mirror of
https://github.com/n8n-io/n8n.git
synced 2024-12-27 13:39:44 -08:00
107 lines
3.9 KiB
TypeScript
107 lines
3.9 KiB
TypeScript
import type { CookieOptions, Response } from 'express';
|
|
import { anyObject, captor, mock } from 'jest-mock-extended';
|
|
import jwt from 'jsonwebtoken';
|
|
import type { User } from '@db/entities/User';
|
|
import type { SettingsRepository } from '@db/repositories/settings.repository';
|
|
import config from '@/config';
|
|
import type { OwnerRequest } from '@/requests';
|
|
import { OwnerController } from '@/controllers/owner.controller';
|
|
import { AUTH_COOKIE_NAME } from '@/constants';
|
|
import { UserService } from '@/services/user.service';
|
|
import { License } from '@/License';
|
|
|
|
import { mockInstance } from '../../shared/mocking';
|
|
import { badPasswords } from '../shared/testData';
|
|
import { BadRequestError } from '@/errors/response-errors/bad-request.error';
|
|
import { PasswordUtility } from '@/services/password.utility';
|
|
import Container from 'typedi';
|
|
import type { InternalHooks } from '@/InternalHooks';
|
|
import { UserRepository } from '@/databases/repositories/user.repository';
|
|
|
|
describe('OwnerController', () => {
|
|
const configGetSpy = jest.spyOn(config, 'getEnv');
|
|
const internalHooks = mock<InternalHooks>();
|
|
const userService = mockInstance(UserService);
|
|
const userRepository = mockInstance(UserRepository);
|
|
const settingsRepository = mock<SettingsRepository>();
|
|
mockInstance(License).isWithinUsersLimit.mockReturnValue(true);
|
|
const controller = new OwnerController(
|
|
mock(),
|
|
internalHooks,
|
|
settingsRepository,
|
|
userService,
|
|
Container.get(PasswordUtility),
|
|
mock(),
|
|
userRepository,
|
|
);
|
|
|
|
describe('setupOwner', () => {
|
|
it('should throw a BadRequestError if the instance owner is already setup', async () => {
|
|
configGetSpy.mockReturnValue(true);
|
|
await expect(controller.setupOwner(mock(), mock())).rejects.toThrowError(
|
|
new BadRequestError('Instance owner already setup'),
|
|
);
|
|
});
|
|
|
|
it('should throw a BadRequestError if the email is invalid', async () => {
|
|
configGetSpy.mockReturnValue(false);
|
|
const req = mock<OwnerRequest.Post>({ body: { email: 'invalid email' } });
|
|
await expect(controller.setupOwner(req, mock())).rejects.toThrowError(
|
|
new BadRequestError('Invalid email address'),
|
|
);
|
|
});
|
|
|
|
describe('should throw if the password is invalid', () => {
|
|
Object.entries(badPasswords).forEach(([password, errorMessage]) => {
|
|
it(password, async () => {
|
|
configGetSpy.mockReturnValue(false);
|
|
const req = mock<OwnerRequest.Post>({ body: { email: 'valid@email.com', password } });
|
|
await expect(controller.setupOwner(req, mock())).rejects.toThrowError(
|
|
new BadRequestError(errorMessage),
|
|
);
|
|
});
|
|
});
|
|
});
|
|
|
|
it('should throw a BadRequestError if firstName & lastName are missing ', async () => {
|
|
configGetSpy.mockReturnValue(false);
|
|
const req = mock<OwnerRequest.Post>({
|
|
body: { email: 'valid@email.com', password: 'NewPassword123', firstName: '', lastName: '' },
|
|
});
|
|
await expect(controller.setupOwner(req, mock())).rejects.toThrowError(
|
|
new BadRequestError('First and last names are mandatory'),
|
|
);
|
|
});
|
|
|
|
it('should setup the instance owner successfully', async () => {
|
|
const user = mock<User>({
|
|
id: 'userId',
|
|
role: 'global:owner',
|
|
authIdentities: [],
|
|
});
|
|
const req = mock<OwnerRequest.Post>({
|
|
body: {
|
|
email: 'valid@email.com',
|
|
password: 'NewPassword123',
|
|
firstName: 'Jane',
|
|
lastName: 'Doe',
|
|
},
|
|
user,
|
|
});
|
|
const res = mock<Response>();
|
|
configGetSpy.mockReturnValue(false);
|
|
userRepository.save.calledWith(anyObject()).mockResolvedValue(user);
|
|
jest.spyOn(jwt, 'sign').mockImplementation(() => 'signed-token');
|
|
|
|
await controller.setupOwner(req, res);
|
|
|
|
expect(userRepository.save).toHaveBeenCalledWith(user);
|
|
|
|
const cookieOptions = captor<CookieOptions>();
|
|
expect(res.cookie).toHaveBeenCalledWith(AUTH_COOKIE_NAME, 'signed-token', cookieOptions);
|
|
expect(cookieOptions.value.httpOnly).toBe(true);
|
|
expect(cookieOptions.value.sameSite).toBe('lax');
|
|
});
|
|
});
|
|
});
|