Compare commits

..

9 Commits

Author SHA1 Message Date
Romuald Członkowski
4b764c6110 Merge pull request #254 from czlonkowski/fix/telemetry-error-message-capture
feat(telemetry): capture error messages with security hardening
2025-10-03 17:07:02 +02:00
czlonkowski
c3b691cedf feat(telemetry): capture error messages with security hardening
## Summary
Enhanced telemetry system to capture actual error messages for debugging
while implementing comprehensive security hardening to protect sensitive data.

## Changes
- Added optional errorMessage parameter to trackError() method
- Implemented sanitizeErrorMessage() with 7-layer security protection
- Updated all production and test call sites (atomic change)
- Added 18 new security-focused tests

## Security Fixes
- ReDoS Prevention: Early truncation + simplified regex patterns
- Full URL Redaction: Changed [URL]/path → [URL] to prevent leakage
- Credential Detection: AWS keys, GitHub tokens, JWT, Bearer tokens
- Correct Sanitization Order: URLs → credentials → emails → generic
- Error Handling: Try-catch wrapper with [SANITIZATION_FAILED] fallback

## Impact
- Resolves 272+ weekly errors with no error messages
- Protects against ReDoS attacks
- Prevents API structure and credential leakage
- 90.75% test coverage, 269 tests passing

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-03 15:53:13 +02:00
Romuald Członkowski
4bf8f7006d Merge pull request #253 from czlonkowski/fix/search-templates-metadata-timeout
refactor: enhance search_templates_by_metadata with production-ready improvements
2025-10-03 14:52:42 +02:00
czlonkowski
2a9a3b9410 chore: release v2.15.2 with 100% test coverage
- Bump version to 2.15.2
- Add comprehensive changelog entry documenting all improvements
- Add 31 new unit tests achieving 100% coverage for changed code
- Fix flaky integration tests with deterministic ordering

Test Coverage Improvements:
- buildMetadataFilterConditions: All filter combinations (11 tests)
- Performance logging validation (3 tests)
- ID filtering edge cases (7 tests)
- getMetadataSearchCount: Shared helper usage (7 tests)
- Two-phase optimization verification (3 tests)

Coverage increased from 36.58% to 100% for patch

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-03 14:44:53 +02:00
czlonkowski
cd27d78bfd refactor: enhance search_templates_by_metadata with production-ready improvements
Implements comprehensive improvements to the two-phase query optimization:

- **Ordering Stability**: Use CTE with VALUES clause to preserve exact Phase 1 ordering
  Prevents any ordering discrepancies between Phase 1 ID selection and Phase 2 data fetch

- **Defensive ID Validation**: Filter IDs for type safety before Phase 2 query
  Ensures only valid positive integers are used in the CTE

- **Performance Metrics**: Add detailed logging with phase1Ms, phase2Ms, totalMs
  Enables monitoring and quantifying the optimization benefits

- **DRY Principle**: Extract buildMetadataFilterConditions helper method
  Eliminates code duplication between searchTemplatesByMetadata and getMetadataSearchCount

- **Comprehensive Testing**: Add 4 integration tests covering:
  - Basic two-phase query functionality
  - Ordering stability with same view counts
  - Empty results early exit
  - Defensive ID validation

All tests passing (36/37, 1 skipped)
Build successful

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-03 14:07:34 +02:00
czlonkowski
8d1ae278ee fix: optimize search_templates_by_metadata to prevent timeout
Problem:
- search_templates_by_metadata with no filters caused Claude Desktop timeouts
- Query loaded ALL templates with metadata_json and decompressed workflows
- With 2,646 templates, this caused significant performance issues

Solution:
- Implement two-phase query optimization:
  1. Phase 1: SELECT id only (fast, no workflow data)
  2. Phase 2: Fetch full records only for matching IDs (decompress only needed rows)
- Prevents loading/decompressing thousands of rows when only 20 are needed

Performance Impact:
- No filters: Now responds instantly instead of timing out
- With filters: Same fast performance, minimal overhead
- Only decompresses the exact number of rows needed (limit parameter)

Testing:
- Tested with no filters:  2,646 templates, returned 5 in <1s
- Tested with complexity filter:  262 templates, returned 3 in <1s

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-03 13:36:46 +02:00
Romuald Członkowski
a84dbd6a15 Merge pull request #252 from czlonkowski/feat/integration-tests-foundation
feat: Integration Testing Foundation (Phase 1)
2025-10-03 13:30:36 +02:00
czlonkowski
1728495146 fix: address critical code review issues
Fix security and reliability issues identified in code review:

1. Security: Remove non-null assertions in credentials.ts
   - Add proper validation before returning credentials
   - Throw early with clear error messages showing which vars are missing
   - Prevents runtime failures with cryptic undefined errors

2. Reliability: Add pagination safety limits
   - Add MAX_PAGES limit (1000) to all pagination loops
   - Prevents infinite loops if API returns same cursor repeatedly
   - Applies to: cleanupOrphanedWorkflows, cleanupOldExecutions, cleanupExecutionsByWorkflow

Changes ensure safer credential handling and prevent potential infinite loops
in cleanup operations.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-03 13:22:33 +02:00
czlonkowski
2305aaab9e feat: implement integration testing foundation (Phase 1)
Complete implementation of Phase 1 foundation for n8n API integration tests.
Establishes core utilities, fixtures, and infrastructure for testing all 17 n8n API handlers against real n8n instance.

Changes:
- Add integration test environment configuration to .env.example
- Create comprehensive test utilities infrastructure:
  * credentials.ts: Environment-aware credential management (local .env vs CI secrets)
  * n8n-client.ts: Singleton API client wrapper with health checks
  * test-context.ts: Resource tracking and automatic cleanup
  * cleanup-helpers.ts: Multi-level cleanup strategies (orphaned, age-based, tag-based)
  * fixtures.ts: 6 pre-built workflow templates (webhook, HTTP, multi-node, error handling, AI, expressions)
  * factories.ts: Dynamic node/workflow builders with 15+ factory functions
  * webhook-workflows.ts: Webhook workflow configs and setup instructions

- Add npm scripts:
  * test:integration:n8n: Run n8n API integration tests
  * test:cleanup:orphans: Clean up orphaned test resources

- Create cleanup script for CI/manual use

Documentation:
- Add comprehensive integration testing plan (550 lines)
- Add Phase 1 completion summary with lessons learned

Key Features:
- Automatic credential detection (CI vs local)
- Multi-level cleanup (test, suite, CI, orphan)
- 6 workflow fixtures covering common scenarios
- 15+ factory functions for dynamic test data
- Support for 4 HTTP methods (GET, POST, PUT, DELETE) via pre-activated webhook workflows
- TypeScript-first with full type safety
- Comprehensive error handling with helpful messages

Total: ~1,520 lines of production-ready code + 650 lines of documentation

Ready for Phase 2: Workflow creation tests

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-03 13:12:42 +02:00
31 changed files with 12428 additions and 109 deletions

View File

@@ -132,4 +132,36 @@ ENABLE_MULTI_TENANT=false
# Enable metadata generation during template fetch (default: false)
# Set to true to automatically generate metadata when running fetch:templates
# METADATA_GENERATION_ENABLED=false
# METADATA_GENERATION_ENABLED=false
# ========================================
# INTEGRATION TESTING CONFIGURATION
# ========================================
# Configuration for integration tests that call real n8n instance API
# n8n API Configuration for Integration Tests
# For local development: Use your local n8n instance
# For CI: These will be provided by GitHub secrets
# N8N_API_URL=http://localhost:5678
# N8N_API_KEY=
# Pre-activated Webhook Workflows for Testing
# These workflows must be created manually in n8n and activated
# because n8n API doesn't support workflow activation.
#
# Setup Instructions:
# 1. Create 4 workflows in n8n UI (one for each HTTP method)
# 2. Each workflow should have a single Webhook node
# 3. Configure webhook paths: mcp-test-get, mcp-test-post, mcp-test-put, mcp-test-delete
# 4. ACTIVATE each workflow in n8n UI
# 5. Copy the workflow IDs here
#
# N8N_TEST_WEBHOOK_GET_ID= # Workflow ID for GET method webhook
# N8N_TEST_WEBHOOK_POST_ID= # Workflow ID for POST method webhook
# N8N_TEST_WEBHOOK_PUT_ID= # Workflow ID for PUT method webhook
# N8N_TEST_WEBHOOK_DELETE_ID= # Workflow ID for DELETE method webhook
# Test Configuration
N8N_TEST_CLEANUP_ENABLED=true # Enable automatic cleanup of test workflows
N8N_TEST_TAG=mcp-integration-test # Tag applied to all test workflows
N8N_TEST_NAME_PREFIX=[MCP-TEST] # Name prefix for test workflows

View File

@@ -5,6 +5,99 @@ All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
## [2.15.3] - 2025-10-03
### Added
- **Error Message Capture in Telemetry** - Enhanced telemetry tracking to capture actual error messages for better debugging
- Added optional `errorMessage` parameter to `trackError()` method
- Comprehensive error message sanitization to protect sensitive data
- Updated all production and test call sites to pass error messages
- Error messages now stored in telemetry events table for analysis
### Security
- **Enhanced Error Message Sanitization** - Comprehensive security hardening for telemetry data
- **ReDoS Prevention**: Early truncation to 1500 chars before regex processing
- **Full URL Redaction**: Changed from `[URL]/path` to `[URL]` to prevent API structure leakage
- **Correct Sanitization Order**: URLs → specific credentials → emails → generic patterns
- **Credential Pattern Detection**: Added AWS keys, GitHub tokens, JWT, Bearer tokens
- **Error Handling**: Try-catch wrapper with `[SANITIZATION_FAILED]` fallback
- **Stack Trace Truncation**: Limited to first 3 lines to reduce attack surface
### Fixed
- **Missing Error Messages**: Resolved issue where 272+ weekly validation errors had no error messages captured
- **Data Leakage**: Fixed URL path preservation exposing API versions and user IDs
- **Email Exposure**: Fixed sanitization order allowing emails in URLs to leak
- **ReDoS Vulnerability**: Removed complex capturing regex patterns that could cause performance issues
### Changed
- **Breaking Change**: `trackError()` signature updated with 4th parameter `errorMessage?: string`
- All internal call sites updated in single commit (atomic change)
- Not backwards compatible but acceptable as all code is internal
### Technical Details
- **Sanitization Patterns**:
- AWS Keys: `AKIA[A-Z0-9]{16}``[AWS_KEY]`
- GitHub Tokens: `ghp_[a-zA-Z0-9]{36,}``[GITHUB_TOKEN]`
- JWT: `eyJ[a-zA-Z0-9_-]+\.eyJ[a-zA-Z0-9_-]+\.[a-zA-Z0-9_-]+``[JWT]`
- Bearer Tokens: `Bearer [^\s]+``Bearer [TOKEN]`
- Emails: `[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}``[EMAIL]`
- Long Keys: `\b[a-zA-Z0-9_-]{32,}\b``[KEY]`
- Generic Credentials: `password/api_key/token=<value>``<field>=[REDACTED]`
### Test Coverage
- Added 18 new security-focused tests
- Total telemetry tests: 269 passing
- Coverage: 90.75% for telemetry module
- All security patterns validated with edge cases
### Performance
- Early truncation prevents ReDoS attacks
- Simplified regex patterns (no complex capturing groups)
- Sanitization adds <1ms overhead per error
- Final message truncated to 500 chars max
### Impact
- **Debugging**: Error messages now available for root cause analysis
- **Security**: Comprehensive protection against credential leakage
- **Performance**: Protected against ReDoS attacks
- **Reliability**: Try-catch ensures sanitization never breaks telemetry
## [2.15.2] - 2025-10-03
### Fixed
- **Template Search Performance & Reliability** - Enhanced `search_templates_by_metadata` with production-ready improvements
- **Ordering Stability**: Implemented CTE with VALUES clause to preserve exact Phase 1 ordering
- Prevents ordering discrepancies between ID selection and data fetch phases
- Ensures deterministic results across query phases
- **Defensive ID Validation**: Added type safety filters before Phase 2 query
- Validates only positive integers are used in the CTE
- Logs warnings for filtered invalid IDs
- **Performance Monitoring**: Added detailed timing metrics (phase1Ms, phase2Ms, totalMs)
- Enables quantifying optimization benefits
- Debug logging for all search operations
- **DRY Refactoring**: Extracted `buildMetadataFilterConditions` helper method
- Eliminates duplication between `searchTemplatesByMetadata` and `getMetadataSearchCount`
- Centralized filter-building logic
### Added
- **Comprehensive Test Coverage** - 31 new unit tests achieving 100% coverage for changed code
- `buildMetadataFilterConditions` - All filter combinations (11 tests)
- Performance logging validation (3 tests)
- ID filtering edge cases - negative, zero, non-integer, null (7 tests)
- `getMetadataSearchCount` - Shared helper usage (7 tests)
- Two-phase query optimization verification (3 tests)
- Fixed flaky integration tests with deterministic ordering using unique view counts
### Performance
- Query optimization maintains sub-1ms Phase 1 performance
- Two-phase approach prevents timeout on large template sets
- CTE-based ordering adds negligible overhead (<1ms)
### Test Results
- Unit tests: 31 new tests, all passing
- Integration tests: 36 passing, 1 skipped
- **Coverage**: 100% for changed code (previously 36.58% patch coverage)
## [2.15.0] - 2025-10-02
### 🚀 Major Features

Binary file not shown.

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,225 @@
# N8N-MCP Deep Dive Analysis - October 2, 2025
## Overview
This directory contains a comprehensive deep-dive analysis of n8n-mcp usage data from September 26 - October 2, 2025.
**Data Volume Analyzed:**
- 212,375 telemetry events
- 5,751 workflow creations
- 2,119 unique users
- 6 days of usage data
## Report Structure
###: `DEEP_DIVE_ANALYSIS_2025-10-02.md` (Main Report)
**Sections Covered:**
1. **Executive Summary** - Key findings and recommendations
2. **Tool Performance Analysis** - Success rates, performance metrics, critical findings
3. **Validation Catastrophe** - The node type prefix disaster analysis
4. **Usage Patterns & User Segmentation** - User distribution, daily trends
5. **Tool Sequence Analysis** - How AI agents use tools together
6. **Workflow Creation Patterns** - Complexity distribution, popular nodes
7. **Platform & Version Distribution** - OS, architecture, version adoption
8. **Error Patterns & Root Causes** - TypeErrors, validation errors, discovery failures
9. **P0-P1 Refactoring Recommendations** - Detailed implementation guides
**Sections Covered:**
- Remaining P1 and P2 recommendations
- Architectural refactoring suggestions
- Telemetry enhancements
- CHANGELOG integration
- Final recommendations summary
## Key Findings Summary
### Critical Issues (P0 - Fix Immediately)
1. **Node Type Prefix Validation Catastrophe**
- 5,000+ validation errors from single root cause
- `nodes-base.X` vs `n8n-nodes-base.X` confusion
- **Solution**: Auto-normalize prefixes (2-4 hours effort)
2. **TypeError in Node Information Tools**
- 10-18% failure rate in get_node_essentials/info
- 1,000+ failures affecting hundreds of users
- **Solution**: Complete null-safety audit (1 day effort)
3. **Task Discovery Failures**
- `get_node_for_task` failing 28% of the time
- Worst-performing tool in entire system
- **Solution**: Expand task library + fuzzy matching (3 days effort)
### Performance Metrics
**Excellent Reliability (96-100% success):**
- n8n_update_partial_workflow: 98.7%
- search_nodes: 99.8%
- n8n_create_workflow: 96.1%
- All workflow management tools: 100%
**User Distribution:**
- Power Users (12): 2,112 events/user, 33 workflows
- Heavy Users (47): 673 events/user, 18 workflows
- Regular Users (516): 199 events/user, 7 workflows (CORE AUDIENCE)
- Active Users (919): 52 events/user, 2 workflows
- Casual Users (625): 8 events/user, 1 workflow
### Usage Insights
**Most Used Tools:**
1. n8n_update_partial_workflow: 10,177 calls (iterative refinement)
2. search_nodes: 8,839 calls (node discovery)
3. n8n_create_workflow: 6,046 calls (workflow creation)
**Most Common Tool Sequences:**
1. update → update → update (549x) - Iterative refinement pattern
2. create → update (297x) - Create then refine
3. update → get_workflow (265x) - Update then verify
**Most Popular Nodes:**
1. code (53% of workflows) - AI agents love programmatic control
2. httpRequest (47%) - Integration-heavy usage
3. webhook (32%) - Event-driven automation
## SQL Analytical Views Created
15 comprehensive views were created in Supabase for ongoing analysis:
1. `vw_tool_performance` - Performance metrics per tool
2. `vw_error_analysis` - Error patterns and frequencies
3. `vw_validation_analysis` - Validation failure details
4. `vw_tool_sequences` - Tool-to-tool transition patterns
5. `vw_workflow_creation_patterns` - Workflow characteristics
6. `vw_node_usage_analysis` - Node popularity and complexity
7. `vw_node_cooccurrence` - Which nodes are used together
8. `vw_user_activity` - Per-user activity metrics
9. `vw_session_analysis` - Platform/version distribution
10. `vw_workflow_validation_failures` - Workflow validation issues
11. `vw_temporal_patterns` - Time-based usage patterns
12. `vw_tool_funnel` - User progression through tools
13. `vw_search_analysis` - Search behavior
14. `vw_tool_success_summary` - Success/failure rates
15. `vw_user_journeys` - Complete user session reconstruction
## Priority Recommendations
### Immediate Actions (This Week)
**P0-R1**: Auto-normalize node type prefixes → Eliminate 4,800 errors
**P0-R2**: Complete null-safety audit → Fix 10-18% TypeError failures
**P0-R3**: Expand get_node_for_task library → 72% → 95% success rate
**Expected Impact**: Reduce error rate from 5-10% to <2% overall
### Next Release (2-3 Weeks)
**P1-R4**: Batch workflow operations Save 30-50% tokens
**P1-R5**: Proactive node suggestions Reduce search iterations
**P1-R6**: Auto-fix suggestions in errors Self-service recovery
**Expected Impact**: 40% faster workflow creation, better UX
### Future Roadmap (1-3 Months)
**A1**: Service layer consolidation Cleaner architecture
**A2**: Repository caching 50% faster node operations
**R10**: Workflow template library from usage 80% coverage
**T1-T3**: Enhanced telemetry Better observability
**Expected Impact**: Scalable foundation for 10x growth
## Methodology
### Data Sources
1. **Supabase Telemetry Database**
- `telemetry_events` table: 212,375 rows
- `telemetry_workflows` table: 5,751 rows
2. **Analytical Views**
- Created 15 SQL views for multi-dimensional analysis
- Enabled complex queries and pattern recognition
3. **CHANGELOG Review**
- Analyzed recent changes (v2.14.0 - v2.14.6)
- Correlated fixes with error patterns
### Analysis Approach
1. **Quantitative Analysis**
- Success/failure rates per tool
- Performance metrics (avg, median, p95, p99)
- User segmentation and cohort analysis
- Temporal trends and growth patterns
2. **Pattern Recognition**
- Tool sequence analysis (Markov chains)
- Node co-occurrence patterns
- Workflow complexity distribution
- Error clustering and root cause analysis
3. **Qualitative Insights**
- CHANGELOG integration
- Error message analysis
- User journey reconstruction
- Best practice identification
## How to Use This Analysis
### For Development Priorities
1. Review **P0 Critical Recommendations** (Section 8)
2. Check estimated effort and impact
3. Prioritize based on ROI (impact/effort ratio)
4. Follow implementation guides with code examples
### For Architecture Decisions
1. Review **Architectural Recommendations** (Section 9)
2. Consider service layer consolidation
3. Evaluate repository caching opportunities
4. Plan for 10x scale
### For Product Strategy
1. Review **Usage Patterns** (Section 3 & 5)
2. Understand user segments (power vs casual)
3. Identify high-value features (most-used tools)
4. Focus on reliability over features (96% success rate target)
### For Telemetry Enhancement
1. Review **Telemetry Enhancements** (Section 10)
2. Add fine-grained timing metrics
3. Track workflow creation funnels
4. Monitor node-level analytics
## Contact & Feedback
For questions about this analysis or to request additional insights:
- Data Analyst: Claude Code with Supabase MCP
- Analysis Date: October 2, 2025
- Data Period: September 26 - October 2, 2025
## Change Log
- **2025-10-02**: Initial comprehensive analysis completed
- 15 SQL analytical views created
- 13 sections of detailed findings
- P0/P1/P2 recommendations with implementation guides
- Code examples and effort estimates provided
## Next Steps
1. Review findings with development team
2. Prioritize P0 recommendations for immediate implementation
3. Plan P1 features for next release cycle
4. Set up monitoring for key metrics
5. Schedule follow-up analysis (weekly recommended)
---
*This analysis represents a snapshot of n8n-mcp usage during early adoption phase. Patterns may evolve as the user base grows and matures.*

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,369 @@
# Template Mining Analysis - Alternative to P0-R3
**Date**: 2025-10-02
**Context**: Analyzing whether to fix `get_node_for_task` (28% failure rate) or replace it with template-based configuration extraction
## Executive Summary
**RECOMMENDATION**: Replace `get_node_for_task` with template-based configuration extraction. The template database contains 2,646 real-world workflows with rich node configurations that far exceed the 31 hardcoded task templates.
## Key Findings
### 1. Template Database Coverage
- **Total Templates**: 2,646 production workflows from n8n.io
- **Unique Node Types**: 543 (covers 103% of our 525 core nodes)
- **Metadata Coverage**: 100% (AI-generated structured metadata)
### 2. Node Type Coverage in Templates
Top node types by template usage:
```
3,820 templates: n8n-nodes-base.httpRequest (144% of total templates!)
3,678 templates: n8n-nodes-base.set
2,445 templates: n8n-nodes-base.code
1,700 templates: n8n-nodes-base.googleSheets
1,471 templates: @n8n/n8n-nodes-langchain.agent
1,269 templates: @n8n/n8n-nodes-langchain.lmChatOpenAi
792 templates: n8n-nodes-base.telegram
702 templates: n8n-nodes-base.httpRequestTool
596 templates: n8n-nodes-base.gmail
466 templates: n8n-nodes-base.webhook
```
**Comparison**:
- Hardcoded task templates: 31 tasks covering 5.9% of nodes
- Real templates: 2,646 templates with 2-3k examples for common nodes
### 3. Database Structure
```sql
CREATE TABLE templates (
id INTEGER PRIMARY KEY,
workflow_id INTEGER UNIQUE NOT NULL,
name TEXT NOT NULL,
description TEXT,
-- Node information
nodes_used TEXT, -- JSON array: ["n8n-nodes-base.httpRequest", ...]
workflow_json_compressed TEXT, -- Base64 encoded gzip of full workflow
-- Metadata (100% coverage)
metadata_json TEXT, -- AI-generated structured metadata
-- Stats
views INTEGER DEFAULT 0,
created_at DATETIME,
-- ...
);
```
### 4. Real Configuration Examples
#### HTTP Request Node Configurations
**Simple URL fetch**:
```json
{
"url": "https://api.example.com/data",
"options": {}
}
```
**With authentication**:
```json
{
"url": "=https://api.wavespeed.ai/api/v3/predictions/{{ $json.data.id }}/result",
"options": {},
"authentication": "genericCredentialType",
"genericAuthType": "httpHeaderAuth"
}
```
**Complex expressions**:
```json
{
"url": "=https://image.pollinations.ai/prompt/{{$('Social Media Content Factory').item.json.output.description.replaceAll(' ','-').replaceAll(',','').replaceAll('.','') }}",
"options": {}
}
```
#### Webhook Node Configurations
**Basic webhook**:
```json
{
"path": "ytube",
"options": {},
"httpMethod": "POST",
"responseMode": "responseNode"
}
```
**With binary data**:
```json
{
"path": "your-endpoint",
"options": {
"binaryPropertyName": "data"
},
"httpMethod": "POST"
}
```
### 5. AI-Generated Metadata
Each template has structured metadata including:
```json
{
"categories": ["automation", "integration", "data processing"],
"complexity": "medium",
"use_cases": [
"Extract transaction data from Gmail",
"Automate bookkeeping",
"Expense tracking"
],
"estimated_setup_minutes": 30,
"required_services": ["Gmail", "Google Sheets", "Google Gemini"],
"key_features": [
"Fetch emails by label",
"Extract transaction data",
"Use LLM for structured output"
],
"target_audience": ["Accountants", "Small business owners"]
}
```
## Comparison: Task Templates vs Real Templates
### Current Approach (get_node_for_task)
**Pros**:
- Curated configurations with best practices
- Predictable, stable responses
- Fast lookup (no decompression needed)
**Cons**:
- Only 31 tasks (5.9% node coverage)
- 28% failure rate (users can't find what they need)
- Requires manual maintenance
- Static configurations without real-world context
- Usage ratio 22.5:1 (search_nodes is preferred)
### Template-Based Approach
**Pros**:
- 2,646 real workflows with 2-3k examples for common nodes
- 100% metadata coverage for semantic matching
- Real-world patterns and best practices
- Covers 543 node types (103% coverage)
- Self-updating (templates fetched from n8n.io)
- Rich context (use cases, complexity, setup time)
**Cons**:
- Requires decompression for full workflow access
- May contain template-specific context (but can be filtered)
- Need ranking/filtering logic for best matches
## Proposed Implementation Strategy
### Phase 1: Extract Node Configurations from Templates
Create a new service: `TemplateConfigExtractor`
```typescript
interface ExtractedNodeConfig {
nodeType: string;
configuration: Record<string, any>;
source: {
templateId: number;
templateName: string;
templateViews: number;
useCases: string[];
complexity: 'simple' | 'medium' | 'complex';
};
patterns: {
hasAuthentication: boolean;
hasExpressions: boolean;
hasOptionalFields: boolean;
};
}
class TemplateConfigExtractor {
async extractConfigsForNode(
nodeType: string,
options?: {
complexity?: 'simple' | 'medium' | 'complex';
requiresAuth?: boolean;
limit?: number;
}
): Promise<ExtractedNodeConfig[]> {
// 1. Query templates containing nodeType
// 2. Decompress workflow_json_compressed
// 3. Extract node configurations
// 4. Rank by popularity + complexity match
// 5. Return top N configurations
}
}
```
### Phase 2: Integrate with Existing Tools
**Option A**: Enhance `get_node_essentials`
- Add `includeExamples: boolean` parameter
- Return 2-3 real configurations from templates
- Preserve existing compact format
**Option B**: Enhance `get_node_info`
- Add `examples` section with template-sourced configs
- Include source attribution (template name, views)
**Option C**: New tool `get_node_examples`
- Dedicated tool for retrieving configuration examples
- Query by node type, complexity, use case
- Returns ranked list of real configurations
### Phase 3: Deprecate get_node_for_task
- Mark as deprecated in tool documentation
- Redirect to enhanced tools
- Remove after 2-3 version cycles
## Performance Considerations
### Decompression Cost
- Average compressed size: 6-12 KB
- Decompression time: ~5-10ms per template
- Caching strategy needed for frequently accessed templates
### Query Strategy
```sql
-- Fast: Get templates for a node type (no decompression)
SELECT id, name, views, metadata_json
FROM templates
WHERE nodes_used LIKE '%n8n-nodes-base.httpRequest%'
ORDER BY views DESC
LIMIT 10;
-- Then decompress only top matches
```
### Caching
- Cache decompressed workflows for popular templates (top 100)
- TTL: 1 hour
- Estimated memory: 100 * 50KB = 5MB
## Impact on P0-R3
**Original P0-R3 Plan**: Expand task library from 31 to 100+ tasks using fuzzy matching
**New Approach**: Mine 2,646 templates for real configurations
**Impact Assessment**:
| Metric | Original Plan | Template Mining |
|--------|--------------|-----------------|
| Configuration examples | 100 (estimated) | 2,646+ actual |
| Node coverage | ~20% | 103% |
| Maintenance | High (manual) | Low (auto-fetch) |
| Accuracy | Curated | Production-tested |
| Context richness | Limited | Rich metadata |
| Development time | 2-3 weeks | 1 week |
**Recommendation**: PIVOT to template mining approach for P0-R3
## Implementation Estimate
### Week 1: Core Infrastructure
- Day 1-2: Create `TemplateConfigExtractor` service
- Day 3: Implement caching layer
- Day 4-5: Testing and optimization
### Week 2: Integration
- Day 1-2: Enhance `get_node_essentials` with examples
- Day 3: Update tool documentation
- Day 4-5: Integration testing
**Total**: 2 weeks vs 3 weeks for original plan
## Validation Tests
```typescript
// Test: Extract HTTP Request configs
const configs = await extractor.extractConfigsForNode(
'n8n-nodes-base.httpRequest',
{ complexity: 'simple', limit: 5 }
);
// Expected: 5 configs from top templates
// - Simple URL fetch
// - With authentication
// - With custom headers
// - With expressions
// - With error handling
// Test: Extract webhook configs
const webhookConfigs = await extractor.extractConfigsForNode(
'n8n-nodes-base.webhook',
{ limit: 3 }
);
// Expected: 3 configs showing different patterns
// - Basic POST webhook
// - With response node
// - With binary data handling
```
## Risks and Mitigation
### Risk 1: Template Quality Varies
- **Mitigation**: Filter by views (popularity) and metadata complexity rating
- Only use templates with >1000 views for examples
### Risk 2: Decompression Performance
- **Mitigation**: Cache decompressed popular templates
- Implement lazy loading (decompress on demand)
### Risk 3: Template-Specific Context
- **Mitigation**: Extract only node configuration, strip workflow-specific context
- Provide source attribution for context
### Risk 4: Breaking Changes in Template Structure
- **Mitigation**: Robust error handling in decompression
- Fallback to cached configs if template fetch fails
## Success Metrics
**Before** (get_node_for_task):
- 392 calls, 72% success rate
- 28% failure rate
- 31 task templates
- 5.9% node coverage
**Target** (template-based):
- 90%+ success rate for configuration discovery
- 100%+ node coverage
- 2,646+ real-world examples
- Self-updating from n8n.io
## Next Steps
1. ✅ Complete template database analysis
2. ⏳ Create `TemplateConfigExtractor` service
3. ⏳ Implement caching layer
4. ⏳ Enhance `get_node_essentials` with examples
5. ⏳ Update P0 implementation plan
6. ⏳ Begin implementation
## Conclusion
The template database provides a vastly superior alternative to hardcoded task templates:
- **2,646 templates** vs 31 tasks (85x more examples)
- **103% node coverage** vs 5.9% coverage (17x improvement)
- **Real-world configurations** vs synthetic examples
- **Self-updating** vs manual maintenance
- **Rich metadata** for semantic matching
**Recommendation**: Pivot P0-R3 from "expand task library" to "mine template configurations"

View File

@@ -0,0 +1,924 @@
# Comprehensive Integration Testing Plan
## Overview
Transform the test suite to test all 17 n8n API handlers against a **real n8n instance** instead of mocks. This plan ensures 100% coverage of every tool, operation, and parameter combination to prevent bugs like the P0 workflow creation issue from slipping through.
## Critical Requirements
1. **Credentials**:
- Local development: Read from `.env` file
- CI/GitHub Actions: Use GitHub secrets (`N8N_URL`, `N8N_API_KEY`)
2. **Pre-activated Webhook Workflows**:
- n8n API doesn't support workflow activation via API
- Need pre-created, activated workflows for webhook testing
- Store workflow IDs in `.env`:
- `N8N_TEST_WEBHOOK_GET_ID` - Webhook with GET method
- `N8N_TEST_WEBHOOK_POST_ID` - Webhook with POST method
- `N8N_TEST_WEBHOOK_PUT_ID` - Webhook with PUT method
- `N8N_TEST_WEBHOOK_DELETE_ID` - Webhook with DELETE method
3. **100% Coverage Goal**: Test EVERY tool, EVERY operation, EVERY parameter combination
---
## Complete Test Coverage Matrix
### Total Test Scenarios: ~150+
#### Workflow Management (10 handlers)
**1. `handleCreateWorkflow`** - 10+ scenarios
- Create workflow with base nodes (webhook, httpRequest, set)
- Create workflow with langchain nodes (agent, aiChain)
- Invalid node types (error handling)
- Complex multi-node workflows
- Complex connection patterns
- **P0 Bug Verification**: SHORT vs FULL node type handling
- Missing required parameters
- Duplicate node names
- Invalid connection references
- Settings variations
**2. `handleGetWorkflow`** - 3 scenarios
- Successful retrieval
- Not found (invalid ID)
- Malformed ID
**3. `handleGetWorkflowDetails`** - 4 scenarios
- Basic workflow
- Workflow with metadata
- Workflow with version history
- Workflow with execution stats
**4. `handleGetWorkflowStructure`** - 2 scenarios
- Simple workflow
- Complex workflow (verify no parameter data)
**5. `handleGetWorkflowMinimal`** - 2 scenarios
- Active workflow
- Inactive workflow
**6. `handleUpdateWorkflow`** - 8+ scenarios
- Full workflow replacement
- Update nodes
- Update connections
- Update settings
- Update tags
- Validation errors
- Concurrent update conflicts
- Large workflow updates
**7. `handleUpdatePartialWorkflow`** - 30+ scenarios (15 operations × 2 paths)
**Node Operations (12 scenarios):**
- `addNode`: Success, duplicate name, invalid type, missing position
- `removeNode`: By ID, by name, not found, with connection cleanup
- `updateNode`: By ID, by name, invalid updates, nested parameter updates
- `moveNode`: Valid position, boundary positions
- `enableNode`: Success, already enabled
- `disableNode`: Success, already disabled
**Connection Operations (10 scenarios):**
- `addConnection`: Default ports, custom ports, invalid nodes
- `removeConnection`: Success, not found, with ignoreErrors
- `updateConnection`: Change ports, change indices
- `cleanStaleConnections`: Dry run, actual cleanup
- `replaceConnections`: Full replacement, validation
**Metadata Operations (8 scenarios):**
- `updateSettings`: Timezone, execution order, error workflow
- `updateName`: Valid, duplicate, empty
- `addTag`: New tag, existing tag
- `removeTag`: Existing, non-existing
**8. `handleDeleteWorkflow`** - 3 scenarios
- Successful deletion
- Not found
- Verify cleanup (workflow actually deleted)
**9. `handleListWorkflows`** - 12+ scenarios
- No filters (all workflows)
- Filter by active status (true/false)
- Filter by tags (single, multiple)
- Filter by projectId (enterprise feature)
- Pagination: first page, next page, last page
- Pagination: cursor handling
- Exclude pinned data
- Limit variations (1, 50, 100)
- Empty results
- Sort order verification
**10. `handleValidateWorkflow`** - 16 scenarios (4 profiles × 4 validation types)
**Validation Profiles:**
- `strict`: All validations enabled, strictest rules
- `runtime`: Production-ready validation
- `ai-friendly`: Relaxed rules for AI-generated workflows
- `minimal`: Basic structure validation only
**Validation Types (for each profile):**
- All validations enabled (default)
- Nodes only (`validateNodes: true`, others false)
- Connections only (`validateConnections: true`, others false)
- Expressions only (`validateExpressions: true`, others false)
**11. `handleAutofixWorkflow`** - 20+ scenarios
**Fix Types (5):**
- `expression-format`: Fix `{{}}` syntax issues
- `typeversion-correction`: Fix outdated typeVersion
- `error-output-config`: Fix error output configuration
- `node-type-correction`: Fix incorrect node types
- `webhook-missing-path`: Add missing webhook paths
**Confidence Levels (3):**
- `high`: Only apply high-confidence fixes
- `medium`: Apply high + medium confidence fixes
- `low`: Apply all fixes
**Test Matrix:**
- Each fix type with preview mode (`applyFixes: false`)
- Each fix type with apply mode (`applyFixes: true`)
- Confidence threshold filtering
- `maxFixes` parameter limiting
- Multiple fix types in single workflow
- No fixes available scenario
---
#### Execution Management (4 handlers)
**12. `handleTriggerWebhookWorkflow`** - 16+ scenarios
**HTTP Methods (4):**
- GET: Query parameters, no data
- POST: JSON body, form data, headers
- PUT: Update data, custom headers
- DELETE: Query parameters, headers
**Scenarios per method:**
- Basic trigger (no data)
- With request data
- With custom headers
- Wait for response (true/false)
- Workflow not found
- Invalid webhook URL
**13. `handleGetExecution`** - 20+ scenarios
**Execution Modes (4):**
- `preview`: Structure & counts only (no data)
- `summary`: 2 samples per node (default)
- `filtered`: Custom limits and node filters
- `full`: Complete execution data
**Scenarios per mode:**
- Successful execution
- Failed execution
- Running execution
- With input data (`includeInputData: true`)
- Node filters (`nodeNames: ['Node1', 'Node2']`)
- Item limits (`itemsLimit: 0, 2, 5, -1`)
- Not found
**14. `handleListExecutions`** - 10+ scenarios
- No filters (all executions)
- Filter by workflowId
- Filter by status (success, error, waiting)
- Filter by projectId
- Pagination: first page, next page, last page
- Include execution data (`includeData: true/false`)
- Limit variations (1, 50, 100)
- Empty results
**15. `handleDeleteExecution`** - 3 scenarios
- Successful deletion
- Not found
- Verify cleanup
---
#### System/Utility (3 handlers)
**16. `handleHealthCheck`** - 2 scenarios
- API available
- Feature availability check
**17. `handleListAvailableTools`** - 1 scenario
- List all tools
**18. `handleDiagnostic`** - 3 scenarios
- Basic diagnostic
- Verbose mode (`verbose: true`)
- Configuration display
---
## Implementation Phases
### Phase 1: Foundation (Branch: `feat/integration-tests-foundation`)
#### 1.1 Environment Configuration
**Update `.env.example`:**
```bash
# ========================================
# INTEGRATION TESTING CONFIGURATION
# ========================================
# n8n API Configuration for Integration Tests
N8N_API_URL=http://localhost:5678
N8N_API_KEY=your-api-key-here
# Pre-activated Webhook Workflows for Testing
# Create these workflows manually in n8n and activate them
# Each workflow should have a single Webhook node with the specified HTTP method
N8N_TEST_WEBHOOK_GET_ID= # Webhook with GET method
N8N_TEST_WEBHOOK_POST_ID= # Webhook with POST method
N8N_TEST_WEBHOOK_PUT_ID= # Webhook with PUT method
N8N_TEST_WEBHOOK_DELETE_ID= # Webhook with DELETE method
# Test Configuration
N8N_TEST_CLEANUP_ENABLED=true # Enable automatic cleanup
N8N_TEST_TAG=mcp-integration-test # Tag for test workflows
N8N_TEST_NAME_PREFIX=[MCP-TEST] # Name prefix for test workflows
```
**GitHub Secrets (for CI):**
- `N8N_URL`: n8n instance URL
- `N8N_API_KEY`: n8n API key
- `N8N_TEST_WEBHOOK_GET_ID`: Pre-activated GET webhook workflow ID
- `N8N_TEST_WEBHOOK_POST_ID`: Pre-activated POST webhook workflow ID
- `N8N_TEST_WEBHOOK_PUT_ID`: Pre-activated PUT webhook workflow ID
- `N8N_TEST_WEBHOOK_DELETE_ID`: Pre-activated DELETE webhook workflow ID
#### 1.2 Directory Structure
```
tests/integration/n8n-api/
├── workflows/
│ ├── create-workflow.test.ts (10+ scenarios)
│ ├── get-workflow.test.ts (3 scenarios)
│ ├── get-workflow-details.test.ts (4 scenarios)
│ ├── get-workflow-structure.test.ts (2 scenarios)
│ ├── get-workflow-minimal.test.ts (2 scenarios)
│ ├── update-workflow.test.ts (8+ scenarios)
│ ├── update-partial-workflow.test.ts (30+ scenarios - 15 operations)
│ ├── delete-workflow.test.ts (3 scenarios)
│ ├── list-workflows.test.ts (12+ scenarios)
│ ├── validate-workflow.test.ts (16 scenarios - 4 profiles × 4 types)
│ └── autofix-workflow.test.ts (20+ scenarios - 5 types × modes)
├── executions/
│ ├── trigger-webhook.test.ts (16+ scenarios - 4 methods)
│ ├── get-execution.test.ts (20+ scenarios - 4 modes)
│ ├── list-executions.test.ts (10+ scenarios)
│ └── delete-execution.test.ts (3 scenarios)
├── system/
│ ├── health-check.test.ts (2 scenarios)
│ ├── list-tools.test.ts (1 scenario)
│ └── diagnostic.test.ts (3 scenarios)
└── utils/
├── credentials.ts # Environment-aware credential loader
├── n8n-client.ts # Pre-configured API client
├── cleanup-helpers.ts # Multi-level cleanup
├── test-context.ts # Resource tracking
├── fixtures.ts # Reusable workflow templates
├── factories.ts # Test data generators
└── webhook-workflows.ts # Webhook workflow configurations
```
#### 1.3 Core Utilities
**credentials.ts** - Environment-aware credential loader:
```typescript
import dotenv from 'dotenv';
dotenv.config();
export interface N8nTestCredentials {
url: string;
apiKey: string;
webhookWorkflows: {
get: string;
post: string;
put: string;
delete: string;
};
cleanup: {
enabled: boolean;
tag: string;
namePrefix: string;
};
}
export function getN8nCredentials(): N8nTestCredentials {
if (process.env.CI) {
// CI: Use GitHub secrets
return {
url: process.env.N8N_URL!,
apiKey: process.env.N8N_API_KEY!,
webhookWorkflows: {
get: process.env.N8N_TEST_WEBHOOK_GET_ID!,
post: process.env.N8N_TEST_WEBHOOK_POST_ID!,
put: process.env.N8N_TEST_WEBHOOK_PUT_ID!,
delete: process.env.N8N_TEST_WEBHOOK_DELETE_ID!
},
cleanup: {
enabled: true,
tag: 'mcp-integration-test',
namePrefix: '[MCP-TEST]'
}
};
} else {
// Local: Use .env file
return {
url: process.env.N8N_API_URL!,
apiKey: process.env.N8N_API_KEY!,
webhookWorkflows: {
get: process.env.N8N_TEST_WEBHOOK_GET_ID || '',
post: process.env.N8N_TEST_WEBHOOK_POST_ID || '',
put: process.env.N8N_TEST_WEBHOOK_PUT_ID || '',
delete: process.env.N8N_TEST_WEBHOOK_DELETE_ID || ''
},
cleanup: {
enabled: process.env.N8N_TEST_CLEANUP_ENABLED !== 'false',
tag: process.env.N8N_TEST_TAG || 'mcp-integration-test',
namePrefix: process.env.N8N_TEST_NAME_PREFIX || '[MCP-TEST]'
}
};
}
}
export function validateCredentials(creds: N8nTestCredentials): void {
if (!creds.url) throw new Error('N8N_API_URL is required');
if (!creds.apiKey) throw new Error('N8N_API_KEY is required');
}
export function validateWebhookWorkflows(creds: N8nTestCredentials): void {
const missing: string[] = [];
if (!creds.webhookWorkflows.get) missing.push('GET');
if (!creds.webhookWorkflows.post) missing.push('POST');
if (!creds.webhookWorkflows.put) missing.push('PUT');
if (!creds.webhookWorkflows.delete) missing.push('DELETE');
if (missing.length > 0) {
throw new Error(
`Missing webhook workflow IDs for HTTP methods: ${missing.join(', ')}\n` +
`Please create and activate webhook workflows, then set:\n` +
missing.map(m => ` N8N_TEST_WEBHOOK_${m}_ID`).join('\n')
);
}
}
```
**n8n-client.ts** - Pre-configured API client wrapper:
```typescript
import { N8nApiClient } from '../../../src/services/n8n-api-client';
import { getN8nCredentials } from './credentials';
let client: N8nApiClient | null = null;
export function getTestN8nClient(): N8nApiClient {
if (!client) {
const creds = getN8nCredentials();
client = new N8nApiClient(creds.url, creds.apiKey);
}
return client;
}
export function resetTestN8nClient(): void {
client = null;
}
```
**test-context.ts** - Resource tracking for cleanup:
```typescript
import { getN8nCredentials } from './credentials';
export interface TestContext {
workflowIds: string[];
executionIds: string[];
cleanup: () => Promise<void>;
}
export function createTestContext(): TestContext {
const context: TestContext = {
workflowIds: [],
executionIds: [],
cleanup: async () => {
const creds = getN8nCredentials();
if (!creds.cleanup.enabled) return;
const client = getTestN8nClient();
// Delete executions first
for (const id of context.executionIds) {
try {
await client.deleteExecution(id);
} catch (error) {
console.warn(`Failed to delete execution ${id}:`, error);
}
}
// Then delete workflows
for (const id of context.workflowIds) {
try {
await client.deleteWorkflow(id);
} catch (error) {
console.warn(`Failed to delete workflow ${id}:`, error);
}
}
context.workflowIds = [];
context.executionIds = [];
}
};
return context;
}
```
**cleanup-helpers.ts** - Multi-level cleanup strategies:
```typescript
import { N8nApiClient } from '../../../src/services/n8n-api-client';
import { getN8nCredentials, getTestN8nClient } from './credentials';
/**
* Clean up orphaned test workflows
* Run this periodically in CI to clean up failed test runs
*/
export async function cleanupOrphanedWorkflows(): Promise<void> {
const creds = getN8nCredentials();
const client = getTestN8nClient();
let allWorkflows: any[] = [];
let cursor: string | undefined;
// Fetch all workflows with pagination
do {
const response = await client.listWorkflows({ cursor, limit: 100 });
allWorkflows.push(...response.data);
cursor = response.nextCursor;
} while (cursor);
// Find test workflows
const testWorkflows = allWorkflows.filter(w =>
w.tags?.includes(creds.cleanup.tag) ||
w.name?.startsWith(creds.cleanup.namePrefix)
);
console.log(`Found ${testWorkflows.length} orphaned test workflows`);
// Delete them
for (const workflow of testWorkflows) {
try {
await client.deleteWorkflow(workflow.id);
console.log(`Deleted orphaned workflow: ${workflow.name} (${workflow.id})`);
} catch (error) {
console.warn(`Failed to delete workflow ${workflow.id}:`, error);
}
}
}
/**
* Clean up old executions (older than 24 hours)
*/
export async function cleanupOldExecutions(): Promise<void> {
const client = getTestN8nClient();
let allExecutions: any[] = [];
let cursor: string | undefined;
// Fetch all executions
do {
const response = await client.listExecutions({ cursor, limit: 100 });
allExecutions.push(...response.data);
cursor = response.nextCursor;
} while (cursor);
const oneDayAgo = Date.now() - 24 * 60 * 60 * 1000;
const oldExecutions = allExecutions.filter(e =>
new Date(e.startedAt).getTime() < oneDayAgo
);
console.log(`Found ${oldExecutions.length} old executions`);
for (const execution of oldExecutions) {
try {
await client.deleteExecution(execution.id);
} catch (error) {
console.warn(`Failed to delete execution ${execution.id}:`, error);
}
}
}
```
**fixtures.ts** - Reusable workflow templates:
```typescript
import { Workflow } from '../../../src/types/n8n-api';
export const SIMPLE_WEBHOOK_WORKFLOW: Partial<Workflow> = {
name: '[MCP-TEST] Simple Webhook',
nodes: [
{
id: 'webhook-1',
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
position: [250, 300],
parameters: {
httpMethod: 'GET',
path: 'test-webhook'
}
}
],
connections: {}
};
export const SIMPLE_HTTP_WORKFLOW: Partial<Workflow> = {
name: '[MCP-TEST] Simple HTTP Request',
nodes: [
{
id: 'webhook-1',
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
position: [250, 300],
parameters: {
httpMethod: 'GET',
path: 'trigger'
}
},
{
id: 'http-1',
name: 'HTTP Request',
type: 'n8n-nodes-base.httpRequest',
typeVersion: 4.2,
position: [450, 300],
parameters: {
url: 'https://httpbin.org/get',
method: 'GET'
}
}
],
connections: {
Webhook: {
main: [[{ node: 'HTTP Request', type: 'main', index: 0 }]]
}
}
};
// Add more fixtures for complex workflows
```
**webhook-workflows.ts** - Webhook workflow setup guide:
```typescript
/**
* Guide for setting up webhook workflows manually in n8n
*
* These workflows must be created manually and activated because
* n8n API doesn't support workflow activation.
*
* For each HTTP method, create a workflow with:
* 1. Single Webhook node
* 2. Configured for the specific HTTP method
* 3. Unique webhook path
* 4. Activated in n8n UI
* 5. Workflow ID added to .env
*/
export const WEBHOOK_WORKFLOW_CONFIGS = {
GET: {
name: '[MCP-TEST] Webhook GET',
description: 'Pre-activated webhook for GET method testing',
nodes: [
{
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
parameters: {
httpMethod: 'GET',
path: 'mcp-test-get',
responseMode: 'lastNode'
}
}
]
},
POST: {
name: '[MCP-TEST] Webhook POST',
description: 'Pre-activated webhook for POST method testing',
nodes: [
{
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
parameters: {
httpMethod: 'POST',
path: 'mcp-test-post',
responseMode: 'lastNode'
}
}
]
},
PUT: {
name: '[MCP-TEST] Webhook PUT',
description: 'Pre-activated webhook for PUT method testing',
nodes: [
{
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
parameters: {
httpMethod: 'PUT',
path: 'mcp-test-put',
responseMode: 'lastNode'
}
}
]
},
DELETE: {
name: '[MCP-TEST] Webhook DELETE',
description: 'Pre-activated webhook for DELETE method testing',
nodes: [
{
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
parameters: {
httpMethod: 'DELETE',
path: 'mcp-test-delete',
responseMode: 'lastNode'
}
}
]
}
};
export function printSetupInstructions(): void {
console.log(`
╔════════════════════════════════════════════════════════════════╗
║ WEBHOOK WORKFLOW SETUP REQUIRED ║
╠════════════════════════════════════════════════════════════════╣
║ ║
║ Integration tests require 4 pre-activated webhook workflows: ║
║ ║
║ 1. Create workflows manually in n8n UI ║
║ 2. Use the configurations shown below ║
║ 3. ACTIVATE each workflow in n8n UI ║
║ 4. Copy workflow IDs to .env file ║
║ ║
╚════════════════════════════════════════════════════════════════╝
Required workflows:
`);
Object.entries(WEBHOOK_WORKFLOW_CONFIGS).forEach(([method, config]) => {
console.log(`
${method} Method:
Name: ${config.name}
Path: ${config.nodes[0].parameters.path}
.env variable: N8N_TEST_WEBHOOK_${method}_ID
`);
});
}
```
---
### Phase 2: Workflow Creation Tests (P0)
**Branch**: `feat/integration-tests-workflow-creation`
**File**: `tests/integration/n8n-api/workflows/create-workflow.test.ts`
**10+ Test Scenarios**:
1. Create workflow with base webhook node (verify P0 bug fix)
2. Create workflow with base HTTP request node
3. Create workflow with langchain agent node
4. Create complex multi-node workflow
5. Create workflow with complex connections
6. Error: Invalid node type
7. Error: Missing required parameters
8. Error: Duplicate node names
9. Error: Invalid connection references
10. Create workflow with custom settings
---
### Phase 3: Workflow Retrieval Tests (P1)
**Branch**: `feat/integration-tests-workflow-retrieval`
**Files**:
- `get-workflow.test.ts` (3 scenarios)
- `get-workflow-details.test.ts` (4 scenarios)
- `get-workflow-structure.test.ts` (2 scenarios)
- `get-workflow-minimal.test.ts` (2 scenarios)
---
### Phase 4: Workflow Update Tests (P1)
**Branch**: `feat/integration-tests-workflow-updates`
**Files**:
- `update-workflow.test.ts` (8+ scenarios)
- `update-partial-workflow.test.ts` (30+ scenarios covering all 15 operations)
---
### Phase 5: Workflow Management Tests (P2)
**Branch**: `feat/integration-tests-workflow-management`
**Files**:
- `delete-workflow.test.ts` (3 scenarios)
- `list-workflows.test.ts` (12+ scenarios with all filters and pagination)
---
### Phase 6: Validation & Autofix Tests (P2)
**Branch**: `feat/integration-tests-validation`
**Files**:
- `validate-workflow.test.ts` (16 scenarios: 4 profiles × 4 validation types)
- `autofix-workflow.test.ts` (20+ scenarios: 5 fix types × confidence levels)
---
### Phase 7: Execution Management Tests (P2)
**Branch**: `feat/integration-tests-executions`
**Files**:
- `trigger-webhook.test.ts` (16+ scenarios: 4 HTTP methods × variations)
- `get-execution.test.ts` (20+ scenarios: 4 modes × filters)
- `list-executions.test.ts` (10+ scenarios)
- `delete-execution.test.ts` (3 scenarios)
**Special Considerations for Webhook Testing**:
- Use pre-activated workflows from `.env`
- Each HTTP method uses a different workflow ID
- Test both successful triggers and error cases
- Verify response data for synchronous executions
---
### Phase 8: System Tools Tests (P3)
**Branch**: `feat/integration-tests-system`
**Files**:
- `health-check.test.ts` (2 scenarios)
- `list-tools.test.ts` (1 scenario)
- `diagnostic.test.ts` (3 scenarios)
---
### Phase 9: CI/CD Integration
**Branch**: `feat/integration-tests-ci`
**GitHub Actions Workflow** (`.github/workflows/integration-tests.yml`):
```yaml
name: Integration Tests
on:
pull_request:
push:
branches: [main]
schedule:
- cron: '0 2 * * *' # Daily at 2 AM
workflow_dispatch:
jobs:
integration-tests:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Setup Node.js
uses: actions/setup-node@v4
with:
node-version: '20'
cache: 'npm'
- name: Install dependencies
run: npm ci
- name: Build project
run: npm run build
- name: Run integration tests
env:
N8N_URL: ${{ secrets.N8N_URL }}
N8N_API_KEY: ${{ secrets.N8N_API_KEY }}
N8N_TEST_WEBHOOK_GET_ID: ${{ secrets.N8N_TEST_WEBHOOK_GET_ID }}
N8N_TEST_WEBHOOK_POST_ID: ${{ secrets.N8N_TEST_WEBHOOK_POST_ID }}
N8N_TEST_WEBHOOK_PUT_ID: ${{ secrets.N8N_TEST_WEBHOOK_PUT_ID }}
N8N_TEST_WEBHOOK_DELETE_ID: ${{ secrets.N8N_TEST_WEBHOOK_DELETE_ID }}
CI: true
run: npm run test:integration
- name: Cleanup orphaned workflows
if: always()
env:
N8N_URL: ${{ secrets.N8N_URL }}
N8N_API_KEY: ${{ secrets.N8N_API_KEY }}
run: npm run test:cleanup:orphans
```
**Add npm scripts to `package.json`**:
```json
{
"scripts": {
"test:integration:n8n": "vitest run tests/integration/n8n-api",
"test:cleanup:orphans": "tsx tests/integration/n8n-api/utils/cleanup-orphans.ts"
}
}
```
---
## Test Isolation Strategy
### Workflow Naming Convention
- Prefix: `[MCP-TEST]`
- Include test name: `[MCP-TEST] Create Workflow - Base Nodes`
- Include timestamp for uniqueness: `[MCP-TEST] Test Name ${Date.now()}`
### Workflow Tagging
- All test workflows tagged with: `mcp-integration-test`
- Enables bulk cleanup queries
### Cleanup Levels
1. **Test-level**: After each test via `afterEach` hook
2. **Suite-level**: After each test file via `afterAll` hook
3. **CI-level**: After CI job completes (always run)
4. **Orphan cleanup**: Periodic job to clean up failed test runs
---
## Pre-Test Setup Checklist
### Local Development
1. ✅ Install n8n locally or use Docker
2. ✅ Start n8n instance: `npx n8n start`
3. ✅ Create 4 webhook workflows (GET, POST, PUT, DELETE)
4. ✅ Activate all 4 webhook workflows in n8n UI
5. ✅ Get workflow IDs from n8n UI
6. ✅ Copy `.env.example` to `.env`
7. ✅ Set `N8N_API_URL=http://localhost:5678`
8. ✅ Generate API key in n8n Settings > API
9. ✅ Set `N8N_API_KEY=<your-key>`
10. ✅ Set all 4 `N8N_TEST_WEBHOOK_*_ID` variables
### CI/GitHub Actions
1. ✅ Set up cloud n8n instance (or self-hosted)
2. ✅ Create 4 webhook workflows (GET, POST, PUT, DELETE)
3. ✅ Activate all 4 webhook workflows
4. ✅ Add GitHub secrets: `N8N_URL`, `N8N_API_KEY`
5. ✅ Add webhook workflow ID secrets (4 total)
---
## Success Criteria
- ✅ All 17 handlers have integration tests
- ✅ All operations/parameters covered (150+ scenarios)
- ✅ Tests run successfully locally and in CI
- ✅ No manual cleanup required (automatic)
- ✅ Test coverage catches P0-level bugs
- ✅ CI runs on every PR and daily
- ✅ Clear error messages when tests fail
- ✅ Documentation for webhook workflow setup
---
## Timeline Estimate
- **Phase 1 (Foundation)**: 2-3 days
- **Phase 2 (Workflow Creation)**: 1 day
- **Phase 3 (Retrieval)**: 1 day
- **Phase 4 (Updates)**: 2-3 days (15 operations)
- **Phase 5 (Management)**: 1 day
- **Phase 6 (Validation)**: 2 days
- **Phase 7 (Executions)**: 2 days
- **Phase 8 (System)**: 1 day
- **Phase 9 (CI/CD)**: 1 day
**Total**: ~14-18 days
---
## Notes
- Each phase should be developed on a separate branch
- Phases can be parallelized where dependencies allow
- Run local tests frequently to catch issues early
- Document any n8n API quirks discovered during testing

View File

@@ -0,0 +1,260 @@
# Integration Tests Phase 1: Foundation - COMPLETED
## Overview
Phase 1 establishes the foundation for n8n API integration testing. All core utilities, fixtures, and infrastructure are now in place.
## Branch
`feat/integration-tests-foundation`
## Completed Tasks
### 1. Environment Configuration
- ✅ Updated `.env.example` with integration testing configuration
- ✅ Added environment variables for:
- n8n API credentials (`N8N_API_URL`, `N8N_API_KEY`)
- Webhook workflow IDs (4 workflows for GET/POST/PUT/DELETE)
- Test configuration (cleanup, tags, naming)
- ✅ Included detailed setup instructions in comments
### 2. Directory Structure
```
tests/integration/n8n-api/
├── workflows/ (empty - for Phase 2+)
├── executions/ (empty - for Phase 2+)
├── system/ (empty - for Phase 2+)
├── scripts/
│ └── cleanup-orphans.ts
└── utils/
├── credentials.ts
├── n8n-client.ts
├── test-context.ts
├── cleanup-helpers.ts
├── fixtures.ts
├── factories.ts
└── webhook-workflows.ts
```
### 3. Core Utilities
#### `credentials.ts` (200 lines)
- Environment-aware credential loading
- Detects CI vs local environment automatically
- Validation functions with helpful error messages
- Non-throwing credential check functions
**Key Functions:**
- `getN8nCredentials()` - Load credentials from .env or GitHub secrets
- `validateCredentials()` - Ensure required credentials are present
- `validateWebhookWorkflows()` - Check webhook workflow IDs with setup instructions
- `hasCredentials()` - Non-throwing credential check
- `hasWebhookWorkflows()` - Non-throwing webhook check
#### `n8n-client.ts` (45 lines)
- Singleton n8n API client wrapper
- Pre-configured with test credentials
- Health check functionality
**Key Functions:**
- `getTestN8nClient()` - Get/create configured API client
- `resetTestN8nClient()` - Reset client instance
- `isN8nApiAccessible()` - Check API connectivity
#### `test-context.ts` (120 lines)
- Resource tracking for automatic cleanup
- Test workflow naming utilities
- Tag management
**Key Functions:**
- `createTestContext()` - Create context for tracking resources
- `TestContext.trackWorkflow()` - Track workflow for cleanup
- `TestContext.trackExecution()` - Track execution for cleanup
- `TestContext.cleanup()` - Delete all tracked resources
- `createTestWorkflowName()` - Generate unique workflow names
- `getTestTag()` - Get configured test tag
#### `cleanup-helpers.ts` (275 lines)
- Multi-level cleanup strategies
- Orphaned resource detection
- Age-based execution cleanup
- Tag-based workflow cleanup
**Key Functions:**
- `cleanupOrphanedWorkflows()` - Find and delete test workflows
- `cleanupOldExecutions()` - Delete executions older than X hours
- `cleanupAllTestResources()` - Comprehensive cleanup
- `cleanupWorkflowsByTag()` - Delete workflows by tag
- `cleanupExecutionsByWorkflow()` - Delete workflow's executions
#### `fixtures.ts` (310 lines)
- Pre-built workflow templates
- All using FULL node type format (n8n-nodes-base.*)
**Available Fixtures:**
- `SIMPLE_WEBHOOK_WORKFLOW` - Single webhook node
- `SIMPLE_HTTP_WORKFLOW` - Webhook + HTTP Request
- `MULTI_NODE_WORKFLOW` - Complex branching workflow
- `ERROR_HANDLING_WORKFLOW` - Error output configuration
- `AI_AGENT_WORKFLOW` - Langchain agent node
- `EXPRESSION_WORKFLOW` - n8n expressions testing
**Helper Functions:**
- `getFixture()` - Get fixture by name (with deep clone)
- `createCustomWorkflow()` - Build custom workflow from nodes
#### `factories.ts` (315 lines)
- Dynamic test data generation
- Node builders with sensible defaults
- Workflow composition helpers
**Node Factories:**
- `createWebhookNode()` - Webhook node with customization
- `createHttpRequestNode()` - HTTP Request node
- `createSetNode()` - Set node with assignments
- `createManualTriggerNode()` - Manual trigger node
**Connection Factories:**
- `createConnection()` - Simple node connection
- `createSequentialWorkflow()` - Auto-connected sequential nodes
- `createParallelWorkflow()` - Trigger with parallel branches
- `createErrorHandlingWorkflow()` - Workflow with error handling
**Utilities:**
- `randomString()` - Generate random test data
- `uniqueId()` - Unique IDs for testing
- `createTestTags()` - Test workflow tags
- `createWorkflowSettings()` - Common settings
#### `webhook-workflows.ts` (215 lines)
- Webhook workflow configuration templates
- Setup instructions generator
- URL generation utilities
**Key Features:**
- `WEBHOOK_WORKFLOW_CONFIGS` - Configurations for all 4 HTTP methods
- `printSetupInstructions()` - Print detailed setup guide
- `generateWebhookWorkflowJson()` - Generate workflow JSON
- `exportAllWebhookWorkflows()` - Export all 4 configs
- `getWebhookUrl()` - Get webhook URL for testing
- `isValidWebhookWorkflow()` - Validate workflow structure
### 4. Scripts
#### `cleanup-orphans.ts` (40 lines)
- Standalone cleanup script
- Can be run manually or in CI
- Comprehensive output logging
**Usage:**
```bash
npm run test:cleanup:orphans
```
### 5. npm Scripts
Added to `package.json`:
```json
{
"test:integration:n8n": "vitest run tests/integration/n8n-api",
"test:cleanup:orphans": "tsx tests/integration/n8n-api/scripts/cleanup-orphans.ts"
}
```
## Code Quality
### TypeScript
- ✅ All code passes `npm run typecheck`
- ✅ All code compiles with `npm run build`
- ✅ No TypeScript errors
- ✅ Proper type annotations throughout
### Error Handling
- ✅ Comprehensive error messages
- ✅ Helpful setup instructions in error messages
- ✅ Non-throwing validation functions where appropriate
- ✅ Graceful handling of missing credentials
### Documentation
- ✅ All functions have JSDoc comments
- ✅ Usage examples in comments
- ✅ Clear parameter descriptions
- ✅ Return type documentation
## Files Created
### Documentation
1. `docs/local/integration-testing-plan.md` (550 lines)
2. `docs/local/integration-tests-phase1-summary.md` (this file)
### Code
1. `.env.example` - Updated with test configuration (32 new lines)
2. `package.json` - Added 2 npm scripts
3. `tests/integration/n8n-api/utils/credentials.ts` (200 lines)
4. `tests/integration/n8n-api/utils/n8n-client.ts` (45 lines)
5. `tests/integration/n8n-api/utils/test-context.ts` (120 lines)
6. `tests/integration/n8n-api/utils/cleanup-helpers.ts` (275 lines)
7. `tests/integration/n8n-api/utils/fixtures.ts` (310 lines)
8. `tests/integration/n8n-api/utils/factories.ts` (315 lines)
9. `tests/integration/n8n-api/utils/webhook-workflows.ts` (215 lines)
10. `tests/integration/n8n-api/scripts/cleanup-orphans.ts` (40 lines)
**Total New Code:** ~1,520 lines of production-ready TypeScript
## Next Steps (Phase 2)
Phase 2 will implement the first actual integration tests:
- Create workflow creation tests (10+ scenarios)
- Test P0 bug fix (SHORT vs FULL node types)
- Test workflow retrieval
- Test workflow deletion
**Branch:** `feat/integration-tests-workflow-creation`
## Prerequisites for Running Tests
Before running integration tests, you need to:
1. **Set up n8n instance:**
- Local: `npx n8n start`
- Or use cloud/self-hosted n8n
2. **Configure credentials in `.env`:**
```bash
N8N_API_URL=http://localhost:5678
N8N_API_KEY=<your-api-key>
```
3. **Create 4 webhook workflows manually:**
- One for each HTTP method (GET, POST, PUT, DELETE)
- Activate each workflow in n8n UI
- Set workflow IDs in `.env`:
```bash
N8N_TEST_WEBHOOK_GET_ID=<workflow-id>
N8N_TEST_WEBHOOK_POST_ID=<workflow-id>
N8N_TEST_WEBHOOK_PUT_ID=<workflow-id>
N8N_TEST_WEBHOOK_DELETE_ID=<workflow-id>
```
See `docs/local/integration-testing-plan.md` for detailed setup instructions.
## Success Metrics
Phase 1 Success Criteria - ALL MET:
- ✅ All utilities implemented and tested
- ✅ TypeScript compiles without errors
- ✅ Code follows project conventions
- ✅ Comprehensive documentation
- ✅ Environment configuration complete
- ✅ Cleanup infrastructure in place
- ✅ Ready for Phase 2 test implementation
## Lessons Learned
1. **N8nApiClient Constructor:** Uses config object, not separate parameters
2. **Cursor Handling:** n8n API returns `null` for no more pages, need to convert to `undefined`
3. **Workflow ID Validation:** Some workflows might have undefined IDs, need null checks
4. **Connection Types:** Error connections need explicit typing to avoid TypeScript errors
5. **Webhook Activation:** Cannot be done via API, must be manual - hence pre-activated workflow requirement
## Time Invested
Phase 1 actual time: ~2 hours (estimated 2-3 days in plan)
- Faster than expected due to clear architecture and reusable patterns

View File

@@ -1,6 +1,6 @@
{
"name": "n8n-mcp",
"version": "2.15.1",
"version": "2.15.3",
"description": "Integration between n8n workflow automation and Model Context Protocol (MCP)",
"main": "dist/index.js",
"bin": {
@@ -31,6 +31,8 @@
"test:watch": "vitest watch",
"test:unit": "vitest run tests/unit",
"test:integration": "vitest run --config vitest.config.integration.ts",
"test:integration:n8n": "vitest run tests/integration/n8n-api",
"test:cleanup:orphans": "tsx tests/integration/n8n-api/scripts/cleanup-orphans.ts",
"test:e2e": "vitest run tests/e2e",
"lint": "tsc --noEmit",
"typecheck": "tsc --noEmit",

View File

@@ -1,6 +1,6 @@
{
"name": "n8n-mcp-runtime",
"version": "2.15.0",
"version": "2.15.1",
"description": "n8n MCP Server Runtime Dependencies Only",
"private": true,
"dependencies": {

View File

@@ -23,7 +23,7 @@ async function testIntegration() {
// Track errors
console.log('Tracking errors...');
telemetry.trackError('ValidationError', 'workflow_validation', 'validate_workflow');
telemetry.trackError('ValidationError', 'workflow_validation', 'validate_workflow', 'Required field missing: nodes array is empty');
// Track a test workflow
console.log('Tracking workflow creation...');

View File

@@ -398,7 +398,8 @@ export class N8NDocumentationMCPServer {
telemetry.trackError(
error instanceof Error ? error.constructor.name : 'UnknownError',
`tool_execution`,
name
name,
errorMessage
);
// Track tool sequence even for errors

View File

@@ -127,7 +127,7 @@ export class TelemetryEventTracker {
/**
* Track an error event
*/
trackError(errorType: string, context: string, toolName?: string): void {
trackError(errorType: string, context: string, toolName?: string, errorMessage?: string): void {
if (!this.isEnabled()) return;
// Don't rate limit error tracking - we want to see all errors
@@ -135,6 +135,7 @@ export class TelemetryEventTracker {
errorType: this.sanitizeErrorType(errorType),
context: this.sanitizeContext(context),
tool: toolName ? toolName.replace(/[^a-zA-Z0-9_-]/g, '_') : undefined,
error: errorMessage ? this.sanitizeErrorMessage(errorMessage) : undefined,
}, false); // Skip rate limiting for errors
}
@@ -428,4 +429,56 @@ export class TelemetryEventTracker {
}
return sanitized;
}
/**
* Sanitize error message
*/
private sanitizeErrorMessage(errorMessage: string): string {
try {
// Early truncate to prevent ReDoS and performance issues
const maxLength = 1500;
const trimmed = errorMessage.length > maxLength
? errorMessage.substring(0, maxLength)
: errorMessage;
// Handle stack traces - keep only first 3 lines (message + top stack frames)
const lines = trimmed.split('\n');
let sanitized = lines.slice(0, 3).join('\n');
// Sanitize sensitive data in correct order to prevent leakage
// 1. URLs first (most encompassing) - fully redact to prevent path leakage
sanitized = sanitized.replace(/https?:\/\/\S+/gi, '[URL]');
// 2. Specific credential patterns (before generic patterns)
sanitized = sanitized
.replace(/AKIA[A-Z0-9]{16}/g, '[AWS_KEY]')
.replace(/ghp_[a-zA-Z0-9]{36,}/g, '[GITHUB_TOKEN]')
.replace(/eyJ[a-zA-Z0-9_-]+\.eyJ[a-zA-Z0-9_-]+\.[a-zA-Z0-9_-]+/g, '[JWT]')
.replace(/Bearer\s+[^\s]+/gi, 'Bearer [TOKEN]');
// 3. Emails (after URLs to avoid partial matches)
sanitized = sanitized.replace(/[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}/g, '[EMAIL]');
// 4. Long keys and quoted tokens
sanitized = sanitized
.replace(/\b[a-zA-Z0-9_-]{32,}\b/g, '[KEY]')
.replace(/(['"])[a-zA-Z0-9_-]{16,}\1/g, '$1[TOKEN]$1');
// 5. Generic credential patterns (after specific ones to avoid conflicts)
sanitized = sanitized
.replace(/password\s*[=:]\s*\S+/gi, 'password=[REDACTED]')
.replace(/api[_-]?key\s*[=:]\s*\S+/gi, 'api_key=[REDACTED]')
.replace(/(?<!Bearer\s)token\s*[=:]\s*\S+/gi, 'token=[REDACTED]'); // Negative lookbehind to avoid Bearer tokens
// Final truncate to 500 chars
if (sanitized.length > 500) {
sanitized = sanitized.substring(0, 500) + '...';
}
return sanitized;
} catch (error) {
logger.debug('Error message sanitization failed:', error);
return '[SANITIZATION_FAILED]';
}
}
}

View File

@@ -152,9 +152,9 @@ export class TelemetryManager {
/**
* Track an error event
*/
trackError(errorType: string, context: string, toolName?: string): void {
trackError(errorType: string, context: string, toolName?: string, errorMessage?: string): void {
this.ensureInitialized();
this.eventTracker.trackError(errorType, context, toolName);
this.eventTracker.trackError(errorType, context, toolName, errorMessage);
}
/**

View File

@@ -625,7 +625,65 @@ export class TemplateRepository {
return { total, withMetadata, withoutMetadata, outdated };
}
/**
* Build WHERE conditions for metadata filtering
* @private
* @returns Object containing SQL conditions array and parameter values array
*/
private buildMetadataFilterConditions(filters: {
category?: string;
complexity?: 'simple' | 'medium' | 'complex';
maxSetupMinutes?: number;
minSetupMinutes?: number;
requiredService?: string;
targetAudience?: string;
}): { conditions: string[], params: any[] } {
const conditions: string[] = ['metadata_json IS NOT NULL'];
const params: any[] = [];
if (filters.category !== undefined) {
// Use parameterized LIKE with JSON array search - safe from injection
conditions.push("json_extract(metadata_json, '$.categories') LIKE '%' || ? || '%'");
// Escape special characters and quotes for JSON string matching
const sanitizedCategory = JSON.stringify(filters.category).slice(1, -1);
params.push(sanitizedCategory);
}
if (filters.complexity) {
conditions.push("json_extract(metadata_json, '$.complexity') = ?");
params.push(filters.complexity);
}
if (filters.maxSetupMinutes !== undefined) {
conditions.push("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) <= ?");
params.push(filters.maxSetupMinutes);
}
if (filters.minSetupMinutes !== undefined) {
conditions.push("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) >= ?");
params.push(filters.minSetupMinutes);
}
if (filters.requiredService !== undefined) {
// Use parameterized LIKE with JSON array search - safe from injection
conditions.push("json_extract(metadata_json, '$.required_services') LIKE '%' || ? || '%'");
// Escape special characters and quotes for JSON string matching
const sanitizedService = JSON.stringify(filters.requiredService).slice(1, -1);
params.push(sanitizedService);
}
if (filters.targetAudience !== undefined) {
// Use parameterized LIKE with JSON array search - safe from injection
conditions.push("json_extract(metadata_json, '$.target_audience') LIKE '%' || ? || '%'");
// Escape special characters and quotes for JSON string matching
const sanitizedAudience = JSON.stringify(filters.targetAudience).slice(1, -1);
params.push(sanitizedAudience);
}
return { conditions, params };
}
/**
* Search templates by metadata fields
*/
@@ -637,60 +695,72 @@ export class TemplateRepository {
requiredService?: string;
targetAudience?: string;
}, limit: number = 20, offset: number = 0): StoredTemplate[] {
const conditions: string[] = ['metadata_json IS NOT NULL'];
const params: any[] = [];
// Build WHERE conditions based on filters with proper parameterization
if (filters.category !== undefined) {
// Use parameterized LIKE with JSON array search - safe from injection
conditions.push("json_extract(metadata_json, '$.categories') LIKE '%' || ? || '%'");
// Escape special characters and quotes for JSON string matching
const sanitizedCategory = JSON.stringify(filters.category).slice(1, -1);
params.push(sanitizedCategory);
}
if (filters.complexity) {
conditions.push("json_extract(metadata_json, '$.complexity') = ?");
params.push(filters.complexity);
}
if (filters.maxSetupMinutes !== undefined) {
conditions.push("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) <= ?");
params.push(filters.maxSetupMinutes);
}
if (filters.minSetupMinutes !== undefined) {
conditions.push("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) >= ?");
params.push(filters.minSetupMinutes);
}
if (filters.requiredService !== undefined) {
// Use parameterized LIKE with JSON array search - safe from injection
conditions.push("json_extract(metadata_json, '$.required_services') LIKE '%' || ? || '%'");
// Escape special characters and quotes for JSON string matching
const sanitizedService = JSON.stringify(filters.requiredService).slice(1, -1);
params.push(sanitizedService);
}
if (filters.targetAudience !== undefined) {
// Use parameterized LIKE with JSON array search - safe from injection
conditions.push("json_extract(metadata_json, '$.target_audience') LIKE '%' || ? || '%'");
// Escape special characters and quotes for JSON string matching
const sanitizedAudience = JSON.stringify(filters.targetAudience).slice(1, -1);
params.push(sanitizedAudience);
}
const query = `
SELECT * FROM templates
const startTime = Date.now();
// Build WHERE conditions using shared helper
const { conditions, params } = this.buildMetadataFilterConditions(filters);
// Performance optimization: Use two-phase query to avoid loading large compressed workflows
// during metadata filtering. This prevents timeout when no filters are provided.
// Phase 1: Get IDs only with metadata filtering (fast - no workflow data)
// Add id to ORDER BY to ensure stable ordering
const idsQuery = `
SELECT id FROM templates
WHERE ${conditions.join(' AND ')}
ORDER BY views DESC, created_at DESC
ORDER BY views DESC, created_at DESC, id ASC
LIMIT ? OFFSET ?
`;
params.push(limit, offset);
const results = this.db.prepare(query).all(...params) as StoredTemplate[];
logger.debug(`Metadata search found ${results.length} results`, { filters, count: results.length });
const ids = this.db.prepare(idsQuery).all(...params) as { id: number }[];
const phase1Time = Date.now() - startTime;
if (ids.length === 0) {
logger.debug('Metadata search found 0 results', { filters, phase1Ms: phase1Time });
return [];
}
// Defensive validation: ensure all IDs are valid positive integers
const idValues = ids.map(r => r.id).filter(id => typeof id === 'number' && id > 0 && Number.isInteger(id));
if (idValues.length === 0) {
logger.warn('No valid IDs after filtering', { filters, originalCount: ids.length });
return [];
}
if (idValues.length !== ids.length) {
logger.warn('Some IDs were filtered out as invalid', {
original: ids.length,
valid: idValues.length,
filtered: ids.length - idValues.length
});
}
// Phase 2: Fetch full records preserving exact order from Phase 1
// Use CTE with VALUES to maintain ordering without depending on SQLite's IN clause behavior
const phase2Start = Date.now();
const orderedQuery = `
WITH ordered_ids(id, sort_order) AS (
VALUES ${idValues.map((id, idx) => `(${id}, ${idx})`).join(', ')}
)
SELECT t.* FROM templates t
INNER JOIN ordered_ids o ON t.id = o.id
ORDER BY o.sort_order
`;
const results = this.db.prepare(orderedQuery).all() as StoredTemplate[];
const phase2Time = Date.now() - phase2Start;
logger.debug(`Metadata search found ${results.length} results`, {
filters,
count: results.length,
phase1Ms: phase1Time,
phase2Ms: phase2Time,
totalMs: Date.now() - startTime,
optimization: 'two-phase-with-ordering'
});
return results.map(t => this.decompressWorkflow(t));
}
@@ -705,48 +775,12 @@ export class TemplateRepository {
requiredService?: string;
targetAudience?: string;
}): number {
const conditions: string[] = ['metadata_json IS NOT NULL'];
const params: any[] = [];
if (filters.category !== undefined) {
// Use parameterized LIKE with JSON array search - safe from injection
conditions.push("json_extract(metadata_json, '$.categories') LIKE '%' || ? || '%'");
const sanitizedCategory = JSON.stringify(filters.category).slice(1, -1);
params.push(sanitizedCategory);
}
if (filters.complexity) {
conditions.push("json_extract(metadata_json, '$.complexity') = ?");
params.push(filters.complexity);
}
if (filters.maxSetupMinutes !== undefined) {
conditions.push("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) <= ?");
params.push(filters.maxSetupMinutes);
}
if (filters.minSetupMinutes !== undefined) {
conditions.push("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) >= ?");
params.push(filters.minSetupMinutes);
}
if (filters.requiredService !== undefined) {
// Use parameterized LIKE with JSON array search - safe from injection
conditions.push("json_extract(metadata_json, '$.required_services') LIKE '%' || ? || '%'");
const sanitizedService = JSON.stringify(filters.requiredService).slice(1, -1);
params.push(sanitizedService);
}
if (filters.targetAudience !== undefined) {
// Use parameterized LIKE with JSON array search - safe from injection
conditions.push("json_extract(metadata_json, '$.target_audience') LIKE '%' || ? || '%'");
const sanitizedAudience = JSON.stringify(filters.targetAudience).slice(1, -1);
params.push(sanitizedAudience);
}
// Build WHERE conditions using shared helper
const { conditions, params } = this.buildMetadataFilterConditions(filters);
const query = `SELECT COUNT(*) as count FROM templates WHERE ${conditions.join(' AND ')}`;
const result = this.db.prepare(query).get(...params) as { count: number };
return result.count;
}

View File

@@ -643,6 +643,207 @@ describe('TemplateRepository Integration Tests', () => {
});
});
});
describe('searchTemplatesByMetadata - Two-Phase Optimization', () => {
it('should use two-phase query pattern for performance', () => {
// Setup: Create templates with metadata and different views for deterministic ordering
const templates = [
{ id: 1, complexity: 'simple', category: 'automation', views: 200 },
{ id: 2, complexity: 'medium', category: 'integration', views: 300 },
{ id: 3, complexity: 'simple', category: 'automation', views: 100 },
{ id: 4, complexity: 'complex', category: 'data-processing', views: 400 }
];
templates.forEach(({ id, complexity, category, views }) => {
const template = createTemplateWorkflow({ id, name: `Template ${id}`, totalViews: views });
const detail = createTemplateDetail({
id,
views,
workflow: {
id: id.toString(),
name: `Template ${id}`,
nodes: [],
connections: {},
settings: {}
}
});
repository.saveTemplate(template, detail);
// Update views to match our test data
db.prepare(`UPDATE templates SET views = ? WHERE workflow_id = ?`).run(views, id);
// Add metadata
const metadata = {
categories: [category],
complexity,
use_cases: ['test'],
estimated_setup_minutes: 15,
required_services: [],
key_features: ['test'],
target_audience: ['developers']
};
db.prepare(`
UPDATE templates
SET metadata_json = ?,
metadata_generated_at = datetime('now')
WHERE workflow_id = ?
`).run(JSON.stringify(metadata), id);
});
// Test: Search with filter should return matching templates
const results = repository.searchTemplatesByMetadata({ complexity: 'simple' }, 10, 0);
// Verify results - Ordered by views DESC (200, 100), then created_at DESC, then id ASC
expect(results).toHaveLength(2);
expect(results[0].workflow_id).toBe(1); // 200 views
expect(results[1].workflow_id).toBe(3); // 100 views
});
it('should preserve exact ordering from Phase 1', () => {
// Setup: Create templates with different view counts
// Use unique views to ensure deterministic ordering
const templates = [
{ id: 1, views: 100 },
{ id: 2, views: 500 },
{ id: 3, views: 300 },
{ id: 4, views: 400 },
{ id: 5, views: 200 }
];
templates.forEach(({ id, views }) => {
const template = createTemplateWorkflow({ id, name: `Template ${id}`, totalViews: views });
const detail = createTemplateDetail({
id,
views,
workflow: {
id: id.toString(),
name: `Template ${id}`,
nodes: [],
connections: {},
settings: {}
}
});
repository.saveTemplate(template, detail);
// Update views in database to match our test data
db.prepare(`UPDATE templates SET views = ? WHERE workflow_id = ?`).run(views, id);
// Add metadata
const metadata = {
categories: ['test'],
complexity: 'medium',
use_cases: ['test'],
estimated_setup_minutes: 15,
required_services: [],
key_features: ['test'],
target_audience: ['developers']
};
db.prepare(`
UPDATE templates
SET metadata_json = ?,
metadata_generated_at = datetime('now')
WHERE workflow_id = ?
`).run(JSON.stringify(metadata), id);
});
// Test: Search should return templates in correct order
const results = repository.searchTemplatesByMetadata({ complexity: 'medium' }, 10, 0);
// Verify ordering: 500 views, 400 views, 300 views, 200 views, 100 views
expect(results).toHaveLength(5);
expect(results[0].workflow_id).toBe(2); // 500 views
expect(results[1].workflow_id).toBe(4); // 400 views
expect(results[2].workflow_id).toBe(3); // 300 views
expect(results[3].workflow_id).toBe(5); // 200 views
expect(results[4].workflow_id).toBe(1); // 100 views
});
it('should handle empty results efficiently', () => {
// Setup: Create templates without the searched complexity
const template = createTemplateWorkflow({ id: 1 });
const detail = createTemplateDetail({
id: 1,
workflow: {
id: '1',
name: 'Template 1',
nodes: [],
connections: {},
settings: {}
}
});
repository.saveTemplate(template, detail);
const metadata = {
categories: ['test'],
complexity: 'simple',
use_cases: ['test'],
estimated_setup_minutes: 15,
required_services: [],
key_features: ['test'],
target_audience: ['developers']
};
db.prepare(`
UPDATE templates
SET metadata_json = ?,
metadata_generated_at = datetime('now')
WHERE workflow_id = 1
`).run(JSON.stringify(metadata));
// Test: Search for non-existent complexity
const results = repository.searchTemplatesByMetadata({ complexity: 'complex' }, 10, 0);
// Verify: Should return empty array without errors
expect(results).toHaveLength(0);
});
it('should validate IDs defensively', () => {
// This test ensures the defensive ID validation works
// Setup: Create a template
const template = createTemplateWorkflow({ id: 1 });
const detail = createTemplateDetail({
id: 1,
workflow: {
id: '1',
name: 'Template 1',
nodes: [],
connections: {},
settings: {}
}
});
repository.saveTemplate(template, detail);
const metadata = {
categories: ['test'],
complexity: 'simple',
use_cases: ['test'],
estimated_setup_minutes: 15,
required_services: [],
key_features: ['test'],
target_audience: ['developers']
};
db.prepare(`
UPDATE templates
SET metadata_json = ?,
metadata_generated_at = datetime('now')
WHERE workflow_id = 1
`).run(JSON.stringify(metadata));
// Test: Normal search should work
const results = repository.searchTemplatesByMetadata({ complexity: 'simple' }, 10, 0);
// Verify: Should return the template
expect(results).toHaveLength(1);
expect(results[0].workflow_id).toBe(1);
});
});
});
// Helper functions

View File

@@ -0,0 +1,43 @@
#!/usr/bin/env tsx
/**
* Cleanup Orphaned Test Resources
*
* Standalone script to clean up orphaned workflows and executions
* from failed test runs. Run this periodically in CI or manually
* to maintain a clean test environment.
*
* Usage:
* npm run test:cleanup:orphans
* tsx tests/integration/n8n-api/scripts/cleanup-orphans.ts
*/
import { cleanupAllTestResources } from '../utils/cleanup-helpers';
import { getN8nCredentials, validateCredentials } from '../utils/credentials';
async function main() {
console.log('Starting cleanup of orphaned test resources...\n');
try {
// Validate credentials
const creds = getN8nCredentials();
validateCredentials(creds);
console.log(`n8n Instance: ${creds.url}`);
console.log(`Cleanup Tag: ${creds.cleanup.tag}`);
console.log(`Cleanup Prefix: ${creds.cleanup.namePrefix}\n`);
// Run cleanup
const result = await cleanupAllTestResources();
console.log('\n✅ Cleanup complete!');
console.log(` Workflows deleted: ${result.workflows}`);
console.log(` Executions deleted: ${result.executions}`);
process.exit(0);
} catch (error) {
console.error('\n❌ Cleanup failed:', error);
process.exit(1);
}
}
main();

View File

@@ -0,0 +1,299 @@
/**
* Cleanup Helpers for Integration Tests
*
* Provides multi-level cleanup strategies for test resources:
* - Orphaned workflows (from failed test runs)
* - Old executions (older than 24 hours)
* - Bulk cleanup by tag or name prefix
*/
import { getTestN8nClient } from './n8n-client';
import { getN8nCredentials } from './credentials';
import { Logger } from '../../../../src/utils/logger';
const logger = new Logger({ prefix: '[Cleanup]' });
/**
* Clean up orphaned test workflows
*
* Finds and deletes all workflows tagged with the test tag or
* prefixed with the test name prefix. Run this periodically in CI
* to clean up failed test runs.
*
* @returns Array of deleted workflow IDs
*/
export async function cleanupOrphanedWorkflows(): Promise<string[]> {
const creds = getN8nCredentials();
const client = getTestN8nClient();
const deleted: string[] = [];
logger.info('Searching for orphaned test workflows...');
let allWorkflows: any[] = [];
let cursor: string | undefined;
let pageCount = 0;
const MAX_PAGES = 1000; // Safety limit to prevent infinite loops
// Fetch all workflows with pagination
try {
do {
pageCount++;
if (pageCount > MAX_PAGES) {
logger.error(`Exceeded maximum pages (${MAX_PAGES}). Possible infinite loop or API issue.`);
throw new Error('Pagination safety limit exceeded while fetching workflows');
}
logger.debug(`Fetching workflows page ${pageCount}...`);
const response = await client.listWorkflows({
cursor,
limit: 100,
excludePinnedData: true
});
allWorkflows.push(...response.data);
cursor = response.nextCursor || undefined;
} while (cursor);
logger.info(`Found ${allWorkflows.length} total workflows across ${pageCount} page(s)`);
} catch (error) {
logger.error('Failed to fetch workflows:', error);
throw error;
}
// Find test workflows
const testWorkflows = allWorkflows.filter(w =>
w.tags?.includes(creds.cleanup.tag) ||
w.name?.startsWith(creds.cleanup.namePrefix)
);
logger.info(`Found ${testWorkflows.length} orphaned test workflow(s)`);
if (testWorkflows.length === 0) {
return deleted;
}
// Delete them
for (const workflow of testWorkflows) {
try {
await client.deleteWorkflow(workflow.id);
deleted.push(workflow.id);
logger.debug(`Deleted orphaned workflow: ${workflow.name} (${workflow.id})`);
} catch (error) {
logger.warn(`Failed to delete workflow ${workflow.id}:`, error);
}
}
logger.info(`Successfully deleted ${deleted.length} orphaned workflow(s)`);
return deleted;
}
/**
* Clean up old executions
*
* Deletes executions older than the specified age.
*
* @param maxAgeMs - Maximum age in milliseconds (default: 24 hours)
* @returns Array of deleted execution IDs
*/
export async function cleanupOldExecutions(
maxAgeMs: number = 24 * 60 * 60 * 1000
): Promise<string[]> {
const client = getTestN8nClient();
const deleted: string[] = [];
logger.info(`Searching for executions older than ${maxAgeMs}ms...`);
let allExecutions: any[] = [];
let cursor: string | undefined;
let pageCount = 0;
const MAX_PAGES = 1000; // Safety limit to prevent infinite loops
// Fetch all executions
try {
do {
pageCount++;
if (pageCount > MAX_PAGES) {
logger.error(`Exceeded maximum pages (${MAX_PAGES}). Possible infinite loop or API issue.`);
throw new Error('Pagination safety limit exceeded while fetching executions');
}
logger.debug(`Fetching executions page ${pageCount}...`);
const response = await client.listExecutions({
cursor,
limit: 100,
includeData: false
});
allExecutions.push(...response.data);
cursor = response.nextCursor || undefined;
} while (cursor);
logger.info(`Found ${allExecutions.length} total executions across ${pageCount} page(s)`);
} catch (error) {
logger.error('Failed to fetch executions:', error);
throw error;
}
const cutoffTime = Date.now() - maxAgeMs;
const oldExecutions = allExecutions.filter(e => {
const executionTime = new Date(e.startedAt).getTime();
return executionTime < cutoffTime;
});
logger.info(`Found ${oldExecutions.length} old execution(s)`);
if (oldExecutions.length === 0) {
return deleted;
}
for (const execution of oldExecutions) {
try {
await client.deleteExecution(execution.id);
deleted.push(execution.id);
logger.debug(`Deleted old execution: ${execution.id}`);
} catch (error) {
logger.warn(`Failed to delete execution ${execution.id}:`, error);
}
}
logger.info(`Successfully deleted ${deleted.length} old execution(s)`);
return deleted;
}
/**
* Clean up all test resources
*
* Combines cleanupOrphanedWorkflows and cleanupOldExecutions.
* Use this as a comprehensive cleanup in CI.
*
* @returns Object with counts of deleted resources
*/
export async function cleanupAllTestResources(): Promise<{
workflows: number;
executions: number;
}> {
logger.info('Starting comprehensive test resource cleanup...');
const [workflowIds, executionIds] = await Promise.all([
cleanupOrphanedWorkflows(),
cleanupOldExecutions()
]);
logger.info(
`Cleanup complete: ${workflowIds.length} workflows, ${executionIds.length} executions`
);
return {
workflows: workflowIds.length,
executions: executionIds.length
};
}
/**
* Delete workflows by tag
*
* Deletes all workflows with the specified tag.
*
* @param tag - Tag to match
* @returns Array of deleted workflow IDs
*/
export async function cleanupWorkflowsByTag(tag: string): Promise<string[]> {
const client = getTestN8nClient();
const deleted: string[] = [];
logger.info(`Searching for workflows with tag: ${tag}`);
try {
const response = await client.listWorkflows({
tags: tag ? [tag] : undefined,
limit: 100,
excludePinnedData: true
});
const workflows = response.data;
logger.info(`Found ${workflows.length} workflow(s) with tag: ${tag}`);
for (const workflow of workflows) {
if (!workflow.id) continue;
try {
await client.deleteWorkflow(workflow.id);
deleted.push(workflow.id);
logger.debug(`Deleted workflow: ${workflow.name} (${workflow.id})`);
} catch (error) {
logger.warn(`Failed to delete workflow ${workflow.id}:`, error);
}
}
logger.info(`Successfully deleted ${deleted.length} workflow(s)`);
return deleted;
} catch (error) {
logger.error(`Failed to cleanup workflows by tag: ${tag}`, error);
throw error;
}
}
/**
* Delete executions for a specific workflow
*
* @param workflowId - Workflow ID
* @returns Array of deleted execution IDs
*/
export async function cleanupExecutionsByWorkflow(
workflowId: string
): Promise<string[]> {
const client = getTestN8nClient();
const deleted: string[] = [];
logger.info(`Searching for executions of workflow: ${workflowId}`);
let cursor: string | undefined;
let totalCount = 0;
let pageCount = 0;
const MAX_PAGES = 1000; // Safety limit to prevent infinite loops
try {
do {
pageCount++;
if (pageCount > MAX_PAGES) {
logger.error(`Exceeded maximum pages (${MAX_PAGES}). Possible infinite loop or API issue.`);
throw new Error(`Pagination safety limit exceeded while fetching executions for workflow ${workflowId}`);
}
const response = await client.listExecutions({
workflowId,
cursor,
limit: 100,
includeData: false
});
const executions = response.data;
totalCount += executions.length;
for (const execution of executions) {
try {
await client.deleteExecution(execution.id);
deleted.push(execution.id);
logger.debug(`Deleted execution: ${execution.id}`);
} catch (error) {
logger.warn(`Failed to delete execution ${execution.id}:`, error);
}
}
cursor = response.nextCursor || undefined;
} while (cursor);
logger.info(
`Successfully deleted ${deleted.length}/${totalCount} execution(s) for workflow ${workflowId}`
);
return deleted;
} catch (error) {
logger.error(`Failed to cleanup executions for workflow: ${workflowId}`, error);
throw error;
}
}

View File

@@ -0,0 +1,194 @@
/**
* Integration Test Credentials Management
*
* Provides environment-aware credential loading for integration tests.
* - Local development: Reads from .env file
* - CI/GitHub Actions: Uses GitHub secrets from process.env
*/
import dotenv from 'dotenv';
import path from 'path';
// Load .env file for local development
dotenv.config({ path: path.resolve(process.cwd(), '.env') });
export interface N8nTestCredentials {
url: string;
apiKey: string;
webhookWorkflows: {
get: string;
post: string;
put: string;
delete: string;
};
cleanup: {
enabled: boolean;
tag: string;
namePrefix: string;
};
}
/**
* Get n8n credentials for integration tests
*
* Automatically detects environment (local vs CI) and loads
* credentials from the appropriate source.
*
* @returns N8nTestCredentials
* @throws Error if required credentials are missing
*/
export function getN8nCredentials(): N8nTestCredentials {
if (process.env.CI) {
// CI: Use GitHub secrets - validate required variables first
const url = process.env.N8N_URL;
const apiKey = process.env.N8N_API_KEY;
if (!url || !apiKey) {
throw new Error(
'Missing required CI credentials:\n' +
` N8N_URL: ${url ? 'set' : 'MISSING'}\n` +
` N8N_API_KEY: ${apiKey ? 'set' : 'MISSING'}\n` +
'Please configure GitHub secrets for integration tests.'
);
}
return {
url,
apiKey,
webhookWorkflows: {
get: process.env.N8N_TEST_WEBHOOK_GET_ID || '',
post: process.env.N8N_TEST_WEBHOOK_POST_ID || '',
put: process.env.N8N_TEST_WEBHOOK_PUT_ID || '',
delete: process.env.N8N_TEST_WEBHOOK_DELETE_ID || ''
},
cleanup: {
enabled: true,
tag: 'mcp-integration-test',
namePrefix: '[MCP-TEST]'
}
};
} else {
// Local: Use .env file - validate required variables first
const url = process.env.N8N_API_URL;
const apiKey = process.env.N8N_API_KEY;
if (!url || !apiKey) {
throw new Error(
'Missing required credentials in .env:\n' +
` N8N_API_URL: ${url ? 'set' : 'MISSING'}\n` +
` N8N_API_KEY: ${apiKey ? 'set' : 'MISSING'}\n\n` +
'Please add these to your .env file.\n' +
'See .env.example for configuration details.'
);
}
return {
url,
apiKey,
webhookWorkflows: {
get: process.env.N8N_TEST_WEBHOOK_GET_ID || '',
post: process.env.N8N_TEST_WEBHOOK_POST_ID || '',
put: process.env.N8N_TEST_WEBHOOK_PUT_ID || '',
delete: process.env.N8N_TEST_WEBHOOK_DELETE_ID || ''
},
cleanup: {
enabled: process.env.N8N_TEST_CLEANUP_ENABLED !== 'false',
tag: process.env.N8N_TEST_TAG || 'mcp-integration-test',
namePrefix: process.env.N8N_TEST_NAME_PREFIX || '[MCP-TEST]'
}
};
}
}
/**
* Validate that required credentials are present
*
* @param creds - Credentials to validate
* @throws Error if required credentials are missing
*/
export function validateCredentials(creds: N8nTestCredentials): void {
const missing: string[] = [];
if (!creds.url) {
missing.push(process.env.CI ? 'N8N_URL' : 'N8N_API_URL');
}
if (!creds.apiKey) {
missing.push('N8N_API_KEY');
}
if (missing.length > 0) {
throw new Error(
`Missing required n8n credentials: ${missing.join(', ')}\n\n` +
`Please set the following environment variables:\n` +
missing.map(v => ` ${v}`).join('\n') + '\n\n' +
`See .env.example for configuration details.`
);
}
}
/**
* Validate that webhook workflow IDs are configured
*
* @param creds - Credentials to validate
* @throws Error with setup instructions if webhook workflows are missing
*/
export function validateWebhookWorkflows(creds: N8nTestCredentials): void {
const missing: string[] = [];
if (!creds.webhookWorkflows.get) missing.push('GET');
if (!creds.webhookWorkflows.post) missing.push('POST');
if (!creds.webhookWorkflows.put) missing.push('PUT');
if (!creds.webhookWorkflows.delete) missing.push('DELETE');
if (missing.length > 0) {
const envVars = missing.map(m => `N8N_TEST_WEBHOOK_${m}_ID`);
throw new Error(
`Missing webhook workflow IDs for HTTP methods: ${missing.join(', ')}\n\n` +
`Webhook testing requires pre-activated workflows in n8n.\n` +
`n8n API doesn't support workflow activation, so these must be created manually.\n\n` +
`Setup Instructions:\n` +
`1. Create ${missing.length} workflow(s) in your n8n instance\n` +
`2. Each workflow should have a single Webhook node\n` +
`3. Configure webhook paths:\n` +
missing.map(m => ` - ${m}: mcp-test-${m.toLowerCase()}`).join('\n') + '\n' +
`4. ACTIVATE each workflow in n8n UI\n` +
`5. Set the following environment variables with workflow IDs:\n` +
envVars.map(v => ` ${v}=<workflow-id>`).join('\n') + '\n\n' +
`See docs/local/integration-testing-plan.md for detailed instructions.`
);
}
}
/**
* Check if credentials are configured (non-throwing version)
*
* @returns true if basic credentials are available
*/
export function hasCredentials(): boolean {
try {
const creds = getN8nCredentials();
return !!(creds.url && creds.apiKey);
} catch {
return false;
}
}
/**
* Check if webhook workflows are configured (non-throwing version)
*
* @returns true if all webhook workflow IDs are available
*/
export function hasWebhookWorkflows(): boolean {
try {
const creds = getN8nCredentials();
return !!(
creds.webhookWorkflows.get &&
creds.webhookWorkflows.post &&
creds.webhookWorkflows.put &&
creds.webhookWorkflows.delete
);
} catch {
return false;
}
}

View File

@@ -0,0 +1,326 @@
/**
* Test Data Factories
*
* Provides factory functions for generating test data dynamically.
* Useful for creating variations of workflows, nodes, and parameters.
*/
import { Workflow, WorkflowNode } from '../../../../src/types/n8n-api';
import { createTestWorkflowName } from './test-context';
/**
* Create a webhook node with custom parameters
*
* @param options - Node options
* @returns WorkflowNode
*/
export function createWebhookNode(options: {
id?: string;
name?: string;
httpMethod?: 'GET' | 'POST' | 'PUT' | 'DELETE' | 'PATCH';
path?: string;
position?: [number, number];
responseMode?: 'onReceived' | 'lastNode';
}): WorkflowNode {
return {
id: options.id || `webhook-${Date.now()}`,
name: options.name || 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
position: options.position || [250, 300],
parameters: {
httpMethod: options.httpMethod || 'GET',
path: options.path || `test-${Date.now()}`,
responseMode: options.responseMode || 'lastNode'
}
};
}
/**
* Create an HTTP Request node with custom parameters
*
* @param options - Node options
* @returns WorkflowNode
*/
export function createHttpRequestNode(options: {
id?: string;
name?: string;
url?: string;
method?: 'GET' | 'POST' | 'PUT' | 'DELETE' | 'PATCH';
position?: [number, number];
authentication?: string;
}): WorkflowNode {
return {
id: options.id || `http-${Date.now()}`,
name: options.name || 'HTTP Request',
type: 'n8n-nodes-base.httpRequest',
typeVersion: 4.2,
position: options.position || [450, 300],
parameters: {
url: options.url || 'https://httpbin.org/get',
method: options.method || 'GET',
authentication: options.authentication || 'none'
}
};
}
/**
* Create a Set node with custom assignments
*
* @param options - Node options
* @returns WorkflowNode
*/
export function createSetNode(options: {
id?: string;
name?: string;
position?: [number, number];
assignments?: Array<{
name: string;
value: any;
type?: 'string' | 'number' | 'boolean' | 'object' | 'array';
}>;
}): WorkflowNode {
const assignments = options.assignments || [
{ name: 'key', value: 'value', type: 'string' as const }
];
return {
id: options.id || `set-${Date.now()}`,
name: options.name || 'Set',
type: 'n8n-nodes-base.set',
typeVersion: 3.4,
position: options.position || [450, 300],
parameters: {
assignments: {
assignments: assignments.map((a, idx) => ({
id: `assign-${idx}`,
name: a.name,
value: a.value,
type: a.type || 'string'
}))
},
options: {}
}
};
}
/**
* Create a Manual Trigger node
*
* @param options - Node options
* @returns WorkflowNode
*/
export function createManualTriggerNode(options: {
id?: string;
name?: string;
position?: [number, number];
} = {}): WorkflowNode {
return {
id: options.id || `manual-${Date.now()}`,
name: options.name || 'When clicking "Test workflow"',
type: 'n8n-nodes-base.manualTrigger',
typeVersion: 1,
position: options.position || [250, 300],
parameters: {}
};
}
/**
* Create a simple connection between two nodes
*
* @param from - Source node name
* @param to - Target node name
* @param options - Connection options
* @returns Connection object
*/
export function createConnection(
from: string,
to: string,
options: {
sourceOutput?: string;
targetInput?: string;
sourceIndex?: number;
targetIndex?: number;
} = {}
): Record<string, any> {
const sourceOutput = options.sourceOutput || 'main';
const targetInput = options.targetInput || 'main';
const sourceIndex = options.sourceIndex || 0;
const targetIndex = options.targetIndex || 0;
return {
[from]: {
[sourceOutput]: [
[
{
node: to,
type: targetInput,
index: targetIndex
}
]
]
}
};
}
/**
* Create a workflow from nodes with automatic connections
*
* Connects nodes in sequence: node1 -> node2 -> node3, etc.
*
* @param name - Workflow name
* @param nodes - Array of nodes
* @returns Partial workflow
*/
export function createSequentialWorkflow(
name: string,
nodes: WorkflowNode[]
): Partial<Workflow> {
const connections: Record<string, any> = {};
// Create connections between sequential nodes
for (let i = 0; i < nodes.length - 1; i++) {
const currentNode = nodes[i];
const nextNode = nodes[i + 1];
connections[currentNode.name] = {
main: [[{ node: nextNode.name, type: 'main', index: 0 }]]
};
}
return {
name: createTestWorkflowName(name),
nodes,
connections,
settings: {
executionOrder: 'v1'
}
};
}
/**
* Create a workflow with parallel branches
*
* Creates a workflow with one trigger node that splits into multiple
* parallel execution paths.
*
* @param name - Workflow name
* @param trigger - Trigger node
* @param branches - Array of branch nodes
* @returns Partial workflow
*/
export function createParallelWorkflow(
name: string,
trigger: WorkflowNode,
branches: WorkflowNode[]
): Partial<Workflow> {
const connections: Record<string, any> = {
[trigger.name]: {
main: [branches.map(node => ({ node: node.name, type: 'main', index: 0 }))]
}
};
return {
name: createTestWorkflowName(name),
nodes: [trigger, ...branches],
connections,
settings: {
executionOrder: 'v1'
}
};
}
/**
* Generate a random string for test data
*
* @param length - String length (default: 8)
* @returns Random string
*/
export function randomString(length: number = 8): string {
const chars = 'abcdefghijklmnopqrstuvwxyz0123456789';
let result = '';
for (let i = 0; i < length; i++) {
result += chars.charAt(Math.floor(Math.random() * chars.length));
}
return result;
}
/**
* Generate a unique ID for testing
*
* @param prefix - Optional prefix
* @returns Unique ID
*/
export function uniqueId(prefix: string = 'test'): string {
return `${prefix}-${Date.now()}-${randomString(4)}`;
}
/**
* Create a workflow with error handling
*
* @param name - Workflow name
* @param mainNode - Main processing node
* @param errorNode - Error handling node
* @returns Partial workflow with error handling configured
*/
export function createErrorHandlingWorkflow(
name: string,
mainNode: WorkflowNode,
errorNode: WorkflowNode
): Partial<Workflow> {
const trigger = createWebhookNode({
name: 'Trigger',
position: [250, 300]
});
// Configure main node for error handling
const mainNodeWithError = {
...mainNode,
continueOnFail: true,
onError: 'continueErrorOutput' as const
};
const connections: Record<string, any> = {
[trigger.name]: {
main: [[{ node: mainNode.name, type: 'main', index: 0 }]]
},
[mainNode.name]: {
error: [[{ node: errorNode.name, type: 'main', index: 0 }]]
}
};
return {
name: createTestWorkflowName(name),
nodes: [trigger, mainNodeWithError, errorNode],
connections,
settings: {
executionOrder: 'v1'
}
};
}
/**
* Create test workflow tags
*
* @param additional - Additional tags to include
* @returns Array of tags for test workflows
*/
export function createTestTags(additional: string[] = []): string[] {
return ['mcp-integration-test', ...additional];
}
/**
* Create workflow settings with common test configurations
*
* @param overrides - Settings to override
* @returns Workflow settings object
*/
export function createWorkflowSettings(overrides: Record<string, any> = {}): Record<string, any> {
return {
executionOrder: 'v1',
saveDataErrorExecution: 'all',
saveDataSuccessExecution: 'all',
saveManualExecutions: true,
...overrides
};
}

View File

@@ -0,0 +1,374 @@
/**
* Workflow Fixtures for Integration Tests
*
* Provides reusable workflow templates for testing.
* All fixtures use FULL node type format (n8n-nodes-base.*)
* as required by the n8n API.
*/
import { Workflow, WorkflowNode } from '../../../../src/types/n8n-api';
/**
* Simple webhook workflow with a single Webhook node
*
* Use this for basic workflow creation tests.
*/
export const SIMPLE_WEBHOOK_WORKFLOW: Partial<Workflow> = {
nodes: [
{
id: 'webhook-1',
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
position: [250, 300],
parameters: {
httpMethod: 'GET',
path: 'test-webhook'
}
}
],
connections: {},
settings: {
executionOrder: 'v1'
}
};
/**
* Simple HTTP request workflow
*
* Contains a Webhook trigger and an HTTP Request node.
* Tests basic workflow connections.
*/
export const SIMPLE_HTTP_WORKFLOW: Partial<Workflow> = {
nodes: [
{
id: 'webhook-1',
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
position: [250, 300],
parameters: {
httpMethod: 'GET',
path: 'trigger'
}
},
{
id: 'http-1',
name: 'HTTP Request',
type: 'n8n-nodes-base.httpRequest',
typeVersion: 4.2,
position: [450, 300],
parameters: {
url: 'https://httpbin.org/get',
method: 'GET'
}
}
],
connections: {
Webhook: {
main: [[{ node: 'HTTP Request', type: 'main', index: 0 }]]
}
},
settings: {
executionOrder: 'v1'
}
};
/**
* Multi-node workflow with branching
*
* Tests complex connections and multiple execution paths.
*/
export const MULTI_NODE_WORKFLOW: Partial<Workflow> = {
nodes: [
{
id: 'webhook-1',
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
position: [250, 300],
parameters: {
httpMethod: 'POST',
path: 'multi-node'
}
},
{
id: 'set-1',
name: 'Set 1',
type: 'n8n-nodes-base.set',
typeVersion: 3.4,
position: [450, 200],
parameters: {
assignments: {
assignments: [
{
id: 'assign-1',
name: 'branch',
value: 'top',
type: 'string'
}
]
},
options: {}
}
},
{
id: 'set-2',
name: 'Set 2',
type: 'n8n-nodes-base.set',
typeVersion: 3.4,
position: [450, 400],
parameters: {
assignments: {
assignments: [
{
id: 'assign-2',
name: 'branch',
value: 'bottom',
type: 'string'
}
]
},
options: {}
}
},
{
id: 'merge-1',
name: 'Merge',
type: 'n8n-nodes-base.merge',
typeVersion: 3,
position: [650, 300],
parameters: {
mode: 'append',
options: {}
}
}
],
connections: {
Webhook: {
main: [
[
{ node: 'Set 1', type: 'main', index: 0 },
{ node: 'Set 2', type: 'main', index: 0 }
]
]
},
'Set 1': {
main: [[{ node: 'Merge', type: 'main', index: 0 }]]
},
'Set 2': {
main: [[{ node: 'Merge', type: 'main', index: 1 }]]
}
},
settings: {
executionOrder: 'v1'
}
};
/**
* Workflow with error handling
*
* Tests error output configuration and error workflows.
*/
export const ERROR_HANDLING_WORKFLOW: Partial<Workflow> = {
nodes: [
{
id: 'webhook-1',
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
position: [250, 300],
parameters: {
httpMethod: 'GET',
path: 'error-test'
}
},
{
id: 'http-1',
name: 'HTTP Request',
type: 'n8n-nodes-base.httpRequest',
typeVersion: 4.2,
position: [450, 300],
parameters: {
url: 'https://httpbin.org/status/500',
method: 'GET'
},
continueOnFail: true,
onError: 'continueErrorOutput'
},
{
id: 'set-error',
name: 'Handle Error',
type: 'n8n-nodes-base.set',
typeVersion: 3.4,
position: [650, 400],
parameters: {
assignments: {
assignments: [
{
id: 'error-assign',
name: 'error_handled',
value: 'true',
type: 'boolean'
}
]
},
options: {}
}
}
],
connections: {
Webhook: {
main: [[{ node: 'HTTP Request', type: 'main', index: 0 }]]
},
'HTTP Request': {
error: [[{ node: 'Handle Error', type: 'main', index: 0 }]]
}
},
settings: {
executionOrder: 'v1'
}
};
/**
* AI Agent workflow (langchain nodes)
*
* Tests langchain node support.
*/
export const AI_AGENT_WORKFLOW: Partial<Workflow> = {
nodes: [
{
id: 'manual-1',
name: 'When clicking "Test workflow"',
type: 'n8n-nodes-base.manualTrigger',
typeVersion: 1,
position: [250, 300],
parameters: {}
},
{
id: 'agent-1',
name: 'AI Agent',
type: '@n8n/n8n-nodes-langchain.agent',
typeVersion: 1.7,
position: [450, 300],
parameters: {
promptType: 'define',
text: '={{ $json.input }}',
options: {}
}
}
],
connections: {
'When clicking "Test workflow"': {
main: [[{ node: 'AI Agent', type: 'main', index: 0 }]]
}
},
settings: {
executionOrder: 'v1'
}
};
/**
* Workflow with n8n expressions
*
* Tests expression validation.
*/
export const EXPRESSION_WORKFLOW: Partial<Workflow> = {
nodes: [
{
id: 'manual-1',
name: 'Manual Trigger',
type: 'n8n-nodes-base.manualTrigger',
typeVersion: 1,
position: [250, 300],
parameters: {}
},
{
id: 'set-1',
name: 'Set Variables',
type: 'n8n-nodes-base.set',
typeVersion: 3.4,
position: [450, 300],
parameters: {
assignments: {
assignments: [
{
id: 'expr-1',
name: 'timestamp',
value: '={{ $now }}',
type: 'string'
},
{
id: 'expr-2',
name: 'item_count',
value: '={{ $json.items.length }}',
type: 'number'
},
{
id: 'expr-3',
name: 'first_item',
value: '={{ $node["Manual Trigger"].json }}',
type: 'object'
}
]
},
options: {}
}
}
],
connections: {
'Manual Trigger': {
main: [[{ node: 'Set Variables', type: 'main', index: 0 }]]
}
},
settings: {
executionOrder: 'v1'
}
};
/**
* Get a fixture by name
*
* @param name - Fixture name
* @returns Workflow fixture
*/
export function getFixture(
name:
| 'simple-webhook'
| 'simple-http'
| 'multi-node'
| 'error-handling'
| 'ai-agent'
| 'expression'
): Partial<Workflow> {
const fixtures = {
'simple-webhook': SIMPLE_WEBHOOK_WORKFLOW,
'simple-http': SIMPLE_HTTP_WORKFLOW,
'multi-node': MULTI_NODE_WORKFLOW,
'error-handling': ERROR_HANDLING_WORKFLOW,
'ai-agent': AI_AGENT_WORKFLOW,
expression: EXPRESSION_WORKFLOW
};
return JSON.parse(JSON.stringify(fixtures[name])); // Deep clone
}
/**
* Create a minimal workflow with custom nodes
*
* @param nodes - Array of workflow nodes
* @param connections - Optional connections object
* @returns Workflow fixture
*/
export function createCustomWorkflow(
nodes: WorkflowNode[],
connections: Record<string, any> = {}
): Partial<Workflow> {
return {
nodes,
connections,
settings: {
executionOrder: 'v1'
}
};
}

View File

@@ -0,0 +1,63 @@
/**
* Pre-configured n8n API Client for Integration Tests
*
* Provides a singleton API client instance configured with test credentials.
* Automatically loads credentials from .env (local) or GitHub secrets (CI).
*/
import { N8nApiClient } from '../../../../src/services/n8n-api-client';
import { getN8nCredentials, validateCredentials } from './credentials';
let client: N8nApiClient | null = null;
/**
* Get or create the test n8n API client
*
* Creates a singleton instance configured with credentials from
* the environment. Validates that required credentials are present.
*
* @returns Configured N8nApiClient instance
* @throws Error if credentials are missing or invalid
*
* @example
* const client = getTestN8nClient();
* const workflow = await client.createWorkflow({ ... });
*/
export function getTestN8nClient(): N8nApiClient {
if (!client) {
const creds = getN8nCredentials();
validateCredentials(creds);
client = new N8nApiClient({
baseUrl: creds.url,
apiKey: creds.apiKey
});
}
return client;
}
/**
* Reset the test client instance
*
* Forces recreation of the client on next call to getTestN8nClient().
* Useful for testing or when credentials change.
*/
export function resetTestN8nClient(): void {
client = null;
}
/**
* Check if the n8n API is accessible
*
* Performs a health check to verify API connectivity.
*
* @returns true if API is accessible, false otherwise
*/
export async function isN8nApiAccessible(): Promise<boolean> {
try {
const client = getTestN8nClient();
await client.healthCheck();
return true;
} catch {
return false;
}
}

View File

@@ -0,0 +1,177 @@
/**
* Test Context for Resource Tracking and Cleanup
*
* Tracks resources created during tests (workflows, executions) and
* provides automatic cleanup functionality.
*/
import { getTestN8nClient } from './n8n-client';
import { getN8nCredentials } from './credentials';
import { Logger } from '../../../../src/utils/logger';
const logger = new Logger({ prefix: '[TestContext]' });
export interface TestContext {
/** Workflow IDs created during the test */
workflowIds: string[];
/** Execution IDs created during the test */
executionIds: string[];
/** Clean up all tracked resources */
cleanup: () => Promise<void>;
/** Track a workflow for cleanup */
trackWorkflow: (id: string) => void;
/** Track an execution for cleanup */
trackExecution: (id: string) => void;
/** Remove a workflow from tracking (e.g., already deleted) */
untrackWorkflow: (id: string) => void;
/** Remove an execution from tracking (e.g., already deleted) */
untrackExecution: (id: string) => void;
}
/**
* Create a test context for tracking and cleaning up resources
*
* Use this in test setup to create a context that tracks all
* workflows and executions created during the test. Call cleanup()
* in afterEach or afterAll to remove test resources.
*
* @returns TestContext
*
* @example
* describe('Workflow tests', () => {
* let context: TestContext;
*
* beforeEach(() => {
* context = createTestContext();
* });
*
* afterEach(async () => {
* await context.cleanup();
* });
*
* it('creates a workflow', async () => {
* const workflow = await client.createWorkflow({ ... });
* context.trackWorkflow(workflow.id);
* // Test runs, then cleanup() automatically deletes the workflow
* });
* });
*/
export function createTestContext(): TestContext {
const context: TestContext = {
workflowIds: [],
executionIds: [],
trackWorkflow(id: string) {
if (!this.workflowIds.includes(id)) {
this.workflowIds.push(id);
logger.debug(`Tracking workflow for cleanup: ${id}`);
}
},
trackExecution(id: string) {
if (!this.executionIds.includes(id)) {
this.executionIds.push(id);
logger.debug(`Tracking execution for cleanup: ${id}`);
}
},
untrackWorkflow(id: string) {
const index = this.workflowIds.indexOf(id);
if (index > -1) {
this.workflowIds.splice(index, 1);
logger.debug(`Untracked workflow: ${id}`);
}
},
untrackExecution(id: string) {
const index = this.executionIds.indexOf(id);
if (index > -1) {
this.executionIds.splice(index, 1);
logger.debug(`Untracked execution: ${id}`);
}
},
async cleanup() {
const creds = getN8nCredentials();
// Skip cleanup if disabled
if (!creds.cleanup.enabled) {
logger.info('Cleanup disabled, skipping resource cleanup');
return;
}
const client = getTestN8nClient();
// Delete executions first (they reference workflows)
if (this.executionIds.length > 0) {
logger.info(`Cleaning up ${this.executionIds.length} execution(s)`);
for (const id of this.executionIds) {
try {
await client.deleteExecution(id);
logger.debug(`Deleted execution: ${id}`);
} catch (error) {
// Log but don't fail - execution might already be deleted
logger.warn(`Failed to delete execution ${id}:`, error);
}
}
this.executionIds = [];
}
// Then delete workflows
if (this.workflowIds.length > 0) {
logger.info(`Cleaning up ${this.workflowIds.length} workflow(s)`);
for (const id of this.workflowIds) {
try {
await client.deleteWorkflow(id);
logger.debug(`Deleted workflow: ${id}`);
} catch (error) {
// Log but don't fail - workflow might already be deleted
logger.warn(`Failed to delete workflow ${id}:`, error);
}
}
this.workflowIds = [];
}
}
};
return context;
}
/**
* Create a test workflow name with prefix and timestamp
*
* Generates a unique workflow name for testing that follows
* the configured naming convention.
*
* @param baseName - Base name for the workflow
* @returns Prefixed workflow name with timestamp
*
* @example
* const name = createTestWorkflowName('Simple HTTP Request');
* // Returns: "[MCP-TEST] Simple HTTP Request 1704067200000"
*/
export function createTestWorkflowName(baseName: string): string {
const creds = getN8nCredentials();
const timestamp = Date.now();
return `${creds.cleanup.namePrefix} ${baseName} ${timestamp}`;
}
/**
* Get the configured test tag
*
* @returns Tag to apply to test workflows
*/
export function getTestTag(): string {
const creds = getN8nCredentials();
return creds.cleanup.tag;
}

View File

@@ -0,0 +1,289 @@
/**
* Webhook Workflow Configuration
*
* Provides configuration and setup instructions for webhook workflows
* required for integration testing.
*
* These workflows must be created manually in n8n and activated because
* the n8n API doesn't support workflow activation.
*/
import { Workflow, WorkflowNode } from '../../../../src/types/n8n-api';
export interface WebhookWorkflowConfig {
name: string;
description: string;
httpMethod: 'GET' | 'POST' | 'PUT' | 'DELETE';
path: string;
nodes: Array<Partial<WorkflowNode>>;
connections: Record<string, any>;
}
/**
* Configuration for required webhook workflows
*/
export const WEBHOOK_WORKFLOW_CONFIGS: Record<string, WebhookWorkflowConfig> = {
GET: {
name: '[MCP-TEST] Webhook GET',
description: 'Pre-activated webhook for GET method testing',
httpMethod: 'GET',
path: 'mcp-test-get',
nodes: [
{
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
position: [250, 300],
parameters: {
httpMethod: 'GET',
path: 'mcp-test-get',
responseMode: 'lastNode',
options: {}
}
},
{
name: 'Respond to Webhook',
type: 'n8n-nodes-base.respondToWebhook',
typeVersion: 1.1,
position: [450, 300],
parameters: {
options: {}
}
}
],
connections: {
Webhook: {
main: [[{ node: 'Respond to Webhook', type: 'main', index: 0 }]]
}
}
},
POST: {
name: '[MCP-TEST] Webhook POST',
description: 'Pre-activated webhook for POST method testing',
httpMethod: 'POST',
path: 'mcp-test-post',
nodes: [
{
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
position: [250, 300],
parameters: {
httpMethod: 'POST',
path: 'mcp-test-post',
responseMode: 'lastNode',
options: {}
}
},
{
name: 'Respond to Webhook',
type: 'n8n-nodes-base.respondToWebhook',
typeVersion: 1.1,
position: [450, 300],
parameters: {
options: {}
}
}
],
connections: {
Webhook: {
main: [[{ node: 'Respond to Webhook', type: 'main', index: 0 }]]
}
}
},
PUT: {
name: '[MCP-TEST] Webhook PUT',
description: 'Pre-activated webhook for PUT method testing',
httpMethod: 'PUT',
path: 'mcp-test-put',
nodes: [
{
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
position: [250, 300],
parameters: {
httpMethod: 'PUT',
path: 'mcp-test-put',
responseMode: 'lastNode',
options: {}
}
},
{
name: 'Respond to Webhook',
type: 'n8n-nodes-base.respondToWebhook',
typeVersion: 1.1,
position: [450, 300],
parameters: {
options: {}
}
}
],
connections: {
Webhook: {
main: [[{ node: 'Respond to Webhook', type: 'main', index: 0 }]]
}
}
},
DELETE: {
name: '[MCP-TEST] Webhook DELETE',
description: 'Pre-activated webhook for DELETE method testing',
httpMethod: 'DELETE',
path: 'mcp-test-delete',
nodes: [
{
name: 'Webhook',
type: 'n8n-nodes-base.webhook',
typeVersion: 2,
position: [250, 300],
parameters: {
httpMethod: 'DELETE',
path: 'mcp-test-delete',
responseMode: 'lastNode',
options: {}
}
},
{
name: 'Respond to Webhook',
type: 'n8n-nodes-base.respondToWebhook',
typeVersion: 1.1,
position: [450, 300],
parameters: {
options: {}
}
}
],
connections: {
Webhook: {
main: [[{ node: 'Respond to Webhook', type: 'main', index: 0 }]]
}
}
}
};
/**
* Print setup instructions for webhook workflows
*/
export function printSetupInstructions(): void {
console.log(`
╔════════════════════════════════════════════════════════════════╗
║ WEBHOOK WORKFLOW SETUP REQUIRED ║
╠════════════════════════════════════════════════════════════════╣
║ ║
║ Integration tests require 4 pre-activated webhook workflows: ║
║ ║
║ 1. Create workflows manually in n8n UI ║
║ 2. Use the configurations shown below ║
║ 3. ACTIVATE each workflow in n8n UI ║
║ 4. Copy workflow IDs to .env file ║
║ ║
╚════════════════════════════════════════════════════════════════╝
Required workflows:
`);
Object.entries(WEBHOOK_WORKFLOW_CONFIGS).forEach(([method, config]) => {
console.log(`
${method} Method:
Name: ${config.name}
Path: ${config.path}
.env variable: N8N_TEST_WEBHOOK_${method}_ID
Workflow Structure:
1. Webhook node (${method} method, path: ${config.path})
2. Respond to Webhook node
After creating:
1. Save the workflow
2. ACTIVATE the workflow (toggle in UI)
3. Copy the workflow ID
4. Add to .env: N8N_TEST_WEBHOOK_${method}_ID=<workflow-id>
`);
});
console.log(`
See docs/local/integration-testing-plan.md for detailed instructions.
`);
}
/**
* Generate workflow JSON for a webhook workflow
*
* @param method - HTTP method
* @returns Partial workflow ready to create
*/
export function generateWebhookWorkflowJson(
method: 'GET' | 'POST' | 'PUT' | 'DELETE'
): Partial<Workflow> {
const config = WEBHOOK_WORKFLOW_CONFIGS[method];
return {
name: config.name,
nodes: config.nodes as any,
connections: config.connections,
active: false, // Will need to be activated manually
settings: {
executionOrder: 'v1'
},
tags: ['mcp-integration-test', 'webhook-test']
};
}
/**
* Export all webhook workflow JSONs
*
* Returns an object with all 4 webhook workflow configurations
* ready to be created in n8n.
*
* @returns Object with workflow configurations
*/
export function exportAllWebhookWorkflows(): Record<string, Partial<Workflow>> {
return {
GET: generateWebhookWorkflowJson('GET'),
POST: generateWebhookWorkflowJson('POST'),
PUT: generateWebhookWorkflowJson('PUT'),
DELETE: generateWebhookWorkflowJson('DELETE')
};
}
/**
* Get webhook URL for a given n8n instance and HTTP method
*
* @param n8nUrl - n8n instance URL
* @param method - HTTP method
* @returns Webhook URL
*/
export function getWebhookUrl(
n8nUrl: string,
method: 'GET' | 'POST' | 'PUT' | 'DELETE'
): string {
const config = WEBHOOK_WORKFLOW_CONFIGS[method];
const baseUrl = n8nUrl.replace(/\/$/, ''); // Remove trailing slash
return `${baseUrl}/webhook/${config.path}`;
}
/**
* Validate webhook workflow structure
*
* Checks if a workflow matches the expected webhook workflow structure.
*
* @param workflow - Workflow to validate
* @param method - Expected HTTP method
* @returns true if valid
*/
export function isValidWebhookWorkflow(
workflow: Partial<Workflow>,
method: 'GET' | 'POST' | 'PUT' | 'DELETE'
): boolean {
if (!workflow.nodes || workflow.nodes.length < 1) {
return false;
}
const webhookNode = workflow.nodes.find(n => n.type === 'n8n-nodes-base.webhook');
if (!webhookNode) {
return false;
}
const params = webhookNode.parameters as any;
return params.httpMethod === method;
}

View File

@@ -142,7 +142,8 @@ describe.skip('MCP Telemetry Integration', () => {
telemetry.trackError(
error.constructor.name,
error.message,
toolName
toolName,
error.message
);
throw error;
}

View File

@@ -192,7 +192,7 @@ describe('TelemetryEventTracker', () => {
describe('trackError()', () => {
it('should track error events without rate limiting', () => {
eventTracker.trackError('ValidationError', 'Node configuration invalid', 'httpRequest');
eventTracker.trackError('ValidationError', 'Node configuration invalid', 'httpRequest', 'Required field "url" is missing');
const events = eventTracker.getEventQueue();
expect(events).toHaveLength(1);
@@ -202,34 +202,173 @@ describe('TelemetryEventTracker', () => {
properties: {
errorType: 'ValidationError',
context: 'Node configuration invalid',
tool: 'httpRequest'
tool: 'httpRequest',
error: 'Required field "url" is missing'
}
});
});
it('should sanitize error context', () => {
const context = 'Failed to connect to https://api.example.com with key abc123def456ghi789jklmno0123456789';
eventTracker.trackError('NetworkError', context);
eventTracker.trackError('NetworkError', context, undefined, 'Connection timeout after 30s');
const events = eventTracker.getEventQueue();
expect(events[0].properties.context).toBe('Failed to connect to [URL] with key [KEY]');
});
it('should sanitize error type', () => {
eventTracker.trackError('Invalid$Error!Type', 'test context');
eventTracker.trackError('Invalid$Error!Type', 'test context', undefined, 'Test error message');
const events = eventTracker.getEventQueue();
expect(events[0].properties.errorType).toBe('Invalid_Error_Type');
});
it('should handle missing tool name', () => {
eventTracker.trackError('TestError', 'test context');
eventTracker.trackError('TestError', 'test context', undefined, 'No tool specified');
const events = eventTracker.getEventQueue();
expect(events[0].properties.tool).toBeNull(); // Validator converts undefined to null
});
});
describe('trackError() with error messages', () => {
it('should capture error messages in properties', () => {
eventTracker.trackError('ValidationError', 'test', 'tool', 'Field "url" is required');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toBe('Field "url" is required');
});
it('should handle undefined error message', () => {
eventTracker.trackError('Error', 'test', 'tool', undefined);
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toBeNull(); // Validator converts undefined to null
});
it('should sanitize API keys in error messages', () => {
eventTracker.trackError('AuthError', 'test', 'tool', 'Failed with api_key=sk_live_abc123def456');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toContain('api_key=[REDACTED]');
expect(events[0].properties.error).not.toContain('sk_live_abc123def456');
});
it('should sanitize passwords in error messages', () => {
eventTracker.trackError('AuthError', 'test', 'tool', 'Login failed: password=secret123');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toContain('password=[REDACTED]');
});
it('should sanitize long keys (32+ chars)', () => {
eventTracker.trackError('Error', 'test', 'tool', 'Key: abc123def456ghi789jkl012mno345pqr678');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toContain('[KEY]');
});
it('should sanitize URLs in error messages', () => {
eventTracker.trackError('NetworkError', 'test', 'tool', 'Failed to fetch https://api.example.com/v1/users');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toBe('Failed to fetch [URL]');
expect(events[0].properties.error).not.toContain('api.example.com');
expect(events[0].properties.error).not.toContain('/v1/users');
});
it('should truncate very long error messages to 500 chars', () => {
const longError = 'Error occurred while processing the request. ' + 'Additional context details. '.repeat(50);
eventTracker.trackError('Error', 'test', 'tool', longError);
const events = eventTracker.getEventQueue();
expect(events[0].properties.error.length).toBeLessThanOrEqual(503); // 500 + '...'
expect(events[0].properties.error).toMatch(/\.\.\.$/);
});
it('should handle stack traces by keeping first 3 lines', () => {
const errorMsg = 'Error: Something failed\n at foo (/path/file.js:10:5)\n at bar (/path/file.js:20:10)\n at baz (/path/file.js:30:15)\n at qux (/path/file.js:40:20)';
eventTracker.trackError('Error', 'test', 'tool', errorMsg);
const events = eventTracker.getEventQueue();
const lines = events[0].properties.error.split('\n');
expect(lines.length).toBeLessThanOrEqual(3);
});
it('should sanitize emails in error messages', () => {
eventTracker.trackError('Error', 'test', 'tool', 'Failed for user test@example.com');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toContain('[EMAIL]');
expect(events[0].properties.error).not.toContain('test@example.com');
});
it('should sanitize quoted tokens', () => {
eventTracker.trackError('Error', 'test', 'tool', 'Auth failed: "abc123def456ghi789"');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toContain('"[TOKEN]"');
});
it('should sanitize token= patterns in error messages', () => {
eventTracker.trackError('AuthError', 'test', 'tool', 'Failed with token=abc123def456');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toContain('token=[REDACTED]');
});
it('should sanitize AWS access keys', () => {
eventTracker.trackError('Error', 'test', 'tool', 'Failed with AWS key AKIAIOSFODNN7EXAMPLE');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toContain('[AWS_KEY]');
expect(events[0].properties.error).not.toContain('AKIAIOSFODNN7EXAMPLE');
});
it('should sanitize GitHub tokens', () => {
eventTracker.trackError('Error', 'test', 'tool', 'Auth failed: ghp_1234567890abcdefghijklmnopqrstuvwxyz');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toContain('[GITHUB_TOKEN]');
expect(events[0].properties.error).not.toContain('ghp_1234567890abcdefghijklmnopqrstuvwxyz');
});
it('should sanitize JWT tokens', () => {
eventTracker.trackError('Error', 'test', 'tool', 'Invalid JWT eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIxMjM0In0.signature provided');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toContain('[JWT]');
expect(events[0].properties.error).not.toContain('eyJhbGciOiJIUzI1NiJ9');
});
it('should sanitize Bearer tokens', () => {
eventTracker.trackError('Error', 'test', 'tool', 'Authorization failed: Bearer abc123def456ghi789');
const events = eventTracker.getEventQueue();
expect(events[0].properties.error).toContain('Bearer [TOKEN]');
expect(events[0].properties.error).not.toContain('abc123def456ghi789');
});
it('should prevent email leakage in URLs by sanitizing URLs first', () => {
eventTracker.trackError('Error', 'test', 'tool', 'Failed: https://api.example.com/users/test@example.com/profile');
const events = eventTracker.getEventQueue();
// URL should be fully redacted, preventing any email leakage
expect(events[0].properties.error).toBe('Failed: [URL]');
expect(events[0].properties.error).not.toContain('test@example.com');
expect(events[0].properties.error).not.toContain('/users/');
});
it('should handle extremely long error messages efficiently', () => {
const hugeError = 'Error: ' + 'x'.repeat(10000);
eventTracker.trackError('Error', 'test', 'tool', hugeError);
const events = eventTracker.getEventQueue();
// Should be truncated at 500 chars max
expect(events[0].properties.error.length).toBeLessThanOrEqual(503); // 500 + '...'
});
});
describe('trackEvent()', () => {
it('should track generic events', () => {
const properties = { key: 'value', count: 42 };
@@ -618,7 +757,7 @@ describe('TelemetryEventTracker', () => {
describe('sanitization helpers', () => {
it('should sanitize context strings properly', () => {
const context = 'Error at https://api.example.com/v1/users/test@email.com?key=secret123456789012345678901234567890';
eventTracker.trackError('TestError', context);
eventTracker.trackError('TestError', context, undefined, 'Test error with special chars');
const events = eventTracker.getEventQueue();
// After sanitization: emails first, then keys, then URL (keeping path)
@@ -628,7 +767,7 @@ describe('TelemetryEventTracker', () => {
it('should handle context truncation', () => {
// Use a more realistic long context that won't trigger key sanitization
const longContext = 'Error occurred while processing the request: ' + 'details '.repeat(20);
eventTracker.trackError('TestError', longContext);
eventTracker.trackError('TestError', longContext, undefined, 'Long error message for truncation test');
const events = eventTracker.getEventQueue();
// Should be truncated to 100 chars

View File

@@ -233,12 +233,13 @@ describe('TelemetryManager', () => {
});
it('should track errors', () => {
manager.trackError('ValidationError', 'Node configuration invalid', 'httpRequest');
manager.trackError('ValidationError', 'Node configuration invalid', 'httpRequest', 'Required field "url" is missing');
expect(mockEventTracker.trackError).toHaveBeenCalledWith(
'ValidationError',
'Node configuration invalid',
'httpRequest'
'httpRequest',
'Required field "url" is missing'
);
});

View File

@@ -0,0 +1,793 @@
import { describe, it, expect, beforeEach, vi, afterEach } from 'vitest';
import { TemplateRepository } from '../../../src/templates/template-repository';
import { DatabaseAdapter, PreparedStatement, RunResult } from '../../../src/database/database-adapter';
import { logger } from '../../../src/utils/logger';
// Mock logger
vi.mock('../../../src/utils/logger', () => ({
logger: {
info: vi.fn(),
warn: vi.fn(),
error: vi.fn(),
debug: vi.fn()
}
}));
// Mock template sanitizer
vi.mock('../../../src/utils/template-sanitizer', () => {
class MockTemplateSanitizer {
sanitizeWorkflow = vi.fn((workflow) => ({ sanitized: workflow, wasModified: false }));
detectTokens = vi.fn(() => []);
}
return {
TemplateSanitizer: MockTemplateSanitizer
};
});
// Create mock database adapter
class MockDatabaseAdapter implements DatabaseAdapter {
private statements = new Map<string, MockPreparedStatement>();
private execCalls: string[] = [];
private _fts5Support = true;
prepare = vi.fn((sql: string) => {
if (!this.statements.has(sql)) {
this.statements.set(sql, new MockPreparedStatement(sql));
}
return this.statements.get(sql)!;
});
exec = vi.fn((sql: string) => {
this.execCalls.push(sql);
});
close = vi.fn();
pragma = vi.fn();
transaction = vi.fn((fn: () => any) => fn());
checkFTS5Support = vi.fn(() => this._fts5Support);
inTransaction = false;
_setFTS5Support(supported: boolean) {
this._fts5Support = supported;
}
_getStatement(sql: string) {
return this.statements.get(sql);
}
_getExecCalls() {
return this.execCalls;
}
_clearExecCalls() {
this.execCalls = [];
}
}
class MockPreparedStatement implements PreparedStatement {
public mockResults: any[] = [];
public capturedParams: any[][] = [];
run = vi.fn((...params: any[]): RunResult => {
this.capturedParams.push(params);
return { changes: 1, lastInsertRowid: 1 };
});
get = vi.fn((...params: any[]) => {
this.capturedParams.push(params);
return this.mockResults[0] || null;
});
all = vi.fn((...params: any[]) => {
this.capturedParams.push(params);
return this.mockResults;
});
iterate = vi.fn();
pluck = vi.fn(() => this);
expand = vi.fn(() => this);
raw = vi.fn(() => this);
columns = vi.fn(() => []);
bind = vi.fn(() => this);
constructor(private sql: string) {}
_setMockResults(results: any[]) {
this.mockResults = results;
}
_getCapturedParams() {
return this.capturedParams;
}
}
describe('TemplateRepository - Metadata Filter Tests', () => {
let repository: TemplateRepository;
let mockAdapter: MockDatabaseAdapter;
beforeEach(() => {
vi.clearAllMocks();
mockAdapter = new MockDatabaseAdapter();
repository = new TemplateRepository(mockAdapter);
});
afterEach(() => {
vi.clearAllMocks();
});
describe('buildMetadataFilterConditions - All Filter Combinations', () => {
it('should build conditions with no filters', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
repository.searchTemplatesByMetadata({}, 10, 0);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
// Should only have the base condition
expect(prepareCall).toContain('metadata_json IS NOT NULL');
// Should not have any additional conditions
expect(prepareCall).not.toContain("json_extract(metadata_json, '$.categories')");
expect(prepareCall).not.toContain("json_extract(metadata_json, '$.complexity')");
});
it('should build conditions with only category filter', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
repository.searchTemplatesByMetadata({ category: 'automation' }, 10, 0);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain('metadata_json IS NOT NULL');
expect(prepareCall).toContain("json_extract(metadata_json, '$.categories') LIKE '%' || ? || '%'");
const capturedParams = stmt._getCapturedParams();
expect(capturedParams[0][0]).toBe('automation');
});
it('should build conditions with only complexity filter', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
repository.searchTemplatesByMetadata({ complexity: 'simple' }, 10, 0);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain('metadata_json IS NOT NULL');
expect(prepareCall).toContain("json_extract(metadata_json, '$.complexity') = ?");
const capturedParams = stmt._getCapturedParams();
expect(capturedParams[0][0]).toBe('simple');
});
it('should build conditions with only maxSetupMinutes filter', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
repository.searchTemplatesByMetadata({ maxSetupMinutes: 30 }, 10, 0);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain('metadata_json IS NOT NULL');
expect(prepareCall).toContain("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) <= ?");
const capturedParams = stmt._getCapturedParams();
expect(capturedParams[0][0]).toBe(30);
});
it('should build conditions with only minSetupMinutes filter', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
repository.searchTemplatesByMetadata({ minSetupMinutes: 10 }, 10, 0);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain('metadata_json IS NOT NULL');
expect(prepareCall).toContain("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) >= ?");
const capturedParams = stmt._getCapturedParams();
expect(capturedParams[0][0]).toBe(10);
});
it('should build conditions with only requiredService filter', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
repository.searchTemplatesByMetadata({ requiredService: 'slack' }, 10, 0);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain('metadata_json IS NOT NULL');
expect(prepareCall).toContain("json_extract(metadata_json, '$.required_services') LIKE '%' || ? || '%'");
const capturedParams = stmt._getCapturedParams();
expect(capturedParams[0][0]).toBe('slack');
});
it('should build conditions with only targetAudience filter', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
repository.searchTemplatesByMetadata({ targetAudience: 'developers' }, 10, 0);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain('metadata_json IS NOT NULL');
expect(prepareCall).toContain("json_extract(metadata_json, '$.target_audience') LIKE '%' || ? || '%'");
const capturedParams = stmt._getCapturedParams();
expect(capturedParams[0][0]).toBe('developers');
});
it('should build conditions with all filters combined', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
repository.searchTemplatesByMetadata({
category: 'automation',
complexity: 'medium',
maxSetupMinutes: 60,
minSetupMinutes: 15,
requiredService: 'openai',
targetAudience: 'marketers'
}, 10, 0);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain('metadata_json IS NOT NULL');
expect(prepareCall).toContain("json_extract(metadata_json, '$.categories') LIKE '%' || ? || '%'");
expect(prepareCall).toContain("json_extract(metadata_json, '$.complexity') = ?");
expect(prepareCall).toContain("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) <= ?");
expect(prepareCall).toContain("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) >= ?");
expect(prepareCall).toContain("json_extract(metadata_json, '$.required_services') LIKE '%' || ? || '%'");
expect(prepareCall).toContain("json_extract(metadata_json, '$.target_audience') LIKE '%' || ? || '%'");
const capturedParams = stmt._getCapturedParams();
expect(capturedParams[0]).toEqual(['automation', 'medium', 60, 15, 'openai', 'marketers', 10, 0]);
});
it('should build conditions with partial filter combinations', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
repository.searchTemplatesByMetadata({
category: 'data-processing',
maxSetupMinutes: 45,
targetAudience: 'analysts'
}, 10, 0);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain('metadata_json IS NOT NULL');
expect(prepareCall).toContain("json_extract(metadata_json, '$.categories') LIKE '%' || ? || '%'");
expect(prepareCall).toContain("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) <= ?");
expect(prepareCall).toContain("json_extract(metadata_json, '$.target_audience') LIKE '%' || ? || '%'");
// Should not have complexity, minSetupMinutes, or requiredService conditions
expect(prepareCall).not.toContain("json_extract(metadata_json, '$.complexity') = ?");
expect(prepareCall).not.toContain("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) >= ?");
expect(prepareCall).not.toContain("json_extract(metadata_json, '$.required_services') LIKE '%' || ? || '%'");
const capturedParams = stmt._getCapturedParams();
expect(capturedParams[0]).toEqual(['data-processing', 45, 'analysts', 10, 0]);
});
it('should handle complexity variations', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
// Test each complexity level
const complexityLevels: Array<'simple' | 'medium' | 'complex'> = ['simple', 'medium', 'complex'];
complexityLevels.forEach((complexity) => {
vi.clearAllMocks();
stmt.capturedParams = [];
repository.searchTemplatesByMetadata({ complexity }, 10, 0);
const capturedParams = stmt._getCapturedParams();
expect(capturedParams[0][0]).toBe(complexity);
});
});
it('should handle setup minutes edge cases', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
// Test zero values
repository.searchTemplatesByMetadata({ maxSetupMinutes: 0, minSetupMinutes: 0 }, 10, 0);
let capturedParams = stmt._getCapturedParams();
expect(capturedParams[0]).toContain(0);
// Test very large values
vi.clearAllMocks();
stmt.capturedParams = [];
repository.searchTemplatesByMetadata({ maxSetupMinutes: 999999 }, 10, 0);
capturedParams = stmt._getCapturedParams();
expect(capturedParams[0]).toContain(999999);
// Test negative values (should still work, though might not make sense semantically)
vi.clearAllMocks();
stmt.capturedParams = [];
repository.searchTemplatesByMetadata({ minSetupMinutes: -10 }, 10, 0);
capturedParams = stmt._getCapturedParams();
expect(capturedParams[0]).toContain(-10);
});
it('should sanitize special characters in string filters', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
const specialCategory = 'test"with\'quotes';
const specialService = 'service\\with\\backslashes';
const specialAudience = 'audience\nwith\nnewlines';
repository.searchTemplatesByMetadata({
category: specialCategory,
requiredService: specialService,
targetAudience: specialAudience
}, 10, 0);
const capturedParams = stmt._getCapturedParams();
// JSON.stringify escapes special characters, then slice(1, -1) removes quotes
expect(capturedParams[0][0]).toBe(JSON.stringify(specialCategory).slice(1, -1));
expect(capturedParams[0][1]).toBe(JSON.stringify(specialService).slice(1, -1));
expect(capturedParams[0][2]).toBe(JSON.stringify(specialAudience).slice(1, -1));
});
});
describe('Performance Logging and Timing', () => {
it('should log debug info on successful search', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([
{ id: 1 },
{ id: 2 }
]);
const stmt2 = new MockPreparedStatement('');
stmt2._setMockResults([
{ id: 1, workflow_id: 1, name: 'Template 1', workflow_json: '{}' },
{ id: 2, workflow_id: 2, name: 'Template 2', workflow_json: '{}' }
]);
let callCount = 0;
mockAdapter.prepare = vi.fn((sql: string) => {
callCount++;
return callCount === 1 ? stmt : stmt2;
});
repository.searchTemplatesByMetadata({ complexity: 'simple' }, 10, 0);
expect(logger.debug).toHaveBeenCalledWith(
expect.stringContaining('Metadata search found'),
expect.objectContaining({
filters: { complexity: 'simple' },
count: 2,
phase1Ms: expect.any(Number),
phase2Ms: expect.any(Number),
totalMs: expect.any(Number),
optimization: 'two-phase-with-ordering'
})
);
});
it('should log debug info on empty results', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
repository.searchTemplatesByMetadata({ category: 'nonexistent' }, 10, 0);
expect(logger.debug).toHaveBeenCalledWith(
'Metadata search found 0 results',
expect.objectContaining({
filters: { category: 'nonexistent' },
phase1Ms: expect.any(Number)
})
);
});
it('should include all filter types in logs', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
const filters = {
category: 'automation',
complexity: 'medium' as const,
maxSetupMinutes: 60,
minSetupMinutes: 15,
requiredService: 'slack',
targetAudience: 'developers'
};
repository.searchTemplatesByMetadata(filters, 10, 0);
expect(logger.debug).toHaveBeenCalledWith(
expect.any(String),
expect.objectContaining({
filters: filters
})
);
});
});
describe('ID Filtering and Validation', () => {
it('should filter out negative IDs', () => {
const stmt1 = new MockPreparedStatement('');
stmt1._setMockResults([
{ id: 1 },
{ id: -5 },
{ id: 2 }
]);
const stmt2 = new MockPreparedStatement('');
stmt2._setMockResults([
{ id: 1, workflow_id: 1, name: 'Template 1', workflow_json: '{}' },
{ id: 2, workflow_id: 2, name: 'Template 2', workflow_json: '{}' }
]);
let callCount = 0;
mockAdapter.prepare = vi.fn((sql: string) => {
callCount++;
return callCount === 1 ? stmt1 : stmt2;
});
repository.searchTemplatesByMetadata({}, 10, 0);
// Should only fetch valid IDs (1 and 2)
const prepareCall = mockAdapter.prepare.mock.calls[1][0];
expect(prepareCall).toContain('(1, 0)');
expect(prepareCall).toContain('(2, 1)');
expect(prepareCall).not.toContain('-5');
});
it('should filter out zero IDs', () => {
const stmt1 = new MockPreparedStatement('');
stmt1._setMockResults([
{ id: 0 },
{ id: 1 }
]);
const stmt2 = new MockPreparedStatement('');
stmt2._setMockResults([
{ id: 1, workflow_id: 1, name: 'Template 1', workflow_json: '{}' }
]);
let callCount = 0;
mockAdapter.prepare = vi.fn((sql: string) => {
callCount++;
return callCount === 1 ? stmt1 : stmt2;
});
repository.searchTemplatesByMetadata({}, 10, 0);
// Should only fetch valid ID (1)
const prepareCall = mockAdapter.prepare.mock.calls[1][0];
expect(prepareCall).toContain('(1, 0)');
expect(prepareCall).not.toContain('(0,');
});
it('should filter out non-integer IDs', () => {
const stmt1 = new MockPreparedStatement('');
stmt1._setMockResults([
{ id: 1 },
{ id: 2.5 },
{ id: 3 }
]);
const stmt2 = new MockPreparedStatement('');
stmt2._setMockResults([
{ id: 1, workflow_id: 1, name: 'Template 1', workflow_json: '{}' },
{ id: 3, workflow_id: 3, name: 'Template 3', workflow_json: '{}' }
]);
let callCount = 0;
mockAdapter.prepare = vi.fn((sql: string) => {
callCount++;
return callCount === 1 ? stmt1 : stmt2;
});
repository.searchTemplatesByMetadata({}, 10, 0);
// Should only fetch integer IDs (1 and 3)
const prepareCall = mockAdapter.prepare.mock.calls[1][0];
expect(prepareCall).toContain('(1, 0)');
expect(prepareCall).toContain('(3, 1)');
expect(prepareCall).not.toContain('2.5');
});
it('should filter out null IDs', () => {
const stmt1 = new MockPreparedStatement('');
stmt1._setMockResults([
{ id: 1 },
{ id: null },
{ id: 2 }
]);
const stmt2 = new MockPreparedStatement('');
stmt2._setMockResults([
{ id: 1, workflow_id: 1, name: 'Template 1', workflow_json: '{}' },
{ id: 2, workflow_id: 2, name: 'Template 2', workflow_json: '{}' }
]);
let callCount = 0;
mockAdapter.prepare = vi.fn((sql: string) => {
callCount++;
return callCount === 1 ? stmt1 : stmt2;
});
repository.searchTemplatesByMetadata({}, 10, 0);
// Should only fetch valid IDs (1 and 2)
const prepareCall = mockAdapter.prepare.mock.calls[1][0];
expect(prepareCall).toContain('(1, 0)');
expect(prepareCall).toContain('(2, 1)');
expect(prepareCall).not.toContain('null');
});
it('should warn when no valid IDs after filtering', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([
{ id: -1 },
{ id: 0 },
{ id: null }
]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
const result = repository.searchTemplatesByMetadata({}, 10, 0);
expect(result).toHaveLength(0);
expect(logger.warn).toHaveBeenCalledWith(
'No valid IDs after filtering',
expect.objectContaining({
filters: {},
originalCount: 3
})
);
});
it('should warn when some IDs are filtered out', () => {
const stmt1 = new MockPreparedStatement('');
stmt1._setMockResults([
{ id: 1 },
{ id: -2 },
{ id: 3 },
{ id: null }
]);
const stmt2 = new MockPreparedStatement('');
stmt2._setMockResults([
{ id: 1, workflow_id: 1, name: 'Template 1', workflow_json: '{}' },
{ id: 3, workflow_id: 3, name: 'Template 3', workflow_json: '{}' }
]);
let callCount = 0;
mockAdapter.prepare = vi.fn((sql: string) => {
callCount++;
return callCount === 1 ? stmt1 : stmt2;
});
repository.searchTemplatesByMetadata({}, 10, 0);
expect(logger.warn).toHaveBeenCalledWith(
'Some IDs were filtered out as invalid',
expect.objectContaining({
original: 4,
valid: 2,
filtered: 2
})
);
});
it('should not warn when all IDs are valid', () => {
const stmt1 = new MockPreparedStatement('');
stmt1._setMockResults([
{ id: 1 },
{ id: 2 },
{ id: 3 }
]);
const stmt2 = new MockPreparedStatement('');
stmt2._setMockResults([
{ id: 1, workflow_id: 1, name: 'Template 1', workflow_json: '{}' },
{ id: 2, workflow_id: 2, name: 'Template 2', workflow_json: '{}' },
{ id: 3, workflow_id: 3, name: 'Template 3', workflow_json: '{}' }
]);
let callCount = 0;
mockAdapter.prepare = vi.fn((sql: string) => {
callCount++;
return callCount === 1 ? stmt1 : stmt2;
});
repository.searchTemplatesByMetadata({}, 10, 0);
expect(logger.warn).not.toHaveBeenCalledWith(
'Some IDs were filtered out as invalid',
expect.any(Object)
);
});
});
describe('getMetadataSearchCount - Shared Helper Usage', () => {
it('should use buildMetadataFilterConditions for category', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([{ count: 5 }]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
const result = repository.getMetadataSearchCount({ category: 'automation' });
expect(result).toBe(5);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain("json_extract(metadata_json, '$.categories') LIKE '%' || ? || '%'");
const capturedParams = stmt._getCapturedParams();
expect(capturedParams[0][0]).toBe('automation');
});
it('should use buildMetadataFilterConditions for complexity', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([{ count: 10 }]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
const result = repository.getMetadataSearchCount({ complexity: 'medium' });
expect(result).toBe(10);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain("json_extract(metadata_json, '$.complexity') = ?");
});
it('should use buildMetadataFilterConditions for setup minutes', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([{ count: 3 }]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
const result = repository.getMetadataSearchCount({
maxSetupMinutes: 30,
minSetupMinutes: 10
});
expect(result).toBe(3);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) <= ?");
expect(prepareCall).toContain("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) >= ?");
});
it('should use buildMetadataFilterConditions for service and audience', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([{ count: 7 }]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
const result = repository.getMetadataSearchCount({
requiredService: 'openai',
targetAudience: 'developers'
});
expect(result).toBe(7);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain("json_extract(metadata_json, '$.required_services') LIKE '%' || ? || '%'");
expect(prepareCall).toContain("json_extract(metadata_json, '$.target_audience') LIKE '%' || ? || '%'");
});
it('should use buildMetadataFilterConditions with all filters', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([{ count: 2 }]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
const result = repository.getMetadataSearchCount({
category: 'integration',
complexity: 'complex',
maxSetupMinutes: 120,
minSetupMinutes: 30,
requiredService: 'slack',
targetAudience: 'marketers'
});
expect(result).toBe(2);
const prepareCall = mockAdapter.prepare.mock.calls[0][0];
expect(prepareCall).toContain("json_extract(metadata_json, '$.categories') LIKE '%' || ? || '%'");
expect(prepareCall).toContain("json_extract(metadata_json, '$.complexity') = ?");
expect(prepareCall).toContain("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) <= ?");
expect(prepareCall).toContain("CAST(json_extract(metadata_json, '$.estimated_setup_minutes') AS INTEGER) >= ?");
expect(prepareCall).toContain("json_extract(metadata_json, '$.required_services') LIKE '%' || ? || '%'");
expect(prepareCall).toContain("json_extract(metadata_json, '$.target_audience') LIKE '%' || ? || '%'");
const capturedParams = stmt._getCapturedParams();
expect(capturedParams[0]).toEqual(['integration', 'complex', 120, 30, 'slack', 'marketers']);
});
it('should return 0 when no matches', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([{ count: 0 }]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
const result = repository.getMetadataSearchCount({ category: 'nonexistent' });
expect(result).toBe(0);
});
});
describe('Two-Phase Query Optimization', () => {
it('should execute two separate queries', () => {
const stmt1 = new MockPreparedStatement('');
stmt1._setMockResults([{ id: 1 }, { id: 2 }]);
const stmt2 = new MockPreparedStatement('');
stmt2._setMockResults([
{ id: 1, workflow_id: 1, name: 'Template 1', workflow_json: '{}' },
{ id: 2, workflow_id: 2, name: 'Template 2', workflow_json: '{}' }
]);
let callCount = 0;
mockAdapter.prepare = vi.fn((sql: string) => {
callCount++;
return callCount === 1 ? stmt1 : stmt2;
});
repository.searchTemplatesByMetadata({ complexity: 'simple' }, 10, 0);
expect(mockAdapter.prepare).toHaveBeenCalledTimes(2);
// First query should select only ID
const phase1Query = mockAdapter.prepare.mock.calls[0][0];
expect(phase1Query).toContain('SELECT id FROM templates');
expect(phase1Query).toContain('ORDER BY views DESC, created_at DESC, id ASC');
// Second query should use CTE with ordered IDs
const phase2Query = mockAdapter.prepare.mock.calls[1][0];
expect(phase2Query).toContain('WITH ordered_ids(id, sort_order) AS');
expect(phase2Query).toContain('VALUES (1, 0), (2, 1)');
expect(phase2Query).toContain('SELECT t.* FROM templates t');
expect(phase2Query).toContain('INNER JOIN ordered_ids o ON t.id = o.id');
expect(phase2Query).toContain('ORDER BY o.sort_order');
});
it('should skip phase 2 when no IDs found', () => {
const stmt = new MockPreparedStatement('');
stmt._setMockResults([]);
mockAdapter.prepare = vi.fn().mockReturnValue(stmt);
const result = repository.searchTemplatesByMetadata({ category: 'nonexistent' }, 10, 0);
expect(result).toHaveLength(0);
// Should only call prepare once (phase 1)
expect(mockAdapter.prepare).toHaveBeenCalledTimes(1);
});
it('should preserve ordering with stable sort', () => {
const stmt1 = new MockPreparedStatement('');
stmt1._setMockResults([
{ id: 5 },
{ id: 3 },
{ id: 1 }
]);
const stmt2 = new MockPreparedStatement('');
stmt2._setMockResults([
{ id: 5, workflow_id: 5, name: 'Template 5', workflow_json: '{}' },
{ id: 3, workflow_id: 3, name: 'Template 3', workflow_json: '{}' },
{ id: 1, workflow_id: 1, name: 'Template 1', workflow_json: '{}' }
]);
let callCount = 0;
mockAdapter.prepare = vi.fn((sql: string) => {
callCount++;
return callCount === 1 ? stmt1 : stmt2;
});
repository.searchTemplatesByMetadata({}, 10, 0);
// Check that phase 2 query maintains order: (5,0), (3,1), (1,2)
const phase2Query = mockAdapter.prepare.mock.calls[1][0];
expect(phase2Query).toContain('VALUES (5, 0), (3, 1), (1, 2)');
});
});
});