Add comprehensive test suite for express modules
Tests for: - user.ts: User class, roles, permissions, status checks - util.ts: loadFile utility - handlers.ts: multiHandler - types.ts: methodParser, requireAuth, requirePermission - logging.ts: module structure - database.ts: connectionConfig, raw queries, PostgresAuthStore - auth/token.ts: generateToken, hashToken, parseAuthorizationHeader - auth/password.ts: hashPassword, verifyPassword (scrypt) - auth/types.ts: Zod parsers, Session class, tokenLifetimes - auth/store.ts: InMemoryAuthStore - auth/service.ts: AuthService (login, register, verify, reset) - basic/*.ts: route structure tests Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This commit is contained in:
80
express/auth/password.spec.ts
Normal file
80
express/auth/password.spec.ts
Normal file
@@ -0,0 +1,80 @@
|
||||
// Tests for auth/password.ts
|
||||
// Pure unit tests - no database needed
|
||||
|
||||
import assert from "node:assert/strict";
|
||||
import { describe, it } from "node:test";
|
||||
import { hashPassword, verifyPassword } from "./password";
|
||||
|
||||
describe("password", () => {
|
||||
describe("hashPassword", () => {
|
||||
it("returns a scrypt formatted hash", async () => {
|
||||
const hash = await hashPassword("testpassword");
|
||||
assert.ok(hash.startsWith("$scrypt$"));
|
||||
});
|
||||
|
||||
it("includes all scrypt parameters", async () => {
|
||||
const hash = await hashPassword("testpassword");
|
||||
const parts = hash.split("$");
|
||||
// Format: $scrypt$N$r$p$salt$hash
|
||||
assert.equal(parts.length, 7);
|
||||
assert.equal(parts[0], "");
|
||||
assert.equal(parts[1], "scrypt");
|
||||
// N, r, p should be numbers
|
||||
assert.ok(!Number.isNaN(parseInt(parts[2], 10)));
|
||||
assert.ok(!Number.isNaN(parseInt(parts[3], 10)));
|
||||
assert.ok(!Number.isNaN(parseInt(parts[4], 10)));
|
||||
});
|
||||
|
||||
it("generates different hashes for same password (different salt)", async () => {
|
||||
const hash1 = await hashPassword("testpassword");
|
||||
const hash2 = await hashPassword("testpassword");
|
||||
assert.notEqual(hash1, hash2);
|
||||
});
|
||||
});
|
||||
|
||||
describe("verifyPassword", () => {
|
||||
it("returns true for correct password", async () => {
|
||||
const hash = await hashPassword("correctpassword");
|
||||
const result = await verifyPassword("correctpassword", hash);
|
||||
assert.equal(result, true);
|
||||
});
|
||||
|
||||
it("returns false for incorrect password", async () => {
|
||||
const hash = await hashPassword("correctpassword");
|
||||
const result = await verifyPassword("wrongpassword", hash);
|
||||
assert.equal(result, false);
|
||||
});
|
||||
|
||||
it("throws for invalid hash format", async () => {
|
||||
await assert.rejects(
|
||||
verifyPassword("password", "invalid-hash"),
|
||||
/Invalid password hash format/,
|
||||
);
|
||||
});
|
||||
|
||||
it("throws for non-scrypt hash", async () => {
|
||||
await assert.rejects(
|
||||
verifyPassword("password", "$bcrypt$10$salt$hash"),
|
||||
/Invalid password hash format/,
|
||||
);
|
||||
});
|
||||
|
||||
it("works with empty password", async () => {
|
||||
const hash = await hashPassword("");
|
||||
const result = await verifyPassword("", hash);
|
||||
assert.equal(result, true);
|
||||
});
|
||||
|
||||
it("works with unicode password", async () => {
|
||||
const hash = await hashPassword("p@$$w0rd\u{1F511}");
|
||||
const result = await verifyPassword("p@$$w0rd\u{1F511}", hash);
|
||||
assert.equal(result, true);
|
||||
});
|
||||
|
||||
it("is case sensitive", async () => {
|
||||
const hash = await hashPassword("Password");
|
||||
const result = await verifyPassword("password", hash);
|
||||
assert.equal(result, false);
|
||||
});
|
||||
});
|
||||
});
|
||||
419
express/auth/service.spec.ts
Normal file
419
express/auth/service.spec.ts
Normal file
@@ -0,0 +1,419 @@
|
||||
// Tests for auth/service.ts
|
||||
// Uses InMemoryAuthStore - no database needed
|
||||
|
||||
import assert from "node:assert/strict";
|
||||
import { beforeEach, describe, it } from "node:test";
|
||||
import { AuthService } from "./service";
|
||||
import { InMemoryAuthStore } from "./store";
|
||||
|
||||
describe("AuthService", () => {
|
||||
let store: InMemoryAuthStore;
|
||||
let service: AuthService;
|
||||
|
||||
beforeEach(() => {
|
||||
store = new InMemoryAuthStore();
|
||||
service = new AuthService(store);
|
||||
});
|
||||
|
||||
describe("register", () => {
|
||||
it("creates a new user", async () => {
|
||||
const result = await service.register(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
"Test User",
|
||||
);
|
||||
|
||||
assert.equal(result.success, true);
|
||||
if (result.success) {
|
||||
assert.equal(result.user.email, "test@example.com");
|
||||
assert.equal(result.user.displayName, "Test User");
|
||||
assert.ok(result.verificationToken.length > 0);
|
||||
}
|
||||
});
|
||||
|
||||
it("fails when email already registered", async () => {
|
||||
await service.register("test@example.com", "password123");
|
||||
const result = await service.register(
|
||||
"test@example.com",
|
||||
"password456",
|
||||
);
|
||||
|
||||
assert.equal(result.success, false);
|
||||
if (!result.success) {
|
||||
assert.equal(result.error, "Email already registered");
|
||||
}
|
||||
});
|
||||
|
||||
it("creates user without displayName", async () => {
|
||||
const result = await service.register(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
);
|
||||
|
||||
assert.equal(result.success, true);
|
||||
if (result.success) {
|
||||
assert.equal(result.user.displayName, undefined);
|
||||
}
|
||||
});
|
||||
});
|
||||
|
||||
describe("login", () => {
|
||||
beforeEach(async () => {
|
||||
// Create and verify a user
|
||||
const result = await service.register(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
"Test User",
|
||||
);
|
||||
if (result.success) {
|
||||
// Verify email to activate user
|
||||
await service.verifyEmail(result.verificationToken);
|
||||
}
|
||||
});
|
||||
|
||||
it("succeeds with correct credentials", async () => {
|
||||
const result = await service.login(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
"cookie",
|
||||
);
|
||||
|
||||
assert.equal(result.success, true);
|
||||
if (result.success) {
|
||||
assert.ok(result.token.length > 0);
|
||||
assert.equal(result.user.email, "test@example.com");
|
||||
}
|
||||
});
|
||||
|
||||
it("fails with wrong password", async () => {
|
||||
const result = await service.login(
|
||||
"test@example.com",
|
||||
"wrongpassword",
|
||||
"cookie",
|
||||
);
|
||||
|
||||
assert.equal(result.success, false);
|
||||
if (!result.success) {
|
||||
assert.equal(result.error, "Invalid credentials");
|
||||
}
|
||||
});
|
||||
|
||||
it("fails with unknown email", async () => {
|
||||
const result = await service.login(
|
||||
"unknown@example.com",
|
||||
"password123",
|
||||
"cookie",
|
||||
);
|
||||
|
||||
assert.equal(result.success, false);
|
||||
if (!result.success) {
|
||||
assert.equal(result.error, "Invalid credentials");
|
||||
}
|
||||
});
|
||||
|
||||
it("fails for inactive user", async () => {
|
||||
// Create a user but don't verify email (stays pending)
|
||||
await service.register("pending@example.com", "password123");
|
||||
|
||||
const result = await service.login(
|
||||
"pending@example.com",
|
||||
"password123",
|
||||
"cookie",
|
||||
);
|
||||
|
||||
assert.equal(result.success, false);
|
||||
if (!result.success) {
|
||||
assert.equal(result.error, "Account is not active");
|
||||
}
|
||||
});
|
||||
|
||||
it("stores metadata", async () => {
|
||||
const result = await service.login(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
"cookie",
|
||||
{ userAgent: "TestAgent", ipAddress: "192.168.1.1" },
|
||||
);
|
||||
|
||||
assert.equal(result.success, true);
|
||||
});
|
||||
});
|
||||
|
||||
describe("validateToken", () => {
|
||||
let token: string;
|
||||
|
||||
beforeEach(async () => {
|
||||
const regResult = await service.register(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
);
|
||||
if (regResult.success) {
|
||||
await service.verifyEmail(regResult.verificationToken);
|
||||
}
|
||||
|
||||
const loginResult = await service.login(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
"cookie",
|
||||
);
|
||||
if (loginResult.success) {
|
||||
token = loginResult.token;
|
||||
}
|
||||
});
|
||||
|
||||
it("returns authenticated for valid token", async () => {
|
||||
const result = await service.validateToken(token);
|
||||
|
||||
assert.equal(result.authenticated, true);
|
||||
if (result.authenticated) {
|
||||
assert.equal(result.user.email, "test@example.com");
|
||||
assert.notEqual(result.session, null);
|
||||
}
|
||||
});
|
||||
|
||||
it("returns unauthenticated for invalid token", async () => {
|
||||
const result = await service.validateToken("invalid-token");
|
||||
|
||||
assert.equal(result.authenticated, false);
|
||||
assert.equal(result.user.isAnonymous(), true);
|
||||
assert.equal(result.session, null);
|
||||
});
|
||||
});
|
||||
|
||||
describe("logout", () => {
|
||||
it("invalidates the session", async () => {
|
||||
const regResult = await service.register(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
);
|
||||
if (regResult.success) {
|
||||
await service.verifyEmail(regResult.verificationToken);
|
||||
}
|
||||
|
||||
const loginResult = await service.login(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
"cookie",
|
||||
);
|
||||
assert.equal(loginResult.success, true);
|
||||
if (!loginResult.success) return;
|
||||
|
||||
const token = loginResult.token;
|
||||
|
||||
// Token should be valid before logout
|
||||
const beforeLogout = await service.validateToken(token);
|
||||
assert.equal(beforeLogout.authenticated, true);
|
||||
|
||||
// Logout
|
||||
await service.logout(token);
|
||||
|
||||
// Token should be invalid after logout
|
||||
const afterLogout = await service.validateToken(token);
|
||||
assert.equal(afterLogout.authenticated, false);
|
||||
});
|
||||
});
|
||||
|
||||
describe("logoutAllSessions", () => {
|
||||
it("invalidates all user sessions", async () => {
|
||||
const regResult = await service.register(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
);
|
||||
if (regResult.success) {
|
||||
await service.verifyEmail(regResult.verificationToken);
|
||||
}
|
||||
|
||||
// Create multiple sessions
|
||||
const login1 = await service.login(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
"cookie",
|
||||
);
|
||||
const login2 = await service.login(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
"bearer",
|
||||
);
|
||||
|
||||
assert.equal(login1.success, true);
|
||||
assert.equal(login2.success, true);
|
||||
if (!login1.success || !login2.success) return;
|
||||
|
||||
// Both should be valid
|
||||
const before1 = await service.validateToken(login1.token);
|
||||
const before2 = await service.validateToken(login2.token);
|
||||
assert.equal(before1.authenticated, true);
|
||||
assert.equal(before2.authenticated, true);
|
||||
|
||||
// Logout all
|
||||
const user = await store.getUserByEmail("test@example.com");
|
||||
const count = await service.logoutAllSessions(user!.id);
|
||||
assert.equal(count, 2);
|
||||
|
||||
// Both should be invalid
|
||||
const after1 = await service.validateToken(login1.token);
|
||||
const after2 = await service.validateToken(login2.token);
|
||||
assert.equal(after1.authenticated, false);
|
||||
assert.equal(after2.authenticated, false);
|
||||
});
|
||||
});
|
||||
|
||||
describe("verifyEmail", () => {
|
||||
it("activates user with valid token", async () => {
|
||||
const regResult = await service.register(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
);
|
||||
assert.equal(regResult.success, true);
|
||||
if (!regResult.success) return;
|
||||
|
||||
const result = await service.verifyEmail(
|
||||
regResult.verificationToken,
|
||||
);
|
||||
assert.equal(result.success, true);
|
||||
|
||||
// User should now be active and can login
|
||||
const loginResult = await service.login(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
"cookie",
|
||||
);
|
||||
assert.equal(loginResult.success, true);
|
||||
});
|
||||
|
||||
it("fails with invalid token", async () => {
|
||||
const result = await service.verifyEmail("invalid-token");
|
||||
|
||||
assert.equal(result.success, false);
|
||||
if (!result.success) {
|
||||
assert.equal(
|
||||
result.error,
|
||||
"Invalid or expired verification token",
|
||||
);
|
||||
}
|
||||
});
|
||||
|
||||
it("fails when token already used", async () => {
|
||||
const regResult = await service.register(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
);
|
||||
assert.equal(regResult.success, true);
|
||||
if (!regResult.success) return;
|
||||
|
||||
// First verification succeeds
|
||||
const result1 = await service.verifyEmail(
|
||||
regResult.verificationToken,
|
||||
);
|
||||
assert.equal(result1.success, true);
|
||||
|
||||
// Second verification fails (token deleted)
|
||||
const result2 = await service.verifyEmail(
|
||||
regResult.verificationToken,
|
||||
);
|
||||
assert.equal(result2.success, false);
|
||||
});
|
||||
});
|
||||
|
||||
describe("createPasswordResetToken", () => {
|
||||
it("returns token for existing user", async () => {
|
||||
const regResult = await service.register(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
);
|
||||
assert.equal(regResult.success, true);
|
||||
|
||||
const result =
|
||||
await service.createPasswordResetToken("test@example.com");
|
||||
assert.notEqual(result, null);
|
||||
assert.ok(result!.token.length > 0);
|
||||
});
|
||||
|
||||
it("returns null for unknown email", async () => {
|
||||
const result = await service.createPasswordResetToken(
|
||||
"unknown@example.com",
|
||||
);
|
||||
assert.equal(result, null);
|
||||
});
|
||||
});
|
||||
|
||||
describe("resetPassword", () => {
|
||||
it("changes password with valid token", async () => {
|
||||
const regResult = await service.register(
|
||||
"test@example.com",
|
||||
"oldpassword",
|
||||
);
|
||||
if (regResult.success) {
|
||||
await service.verifyEmail(regResult.verificationToken);
|
||||
}
|
||||
|
||||
const resetToken =
|
||||
await service.createPasswordResetToken("test@example.com");
|
||||
assert.notEqual(resetToken, null);
|
||||
|
||||
const result = await service.resetPassword(
|
||||
resetToken!.token,
|
||||
"newpassword",
|
||||
);
|
||||
assert.equal(result.success, true);
|
||||
|
||||
// Old password should no longer work
|
||||
const loginOld = await service.login(
|
||||
"test@example.com",
|
||||
"oldpassword",
|
||||
"cookie",
|
||||
);
|
||||
assert.equal(loginOld.success, false);
|
||||
|
||||
// New password should work
|
||||
const loginNew = await service.login(
|
||||
"test@example.com",
|
||||
"newpassword",
|
||||
"cookie",
|
||||
);
|
||||
assert.equal(loginNew.success, true);
|
||||
});
|
||||
|
||||
it("fails with invalid token", async () => {
|
||||
const result = await service.resetPassword(
|
||||
"invalid-token",
|
||||
"newpassword",
|
||||
);
|
||||
|
||||
assert.equal(result.success, false);
|
||||
if (!result.success) {
|
||||
assert.equal(result.error, "Invalid or expired reset token");
|
||||
}
|
||||
});
|
||||
|
||||
it("invalidates all existing sessions", async () => {
|
||||
const regResult = await service.register(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
);
|
||||
if (regResult.success) {
|
||||
await service.verifyEmail(regResult.verificationToken);
|
||||
}
|
||||
|
||||
// Create a session
|
||||
const loginResult = await service.login(
|
||||
"test@example.com",
|
||||
"password123",
|
||||
"cookie",
|
||||
);
|
||||
assert.equal(loginResult.success, true);
|
||||
if (!loginResult.success) return;
|
||||
|
||||
const sessionToken = loginResult.token;
|
||||
|
||||
// Reset password
|
||||
const resetToken =
|
||||
await service.createPasswordResetToken("test@example.com");
|
||||
await service.resetPassword(resetToken!.token, "newpassword");
|
||||
|
||||
// Old session should be invalid
|
||||
const validateResult = await service.validateToken(sessionToken);
|
||||
assert.equal(validateResult.authenticated, false);
|
||||
});
|
||||
});
|
||||
});
|
||||
321
express/auth/store.spec.ts
Normal file
321
express/auth/store.spec.ts
Normal file
@@ -0,0 +1,321 @@
|
||||
// Tests for auth/store.ts (InMemoryAuthStore)
|
||||
// Pure unit tests - no database needed
|
||||
|
||||
import assert from "node:assert/strict";
|
||||
import { after, before, beforeEach, describe, it } from "node:test";
|
||||
import type { UserId } from "../user";
|
||||
import { InMemoryAuthStore } from "./store";
|
||||
import { hashToken } from "./token";
|
||||
import type { TokenId } from "./types";
|
||||
|
||||
describe("InMemoryAuthStore", () => {
|
||||
let store: InMemoryAuthStore;
|
||||
|
||||
beforeEach(() => {
|
||||
store = new InMemoryAuthStore();
|
||||
});
|
||||
|
||||
describe("createUser", () => {
|
||||
it("creates a user with pending status", async () => {
|
||||
const user = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
displayName: "Test User",
|
||||
});
|
||||
|
||||
assert.equal(user.email, "test@example.com");
|
||||
assert.equal(user.displayName, "Test User");
|
||||
assert.equal(user.status, "pending");
|
||||
});
|
||||
|
||||
it("creates a user without displayName", async () => {
|
||||
const user = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
assert.equal(user.email, "test@example.com");
|
||||
assert.equal(user.displayName, undefined);
|
||||
});
|
||||
|
||||
it("generates a unique id", async () => {
|
||||
const user1 = await store.createUser({
|
||||
email: "test1@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
const user2 = await store.createUser({
|
||||
email: "test2@example.com",
|
||||
passwordHash: "hash456",
|
||||
});
|
||||
|
||||
assert.notEqual(user1.id, user2.id);
|
||||
});
|
||||
});
|
||||
|
||||
describe("getUserByEmail", () => {
|
||||
it("returns user when found", async () => {
|
||||
await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
const user = await store.getUserByEmail("test@example.com");
|
||||
assert.notEqual(user, null);
|
||||
assert.equal(user!.email, "test@example.com");
|
||||
});
|
||||
|
||||
it("is case-insensitive", async () => {
|
||||
await store.createUser({
|
||||
email: "Test@Example.COM",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
const user = await store.getUserByEmail("test@example.com");
|
||||
assert.notEqual(user, null);
|
||||
});
|
||||
|
||||
it("returns null when not found", async () => {
|
||||
const user = await store.getUserByEmail("notfound@example.com");
|
||||
assert.equal(user, null);
|
||||
});
|
||||
});
|
||||
|
||||
describe("getUserById", () => {
|
||||
it("returns user when found", async () => {
|
||||
const created = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
const user = await store.getUserById(created.id);
|
||||
assert.notEqual(user, null);
|
||||
assert.equal(user!.id, created.id);
|
||||
});
|
||||
|
||||
it("returns null when not found", async () => {
|
||||
const user = await store.getUserById("nonexistent" as UserId);
|
||||
assert.equal(user, null);
|
||||
});
|
||||
});
|
||||
|
||||
describe("getUserPasswordHash", () => {
|
||||
it("returns hash when found", async () => {
|
||||
const user = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
const hash = await store.getUserPasswordHash(user.id);
|
||||
assert.equal(hash, "hash123");
|
||||
});
|
||||
|
||||
it("returns null when not found", async () => {
|
||||
const hash = await store.getUserPasswordHash(
|
||||
"nonexistent" as UserId,
|
||||
);
|
||||
assert.equal(hash, null);
|
||||
});
|
||||
});
|
||||
|
||||
describe("setUserPassword", () => {
|
||||
it("updates password hash", async () => {
|
||||
const user = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "oldhash",
|
||||
});
|
||||
|
||||
await store.setUserPassword(user.id, "newhash");
|
||||
|
||||
const hash = await store.getUserPasswordHash(user.id);
|
||||
assert.equal(hash, "newhash");
|
||||
});
|
||||
});
|
||||
|
||||
describe("updateUserEmailVerified", () => {
|
||||
it("sets user status to active", async () => {
|
||||
const created = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
assert.equal(created.status, "pending");
|
||||
|
||||
await store.updateUserEmailVerified(created.id);
|
||||
|
||||
const user = await store.getUserById(created.id);
|
||||
assert.equal(user!.status, "active");
|
||||
});
|
||||
});
|
||||
|
||||
describe("createSession", () => {
|
||||
it("creates a session with token", async () => {
|
||||
const user = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
const { token, session } = await store.createSession({
|
||||
userId: user.id,
|
||||
tokenType: "session",
|
||||
authMethod: "cookie",
|
||||
expiresAt: new Date(Date.now() + 3600000),
|
||||
});
|
||||
|
||||
assert.ok(token.length > 0);
|
||||
assert.equal(session.userId, user.id);
|
||||
assert.equal(session.tokenType, "session");
|
||||
assert.equal(session.authMethod, "cookie");
|
||||
});
|
||||
|
||||
it("stores metadata", async () => {
|
||||
const user = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
const { session } = await store.createSession({
|
||||
userId: user.id,
|
||||
tokenType: "session",
|
||||
authMethod: "cookie",
|
||||
expiresAt: new Date(Date.now() + 3600000),
|
||||
userAgent: "Mozilla/5.0",
|
||||
ipAddress: "127.0.0.1",
|
||||
});
|
||||
|
||||
assert.equal(session.userAgent, "Mozilla/5.0");
|
||||
assert.equal(session.ipAddress, "127.0.0.1");
|
||||
});
|
||||
});
|
||||
|
||||
describe("getSession", () => {
|
||||
it("returns session when found and not expired", async () => {
|
||||
const user = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
const { token } = await store.createSession({
|
||||
userId: user.id,
|
||||
tokenType: "session",
|
||||
authMethod: "cookie",
|
||||
expiresAt: new Date(Date.now() + 3600000), // 1 hour from now
|
||||
});
|
||||
|
||||
const tokenId = hashToken(token) as TokenId;
|
||||
const session = await store.getSession(tokenId);
|
||||
assert.notEqual(session, null);
|
||||
assert.equal(session!.userId, user.id);
|
||||
});
|
||||
|
||||
it("returns null for expired session", async () => {
|
||||
const user = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
const { token } = await store.createSession({
|
||||
userId: user.id,
|
||||
tokenType: "session",
|
||||
authMethod: "cookie",
|
||||
expiresAt: new Date(Date.now() - 1000), // Expired 1 second ago
|
||||
});
|
||||
|
||||
const tokenId = hashToken(token) as TokenId;
|
||||
const session = await store.getSession(tokenId);
|
||||
assert.equal(session, null);
|
||||
});
|
||||
|
||||
it("returns null for nonexistent session", async () => {
|
||||
const session = await store.getSession("nonexistent" as TokenId);
|
||||
assert.equal(session, null);
|
||||
});
|
||||
});
|
||||
|
||||
describe("deleteSession", () => {
|
||||
it("removes the session", async () => {
|
||||
const user = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
const { token } = await store.createSession({
|
||||
userId: user.id,
|
||||
tokenType: "session",
|
||||
authMethod: "cookie",
|
||||
expiresAt: new Date(Date.now() + 3600000),
|
||||
});
|
||||
|
||||
const tokenId = hashToken(token) as TokenId;
|
||||
await store.deleteSession(tokenId);
|
||||
|
||||
const session = await store.getSession(tokenId);
|
||||
assert.equal(session, null);
|
||||
});
|
||||
});
|
||||
|
||||
describe("deleteUserSessions", () => {
|
||||
it("removes all sessions for user", async () => {
|
||||
const user = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
const { token: token1 } = await store.createSession({
|
||||
userId: user.id,
|
||||
tokenType: "session",
|
||||
authMethod: "cookie",
|
||||
expiresAt: new Date(Date.now() + 3600000),
|
||||
});
|
||||
|
||||
const { token: token2 } = await store.createSession({
|
||||
userId: user.id,
|
||||
tokenType: "session",
|
||||
authMethod: "bearer",
|
||||
expiresAt: new Date(Date.now() + 3600000),
|
||||
});
|
||||
|
||||
const count = await store.deleteUserSessions(user.id);
|
||||
assert.equal(count, 2);
|
||||
|
||||
const session1 = await store.getSession(
|
||||
hashToken(token1) as TokenId,
|
||||
);
|
||||
const session2 = await store.getSession(
|
||||
hashToken(token2) as TokenId,
|
||||
);
|
||||
assert.equal(session1, null);
|
||||
assert.equal(session2, null);
|
||||
});
|
||||
|
||||
it("returns 0 when user has no sessions", async () => {
|
||||
const count = await store.deleteUserSessions(
|
||||
"nonexistent" as UserId,
|
||||
);
|
||||
assert.equal(count, 0);
|
||||
});
|
||||
});
|
||||
|
||||
describe("updateLastUsed", () => {
|
||||
it("updates lastUsedAt timestamp", async () => {
|
||||
const user = await store.createUser({
|
||||
email: "test@example.com",
|
||||
passwordHash: "hash123",
|
||||
});
|
||||
|
||||
const { token } = await store.createSession({
|
||||
userId: user.id,
|
||||
tokenType: "session",
|
||||
authMethod: "cookie",
|
||||
expiresAt: new Date(Date.now() + 3600000),
|
||||
});
|
||||
|
||||
const tokenId = hashToken(token) as TokenId;
|
||||
const beforeUpdate = await store.getSession(tokenId);
|
||||
assert.equal(beforeUpdate!.lastUsedAt, undefined);
|
||||
|
||||
await store.updateLastUsed(tokenId);
|
||||
|
||||
const afterUpdate = await store.getSession(tokenId);
|
||||
assert.ok(afterUpdate!.lastUsedAt instanceof Date);
|
||||
});
|
||||
});
|
||||
});
|
||||
94
express/auth/token.spec.ts
Normal file
94
express/auth/token.spec.ts
Normal file
@@ -0,0 +1,94 @@
|
||||
// Tests for auth/token.ts
|
||||
// Pure unit tests - no database needed
|
||||
|
||||
import assert from "node:assert/strict";
|
||||
import { describe, it } from "node:test";
|
||||
import {
|
||||
generateToken,
|
||||
hashToken,
|
||||
parseAuthorizationHeader,
|
||||
SESSION_COOKIE_NAME,
|
||||
} from "./token";
|
||||
|
||||
describe("token", () => {
|
||||
describe("generateToken", () => {
|
||||
it("generates a non-empty string", () => {
|
||||
const token = generateToken();
|
||||
assert.equal(typeof token, "string");
|
||||
assert.ok(token.length > 0);
|
||||
});
|
||||
|
||||
it("generates unique tokens", () => {
|
||||
const tokens = new Set<string>();
|
||||
for (let i = 0; i < 100; i++) {
|
||||
tokens.add(generateToken());
|
||||
}
|
||||
assert.equal(tokens.size, 100);
|
||||
});
|
||||
|
||||
it("generates base64url encoded tokens", () => {
|
||||
const token = generateToken();
|
||||
// base64url uses A-Z, a-z, 0-9, -, _
|
||||
assert.match(token, /^[A-Za-z0-9_-]+$/);
|
||||
});
|
||||
});
|
||||
|
||||
describe("hashToken", () => {
|
||||
it("returns a hex string", () => {
|
||||
const hash = hashToken("test-token");
|
||||
assert.match(hash, /^[a-f0-9]+$/);
|
||||
});
|
||||
|
||||
it("returns consistent hash for same input", () => {
|
||||
const hash1 = hashToken("test-token");
|
||||
const hash2 = hashToken("test-token");
|
||||
assert.equal(hash1, hash2);
|
||||
});
|
||||
|
||||
it("returns different hash for different input", () => {
|
||||
const hash1 = hashToken("token-1");
|
||||
const hash2 = hashToken("token-2");
|
||||
assert.notEqual(hash1, hash2);
|
||||
});
|
||||
|
||||
it("returns 64 character hash (SHA-256)", () => {
|
||||
const hash = hashToken("test-token");
|
||||
assert.equal(hash.length, 64);
|
||||
});
|
||||
});
|
||||
|
||||
describe("parseAuthorizationHeader", () => {
|
||||
it("returns null for undefined header", () => {
|
||||
assert.equal(parseAuthorizationHeader(undefined), null);
|
||||
});
|
||||
|
||||
it("returns null for empty string", () => {
|
||||
assert.equal(parseAuthorizationHeader(""), null);
|
||||
});
|
||||
|
||||
it("returns null for non-bearer auth", () => {
|
||||
assert.equal(parseAuthorizationHeader("Basic abc123"), null);
|
||||
});
|
||||
|
||||
it("returns null for malformed header", () => {
|
||||
assert.equal(parseAuthorizationHeader("Bearer"), null);
|
||||
assert.equal(parseAuthorizationHeader("Bearer token extra"), null);
|
||||
});
|
||||
|
||||
it("extracts token from valid bearer header", () => {
|
||||
assert.equal(parseAuthorizationHeader("Bearer abc123"), "abc123");
|
||||
});
|
||||
|
||||
it("is case-insensitive for Bearer keyword", () => {
|
||||
assert.equal(parseAuthorizationHeader("bearer abc123"), "abc123");
|
||||
assert.equal(parseAuthorizationHeader("BEARER abc123"), "abc123");
|
||||
});
|
||||
});
|
||||
|
||||
describe("SESSION_COOKIE_NAME", () => {
|
||||
it("is defined", () => {
|
||||
assert.equal(typeof SESSION_COOKIE_NAME, "string");
|
||||
assert.ok(SESSION_COOKIE_NAME.length > 0);
|
||||
});
|
||||
});
|
||||
});
|
||||
253
express/auth/types.spec.ts
Normal file
253
express/auth/types.spec.ts
Normal file
@@ -0,0 +1,253 @@
|
||||
// Tests for auth/types.ts
|
||||
// Pure unit tests - no database needed
|
||||
|
||||
import assert from "node:assert/strict";
|
||||
import { describe, it } from "node:test";
|
||||
import { z } from "zod";
|
||||
import { AuthenticatedUser, anonymousUser } from "../user";
|
||||
import {
|
||||
authMethodParser,
|
||||
forgotPasswordInputParser,
|
||||
loginInputParser,
|
||||
registerInputParser,
|
||||
resetPasswordInputParser,
|
||||
Session,
|
||||
sessionDataParser,
|
||||
tokenLifetimes,
|
||||
tokenTypeParser,
|
||||
} from "./types";
|
||||
|
||||
describe("auth/types", () => {
|
||||
describe("tokenTypeParser", () => {
|
||||
it("accepts valid token types", () => {
|
||||
assert.equal(tokenTypeParser.parse("session"), "session");
|
||||
assert.equal(
|
||||
tokenTypeParser.parse("password_reset"),
|
||||
"password_reset",
|
||||
);
|
||||
assert.equal(tokenTypeParser.parse("email_verify"), "email_verify");
|
||||
});
|
||||
|
||||
it("rejects invalid token types", () => {
|
||||
assert.throws(() => tokenTypeParser.parse("invalid"));
|
||||
});
|
||||
});
|
||||
|
||||
describe("authMethodParser", () => {
|
||||
it("accepts valid auth methods", () => {
|
||||
assert.equal(authMethodParser.parse("cookie"), "cookie");
|
||||
assert.equal(authMethodParser.parse("bearer"), "bearer");
|
||||
});
|
||||
|
||||
it("rejects invalid auth methods", () => {
|
||||
assert.throws(() => authMethodParser.parse("basic"));
|
||||
});
|
||||
});
|
||||
|
||||
describe("sessionDataParser", () => {
|
||||
it("accepts valid session data", () => {
|
||||
const data = {
|
||||
tokenId: "abc123",
|
||||
userId: "user-1",
|
||||
tokenType: "session",
|
||||
authMethod: "cookie",
|
||||
createdAt: new Date(),
|
||||
expiresAt: new Date(),
|
||||
};
|
||||
const result = sessionDataParser.parse(data);
|
||||
assert.equal(result.tokenId, "abc123");
|
||||
assert.equal(result.userId, "user-1");
|
||||
});
|
||||
|
||||
it("coerces date strings to dates", () => {
|
||||
const data = {
|
||||
tokenId: "abc123",
|
||||
userId: "user-1",
|
||||
tokenType: "session",
|
||||
authMethod: "cookie",
|
||||
createdAt: "2025-01-01T00:00:00Z",
|
||||
expiresAt: "2025-01-02T00:00:00Z",
|
||||
};
|
||||
const result = sessionDataParser.parse(data);
|
||||
assert.ok(result.createdAt instanceof Date);
|
||||
assert.ok(result.expiresAt instanceof Date);
|
||||
});
|
||||
|
||||
it("accepts optional fields", () => {
|
||||
const data = {
|
||||
tokenId: "abc123",
|
||||
userId: "user-1",
|
||||
tokenType: "session",
|
||||
authMethod: "cookie",
|
||||
createdAt: new Date(),
|
||||
expiresAt: new Date(),
|
||||
lastUsedAt: new Date(),
|
||||
userAgent: "Mozilla/5.0",
|
||||
ipAddress: "127.0.0.1",
|
||||
isUsed: true,
|
||||
};
|
||||
const result = sessionDataParser.parse(data);
|
||||
assert.equal(result.userAgent, "Mozilla/5.0");
|
||||
assert.equal(result.ipAddress, "127.0.0.1");
|
||||
assert.equal(result.isUsed, true);
|
||||
});
|
||||
});
|
||||
|
||||
describe("loginInputParser", () => {
|
||||
it("accepts valid login input", () => {
|
||||
const result = loginInputParser.parse({
|
||||
email: "test@example.com",
|
||||
password: "secret",
|
||||
});
|
||||
assert.equal(result.email, "test@example.com");
|
||||
assert.equal(result.password, "secret");
|
||||
});
|
||||
|
||||
it("rejects invalid email", () => {
|
||||
assert.throws(() =>
|
||||
loginInputParser.parse({
|
||||
email: "not-an-email",
|
||||
password: "secret",
|
||||
}),
|
||||
);
|
||||
});
|
||||
|
||||
it("rejects empty password", () => {
|
||||
assert.throws(() =>
|
||||
loginInputParser.parse({
|
||||
email: "test@example.com",
|
||||
password: "",
|
||||
}),
|
||||
);
|
||||
});
|
||||
});
|
||||
|
||||
describe("registerInputParser", () => {
|
||||
it("accepts valid registration input", () => {
|
||||
const result = registerInputParser.parse({
|
||||
email: "test@example.com",
|
||||
password: "password123",
|
||||
displayName: "Test User",
|
||||
});
|
||||
assert.equal(result.email, "test@example.com");
|
||||
assert.equal(result.password, "password123");
|
||||
assert.equal(result.displayName, "Test User");
|
||||
});
|
||||
|
||||
it("accepts registration without displayName", () => {
|
||||
const result = registerInputParser.parse({
|
||||
email: "test@example.com",
|
||||
password: "password123",
|
||||
});
|
||||
assert.equal(result.displayName, undefined);
|
||||
});
|
||||
|
||||
it("rejects password shorter than 8 characters", () => {
|
||||
assert.throws(() =>
|
||||
registerInputParser.parse({
|
||||
email: "test@example.com",
|
||||
password: "short",
|
||||
}),
|
||||
);
|
||||
});
|
||||
});
|
||||
|
||||
describe("forgotPasswordInputParser", () => {
|
||||
it("accepts valid email", () => {
|
||||
const result = forgotPasswordInputParser.parse({
|
||||
email: "test@example.com",
|
||||
});
|
||||
assert.equal(result.email, "test@example.com");
|
||||
});
|
||||
|
||||
it("rejects invalid email", () => {
|
||||
assert.throws(() =>
|
||||
forgotPasswordInputParser.parse({
|
||||
email: "invalid",
|
||||
}),
|
||||
);
|
||||
});
|
||||
});
|
||||
|
||||
describe("resetPasswordInputParser", () => {
|
||||
it("accepts valid reset input", () => {
|
||||
const result = resetPasswordInputParser.parse({
|
||||
token: "abc123",
|
||||
password: "newpassword",
|
||||
});
|
||||
assert.equal(result.token, "abc123");
|
||||
assert.equal(result.password, "newpassword");
|
||||
});
|
||||
|
||||
it("rejects empty token", () => {
|
||||
assert.throws(() =>
|
||||
resetPasswordInputParser.parse({
|
||||
token: "",
|
||||
password: "newpassword",
|
||||
}),
|
||||
);
|
||||
});
|
||||
|
||||
it("rejects password shorter than 8 characters", () => {
|
||||
assert.throws(() =>
|
||||
resetPasswordInputParser.parse({
|
||||
token: "abc123",
|
||||
password: "short",
|
||||
}),
|
||||
);
|
||||
});
|
||||
});
|
||||
|
||||
describe("tokenLifetimes", () => {
|
||||
it("defines session lifetime", () => {
|
||||
assert.ok(tokenLifetimes.session > 0);
|
||||
// 30 days in ms
|
||||
assert.equal(tokenLifetimes.session, 30 * 24 * 60 * 60 * 1000);
|
||||
});
|
||||
|
||||
it("defines password_reset lifetime", () => {
|
||||
assert.ok(tokenLifetimes.password_reset > 0);
|
||||
// 1 hour in ms
|
||||
assert.equal(tokenLifetimes.password_reset, 1 * 60 * 60 * 1000);
|
||||
});
|
||||
|
||||
it("defines email_verify lifetime", () => {
|
||||
assert.ok(tokenLifetimes.email_verify > 0);
|
||||
// 24 hours in ms
|
||||
assert.equal(tokenLifetimes.email_verify, 24 * 60 * 60 * 1000);
|
||||
});
|
||||
});
|
||||
|
||||
describe("Session", () => {
|
||||
it("wraps authenticated session", () => {
|
||||
const user = AuthenticatedUser.create("test@example.com", {
|
||||
id: "user-1",
|
||||
});
|
||||
const sessionData = {
|
||||
tokenId: "token-1",
|
||||
userId: "user-1",
|
||||
tokenType: "session" as const,
|
||||
authMethod: "cookie" as const,
|
||||
createdAt: new Date(),
|
||||
expiresAt: new Date(),
|
||||
};
|
||||
const session = new Session(sessionData, user);
|
||||
|
||||
assert.equal(session.isAuthenticated(), true);
|
||||
assert.equal(session.getUser(), user);
|
||||
assert.equal(session.getData(), sessionData);
|
||||
assert.equal(session.tokenId, "token-1");
|
||||
assert.equal(session.userId, "user-1");
|
||||
});
|
||||
|
||||
it("wraps anonymous session", () => {
|
||||
const session = new Session(null, anonymousUser);
|
||||
|
||||
assert.equal(session.isAuthenticated(), false);
|
||||
assert.equal(session.getUser(), anonymousUser);
|
||||
assert.equal(session.getData(), null);
|
||||
assert.equal(session.tokenId, undefined);
|
||||
assert.equal(session.userId, undefined);
|
||||
});
|
||||
});
|
||||
});
|
||||
Reference in New Issue
Block a user