UNPKG

create-cf-planetscale-app

Version:

Create a Cloudflare workers app for building production ready RESTful APIs using Hono

611 lines (550 loc) 23.7 kB
import { faker } from '@faker-js/faker' import jwt from '@tsndr/cloudflare-worker-jwt' import { env, fetchMock } from 'cloudflare:test' import httpStatus from 'http-status' import { describe, expect, test, beforeAll, afterEach } from 'vitest' import { authProviders } from '../../../../src/config/authProviders' import { getConfig } from '../../../../src/config/config' import { getDBClient } from '../../../../src/config/database' import { tokenTypes } from '../../../../src/config/tokens' import { AppleUserType } from '../../../../src/types/oauth.types' import { appleAuthorisation, githubAuthorisation, googleAuthorisation, insertAuthorisations } from '../../../fixtures/authorisations.fixture' import { getAccessToken } from '../../../fixtures/token.fixture' import { userOne, insertUsers, userTwo } from '../../../fixtures/user.fixture' import { clearDBTables } from '../../../utils/clear-db-tables' import { request } from '../../../utils/test-request' const config = getConfig(env) const client = getDBClient(config.database) clearDBTables(['authorisations', 'user'], config.database) describe('Oauth Apple routes', () => { describe('GET /v1/auth/apple/redirect', () => { test('should return 302 and successfully redirect to apple', async () => { const state = btoa(JSON.stringify({ platform: 'web' })) const urlEncodedRedirectUrl = encodeURIComponent(config.oauth.provider.apple.redirectUrl) const res = await request(`/v1/auth/apple/redirect?state=${state}`, { method: 'GET' }) expect(res.status).toBe(httpStatus.FOUND) expect(res.headers.get('location')).toContain( 'https://appleid.apple.com/auth/authorize?client_id=myclientid&redirect_uri=' + `${urlEncodedRedirectUrl}&response_mode=form_post&response_type=code&scope=email` + `&state=${state}` ) }) test('should return 400 error if state is not provided', async () => { const res = await request('/v1/auth/apple/redirect', { method: 'GET' }) expect(res.status).toBe(httpStatus.BAD_REQUEST) }) test('should return 400 error if state platform is not provided', async () => { const state = btoa(JSON.stringify({})) const res = await request(`/v1/auth/apple/redirect?state=${state}`, { method: 'GET' }) expect(res.status).toBe(httpStatus.BAD_REQUEST) }) test('should return 400 error if state platform is invalid', async () => { const state = btoa(JSON.stringify({ platform: 'fake' })) const res = await request(`/v1/auth/apple/redirect?state=${state}`, { method: 'GET' }) expect(res.status).toBe(httpStatus.BAD_REQUEST) }) }) describe('POST /v1/auth/apple/callback', () => { let newUser: AppleUserType let state: string beforeAll(async () => { newUser = { sub: faker.number.int().toString(), name: faker.person.fullName(), email: faker.internet.email() } fetchMock.activate() state = btoa(JSON.stringify({ platform: 'web' })) }) afterEach(() => fetchMock.assertNoPendingInterceptors()) test('should return 200 and successfully register + redirect with one time code', async () => { const mockJWT = await jwt.sign(newUser, 'randomSecret') const appleMock = fetchMock.get('https://appleid.apple.com') appleMock .intercept({ method: 'POST', path: '/auth/token' }) .reply(200, JSON.stringify({ id_token: mockJWT })) const providerId = '123456' const formData = new FormData() formData.append('code', providerId) formData.append('state', state) const res = await request('/v1/auth/apple/callback', { method: 'POST', body: formData }) expect(res.status).toBe(httpStatus.FOUND) expect(res.headers.get('location')).toContain( `${config.oauth.platform.ios.redirectUrl}?oneTimeCode=` ) const location = res.headers.get('location') const oneTimeCode = location?.split('=')[1].split('&')[0] expect(oneTimeCode).toBeDefined() if (!oneTimeCode) return const returnedState = location?.split('=')[2] expect(returnedState).toBe(state) const dbOneTimeCode = await client .selectFrom('one_time_oauth_code') .selectAll() .where('one_time_oauth_code.code', '=', oneTimeCode) .executeTakeFirst() expect(dbOneTimeCode).toBeDefined() if (!dbOneTimeCode) return expect(dbOneTimeCode).toEqual({ code: oneTimeCode, user_id: expect.any(String), access_token: expect.any(String), access_token_expires_at: expect.any(Date), refresh_token: expect.any(String), refresh_token_expires_at: expect.any(Date), expires_at: expect.any(Date), created_at: expect.any(Date), updated_at: expect.any(Date) }) const dbUser = await client .selectFrom('user') .selectAll() .where('user.id', '=', dbOneTimeCode.user_id) .executeTakeFirst() expect(dbUser).toBeDefined() if (!dbUser) return expect(dbUser.password).toBeNull() expect(dbUser).toMatchObject({ name: newUser.name, password: null, email: newUser.email, role: 'user', is_email_verified: 1 }) const oauthUser = await client .selectFrom('authorisations') .selectAll() .where('authorisations.provider_type', '=', authProviders.APPLE) .where('authorisations.user_id', '=', dbOneTimeCode.user_id) .where('authorisations.provider_user_id', '=', newUser.sub) .executeTakeFirst() expect(oauthUser).toBeDefined() if (!oauthUser) return }) test('should redirect and successfully login user if already created', async () => { await insertUsers([userOne], config.database) const appleUser = appleAuthorisation(userOne.id) await insertAuthorisations([appleUser], config.database) newUser.sub = appleUser.provider_user_id const mockJWT = await jwt.sign(newUser, 'randomSecret') const appleMock = fetchMock.get('https://appleid.apple.com') appleMock .intercept({ method: 'POST', path: '/auth/token' }) .reply(200, JSON.stringify({ id_token: mockJWT })) const providerId = '123456' const formData = new FormData() formData.append('code', providerId) formData.append('state', state) const res = await request('/v1/auth/apple/callback', { method: 'POST', body: formData }) expect(res.status).toBe(httpStatus.FOUND) expect(res.headers.get('location')).toContain( `${config.oauth.platform.ios.redirectUrl}?oneTimeCode=` ) expect(res.headers.get('location')).toContain(`state=${state}`) }) test('should redirect with error if user exists but has not linked their apple', async () => { await insertUsers([userOne], config.database) newUser.email = userOne.email const mockJWT = await jwt.sign(newUser, 'randomSecret') const appleMock = fetchMock.get('https://appleid.apple.com') appleMock .intercept({ method: 'POST', path: '/auth/token' }) .reply(200, JSON.stringify({ id_token: mockJWT })) const providerId = '123456' const formData = new FormData() formData.append('code', providerId) formData.append('state', state) const res = await request('/v1/auth/apple/callback', { method: 'POST', body: formData }) expect(res.status).toBe(httpStatus.FOUND) const encodedError = 'Cannot%20signup%20with%20apple,' + '%20user%20already%20exists%20with%20that%20email' expect(res.headers.get('location')).toBe( `${config.oauth.platform.ios.redirectUrl}?error=${encodedError}&state=${state}` ) }) //TODO: return custom error message for this scenario test('should redirect with error if no apple email is provided', async () => { delete newUser.email const mockJWT = await jwt.sign(newUser, 'randomSecret') const appleMock = fetchMock.get('https://appleid.apple.com') appleMock .intercept({ method: 'POST', path: '/auth/token' }) .reply(200, JSON.stringify({ id_token: mockJWT })) const providerId = '123456' const formData = new FormData() formData.append('state', state) formData.append('code', providerId) const res = await request('/v1/auth/apple/callback', { method: 'POST', body: formData }) expect(res.status).toBe(httpStatus.FOUND) expect(res.headers.get('location')).toBe( `${config.oauth.platform.ios.redirectUrl}?error=Unauthorized&state=${state}` ) }) test('should redirect with error if code is invalid', async () => { const appleMock = fetchMock.get('https://appleid.apple.com') appleMock .intercept({ method: 'POST', path: '/auth/token' }) .reply(httpStatus.UNAUTHORIZED, JSON.stringify({ error: 'error' })) const providerId = '123456' const formData = new FormData() formData.append('code', providerId) formData.append('state', state) const res = await request('/v1/auth/apple/callback', { method: 'POST', body: formData }) expect(res.status).toBe(httpStatus.FOUND) expect(res.headers.get('location')).toBe( `${config.oauth.platform.ios.redirectUrl}?error=Unauthorized&state=${state}` ) }) test('should redirect with error if no code provided', async () => { const formData = new FormData() formData.append('state', state) const res = await request('/v1/auth/apple/callback', { method: 'POST', body: formData }) expect(res.status).toBe(httpStatus.FOUND) expect(res.headers.get('location')).toBe( `${config.oauth.platform.ios.redirectUrl}?error=Bad%20request&state=${state}` ) }) test('should return 400 error if state is not provided', async () => { const providerId = '123456' const formData = new FormData() formData.append('code', providerId) const res = await request('/v1/auth/apple/callback', { method: 'POST', body: formData }) expect(res.status).toBe(httpStatus.FOUND) expect(res.headers.get('location')).toBe( `${config.oauth.platform.web.redirectUrl}?error=Something%20went%20wrong` ) }) test('should return 400 error if platform is not provided', async () => { const providerId = '123456' const formData = new FormData() state = btoa(JSON.stringify({})) formData.append('code', providerId) formData.append('state', state) const res = await request('/v1/auth/apple/callback', { method: 'POST', body: formData }) expect(res.status).toBe(httpStatus.FOUND) expect(res.headers.get('location')).toBe( `${config.oauth.platform.web.redirectUrl}?error=Bad%20request&state=${state}` ) }) test('should return 400 error if platform is invalid', async () => { const providerId = '123456' const formData = new FormData() state = btoa(JSON.stringify({ platform: 'wb' })) formData.append('code', providerId) formData.append('state', state) const res = await request('/v1/auth/apple/callback', { method: 'POST', body: formData }) expect(res.status).toBe(httpStatus.FOUND) expect(res.headers.get('location')).toBe( `${config.oauth.platform.web.redirectUrl}?error=Bad%20request&state=${state}` ) }) }) describe('POST /v1/auth/apple/:userId', () => { let newUser: AppleUserType beforeAll(async () => { newUser = { sub: faker.number.int().toString(), name: faker.person.fullName(), email: faker.internet.email() } fetchMock.activate() }) afterEach(() => fetchMock.assertNoPendingInterceptors()) test('should return 200 and successfully link apple account', async () => { await insertUsers([userOne], config.database) const userOneAccessToken = await getAccessToken(userOne.id, userOne.role, config.jwt) const mockJWT = await jwt.sign(newUser, 'randomSecret') const appleMock = fetchMock.get('https://appleid.apple.com') appleMock .intercept({ method: 'POST', path: '/auth/token' }) .reply(200, JSON.stringify({ id_token: mockJWT })) const providerId = '123456' const res = await request(`/v1/auth/apple/${userOne.id}`, { method: 'POST', body: JSON.stringify({ code: providerId }), headers: { 'Content-Type': 'application/json', Authorization: `Bearer ${userOneAccessToken}` } }) expect(res.status).toBe(httpStatus.NO_CONTENT) const dbUser = await client .selectFrom('user') .selectAll() .where('user.id', '=', userOne.id) .executeTakeFirst() expect(dbUser).toBeDefined() if (!dbUser) return expect(dbUser.password).toBeDefined() expect(dbUser).toMatchObject({ name: userOne.name, password: expect.anything(), email: userOne.email, role: userOne.role, is_email_verified: 0 }) const oauthUser = await client .selectFrom('authorisations') .selectAll() .where('authorisations.provider_type', '=', authProviders.APPLE) .where('authorisations.user_id', '=', userOne.id) .where('authorisations.provider_user_id', '=', newUser.sub) .executeTakeFirst() expect(oauthUser).toBeDefined() if (!oauthUser) return }) test('should return 401 if user does not exist when linking', async () => { await insertUsers([userOne], config.database) const userOneAccessToken = await getAccessToken(userOne.id, userOne.role, config.jwt) await client.deleteFrom('user').where('user.id', '=', userOne.id).execute() const mockJWT = await jwt.sign(newUser, 'randomSecret') const appleMock = fetchMock.get('https://appleid.apple.com') appleMock .intercept({ method: 'POST', path: '/auth/token' }) .reply(200, JSON.stringify({ id_token: mockJWT })) const providerId = '123456' const res = await request(`/v1/auth/apple/${userOne.id}`, { method: 'POST', body: JSON.stringify({ code: providerId }), headers: { 'Content-Type': 'application/json', Authorization: `Bearer ${userOneAccessToken}` } }) expect(res.status).toBe(httpStatus.UNAUTHORIZED) const oauthUser = await client .selectFrom('authorisations') .selectAll() .where('authorisations.provider_type', '=', authProviders.APPLE) .where('authorisations.user_id', '=', userOne.id) .where('authorisations.provider_user_id', '=', String(newUser.sub)) .executeTakeFirst() expect(oauthUser).toBeUndefined() }) test('should return 401 if code is invalid', async () => { await insertUsers([userOne], config.database) const userOneAccessToken = await getAccessToken(userOne.id, userOne.role, config.jwt) const appleMock = fetchMock.get('https://appleid.apple.com') appleMock .intercept({ method: 'POST', path: '/auth/token' }) .reply(httpStatus.UNAUTHORIZED, JSON.stringify({ error: 'error' })) const providerId = '123456' const res = await request(`/v1/auth/apple/${userOne.id}`, { method: 'POST', body: JSON.stringify({ code: providerId }), headers: { 'Content-Type': 'application/json', Authorization: `Bearer ${userOneAccessToken}` } }) expect(res.status).toBe(httpStatus.UNAUTHORIZED) }) test('should return 403 if linking different user', async () => { await insertUsers([userOne], config.database) const userOneAccessToken = await getAccessToken(userOne.id, userOne.role, config.jwt) const providerId = '123456' const res = await request('/v1/auth/apple/5298', { method: 'POST', body: JSON.stringify({ code: providerId }), headers: { 'Content-Type': 'application/json', Authorization: `Bearer ${userOneAccessToken}` } }) expect(res.status).toBe(httpStatus.FORBIDDEN) }) test('should return 400 if no code provided', async () => { await insertUsers([userOne], config.database) const userOneAccessToken = await getAccessToken(userOne.id, userOne.role, config.jwt) const res = await request(`/v1/auth/apple/${userOne.id}`, { method: 'POST', body: JSON.stringify({}), headers: { 'Content-Type': 'application/json', Authorization: `Bearer ${userOneAccessToken}` } }) expect(res.status).toBe(httpStatus.BAD_REQUEST) }) test('should return 401 error if access token is missing', async () => { const res = await request('/v1/auth/apple/1234', { method: 'POST', body: JSON.stringify({}), headers: { 'Content-Type': 'application/json' } }) expect(res.status).toBe(httpStatus.UNAUTHORIZED) }) test('should return 403 if user has not verified their email', async () => { await insertUsers([userTwo], config.database) const accessToken = await getAccessToken( userTwo.id, userTwo.role, config.jwt, tokenTypes.ACCESS, userTwo.is_email_verified ) const res = await request('/v1/auth/apple/5298', { method: 'POST', body: JSON.stringify({}), headers: { 'Content-Type': 'application/json', Authorization: `Bearer ${accessToken}` } }) expect(res.status).toBe(httpStatus.FORBIDDEN) }) }) describe('DELETE /v1/auth/apple/:userId', () => { test('should return 200 and successfully remove apple account link', async () => { await insertUsers([userOne], config.database) const userOneAccessToken = await getAccessToken(userOne.id, userOne.role, config.jwt) const appleUser = appleAuthorisation(userOne.id) await insertAuthorisations([appleUser], config.database) const res = await request(`/v1/auth/apple/${userOne.id}`, { method: 'DELETE', headers: { Authorization: `Bearer ${userOneAccessToken}` } }) expect(res.status).toBe(httpStatus.NO_CONTENT) const oauthUser = await client .selectFrom('authorisations') .selectAll() .where('authorisations.provider_type', '=', authProviders.APPLE) .where('authorisations.user_id', '=', userOne.id) .executeTakeFirst() expect(oauthUser).toBeUndefined() if (!oauthUser) return }) test('should return 400 if user does not have a local login and only 1 link', async () => { const newUser = { ...userOne, password: null } await insertUsers([newUser], config.database) const userOneAccessToken = await getAccessToken(newUser.id, newUser.role, config.jwt) const appleUser = appleAuthorisation(newUser.id) await insertAuthorisations([appleUser], config.database) const res = await request(`/v1/auth/apple/${newUser.id}`, { method: 'DELETE', headers: { Authorization: `Bearer ${userOneAccessToken}` } }) expect(res.status).toBe(httpStatus.BAD_REQUEST) const oauthUser = await client .selectFrom('authorisations') .selectAll() .where('authorisations.provider_type', '=', authProviders.APPLE) .where('authorisations.user_id', '=', newUser.id) .executeTakeFirst() expect(oauthUser).toBeDefined() }) test('should return 400 if user does not have apple link', async () => { const newUser = { ...userOne, password: null } await insertUsers([newUser], config.database) const userOneAccessToken = await getAccessToken(newUser.id, newUser.role, config.jwt) const githubUser = githubAuthorisation(newUser.id) await insertAuthorisations([githubUser], config.database) const googleUser = googleAuthorisation(newUser.id) await insertAuthorisations([googleUser], config.database) const res = await request(`/v1/auth/apple/${newUser.id}`, { method: 'DELETE', headers: { Authorization: `Bearer ${userOneAccessToken}` } }) expect(res.status).toBe(httpStatus.BAD_REQUEST) }) test('should return 400 if user only has a local login', async () => { const newUser = { ...userOne, password: null } await insertUsers([newUser], config.database) const userOneAccessToken = await getAccessToken(newUser.id, newUser.role, config.jwt) const res = await request(`/v1/auth/apple/${newUser.id}`, { method: 'DELETE', headers: { Authorization: `Bearer ${userOneAccessToken}` } }) expect(res.status).toBe(httpStatus.BAD_REQUEST) }) test('should return 200 if user does not have a local login and 2 links', async () => { const newUser = { ...userOne, password: null } await insertUsers([newUser], config.database) const userOneAccessToken = await getAccessToken(newUser.id, newUser.role, config.jwt) const appleUser = appleAuthorisation(newUser.id) const githubUser = githubAuthorisation(newUser.id) await insertAuthorisations([appleUser, githubUser], config.database) const res = await request(`/v1/auth/apple/${newUser.id}`, { method: 'DELETE', headers: { Authorization: `Bearer ${userOneAccessToken}` } }) expect(res.status).toBe(httpStatus.NO_CONTENT) const oauthAppleUser = await client .selectFrom('authorisations') .selectAll() .where('authorisations.provider_type', '=', authProviders.APPLE) .where('authorisations.user_id', '=', newUser.id) .executeTakeFirst() expect(oauthAppleUser).toBeUndefined() const oauthFacebookUser = await client .selectFrom('authorisations') .selectAll() .where('authorisations.provider_type', '=', authProviders.GITHUB) .where('authorisations.user_id', '=', newUser.id) .executeTakeFirst() expect(oauthFacebookUser).toBeDefined() }) test('should return 403 if unlinking different user', async () => { await insertUsers([userOne], config.database) const userOneAccessToken = await getAccessToken(userOne.id, userOne.role, config.jwt) const res = await request('/v1/auth/apple/5298', { method: 'DELETE', headers: { 'Content-Type': 'application/json', Authorization: `Bearer ${userOneAccessToken}` } }) expect(res.status).toBe(httpStatus.FORBIDDEN) }) test('should return 401 error if access token is missing', async () => { const res = await request('/v1/auth/apple/1234', { method: 'DELETE', headers: { 'Content-Type': 'application/json' } }) expect(res.status).toBe(httpStatus.UNAUTHORIZED) }) test('should return 403 if user has not verified their email', async () => { await insertUsers([userTwo], config.database) const accessToken = await getAccessToken( userTwo.id, userTwo.role, config.jwt, tokenTypes.ACCESS, userTwo.is_email_verified ) const res = await request('/v1/auth/apple/5298', { method: 'DELETE', headers: { 'Content-Type': 'application/json', Authorization: `Bearer ${accessToken}` } }) expect(res.status).toBe(httpStatus.FORBIDDEN) }) }) })