mirror of
https://github.com/n8n-io/n8n.git
synced 2024-11-15 17:14:05 -08:00
5156313074
Some checks are pending
Test Master / install-and-build (push) Waiting to run
Test Master / Unit tests (18.x) (push) Blocked by required conditions
Test Master / Unit tests (20.x) (push) Blocked by required conditions
Test Master / Unit tests (22.4) (push) Blocked by required conditions
Test Master / Lint (push) Blocked by required conditions
Test Master / Notify Slack on failure (push) Blocked by required conditions
Benchmark Docker Image CI / build (push) Waiting to run
186 lines
6.8 KiB
TypeScript
186 lines
6.8 KiB
TypeScript
import { mock } from 'jest-mock-extended';
|
|
import Container from 'typedi';
|
|
|
|
import { CredentialsEntity } from '@/databases/entities/credentials-entity';
|
|
import { CredentialsRepository } from '@/databases/repositories/credentials.repository';
|
|
import { SharedWorkflowRepository } from '@/databases/repositories/shared-workflow.repository';
|
|
import { WorkflowRepository } from '@/databases/repositories/workflow.repository';
|
|
import { Telemetry } from '@/telemetry';
|
|
import { EnterpriseWorkflowService } from '@/workflows/workflow.service.ee';
|
|
|
|
import { mockInstance } from '../../shared/mocking';
|
|
import * as testDb from '../shared/test-db';
|
|
import {
|
|
FIRST_CREDENTIAL_ID,
|
|
SECOND_CREDENTIAL_ID,
|
|
THIRD_CREDENTIAL_ID,
|
|
getWorkflow,
|
|
} from '../shared/workflow';
|
|
|
|
describe('EnterpriseWorkflowService', () => {
|
|
let service: EnterpriseWorkflowService;
|
|
|
|
beforeAll(async () => {
|
|
await testDb.init();
|
|
mockInstance(Telemetry);
|
|
|
|
service = new EnterpriseWorkflowService(
|
|
mock(),
|
|
Container.get(SharedWorkflowRepository),
|
|
Container.get(WorkflowRepository),
|
|
Container.get(CredentialsRepository),
|
|
mock(),
|
|
mock(),
|
|
mock(),
|
|
mock(),
|
|
);
|
|
});
|
|
|
|
afterEach(async () => {
|
|
await testDb.truncate(['Workflow']);
|
|
jest.restoreAllMocks();
|
|
});
|
|
|
|
afterAll(async () => {
|
|
await testDb.terminate();
|
|
});
|
|
|
|
describe('validateWorkflowCredentialUsage', () => {
|
|
function generateCredentialEntity(credentialId: string) {
|
|
const credentialEntity = new CredentialsEntity();
|
|
credentialEntity.id = credentialId;
|
|
return credentialEntity;
|
|
}
|
|
|
|
it('Should throw error saving a workflow using credential without access', () => {
|
|
const newWorkflowVersion = getWorkflow({ addNodeWithOneCred: true });
|
|
const previousWorkflowVersion = getWorkflow();
|
|
expect(() => {
|
|
service.validateWorkflowCredentialUsage(newWorkflowVersion, previousWorkflowVersion, []);
|
|
}).toThrow();
|
|
});
|
|
|
|
it('Should not throw error when saving a workflow using credential with access', () => {
|
|
const newWorkflowVersion = getWorkflow({ addNodeWithOneCred: true });
|
|
const previousWorkflowVersion = getWorkflow();
|
|
expect(() => {
|
|
service.validateWorkflowCredentialUsage(newWorkflowVersion, previousWorkflowVersion, [
|
|
generateCredentialEntity('1'),
|
|
]);
|
|
}).not.toThrow();
|
|
});
|
|
|
|
it('Should not throw error when saving a workflow removing node without credential access', () => {
|
|
const newWorkflowVersion = getWorkflow();
|
|
const previousWorkflowVersion = getWorkflow({ addNodeWithOneCred: true });
|
|
expect(() => {
|
|
service.validateWorkflowCredentialUsage(newWorkflowVersion, previousWorkflowVersion, [
|
|
generateCredentialEntity('1'),
|
|
]);
|
|
}).not.toThrow();
|
|
});
|
|
|
|
it('Should save fine when not making changes to workflow without access', () => {
|
|
const workflowWithOneCredential = getWorkflow({ addNodeWithOneCred: true });
|
|
expect(() => {
|
|
service.validateWorkflowCredentialUsage(
|
|
workflowWithOneCredential,
|
|
workflowWithOneCredential,
|
|
[],
|
|
);
|
|
}).not.toThrow();
|
|
});
|
|
|
|
it('Should throw error saving a workflow adding node without credential access', () => {
|
|
const newWorkflowVersion = getWorkflow({
|
|
addNodeWithOneCred: true,
|
|
addNodeWithTwoCreds: true,
|
|
});
|
|
const previousWorkflowVersion = getWorkflow({ addNodeWithOneCred: true });
|
|
expect(() => {
|
|
service.validateWorkflowCredentialUsage(newWorkflowVersion, previousWorkflowVersion, []);
|
|
}).toThrow();
|
|
});
|
|
});
|
|
|
|
describe('getNodesWithInaccessibleCreds', () => {
|
|
test('Should return an empty list for a workflow without nodes', () => {
|
|
const workflow = getWorkflow();
|
|
const nodesWithInaccessibleCreds = service.getNodesWithInaccessibleCreds(workflow, []);
|
|
expect(nodesWithInaccessibleCreds).toHaveLength(0);
|
|
});
|
|
|
|
test('Should return an empty list for a workflow with nodes without credentials', () => {
|
|
const workflow = getWorkflow({ addNodeWithoutCreds: true });
|
|
const nodesWithInaccessibleCreds = service.getNodesWithInaccessibleCreds(workflow, []);
|
|
expect(nodesWithInaccessibleCreds).toHaveLength(0);
|
|
});
|
|
|
|
test('Should return an element for a node with a credential without access', () => {
|
|
const workflow = getWorkflow({ addNodeWithOneCred: true });
|
|
const nodesWithInaccessibleCreds = service.getNodesWithInaccessibleCreds(workflow, []);
|
|
expect(nodesWithInaccessibleCreds).toHaveLength(1);
|
|
});
|
|
|
|
test('Should return an empty list for a node with a credential with access', () => {
|
|
const workflow = getWorkflow({ addNodeWithOneCred: true });
|
|
const nodesWithInaccessibleCreds = service.getNodesWithInaccessibleCreds(workflow, [
|
|
FIRST_CREDENTIAL_ID,
|
|
]);
|
|
expect(nodesWithInaccessibleCreds).toHaveLength(0);
|
|
});
|
|
|
|
test('Should return an element for a node with two credentials and mixed access', () => {
|
|
const workflow = getWorkflow({ addNodeWithTwoCreds: true });
|
|
const nodesWithInaccessibleCreds = service.getNodesWithInaccessibleCreds(workflow, [
|
|
SECOND_CREDENTIAL_ID,
|
|
]);
|
|
expect(nodesWithInaccessibleCreds).toHaveLength(1);
|
|
});
|
|
|
|
test('Should return one node for a workflow with two nodes and two credentials', () => {
|
|
const workflow = getWorkflow({ addNodeWithOneCred: true, addNodeWithTwoCreds: true });
|
|
const nodesWithInaccessibleCreds = service.getNodesWithInaccessibleCreds(workflow, [
|
|
SECOND_CREDENTIAL_ID,
|
|
THIRD_CREDENTIAL_ID,
|
|
]);
|
|
expect(nodesWithInaccessibleCreds).toHaveLength(1);
|
|
});
|
|
|
|
test('Should return one element for a workflows with two nodes and one credential', () => {
|
|
const workflow = getWorkflow({
|
|
addNodeWithoutCreds: true,
|
|
addNodeWithOneCred: true,
|
|
addNodeWithTwoCreds: true,
|
|
});
|
|
const nodesWithInaccessibleCreds = service.getNodesWithInaccessibleCreds(workflow, [
|
|
FIRST_CREDENTIAL_ID,
|
|
]);
|
|
expect(nodesWithInaccessibleCreds).toHaveLength(1);
|
|
});
|
|
|
|
test('Should return one element for a workflows with two nodes and partial credential access', () => {
|
|
const workflow = getWorkflow({ addNodeWithOneCred: true, addNodeWithTwoCreds: true });
|
|
const nodesWithInaccessibleCreds = service.getNodesWithInaccessibleCreds(workflow, [
|
|
FIRST_CREDENTIAL_ID,
|
|
SECOND_CREDENTIAL_ID,
|
|
]);
|
|
expect(nodesWithInaccessibleCreds).toHaveLength(1);
|
|
});
|
|
|
|
test('Should return two elements for a workflows with two nodes and partial credential access', () => {
|
|
const workflow = getWorkflow({ addNodeWithOneCred: true, addNodeWithTwoCreds: true });
|
|
const nodesWithInaccessibleCreds = service.getNodesWithInaccessibleCreds(workflow, [
|
|
SECOND_CREDENTIAL_ID,
|
|
]);
|
|
expect(nodesWithInaccessibleCreds).toHaveLength(2);
|
|
});
|
|
|
|
test('Should return two elements for a workflows with two nodes and no credential access', () => {
|
|
const workflow = getWorkflow({ addNodeWithOneCred: true, addNodeWithTwoCreds: true });
|
|
const nodesWithInaccessibleCreds = service.getNodesWithInaccessibleCreds(workflow, []);
|
|
expect(nodesWithInaccessibleCreds).toHaveLength(2);
|
|
});
|
|
});
|
|
});
|