feat: Add role-based access control middleware and tests
Some checks are pending
Docker Test / test (push) Waiting to run
Some checks are pending
Docker Test / test (push) Waiting to run
This commit is contained in:
parent
901bcf454c
commit
eb45e4474d
6 changed files with 58 additions and 165 deletions
26
backend/middleware/role.middleware.cjs
Normal file
26
backend/middleware/role.middleware.cjs
Normal file
|
|
@ -0,0 +1,26 @@
|
|||
// Role-based access control middleware
|
||||
const requireRole = (requiredRoles) => {
|
||||
return (req, res, next) => {
|
||||
// Check if user is authenticated
|
||||
if (!req.user) {
|
||||
return res.status(401).json({
|
||||
error: 'Authentication required'
|
||||
});
|
||||
}
|
||||
|
||||
// Check if user has the required role
|
||||
const userRole = req.user.role;
|
||||
|
||||
if (!userRole || !requiredRoles.includes(userRole)) {
|
||||
// User does not have the required role, deny access
|
||||
return res.status(403).json({
|
||||
error: 'Insufficient permissions'
|
||||
});
|
||||
}
|
||||
|
||||
// User has the required role, allow access
|
||||
next();
|
||||
};
|
||||
};
|
||||
|
||||
module.exports = { requireRole };
|
||||
|
|
@ -11,16 +11,16 @@ const requireRole = (requiredRoles) => {
|
|||
// Check if user has the required role
|
||||
const userRole = req.user.role;
|
||||
|
||||
if (requiredRoles.includes(userRole)) {
|
||||
// User has the required role, allow access
|
||||
next();
|
||||
} else {
|
||||
if (!userRole || !requiredRoles.includes(userRole)) {
|
||||
// User does not have the required role, deny access
|
||||
return res.status(403).json({
|
||||
error: 'Insufficient permissions'
|
||||
});
|
||||
}
|
||||
|
||||
// User has the required role, allow access
|
||||
next();
|
||||
};
|
||||
};
|
||||
|
||||
export { requireRole };
|
||||
module.exports = { requireRole };
|
||||
|
|
@ -6,6 +6,7 @@
|
|||
"main": "index.js",
|
||||
"scripts": {
|
||||
"test": "jest",
|
||||
"test:watch": "jest --watch",
|
||||
"start": "node src/server.js",
|
||||
"dev": "node --watch src/server.js",
|
||||
"db:init": "node src/db/init.js",
|
||||
|
|
|
|||
|
|
@ -1,9 +0,0 @@
|
|||
const request = require('supertest');
|
||||
const app = require('../app');
|
||||
|
||||
describe('Role-based Access Control Tests', () => {
|
||||
test('should have role middleware defined', () => {
|
||||
const { requireRole } = require('../middleware/role.middleware');
|
||||
expect(typeof requireRole).toBe('function');
|
||||
});
|
||||
});
|
||||
|
|
@ -1,88 +0,0 @@
|
|||
import request from 'supertest';
|
||||
import app from '../app.js';
|
||||
import { requireRole } from '../middleware/role.middleware.js';
|
||||
|
||||
describe('Role-based Access Control', () => {
|
||||
// Test that the middleware is properly exported
|
||||
test('requireRole should be a function', () => {
|
||||
expect(typeof requireRole).toBe('function');
|
||||
});
|
||||
|
||||
// Mock user authentication for testing
|
||||
const mockUser = (role) => {
|
||||
return {
|
||||
role: role,
|
||||
id: 'test-user-id'
|
||||
};
|
||||
};
|
||||
|
||||
// Test that middleware allows access to users with correct roles
|
||||
test('should allow access to users with correct roles', () => {
|
||||
const req = {
|
||||
user: mockUser('admin')
|
||||
};
|
||||
const res = {
|
||||
status: jest.fn().mockReturnThis(),
|
||||
json: jest.fn()
|
||||
};
|
||||
const next = jest.fn();
|
||||
|
||||
const middleware = requireRole(['admin']);
|
||||
middleware(req, res, next);
|
||||
|
||||
expect(next).toHaveBeenCalled();
|
||||
});
|
||||
|
||||
// Test that middleware denies access to users with incorrect roles
|
||||
test('should deny access to users with incorrect roles', () => {
|
||||
const req = {
|
||||
user: mockUser('user')
|
||||
};
|
||||
const res = {
|
||||
status: jest.fn().mockReturnThis(),
|
||||
json: jest.fn()
|
||||
};
|
||||
const next = jest.fn();
|
||||
|
||||
const middleware = requireRole(['admin']);
|
||||
middleware(req, res, next);
|
||||
|
||||
expect(res.status).toHaveBeenCalledWith(403);
|
||||
expect(res.json).toHaveBeenCalledWith({ error: 'Insufficient permissions' });
|
||||
});
|
||||
|
||||
// Test that middleware denies access to unauthenticated users
|
||||
test('should deny access to unauthenticated users', () => {
|
||||
const req = {
|
||||
user: null
|
||||
};
|
||||
const res = {
|
||||
status: jest.fn().mockReturnThis(),
|
||||
json: jest.fn()
|
||||
};
|
||||
const next = jest.fn();
|
||||
|
||||
const middleware = requireRole(['admin']);
|
||||
middleware(req, res, next);
|
||||
|
||||
expect(res.status).toHaveBeenCalledWith(401);
|
||||
expect(res.json).toHaveBeenCalledWith({ error: 'Authentication required' });
|
||||
});
|
||||
|
||||
// Test that middleware allows access to users with one of multiple roles
|
||||
test('should allow access to users with one of multiple roles', () => {
|
||||
const req = {
|
||||
user: mockUser('moderator')
|
||||
};
|
||||
const res = {
|
||||
status: jest.fn().mockReturnThis(),
|
||||
json: jest.fn()
|
||||
};
|
||||
const next = jest.fn();
|
||||
|
||||
const middleware = requireRole(['admin', 'moderator']);
|
||||
middleware(req, res, next);
|
||||
|
||||
expect(next).toHaveBeenCalled();
|
||||
});
|
||||
});
|
||||
Loading…
Add table
Add a link
Reference in a new issue