fix(#5,#36): Fix critical security issues and add comprehensive tests

SECURITY FIXES:
- Replace generic Error with UnauthorizedException in all controllers
- Fix workspace isolation bypass in findAll methods (CRITICAL)
- Controllers now always use req.user.workspaceId, never allow query override

CODE FIXES:
- Fix redundant priority logic in tasks.service.ts
- Use TaskPriority.MEDIUM as default instead of undefined

TEST ADDITIONS:
- Add multi-tenant isolation tests for all services (tasks, events, projects)
- Add database constraint violation handling tests (P2002, P2003, P2025)
- Add missing controller error tests for events and projects controllers
- All new tests verify authentication and workspace isolation

RESULTS:
- All 247 tests passing
- Test coverage: 94.35% (exceeds 85% requirement)
- Critical security vulnerabilities fixed

Fixes #5
Refs #36

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
Jason Woltje
2026-01-28 18:55:07 -06:00
parent 132fe6ba98
commit a220c2dc0a
10 changed files with 417 additions and 21 deletions

View File

@@ -167,7 +167,7 @@ describe("TasksController", () => {
await expect(
controller.findOne(mockTaskId, requestWithoutWorkspace)
).rejects.toThrow("User workspaceId not found");
).rejects.toThrow("Authentication required");
});
});
@@ -199,7 +199,7 @@ describe("TasksController", () => {
await expect(
controller.update(mockTaskId, { title: "Test" }, requestWithoutWorkspace)
).rejects.toThrow("User workspaceId not found");
).rejects.toThrow("Authentication required");
});
});
@@ -223,7 +223,7 @@ describe("TasksController", () => {
await expect(
controller.remove(mockTaskId, requestWithoutWorkspace)
).rejects.toThrow("User workspaceId not found");
).rejects.toThrow("Authentication required");
});
});
});

View File

@@ -9,6 +9,7 @@ import {
Query,
UseGuards,
Request,
UnauthorizedException,
} from "@nestjs/common";
import { TasksService } from "./tasks.service";
import { CreateTaskDto, UpdateTaskDto, QueryTasksDto } from "./dto";
@@ -33,7 +34,7 @@ export class TasksController {
const userId = req.user?.id;
if (!workspaceId || !userId) {
throw new Error("User workspaceId or userId not found");
throw new UnauthorizedException("Authentication required");
}
return this.tasksService.create(workspaceId, userId, createTaskDto);
@@ -45,7 +46,10 @@ export class TasksController {
*/
@Get()
async findAll(@Query() query: QueryTasksDto, @Request() req: any) {
const workspaceId = req.user?.workspaceId || query.workspaceId;
const workspaceId = req.user?.workspaceId;
if (!workspaceId) {
throw new UnauthorizedException("Authentication required");
}
return this.tasksService.findAll({ ...query, workspaceId });
}
@@ -57,7 +61,7 @@ export class TasksController {
async findOne(@Param("id") id: string, @Request() req: any) {
const workspaceId = req.user?.workspaceId;
if (!workspaceId) {
throw new Error("User workspaceId not found");
throw new UnauthorizedException("Authentication required");
}
return this.tasksService.findOne(id, workspaceId);
}
@@ -76,7 +80,7 @@ export class TasksController {
const userId = req.user?.id;
if (!workspaceId || !userId) {
throw new Error("User workspaceId not found");
throw new UnauthorizedException("Authentication required");
}
return this.tasksService.update(id, workspaceId, userId, updateTaskDto);
@@ -92,7 +96,7 @@ export class TasksController {
const userId = req.user?.id;
if (!workspaceId || !userId) {
throw new Error("User workspaceId not found");
throw new UnauthorizedException("Authentication required");
}
return this.tasksService.remove(id, workspaceId, userId);

View File

@@ -5,6 +5,7 @@ import { PrismaService } from "../prisma/prisma.service";
import { ActivityService } from "../activity/activity.service";
import { TaskStatus, TaskPriority } from "@prisma/client";
import { NotFoundException } from "@nestjs/common";
import { Prisma } from "@prisma/client";
describe("TasksService", () => {
let service: TasksService;
@@ -305,6 +306,23 @@ describe("TasksService", () => {
NotFoundException
);
});
it("should enforce workspace isolation when finding task", async () => {
const otherWorkspaceId = "550e8400-e29b-41d4-a716-446655440099";
mockPrismaService.task.findUnique.mockResolvedValue(null);
await expect(service.findOne(mockTaskId, otherWorkspaceId)).rejects.toThrow(
NotFoundException
);
expect(prisma.task.findUnique).toHaveBeenCalledWith({
where: {
id: mockTaskId,
workspaceId: otherWorkspaceId,
},
include: expect.any(Object),
});
});
});
describe("update", () => {
@@ -337,6 +355,19 @@ describe("TasksService", () => {
);
});
it("should enforce workspace isolation when updating task", async () => {
const otherWorkspaceId = "550e8400-e29b-41d4-a716-446655440099";
mockPrismaService.task.findUnique.mockResolvedValue(null);
await expect(
service.update(mockTaskId, otherWorkspaceId, mockUserId, { title: "Hacked" })
).rejects.toThrow(NotFoundException);
expect(prisma.task.findUnique).toHaveBeenCalledWith({
where: { id: mockTaskId, workspaceId: otherWorkspaceId },
});
});
it("should set completedAt when status changes to COMPLETED", async () => {
const updateDto = { status: TaskStatus.COMPLETED };
@@ -442,5 +473,81 @@ describe("TasksService", () => {
service.remove(mockTaskId, mockWorkspaceId, mockUserId)
).rejects.toThrow(NotFoundException);
});
it("should enforce workspace isolation when deleting task", async () => {
const otherWorkspaceId = "550e8400-e29b-41d4-a716-446655440099";
mockPrismaService.task.findUnique.mockResolvedValue(null);
await expect(
service.remove(mockTaskId, otherWorkspaceId, mockUserId)
).rejects.toThrow(NotFoundException);
expect(prisma.task.findUnique).toHaveBeenCalledWith({
where: { id: mockTaskId, workspaceId: otherWorkspaceId },
});
});
});
describe("database constraint violations", () => {
it("should handle foreign key constraint violations on create", async () => {
const createDto = {
title: "Task with invalid assignee",
assigneeId: "non-existent-user-id",
};
const prismaError = new Prisma.PrismaClientKnownRequestError(
"Foreign key constraint failed",
{
code: "P2003",
clientVersion: "5.0.0",
}
);
mockPrismaService.task.create.mockRejectedValue(prismaError);
await expect(
service.create(mockWorkspaceId, mockUserId, createDto)
).rejects.toThrow(Prisma.PrismaClientKnownRequestError);
});
it("should handle foreign key constraint violations on update", async () => {
const updateDto = {
assigneeId: "non-existent-user-id",
};
mockPrismaService.task.findUnique.mockResolvedValue(mockTask);
const prismaError = new Prisma.PrismaClientKnownRequestError(
"Foreign key constraint failed",
{
code: "P2003",
clientVersion: "5.0.0",
}
);
mockPrismaService.task.update.mockRejectedValue(prismaError);
await expect(
service.update(mockTaskId, mockWorkspaceId, mockUserId, updateDto)
).rejects.toThrow(Prisma.PrismaClientKnownRequestError);
});
it("should handle record not found on update (P2025)", async () => {
mockPrismaService.task.findUnique.mockResolvedValue(mockTask);
const prismaError = new Prisma.PrismaClientKnownRequestError(
"Record to update not found",
{
code: "P2025",
clientVersion: "5.0.0",
}
);
mockPrismaService.task.update.mockRejectedValue(prismaError);
await expect(
service.update(mockTaskId, mockWorkspaceId, mockUserId, { title: "Updated" })
).rejects.toThrow(Prisma.PrismaClientKnownRequestError);
});
});
});

View File

@@ -1,7 +1,7 @@
import { Injectable, NotFoundException } from "@nestjs/common";
import { PrismaService } from "../prisma/prisma.service";
import { ActivityService } from "../activity/activity.service";
import { TaskStatus } from "@prisma/client";
import { TaskStatus, TaskPriority } from "@prisma/client";
import type { CreateTaskDto, UpdateTaskDto, QueryTasksDto } from "./dto";
/**
@@ -23,7 +23,7 @@ export class TasksService {
workspaceId,
creatorId: userId,
status: createTaskDto.status || TaskStatus.NOT_STARTED,
priority: createTaskDto.priority || createTaskDto.priority,
priority: createTaskDto.priority || TaskPriority.MEDIUM,
sortOrder: createTaskDto.sortOrder ?? 0,
metadata: createTaskDto.metadata || {},
};