21 Commits

Author SHA1 Message Date
Romuald Członkowski
9e71c71698 Merge pull request #120 from czlonkowski/fix/issue-118-mcp-connection-loss
### Fixed
- **Memory Leak in SimpleCache**: Fixed critical memory leak causing MCP server connection loss after several hours (fixes #118)
  - Added proper timer cleanup in `SimpleCache.destroy()` method
  - Updated MCP server shutdown to clean up cache timers
  - Enhanced HTTP server error handling with transport error handlers
  - Fixed event listener cleanup to prevent accumulation
  - Added comprehensive test coverage for memory leak prevention
2025-08-02 15:24:53 +02:00
czlonkowski
df4066022f chore: bump version to 2.10.1 for memory leak fix release
- Updated version in package.json and package.runtime.json
- Updated README version badge
- Moved changelog entry from Unreleased to v2.10.1
- Added version comparison link for v2.10.1

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-08-02 15:18:58 +02:00
czlonkowski
7a71c3c3f8 fix: memory leak in SimpleCache causing MCP connection loss (fixes #118)
- Added cleanupTimer property to track setInterval timer
- Implemented destroy() method to clear timer and prevent memory leak
- Updated MCP server shutdown to call cache.destroy()
- Enhanced HTTP server error handling with transport.onerror
- Fixed event listener cleanup to prevent accumulation
- Added comprehensive test coverage for memory leak prevention

This fixes the issue where MCP server would lose connection after
several hours due to timer accumulation causing memory exhaustion.

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-08-02 14:45:58 +02:00
Romuald Członkowski
3bfad51519 Merge pull request #119 from czlonkowski/ci-cd
feat: Add automated release system with CI/CD pipeline
2025-08-02 13:03:38 +02:00
czlonkowski
907d3846a9 chore: release v2.10.0
- Added automated release system with GitHub Actions
- Implemented CI/CD pipeline for zero-touch releases
- Added security fixes for deprecated actions and vulnerabilities
- Created developer tools for release preparation
- Full documentation in docs/AUTOMATED_RELEASES.md
2025-08-02 12:37:18 +02:00
Romuald Członkowski
6de82cd2b9 Merge pull request #117 from czlonkowski/bugfix/general-fixes
fix: Docker build failures and outdated pre-built images
2025-08-02 12:01:16 +02:00
czlonkowski
6856add177 fix: address code review feedback for Docker consolidation
- Improved GitHub Actions test to verify N8N_MODE environment variable
- Added explanatory comment in docker-compose.n8n.yml
- Added Docker Build Changes section to deployment documentation
- Explains the consolidation benefits and rationale for users
2025-08-02 11:54:33 +02:00
czlonkowski
3eecda4bd5 refactor: consolidate Docker builds by removing redundant Dockerfile.n8n
- Research proved n8n packages are NOT required at runtime for N8N_MODE
- The 'n8n' CMD argument was vestigial and completely ignored by code
- N8N_MODE only affects protocol negotiation, not runtime functionality
- Standard Dockerfile works perfectly with N8N_MODE=true

Benefits:
- Eliminates 500MB+ of unnecessary n8n packages from Docker images
- Reduces build time from 8+ minutes to 1-2 minutes
- Simplifies maintenance with single Dockerfile
- Improves CI/CD reliability

Updated:
- Removed Dockerfile.n8n
- Updated GitHub Actions to use standard Dockerfile
- Fixed docker-compose.n8n.yml to use standard Dockerfile
- Added missing MCP_MODE=http and AUTH_TOKEN env vars
- Updated all documentation references
2025-08-02 11:52:04 +02:00
czlonkowski
1c6bff7d42 fix: add missing axios dependency to runtime dependencies
- The Docker build was failing because axios is used by n8n-api-client.ts
- This dependency was missing from package.runtime.json causing container startup failures
- Fixes the Docker CI/CD pipeline that was stuck at v2.3.0
2025-08-02 11:15:14 +02:00
czlonkowski
8864d6fa5c fix: resolve Docker CI/CD and deployment documentation issues
- Create missing v2.9.1 git tag to trigger Docker builds
- Fix GitHub Actions workflow with proper environment variables
- Add comprehensive deployment documentation updates:
  * Add missing MCP_MODE=http environment variable requirement
  * Clarify Server URL must include /mcp endpoint
  * Add complete environment variables reference table
  * Update all Docker examples with proper variable configuration
  * Add version compatibility warnings for pre-built images
  * Document build-from-source as recommended approach
  * Add comprehensive troubleshooting section with common issues
  * Include systematic debugging steps and diagnostic commands
- Optimize package.runtime.json dependencies for Docker builds
- Ensure both MCP_AUTH_TOKEN and AUTH_TOKEN use same value

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-08-02 11:11:57 +02:00
Romuald Członkowski
f6906d7971 Merge pull request #116 from czlonkowski/fix/issue-90-fixed-collection-validation
fix: prevent 'propertyValues[itemName] is not iterable' error (fixes #90)
2025-08-02 10:51:38 +02:00
czlonkowski
296bf76e68 fix: resolve TypeScript errors in test files
- Fixed MCP_MODE type assignment in console-manager.test.ts
- Fixed prototype pollution test TypeScript errors in fixed-collection-validator.test.ts
- All linting checks now pass

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-08-02 10:27:45 +02:00
czlonkowski
a2be2b36d5 chore: release v2.9.1
- Bumped version from 2.9.0 to 2.9.1
- Updated version badge in README.md
- Added comprehensive changelog entry documenting fixedCollection validation fixes
- Increased test coverage from 79.95% to 80.16% to meet CI requirements
- Added 50 new tests for fixed-collection-validator and console-manager

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-08-02 10:16:03 +02:00
czlonkowski
35b4e77bcd fix: resolve TypeScript errors in fixed-collection-validator tests
- Added type imports and isNodeConfig type guard helper
- Fixed all 'autofix is possibly undefined' errors
- Added proper type guards for accessing properties on union type
- Maintained test logic integrity while ensuring type safety

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-08-02 09:35:15 +02:00
czlonkowski
a5c60ddde1 fix: address code review feedback for generic fixedCollection validator
- Fixed node type casing inconsistencies (compareDatasets -> comparedatasets, httpRequest -> httprequest)
- Improved error handling in hasInvalidStructure method with null/array checks
- Replaced all 'any' types with proper TypeScript types (NodeConfig, NodeConfigValue)
- Fixed potential memory leak in getAllPatterns by creating deep copies
- Added circular reference protection using WeakSet in hasInvalidStructure

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-08-02 09:20:56 +02:00
czlonkowski
066e7fc668 feat: create generic fixedCollection validation utility
- Add FixedCollectionValidator utility to handle all fixedCollection patterns
- Support validation for 12 different node types including Switch, If, Filter,
  Summarize, Compare Datasets, Sort, Aggregate, Set, HTML, HTTP Request, and Airtable
- Refactor enhanced-config-validator to use the generic utility
- Add comprehensive tests with 19 test cases covering all node types
- Maintain backward compatibility with existing validation behavior

This prevents the 'propertyValues[itemName] is not iterable' error across all
susceptible n8n nodes, not just Switch/If/Filter.
2025-08-02 09:09:30 +02:00
czlonkowski
ff17fbcc0a refactor: optimize fixedCollection validation based on code review
- Replace Math.random() with deterministic index-based output keys
- Remove redundant validation logic in node-specific validators
- Keep validation DRY by checking if fixedCollection errors already exist
- Maintain all functionality while improving performance
2025-08-02 08:21:34 +02:00
czlonkowski
f6c9548839 fix: add validation for fixedCollection structures to prevent 'propertyValues[itemName] is not iterable' error (issue #90)
- Add validateFixedCollectionStructures method to detect invalid nested structures
- Add specific validators for Switch, If, and Filter nodes
- Provide auto-fix suggestions that transform invalid structures to correct ones
- Add comprehensive test coverage with 16 test cases
- Integrate validation into EnhancedConfigValidator and WorkflowValidator

This prevents AI agents from creating workflows that fail to load in n8n UI.
2025-08-02 08:16:58 +02:00
czlonkowski
6b78c19545 fix: resolve issue #90 - prevent 'propertyValues[itemName] is not iterable' error
- Add validation for invalid fixedCollection structures in Switch, If, and Filter nodes
- Detect and prevent nested 'conditions.values' patterns that cause n8n UI crashes
- Support both 'n8n-nodes-base.x' and 'nodes-base.x' node type formats
- Provide auto-fix suggestions for invalid structures
- Add comprehensive test coverage for all edge cases

This prevents AI agents from creating invalid node configurations that break n8n's UI.
2025-08-02 00:42:25 +02:00
Romuald Członkowski
7fbab3ec49 Merge pull request #112 from czlonkowski/feature/n8n-integration
## [2.9.0] - 2025-08-01

### Added
- **n8n Integration with MCP Client Tool Support**: Complete n8n integration enabling n8n-mcp to run as MCP server within n8n workflows
  - Full compatibility with n8n's MCP Client Tool node
  - Dedicated n8n mode (`N8N_MODE=true`) for optimized operation
  - Workflow examples and n8n-friendly tool descriptions
  - Quick deployment script (`deploy/quick-deploy-n8n.sh`) for easy setup
  - Docker configuration specifically for n8n deployment (`Dockerfile.n8n`, `docker-compose.n8n.yml`)
  - Test scripts for n8n integration (`test-n8n-integration.sh`, `test-n8n-mode.sh`)
- **n8n Deployment Documentation**: Comprehensive guide for deploying n8n-MCP with n8n (`docs/N8N_DEPLOYMENT.md`)
  - Local testing instructions using `/scripts/test-n8n-mode.sh`
  - Production deployment with Docker Compose
  - Cloud deployment guide for Hetzner, AWS, and other providers
  - n8n MCP Client Tool setup and configuration
  - Troubleshooting section with common issues and solutions
- **Protocol Version Negotiation**: Intelligent client detection for n8n compatibility
  - Automatically detects n8n clients and uses protocol version 2024-11-05
  - Standard MCP clients get the latest version (2025-03-26)
  - Improves compatibility with n8n's MCP Client Tool node
  - Comprehensive protocol negotiation test suite
- **Comprehensive Parameter Validation**: Enhanced validation for all MCP tools
  - Clear, user-friendly error messages for invalid parameters
  - Numeric parameter conversion and edge case handling
  - 52 new parameter validation tests
  - Consistent error format across all tools
- **Session Management**: Improved session handling with comprehensive test coverage
  - Fixed memory leak potential with async cleanup
  - Better connection close handling
  - Enhanced session management tests
- **Dynamic README Version Badge**: Made version badge update automatically from package.json
  - Added `update-readme-version.js` script
  - Enhanced `sync-runtime-version.js` to update README badges
  - Version badge now stays in sync during publish workflow

### Fixed
- **Docker Build Optimization**: Fixed Dockerfile.n8n using wrong dependencies
  - Now uses `package.runtime.json` instead of full `package.json`
  - Reduces build time from 13+ minutes to 1-2 minutes
  - Fixes ARM64 build failures due to network timeouts
  - Reduces image size from ~1.5GB to ~280MB
- **CI Test Failures**: Resolved Docker entrypoint permission issues
  - Updated tests to accept dynamic UID range (10000-59999)
  - Enhanced lock file creation with better error recovery
  - Fixed TypeScript lint errors in test files
  - Fixed flaky performance tests with deterministic versions
- **Schema Validation Issues**: Fixed n8n nested output format compatibility
  - Added validation for n8n's nested output workaround
  - Fixed schema validation errors with n8n MCP Client Tool
  - Enhanced error sanitization for production environments

### Changed
- **Memory Management**: Improved session cleanup to prevent memory leaks
- **Error Handling**: Enhanced error sanitization for production environments
- **Docker Security**: Using unpredictable UIDs/GIDs (10000-59999 range) for better security
- **CI/CD Configuration**: Made codecov patch coverage informational to prevent CI failures on infrastructure code
- **Test Scripts**: Enhanced with Docker auto-installation and better user experience
  - Added colored output and progress indicators
  - Automatic Docker installation for multiple operating systems
  - n8n API key flow for management tools

### Security
- **Enhanced Docker Security**: Dynamic UID/GID generation for containers
- **Error Sanitization**: Improved error messages to prevent information leakage
- **Permission Handling**: Better permission management for mounted volumes
- **Input Validation**: Comprehensive parameter validation prevents injection attacks
2025-08-02 00:11:44 +02:00
Romuald Członkowski
23327f5dc7 Merge pull request #106 from czlonkowski/fix/docker-config-file-support
fix: add Docker configuration file support (fixes #105)
2025-07-31 18:07:48 +02:00
19 changed files with 3277 additions and 154 deletions

View File

@@ -53,7 +53,7 @@ jobs:
uses: docker/build-push-action@v5
with:
context: .
file: ./Dockerfile.n8n
file: ./Dockerfile
push: ${{ github.event_name != 'pull_request' }}
tags: ${{ steps.meta.outputs.tags }}
labels: ${{ steps.meta.outputs.labels }}
@@ -82,13 +82,16 @@ jobs:
- name: Test Docker image
run: |
# Test that the image starts correctly with N8N_MODE
docker run --rm \
-e N8N_MODE=true \
-e MCP_MODE=http \
-e N8N_API_URL=http://localhost:5678 \
-e N8N_API_KEY=test \
-e MCP_AUTH_TOKEN=test \
-e MCP_AUTH_TOKEN=test-token-minimum-32-chars-long \
-e AUTH_TOKEN=test-token-minimum-32-chars-long \
${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:latest \
node dist/index.js n8n --version
node -e "console.log('N8N_MODE:', process.env.N8N_MODE); process.exit(0);"
- name: Test health endpoint
run: |
@@ -97,9 +100,11 @@ jobs:
--name n8n-mcp-test \
-p 3000:3000 \
-e N8N_MODE=true \
-e MCP_MODE=http \
-e N8N_API_URL=http://localhost:5678 \
-e N8N_API_KEY=test \
-e MCP_AUTH_TOKEN=test \
-e MCP_AUTH_TOKEN=test-token-minimum-32-chars-long \
-e AUTH_TOKEN=test-token-minimum-32-chars-long \
${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:latest
# Wait for container to start
@@ -108,6 +113,9 @@ jobs:
# Test health endpoint
curl -f http://localhost:3000/health || exit 1
# Test MCP endpoint
curl -f http://localhost:3000/mcp || exit 1
# Cleanup
docker stop n8n-mcp-test
docker rm n8n-mcp-test

View File

@@ -1,79 +0,0 @@
# Multi-stage Dockerfile optimized for n8n integration
# Stage 1: Build stage
FROM node:20-alpine AS builder
# Install build dependencies
RUN apk add --no-cache python3 make g++ git
# Set working directory
WORKDIR /app
# Copy package files
COPY package*.json ./
# Install all dependencies (including dev deps for building)
RUN npm ci
# Copy source code
COPY . .
# Build the application
RUN npm run build
# Stage 2: Production stage
FROM node:20-alpine
# Install runtime dependencies
RUN apk add --no-cache \
curl \
tini \
&& rm -rf /var/cache/apk/*
# Create non-root user with unpredictable UID/GID
# Using a hash of the build time to generate unpredictable IDs
RUN BUILD_HASH=$(date +%s | sha256sum | head -c 8) && \
UID=$((10000 + 0x${BUILD_HASH} % 50000)) && \
GID=$((10000 + 0x${BUILD_HASH} % 50000)) && \
addgroup -g ${GID} n8n-mcp && \
adduser -u ${UID} -G n8n-mcp -s /bin/sh -D n8n-mcp
# Set working directory
WORKDIR /app
# Copy package files (use runtime-only dependencies)
COPY package.runtime.json package.json
# Install production dependencies only
RUN npm install --production --no-audit --no-fund && \
npm cache clean --force
# Copy built application from builder stage
COPY --from=builder /app/dist ./dist
COPY --from=builder /app/data ./data
# Create necessary directories and set permissions
RUN mkdir -p /app/logs /app/data && \
chown -R n8n-mcp:n8n-mcp /app
# Switch to non-root user
USER n8n-mcp
# Set environment variables for n8n mode
ENV NODE_ENV=production \
N8N_MODE=true \
N8N_API_URL="" \
N8N_API_KEY="" \
PORT=3000
# Expose port
EXPOSE 3000
# Health check
HEALTHCHECK --interval=30s --timeout=10s --start-period=40s --retries=3 \
CMD curl -f http://localhost:${PORT}/health || exit 1
# Use tini for proper signal handling
ENTRYPOINT ["/sbin/tini", "--"]
# Start the application in n8n mode
CMD ["node", "dist/index.js", "n8n"]

View File

@@ -2,7 +2,7 @@
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
[![GitHub stars](https://img.shields.io/github/stars/czlonkowski/n8n-mcp?style=social)](https://github.com/czlonkowski/n8n-mcp)
[![Version](https://img.shields.io/badge/version-2.9.0-blue.svg)](https://github.com/czlonkowski/n8n-mcp)
[![Version](https://img.shields.io/badge/version-2.10.1-blue.svg)](https://github.com/czlonkowski/n8n-mcp)
[![npm version](https://img.shields.io/npm/v/n8n-mcp.svg)](https://www.npmjs.com/package/n8n-mcp)
[![codecov](https://codecov.io/gh/czlonkowski/n8n-mcp/graph/badge.svg?token=YOUR_TOKEN)](https://codecov.io/gh/czlonkowski/n8n-mcp)
[![Tests](https://img.shields.io/badge/tests-1356%20passing-brightgreen.svg)](https://github.com/czlonkowski/n8n-mcp/actions)
@@ -781,6 +781,26 @@ Contributions are welcome! Please:
3. Run tests (`npm test`)
4. Submit a pull request
### 🚀 For Maintainers: Automated Releases
This project uses automated releases triggered by version changes:
```bash
# Guided release preparation
npm run prepare:release
# Test release automation
npm run test:release-automation
```
The system automatically handles:
- 🏷️ GitHub releases with changelog content
- 📦 NPM package publishing
- 🐳 Multi-platform Docker images
- 📚 Documentation updates
See [Automated Release Guide](./docs/AUTOMATED_RELEASES.md) for complete details.
## 👏 Acknowledgments
- [n8n](https://n8n.io) team for the workflow automation platform

Binary file not shown.

View File

@@ -32,7 +32,7 @@ services:
n8n-mcp:
build:
context: .
dockerfile: Dockerfile.n8n
dockerfile: Dockerfile # Uses standard Dockerfile with N8N_MODE=true env var
image: ghcr.io/${GITHUB_REPOSITORY:-czlonkowski/n8n-mcp}/n8n-mcp:${VERSION:-latest}
container_name: n8n-mcp
restart: unless-stopped
@@ -41,9 +41,11 @@ services:
environment:
- NODE_ENV=production
- N8N_MODE=true
- MCP_MODE=http
- N8N_API_URL=http://n8n:5678
- N8N_API_KEY=${N8N_API_KEY}
- MCP_AUTH_TOKEN=${MCP_AUTH_TOKEN}
- AUTH_TOKEN=${MCP_AUTH_TOKEN}
- LOG_LEVEL=${LOG_LEVEL:-info}
volumes:
- ./data:/app/data:ro

View File

@@ -5,6 +5,96 @@ All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
## [Unreleased]
## [2.10.1] - 2025-08-02
### Fixed
- **Memory Leak in SimpleCache**: Fixed critical memory leak causing MCP server connection loss after several hours (fixes #118)
- Added proper timer cleanup in `SimpleCache.destroy()` method
- Updated MCP server shutdown to clean up cache timers
- Enhanced HTTP server error handling with transport error handlers
- Fixed event listener cleanup to prevent accumulation
- Added comprehensive test coverage for memory leak prevention
## [2.10.0] - 2025-08-02
### Added
- **Automated Release System**: Complete CI/CD pipeline for automated releases on version bump
- GitHub Actions workflow (`.github/workflows/release.yml`) with 7 coordinated jobs
- Automatic version detection and changelog extraction
- Multi-artifact publishing: GitHub releases, NPM package, Docker images
- Interactive release preparation tool (`npm run prepare:release`)
- Comprehensive release testing tool (`npm run test:release-automation`)
- Full documentation in `docs/AUTOMATED_RELEASES.md`
- Zero-touch releases: version bump → automatic everything
### Security
- **CI/CD Security Enhancements**:
- Replaced deprecated `actions/create-release@v1` with secure `gh` CLI
- Fixed git checkout vulnerability using safe `git show` commands
- Fixed command injection risk using proper argument arrays
- Added concurrency control to prevent simultaneous releases
- Added disk space checks before resource-intensive operations
- Implemented confirmation gates for destructive operations
### Changed
- **Dockerfile Consolidation**: Removed redundant `Dockerfile.n8n` in favor of single optimized `Dockerfile`
- n8n packages are not required at runtime for N8N_MODE functionality
- Standard image works perfectly with `N8N_MODE=true` environment variable
- Reduces build complexity and maintenance overhead
- Image size reduced by 500MB+ (no unnecessary n8n packages)
- Build time improved from 8+ minutes to 1-2 minutes
### Added (CI/CD Features)
- **Developer Tools**:
- `scripts/prepare-release.js`: Interactive guided release tool
- `scripts/test-release-automation.js`: Validates entire release setup
- `scripts/extract-changelog.js`: Modular changelog extraction
- **Release Automation Features**:
- NPM publishing with 3-retry mechanism for network resilience
- Multi-platform Docker builds (amd64, arm64)
- Semantic version validation and prerelease detection
- Automatic documentation badge updates
- Runtime-optimized NPM package (8 deps vs 50+, ~50MB vs 1GB+)
### Fixed
- Fixed missing `axios` dependency in `package.runtime.json` causing Docker build failures
## [2.9.1] - 2025-08-02
### Fixed
- **Fixed Collection Validation**: Fixed critical issue where AI agents created invalid fixedCollection structures causing "propertyValues[itemName] is not iterable" error (fixes #90)
- Created generic `FixedCollectionValidator` utility class that handles 12 different node types
- Validates and auto-fixes common AI-generated patterns for Switch, If, Filter nodes
- Extended support to Summarize, Compare Datasets, Sort, Aggregate, Set, HTML, HTTP Request, and Airtable nodes
- Added comprehensive test coverage with 19 tests for all affected node types
- Provides clear error messages and automatic structure corrections
- **TypeScript Type Safety**: Improved type safety in fixed collection validator
- Replaced all `any` types with proper TypeScript types (`NodeConfig`, `NodeConfigValue`)
- Added type guards for safe property access
- Fixed potential memory leak in `getAllPatterns` by creating deep copies
- Added circular reference protection using `WeakSet` in structure traversal
- **Node Type Normalization**: Fixed inconsistent node type casing
- Normalized `compareDatasets` to `comparedatasets` and `httpRequest` to `httprequest`
- Ensures consistent node type handling across all validation tools
- Maintains backward compatibility with existing workflows
### Enhanced
- **Code Review Improvements**: Addressed all code review feedback
- Made output keys deterministic by removing `Math.random()` usage
- Improved error handling with comprehensive null/undefined/array checks
- Enhanced memory safety with proper object cloning
- Added protection against circular references in configuration objects
### Testing
- **Comprehensive Test Coverage**: Added extensive tests for fixedCollection validation
- 19 tests covering all 12 affected node types
- Tests for edge cases including empty configs, non-object values, and circular references
- Real-world AI agent pattern tests based on actual ChatGPT/Claude generated configs
- Version compatibility tests across all validation profiles
- TypeScript compilation tests ensuring type safety
## [2.9.0] - 2025-08-01
### Added
@@ -994,6 +1084,14 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
- Basic n8n and MCP integration
- Core workflow automation features
[2.10.1]: https://github.com/czlonkowski/n8n-mcp/compare/v2.10.0...v2.10.1
[2.10.0]: https://github.com/czlonkowski/n8n-mcp/compare/v2.9.1...v2.10.0
[2.9.1]: https://github.com/czlonkowski/n8n-mcp/compare/v2.9.0...v2.9.1
[2.9.0]: https://github.com/czlonkowski/n8n-mcp/compare/v2.8.3...v2.9.0
[2.8.3]: https://github.com/czlonkowski/n8n-mcp/compare/v2.8.2...v2.8.3
[2.8.2]: https://github.com/czlonkowski/n8n-mcp/compare/v2.8.0...v2.8.2
[2.8.0]: https://github.com/czlonkowski/n8n-mcp/compare/v2.7.23...v2.8.0
[2.7.23]: https://github.com/czlonkowski/n8n-mcp/compare/v2.7.22...v2.7.23
[2.7.22]: https://github.com/czlonkowski/n8n-mcp/compare/v2.7.21...v2.7.22
[2.7.21]: https://github.com/czlonkowski/n8n-mcp/compare/v2.7.20...v2.7.21
[2.7.20]: https://github.com/czlonkowski/n8n-mcp/compare/v2.7.19...v2.7.20

View File

@@ -57,9 +57,11 @@ For development or custom testing:
```bash
# Set environment variables
export N8N_MODE=true
export MCP_MODE=http # Required for HTTP mode
export N8N_API_URL=http://localhost:5678 # Your n8n instance URL
export N8N_API_KEY=your-api-key-here # Your n8n API key
export MCP_AUTH_TOKEN=test-token-minimum-32-chars-long
export AUTH_TOKEN=test-token-minimum-32-chars-long # Same value as MCP_AUTH_TOKEN
export PORT=3001
# Start the server
@@ -71,18 +73,75 @@ npm start
# Check health
curl http://localhost:3001/health
# Check MCP protocol endpoint
# Check MCP protocol endpoint (this is the endpoint n8n connects to)
curl http://localhost:3001/mcp
# Should return: {"protocolVersion":"2024-11-05"} for n8n compatibility
```
## Environment Variables Reference
| Variable | Required | Description | Example Value |
|----------|----------|-------------|---------------|
| `N8N_MODE` | Yes | Enables n8n integration mode | `true` |
| `MCP_MODE` | Yes | Enables HTTP mode for n8n MCP Client | `http` |
| `N8N_API_URL` | Yes* | URL of your n8n instance | `http://localhost:5678` |
| `N8N_API_KEY` | Yes* | n8n API key for workflow management | `n8n_api_xxx...` |
| `MCP_AUTH_TOKEN` | Yes | Authentication token for MCP requests | `secure-random-32-char-token` |
| `AUTH_TOKEN` | Yes | Must match MCP_AUTH_TOKEN | `secure-random-32-char-token` |
| `PORT` | No | Port for the HTTP server | `3000` (default) |
| `LOG_LEVEL` | No | Logging verbosity | `info`, `debug`, `error` |
*Required only for workflow management features. Documentation tools work without these.
## Docker Build Changes (v2.9.2+)
Starting with version 2.9.2, we use a single optimized Dockerfile for all deployments:
- The previous `Dockerfile.n8n` has been removed as redundant
- N8N_MODE functionality is enabled via the `N8N_MODE=true` environment variable
- This reduces image size by 500MB+ and improves build times from 8+ minutes to 1-2 minutes
- All examples now use the standard `Dockerfile`
## Production Deployment
### Same Server as n8n
If you're running n8n-MCP on the same server as your n8n instance:
1. **Using Docker** (Recommended):
### Building from Source (Recommended)
For the latest features and bug fixes, build from source:
```bash
# Clone and build
git clone https://github.com/czlonkowski/n8n-mcp.git
cd n8n-mcp
# Build Docker image
docker build -t n8n-mcp:latest .
# Create a Docker network if n8n uses one
docker network create n8n-net
# Run n8n-MCP container
docker run -d \
--name n8n-mcp \
--network n8n-net \
-p 3000:3000 \
-e N8N_MODE=true \
-e MCP_MODE=http \
-e N8N_API_URL=http://n8n:5678 \
-e N8N_API_KEY=your-n8n-api-key \
-e MCP_AUTH_TOKEN=$(openssl rand -hex 32) \
-e AUTH_TOKEN=$(openssl rand -hex 32) \
-e LOG_LEVEL=info \
--restart unless-stopped \
n8n-mcp:latest
```
### Using Pre-built Image (May Be Outdated)
⚠️ **Warning**: Pre-built images may be outdated due to CI/CD synchronization issues. Always check the [GitHub releases](https://github.com/czlonkowski/n8n-mcp/releases) for the latest version.
```bash
# Create a Docker network if n8n uses one
docker network create n8n-net
@@ -93,15 +152,18 @@ docker run -d \
--network n8n-net \
-p 3000:3000 \
-e N8N_MODE=true \
-e MCP_MODE=http \
-e N8N_API_URL=http://n8n:5678 \
-e N8N_API_KEY=your-n8n-api-key \
-e MCP_AUTH_TOKEN=$(openssl rand -hex 32) \
-e AUTH_TOKEN=$(openssl rand -hex 32) \
-e LOG_LEVEL=info \
--restart unless-stopped \
ghcr.io/czlonkowski/n8n-mcp:latest
```
2. **Using systemd** (for native installation):
### Using systemd (for native installation)
```bash
# Create service file
sudo cat > /etc/systemd/system/n8n-mcp.service << EOF
@@ -114,9 +176,11 @@ Type=simple
User=nodejs
WorkingDirectory=/opt/n8n-mcp
Environment="N8N_MODE=true"
Environment="MCP_MODE=http"
Environment="N8N_API_URL=http://localhost:5678"
Environment="N8N_API_KEY=your-n8n-api-key"
Environment="MCP_AUTH_TOKEN=your-secure-token"
Environment="MCP_AUTH_TOKEN=your-secure-token-32-chars-min"
Environment="AUTH_TOKEN=your-secure-token-32-chars-min"
Environment="PORT=3000"
ExecStart=/usr/bin/node /opt/n8n-mcp/dist/mcp/index.js
Restart=on-failure
@@ -134,22 +198,56 @@ sudo systemctl start n8n-mcp
Deploy n8n-MCP on a separate server from your n8n instance:
#### Quick Docker Deployment
#### Quick Docker Deployment (Build from Source)
```bash
# On your cloud server (Hetzner, AWS, DigitalOcean, etc.)
# First, clone and build
git clone https://github.com/czlonkowski/n8n-mcp.git
cd n8n-mcp
docker build -t n8n-mcp:latest .
# Generate auth tokens
AUTH_TOKEN=$(openssl rand -hex 32)
echo "Save this AUTH_TOKEN: $AUTH_TOKEN"
# Run the container
docker run -d \
--name n8n-mcp \
-p 3000:3000 \
-e N8N_MODE=true \
-e MCP_MODE=http \
-e N8N_API_URL=https://your-n8n-instance.com \
-e N8N_API_KEY=your-n8n-api-key \
-e MCP_AUTH_TOKEN=$(openssl rand -hex 32) \
-e MCP_AUTH_TOKEN=$AUTH_TOKEN \
-e AUTH_TOKEN=$AUTH_TOKEN \
-e LOG_LEVEL=info \
--restart unless-stopped \
n8n-mcp:latest
```
#### Quick Docker Deployment (Pre-built Image)
⚠️ **Warning**: May be outdated. Check [releases](https://github.com/czlonkowski/n8n-mcp/releases) first.
```bash
# Generate auth tokens
AUTH_TOKEN=$(openssl rand -hex 32)
echo "Save this AUTH_TOKEN: $AUTH_TOKEN"
# Run the container
docker run -d \
--name n8n-mcp \
-p 3000:3000 \
-e N8N_MODE=true \
-e MCP_MODE=http \
-e N8N_API_URL=https://your-n8n-instance.com \
-e N8N_API_KEY=your-n8n-api-key \
-e MCP_AUTH_TOKEN=$AUTH_TOKEN \
-e AUTH_TOKEN=$AUTH_TOKEN \
-e LOG_LEVEL=info \
--restart unless-stopped \
ghcr.io/czlonkowski/n8n-mcp:latest
# Save the MCP_AUTH_TOKEN for later use!
```
#### Full Production Setup (Hetzner/AWS/DigitalOcean)
@@ -170,21 +268,32 @@ curl -fsSL https://get.docker.com | sh
```
3. **Deploy n8n-MCP with SSL** (using Caddy for automatic HTTPS):
**Option A: Build from Source (Recommended)**
```bash
# Clone and prepare
git clone https://github.com/czlonkowski/n8n-mcp.git
cd n8n-mcp
# Build local image
docker build -t n8n-mcp:latest .
# Create docker-compose.yml
cat > docker-compose.yml << 'EOF'
version: '3.8'
services:
n8n-mcp:
image: ghcr.io/czlonkowski/n8n-mcp:latest
image: n8n-mcp:latest # Using locally built image
container_name: n8n-mcp
restart: unless-stopped
environment:
- N8N_MODE=true
- MCP_MODE=http
- N8N_API_URL=${N8N_API_URL}
- N8N_API_KEY=${N8N_API_KEY}
- MCP_AUTH_TOKEN=${MCP_AUTH_TOKEN}
- AUTH_TOKEN=${AUTH_TOKEN}
- PORT=3000
- LOG_LEVEL=info
networks:
@@ -212,7 +321,57 @@ volumes:
caddy_data:
caddy_config:
EOF
```
**Option B: Pre-built Image (May Be Outdated)**
```bash
# Create docker-compose.yml
cat > docker-compose.yml << 'EOF'
version: '3.8'
services:
n8n-mcp:
image: ghcr.io/czlonkowski/n8n-mcp:latest
container_name: n8n-mcp
restart: unless-stopped
environment:
- N8N_MODE=true
- MCP_MODE=http
- N8N_API_URL=${N8N_API_URL}
- N8N_API_KEY=${N8N_API_KEY}
- MCP_AUTH_TOKEN=${MCP_AUTH_TOKEN}
- AUTH_TOKEN=${AUTH_TOKEN}
- PORT=3000
- LOG_LEVEL=info
networks:
- web
caddy:
image: caddy:2-alpine
container_name: caddy
restart: unless-stopped
ports:
- "80:80"
- "443:443"
volumes:
- ./Caddyfile:/etc/caddy/Caddyfile
- caddy_data:/data
- caddy_config:/config
networks:
- web
networks:
web:
driver: bridge
volumes:
caddy_data:
caddy_config:
EOF
```
**Complete Setup (Both Options)**
```bash
# Create Caddyfile
cat > Caddyfile << 'EOF'
mcp.yourdomain.com {
@@ -221,15 +380,17 @@ mcp.yourdomain.com {
EOF
# Create .env file
AUTH_TOKEN=$(openssl rand -hex 32)
cat > .env << EOF
N8N_API_URL=https://your-n8n-instance.com
N8N_API_KEY=your-n8n-api-key-here
MCP_AUTH_TOKEN=$(openssl rand -hex 32)
MCP_AUTH_TOKEN=$AUTH_TOKEN
AUTH_TOKEN=$AUTH_TOKEN
EOF
# Save the MCP_AUTH_TOKEN!
echo "Your MCP_AUTH_TOKEN is:"
grep MCP_AUTH_TOKEN .env
# Save the AUTH_TOKEN!
echo "Your AUTH_TOKEN is: $AUTH_TOKEN"
echo "Save this token - you'll need it in n8n MCP Client Tool configuration"
# Start services
docker compose up -d
@@ -258,15 +419,17 @@ docker compose up -d
2. **Configure the connection**:
```
Server URL:
- Same server: http://localhost:3000
- Docker network: http://n8n-mcp:3000
- Different server: https://mcp.yourdomain.com
Server URL (MUST include /mcp endpoint):
- Same server: http://localhost:3000/mcp
- Docker network: http://n8n-mcp:3000/mcp
- Different server: https://mcp.yourdomain.com/mcp
Auth Token: [Your MCP_AUTH_TOKEN]
Auth Token: [Your MCP_AUTH_TOKEN/AUTH_TOKEN value]
Transport: HTTP Streamable (SSE)
```
⚠️ **Critical**: The Server URL must include the `/mcp` endpoint path. Without this, the connection will fail.
3. **Test the connection** by selecting a simple tool like `list_nodes`
@@ -324,70 +487,255 @@ You are an n8n workflow expert. Use the MCP tools to:
## Troubleshooting
### Common Configuration Issues
**Missing `MCP_MODE=http` Environment Variable**
- **Symptom**: n8n MCP Client Tool cannot connect, server doesn't respond on `/mcp` endpoint
- **Solution**: Add `MCP_MODE=http` to your environment variables
- **Why**: Without this, the server runs in stdio mode which is incompatible with n8n
**Server URL Missing `/mcp` Endpoint**
- **Symptom**: "Connection refused" or "Invalid response" in n8n MCP Client Tool
- **Solution**: Ensure your Server URL includes `/mcp` (e.g., `http://localhost:3000/mcp`)
- **Why**: n8n connects to the `/mcp` endpoint specifically, not the root URL
**Mismatched Auth Tokens**
- **Symptom**: "Authentication failed" or "Invalid auth token"
- **Solution**: Ensure both `MCP_AUTH_TOKEN` and `AUTH_TOKEN` have the same value
- **Why**: Both variables must match for proper authentication
### Connection Issues
**"Connection refused" in n8n MCP Client Tool**
- Check n8n-MCP is running: `docker ps` or `systemctl status n8n-mcp`
- Verify port is accessible: `curl http://your-server:3000/health`
- Check firewall rules allow port 3000
1. **Check n8n-MCP is running**:
```bash
# Docker
docker ps | grep n8n-mcp
docker logs n8n-mcp --tail 20
# Systemd
systemctl status n8n-mcp
journalctl -u n8n-mcp --tail 20
```
**"Invalid auth token"**
- Ensure MCP_AUTH_TOKEN matches exactly (no extra spaces)
- Token must be at least 32 characters long
- Check for special characters that might need escaping
2. **Verify endpoints are accessible**:
```bash
# Health check (should return status info)
curl http://your-server:3000/health
# MCP endpoint (should return protocol version)
curl http://your-server:3000/mcp
```
3. **Check firewall and networking**:
```bash
# Test port accessibility from n8n server
telnet your-mcp-server 3000
# Check firewall rules (Ubuntu/Debian)
sudo ufw status
# Check if port is bound correctly
netstat -tlnp | grep :3000
```
**"Invalid auth token" or "Authentication failed"**
1. **Verify token format**:
```bash
# Check token length (should be 64 chars for hex-32)
echo $MCP_AUTH_TOKEN | wc -c
# Verify both tokens match
echo "MCP_AUTH_TOKEN: $MCP_AUTH_TOKEN"
echo "AUTH_TOKEN: $AUTH_TOKEN"
```
2. **Common token issues**:
- Token too short (minimum 32 characters)
- Extra whitespace or newlines in token
- Different values for `MCP_AUTH_TOKEN` and `AUTH_TOKEN`
- Special characters not properly escaped in environment files
**"Cannot connect to n8n API"**
- Verify N8N_API_URL is correct (include http:// or https://)
- Check n8n API key is valid and has necessary permissions
- Ensure n8n instance is accessible from n8n-MCP server
1. **Verify n8n configuration**:
```bash
# Test n8n API accessibility
curl -H "X-N8N-API-KEY: your-api-key" \
https://your-n8n-instance.com/api/v1/workflows
```
### Protocol Issues
2. **Common n8n API issues**:
- `N8N_API_URL` missing protocol (http:// or https://)
- n8n API key expired or invalid
- n8n instance not accessible from n8n-MCP server
- n8n API disabled in settings
### Version Compatibility Issues
**"Outdated Docker Image"**
- **Symptom**: Missing features, old bugs, or compatibility issues
- **Solution**: Build from source instead of using pre-built images
- **Check**: Compare your image version with [GitHub releases](https://github.com/czlonkowski/n8n-mcp/releases)
**"Protocol version mismatch"**
- n8n-MCP automatically uses version 2024-11-05 for n8n
- n8n-MCP automatically uses version 2024-11-05 for n8n compatibility
- Update to latest n8n-MCP version if issues persist
- Check `/mcp` endpoint returns correct version
- Verify `/mcp` endpoint returns correct version
**"Schema validation errors"**
- Known issue with n8n's nested output handling
- n8n-MCP includes workarounds
- Enable debug mode to see detailed errors
### Environment Variable Issues
### Debugging
1. **Enable debug mode**:
**Complete Environment Variable Checklist**:
```bash
# Required for all deployments
export N8N_MODE=true # Enables n8n integration
export MCP_MODE=http # Enables HTTP mode for n8n
export MCP_AUTH_TOKEN=your-secure-32-char-token # Auth token
export AUTH_TOKEN=your-secure-32-char-token # Same value as MCP_AUTH_TOKEN
# Required for workflow management features
export N8N_API_URL=https://your-n8n-instance.com # Your n8n URL
export N8N_API_KEY=your-n8n-api-key # Your n8n API key
# Optional
export PORT=3000 # HTTP port (default: 3000)
export LOG_LEVEL=info # Logging level
```
### Docker-Specific Issues
**Container Build Failures**
```bash
# Clear Docker cache and rebuild
docker system prune -f
docker build --no-cache -t n8n-mcp:latest .
```
**Container Runtime Issues**
```bash
# Check container logs for detailed errors
docker logs n8n-mcp -f --timestamps
# Inspect container environment
docker exec n8n-mcp env | grep -E "(N8N|MCP|AUTH)"
# Test container connectivity
docker exec n8n-mcp curl -f http://localhost:3000/health
```
### Network and SSL Issues
**HTTPS/SSL Problems**
```bash
# Test SSL certificate
openssl s_client -connect mcp.yourdomain.com:443
# Check Caddy logs
docker logs caddy -f --tail 50
```
**Docker Network Issues**
```bash
# Check if containers can communicate
docker network ls
docker network inspect bridge
# Test inter-container connectivity
docker exec n8n curl http://n8n-mcp:3000/health
```
### Debugging Steps
1. **Enable comprehensive logging**:
```bash
# For Docker
docker run -d \
--name n8n-mcp \
-e DEBUG_MCP=true \
-e LOG_LEVEL=debug \
-e N8N_MODE=true \
-e MCP_MODE=http \
# ... other settings
# For systemd, add to service file:
Environment="DEBUG_MCP=true"
Environment="LOG_LEVEL=debug"
```
2. **Check logs**:
2. **Test all endpoints systematically**:
```bash
# Docker
docker logs n8n-mcp -f --tail 100
# 1. Health check (basic server functionality)
curl -v http://localhost:3000/health
# Systemd
journalctl -u n8n-mcp -f
```
# 2. MCP protocol endpoint (what n8n connects to)
curl -v http://localhost:3000/mcp
3. **Test endpoints**:
```bash
# Health check
curl http://localhost:3000/health
# Protocol version
curl http://localhost:3000/mcp
# List tools (requires auth)
curl -X POST http://localhost:3000 \
-H "Authorization: Bearer YOUR_MCP_AUTH_TOKEN" \
# 3. Test authentication (if working, returns tools list)
curl -X POST http://localhost:3000/mcp \
-H "Authorization: Bearer YOUR_AUTH_TOKEN" \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","method":"tools/list","id":1}'
# 4. Test a simple tool (documentation only, no n8n API needed)
curl -X POST http://localhost:3000/mcp \
-H "Authorization: Bearer YOUR_AUTH_TOKEN" \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","method":"tools/call","params":{"name":"get_database_statistics","arguments":{}},"id":2}'
```
3. **Common log patterns to look for**:
```bash
# Success patterns
grep "Server started" /var/log/n8n-mcp.log
grep "Protocol version" /var/log/n8n-mcp.log
# Error patterns
grep -i "error\|failed\|invalid" /var/log/n8n-mcp.log
grep -i "auth\|token" /var/log/n8n-mcp.log
grep -i "connection\|network" /var/log/n8n-mcp.log
```
### Getting Help
If you're still experiencing issues:
1. **Gather diagnostic information**:
```bash
# System info
docker --version
docker-compose --version
uname -a
# n8n-MCP version
docker exec n8n-mcp node dist/index.js --version
# Environment check
docker exec n8n-mcp env | grep -E "(N8N|MCP|AUTH)" | sort
# Container status
docker ps | grep n8n-mcp
docker stats n8n-mcp --no-stream
```
2. **Create a minimal test setup**:
```bash
# Test with minimal configuration
docker run -d \
--name n8n-mcp-test \
-p 3001:3000 \
-e N8N_MODE=true \
-e MCP_MODE=http \
-e MCP_AUTH_TOKEN=test-token-minimum-32-chars-long \
-e AUTH_TOKEN=test-token-minimum-32-chars-long \
-e LOG_LEVEL=debug \
n8n-mcp:latest
# Test basic functionality
curl http://localhost:3001/health
curl http://localhost:3001/mcp
```
3. **Report issues**: Include the diagnostic information when opening an issue on [GitHub](https://github.com/czlonkowski/n8n-mcp/issues)
## Performance Tips
- **Minimal deployment**: 1 vCPU, 1GB RAM is sufficient

View File

@@ -1,6 +1,6 @@
{
"name": "n8n-mcp",
"version": "2.9.0",
"version": "2.10.1",
"description": "Integration between n8n workflow automation and Model Context Protocol (MCP)",
"main": "dist/index.js",
"bin": {
@@ -77,7 +77,9 @@
"sync:runtime-version": "node scripts/sync-runtime-version.js",
"update:readme-version": "node scripts/update-readme-version.js",
"prepare:publish": "./scripts/publish-npm.sh",
"update:all": "./scripts/update-and-publish-prep.sh"
"update:all": "./scripts/update-and-publish-prep.sh",
"test:release-automation": "node scripts/test-release-automation.js",
"prepare:release": "node scripts/prepare-release.js"
},
"repository": {
"type": "git",

View File

@@ -1,17 +1,15 @@
{
"name": "n8n-mcp-runtime",
"version": "2.9.0",
"version": "2.10.1",
"description": "n8n MCP Server Runtime Dependencies Only",
"private": true,
"dependencies": {
"@modelcontextprotocol/sdk": "^1.13.2",
"better-sqlite3": "^11.10.0",
"sql.js": "^1.13.0",
"express": "^5.1.0",
"dotenv": "^16.5.0",
"axios": "^1.7.2",
"zod": "^3.23.8",
"uuid": "^10.0.0"
"sql.js": "^1.13.0",
"uuid": "^10.0.0",
"axios": "^1.7.7"
},
"engines": {
"node": ">=16.0.0"

View File

@@ -369,7 +369,7 @@ export class SingleSessionHTTPServer {
}
});
// Set up cleanup handler
// Set up cleanup handlers
transport.onclose = () => {
const sid = transport.sessionId;
if (sid) {
@@ -378,6 +378,17 @@ export class SingleSessionHTTPServer {
}
};
// Handle transport errors to prevent connection drops
transport.onerror = (error: Error) => {
const sid = transport.sessionId;
logger.error('Transport error', { sessionId: sid, error: error.message });
if (sid) {
this.removeSession(sid, 'transport_error').catch(err => {
logger.error('Error during transport error cleanup', { error: err });
});
}
};
// Connect the server to the transport BEFORE handling the request
logger.info('handleRequest: Connecting server to new transport');
await server.connect(transport);
@@ -873,7 +884,7 @@ export class SingleSessionHTTPServer {
const sessionId = req.headers['mcp-session-id'] as string | undefined;
// Only add event listener if the request object supports it (not in test mocks)
if (typeof req.on === 'function') {
req.on('close', () => {
const closeHandler = () => {
if (!res.headersSent && sessionId) {
logger.info('Connection closed before response sent', { sessionId });
// Schedule immediate cleanup if connection closes unexpectedly
@@ -883,11 +894,20 @@ export class SingleSessionHTTPServer {
const timeSinceAccess = Date.now() - metadata.lastAccess.getTime();
// Only remove if it's been inactive for a bit to avoid race conditions
if (timeSinceAccess > 60000) { // 1 minute
this.removeSession(sessionId, 'connection_closed');
this.removeSession(sessionId, 'connection_closed').catch(err => {
logger.error('Error during connection close cleanup', { error: err });
});
}
}
});
}
};
req.on('close', closeHandler);
// Clean up event listener when response ends to prevent memory leaks
res.on('finish', () => {
req.removeListener('close', closeHandler);
});
}

View File

@@ -2538,6 +2538,16 @@ Full documentation is being prepared. For now, use get_node_essentials for confi
async shutdown(): Promise<void> {
logger.info('Shutting down MCP server...');
// Clean up cache timers to prevent memory leaks
if (this.cache) {
try {
this.cache.destroy();
logger.info('Cache timers cleaned up');
} catch (error) {
logger.error('Error cleaning up cache:', error);
}
}
// Close database connection if it exists
if (this.db) {
try {

View File

@@ -7,6 +7,7 @@
import { ConfigValidator, ValidationResult, ValidationError, ValidationWarning } from './config-validator';
import { NodeSpecificValidators, NodeValidationContext } from './node-specific-validators';
import { FixedCollectionValidator } from '../utils/fixed-collection-validator';
export type ValidationMode = 'full' | 'operation' | 'minimal';
export type ValidationProfile = 'strict' | 'runtime' | 'ai-friendly' | 'minimal';
@@ -86,6 +87,9 @@ export class EnhancedConfigValidator extends ConfigValidator {
// Generate next steps based on errors
enhancedResult.nextSteps = this.generateNextSteps(enhancedResult);
// Recalculate validity after all enhancements (crucial for fixedCollection validation)
enhancedResult.valid = enhancedResult.errors.length === 0;
return enhancedResult;
}
@@ -186,6 +190,9 @@ export class EnhancedConfigValidator extends ConfigValidator {
config: Record<string, any>,
result: EnhancedValidationResult
): void {
// First, validate fixedCollection properties for known problematic nodes
this.validateFixedCollectionStructures(nodeType, config, result);
// Create context for node-specific validators
const context: NodeValidationContext = {
config,
@@ -195,8 +202,11 @@ export class EnhancedConfigValidator extends ConfigValidator {
autofix: result.autofix || {}
};
// Normalize node type (handle both 'n8n-nodes-base.x' and 'nodes-base.x' formats)
const normalizedNodeType = nodeType.replace('n8n-nodes-base.', 'nodes-base.');
// Use node-specific validators
switch (nodeType) {
switch (normalizedNodeType) {
case 'nodes-base.slack':
NodeSpecificValidators.validateSlack(context);
this.enhanceSlackValidation(config, result);
@@ -235,6 +245,21 @@ export class EnhancedConfigValidator extends ConfigValidator {
case 'nodes-base.mysql':
NodeSpecificValidators.validateMySQL(context);
break;
case 'nodes-base.switch':
this.validateSwitchNodeStructure(config, result);
break;
case 'nodes-base.if':
this.validateIfNodeStructure(config, result);
break;
case 'nodes-base.filter':
this.validateFilterNodeStructure(config, result);
break;
// Additional nodes handled by FixedCollectionValidator
// No need for specific validators as the generic utility handles them
}
// Update autofix if changes were made
@@ -468,4 +493,129 @@ export class EnhancedConfigValidator extends ConfigValidator {
);
}
}
}
/**
* Validate fixedCollection structures for known problematic nodes
* This prevents the "propertyValues[itemName] is not iterable" error
*/
private static validateFixedCollectionStructures(
nodeType: string,
config: Record<string, any>,
result: EnhancedValidationResult
): void {
// Use the generic FixedCollectionValidator
const validationResult = FixedCollectionValidator.validate(nodeType, config);
if (!validationResult.isValid) {
// Add errors to the result
for (const error of validationResult.errors) {
result.errors.push({
type: 'invalid_value',
property: error.pattern.split('.')[0], // Get the root property
message: error.message,
fix: error.fix
});
}
// Apply autofix if available
if (validationResult.autofix) {
// For nodes like If/Filter where the entire config might be replaced,
// we need to handle it specially
if (typeof validationResult.autofix === 'object' && !Array.isArray(validationResult.autofix)) {
result.autofix = {
...result.autofix,
...validationResult.autofix
};
} else {
// If the autofix is an array (like for If/Filter nodes), wrap it properly
const firstError = validationResult.errors[0];
if (firstError) {
const rootProperty = firstError.pattern.split('.')[0];
result.autofix = {
...result.autofix,
[rootProperty]: validationResult.autofix
};
}
}
}
}
}
/**
* Validate Switch node structure specifically
*/
private static validateSwitchNodeStructure(
config: Record<string, any>,
result: EnhancedValidationResult
): void {
if (!config.rules) return;
// Skip if already caught by validateFixedCollectionStructures
const hasFixedCollectionError = result.errors.some(e =>
e.property === 'rules' && e.message.includes('propertyValues[itemName] is not iterable')
);
if (hasFixedCollectionError) return;
// Validate rules.values structure if present
if (config.rules.values && Array.isArray(config.rules.values)) {
config.rules.values.forEach((rule: any, index: number) => {
if (!rule.conditions) {
result.warnings.push({
type: 'missing_common',
property: 'rules',
message: `Switch rule ${index + 1} is missing "conditions" property`,
suggestion: 'Each rule in the values array should have a "conditions" property'
});
}
if (!rule.outputKey && rule.renameOutput !== false) {
result.warnings.push({
type: 'missing_common',
property: 'rules',
message: `Switch rule ${index + 1} is missing "outputKey" property`,
suggestion: 'Add "outputKey" to specify which output to use when this rule matches'
});
}
});
}
}
/**
* Validate If node structure specifically
*/
private static validateIfNodeStructure(
config: Record<string, any>,
result: EnhancedValidationResult
): void {
if (!config.conditions) return;
// Skip if already caught by validateFixedCollectionStructures
const hasFixedCollectionError = result.errors.some(e =>
e.property === 'conditions' && e.message.includes('propertyValues[itemName] is not iterable')
);
if (hasFixedCollectionError) return;
// Add any If-node-specific validation here in the future
}
/**
* Validate Filter node structure specifically
*/
private static validateFilterNodeStructure(
config: Record<string, any>,
result: EnhancedValidationResult
): void {
if (!config.conditions) return;
// Skip if already caught by validateFixedCollectionStructures
const hasFixedCollectionError = result.errors.some(e =>
e.property === 'conditions' && e.message.includes('propertyValues[itemName] is not iterable')
);
if (hasFixedCollectionError) return;
// Add any Filter-node-specific validation here in the future
}
}

View File

@@ -0,0 +1,479 @@
/**
* Generic utility for validating and fixing fixedCollection structures in n8n nodes
* Prevents the "propertyValues[itemName] is not iterable" error
*/
// Type definitions for node configurations
export type NodeConfigValue = string | number | boolean | null | undefined | NodeConfig | NodeConfigValue[];
export interface NodeConfig {
[key: string]: NodeConfigValue;
}
export interface FixedCollectionPattern {
nodeType: string;
property: string;
subProperty?: string;
expectedStructure: string;
invalidPatterns: string[];
}
export interface FixedCollectionValidationResult {
isValid: boolean;
errors: Array<{
pattern: string;
message: string;
fix: string;
}>;
autofix?: NodeConfig | NodeConfigValue[];
}
export class FixedCollectionValidator {
/**
* Type guard to check if value is a NodeConfig
*/
private static isNodeConfig(value: NodeConfigValue): value is NodeConfig {
return typeof value === 'object' && value !== null && !Array.isArray(value);
}
/**
* Safely get nested property value
*/
private static getNestedValue(obj: NodeConfig, path: string): NodeConfigValue | undefined {
const parts = path.split('.');
let current: NodeConfigValue = obj;
for (const part of parts) {
if (!this.isNodeConfig(current)) {
return undefined;
}
current = current[part];
}
return current;
}
/**
* Known problematic patterns for various n8n nodes
*/
private static readonly KNOWN_PATTERNS: FixedCollectionPattern[] = [
// Conditional nodes (already fixed)
{
nodeType: 'switch',
property: 'rules',
expectedStructure: 'rules.values array',
invalidPatterns: ['rules.conditions', 'rules.conditions.values']
},
{
nodeType: 'if',
property: 'conditions',
expectedStructure: 'conditions array/object',
invalidPatterns: ['conditions.values']
},
{
nodeType: 'filter',
property: 'conditions',
expectedStructure: 'conditions array/object',
invalidPatterns: ['conditions.values']
},
// New nodes identified by research
{
nodeType: 'summarize',
property: 'fieldsToSummarize',
subProperty: 'values',
expectedStructure: 'fieldsToSummarize.values array',
invalidPatterns: ['fieldsToSummarize.values.values']
},
{
nodeType: 'comparedatasets',
property: 'mergeByFields',
subProperty: 'values',
expectedStructure: 'mergeByFields.values array',
invalidPatterns: ['mergeByFields.values.values']
},
{
nodeType: 'sort',
property: 'sortFieldsUi',
subProperty: 'sortField',
expectedStructure: 'sortFieldsUi.sortField array',
invalidPatterns: ['sortFieldsUi.sortField.values']
},
{
nodeType: 'aggregate',
property: 'fieldsToAggregate',
subProperty: 'fieldToAggregate',
expectedStructure: 'fieldsToAggregate.fieldToAggregate array',
invalidPatterns: ['fieldsToAggregate.fieldToAggregate.values']
},
{
nodeType: 'set',
property: 'fields',
subProperty: 'values',
expectedStructure: 'fields.values array',
invalidPatterns: ['fields.values.values']
},
{
nodeType: 'html',
property: 'extractionValues',
subProperty: 'values',
expectedStructure: 'extractionValues.values array',
invalidPatterns: ['extractionValues.values.values']
},
{
nodeType: 'httprequest',
property: 'body',
subProperty: 'parameters',
expectedStructure: 'body.parameters array',
invalidPatterns: ['body.parameters.values']
},
{
nodeType: 'airtable',
property: 'sort',
subProperty: 'sortField',
expectedStructure: 'sort.sortField array',
invalidPatterns: ['sort.sortField.values']
}
];
/**
* Validate a node configuration for fixedCollection issues
* Includes protection against circular references
*/
static validate(
nodeType: string,
config: NodeConfig
): FixedCollectionValidationResult {
// Early return for non-object configs
if (typeof config !== 'object' || config === null || Array.isArray(config)) {
return { isValid: true, errors: [] };
}
const normalizedNodeType = this.normalizeNodeType(nodeType);
const pattern = this.getPatternForNode(normalizedNodeType);
if (!pattern) {
return { isValid: true, errors: [] };
}
const result: FixedCollectionValidationResult = {
isValid: true,
errors: []
};
// Check for invalid patterns
for (const invalidPattern of pattern.invalidPatterns) {
if (this.hasInvalidStructure(config, invalidPattern)) {
result.isValid = false;
result.errors.push({
pattern: invalidPattern,
message: `Invalid structure for nodes-base.${pattern.nodeType} node: found nested "${invalidPattern}" but expected "${pattern.expectedStructure}". This causes "propertyValues[itemName] is not iterable" error in n8n.`,
fix: this.generateFixMessage(pattern)
});
// Generate autofix
if (!result.autofix) {
result.autofix = this.generateAutofix(config, pattern);
}
}
}
return result;
}
/**
* Apply autofix to a configuration
*/
static applyAutofix(
config: NodeConfig,
pattern: FixedCollectionPattern
): NodeConfig | NodeConfigValue[] {
const fixedConfig = this.generateAutofix(config, pattern);
// For If/Filter nodes, the autofix might return just the values array
if (pattern.nodeType === 'if' || pattern.nodeType === 'filter') {
const conditions = config.conditions;
if (conditions && typeof conditions === 'object' && !Array.isArray(conditions) && 'values' in conditions) {
const values = conditions.values;
if (values !== undefined && values !== null &&
(Array.isArray(values) || typeof values === 'object')) {
return values as NodeConfig | NodeConfigValue[];
}
}
}
return fixedConfig;
}
/**
* Normalize node type to handle various formats
*/
private static normalizeNodeType(nodeType: string): string {
return nodeType
.replace('n8n-nodes-base.', '')
.replace('nodes-base.', '')
.replace('@n8n/n8n-nodes-langchain.', '')
.toLowerCase();
}
/**
* Get pattern configuration for a specific node type
*/
private static getPatternForNode(nodeType: string): FixedCollectionPattern | undefined {
return this.KNOWN_PATTERNS.find(p => p.nodeType === nodeType);
}
/**
* Check if configuration has an invalid structure
* Includes circular reference protection
*/
private static hasInvalidStructure(
config: NodeConfig,
pattern: string
): boolean {
const parts = pattern.split('.');
let current: NodeConfigValue = config;
const visited = new WeakSet<object>();
for (const part of parts) {
// Check for null/undefined
if (current === null || current === undefined) {
return false;
}
// Check if it's an object (but not an array for property access)
if (typeof current !== 'object' || Array.isArray(current)) {
return false;
}
// Check for circular reference
if (visited.has(current)) {
return false; // Circular reference detected, invalid structure
}
visited.add(current);
// Check if property exists (using hasOwnProperty to avoid prototype pollution)
if (!Object.prototype.hasOwnProperty.call(current, part)) {
return false;
}
const nextValue = (current as NodeConfig)[part];
if (typeof nextValue !== 'object' || nextValue === null) {
// If we have more parts to traverse but current value is not an object, invalid structure
if (parts.indexOf(part) < parts.length - 1) {
return false;
}
}
current = nextValue as NodeConfig;
}
return true;
}
/**
* Generate a fix message for the specific pattern
*/
private static generateFixMessage(pattern: FixedCollectionPattern): string {
switch (pattern.nodeType) {
case 'switch':
return 'Use: { "rules": { "values": [{ "conditions": {...}, "outputKey": "output1" }] } }';
case 'if':
case 'filter':
return 'Use: { "conditions": {...} } or { "conditions": [...] } directly, not nested under "values"';
case 'summarize':
return 'Use: { "fieldsToSummarize": { "values": [...] } } not nested values.values';
case 'comparedatasets':
return 'Use: { "mergeByFields": { "values": [...] } } not nested values.values';
case 'sort':
return 'Use: { "sortFieldsUi": { "sortField": [...] } } not sortField.values';
case 'aggregate':
return 'Use: { "fieldsToAggregate": { "fieldToAggregate": [...] } } not fieldToAggregate.values';
case 'set':
return 'Use: { "fields": { "values": [...] } } not nested values.values';
case 'html':
return 'Use: { "extractionValues": { "values": [...] } } not nested values.values';
case 'httprequest':
return 'Use: { "body": { "parameters": [...] } } not parameters.values';
case 'airtable':
return 'Use: { "sort": { "sortField": [...] } } not sortField.values';
default:
return `Use ${pattern.expectedStructure} structure`;
}
}
/**
* Generate autofix for invalid structures
*/
private static generateAutofix(
config: NodeConfig,
pattern: FixedCollectionPattern
): NodeConfig | NodeConfigValue[] {
const fixedConfig = { ...config };
switch (pattern.nodeType) {
case 'switch': {
const rules = config.rules;
if (this.isNodeConfig(rules)) {
const conditions = rules.conditions;
if (this.isNodeConfig(conditions) && 'values' in conditions) {
const values = conditions.values;
fixedConfig.rules = {
values: Array.isArray(values)
? values.map((condition, index) => ({
conditions: condition,
outputKey: `output${index + 1}`
}))
: [{
conditions: values,
outputKey: 'output1'
}]
};
} else if (conditions) {
fixedConfig.rules = {
values: [{
conditions: conditions,
outputKey: 'output1'
}]
};
}
}
break;
}
case 'if':
case 'filter': {
const conditions = config.conditions;
if (this.isNodeConfig(conditions) && 'values' in conditions) {
const values = conditions.values;
if (values !== undefined && values !== null &&
(Array.isArray(values) || typeof values === 'object')) {
return values as NodeConfig | NodeConfigValue[];
}
}
break;
}
case 'summarize': {
const fieldsToSummarize = config.fieldsToSummarize;
if (this.isNodeConfig(fieldsToSummarize)) {
const values = fieldsToSummarize.values;
if (this.isNodeConfig(values) && 'values' in values) {
fixedConfig.fieldsToSummarize = {
values: values.values
};
}
}
break;
}
case 'comparedatasets': {
const mergeByFields = config.mergeByFields;
if (this.isNodeConfig(mergeByFields)) {
const values = mergeByFields.values;
if (this.isNodeConfig(values) && 'values' in values) {
fixedConfig.mergeByFields = {
values: values.values
};
}
}
break;
}
case 'sort': {
const sortFieldsUi = config.sortFieldsUi;
if (this.isNodeConfig(sortFieldsUi)) {
const sortField = sortFieldsUi.sortField;
if (this.isNodeConfig(sortField) && 'values' in sortField) {
fixedConfig.sortFieldsUi = {
sortField: sortField.values
};
}
}
break;
}
case 'aggregate': {
const fieldsToAggregate = config.fieldsToAggregate;
if (this.isNodeConfig(fieldsToAggregate)) {
const fieldToAggregate = fieldsToAggregate.fieldToAggregate;
if (this.isNodeConfig(fieldToAggregate) && 'values' in fieldToAggregate) {
fixedConfig.fieldsToAggregate = {
fieldToAggregate: fieldToAggregate.values
};
}
}
break;
}
case 'set': {
const fields = config.fields;
if (this.isNodeConfig(fields)) {
const values = fields.values;
if (this.isNodeConfig(values) && 'values' in values) {
fixedConfig.fields = {
values: values.values
};
}
}
break;
}
case 'html': {
const extractionValues = config.extractionValues;
if (this.isNodeConfig(extractionValues)) {
const values = extractionValues.values;
if (this.isNodeConfig(values) && 'values' in values) {
fixedConfig.extractionValues = {
values: values.values
};
}
}
break;
}
case 'httprequest': {
const body = config.body;
if (this.isNodeConfig(body)) {
const parameters = body.parameters;
if (this.isNodeConfig(parameters) && 'values' in parameters) {
fixedConfig.body = {
...body,
parameters: parameters.values
};
}
}
break;
}
case 'airtable': {
const sort = config.sort;
if (this.isNodeConfig(sort)) {
const sortField = sort.sortField;
if (this.isNodeConfig(sortField) && 'values' in sortField) {
fixedConfig.sort = {
sortField: sortField.values
};
}
}
break;
}
}
return fixedConfig;
}
/**
* Get all known patterns (for testing and documentation)
* Returns a deep copy to prevent external modifications
*/
static getAllPatterns(): FixedCollectionPattern[] {
return this.KNOWN_PATTERNS.map(pattern => ({
...pattern,
invalidPatterns: [...pattern.invalidPatterns]
}));
}
/**
* Check if a node type is susceptible to fixedCollection issues
*/
static isNodeSusceptible(nodeType: string): boolean {
const normalizedType = this.normalizeNodeType(nodeType);
return this.KNOWN_PATTERNS.some(p => p.nodeType === normalizedType);
}
}

View File

@@ -4,10 +4,11 @@
*/
export class SimpleCache {
private cache = new Map<string, { data: any; expires: number }>();
private cleanupTimer: NodeJS.Timeout | null = null;
constructor() {
// Clean up expired entries every minute
setInterval(() => {
this.cleanupTimer = setInterval(() => {
const now = Date.now();
for (const [key, item] of this.cache.entries()) {
if (item.expires < now) this.cache.delete(key);
@@ -34,4 +35,16 @@ export class SimpleCache {
clear(): void {
this.cache.clear();
}
/**
* Clean up the cache and stop the cleanup timer
* Essential for preventing memory leaks in long-running servers
*/
destroy(): void {
if (this.cleanupTimer) {
clearInterval(this.cleanupTimer);
this.cleanupTimer = null;
}
this.cache.clear();
}
}

View File

@@ -0,0 +1,450 @@
/**
* Fixed Collection Validation Tests
* Tests for the fix of issue #90: "propertyValues[itemName] is not iterable" error
*
* This ensures AI agents cannot create invalid fixedCollection structures that break n8n UI
*/
import { describe, test, expect } from 'vitest';
import { EnhancedConfigValidator } from '../../../src/services/enhanced-config-validator';
describe('FixedCollection Validation', () => {
describe('Switch Node v2/v3 Validation', () => {
test('should detect invalid nested conditions structure', () => {
const invalidConfig = {
rules: {
conditions: {
values: [
{
value1: '={{$json.status}}',
operation: 'equals',
value2: 'active'
}
]
}
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.switch',
invalidConfig,
[],
'operation',
'ai-friendly'
);
expect(result.valid).toBe(false);
expect(result.errors).toHaveLength(1);
expect(result.errors[0].type).toBe('invalid_value');
expect(result.errors[0].property).toBe('rules');
expect(result.errors[0].message).toContain('propertyValues[itemName] is not iterable');
expect(result.errors[0].fix).toContain('{ "rules": { "values": [{ "conditions": {...}, "outputKey": "output1" }] } }');
});
test('should detect direct conditions in rules (another invalid pattern)', () => {
const invalidConfig = {
rules: {
conditions: {
value1: '={{$json.status}}',
operation: 'equals',
value2: 'active'
}
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.switch',
invalidConfig,
[],
'operation',
'ai-friendly'
);
expect(result.valid).toBe(false);
expect(result.errors).toHaveLength(1);
expect(result.errors[0].message).toContain('Invalid structure for nodes-base.switch node');
});
test('should provide auto-fix for invalid switch structure', () => {
const invalidConfig = {
rules: {
conditions: {
values: [
{
value1: '={{$json.status}}',
operation: 'equals',
value2: 'active'
}
]
}
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.switch',
invalidConfig,
[],
'operation',
'ai-friendly'
);
expect(result.autofix).toBeDefined();
expect(result.autofix!.rules).toBeDefined();
expect(result.autofix!.rules.values).toBeInstanceOf(Array);
expect(result.autofix!.rules.values).toHaveLength(1);
expect(result.autofix!.rules.values[0]).toHaveProperty('conditions');
expect(result.autofix!.rules.values[0]).toHaveProperty('outputKey');
});
test('should accept valid switch structure', () => {
const validConfig = {
rules: {
values: [
{
conditions: {
value1: '={{$json.status}}',
operation: 'equals',
value2: 'active'
},
outputKey: 'active'
}
]
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.switch',
validConfig,
[],
'operation',
'ai-friendly'
);
// Should not have the specific fixedCollection error
const hasFixedCollectionError = result.errors.some(e =>
e.message.includes('propertyValues[itemName] is not iterable')
);
expect(hasFixedCollectionError).toBe(false);
});
test('should warn about missing outputKey in valid structure', () => {
const configMissingOutputKey = {
rules: {
values: [
{
conditions: {
value1: '={{$json.status}}',
operation: 'equals',
value2: 'active'
}
// Missing outputKey
}
]
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.switch',
configMissingOutputKey,
[],
'operation',
'ai-friendly'
);
const hasOutputKeyWarning = result.warnings.some(w =>
w.message.includes('missing "outputKey" property')
);
expect(hasOutputKeyWarning).toBe(true);
});
});
describe('If Node Validation', () => {
test('should detect invalid nested values structure', () => {
const invalidConfig = {
conditions: {
values: [
{
value1: '={{$json.age}}',
operation: 'largerEqual',
value2: 18
}
]
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.if',
invalidConfig,
[],
'operation',
'ai-friendly'
);
expect(result.valid).toBe(false);
expect(result.errors).toHaveLength(1);
expect(result.errors[0].type).toBe('invalid_value');
expect(result.errors[0].property).toBe('conditions');
expect(result.errors[0].message).toContain('Invalid structure for nodes-base.if node');
expect(result.errors[0].fix).toBe('Use: { "conditions": {...} } or { "conditions": [...] } directly, not nested under "values"');
});
test('should provide auto-fix for invalid if structure', () => {
const invalidConfig = {
conditions: {
values: [
{
value1: '={{$json.age}}',
operation: 'largerEqual',
value2: 18
}
]
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.if',
invalidConfig,
[],
'operation',
'ai-friendly'
);
expect(result.autofix).toBeDefined();
expect(result.autofix!.conditions).toEqual(invalidConfig.conditions.values);
});
test('should accept valid if structure', () => {
const validConfig = {
conditions: {
value1: '={{$json.age}}',
operation: 'largerEqual',
value2: 18
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.if',
validConfig,
[],
'operation',
'ai-friendly'
);
// Should not have the specific structure error
const hasStructureError = result.errors.some(e =>
e.message.includes('should be a filter object/array directly')
);
expect(hasStructureError).toBe(false);
});
});
describe('Filter Node Validation', () => {
test('should detect invalid nested values structure', () => {
const invalidConfig = {
conditions: {
values: [
{
value1: '={{$json.score}}',
operation: 'larger',
value2: 80
}
]
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
invalidConfig,
[],
'operation',
'ai-friendly'
);
expect(result.valid).toBe(false);
expect(result.errors).toHaveLength(1);
expect(result.errors[0].type).toBe('invalid_value');
expect(result.errors[0].property).toBe('conditions');
expect(result.errors[0].message).toContain('Invalid structure for nodes-base.filter node');
});
test('should accept valid filter structure', () => {
const validConfig = {
conditions: {
value1: '={{$json.score}}',
operation: 'larger',
value2: 80
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
validConfig,
[],
'operation',
'ai-friendly'
);
// Should not have the specific structure error
const hasStructureError = result.errors.some(e =>
e.message.includes('should be a filter object/array directly')
);
expect(hasStructureError).toBe(false);
});
});
describe('Edge Cases', () => {
test('should not validate non-problematic nodes', () => {
const config = {
someProperty: {
conditions: {
values: ['should', 'not', 'trigger', 'validation']
}
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.httpRequest',
config,
[],
'operation',
'ai-friendly'
);
// Should not have fixedCollection errors for non-problematic nodes
const hasFixedCollectionError = result.errors.some(e =>
e.message.includes('propertyValues[itemName] is not iterable')
);
expect(hasFixedCollectionError).toBe(false);
});
test('should handle empty config gracefully', () => {
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.switch',
{},
[],
'operation',
'ai-friendly'
);
// Should not crash or produce false positives
expect(result).toBeDefined();
expect(result.errors).toBeInstanceOf(Array);
});
test('should handle non-object property values', () => {
const config = {
rules: 'not an object'
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.switch',
config,
[],
'operation',
'ai-friendly'
);
// Should not crash on non-object values
expect(result).toBeDefined();
expect(result.errors).toBeInstanceOf(Array);
});
});
describe('Real-world AI Agent Patterns', () => {
test('should catch common ChatGPT/Claude switch patterns', () => {
// This is a pattern commonly generated by AI agents
const aiGeneratedConfig = {
rules: {
conditions: {
values: [
{
"value1": "={{$json.status}}",
"operation": "equals",
"value2": "active"
},
{
"value1": "={{$json.priority}}",
"operation": "equals",
"value2": "high"
}
]
}
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.switch',
aiGeneratedConfig,
[],
'operation',
'ai-friendly'
);
expect(result.valid).toBe(false);
expect(result.errors).toHaveLength(1);
expect(result.errors[0].message).toContain('propertyValues[itemName] is not iterable');
// Check auto-fix generates correct structure
expect(result.autofix!.rules.values).toHaveLength(2);
result.autofix!.rules.values.forEach((rule: any) => {
expect(rule).toHaveProperty('conditions');
expect(rule).toHaveProperty('outputKey');
});
});
test('should catch common AI if/filter patterns', () => {
const aiGeneratedIfConfig = {
conditions: {
values: {
"value1": "={{$json.age}}",
"operation": "largerEqual",
"value2": 21
}
}
};
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.if',
aiGeneratedIfConfig,
[],
'operation',
'ai-friendly'
);
expect(result.valid).toBe(false);
expect(result.errors[0].message).toContain('Invalid structure for nodes-base.if node');
});
});
describe('Version Compatibility', () => {
test('should work across different validation profiles', () => {
const invalidConfig = {
rules: {
conditions: {
values: [{ value1: 'test', operation: 'equals', value2: 'test' }]
}
}
};
const profiles: Array<'strict' | 'runtime' | 'ai-friendly' | 'minimal'> =
['strict', 'runtime', 'ai-friendly', 'minimal'];
profiles.forEach(profile => {
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.switch',
invalidConfig,
[],
'operation',
profile
);
// All profiles should catch this critical error
const hasCriticalError = result.errors.some(e =>
e.message.includes('propertyValues[itemName] is not iterable')
);
expect(hasCriticalError, `Profile ${profile} should catch critical fixedCollection error`).toBe(true);
});
});
});
});

View File

@@ -0,0 +1,413 @@
/**
* Workflow Fixed Collection Validation Tests
* Tests that workflow validation catches fixedCollection structure errors at the workflow level
*/
import { describe, test, expect, beforeEach, vi } from 'vitest';
import { WorkflowValidator } from '../../../src/services/workflow-validator';
import { EnhancedConfigValidator } from '../../../src/services/enhanced-config-validator';
import { NodeRepository } from '../../../src/database/node-repository';
describe('Workflow FixedCollection Validation', () => {
let validator: WorkflowValidator;
let mockNodeRepository: any;
beforeEach(() => {
// Create mock repository that returns basic node info for common nodes
mockNodeRepository = {
getNode: vi.fn().mockImplementation((type: string) => {
const normalizedType = type.replace('n8n-nodes-base.', '').replace('nodes-base.', '');
switch (normalizedType) {
case 'webhook':
return {
nodeType: 'nodes-base.webhook',
displayName: 'Webhook',
properties: [
{ name: 'path', type: 'string', required: true },
{ name: 'httpMethod', type: 'options' }
]
};
case 'switch':
return {
nodeType: 'nodes-base.switch',
displayName: 'Switch',
properties: [
{ name: 'rules', type: 'fixedCollection', required: true }
]
};
case 'if':
return {
nodeType: 'nodes-base.if',
displayName: 'If',
properties: [
{ name: 'conditions', type: 'filter', required: true }
]
};
case 'filter':
return {
nodeType: 'nodes-base.filter',
displayName: 'Filter',
properties: [
{ name: 'conditions', type: 'filter', required: true }
]
};
default:
return null;
}
})
};
validator = new WorkflowValidator(mockNodeRepository, EnhancedConfigValidator);
});
test('should catch invalid Switch node structure in workflow validation', async () => {
const workflow = {
name: 'Test Workflow with Invalid Switch',
nodes: [
{
id: 'webhook',
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
position: [0, 0] as [number, number],
parameters: {
path: 'test-webhook'
}
},
{
id: 'switch',
name: 'Switch',
type: 'n8n-nodes-base.switch',
position: [200, 0] as [number, number],
parameters: {
// This is the problematic structure that causes "propertyValues[itemName] is not iterable"
rules: {
conditions: {
values: [
{
value1: '={{$json.status}}',
operation: 'equals',
value2: 'active'
}
]
}
}
}
}
],
connections: {
Webhook: {
main: [[{ node: 'Switch', type: 'main', index: 0 }]]
}
}
};
const result = await validator.validateWorkflow(workflow, {
validateNodes: true,
profile: 'ai-friendly'
});
expect(result.valid).toBe(false);
expect(result.errors).toHaveLength(1);
const switchError = result.errors.find(e => e.nodeId === 'switch');
expect(switchError).toBeDefined();
expect(switchError!.message).toContain('propertyValues[itemName] is not iterable');
expect(switchError!.message).toContain('Invalid structure for nodes-base.switch node');
});
test('should catch invalid If node structure in workflow validation', async () => {
const workflow = {
name: 'Test Workflow with Invalid If',
nodes: [
{
id: 'webhook',
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
position: [0, 0] as [number, number],
parameters: {
path: 'test-webhook'
}
},
{
id: 'if',
name: 'If',
type: 'n8n-nodes-base.if',
position: [200, 0] as [number, number],
parameters: {
// This is the problematic structure
conditions: {
values: [
{
value1: '={{$json.age}}',
operation: 'largerEqual',
value2: 18
}
]
}
}
}
],
connections: {
Webhook: {
main: [[{ node: 'If', type: 'main', index: 0 }]]
}
}
};
const result = await validator.validateWorkflow(workflow, {
validateNodes: true,
profile: 'ai-friendly'
});
expect(result.valid).toBe(false);
expect(result.errors).toHaveLength(1);
const ifError = result.errors.find(e => e.nodeId === 'if');
expect(ifError).toBeDefined();
expect(ifError!.message).toContain('Invalid structure for nodes-base.if node');
});
test('should accept valid Switch node structure in workflow validation', async () => {
const workflow = {
name: 'Test Workflow with Valid Switch',
nodes: [
{
id: 'webhook',
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
position: [0, 0] as [number, number],
parameters: {
path: 'test-webhook'
}
},
{
id: 'switch',
name: 'Switch',
type: 'n8n-nodes-base.switch',
position: [200, 0] as [number, number],
parameters: {
// This is the correct structure
rules: {
values: [
{
conditions: {
value1: '={{$json.status}}',
operation: 'equals',
value2: 'active'
},
outputKey: 'active'
}
]
}
}
}
],
connections: {
Webhook: {
main: [[{ node: 'Switch', type: 'main', index: 0 }]]
}
}
};
const result = await validator.validateWorkflow(workflow, {
validateNodes: true,
profile: 'ai-friendly'
});
// Should not have fixedCollection structure errors
const hasFixedCollectionError = result.errors.some(e =>
e.message.includes('propertyValues[itemName] is not iterable')
);
expect(hasFixedCollectionError).toBe(false);
});
test('should catch multiple fixedCollection errors in a single workflow', async () => {
const workflow = {
name: 'Test Workflow with Multiple Invalid Structures',
nodes: [
{
id: 'webhook',
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
position: [0, 0] as [number, number],
parameters: {
path: 'test-webhook'
}
},
{
id: 'switch',
name: 'Switch',
type: 'n8n-nodes-base.switch',
position: [200, 0] as [number, number],
parameters: {
rules: {
conditions: {
values: [{ value1: 'test', operation: 'equals', value2: 'test' }]
}
}
}
},
{
id: 'if',
name: 'If',
type: 'n8n-nodes-base.if',
position: [400, 0] as [number, number],
parameters: {
conditions: {
values: [{ value1: 'test', operation: 'equals', value2: 'test' }]
}
}
},
{
id: 'filter',
name: 'Filter',
type: 'n8n-nodes-base.filter',
position: [600, 0] as [number, number],
parameters: {
conditions: {
values: [{ value1: 'test', operation: 'equals', value2: 'test' }]
}
}
}
],
connections: {
Webhook: {
main: [[{ node: 'Switch', type: 'main', index: 0 }]]
},
Switch: {
main: [
[{ node: 'If', type: 'main', index: 0 }],
[{ node: 'Filter', type: 'main', index: 0 }]
]
}
}
};
const result = await validator.validateWorkflow(workflow, {
validateNodes: true,
profile: 'ai-friendly'
});
expect(result.valid).toBe(false);
expect(result.errors.length).toBeGreaterThanOrEqual(3); // At least one error for each problematic node
// Check that each problematic node has an error
const switchError = result.errors.find(e => e.nodeId === 'switch');
const ifError = result.errors.find(e => e.nodeId === 'if');
const filterError = result.errors.find(e => e.nodeId === 'filter');
expect(switchError).toBeDefined();
expect(ifError).toBeDefined();
expect(filterError).toBeDefined();
});
test('should provide helpful statistics about fixedCollection errors', async () => {
const workflow = {
name: 'Test Workflow Statistics',
nodes: [
{
id: 'webhook',
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
position: [0, 0] as [number, number],
parameters: { path: 'test' }
},
{
id: 'bad-switch',
name: 'Bad Switch',
type: 'n8n-nodes-base.switch',
position: [200, 0] as [number, number],
parameters: {
rules: {
conditions: { values: [{ value1: 'test', operation: 'equals', value2: 'test' }] }
}
}
},
{
id: 'good-switch',
name: 'Good Switch',
type: 'n8n-nodes-base.switch',
position: [400, 0] as [number, number],
parameters: {
rules: {
values: [{ conditions: { value1: 'test', operation: 'equals', value2: 'test' }, outputKey: 'out' }]
}
}
}
],
connections: {
Webhook: {
main: [
[{ node: 'Bad Switch', type: 'main', index: 0 }],
[{ node: 'Good Switch', type: 'main', index: 0 }]
]
}
}
};
const result = await validator.validateWorkflow(workflow, {
validateNodes: true,
profile: 'ai-friendly'
});
expect(result.statistics.totalNodes).toBe(3);
expect(result.statistics.enabledNodes).toBe(3);
expect(result.valid).toBe(false); // Should be invalid due to the bad switch
// Should have at least one error for the bad switch
const badSwitchError = result.errors.find(e => e.nodeId === 'bad-switch');
expect(badSwitchError).toBeDefined();
// Should not have errors for the good switch or webhook
const goodSwitchError = result.errors.find(e => e.nodeId === 'good-switch');
const webhookError = result.errors.find(e => e.nodeId === 'webhook');
// These might have other validation errors, but not fixedCollection errors
if (goodSwitchError) {
expect(goodSwitchError.message).not.toContain('propertyValues[itemName] is not iterable');
}
if (webhookError) {
expect(webhookError.message).not.toContain('propertyValues[itemName] is not iterable');
}
});
test('should work with different validation profiles', async () => {
const workflow = {
name: 'Test Profile Compatibility',
nodes: [
{
id: 'switch',
name: 'Switch',
type: 'n8n-nodes-base.switch',
position: [0, 0] as [number, number],
parameters: {
rules: {
conditions: {
values: [{ value1: 'test', operation: 'equals', value2: 'test' }]
}
}
}
}
],
connections: {}
};
const profiles: Array<'strict' | 'runtime' | 'ai-friendly' | 'minimal'> =
['strict', 'runtime', 'ai-friendly', 'minimal'];
for (const profile of profiles) {
const result = await validator.validateWorkflow(workflow, {
validateNodes: true,
profile
});
// All profiles should catch this critical error
const hasCriticalError = result.errors.some(e =>
e.message.includes('propertyValues[itemName] is not iterable')
);
expect(hasCriticalError, `Profile ${profile} should catch critical fixedCollection error`).toBe(true);
expect(result.valid, `Profile ${profile} should mark workflow as invalid`).toBe(false);
}
});
});

View File

@@ -0,0 +1,282 @@
import { describe, test, expect, beforeEach, afterEach, vi } from 'vitest';
import { ConsoleManager, consoleManager } from '../../../src/utils/console-manager';
describe('ConsoleManager', () => {
let manager: ConsoleManager;
let originalEnv: string | undefined;
beforeEach(() => {
manager = new ConsoleManager();
originalEnv = process.env.MCP_MODE;
// Reset console methods to originals before each test
manager.restore();
});
afterEach(() => {
// Clean up after each test
manager.restore();
if (originalEnv !== undefined) {
process.env.MCP_MODE = originalEnv as "test" | "http" | "stdio" | undefined;
} else {
delete process.env.MCP_MODE;
}
delete process.env.MCP_REQUEST_ACTIVE;
});
describe('silence method', () => {
test('should silence console methods when in HTTP mode', () => {
process.env.MCP_MODE = 'http';
const originalLog = console.log;
const originalError = console.error;
manager.silence();
expect(console.log).not.toBe(originalLog);
expect(console.error).not.toBe(originalError);
expect(manager.isActive).toBe(true);
expect(process.env.MCP_REQUEST_ACTIVE).toBe('true');
});
test('should not silence when not in HTTP mode', () => {
process.env.MCP_MODE = 'stdio';
const originalLog = console.log;
manager.silence();
expect(console.log).toBe(originalLog);
expect(manager.isActive).toBe(false);
});
test('should not silence if already silenced', () => {
process.env.MCP_MODE = 'http';
manager.silence();
const firstSilencedLog = console.log;
manager.silence(); // Call again
expect(console.log).toBe(firstSilencedLog);
expect(manager.isActive).toBe(true);
});
test('should silence all console methods', () => {
process.env.MCP_MODE = 'http';
const originalMethods = {
log: console.log,
error: console.error,
warn: console.warn,
info: console.info,
debug: console.debug,
trace: console.trace
};
manager.silence();
Object.values(originalMethods).forEach(originalMethod => {
const currentMethod = Object.values(console).find(method => method === originalMethod);
expect(currentMethod).toBeUndefined();
});
});
});
describe('restore method', () => {
test('should restore console methods after silencing', () => {
process.env.MCP_MODE = 'http';
const originalLog = console.log;
const originalError = console.error;
manager.silence();
expect(console.log).not.toBe(originalLog);
manager.restore();
expect(console.log).toBe(originalLog);
expect(console.error).toBe(originalError);
expect(manager.isActive).toBe(false);
expect(process.env.MCP_REQUEST_ACTIVE).toBe('false');
});
test('should not restore if not silenced', () => {
const originalLog = console.log;
manager.restore(); // Call without silencing first
expect(console.log).toBe(originalLog);
expect(manager.isActive).toBe(false);
});
test('should restore all console methods', () => {
process.env.MCP_MODE = 'http';
const originalMethods = {
log: console.log,
error: console.error,
warn: console.warn,
info: console.info,
debug: console.debug,
trace: console.trace
};
manager.silence();
manager.restore();
expect(console.log).toBe(originalMethods.log);
expect(console.error).toBe(originalMethods.error);
expect(console.warn).toBe(originalMethods.warn);
expect(console.info).toBe(originalMethods.info);
expect(console.debug).toBe(originalMethods.debug);
expect(console.trace).toBe(originalMethods.trace);
});
});
describe('wrapOperation method', () => {
test('should wrap synchronous operations', async () => {
process.env.MCP_MODE = 'http';
const testValue = 'test-result';
const operation = vi.fn(() => testValue);
const result = await manager.wrapOperation(operation);
expect(result).toBe(testValue);
expect(operation).toHaveBeenCalledOnce();
expect(manager.isActive).toBe(false); // Should be restored after operation
});
test('should wrap asynchronous operations', async () => {
process.env.MCP_MODE = 'http';
const testValue = 'async-result';
const operation = vi.fn(async () => {
await new Promise(resolve => setTimeout(resolve, 10));
return testValue;
});
const result = await manager.wrapOperation(operation);
expect(result).toBe(testValue);
expect(operation).toHaveBeenCalledOnce();
expect(manager.isActive).toBe(false); // Should be restored after operation
});
test('should restore console even if synchronous operation throws', async () => {
process.env.MCP_MODE = 'http';
const error = new Error('test error');
const operation = vi.fn(() => {
throw error;
});
await expect(manager.wrapOperation(operation)).rejects.toThrow('test error');
expect(manager.isActive).toBe(false); // Should be restored even after error
});
test('should restore console even if async operation throws', async () => {
process.env.MCP_MODE = 'http';
const error = new Error('async test error');
const operation = vi.fn(async () => {
throw error;
});
await expect(manager.wrapOperation(operation)).rejects.toThrow('async test error');
expect(manager.isActive).toBe(false); // Should be restored even after error
});
test('should handle promise rejection properly', async () => {
process.env.MCP_MODE = 'http';
const error = new Error('promise rejection');
const operation = vi.fn(() => Promise.reject(error));
await expect(manager.wrapOperation(operation)).rejects.toThrow('promise rejection');
expect(manager.isActive).toBe(false); // Should be restored even after rejection
});
});
describe('isActive getter', () => {
test('should return false initially', () => {
expect(manager.isActive).toBe(false);
});
test('should return true when silenced', () => {
process.env.MCP_MODE = 'http';
manager.silence();
expect(manager.isActive).toBe(true);
});
test('should return false after restore', () => {
process.env.MCP_MODE = 'http';
manager.silence();
manager.restore();
expect(manager.isActive).toBe(false);
});
});
describe('Singleton instance', () => {
test('should export a singleton instance', () => {
expect(consoleManager).toBeInstanceOf(ConsoleManager);
});
test('should work with singleton instance', () => {
process.env.MCP_MODE = 'http';
const originalLog = console.log;
consoleManager.silence();
expect(console.log).not.toBe(originalLog);
expect(consoleManager.isActive).toBe(true);
consoleManager.restore();
expect(console.log).toBe(originalLog);
expect(consoleManager.isActive).toBe(false);
});
});
describe('Edge cases', () => {
test('should handle undefined MCP_MODE', () => {
delete process.env.MCP_MODE;
const originalLog = console.log;
manager.silence();
expect(console.log).toBe(originalLog);
expect(manager.isActive).toBe(false);
});
test('should handle empty MCP_MODE', () => {
process.env.MCP_MODE = '' as any;
const originalLog = console.log;
manager.silence();
expect(console.log).toBe(originalLog);
expect(manager.isActive).toBe(false);
});
test('should silence and restore multiple times', () => {
process.env.MCP_MODE = 'http';
const originalLog = console.log;
// First cycle
manager.silence();
expect(manager.isActive).toBe(true);
manager.restore();
expect(manager.isActive).toBe(false);
expect(console.log).toBe(originalLog);
// Second cycle
manager.silence();
expect(manager.isActive).toBe(true);
manager.restore();
expect(manager.isActive).toBe(false);
expect(console.log).toBe(originalLog);
});
});
});

View File

@@ -0,0 +1,786 @@
import { describe, test, expect } from 'vitest';
import { FixedCollectionValidator, NodeConfig, NodeConfigValue } from '../../../src/utils/fixed-collection-validator';
// Type guard helper for tests
function isNodeConfig(value: NodeConfig | NodeConfigValue[] | undefined): value is NodeConfig {
return typeof value === 'object' && value !== null && !Array.isArray(value);
}
describe('FixedCollectionValidator', () => {
describe('Core Functionality', () => {
test('should return valid for non-susceptible nodes', () => {
const result = FixedCollectionValidator.validate('n8n-nodes-base.cron', {
triggerTimes: { hour: 10, minute: 30 }
});
expect(result.isValid).toBe(true);
expect(result.errors).toHaveLength(0);
});
test('should normalize node types correctly', () => {
const nodeTypes = [
'n8n-nodes-base.switch',
'nodes-base.switch',
'@n8n/n8n-nodes-langchain.switch',
'SWITCH'
];
nodeTypes.forEach(nodeType => {
expect(FixedCollectionValidator.isNodeSusceptible(nodeType)).toBe(true);
});
});
test('should get all known patterns', () => {
const patterns = FixedCollectionValidator.getAllPatterns();
expect(patterns.length).toBeGreaterThan(10); // We have at least 11 patterns
expect(patterns.some(p => p.nodeType === 'switch')).toBe(true);
expect(patterns.some(p => p.nodeType === 'summarize')).toBe(true);
});
});
describe('Switch Node Validation', () => {
test('should detect invalid nested conditions structure', () => {
const invalidConfig = {
rules: {
conditions: {
values: [
{
value1: '={{$json.status}}',
operation: 'equals',
value2: 'active'
}
]
}
}
};
const result = FixedCollectionValidator.validate('n8n-nodes-base.switch', invalidConfig);
expect(result.isValid).toBe(false);
expect(result.errors).toHaveLength(2); // Both rules.conditions and rules.conditions.values match
// Check that we found the specific pattern
const conditionsValuesError = result.errors.find(e => e.pattern === 'rules.conditions.values');
expect(conditionsValuesError).toBeDefined();
expect(conditionsValuesError!.message).toContain('propertyValues[itemName] is not iterable');
expect(result.autofix).toBeDefined();
expect(isNodeConfig(result.autofix)).toBe(true);
if (isNodeConfig(result.autofix)) {
expect(result.autofix.rules).toBeDefined();
expect((result.autofix.rules as any).values).toBeDefined();
expect((result.autofix.rules as any).values[0].outputKey).toBe('output1');
}
});
test('should provide correct autofix for switch node', () => {
const invalidConfig = {
rules: {
conditions: {
values: [
{ value1: '={{$json.a}}', operation: 'equals', value2: '1' },
{ value1: '={{$json.b}}', operation: 'equals', value2: '2' }
]
}
}
};
const result = FixedCollectionValidator.validate('switch', invalidConfig);
expect(isNodeConfig(result.autofix)).toBe(true);
if (isNodeConfig(result.autofix)) {
expect((result.autofix.rules as any).values).toHaveLength(2);
expect((result.autofix.rules as any).values[0].outputKey).toBe('output1');
expect((result.autofix.rules as any).values[1].outputKey).toBe('output2');
}
});
});
describe('If/Filter Node Validation', () => {
test('should detect invalid nested values structure', () => {
const invalidConfig = {
conditions: {
values: [
{
value1: '={{$json.age}}',
operation: 'largerEqual',
value2: 18
}
]
}
};
const ifResult = FixedCollectionValidator.validate('n8n-nodes-base.if', invalidConfig);
const filterResult = FixedCollectionValidator.validate('n8n-nodes-base.filter', invalidConfig);
expect(ifResult.isValid).toBe(false);
expect(ifResult.errors[0].fix).toContain('directly, not nested under "values"');
expect(ifResult.autofix).toEqual([
{
value1: '={{$json.age}}',
operation: 'largerEqual',
value2: 18
}
]);
expect(filterResult.isValid).toBe(false);
expect(filterResult.autofix).toEqual(ifResult.autofix);
});
});
describe('New Nodes Validation', () => {
test('should validate Summarize node', () => {
const invalidConfig = {
fieldsToSummarize: {
values: {
values: [
{ field: 'amount', aggregation: 'sum' },
{ field: 'count', aggregation: 'count' }
]
}
}
};
const result = FixedCollectionValidator.validate('summarize', invalidConfig);
expect(result.isValid).toBe(false);
expect(result.errors[0].pattern).toBe('fieldsToSummarize.values.values');
expect(result.errors[0].fix).toContain('not nested values.values');
expect(isNodeConfig(result.autofix)).toBe(true);
if (isNodeConfig(result.autofix)) {
expect((result.autofix.fieldsToSummarize as any).values).toHaveLength(2);
}
});
test('should validate Compare Datasets node', () => {
const invalidConfig = {
mergeByFields: {
values: {
values: [
{ field1: 'id', field2: 'userId' }
]
}
}
};
const result = FixedCollectionValidator.validate('compareDatasets', invalidConfig);
expect(result.isValid).toBe(false);
expect(result.errors[0].pattern).toBe('mergeByFields.values.values');
expect(isNodeConfig(result.autofix)).toBe(true);
if (isNodeConfig(result.autofix)) {
expect((result.autofix.mergeByFields as any).values).toHaveLength(1);
}
});
test('should validate Sort node', () => {
const invalidConfig = {
sortFieldsUi: {
sortField: {
values: [
{ fieldName: 'date', order: 'descending' }
]
}
}
};
const result = FixedCollectionValidator.validate('sort', invalidConfig);
expect(result.isValid).toBe(false);
expect(result.errors[0].pattern).toBe('sortFieldsUi.sortField.values');
expect(result.errors[0].fix).toContain('not sortField.values');
expect(isNodeConfig(result.autofix)).toBe(true);
if (isNodeConfig(result.autofix)) {
expect((result.autofix.sortFieldsUi as any).sortField).toHaveLength(1);
}
});
test('should validate Aggregate node', () => {
const invalidConfig = {
fieldsToAggregate: {
fieldToAggregate: {
values: [
{ fieldToAggregate: 'price', aggregation: 'average' }
]
}
}
};
const result = FixedCollectionValidator.validate('aggregate', invalidConfig);
expect(result.isValid).toBe(false);
expect(result.errors[0].pattern).toBe('fieldsToAggregate.fieldToAggregate.values');
expect(isNodeConfig(result.autofix)).toBe(true);
if (isNodeConfig(result.autofix)) {
expect((result.autofix.fieldsToAggregate as any).fieldToAggregate).toHaveLength(1);
}
});
test('should validate Set node', () => {
const invalidConfig = {
fields: {
values: {
values: [
{ name: 'status', value: 'active' }
]
}
}
};
const result = FixedCollectionValidator.validate('set', invalidConfig);
expect(result.isValid).toBe(false);
expect(result.errors[0].pattern).toBe('fields.values.values');
expect(isNodeConfig(result.autofix)).toBe(true);
if (isNodeConfig(result.autofix)) {
expect((result.autofix.fields as any).values).toHaveLength(1);
}
});
test('should validate HTML node', () => {
const invalidConfig = {
extractionValues: {
values: {
values: [
{ key: 'title', cssSelector: 'h1' }
]
}
}
};
const result = FixedCollectionValidator.validate('html', invalidConfig);
expect(result.isValid).toBe(false);
expect(result.errors[0].pattern).toBe('extractionValues.values.values');
expect(isNodeConfig(result.autofix)).toBe(true);
if (isNodeConfig(result.autofix)) {
expect((result.autofix.extractionValues as any).values).toHaveLength(1);
}
});
test('should validate HTTP Request node', () => {
const invalidConfig = {
body: {
parameters: {
values: [
{ name: 'api_key', value: '123' }
]
}
}
};
const result = FixedCollectionValidator.validate('httpRequest', invalidConfig);
expect(result.isValid).toBe(false);
expect(result.errors[0].pattern).toBe('body.parameters.values');
expect(result.errors[0].fix).toContain('not parameters.values');
expect(isNodeConfig(result.autofix)).toBe(true);
if (isNodeConfig(result.autofix)) {
expect((result.autofix.body as any).parameters).toHaveLength(1);
}
});
test('should validate Airtable node', () => {
const invalidConfig = {
sort: {
sortField: {
values: [
{ fieldName: 'Created', direction: 'desc' }
]
}
}
};
const result = FixedCollectionValidator.validate('airtable', invalidConfig);
expect(result.isValid).toBe(false);
expect(result.errors[0].pattern).toBe('sort.sortField.values');
expect(isNodeConfig(result.autofix)).toBe(true);
if (isNodeConfig(result.autofix)) {
expect((result.autofix.sort as any).sortField).toHaveLength(1);
}
});
});
describe('Edge Cases', () => {
test('should handle empty config', () => {
const result = FixedCollectionValidator.validate('switch', {});
expect(result.isValid).toBe(true);
});
test('should handle null/undefined properties', () => {
const result = FixedCollectionValidator.validate('switch', {
rules: null
});
expect(result.isValid).toBe(true);
});
test('should handle valid structures', () => {
const validSwitch = {
rules: {
values: [
{
conditions: { value1: '={{$json.x}}', operation: 'equals', value2: 1 },
outputKey: 'output1'
}
]
}
};
const result = FixedCollectionValidator.validate('switch', validSwitch);
expect(result.isValid).toBe(true);
expect(result.errors).toHaveLength(0);
});
test('should handle deeply nested invalid structures', () => {
const deeplyNested = {
rules: {
conditions: {
values: [
{
value1: '={{$json.deep}}',
operation: 'equals',
value2: 'nested'
}
]
}
}
};
const result = FixedCollectionValidator.validate('switch', deeplyNested);
expect(result.isValid).toBe(false);
expect(result.errors).toHaveLength(2); // Both patterns match
});
});
describe('Private Method Testing (through public API)', () => {
describe('isNodeConfig Type Guard', () => {
test('should return true for plain objects', () => {
const validConfig = { property: 'value' };
const result = FixedCollectionValidator.validate('switch', validConfig);
// Type guard is tested indirectly through validation
expect(result).toBeDefined();
});
test('should handle null values correctly', () => {
const result = FixedCollectionValidator.validate('switch', null as any);
expect(result.isValid).toBe(true);
expect(result.errors).toHaveLength(0);
});
test('should handle undefined values correctly', () => {
const result = FixedCollectionValidator.validate('switch', undefined as any);
expect(result.isValid).toBe(true);
expect(result.errors).toHaveLength(0);
});
test('should handle arrays correctly', () => {
const result = FixedCollectionValidator.validate('switch', [] as any);
expect(result.isValid).toBe(true);
expect(result.errors).toHaveLength(0);
});
test('should handle primitive values correctly', () => {
const result1 = FixedCollectionValidator.validate('switch', 'string' as any);
expect(result1.isValid).toBe(true);
const result2 = FixedCollectionValidator.validate('switch', 123 as any);
expect(result2.isValid).toBe(true);
const result3 = FixedCollectionValidator.validate('switch', true as any);
expect(result3.isValid).toBe(true);
});
});
describe('getNestedValue Testing', () => {
test('should handle simple nested paths', () => {
const config = {
rules: {
conditions: {
values: [{ test: 'value' }]
}
}
};
const result = FixedCollectionValidator.validate('switch', config);
expect(result.isValid).toBe(false); // This tests the nested value extraction
});
test('should handle non-existent paths gracefully', () => {
const config = {
rules: {
// missing conditions property
}
};
const result = FixedCollectionValidator.validate('switch', config);
expect(result.isValid).toBe(true); // Should not find invalid structure
});
test('should handle interrupted paths (null/undefined in middle)', () => {
const config = {
rules: null
};
const result = FixedCollectionValidator.validate('switch', config);
expect(result.isValid).toBe(true);
});
test('should handle array interruptions in path', () => {
const config = {
rules: [1, 2, 3] // array instead of object
};
const result = FixedCollectionValidator.validate('switch', config);
expect(result.isValid).toBe(true); // Should not find the pattern
});
});
describe('Circular Reference Protection', () => {
test('should handle circular references in config', () => {
const config: any = {
rules: {
conditions: {}
}
};
// Create circular reference
config.rules.conditions.circular = config.rules;
const result = FixedCollectionValidator.validate('switch', config);
// Should not crash and should detect the pattern (result is false because it finds rules.conditions)
expect(result.isValid).toBe(false);
expect(result.errors.length).toBeGreaterThan(0);
});
test('should handle self-referencing objects', () => {
const config: any = {
rules: {}
};
config.rules.self = config.rules;
const result = FixedCollectionValidator.validate('switch', config);
expect(result.isValid).toBe(true);
});
test('should handle deeply nested circular references', () => {
const config: any = {
rules: {
conditions: {
values: {}
}
}
};
config.rules.conditions.values.back = config;
const result = FixedCollectionValidator.validate('switch', config);
// Should detect the problematic pattern: rules.conditions.values exists
expect(result.isValid).toBe(false);
expect(result.errors.length).toBeGreaterThan(0);
});
});
describe('Deep Copying in getAllPatterns', () => {
test('should return independent copies of patterns', () => {
const patterns1 = FixedCollectionValidator.getAllPatterns();
const patterns2 = FixedCollectionValidator.getAllPatterns();
// Modify one copy
patterns1[0].invalidPatterns.push('test.pattern');
// Other copy should be unaffected
expect(patterns2[0].invalidPatterns).not.toContain('test.pattern');
});
test('should deep copy invalidPatterns arrays', () => {
const patterns = FixedCollectionValidator.getAllPatterns();
const switchPattern = patterns.find(p => p.nodeType === 'switch')!;
expect(switchPattern.invalidPatterns).toBeInstanceOf(Array);
expect(switchPattern.invalidPatterns.length).toBeGreaterThan(0);
// Ensure it's a different array instance
const originalPatterns = FixedCollectionValidator.getAllPatterns();
const originalSwitch = originalPatterns.find(p => p.nodeType === 'switch')!;
expect(switchPattern.invalidPatterns).not.toBe(originalSwitch.invalidPatterns);
expect(switchPattern.invalidPatterns).toEqual(originalSwitch.invalidPatterns);
});
});
});
describe('Enhanced Edge Cases', () => {
test('should handle hasOwnProperty edge case', () => {
const config = Object.create(null);
config.rules = {
conditions: {
values: [{ test: 'value' }]
}
};
const result = FixedCollectionValidator.validate('switch', config);
expect(result.isValid).toBe(false); // Should still detect the pattern
});
test('should handle prototype pollution attempts', () => {
const config = {
rules: {
conditions: {
values: [{ test: 'value' }]
}
}
};
// Add prototype property (should be ignored by hasOwnProperty check)
(Object.prototype as any).maliciousProperty = 'evil';
try {
const result = FixedCollectionValidator.validate('switch', config);
expect(result.isValid).toBe(false);
expect(result.errors).toHaveLength(2);
} finally {
delete (Object.prototype as any).maliciousProperty;
}
});
test('should handle objects with numeric keys', () => {
const config = {
rules: {
'0': {
values: [{ test: 'value' }]
}
}
};
const result = FixedCollectionValidator.validate('switch', config);
expect(result.isValid).toBe(true); // Should not match 'conditions' pattern
});
test('should handle very deep nesting without crashing', () => {
let deepConfig: any = {};
let current = deepConfig;
// Create 100 levels deep
for (let i = 0; i < 100; i++) {
current.next = {};
current = current.next;
}
const result = FixedCollectionValidator.validate('switch', deepConfig);
expect(result.isValid).toBe(true);
});
});
describe('Alternative Node Type Formats', () => {
test('should handle all node type normalization cases', () => {
const testCases = [
'n8n-nodes-base.switch',
'nodes-base.switch',
'@n8n/n8n-nodes-langchain.switch',
'SWITCH',
'Switch',
'sWiTcH'
];
testCases.forEach(nodeType => {
expect(FixedCollectionValidator.isNodeSusceptible(nodeType)).toBe(true);
});
});
test('should handle empty and invalid node types', () => {
expect(FixedCollectionValidator.isNodeSusceptible('')).toBe(false);
expect(FixedCollectionValidator.isNodeSusceptible('unknown-node')).toBe(false);
expect(FixedCollectionValidator.isNodeSusceptible('n8n-nodes-base.unknown')).toBe(false);
});
});
describe('Complex Autofix Scenarios', () => {
test('should handle switch autofix with non-array values', () => {
const invalidConfig = {
rules: {
conditions: {
values: { single: 'condition' } // Object instead of array
}
}
};
const result = FixedCollectionValidator.validate('switch', invalidConfig);
expect(result.isValid).toBe(false);
expect(isNodeConfig(result.autofix)).toBe(true);
if (isNodeConfig(result.autofix)) {
const values = (result.autofix.rules as any).values;
expect(values).toHaveLength(1);
expect(values[0].conditions).toEqual({ single: 'condition' });
expect(values[0].outputKey).toBe('output1');
}
});
test('should handle if/filter autofix with object values', () => {
const invalidConfig = {
conditions: {
values: { type: 'single', condition: 'test' }
}
};
const result = FixedCollectionValidator.validate('if', invalidConfig);
expect(result.isValid).toBe(false);
expect(result.autofix).toEqual({ type: 'single', condition: 'test' });
});
test('should handle applyAutofix for if/filter with null values', () => {
const invalidConfig = {
conditions: {
values: null
}
};
const pattern = FixedCollectionValidator.getAllPatterns().find(p => p.nodeType === 'if')!;
const fixed = FixedCollectionValidator.applyAutofix(invalidConfig, pattern);
// Should return the original config when values is null
expect(fixed).toEqual(invalidConfig);
});
test('should handle applyAutofix for if/filter with undefined values', () => {
const invalidConfig = {
conditions: {
values: undefined
}
};
const pattern = FixedCollectionValidator.getAllPatterns().find(p => p.nodeType === 'if')!;
const fixed = FixedCollectionValidator.applyAutofix(invalidConfig, pattern);
// Should return the original config when values is undefined
expect(fixed).toEqual(invalidConfig);
});
});
describe('applyAutofix Method', () => {
test('should apply autofix correctly for if/filter nodes', () => {
const invalidConfig = {
conditions: {
values: [
{ value1: '={{$json.test}}', operation: 'equals', value2: 'yes' }
]
}
};
const pattern = FixedCollectionValidator.getAllPatterns().find(p => p.nodeType === 'if');
const fixed = FixedCollectionValidator.applyAutofix(invalidConfig, pattern!);
expect(fixed).toEqual([
{ value1: '={{$json.test}}', operation: 'equals', value2: 'yes' }
]);
});
test('should return original config for non-if/filter nodes', () => {
const invalidConfig = {
fieldsToSummarize: {
values: {
values: [{ field: 'test' }]
}
}
};
const pattern = FixedCollectionValidator.getAllPatterns().find(p => p.nodeType === 'summarize');
const fixed = FixedCollectionValidator.applyAutofix(invalidConfig, pattern!);
expect(isNodeConfig(fixed)).toBe(true);
if (isNodeConfig(fixed)) {
expect((fixed.fieldsToSummarize as any).values).toEqual([{ field: 'test' }]);
}
});
test('should handle filter node applyAutofix edge cases', () => {
const invalidConfig = {
conditions: {
values: 'string-value' // Invalid type
}
};
const pattern = FixedCollectionValidator.getAllPatterns().find(p => p.nodeType === 'filter');
const fixed = FixedCollectionValidator.applyAutofix(invalidConfig, pattern!);
// Should return original config when values is not object/array
expect(fixed).toEqual(invalidConfig);
});
});
describe('Missing Function Coverage Tests', () => {
test('should test all generateFixMessage cases', () => {
// Test each node type's fix message generation through validation
const nodeConfigs = [
{ nodeType: 'switch', config: { rules: { conditions: { values: [] } } } },
{ nodeType: 'if', config: { conditions: { values: [] } } },
{ nodeType: 'filter', config: { conditions: { values: [] } } },
{ nodeType: 'summarize', config: { fieldsToSummarize: { values: { values: [] } } } },
{ nodeType: 'comparedatasets', config: { mergeByFields: { values: { values: [] } } } },
{ nodeType: 'sort', config: { sortFieldsUi: { sortField: { values: [] } } } },
{ nodeType: 'aggregate', config: { fieldsToAggregate: { fieldToAggregate: { values: [] } } } },
{ nodeType: 'set', config: { fields: { values: { values: [] } } } },
{ nodeType: 'html', config: { extractionValues: { values: { values: [] } } } },
{ nodeType: 'httprequest', config: { body: { parameters: { values: [] } } } },
{ nodeType: 'airtable', config: { sort: { sortField: { values: [] } } } },
];
nodeConfigs.forEach(({ nodeType, config }) => {
const result = FixedCollectionValidator.validate(nodeType, config);
expect(result.isValid).toBe(false);
expect(result.errors.length).toBeGreaterThan(0);
expect(result.errors[0].fix).toBeDefined();
expect(typeof result.errors[0].fix).toBe('string');
});
});
test('should test default case in generateFixMessage', () => {
// Create a custom pattern with unknown nodeType to test default case
const mockPattern = {
nodeType: 'unknown-node-type',
property: 'testProperty',
expectedStructure: 'test.structure',
invalidPatterns: ['test.invalid.pattern']
};
// We can't directly test the private generateFixMessage method,
// but we can test through the validation logic by temporarily adding to KNOWN_PATTERNS
// Instead, let's verify the method works by checking error messages contain the expected structure
const patterns = FixedCollectionValidator.getAllPatterns();
expect(patterns.length).toBeGreaterThan(0);
// Ensure we have patterns that would exercise different fix message paths
const switchPattern = patterns.find(p => p.nodeType === 'switch');
expect(switchPattern).toBeDefined();
expect(switchPattern!.expectedStructure).toBe('rules.values array');
});
test('should exercise hasInvalidStructure edge cases', () => {
// Test with property that exists but is not at the end of the pattern
const config = {
rules: {
conditions: 'string-value' // Not an object, so traversal should stop
}
};
const result = FixedCollectionValidator.validate('switch', config);
expect(result.isValid).toBe(false); // Should still detect rules.conditions pattern
});
test('should test getNestedValue with complex paths', () => {
// Test through hasInvalidStructure which uses getNestedValue
const config = {
deeply: {
nested: {
path: {
to: {
value: 'exists'
}
}
}
}
};
// This would exercise the getNestedValue function through hasInvalidStructure
const result = FixedCollectionValidator.validate('switch', config);
expect(result.isValid).toBe(true); // No matching patterns
});
});
});

View File

@@ -0,0 +1,123 @@
import { describe, it, expect, vi, beforeEach, afterEach } from 'vitest';
import { SimpleCache } from '../../../src/utils/simple-cache';
describe('SimpleCache Memory Leak Fix', () => {
let cache: SimpleCache;
beforeEach(() => {
vi.useFakeTimers();
});
afterEach(() => {
if (cache && typeof cache.destroy === 'function') {
cache.destroy();
}
vi.restoreAllMocks();
});
it('should track cleanup timer', () => {
cache = new SimpleCache();
// Access private property for testing
expect((cache as any).cleanupTimer).toBeDefined();
expect((cache as any).cleanupTimer).not.toBeNull();
});
it('should clear timer on destroy', () => {
cache = new SimpleCache();
const timer = (cache as any).cleanupTimer;
cache.destroy();
expect((cache as any).cleanupTimer).toBeNull();
// Verify timer was cleared
expect(() => clearInterval(timer)).not.toThrow();
});
it('should clear cache on destroy', () => {
cache = new SimpleCache();
cache.set('test-key', 'test-value', 300);
expect(cache.get('test-key')).toBe('test-value');
cache.destroy();
expect(cache.get('test-key')).toBeNull();
});
it('should handle multiple destroy calls safely', () => {
cache = new SimpleCache();
expect(() => {
cache.destroy();
cache.destroy();
cache.destroy();
}).not.toThrow();
expect((cache as any).cleanupTimer).toBeNull();
});
it('should not create new timers after destroy', () => {
cache = new SimpleCache();
const originalTimer = (cache as any).cleanupTimer;
cache.destroy();
// Try to use the cache after destroy
cache.set('key', 'value');
cache.get('key');
cache.clear();
// Timer should still be null
expect((cache as any).cleanupTimer).toBeNull();
expect((cache as any).cleanupTimer).not.toBe(originalTimer);
});
it('should clean up expired entries periodically', () => {
cache = new SimpleCache();
// Set items with different TTLs
cache.set('short', 'value1', 1); // 1 second
cache.set('long', 'value2', 300); // 300 seconds
// Advance time by 2 seconds
vi.advanceTimersByTime(2000);
// Advance time to trigger cleanup (60 seconds)
vi.advanceTimersByTime(58000);
// Short-lived item should be gone
expect(cache.get('short')).toBeNull();
// Long-lived item should still exist
expect(cache.get('long')).toBe('value2');
});
it('should prevent memory leak by clearing timer', () => {
const timers: NodeJS.Timeout[] = [];
const originalSetInterval = global.setInterval;
// Mock setInterval to track created timers
global.setInterval = vi.fn((callback, delay) => {
const timer = originalSetInterval(callback, delay);
timers.push(timer);
return timer;
});
// Create and destroy multiple caches
for (let i = 0; i < 5; i++) {
const tempCache = new SimpleCache();
tempCache.set(`key${i}`, `value${i}`);
tempCache.destroy();
}
// All timers should have been cleared
expect(timers.length).toBe(5);
// Restore original setInterval
global.setInterval = originalSetInterval;
});
it('should have destroy method defined', () => {
cache = new SimpleCache();
expect(typeof cache.destroy).toBe('function');
});
});