(organization?.name)}
|
{capitalizeFirstLetter(organization?.name)}
|
||||||
</p>
|
</p>
|
||||||
</div>
|
</div>
|
||||||
<ChevronRightIcon className={cn("h-5 w-5 text-slate-700 hover:text-slate-500")} />
|
<ChevronRightIcon className={cn("h-5 w-5 shrink-0 text-slate-700 hover:text-slate-500")} />
|
||||||
</>
|
</>
|
||||||
</div>
|
</div>
|
||||||
</DropdownMenuTrigger>
|
</DropdownMenuTrigger>
|
||||||
|
|||||||
@@ -89,7 +89,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
OIDC_ISSUER: "https://mock-oidc-issuer.com",
|
OIDC_ISSUER: "https://mock-oidc-issuer.com",
|
||||||
OIDC_SIGNING_ALGORITHM: "RS256",
|
OIDC_SIGNING_ALGORITHM: "RS256",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "test-redis-url",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: true,
|
AUDIT_LOG_ENABLED: true,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -97,7 +97,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
OIDC_ISSUER: "https://mock-oidc-issuer.com",
|
OIDC_ISSUER: "https://mock-oidc-issuer.com",
|
||||||
OIDC_SIGNING_ALGORITHM: "RS256",
|
OIDC_SIGNING_ALGORITHM: "RS256",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "test-redis-url",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: true,
|
AUDIT_LOG_ENABLED: true,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -35,7 +35,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
WEBAPP_URL: "test-webapp-url",
|
WEBAPP_URL: "test-webapp-url",
|
||||||
IS_PRODUCTION: false,
|
IS_PRODUCTION: false,
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "test-redis-url",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: true,
|
AUDIT_LOG_ENABLED: true,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -34,7 +34,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
WEBAPP_URL: "test-webapp-url",
|
WEBAPP_URL: "test-webapp-url",
|
||||||
IS_PRODUCTION: false,
|
IS_PRODUCTION: false,
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "test-redis-url",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: true,
|
AUDIT_LOG_ENABLED: true,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ describe("ProjectSettings component", () => {
|
|||||||
industry: "ind",
|
industry: "ind",
|
||||||
defaultBrandColor: "#fff",
|
defaultBrandColor: "#fff",
|
||||||
organizationTeams: [],
|
organizationTeams: [],
|
||||||
canDoRoleManagement: false,
|
isAccessControlAllowed: false,
|
||||||
userProjectsCount: 0,
|
userProjectsCount: 0,
|
||||||
} as any;
|
} as any;
|
||||||
|
|
||||||
|
|||||||
@@ -42,7 +42,7 @@ interface ProjectSettingsProps {
|
|||||||
industry: TProjectConfigIndustry;
|
industry: TProjectConfigIndustry;
|
||||||
defaultBrandColor: string;
|
defaultBrandColor: string;
|
||||||
organizationTeams: TOrganizationTeam[];
|
organizationTeams: TOrganizationTeam[];
|
||||||
canDoRoleManagement: boolean;
|
isAccessControlAllowed: boolean;
|
||||||
userProjectsCount: number;
|
userProjectsCount: number;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -53,7 +53,7 @@ export const ProjectSettings = ({
|
|||||||
industry,
|
industry,
|
||||||
defaultBrandColor,
|
defaultBrandColor,
|
||||||
organizationTeams,
|
organizationTeams,
|
||||||
canDoRoleManagement = false,
|
isAccessControlAllowed = false,
|
||||||
userProjectsCount,
|
userProjectsCount,
|
||||||
}: ProjectSettingsProps) => {
|
}: ProjectSettingsProps) => {
|
||||||
const [createTeamModalOpen, setCreateTeamModalOpen] = useState(false);
|
const [createTeamModalOpen, setCreateTeamModalOpen] = useState(false);
|
||||||
@@ -174,7 +174,7 @@ export const ProjectSettings = ({
|
|||||||
)}
|
)}
|
||||||
/>
|
/>
|
||||||
|
|
||||||
{canDoRoleManagement && userProjectsCount > 0 && (
|
{isAccessControlAllowed && userProjectsCount > 0 && (
|
||||||
<FormField
|
<FormField
|
||||||
control={form.control}
|
control={form.control}
|
||||||
name="teamIds"
|
name="teamIds"
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
import { getTeamsByOrganizationId } from "@/app/(app)/(onboarding)/lib/onboarding";
|
import { getTeamsByOrganizationId } from "@/app/(app)/(onboarding)/lib/onboarding";
|
||||||
import { getUserProjects } from "@/lib/project/service";
|
import { getUserProjects } from "@/lib/project/service";
|
||||||
import { getRoleManagementPermission } from "@/modules/ee/license-check/lib/utils";
|
import { getAccessControlPermission } from "@/modules/ee/license-check/lib/utils";
|
||||||
import { getOrganizationAuth } from "@/modules/organization/lib/utils";
|
import { getOrganizationAuth } from "@/modules/organization/lib/utils";
|
||||||
import "@testing-library/jest-dom/vitest";
|
import "@testing-library/jest-dom/vitest";
|
||||||
import { cleanup, render, screen } from "@testing-library/react";
|
import { cleanup, render, screen } from "@testing-library/react";
|
||||||
@@ -12,7 +12,7 @@ vi.mock("@/lib/constants", () => ({ DEFAULT_BRAND_COLOR: "#fff" }));
|
|||||||
// Mocks before component import
|
// Mocks before component import
|
||||||
vi.mock("@/app/(app)/(onboarding)/lib/onboarding", () => ({ getTeamsByOrganizationId: vi.fn() }));
|
vi.mock("@/app/(app)/(onboarding)/lib/onboarding", () => ({ getTeamsByOrganizationId: vi.fn() }));
|
||||||
vi.mock("@/lib/project/service", () => ({ getUserProjects: vi.fn() }));
|
vi.mock("@/lib/project/service", () => ({ getUserProjects: vi.fn() }));
|
||||||
vi.mock("@/modules/ee/license-check/lib/utils", () => ({ getRoleManagementPermission: vi.fn() }));
|
vi.mock("@/modules/ee/license-check/lib/utils", () => ({ getAccessControlPermission: vi.fn() }));
|
||||||
vi.mock("@/modules/organization/lib/utils", () => ({ getOrganizationAuth: vi.fn() }));
|
vi.mock("@/modules/organization/lib/utils", () => ({ getOrganizationAuth: vi.fn() }));
|
||||||
vi.mock("@/tolgee/server", () => ({ getTranslate: () => Promise.resolve((key: string) => key) }));
|
vi.mock("@/tolgee/server", () => ({ getTranslate: () => Promise.resolve((key: string) => key) }));
|
||||||
vi.mock("next/navigation", () => ({ redirect: vi.fn() }));
|
vi.mock("next/navigation", () => ({ redirect: vi.fn() }));
|
||||||
@@ -61,7 +61,7 @@ describe("ProjectSettingsPage", () => {
|
|||||||
} as any);
|
} as any);
|
||||||
vi.mocked(getUserProjects).mockResolvedValueOnce([] as any);
|
vi.mocked(getUserProjects).mockResolvedValueOnce([] as any);
|
||||||
vi.mocked(getTeamsByOrganizationId).mockResolvedValueOnce(null as any);
|
vi.mocked(getTeamsByOrganizationId).mockResolvedValueOnce(null as any);
|
||||||
vi.mocked(getRoleManagementPermission).mockResolvedValueOnce(false as any);
|
vi.mocked(getAccessControlPermission).mockResolvedValueOnce(false as any);
|
||||||
|
|
||||||
await expect(Page({ params, searchParams })).rejects.toThrow("common.organization_teams_not_found");
|
await expect(Page({ params, searchParams })).rejects.toThrow("common.organization_teams_not_found");
|
||||||
});
|
});
|
||||||
@@ -73,7 +73,7 @@ describe("ProjectSettingsPage", () => {
|
|||||||
} as any);
|
} as any);
|
||||||
vi.mocked(getUserProjects).mockResolvedValueOnce([{ id: "p1" }] as any);
|
vi.mocked(getUserProjects).mockResolvedValueOnce([{ id: "p1" }] as any);
|
||||||
vi.mocked(getTeamsByOrganizationId).mockResolvedValueOnce([{ id: "t1", name: "Team1" }] as any);
|
vi.mocked(getTeamsByOrganizationId).mockResolvedValueOnce([{ id: "t1", name: "Team1" }] as any);
|
||||||
vi.mocked(getRoleManagementPermission).mockResolvedValueOnce(true as any);
|
vi.mocked(getAccessControlPermission).mockResolvedValueOnce(true as any);
|
||||||
|
|
||||||
const element = await Page({ params, searchParams });
|
const element = await Page({ params, searchParams });
|
||||||
render(element as React.ReactElement);
|
render(element as React.ReactElement);
|
||||||
@@ -96,7 +96,7 @@ describe("ProjectSettingsPage", () => {
|
|||||||
} as any);
|
} as any);
|
||||||
vi.mocked(getUserProjects).mockResolvedValueOnce([] as any);
|
vi.mocked(getUserProjects).mockResolvedValueOnce([] as any);
|
||||||
vi.mocked(getTeamsByOrganizationId).mockResolvedValueOnce([{ id: "t1", name: "Team1" }] as any);
|
vi.mocked(getTeamsByOrganizationId).mockResolvedValueOnce([{ id: "t1", name: "Team1" }] as any);
|
||||||
vi.mocked(getRoleManagementPermission).mockResolvedValueOnce(true as any);
|
vi.mocked(getAccessControlPermission).mockResolvedValueOnce(true as any);
|
||||||
|
|
||||||
const element = await Page({ params, searchParams });
|
const element = await Page({ params, searchParams });
|
||||||
render(element as React.ReactElement);
|
render(element as React.ReactElement);
|
||||||
|
|||||||
@@ -2,7 +2,7 @@ import { getTeamsByOrganizationId } from "@/app/(app)/(onboarding)/lib/onboardin
|
|||||||
import { ProjectSettings } from "@/app/(app)/(onboarding)/organizations/[organizationId]/projects/new/settings/components/ProjectSettings";
|
import { ProjectSettings } from "@/app/(app)/(onboarding)/organizations/[organizationId]/projects/new/settings/components/ProjectSettings";
|
||||||
import { DEFAULT_BRAND_COLOR } from "@/lib/constants";
|
import { DEFAULT_BRAND_COLOR } from "@/lib/constants";
|
||||||
import { getUserProjects } from "@/lib/project/service";
|
import { getUserProjects } from "@/lib/project/service";
|
||||||
import { getRoleManagementPermission } from "@/modules/ee/license-check/lib/utils";
|
import { getAccessControlPermission } from "@/modules/ee/license-check/lib/utils";
|
||||||
import { getOrganizationAuth } from "@/modules/organization/lib/utils";
|
import { getOrganizationAuth } from "@/modules/organization/lib/utils";
|
||||||
import { Button } from "@/modules/ui/components/button";
|
import { Button } from "@/modules/ui/components/button";
|
||||||
import { Header } from "@/modules/ui/components/header";
|
import { Header } from "@/modules/ui/components/header";
|
||||||
@@ -41,7 +41,7 @@ const Page = async (props: ProjectSettingsPageProps) => {
|
|||||||
|
|
||||||
const organizationTeams = await getTeamsByOrganizationId(params.organizationId);
|
const organizationTeams = await getTeamsByOrganizationId(params.organizationId);
|
||||||
|
|
||||||
const canDoRoleManagement = await getRoleManagementPermission(organization.billing.plan);
|
const isAccessControlAllowed = await getAccessControlPermission(organization.billing.plan);
|
||||||
|
|
||||||
if (!organizationTeams) {
|
if (!organizationTeams) {
|
||||||
throw new Error(t("common.organization_teams_not_found"));
|
throw new Error(t("common.organization_teams_not_found"));
|
||||||
@@ -60,7 +60,7 @@ const Page = async (props: ProjectSettingsPageProps) => {
|
|||||||
industry={industry}
|
industry={industry}
|
||||||
defaultBrandColor={DEFAULT_BRAND_COLOR}
|
defaultBrandColor={DEFAULT_BRAND_COLOR}
|
||||||
organizationTeams={organizationTeams}
|
organizationTeams={organizationTeams}
|
||||||
canDoRoleManagement={canDoRoleManagement}
|
isAccessControlAllowed={isAccessControlAllowed}
|
||||||
userProjectsCount={projects.length}
|
userProjectsCount={projects.length}
|
||||||
/>
|
/>
|
||||||
{projects.length >= 1 && (
|
{projects.length >= 1 && (
|
||||||
|
|||||||
@@ -27,7 +27,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
IS_POSTHOG_CONFIGURED: true,
|
IS_POSTHOG_CONFIGURED: true,
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
AUDIT_LOG_ENABLED: 1,
|
AUDIT_LOG_ENABLED: 1,
|
||||||
REDIS_URL: "redis://localhost:6379",
|
REDIS_URL: undefined,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
vi.mock("@/lib/env", () => ({
|
vi.mock("@/lib/env", () => ({
|
||||||
|
|||||||
@@ -8,8 +8,8 @@ import { checkAuthorizationUpdated } from "@/lib/utils/action-client/action-clie
|
|||||||
import { AuthenticatedActionClientCtx } from "@/lib/utils/action-client/types/context";
|
import { AuthenticatedActionClientCtx } from "@/lib/utils/action-client/types/context";
|
||||||
import { withAuditLogging } from "@/modules/ee/audit-logs/lib/handler";
|
import { withAuditLogging } from "@/modules/ee/audit-logs/lib/handler";
|
||||||
import {
|
import {
|
||||||
|
getAccessControlPermission,
|
||||||
getOrganizationProjectsLimit,
|
getOrganizationProjectsLimit,
|
||||||
getRoleManagementPermission,
|
|
||||||
} from "@/modules/ee/license-check/lib/utils";
|
} from "@/modules/ee/license-check/lib/utils";
|
||||||
import { createProject } from "@/modules/projects/settings/lib/project";
|
import { createProject } from "@/modules/projects/settings/lib/project";
|
||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
@@ -58,9 +58,9 @@ export const createProjectAction = authenticatedActionClient.schema(ZCreateProje
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (parsedInput.data.teamIds && parsedInput.data.teamIds.length > 0) {
|
if (parsedInput.data.teamIds && parsedInput.data.teamIds.length > 0) {
|
||||||
const canDoRoleManagement = await getRoleManagementPermission(organization.billing.plan);
|
const isAccessControlAllowed = await getAccessControlPermission(organization.billing.plan);
|
||||||
|
|
||||||
if (!canDoRoleManagement) {
|
if (!isAccessControlAllowed) {
|
||||||
throw new OperationNotAllowedError("You do not have permission to manage roles");
|
throw new OperationNotAllowedError("You do not have permission to manage roles");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -71,10 +71,6 @@ export const createProjectAction = authenticatedActionClient.schema(ZCreateProje
|
|||||||
alert: {
|
alert: {
|
||||||
...user.notificationSettings?.alert,
|
...user.notificationSettings?.alert,
|
||||||
},
|
},
|
||||||
weeklySummary: {
|
|
||||||
...user.notificationSettings?.weeklySummary,
|
|
||||||
[project.id]: true,
|
|
||||||
},
|
|
||||||
};
|
};
|
||||||
|
|
||||||
await updateUser(user.id, {
|
await updateUser(user.id, {
|
||||||
|
|||||||
@@ -24,14 +24,17 @@ export const ActionClassesTable = ({
|
|||||||
otherEnvActionClasses,
|
otherEnvActionClasses,
|
||||||
otherEnvironment,
|
otherEnvironment,
|
||||||
}: ActionClassesTableProps) => {
|
}: ActionClassesTableProps) => {
|
||||||
const [isActionDetailModalOpen, setActionDetailModalOpen] = useState(false);
|
const [isActionDetailModalOpen, setIsActionDetailModalOpen] = useState(false);
|
||||||
|
|
||||||
const [activeActionClass, setActiveActionClass] = useState<TActionClass>();
|
const [activeActionClass, setActiveActionClass] = useState<TActionClass>();
|
||||||
|
|
||||||
const handleOpenActionDetailModalClick = (e, actionClass: TActionClass) => {
|
const handleOpenActionDetailModalClick = (
|
||||||
|
e: React.MouseEvent<HTMLButtonElement>,
|
||||||
|
actionClass: TActionClass
|
||||||
|
) => {
|
||||||
e.preventDefault();
|
e.preventDefault();
|
||||||
setActiveActionClass(actionClass);
|
setActiveActionClass(actionClass);
|
||||||
setActionDetailModalOpen(true);
|
setIsActionDetailModalOpen(true);
|
||||||
};
|
};
|
||||||
|
|
||||||
return (
|
return (
|
||||||
@@ -42,7 +45,7 @@ export const ActionClassesTable = ({
|
|||||||
{actionClasses.length > 0 ? (
|
{actionClasses.length > 0 ? (
|
||||||
actionClasses.map((actionClass, index) => (
|
actionClasses.map((actionClass, index) => (
|
||||||
<button
|
<button
|
||||||
onClick={(e) => {
|
onClick={(e: React.MouseEvent<HTMLButtonElement>) => {
|
||||||
handleOpenActionDetailModalClick(e, actionClass);
|
handleOpenActionDetailModalClick(e, actionClass);
|
||||||
}}
|
}}
|
||||||
className="w-full"
|
className="w-full"
|
||||||
@@ -63,7 +66,7 @@ export const ActionClassesTable = ({
|
|||||||
environmentId={environmentId}
|
environmentId={environmentId}
|
||||||
environment={environment}
|
environment={environment}
|
||||||
open={isActionDetailModalOpen}
|
open={isActionDetailModalOpen}
|
||||||
setOpen={setActionDetailModalOpen}
|
setOpen={setIsActionDetailModalOpen}
|
||||||
actionClasses={actionClasses}
|
actionClasses={actionClasses}
|
||||||
actionClass={activeActionClass}
|
actionClass={activeActionClass}
|
||||||
isReadOnly={isReadOnly}
|
isReadOnly={isReadOnly}
|
||||||
|
|||||||
@@ -70,15 +70,13 @@ export const ActionDetailModal = ({
|
|||||||
};
|
};
|
||||||
|
|
||||||
return (
|
return (
|
||||||
<>
|
<ModalWithTabs
|
||||||
<ModalWithTabs
|
open={open}
|
||||||
open={open}
|
setOpen={setOpen}
|
||||||
setOpen={setOpen}
|
tabs={tabs}
|
||||||
tabs={tabs}
|
icon={ACTION_TYPE_ICON_LOOKUP[actionClass.type]}
|
||||||
icon={ACTION_TYPE_ICON_LOOKUP[actionClass.type]}
|
label={actionClass.name}
|
||||||
label={actionClass.name}
|
description={typeDescription()}
|
||||||
description={typeDescription()}
|
/>
|
||||||
/>
|
|
||||||
</>
|
|
||||||
);
|
);
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -11,6 +11,21 @@ vi.mock("@/app/(app)/environments/[environmentId]/actions/actions", () => ({
|
|||||||
updateActionClassAction: vi.fn(),
|
updateActionClassAction: vi.fn(),
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
// Mock action utils
|
||||||
|
vi.mock("@/modules/survey/editor/lib/action-utils", () => ({
|
||||||
|
useActionClassKeys: vi.fn(() => ["existing-key"]),
|
||||||
|
createActionClassZodResolver: vi.fn(() => vi.fn()),
|
||||||
|
validatePermissions: vi.fn(),
|
||||||
|
}));
|
||||||
|
|
||||||
|
// Mock action builder
|
||||||
|
vi.mock("@/modules/survey/editor/lib/action-builder", () => ({
|
||||||
|
buildActionObject: vi.fn((data, environmentId, t) => ({
|
||||||
|
...data,
|
||||||
|
environmentId,
|
||||||
|
})),
|
||||||
|
}));
|
||||||
|
|
||||||
// Mock utils
|
// Mock utils
|
||||||
vi.mock("@/app/lib/actionClass/actionClass", () => ({
|
vi.mock("@/app/lib/actionClass/actionClass", () => ({
|
||||||
isValidCssSelector: vi.fn((selector) => selector !== "invalid-selector"),
|
isValidCssSelector: vi.fn((selector) => selector !== "invalid-selector"),
|
||||||
@@ -24,6 +39,7 @@ vi.mock("@/modules/ui/components/button", () => ({
|
|||||||
</button>
|
</button>
|
||||||
),
|
),
|
||||||
}));
|
}));
|
||||||
|
|
||||||
vi.mock("@/modules/ui/components/code-action-form", () => ({
|
vi.mock("@/modules/ui/components/code-action-form", () => ({
|
||||||
CodeActionForm: ({ isReadOnly }: { isReadOnly: boolean }) => (
|
CodeActionForm: ({ isReadOnly }: { isReadOnly: boolean }) => (
|
||||||
<div data-testid="code-action-form" data-readonly={isReadOnly}>
|
<div data-testid="code-action-form" data-readonly={isReadOnly}>
|
||||||
@@ -31,6 +47,7 @@ vi.mock("@/modules/ui/components/code-action-form", () => ({
|
|||||||
</div>
|
</div>
|
||||||
),
|
),
|
||||||
}));
|
}));
|
||||||
|
|
||||||
vi.mock("@/modules/ui/components/delete-dialog", () => ({
|
vi.mock("@/modules/ui/components/delete-dialog", () => ({
|
||||||
DeleteDialog: ({ open, setOpen, isDeleting, onDelete }: any) =>
|
DeleteDialog: ({ open, setOpen, isDeleting, onDelete }: any) =>
|
||||||
open ? (
|
open ? (
|
||||||
@@ -43,6 +60,26 @@ vi.mock("@/modules/ui/components/delete-dialog", () => ({
|
|||||||
</div>
|
</div>
|
||||||
) : null,
|
) : null,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
vi.mock("@/modules/ui/components/action-name-description-fields", () => ({
|
||||||
|
ActionNameDescriptionFields: ({ isReadOnly, nameInputId, descriptionInputId }: any) => (
|
||||||
|
<div data-testid="action-name-description-fields">
|
||||||
|
<input
|
||||||
|
data-testid={`name-input-${nameInputId}`}
|
||||||
|
placeholder="environments.actions.eg_clicked_download"
|
||||||
|
disabled={isReadOnly}
|
||||||
|
defaultValue="Test Action"
|
||||||
|
/>
|
||||||
|
<input
|
||||||
|
data-testid={`description-input-${descriptionInputId}`}
|
||||||
|
placeholder="environments.actions.user_clicked_download_button"
|
||||||
|
disabled={isReadOnly}
|
||||||
|
defaultValue="Test Description"
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
|
),
|
||||||
|
}));
|
||||||
|
|
||||||
vi.mock("@/modules/ui/components/no-code-action-form", () => ({
|
vi.mock("@/modules/ui/components/no-code-action-form", () => ({
|
||||||
NoCodeActionForm: ({ isReadOnly }: { isReadOnly: boolean }) => (
|
NoCodeActionForm: ({ isReadOnly }: { isReadOnly: boolean }) => (
|
||||||
<div data-testid="no-code-action-form" data-readonly={isReadOnly}>
|
<div data-testid="no-code-action-form" data-readonly={isReadOnly}>
|
||||||
@@ -56,6 +93,23 @@ vi.mock("lucide-react", () => ({
|
|||||||
TrashIcon: () => <div data-testid="trash-icon">Trash</div>,
|
TrashIcon: () => <div data-testid="trash-icon">Trash</div>,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
// Mock react-hook-form
|
||||||
|
const mockHandleSubmit = vi.fn();
|
||||||
|
const mockForm = {
|
||||||
|
handleSubmit: mockHandleSubmit,
|
||||||
|
control: {},
|
||||||
|
formState: { errors: {} },
|
||||||
|
};
|
||||||
|
|
||||||
|
vi.mock("react-hook-form", async () => {
|
||||||
|
const actual = await vi.importActual("react-hook-form");
|
||||||
|
return {
|
||||||
|
...actual,
|
||||||
|
useForm: vi.fn(() => mockForm),
|
||||||
|
FormProvider: ({ children }: any) => <div>{children}</div>,
|
||||||
|
};
|
||||||
|
});
|
||||||
|
|
||||||
const mockSetOpen = vi.fn();
|
const mockSetOpen = vi.fn();
|
||||||
const mockActionClasses: TActionClass[] = [
|
const mockActionClasses: TActionClass[] = [
|
||||||
{
|
{
|
||||||
@@ -88,6 +142,7 @@ const createMockActionClass = (id: string, type: TActionClassType, name: string)
|
|||||||
describe("ActionSettingsTab", () => {
|
describe("ActionSettingsTab", () => {
|
||||||
beforeEach(() => {
|
beforeEach(() => {
|
||||||
vi.clearAllMocks();
|
vi.clearAllMocks();
|
||||||
|
mockHandleSubmit.mockImplementation((fn) => fn);
|
||||||
});
|
});
|
||||||
|
|
||||||
afterEach(() => {
|
afterEach(() => {
|
||||||
@@ -105,13 +160,9 @@ describe("ActionSettingsTab", () => {
|
|||||||
/>
|
/>
|
||||||
);
|
);
|
||||||
|
|
||||||
// Use getByPlaceholderText or getByLabelText now that Input isn't mocked
|
expect(screen.getByTestId("action-name-description-fields")).toBeInTheDocument();
|
||||||
expect(screen.getByPlaceholderText("environments.actions.eg_clicked_download")).toHaveValue(
|
expect(screen.getByTestId("name-input-actionNameSettingsInput")).toBeInTheDocument();
|
||||||
actionClass.name
|
expect(screen.getByTestId("description-input-actionDescriptionSettingsInput")).toBeInTheDocument();
|
||||||
);
|
|
||||||
expect(screen.getByPlaceholderText("environments.actions.user_clicked_download_button")).toHaveValue(
|
|
||||||
actionClass.description
|
|
||||||
);
|
|
||||||
expect(screen.getByTestId("code-action-form")).toBeInTheDocument();
|
expect(screen.getByTestId("code-action-form")).toBeInTheDocument();
|
||||||
expect(
|
expect(
|
||||||
screen.getByText("environments.actions.this_is_a_code_action_please_make_changes_in_your_code_base")
|
screen.getByText("environments.actions.this_is_a_code_action_please_make_changes_in_your_code_base")
|
||||||
@@ -131,18 +182,104 @@ describe("ActionSettingsTab", () => {
|
|||||||
/>
|
/>
|
||||||
);
|
);
|
||||||
|
|
||||||
// Use getByPlaceholderText or getByLabelText now that Input isn't mocked
|
expect(screen.getByTestId("action-name-description-fields")).toBeInTheDocument();
|
||||||
expect(screen.getByPlaceholderText("environments.actions.eg_clicked_download")).toHaveValue(
|
|
||||||
actionClass.name
|
|
||||||
);
|
|
||||||
expect(screen.getByPlaceholderText("environments.actions.user_clicked_download_button")).toHaveValue(
|
|
||||||
actionClass.description
|
|
||||||
);
|
|
||||||
expect(screen.getByTestId("no-code-action-form")).toBeInTheDocument();
|
expect(screen.getByTestId("no-code-action-form")).toBeInTheDocument();
|
||||||
expect(screen.getByRole("button", { name: "common.save_changes" })).toBeInTheDocument();
|
expect(screen.getByRole("button", { name: "common.save_changes" })).toBeInTheDocument();
|
||||||
expect(screen.getByRole("button", { name: /common.delete/ })).toBeInTheDocument();
|
expect(screen.getByRole("button", { name: /common.delete/ })).toBeInTheDocument();
|
||||||
});
|
});
|
||||||
|
|
||||||
|
test("renders correctly for other action types (fallback)", () => {
|
||||||
|
const actionClass = {
|
||||||
|
...createMockActionClass("auto1", "noCode", "Auto Action"),
|
||||||
|
type: "automatic" as any,
|
||||||
|
};
|
||||||
|
render(
|
||||||
|
<ActionSettingsTab
|
||||||
|
actionClass={actionClass}
|
||||||
|
actionClasses={mockActionClasses}
|
||||||
|
setOpen={mockSetOpen}
|
||||||
|
isReadOnly={false}
|
||||||
|
/>
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("action-name-description-fields")).toBeInTheDocument();
|
||||||
|
expect(
|
||||||
|
screen.getByText(
|
||||||
|
"environments.actions.this_action_was_created_automatically_you_cannot_make_changes_to_it"
|
||||||
|
)
|
||||||
|
).toBeInTheDocument();
|
||||||
|
});
|
||||||
|
|
||||||
|
test("calls utility functions on initialization", async () => {
|
||||||
|
const actionUtilsMock = await import("@/modules/survey/editor/lib/action-utils");
|
||||||
|
|
||||||
|
const actionClass = createMockActionClass("noCode1", "noCode", "No Code Action");
|
||||||
|
render(
|
||||||
|
<ActionSettingsTab
|
||||||
|
actionClass={actionClass}
|
||||||
|
actionClasses={mockActionClasses}
|
||||||
|
setOpen={mockSetOpen}
|
||||||
|
isReadOnly={false}
|
||||||
|
/>
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(actionUtilsMock.useActionClassKeys).toHaveBeenCalledWith(mockActionClasses);
|
||||||
|
expect(actionUtilsMock.createActionClassZodResolver).toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles successful form submission", async () => {
|
||||||
|
const { updateActionClassAction } = await import(
|
||||||
|
"@/app/(app)/environments/[environmentId]/actions/actions"
|
||||||
|
);
|
||||||
|
const actionUtilsMock = await import("@/modules/survey/editor/lib/action-utils");
|
||||||
|
|
||||||
|
vi.mocked(updateActionClassAction).mockResolvedValue({ data: {} } as any);
|
||||||
|
|
||||||
|
const actionClass = createMockActionClass("noCode1", "noCode", "No Code Action");
|
||||||
|
render(
|
||||||
|
<ActionSettingsTab
|
||||||
|
actionClass={actionClass}
|
||||||
|
actionClasses={mockActionClasses}
|
||||||
|
setOpen={mockSetOpen}
|
||||||
|
isReadOnly={false}
|
||||||
|
/>
|
||||||
|
);
|
||||||
|
|
||||||
|
// Check that utility functions were called during component initialization
|
||||||
|
expect(actionUtilsMock.useActionClassKeys).toHaveBeenCalledWith(mockActionClasses);
|
||||||
|
expect(actionUtilsMock.createActionClassZodResolver).toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles permission validation error", async () => {
|
||||||
|
const actionUtilsMock = await import("@/modules/survey/editor/lib/action-utils");
|
||||||
|
vi.mocked(actionUtilsMock.validatePermissions).mockImplementation(() => {
|
||||||
|
throw new Error("Not authorized");
|
||||||
|
});
|
||||||
|
|
||||||
|
const actionClass = createMockActionClass("noCode1", "noCode", "No Code Action");
|
||||||
|
render(
|
||||||
|
<ActionSettingsTab
|
||||||
|
actionClass={actionClass}
|
||||||
|
actionClasses={mockActionClasses}
|
||||||
|
setOpen={mockSetOpen}
|
||||||
|
isReadOnly={false}
|
||||||
|
/>
|
||||||
|
);
|
||||||
|
|
||||||
|
const submitButton = screen.getByRole("button", { name: "common.save_changes" });
|
||||||
|
|
||||||
|
mockHandleSubmit.mockImplementation((fn) => (e) => {
|
||||||
|
e.preventDefault();
|
||||||
|
return fn({ name: "Test", type: "noCode" });
|
||||||
|
});
|
||||||
|
|
||||||
|
await userEvent.click(submitButton);
|
||||||
|
|
||||||
|
await waitFor(() => {
|
||||||
|
expect(toast.error).toHaveBeenCalledWith("Not authorized");
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
test("handles successful deletion", async () => {
|
test("handles successful deletion", async () => {
|
||||||
const actionClass = createMockActionClass("noCode1", "noCode", "No Code Action");
|
const actionClass = createMockActionClass("noCode1", "noCode", "No Code Action");
|
||||||
const { deleteActionClassAction } = await import(
|
const { deleteActionClassAction } = await import(
|
||||||
@@ -209,17 +346,16 @@ describe("ActionSettingsTab", () => {
|
|||||||
actionClass={actionClass}
|
actionClass={actionClass}
|
||||||
actionClasses={mockActionClasses}
|
actionClasses={mockActionClasses}
|
||||||
setOpen={mockSetOpen}
|
setOpen={mockSetOpen}
|
||||||
isReadOnly={true} // Set to read-only
|
isReadOnly={true}
|
||||||
/>
|
/>
|
||||||
);
|
);
|
||||||
|
|
||||||
// Use getByPlaceholderText or getByLabelText now that Input isn't mocked
|
expect(screen.getByTestId("name-input-actionNameSettingsInput")).toBeDisabled();
|
||||||
expect(screen.getByPlaceholderText("environments.actions.eg_clicked_download")).toBeDisabled();
|
expect(screen.getByTestId("description-input-actionDescriptionSettingsInput")).toBeDisabled();
|
||||||
expect(screen.getByPlaceholderText("environments.actions.user_clicked_download_button")).toBeDisabled();
|
|
||||||
expect(screen.getByTestId("no-code-action-form")).toHaveAttribute("data-readonly", "true");
|
expect(screen.getByTestId("no-code-action-form")).toHaveAttribute("data-readonly", "true");
|
||||||
expect(screen.queryByRole("button", { name: "common.save_changes" })).not.toBeInTheDocument();
|
expect(screen.queryByRole("button", { name: "common.save_changes" })).not.toBeInTheDocument();
|
||||||
expect(screen.queryByRole("button", { name: /common.delete/ })).not.toBeInTheDocument();
|
expect(screen.queryByRole("button", { name: /common.delete/ })).not.toBeInTheDocument();
|
||||||
expect(screen.getByRole("link", { name: "common.read_docs" })).toBeInTheDocument(); // Docs link still visible
|
expect(screen.getByRole("link", { name: "common.read_docs" })).toBeInTheDocument();
|
||||||
});
|
});
|
||||||
|
|
||||||
test("prevents delete when read-only", async () => {
|
test("prevents delete when read-only", async () => {
|
||||||
@@ -228,7 +364,6 @@ describe("ActionSettingsTab", () => {
|
|||||||
"@/app/(app)/environments/[environmentId]/actions/actions"
|
"@/app/(app)/environments/[environmentId]/actions/actions"
|
||||||
);
|
);
|
||||||
|
|
||||||
// Render with isReadOnly=true, but simulate a delete attempt
|
|
||||||
render(
|
render(
|
||||||
<ActionSettingsTab
|
<ActionSettingsTab
|
||||||
actionClass={actionClass}
|
actionClass={actionClass}
|
||||||
@@ -238,12 +373,6 @@ describe("ActionSettingsTab", () => {
|
|||||||
/>
|
/>
|
||||||
);
|
);
|
||||||
|
|
||||||
// Try to open and confirm delete dialog (buttons won't exist, so we simulate the flow)
|
|
||||||
// This test primarily checks the logic within handleDeleteAction if it were called.
|
|
||||||
// A better approach might be to export handleDeleteAction for direct testing,
|
|
||||||
// but for now, we assume the UI prevents calling it.
|
|
||||||
|
|
||||||
// We can assert that the delete button isn't there to prevent the flow
|
|
||||||
expect(screen.queryByRole("button", { name: /common.delete/ })).not.toBeInTheDocument();
|
expect(screen.queryByRole("button", { name: /common.delete/ })).not.toBeInTheDocument();
|
||||||
expect(deleteActionClassAction).not.toHaveBeenCalled();
|
expect(deleteActionClassAction).not.toHaveBeenCalled();
|
||||||
});
|
});
|
||||||
@@ -262,4 +391,19 @@ describe("ActionSettingsTab", () => {
|
|||||||
expect(docsLink).toHaveAttribute("href", "https://formbricks.com/docs/actions/no-code");
|
expect(docsLink).toHaveAttribute("href", "https://formbricks.com/docs/actions/no-code");
|
||||||
expect(docsLink).toHaveAttribute("target", "_blank");
|
expect(docsLink).toHaveAttribute("target", "_blank");
|
||||||
});
|
});
|
||||||
|
|
||||||
|
test("uses correct input IDs for ActionNameDescriptionFields", () => {
|
||||||
|
const actionClass = createMockActionClass("noCode1", "noCode", "No Code Action");
|
||||||
|
render(
|
||||||
|
<ActionSettingsTab
|
||||||
|
actionClass={actionClass}
|
||||||
|
actionClasses={mockActionClasses}
|
||||||
|
setOpen={mockSetOpen}
|
||||||
|
isReadOnly={false}
|
||||||
|
/>
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("name-input-actionNameSettingsInput")).toBeInTheDocument();
|
||||||
|
expect(screen.getByTestId("description-input-actionDescriptionSettingsInput")).toBeInTheDocument();
|
||||||
|
});
|
||||||
});
|
});
|
||||||
|
|||||||
@@ -4,14 +4,17 @@ import {
|
|||||||
deleteActionClassAction,
|
deleteActionClassAction,
|
||||||
updateActionClassAction,
|
updateActionClassAction,
|
||||||
} from "@/app/(app)/environments/[environmentId]/actions/actions";
|
} from "@/app/(app)/environments/[environmentId]/actions/actions";
|
||||||
import { isValidCssSelector } from "@/app/lib/actionClass/actionClass";
|
import { buildActionObject } from "@/modules/survey/editor/lib/action-builder";
|
||||||
|
import {
|
||||||
|
createActionClassZodResolver,
|
||||||
|
useActionClassKeys,
|
||||||
|
validatePermissions,
|
||||||
|
} from "@/modules/survey/editor/lib/action-utils";
|
||||||
|
import { ActionNameDescriptionFields } from "@/modules/ui/components/action-name-description-fields";
|
||||||
import { Button } from "@/modules/ui/components/button";
|
import { Button } from "@/modules/ui/components/button";
|
||||||
import { CodeActionForm } from "@/modules/ui/components/code-action-form";
|
import { CodeActionForm } from "@/modules/ui/components/code-action-form";
|
||||||
import { DeleteDialog } from "@/modules/ui/components/delete-dialog";
|
import { DeleteDialog } from "@/modules/ui/components/delete-dialog";
|
||||||
import { FormControl, FormError, FormField, FormItem, FormLabel } from "@/modules/ui/components/form";
|
|
||||||
import { Input } from "@/modules/ui/components/input";
|
|
||||||
import { NoCodeActionForm } from "@/modules/ui/components/no-code-action-form";
|
import { NoCodeActionForm } from "@/modules/ui/components/no-code-action-form";
|
||||||
import { zodResolver } from "@hookform/resolvers/zod";
|
|
||||||
import { useTranslate } from "@tolgee/react";
|
import { useTranslate } from "@tolgee/react";
|
||||||
import { TrashIcon } from "lucide-react";
|
import { TrashIcon } from "lucide-react";
|
||||||
import Link from "next/link";
|
import Link from "next/link";
|
||||||
@@ -19,8 +22,7 @@ import { useRouter } from "next/navigation";
|
|||||||
import { useMemo, useState } from "react";
|
import { useMemo, useState } from "react";
|
||||||
import { FormProvider, useForm } from "react-hook-form";
|
import { FormProvider, useForm } from "react-hook-form";
|
||||||
import { toast } from "react-hot-toast";
|
import { toast } from "react-hot-toast";
|
||||||
import { z } from "zod";
|
import { TActionClass, TActionClassInput } from "@formbricks/types/action-classes";
|
||||||
import { TActionClass, TActionClassInput, ZActionClassInput } from "@formbricks/types/action-classes";
|
|
||||||
|
|
||||||
interface ActionSettingsTabProps {
|
interface ActionSettingsTabProps {
|
||||||
actionClass: TActionClass;
|
actionClass: TActionClass;
|
||||||
@@ -48,63 +50,51 @@ export const ActionSettingsTab = ({
|
|||||||
[actionClass.id, actionClasses]
|
[actionClass.id, actionClasses]
|
||||||
);
|
);
|
||||||
|
|
||||||
|
const actionClassKeys = useActionClassKeys(actionClasses);
|
||||||
|
|
||||||
const form = useForm<TActionClassInput>({
|
const form = useForm<TActionClassInput>({
|
||||||
defaultValues: {
|
defaultValues: {
|
||||||
...restActionClass,
|
...restActionClass,
|
||||||
},
|
},
|
||||||
resolver: zodResolver(
|
resolver: createActionClassZodResolver(actionClassNames, actionClassKeys, t),
|
||||||
ZActionClassInput.superRefine((data, ctx) => {
|
|
||||||
if (data.name && actionClassNames.includes(data.name)) {
|
|
||||||
ctx.addIssue({
|
|
||||||
code: z.ZodIssueCode.custom,
|
|
||||||
path: ["name"],
|
|
||||||
message: t("environments.actions.action_with_name_already_exists", { name: data.name }),
|
|
||||||
});
|
|
||||||
}
|
|
||||||
})
|
|
||||||
),
|
|
||||||
|
|
||||||
mode: "onChange",
|
mode: "onChange",
|
||||||
});
|
});
|
||||||
|
|
||||||
const { handleSubmit, control } = form;
|
const { handleSubmit, control } = form;
|
||||||
|
|
||||||
|
const renderActionForm = () => {
|
||||||
|
if (actionClass.type === "code") {
|
||||||
|
return (
|
||||||
|
<>
|
||||||
|
<CodeActionForm form={form} isReadOnly={true} />
|
||||||
|
<p className="text-sm text-slate-600">
|
||||||
|
{t("environments.actions.this_is_a_code_action_please_make_changes_in_your_code_base")}
|
||||||
|
</p>
|
||||||
|
</>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (actionClass.type === "noCode") {
|
||||||
|
return <NoCodeActionForm form={form} isReadOnly={isReadOnly} />;
|
||||||
|
}
|
||||||
|
|
||||||
|
return (
|
||||||
|
<p className="text-sm text-slate-600">
|
||||||
|
{t("environments.actions.this_action_was_created_automatically_you_cannot_make_changes_to_it")}
|
||||||
|
</p>
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
const onSubmit = async (data: TActionClassInput) => {
|
const onSubmit = async (data: TActionClassInput) => {
|
||||||
try {
|
try {
|
||||||
if (isReadOnly) {
|
|
||||||
throw new Error(t("common.you_are_not_authorised_to_perform_this_action"));
|
|
||||||
}
|
|
||||||
setIsUpdatingAction(true);
|
setIsUpdatingAction(true);
|
||||||
|
validatePermissions(isReadOnly, t);
|
||||||
|
const updatedAction = buildActionObject(data, actionClass.environmentId, t);
|
||||||
|
|
||||||
if (data.name && actionClassNames.includes(data.name)) {
|
|
||||||
throw new Error(t("environments.actions.action_with_name_already_exists", { name: data.name }));
|
|
||||||
}
|
|
||||||
|
|
||||||
if (
|
|
||||||
data.type === "noCode" &&
|
|
||||||
data.noCodeConfig?.type === "click" &&
|
|
||||||
data.noCodeConfig.elementSelector.cssSelector &&
|
|
||||||
!isValidCssSelector(data.noCodeConfig.elementSelector.cssSelector)
|
|
||||||
) {
|
|
||||||
throw new Error(t("environments.actions.invalid_css_selector"));
|
|
||||||
}
|
|
||||||
|
|
||||||
const updatedData: TActionClassInput = {
|
|
||||||
...data,
|
|
||||||
...(data.type === "noCode" &&
|
|
||||||
data.noCodeConfig?.type === "click" && {
|
|
||||||
noCodeConfig: {
|
|
||||||
...data.noCodeConfig,
|
|
||||||
elementSelector: {
|
|
||||||
cssSelector: data.noCodeConfig.elementSelector.cssSelector,
|
|
||||||
innerHtml: data.noCodeConfig.elementSelector.innerHtml,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}),
|
|
||||||
};
|
|
||||||
await updateActionClassAction({
|
await updateActionClassAction({
|
||||||
actionClassId: actionClass.id,
|
actionClassId: actionClass.id,
|
||||||
updatedAction: updatedData,
|
updatedAction: updatedAction,
|
||||||
});
|
});
|
||||||
setOpen(false);
|
setOpen(false);
|
||||||
router.refresh();
|
router.refresh();
|
||||||
@@ -123,7 +113,7 @@ export const ActionSettingsTab = ({
|
|||||||
router.refresh();
|
router.refresh();
|
||||||
toast.success(t("environments.actions.action_deleted_successfully"));
|
toast.success(t("environments.actions.action_deleted_successfully"));
|
||||||
setOpen(false);
|
setOpen(false);
|
||||||
} catch (error) {
|
} catch {
|
||||||
toast.error(t("common.something_went_wrong_please_try_again"));
|
toast.error(t("common.something_went_wrong_please_try_again"));
|
||||||
} finally {
|
} finally {
|
||||||
setIsDeletingAction(false);
|
setIsDeletingAction(false);
|
||||||
@@ -135,79 +125,14 @@ export const ActionSettingsTab = ({
|
|||||||
<FormProvider {...form}>
|
<FormProvider {...form}>
|
||||||
<form onSubmit={handleSubmit(onSubmit)}>
|
<form onSubmit={handleSubmit(onSubmit)}>
|
||||||
<div className="max-h-[400px] w-full space-y-4 overflow-y-auto">
|
<div className="max-h-[400px] w-full space-y-4 overflow-y-auto">
|
||||||
<div className="grid w-full grid-cols-2 gap-x-4">
|
<ActionNameDescriptionFields
|
||||||
<div className="col-span-1">
|
control={control}
|
||||||
<FormField
|
isReadOnly={isReadOnly}
|
||||||
control={control}
|
nameInputId="actionNameSettingsInput"
|
||||||
name="name"
|
descriptionInputId="actionDescriptionSettingsInput"
|
||||||
disabled={isReadOnly}
|
/>
|
||||||
render={({ field, fieldState: { error } }) => (
|
|
||||||
<FormItem>
|
|
||||||
<FormLabel htmlFor="actionNameSettingsInput">
|
|
||||||
{actionClass.type === "noCode"
|
|
||||||
? t("environments.actions.what_did_your_user_do")
|
|
||||||
: t("environments.actions.display_name")}
|
|
||||||
</FormLabel>
|
|
||||||
|
|
||||||
<FormControl>
|
{renderActionForm()}
|
||||||
<Input
|
|
||||||
type="text"
|
|
||||||
id="actionNameSettingsInput"
|
|
||||||
{...field}
|
|
||||||
placeholder={t("environments.actions.eg_clicked_download")}
|
|
||||||
isInvalid={!!error?.message}
|
|
||||||
disabled={isReadOnly}
|
|
||||||
/>
|
|
||||||
</FormControl>
|
|
||||||
|
|
||||||
<FormError />
|
|
||||||
</FormItem>
|
|
||||||
)}
|
|
||||||
/>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div className="col-span-1">
|
|
||||||
<FormField
|
|
||||||
control={control}
|
|
||||||
name="description"
|
|
||||||
render={({ field }) => (
|
|
||||||
<FormItem>
|
|
||||||
<FormLabel htmlFor="actionDescriptionSettingsInput">
|
|
||||||
{t("common.description")}
|
|
||||||
</FormLabel>
|
|
||||||
|
|
||||||
<FormControl>
|
|
||||||
<Input
|
|
||||||
type="text"
|
|
||||||
id="actionDescriptionSettingsInput"
|
|
||||||
{...field}
|
|
||||||
placeholder={t("environments.actions.user_clicked_download_button")}
|
|
||||||
value={field.value ?? ""}
|
|
||||||
disabled={isReadOnly}
|
|
||||||
/>
|
|
||||||
</FormControl>
|
|
||||||
</FormItem>
|
|
||||||
)}
|
|
||||||
/>
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
{actionClass.type === "code" ? (
|
|
||||||
<>
|
|
||||||
<CodeActionForm form={form} isReadOnly={true} />
|
|
||||||
<p className="text-sm text-slate-600">
|
|
||||||
{t("environments.actions.this_is_a_code_action_please_make_changes_in_your_code_base")}
|
|
||||||
</p>
|
|
||||||
</>
|
|
||||||
) : actionClass.type === "noCode" ? (
|
|
||||||
<NoCodeActionForm form={form} isReadOnly={isReadOnly} />
|
|
||||||
) : (
|
|
||||||
<p className="text-sm text-slate-600">
|
|
||||||
{t(
|
|
||||||
"environments.actions.this_action_was_created_automatically_you_cannot_make_changes_to_it"
|
|
||||||
)}
|
|
||||||
</p>
|
|
||||||
)}
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div className="flex justify-between gap-x-2 border-slate-200 pt-4">
|
<div className="flex justify-between gap-x-2 border-slate-200 pt-4">
|
||||||
|
|||||||
@@ -9,8 +9,12 @@ import {
|
|||||||
} from "@/lib/organization/service";
|
} from "@/lib/organization/service";
|
||||||
import { getUserProjects } from "@/lib/project/service";
|
import { getUserProjects } from "@/lib/project/service";
|
||||||
import { getUser } from "@/lib/user/service";
|
import { getUser } from "@/lib/user/service";
|
||||||
import { getOrganizationProjectsLimit } from "@/modules/ee/license-check/lib/utils";
|
import {
|
||||||
|
getAccessControlPermission,
|
||||||
|
getOrganizationProjectsLimit,
|
||||||
|
} from "@/modules/ee/license-check/lib/utils";
|
||||||
import { getProjectPermissionByUserId } from "@/modules/ee/teams/lib/roles";
|
import { getProjectPermissionByUserId } from "@/modules/ee/teams/lib/roles";
|
||||||
|
import { getTeamsByOrganizationId } from "@/modules/ee/teams/team-list/lib/team";
|
||||||
import { cleanup, render, screen } from "@testing-library/react";
|
import { cleanup, render, screen } from "@testing-library/react";
|
||||||
import type { Session } from "next-auth";
|
import type { Session } from "next-auth";
|
||||||
import { afterEach, beforeEach, describe, expect, test, vi } from "vitest";
|
import { afterEach, beforeEach, describe, expect, test, vi } from "vitest";
|
||||||
@@ -49,10 +53,14 @@ vi.mock("@/lib/membership/utils", () => ({
|
|||||||
}));
|
}));
|
||||||
vi.mock("@/modules/ee/license-check/lib/utils", () => ({
|
vi.mock("@/modules/ee/license-check/lib/utils", () => ({
|
||||||
getOrganizationProjectsLimit: vi.fn(),
|
getOrganizationProjectsLimit: vi.fn(),
|
||||||
|
getAccessControlPermission: vi.fn(),
|
||||||
}));
|
}));
|
||||||
vi.mock("@/modules/ee/teams/lib/roles", () => ({
|
vi.mock("@/modules/ee/teams/lib/roles", () => ({
|
||||||
getProjectPermissionByUserId: vi.fn(),
|
getProjectPermissionByUserId: vi.fn(),
|
||||||
}));
|
}));
|
||||||
|
vi.mock("@/modules/ee/teams/team-list/lib/team", () => ({
|
||||||
|
getTeamsByOrganizationId: vi.fn(),
|
||||||
|
}));
|
||||||
vi.mock("@/tolgee/server", () => ({
|
vi.mock("@/tolgee/server", () => ({
|
||||||
getTranslate: async () => (key: string) => key,
|
getTranslate: async () => (key: string) => key,
|
||||||
}));
|
}));
|
||||||
@@ -71,7 +79,13 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
|
|
||||||
// Mock components
|
// Mock components
|
||||||
vi.mock("@/app/(app)/environments/[environmentId]/components/MainNavigation", () => ({
|
vi.mock("@/app/(app)/environments/[environmentId]/components/MainNavigation", () => ({
|
||||||
MainNavigation: () => <div data-testid="main-navigation">MainNavigation</div>,
|
MainNavigation: ({ organizationTeams, isAccessControlAllowed }: any) => (
|
||||||
|
<div data-testid="main-navigation">
|
||||||
|
MainNavigation
|
||||||
|
<div data-testid="organization-teams">{JSON.stringify(organizationTeams || [])}</div>
|
||||||
|
<div data-testid="is-access-control-allowed">{isAccessControlAllowed?.toString() || "false"}</div>
|
||||||
|
</div>
|
||||||
|
),
|
||||||
}));
|
}));
|
||||||
vi.mock("@/app/(app)/environments/[environmentId]/components/TopControlBar", () => ({
|
vi.mock("@/app/(app)/environments/[environmentId]/components/TopControlBar", () => ({
|
||||||
TopControlBar: () => <div data-testid="top-control-bar">TopControlBar</div>,
|
TopControlBar: () => <div data-testid="top-control-bar">TopControlBar</div>,
|
||||||
@@ -104,7 +118,7 @@ const mockUser = {
|
|||||||
identityProvider: "email",
|
identityProvider: "email",
|
||||||
createdAt: new Date(),
|
createdAt: new Date(),
|
||||||
updatedAt: new Date(),
|
updatedAt: new Date(),
|
||||||
notificationSettings: { alert: {}, weeklySummary: {} },
|
notificationSettings: { alert: {} },
|
||||||
} as unknown as TUser;
|
} as unknown as TUser;
|
||||||
|
|
||||||
const mockOrganization = {
|
const mockOrganization = {
|
||||||
@@ -156,6 +170,17 @@ const mockProjectPermission = {
|
|||||||
role: "admin",
|
role: "admin",
|
||||||
} as any;
|
} as any;
|
||||||
|
|
||||||
|
const mockOrganizationTeams = [
|
||||||
|
{
|
||||||
|
id: "team-1",
|
||||||
|
name: "Development Team",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
id: "team-2",
|
||||||
|
name: "Marketing Team",
|
||||||
|
},
|
||||||
|
];
|
||||||
|
|
||||||
const mockSession: Session = {
|
const mockSession: Session = {
|
||||||
user: {
|
user: {
|
||||||
id: "user-1",
|
id: "user-1",
|
||||||
@@ -176,6 +201,8 @@ describe("EnvironmentLayout", () => {
|
|||||||
vi.mocked(getMonthlyOrganizationResponseCount).mockResolvedValue(500);
|
vi.mocked(getMonthlyOrganizationResponseCount).mockResolvedValue(500);
|
||||||
vi.mocked(getOrganizationProjectsLimit).mockResolvedValue(null as any);
|
vi.mocked(getOrganizationProjectsLimit).mockResolvedValue(null as any);
|
||||||
vi.mocked(getProjectPermissionByUserId).mockResolvedValue(mockProjectPermission);
|
vi.mocked(getProjectPermissionByUserId).mockResolvedValue(mockProjectPermission);
|
||||||
|
vi.mocked(getTeamsByOrganizationId).mockResolvedValue(mockOrganizationTeams);
|
||||||
|
vi.mocked(getAccessControlPermission).mockResolvedValue(true);
|
||||||
mockIsDevelopment = false;
|
mockIsDevelopment = false;
|
||||||
mockIsFormbricksCloud = false;
|
mockIsFormbricksCloud = false;
|
||||||
});
|
});
|
||||||
@@ -288,6 +315,110 @@ describe("EnvironmentLayout", () => {
|
|||||||
expect(screen.getByTestId("downgrade-banner")).toBeInTheDocument();
|
expect(screen.getByTestId("downgrade-banner")).toBeInTheDocument();
|
||||||
});
|
});
|
||||||
|
|
||||||
|
test("passes isAccessControlAllowed props to MainNavigation", async () => {
|
||||||
|
vi.resetModules();
|
||||||
|
await vi.doMock("@/modules/ee/license-check/lib/license", () => ({
|
||||||
|
getEnterpriseLicense: vi.fn().mockResolvedValue({
|
||||||
|
active: false,
|
||||||
|
isPendingDowngrade: false,
|
||||||
|
features: { isMultiOrgEnabled: false },
|
||||||
|
lastChecked: new Date(),
|
||||||
|
fallbackLevel: "live",
|
||||||
|
}),
|
||||||
|
}));
|
||||||
|
const { EnvironmentLayout } = await import(
|
||||||
|
"@/app/(app)/environments/[environmentId]/components/EnvironmentLayout"
|
||||||
|
);
|
||||||
|
render(
|
||||||
|
await EnvironmentLayout({
|
||||||
|
environmentId: "env-1",
|
||||||
|
session: mockSession,
|
||||||
|
children: <div>Child Content</div>,
|
||||||
|
})
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("is-access-control-allowed")).toHaveTextContent("true");
|
||||||
|
expect(vi.mocked(getAccessControlPermission)).toHaveBeenCalledWith(mockOrganization.billing.plan);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles empty organizationTeams array", async () => {
|
||||||
|
vi.mocked(getTeamsByOrganizationId).mockResolvedValue([]);
|
||||||
|
vi.resetModules();
|
||||||
|
await vi.doMock("@/modules/ee/license-check/lib/license", () => ({
|
||||||
|
getEnterpriseLicense: vi.fn().mockResolvedValue({
|
||||||
|
active: false,
|
||||||
|
isPendingDowngrade: false,
|
||||||
|
features: { isMultiOrgEnabled: false },
|
||||||
|
lastChecked: new Date(),
|
||||||
|
fallbackLevel: "live",
|
||||||
|
}),
|
||||||
|
}));
|
||||||
|
const { EnvironmentLayout } = await import(
|
||||||
|
"@/app/(app)/environments/[environmentId]/components/EnvironmentLayout"
|
||||||
|
);
|
||||||
|
render(
|
||||||
|
await EnvironmentLayout({
|
||||||
|
environmentId: "env-1",
|
||||||
|
session: mockSession,
|
||||||
|
children: <div>Child Content</div>,
|
||||||
|
})
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("organization-teams")).toHaveTextContent("[]");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles null organizationTeams", async () => {
|
||||||
|
vi.mocked(getTeamsByOrganizationId).mockResolvedValue(null);
|
||||||
|
vi.resetModules();
|
||||||
|
await vi.doMock("@/modules/ee/license-check/lib/license", () => ({
|
||||||
|
getEnterpriseLicense: vi.fn().mockResolvedValue({
|
||||||
|
active: false,
|
||||||
|
isPendingDowngrade: false,
|
||||||
|
features: { isMultiOrgEnabled: false },
|
||||||
|
lastChecked: new Date(),
|
||||||
|
fallbackLevel: "live",
|
||||||
|
}),
|
||||||
|
}));
|
||||||
|
const { EnvironmentLayout } = await import(
|
||||||
|
"@/app/(app)/environments/[environmentId]/components/EnvironmentLayout"
|
||||||
|
);
|
||||||
|
render(
|
||||||
|
await EnvironmentLayout({
|
||||||
|
environmentId: "env-1",
|
||||||
|
session: mockSession,
|
||||||
|
children: <div>Child Content</div>,
|
||||||
|
})
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("organization-teams")).toHaveTextContent("[]");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles isAccessControlAllowed false", async () => {
|
||||||
|
vi.mocked(getAccessControlPermission).mockResolvedValue(false);
|
||||||
|
vi.resetModules();
|
||||||
|
await vi.doMock("@/modules/ee/license-check/lib/license", () => ({
|
||||||
|
getEnterpriseLicense: vi.fn().mockResolvedValue({
|
||||||
|
active: false,
|
||||||
|
isPendingDowngrade: false,
|
||||||
|
features: { isMultiOrgEnabled: false },
|
||||||
|
lastChecked: new Date(),
|
||||||
|
fallbackLevel: "live",
|
||||||
|
}),
|
||||||
|
}));
|
||||||
|
const { EnvironmentLayout } = await import(
|
||||||
|
"@/app/(app)/environments/[environmentId]/components/EnvironmentLayout"
|
||||||
|
);
|
||||||
|
render(
|
||||||
|
await EnvironmentLayout({
|
||||||
|
environmentId: "env-1",
|
||||||
|
session: mockSession,
|
||||||
|
children: <div>Child Content</div>,
|
||||||
|
})
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("is-access-control-allowed")).toHaveTextContent("false");
|
||||||
|
});
|
||||||
|
|
||||||
test("throws error if user not found", async () => {
|
test("throws error if user not found", async () => {
|
||||||
vi.mocked(getUser).mockResolvedValue(null);
|
vi.mocked(getUser).mockResolvedValue(null);
|
||||||
vi.resetModules();
|
vi.resetModules();
|
||||||
|
|||||||
@@ -13,7 +13,10 @@ import {
|
|||||||
import { getUserProjects } from "@/lib/project/service";
|
import { getUserProjects } from "@/lib/project/service";
|
||||||
import { getUser } from "@/lib/user/service";
|
import { getUser } from "@/lib/user/service";
|
||||||
import { getEnterpriseLicense } from "@/modules/ee/license-check/lib/license";
|
import { getEnterpriseLicense } from "@/modules/ee/license-check/lib/license";
|
||||||
import { getOrganizationProjectsLimit } from "@/modules/ee/license-check/lib/utils";
|
import {
|
||||||
|
getAccessControlPermission,
|
||||||
|
getOrganizationProjectsLimit,
|
||||||
|
} from "@/modules/ee/license-check/lib/utils";
|
||||||
import { getProjectPermissionByUserId } from "@/modules/ee/teams/lib/roles";
|
import { getProjectPermissionByUserId } from "@/modules/ee/teams/lib/roles";
|
||||||
import { DevEnvironmentBanner } from "@/modules/ui/components/dev-environment-banner";
|
import { DevEnvironmentBanner } from "@/modules/ui/components/dev-environment-banner";
|
||||||
import { LimitsReachedBanner } from "@/modules/ui/components/limits-reached-banner";
|
import { LimitsReachedBanner } from "@/modules/ui/components/limits-reached-banner";
|
||||||
@@ -48,9 +51,10 @@ export const EnvironmentLayout = async ({ environmentId, session, children }: En
|
|||||||
throw new Error(t("common.environment_not_found"));
|
throw new Error(t("common.environment_not_found"));
|
||||||
}
|
}
|
||||||
|
|
||||||
const [projects, environments] = await Promise.all([
|
const [projects, environments, isAccessControlAllowed] = await Promise.all([
|
||||||
getUserProjects(user.id, organization.id),
|
getUserProjects(user.id, organization.id),
|
||||||
getEnvironments(environment.projectId),
|
getEnvironments(environment.projectId),
|
||||||
|
getAccessControlPermission(organization.billing.plan),
|
||||||
]);
|
]);
|
||||||
|
|
||||||
if (!projects || !environments || !organizations) {
|
if (!projects || !environments || !organizations) {
|
||||||
@@ -101,6 +105,7 @@ export const EnvironmentLayout = async ({ environmentId, session, children }: En
|
|||||||
isPendingDowngrade={isPendingDowngrade ?? false}
|
isPendingDowngrade={isPendingDowngrade ?? false}
|
||||||
active={active}
|
active={active}
|
||||||
environmentId={environment.id}
|
environmentId={environment.id}
|
||||||
|
locale={user.locale}
|
||||||
/>
|
/>
|
||||||
|
|
||||||
<div className="flex h-full">
|
<div className="flex h-full">
|
||||||
@@ -116,15 +121,16 @@ export const EnvironmentLayout = async ({ environmentId, session, children }: En
|
|||||||
membershipRole={membershipRole}
|
membershipRole={membershipRole}
|
||||||
isMultiOrgEnabled={isMultiOrgEnabled}
|
isMultiOrgEnabled={isMultiOrgEnabled}
|
||||||
isLicenseActive={active}
|
isLicenseActive={active}
|
||||||
|
isAccessControlAllowed={isAccessControlAllowed}
|
||||||
/>
|
/>
|
||||||
<div id="mainContent" className="flex-1 overflow-y-auto bg-slate-50">
|
<div id="mainContent" className="flex flex-1 flex-col overflow-hidden bg-slate-50">
|
||||||
<TopControlBar
|
<TopControlBar
|
||||||
environment={environment}
|
environment={environment}
|
||||||
environments={environments}
|
environments={environments}
|
||||||
membershipRole={membershipRole}
|
membershipRole={membershipRole}
|
||||||
projectPermission={projectPermission}
|
projectPermission={projectPermission}
|
||||||
/>
|
/>
|
||||||
<div className="mt-14">{children}</div>
|
<div className="flex-1 overflow-y-auto">{children}</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|||||||
@@ -1,4 +1,5 @@
|
|||||||
import { useSignOut } from "@/modules/auth/hooks/use-sign-out";
|
import { useSignOut } from "@/modules/auth/hooks/use-sign-out";
|
||||||
|
import { TOrganizationTeam } from "@/modules/ee/teams/team-list/types/team";
|
||||||
import { cleanup, render, screen, waitFor } from "@testing-library/react";
|
import { cleanup, render, screen, waitFor } from "@testing-library/react";
|
||||||
import userEvent from "@testing-library/user-event";
|
import userEvent from "@testing-library/user-event";
|
||||||
import { usePathname, useRouter } from "next/navigation";
|
import { usePathname, useRouter } from "next/navigation";
|
||||||
@@ -52,9 +53,19 @@ vi.mock("@/modules/organization/components/CreateOrganizationModal", () => ({
|
|||||||
open ? <div data-testid="create-org-modal">Create Org Modal</div> : null,
|
open ? <div data-testid="create-org-modal">Create Org Modal</div> : null,
|
||||||
}));
|
}));
|
||||||
vi.mock("@/modules/projects/components/project-switcher", () => ({
|
vi.mock("@/modules/projects/components/project-switcher", () => ({
|
||||||
ProjectSwitcher: ({ isCollapsed }: { isCollapsed: boolean }) => (
|
ProjectSwitcher: ({
|
||||||
|
isCollapsed,
|
||||||
|
organizationTeams,
|
||||||
|
isAccessControlAllowed,
|
||||||
|
}: {
|
||||||
|
isCollapsed: boolean;
|
||||||
|
organizationTeams: TOrganizationTeam[];
|
||||||
|
isAccessControlAllowed: boolean;
|
||||||
|
}) => (
|
||||||
<div data-testid="project-switcher" data-collapsed={isCollapsed}>
|
<div data-testid="project-switcher" data-collapsed={isCollapsed}>
|
||||||
Project Switcher
|
Project Switcher
|
||||||
|
<div data-testid="organization-teams-count">{organizationTeams?.length || 0}</div>
|
||||||
|
<div data-testid="is-access-control-allowed">{isAccessControlAllowed.toString()}</div>
|
||||||
</div>
|
</div>
|
||||||
),
|
),
|
||||||
}));
|
}));
|
||||||
@@ -106,7 +117,7 @@ const mockUser = {
|
|||||||
identityProvider: "email",
|
identityProvider: "email",
|
||||||
createdAt: new Date(),
|
createdAt: new Date(),
|
||||||
updatedAt: new Date(),
|
updatedAt: new Date(),
|
||||||
notificationSettings: { alert: {}, weeklySummary: {} },
|
notificationSettings: { alert: {} },
|
||||||
role: "project_manager",
|
role: "project_manager",
|
||||||
objective: "other",
|
objective: "other",
|
||||||
} as unknown as TUser;
|
} as unknown as TUser;
|
||||||
@@ -146,6 +157,7 @@ const defaultProps = {
|
|||||||
membershipRole: "owner" as const,
|
membershipRole: "owner" as const,
|
||||||
organizationProjectsLimit: 5,
|
organizationProjectsLimit: 5,
|
||||||
isLicenseActive: true,
|
isLicenseActive: true,
|
||||||
|
isAccessControlAllowed: true,
|
||||||
};
|
};
|
||||||
|
|
||||||
describe("MainNavigation", () => {
|
describe("MainNavigation", () => {
|
||||||
@@ -334,4 +346,23 @@ describe("MainNavigation", () => {
|
|||||||
});
|
});
|
||||||
expect(screen.queryByText("common.license")).not.toBeInTheDocument();
|
expect(screen.queryByText("common.license")).not.toBeInTheDocument();
|
||||||
});
|
});
|
||||||
|
|
||||||
|
test("passes isAccessControlAllowed props to ProjectSwitcher", () => {
|
||||||
|
render(<MainNavigation {...defaultProps} />);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("organization-teams-count")).toHaveTextContent("0");
|
||||||
|
expect(screen.getByTestId("is-access-control-allowed")).toHaveTextContent("true");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles no organizationTeams", () => {
|
||||||
|
render(<MainNavigation {...defaultProps} />);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("organization-teams-count")).toHaveTextContent("0");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles isAccessControlAllowed false", () => {
|
||||||
|
render(<MainNavigation {...defaultProps} isAccessControlAllowed={false} />);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("is-access-control-allowed")).toHaveTextContent("false");
|
||||||
|
});
|
||||||
});
|
});
|
||||||
|
|||||||
@@ -66,6 +66,7 @@ interface NavigationProps {
|
|||||||
membershipRole?: TOrganizationRole;
|
membershipRole?: TOrganizationRole;
|
||||||
organizationProjectsLimit: number;
|
organizationProjectsLimit: number;
|
||||||
isLicenseActive: boolean;
|
isLicenseActive: boolean;
|
||||||
|
isAccessControlAllowed: boolean;
|
||||||
}
|
}
|
||||||
|
|
||||||
export const MainNavigation = ({
|
export const MainNavigation = ({
|
||||||
@@ -80,6 +81,7 @@ export const MainNavigation = ({
|
|||||||
organizationProjectsLimit,
|
organizationProjectsLimit,
|
||||||
isLicenseActive,
|
isLicenseActive,
|
||||||
isDevelopment,
|
isDevelopment,
|
||||||
|
isAccessControlAllowed,
|
||||||
}: NavigationProps) => {
|
}: NavigationProps) => {
|
||||||
const router = useRouter();
|
const router = useRouter();
|
||||||
const pathname = usePathname();
|
const pathname = usePathname();
|
||||||
@@ -323,6 +325,7 @@ export const MainNavigation = ({
|
|||||||
isTextVisible={isTextVisible}
|
isTextVisible={isTextVisible}
|
||||||
organization={organization}
|
organization={organization}
|
||||||
organizationProjectsLimit={organizationProjectsLimit}
|
organizationProjectsLimit={organizationProjectsLimit}
|
||||||
|
isAccessControlAllowed={isAccessControlAllowed}
|
||||||
/>
|
/>
|
||||||
)}
|
)}
|
||||||
|
|
||||||
@@ -336,27 +339,30 @@ export const MainNavigation = ({
|
|||||||
<div
|
<div
|
||||||
tabIndex={0}
|
tabIndex={0}
|
||||||
className={cn(
|
className={cn(
|
||||||
"flex cursor-pointer flex-row items-center space-x-3",
|
"flex cursor-pointer flex-row items-center gap-3",
|
||||||
isCollapsed ? "pl-2" : "pl-4"
|
isCollapsed ? "justify-center px-2" : "px-4"
|
||||||
)}>
|
)}>
|
||||||
<ProfileAvatar userId={user.id} imageUrl={user.imageUrl} />
|
<ProfileAvatar userId={user.id} imageUrl={user.imageUrl} />
|
||||||
{!isCollapsed && !isTextVisible && (
|
{!isCollapsed && !isTextVisible && (
|
||||||
<>
|
<>
|
||||||
<div className={cn(isTextVisible ? "opacity-0" : "opacity-100")}>
|
<div
|
||||||
|
className={cn(isTextVisible ? "opacity-0" : "opacity-100", "grow overflow-hidden")}>
|
||||||
<p
|
<p
|
||||||
title={user?.email}
|
title={user?.email}
|
||||||
className={cn(
|
className={cn(
|
||||||
"ph-no-capture ph-no-capture -mb-0.5 max-w-28 truncate text-sm font-bold text-slate-700"
|
"ph-no-capture ph-no-capture -mb-0.5 truncate text-sm font-bold text-slate-700"
|
||||||
)}>
|
)}>
|
||||||
{user?.name ? <span>{user?.name}</span> : <span>{user?.email}</span>}
|
{user?.name ? <span>{user?.name}</span> : <span>{user?.email}</span>}
|
||||||
</p>
|
</p>
|
||||||
<p
|
<p
|
||||||
title={capitalizeFirstLetter(organization?.name)}
|
title={capitalizeFirstLetter(organization?.name)}
|
||||||
className="max-w-28 truncate text-sm text-slate-500">
|
className="truncate text-sm text-slate-500">
|
||||||
{capitalizeFirstLetter(organization?.name)}
|
{capitalizeFirstLetter(organization?.name)}
|
||||||
</p>
|
</p>
|
||||||
</div>
|
</div>
|
||||||
<ChevronRightIcon className={cn("h-5 w-5 text-slate-700 hover:text-slate-500")} />
|
<ChevronRightIcon
|
||||||
|
className={cn("h-5 w-5 shrink-0 text-slate-700 hover:text-slate-500")}
|
||||||
|
/>
|
||||||
</>
|
</>
|
||||||
)}
|
)}
|
||||||
</div>
|
</div>
|
||||||
|
|||||||
@@ -28,7 +28,7 @@ const TestComponent = () => {
|
|||||||
|
|
||||||
return (
|
return (
|
||||||
<div>
|
<div>
|
||||||
<div data-testid="onlyComplete">{selectedFilter.onlyComplete.toString()}</div>
|
<div data-testid="responseStatus">{selectedFilter.responseStatus}</div>
|
||||||
<div data-testid="filterLength">{selectedFilter.filter.length}</div>
|
<div data-testid="filterLength">{selectedFilter.filter.length}</div>
|
||||||
<div data-testid="questionOptionsLength">{selectedOptions.questionOptions.length}</div>
|
<div data-testid="questionOptionsLength">{selectedOptions.questionOptions.length}</div>
|
||||||
<div data-testid="questionFilterOptionsLength">{selectedOptions.questionFilterOptions.length}</div>
|
<div data-testid="questionFilterOptionsLength">{selectedOptions.questionFilterOptions.length}</div>
|
||||||
@@ -44,7 +44,7 @@ const TestComponent = () => {
|
|||||||
filterType: { filterValue: "value1", filterComboBoxValue: "option1" },
|
filterType: { filterValue: "value1", filterComboBoxValue: "option1" },
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
onlyComplete: true,
|
responseStatus: "complete",
|
||||||
})
|
})
|
||||||
}>
|
}>
|
||||||
Update Filter
|
Update Filter
|
||||||
@@ -81,7 +81,7 @@ describe("ResponseFilterContext", () => {
|
|||||||
</ResponseFilterProvider>
|
</ResponseFilterProvider>
|
||||||
);
|
);
|
||||||
|
|
||||||
expect(screen.getByTestId("onlyComplete").textContent).toBe("false");
|
expect(screen.getByTestId("responseStatus").textContent).toBe("all");
|
||||||
expect(screen.getByTestId("filterLength").textContent).toBe("0");
|
expect(screen.getByTestId("filterLength").textContent).toBe("0");
|
||||||
expect(screen.getByTestId("questionOptionsLength").textContent).toBe("0");
|
expect(screen.getByTestId("questionOptionsLength").textContent).toBe("0");
|
||||||
expect(screen.getByTestId("questionFilterOptionsLength").textContent).toBe("0");
|
expect(screen.getByTestId("questionFilterOptionsLength").textContent).toBe("0");
|
||||||
@@ -99,7 +99,7 @@ describe("ResponseFilterContext", () => {
|
|||||||
const updateButton = screen.getByText("Update Filter");
|
const updateButton = screen.getByText("Update Filter");
|
||||||
await userEvent.click(updateButton);
|
await userEvent.click(updateButton);
|
||||||
|
|
||||||
expect(screen.getByTestId("onlyComplete").textContent).toBe("true");
|
expect(screen.getByTestId("responseStatus").textContent).toBe("complete");
|
||||||
expect(screen.getByTestId("filterLength").textContent).toBe("1");
|
expect(screen.getByTestId("filterLength").textContent).toBe("1");
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|||||||
@@ -16,9 +16,11 @@ export interface FilterValue {
|
|||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
export type TResponseStatus = "all" | "complete" | "partial";
|
||||||
|
|
||||||
export interface SelectedFilterValue {
|
export interface SelectedFilterValue {
|
||||||
filter: FilterValue[];
|
filter: FilterValue[];
|
||||||
onlyComplete: boolean;
|
responseStatus: TResponseStatus;
|
||||||
}
|
}
|
||||||
|
|
||||||
interface SelectedFilterOptions {
|
interface SelectedFilterOptions {
|
||||||
@@ -47,7 +49,7 @@ const ResponseFilterProvider = ({ children }: { children: React.ReactNode }) =>
|
|||||||
// state holds the filter selected value
|
// state holds the filter selected value
|
||||||
const [selectedFilter, setSelectedFilter] = useState<SelectedFilterValue>({
|
const [selectedFilter, setSelectedFilter] = useState<SelectedFilterValue>({
|
||||||
filter: [],
|
filter: [],
|
||||||
onlyComplete: false,
|
responseStatus: "all",
|
||||||
});
|
});
|
||||||
// state holds all the options of the responses fetched
|
// state holds all the options of the responses fetched
|
||||||
const [selectedOptions, setSelectedOptions] = useState<SelectedFilterOptions>({
|
const [selectedOptions, setSelectedOptions] = useState<SelectedFilterOptions>({
|
||||||
@@ -67,7 +69,7 @@ const ResponseFilterProvider = ({ children }: { children: React.ReactNode }) =>
|
|||||||
});
|
});
|
||||||
setSelectedFilter({
|
setSelectedFilter({
|
||||||
filter: [],
|
filter: [],
|
||||||
onlyComplete: false,
|
responseStatus: "all",
|
||||||
});
|
});
|
||||||
}, []);
|
}, []);
|
||||||
|
|
||||||
|
|||||||
@@ -44,10 +44,8 @@ describe("TopControlBar", () => {
|
|||||||
);
|
);
|
||||||
|
|
||||||
// Check if the main div is rendered
|
// Check if the main div is rendered
|
||||||
const mainDiv = screen.getByTestId("top-control-buttons").parentElement?.parentElement?.parentElement;
|
const mainDiv = screen.getByTestId("fb__global-top-control-bar");
|
||||||
expect(mainDiv).toHaveClass(
|
expect(mainDiv).toHaveClass("flex h-14 w-full items-center justify-end bg-slate-50 px-6");
|
||||||
"fixed inset-0 top-0 z-30 flex h-14 w-full items-center justify-end bg-slate-50 px-6"
|
|
||||||
);
|
|
||||||
|
|
||||||
// Check if the mocked child component is rendered
|
// Check if the mocked child component is rendered
|
||||||
expect(screen.getByTestId("top-control-buttons")).toBeInTheDocument();
|
expect(screen.getByTestId("top-control-buttons")).toBeInTheDocument();
|
||||||
|
|||||||
@@ -17,7 +17,9 @@ export const TopControlBar = ({
|
|||||||
projectPermission,
|
projectPermission,
|
||||||
}: SideBarProps) => {
|
}: SideBarProps) => {
|
||||||
return (
|
return (
|
||||||
<div className="fixed inset-0 top-0 z-30 flex h-14 w-full items-center justify-end bg-slate-50 px-6">
|
<div
|
||||||
|
className="flex h-14 w-full items-center justify-end bg-slate-50 px-6"
|
||||||
|
data-testid="fb__global-top-control-bar">
|
||||||
<div className="shadow-xs z-10">
|
<div className="shadow-xs z-10">
|
||||||
<div className="flex w-fit items-center space-x-2 py-2">
|
<div className="flex w-fit items-center space-x-2 py-2">
|
||||||
<TopControlButtons
|
<TopControlButtons
|
||||||
|
|||||||
@@ -0,0 +1,157 @@
|
|||||||
|
import "@testing-library/jest-dom/vitest";
|
||||||
|
import { cleanup, render, screen } from "@testing-library/react";
|
||||||
|
import { afterEach, describe, expect, test } from "vitest";
|
||||||
|
import { TEnvironment } from "@formbricks/types/environment";
|
||||||
|
import { TProject } from "@formbricks/types/project";
|
||||||
|
import { EnvironmentContextWrapper, useEnvironment } from "./environment-context";
|
||||||
|
|
||||||
|
// Mock environment data
|
||||||
|
const mockEnvironment: TEnvironment = {
|
||||||
|
id: "test-env-id",
|
||||||
|
createdAt: new Date(),
|
||||||
|
updatedAt: new Date(),
|
||||||
|
type: "development",
|
||||||
|
projectId: "test-project-id",
|
||||||
|
appSetupCompleted: true,
|
||||||
|
};
|
||||||
|
|
||||||
|
// Mock project data
|
||||||
|
const mockProject = {
|
||||||
|
id: "test-project-id",
|
||||||
|
createdAt: new Date(),
|
||||||
|
updatedAt: new Date(),
|
||||||
|
organizationId: "test-org-id",
|
||||||
|
config: {
|
||||||
|
channel: "app",
|
||||||
|
industry: "saas",
|
||||||
|
},
|
||||||
|
linkSurveyBranding: true,
|
||||||
|
styling: {
|
||||||
|
allowStyleOverwrite: true,
|
||||||
|
brandColor: {
|
||||||
|
light: "#ffffff",
|
||||||
|
dark: "#000000",
|
||||||
|
},
|
||||||
|
questionColor: {
|
||||||
|
light: "#000000",
|
||||||
|
dark: "#ffffff",
|
||||||
|
},
|
||||||
|
inputColor: {
|
||||||
|
light: "#000000",
|
||||||
|
dark: "#ffffff",
|
||||||
|
},
|
||||||
|
inputBorderColor: {
|
||||||
|
light: "#cccccc",
|
||||||
|
dark: "#444444",
|
||||||
|
},
|
||||||
|
cardBackgroundColor: {
|
||||||
|
light: "#ffffff",
|
||||||
|
dark: "#000000",
|
||||||
|
},
|
||||||
|
cardBorderColor: {
|
||||||
|
light: "#cccccc",
|
||||||
|
dark: "#444444",
|
||||||
|
},
|
||||||
|
isDarkModeEnabled: false,
|
||||||
|
isLogoHidden: false,
|
||||||
|
hideProgressBar: false,
|
||||||
|
roundness: 8,
|
||||||
|
cardArrangement: {
|
||||||
|
linkSurveys: "casual",
|
||||||
|
appSurveys: "casual",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
recontactDays: 30,
|
||||||
|
inAppSurveyBranding: true,
|
||||||
|
logo: {
|
||||||
|
url: "test-logo.png",
|
||||||
|
bgColor: "#ffffff",
|
||||||
|
},
|
||||||
|
placement: "bottomRight",
|
||||||
|
clickOutsideClose: true,
|
||||||
|
} as TProject;
|
||||||
|
|
||||||
|
// Test component that uses the hook
|
||||||
|
const TestComponent = () => {
|
||||||
|
const { environment, project } = useEnvironment();
|
||||||
|
return (
|
||||||
|
<div>
|
||||||
|
<div data-testid="environment-id">{environment.id}</div>
|
||||||
|
<div data-testid="environment-type">{environment.type}</div>
|
||||||
|
<div data-testid="project-id">{project.id}</div>
|
||||||
|
<div data-testid="project-organization-id">{project.organizationId}</div>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
|
describe("EnvironmentContext", () => {
|
||||||
|
afterEach(() => {
|
||||||
|
cleanup();
|
||||||
|
});
|
||||||
|
|
||||||
|
test("provides environment and project data to child components", () => {
|
||||||
|
render(
|
||||||
|
<EnvironmentContextWrapper environment={mockEnvironment} project={mockProject}>
|
||||||
|
<TestComponent />
|
||||||
|
</EnvironmentContextWrapper>
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("environment-id")).toHaveTextContent("test-env-id");
|
||||||
|
expect(screen.getByTestId("environment-type")).toHaveTextContent("development");
|
||||||
|
expect(screen.getByTestId("project-id")).toHaveTextContent("test-project-id");
|
||||||
|
expect(screen.getByTestId("project-organization-id")).toHaveTextContent("test-org-id");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("throws error when useEnvironment is used outside of provider", () => {
|
||||||
|
const TestComponentWithoutProvider = () => {
|
||||||
|
useEnvironment();
|
||||||
|
return <div>Should not render</div>;
|
||||||
|
};
|
||||||
|
|
||||||
|
expect(() => {
|
||||||
|
render(<TestComponentWithoutProvider />);
|
||||||
|
}).toThrow("useEnvironment must be used within an EnvironmentProvider");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("updates context value when environment or project changes", () => {
|
||||||
|
const { rerender } = render(
|
||||||
|
<EnvironmentContextWrapper environment={mockEnvironment} project={mockProject}>
|
||||||
|
<TestComponent />
|
||||||
|
</EnvironmentContextWrapper>
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("environment-type")).toHaveTextContent("development");
|
||||||
|
|
||||||
|
const updatedEnvironment = {
|
||||||
|
...mockEnvironment,
|
||||||
|
type: "production" as const,
|
||||||
|
};
|
||||||
|
|
||||||
|
rerender(
|
||||||
|
<EnvironmentContextWrapper environment={updatedEnvironment} project={mockProject}>
|
||||||
|
<TestComponent />
|
||||||
|
</EnvironmentContextWrapper>
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(screen.getByTestId("environment-type")).toHaveTextContent("production");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("memoizes context value correctly", () => {
|
||||||
|
const { rerender } = render(
|
||||||
|
<EnvironmentContextWrapper environment={mockEnvironment} project={mockProject}>
|
||||||
|
<TestComponent />
|
||||||
|
</EnvironmentContextWrapper>
|
||||||
|
);
|
||||||
|
|
||||||
|
// Re-render with same props
|
||||||
|
rerender(
|
||||||
|
<EnvironmentContextWrapper environment={mockEnvironment} project={mockProject}>
|
||||||
|
<TestComponent />
|
||||||
|
</EnvironmentContextWrapper>
|
||||||
|
);
|
||||||
|
|
||||||
|
// Should still work correctly
|
||||||
|
expect(screen.getByTestId("environment-id")).toHaveTextContent("test-env-id");
|
||||||
|
expect(screen.getByTestId("project-id")).toHaveTextContent("test-project-id");
|
||||||
|
});
|
||||||
|
});
|
||||||
@@ -0,0 +1,47 @@
|
|||||||
|
"use client";
|
||||||
|
|
||||||
|
import { createContext, useContext, useMemo } from "react";
|
||||||
|
import { TEnvironment } from "@formbricks/types/environment";
|
||||||
|
import { TProject } from "@formbricks/types/project";
|
||||||
|
|
||||||
|
export interface EnvironmentContextType {
|
||||||
|
environment: TEnvironment;
|
||||||
|
project: TProject;
|
||||||
|
organizationId: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
const EnvironmentContext = createContext<EnvironmentContextType | null>(null);
|
||||||
|
|
||||||
|
export const useEnvironment = () => {
|
||||||
|
const context = useContext(EnvironmentContext);
|
||||||
|
if (!context) {
|
||||||
|
throw new Error("useEnvironment must be used within an EnvironmentProvider");
|
||||||
|
}
|
||||||
|
return context;
|
||||||
|
};
|
||||||
|
|
||||||
|
// Client wrapper component to be used in server components
|
||||||
|
interface EnvironmentContextWrapperProps {
|
||||||
|
environment: TEnvironment;
|
||||||
|
project: TProject;
|
||||||
|
children: React.ReactNode;
|
||||||
|
}
|
||||||
|
|
||||||
|
export const EnvironmentContextWrapper = ({
|
||||||
|
environment,
|
||||||
|
project,
|
||||||
|
children,
|
||||||
|
}: EnvironmentContextWrapperProps) => {
|
||||||
|
const environmentContextValue = useMemo(
|
||||||
|
() => ({
|
||||||
|
environment,
|
||||||
|
project,
|
||||||
|
organizationId: project.organizationId,
|
||||||
|
}),
|
||||||
|
[environment, project]
|
||||||
|
);
|
||||||
|
|
||||||
|
return (
|
||||||
|
<EnvironmentContext.Provider value={environmentContextValue}>{children}</EnvironmentContext.Provider>
|
||||||
|
);
|
||||||
|
};
|
||||||
@@ -30,16 +30,16 @@ interface ManageIntegrationProps {
|
|||||||
locale: TUserLocale;
|
locale: TUserLocale;
|
||||||
}
|
}
|
||||||
|
|
||||||
const tableHeaders = [
|
|
||||||
"common.survey",
|
|
||||||
"environments.integrations.airtable.table_name",
|
|
||||||
"common.questions",
|
|
||||||
"common.updated_at",
|
|
||||||
];
|
|
||||||
|
|
||||||
export const ManageIntegration = (props: ManageIntegrationProps) => {
|
export const ManageIntegration = (props: ManageIntegrationProps) => {
|
||||||
const { airtableIntegration, environment, environmentId, setIsConnected, surveys, airtableArray } = props;
|
const { airtableIntegration, environment, environmentId, setIsConnected, surveys, airtableArray } = props;
|
||||||
const { t } = useTranslate();
|
const { t } = useTranslate();
|
||||||
|
|
||||||
|
const tableHeaders = [
|
||||||
|
t("common.survey"),
|
||||||
|
t("environments.integrations.airtable.table_name"),
|
||||||
|
t("common.questions"),
|
||||||
|
t("common.updated_at"),
|
||||||
|
];
|
||||||
const [isDeleting, setisDeleting] = useState(false);
|
const [isDeleting, setisDeleting] = useState(false);
|
||||||
const [isDeleteIntegrationModalOpen, setIsDeleteIntegrationModalOpen] = useState(false);
|
const [isDeleteIntegrationModalOpen, setIsDeleteIntegrationModalOpen] = useState(false);
|
||||||
const [defaultValues, setDefaultValues] = useState<(IntegrationModalInputs & { index: number }) | null>(
|
const [defaultValues, setDefaultValues] = useState<(IntegrationModalInputs & { index: number }) | null>(
|
||||||
@@ -100,7 +100,7 @@ export const ManageIntegration = (props: ManageIntegrationProps) => {
|
|||||||
<div className="grid h-12 grid-cols-8 content-center rounded-lg bg-slate-100 text-left text-sm font-semibold text-slate-900">
|
<div className="grid h-12 grid-cols-8 content-center rounded-lg bg-slate-100 text-left text-sm font-semibold text-slate-900">
|
||||||
{tableHeaders.map((header) => (
|
{tableHeaders.map((header) => (
|
||||||
<div key={header} className={`col-span-2 hidden text-center sm:block`}>
|
<div key={header} className={`col-span-2 hidden text-center sm:block`}>
|
||||||
{t(header)}
|
{header}
|
||||||
</div>
|
</div>
|
||||||
))}
|
))}
|
||||||
</div>
|
</div>
|
||||||
|
|||||||
@@ -49,7 +49,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
OIDC_SIGNING_ALGORITHM: "test-oidc-signing-algorithm",
|
OIDC_SIGNING_ALGORITHM: "test-oidc-signing-algorithm",
|
||||||
SENTRY_DSN: "mock-sentry-dsn",
|
SENTRY_DSN: "mock-sentry-dsn",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "test-redis-url",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: true,
|
AUDIT_LOG_ENABLED: true,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -220,7 +220,6 @@ const surveys: TSurvey[] = [
|
|||||||
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
||||||
hiddenFields: { enabled: true, fieldIds: [] },
|
hiddenFields: { enabled: true, fieldIds: [] },
|
||||||
pin: null,
|
pin: null,
|
||||||
resultShareKey: null,
|
|
||||||
displayLimit: null,
|
displayLimit: null,
|
||||||
} as unknown as TSurvey,
|
} as unknown as TSurvey,
|
||||||
{
|
{
|
||||||
@@ -258,7 +257,6 @@ const surveys: TSurvey[] = [
|
|||||||
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
||||||
hiddenFields: { enabled: true, fieldIds: [] },
|
hiddenFields: { enabled: true, fieldIds: [] },
|
||||||
pin: null,
|
pin: null,
|
||||||
resultShareKey: null,
|
|
||||||
displayLimit: null,
|
displayLimit: null,
|
||||||
} as unknown as TSurvey,
|
} as unknown as TSurvey,
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -119,7 +119,6 @@ const mockSurveys: TSurvey[] = [
|
|||||||
displayPercentage: null,
|
displayPercentage: null,
|
||||||
languages: [],
|
languages: [],
|
||||||
pin: null,
|
pin: null,
|
||||||
resultShareKey: null,
|
|
||||||
segment: null,
|
segment: null,
|
||||||
singleUse: null,
|
singleUse: null,
|
||||||
styling: null,
|
styling: null,
|
||||||
|
|||||||
@@ -236,7 +236,6 @@ const surveys: TSurvey[] = [
|
|||||||
languages: [],
|
languages: [],
|
||||||
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
||||||
pin: null,
|
pin: null,
|
||||||
resultShareKey: null,
|
|
||||||
displayLimit: null,
|
displayLimit: null,
|
||||||
} as unknown as TSurvey,
|
} as unknown as TSurvey,
|
||||||
{
|
{
|
||||||
@@ -272,7 +271,6 @@ const surveys: TSurvey[] = [
|
|||||||
languages: [],
|
languages: [],
|
||||||
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
||||||
pin: null,
|
pin: null,
|
||||||
resultShareKey: null,
|
|
||||||
displayLimit: null,
|
displayLimit: null,
|
||||||
} as unknown as TSurvey,
|
} as unknown as TSurvey,
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -32,7 +32,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
GOOGLE_SHEETS_CLIENT_SECRET: "test-client-secret",
|
GOOGLE_SHEETS_CLIENT_SECRET: "test-client-secret",
|
||||||
GOOGLE_SHEETS_REDIRECT_URL: "test-redirect-url",
|
GOOGLE_SHEETS_REDIRECT_URL: "test-redirect-url",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "mock-redis-url",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: true,
|
AUDIT_LOG_ENABLED: true,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -128,7 +128,6 @@ const mockSurveys: TSurvey[] = [
|
|||||||
displayPercentage: null,
|
displayPercentage: null,
|
||||||
languages: [],
|
languages: [],
|
||||||
pin: null,
|
pin: null,
|
||||||
resultShareKey: null,
|
|
||||||
segment: null,
|
segment: null,
|
||||||
singleUse: null,
|
singleUse: null,
|
||||||
styling: null,
|
styling: null,
|
||||||
|
|||||||
@@ -226,7 +226,6 @@ const surveys: TSurvey[] = [
|
|||||||
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
||||||
hiddenFields: { enabled: true, fieldIds: [] },
|
hiddenFields: { enabled: true, fieldIds: [] },
|
||||||
pin: null,
|
pin: null,
|
||||||
resultShareKey: null,
|
|
||||||
displayLimit: null,
|
displayLimit: null,
|
||||||
} as unknown as TSurvey,
|
} as unknown as TSurvey,
|
||||||
{
|
{
|
||||||
@@ -264,7 +263,6 @@ const surveys: TSurvey[] = [
|
|||||||
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
welcomeCard: { enabled: true } as unknown as TSurvey["welcomeCard"],
|
||||||
hiddenFields: { enabled: true, fieldIds: [] },
|
hiddenFields: { enabled: true, fieldIds: [] },
|
||||||
pin: null,
|
pin: null,
|
||||||
resultShareKey: null,
|
|
||||||
displayLimit: null,
|
displayLimit: null,
|
||||||
} as unknown as TSurvey,
|
} as unknown as TSurvey,
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -114,7 +114,6 @@ const mockSurveys: TSurvey[] = [
|
|||||||
languages: [],
|
languages: [],
|
||||||
styling: null,
|
styling: null,
|
||||||
segment: null,
|
segment: null,
|
||||||
resultShareKey: null,
|
|
||||||
displayPercentage: null,
|
displayPercentage: null,
|
||||||
closeOnDate: null,
|
closeOnDate: null,
|
||||||
runOnDate: null,
|
runOnDate: null,
|
||||||
|
|||||||
@@ -1,3 +1,4 @@
|
|||||||
|
import { getEnvironment } from "@/lib/environment/service";
|
||||||
import { getMembershipByUserIdOrganizationId } from "@/lib/membership/service";
|
import { getMembershipByUserIdOrganizationId } from "@/lib/membership/service";
|
||||||
import { getProjectByEnvironmentId } from "@/lib/project/service";
|
import { getProjectByEnvironmentId } from "@/lib/project/service";
|
||||||
import { environmentIdLayoutChecks } from "@/modules/environments/lib/utils";
|
import { environmentIdLayoutChecks } from "@/modules/environments/lib/utils";
|
||||||
@@ -5,6 +6,7 @@ import { cleanup, render, screen } from "@testing-library/react";
|
|||||||
import { Session } from "next-auth";
|
import { Session } from "next-auth";
|
||||||
import { redirect } from "next/navigation";
|
import { redirect } from "next/navigation";
|
||||||
import { afterEach, describe, expect, test, vi } from "vitest";
|
import { afterEach, describe, expect, test, vi } from "vitest";
|
||||||
|
import { TEnvironment } from "@formbricks/types/environment";
|
||||||
import { TMembership } from "@formbricks/types/memberships";
|
import { TMembership } from "@formbricks/types/memberships";
|
||||||
import { TOrganization } from "@formbricks/types/organizations";
|
import { TOrganization } from "@formbricks/types/organizations";
|
||||||
import { TProject } from "@formbricks/types/project";
|
import { TProject } from "@formbricks/types/project";
|
||||||
@@ -13,12 +15,20 @@ import EnvLayout from "./layout";
|
|||||||
|
|
||||||
// Mock sub-components to render identifiable elements
|
// Mock sub-components to render identifiable elements
|
||||||
vi.mock("@/app/(app)/environments/[environmentId]/components/EnvironmentLayout", () => ({
|
vi.mock("@/app/(app)/environments/[environmentId]/components/EnvironmentLayout", () => ({
|
||||||
EnvironmentLayout: ({ children }: any) => <div data-testid="EnvironmentLayout">{children}</div>,
|
EnvironmentLayout: ({ children, environmentId, session }: any) => (
|
||||||
|
<div data-testid="EnvironmentLayout" data-environment-id={environmentId} data-session={session?.user?.id}>
|
||||||
|
{children}
|
||||||
|
</div>
|
||||||
|
),
|
||||||
}));
|
}));
|
||||||
vi.mock("@/modules/ui/components/environmentId-base-layout", () => ({
|
vi.mock("@/modules/ui/components/environmentId-base-layout", () => ({
|
||||||
EnvironmentIdBaseLayout: ({ children, environmentId }: any) => (
|
EnvironmentIdBaseLayout: ({ children, environmentId, session, user, organization }: any) => (
|
||||||
<div data-testid="EnvironmentIdBaseLayout">
|
<div
|
||||||
{environmentId}
|
data-testid="EnvironmentIdBaseLayout"
|
||||||
|
data-environment-id={environmentId}
|
||||||
|
data-session={session?.user?.id}
|
||||||
|
data-user={user?.id}
|
||||||
|
data-organization={organization?.id}>
|
||||||
{children}
|
{children}
|
||||||
</div>
|
</div>
|
||||||
),
|
),
|
||||||
@@ -27,7 +37,24 @@ vi.mock("@/modules/ui/components/toaster-client", () => ({
|
|||||||
ToasterClient: () => <div data-testid="ToasterClient" />,
|
ToasterClient: () => <div data-testid="ToasterClient" />,
|
||||||
}));
|
}));
|
||||||
vi.mock("./components/EnvironmentStorageHandler", () => ({
|
vi.mock("./components/EnvironmentStorageHandler", () => ({
|
||||||
default: ({ environmentId }: any) => <div data-testid="EnvironmentStorageHandler">{environmentId}</div>,
|
default: ({ environmentId }: any) => (
|
||||||
|
<div data-testid="EnvironmentStorageHandler" data-environment-id={environmentId} />
|
||||||
|
),
|
||||||
|
}));
|
||||||
|
vi.mock("@/app/(app)/environments/[environmentId]/context/environment-context", () => ({
|
||||||
|
EnvironmentContextWrapper: ({ children, environment, project }: any) => (
|
||||||
|
<div
|
||||||
|
data-testid="EnvironmentContextWrapper"
|
||||||
|
data-environment-id={environment?.id}
|
||||||
|
data-project-id={project?.id}>
|
||||||
|
{children}
|
||||||
|
</div>
|
||||||
|
),
|
||||||
|
}));
|
||||||
|
|
||||||
|
// Mock navigation
|
||||||
|
vi.mock("next/navigation", () => ({
|
||||||
|
redirect: vi.fn(),
|
||||||
}));
|
}));
|
||||||
|
|
||||||
// Mocks for dependencies
|
// Mocks for dependencies
|
||||||
@@ -37,26 +64,43 @@ vi.mock("@/modules/environments/lib/utils", () => ({
|
|||||||
vi.mock("@/lib/project/service", () => ({
|
vi.mock("@/lib/project/service", () => ({
|
||||||
getProjectByEnvironmentId: vi.fn(),
|
getProjectByEnvironmentId: vi.fn(),
|
||||||
}));
|
}));
|
||||||
|
vi.mock("@/lib/environment/service", () => ({
|
||||||
|
getEnvironment: vi.fn(),
|
||||||
|
}));
|
||||||
vi.mock("@/lib/membership/service", () => ({
|
vi.mock("@/lib/membership/service", () => ({
|
||||||
getMembershipByUserIdOrganizationId: vi.fn(),
|
getMembershipByUserIdOrganizationId: vi.fn(),
|
||||||
}));
|
}));
|
||||||
|
|
||||||
describe("EnvLayout", () => {
|
describe("EnvLayout", () => {
|
||||||
|
const mockSession = { user: { id: "user1" } } as Session;
|
||||||
|
const mockUser = { id: "user1", email: "user1@example.com" } as TUser;
|
||||||
|
const mockOrganization = { id: "org1", name: "Org1", billing: {} } as TOrganization;
|
||||||
|
const mockProject = { id: "proj1", name: "Test Project" } as TProject;
|
||||||
|
const mockEnvironment = { id: "env1", type: "production" } as TEnvironment;
|
||||||
|
const mockMembership = {
|
||||||
|
id: "member1",
|
||||||
|
role: "owner",
|
||||||
|
organizationId: "org1",
|
||||||
|
userId: "user1",
|
||||||
|
accepted: true,
|
||||||
|
} as TMembership;
|
||||||
|
const mockTranslation = ((key: string) => key) as any;
|
||||||
|
|
||||||
afterEach(() => {
|
afterEach(() => {
|
||||||
cleanup();
|
cleanup();
|
||||||
|
vi.clearAllMocks();
|
||||||
});
|
});
|
||||||
|
|
||||||
test("renders successfully when all dependencies return valid data", async () => {
|
test("renders successfully when all dependencies return valid data", async () => {
|
||||||
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
||||||
t: ((key: string) => key) as any, // Mock translation function, we don't need to implement it for the test
|
t: mockTranslation,
|
||||||
session: { user: { id: "user1" } } as Session,
|
session: mockSession,
|
||||||
user: { id: "user1", email: "user1@example.com" } as TUser,
|
user: mockUser,
|
||||||
organization: { id: "org1", name: "Org1", billing: {} } as TOrganization,
|
organization: mockOrganization,
|
||||||
});
|
});
|
||||||
vi.mocked(getProjectByEnvironmentId).mockResolvedValueOnce({ id: "proj1" } as TProject);
|
vi.mocked(getProjectByEnvironmentId).mockResolvedValueOnce(mockProject);
|
||||||
vi.mocked(getMembershipByUserIdOrganizationId).mockResolvedValueOnce({
|
vi.mocked(getEnvironment).mockResolvedValueOnce(mockEnvironment);
|
||||||
id: "member1",
|
vi.mocked(getMembershipByUserIdOrganizationId).mockResolvedValueOnce(mockMembership);
|
||||||
} as unknown as TMembership);
|
|
||||||
|
|
||||||
const result = await EnvLayout({
|
const result = await EnvLayout({
|
||||||
params: Promise.resolve({ environmentId: "env1" }),
|
params: Promise.resolve({ environmentId: "env1" }),
|
||||||
@@ -64,56 +108,43 @@ describe("EnvLayout", () => {
|
|||||||
});
|
});
|
||||||
render(result);
|
render(result);
|
||||||
|
|
||||||
expect(screen.getByTestId("EnvironmentIdBaseLayout")).toHaveTextContent("env1");
|
// Verify main layout structure
|
||||||
expect(screen.getByTestId("EnvironmentStorageHandler")).toHaveTextContent("env1");
|
expect(screen.getByTestId("EnvironmentIdBaseLayout")).toBeInTheDocument();
|
||||||
expect(screen.getByTestId("EnvironmentLayout")).toBeDefined();
|
expect(screen.getByTestId("EnvironmentIdBaseLayout")).toHaveAttribute("data-environment-id", "env1");
|
||||||
|
expect(screen.getByTestId("EnvironmentIdBaseLayout")).toHaveAttribute("data-session", "user1");
|
||||||
|
expect(screen.getByTestId("EnvironmentIdBaseLayout")).toHaveAttribute("data-user", "user1");
|
||||||
|
expect(screen.getByTestId("EnvironmentIdBaseLayout")).toHaveAttribute("data-organization", "org1");
|
||||||
|
|
||||||
|
// Verify environment storage handler
|
||||||
|
expect(screen.getByTestId("EnvironmentStorageHandler")).toBeInTheDocument();
|
||||||
|
expect(screen.getByTestId("EnvironmentStorageHandler")).toHaveAttribute("data-environment-id", "env1");
|
||||||
|
|
||||||
|
// Verify context wrapper
|
||||||
|
expect(screen.getByTestId("EnvironmentContextWrapper")).toBeInTheDocument();
|
||||||
|
expect(screen.getByTestId("EnvironmentContextWrapper")).toHaveAttribute("data-environment-id", "env1");
|
||||||
|
expect(screen.getByTestId("EnvironmentContextWrapper")).toHaveAttribute("data-project-id", "proj1");
|
||||||
|
|
||||||
|
// Verify environment layout
|
||||||
|
expect(screen.getByTestId("EnvironmentLayout")).toBeInTheDocument();
|
||||||
|
expect(screen.getByTestId("EnvironmentLayout")).toHaveAttribute("data-environment-id", "env1");
|
||||||
|
expect(screen.getByTestId("EnvironmentLayout")).toHaveAttribute("data-session", "user1");
|
||||||
|
|
||||||
|
// Verify children are rendered
|
||||||
expect(screen.getByTestId("child")).toHaveTextContent("Content");
|
expect(screen.getByTestId("child")).toHaveTextContent("Content");
|
||||||
|
|
||||||
|
// Verify all services were called with correct parameters
|
||||||
|
expect(environmentIdLayoutChecks).toHaveBeenCalledWith("env1");
|
||||||
|
expect(getProjectByEnvironmentId).toHaveBeenCalledWith("env1");
|
||||||
|
expect(getEnvironment).toHaveBeenCalledWith("env1");
|
||||||
|
expect(getMembershipByUserIdOrganizationId).toHaveBeenCalledWith("user1", "org1");
|
||||||
});
|
});
|
||||||
|
|
||||||
test("throws error if project is not found", async () => {
|
test("redirects when session is null", async () => {
|
||||||
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
||||||
t: ((key: string) => key) as any,
|
t: mockTranslation,
|
||||||
session: { user: { id: "user1" } } as Session,
|
session: null as unknown as Session,
|
||||||
user: { id: "user1", email: "user1@example.com" } as TUser,
|
user: mockUser,
|
||||||
organization: { id: "org1", name: "Org1", billing: {} } as TOrganization,
|
organization: mockOrganization,
|
||||||
});
|
|
||||||
vi.mocked(getProjectByEnvironmentId).mockResolvedValueOnce(null);
|
|
||||||
vi.mocked(getMembershipByUserIdOrganizationId).mockResolvedValueOnce({
|
|
||||||
id: "member1",
|
|
||||||
} as unknown as TMembership);
|
|
||||||
|
|
||||||
await expect(
|
|
||||||
EnvLayout({
|
|
||||||
params: Promise.resolve({ environmentId: "env1" }),
|
|
||||||
children: <div>Content</div>,
|
|
||||||
})
|
|
||||||
).rejects.toThrow("common.project_not_found");
|
|
||||||
});
|
|
||||||
|
|
||||||
test("throws error if membership is not found", async () => {
|
|
||||||
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
|
||||||
t: ((key: string) => key) as any,
|
|
||||||
session: { user: { id: "user1" } } as Session,
|
|
||||||
user: { id: "user1", email: "user1@example.com" } as TUser,
|
|
||||||
organization: { id: "org1", name: "Org1", billing: {} } as TOrganization,
|
|
||||||
});
|
|
||||||
vi.mocked(getProjectByEnvironmentId).mockResolvedValueOnce({ id: "proj1" } as TProject);
|
|
||||||
vi.mocked(getMembershipByUserIdOrganizationId).mockResolvedValueOnce(null);
|
|
||||||
|
|
||||||
await expect(
|
|
||||||
EnvLayout({
|
|
||||||
params: Promise.resolve({ environmentId: "env1" }),
|
|
||||||
children: <div>Content</div>,
|
|
||||||
})
|
|
||||||
).rejects.toThrow("common.membership_not_found");
|
|
||||||
});
|
|
||||||
|
|
||||||
test("calls redirect when session is null", async () => {
|
|
||||||
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
|
||||||
t: ((key: string) => key) as any,
|
|
||||||
session: undefined as unknown as Session,
|
|
||||||
user: undefined as unknown as TUser,
|
|
||||||
organization: { id: "org1", name: "Org1", billing: {} } as TOrganization,
|
|
||||||
});
|
});
|
||||||
vi.mocked(redirect).mockImplementationOnce(() => {
|
vi.mocked(redirect).mockImplementationOnce(() => {
|
||||||
throw new Error("Redirect called");
|
throw new Error("Redirect called");
|
||||||
@@ -125,18 +156,16 @@ describe("EnvLayout", () => {
|
|||||||
children: <div>Content</div>,
|
children: <div>Content</div>,
|
||||||
})
|
})
|
||||||
).rejects.toThrow("Redirect called");
|
).rejects.toThrow("Redirect called");
|
||||||
|
|
||||||
|
expect(redirect).toHaveBeenCalledWith("/auth/login");
|
||||||
});
|
});
|
||||||
|
|
||||||
test("throws error if user is null", async () => {
|
test("throws error if user is null", async () => {
|
||||||
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
||||||
t: ((key: string) => key) as any,
|
t: mockTranslation,
|
||||||
session: { user: { id: "user1" } } as Session,
|
session: mockSession,
|
||||||
user: undefined as unknown as TUser,
|
user: null as unknown as TUser,
|
||||||
organization: { id: "org1", name: "Org1", billing: {} } as TOrganization,
|
organization: mockOrganization,
|
||||||
});
|
|
||||||
|
|
||||||
vi.mocked(redirect).mockImplementationOnce(() => {
|
|
||||||
throw new Error("Redirect called");
|
|
||||||
});
|
});
|
||||||
|
|
||||||
await expect(
|
await expect(
|
||||||
@@ -145,5 +174,154 @@ describe("EnvLayout", () => {
|
|||||||
children: <div>Content</div>,
|
children: <div>Content</div>,
|
||||||
})
|
})
|
||||||
).rejects.toThrow("common.user_not_found");
|
).rejects.toThrow("common.user_not_found");
|
||||||
|
|
||||||
|
// Verify redirect was not called
|
||||||
|
expect(redirect).not.toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
|
||||||
|
test("throws error if project is not found", async () => {
|
||||||
|
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
||||||
|
t: mockTranslation,
|
||||||
|
session: mockSession,
|
||||||
|
user: mockUser,
|
||||||
|
organization: mockOrganization,
|
||||||
|
});
|
||||||
|
vi.mocked(getProjectByEnvironmentId).mockResolvedValueOnce(null);
|
||||||
|
vi.mocked(getEnvironment).mockResolvedValueOnce(mockEnvironment);
|
||||||
|
|
||||||
|
await expect(
|
||||||
|
EnvLayout({
|
||||||
|
params: Promise.resolve({ environmentId: "env1" }),
|
||||||
|
children: <div>Content</div>,
|
||||||
|
})
|
||||||
|
).rejects.toThrow("common.project_not_found");
|
||||||
|
|
||||||
|
// Verify both project and environment were called in Promise.all
|
||||||
|
expect(getProjectByEnvironmentId).toHaveBeenCalledWith("env1");
|
||||||
|
expect(getEnvironment).toHaveBeenCalledWith("env1");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("throws error if environment is not found", async () => {
|
||||||
|
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
||||||
|
t: mockTranslation,
|
||||||
|
session: mockSession,
|
||||||
|
user: mockUser,
|
||||||
|
organization: mockOrganization,
|
||||||
|
});
|
||||||
|
vi.mocked(getProjectByEnvironmentId).mockResolvedValueOnce(mockProject);
|
||||||
|
vi.mocked(getEnvironment).mockResolvedValueOnce(null);
|
||||||
|
|
||||||
|
await expect(
|
||||||
|
EnvLayout({
|
||||||
|
params: Promise.resolve({ environmentId: "env1" }),
|
||||||
|
children: <div>Content</div>,
|
||||||
|
})
|
||||||
|
).rejects.toThrow("common.environment_not_found");
|
||||||
|
|
||||||
|
// Verify both project and environment were called in Promise.all
|
||||||
|
expect(getProjectByEnvironmentId).toHaveBeenCalledWith("env1");
|
||||||
|
expect(getEnvironment).toHaveBeenCalledWith("env1");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("throws error if membership is not found", async () => {
|
||||||
|
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
||||||
|
t: mockTranslation,
|
||||||
|
session: mockSession,
|
||||||
|
user: mockUser,
|
||||||
|
organization: mockOrganization,
|
||||||
|
});
|
||||||
|
vi.mocked(getProjectByEnvironmentId).mockResolvedValueOnce(mockProject);
|
||||||
|
vi.mocked(getEnvironment).mockResolvedValueOnce(mockEnvironment);
|
||||||
|
vi.mocked(getMembershipByUserIdOrganizationId).mockResolvedValueOnce(null);
|
||||||
|
|
||||||
|
await expect(
|
||||||
|
EnvLayout({
|
||||||
|
params: Promise.resolve({ environmentId: "env1" }),
|
||||||
|
children: <div>Content</div>,
|
||||||
|
})
|
||||||
|
).rejects.toThrow("common.membership_not_found");
|
||||||
|
|
||||||
|
expect(getMembershipByUserIdOrganizationId).toHaveBeenCalledWith("user1", "org1");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles Promise.all correctly for project and environment", async () => {
|
||||||
|
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
||||||
|
t: mockTranslation,
|
||||||
|
session: mockSession,
|
||||||
|
user: mockUser,
|
||||||
|
organization: mockOrganization,
|
||||||
|
});
|
||||||
|
|
||||||
|
// Mock Promise.all to verify it's called correctly
|
||||||
|
const getProjectSpy = vi.mocked(getProjectByEnvironmentId).mockResolvedValueOnce(mockProject);
|
||||||
|
const getEnvironmentSpy = vi.mocked(getEnvironment).mockResolvedValueOnce(mockEnvironment);
|
||||||
|
vi.mocked(getMembershipByUserIdOrganizationId).mockResolvedValueOnce(mockMembership);
|
||||||
|
|
||||||
|
const result = await EnvLayout({
|
||||||
|
params: Promise.resolve({ environmentId: "env1" }),
|
||||||
|
children: <div data-testid="child">Content</div>,
|
||||||
|
});
|
||||||
|
render(result);
|
||||||
|
|
||||||
|
// Verify both calls were made
|
||||||
|
expect(getProjectSpy).toHaveBeenCalledWith("env1");
|
||||||
|
expect(getEnvironmentSpy).toHaveBeenCalledWith("env1");
|
||||||
|
|
||||||
|
// Verify successful rendering
|
||||||
|
expect(screen.getByTestId("child")).toBeInTheDocument();
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles different environment types correctly", async () => {
|
||||||
|
const developmentEnvironment = { id: "env1", type: "development" } as TEnvironment;
|
||||||
|
|
||||||
|
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
||||||
|
t: mockTranslation,
|
||||||
|
session: mockSession,
|
||||||
|
user: mockUser,
|
||||||
|
organization: mockOrganization,
|
||||||
|
});
|
||||||
|
vi.mocked(getProjectByEnvironmentId).mockResolvedValueOnce(mockProject);
|
||||||
|
vi.mocked(getEnvironment).mockResolvedValueOnce(developmentEnvironment);
|
||||||
|
vi.mocked(getMembershipByUserIdOrganizationId).mockResolvedValueOnce(mockMembership);
|
||||||
|
|
||||||
|
const result = await EnvLayout({
|
||||||
|
params: Promise.resolve({ environmentId: "env1" }),
|
||||||
|
children: <div data-testid="child">Content</div>,
|
||||||
|
});
|
||||||
|
render(result);
|
||||||
|
|
||||||
|
// Verify context wrapper receives the development environment
|
||||||
|
expect(screen.getByTestId("EnvironmentContextWrapper")).toHaveAttribute("data-environment-id", "env1");
|
||||||
|
expect(screen.getByTestId("child")).toBeInTheDocument();
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles different user roles correctly", async () => {
|
||||||
|
const memberMembership = {
|
||||||
|
id: "member1",
|
||||||
|
role: "member",
|
||||||
|
organizationId: "org1",
|
||||||
|
userId: "user1",
|
||||||
|
accepted: true,
|
||||||
|
} as TMembership;
|
||||||
|
|
||||||
|
vi.mocked(environmentIdLayoutChecks).mockResolvedValueOnce({
|
||||||
|
t: mockTranslation,
|
||||||
|
session: mockSession,
|
||||||
|
user: mockUser,
|
||||||
|
organization: mockOrganization,
|
||||||
|
});
|
||||||
|
vi.mocked(getProjectByEnvironmentId).mockResolvedValueOnce(mockProject);
|
||||||
|
vi.mocked(getEnvironment).mockResolvedValueOnce(mockEnvironment);
|
||||||
|
vi.mocked(getMembershipByUserIdOrganizationId).mockResolvedValueOnce(memberMembership);
|
||||||
|
|
||||||
|
const result = await EnvLayout({
|
||||||
|
params: Promise.resolve({ environmentId: "env1" }),
|
||||||
|
children: <div data-testid="child">Content</div>,
|
||||||
|
});
|
||||||
|
render(result);
|
||||||
|
|
||||||
|
// Verify successful rendering with member role
|
||||||
|
expect(screen.getByTestId("child")).toBeInTheDocument();
|
||||||
|
expect(getMembershipByUserIdOrganizationId).toHaveBeenCalledWith("user1", "org1");
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|||||||
@@ -1,4 +1,6 @@
|
|||||||
import { EnvironmentLayout } from "@/app/(app)/environments/[environmentId]/components/EnvironmentLayout";
|
import { EnvironmentLayout } from "@/app/(app)/environments/[environmentId]/components/EnvironmentLayout";
|
||||||
|
import { EnvironmentContextWrapper } from "@/app/(app)/environments/[environmentId]/context/environment-context";
|
||||||
|
import { getEnvironment } from "@/lib/environment/service";
|
||||||
import { getMembershipByUserIdOrganizationId } from "@/lib/membership/service";
|
import { getMembershipByUserIdOrganizationId } from "@/lib/membership/service";
|
||||||
import { getProjectByEnvironmentId } from "@/lib/project/service";
|
import { getProjectByEnvironmentId } from "@/lib/project/service";
|
||||||
import { environmentIdLayoutChecks } from "@/modules/environments/lib/utils";
|
import { environmentIdLayoutChecks } from "@/modules/environments/lib/utils";
|
||||||
@@ -11,7 +13,6 @@ const EnvLayout = async (props: {
|
|||||||
children: React.ReactNode;
|
children: React.ReactNode;
|
||||||
}) => {
|
}) => {
|
||||||
const params = await props.params;
|
const params = await props.params;
|
||||||
|
|
||||||
const { children } = props;
|
const { children } = props;
|
||||||
|
|
||||||
const { t, session, user, organization } = await environmentIdLayoutChecks(params.environmentId);
|
const { t, session, user, organization } = await environmentIdLayoutChecks(params.environmentId);
|
||||||
@@ -24,11 +25,19 @@ const EnvLayout = async (props: {
|
|||||||
throw new Error(t("common.user_not_found"));
|
throw new Error(t("common.user_not_found"));
|
||||||
}
|
}
|
||||||
|
|
||||||
const project = await getProjectByEnvironmentId(params.environmentId);
|
const [project, environment] = await Promise.all([
|
||||||
|
getProjectByEnvironmentId(params.environmentId),
|
||||||
|
getEnvironment(params.environmentId),
|
||||||
|
]);
|
||||||
|
|
||||||
if (!project) {
|
if (!project) {
|
||||||
throw new Error(t("common.project_not_found"));
|
throw new Error(t("common.project_not_found"));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!environment) {
|
||||||
|
throw new Error(t("common.environment_not_found"));
|
||||||
|
}
|
||||||
|
|
||||||
const membership = await getMembershipByUserIdOrganizationId(session.user.id, organization.id);
|
const membership = await getMembershipByUserIdOrganizationId(session.user.id, organization.id);
|
||||||
|
|
||||||
if (!membership) {
|
if (!membership) {
|
||||||
@@ -42,9 +51,11 @@ const EnvLayout = async (props: {
|
|||||||
user={user}
|
user={user}
|
||||||
organization={organization}>
|
organization={organization}>
|
||||||
<EnvironmentStorageHandler environmentId={params.environmentId} />
|
<EnvironmentStorageHandler environmentId={params.environmentId} />
|
||||||
<EnvironmentLayout environmentId={params.environmentId} session={session}>
|
<EnvironmentContextWrapper environment={environment} project={project}>
|
||||||
{children}
|
<EnvironmentLayout environmentId={params.environmentId} session={session}>
|
||||||
</EnvironmentLayout>
|
{children}
|
||||||
|
</EnvironmentLayout>
|
||||||
|
</EnvironmentContextWrapper>
|
||||||
</EnvironmentIdBaseLayout>
|
</EnvironmentIdBaseLayout>
|
||||||
);
|
);
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
IS_PRODUCTION: false,
|
IS_PRODUCTION: false,
|
||||||
SENTRY_DSN: "mock-sentry-dsn",
|
SENTRY_DSN: "mock-sentry-dsn",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "test-redis-url",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: true,
|
AUDIT_LOG_ENABLED: true,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
IS_PRODUCTION: false,
|
IS_PRODUCTION: false,
|
||||||
SENTRY_DSN: "mock-sentry-dsn",
|
SENTRY_DSN: "mock-sentry-dsn",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "redis://localhost:6379",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: 1,
|
AUDIT_LOG_ENABLED: 1,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
IS_PRODUCTION: false,
|
IS_PRODUCTION: false,
|
||||||
SENTRY_DSN: "mock-sentry-dsn",
|
SENTRY_DSN: "mock-sentry-dsn",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "redis://localhost:6379",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: 1,
|
AUDIT_LOG_ENABLED: 1,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
IS_PRODUCTION: false,
|
IS_PRODUCTION: false,
|
||||||
SENTRY_DSN: "mock-sentry-dsn",
|
SENTRY_DSN: "mock-sentry-dsn",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "redis://localhost:6379",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: 1,
|
AUDIT_LOG_ENABLED: 1,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
IS_PRODUCTION: false,
|
IS_PRODUCTION: false,
|
||||||
SENTRY_DSN: "mock-sentry-dsn",
|
SENTRY_DSN: "mock-sentry-dsn",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "redis://localhost:6379",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: 1,
|
AUDIT_LOG_ENABLED: 1,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
IS_PRODUCTION: false,
|
IS_PRODUCTION: false,
|
||||||
SENTRY_DSN: "mock-sentry-dsn",
|
SENTRY_DSN: "mock-sentry-dsn",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "test-redis-url",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: true,
|
AUDIT_LOG_ENABLED: true,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -41,7 +41,7 @@ vi.mock("@/lib/constants", () => ({
|
|||||||
IS_PRODUCTION: false,
|
IS_PRODUCTION: false,
|
||||||
SENTRY_DSN: "mock-sentry-dsn",
|
SENTRY_DSN: "mock-sentry-dsn",
|
||||||
SESSION_MAX_AGE: 1000,
|
SESSION_MAX_AGE: 1000,
|
||||||
REDIS_URL: "test-redis-url",
|
REDIS_URL: undefined,
|
||||||
AUDIT_LOG_ENABLED: true,
|
AUDIT_LOG_ENABLED: true,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
|||||||
@@ -49,7 +49,6 @@ const mockUser = {
|
|||||||
email: "test@example.com",
|
email: "test@example.com",
|
||||||
notificationSettings: {
|
notificationSettings: {
|
||||||
alert: {},
|
alert: {},
|
||||||
weeklySummary: {},
|
|
||||||
unsubscribedOrganizationIds: [],
|
unsubscribedOrganizationIds: [],
|
||||||
},
|
},
|
||||||
role: "project_manager",
|
role: "project_manager",
|
||||||
|
|||||||
@@ -1,166 +0,0 @@
|
|||||||
import { cleanup, render, screen } from "@testing-library/react";
|
|
||||||
import { afterEach, describe, expect, test, vi } from "vitest";
|
|
||||||
import { TUser } from "@formbricks/types/user";
|
|
||||||
import { Membership } from "../types";
|
|
||||||
import { EditWeeklySummary } from "./EditWeeklySummary";
|
|
||||||
|
|
||||||
vi.mock("lucide-react", () => ({
|
|
||||||
UsersIcon: () => <div data-testid="users-icon" />,
|
|
||||||
}));
|
|
||||||
|
|
||||||
vi.mock("next/link", () => ({
|
|
||||||
default: ({ children, href }: { children: React.ReactNode; href: string }) => (
|
|
||||||
<a href={href} data-testid="link">
|
|
||||||
{children}
|
|
||||||
</a>
|
|
||||||
),
|
|
||||||
}));
|
|
||||||
|
|
||||||
const mockNotificationSwitch = vi.fn();
|
|
||||||
vi.mock("./NotificationSwitch", () => ({
|
|
||||||
NotificationSwitch: (props: any) => {
|
|
||||||
mockNotificationSwitch(props);
|
|
||||||
return (
|
|
||||||
<div data-testid={`notification-switch-${props.surveyOrProjectOrOrganizationId}`}>
|
|
||||||
NotificationSwitch
|
|
||||||
</div>
|
|
||||||
);
|
|
||||||
},
|
|
||||||
}));
|
|
||||||
|
|
||||||
const mockT = vi.fn((key) => key);
|
|
||||||
vi.mock("@tolgee/react", () => ({
|
|
||||||
useTranslate: () => ({
|
|
||||||
t: mockT,
|
|
||||||
}),
|
|
||||||
}));
|
|
||||||
|
|
||||||
const mockUser = {
|
|
||||||
id: "user1",
|
|
||||||
name: "Test User",
|
|
||||||
email: "test@example.com",
|
|
||||||
notificationSettings: {
|
|
||||||
alert: {},
|
|
||||||
weeklySummary: {
|
|
||||||
proj1: true,
|
|
||||||
proj3: false,
|
|
||||||
},
|
|
||||||
unsubscribedOrganizationIds: [],
|
|
||||||
},
|
|
||||||
role: "project_manager",
|
|
||||||
objective: "other",
|
|
||||||
emailVerified: new Date(),
|
|
||||||
createdAt: new Date(),
|
|
||||||
updatedAt: new Date(),
|
|
||||||
identityProvider: "email",
|
|
||||||
twoFactorEnabled: false,
|
|
||||||
} as unknown as TUser;
|
|
||||||
|
|
||||||
const mockMemberships: Membership[] = [
|
|
||||||
{
|
|
||||||
organization: {
|
|
||||||
id: "org1",
|
|
||||||
name: "Organization 1",
|
|
||||||
projects: [
|
|
||||||
{ id: "proj1", name: "Project 1", environments: [] },
|
|
||||||
{ id: "proj2", name: "Project 2", environments: [] },
|
|
||||||
],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
organization: {
|
|
||||||
id: "org2",
|
|
||||||
name: "Organization 2",
|
|
||||||
projects: [{ id: "proj3", name: "Project 3", environments: [] }],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
];
|
|
||||||
|
|
||||||
const environmentId = "test-env-id";
|
|
||||||
|
|
||||||
describe("EditWeeklySummary", () => {
|
|
||||||
afterEach(() => {
|
|
||||||
cleanup();
|
|
||||||
vi.clearAllMocks();
|
|
||||||
});
|
|
||||||
|
|
||||||
test("renders correctly with multiple memberships and projects", () => {
|
|
||||||
render(<EditWeeklySummary memberships={mockMemberships} user={mockUser} environmentId={environmentId} />);
|
|
||||||
|
|
||||||
expect(screen.getByText("Organization 1")).toBeInTheDocument();
|
|
||||||
expect(screen.getByText("Project 1")).toBeInTheDocument();
|
|
||||||
expect(screen.getByText("Project 2")).toBeInTheDocument();
|
|
||||||
expect(screen.getByText("Organization 2")).toBeInTheDocument();
|
|
||||||
expect(screen.getByText("Project 3")).toBeInTheDocument();
|
|
||||||
|
|
||||||
expect(mockNotificationSwitch).toHaveBeenCalledWith(
|
|
||||||
expect.objectContaining({
|
|
||||||
surveyOrProjectOrOrganizationId: "proj1",
|
|
||||||
notificationSettings: mockUser.notificationSettings,
|
|
||||||
notificationType: "weeklySummary",
|
|
||||||
})
|
|
||||||
);
|
|
||||||
expect(screen.getByTestId("notification-switch-proj1")).toBeInTheDocument();
|
|
||||||
|
|
||||||
expect(mockNotificationSwitch).toHaveBeenCalledWith(
|
|
||||||
expect.objectContaining({
|
|
||||||
surveyOrProjectOrOrganizationId: "proj2",
|
|
||||||
notificationSettings: mockUser.notificationSettings,
|
|
||||||
notificationType: "weeklySummary",
|
|
||||||
})
|
|
||||||
);
|
|
||||||
expect(screen.getByTestId("notification-switch-proj2")).toBeInTheDocument();
|
|
||||||
|
|
||||||
expect(mockNotificationSwitch).toHaveBeenCalledWith(
|
|
||||||
expect.objectContaining({
|
|
||||||
surveyOrProjectOrOrganizationId: "proj3",
|
|
||||||
notificationSettings: mockUser.notificationSettings,
|
|
||||||
notificationType: "weeklySummary",
|
|
||||||
})
|
|
||||||
);
|
|
||||||
expect(screen.getByTestId("notification-switch-proj3")).toBeInTheDocument();
|
|
||||||
|
|
||||||
const inviteLinks = screen.getAllByTestId("link");
|
|
||||||
expect(inviteLinks.length).toBe(mockMemberships.length);
|
|
||||||
inviteLinks.forEach((link) => {
|
|
||||||
expect(link).toHaveAttribute("href", `/environments/${environmentId}/settings/general`);
|
|
||||||
expect(link).toHaveTextContent("common.invite_them");
|
|
||||||
});
|
|
||||||
|
|
||||||
expect(screen.getAllByTestId("users-icon").length).toBe(mockMemberships.length);
|
|
||||||
|
|
||||||
expect(screen.getAllByText("common.project")[0]).toBeInTheDocument();
|
|
||||||
expect(screen.getAllByText("common.weekly_summary")[0]).toBeInTheDocument();
|
|
||||||
expect(
|
|
||||||
screen.getAllByText("environments.settings.notifications.want_to_loop_in_organization_mates?").length
|
|
||||||
).toBe(mockMemberships.length);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("renders correctly with no memberships", () => {
|
|
||||||
render(<EditWeeklySummary memberships={[]} user={mockUser} environmentId={environmentId} />);
|
|
||||||
expect(screen.queryByText("Organization 1")).not.toBeInTheDocument();
|
|
||||||
expect(screen.queryByTestId("users-icon")).not.toBeInTheDocument();
|
|
||||||
});
|
|
||||||
|
|
||||||
test("renders correctly when an organization has no projects", () => {
|
|
||||||
const membershipsWithNoProjects: Membership[] = [
|
|
||||||
{
|
|
||||||
organization: {
|
|
||||||
id: "org3",
|
|
||||||
name: "Organization No Projects",
|
|
||||||
projects: [],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
];
|
|
||||||
render(
|
|
||||||
<EditWeeklySummary
|
|
||||||
memberships={membershipsWithNoProjects}
|
|
||||||
user={mockUser}
|
|
||||||
environmentId={environmentId}
|
|
||||||
/>
|
|
||||||
);
|
|
||||||
expect(screen.getByText("Organization No Projects")).toBeInTheDocument();
|
|
||||||
expect(screen.queryByText("Project 1")).not.toBeInTheDocument(); // Check that no projects are listed under it
|
|
||||||
expect(mockNotificationSwitch).not.toHaveBeenCalled(); // No projects, so no switches for projects
|
|
||||||
});
|
|
||||||
});
|
|
||||||
@@ -1,59 +0,0 @@
|
|||||||
"use client";
|
|
||||||
|
|
||||||
import { useTranslate } from "@tolgee/react";
|
|
||||||
import { UsersIcon } from "lucide-react";
|
|
||||||
import Link from "next/link";
|
|
||||||
import { TUser } from "@formbricks/types/user";
|
|
||||||
import { Membership } from "../types";
|
|
||||||
import { NotificationSwitch } from "./NotificationSwitch";
|
|
||||||
|
|
||||||
interface EditAlertsProps {
|
|
||||||
memberships: Membership[];
|
|
||||||
user: TUser;
|
|
||||||
environmentId: string;
|
|
||||||
}
|
|
||||||
|
|
||||||
export const EditWeeklySummary = ({ memberships, user, environmentId }: EditAlertsProps) => {
|
|
||||||
const { t } = useTranslate();
|
|
||||||
return (
|
|
||||||
<>
|
|
||||||
{memberships.map((membership) => (
|
|
||||||
<div key={membership.organization.id}>
|
|
||||||
<div className="mb-5 flex items-center space-x-3 text-sm font-medium">
|
|
||||||
<UsersIcon className="h-6 w-7 text-slate-600" />
|
|
||||||
|
|
||||||
<p className="text-slate-800">{membership.organization.name}</p>
|
|
||||||
</div>
|
|
||||||
<div className="mb-6 rounded-lg border border-slate-200">
|
|
||||||
<div className="grid h-12 grid-cols-3 content-center rounded-t-lg bg-slate-100 px-4 text-left text-sm font-semibold text-slate-900">
|
|
||||||
<div className="col-span-2">{t("common.project")}</div>
|
|
||||||
<div className="col-span-1 text-center">{t("common.weekly_summary")}</div>
|
|
||||||
</div>
|
|
||||||
<div className="space-y-1 p-2">
|
|
||||||
{membership.organization.projects.map((project) => (
|
|
||||||
<div
|
|
||||||
className="grid h-auto w-full cursor-pointer grid-cols-3 place-content-center justify-center rounded-lg px-2 py-2 text-left text-sm text-slate-900 hover:bg-slate-50"
|
|
||||||
key={project.id}>
|
|
||||||
<div className="col-span-2">{project?.name}</div>
|
|
||||||
<div className="col-span-1 flex items-center justify-center">
|
|
||||||
<NotificationSwitch
|
|
||||||
surveyOrProjectOrOrganizationId={project.id}
|
|
||||||
notificationSettings={user.notificationSettings!}
|
|
||||||
notificationType={"weeklySummary"}
|
|
||||||
/>
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
))}
|
|
||||||
</div>
|
|
||||||
<p className="pb-3 pl-4 text-xs text-slate-400">
|
|
||||||
{t("environments.settings.notifications.want_to_loop_in_organization_mates")}?{" "}
|
|
||||||
<Link className="font-semibold" href={`/environments/${environmentId}/settings/general`}>
|
|
||||||
{t("common.invite_them")}
|
|
||||||
</Link>
|
|
||||||
</p>
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
))}
|
|
||||||
</>
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -29,7 +29,6 @@ const organizationId = "org1";
|
|||||||
|
|
||||||
const baseNotificationSettings: TUserNotificationSettings = {
|
const baseNotificationSettings: TUserNotificationSettings = {
|
||||||
alert: {},
|
alert: {},
|
||||||
weeklySummary: {},
|
|
||||||
unsubscribedOrganizationIds: [],
|
unsubscribedOrganizationIds: [],
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -68,19 +67,6 @@ describe("NotificationSwitch", () => {
|
|||||||
expect(switchInput.checked).toBe(false);
|
expect(switchInput.checked).toBe(false);
|
||||||
});
|
});
|
||||||
|
|
||||||
test("renders with initial checked state for 'weeklySummary' (true)", () => {
|
|
||||||
const settings = { ...baseNotificationSettings, weeklySummary: { [projectId]: true } };
|
|
||||||
renderSwitch({
|
|
||||||
surveyOrProjectOrOrganizationId: projectId,
|
|
||||||
notificationSettings: settings,
|
|
||||||
notificationType: "weeklySummary",
|
|
||||||
});
|
|
||||||
const switchInput = screen.getByLabelText(
|
|
||||||
"toggle notification settings for weeklySummary"
|
|
||||||
) as HTMLInputElement;
|
|
||||||
expect(switchInput.checked).toBe(true);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("renders with initial checked state for 'unsubscribedOrganizationIds' (subscribed initially, so checked is true)", () => {
|
test("renders with initial checked state for 'unsubscribedOrganizationIds' (subscribed initially, so checked is true)", () => {
|
||||||
const settings = { ...baseNotificationSettings, unsubscribedOrganizationIds: [] };
|
const settings = { ...baseNotificationSettings, unsubscribedOrganizationIds: [] };
|
||||||
renderSwitch({
|
renderSwitch({
|
||||||
@@ -268,31 +254,6 @@ describe("NotificationSwitch", () => {
|
|||||||
expect(toast.success).not.toHaveBeenCalled();
|
expect(toast.success).not.toHaveBeenCalled();
|
||||||
});
|
});
|
||||||
|
|
||||||
test("shows error toast when updateNotificationSettingsAction fails for 'weeklySummary' type", async () => {
|
|
||||||
const mockErrorResponse = { serverError: "Database connection failed" };
|
|
||||||
vi.mocked(updateNotificationSettingsAction).mockResolvedValueOnce(mockErrorResponse);
|
|
||||||
|
|
||||||
const initialSettings = { ...baseNotificationSettings, weeklySummary: { [projectId]: true } };
|
|
||||||
renderSwitch({
|
|
||||||
surveyOrProjectOrOrganizationId: projectId,
|
|
||||||
notificationSettings: initialSettings,
|
|
||||||
notificationType: "weeklySummary",
|
|
||||||
});
|
|
||||||
const switchInput = screen.getByLabelText("toggle notification settings for weeklySummary");
|
|
||||||
|
|
||||||
await act(async () => {
|
|
||||||
await user.click(switchInput);
|
|
||||||
});
|
|
||||||
|
|
||||||
expect(updateNotificationSettingsAction).toHaveBeenCalledWith({
|
|
||||||
notificationSettings: { ...initialSettings, weeklySummary: { [projectId]: false } },
|
|
||||||
});
|
|
||||||
expect(toast.error).toHaveBeenCalledWith("Database connection failed", {
|
|
||||||
id: "notification-switch",
|
|
||||||
});
|
|
||||||
expect(toast.success).not.toHaveBeenCalled();
|
|
||||||
});
|
|
||||||
|
|
||||||
test("shows error toast when updateNotificationSettingsAction fails for 'unsubscribedOrganizationIds' type", async () => {
|
test("shows error toast when updateNotificationSettingsAction fails for 'unsubscribedOrganizationIds' type", async () => {
|
||||||
const mockErrorResponse = { serverError: "Permission denied" };
|
const mockErrorResponse = { serverError: "Permission denied" };
|
||||||
vi.mocked(updateNotificationSettingsAction).mockResolvedValueOnce(mockErrorResponse);
|
vi.mocked(updateNotificationSettingsAction).mockResolvedValueOnce(mockErrorResponse);
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ import { updateNotificationSettingsAction } from "../actions";
|
|||||||
interface NotificationSwitchProps {
|
interface NotificationSwitchProps {
|
||||||
surveyOrProjectOrOrganizationId: string;
|
surveyOrProjectOrOrganizationId: string;
|
||||||
notificationSettings: TUserNotificationSettings;
|
notificationSettings: TUserNotificationSettings;
|
||||||
notificationType: "alert" | "weeklySummary" | "unsubscribedOrganizationIds";
|
notificationType: "alert" | "unsubscribedOrganizationIds";
|
||||||
autoDisableNotificationType?: string;
|
autoDisableNotificationType?: string;
|
||||||
autoDisableNotificationElementId?: string;
|
autoDisableNotificationElementId?: string;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -34,17 +34,5 @@ describe("Loading Notifications Settings", () => {
|
|||||||
.getByText("environments.settings.notifications.email_alerts_surveys")
|
.getByText("environments.settings.notifications.email_alerts_surveys")
|
||||||
.closest("div[class*='rounded-xl']"); // Find parent card
|
.closest("div[class*='rounded-xl']"); // Find parent card
|
||||||
expect(alertsCard).toBeInTheDocument();
|
expect(alertsCard).toBeInTheDocument();
|
||||||
|
|
||||||
// Check for Weekly Summary LoadingCard
|
|
||||||
expect(
|
|
||||||
screen.getByText("environments.settings.notifications.weekly_summary_projects")
|
|
||||||
).toBeInTheDocument();
|
|
||||||
expect(
|
|
||||||
screen.getByText("environments.settings.notifications.stay_up_to_date_with_a_Weekly_every_Monday")
|
|
||||||
).toBeInTheDocument();
|
|
||||||
const weeklySummaryCard = screen
|
|
||||||
.getByText("environments.settings.notifications.weekly_summary_projects")
|
|
||||||
.closest("div[class*='rounded-xl']"); // Find parent card
|
|
||||||
expect(weeklySummaryCard).toBeInTheDocument();
|
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|||||||
@@ -14,11 +14,6 @@ const Loading = () => {
|
|||||||
description: t("environments.settings.notifications.set_up_an_alert_to_get_an_email_on_new_responses"),
|
description: t("environments.settings.notifications.set_up_an_alert_to_get_an_email_on_new_responses"),
|
||||||
skeletonLines: [{ classes: "h-6 w-28" }, { classes: "h-10 w-128" }, { classes: "h-10 w-128" }],
|
skeletonLines: [{ classes: "h-6 w-28" }, { classes: "h-10 w-128" }, { classes: "h-10 w-128" }],
|
||||||
},
|
},
|
||||||
{
|
|
||||||
title: t("environments.settings.notifications.weekly_summary_projects"),
|
|
||||||
description: t("environments.settings.notifications.stay_up_to_date_with_a_Weekly_every_Monday"),
|
|
||||||
skeletonLines: [{ classes: "h-6 w-28" }, { classes: "h-10 w-128" }, { classes: "h-10 w-128" }],
|
|
||||||
},
|
|
||||||
];
|
];
|
||||||
|
|
||||||
return (
|
return (
|
||||||
|
|||||||
@@ -5,7 +5,6 @@ import { afterEach, beforeEach, describe, expect, test, vi } from "vitest";
|
|||||||
import { prisma } from "@formbricks/database";
|
import { prisma } from "@formbricks/database";
|
||||||
import { TUser } from "@formbricks/types/user";
|
import { TUser } from "@formbricks/types/user";
|
||||||
import { EditAlerts } from "./components/EditAlerts";
|
import { EditAlerts } from "./components/EditAlerts";
|
||||||
import { EditWeeklySummary } from "./components/EditWeeklySummary";
|
|
||||||
import Page from "./page";
|
import Page from "./page";
|
||||||
import { Membership } from "./types";
|
import { Membership } from "./types";
|
||||||
|
|
||||||
@@ -58,9 +57,7 @@ vi.mock("@formbricks/database", () => ({
|
|||||||
vi.mock("./components/EditAlerts", () => ({
|
vi.mock("./components/EditAlerts", () => ({
|
||||||
EditAlerts: vi.fn(() => <div>EditAlertsComponent</div>),
|
EditAlerts: vi.fn(() => <div>EditAlertsComponent</div>),
|
||||||
}));
|
}));
|
||||||
vi.mock("./components/EditWeeklySummary", () => ({
|
|
||||||
EditWeeklySummary: vi.fn(() => <div>EditWeeklySummaryComponent</div>),
|
|
||||||
}));
|
|
||||||
vi.mock("./components/IntegrationsTip", () => ({
|
vi.mock("./components/IntegrationsTip", () => ({
|
||||||
IntegrationsTip: () => <div>IntegrationsTipComponent</div>,
|
IntegrationsTip: () => <div>IntegrationsTipComponent</div>,
|
||||||
}));
|
}));
|
||||||
@@ -71,7 +68,6 @@ const mockUser: Partial<TUser> = {
|
|||||||
email: "test@example.com",
|
email: "test@example.com",
|
||||||
notificationSettings: {
|
notificationSettings: {
|
||||||
alert: { "survey-old": true },
|
alert: { "survey-old": true },
|
||||||
weeklySummary: { "project-old": true },
|
|
||||||
unsubscribedOrganizationIds: ["org-unsubscribed"],
|
unsubscribedOrganizationIds: ["org-unsubscribed"],
|
||||||
},
|
},
|
||||||
};
|
};
|
||||||
@@ -137,13 +133,6 @@ describe("NotificationsPage", () => {
|
|||||||
).toBeInTheDocument();
|
).toBeInTheDocument();
|
||||||
expect(screen.getByText("EditAlertsComponent")).toBeInTheDocument();
|
expect(screen.getByText("EditAlertsComponent")).toBeInTheDocument();
|
||||||
expect(screen.getByText("IntegrationsTipComponent")).toBeInTheDocument();
|
expect(screen.getByText("IntegrationsTipComponent")).toBeInTheDocument();
|
||||||
expect(
|
|
||||||
screen.getByText("environments.settings.notifications.weekly_summary_projects")
|
|
||||||
).toBeInTheDocument();
|
|
||||||
expect(
|
|
||||||
screen.getByText("environments.settings.notifications.stay_up_to_date_with_a_Weekly_every_Monday")
|
|
||||||
).toBeInTheDocument();
|
|
||||||
expect(screen.getByText("EditWeeklySummaryComponent")).toBeInTheDocument();
|
|
||||||
|
|
||||||
// The actual `user.notificationSettings` passed to EditAlerts will be a new object
|
// The actual `user.notificationSettings` passed to EditAlerts will be a new object
|
||||||
// after `setCompleteNotificationSettings` processes it.
|
// after `setCompleteNotificationSettings` processes it.
|
||||||
@@ -157,16 +146,12 @@ describe("NotificationsPage", () => {
|
|||||||
// It iterates memberships, then projects, then environments, then surveys.
|
// It iterates memberships, then projects, then environments, then surveys.
|
||||||
// `newNotificationSettings.alert[survey.id] = notificationSettings[survey.id]?.responseFinished || (notificationSettings.alert && notificationSettings.alert[survey.id]) || false;`
|
// `newNotificationSettings.alert[survey.id] = notificationSettings[survey.id]?.responseFinished || (notificationSettings.alert && notificationSettings.alert[survey.id]) || false;`
|
||||||
// This means only survey IDs found in memberships will be in the new `alert` object.
|
// This means only survey IDs found in memberships will be in the new `alert` object.
|
||||||
// `newNotificationSettings.weeklySummary[project.id]` also only adds project IDs from memberships.
|
|
||||||
|
|
||||||
const finalExpectedSettings = {
|
const finalExpectedSettings = {
|
||||||
alert: {
|
alert: {
|
||||||
"survey-1": false,
|
"survey-1": false,
|
||||||
"survey-2": false,
|
"survey-2": false,
|
||||||
},
|
},
|
||||||
weeklySummary: {
|
|
||||||
"project-1": false,
|
|
||||||
},
|
|
||||||
unsubscribedOrganizationIds: ["org-unsubscribed"],
|
unsubscribedOrganizationIds: ["org-unsubscribed"],
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -175,11 +160,6 @@ describe("NotificationsPage", () => {
|
|||||||
expect(editAlertsCall.environmentId).toBe(mockParams.environmentId);
|
expect(editAlertsCall.environmentId).toBe(mockParams.environmentId);
|
||||||
expect(editAlertsCall.autoDisableNotificationType).toBe(mockSearchParams.type);
|
expect(editAlertsCall.autoDisableNotificationType).toBe(mockSearchParams.type);
|
||||||
expect(editAlertsCall.autoDisableNotificationElementId).toBe(mockSearchParams.elementId);
|
expect(editAlertsCall.autoDisableNotificationElementId).toBe(mockSearchParams.elementId);
|
||||||
|
|
||||||
const editWeeklySummaryCall = vi.mocked(EditWeeklySummary).mock.calls[0][0];
|
|
||||||
expect(editWeeklySummaryCall.user.notificationSettings).toEqual(finalExpectedSettings);
|
|
||||||
expect(editWeeklySummaryCall.memberships).toEqual(mockMemberships);
|
|
||||||
expect(editWeeklySummaryCall.environmentId).toBe(mockParams.environmentId);
|
|
||||||
});
|
});
|
||||||
|
|
||||||
test("throws error if session is not found", async () => {
|
test("throws error if session is not found", async () => {
|
||||||
@@ -207,21 +187,15 @@ describe("NotificationsPage", () => {
|
|||||||
render(PageComponent);
|
render(PageComponent);
|
||||||
|
|
||||||
expect(screen.getByText("EditAlertsComponent")).toBeInTheDocument();
|
expect(screen.getByText("EditAlertsComponent")).toBeInTheDocument();
|
||||||
expect(screen.getByText("EditWeeklySummaryComponent")).toBeInTheDocument();
|
|
||||||
|
|
||||||
const expectedEmptySettings = {
|
const expectedEmptySettings = {
|
||||||
alert: {},
|
alert: {},
|
||||||
weeklySummary: {},
|
|
||||||
unsubscribedOrganizationIds: [],
|
unsubscribedOrganizationIds: [],
|
||||||
};
|
};
|
||||||
|
|
||||||
const editAlertsCall = vi.mocked(EditAlerts).mock.calls[0][0];
|
const editAlertsCall = vi.mocked(EditAlerts).mock.calls[0][0];
|
||||||
expect(editAlertsCall.user.notificationSettings).toEqual(expectedEmptySettings);
|
expect(editAlertsCall.user.notificationSettings).toEqual(expectedEmptySettings);
|
||||||
expect(editAlertsCall.memberships).toEqual([]);
|
expect(editAlertsCall.memberships).toEqual([]);
|
||||||
|
|
||||||
const editWeeklySummaryCall = vi.mocked(EditWeeklySummary).mock.calls[0][0];
|
|
||||||
expect(editWeeklySummaryCall.user.notificationSettings).toEqual(expectedEmptySettings);
|
|
||||||
expect(editWeeklySummaryCall.memberships).toEqual([]);
|
|
||||||
});
|
});
|
||||||
|
|
||||||
test("handles legacy notification settings correctly", async () => {
|
test("handles legacy notification settings correctly", async () => {
|
||||||
@@ -229,7 +203,6 @@ describe("NotificationsPage", () => {
|
|||||||
id: "user-legacy",
|
id: "user-legacy",
|
||||||
notificationSettings: {
|
notificationSettings: {
|
||||||
"survey-1": { responseFinished: true }, // Legacy alert for survey-1
|
"survey-1": { responseFinished: true }, // Legacy alert for survey-1
|
||||||
weeklySummary: { "project-1": true },
|
|
||||||
unsubscribedOrganizationIds: [],
|
unsubscribedOrganizationIds: [],
|
||||||
} as any, // To allow legacy structure
|
} as any, // To allow legacy structure
|
||||||
};
|
};
|
||||||
@@ -246,9 +219,6 @@ describe("NotificationsPage", () => {
|
|||||||
"survey-1": true, // Should be true due to legacy setting
|
"survey-1": true, // Should be true due to legacy setting
|
||||||
"survey-2": false, // Default for other surveys in membership
|
"survey-2": false, // Default for other surveys in membership
|
||||||
},
|
},
|
||||||
weeklySummary: {
|
|
||||||
"project-1": true, // From user's weeklySummary
|
|
||||||
},
|
|
||||||
unsubscribedOrganizationIds: [],
|
unsubscribedOrganizationIds: [],
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -9,7 +9,6 @@ import { getServerSession } from "next-auth";
|
|||||||
import { prisma } from "@formbricks/database";
|
import { prisma } from "@formbricks/database";
|
||||||
import { TUserNotificationSettings } from "@formbricks/types/user";
|
import { TUserNotificationSettings } from "@formbricks/types/user";
|
||||||
import { EditAlerts } from "./components/EditAlerts";
|
import { EditAlerts } from "./components/EditAlerts";
|
||||||
import { EditWeeklySummary } from "./components/EditWeeklySummary";
|
|
||||||
import { IntegrationsTip } from "./components/IntegrationsTip";
|
import { IntegrationsTip } from "./components/IntegrationsTip";
|
||||||
import type { Membership } from "./types";
|
import type { Membership } from "./types";
|
||||||
|
|
||||||
@@ -19,14 +18,10 @@ const setCompleteNotificationSettings = (
|
|||||||
): TUserNotificationSettings => {
|
): TUserNotificationSettings => {
|
||||||
const newNotificationSettings = {
|
const newNotificationSettings = {
|
||||||
alert: {},
|
alert: {},
|
||||||
weeklySummary: {},
|
|
||||||
unsubscribedOrganizationIds: notificationSettings.unsubscribedOrganizationIds || [],
|
unsubscribedOrganizationIds: notificationSettings.unsubscribedOrganizationIds || [],
|
||||||
};
|
};
|
||||||
for (const membership of memberships) {
|
for (const membership of memberships) {
|
||||||
for (const project of membership.organization.projects) {
|
for (const project of membership.organization.projects) {
|
||||||
// set default values for weekly summary
|
|
||||||
newNotificationSettings.weeklySummary[project.id] =
|
|
||||||
(notificationSettings.weeklySummary && notificationSettings.weeklySummary[project.id]) || false;
|
|
||||||
// set default values for alerts
|
// set default values for alerts
|
||||||
for (const environment of project.environments) {
|
for (const environment of project.environments) {
|
||||||
for (const survey of environment.surveys) {
|
for (const survey of environment.surveys) {
|
||||||
@@ -183,11 +178,6 @@ const Page = async (props) => {
|
|||||||
/>
|
/>
|
||||||
</SettingsCard>
|
</SettingsCard>
|
||||||
<IntegrationsTip environmentId={params.environmentId} />
|
<IntegrationsTip environmentId={params.environmentId} />
|
||||||
<SettingsCard
|
|
||||||
title={t("environments.settings.notifications.weekly_summary_projects")}
|
|
||||||
description={t("environments.settings.notifications.stay_up_to_date_with_a_Weekly_every_Monday")}>
|
|
||||||
<EditWeeklySummary memberships={memberships} user={user} environmentId={params.environmentId} />
|
|
||||||
</SettingsCard>
|
|
||||||
</PageContentWrapper>
|
</PageContentWrapper>
|
||||||
);
|
);
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -10,24 +10,19 @@ import { getFileNameWithIdFromUrl } from "@/lib/storage/utils";
|
|||||||
import { getUser, updateUser } from "@/lib/user/service";
|
import { getUser, updateUser } from "@/lib/user/service";
|
||||||
import { authenticatedActionClient } from "@/lib/utils/action-client";
|
import { authenticatedActionClient } from "@/lib/utils/action-client";
|
||||||
import { AuthenticatedActionClientCtx } from "@/lib/utils/action-client/types/context";
|
import { AuthenticatedActionClientCtx } from "@/lib/utils/action-client/types/context";
|
||||||
import { rateLimit } from "@/lib/utils/rate-limit";
|
|
||||||
import { updateBrevoCustomer } from "@/modules/auth/lib/brevo";
|
import { updateBrevoCustomer } from "@/modules/auth/lib/brevo";
|
||||||
|
import { applyRateLimit } from "@/modules/core/rate-limit/helpers";
|
||||||
|
import { rateLimitConfigs } from "@/modules/core/rate-limit/rate-limit-configs";
|
||||||
import { withAuditLogging } from "@/modules/ee/audit-logs/lib/handler";
|
import { withAuditLogging } from "@/modules/ee/audit-logs/lib/handler";
|
||||||
import { sendForgotPasswordEmail, sendVerificationNewEmail } from "@/modules/email";
|
import { sendForgotPasswordEmail, sendVerificationNewEmail } from "@/modules/email";
|
||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
import { ZId } from "@formbricks/types/common";
|
import { ZId } from "@formbricks/types/common";
|
||||||
|
import { AuthenticationError, AuthorizationError, OperationNotAllowedError } from "@formbricks/types/errors";
|
||||||
import {
|
import {
|
||||||
AuthenticationError,
|
TUserPersonalInfoUpdateInput,
|
||||||
AuthorizationError,
|
TUserUpdateInput,
|
||||||
OperationNotAllowedError,
|
ZUserPersonalInfoUpdateInput,
|
||||||
TooManyRequestsError,
|
} from "@formbricks/types/user";
|
||||||
} from "@formbricks/types/errors";
|
|
||||||
import { TUserUpdateInput, ZUserPassword, ZUserUpdateInput } from "@formbricks/types/user";
|
|
||||||
|
|
||||||
const limiter = rateLimit({
|
|
||||||
interval: 60 * 60, // 1 hour
|
|
||||||
allowedPerInterval: 3, // max 3 calls for email verification per hour
|
|
||||||
});
|
|
||||||
|
|
||||||
function buildUserUpdatePayload(parsedInput: any): TUserUpdateInput {
|
function buildUserUpdatePayload(parsedInput: any): TUserUpdateInput {
|
||||||
return {
|
return {
|
||||||
@@ -41,18 +36,15 @@ async function handleEmailUpdate({
|
|||||||
parsedInput,
|
parsedInput,
|
||||||
payload,
|
payload,
|
||||||
}: {
|
}: {
|
||||||
ctx: any;
|
ctx: AuthenticatedActionClientCtx;
|
||||||
parsedInput: any;
|
parsedInput: TUserPersonalInfoUpdateInput;
|
||||||
payload: TUserUpdateInput;
|
payload: TUserUpdateInput;
|
||||||
}) {
|
}) {
|
||||||
const inputEmail = parsedInput.email?.trim().toLowerCase();
|
const inputEmail = parsedInput.email?.trim().toLowerCase();
|
||||||
if (!inputEmail || ctx.user.email === inputEmail) return payload;
|
if (!inputEmail || ctx.user.email === inputEmail) return payload;
|
||||||
|
|
||||||
try {
|
await applyRateLimit(rateLimitConfigs.actions.emailUpdate, ctx.user.id);
|
||||||
await limiter(ctx.user.id);
|
|
||||||
} catch {
|
|
||||||
throw new TooManyRequestsError("Too many requests");
|
|
||||||
}
|
|
||||||
if (ctx.user.identityProvider !== "email") {
|
if (ctx.user.identityProvider !== "email") {
|
||||||
throw new OperationNotAllowedError("Email update is not allowed for non-credential users.");
|
throw new OperationNotAllowedError("Email update is not allowed for non-credential users.");
|
||||||
}
|
}
|
||||||
@@ -75,41 +67,35 @@ async function handleEmailUpdate({
|
|||||||
return payload;
|
return payload;
|
||||||
}
|
}
|
||||||
|
|
||||||
export const updateUserAction = authenticatedActionClient
|
export const updateUserAction = authenticatedActionClient.schema(ZUserPersonalInfoUpdateInput).action(
|
||||||
.schema(
|
withAuditLogging(
|
||||||
ZUserUpdateInput.pick({ name: true, email: true, locale: true }).extend({
|
"updated",
|
||||||
password: ZUserPassword.optional(),
|
"user",
|
||||||
})
|
async ({
|
||||||
)
|
ctx,
|
||||||
.action(
|
parsedInput,
|
||||||
withAuditLogging(
|
}: {
|
||||||
"updated",
|
ctx: AuthenticatedActionClientCtx;
|
||||||
"user",
|
parsedInput: TUserPersonalInfoUpdateInput;
|
||||||
async ({
|
}) => {
|
||||||
ctx,
|
const oldObject = await getUser(ctx.user.id);
|
||||||
parsedInput,
|
let payload = buildUserUpdatePayload(parsedInput);
|
||||||
}: {
|
payload = await handleEmailUpdate({ ctx, parsedInput, payload });
|
||||||
ctx: AuthenticatedActionClientCtx;
|
|
||||||
parsedInput: Record<string, any>;
|
|
||||||
}) => {
|
|
||||||
const oldObject = await getUser(ctx.user.id);
|
|
||||||
let payload = buildUserUpdatePayload(parsedInput);
|
|
||||||
payload = await handleEmailUpdate({ ctx, parsedInput, payload });
|
|
||||||
|
|
||||||
// Only proceed with updateUser if we have actual changes to make
|
// Only proceed with updateUser if we have actual changes to make
|
||||||
let newObject = oldObject;
|
let newObject = oldObject;
|
||||||
if (Object.keys(payload).length > 0) {
|
if (Object.keys(payload).length > 0) {
|
||||||
newObject = await updateUser(ctx.user.id, payload);
|
newObject = await updateUser(ctx.user.id, payload);
|
||||||
}
|
|
||||||
|
|
||||||
ctx.auditLoggingCtx.userId = ctx.user.id;
|
|
||||||
ctx.auditLoggingCtx.oldObject = oldObject;
|
|
||||||
ctx.auditLoggingCtx.newObject = newObject;
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
}
|
||||||
)
|
|
||||||
);
|
ctx.auditLoggingCtx.userId = ctx.user.id;
|
||||||
|
ctx.auditLoggingCtx.oldObject = oldObject;
|
||||||
|
ctx.auditLoggingCtx.newObject = newObject;
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
)
|
||||||
|
);
|
||||||
|
|
||||||
const ZUpdateAvatarAction = z.object({
|
const ZUpdateAvatarAction = z.object({
|
||||||
avatarUrl: z.string(),
|
avatarUrl: z.string(),
|
||||||
@@ -169,7 +155,7 @@ export const resetPasswordAction = authenticatedActionClient.action(
|
|||||||
"user",
|
"user",
|
||||||
async ({ ctx }: { ctx: AuthenticatedActionClientCtx; parsedInput: undefined }) => {
|
async ({ ctx }: { ctx: AuthenticatedActionClientCtx; parsedInput: undefined }) => {
|
||||||
if (ctx.user.identityProvider !== "email") {
|
if (ctx.user.identityProvider !== "email") {
|
||||||
throw new OperationNotAllowedError("auth.reset-password.not-allowed");
|
throw new OperationNotAllowedError("Password reset is not allowed for this user.");
|
||||||
}
|
}
|
||||||
|
|
||||||
await sendForgotPasswordEmail(ctx.user);
|
await sendForgotPasswordEmail(ctx.user);
|
||||||
|
|||||||
@@ -20,7 +20,7 @@ const mockUser = {
|
|||||||
email: "test@example.com",
|
email: "test@example.com",
|
||||||
notificationSettings: {
|
notificationSettings: {
|
||||||
alert: {},
|
alert: {},
|
||||||
weeklySummary: {},
|
|
||||||
unsubscribedOrganizationIds: [],
|
unsubscribedOrganizationIds: [],
|
||||||
},
|
},
|
||||||
twoFactorEnabled: false,
|
twoFactorEnabled: false,
|
||||||
|
|||||||
@@ -15,7 +15,7 @@ const mockUser = {
|
|||||||
id: "user1",
|
id: "user1",
|
||||||
name: "Test User",
|
name: "Test User",
|
||||||
email: "test@example.com",
|
email: "test@example.com",
|
||||||
notificationSettings: { alert: {}, weeklySummary: {}, unsubscribedOrganizationIds: [] },
|
notificationSettings: { alert: {}, unsubscribedOrganizationIds: [] },
|
||||||
twoFactorEnabled: false,
|
twoFactorEnabled: false,
|
||||||
identityProvider: "email",
|
identityProvider: "email",
|
||||||
createdAt: new Date(),
|
createdAt: new Date(),
|
||||||
|
|||||||
@@ -13,7 +13,7 @@ const mockUser = {
|
|||||||
locale: "en-US",
|
locale: "en-US",
|
||||||
notificationSettings: {
|
notificationSettings: {
|
||||||
alert: {},
|
alert: {},
|
||||||
weeklySummary: {},
|
|
||||||
unsubscribedOrganizationIds: [],
|
unsubscribedOrganizationIds: [],
|
||||||
},
|
},
|
||||||
twoFactorEnabled: false,
|
twoFactorEnabled: false,
|
||||||
|
|||||||
@@ -145,7 +145,7 @@ export const EditProfileDetailsForm = ({
|
|||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
const errorMessage = getFormattedErrorMessage(result);
|
const errorMessage = getFormattedErrorMessage(result);
|
||||||
toast.error(t(errorMessage));
|
toast.error(errorMessage);
|
||||||
}
|
}
|
||||||
|
|
||||||
setIsResettingPassword(false);
|
setIsResettingPassword(false);
|
||||||
|
|||||||
@@ -76,7 +76,7 @@ const mockUser = {
|
|||||||
imageUrl: "http://example.com/avatar.png",
|
imageUrl: "http://example.com/avatar.png",
|
||||||
twoFactorEnabled: false,
|
twoFactorEnabled: false,
|
||||||
identityProvider: "email",
|
identityProvider: "email",
|
||||||
notificationSettings: { alert: {}, weeklySummary: {}, unsubscribedOrganizationIds: [] },
|
notificationSettings: { alert: {}, unsubscribedOrganizationIds: [] },
|
||||||
createdAt: new Date(),
|
createdAt: new Date(),
|
||||||
updatedAt: new Date(),
|
updatedAt: new Date(),
|
||||||
role: "project_manager",
|
role: "project_manager",
|
||||||
@@ -121,8 +121,9 @@ describe("ProfilePage", () => {
|
|||||||
expect(screen.getByTestId("account-security")).toBeInTheDocument(); // Shown because 2FA license is enabled
|
expect(screen.getByTestId("account-security")).toBeInTheDocument(); // Shown because 2FA license is enabled
|
||||||
expect(screen.queryByTestId("upgrade-prompt")).not.toBeInTheDocument();
|
expect(screen.queryByTestId("upgrade-prompt")).not.toBeInTheDocument();
|
||||||
expect(screen.getByTestId("delete-account")).toBeInTheDocument();
|
expect(screen.getByTestId("delete-account")).toBeInTheDocument();
|
||||||
// Use a regex to match the text content, allowing for variable whitespace
|
// Check for IdBadge content
|
||||||
expect(screen.getByText(new RegExp(`common\\.profile\\s*:\\s*${mockUser.id}`))).toBeInTheDocument(); // SettingsId
|
expect(screen.getByText("common.profile_id")).toBeInTheDocument();
|
||||||
|
expect(screen.getByText(mockUser.id)).toBeInTheDocument();
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|||||||
@@ -5,9 +5,9 @@ import { getOrganizationsWhereUserIsSingleOwner } from "@/lib/organization/servi
|
|||||||
import { getUser } from "@/lib/user/service";
|
import { getUser } from "@/lib/user/service";
|
||||||
import { getIsMultiOrgEnabled, getIsTwoFactorAuthEnabled } from "@/modules/ee/license-check/lib/utils";
|
import { getIsMultiOrgEnabled, getIsTwoFactorAuthEnabled } from "@/modules/ee/license-check/lib/utils";
|
||||||
import { getEnvironmentAuth } from "@/modules/environments/lib/utils";
|
import { getEnvironmentAuth } from "@/modules/environments/lib/utils";
|
||||||
|
import { IdBadge } from "@/modules/ui/components/id-badge";
|
||||||
import { PageContentWrapper } from "@/modules/ui/components/page-content-wrapper";
|
import { PageContentWrapper } from "@/modules/ui/components/page-content-wrapper";
|
||||||
import { PageHeader } from "@/modules/ui/components/page-header";
|
import { PageHeader } from "@/modules/ui/components/page-header";
|
||||||
import { SettingsId } from "@/modules/ui/components/settings-id";
|
|
||||||
import { UpgradePrompt } from "@/modules/ui/components/upgrade-prompt";
|
import { UpgradePrompt } from "@/modules/ui/components/upgrade-prompt";
|
||||||
import { getTranslate } from "@/tolgee/server";
|
import { getTranslate } from "@/tolgee/server";
|
||||||
import { SettingsCard } from "../../components/SettingsCard";
|
import { SettingsCard } from "../../components/SettingsCard";
|
||||||
@@ -103,7 +103,7 @@ const Page = async (props: { params: Promise<{ environmentId: string }> }) => {
|
|||||||
isMultiOrgEnabled={isMultiOrgEnabled}
|
isMultiOrgEnabled={isMultiOrgEnabled}
|
||||||
/>
|
/>
|
||||||
</SettingsCard>
|
</SettingsCard>
|
||||||
<SettingsId title={t("common.profile")} id={user.id}></SettingsId>
|
<IdBadge id={user.id} label={t("common.profile_id")} variant="column" />
|
||||||
</div>
|
</div>
|
||||||
)}
|
)}
|
||||||
</PageContentWrapper>
|
</PageContentWrapper>
|
||||||
|
|||||||
@@ -129,7 +129,7 @@ const mockUser = {
|
|||||||
imageUrl: "",
|
imageUrl: "",
|
||||||
twoFactorEnabled: false,
|
twoFactorEnabled: false,
|
||||||
identityProvider: "email",
|
identityProvider: "email",
|
||||||
notificationSettings: { alert: {}, weeklySummary: {} },
|
notificationSettings: { alert: {} },
|
||||||
role: "project_manager",
|
role: "project_manager",
|
||||||
objective: "other",
|
objective: "other",
|
||||||
} as unknown as TUser;
|
} as unknown as TUser;
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ import { getIsMultiOrgEnabled, getWhiteLabelPermission } from "@/modules/ee/lice
|
|||||||
import { EmailCustomizationSettings } from "@/modules/ee/whitelabel/email-customization/components/email-customization-settings";
|
import { EmailCustomizationSettings } from "@/modules/ee/whitelabel/email-customization/components/email-customization-settings";
|
||||||
import { getEnvironmentAuth } from "@/modules/environments/lib/utils";
|
import { getEnvironmentAuth } from "@/modules/environments/lib/utils";
|
||||||
import { TEnvironmentAuth } from "@/modules/environments/types/environment-auth";
|
import { TEnvironmentAuth } from "@/modules/environments/types/environment-auth";
|
||||||
import { SettingsId } from "@/modules/ui/components/settings-id";
|
import { IdBadge } from "@/modules/ui/components/id-badge";
|
||||||
import { getTranslate } from "@/tolgee/server";
|
import { getTranslate } from "@/tolgee/server";
|
||||||
import { cleanup, render, screen } from "@testing-library/react";
|
import { cleanup, render, screen } from "@testing-library/react";
|
||||||
import { afterEach, beforeEach, describe, expect, test, vi } from "vitest";
|
import { afterEach, beforeEach, describe, expect, test, vi } from "vitest";
|
||||||
@@ -78,8 +78,8 @@ vi.mock("./components/DeleteOrganization", () => ({
|
|||||||
DeleteOrganization: vi.fn(() => <div>DeleteOrganization</div>),
|
DeleteOrganization: vi.fn(() => <div>DeleteOrganization</div>),
|
||||||
}));
|
}));
|
||||||
|
|
||||||
vi.mock("@/modules/ui/components/settings-id", () => ({
|
vi.mock("@/modules/ui/components/id-badge", () => ({
|
||||||
SettingsId: vi.fn(() => <div>SettingsId</div>),
|
IdBadge: vi.fn(() => <div>IdBadge</div>),
|
||||||
}));
|
}));
|
||||||
|
|
||||||
describe("Page", () => {
|
describe("Page", () => {
|
||||||
@@ -156,10 +156,11 @@ describe("Page", () => {
|
|||||||
},
|
},
|
||||||
undefined
|
undefined
|
||||||
);
|
);
|
||||||
expect(SettingsId).toHaveBeenCalledWith(
|
expect(IdBadge).toHaveBeenCalledWith(
|
||||||
{
|
{
|
||||||
title: "common.organization_id",
|
|
||||||
id: mockEnvironmentAuth.organization.id,
|
id: mockEnvironmentAuth.organization.id,
|
||||||
|
label: "common.organization_id",
|
||||||
|
variant: "column",
|
||||||
},
|
},
|
||||||
undefined
|
undefined
|
||||||
);
|
);
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user