db(couchdb): auto-provision databases on startup for production strategy; add TokenService with CouchDB-backed token storage and localStorage fallback; switch OAuth to unified config for client IDs and redirect URI; express Request typing for req.user; align exportAsEnvVars with show-config expectations; remove Vite importmap from index.html; prefer babel-jest over ts-jest; remove duplicate uuid mocking from Jest config

This commit is contained in:
William Valentin
2025-09-09 12:30:38 -07:00
parent 062e0973c1
commit 15170a4f43
17 changed files with 1097 additions and 67 deletions

View File

@@ -0,0 +1,336 @@
import type { EmailVerificationToken } from '../../auth.types';
// Integration tests for TokenService against a live CouchDB instance.
// These tests require a local CouchDB at http://localhost:5984 with admin:password
// or credentials provided via environment variables.
//
// To run only these tests:
// jest meds/services/auth/__tests__/integration/token.service.integration.test.ts
//
// Skips automatically if CouchDB is not reachable.
describe('TokenService (integration with CouchDB)', () => {
const COUCH_URL =
process.env.VITE_COUCHDB_URL ||
process.env.COUCHDB_URL ||
'http://localhost:5984';
const COUCH_USER =
process.env.VITE_COUCHDB_USER || process.env.COUCHDB_USER || 'admin';
const COUCH_PASS =
process.env.VITE_COUCHDB_PASSWORD ||
process.env.COUCHDB_PASSWORD ||
'password';
const BASIC_AUTH =
'Basic ' + Buffer.from(`${COUCH_USER}:${COUCH_PASS}`).toString('base64');
let couchUp = false;
let previousFetch: typeof fetch | undefined;
let previousHeaders: typeof Headers | undefined;
let previousRequest: typeof Request | undefined;
let previousResponse: typeof Response | undefined;
// TokenService and its dependencies will be imported after configuring env and fetch.
let tokenService: any;
// Utility: install a custom HTTP(S) fetch to reach real CouchDB (bypass test mocks)
const installCustomFetch = async () => {
previousFetch = global.fetch;
previousHeaders = global.Headers as typeof Headers | undefined;
previousRequest = global.Request as typeof Request | undefined;
previousResponse = global.Response as typeof Response | undefined;
// Use Node core undici (Node 18+)
// Install a minimal HTTP(S)-based fetch to bypass test mocks
const customFetch = async (url: string, init?: RequestInit) => {
const { URL } = await import('node:url');
const http = await import('node:http');
const https = await import('node:https');
const u = new URL(url);
const isHttps = u.protocol === 'https:';
const mod = isHttps ? https : http;
const headers = init?.headers as Record<string, string> | undefined;
const method = init?.method || 'GET';
const body = init?.body as string | undefined;
return await new Promise<Response>((resolve, reject) => {
const req = mod.request(
{
protocol: u.protocol,
hostname: u.hostname,
port: u.port || (isHttps ? 443 : 80),
path: u.pathname + (u.search || ''),
method,
headers,
},
res => {
const chunks: Buffer[] = [];
res.on('data', d =>
chunks.push(Buffer.isBuffer(d) ? d : Buffer.from(d))
);
res.on('end', () => {
const buf = Buffer.concat(chunks);
const status = res.statusCode || 0;
const headersMap = new Map<string, string>();
for (const [k, v] of Object.entries(res.headers)) {
if (Array.isArray(v)) headersMap.set(k, v.join(', '));
else if (v != null) headersMap.set(k, String(v));
}
const responseLike = {
ok: status >= 200 && status < 300,
status,
headers: {
get: (k: string) =>
headersMap.get(k.toLowerCase()) ||
headersMap.get(k) ||
null,
has: (k: string) =>
headersMap.has(k.toLowerCase()) || headersMap.has(k),
},
json: async () => {
const txt = buf.toString('utf8');
return txt ? JSON.parse(txt) : {};
},
text: async () => buf.toString('utf8'),
} as unknown as Response;
resolve(responseLike);
});
}
);
req.on('error', reject);
if (body) req.write(body);
req.end();
});
};
// Override global fetch temporarily
// @ts-ignore - test environment mutation
global.fetch = customFetch as unknown as typeof fetch;
};
const restoreMockFetch = () => {
if (previousFetch) global.fetch = previousFetch;
if (previousHeaders) global.Headers = previousHeaders as typeof Headers;
if (previousRequest) global.Request = previousRequest as typeof Request;
if (previousResponse) global.Response = previousResponse as typeof Response;
};
const pingCouch = async (): Promise<boolean> => {
try {
const res = await fetch(`${COUCH_URL}/`, {
headers: { Authorization: BASIC_AUTH },
});
return res.ok;
} catch {
return false;
}
};
beforeAll(async () => {
// Use development settings and disable mock DB so TokenService uses CouchDB
process.env.NODE_ENV = 'development';
process.env.USE_MOCK_DB = 'false';
process.env.VITE_COUCHDB_URL = COUCH_URL;
process.env.VITE_COUCHDB_USER = COUCH_USER;
process.env.VITE_COUCHDB_PASSWORD = COUCH_PASS;
await installCustomFetch();
// Verify CouchDB is reachable
couchUp = await pingCouch();
if (!couchUp) {
console.warn(
`⚠️ CouchDB not reachable at ${COUCH_URL}. Skipping TokenService integration tests.`
);
restoreMockFetch();
return;
}
// Ensure a clean module graph and import TokenService fresh with current env
jest.resetModules();
// import after env is set so unified config picks up these values
const mod = await import('../../token.service');
tokenService = mod.tokenService;
// Trigger DB provisioning just in case
// Save a no-op token then delete it; this ensures database exists.
const bootstrapToken = `bootstrap-${Date.now()}`;
await tokenService.savePasswordResetToken({
userId: 'bootstrap',
email: 'bootstrap@example.com',
token: bootstrapToken,
expiresAt: new Date(Date.now() + 60_000),
});
await tokenService.deletePasswordResetToken(bootstrapToken);
}, 30000);
afterAll(async () => {
if (couchUp) {
try {
// Best-effort cleanup of expired tokens
await tokenService.cleanupExpiredTokens();
} catch {
// ignore
}
}
// Restore original mocked fetch for the rest of the test suite
restoreMockFetch();
});
const itIf = (cond: boolean) => (cond ? it : it.skip);
itIf(couchUp)(
'saves and retrieves a verification token',
async () => {
const tokenValue = `ver-${Date.now()}-${Math.random()
.toString(16)
.slice(2)}`;
const userId = `u-${Date.now()}`;
const email = `user-${Date.now()}@example.com`;
const expiresAt = new Date(Date.now() + 5 * 60_000);
const token: EmailVerificationToken = {
userId,
email,
token: tokenValue,
expiresAt,
};
await tokenService.saveVerificationToken(token);
const fetched = await tokenService.findVerificationToken(tokenValue);
expect(fetched).toBeTruthy();
expect(fetched.userId).toBe(userId);
expect(fetched.email).toBe(email);
expect(new Date(fetched.expiresAt).getTime()).toBe(expiresAt.getTime());
// Cleanup
await tokenService.deleteVerificationTokensForUser(userId);
const after = await tokenService.findVerificationToken(tokenValue);
expect(after).toBeNull();
},
30000
);
itIf(couchUp)(
'deletes only verification tokens for the specified user',
async () => {
const tokenA = `verA-${Date.now()}-${Math.random()
.toString(16)
.slice(2)}`;
const tokenB = `verB-${Date.now()}-${Math.random()
.toString(16)
.slice(2)}`;
const userA = `userA-${Date.now()}`;
const userB = `userB-${Date.now()}`;
const exp = new Date(Date.now() + 10 * 60_000);
await tokenService.saveVerificationToken({
userId: userA,
email: 'a@example.com',
token: tokenA,
expiresAt: exp,
});
await tokenService.saveVerificationToken({
userId: userB,
email: 'b@example.com',
token: tokenB,
expiresAt: exp,
});
// Delete tokens for userA
await tokenService.deleteVerificationTokensForUser(userA);
// Verify A is deleted
const fa = await tokenService.findVerificationToken(tokenA);
expect(fa).toBeNull();
// Verify B still exists
const fb = await tokenService.findVerificationToken(tokenB);
expect(fb).toBeTruthy();
expect(fb.userId).toBe(userB);
// Cleanup B
await tokenService.deleteVerificationTokensForUser(userB);
const fbAfter = await tokenService.findVerificationToken(tokenB);
expect(fbAfter).toBeNull();
},
30000
);
itIf(couchUp)(
'password reset token lifecycle (save, find, delete)',
async () => {
const tokenValue = `rst-${Date.now()}-${Math.random()
.toString(16)
.slice(2)}`;
const userId = `u-${Date.now()}`;
const email = `reset-${Date.now()}@example.com`;
const exp = new Date(Date.now() + 5 * 60_000);
await tokenService.savePasswordResetToken({
userId,
email,
token: tokenValue,
expiresAt: exp,
});
const fetched = await tokenService.findPasswordResetToken(tokenValue);
expect(fetched).toBeTruthy();
expect(fetched.userId).toBe(userId);
expect(fetched.email).toBe(email);
await tokenService.deletePasswordResetToken(tokenValue);
const after = await tokenService.findPasswordResetToken(tokenValue);
expect(after).toBeNull();
},
30000
);
itIf(couchUp)(
'cleanup removes expired tokens',
async () => {
const expiredToken = `expired-${Date.now()}-${Math.random()
.toString(16)
.slice(2)}`;
const userId = `u-exp-${Date.now()}`;
const email = `expired-${Date.now()}@example.com`;
const past = new Date(Date.now() - 60_000);
// Save one expired verification token
await tokenService.saveVerificationToken({
userId,
email,
token: expiredToken,
expiresAt: past,
});
// And one valid token to ensure only expired is removed
const validToken = `valid-${Date.now()}-${Math.random()
.toString(16)
.slice(2)}`;
const future = new Date(Date.now() + 60_000);
await tokenService.saveVerificationToken({
userId,
email,
token: validToken,
expiresAt: future,
});
const removed = await tokenService.cleanupExpiredTokens();
expect(removed).toBeGreaterThanOrEqual(1);
const expiredFetched =
await tokenService.findVerificationToken(expiredToken);
expect(expiredFetched).toBeNull();
const validFetched = await tokenService.findVerificationToken(validToken);
expect(validFetched).toBeTruthy();
// Cleanup valid
await tokenService.deleteVerificationTokensForUser(userId);
const validAfter = await tokenService.findVerificationToken(validToken);
expect(validAfter).toBeNull();
},
30000
);
});