test(notification): expand audience auth coverage

This commit is contained in:
2026-03-30 12:33:10 +02:00
parent 019c267435
commit a0fcc0afbb
@@ -52,6 +52,40 @@ describe("notification router authorization", () => {
expect(findMany).not.toHaveBeenCalled(); expect(findMany).not.toHaveBeenCalled();
}); });
it("requires authentication for unread counts, reminders, and self-service deletes", async () => {
const count = vi.fn();
const findFirst = vi.fn();
const deleteFn = vi.fn();
const caller = createCaller(createContext({
notification: {
count,
findMany: vi.fn(),
findFirst,
delete: deleteFn,
},
user: {
findUnique: vi.fn(),
},
}, { session: false }));
await expect(caller.unreadCount()).rejects.toMatchObject({
code: "UNAUTHORIZED",
message: "Authentication required",
});
await expect(caller.listReminders({ limit: 10 })).rejects.toMatchObject({
code: "UNAUTHORIZED",
message: "Authentication required",
});
await expect(caller.delete({ id: "notif_1" })).rejects.toMatchObject({
code: "UNAUTHORIZED",
message: "Authentication required",
});
expect(count).not.toHaveBeenCalled();
expect(findFirst).not.toHaveBeenCalled();
expect(deleteFn).not.toHaveBeenCalled();
});
it("forbids regular users from creating broadcasts", async () => { it("forbids regular users from creating broadcasts", async () => {
const create = vi.fn(); const create = vi.fn();
const caller = createCaller(createContext({ const caller = createCaller(createContext({
@@ -71,6 +105,34 @@ describe("notification router authorization", () => {
expect(create).not.toHaveBeenCalled(); expect(create).not.toHaveBeenCalled();
}); });
it("forbids regular users from reading broadcasts or creating tasks", async () => {
const findUnique = vi.fn();
const create = vi.fn();
const caller = createCaller(createContext({
notificationBroadcast: {
findUnique,
},
notification: {
create,
},
}));
await expect(caller.getBroadcastById({ id: "broadcast_1" })).rejects.toMatchObject({
code: "FORBIDDEN",
message: "Manager or Admin role required",
});
await expect(caller.createTask({
userId: "user_2",
title: "Review proposal",
})).rejects.toMatchObject({
code: "FORBIDDEN",
message: "Manager or Admin role required",
});
expect(findUnique).not.toHaveBeenCalled();
expect(create).not.toHaveBeenCalled();
});
it("forbids regular users from reassigning tasks", async () => { it("forbids regular users from reassigning tasks", async () => {
const findUnique = vi.fn(); const findUnique = vi.fn();
const caller = createCaller(createContext({ const caller = createCaller(createContext({
@@ -113,4 +175,31 @@ describe("notification router authorization", () => {
}, },
}); });
}); });
it("allows managers to read individual broadcasts", async () => {
const findUnique = vi.fn().mockResolvedValue({
id: "broadcast_1",
title: "Ops update",
sender: { id: "user_mgr", name: "Manager", email: "mgr@example.com" },
});
const caller = createCaller(createContext({
notificationBroadcast: {
findUnique,
},
}, { role: SystemRole.MANAGER }));
const result = await caller.getBroadcastById({ id: "broadcast_1" });
expect(result).toEqual({
id: "broadcast_1",
title: "Ops update",
sender: { id: "user_mgr", name: "Manager", email: "mgr@example.com" },
});
expect(findUnique).toHaveBeenCalledWith({
where: { id: "broadcast_1" },
include: {
sender: { select: { id: true, name: true, email: true } },
},
});
});
}); });