You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
219 lines
6.8 KiB
TypeScript
219 lines
6.8 KiB
TypeScript
import { describe, test, expect, beforeAll, afterAll, beforeEach, afterEach } from 'bun:test';
|
|
import { Database } from 'bun:sqlite';
|
|
import { WebhookServer } from '../../../src/server';
|
|
import { initializeDatabase } from '../../../src/db';
|
|
import { ResponseQueue } from '../../../src/services/response-queue';
|
|
|
|
let testDb: Database;
|
|
let originalAdd: any;
|
|
|
|
let simulatedQueue: any[] = [];
|
|
const SimulatedResponseQueue = {
|
|
async add(responses: any[]) {
|
|
simulatedQueue.push(...responses);
|
|
},
|
|
clear() { simulatedQueue = []; },
|
|
get() { return simulatedQueue; }
|
|
};
|
|
|
|
const createTestRequest = (payload: any) =>
|
|
new Request('http://localhost:3007', {
|
|
method: 'POST',
|
|
headers: { 'Content-Type': 'application/json' },
|
|
body: JSON.stringify(payload)
|
|
});
|
|
|
|
describe('WebhookServer - /admin aprobación en modo enforce', () => {
|
|
const envBackup = process.env;
|
|
|
|
beforeAll(() => {
|
|
testDb = new Database(':memory:');
|
|
initializeDatabase(testDb);
|
|
originalAdd = (ResponseQueue as any).add;
|
|
});
|
|
|
|
afterAll(() => {
|
|
(ResponseQueue as any).add = originalAdd;
|
|
testDb.close();
|
|
});
|
|
|
|
beforeEach(() => {
|
|
process.env = {
|
|
...envBackup,
|
|
NODE_ENV: 'test',
|
|
GROUP_GATING_MODE: 'enforce',
|
|
ADMIN_USERS: '1234567890'
|
|
};
|
|
SimulatedResponseQueue.clear();
|
|
(ResponseQueue as any).add = SimulatedResponseQueue.add;
|
|
WebhookServer.dbInstance = testDb;
|
|
|
|
testDb.exec('DELETE FROM response_queue');
|
|
testDb.exec('DELETE FROM allowed_groups');
|
|
testDb.exec('DELETE FROM users');
|
|
});
|
|
|
|
afterEach(() => {
|
|
process.env = envBackup;
|
|
});
|
|
|
|
test('admin puede habilitar el grupo actual incluso si no está allowed', async () => {
|
|
const payload = {
|
|
event: 'messages.upsert',
|
|
instance: 'test-instance',
|
|
data: {
|
|
key: {
|
|
remoteJid: 'new-group@g.us',
|
|
participant: '1234567890@s.whatsapp.net'
|
|
},
|
|
message: { conversation: '/admin habilitar-aquí' }
|
|
}
|
|
};
|
|
|
|
const res = await WebhookServer.handleRequest(createTestRequest(payload));
|
|
expect(res.status).toBe(200);
|
|
|
|
// Debe haber respuesta de confirmación encolada
|
|
expect(SimulatedResponseQueue.get().length).toBeGreaterThan(0);
|
|
|
|
// El grupo debe figurar como allowed
|
|
const row = testDb.query(`SELECT status FROM allowed_groups WHERE group_id = 'new-group@g.us'`).get() as any;
|
|
expect(row && String(row.status)).toBe('allowed');
|
|
});
|
|
|
|
test('no admin no puede usar /admin', async () => {
|
|
process.env.ADMIN_USERS = '5555555555';
|
|
|
|
const payload = {
|
|
event: 'messages.upsert',
|
|
instance: 'test-instance',
|
|
data: {
|
|
key: {
|
|
remoteJid: 'another-group@g.us',
|
|
participant: '1234567890@s.whatsapp.net'
|
|
},
|
|
message: { conversation: '/admin habilitar-aquí' }
|
|
}
|
|
};
|
|
|
|
const res = await WebhookServer.handleRequest(createTestRequest(payload));
|
|
expect(res.status).toBe(200);
|
|
|
|
// Debe haber una respuesta indicando no autorizado
|
|
const out = SimulatedResponseQueue.get();
|
|
expect(out.length).toBe(1);
|
|
expect(String(out[0].message).toLowerCase()).toContain('no estás autorizado');
|
|
|
|
// Y el grupo no debe estar allowed
|
|
const row = testDb.query(`SELECT status FROM allowed_groups WHERE group_id = 'another-group@g.us'`).get() as any;
|
|
expect(row == null).toBe(true);
|
|
});
|
|
|
|
test('admin puede habilitar el grupo actual con alias /admin enable', async () => {
|
|
const payload = {
|
|
event: 'messages.upsert',
|
|
instance: 'test-instance',
|
|
data: {
|
|
key: {
|
|
remoteJid: 'new-group-alias@g.us',
|
|
participant: '1234567890@s.whatsapp.net'
|
|
},
|
|
message: { conversation: '/admin enable' }
|
|
}
|
|
};
|
|
|
|
const res = await WebhookServer.handleRequest(createTestRequest(payload));
|
|
expect(res.status).toBe(200);
|
|
|
|
// Debe haber respuesta de confirmación encolada
|
|
expect(SimulatedResponseQueue.get().length).toBeGreaterThan(0);
|
|
|
|
// El grupo debe figurar como allowed
|
|
const row = testDb.query(`SELECT status FROM allowed_groups WHERE group_id = 'new-group-alias@g.us'`).get() as any;
|
|
expect(row && String(row.status)).toBe('allowed');
|
|
});
|
|
|
|
test('admin puede deshabilitar el grupo actual con alias /admin disable', async () => {
|
|
const payload = {
|
|
event: 'messages.upsert',
|
|
instance: 'test-instance',
|
|
data: {
|
|
key: {
|
|
remoteJid: 'disable-group@g.us',
|
|
participant: '1234567890@s.whatsapp.net'
|
|
},
|
|
message: { conversation: '/admin disable' }
|
|
}
|
|
};
|
|
|
|
const res = await WebhookServer.handleRequest(createTestRequest(payload));
|
|
expect(res.status).toBe(200);
|
|
|
|
expect(SimulatedResponseQueue.get().length).toBeGreaterThan(0);
|
|
|
|
const row = testDb.query(`SELECT status FROM allowed_groups WHERE group_id = 'disable-group@g.us'`).get() as any;
|
|
expect(row && String(row.status)).toBe('blocked');
|
|
});
|
|
|
|
test('admin puede permitir un grupo por JID con alias /admin allow <jid>', async () => {
|
|
const payload = {
|
|
event: 'messages.upsert',
|
|
instance: 'test-instance',
|
|
data: {
|
|
key: {
|
|
remoteJid: 'some-group@g.us',
|
|
participant: '1234567890@s.whatsapp.net'
|
|
},
|
|
message: { conversation: '/admin allow target-allow@g.us' }
|
|
}
|
|
};
|
|
|
|
const res = await WebhookServer.handleRequest(createTestRequest(payload));
|
|
expect(res.status).toBe(200);
|
|
|
|
const row = testDb.query(`SELECT status FROM allowed_groups WHERE group_id = 'target-allow@g.us'`).get() as any;
|
|
expect(row && String(row.status)).toBe('allowed');
|
|
});
|
|
|
|
test('admin puede bloquear un grupo por JID con alias /admin block <jid>', async () => {
|
|
const payload = {
|
|
event: 'messages.upsert',
|
|
instance: 'test-instance',
|
|
data: {
|
|
key: {
|
|
remoteJid: 'some-group@g.us',
|
|
participant: '1234567890@s.whatsapp.net'
|
|
},
|
|
message: { conversation: '/admin block target-block@g.us' }
|
|
}
|
|
};
|
|
|
|
const res = await WebhookServer.handleRequest(createTestRequest(payload));
|
|
expect(res.status).toBe(200);
|
|
|
|
const row = testDb.query(`SELECT status FROM allowed_groups WHERE group_id = 'target-block@g.us'`).get() as any;
|
|
expect(row && String(row.status)).toBe('blocked');
|
|
});
|
|
|
|
test('admin puede ver pendientes con alias /admin pending', async () => {
|
|
const payload = {
|
|
event: 'messages.upsert',
|
|
instance: 'test-instance',
|
|
data: {
|
|
key: {
|
|
remoteJid: 'some-group@g.us',
|
|
participant: '1234567890@s.whatsapp.net'
|
|
},
|
|
message: { conversation: '/admin pending' }
|
|
}
|
|
};
|
|
|
|
const res = await WebhookServer.handleRequest(createTestRequest(payload));
|
|
expect(res.status).toBe(200);
|
|
|
|
const out = SimulatedResponseQueue.get();
|
|
expect(out.length).toBe(1);
|
|
expect(String(out[0].message).toLowerCase()).toContain('no hay grupos pendientes');
|
|
});
|
|
});
|