@friggframework/core 2.0.0--canary.461.bb7fcba.0 → 2.0.0--canary.461.5767fa4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (118) hide show
  1. package/generated/prisma-mongodb/client.d.ts +1 -0
  2. package/generated/prisma-mongodb/client.js +4 -0
  3. package/generated/prisma-mongodb/default.d.ts +1 -0
  4. package/generated/prisma-mongodb/default.js +4 -0
  5. package/generated/prisma-mongodb/edge.d.ts +1 -0
  6. package/generated/prisma-mongodb/edge.js +336 -0
  7. package/generated/prisma-mongodb/index-browser.js +318 -0
  8. package/generated/prisma-mongodb/index.d.ts +22993 -0
  9. package/generated/prisma-mongodb/index.js +361 -0
  10. package/generated/prisma-mongodb/package.json +183 -0
  11. package/generated/prisma-mongodb/query-engine-debian-openssl-3.0.x +0 -0
  12. package/generated/prisma-mongodb/query-engine-rhel-openssl-3.0.x +0 -0
  13. package/generated/prisma-mongodb/runtime/binary.d.ts +1 -0
  14. package/generated/prisma-mongodb/runtime/binary.js +289 -0
  15. package/generated/prisma-mongodb/runtime/edge-esm.js +34 -0
  16. package/generated/prisma-mongodb/runtime/edge.js +34 -0
  17. package/generated/prisma-mongodb/runtime/index-browser.d.ts +370 -0
  18. package/generated/prisma-mongodb/runtime/index-browser.js +16 -0
  19. package/generated/prisma-mongodb/runtime/library.d.ts +3977 -0
  20. package/generated/prisma-mongodb/runtime/react-native.js +83 -0
  21. package/generated/prisma-mongodb/runtime/wasm-compiler-edge.js +84 -0
  22. package/generated/prisma-mongodb/runtime/wasm-engine-edge.js +36 -0
  23. package/generated/prisma-mongodb/schema.prisma +364 -0
  24. package/generated/prisma-mongodb/wasm-edge-light-loader.mjs +4 -0
  25. package/generated/prisma-mongodb/wasm-worker-loader.mjs +4 -0
  26. package/generated/prisma-mongodb/wasm.d.ts +1 -0
  27. package/generated/prisma-mongodb/wasm.js +343 -0
  28. package/generated/prisma-postgresql/client.d.ts +1 -0
  29. package/generated/prisma-postgresql/client.js +4 -0
  30. package/generated/prisma-postgresql/default.d.ts +1 -0
  31. package/generated/prisma-postgresql/default.js +4 -0
  32. package/generated/prisma-postgresql/edge.d.ts +1 -0
  33. package/generated/prisma-postgresql/edge.js +358 -0
  34. package/generated/prisma-postgresql/index-browser.js +340 -0
  35. package/generated/prisma-postgresql/index.d.ts +25171 -0
  36. package/generated/prisma-postgresql/index.js +383 -0
  37. package/generated/prisma-postgresql/package.json +183 -0
  38. package/generated/prisma-postgresql/query-engine-debian-openssl-3.0.x +0 -0
  39. package/generated/prisma-postgresql/query-engine-rhel-openssl-3.0.x +0 -0
  40. package/generated/prisma-postgresql/query_engine_bg.js +2 -0
  41. package/generated/prisma-postgresql/query_engine_bg.wasm +0 -0
  42. package/generated/prisma-postgresql/runtime/binary.d.ts +1 -0
  43. package/generated/prisma-postgresql/runtime/binary.js +289 -0
  44. package/generated/prisma-postgresql/runtime/edge-esm.js +34 -0
  45. package/generated/prisma-postgresql/runtime/edge.js +34 -0
  46. package/generated/prisma-postgresql/runtime/index-browser.d.ts +370 -0
  47. package/generated/prisma-postgresql/runtime/index-browser.js +16 -0
  48. package/generated/prisma-postgresql/runtime/library.d.ts +3977 -0
  49. package/generated/prisma-postgresql/runtime/react-native.js +83 -0
  50. package/generated/prisma-postgresql/runtime/wasm-compiler-edge.js +84 -0
  51. package/generated/prisma-postgresql/runtime/wasm-engine-edge.js +36 -0
  52. package/generated/prisma-postgresql/schema.prisma +347 -0
  53. package/generated/prisma-postgresql/wasm-edge-light-loader.mjs +4 -0
  54. package/generated/prisma-postgresql/wasm-worker-loader.mjs +4 -0
  55. package/generated/prisma-postgresql/wasm.d.ts +1 -0
  56. package/generated/prisma-postgresql/wasm.js +365 -0
  57. package/package.json +5 -5
  58. package/application/commands/integration-commands.test.js +0 -123
  59. package/core/Worker.test.js +0 -159
  60. package/database/encryption/encryption-integration.test.js +0 -553
  61. package/database/encryption/encryption-schema-registry.test.js +0 -392
  62. package/database/encryption/field-encryption-service.test.js +0 -525
  63. package/database/encryption/mongo-decryption-fix-verification.test.js +0 -348
  64. package/database/encryption/postgres-decryption-fix-verification.test.js +0 -371
  65. package/database/encryption/postgres-relation-decryption.test.js +0 -245
  66. package/database/encryption/prisma-encryption-extension.test.js +0 -439
  67. package/database/repositories/migration-status-repository-s3.test.js +0 -158
  68. package/database/use-cases/check-encryption-health-use-case.test.js +0 -192
  69. package/database/use-cases/get-migration-status-use-case.test.js +0 -171
  70. package/database/use-cases/run-database-migration-use-case.test.js +0 -310
  71. package/database/use-cases/trigger-database-migration-use-case.test.js +0 -250
  72. package/database/utils/prisma-runner.test.js +0 -486
  73. package/encrypt/Cryptor.test.js +0 -144
  74. package/errors/base-error.test.js +0 -32
  75. package/errors/fetch-error.test.js +0 -79
  76. package/errors/halt-error.test.js +0 -11
  77. package/errors/validation-errors.test.js +0 -120
  78. package/handlers/auth-flow.integration.test.js +0 -147
  79. package/handlers/integration-event-dispatcher.test.js +0 -209
  80. package/handlers/routers/db-migration.test.js +0 -51
  81. package/handlers/routers/health.test.js +0 -210
  82. package/handlers/routers/integration-webhook-routers.test.js +0 -126
  83. package/handlers/use-cases/check-integrations-health-use-case.test.js +0 -125
  84. package/handlers/webhook-flow.integration.test.js +0 -356
  85. package/handlers/workers/db-migration.test.js +0 -50
  86. package/handlers/workers/integration-defined-workers.test.js +0 -184
  87. package/integrations/tests/integration-router-multi-auth.test.js +0 -369
  88. package/integrations/tests/use-cases/create-integration.test.js +0 -131
  89. package/integrations/tests/use-cases/delete-integration-for-user.test.js +0 -150
  90. package/integrations/tests/use-cases/find-integration-context-by-external-entity-id.test.js +0 -92
  91. package/integrations/tests/use-cases/get-integration-for-user.test.js +0 -150
  92. package/integrations/tests/use-cases/get-integration-instance.test.js +0 -176
  93. package/integrations/tests/use-cases/get-integrations-for-user.test.js +0 -176
  94. package/integrations/tests/use-cases/get-possible-integrations.test.js +0 -188
  95. package/integrations/tests/use-cases/update-integration-messages.test.js +0 -142
  96. package/integrations/tests/use-cases/update-integration-status.test.js +0 -103
  97. package/integrations/tests/use-cases/update-integration.test.js +0 -141
  98. package/integrations/use-cases/create-process.test.js +0 -178
  99. package/integrations/use-cases/get-process.test.js +0 -190
  100. package/integrations/use-cases/load-integration-context-full.test.js +0 -329
  101. package/integrations/use-cases/load-integration-context.test.js +0 -114
  102. package/integrations/use-cases/update-process-metrics.test.js +0 -308
  103. package/integrations/use-cases/update-process-state.test.js +0 -256
  104. package/lambda/TimeoutCatcher.test.js +0 -68
  105. package/logs/logger.test.js +0 -76
  106. package/modules/module-hydration.test.js +0 -205
  107. package/modules/requester/requester.test.js +0 -28
  108. package/queues/queuer-util.test.js +0 -132
  109. package/user/tests/use-cases/create-individual-user.test.js +0 -24
  110. package/user/tests/use-cases/create-organization-user.test.js +0 -28
  111. package/user/tests/use-cases/create-token-for-user-id.test.js +0 -19
  112. package/user/tests/use-cases/get-user-from-adopter-jwt.test.js +0 -113
  113. package/user/tests/use-cases/get-user-from-bearer-token.test.js +0 -64
  114. package/user/tests/use-cases/get-user-from-x-frigg-headers.test.js +0 -346
  115. package/user/tests/use-cases/login-user.test.js +0 -220
  116. package/user/tests/user-password-encryption-isolation.test.js +0 -237
  117. package/user/tests/user-password-hashing.test.js +0 -235
  118. package/websocket/repositories/websocket-connection-repository.test.js +0 -227
@@ -1,525 +0,0 @@
1
- const { FieldEncryptionService } = require('./field-encryption-service');
2
-
3
- describe('FieldEncryptionService', () => {
4
- let mockCryptor;
5
- let mockSchema;
6
- let service;
7
-
8
- beforeEach(() => {
9
- // Mock Cryptor
10
- mockCryptor = {
11
- encrypt: jest
12
- .fn()
13
- .mockImplementation(
14
- (value) => `encrypted:${value}:keydata:enckey`
15
- ),
16
- decrypt: jest
17
- .fn()
18
- .mockImplementation((value) => {
19
- // Handle multiple encrypted formats
20
- // Format 1: "encrypted:ORIGINAL:keydata:enckey"
21
- // Format 2: "keyId:ORIGINAL:iv:enckey"
22
-
23
- // Try format 1 (from our new tests)
24
- const prefix1 = 'encrypted:';
25
- const suffix1 = ':keydata:enckey';
26
- if (value.startsWith(prefix1) && value.endsWith(suffix1)) {
27
- return value.slice(prefix1.length, -suffix1.length);
28
- }
29
-
30
- // Try format 2 (from existing tests)
31
- const prefix2 = 'keyId:';
32
- const suffix2 = ':iv:enckey';
33
- if (value.startsWith(prefix2) && value.endsWith(suffix2)) {
34
- return value.slice(prefix2.length, -suffix2.length);
35
- }
36
-
37
- return value; // Fallback for non-standard format
38
- }),
39
- };
40
-
41
- // Mock Schema Registry
42
- mockSchema = {
43
- getEncryptedFields: jest.fn().mockImplementation((modelName) => {
44
- const schemas = {
45
- Credential: ['data.access_token', 'data.refresh_token'],
46
- User: ['hashword'],
47
- IntegrationMapping: ['mapping'],
48
- EmptyModel: [],
49
- };
50
- return schemas[modelName] || [];
51
- }),
52
- };
53
-
54
- service = new FieldEncryptionService({
55
- cryptor: mockCryptor,
56
- schema: mockSchema,
57
- });
58
- });
59
-
60
- describe('constructor', () => {
61
- it('should throw if cryptor not provided', () => {
62
- expect(() => {
63
- new FieldEncryptionService({ schema: mockSchema });
64
- }).toThrow('Cryptor instance required');
65
- });
66
-
67
- it('should throw if schema not provided', () => {
68
- expect(() => {
69
- new FieldEncryptionService({ cryptor: mockCryptor });
70
- }).toThrow('Schema with getEncryptedFields method required');
71
- });
72
-
73
- it('should throw if schema missing getEncryptedFields', () => {
74
- expect(() => {
75
- new FieldEncryptionService({
76
- cryptor: mockCryptor,
77
- schema: {},
78
- });
79
- }).toThrow('Schema with getEncryptedFields method required');
80
- });
81
-
82
- it('should create instance with valid params', () => {
83
- expect(service).toBeInstanceOf(FieldEncryptionService);
84
- expect(service.cryptor).toBe(mockCryptor);
85
- expect(service.schema).toBe(mockSchema);
86
- });
87
- });
88
-
89
- describe('encryptFields', () => {
90
- it('should encrypt nested JSON fields', async () => {
91
- const document = {
92
- id: '123',
93
- data: {
94
- access_token: 'secret123',
95
- refresh_token: 'refresh456',
96
- other: 'public',
97
- },
98
- };
99
-
100
- const result = await service.encryptFields('Credential', document);
101
-
102
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('secret123');
103
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('refresh456');
104
- expect(result.data.access_token).toBe(
105
- 'encrypted:secret123:keydata:enckey'
106
- );
107
- expect(result.data.refresh_token).toBe(
108
- 'encrypted:refresh456:keydata:enckey'
109
- );
110
- expect(result.data.other).toBe('public'); // Not encrypted
111
- });
112
-
113
- it('should encrypt top-level fields', async () => {
114
- const document = {
115
- id: '123',
116
- hashword: 'password_hash',
117
- };
118
-
119
- const result = await service.encryptFields('User', document);
120
-
121
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('password_hash');
122
- expect(result.hashword).toBe(
123
- 'encrypted:password_hash:keydata:enckey'
124
- );
125
- expect(result.id).toBe('123'); // Not encrypted
126
- });
127
-
128
- it('should handle models without encrypted fields', async () => {
129
- const document = { id: '123', state: 'some_state' };
130
-
131
- const result = await service.encryptFields('EmptyModel', document);
132
-
133
- expect(mockCryptor.encrypt).not.toHaveBeenCalled();
134
- expect(result).toEqual(document);
135
- });
136
-
137
- it('should skip null values', async () => {
138
- const document = {
139
- data: {
140
- access_token: null,
141
- refresh_token: 'valid',
142
- },
143
- };
144
-
145
- await service.encryptFields('Credential', document);
146
-
147
- expect(mockCryptor.encrypt).toHaveBeenCalledTimes(1);
148
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('valid');
149
- });
150
-
151
- it('should skip undefined values', async () => {
152
- const document = {
153
- data: {
154
- access_token: undefined,
155
- refresh_token: 'valid',
156
- },
157
- };
158
-
159
- await service.encryptFields('Credential', document);
160
-
161
- expect(mockCryptor.encrypt).toHaveBeenCalledTimes(1);
162
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('valid');
163
- });
164
-
165
- it('should skip empty strings', async () => {
166
- const document = {
167
- data: {
168
- access_token: '',
169
- refresh_token: 'valid',
170
- },
171
- };
172
-
173
- await service.encryptFields('Credential', document);
174
-
175
- expect(mockCryptor.encrypt).toHaveBeenCalledTimes(1);
176
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('valid');
177
- });
178
-
179
- it('should skip already encrypted values', async () => {
180
- const document = {
181
- data: {
182
- access_token: 'already:encrypted:data:key',
183
- refresh_token: 'plain',
184
- },
185
- };
186
-
187
- await service.encryptFields('Credential', document);
188
-
189
- expect(mockCryptor.encrypt).toHaveBeenCalledTimes(1);
190
- expect(mockCryptor.encrypt).toHaveBeenCalledWith('plain');
191
- });
192
-
193
- it('should not mutate original document', async () => {
194
- const document = {
195
- data: { access_token: 'secret' },
196
- };
197
- const original = JSON.parse(JSON.stringify(document));
198
-
199
- await service.encryptFields('Credential', document);
200
-
201
- expect(document).toEqual(original);
202
- });
203
-
204
- it('should properly encrypt object/JSON values (IntegrationMapping.mapping)', async () => {
205
- // This test demonstrates the bug: objects are converted to "[object Object]"
206
- // Expected behavior: object should be JSON.stringify'd before encryption
207
- const mappingObject = {
208
- action: 'upload',
209
- formData: {
210
- container: 'project_123',
211
- folderId: '456',
212
- attachments: ['att-1', 'att-2'],
213
- },
214
- taskId: 'task-789',
215
- status: 'pending',
216
- };
217
-
218
- const document = {
219
- id: 1,
220
- integrationId: 1,
221
- sourceId: 'task-789',
222
- mapping: mappingObject,
223
- };
224
-
225
- const encrypted = await service.encryptFields('IntegrationMapping', document);
226
-
227
- // The cryptor should receive JSON string, not "[object Object]"
228
- expect(mockCryptor.encrypt).toHaveBeenCalledWith(
229
- JSON.stringify(mappingObject)
230
- );
231
-
232
- // The encrypted value should be the JSON string encrypted
233
- expect(encrypted.mapping).toBe(
234
- `encrypted:${JSON.stringify(mappingObject)}:keydata:enckey`
235
- );
236
-
237
- // Now decrypt and verify object is restored
238
- const decrypted = await service.decryptFields('IntegrationMapping', encrypted);
239
-
240
- // After decryption, the object should be fully restored
241
- expect(decrypted.mapping).toEqual(mappingObject);
242
- expect(decrypted.mapping.action).toBe('upload');
243
- expect(decrypted.mapping.formData.attachments).toEqual(['att-1', 'att-2']);
244
- });
245
-
246
- it('should throw on encryption errors', async () => {
247
- mockCryptor.encrypt.mockRejectedValueOnce(
248
- new Error('Encryption failed')
249
- );
250
-
251
- const document = {
252
- data: {
253
- access_token: 'secret',
254
- refresh_token: 'valid',
255
- },
256
- };
257
-
258
- await expect(
259
- service.encryptFields('Credential', document)
260
- ).rejects.toThrow('Encryption failed');
261
- });
262
-
263
- it('should return non-object values as-is', async () => {
264
- expect(await service.encryptFields('Credential', null)).toBeNull();
265
- expect(
266
- await service.encryptFields('Credential', undefined)
267
- ).toBeUndefined();
268
- expect(await service.encryptFields('Credential', 'string')).toBe(
269
- 'string'
270
- );
271
- expect(await service.encryptFields('Credential', 123)).toBe(123);
272
- });
273
- });
274
-
275
- describe('decryptFields', () => {
276
- it('should decrypt nested JSON fields', async () => {
277
- const document = {
278
- id: '123',
279
- data: {
280
- access_token: 'keyId:secret123:iv:enckey',
281
- refresh_token: 'keyId:refresh456:iv:enckey',
282
- other: 'public',
283
- },
284
- };
285
-
286
- const result = await service.decryptFields('Credential', document);
287
-
288
- expect(mockCryptor.decrypt).toHaveBeenCalledWith(
289
- 'keyId:secret123:iv:enckey'
290
- );
291
- expect(mockCryptor.decrypt).toHaveBeenCalledWith(
292
- 'keyId:refresh456:iv:enckey'
293
- );
294
- expect(result.data.access_token).toBe('secret123');
295
- expect(result.data.refresh_token).toBe('refresh456');
296
- expect(result.data.other).toBe('public'); // Not decrypted
297
- });
298
-
299
- it('should decrypt top-level fields', async () => {
300
- const document = {
301
- id: '123',
302
- hashword: 'keyId:password_hash:iv:enckey',
303
- };
304
-
305
- const result = await service.decryptFields('User', document);
306
-
307
- expect(mockCryptor.decrypt).toHaveBeenCalledWith(
308
- 'keyId:password_hash:iv:enckey'
309
- );
310
- expect(result.hashword).toBe('password_hash');
311
- });
312
-
313
- it('should skip non-encrypted values', async () => {
314
- const document = {
315
- data: {
316
- access_token: 'plaintext', // Not encrypted format
317
- refresh_token: 'keyId:encrypted:iv:enckey',
318
- },
319
- };
320
-
321
- await service.decryptFields('Credential', document);
322
-
323
- expect(mockCryptor.decrypt).toHaveBeenCalledTimes(1);
324
- expect(mockCryptor.decrypt).toHaveBeenCalledWith(
325
- 'keyId:encrypted:iv:enckey'
326
- );
327
- });
328
-
329
- it('should not mutate original document', async () => {
330
- const document = {
331
- data: { access_token: 'keyId:secret:iv:enckey' },
332
- };
333
- const original = JSON.parse(JSON.stringify(document));
334
-
335
- await service.decryptFields('Credential', document);
336
-
337
- expect(document).toEqual(original);
338
- });
339
-
340
- it('should throw on decryption errors', async () => {
341
- mockCryptor.decrypt.mockRejectedValueOnce(
342
- new Error('Decryption failed')
343
- );
344
-
345
- const document = {
346
- data: {
347
- access_token: 'keyId:secret:iv:enckey',
348
- refresh_token: 'keyId:valid:iv:enckey',
349
- },
350
- };
351
-
352
- await expect(
353
- service.decryptFields('Credential', document)
354
- ).rejects.toThrow('Decryption failed');
355
- });
356
- });
357
-
358
- describe('encryptFieldsInBulk', () => {
359
- it('should encrypt multiple documents', async () => {
360
- const documents = [
361
- { data: { access_token: 'secret1' } },
362
- { data: { access_token: 'secret2' } },
363
- ];
364
-
365
- const result = await service.encryptFieldsInBulk(
366
- 'Credential',
367
- documents
368
- );
369
-
370
- expect(result).toHaveLength(2);
371
- expect(result[0].data.access_token).toBe(
372
- 'encrypted:secret1:keydata:enckey'
373
- );
374
- expect(result[1].data.access_token).toBe(
375
- 'encrypted:secret2:keydata:enckey'
376
- );
377
- });
378
-
379
- it('should handle empty array', async () => {
380
- const result = await service.encryptFieldsInBulk('Credential', []);
381
- expect(result).toEqual([]);
382
- });
383
-
384
- it('should return non-array values as-is', async () => {
385
- expect(
386
- await service.encryptFieldsInBulk('Credential', null)
387
- ).toBeNull();
388
- expect(
389
- await service.encryptFieldsInBulk('Credential', { data: {} })
390
- ).toEqual({ data: {} });
391
- });
392
- });
393
-
394
- describe('decryptFieldsInBulk', () => {
395
- it('should decrypt multiple documents', async () => {
396
- const documents = [
397
- { data: { access_token: 'keyId:secret1:iv:enckey' } },
398
- { data: { access_token: 'keyId:secret2:iv:enckey' } },
399
- ];
400
-
401
- const result = await service.decryptFieldsInBulk(
402
- 'Credential',
403
- documents
404
- );
405
-
406
- expect(result).toHaveLength(2);
407
- expect(result[0].data.access_token).toBe('secret1');
408
- expect(result[1].data.access_token).toBe('secret2');
409
- });
410
- });
411
-
412
- describe('_isEncrypted', () => {
413
- it('should detect encrypted format', () => {
414
- expect(service._isEncrypted('keyId:data:iv:enckey')).toBe(true);
415
- expect(
416
- service._isEncrypted('keyId:longer:data:with:colons:enckey')
417
- ).toBe(true);
418
- });
419
-
420
- it('should reject non-encrypted formats', () => {
421
- expect(service._isEncrypted('plaintext')).toBe(false);
422
- expect(service._isEncrypted('one:two:three')).toBe(false);
423
- expect(service._isEncrypted('one:two')).toBe(false);
424
- expect(service._isEncrypted(null)).toBe(false);
425
- expect(service._isEncrypted(undefined)).toBe(false);
426
- expect(service._isEncrypted(123)).toBe(false);
427
- });
428
- });
429
-
430
- describe('_getNestedValue', () => {
431
- it('should get top-level value', () => {
432
- const obj = { name: 'test' };
433
- expect(service._getNestedValue(obj, 'name')).toBe('test');
434
- });
435
-
436
- it('should get nested value', () => {
437
- const obj = { data: { token: 'abc' } };
438
- expect(service._getNestedValue(obj, 'data.token')).toBe('abc');
439
- });
440
-
441
- it('should get deeply nested value', () => {
442
- const obj = { level1: { level2: { level3: 'deep' } } };
443
- expect(service._getNestedValue(obj, 'level1.level2.level3')).toBe(
444
- 'deep'
445
- );
446
- });
447
-
448
- it('should return undefined for missing path', () => {
449
- const obj = { data: { token: 'abc' } };
450
- expect(service._getNestedValue(obj, 'data.missing')).toBeUndefined();
451
- });
452
-
453
- it('should handle null/undefined gracefully', () => {
454
- expect(service._getNestedValue(null, 'path')).toBeUndefined();
455
- expect(service._getNestedValue({}, null)).toBeUndefined();
456
- });
457
- });
458
-
459
- describe('_setNestedValue', () => {
460
- it('should set top-level value', () => {
461
- const obj = {};
462
- service._setNestedValue(obj, 'name', 'test');
463
- expect(obj.name).toBe('test');
464
- });
465
-
466
- it('should set nested value', () => {
467
- const obj = {};
468
- service._setNestedValue(obj, 'data.token', 'abc');
469
- expect(obj.data.token).toBe('abc');
470
- });
471
-
472
- it('should set deeply nested value', () => {
473
- const obj = {};
474
- service._setNestedValue(obj, 'level1.level2.level3', 'deep');
475
- expect(obj.level1.level2.level3).toBe('deep');
476
- });
477
-
478
- it('should create intermediate objects', () => {
479
- const obj = { data: {} };
480
- service._setNestedValue(obj, 'data.nested.value', 'test');
481
- expect(obj.data.nested.value).toBe('test');
482
- });
483
-
484
- it('should handle null/undefined gracefully', () => {
485
- service._setNestedValue(null, 'path', 'value'); // Should not throw
486
- service._setNestedValue({}, null, 'value'); // Should not throw
487
- });
488
- });
489
-
490
- describe('_deepClone', () => {
491
- it('should clone objects', () => {
492
- const obj = { a: 1, b: { c: 2 } };
493
- const clone = service._deepClone(obj);
494
-
495
- expect(clone).toEqual(obj);
496
- expect(clone).not.toBe(obj);
497
- expect(clone.b).not.toBe(obj.b);
498
- });
499
-
500
- it('should clone arrays', () => {
501
- const arr = [1, 2, { a: 3 }];
502
- const clone = service._deepClone(arr);
503
-
504
- expect(clone).toEqual(arr);
505
- expect(clone).not.toBe(arr);
506
- expect(clone[2]).not.toBe(arr[2]);
507
- });
508
-
509
- it('should clone dates', () => {
510
- const date = new Date('2024-01-01');
511
- const clone = service._deepClone(date);
512
-
513
- expect(clone).toEqual(date);
514
- expect(clone).not.toBe(date);
515
- });
516
-
517
- it('should handle primitives', () => {
518
- expect(service._deepClone(null)).toBeNull();
519
- expect(service._deepClone(undefined)).toBeUndefined();
520
- expect(service._deepClone(123)).toBe(123);
521
- expect(service._deepClone('string')).toBe('string');
522
- expect(service._deepClone(true)).toBe(true);
523
- });
524
- });
525
- });