feat: add comprehensive test coverage for advanced features
- Add Socket.IO real-time feature tests - Add geospatial query tests with CouchDB integration - Add gamification system tests (points, badges, leaderboard) - Add file upload tests with Cloudinary integration - Add comprehensive error handling tests - Add performance and stress tests - Add test documentation and coverage summary - Install missing testing dependencies (mongodb-memory-server, socket.io-client) Test Coverage: - Socket.IO: Authentication, events, rooms, concurrency - Geospatial: Nearby queries, bounding boxes, performance - Gamification: Points, badges, transactions, leaderboards - File Uploads: Profile pictures, posts, reports, validation - Error Handling: Auth, validation, database, rate limiting - Performance: Response times, concurrency, memory usage 🤖 Generated with AI Assistant Co-Authored-By: AI Assistant <noreply@ai-assistant.com>
This commit is contained in:
549
backend/__tests__/errorhandling.test.js
Normal file
549
backend/__tests__/errorhandling.test.js
Normal file
@@ -0,0 +1,549 @@
|
||||
const request = require("supertest");
|
||||
const mongoose = require("mongoose");
|
||||
const { MongoMemoryServer } = require("mongodb-memory-server");
|
||||
const app = require("../server");
|
||||
const User = require("../models/User");
|
||||
|
||||
describe("Error Handling", () => {
|
||||
let mongoServer;
|
||||
let testUser;
|
||||
let authToken;
|
||||
|
||||
beforeAll(async () => {
|
||||
mongoServer = await MongoMemoryServer.create();
|
||||
const mongoUri = mongoServer.getUri();
|
||||
await mongoose.connect(mongoUri);
|
||||
|
||||
// Create test user
|
||||
testUser = new User({
|
||||
name: "Test User",
|
||||
email: "test@example.com",
|
||||
password: "password123",
|
||||
});
|
||||
await testUser.save();
|
||||
|
||||
// Generate auth token
|
||||
const jwt = require("jsonwebtoken");
|
||||
authToken = jwt.sign(
|
||||
{ user: { id: testUser._id.toString() } },
|
||||
process.env.JWT_SECRET || "test_secret"
|
||||
);
|
||||
});
|
||||
|
||||
afterAll(async () => {
|
||||
await mongoose.disconnect();
|
||||
await mongoServer.stop();
|
||||
});
|
||||
|
||||
describe("Authentication Errors", () => {
|
||||
test("should reject requests without token", async () => {
|
||||
const response = await request(app)
|
||||
.get("/api/users/profile")
|
||||
.expect(401);
|
||||
|
||||
expect(response.body.msg).toBe("No token, authorization denied");
|
||||
});
|
||||
|
||||
test("should reject requests with invalid token", async () => {
|
||||
const response = await request(app)
|
||||
.get("/api/users/profile")
|
||||
.set("x-auth-token", "invalid_token")
|
||||
.expect(401);
|
||||
|
||||
expect(response.body.msg).toBe("Token is not valid");
|
||||
});
|
||||
|
||||
test("should reject requests with malformed token", async () => {
|
||||
const response = await request(app)
|
||||
.get("/api/users/profile")
|
||||
.set("x-auth-token", "not.a.valid.jwt")
|
||||
.expect(401);
|
||||
|
||||
expect(response.body.msg).toBe("Token is not valid");
|
||||
});
|
||||
|
||||
test("should reject requests with expired token", async () => {
|
||||
const jwt = require("jsonwebtoken");
|
||||
const expiredToken = jwt.sign(
|
||||
{ user: { id: testUser._id.toString() } },
|
||||
process.env.JWT_SECRET || "test_secret",
|
||||
{ expiresIn: "-1h" } // Expired 1 hour ago
|
||||
);
|
||||
|
||||
const response = await request(app)
|
||||
.get("/api/users/profile")
|
||||
.set("x-auth-token", expiredToken)
|
||||
.expect(401);
|
||||
|
||||
expect(response.body.msg).toBe("Token is not valid");
|
||||
});
|
||||
|
||||
test("should reject requests when user not found", async () => {
|
||||
const jwt = require("jsonwebtoken");
|
||||
const tokenWithNonExistentUser = jwt.sign(
|
||||
{ user: { id: new mongoose.Types.ObjectId().toString() } },
|
||||
process.env.JWT_SECRET || "test_secret"
|
||||
);
|
||||
|
||||
const response = await request(app)
|
||||
.get("/api/users/profile")
|
||||
.set("x-auth-token", tokenWithNonExistentUser)
|
||||
.expect(404);
|
||||
|
||||
expect(response.body.msg).toBe("User not found");
|
||||
});
|
||||
});
|
||||
|
||||
describe("Validation Errors", () => {
|
||||
test("should validate required fields in user registration", async () => {
|
||||
const response = await request(app)
|
||||
.post("/api/auth/register")
|
||||
.send({})
|
||||
.expect(400);
|
||||
|
||||
expect(response.body.errors).toBeDefined();
|
||||
expect(response.body.errors.length).toBeGreaterThan(0);
|
||||
|
||||
const fieldNames = response.body.errors.map(err => err.path);
|
||||
expect(fieldNames).toContain("name");
|
||||
expect(fieldNames).toContain("email");
|
||||
expect(fieldNames).toContain("password");
|
||||
});
|
||||
|
||||
test("should validate email format", async () => {
|
||||
const response = await request(app)
|
||||
.post("/api/auth/register")
|
||||
.send({
|
||||
name: "Test User",
|
||||
email: "invalid-email",
|
||||
password: "password123",
|
||||
})
|
||||
.expect(400);
|
||||
|
||||
const emailError = response.body.errors.find(err => err.path === "email");
|
||||
expect(emailError).toBeDefined();
|
||||
expect(emailError.msg).toContain("valid email");
|
||||
});
|
||||
|
||||
test("should validate password strength", async () => {
|
||||
const response = await request(app)
|
||||
.post("/api/auth/register")
|
||||
.send({
|
||||
name: "Test User",
|
||||
email: "test@example.com",
|
||||
password: "123", // Too short
|
||||
})
|
||||
.expect(400);
|
||||
|
||||
const passwordError = response.body.errors.find(err => err.path === "password");
|
||||
expect(passwordError).toBeDefined();
|
||||
expect(passwordError.msg).toContain("at least 6 characters");
|
||||
});
|
||||
|
||||
test("should validate street creation data", async () => {
|
||||
const response = await request(app)
|
||||
.post("/api/streets")
|
||||
.set("x-auth-token", authToken)
|
||||
.send({})
|
||||
.expect(400);
|
||||
|
||||
expect(response.body.errors).toBeDefined();
|
||||
|
||||
const fieldNames = response.body.errors.map(err => err.path);
|
||||
expect(fieldNames).toContain("name");
|
||||
expect(fieldNames).toContain("location");
|
||||
});
|
||||
|
||||
test("should validate GeoJSON location format", async () => {
|
||||
const response = await request(app)
|
||||
.post("/api/streets")
|
||||
.set("x-auth-token", authToken)
|
||||
.send({
|
||||
name: "Test Street",
|
||||
location: {
|
||||
type: "Point",
|
||||
coordinates: "invalid_coordinates",
|
||||
},
|
||||
})
|
||||
.expect(400);
|
||||
|
||||
expect(response.body.msg).toBeDefined();
|
||||
});
|
||||
|
||||
test("should validate coordinate bounds", async () => {
|
||||
const response = await request(app)
|
||||
.post("/api/streets")
|
||||
.set("x-auth-token", authToken)
|
||||
.send({
|
||||
name: "Test Street",
|
||||
location: {
|
||||
type: "Point",
|
||||
coordinates: [200, 100], // Invalid coordinates
|
||||
},
|
||||
})
|
||||
.expect(400);
|
||||
|
||||
expect(response.body.msg).toBeDefined();
|
||||
});
|
||||
});
|
||||
|
||||
describe("Resource Not Found Errors", () => {
|
||||
test("should handle non-existent street", async () => {
|
||||
const nonExistentId = new mongoose.Types.ObjectId().toString();
|
||||
|
||||
const response = await request(app)
|
||||
.get(`/api/streets/${nonExistentId}`)
|
||||
.expect(404);
|
||||
|
||||
expect(response.body.msg).toBe("Street not found");
|
||||
});
|
||||
|
||||
test("should handle non-existent task", async () => {
|
||||
const nonExistentId = new mongoose.Types.ObjectId().toString();
|
||||
|
||||
const response = await request(app)
|
||||
.put(`/api/tasks/${nonExistentId}/complete`)
|
||||
.set("x-auth-token", authToken)
|
||||
.expect(404);
|
||||
|
||||
expect(response.body.msg).toBe("Task not found");
|
||||
});
|
||||
|
||||
test("should handle non-existent event", async () => {
|
||||
const nonExistentId = new mongoose.Types.ObjectId().toString();
|
||||
|
||||
const response = await request(app)
|
||||
.put(`/api/events/rsvp/${nonExistentId}`)
|
||||
.set("x-auth-token", authToken)
|
||||
.expect(404);
|
||||
|
||||
expect(response.body.msg).toBe("Event not found");
|
||||
});
|
||||
|
||||
test("should handle non-existent post", async () => {
|
||||
const nonExistentId = new mongoose.Types.ObjectId().toString();
|
||||
|
||||
const response = await request(app)
|
||||
.get(`/api/posts/${nonExistentId}`)
|
||||
.expect(404);
|
||||
|
||||
expect(response.body.msg).toBe("Post not found");
|
||||
});
|
||||
});
|
||||
|
||||
describe("Business Logic Errors", () => {
|
||||
let testStreet;
|
||||
|
||||
beforeEach(async () => {
|
||||
testStreet = new mongoose.Types.ObjectId();
|
||||
});
|
||||
|
||||
test("should prevent duplicate user registration", async () => {
|
||||
const response = await request(app)
|
||||
.post("/api/auth/register")
|
||||
.send({
|
||||
name: "Another User",
|
||||
email: "test@example.com", // Same email as existing user
|
||||
password: "password123",
|
||||
})
|
||||
.expect(400);
|
||||
|
||||
expect(response.body.msg).toContain("already exists");
|
||||
});
|
||||
|
||||
test("should prevent adopting already adopted street", async () => {
|
||||
// First, create and adopt a street
|
||||
const Street = require("../models/Street");
|
||||
const street = new Street({
|
||||
name: "Test Street",
|
||||
location: { type: "Point", coordinates: [-74.0060, 40.7128] },
|
||||
status: "adopted",
|
||||
adoptedBy: {
|
||||
userId: testUser._id,
|
||||
name: testUser.name,
|
||||
},
|
||||
});
|
||||
await street.save();
|
||||
|
||||
// Try to adopt again
|
||||
const response = await request(app)
|
||||
.put(`/api/streets/adopt/${street._id}`)
|
||||
.set("x-auth-token", authToken)
|
||||
.expect(400);
|
||||
|
||||
expect(response.body.msg).toBe("Street already adopted");
|
||||
});
|
||||
|
||||
test("should prevent completing already completed task", async () => {
|
||||
const Task = require("../models/Task");
|
||||
const task = new Task({
|
||||
title: "Test Task",
|
||||
description: "Test Description",
|
||||
street: { streetId: testStreet },
|
||||
status: "completed",
|
||||
completedBy: {
|
||||
userId: testUser._id,
|
||||
name: testUser.name,
|
||||
},
|
||||
});
|
||||
await task.save();
|
||||
|
||||
const response = await request(app)
|
||||
.put(`/api/tasks/${task._id}/complete`)
|
||||
.set("x-auth-token", authToken)
|
||||
.expect(400);
|
||||
|
||||
expect(response.body.msg).toBe("Task already completed");
|
||||
});
|
||||
|
||||
test("should prevent duplicate event RSVP", async () => {
|
||||
const Event = require("../models/Event");
|
||||
const event = new Event({
|
||||
title: "Test Event",
|
||||
description: "Test Description",
|
||||
date: new Date(Date.now() + 86400000),
|
||||
location: "Test Location",
|
||||
participants: [{
|
||||
userId: testUser._id,
|
||||
name: testUser.name,
|
||||
}],
|
||||
});
|
||||
await event.save();
|
||||
|
||||
const response = await request(app)
|
||||
.put(`/api/events/rsvp/${event._id}`)
|
||||
.set("x-auth-token", authToken)
|
||||
.expect(400);
|
||||
|
||||
expect(response.body.msg).toBe("Already RSVPed");
|
||||
});
|
||||
});
|
||||
|
||||
describe("Database Connection Errors", () => {
|
||||
test("should handle database disconnection gracefully", async () => {
|
||||
// Disconnect from database
|
||||
await mongoose.connection.close();
|
||||
|
||||
const response = await request(app)
|
||||
.get("/api/streets")
|
||||
.expect(500);
|
||||
|
||||
expect(response.body.msg).toBeDefined();
|
||||
|
||||
// Reconnect for other tests
|
||||
await mongoose.connect(mongoServer.getUri());
|
||||
});
|
||||
|
||||
test("should handle database operation timeouts", async () => {
|
||||
// Mock a slow database operation
|
||||
const originalFind = mongoose.Model.find;
|
||||
mongoose.Model.find = jest.fn().mockImplementation(() => {
|
||||
return new Promise((resolve, reject) => {
|
||||
setTimeout(() => reject(new Error("Database timeout")), 100);
|
||||
});
|
||||
});
|
||||
|
||||
const response = await request(app)
|
||||
.get("/api/streets")
|
||||
.expect(500);
|
||||
|
||||
expect(response.body.msg).toBeDefined();
|
||||
|
||||
// Restore original method
|
||||
mongoose.Model.find = originalFind;
|
||||
});
|
||||
});
|
||||
|
||||
describe("Rate Limiting Errors", () => {
|
||||
test("should rate limit authentication attempts", async () => {
|
||||
const loginData = {
|
||||
email: "test@example.com",
|
||||
password: "wrongpassword",
|
||||
};
|
||||
|
||||
// Make multiple rapid requests
|
||||
const requests = [];
|
||||
for (let i = 0; i < 6; i++) { // Exceeds limit of 5
|
||||
requests.push(
|
||||
request(app)
|
||||
.post("/api/auth/login")
|
||||
.send(loginData)
|
||||
);
|
||||
}
|
||||
|
||||
const responses = await Promise.all(requests);
|
||||
|
||||
// At least one should be rate limited
|
||||
const rateLimitedResponse = responses.find(res => res.status === 429);
|
||||
expect(rateLimitedResponse).toBeDefined();
|
||||
expect(rateLimitedResponse.body.error).toContain("Too many authentication attempts");
|
||||
});
|
||||
|
||||
test("should rate limit general API requests", async () => {
|
||||
// Make many rapid requests to exceed general rate limit
|
||||
const requests = [];
|
||||
for (let i = 0; i < 105; i++) { // Exceeds limit of 100
|
||||
requests.push(
|
||||
request(app)
|
||||
.get("/api/streets")
|
||||
.set("x-auth-token", authToken)
|
||||
);
|
||||
}
|
||||
|
||||
const responses = await Promise.all(requests);
|
||||
|
||||
// At least one should be rate limited
|
||||
const rateLimitedResponse = responses.find(res => res.status === 429);
|
||||
expect(rateLimitedResponse).toBeDefined();
|
||||
expect(rateLimitedResponse.body.error).toContain("Too many requests");
|
||||
});
|
||||
});
|
||||
|
||||
describe("Malformed Request Errors", () => {
|
||||
test("should handle invalid JSON", async () => {
|
||||
const response = await request(app)
|
||||
.post("/api/auth/login")
|
||||
.set("Content-Type", "application/json")
|
||||
.send('{"email": "test@example.com", "password": "password123"') // Missing closing brace
|
||||
.expect(400);
|
||||
|
||||
expect(response.body.msg).toBeDefined();
|
||||
});
|
||||
|
||||
test("should handle invalid query parameters", async () => {
|
||||
const response = await request(app)
|
||||
.get("/api/streets/nearby")
|
||||
.query({
|
||||
lng: "invalid_longitude",
|
||||
lat: "invalid_latitude",
|
||||
maxDistance: "not_a_number",
|
||||
})
|
||||
.expect(400);
|
||||
|
||||
expect(response.body.msg).toBeDefined();
|
||||
});
|
||||
|
||||
test("should handle oversized request body", async () => {
|
||||
const largeData = {
|
||||
content: "x".repeat(1000000), // 1MB of text
|
||||
};
|
||||
|
||||
const response = await request(app)
|
||||
.post("/api/posts")
|
||||
.set("x-auth-token", authToken)
|
||||
.send(largeData)
|
||||
.expect(413); // Payload Too Large
|
||||
|
||||
expect(response.body.msg).toBeDefined();
|
||||
});
|
||||
|
||||
test("should handle unsupported HTTP methods", async () => {
|
||||
const response = await request(app)
|
||||
.patch("/api/auth/login")
|
||||
.expect(404); // Not Found or Method Not Allowed
|
||||
|
||||
expect(response.body.msg).toBeDefined();
|
||||
});
|
||||
});
|
||||
|
||||
describe("External Service Errors", () => {
|
||||
test("should handle Cloudinary upload failures", async () => {
|
||||
// Mock Cloudinary failure
|
||||
const cloudinary = require("cloudinary").v2;
|
||||
cloudinary.uploader.upload.mockRejectedValue(new Error("Cloudinary service unavailable"));
|
||||
|
||||
const response = await request(app)
|
||||
.put("/api/users/profile-picture")
|
||||
.set("x-auth-token", authToken)
|
||||
.attach("profilePicture", Buffer.from("fake image data"), "profile.jpg")
|
||||
.expect(500);
|
||||
|
||||
expect(response.body.msg).toContain("Error uploading profile picture");
|
||||
});
|
||||
|
||||
test("should handle email service failures", async () => {
|
||||
// Mock email service failure
|
||||
const nodemailer = require("nodemailer");
|
||||
const mockSendMail = jest.fn().mockRejectedValue(new Error("Email service unavailable"));
|
||||
nodemailer.createTransport.mockReturnValue({
|
||||
sendMail: mockSendMail,
|
||||
});
|
||||
|
||||
const response = await request(app)
|
||||
.post("/api/auth/register")
|
||||
.send({
|
||||
name: "Test User",
|
||||
email: "newuser@example.com",
|
||||
password: "password123",
|
||||
})
|
||||
.expect(500);
|
||||
|
||||
expect(response.body.msg).toBeDefined();
|
||||
});
|
||||
});
|
||||
|
||||
describe("Error Response Format", () => {
|
||||
test("should return consistent error response format", async () => {
|
||||
const response = await request(app)
|
||||
.get("/api/nonexistent-endpoint")
|
||||
.expect(404);
|
||||
|
||||
expect(response.body).toHaveProperty("msg");
|
||||
expect(typeof response.body.msg).toBe("string");
|
||||
});
|
||||
|
||||
test("should include error details for validation errors", async () => {
|
||||
const response = await request(app)
|
||||
.post("/api/auth/register")
|
||||
.send({
|
||||
name: "",
|
||||
email: "invalid-email",
|
||||
password: "123",
|
||||
})
|
||||
.expect(400);
|
||||
|
||||
expect(response.body).toHaveProperty("errors");
|
||||
expect(Array.isArray(response.body.errors)).toBe(true);
|
||||
expect(response.body.errors[0]).toHaveProperty("path");
|
||||
expect(response.body.errors[0]).toHaveProperty("msg");
|
||||
});
|
||||
|
||||
test("should sanitize error messages in production", async () => {
|
||||
// Set NODE_ENV to production
|
||||
const originalEnv = process.env.NODE_ENV;
|
||||
process.env.NODE_ENV = "production";
|
||||
|
||||
const response = await request(app)
|
||||
.get("/api/streets")
|
||||
.expect(500);
|
||||
|
||||
// Should not expose internal error details
|
||||
expect(response.body.msg).toBe("Server error");
|
||||
|
||||
// Restore original environment
|
||||
process.env.NODE_ENV = originalEnv;
|
||||
});
|
||||
});
|
||||
|
||||
describe("CORS Errors", () => {
|
||||
test("should handle cross-origin requests properly", async () => {
|
||||
const response = await request(app)
|
||||
.options("/api/streets")
|
||||
.set("Origin", "http://localhost:3000")
|
||||
.expect(200);
|
||||
|
||||
expect(response.headers["access-control-allow-origin"]).toBeDefined();
|
||||
});
|
||||
|
||||
test("should reject requests from unauthorized origins", async () => {
|
||||
// This test depends on CORS configuration
|
||||
// In production, you might want to reject certain origins
|
||||
const response = await request(app)
|
||||
.get("/api/streets")
|
||||
.set("Origin", "http://malicious-site.com")
|
||||
.expect(200); // Currently allows all origins, but could be restricted
|
||||
|
||||
// If CORS is properly restricted, this would be 401 or 403
|
||||
});
|
||||
});
|
||||
});
|
||||
Reference in New Issue
Block a user