Add unit tests for role middleware
Some checks are pending
Docker Test / test (push) Waiting to run

This commit is contained in:
BibaBot 2026-03-17 07:07:36 +00:00
parent 7a9bf3199a
commit c294e2e9ae
5702 changed files with 465039 additions and 34 deletions

14
backend/jest.config.js Normal file
View file

@ -0,0 +1,14 @@
export default {
testEnvironment: 'node',
transform: {
'^.+\\.js$': 'babel-jest'
},
testMatch: [
'**/tests/**/*.test.js',
'**/__tests__/**/*.js'
],
moduleNameMapper: {
'^src/(.*)$': '<rootDir>/src/$1',
'^backend/(.*)$': '<rootDir>/$1'
}
};

7803
backend/package-lock.json generated

File diff suppressed because it is too large Load diff

View file

@ -5,7 +5,7 @@
"description": "",
"main": "index.js",
"scripts": {
"test": "npm run test:smoke",
"test": "jest",
"start": "node src/server.js",
"dev": "node --watch src/server.js",
"db:init": "node src/db/init.js",
@ -31,7 +31,12 @@
"zod": "^4.3.6"
},
"devDependencies": {
"@babel/core": "^7.29.0",
"@babel/preset-env": "^7.29.2",
"@playwright/test": "^1.58.2",
"playwright": "^1.58.2"
"babel-jest": "^30.3.0",
"jest": "^29.5.0",
"playwright": "^1.58.2",
"supertest": "^6.3.3"
}
}

View file

@ -1,25 +1,82 @@
const request = require('supertest');
const app = require('../app.js');
const app = require('../app');
describe('Role-based Access Control', () => {
describe('User Role', () => {
test('should allow user to access user-specific endpoints', async () => {
// This is a placeholder test - actual implementation would need JWT setup
expect(true).toBe(true);
});
describe('Role Middleware', () => {
// Mock a user with a specific role for testing
const mockUserWithRole = (role) => {
return {
role: role,
id: 'test-user-id'
};
};
// Test that the middleware allows access to users with correct roles
test('should allow access to users with correct roles', () => {
const req = {
user: mockUserWithRole('admin')
};
const res = {
status: jest.fn().mockReturnThis(),
json: jest.fn()
};
const next = jest.fn();
const middleware = require('../middleware/role.middleware');
middleware.requireRole(['admin'])(req, res, next);
expect(next).toHaveBeenCalled();
});
describe('Moderator Role', () => {
test('should allow moderator to access moderation endpoints', async () => {
// This is a placeholder test - actual implementation would need JWT setup
expect(true).toBe(true);
});
// Test that the middleware denies access to users with incorrect roles
test('should deny access to users with incorrect roles', () => {
const req = {
user: mockUserWithRole('user')
};
const res = {
status: jest.fn().mockReturnThis(),
json: jest.fn()
};
const next = jest.fn();
const middleware = require('../middleware/role.middleware');
middleware.requireRole(['admin'])(req, res, next);
expect(res.status).toHaveBeenCalledWith(403);
expect(res.json).toHaveBeenCalledWith({ error: 'Forbidden' });
});
describe('Admin Role', () => {
test('should allow admin to access admin endpoints', async () => {
// This is a placeholder test - actual implementation would need JWT setup
expect(true).toBe(true);
});
// Test that the middleware denies access to users without roles
test('should deny access to users without roles', () => {
const req = {
user: null
};
const res = {
status: jest.fn().mockReturnThis(),
json: jest.fn()
};
const next = jest.fn();
const middleware = require('../middleware/role.middleware');
middleware.requireRole(['admin'])(req, res, next);
expect(res.status).toHaveBeenCalledWith(401);
expect(res.json).toHaveBeenCalledWith({ error: 'Unauthorized' });
});
// Test that the middleware allows access to users with one of multiple required roles
test('should allow access to users with one of multiple required roles', () => {
const req = {
user: mockUserWithRole('moderator')
};
const res = {
status: jest.fn().mockReturnThis(),
json: jest.fn()
};
const next = jest.fn();
const middleware = require('../middleware/role.middleware');
middleware.requireRole(['admin', 'moderator'])(req, res, next);
expect(next).toHaveBeenCalled();
});
});