mirror of
https://github.com/tiddly-gittly/TidGi-Desktop.git
synced 2025-12-05 18:20:39 -08:00
* Add watch-filesystem-adaptor plugin and worker IPC Introduces the watch-filesystem-adaptor TiddlyWiki plugin, enabling tag-based routing of tiddlers to sub-wikis by querying workspace info via worker thread IPC. Adds workerServiceCaller utility for worker-to-main service calls, updates workerAdapter and bindServiceAndProxy to support explicit service registration for workers, and documents the new IPC architecture. Updates wikiWorker and startNodeJSWiki to preload workspace ID and load the new plugin. Also updates the plugin build script to compile and copy the new plugin. * test: wiki operation steps * Add per-wiki labeled logging and console hijack Introduces labeled loggers for each wiki, writing logs to separate files. Adds a logFor method to NativeService for logging with labels, updates interfaces, and hijacks worker thread console methods to redirect logs to main process for wiki-specific logging. Refactors workspaceID usage to workspace object for improved context. * Update log handling for wiki worker and tests Enhanced logging tests to check all log files, including wiki logs. Adjusted logger to write wiki worker logs to the main log directory. Updated e2e app script comment for correct usage. * Enable worker thread access to main process services Introduces a proxy system allowing worker threads to call main process services with full type safety and observable support. Adds worker-side service proxy creation, auto-attaches proxies to global.service, and updates service registration to use IPC descriptors. Documentation is added for usage and architecture. * Update ErrorDuringStart.md * chore: upgrade ipc cat and allow clean vite cache * Refactor wiki worker initialization and service readiness Moved wiki worker implementation from wikiWorker.ts to wikiWorker/index.ts and deleted the old file. Added servicesReady.ts to manage worker service readiness and callbacks, and integrated notifyServicesReady into the worker lifecycle. Updated console hijack logic to wait for service readiness before hijacking. Improved worker management in Wiki service to support detaching workers and notifying readiness. * Refactor wiki logging to use centralized logger Removed per-wiki loggers and console hijacking in favor of a single labeled logger. All wiki logs, including errors, are now written to a unified log file. Updated worker and service code to route logs through the main logger and removed obsolete log file naming and management logic. * fix: ipc cat log error * Refactor wiki test paths and improve file save logic Updated test step to use wikiTestRootPath for directory replacements and added wikiTestRootPath to paths.ts for clarity. Improved error handling and directory logic in watch-filesystem-adaptor.ts, including saving tiddlers directly to sub-wiki folders, more informative logging, and ensuring cleanup after file writes is properly awaited. * rename * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * feat: basic watch-fs * feat: check file not exist * refactor: use exponential-backoff * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * Initial commit when init a new git. * fix: cleanup * Refactor test setup and cleanup to separate file Moved Before and After hooks from application.ts to a new cleanup.ts file for better organization and separation of concerns. Also removed unused imports and related code from application.ts. Minor type simplification in agent.ts for row parsing. * test: modify and rename * feat: enableFileSystemWatch * refactor: unused utils.ts * Update watch-filesystem-adaptor.ts * refactor: use node-sentinel-file-watcher * refactor: extract to two classes * The logFor method lacks JSDoc describing the level parameter's * Update startNodeJSWiki.ts * fix: napi build * Update electron-rebuild command in workflows Changed the electron-rebuild command in release and test GitHub Actions workflows to use a comma-separated list for native modules instead of multiple -w flags. This simplifies the rebuild step for better-sqlite3 and nsfw modules. * lint * not build nsfw, try use prebuild * Update package.json * Update workerAdapter.ts * remove subWikiPlugin.ts as we use new filesystem adaptor that supports tag based sub wiki * fix: build * fix: wrong type * lint * remove `act(...)` warnings * uninstall chokidar * refactor and test * lint * remove unused logic, as we already use ipc syncadaptor, not afriad of wiki status change * Update translation.json * test: increast timeout in CI * Update application.ts * fix: AI's wrong cleanup logic hidden by as unknown as * fix: AI's wrong as unknown as * Update agent.feature * Update wikiSearchPlugin.ts * fix: A dynamic import callback was not specified.
218 lines
10 KiB
Gherkin
218 lines
10 KiB
Gherkin
Feature: OAuth Login Flow
|
|
As a user
|
|
I want to login via OAuth with PKCE using GitHub OAuth
|
|
So that I can securely authenticate and sync my wiki
|
|
|
|
Background:
|
|
Given I launch the TidGi application
|
|
And I wait for the page to load completely
|
|
And I should see a "page body" element with selector "body"
|
|
|
|
@oauth
|
|
Scenario: Login with Custom OAuth Server using PKCE
|
|
# Step 1: Start Mock OAuth Server
|
|
When I start Mock OAuth Server on port 8888
|
|
|
|
# Step 2: Open preferences window
|
|
When I click on a "settings button" element with selector "#open-preferences-button"
|
|
When I switch to "preferences" window
|
|
|
|
# Step 2: Navigate to Sync section
|
|
When I click on a "sync section" element with selector "[data-testid='preference-section-sync']"
|
|
|
|
# Step 3: Click Custom Server tab
|
|
When I click on a "custom server tab" element with selector "[data-testid='custom-server-tab']"
|
|
|
|
# Step 4: Verify Custom Server form is visible
|
|
Then I should see "server url input and client id input" elements with selectors:
|
|
| [data-testid='custom-server-url-input'] |
|
|
| [data-testid='custom-client-id-input'] |
|
|
|
|
# Step 5: Trigger OAuth login
|
|
# Note: oauth2-mock-server automatically redirects without showing login UI
|
|
# This tests the token exchange logic which is the most critical part
|
|
When I click on a "login button" element with selector "[data-testid='custom-oauth-login-button']"
|
|
And I wait for 3 seconds
|
|
|
|
# Step 6: After OAuth completes, page reloads and defaults to GitHub tab
|
|
# Need to click Custom Server tab again to see the filled token
|
|
When I click on a "custom server tab" element with selector "[data-testid='custom-server-tab']"
|
|
|
|
# Step 7: The token should be filled in the form after OAuth completes
|
|
Then I should see a "token input with non-empty value" element with selector "[data-testid='custom-token-input'] input:not([value=''])"
|
|
|
|
# Step 8: Verify logout button appears
|
|
Then I should see a "logout button" element with selector "[data-testid='custom-oauth-logout-button']"
|
|
|
|
# Step 9: Close preferences window
|
|
When I close "preferences" window
|
|
|
|
# Cleanup
|
|
And I stop Mock OAuth Server
|
|
|
|
# For Github login debugging. Need human to fill in the real password of an one-time test account.
|
|
# @oauth @github @real @manual
|
|
# Scenario: Login with Real GitHub OAuth
|
|
# # NOTE: This test requires GITHUB_CLIENT_SECRET environment variable to be set
|
|
# # GitHub OAuth Apps don't support PKCE and require client_secret
|
|
# # Step 1: Open preferences window
|
|
# When I click on a "settings button" element with selector "#open-preferences-button"
|
|
# And I wait for 1 seconds
|
|
# When I switch to "preferences" window
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 2: Navigate to Sync section
|
|
# When I click on a "sync section" element with selector "[data-testid='preference-section-sync']"
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 3: Click GitHub login button (this will open a new OAuth window)
|
|
# When I click on a "GitHub login button" element with selector "[data-testid='github-login-button']"
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 4: Switch to the OAuth popup window
|
|
# When I switch to the newest window
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 5: Fill in GitHub credentials in the OAuth popup
|
|
# # GitHub's login page uses 'login' and 'password' as field names
|
|
# When I type "tiddlygit@gmail.com" in "GitHub email input" element with selector "input[name='login']"
|
|
# And I wait for 0.5 seconds
|
|
# When I type "PASSWORD HERE" in "GitHub password input" element with selector "input[name='password']"
|
|
# And I wait for 0.5 seconds
|
|
# When I click on a "GitHub sign in button" element with selector "input[type='submit'][name='commit']"
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 6: Click Authorize button on the OAuth authorization page
|
|
# # GitHub App requires user to authorize access to their account
|
|
# # The button is usually green and says "Authorize [AppName]"
|
|
# # When I click on a "GitHub authorize button" element with selector "button[type='submit'].btn-primary, button[id*='authorize'], button.js-oauth-authorize-btn"
|
|
# # And I wait for 3 seconds
|
|
|
|
# # Step 7: Switch back to preferences window
|
|
# # The OAuth window should close automatically after authorization
|
|
# When I switch to "preferences" window
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 7: Verify token is filled in the form with actual value
|
|
# Then I should see a "GitHub token field with value" element with selector "[data-testid='github-token-input'] input:not([value=''])"
|
|
|
|
# # Step 8: Verify user info is populated with actual value
|
|
# Then I should see a "GitHub username field with value" element with selector "[data-testid='github-userName-input'] input:not([value=''])"
|
|
|
|
# # Step 9: Close preferences window
|
|
# When I close "preferences" window
|
|
|
|
|
|
# @oauth @codeberg @real @manual
|
|
# Scenario: Login with Real Codeberg OAuth
|
|
# # Step 1: Open preferences window
|
|
# When I click on a "settings button" element with selector "#open-preferences-button"
|
|
# And I wait for 1 seconds
|
|
# When I switch to "preferences" window
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 2: Navigate to Sync section
|
|
# When I click on a "sync section" element with selector "[data-testid='preference-section-sync']"
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 3: Click Codeberg tab
|
|
# When I click on a "Codeberg tab" element with selector "[data-testid='codeberg-tab']"
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 4: Click Codeberg login button (this will open a new OAuth window)
|
|
# When I click on a "Codeberg login button" element with selector "[data-testid='codeberg-login-button']"
|
|
# And I wait for 2 seconds
|
|
|
|
# # Step 4: Switch to the OAuth popup window
|
|
# When I switch to the newest window
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 5: Fill in Codeberg credentials in the OAuth popup
|
|
# # Codeberg uses id-based selectors
|
|
# When I type "USERNAME HERE" in "Codeberg email input" element with selector "#user_name"
|
|
# When I type "TEMPORARY pswd" in "Codeberg password input" element with selector "#password"
|
|
# When I click on a "Codeberg sign in button" element with selector "button.ui.primary.button.tw-w-full"
|
|
# And I wait for 2 seconds
|
|
|
|
# # Step 6: Authorize the application (Codeberg requires authorization every time)
|
|
# # The authorization page has two buttons:
|
|
# # - Red "Authorize Application" button (id="authorize-app", name="granted" value="true")
|
|
# # - Gray "Cancel" button (name="granted" value="false")
|
|
# # We need to click the red one
|
|
# When I click on a "authorize button" element with selector "#authorize-app"
|
|
# And I wait for 2 seconds
|
|
|
|
# # Step 7: After OAuth completes, switch back to preferences window
|
|
# When I switch to "preferences" window
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 8: Switch to Codeberg tab to verify the filled token
|
|
# When I click on a "codeberg tab" element with selector "[data-testid='codeberg-tab']"
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 9: Verify token is filled in the form with actual value
|
|
# Then I should see a "Codeberg token field with value" element with selector "[data-testid='codeberg-token-input'] input:not([value=''])"
|
|
|
|
# # Step 10: Verify user info is populated with actual value
|
|
# Then I should see a "Codeberg username field with value" element with selector "[data-testid='codeberg-userName-input'] input:not([value=''])"
|
|
|
|
# # Step 11: Close preferences window
|
|
# When I close "preferences" window
|
|
|
|
# @oauth @gitea @real @manual
|
|
# Scenario: Login with Real Gitea OAuth
|
|
# # NOTE: This test uses real Gitea.com OAuth with test credentials
|
|
# # Gitea supports OAuth Apps with PKCE
|
|
|
|
# # Step 1: Open preferences window
|
|
# When I click on a "settings button" element with selector "#open-preferences-button"
|
|
# And I wait for 1 seconds
|
|
# When I switch to "preferences" window
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 2: Navigate to Sync section
|
|
# When I click on a "sync section" element with selector "[data-testid='preference-section-sync']"
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 3: Click Gitea tab
|
|
# When I click on a "Gitea tab" element with selector "[data-testid='gitea-tab']"
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 4: Click Gitea login button (this will open a new OAuth window)
|
|
# When I click on a "Gitea login button" element with selector "[data-testid='gitea-login-button']"
|
|
# And I wait for 2 seconds
|
|
|
|
# # Step 5: Switch to the OAuth popup window
|
|
# When I switch to the newest window
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 6: Fill in Gitea credentials in the OAuth popup
|
|
# # Gitea uses similar id-based selectors as Codeberg
|
|
# When I type "USERNAME HERE" in "Gitea username input" element with selector "#user_name"
|
|
# When I type "TEMPORARY pswd" in "Gitea password input" element with selector "#password"
|
|
# When I click on a "Gitea sign in button" element with selector "button.ui.primary.button.tw-w-full"
|
|
# And I wait for 2 seconds
|
|
|
|
# # Step 7: Authorize the application (Gitea requires authorization every time like Codeberg)
|
|
# # The authorization page has two buttons similar to Codeberg:
|
|
# # - Red "Authorize Application" button (id="authorize-app")
|
|
# # - Gray "Cancel" button
|
|
# # When I click on a "authorize button" element with selector "#authorize-app"
|
|
# # And I wait for 2 seconds
|
|
|
|
# # Step 8: After OAuth completes, switch back to preferences window
|
|
# When I switch to "preferences" window
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 9: Switch to Gitea tab to verify the filled token
|
|
# When I click on a "gitea tab" element with selector "[data-testid='gitea-tab']"
|
|
# And I wait for 1 seconds
|
|
|
|
# # Step 10: Verify token is filled in the form with actual value
|
|
# Then I should see a "Gitea token field with value" element with selector "[data-testid='gitea-token-input'] input:not([value=''])"
|
|
|
|
# # Step 11: Verify user info is populated with actual value
|
|
# Then I should see a "Gitea username field with value" element with selector "[data-testid='gitea-userName-input'] input:not([value=''])"
|
|
|
|
# # Step 12: Close preferences window
|
|
# When I close "preferences" window
|