@elevasis/core 0.17.0 → 0.19.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. package/dist/index.d.ts +82 -1
  2. package/dist/index.js +291 -171
  3. package/dist/knowledge/index.d.ts +43 -0
  4. package/dist/organization-model/index.d.ts +82 -1
  5. package/dist/organization-model/index.js +291 -171
  6. package/dist/test-utils/index.d.ts +41 -12
  7. package/dist/test-utils/index.js +291 -171
  8. package/package.json +2 -1
  9. package/src/_gen/__tests__/__snapshots__/contracts.md.snap +78 -65
  10. package/src/auth/multi-tenancy/organizations/__tests__/api-schemas.test.ts +194 -0
  11. package/src/auth/multi-tenancy/organizations/api-schemas.ts +136 -128
  12. package/src/business/acquisition/api-schemas.test.ts +100 -2
  13. package/src/business/acquisition/api-schemas.ts +81 -43
  14. package/src/business/acquisition/build-templates.test.ts +212 -0
  15. package/src/business/acquisition/types.ts +21 -38
  16. package/src/execution/engine/index.ts +436 -434
  17. package/src/execution/engine/tools/integration/server/adapters/google-calendar/google-calendar-adapter.ts +428 -0
  18. package/src/execution/engine/tools/integration/server/adapters/google-calendar/index.ts +2 -0
  19. package/src/execution/engine/tools/lead-service-types.ts +51 -9
  20. package/src/execution/engine/tools/platform/acquisition/company-tools.ts +7 -6
  21. package/src/execution/engine/tools/platform/acquisition/contact-tools.ts +6 -5
  22. package/src/execution/engine/tools/platform/acquisition/types.ts +20 -9
  23. package/src/execution/engine/tools/registry.ts +700 -698
  24. package/src/execution/engine/tools/tool-maps.ts +10 -0
  25. package/src/execution/external/__tests__/api-schemas.test.ts +127 -0
  26. package/src/integrations/oauth/__tests__/provider-registry.test.ts +7 -6
  27. package/src/integrations/oauth/provider-registry.ts +74 -61
  28. package/src/integrations/oauth/server/credentials.ts +43 -39
  29. package/src/knowledge/__tests__/queries.test.ts +89 -0
  30. package/src/organization-model/__tests__/icons.test.ts +61 -0
  31. package/src/organization-model/__tests__/knowledge.test.ts +118 -1
  32. package/src/organization-model/__tests__/prospecting-ssot.test.ts +94 -0
  33. package/src/organization-model/defaults.ts +8 -0
  34. package/src/organization-model/domains/knowledge.ts +9 -0
  35. package/src/organization-model/domains/prospecting.ts +272 -226
  36. package/src/organization-model/domains/sales.ts +32 -25
  37. package/src/organization-model/icons.ts +3 -0
  38. package/src/organization-model/types.ts +9 -1
  39. package/src/platform/constants/versions.ts +1 -1
  40. package/src/platform/utils/__tests__/validation.test.ts +1084 -1083
  41. package/src/platform/utils/validation.ts +425 -425
  42. package/src/reference/_generated/contracts.md +78 -65
  43. package/src/server.ts +6 -0
  44. package/src/supabase/database.types.ts +6 -12
@@ -1,1083 +1,1084 @@
1
- /**
2
- * Comprehensive unit tests for common validation utilities
3
- *
4
- * Test Coverage:
5
- * - All primitive validators (UUID, Email, URL, Timestamp)
6
- * - Schema composition (Pagination, DateRange)
7
- * - Factory functions (createEnumSchema, createStringSchema, createArraySchema)
8
- * - Edge cases and attack vectors
9
- * - Security validations (path traversal, SQL injection, XSS, DoS)
10
- */
11
-
12
- import { describe, it, expect } from 'vitest'
13
- import { z } from 'zod'
14
- import {
15
- UuidSchema,
16
- NonEmptyStringSchema,
17
- EmailSchema,
18
- UrlSchema,
19
- PaginationSchema,
20
- TimestampSchema,
21
- DateRangeSchema,
22
- ResourceTypeSchema,
23
- OriginResourceTypeSchema,
24
- CredentialNameSchema,
25
- OrganizationIdSchema,
26
- OAuthProviderSchema,
27
- OAuthCodeSchema,
28
- OAuthStateParamSchema,
29
- SanitizedStringSchema,
30
- createEnumSchema,
31
- createStringSchema,
32
- createArraySchema,
33
- createPayloadSizeValidator,
34
- formatZodValidationError
35
- } from '../validation'
36
-
37
- describe('UuidSchema', () => {
38
- it('accepts valid UUID v4', () => {
39
- const validUuid = 'a0eebc99-9c0b-4ef8-bb6d-6bb9bd380a11'
40
- expect(UuidSchema.parse(validUuid)).toBe(validUuid)
41
- })
42
-
43
- it('accepts valid UUID v1', () => {
44
- const validUuid = '550e8400-e29b-11d4-a716-446655440000'
45
- expect(UuidSchema.parse(validUuid)).toBe(validUuid)
46
- })
47
-
48
- it('rejects invalid UUID format', () => {
49
- expect(() => UuidSchema.parse('not-a-uuid')).toThrow()
50
- expect(() => UuidSchema.parse('12345')).toThrow()
51
- expect(() => UuidSchema.parse('')).toThrow()
52
- })
53
-
54
- it('rejects UUID-like strings with wrong format', () => {
55
- expect(() => UuidSchema.parse('a0eebc99-9c0b-4ef8-bb6d')).toThrow()
56
- expect(() => UuidSchema.parse('a0eebc999c0b4ef8bb6d6bb9bd380a11')).toThrow()
57
- })
58
- })
59
-
60
- describe('CredentialNameSchema', () => {
61
- describe('valid credential names', () => {
62
- it('accepts lowercase with hyphens (service-env format)', () => {
63
- expect(CredentialNameSchema.parse('gmail-prod')).toBe('gmail-prod')
64
- expect(CredentialNameSchema.parse('notion-dev')).toBe('notion-dev')
65
- expect(CredentialNameSchema.parse('stripe-api-key')).toBe('stripe-api-key')
66
- })
67
-
68
- it('accepts multi-segment names', () => {
69
- expect(CredentialNameSchema.parse('notion-dev-2024')).toBe('notion-dev-2024')
70
- expect(CredentialNameSchema.parse('google-sheets-prod')).toBe('google-sheets-prod')
71
- })
72
-
73
- it('auto-lowercases input', () => {
74
- expect(CredentialNameSchema.parse('Gmail-Prod')).toBe('gmail-prod')
75
- expect(CredentialNameSchema.parse('NOTION-DEV')).toBe('notion-dev')
76
- })
77
-
78
- it('trims whitespace', () => {
79
- expect(CredentialNameSchema.parse(' gmail-prod ')).toBe('gmail-prod')
80
- })
81
-
82
- it('accepts numbers in segments', () => {
83
- expect(CredentialNameSchema.parse('api-v2')).toBe('api-v2')
84
- expect(CredentialNameSchema.parse('s3-bucket-01')).toBe('s3-bucket-01')
85
- })
86
- })
87
-
88
- describe('format enforcement', () => {
89
- it('rejects names without hyphens (must have service-env format)', () => {
90
- expect(() => CredentialNameSchema.parse('gmailprod')).toThrow(/must be lowercase/)
91
- expect(() => CredentialNameSchema.parse('12345')).toThrow(/must be lowercase/)
92
- })
93
-
94
- it('rejects underscores', () => {
95
- expect(() => CredentialNameSchema.parse('gmail_prod')).toThrow(/must be lowercase/)
96
- expect(() => CredentialNameSchema.parse('notion_dev_2024')).toThrow(/must be lowercase/)
97
- })
98
-
99
- it('rejects sequential hyphens', () => {
100
- expect(() => CredentialNameSchema.parse('gmail--prod')).toThrow(/must be lowercase/)
101
- expect(() => CredentialNameSchema.parse('notion----dev')).toThrow(/must be lowercase/)
102
- })
103
-
104
- it('rejects leading or trailing hyphens', () => {
105
- expect(() => CredentialNameSchema.parse('-gmail-prod')).toThrow(/must be lowercase/)
106
- expect(() => CredentialNameSchema.parse('gmail-prod-')).toThrow(/must be lowercase/)
107
- })
108
- })
109
-
110
- describe('SECURITY: path traversal prevention', () => {
111
- it('rejects path traversal attempts', () => {
112
- expect(() => CredentialNameSchema.parse('../admin-cred')).toThrow(/must be lowercase/)
113
- expect(() => CredentialNameSchema.parse('../../secrets')).toThrow(/must be lowercase/)
114
- expect(() => CredentialNameSchema.parse('./../config')).toThrow(/must be lowercase/)
115
- })
116
-
117
- it('rejects relative path characters', () => {
118
- expect(() => CredentialNameSchema.parse('./local-cred')).toThrow(/must be lowercase/)
119
- expect(() => CredentialNameSchema.parse('../parent')).toThrow(/must be lowercase/)
120
- })
121
- })
122
-
123
- describe('SECURITY: special character prevention', () => {
124
- it('rejects names with spaces', () => {
125
- expect(() => CredentialNameSchema.parse('gmail prod')).toThrow(/must be lowercase/)
126
- expect(() => CredentialNameSchema.parse('notion dev 2024')).toThrow(/must be lowercase/)
127
- })
128
-
129
- it('rejects names with special characters', () => {
130
- expect(() => CredentialNameSchema.parse('gmail@prod')).toThrow(/must be lowercase/)
131
- expect(() => CredentialNameSchema.parse('notion#dev')).toThrow(/must be lowercase/)
132
- expect(() => CredentialNameSchema.parse('slack$prod')).toThrow(/must be lowercase/)
133
- expect(() => CredentialNameSchema.parse('attio%dev')).toThrow(/must be lowercase/)
134
- })
135
-
136
- it('rejects SQL injection attempts', () => {
137
- expect(() => CredentialNameSchema.parse("' OR '1'='1")).toThrow(/must be lowercase/)
138
- expect(() => CredentialNameSchema.parse("admin'; DROP TABLE credentials;--")).toThrow(/must be lowercase/)
139
- })
140
-
141
- it('rejects shell injection attempts', () => {
142
- expect(() => CredentialNameSchema.parse('cred; rm -rf /')).toThrow(/must be lowercase/)
143
- expect(() => CredentialNameSchema.parse('cred && malicious')).toThrow(/must be lowercase/)
144
- })
145
- })
146
-
147
- describe('SECURITY: DoS prevention', () => {
148
- it('rejects empty names', () => {
149
- expect(() => CredentialNameSchema.parse('')).toThrow(/required/)
150
- expect(() => CredentialNameSchema.parse(' ')).toThrow(/required/)
151
- })
152
-
153
- it('rejects names too long (over 100 chars)', () => {
154
- const longName = 'a-' + 'b'.repeat(99)
155
- expect(() => CredentialNameSchema.parse(longName)).toThrow(/too long/)
156
- })
157
-
158
- it('accepts names at max length (100 chars)', () => {
159
- // 100 chars: 49 'a' + '-' + 49 'b' + 'c' = a{49}-b{49}c
160
- const maxName = 'a'.repeat(49) + '-' + 'b'.repeat(49) + 'c'
161
- expect(CredentialNameSchema.parse(maxName)).toBe(maxName)
162
- })
163
- })
164
- })
165
-
166
- describe('OrganizationIdSchema', () => {
167
- it('is an alias for UuidSchema', () => {
168
- const validUuid = 'a0eebc99-9c0b-4ef8-bb6d-6bb9bd380a11'
169
- expect(OrganizationIdSchema.parse(validUuid)).toBe(validUuid)
170
- })
171
-
172
- it('rejects invalid UUIDs', () => {
173
- expect(() => OrganizationIdSchema.parse('not-a-uuid')).toThrow()
174
- })
175
- })
176
-
177
- describe('OAuthProviderSchema', () => {
178
- it('accepts valid OAuth providers', () => {
179
- expect(OAuthProviderSchema.parse('dropbox')).toBe('dropbox')
180
- expect(OAuthProviderSchema.parse('google-sheets')).toBe('google-sheets')
181
- })
182
-
183
- it('rejects unknown providers', () => {
184
- expect(() => OAuthProviderSchema.parse('slack')).toThrow()
185
- expect(() => OAuthProviderSchema.parse('attio')).toThrow()
186
- expect(() => OAuthProviderSchema.parse('github')).toThrow()
187
- expect(() => OAuthProviderSchema.parse('invalid')).toThrow()
188
- })
189
-
190
- it('rejects empty string', () => {
191
- expect(() => OAuthProviderSchema.parse('')).toThrow()
192
- })
193
- })
194
-
195
- describe('OAuthCodeSchema', () => {
196
- it('accepts valid OAuth authorization codes', () => {
197
- const validCode = 'a'.repeat(50)
198
- expect(OAuthCodeSchema.parse(validCode)).toBe(validCode)
199
- })
200
-
201
- it('accepts codes at minimum length (10 chars)', () => {
202
- const minCode = 'a'.repeat(10)
203
- expect(OAuthCodeSchema.parse(minCode)).toBe(minCode)
204
- })
205
-
206
- it('accepts codes at maximum length (1000 chars)', () => {
207
- const maxCode = 'a'.repeat(1000)
208
- expect(OAuthCodeSchema.parse(maxCode)).toBe(maxCode)
209
- })
210
-
211
- it('rejects codes too short (DoS prevention)', () => {
212
- const shortCode = 'a'.repeat(9)
213
- expect(() => OAuthCodeSchema.parse(shortCode)).toThrow(/too short/)
214
- })
215
-
216
- it('rejects codes too long (DoS prevention)', () => {
217
- const longCode = 'a'.repeat(1001)
218
- expect(() => OAuthCodeSchema.parse(longCode)).toThrow(/too long/)
219
- })
220
- })
221
-
222
- describe('OAuthStateParamSchema', () => {
223
- it('accepts valid state parameters', () => {
224
- const validState = 'eyJvcmdhbml6YXRpb25JZCI6InRlc3QifQ=='
225
- expect(OAuthStateParamSchema.parse(validState)).toBe(validState)
226
- })
227
-
228
- it('accepts state at minimum length (10 chars)', () => {
229
- const minState = 'a'.repeat(10)
230
- expect(OAuthStateParamSchema.parse(minState)).toBe(minState)
231
- })
232
-
233
- it('accepts state at maximum length (2048 chars)', () => {
234
- const maxState = 'a'.repeat(2048)
235
- expect(OAuthStateParamSchema.parse(maxState)).toBe(maxState)
236
- })
237
-
238
- it('rejects state too short', () => {
239
- const shortState = 'a'.repeat(9)
240
- expect(() => OAuthStateParamSchema.parse(shortState)).toThrow(/too short/)
241
- })
242
-
243
- it('rejects state too long (DoS prevention)', () => {
244
- const longState = 'a'.repeat(2049)
245
- expect(() => OAuthStateParamSchema.parse(longState)).toThrow(/too long/)
246
- })
247
- })
248
-
249
- describe('NonEmptyStringSchema', () => {
250
- it('accepts valid non-empty strings', () => {
251
- expect(NonEmptyStringSchema.parse('test')).toBe('test')
252
- expect(NonEmptyStringSchema.parse('a')).toBe('a')
253
- })
254
-
255
- it('trims whitespace', () => {
256
- expect(NonEmptyStringSchema.parse(' test ')).toBe('test')
257
- })
258
-
259
- it('rejects empty strings', () => {
260
- expect(() => NonEmptyStringSchema.parse('')).toThrow()
261
- })
262
-
263
- it('rejects whitespace-only strings', () => {
264
- // .trim() runs BEFORE .min(1), so ' ' is trimmed to '' which fails min(1)
265
- const result = NonEmptyStringSchema.safeParse(' ')
266
- expect(result.success).toBe(false)
267
- })
268
-
269
- it('accepts strings up to max length (1000 chars)', () => {
270
- const maxString = 'a'.repeat(1000)
271
- expect(NonEmptyStringSchema.parse(maxString)).toBe(maxString)
272
- })
273
-
274
- it('rejects strings over max length (DoS prevention)', () => {
275
- const tooLong = 'a'.repeat(1001)
276
- expect(() => NonEmptyStringSchema.parse(tooLong)).toThrow()
277
- })
278
- })
279
-
280
- describe('SanitizedStringSchema', () => {
281
- it('removes dangerous characters', () => {
282
- expect(SanitizedStringSchema.parse('hello<script>world')).toBe('helloscriptworld')
283
- expect(SanitizedStringSchema.parse('test>value')).toBe('testvalue')
284
- expect(SanitizedStringSchema.parse("test'value")).toBe('testvalue')
285
- expect(SanitizedStringSchema.parse('test"value')).toBe('testvalue')
286
- })
287
-
288
- it('removes all dangerous characters in one string', () => {
289
- expect(SanitizedStringSchema.parse(`<>"'`)).toBe('')
290
- })
291
-
292
- it('trims whitespace', () => {
293
- expect(SanitizedStringSchema.parse(' test ')).toBe('test')
294
- })
295
-
296
- it('preserves safe characters', () => {
297
- expect(SanitizedStringSchema.parse('hello-world_123')).toBe('hello-world_123')
298
- expect(SanitizedStringSchema.parse('test@example.com')).toBe('test@example.com')
299
- })
300
- })
301
-
302
- describe('EmailSchema', () => {
303
- it('accepts valid email addresses', () => {
304
- const validEmails = [
305
- 'user@example.com',
306
- 'test.user@example.co.uk',
307
- 'user+tag@example.com',
308
- 'user_name@example-domain.com'
309
- ]
310
-
311
- validEmails.forEach((email) => {
312
- expect(EmailSchema.parse(email)).toBe(email)
313
- })
314
- })
315
-
316
- it('rejects invalid email formats', () => {
317
- const invalidEmails = [
318
- 'not-an-email',
319
- '@example.com',
320
- 'user@',
321
- 'user @example.com',
322
- 'user@example',
323
- '',
324
- 'user@@example.com'
325
- ]
326
-
327
- invalidEmails.forEach((email) => {
328
- expect(() => EmailSchema.parse(email)).toThrow()
329
- })
330
- })
331
-
332
- it('prevents email header injection', () => {
333
- const injectionAttempts = ['user@example.com\nBcc: attacker@evil.com', 'user@example.com\r\nCc: spam@spam.com']
334
-
335
- injectionAttempts.forEach((attempt) => {
336
- expect(() => EmailSchema.parse(attempt)).toThrow()
337
- })
338
- })
339
- })
340
-
341
- describe('UrlSchema', () => {
342
- it('accepts valid HTTP URLs', () => {
343
- expect(UrlSchema.parse('http://example.com')).toBe('http://example.com')
344
- })
345
-
346
- it('accepts valid HTTPS URLs', () => {
347
- const validUrls = [
348
- 'https://example.com',
349
- 'https://example.com/path',
350
- 'https://example.com/path?query=value',
351
- 'https://sub.example.com',
352
- 'https://example.com:8080/path'
353
- ]
354
-
355
- validUrls.forEach((url) => {
356
- expect(UrlSchema.parse(url)).toBe(url)
357
- })
358
- })
359
-
360
- it('rejects invalid URL formats', () => {
361
- const invalidUrls = [
362
- 'not-a-url',
363
- 'example.com', // Missing protocol
364
- ''
365
- ]
366
-
367
- invalidUrls.forEach((url) => {
368
- expect(() => UrlSchema.parse(url)).toThrow()
369
- })
370
- })
371
-
372
- it('accepts all valid URL schemes (including javascript: and ftp:)', () => {
373
- // Note: Zod's .url() validator accepts ALL valid URL schemes
374
- // This includes potentially dangerous ones like javascript:
375
- // For HTTP/HTTPS only, use a refinement (see example below)
376
- expect(UrlSchema.parse('ftp://example.com')).toBe('ftp://example.com')
377
- expect(UrlSchema.parse('javascript:alert(1)')).toBe('javascript:alert(1)')
378
- })
379
-
380
- it('can be refined for HTTPS-only', () => {
381
- const SecureUrlSchema = UrlSchema.refine((url) => url.startsWith('https://'), { message: 'HTTPS required' })
382
-
383
- expect(SecureUrlSchema.parse('https://example.com')).toBe('https://example.com')
384
- expect(() => SecureUrlSchema.parse('http://example.com')).toThrow()
385
- })
386
- })
387
-
388
- describe('PaginationSchema', () => {
389
- it('accepts valid pagination parameters', () => {
390
- const result = PaginationSchema.parse({ limit: 20, offset: 0 })
391
- expect(result).toEqual({ limit: 20, offset: 0 })
392
- })
393
-
394
- it('coerces string to number', () => {
395
- const result = PaginationSchema.parse({ limit: '50', offset: '100' })
396
- expect(result).toEqual({ limit: 50, offset: 100 })
397
- })
398
-
399
- it('uses default values when not provided', () => {
400
- const result = PaginationSchema.parse({})
401
- expect(result).toEqual({ limit: 20, offset: 0 })
402
- })
403
-
404
- it('rejects limit over 100 (DoS protection)', () => {
405
- expect(() => PaginationSchema.parse({ limit: 101 })).toThrow()
406
- })
407
-
408
- it('accepts limit of exactly 100', () => {
409
- const result = PaginationSchema.parse({ limit: 100 })
410
- expect(result.limit).toBe(100)
411
- })
412
-
413
- it('rejects limit of 0', () => {
414
- expect(() => PaginationSchema.parse({ limit: 0 })).toThrow()
415
- })
416
-
417
- it('rejects negative offset', () => {
418
- expect(() => PaginationSchema.parse({ offset: -1 })).toThrow()
419
- })
420
-
421
- it('can be extended with additional filters', () => {
422
- const FilteredListSchema = PaginationSchema.extend({
423
- status: z.enum(['active', 'inactive']),
424
- search: z.string().optional()
425
- })
426
-
427
- const result = FilteredListSchema.parse({
428
- limit: 50,
429
- offset: 0,
430
- status: 'active',
431
- search: 'test'
432
- })
433
-
434
- expect(result.status).toBe('active')
435
- })
436
- })
437
-
438
- describe('TimestampSchema', () => {
439
- it('accepts valid ISO 8601 datetime', () => {
440
- const validTimestamps = ['2025-11-13T10:30:00Z', '2025-01-01T00:00:00.000Z', '2025-12-31T23:59:59.999Z']
441
-
442
- validTimestamps.forEach((timestamp) => {
443
- expect(TimestampSchema.parse(timestamp)).toBe(timestamp)
444
- })
445
- })
446
-
447
- it('rejects invalid datetime formats', () => {
448
- const invalidTimestamps = ['invalid-date', '2025-01-01 00:00:00', '2025-01-01', '', '01/01/2025']
449
-
450
- invalidTimestamps.forEach((timestamp) => {
451
- expect(() => TimestampSchema.parse(timestamp)).toThrow()
452
- })
453
- })
454
- })
455
-
456
- describe('DateRangeSchema', () => {
457
- it('accepts valid date range', () => {
458
- const result = DateRangeSchema.parse({
459
- startDate: '2025-01-01T00:00:00Z',
460
- endDate: '2025-12-31T23:59:59Z'
461
- })
462
-
463
- expect(result.startDate).toBe('2025-01-01T00:00:00Z')
464
- expect(result.endDate).toBe('2025-12-31T23:59:59Z')
465
- })
466
-
467
- it('can be refined for logical validation (end > start)', () => {
468
- const ValidatedDateRangeSchema = DateRangeSchema.refine(
469
- (data) => new Date(data.endDate) > new Date(data.startDate),
470
- { message: 'End date must be after start date' }
471
- )
472
-
473
- expect(
474
- ValidatedDateRangeSchema.parse({
475
- startDate: '2025-01-01T00:00:00Z',
476
- endDate: '2025-12-31T23:59:59Z'
477
- })
478
- ).toBeTruthy()
479
-
480
- expect(() =>
481
- ValidatedDateRangeSchema.parse({
482
- startDate: '2025-12-31T23:59:59Z',
483
- endDate: '2025-01-01T00:00:00Z'
484
- })
485
- ).toThrow()
486
- })
487
-
488
- it('rejects invalid date formats in range', () => {
489
- expect(() =>
490
- DateRangeSchema.parse({
491
- startDate: 'invalid',
492
- endDate: '2025-12-31T23:59:59Z'
493
- })
494
- ).toThrow()
495
- })
496
- })
497
-
498
- describe('ResourceTypeSchema', () => {
499
- it('accepts valid resource types', () => {
500
- expect(ResourceTypeSchema.parse('agent')).toBe('agent')
501
- expect(ResourceTypeSchema.parse('workflow')).toBe('workflow')
502
- })
503
-
504
- it('rejects invalid resource types', () => {
505
- const invalidTypes = ['invalid', 'scheduler', 'api', '']
506
-
507
- invalidTypes.forEach((type) => {
508
- expect(() => ResourceTypeSchema.parse(type)).toThrow()
509
- })
510
- })
511
- })
512
-
513
- describe('OriginResourceTypeSchema', () => {
514
- it('accepts all valid origin types', () => {
515
- const validOrigins = ['agent', 'workflow', 'scheduler', 'api']
516
-
517
- validOrigins.forEach((origin) => {
518
- expect(OriginResourceTypeSchema.parse(origin)).toBe(origin)
519
- })
520
- })
521
-
522
- it('rejects invalid origin types', () => {
523
- const invalidOrigins = ['invalid', 'user', 'system', '']
524
-
525
- invalidOrigins.forEach((origin) => {
526
- expect(() => OriginResourceTypeSchema.parse(origin)).toThrow()
527
- })
528
- })
529
- })
530
-
531
- describe('createEnumSchema', () => {
532
- it('creates enum validator', () => {
533
- const StatusSchema = createEnumSchema(['active', 'inactive', 'pending'])
534
-
535
- expect(StatusSchema.parse('active')).toBe('active')
536
- expect(StatusSchema.parse('inactive')).toBe('inactive')
537
- expect(StatusSchema.parse('pending')).toBe('pending')
538
- expect(() => StatusSchema.parse('invalid')).toThrow()
539
- })
540
-
541
- it('supports custom error message', () => {
542
- const StatusSchema = createEnumSchema(['active', 'inactive'], 'Status must be active or inactive')
543
-
544
- expect(StatusSchema.description).toBe('Status must be active or inactive')
545
- })
546
-
547
- it('works without error message', () => {
548
- const StatusSchema = createEnumSchema(['on', 'off'])
549
-
550
- expect(StatusSchema.parse('on')).toBe('on')
551
- expect(StatusSchema.parse('off')).toBe('off')
552
- })
553
- })
554
-
555
- describe('createStringSchema', () => {
556
- it('creates string with length constraints', () => {
557
- const UsernameSchema = createStringSchema(3, 20)
558
-
559
- expect(UsernameSchema.parse('abc')).toBe('abc')
560
- expect(UsernameSchema.parse('a'.repeat(20))).toBe('a'.repeat(20))
561
- expect(() => UsernameSchema.parse('ab')).toThrow()
562
- expect(() => UsernameSchema.parse('a'.repeat(21))).toThrow()
563
- })
564
-
565
- it('trims whitespace', () => {
566
- const schema = createStringSchema(3, 20)
567
- const result = schema.parse(' test ')
568
-
569
- expect(result).toBe('test')
570
- })
571
-
572
- it('supports field name for description', () => {
573
- const UsernameSchema = createStringSchema(3, 20, 'Username')
574
-
575
- expect(UsernameSchema.description).toBe('Username (3-20 characters)')
576
- })
577
-
578
- it('works without field name', () => {
579
- const schema = createStringSchema(5, 50)
580
-
581
- expect(schema.parse('valid string')).toBe('valid string')
582
- })
583
- })
584
-
585
- describe('createArraySchema', () => {
586
- it('creates array with size constraints', () => {
587
- const TagsSchema = createArraySchema(z.string(), 1, 3)
588
-
589
- expect(TagsSchema.parse(['tag1'])).toEqual(['tag1'])
590
- expect(TagsSchema.parse(['tag1', 'tag2'])).toEqual(['tag1', 'tag2'])
591
- expect(TagsSchema.parse(['tag1', 'tag2', 'tag3'])).toEqual(['tag1', 'tag2', 'tag3'])
592
- expect(() => TagsSchema.parse([])).toThrow()
593
- expect(() => TagsSchema.parse(['t1', 't2', 't3', 't4'])).toThrow()
594
- })
595
-
596
- it('validates item schema', () => {
597
- const EmailListSchema = createArraySchema(EmailSchema, 1, 5)
598
-
599
- expect(EmailListSchema.parse(['user@example.com'])).toEqual(['user@example.com'])
600
- expect(() => EmailListSchema.parse(['invalid'])).toThrow()
601
- })
602
-
603
- it('supports field name for description', () => {
604
- const TagsSchema = createArraySchema(z.string(), 1, 10, 'Tags')
605
-
606
- expect(TagsSchema.description).toBe('Tags (1-10 items)')
607
- })
608
-
609
- it('works with complex item schemas', () => {
610
- const UserSchema = z.object({
611
- id: UuidSchema,
612
- email: EmailSchema
613
- })
614
-
615
- const UsersArraySchema = createArraySchema(UserSchema, 1, 10)
616
-
617
- const result = UsersArraySchema.parse([{ id: '123e4567-e89b-12d3-a456-426614174000', email: 'user@example.com' }])
618
-
619
- expect(result).toHaveLength(1)
620
- })
621
- })
622
-
623
- describe('createPayloadSizeValidator', () => {
624
- it('accepts payload under size limit', () => {
625
- const PayloadSchema = createPayloadSizeValidator(500_000)
626
-
627
- const smallPayload = { data: 'test' }
628
- expect(PayloadSchema.parse(smallPayload)).toEqual(smallPayload)
629
- })
630
-
631
- it('rejects payload over size limit', () => {
632
- const PayloadSchema = createPayloadSizeValidator(100)
633
-
634
- const largePayload = { data: 'x'.repeat(1000) }
635
- expect(() => PayloadSchema.parse(largePayload)).toThrow()
636
- })
637
-
638
- it('validates serialized JSON size', () => {
639
- const PayloadSchema = createPayloadSizeValidator(50)
640
-
641
- expect(PayloadSchema.parse({ a: 'test' })).toEqual({ a: 'test' })
642
- expect(() => PayloadSchema.parse({ a: 'x'.repeat(100) })).toThrow()
643
- })
644
-
645
- it('accepts null as valid empty payload', () => {
646
- const PayloadSchema = createPayloadSizeValidator(100)
647
-
648
- expect(PayloadSchema.parse(null)).toBe(null)
649
- })
650
- })
651
-
652
- describe('Security Integration Tests', () => {
653
- it('prevents mass assignment with strict mode', () => {
654
- const CreateUserSchema = z
655
- .object({
656
- name: NonEmptyStringSchema,
657
- email: EmailSchema
658
- })
659
- .strict()
660
-
661
- expect(
662
- CreateUserSchema.parse({
663
- name: 'John Doe',
664
- email: 'john@example.com'
665
- })
666
- ).toBeTruthy()
667
-
668
- expect(() =>
669
- CreateUserSchema.parse({
670
- name: 'John Doe',
671
- email: 'john@example.com',
672
- isAdmin: true
673
- })
674
- ).toThrow()
675
- })
676
-
677
- it('combines validators for complex validation', () => {
678
- const CreateWorkflowSchema = z
679
- .object({
680
- workflowId: UuidSchema,
681
- name: NonEmptyStringSchema.max(100),
682
- description: NonEmptyStringSchema.max(500).optional(),
683
- tags: createArraySchema(NonEmptyStringSchema.max(50), 0, 10).optional(),
684
- webhookUrl: UrlSchema.optional()
685
- })
686
- .strict()
687
-
688
- const validInput = {
689
- workflowId: '123e4567-e89b-12d3-a456-426614174000',
690
- name: 'My Workflow',
691
- description: 'Test workflow',
692
- tags: ['automation', 'test'],
693
- webhookUrl: 'https://example.com/webhook'
694
- }
695
-
696
- expect(CreateWorkflowSchema.parse(validInput)).toBeTruthy()
697
- })
698
-
699
- it('validates pagination with filters', () => {
700
- const ListWorkflowsSchema = z.object({
701
- query: PaginationSchema.extend({
702
- status: z.enum(['active', 'inactive']).optional(),
703
- createdAfter: TimestampSchema.optional()
704
- })
705
- })
706
-
707
- const validQuery = {
708
- query: {
709
- limit: '50',
710
- offset: '0',
711
- status: 'active',
712
- createdAfter: '2025-01-01T00:00:00Z'
713
- }
714
- }
715
-
716
- const result = ListWorkflowsSchema.parse(validQuery)
717
- expect(result.query.limit).toBe(50)
718
- expect(result.query.offset).toBe(0)
719
- })
720
- })
721
-
722
- describe('formatZodValidationError', () => {
723
- describe('single field errors', () => {
724
- it('formats single field validation error', () => {
725
- const schema = z.object({ email: EmailSchema })
726
-
727
- try {
728
- schema.parse({ email: 'invalid-email' })
729
- } catch (error) {
730
- const formatted = formatZodValidationError(error as z.ZodError)
731
-
732
- expect(formatted.message).toBe('Validation failed on 1 field')
733
- expect(formatted.fields).toHaveProperty('email')
734
- expect(formatted.fields.email).toHaveLength(1)
735
- expect(formatted.fields.email[0]).toContain('Invalid email')
736
- }
737
- })
738
- })
739
-
740
- describe('multiple field errors', () => {
741
- it('formats multiple field validation errors', () => {
742
- const schema = z.object({
743
- email: EmailSchema,
744
- age: z.number().min(18),
745
- name: NonEmptyStringSchema
746
- })
747
-
748
- try {
749
- schema.parse({ email: 'invalid', age: 15, name: '' })
750
- } catch (error) {
751
- const formatted = formatZodValidationError(error as z.ZodError)
752
-
753
- expect(formatted.message).toBe('Validation failed on 3 fields')
754
- expect(formatted.fields).toHaveProperty('email')
755
- expect(formatted.fields).toHaveProperty('age')
756
- expect(formatted.fields).toHaveProperty('name')
757
- }
758
- })
759
-
760
- it('formats refine validation errors on fields', () => {
761
- // Real-world pattern: custom validation using refine()
762
- const schema = z.object({
763
- password: z.string().refine((val) => val.length >= 8, 'Password must be at least 8 characters')
764
- })
765
-
766
- try {
767
- schema.parse({ password: 'short' })
768
- } catch (error) {
769
- if (error instanceof z.ZodError) {
770
- const formatted = formatZodValidationError(error)
771
-
772
- expect(formatted.fields.password).toHaveLength(1)
773
- expect(formatted.fields.password[0]).toContain('8 characters')
774
- } else {
775
- throw error
776
- }
777
- }
778
- })
779
- })
780
-
781
- describe('nested object errors', () => {
782
- it('formats nested field paths with dot notation', () => {
783
- const schema = z.object({
784
- user: z.object({
785
- profile: z.object({
786
- email: EmailSchema
787
- })
788
- })
789
- })
790
-
791
- try {
792
- schema.parse({ user: { profile: { email: 'invalid' } } })
793
- } catch (error) {
794
- const formatted = formatZodValidationError(error as z.ZodError)
795
-
796
- expect(formatted.fields).toHaveProperty('user.profile.email')
797
- expect(formatted.fields['user.profile.email'][0]).toContain('Invalid email')
798
- }
799
- })
800
-
801
- it('formats multiple nested errors', () => {
802
- const schema = z.object({
803
- user: z.object({
804
- email: EmailSchema,
805
- profile: z.object({
806
- age: z.number().min(18)
807
- })
808
- })
809
- })
810
-
811
- try {
812
- schema.parse({ user: { email: 'bad', profile: { age: 15 } } })
813
- } catch (error) {
814
- const formatted = formatZodValidationError(error as z.ZodError)
815
-
816
- expect(formatted.message).toBe('Validation failed on 2 fields')
817
- expect(formatted.fields).toHaveProperty('user.email')
818
- expect(formatted.fields).toHaveProperty('user.profile.age')
819
- }
820
- })
821
-
822
- it('formats refine errors on nested fields', () => {
823
- // Real-world pattern: nested object with custom validation
824
- const schema = z.object({
825
- user: z.object({
826
- age: z.number().refine((val) => val >= 18, 'Must be 18 or older')
827
- })
828
- })
829
-
830
- try {
831
- schema.parse({ user: { age: 15 } })
832
- } catch (error) {
833
- if (error instanceof z.ZodError) {
834
- const formatted = formatZodValidationError(error)
835
-
836
- expect(formatted.fields).toHaveProperty('user.age')
837
- expect(formatted.fields['user.age'][0]).toContain('18 or older')
838
- } else {
839
- throw error
840
- }
841
- }
842
- })
843
- })
844
-
845
- describe('array errors', () => {
846
- it('formats array item validation errors', () => {
847
- const schema = z.object({
848
- items: z.array(z.object({ id: UuidSchema }))
849
- })
850
-
851
- try {
852
- schema.parse({ items: [{ id: 'invalid' }] })
853
- } catch (error) {
854
- const formatted = formatZodValidationError(error as z.ZodError)
855
-
856
- expect(formatted.fields).toHaveProperty('items.0.id')
857
- }
858
- })
859
-
860
- it('formats multiple array item errors', () => {
861
- const schema = z.object({
862
- emails: z.array(EmailSchema)
863
- })
864
-
865
- try {
866
- schema.parse({ emails: ['valid@test.com', 'invalid', 'also-invalid'] })
867
- } catch (error) {
868
- const formatted = formatZodValidationError(error as z.ZodError)
869
-
870
- expect(formatted.message).toBe('Validation failed on 2 fields')
871
- expect(formatted.fields).toHaveProperty('emails.1')
872
- expect(formatted.fields).toHaveProperty('emails.2')
873
- }
874
- })
875
-
876
- it('formats refine errors in array items', () => {
877
- // Real-world pattern: array items with custom validation
878
- const ItemSchema = z.object({
879
- value: z.number().refine((val) => val > 0, 'Value must be positive')
880
- })
881
-
882
- const schema = z.object({
883
- items: z.array(ItemSchema)
884
- })
885
-
886
- try {
887
- schema.parse({
888
- items: [
889
- { value: 10 },
890
- { value: -5 }, // Invalid
891
- { value: 20 }
892
- ]
893
- })
894
- } catch (error) {
895
- if (error instanceof z.ZodError) {
896
- const formatted = formatZodValidationError(error)
897
-
898
- expect(formatted.fields).toHaveProperty('items.1.value')
899
- expect(formatted.fields['items.1.value'][0]).toContain('positive')
900
- } else {
901
- throw error
902
- }
903
- }
904
- })
905
- })
906
-
907
- describe('strict mode errors', () => {
908
- it('formats unknown field errors from strict mode (mass assignment prevention)', () => {
909
- const schema = z
910
- .object({
911
- name: NonEmptyStringSchema
912
- })
913
- .strict()
914
-
915
- try {
916
- schema.parse({ name: 'John', isAdmin: true, role: 'admin' })
917
- } catch (error) {
918
- const formatted = formatZodValidationError(error as z.ZodError)
919
-
920
- // Zod groups all unrecognized keys into one root error (security feature)
921
- expect(formatted.message).toContain('Validation failed')
922
- expect(formatted.fields._root).toBeDefined()
923
- expect(formatted.fields._root[0]).toContain('Unrecognized key')
924
- }
925
- })
926
- })
927
-
928
- describe('root-level errors', () => {
929
- it('formats root-level validation errors with _root key', () => {
930
- const schema = z.string().min(5)
931
-
932
- try {
933
- schema.parse('abc')
934
- } catch (error) {
935
- const formatted = formatZodValidationError(error as z.ZodError)
936
-
937
- expect(formatted.fields).toHaveProperty('_root')
938
- expect(formatted.fields._root[0]).toContain('5')
939
- }
940
- })
941
-
942
- it('formats union type errors', () => {
943
- const schema = z.union([z.string(), z.number()])
944
-
945
- try {
946
- schema.parse(true)
947
- } catch (error) {
948
- const formatted = formatZodValidationError(error as z.ZodError)
949
-
950
- expect(formatted.fields).toHaveProperty('_root')
951
- }
952
- })
953
- })
954
-
955
- describe('real-world API scenarios', () => {
956
- it('formats credential creation validation errors', () => {
957
- const schema = z
958
- .object({
959
- name: CredentialNameSchema,
960
- type: z.enum(['oauth', 'api-key']),
961
- value: z.record(z.unknown()).refine((val) => Object.keys(val).length > 0, 'Value must not be empty')
962
- })
963
- .strict()
964
-
965
- try {
966
- schema.parse({
967
- name: '../admin-cred',
968
- type: 'invalid-type',
969
- value: {},
970
- organizationId: 'injected-value'
971
- })
972
- } catch (error) {
973
- const formatted = formatZodValidationError(error as z.ZodError)
974
-
975
- expect(formatted.fields).toHaveProperty('name')
976
- expect(formatted.fields).toHaveProperty('type')
977
- expect(formatted.fields).toHaveProperty('value')
978
- expect(formatted.fields).toHaveProperty('_root') // organizationId causes unrecognized key error
979
- }
980
- })
981
-
982
- it('formats session turn execution validation errors', () => {
983
- const schema = z
984
- .object({
985
- input: z.unknown().refine((val) => JSON.stringify(val).length <= 10_000, 'Input exceeds 10,000 characters'),
986
- metadata: z.record(z.unknown()).optional()
987
- })
988
- .strict()
989
-
990
- try {
991
- schema.parse({
992
- input: { data: 'x'.repeat(20_000) },
993
- invalidField: 'test'
994
- })
995
- } catch (error) {
996
- const formatted = formatZodValidationError(error as z.ZodError)
997
-
998
- expect(formatted.fields).toHaveProperty('input')
999
- expect(formatted.fields.input[0]).toContain('10,000 characters')
1000
- expect(formatted.fields).toHaveProperty('_root') // invalidField causes unrecognized key error
1001
- }
1002
- })
1003
-
1004
- it('formats pagination query validation errors', () => {
1005
- const schema = PaginationSchema
1006
-
1007
- try {
1008
- schema.parse({ limit: '500', offset: '-10' })
1009
- } catch (error) {
1010
- const formatted = formatZodValidationError(error as z.ZodError)
1011
-
1012
- expect(formatted.fields).toHaveProperty('limit')
1013
- expect(formatted.fields).toHaveProperty('offset')
1014
- }
1015
- })
1016
- })
1017
-
1018
- describe('edge cases', () => {
1019
- it('handles empty error list gracefully', () => {
1020
- // This shouldn't happen in practice, but test defensive coding
1021
- const emptyError = new z.ZodError([])
1022
- const formatted = formatZodValidationError(emptyError)
1023
-
1024
- expect(formatted.message).toBe('Validation failed on 0 fields')
1025
- expect(formatted.fields).toEqual({})
1026
- })
1027
-
1028
- it('handles very long field paths', () => {
1029
- const schema = z.object({
1030
- level1: z.object({
1031
- level2: z.object({
1032
- level3: z.object({
1033
- level4: z.object({
1034
- email: EmailSchema
1035
- })
1036
- })
1037
- })
1038
- })
1039
- })
1040
-
1041
- try {
1042
- schema.parse({
1043
- level1: {
1044
- level2: {
1045
- level3: {
1046
- level4: {
1047
- email: 'invalid'
1048
- }
1049
- }
1050
- }
1051
- }
1052
- })
1053
- } catch (error) {
1054
- const formatted = formatZodValidationError(error as z.ZodError)
1055
-
1056
- expect(formatted.fields).toHaveProperty('level1.level2.level3.level4.email')
1057
- }
1058
- })
1059
-
1060
- it('uses correct singular/plural in message', () => {
1061
- const schema = z.object({ email: EmailSchema })
1062
-
1063
- try {
1064
- schema.parse({ email: 'invalid' })
1065
- } catch (error) {
1066
- const formatted = formatZodValidationError(error as z.ZodError)
1067
- expect(formatted.message).toContain('1 field')
1068
- }
1069
-
1070
- const multiSchema = z.object({
1071
- email: EmailSchema,
1072
- name: NonEmptyStringSchema
1073
- })
1074
-
1075
- try {
1076
- multiSchema.parse({ email: 'invalid', name: '' })
1077
- } catch (error) {
1078
- const formatted = formatZodValidationError(error as z.ZodError)
1079
- expect(formatted.message).toContain('2 fields')
1080
- }
1081
- })
1082
- })
1083
- })
1
+ /**
2
+ * Comprehensive unit tests for common validation utilities
3
+ *
4
+ * Test Coverage:
5
+ * - All primitive validators (UUID, Email, URL, Timestamp)
6
+ * - Schema composition (Pagination, DateRange)
7
+ * - Factory functions (createEnumSchema, createStringSchema, createArraySchema)
8
+ * - Edge cases and attack vectors
9
+ * - Security validations (path traversal, SQL injection, XSS, DoS)
10
+ */
11
+
12
+ import { describe, it, expect } from 'vitest'
13
+ import { z } from 'zod'
14
+ import {
15
+ UuidSchema,
16
+ NonEmptyStringSchema,
17
+ EmailSchema,
18
+ UrlSchema,
19
+ PaginationSchema,
20
+ TimestampSchema,
21
+ DateRangeSchema,
22
+ ResourceTypeSchema,
23
+ OriginResourceTypeSchema,
24
+ CredentialNameSchema,
25
+ OrganizationIdSchema,
26
+ OAuthProviderSchema,
27
+ OAuthCodeSchema,
28
+ OAuthStateParamSchema,
29
+ SanitizedStringSchema,
30
+ createEnumSchema,
31
+ createStringSchema,
32
+ createArraySchema,
33
+ createPayloadSizeValidator,
34
+ formatZodValidationError
35
+ } from '../validation'
36
+
37
+ describe('UuidSchema', () => {
38
+ it('accepts valid UUID v4', () => {
39
+ const validUuid = 'a0eebc99-9c0b-4ef8-bb6d-6bb9bd380a11'
40
+ expect(UuidSchema.parse(validUuid)).toBe(validUuid)
41
+ })
42
+
43
+ it('accepts valid UUID v1', () => {
44
+ const validUuid = '550e8400-e29b-11d4-a716-446655440000'
45
+ expect(UuidSchema.parse(validUuid)).toBe(validUuid)
46
+ })
47
+
48
+ it('rejects invalid UUID format', () => {
49
+ expect(() => UuidSchema.parse('not-a-uuid')).toThrow()
50
+ expect(() => UuidSchema.parse('12345')).toThrow()
51
+ expect(() => UuidSchema.parse('')).toThrow()
52
+ })
53
+
54
+ it('rejects UUID-like strings with wrong format', () => {
55
+ expect(() => UuidSchema.parse('a0eebc99-9c0b-4ef8-bb6d')).toThrow()
56
+ expect(() => UuidSchema.parse('a0eebc999c0b4ef8bb6d6bb9bd380a11')).toThrow()
57
+ })
58
+ })
59
+
60
+ describe('CredentialNameSchema', () => {
61
+ describe('valid credential names', () => {
62
+ it('accepts lowercase with hyphens (service-env format)', () => {
63
+ expect(CredentialNameSchema.parse('gmail-prod')).toBe('gmail-prod')
64
+ expect(CredentialNameSchema.parse('notion-dev')).toBe('notion-dev')
65
+ expect(CredentialNameSchema.parse('stripe-api-key')).toBe('stripe-api-key')
66
+ })
67
+
68
+ it('accepts multi-segment names', () => {
69
+ expect(CredentialNameSchema.parse('notion-dev-2024')).toBe('notion-dev-2024')
70
+ expect(CredentialNameSchema.parse('google-sheets-prod')).toBe('google-sheets-prod')
71
+ })
72
+
73
+ it('auto-lowercases input', () => {
74
+ expect(CredentialNameSchema.parse('Gmail-Prod')).toBe('gmail-prod')
75
+ expect(CredentialNameSchema.parse('NOTION-DEV')).toBe('notion-dev')
76
+ })
77
+
78
+ it('trims whitespace', () => {
79
+ expect(CredentialNameSchema.parse(' gmail-prod ')).toBe('gmail-prod')
80
+ })
81
+
82
+ it('accepts numbers in segments', () => {
83
+ expect(CredentialNameSchema.parse('api-v2')).toBe('api-v2')
84
+ expect(CredentialNameSchema.parse('s3-bucket-01')).toBe('s3-bucket-01')
85
+ })
86
+ })
87
+
88
+ describe('format enforcement', () => {
89
+ it('rejects names without hyphens (must have service-env format)', () => {
90
+ expect(() => CredentialNameSchema.parse('gmailprod')).toThrow(/must be lowercase/)
91
+ expect(() => CredentialNameSchema.parse('12345')).toThrow(/must be lowercase/)
92
+ })
93
+
94
+ it('rejects underscores', () => {
95
+ expect(() => CredentialNameSchema.parse('gmail_prod')).toThrow(/must be lowercase/)
96
+ expect(() => CredentialNameSchema.parse('notion_dev_2024')).toThrow(/must be lowercase/)
97
+ })
98
+
99
+ it('rejects sequential hyphens', () => {
100
+ expect(() => CredentialNameSchema.parse('gmail--prod')).toThrow(/must be lowercase/)
101
+ expect(() => CredentialNameSchema.parse('notion----dev')).toThrow(/must be lowercase/)
102
+ })
103
+
104
+ it('rejects leading or trailing hyphens', () => {
105
+ expect(() => CredentialNameSchema.parse('-gmail-prod')).toThrow(/must be lowercase/)
106
+ expect(() => CredentialNameSchema.parse('gmail-prod-')).toThrow(/must be lowercase/)
107
+ })
108
+ })
109
+
110
+ describe('SECURITY: path traversal prevention', () => {
111
+ it('rejects path traversal attempts', () => {
112
+ expect(() => CredentialNameSchema.parse('../admin-cred')).toThrow(/must be lowercase/)
113
+ expect(() => CredentialNameSchema.parse('../../secrets')).toThrow(/must be lowercase/)
114
+ expect(() => CredentialNameSchema.parse('./../config')).toThrow(/must be lowercase/)
115
+ })
116
+
117
+ it('rejects relative path characters', () => {
118
+ expect(() => CredentialNameSchema.parse('./local-cred')).toThrow(/must be lowercase/)
119
+ expect(() => CredentialNameSchema.parse('../parent')).toThrow(/must be lowercase/)
120
+ })
121
+ })
122
+
123
+ describe('SECURITY: special character prevention', () => {
124
+ it('rejects names with spaces', () => {
125
+ expect(() => CredentialNameSchema.parse('gmail prod')).toThrow(/must be lowercase/)
126
+ expect(() => CredentialNameSchema.parse('notion dev 2024')).toThrow(/must be lowercase/)
127
+ })
128
+
129
+ it('rejects names with special characters', () => {
130
+ expect(() => CredentialNameSchema.parse('gmail@prod')).toThrow(/must be lowercase/)
131
+ expect(() => CredentialNameSchema.parse('notion#dev')).toThrow(/must be lowercase/)
132
+ expect(() => CredentialNameSchema.parse('slack$prod')).toThrow(/must be lowercase/)
133
+ expect(() => CredentialNameSchema.parse('attio%dev')).toThrow(/must be lowercase/)
134
+ })
135
+
136
+ it('rejects SQL injection attempts', () => {
137
+ expect(() => CredentialNameSchema.parse("' OR '1'='1")).toThrow(/must be lowercase/)
138
+ expect(() => CredentialNameSchema.parse("admin'; DROP TABLE credentials;--")).toThrow(/must be lowercase/)
139
+ })
140
+
141
+ it('rejects shell injection attempts', () => {
142
+ expect(() => CredentialNameSchema.parse('cred; rm -rf /')).toThrow(/must be lowercase/)
143
+ expect(() => CredentialNameSchema.parse('cred && malicious')).toThrow(/must be lowercase/)
144
+ })
145
+ })
146
+
147
+ describe('SECURITY: DoS prevention', () => {
148
+ it('rejects empty names', () => {
149
+ expect(() => CredentialNameSchema.parse('')).toThrow(/required/)
150
+ expect(() => CredentialNameSchema.parse(' ')).toThrow(/required/)
151
+ })
152
+
153
+ it('rejects names too long (over 100 chars)', () => {
154
+ const longName = 'a-' + 'b'.repeat(99)
155
+ expect(() => CredentialNameSchema.parse(longName)).toThrow(/too long/)
156
+ })
157
+
158
+ it('accepts names at max length (100 chars)', () => {
159
+ // 100 chars: 49 'a' + '-' + 49 'b' + 'c' = a{49}-b{49}c
160
+ const maxName = 'a'.repeat(49) + '-' + 'b'.repeat(49) + 'c'
161
+ expect(CredentialNameSchema.parse(maxName)).toBe(maxName)
162
+ })
163
+ })
164
+ })
165
+
166
+ describe('OrganizationIdSchema', () => {
167
+ it('is an alias for UuidSchema', () => {
168
+ const validUuid = 'a0eebc99-9c0b-4ef8-bb6d-6bb9bd380a11'
169
+ expect(OrganizationIdSchema.parse(validUuid)).toBe(validUuid)
170
+ })
171
+
172
+ it('rejects invalid UUIDs', () => {
173
+ expect(() => OrganizationIdSchema.parse('not-a-uuid')).toThrow()
174
+ })
175
+ })
176
+
177
+ describe('OAuthProviderSchema', () => {
178
+ it('accepts valid OAuth providers', () => {
179
+ expect(OAuthProviderSchema.parse('dropbox')).toBe('dropbox')
180
+ expect(OAuthProviderSchema.parse('google-sheets')).toBe('google-sheets')
181
+ expect(OAuthProviderSchema.parse('google-calendar')).toBe('google-calendar')
182
+ })
183
+
184
+ it('rejects unknown providers', () => {
185
+ expect(() => OAuthProviderSchema.parse('slack')).toThrow()
186
+ expect(() => OAuthProviderSchema.parse('attio')).toThrow()
187
+ expect(() => OAuthProviderSchema.parse('github')).toThrow()
188
+ expect(() => OAuthProviderSchema.parse('invalid')).toThrow()
189
+ })
190
+
191
+ it('rejects empty string', () => {
192
+ expect(() => OAuthProviderSchema.parse('')).toThrow()
193
+ })
194
+ })
195
+
196
+ describe('OAuthCodeSchema', () => {
197
+ it('accepts valid OAuth authorization codes', () => {
198
+ const validCode = 'a'.repeat(50)
199
+ expect(OAuthCodeSchema.parse(validCode)).toBe(validCode)
200
+ })
201
+
202
+ it('accepts codes at minimum length (10 chars)', () => {
203
+ const minCode = 'a'.repeat(10)
204
+ expect(OAuthCodeSchema.parse(minCode)).toBe(minCode)
205
+ })
206
+
207
+ it('accepts codes at maximum length (1000 chars)', () => {
208
+ const maxCode = 'a'.repeat(1000)
209
+ expect(OAuthCodeSchema.parse(maxCode)).toBe(maxCode)
210
+ })
211
+
212
+ it('rejects codes too short (DoS prevention)', () => {
213
+ const shortCode = 'a'.repeat(9)
214
+ expect(() => OAuthCodeSchema.parse(shortCode)).toThrow(/too short/)
215
+ })
216
+
217
+ it('rejects codes too long (DoS prevention)', () => {
218
+ const longCode = 'a'.repeat(1001)
219
+ expect(() => OAuthCodeSchema.parse(longCode)).toThrow(/too long/)
220
+ })
221
+ })
222
+
223
+ describe('OAuthStateParamSchema', () => {
224
+ it('accepts valid state parameters', () => {
225
+ const validState = 'eyJvcmdhbml6YXRpb25JZCI6InRlc3QifQ=='
226
+ expect(OAuthStateParamSchema.parse(validState)).toBe(validState)
227
+ })
228
+
229
+ it('accepts state at minimum length (10 chars)', () => {
230
+ const minState = 'a'.repeat(10)
231
+ expect(OAuthStateParamSchema.parse(minState)).toBe(minState)
232
+ })
233
+
234
+ it('accepts state at maximum length (2048 chars)', () => {
235
+ const maxState = 'a'.repeat(2048)
236
+ expect(OAuthStateParamSchema.parse(maxState)).toBe(maxState)
237
+ })
238
+
239
+ it('rejects state too short', () => {
240
+ const shortState = 'a'.repeat(9)
241
+ expect(() => OAuthStateParamSchema.parse(shortState)).toThrow(/too short/)
242
+ })
243
+
244
+ it('rejects state too long (DoS prevention)', () => {
245
+ const longState = 'a'.repeat(2049)
246
+ expect(() => OAuthStateParamSchema.parse(longState)).toThrow(/too long/)
247
+ })
248
+ })
249
+
250
+ describe('NonEmptyStringSchema', () => {
251
+ it('accepts valid non-empty strings', () => {
252
+ expect(NonEmptyStringSchema.parse('test')).toBe('test')
253
+ expect(NonEmptyStringSchema.parse('a')).toBe('a')
254
+ })
255
+
256
+ it('trims whitespace', () => {
257
+ expect(NonEmptyStringSchema.parse(' test ')).toBe('test')
258
+ })
259
+
260
+ it('rejects empty strings', () => {
261
+ expect(() => NonEmptyStringSchema.parse('')).toThrow()
262
+ })
263
+
264
+ it('rejects whitespace-only strings', () => {
265
+ // .trim() runs BEFORE .min(1), so ' ' is trimmed to '' which fails min(1)
266
+ const result = NonEmptyStringSchema.safeParse(' ')
267
+ expect(result.success).toBe(false)
268
+ })
269
+
270
+ it('accepts strings up to max length (1000 chars)', () => {
271
+ const maxString = 'a'.repeat(1000)
272
+ expect(NonEmptyStringSchema.parse(maxString)).toBe(maxString)
273
+ })
274
+
275
+ it('rejects strings over max length (DoS prevention)', () => {
276
+ const tooLong = 'a'.repeat(1001)
277
+ expect(() => NonEmptyStringSchema.parse(tooLong)).toThrow()
278
+ })
279
+ })
280
+
281
+ describe('SanitizedStringSchema', () => {
282
+ it('removes dangerous characters', () => {
283
+ expect(SanitizedStringSchema.parse('hello<script>world')).toBe('helloscriptworld')
284
+ expect(SanitizedStringSchema.parse('test>value')).toBe('testvalue')
285
+ expect(SanitizedStringSchema.parse("test'value")).toBe('testvalue')
286
+ expect(SanitizedStringSchema.parse('test"value')).toBe('testvalue')
287
+ })
288
+
289
+ it('removes all dangerous characters in one string', () => {
290
+ expect(SanitizedStringSchema.parse(`<>"'`)).toBe('')
291
+ })
292
+
293
+ it('trims whitespace', () => {
294
+ expect(SanitizedStringSchema.parse(' test ')).toBe('test')
295
+ })
296
+
297
+ it('preserves safe characters', () => {
298
+ expect(SanitizedStringSchema.parse('hello-world_123')).toBe('hello-world_123')
299
+ expect(SanitizedStringSchema.parse('test@example.com')).toBe('test@example.com')
300
+ })
301
+ })
302
+
303
+ describe('EmailSchema', () => {
304
+ it('accepts valid email addresses', () => {
305
+ const validEmails = [
306
+ 'user@example.com',
307
+ 'test.user@example.co.uk',
308
+ 'user+tag@example.com',
309
+ 'user_name@example-domain.com'
310
+ ]
311
+
312
+ validEmails.forEach((email) => {
313
+ expect(EmailSchema.parse(email)).toBe(email)
314
+ })
315
+ })
316
+
317
+ it('rejects invalid email formats', () => {
318
+ const invalidEmails = [
319
+ 'not-an-email',
320
+ '@example.com',
321
+ 'user@',
322
+ 'user @example.com',
323
+ 'user@example',
324
+ '',
325
+ 'user@@example.com'
326
+ ]
327
+
328
+ invalidEmails.forEach((email) => {
329
+ expect(() => EmailSchema.parse(email)).toThrow()
330
+ })
331
+ })
332
+
333
+ it('prevents email header injection', () => {
334
+ const injectionAttempts = ['user@example.com\nBcc: attacker@evil.com', 'user@example.com\r\nCc: spam@spam.com']
335
+
336
+ injectionAttempts.forEach((attempt) => {
337
+ expect(() => EmailSchema.parse(attempt)).toThrow()
338
+ })
339
+ })
340
+ })
341
+
342
+ describe('UrlSchema', () => {
343
+ it('accepts valid HTTP URLs', () => {
344
+ expect(UrlSchema.parse('http://example.com')).toBe('http://example.com')
345
+ })
346
+
347
+ it('accepts valid HTTPS URLs', () => {
348
+ const validUrls = [
349
+ 'https://example.com',
350
+ 'https://example.com/path',
351
+ 'https://example.com/path?query=value',
352
+ 'https://sub.example.com',
353
+ 'https://example.com:8080/path'
354
+ ]
355
+
356
+ validUrls.forEach((url) => {
357
+ expect(UrlSchema.parse(url)).toBe(url)
358
+ })
359
+ })
360
+
361
+ it('rejects invalid URL formats', () => {
362
+ const invalidUrls = [
363
+ 'not-a-url',
364
+ 'example.com', // Missing protocol
365
+ ''
366
+ ]
367
+
368
+ invalidUrls.forEach((url) => {
369
+ expect(() => UrlSchema.parse(url)).toThrow()
370
+ })
371
+ })
372
+
373
+ it('accepts all valid URL schemes (including javascript: and ftp:)', () => {
374
+ // Note: Zod's .url() validator accepts ALL valid URL schemes
375
+ // This includes potentially dangerous ones like javascript:
376
+ // For HTTP/HTTPS only, use a refinement (see example below)
377
+ expect(UrlSchema.parse('ftp://example.com')).toBe('ftp://example.com')
378
+ expect(UrlSchema.parse('javascript:alert(1)')).toBe('javascript:alert(1)')
379
+ })
380
+
381
+ it('can be refined for HTTPS-only', () => {
382
+ const SecureUrlSchema = UrlSchema.refine((url) => url.startsWith('https://'), { message: 'HTTPS required' })
383
+
384
+ expect(SecureUrlSchema.parse('https://example.com')).toBe('https://example.com')
385
+ expect(() => SecureUrlSchema.parse('http://example.com')).toThrow()
386
+ })
387
+ })
388
+
389
+ describe('PaginationSchema', () => {
390
+ it('accepts valid pagination parameters', () => {
391
+ const result = PaginationSchema.parse({ limit: 20, offset: 0 })
392
+ expect(result).toEqual({ limit: 20, offset: 0 })
393
+ })
394
+
395
+ it('coerces string to number', () => {
396
+ const result = PaginationSchema.parse({ limit: '50', offset: '100' })
397
+ expect(result).toEqual({ limit: 50, offset: 100 })
398
+ })
399
+
400
+ it('uses default values when not provided', () => {
401
+ const result = PaginationSchema.parse({})
402
+ expect(result).toEqual({ limit: 20, offset: 0 })
403
+ })
404
+
405
+ it('rejects limit over 100 (DoS protection)', () => {
406
+ expect(() => PaginationSchema.parse({ limit: 101 })).toThrow()
407
+ })
408
+
409
+ it('accepts limit of exactly 100', () => {
410
+ const result = PaginationSchema.parse({ limit: 100 })
411
+ expect(result.limit).toBe(100)
412
+ })
413
+
414
+ it('rejects limit of 0', () => {
415
+ expect(() => PaginationSchema.parse({ limit: 0 })).toThrow()
416
+ })
417
+
418
+ it('rejects negative offset', () => {
419
+ expect(() => PaginationSchema.parse({ offset: -1 })).toThrow()
420
+ })
421
+
422
+ it('can be extended with additional filters', () => {
423
+ const FilteredListSchema = PaginationSchema.extend({
424
+ status: z.enum(['active', 'inactive']),
425
+ search: z.string().optional()
426
+ })
427
+
428
+ const result = FilteredListSchema.parse({
429
+ limit: 50,
430
+ offset: 0,
431
+ status: 'active',
432
+ search: 'test'
433
+ })
434
+
435
+ expect(result.status).toBe('active')
436
+ })
437
+ })
438
+
439
+ describe('TimestampSchema', () => {
440
+ it('accepts valid ISO 8601 datetime', () => {
441
+ const validTimestamps = ['2025-11-13T10:30:00Z', '2025-01-01T00:00:00.000Z', '2025-12-31T23:59:59.999Z']
442
+
443
+ validTimestamps.forEach((timestamp) => {
444
+ expect(TimestampSchema.parse(timestamp)).toBe(timestamp)
445
+ })
446
+ })
447
+
448
+ it('rejects invalid datetime formats', () => {
449
+ const invalidTimestamps = ['invalid-date', '2025-01-01 00:00:00', '2025-01-01', '', '01/01/2025']
450
+
451
+ invalidTimestamps.forEach((timestamp) => {
452
+ expect(() => TimestampSchema.parse(timestamp)).toThrow()
453
+ })
454
+ })
455
+ })
456
+
457
+ describe('DateRangeSchema', () => {
458
+ it('accepts valid date range', () => {
459
+ const result = DateRangeSchema.parse({
460
+ startDate: '2025-01-01T00:00:00Z',
461
+ endDate: '2025-12-31T23:59:59Z'
462
+ })
463
+
464
+ expect(result.startDate).toBe('2025-01-01T00:00:00Z')
465
+ expect(result.endDate).toBe('2025-12-31T23:59:59Z')
466
+ })
467
+
468
+ it('can be refined for logical validation (end > start)', () => {
469
+ const ValidatedDateRangeSchema = DateRangeSchema.refine(
470
+ (data) => new Date(data.endDate) > new Date(data.startDate),
471
+ { message: 'End date must be after start date' }
472
+ )
473
+
474
+ expect(
475
+ ValidatedDateRangeSchema.parse({
476
+ startDate: '2025-01-01T00:00:00Z',
477
+ endDate: '2025-12-31T23:59:59Z'
478
+ })
479
+ ).toBeTruthy()
480
+
481
+ expect(() =>
482
+ ValidatedDateRangeSchema.parse({
483
+ startDate: '2025-12-31T23:59:59Z',
484
+ endDate: '2025-01-01T00:00:00Z'
485
+ })
486
+ ).toThrow()
487
+ })
488
+
489
+ it('rejects invalid date formats in range', () => {
490
+ expect(() =>
491
+ DateRangeSchema.parse({
492
+ startDate: 'invalid',
493
+ endDate: '2025-12-31T23:59:59Z'
494
+ })
495
+ ).toThrow()
496
+ })
497
+ })
498
+
499
+ describe('ResourceTypeSchema', () => {
500
+ it('accepts valid resource types', () => {
501
+ expect(ResourceTypeSchema.parse('agent')).toBe('agent')
502
+ expect(ResourceTypeSchema.parse('workflow')).toBe('workflow')
503
+ })
504
+
505
+ it('rejects invalid resource types', () => {
506
+ const invalidTypes = ['invalid', 'scheduler', 'api', '']
507
+
508
+ invalidTypes.forEach((type) => {
509
+ expect(() => ResourceTypeSchema.parse(type)).toThrow()
510
+ })
511
+ })
512
+ })
513
+
514
+ describe('OriginResourceTypeSchema', () => {
515
+ it('accepts all valid origin types', () => {
516
+ const validOrigins = ['agent', 'workflow', 'scheduler', 'api']
517
+
518
+ validOrigins.forEach((origin) => {
519
+ expect(OriginResourceTypeSchema.parse(origin)).toBe(origin)
520
+ })
521
+ })
522
+
523
+ it('rejects invalid origin types', () => {
524
+ const invalidOrigins = ['invalid', 'user', 'system', '']
525
+
526
+ invalidOrigins.forEach((origin) => {
527
+ expect(() => OriginResourceTypeSchema.parse(origin)).toThrow()
528
+ })
529
+ })
530
+ })
531
+
532
+ describe('createEnumSchema', () => {
533
+ it('creates enum validator', () => {
534
+ const StatusSchema = createEnumSchema(['active', 'inactive', 'pending'])
535
+
536
+ expect(StatusSchema.parse('active')).toBe('active')
537
+ expect(StatusSchema.parse('inactive')).toBe('inactive')
538
+ expect(StatusSchema.parse('pending')).toBe('pending')
539
+ expect(() => StatusSchema.parse('invalid')).toThrow()
540
+ })
541
+
542
+ it('supports custom error message', () => {
543
+ const StatusSchema = createEnumSchema(['active', 'inactive'], 'Status must be active or inactive')
544
+
545
+ expect(StatusSchema.description).toBe('Status must be active or inactive')
546
+ })
547
+
548
+ it('works without error message', () => {
549
+ const StatusSchema = createEnumSchema(['on', 'off'])
550
+
551
+ expect(StatusSchema.parse('on')).toBe('on')
552
+ expect(StatusSchema.parse('off')).toBe('off')
553
+ })
554
+ })
555
+
556
+ describe('createStringSchema', () => {
557
+ it('creates string with length constraints', () => {
558
+ const UsernameSchema = createStringSchema(3, 20)
559
+
560
+ expect(UsernameSchema.parse('abc')).toBe('abc')
561
+ expect(UsernameSchema.parse('a'.repeat(20))).toBe('a'.repeat(20))
562
+ expect(() => UsernameSchema.parse('ab')).toThrow()
563
+ expect(() => UsernameSchema.parse('a'.repeat(21))).toThrow()
564
+ })
565
+
566
+ it('trims whitespace', () => {
567
+ const schema = createStringSchema(3, 20)
568
+ const result = schema.parse(' test ')
569
+
570
+ expect(result).toBe('test')
571
+ })
572
+
573
+ it('supports field name for description', () => {
574
+ const UsernameSchema = createStringSchema(3, 20, 'Username')
575
+
576
+ expect(UsernameSchema.description).toBe('Username (3-20 characters)')
577
+ })
578
+
579
+ it('works without field name', () => {
580
+ const schema = createStringSchema(5, 50)
581
+
582
+ expect(schema.parse('valid string')).toBe('valid string')
583
+ })
584
+ })
585
+
586
+ describe('createArraySchema', () => {
587
+ it('creates array with size constraints', () => {
588
+ const TagsSchema = createArraySchema(z.string(), 1, 3)
589
+
590
+ expect(TagsSchema.parse(['tag1'])).toEqual(['tag1'])
591
+ expect(TagsSchema.parse(['tag1', 'tag2'])).toEqual(['tag1', 'tag2'])
592
+ expect(TagsSchema.parse(['tag1', 'tag2', 'tag3'])).toEqual(['tag1', 'tag2', 'tag3'])
593
+ expect(() => TagsSchema.parse([])).toThrow()
594
+ expect(() => TagsSchema.parse(['t1', 't2', 't3', 't4'])).toThrow()
595
+ })
596
+
597
+ it('validates item schema', () => {
598
+ const EmailListSchema = createArraySchema(EmailSchema, 1, 5)
599
+
600
+ expect(EmailListSchema.parse(['user@example.com'])).toEqual(['user@example.com'])
601
+ expect(() => EmailListSchema.parse(['invalid'])).toThrow()
602
+ })
603
+
604
+ it('supports field name for description', () => {
605
+ const TagsSchema = createArraySchema(z.string(), 1, 10, 'Tags')
606
+
607
+ expect(TagsSchema.description).toBe('Tags (1-10 items)')
608
+ })
609
+
610
+ it('works with complex item schemas', () => {
611
+ const UserSchema = z.object({
612
+ id: UuidSchema,
613
+ email: EmailSchema
614
+ })
615
+
616
+ const UsersArraySchema = createArraySchema(UserSchema, 1, 10)
617
+
618
+ const result = UsersArraySchema.parse([{ id: '123e4567-e89b-12d3-a456-426614174000', email: 'user@example.com' }])
619
+
620
+ expect(result).toHaveLength(1)
621
+ })
622
+ })
623
+
624
+ describe('createPayloadSizeValidator', () => {
625
+ it('accepts payload under size limit', () => {
626
+ const PayloadSchema = createPayloadSizeValidator(500_000)
627
+
628
+ const smallPayload = { data: 'test' }
629
+ expect(PayloadSchema.parse(smallPayload)).toEqual(smallPayload)
630
+ })
631
+
632
+ it('rejects payload over size limit', () => {
633
+ const PayloadSchema = createPayloadSizeValidator(100)
634
+
635
+ const largePayload = { data: 'x'.repeat(1000) }
636
+ expect(() => PayloadSchema.parse(largePayload)).toThrow()
637
+ })
638
+
639
+ it('validates serialized JSON size', () => {
640
+ const PayloadSchema = createPayloadSizeValidator(50)
641
+
642
+ expect(PayloadSchema.parse({ a: 'test' })).toEqual({ a: 'test' })
643
+ expect(() => PayloadSchema.parse({ a: 'x'.repeat(100) })).toThrow()
644
+ })
645
+
646
+ it('accepts null as valid empty payload', () => {
647
+ const PayloadSchema = createPayloadSizeValidator(100)
648
+
649
+ expect(PayloadSchema.parse(null)).toBe(null)
650
+ })
651
+ })
652
+
653
+ describe('Security Integration Tests', () => {
654
+ it('prevents mass assignment with strict mode', () => {
655
+ const CreateUserSchema = z
656
+ .object({
657
+ name: NonEmptyStringSchema,
658
+ email: EmailSchema
659
+ })
660
+ .strict()
661
+
662
+ expect(
663
+ CreateUserSchema.parse({
664
+ name: 'John Doe',
665
+ email: 'john@example.com'
666
+ })
667
+ ).toBeTruthy()
668
+
669
+ expect(() =>
670
+ CreateUserSchema.parse({
671
+ name: 'John Doe',
672
+ email: 'john@example.com',
673
+ isAdmin: true
674
+ })
675
+ ).toThrow()
676
+ })
677
+
678
+ it('combines validators for complex validation', () => {
679
+ const CreateWorkflowSchema = z
680
+ .object({
681
+ workflowId: UuidSchema,
682
+ name: NonEmptyStringSchema.max(100),
683
+ description: NonEmptyStringSchema.max(500).optional(),
684
+ tags: createArraySchema(NonEmptyStringSchema.max(50), 0, 10).optional(),
685
+ webhookUrl: UrlSchema.optional()
686
+ })
687
+ .strict()
688
+
689
+ const validInput = {
690
+ workflowId: '123e4567-e89b-12d3-a456-426614174000',
691
+ name: 'My Workflow',
692
+ description: 'Test workflow',
693
+ tags: ['automation', 'test'],
694
+ webhookUrl: 'https://example.com/webhook'
695
+ }
696
+
697
+ expect(CreateWorkflowSchema.parse(validInput)).toBeTruthy()
698
+ })
699
+
700
+ it('validates pagination with filters', () => {
701
+ const ListWorkflowsSchema = z.object({
702
+ query: PaginationSchema.extend({
703
+ status: z.enum(['active', 'inactive']).optional(),
704
+ createdAfter: TimestampSchema.optional()
705
+ })
706
+ })
707
+
708
+ const validQuery = {
709
+ query: {
710
+ limit: '50',
711
+ offset: '0',
712
+ status: 'active',
713
+ createdAfter: '2025-01-01T00:00:00Z'
714
+ }
715
+ }
716
+
717
+ const result = ListWorkflowsSchema.parse(validQuery)
718
+ expect(result.query.limit).toBe(50)
719
+ expect(result.query.offset).toBe(0)
720
+ })
721
+ })
722
+
723
+ describe('formatZodValidationError', () => {
724
+ describe('single field errors', () => {
725
+ it('formats single field validation error', () => {
726
+ const schema = z.object({ email: EmailSchema })
727
+
728
+ try {
729
+ schema.parse({ email: 'invalid-email' })
730
+ } catch (error) {
731
+ const formatted = formatZodValidationError(error as z.ZodError)
732
+
733
+ expect(formatted.message).toBe('Validation failed on 1 field')
734
+ expect(formatted.fields).toHaveProperty('email')
735
+ expect(formatted.fields.email).toHaveLength(1)
736
+ expect(formatted.fields.email[0]).toContain('Invalid email')
737
+ }
738
+ })
739
+ })
740
+
741
+ describe('multiple field errors', () => {
742
+ it('formats multiple field validation errors', () => {
743
+ const schema = z.object({
744
+ email: EmailSchema,
745
+ age: z.number().min(18),
746
+ name: NonEmptyStringSchema
747
+ })
748
+
749
+ try {
750
+ schema.parse({ email: 'invalid', age: 15, name: '' })
751
+ } catch (error) {
752
+ const formatted = formatZodValidationError(error as z.ZodError)
753
+
754
+ expect(formatted.message).toBe('Validation failed on 3 fields')
755
+ expect(formatted.fields).toHaveProperty('email')
756
+ expect(formatted.fields).toHaveProperty('age')
757
+ expect(formatted.fields).toHaveProperty('name')
758
+ }
759
+ })
760
+
761
+ it('formats refine validation errors on fields', () => {
762
+ // Real-world pattern: custom validation using refine()
763
+ const schema = z.object({
764
+ password: z.string().refine((val) => val.length >= 8, 'Password must be at least 8 characters')
765
+ })
766
+
767
+ try {
768
+ schema.parse({ password: 'short' })
769
+ } catch (error) {
770
+ if (error instanceof z.ZodError) {
771
+ const formatted = formatZodValidationError(error)
772
+
773
+ expect(formatted.fields.password).toHaveLength(1)
774
+ expect(formatted.fields.password[0]).toContain('8 characters')
775
+ } else {
776
+ throw error
777
+ }
778
+ }
779
+ })
780
+ })
781
+
782
+ describe('nested object errors', () => {
783
+ it('formats nested field paths with dot notation', () => {
784
+ const schema = z.object({
785
+ user: z.object({
786
+ profile: z.object({
787
+ email: EmailSchema
788
+ })
789
+ })
790
+ })
791
+
792
+ try {
793
+ schema.parse({ user: { profile: { email: 'invalid' } } })
794
+ } catch (error) {
795
+ const formatted = formatZodValidationError(error as z.ZodError)
796
+
797
+ expect(formatted.fields).toHaveProperty('user.profile.email')
798
+ expect(formatted.fields['user.profile.email'][0]).toContain('Invalid email')
799
+ }
800
+ })
801
+
802
+ it('formats multiple nested errors', () => {
803
+ const schema = z.object({
804
+ user: z.object({
805
+ email: EmailSchema,
806
+ profile: z.object({
807
+ age: z.number().min(18)
808
+ })
809
+ })
810
+ })
811
+
812
+ try {
813
+ schema.parse({ user: { email: 'bad', profile: { age: 15 } } })
814
+ } catch (error) {
815
+ const formatted = formatZodValidationError(error as z.ZodError)
816
+
817
+ expect(formatted.message).toBe('Validation failed on 2 fields')
818
+ expect(formatted.fields).toHaveProperty('user.email')
819
+ expect(formatted.fields).toHaveProperty('user.profile.age')
820
+ }
821
+ })
822
+
823
+ it('formats refine errors on nested fields', () => {
824
+ // Real-world pattern: nested object with custom validation
825
+ const schema = z.object({
826
+ user: z.object({
827
+ age: z.number().refine((val) => val >= 18, 'Must be 18 or older')
828
+ })
829
+ })
830
+
831
+ try {
832
+ schema.parse({ user: { age: 15 } })
833
+ } catch (error) {
834
+ if (error instanceof z.ZodError) {
835
+ const formatted = formatZodValidationError(error)
836
+
837
+ expect(formatted.fields).toHaveProperty('user.age')
838
+ expect(formatted.fields['user.age'][0]).toContain('18 or older')
839
+ } else {
840
+ throw error
841
+ }
842
+ }
843
+ })
844
+ })
845
+
846
+ describe('array errors', () => {
847
+ it('formats array item validation errors', () => {
848
+ const schema = z.object({
849
+ items: z.array(z.object({ id: UuidSchema }))
850
+ })
851
+
852
+ try {
853
+ schema.parse({ items: [{ id: 'invalid' }] })
854
+ } catch (error) {
855
+ const formatted = formatZodValidationError(error as z.ZodError)
856
+
857
+ expect(formatted.fields).toHaveProperty('items.0.id')
858
+ }
859
+ })
860
+
861
+ it('formats multiple array item errors', () => {
862
+ const schema = z.object({
863
+ emails: z.array(EmailSchema)
864
+ })
865
+
866
+ try {
867
+ schema.parse({ emails: ['valid@test.com', 'invalid', 'also-invalid'] })
868
+ } catch (error) {
869
+ const formatted = formatZodValidationError(error as z.ZodError)
870
+
871
+ expect(formatted.message).toBe('Validation failed on 2 fields')
872
+ expect(formatted.fields).toHaveProperty('emails.1')
873
+ expect(formatted.fields).toHaveProperty('emails.2')
874
+ }
875
+ })
876
+
877
+ it('formats refine errors in array items', () => {
878
+ // Real-world pattern: array items with custom validation
879
+ const ItemSchema = z.object({
880
+ value: z.number().refine((val) => val > 0, 'Value must be positive')
881
+ })
882
+
883
+ const schema = z.object({
884
+ items: z.array(ItemSchema)
885
+ })
886
+
887
+ try {
888
+ schema.parse({
889
+ items: [
890
+ { value: 10 },
891
+ { value: -5 }, // Invalid
892
+ { value: 20 }
893
+ ]
894
+ })
895
+ } catch (error) {
896
+ if (error instanceof z.ZodError) {
897
+ const formatted = formatZodValidationError(error)
898
+
899
+ expect(formatted.fields).toHaveProperty('items.1.value')
900
+ expect(formatted.fields['items.1.value'][0]).toContain('positive')
901
+ } else {
902
+ throw error
903
+ }
904
+ }
905
+ })
906
+ })
907
+
908
+ describe('strict mode errors', () => {
909
+ it('formats unknown field errors from strict mode (mass assignment prevention)', () => {
910
+ const schema = z
911
+ .object({
912
+ name: NonEmptyStringSchema
913
+ })
914
+ .strict()
915
+
916
+ try {
917
+ schema.parse({ name: 'John', isAdmin: true, role: 'admin' })
918
+ } catch (error) {
919
+ const formatted = formatZodValidationError(error as z.ZodError)
920
+
921
+ // Zod groups all unrecognized keys into one root error (security feature)
922
+ expect(formatted.message).toContain('Validation failed')
923
+ expect(formatted.fields._root).toBeDefined()
924
+ expect(formatted.fields._root[0]).toContain('Unrecognized key')
925
+ }
926
+ })
927
+ })
928
+
929
+ describe('root-level errors', () => {
930
+ it('formats root-level validation errors with _root key', () => {
931
+ const schema = z.string().min(5)
932
+
933
+ try {
934
+ schema.parse('abc')
935
+ } catch (error) {
936
+ const formatted = formatZodValidationError(error as z.ZodError)
937
+
938
+ expect(formatted.fields).toHaveProperty('_root')
939
+ expect(formatted.fields._root[0]).toContain('5')
940
+ }
941
+ })
942
+
943
+ it('formats union type errors', () => {
944
+ const schema = z.union([z.string(), z.number()])
945
+
946
+ try {
947
+ schema.parse(true)
948
+ } catch (error) {
949
+ const formatted = formatZodValidationError(error as z.ZodError)
950
+
951
+ expect(formatted.fields).toHaveProperty('_root')
952
+ }
953
+ })
954
+ })
955
+
956
+ describe('real-world API scenarios', () => {
957
+ it('formats credential creation validation errors', () => {
958
+ const schema = z
959
+ .object({
960
+ name: CredentialNameSchema,
961
+ type: z.enum(['oauth', 'api-key']),
962
+ value: z.record(z.unknown()).refine((val) => Object.keys(val).length > 0, 'Value must not be empty')
963
+ })
964
+ .strict()
965
+
966
+ try {
967
+ schema.parse({
968
+ name: '../admin-cred',
969
+ type: 'invalid-type',
970
+ value: {},
971
+ organizationId: 'injected-value'
972
+ })
973
+ } catch (error) {
974
+ const formatted = formatZodValidationError(error as z.ZodError)
975
+
976
+ expect(formatted.fields).toHaveProperty('name')
977
+ expect(formatted.fields).toHaveProperty('type')
978
+ expect(formatted.fields).toHaveProperty('value')
979
+ expect(formatted.fields).toHaveProperty('_root') // organizationId causes unrecognized key error
980
+ }
981
+ })
982
+
983
+ it('formats session turn execution validation errors', () => {
984
+ const schema = z
985
+ .object({
986
+ input: z.unknown().refine((val) => JSON.stringify(val).length <= 10_000, 'Input exceeds 10,000 characters'),
987
+ metadata: z.record(z.unknown()).optional()
988
+ })
989
+ .strict()
990
+
991
+ try {
992
+ schema.parse({
993
+ input: { data: 'x'.repeat(20_000) },
994
+ invalidField: 'test'
995
+ })
996
+ } catch (error) {
997
+ const formatted = formatZodValidationError(error as z.ZodError)
998
+
999
+ expect(formatted.fields).toHaveProperty('input')
1000
+ expect(formatted.fields.input[0]).toContain('10,000 characters')
1001
+ expect(formatted.fields).toHaveProperty('_root') // invalidField causes unrecognized key error
1002
+ }
1003
+ })
1004
+
1005
+ it('formats pagination query validation errors', () => {
1006
+ const schema = PaginationSchema
1007
+
1008
+ try {
1009
+ schema.parse({ limit: '500', offset: '-10' })
1010
+ } catch (error) {
1011
+ const formatted = formatZodValidationError(error as z.ZodError)
1012
+
1013
+ expect(formatted.fields).toHaveProperty('limit')
1014
+ expect(formatted.fields).toHaveProperty('offset')
1015
+ }
1016
+ })
1017
+ })
1018
+
1019
+ describe('edge cases', () => {
1020
+ it('handles empty error list gracefully', () => {
1021
+ // This shouldn't happen in practice, but test defensive coding
1022
+ const emptyError = new z.ZodError([])
1023
+ const formatted = formatZodValidationError(emptyError)
1024
+
1025
+ expect(formatted.message).toBe('Validation failed on 0 fields')
1026
+ expect(formatted.fields).toEqual({})
1027
+ })
1028
+
1029
+ it('handles very long field paths', () => {
1030
+ const schema = z.object({
1031
+ level1: z.object({
1032
+ level2: z.object({
1033
+ level3: z.object({
1034
+ level4: z.object({
1035
+ email: EmailSchema
1036
+ })
1037
+ })
1038
+ })
1039
+ })
1040
+ })
1041
+
1042
+ try {
1043
+ schema.parse({
1044
+ level1: {
1045
+ level2: {
1046
+ level3: {
1047
+ level4: {
1048
+ email: 'invalid'
1049
+ }
1050
+ }
1051
+ }
1052
+ }
1053
+ })
1054
+ } catch (error) {
1055
+ const formatted = formatZodValidationError(error as z.ZodError)
1056
+
1057
+ expect(formatted.fields).toHaveProperty('level1.level2.level3.level4.email')
1058
+ }
1059
+ })
1060
+
1061
+ it('uses correct singular/plural in message', () => {
1062
+ const schema = z.object({ email: EmailSchema })
1063
+
1064
+ try {
1065
+ schema.parse({ email: 'invalid' })
1066
+ } catch (error) {
1067
+ const formatted = formatZodValidationError(error as z.ZodError)
1068
+ expect(formatted.message).toContain('1 field')
1069
+ }
1070
+
1071
+ const multiSchema = z.object({
1072
+ email: EmailSchema,
1073
+ name: NonEmptyStringSchema
1074
+ })
1075
+
1076
+ try {
1077
+ multiSchema.parse({ email: 'invalid', name: '' })
1078
+ } catch (error) {
1079
+ const formatted = formatZodValidationError(error as z.ZodError)
1080
+ expect(formatted.message).toContain('2 fields')
1081
+ }
1082
+ })
1083
+ })
1084
+ })