Files
hexabot/api/src/user/controllers/user.controller.spec.ts
2025-01-09 10:44:32 +01:00

379 lines
13 KiB
TypeScript

/*
* Copyright © 2024 Hexastack. All rights reserved.
*
* Licensed under the GNU Affero General Public License v3.0 (AGPLv3) with the following additional terms:
* 1. The name "Hexabot" is a trademark of Hexastack. You may not use this name in derivative works without express written permission.
* 2. All derivative works must include clear attribution to the original creator and software, Hexastack and Hexabot, in a prominent location (e.g., in the software's "About" section, documentation, and README file).
*/
import { CACHE_MANAGER } from '@nestjs/cache-manager';
import { ForbiddenException, NotFoundException } from '@nestjs/common';
import { EventEmitter2 } from '@nestjs/event-emitter';
import { JwtModule, JwtService } from '@nestjs/jwt';
import { MongooseModule } from '@nestjs/mongoose';
import { Test, TestingModule } from '@nestjs/testing';
import { ISendMailOptions, MailerService } from '@nestjs-modules/mailer';
import { Session as ExpressSession } from 'express-session';
import { SentMessageInfo } from 'nodemailer';
import { AttachmentRepository } from '@/attachment/repositories/attachment.repository';
import { AttachmentModel } from '@/attachment/schemas/attachment.schema';
import { AttachmentService } from '@/attachment/services/attachment.service';
import { LanguageRepository } from '@/i18n/repositories/language.repository';
import { LanguageModel } from '@/i18n/schemas/language.schema';
import { I18nService } from '@/i18n/services/i18n.service';
import { LanguageService } from '@/i18n/services/language.service';
import { LoggerService } from '@/logger/logger.service';
import { IGNORED_TEST_FIELDS } from '@/utils/test/constants';
import { installLanguageFixtures } from '@/utils/test/fixtures/language';
import { installPermissionFixtures } from '@/utils/test/fixtures/permission';
import { getUserFixtures, userFixtures } from '@/utils/test/fixtures/user';
import { getPageQuery } from '@/utils/test/pagination';
import {
closeInMongodConnection,
rootMongooseTestModule,
} from '@/utils/test/test';
import { InvitationCreateDto } from '../dto/invitation.dto';
import {
UserCreateDto,
UserEditProfileDto,
UserUpdateStateAndRolesDto,
} from '../dto/user.dto';
import { InvitationRepository } from '../repositories/invitation.repository';
import { PermissionRepository } from '../repositories/permission.repository';
import { RoleRepository } from '../repositories/role.repository';
import { UserRepository } from '../repositories/user.repository';
import { InvitationModel } from '../schemas/invitation.schema';
import { PermissionModel } from '../schemas/permission.schema';
import { Role, RoleModel } from '../schemas/role.schema';
import { User, UserFull, UserModel } from '../schemas/user.schema';
import { PasswordResetService } from '../services/passwordReset.service';
import { PermissionService } from '../services/permission.service';
import { RoleService } from '../services/role.service';
import { UserService } from '../services/user.service';
import { ValidateAccountService } from '../services/validate-account.service';
import { InvitationService } from './../services/invitation.service';
import { ReadWriteUserController } from './user.controller';
describe('UserController', () => {
let userController: ReadWriteUserController;
let userService: UserService;
let roleService: RoleService;
let invitationService: InvitationService;
let notFoundId: string;
let role: Role | null;
let roles: Role[];
let user: User | null;
let passwordResetService: PasswordResetService;
let jwtService: JwtService;
beforeAll(async () => {
const module: TestingModule = await Test.createTestingModule({
controllers: [ReadWriteUserController],
imports: [
rootMongooseTestModule(async () => {
await installLanguageFixtures();
await installPermissionFixtures();
}),
MongooseModule.forFeature([
UserModel,
RoleModel,
PermissionModel,
InvitationModel,
AttachmentModel,
LanguageModel,
]),
JwtModule,
],
providers: [
LoggerService,
RoleService,
UserService,
InvitationService,
PasswordResetService,
PermissionService,
{
provide: MailerService,
useValue: {
sendMail(_options: ISendMailOptions): Promise<SentMessageInfo> {
return Promise.resolve('Mail sent successfully');
},
},
},
UserRepository,
RoleRepository,
PermissionRepository,
InvitationRepository,
EventEmitter2,
{
provide: CACHE_MANAGER,
useValue: {
del: jest.fn(),
get: jest.fn(),
set: jest.fn(),
},
},
AttachmentService,
AttachmentRepository,
LanguageService,
LanguageRepository,
ValidateAccountService,
{
provide: I18nService,
useValue: {
t: jest.fn().mockImplementation((t) => t),
},
},
],
}).compile();
userController = module.get<ReadWriteUserController>(
ReadWriteUserController,
);
userService = module.get<UserService>(UserService);
roleService = module.get<RoleService>(RoleService);
invitationService = module.get<InvitationService>(InvitationService);
role = await roleService.findOne({ name: 'admin' });
roles = await roleService.findAll();
user = await userService.findOne({ username: 'admin' });
jwtService = module.get<JwtService>(JwtService);
passwordResetService =
module.get<PasswordResetService>(PasswordResetService);
});
const IGNORED_FIELDS = [...IGNORED_TEST_FIELDS, 'resetToken'];
afterAll(closeInMongodConnection);
afterEach(jest.clearAllMocks);
describe('count', () => {
it('should count users', async () => {
const result = await userController.filterCount();
expect(result).toEqual({ count: userFixtures.length });
});
});
describe('findOne', () => {
it('should find one user and populate its roles', async () => {
jest.spyOn(userService, 'findOneAndPopulate');
const result = await userController.findOne(user!.id, ['roles']);
expect(userService.findOneAndPopulate).toHaveBeenCalledWith(user!.id);
expect(result).toEqualPayload(
{
...userFixtures.find(({ username }) => username === 'admin'),
roles: roles.filter(({ id }) => user!.roles.includes(id)),
},
[...IGNORED_FIELDS, 'password', 'provider'],
);
});
});
describe('findAll', () => {
const pageQuery = getPageQuery<User>({ sort: ['_id', 'asc'] });
it('should find users, and for each user populate the corresponding roles', async () => {
jest.spyOn(userService, 'findPageAndPopulate');
const result = await userService.findPageAndPopulate({}, pageQuery);
const usersWithRoles = userFixtures.reduce(
(acc, currUser) => {
acc.push({
...currUser,
roles: roles.filter(({ id }) => user?.roles?.includes(id)),
avatar: null,
});
return acc;
},
[] as Omit<UserFull, 'id' | 'createdAt' | 'updatedAt'>[],
);
expect(userService.findPageAndPopulate).toHaveBeenCalledWith(
{},
pageQuery,
);
expect(result).toEqualPayload(usersWithRoles, [
...IGNORED_FIELDS,
'password',
'provider',
]);
});
});
describe('create', () => {
it('should return created user', async () => {
jest.spyOn(userService, 'create');
const userDto: UserCreateDto = {
username: 'testUser',
first_name: 'testUser',
last_name: 'testUser',
email: 'test@test.test',
password: 'test',
roles: [role!.id],
avatar: null,
};
const result = await userController.create(userDto);
expect(userService.create).toHaveBeenCalledWith(userDto);
expect(result).toEqualPayload(getUserFixtures([userDto])[0], [
...IGNORED_FIELDS,
'password',
'provider',
]);
});
});
describe('updateOne', () => {
const updateDto: UserEditProfileDto = {
first_name: 'updated firstName',
};
it('should return updated user', async () => {
jest.spyOn(userService, 'updateOne');
const result = await userController.updateOne(
{ user: { id: user!.id } } as any,
user!.id,
updateDto,
);
expect(userService.updateOne).toHaveBeenCalledWith(user!.id, updateDto);
expect(result).toEqualPayload(
{
...userFixtures.find(({ username }) => username === 'admin'),
...updateDto,
roles: user!.roles,
},
[...IGNORED_FIELDS, 'password', 'provider'],
);
});
});
describe('updateStateAndRoles', () => {
it('should return updated user', async () => {
const updateDto: UserUpdateStateAndRolesDto = {
roles: [role!.id],
};
jest.spyOn(userService, 'updateOne');
const result = await userController.updateStateAndRoles(
user!.id,
updateDto,
{
passport: {
user: { id: user!.id },
},
} as ExpressSession,
);
expect(userService.updateOne).toHaveBeenCalledWith(user!.id, updateDto);
expect(result).toEqualPayload(
{
...userFixtures.find(({ username }) => username === 'admin'),
...updateDto,
},
[...IGNORED_FIELDS, 'first_name', 'password', 'provider'],
);
});
it('should return updated user after adding an extra role', async () => {
const updateDto: UserUpdateStateAndRolesDto = {
roles: [role!.id, roles[1].id],
};
jest.spyOn(userService, 'updateOne');
const result = await userController.updateStateAndRoles(
user!.id,
updateDto,
{
passport: {
user: { id: user!.id },
},
} as ExpressSession,
);
expect(userService.updateOne).toHaveBeenCalledWith(user!.id, updateDto);
expect(result).toEqualPayload(
{
...userFixtures.find(({ username }) => username === 'admin'),
...updateDto,
},
[...IGNORED_FIELDS, 'first_name', 'password', 'provider'],
);
});
it('should throw a ForbiddenException when an admin try to disable his state', async () => {
const updateDto: UserUpdateStateAndRolesDto = {
state: false,
};
await expect(
userController.updateStateAndRoles(user!.id, updateDto, {
passport: {
user: { id: user!.id },
},
} as ExpressSession),
).rejects.toThrow(ForbiddenException);
});
it('should throw a ForbiddenException when an admin try to remove the his admin privileges', async () => {
const updateDto: UserUpdateStateAndRolesDto = {
roles: [],
};
await expect(
userController.updateStateAndRoles(user!.id, updateDto, {
passport: {
user: { id: user!.id },
},
} as ExpressSession),
).rejects.toThrow(ForbiddenException);
});
});
describe('passwordReset', () => {
it('should request a password reset', async () => {
const body = {
email: 'admin@admin.admin',
};
await expect(userController.requestReset(body)).resolves.toBeUndefined();
});
it('should reset password', async () => {
const body = { password: 'newPassword' };
const token = await jwtService.sign(
{ email: 'admin@admin.admin' },
passwordResetService.jwtSignOptions,
);
const spy = jest.spyOn(passwordResetService, 'sign');
spy.mockResolvedValue(token);
await userController.requestReset({ email: 'admin@admin.admin' });
await expect(userController.reset(body, token)).resolves.toBeUndefined();
});
});
describe('deleteOne', () => {
it('should delete user by id', async () => {
const result = await userController.deleteOne(user!.id);
notFoundId = user!.id;
expect(result).toEqual({
acknowledged: true,
deletedCount: 1,
});
});
it('should throw a NotFoundException when attempting to delete user by id', async () => {
await expect(userController.deleteOne(notFoundId)).rejects.toThrow(
NotFoundException,
);
});
});
describe('invite', () => {
const keysToIgnore = ['token', ...IGNORED_FIELDS];
it('should create a valid user with a hashed token', async () => {
const invitation: InvitationCreateDto = {
email: 'email@email.com',
roles: ['507f1f77bcf86cd799439011'],
};
jest.spyOn(invitationService, 'create');
const result = await userController.invite(invitation);
expect(invitationService.create).toHaveBeenCalledWith(invitation);
expect(result).toEqualPayload(invitation, keysToIgnore);
});
});
});