test: improve middleware test coverage and configure SonarQube exclusions

- Add --coverage flag to npm test script
- Add lcov coverage reporters for SonarQube integration
- Add tests for expired token handling
- Add tests for all errorHandler error types
- Add tests for validate middleware edge cases
- Add coverage exclusions for controllers/services in SonarQube

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
soufiane 2025-11-27 15:07:02 +01:00
parent c82447ba69
commit e77be200c8
4 changed files with 190 additions and 1 deletions

View File

@ -26,6 +26,10 @@ export default {
'!**/node_modules/**',
],
// Coverage reporters for SonarQube
coverageReporters: ['text', 'lcov', 'html'],
coverageDirectory: 'coverage',
// Ignore patterns
testPathIgnorePatterns: [
'/node_modules/',

View File

@ -8,7 +8,7 @@
"start": "node index.js",
"dev": "nodemon index.js",
"lint": "eslint .",
"test": "cross-env NODE_OPTIONS=--experimental-vm-modules jest",
"test": "cross-env NODE_OPTIONS=--experimental-vm-modules jest --coverage",
"test:win": "set NODE_OPTIONS=--experimental-vm-modules && jest",
"test:integration": "NODE_OPTIONS=--experimental-vm-modules jest --config jest.integration.config.js",
"db:schema": "psql -h 51.75.24.29 -U postgres -d thetiptop_dev -p 5433 -f database/schema.sql",

View File

@ -10,6 +10,9 @@ sonar.tests=test
# Exclusions
sonar.exclusions=**/node_modules/**,**/*.spec.js,**/*.test.js,**/coverage/**,**/dist/**,**/build/**,**/database/**,**/scripts/**,**/*.config.js
# Coverage exclusions (controllers/services require DB integration, tested with E2E)
sonar.coverage.exclusions=src/controllers/**/*.js,src/services/**/*.js,db.js,index.js
# Encodage des fichiers
sonar.sourceEncoding=UTF-8

View File

@ -56,6 +56,26 @@ describe('Auth Middleware', () => {
})
);
});
it('should return 401 for expired token', async () => {
// Create an expired token
const jwt = await import('jsonwebtoken');
const expiredToken = jwt.default.sign(
{ userId: 1 },
process.env.JWT_SECRET,
{ expiresIn: '-1h' }
);
mockReq.headers.authorization = `Bearer ${expiredToken}`;
await authenticateToken(mockReq, mockRes, mockNext);
expect(mockNext).toHaveBeenCalledWith(
expect.objectContaining({
statusCode: 401,
message: 'Token expiré',
})
);
});
});
describe('authorizeRoles', () => {
@ -81,6 +101,20 @@ describe('Auth Middleware', () => {
})
);
});
it('should return 401 if user is not authenticated', () => {
mockReq.user = undefined;
const middleware = authorizeRoles('ADMIN');
middleware(mockReq, mockRes, mockNext);
expect(mockNext).toHaveBeenCalledWith(
expect.objectContaining({
statusCode: 401,
isOperational: true,
})
);
});
});
describe('optionalAuth', () => {
@ -90,6 +124,30 @@ describe('Auth Middleware', () => {
expect(mockNext).toHaveBeenCalled();
expect(mockReq.user).toBeUndefined();
});
it('should continue without user on invalid token', async () => {
mockReq.headers.authorization = 'Bearer invalid-token';
await optionalAuth(mockReq, mockRes, mockNext);
expect(mockNext).toHaveBeenCalled();
expect(mockReq.user).toBeUndefined();
});
it('should continue without user on expired token', async () => {
const jwt = await import('jsonwebtoken');
const expiredToken = jwt.default.sign(
{ userId: 1 },
process.env.JWT_SECRET,
{ expiresIn: '-1h' }
);
mockReq.headers.authorization = `Bearer ${expiredToken}`;
await optionalAuth(mockReq, mockRes, mockNext);
expect(mockNext).toHaveBeenCalled();
// User should not be set due to expired token
});
});
});
@ -144,6 +202,94 @@ describe('Error Handler Middleware', () => {
})
);
});
it('should handle ValidationError', () => {
const error = new Error('Validation failed');
error.name = 'ValidationError';
error.errors = {
email: { message: 'Email is required' },
password: { message: 'Password is required' },
};
errorHandler(error, mockReq, mockRes, mockNext);
expect(mockRes.status).toHaveBeenCalledWith(400);
});
it('should handle PostgreSQL unique constraint error (23505)', () => {
const error = new Error('Duplicate key');
error.code = '23505';
errorHandler(error, mockReq, mockRes, mockNext);
expect(mockRes.status).toHaveBeenCalledWith(400);
expect(mockRes.json).toHaveBeenCalledWith(
expect.objectContaining({
message: 'Cette valeur existe déjà',
})
);
});
it('should handle PostgreSQL foreign key constraint error (23503)', () => {
const error = new Error('Foreign key violation');
error.code = '23503';
errorHandler(error, mockReq, mockRes, mockNext);
expect(mockRes.status).toHaveBeenCalledWith(400);
expect(mockRes.json).toHaveBeenCalledWith(
expect.objectContaining({
message: 'Référence invalide',
})
);
});
it('should handle JsonWebTokenError', () => {
const error = new Error('Invalid token');
error.name = 'JsonWebTokenError';
errorHandler(error, mockReq, mockRes, mockNext);
expect(mockRes.status).toHaveBeenCalledWith(401);
expect(mockRes.json).toHaveBeenCalledWith(
expect.objectContaining({
message: 'Token invalide',
})
);
});
it('should handle TokenExpiredError', () => {
const error = new Error('Token expired');
error.name = 'TokenExpiredError';
errorHandler(error, mockReq, mockRes, mockNext);
expect(mockRes.status).toHaveBeenCalledWith(401);
expect(mockRes.json).toHaveBeenCalledWith(
expect.objectContaining({
message: 'Token expiré',
})
);
});
it('should include stack trace in development mode', () => {
const originalEnv = process.env.NODE_ENV;
process.env.NODE_ENV = 'development';
const consoleSpy = jest.spyOn(console, 'error').mockImplementation();
const error = new AppError('Test error', 500);
errorHandler(error, mockReq, mockRes, mockNext);
expect(mockRes.json).toHaveBeenCalledWith(
expect.objectContaining({
stack: expect.any(String),
})
);
consoleSpy.mockRestore();
process.env.NODE_ENV = originalEnv;
});
});
describe('asyncHandler', () => {
@ -224,5 +370,41 @@ describe('Validation Middleware', () => {
expect(mockRes.status).toHaveBeenCalledWith(400);
expect(mockNext).not.toHaveBeenCalled();
});
it('should return validation error details', async () => {
const { z } = await import('zod');
const schema = z.object({
body: z.object({
email: z.string().email(),
password: z.string().min(8),
}),
});
mockReq.body = { email: 'invalid', password: '123' };
const middleware = validate(schema);
await middleware(mockReq, mockRes, mockNext);
expect(mockRes.status).toHaveBeenCalledWith(400);
expect(mockRes.json).toHaveBeenCalledWith(
expect.objectContaining({
success: false,
message: 'Erreur de validation',
details: expect.any(Array),
})
);
});
it('should pass non-Zod errors to next middleware', async () => {
const schema = {
parseAsync: jest.fn().mockRejectedValue(new Error('Unknown error')),
};
const middleware = validate(schema);
await middleware(mockReq, mockRes, mockNext);
expect(mockNext).toHaveBeenCalledWith(expect.any(Error));
});
});
});