start unit testing #142
This commit is contained in:
@@ -7,6 +7,7 @@
|
|||||||
"build": "nuxt build --modern",
|
"build": "nuxt build --modern",
|
||||||
"start:inspect": "NODE_ENV=production node --inspect node_modules/.bin/nuxt start --modern",
|
"start:inspect": "NODE_ENV=production node --inspect node_modules/.bin/nuxt start --modern",
|
||||||
"dev": "nuxt dev",
|
"dev": "nuxt dev",
|
||||||
|
"test": "cd tests/seeds; jest; cd ../..",
|
||||||
"start": "nuxt start --modern",
|
"start": "nuxt start --modern",
|
||||||
"doc": "cd docs && bundle exec jekyll b",
|
"doc": "cd docs && bundle exec jekyll b",
|
||||||
"doc:dev": "cd docs && bundle exec jekyll s --drafts",
|
"doc:dev": "cd docs && bundle exec jekyll s --drafts",
|
||||||
@@ -73,6 +74,7 @@
|
|||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@nuxtjs/vuetify": "^1.12.3",
|
"@nuxtjs/vuetify": "^1.12.3",
|
||||||
|
"jest": "^27.5.1",
|
||||||
"less": "^4.1.1",
|
"less": "^4.1.1",
|
||||||
"less-loader": "^7",
|
"less-loader": "^7",
|
||||||
"prettier": "^2.3.0",
|
"prettier": "^2.3.0",
|
||||||
@@ -80,6 +82,7 @@
|
|||||||
"pug-plain-loader": "^1.1.0",
|
"pug-plain-loader": "^1.1.0",
|
||||||
"sass": "^1.49.4",
|
"sass": "^1.49.4",
|
||||||
"sequelize-cli": "^6.3.0",
|
"sequelize-cli": "^6.3.0",
|
||||||
|
"supertest": "^6.2.2",
|
||||||
"webpack": "4",
|
"webpack": "4",
|
||||||
"webpack-cli": "^4.7.2"
|
"webpack-cli": "^4.7.2"
|
||||||
},
|
},
|
||||||
|
|||||||
61
tests/.setup.js
Normal file
61
tests/.setup.js
Normal file
@@ -0,0 +1,61 @@
|
|||||||
|
// const request = require('supertest')
|
||||||
|
|
||||||
|
|
||||||
|
// // - setup ....
|
||||||
|
// // - event list should be empty
|
||||||
|
// // - try to write without auth
|
||||||
|
// // - registration should be not allowed when disabled
|
||||||
|
// // - registration should create a new user (not active) when enabled
|
||||||
|
// // - unconfirmed user cannot login
|
||||||
|
// // - should not login without auth data
|
||||||
|
// // - should login with correct authentication
|
||||||
|
// // -
|
||||||
|
|
||||||
|
// let admin = {}
|
||||||
|
// describe('Setup', () => {
|
||||||
|
// let app
|
||||||
|
// beforeAll( async () => {
|
||||||
|
// await require('../server/initialize.server.js')()
|
||||||
|
// app = require('../server/routes.js')
|
||||||
|
// return
|
||||||
|
// })
|
||||||
|
|
||||||
|
// test('should setup', async () => {
|
||||||
|
// let response = await request(app).post('/api/setup/db').send({ db: { dialect: 'sqlite', storage: './gancio.sqlite' } })
|
||||||
|
// expect(response.statusCode).toBe(200)
|
||||||
|
// response = await request(app).post('/api/setup/restart')
|
||||||
|
// expect(response.statusCode).toBe(200)
|
||||||
|
// expect(response.body.password).toBeDefined()
|
||||||
|
// expect(response.body.email).toBeDefined()
|
||||||
|
// admin.password = response.body.password
|
||||||
|
// admin.email = response.body.email
|
||||||
|
// })
|
||||||
|
|
||||||
|
// })
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
// // describe('POST /api/event', () => {
|
||||||
|
// // let app
|
||||||
|
// // beforeAll( async () => {
|
||||||
|
// // console.error('dentro il secondo describe di setup beforeAll')
|
||||||
|
// // app = requireUncached('../server/routes.js')
|
||||||
|
// // return
|
||||||
|
// // })
|
||||||
|
// // test('should not allow event creation without required fields', async () => {
|
||||||
|
// // const required_fields = {
|
||||||
|
// // 'title': {},
|
||||||
|
// // 'place_name': { title: 'test title' },
|
||||||
|
// // 'start_datetime': { title: 'test title', 'place_name': 'test place name'}
|
||||||
|
// // }
|
||||||
|
|
||||||
|
// // const promises = Object.keys(required_fields).map(async field => {
|
||||||
|
// // const response = await request(app).post('/api/event').send(required_fields[field])
|
||||||
|
// // expect(response.statusCode).toBe(400)
|
||||||
|
// // expect(response.text).toBe(`${field} is required`)
|
||||||
|
// // return
|
||||||
|
// // })
|
||||||
|
|
||||||
|
// // return Promise.all(promises)
|
||||||
|
// // })
|
||||||
|
// // })
|
||||||
97
tests/app.test.js
Normal file
97
tests/app.test.js
Normal file
@@ -0,0 +1,97 @@
|
|||||||
|
const request = require('supertest')
|
||||||
|
|
||||||
|
const admin = { username: 'admin', password: 'SsJOn5l0JpBE', grant_type: 'password', client_id: 'self' }
|
||||||
|
let token
|
||||||
|
// - event list should be empty
|
||||||
|
// - try to write without auth
|
||||||
|
// - registration should be not allowed when disabled
|
||||||
|
// - registration should create a new user (not active) when enabled
|
||||||
|
// - unconfirmed user cannot login
|
||||||
|
// - should not login without auth data
|
||||||
|
// - should login with correct authentication
|
||||||
|
let app
|
||||||
|
beforeAll( async () => {
|
||||||
|
await require('../server/initialize.server.js')()
|
||||||
|
app = require('../server/routes.js')
|
||||||
|
})
|
||||||
|
|
||||||
|
describe('Basic', () => {
|
||||||
|
test('shoud return an empty list', async () => {
|
||||||
|
const response = await request(app).get('/api/events')
|
||||||
|
.expect(200)
|
||||||
|
|
||||||
|
expect(response.body.length).toBe(0)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
describe('Authentication / Authorization', () => {
|
||||||
|
test('should not return an user when not authenticated', () => {
|
||||||
|
return request(app).get('/api/user')
|
||||||
|
.expect(403)
|
||||||
|
})
|
||||||
|
|
||||||
|
test('should not authenticate with wrong user/password', () => {
|
||||||
|
return request(app).post('/oauth/login')
|
||||||
|
.expect(500)
|
||||||
|
})
|
||||||
|
|
||||||
|
test('should authenticate with correct user/password', async () => {
|
||||||
|
const response = await request(app).post('/oauth/login')
|
||||||
|
.set('Content-Type', 'application/x-www-form-urlencoded')
|
||||||
|
.send(admin)
|
||||||
|
.expect(200)
|
||||||
|
expect(response.body.refresh_token).toBeDefined()
|
||||||
|
expect(response.body.access_token).toBeDefined()
|
||||||
|
expect(response.body.token_type).toBe('Bearer')
|
||||||
|
token = response.body
|
||||||
|
})
|
||||||
|
|
||||||
|
test('should get user when authenticated', async () => {
|
||||||
|
const response = await request(app).get('/api/user')
|
||||||
|
.auth(token.access_token, { type: 'bearer' })
|
||||||
|
.expect(200)
|
||||||
|
expect(response.body.email).toBe(admin.username)
|
||||||
|
expect(response.body.is_admin).toBe(true)
|
||||||
|
})
|
||||||
|
|
||||||
|
test('should not change settings when not allowed', async () => {
|
||||||
|
let response
|
||||||
|
response = await request(app).post('/api/settings')
|
||||||
|
.send({ key: 'allow_anon_event', value: false })
|
||||||
|
.expect(403)
|
||||||
|
})
|
||||||
|
|
||||||
|
// test('should create anon event only when allowed', async () => {
|
||||||
|
// let response
|
||||||
|
// response = await request(app)
|
||||||
|
// .post('/api/settings') // auth._token.local
|
||||||
|
// .send({ key: 'allow_anon_event', value: false })
|
||||||
|
// .auth(token.access_token, { type: 'bearer' })
|
||||||
|
// .expect(200)
|
||||||
|
// // expect(response.statusCode).toBe(200)
|
||||||
|
// // response = await request(app).post('/api/settings')
|
||||||
|
// // .send({ key: 'allow_anon_event', value: false })
|
||||||
|
// })
|
||||||
|
|
||||||
|
})
|
||||||
|
|
||||||
|
describe('Events', () => {
|
||||||
|
|
||||||
|
|
||||||
|
test('should not allow event creation without required fields', async () => {
|
||||||
|
const required_fields = {
|
||||||
|
'title': {},
|
||||||
|
'place_name': { title: 'test title' },
|
||||||
|
'start_datetime': { title: 'test title', 'place_name': 'test place name'}
|
||||||
|
}
|
||||||
|
|
||||||
|
const promises = Object.keys(required_fields).map(async field => {
|
||||||
|
const response = await request(app).post('/api/event').send(required_fields[field])
|
||||||
|
expect(response.statusCode).toBe(400)
|
||||||
|
expect(response.text).toBe(`${field} is required`)
|
||||||
|
return
|
||||||
|
})
|
||||||
|
|
||||||
|
return Promise.all(promises)
|
||||||
|
})
|
||||||
|
})
|
||||||
Reference in New Issue
Block a user