@friggframework/core 2.0.0--canary.461.61382d8.0 → 2.0.0--canary.461.3d6d8ad.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (120) hide show
  1. package/database/use-cases/check-migration-status-use-case.js +81 -0
  2. package/generated/prisma-mongodb/client.d.ts +1 -0
  3. package/generated/prisma-mongodb/client.js +4 -0
  4. package/generated/prisma-mongodb/default.d.ts +1 -0
  5. package/generated/prisma-mongodb/default.js +4 -0
  6. package/generated/prisma-mongodb/edge.d.ts +1 -0
  7. package/generated/prisma-mongodb/edge.js +336 -0
  8. package/generated/prisma-mongodb/index-browser.js +318 -0
  9. package/generated/prisma-mongodb/index.d.ts +22993 -0
  10. package/generated/prisma-mongodb/index.js +361 -0
  11. package/generated/prisma-mongodb/package.json +183 -0
  12. package/generated/prisma-mongodb/query-engine-debian-openssl-3.0.x +0 -0
  13. package/generated/prisma-mongodb/query-engine-rhel-openssl-3.0.x +0 -0
  14. package/generated/prisma-mongodb/runtime/binary.d.ts +1 -0
  15. package/generated/prisma-mongodb/runtime/binary.js +289 -0
  16. package/generated/prisma-mongodb/runtime/edge-esm.js +34 -0
  17. package/generated/prisma-mongodb/runtime/edge.js +34 -0
  18. package/generated/prisma-mongodb/runtime/index-browser.d.ts +370 -0
  19. package/generated/prisma-mongodb/runtime/index-browser.js +16 -0
  20. package/generated/prisma-mongodb/runtime/library.d.ts +3977 -0
  21. package/generated/prisma-mongodb/runtime/react-native.js +83 -0
  22. package/generated/prisma-mongodb/runtime/wasm-compiler-edge.js +84 -0
  23. package/generated/prisma-mongodb/runtime/wasm-engine-edge.js +36 -0
  24. package/generated/prisma-mongodb/schema.prisma +364 -0
  25. package/generated/prisma-mongodb/wasm-edge-light-loader.mjs +4 -0
  26. package/generated/prisma-mongodb/wasm-worker-loader.mjs +4 -0
  27. package/generated/prisma-mongodb/wasm.d.ts +1 -0
  28. package/generated/prisma-mongodb/wasm.js +343 -0
  29. package/generated/prisma-postgresql/client.d.ts +1 -0
  30. package/generated/prisma-postgresql/client.js +4 -0
  31. package/generated/prisma-postgresql/default.d.ts +1 -0
  32. package/generated/prisma-postgresql/default.js +4 -0
  33. package/generated/prisma-postgresql/edge.d.ts +1 -0
  34. package/generated/prisma-postgresql/edge.js +358 -0
  35. package/generated/prisma-postgresql/index-browser.js +340 -0
  36. package/generated/prisma-postgresql/index.d.ts +25171 -0
  37. package/generated/prisma-postgresql/index.js +383 -0
  38. package/generated/prisma-postgresql/package.json +183 -0
  39. package/generated/prisma-postgresql/query-engine-debian-openssl-3.0.x +0 -0
  40. package/generated/prisma-postgresql/query-engine-rhel-openssl-3.0.x +0 -0
  41. package/generated/prisma-postgresql/query_engine_bg.js +2 -0
  42. package/generated/prisma-postgresql/query_engine_bg.wasm +0 -0
  43. package/generated/prisma-postgresql/runtime/binary.d.ts +1 -0
  44. package/generated/prisma-postgresql/runtime/binary.js +289 -0
  45. package/generated/prisma-postgresql/runtime/edge-esm.js +34 -0
  46. package/generated/prisma-postgresql/runtime/edge.js +34 -0
  47. package/generated/prisma-postgresql/runtime/index-browser.d.ts +370 -0
  48. package/generated/prisma-postgresql/runtime/index-browser.js +16 -0
  49. package/generated/prisma-postgresql/runtime/library.d.ts +3977 -0
  50. package/generated/prisma-postgresql/runtime/react-native.js +83 -0
  51. package/generated/prisma-postgresql/runtime/wasm-compiler-edge.js +84 -0
  52. package/generated/prisma-postgresql/runtime/wasm-engine-edge.js +36 -0
  53. package/generated/prisma-postgresql/schema.prisma +347 -0
  54. package/generated/prisma-postgresql/wasm-edge-light-loader.mjs +4 -0
  55. package/generated/prisma-postgresql/wasm-worker-loader.mjs +4 -0
  56. package/generated/prisma-postgresql/wasm.d.ts +1 -0
  57. package/generated/prisma-postgresql/wasm.js +365 -0
  58. package/handlers/routers/db-migration.js +52 -0
  59. package/package.json +5 -5
  60. package/application/commands/integration-commands.test.js +0 -123
  61. package/core/Worker.test.js +0 -159
  62. package/database/encryption/encryption-integration.test.js +0 -553
  63. package/database/encryption/encryption-schema-registry.test.js +0 -392
  64. package/database/encryption/field-encryption-service.test.js +0 -525
  65. package/database/encryption/mongo-decryption-fix-verification.test.js +0 -348
  66. package/database/encryption/postgres-decryption-fix-verification.test.js +0 -371
  67. package/database/encryption/postgres-relation-decryption.test.js +0 -245
  68. package/database/encryption/prisma-encryption-extension.test.js +0 -439
  69. package/database/repositories/migration-status-repository-s3.test.js +0 -158
  70. package/database/use-cases/check-encryption-health-use-case.test.js +0 -192
  71. package/database/use-cases/get-migration-status-use-case.test.js +0 -171
  72. package/database/use-cases/run-database-migration-use-case.test.js +0 -310
  73. package/database/use-cases/trigger-database-migration-use-case.test.js +0 -250
  74. package/database/utils/prisma-runner.test.js +0 -486
  75. package/encrypt/Cryptor.test.js +0 -144
  76. package/errors/base-error.test.js +0 -32
  77. package/errors/fetch-error.test.js +0 -79
  78. package/errors/halt-error.test.js +0 -11
  79. package/errors/validation-errors.test.js +0 -120
  80. package/handlers/auth-flow.integration.test.js +0 -147
  81. package/handlers/integration-event-dispatcher.test.js +0 -209
  82. package/handlers/routers/db-migration.test.js +0 -51
  83. package/handlers/routers/health.test.js +0 -210
  84. package/handlers/routers/integration-webhook-routers.test.js +0 -126
  85. package/handlers/use-cases/check-integrations-health-use-case.test.js +0 -125
  86. package/handlers/webhook-flow.integration.test.js +0 -356
  87. package/handlers/workers/db-migration.test.js +0 -50
  88. package/handlers/workers/integration-defined-workers.test.js +0 -184
  89. package/integrations/tests/integration-router-multi-auth.test.js +0 -369
  90. package/integrations/tests/use-cases/create-integration.test.js +0 -131
  91. package/integrations/tests/use-cases/delete-integration-for-user.test.js +0 -150
  92. package/integrations/tests/use-cases/find-integration-context-by-external-entity-id.test.js +0 -92
  93. package/integrations/tests/use-cases/get-integration-for-user.test.js +0 -150
  94. package/integrations/tests/use-cases/get-integration-instance.test.js +0 -176
  95. package/integrations/tests/use-cases/get-integrations-for-user.test.js +0 -176
  96. package/integrations/tests/use-cases/get-possible-integrations.test.js +0 -188
  97. package/integrations/tests/use-cases/update-integration-messages.test.js +0 -142
  98. package/integrations/tests/use-cases/update-integration-status.test.js +0 -103
  99. package/integrations/tests/use-cases/update-integration.test.js +0 -141
  100. package/integrations/use-cases/create-process.test.js +0 -178
  101. package/integrations/use-cases/get-process.test.js +0 -190
  102. package/integrations/use-cases/load-integration-context-full.test.js +0 -329
  103. package/integrations/use-cases/load-integration-context.test.js +0 -114
  104. package/integrations/use-cases/update-process-metrics.test.js +0 -308
  105. package/integrations/use-cases/update-process-state.test.js +0 -256
  106. package/lambda/TimeoutCatcher.test.js +0 -68
  107. package/logs/logger.test.js +0 -76
  108. package/modules/module-hydration.test.js +0 -205
  109. package/modules/requester/requester.test.js +0 -28
  110. package/queues/queuer-util.test.js +0 -132
  111. package/user/tests/use-cases/create-individual-user.test.js +0 -24
  112. package/user/tests/use-cases/create-organization-user.test.js +0 -28
  113. package/user/tests/use-cases/create-token-for-user-id.test.js +0 -19
  114. package/user/tests/use-cases/get-user-from-adopter-jwt.test.js +0 -113
  115. package/user/tests/use-cases/get-user-from-bearer-token.test.js +0 -64
  116. package/user/tests/use-cases/get-user-from-x-frigg-headers.test.js +0 -346
  117. package/user/tests/use-cases/login-user.test.js +0 -220
  118. package/user/tests/user-password-encryption-isolation.test.js +0 -237
  119. package/user/tests/user-password-hashing.test.js +0 -235
  120. package/websocket/repositories/websocket-connection-repository.test.js +0 -227
@@ -1,525 +0,0 @@
1
- const { FieldEncryptionService } = require('./field-encryption-service');
2
-
3
- describe('FieldEncryptionService', () => {
4
- let mockCryptor;
5
- let mockSchema;
6
- let service;
7
-
8
- beforeEach(() => {
9
- // Mock Cryptor
10
- mockCryptor = {
11
- encrypt: jest
12
- .fn()
13
- .mockImplementation(
14
- (value) => `encrypted:${value}:keydata:enckey`
15
- ),
16
- decrypt: jest
17
- .fn()
18
- .mockImplementation((value) => {
19
- // Handle multiple encrypted formats
20
- // Format 1: "encrypted:ORIGINAL:keydata:enckey"
21
- // Format 2: "keyId:ORIGINAL:iv:enckey"
22
-
23
- // Try format 1 (from our new tests)
24
- const prefix1 = 'encrypted:';
25
- const suffix1 = ':keydata:enckey';
26
- if (value.startsWith(prefix1) && value.endsWith(suffix1)) {
27
- return value.slice(prefix1.length, -suffix1.length);
28
- }
29
-
30
- // Try format 2 (from existing tests)
31
- const prefix2 = 'keyId:';
32
- const suffix2 = ':iv:enckey';
33
- if (value.startsWith(prefix2) && value.endsWith(suffix2)) {
34
- return value.slice(prefix2.length, -suffix2.length);
35
- }
36
-
37
- return value; // Fallback for non-standard format
38
- }),
39
- };
40
-
41
- // Mock Schema Registry
42
- mockSchema = {
43
- getEncryptedFields: jest.fn().mockImplementation((modelName) => {
44
- const schemas = {
45
- Credential: ['data.access_token', 'data.refresh_token'],
46
- User: ['hashword'],
47
- IntegrationMapping: ['mapping'],
48
- EmptyModel: [],
49
- };
50
- return schemas[modelName] || [];
51
- }),
52
- };
53
-
54
- service = new FieldEncryptionService({
55
- cryptor: mockCryptor,
56
- schema: mockSchema,
57
- });
58
- });
59
-
60
- describe('constructor', () => {
61
- it('should throw if cryptor not provided', () => {
62
- expect(() => {
63
- new FieldEncryptionService({ schema: mockSchema });
64
- }).toThrow('Cryptor instance required');
65
- });
66
-
67
- it('should throw if schema not provided', () => {
68
- expect(() => {
69
- new FieldEncryptionService({ cryptor: mockCryptor });
70
- }).toThrow('Schema with getEncryptedFields method required');
71
- });
72
-
73
- it('should throw if schema missing getEncryptedFields', () => {
74
- expect(() => {
75
- new FieldEncryptionService({
76
- cryptor: mockCryptor,
77
- schema: {},
78
- });
79
- }).toThrow('Schema with getEncryptedFields method required');
80
- });
81
-
82
- it('should create instance with valid params', () => {
83
- expect(service).toBeInstanceOf(FieldEncryptionService);
84
- expect(service.cryptor).toBe(mockCryptor);
85
- expect(service.schema).toBe(mockSchema);
86
- });
87
- });
88
-
89
- describe('encryptFields', () => {
90
- it('should encrypt nested JSON fields', async () => {
91
- const document = {
92
- id: '123',
93
- data: {
94
- access_token: 'secret123',
95
- refresh_token: 'refresh456',
96
- other: 'public',
97
- },
98
- };
99
-
100
- const result = await service.encryptFields('Credential', document);
101
-
102
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('secret123');
103
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('refresh456');
104
- expect(result.data.access_token).toBe(
105
- 'encrypted:secret123:keydata:enckey'
106
- );
107
- expect(result.data.refresh_token).toBe(
108
- 'encrypted:refresh456:keydata:enckey'
109
- );
110
- expect(result.data.other).toBe('public'); // Not encrypted
111
- });
112
-
113
- it('should encrypt top-level fields', async () => {
114
- const document = {
115
- id: '123',
116
- hashword: 'password_hash',
117
- };
118
-
119
- const result = await service.encryptFields('User', document);
120
-
121
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('password_hash');
122
- expect(result.hashword).toBe(
123
- 'encrypted:password_hash:keydata:enckey'
124
- );
125
- expect(result.id).toBe('123'); // Not encrypted
126
- });
127
-
128
- it('should handle models without encrypted fields', async () => {
129
- const document = { id: '123', state: 'some_state' };
130
-
131
- const result = await service.encryptFields('EmptyModel', document);
132
-
133
- expect(mockCryptor.encrypt).not.toHaveBeenCalled();
134
- expect(result).toEqual(document);
135
- });
136
-
137
- it('should skip null values', async () => {
138
- const document = {
139
- data: {
140
- access_token: null,
141
- refresh_token: 'valid',
142
- },
143
- };
144
-
145
- await service.encryptFields('Credential', document);
146
-
147
- expect(mockCryptor.encrypt).toHaveBeenCalledTimes(1);
148
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('valid');
149
- });
150
-
151
- it('should skip undefined values', async () => {
152
- const document = {
153
- data: {
154
- access_token: undefined,
155
- refresh_token: 'valid',
156
- },
157
- };
158
-
159
- await service.encryptFields('Credential', document);
160
-
161
- expect(mockCryptor.encrypt).toHaveBeenCalledTimes(1);
162
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('valid');
163
- });
164
-
165
- it('should skip empty strings', async () => {
166
- const document = {
167
- data: {
168
- access_token: '',
169
- refresh_token: 'valid',
170
- },
171
- };
172
-
173
- await service.encryptFields('Credential', document);
174
-
175
- expect(mockCryptor.encrypt).toHaveBeenCalledTimes(1);
176
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('valid');
177
- });
178
-
179
- it('should skip already encrypted values', async () => {
180
- const document = {
181
- data: {
182
- access_token: 'already:encrypted:data:key',
183
- refresh_token: 'plain',
184
- },
185
- };
186
-
187
- await service.encryptFields('Credential', document);
188
-
189
- expect(mockCryptor.encrypt).toHaveBeenCalledTimes(1);
190
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('plain');
191
- });
192
-
193
- it('should not mutate original document', async () => {
194
- const document = {
195
- data: { access_token: 'secret' },
196
- };
197
- const original = JSON.parse(JSON.stringify(document));
198
-
199
- await service.encryptFields('Credential', document);
200
-
201
- expect(document).toEqual(original);
202
- });
203
-
204
- it('should properly encrypt object/JSON values (IntegrationMapping.mapping)', async () => {
205
- // This test demonstrates the bug: objects are converted to "[object Object]"
206
- // Expected behavior: object should be JSON.stringify'd before encryption
207
- const mappingObject = {
208
- action: 'upload',
209
- formData: {
210
- container: 'project_123',
211
- folderId: '456',
212
- attachments: ['att-1', 'att-2'],
213
- },
214
- taskId: 'task-789',
215
- status: 'pending',
216
- };
217
-
218
- const document = {
219
- id: 1,
220
- integrationId: 1,
221
- sourceId: 'task-789',
222
- mapping: mappingObject,
223
- };
224
-
225
- const encrypted = await service.encryptFields('IntegrationMapping', document);
226
-
227
- // The cryptor should receive JSON string, not "[object Object]"
228
- expect(mockCryptor.encrypt).toHaveBeenCalledWith(
229
- JSON.stringify(mappingObject)
230
- );
231
-
232
- // The encrypted value should be the JSON string encrypted
233
- expect(encrypted.mapping).toBe(
234
- `encrypted:${JSON.stringify(mappingObject)}:keydata:enckey`
235
- );
236
-
237
- // Now decrypt and verify object is restored
238
- const decrypted = await service.decryptFields('IntegrationMapping', encrypted);
239
-
240
- // After decryption, the object should be fully restored
241
- expect(decrypted.mapping).toEqual(mappingObject);
242
- expect(decrypted.mapping.action).toBe('upload');
243
- expect(decrypted.mapping.formData.attachments).toEqual(['att-1', 'att-2']);
244
- });
245
-
246
- it('should throw on encryption errors', async () => {
247
- mockCryptor.encrypt.mockRejectedValueOnce(
248
- new Error('Encryption failed')
249
- );
250
-
251
- const document = {
252
- data: {
253
- access_token: 'secret',
254
- refresh_token: 'valid',
255
- },
256
- };
257
-
258
- await expect(
259
- service.encryptFields('Credential', document)
260
- ).rejects.toThrow('Encryption failed');
261
- });
262
-
263
- it('should return non-object values as-is', async () => {
264
- expect(await service.encryptFields('Credential', null)).toBeNull();
265
- expect(
266
- await service.encryptFields('Credential', undefined)
267
- ).toBeUndefined();
268
- expect(await service.encryptFields('Credential', 'string')).toBe(
269
- 'string'
270
- );
271
- expect(await service.encryptFields('Credential', 123)).toBe(123);
272
- });
273
- });
274
-
275
- describe('decryptFields', () => {
276
- it('should decrypt nested JSON fields', async () => {
277
- const document = {
278
- id: '123',
279
- data: {
280
- access_token: 'keyId:secret123:iv:enckey',
281
- refresh_token: 'keyId:refresh456:iv:enckey',
282
- other: 'public',
283
- },
284
- };
285
-
286
- const result = await service.decryptFields('Credential', document);
287
-
288
- expect(mockCryptor.decrypt).toHaveBeenCalledWith(
289
- 'keyId:secret123:iv:enckey'
290
- );
291
- expect(mockCryptor.decrypt).toHaveBeenCalledWith(
292
- 'keyId:refresh456:iv:enckey'
293
- );
294
- expect(result.data.access_token).toBe('secret123');
295
- expect(result.data.refresh_token).toBe('refresh456');
296
- expect(result.data.other).toBe('public'); // Not decrypted
297
- });
298
-
299
- it('should decrypt top-level fields', async () => {
300
- const document = {
301
- id: '123',
302
- hashword: 'keyId:password_hash:iv:enckey',
303
- };
304
-
305
- const result = await service.decryptFields('User', document);
306
-
307
- expect(mockCryptor.decrypt).toHaveBeenCalledWith(
308
- 'keyId:password_hash:iv:enckey'
309
- );
310
- expect(result.hashword).toBe('password_hash');
311
- });
312
-
313
- it('should skip non-encrypted values', async () => {
314
- const document = {
315
- data: {
316
- access_token: 'plaintext', // Not encrypted format
317
- refresh_token: 'keyId:encrypted:iv:enckey',
318
- },
319
- };
320
-
321
- await service.decryptFields('Credential', document);
322
-
323
- expect(mockCryptor.decrypt).toHaveBeenCalledTimes(1);
324
- expect(mockCryptor.decrypt).toHaveBeenCalledWith(
325
- 'keyId:encrypted:iv:enckey'
326
- );
327
- });
328
-
329
- it('should not mutate original document', async () => {
330
- const document = {
331
- data: { access_token: 'keyId:secret:iv:enckey' },
332
- };
333
- const original = JSON.parse(JSON.stringify(document));
334
-
335
- await service.decryptFields('Credential', document);
336
-
337
- expect(document).toEqual(original);
338
- });
339
-
340
- it('should throw on decryption errors', async () => {
341
- mockCryptor.decrypt.mockRejectedValueOnce(
342
- new Error('Decryption failed')
343
- );
344
-
345
- const document = {
346
- data: {
347
- access_token: 'keyId:secret:iv:enckey',
348
- refresh_token: 'keyId:valid:iv:enckey',
349
- },
350
- };
351
-
352
- await expect(
353
- service.decryptFields('Credential', document)
354
- ).rejects.toThrow('Decryption failed');
355
- });
356
- });
357
-
358
- describe('encryptFieldsInBulk', () => {
359
- it('should encrypt multiple documents', async () => {
360
- const documents = [
361
- { data: { access_token: 'secret1' } },
362
- { data: { access_token: 'secret2' } },
363
- ];
364
-
365
- const result = await service.encryptFieldsInBulk(
366
- 'Credential',
367
- documents
368
- );
369
-
370
- expect(result).toHaveLength(2);
371
- expect(result[0].data.access_token).toBe(
372
- 'encrypted:secret1:keydata:enckey'
373
- );
374
- expect(result[1].data.access_token).toBe(
375
- 'encrypted:secret2:keydata:enckey'
376
- );
377
- });
378
-
379
- it('should handle empty array', async () => {
380
- const result = await service.encryptFieldsInBulk('Credential', []);
381
- expect(result).toEqual([]);
382
- });
383
-
384
- it('should return non-array values as-is', async () => {
385
- expect(
386
- await service.encryptFieldsInBulk('Credential', null)
387
- ).toBeNull();
388
- expect(
389
- await service.encryptFieldsInBulk('Credential', { data: {} })
390
- ).toEqual({ data: {} });
391
- });
392
- });
393
-
394
- describe('decryptFieldsInBulk', () => {
395
- it('should decrypt multiple documents', async () => {
396
- const documents = [
397
- { data: { access_token: 'keyId:secret1:iv:enckey' } },
398
- { data: { access_token: 'keyId:secret2:iv:enckey' } },
399
- ];
400
-
401
- const result = await service.decryptFieldsInBulk(
402
- 'Credential',
403
- documents
404
- );
405
-
406
- expect(result).toHaveLength(2);
407
- expect(result[0].data.access_token).toBe('secret1');
408
- expect(result[1].data.access_token).toBe('secret2');
409
- });
410
- });
411
-
412
- describe('_isEncrypted', () => {
413
- it('should detect encrypted format', () => {
414
- expect(service._isEncrypted('keyId:data:iv:enckey')).toBe(true);
415
- expect(
416
- service._isEncrypted('keyId:longer:data:with:colons:enckey')
417
- ).toBe(true);
418
- });
419
-
420
- it('should reject non-encrypted formats', () => {
421
- expect(service._isEncrypted('plaintext')).toBe(false);
422
- expect(service._isEncrypted('one:two:three')).toBe(false);
423
- expect(service._isEncrypted('one:two')).toBe(false);
424
- expect(service._isEncrypted(null)).toBe(false);
425
- expect(service._isEncrypted(undefined)).toBe(false);
426
- expect(service._isEncrypted(123)).toBe(false);
427
- });
428
- });
429
-
430
- describe('_getNestedValue', () => {
431
- it('should get top-level value', () => {
432
- const obj = { name: 'test' };
433
- expect(service._getNestedValue(obj, 'name')).toBe('test');
434
- });
435
-
436
- it('should get nested value', () => {
437
- const obj = { data: { token: 'abc' } };
438
- expect(service._getNestedValue(obj, 'data.token')).toBe('abc');
439
- });
440
-
441
- it('should get deeply nested value', () => {
442
- const obj = { level1: { level2: { level3: 'deep' } } };
443
- expect(service._getNestedValue(obj, 'level1.level2.level3')).toBe(
444
- 'deep'
445
- );
446
- });
447
-
448
- it('should return undefined for missing path', () => {
449
- const obj = { data: { token: 'abc' } };
450
- expect(service._getNestedValue(obj, 'data.missing')).toBeUndefined();
451
- });
452
-
453
- it('should handle null/undefined gracefully', () => {
454
- expect(service._getNestedValue(null, 'path')).toBeUndefined();
455
- expect(service._getNestedValue({}, null)).toBeUndefined();
456
- });
457
- });
458
-
459
- describe('_setNestedValue', () => {
460
- it('should set top-level value', () => {
461
- const obj = {};
462
- service._setNestedValue(obj, 'name', 'test');
463
- expect(obj.name).toBe('test');
464
- });
465
-
466
- it('should set nested value', () => {
467
- const obj = {};
468
- service._setNestedValue(obj, 'data.token', 'abc');
469
- expect(obj.data.token).toBe('abc');
470
- });
471
-
472
- it('should set deeply nested value', () => {
473
- const obj = {};
474
- service._setNestedValue(obj, 'level1.level2.level3', 'deep');
475
- expect(obj.level1.level2.level3).toBe('deep');
476
- });
477
-
478
- it('should create intermediate objects', () => {
479
- const obj = { data: {} };
480
- service._setNestedValue(obj, 'data.nested.value', 'test');
481
- expect(obj.data.nested.value).toBe('test');
482
- });
483
-
484
- it('should handle null/undefined gracefully', () => {
485
- service._setNestedValue(null, 'path', 'value'); // Should not throw
486
- service._setNestedValue({}, null, 'value'); // Should not throw
487
- });
488
- });
489
-
490
- describe('_deepClone', () => {
491
- it('should clone objects', () => {
492
- const obj = { a: 1, b: { c: 2 } };
493
- const clone = service._deepClone(obj);
494
-
495
- expect(clone).toEqual(obj);
496
- expect(clone).not.toBe(obj);
497
- expect(clone.b).not.toBe(obj.b);
498
- });
499
-
500
- it('should clone arrays', () => {
501
- const arr = [1, 2, { a: 3 }];
502
- const clone = service._deepClone(arr);
503
-
504
- expect(clone).toEqual(arr);
505
- expect(clone).not.toBe(arr);
506
- expect(clone[2]).not.toBe(arr[2]);
507
- });
508
-
509
- it('should clone dates', () => {
510
- const date = new Date('2024-01-01');
511
- const clone = service._deepClone(date);
512
-
513
- expect(clone).toEqual(date);
514
- expect(clone).not.toBe(date);
515
- });
516
-
517
- it('should handle primitives', () => {
518
- expect(service._deepClone(null)).toBeNull();
519
- expect(service._deepClone(undefined)).toBeUndefined();
520
- expect(service._deepClone(123)).toBe(123);
521
- expect(service._deepClone('string')).toBe('string');
522
- expect(service._deepClone(true)).toBe(true);
523
- });
524
- });
525
- });