@civic/auth 0.1.1 → 0.1.2-beta.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.turbo/turbo-build.log +3 -3
- package/CHANGELOG.md +5 -0
- package/dist/cjs/src/reactjs/components/UserButton.js +1 -1
- package/dist/cjs/src/reactjs/components/UserButton.js.map +1 -1
- package/dist/cjs/src/server/ServerAuthenticationResolver.d.ts +1 -0
- package/dist/cjs/src/server/ServerAuthenticationResolver.d.ts.map +1 -1
- package/dist/cjs/src/server/ServerAuthenticationResolver.js +6 -2
- package/dist/cjs/src/server/ServerAuthenticationResolver.js.map +1 -1
- package/dist/cjs/src/server/config.d.ts +1 -8
- package/dist/cjs/src/server/config.d.ts.map +1 -1
- package/dist/cjs/src/server/config.js.map +1 -1
- package/dist/cjs/src/server/index.d.ts +1 -0
- package/dist/cjs/src/server/index.d.ts.map +1 -1
- package/dist/cjs/src/server/index.js.map +1 -1
- package/dist/cjs/src/shared/lib/GenericAuthenticationRefresher.d.ts +1 -0
- package/dist/cjs/src/shared/lib/GenericAuthenticationRefresher.d.ts.map +1 -1
- package/dist/cjs/src/shared/lib/GenericAuthenticationRefresher.js +5 -1
- package/dist/cjs/src/shared/lib/GenericAuthenticationRefresher.js.map +1 -1
- package/dist/cjs/tsconfig.cjs.tsbuildinfo +1 -1
- package/dist/esm/src/reactjs/components/UserButton.js +1 -1
- package/dist/esm/src/reactjs/components/UserButton.js.map +1 -1
- package/dist/esm/src/server/ServerAuthenticationResolver.d.ts +1 -0
- package/dist/esm/src/server/ServerAuthenticationResolver.d.ts.map +1 -1
- package/dist/esm/src/server/ServerAuthenticationResolver.js +6 -2
- package/dist/esm/src/server/ServerAuthenticationResolver.js.map +1 -1
- package/dist/esm/src/server/config.d.ts +1 -8
- package/dist/esm/src/server/config.d.ts.map +1 -1
- package/dist/esm/src/server/config.js.map +1 -1
- package/dist/esm/src/server/index.d.ts +1 -0
- package/dist/esm/src/server/index.d.ts.map +1 -1
- package/dist/esm/src/server/index.js.map +1 -1
- package/dist/esm/src/shared/lib/GenericAuthenticationRefresher.d.ts +1 -0
- package/dist/esm/src/shared/lib/GenericAuthenticationRefresher.d.ts.map +1 -1
- package/dist/esm/src/shared/lib/GenericAuthenticationRefresher.js +5 -1
- package/dist/esm/src/shared/lib/GenericAuthenticationRefresher.js.map +1 -1
- package/dist/esm/tsconfig.esm.tsbuildinfo +1 -1
- package/dist/src/browser/storage.d.ts +6 -0
- package/dist/src/browser/storage.d.ts.map +1 -0
- package/dist/src/browser/storage.js +9 -0
- package/dist/src/browser/storage.js.map +1 -0
- package/dist/src/config.d.ts +3 -0
- package/dist/src/config.d.ts.map +1 -0
- package/dist/src/config.js +5 -0
- package/dist/src/config.js.map +1 -0
- package/dist/src/constants.d.ts +9 -0
- package/dist/src/constants.d.ts.map +1 -0
- package/dist/src/constants.js +17 -0
- package/dist/src/constants.js.map +1 -0
- package/dist/src/index.d.ts +4 -0
- package/dist/src/index.d.ts.map +1 -0
- package/dist/src/index.js +2 -0
- package/dist/src/index.js.map +1 -0
- package/dist/src/lib/cookies.d.ts +7 -0
- package/dist/src/lib/cookies.d.ts.map +1 -0
- package/dist/src/lib/cookies.js +23 -0
- package/dist/src/lib/cookies.js.map +1 -0
- package/dist/src/lib/jwt.d.ts +3 -0
- package/dist/src/lib/jwt.d.ts.map +1 -0
- package/dist/src/lib/jwt.js +9 -0
- package/dist/src/lib/jwt.js.map +1 -0
- package/dist/src/lib/logger.d.ts +26 -0
- package/dist/src/lib/logger.d.ts.map +1 -0
- package/dist/src/lib/logger.js +55 -0
- package/dist/src/lib/logger.js.map +1 -0
- package/dist/src/lib/oauth.d.ts +19 -0
- package/dist/src/lib/oauth.d.ts.map +1 -0
- package/dist/src/lib/oauth.js +60 -0
- package/dist/src/lib/oauth.js.map +1 -0
- package/dist/src/lib/postMessage.d.ts +4 -0
- package/dist/src/lib/postMessage.d.ts.map +1 -0
- package/dist/src/lib/postMessage.js +15 -0
- package/dist/src/lib/postMessage.js.map +1 -0
- package/dist/src/lib/windowUtil.d.ts +4 -0
- package/dist/src/lib/windowUtil.d.ts.map +1 -0
- package/dist/src/lib/windowUtil.js +30 -0
- package/dist/src/lib/windowUtil.js.map +1 -0
- package/dist/src/nextjs/GetUser.d.ts +6 -0
- package/dist/src/nextjs/GetUser.js +18 -0
- package/dist/src/nextjs/GetUser.js.map +1 -0
- package/dist/src/nextjs/config.d.ts +178 -0
- package/dist/src/nextjs/cookies.d.ts +30 -0
- package/dist/src/nextjs/hooks/index.d.ts +2 -0
- package/dist/src/nextjs/hooks/index.d.ts.map +1 -0
- package/dist/src/nextjs/hooks/index.js +2 -0
- package/dist/src/nextjs/hooks/index.js.map +1 -0
- package/dist/src/nextjs/hooks/useTokenCookie.d.ts +3 -0
- package/dist/src/nextjs/hooks/useTokenCookie.d.ts.map +1 -0
- package/dist/src/nextjs/hooks/useTokenCookie.js +37 -0
- package/dist/src/nextjs/hooks/useTokenCookie.js.map +1 -0
- package/dist/src/nextjs/hooks/useUserCookie.d.ts +3 -0
- package/dist/src/nextjs/hooks/useUserCookie.d.ts.map +1 -0
- package/dist/src/nextjs/hooks/useUserCookie.js +36 -0
- package/dist/src/nextjs/hooks/useUserCookie.js.map +1 -0
- package/dist/src/nextjs/index.d.ts +7 -0
- package/dist/src/nextjs/index.js +6 -0
- package/dist/src/nextjs/index.js.map +1 -0
- package/dist/src/nextjs/middleware/index.d.ts +2 -0
- package/dist/src/nextjs/middleware/index.d.ts.map +1 -0
- package/dist/src/nextjs/middleware/index.js +2 -0
- package/dist/src/nextjs/middleware/index.js.map +1 -0
- package/dist/src/nextjs/middleware.d.ts +59 -0
- package/dist/src/nextjs/middleware.d.ts.map +1 -0
- package/dist/src/nextjs/middleware.js +107 -0
- package/dist/src/nextjs/middleware.js.map +1 -0
- package/dist/src/nextjs/providers/NextAuthProvider.d.ts +9 -0
- package/dist/src/nextjs/providers/NextAuthProvider.js +50 -0
- package/dist/src/nextjs/providers/NextAuthProvider.js.map +1 -0
- package/dist/src/nextjs/routeHandler.d.ts +18 -0
- package/dist/src/nextjs/utils.d.ts +3 -0
- package/dist/src/nextjs/utils.d.ts.map +1 -0
- package/dist/src/nextjs/utils.js +5 -0
- package/dist/src/nextjs/utils.js.map +1 -0
- package/dist/src/reactjs/components/SignInButton.d.ts +8 -0
- package/dist/src/reactjs/components/SignInButton.d.ts.map +1 -0
- package/dist/src/reactjs/components/SignInButton.js +14 -0
- package/dist/src/reactjs/components/SignInButton.js.map +1 -0
- package/dist/src/reactjs/components/SignOutButton.d.ts +6 -0
- package/dist/src/reactjs/components/SignOutButton.d.ts.map +1 -0
- package/dist/src/reactjs/components/SignOutButton.js +14 -0
- package/dist/src/reactjs/components/SignOutButton.js.map +1 -0
- package/dist/src/reactjs/components/UserButton.d.ts +8 -0
- package/dist/src/reactjs/components/UserButton.js +110 -0
- package/dist/src/reactjs/components/UserButton.js.map +1 -0
- package/dist/src/reactjs/components/index.d.ts +6 -0
- package/dist/src/reactjs/components/index.js +6 -0
- package/dist/src/reactjs/components/index.js.map +1 -0
- package/dist/src/reactjs/hooks/useAuth.d.ts +3 -0
- package/dist/src/reactjs/hooks/useAuth.d.ts.map +1 -0
- package/dist/src/reactjs/hooks/useAuth.js +12 -0
- package/dist/src/reactjs/hooks/useAuth.js.map +1 -0
- package/dist/src/reactjs/hooks/useUser.d.ts +4 -0
- package/dist/src/reactjs/hooks/useUser.d.ts.map +1 -0
- package/dist/src/reactjs/hooks/useUser.js +12 -0
- package/dist/src/reactjs/hooks/useUser.js.map +1 -0
- package/dist/src/reactjs/index.d.ts +6 -0
- package/dist/src/reactjs/index.js +8 -0
- package/dist/src/reactjs/index.js.map +1 -0
- package/dist/src/reactjs/providers/index.d.ts +8 -0
- package/dist/src/reactjs/providers/index.js +7 -0
- package/dist/src/reactjs/providers/index.js.map +1 -0
- package/dist/src/server/ServerAuthenticationResolver.d.ts +19 -0
- package/dist/src/server/ServerAuthenticationResolver.d.ts.map +1 -1
- package/dist/src/server/ServerAuthenticationResolver.js +6 -2
- package/dist/src/server/ServerAuthenticationResolver.js.map +1 -1
- package/dist/src/server/config.d.ts +9 -0
- package/dist/src/server/config.d.ts.map +1 -0
- package/dist/src/server/config.js +2 -0
- package/dist/src/server/config.js.map +1 -0
- package/dist/src/server/index.d.ts +7 -0
- package/dist/src/server/index.d.ts.map +1 -1
- package/dist/src/server/index.js +5 -0
- package/dist/src/server/index.js.map +1 -0
- package/dist/src/server/refresh.d.ts +7 -0
- package/dist/src/server/refresh.js +13 -0
- package/dist/src/server/refresh.js.map +1 -0
- package/dist/src/services/PKCE.d.ts +20 -0
- package/dist/src/services/types.d.ts +23 -0
- package/dist/src/services/types.d.ts.map +1 -0
- package/dist/src/services/types.js +7 -0
- package/dist/src/services/types.js.map +1 -0
- package/dist/src/shared/components/CivicAuthIframe.d.ts +8 -0
- package/dist/src/shared/components/CivicAuthIframe.d.ts.map +1 -0
- package/dist/src/shared/components/CivicAuthIframe.js +9 -0
- package/dist/src/shared/components/CivicAuthIframe.js.map +1 -0
- package/dist/src/shared/components/CloseIcon.d.ts +4 -0
- package/dist/src/shared/components/CloseIcon.d.ts.map +1 -0
- package/dist/src/shared/components/CloseIcon.js +6 -0
- package/dist/src/shared/components/CloseIcon.js.map +1 -0
- package/dist/src/shared/components/LoadingIcon.d.ts +4 -0
- package/dist/src/shared/hooks/index.d.ts +5 -0
- package/dist/src/shared/hooks/index.d.ts.map +1 -0
- package/dist/src/shared/hooks/index.js +5 -0
- package/dist/src/shared/hooks/index.js.map +1 -0
- package/dist/src/shared/hooks/useAuth.d.ts +3 -0
- package/dist/src/shared/hooks/useAuth.d.ts.map +1 -0
- package/dist/src/shared/hooks/useAuth.js +12 -0
- package/dist/src/shared/hooks/useAuth.js.map +1 -0
- package/dist/src/shared/hooks/useConfig.d.ts +3 -0
- package/dist/src/shared/hooks/useConfig.d.ts.map +1 -0
- package/dist/src/shared/hooks/useConfig.js +13 -0
- package/dist/src/shared/hooks/useConfig.js.map +1 -0
- package/dist/src/shared/hooks/useIframe.d.ts +3 -0
- package/dist/src/shared/hooks/useIframe.d.ts.map +1 -0
- package/dist/src/shared/hooks/useIframe.js +13 -0
- package/dist/src/shared/hooks/useIframe.js.map +1 -0
- package/dist/src/shared/hooks/useSession.d.ts +3 -0
- package/dist/src/shared/hooks/useSession.d.ts.map +1 -0
- package/dist/src/shared/hooks/useSession.js +13 -0
- package/dist/src/shared/hooks/useSession.js.map +1 -0
- package/dist/src/shared/hooks/useToken.d.ts +3 -0
- package/dist/src/shared/hooks/useToken.d.ts.map +1 -0
- package/dist/src/shared/hooks/useToken.js +12 -0
- package/dist/src/shared/hooks/useToken.js.map +1 -0
- package/dist/{cjs/src/shared → src/shared/lib}/GenericAuthenticationRefresher.d.ts +5 -4
- package/dist/src/shared/lib/GenericAuthenticationRefresher.d.ts.map +1 -1
- package/dist/src/shared/lib/GenericAuthenticationRefresher.js +5 -1
- package/dist/src/shared/lib/GenericAuthenticationRefresher.js.map +1 -1
- package/dist/{cjs/src/shared → src/shared/lib}/UserSession.d.ts +1 -1
- package/dist/src/shared/lib/session.d.ts +3 -0
- package/dist/src/shared/lib/session.js +10 -0
- package/dist/src/shared/lib/session.js.map +1 -0
- package/dist/src/shared/lib/storage.d.ts +25 -0
- package/dist/src/shared/lib/storage.d.ts.map +1 -0
- package/dist/src/shared/lib/storage.js +17 -0
- package/dist/src/shared/lib/storage.js.map +1 -0
- package/dist/src/shared/lib/types.d.ts +22 -0
- package/dist/src/shared/lib/types.d.ts.map +1 -0
- package/dist/src/shared/lib/types.js +16 -0
- package/dist/src/shared/lib/types.js.map +1 -0
- package/dist/src/shared/providers/AuthContext.d.ts +10 -0
- package/dist/src/shared/providers/AuthContext.d.ts.map +1 -0
- package/dist/src/shared/providers/AuthContext.js +3 -0
- package/dist/src/shared/providers/AuthContext.js.map +1 -0
- package/dist/{cjs/src/shared → src/shared/providers}/CivicAuthProvider.d.ts +3 -3
- package/dist/src/shared/providers/CivicAuthProvider.js +15 -0
- package/dist/src/shared/providers/CivicAuthProvider.js.map +1 -0
- package/dist/src/shared/providers/ConfigProvider.d.ts +21 -0
- package/dist/src/shared/providers/ConfigProvider.d.ts.map +1 -0
- package/dist/src/shared/providers/ConfigProvider.js +19 -0
- package/dist/src/shared/providers/ConfigProvider.js.map +1 -0
- package/dist/src/shared/providers/IframeProvider.d.ts +16 -0
- package/dist/src/shared/providers/IframeProvider.d.ts.map +1 -0
- package/dist/src/shared/providers/IframeProvider.js +11 -0
- package/dist/src/shared/providers/IframeProvider.js.map +1 -0
- package/dist/src/shared/providers/SessionProvider.d.ts +13 -0
- package/dist/src/shared/providers/SessionProvider.d.ts.map +1 -0
- package/dist/src/shared/providers/SessionProvider.js +13 -0
- package/dist/src/shared/providers/SessionProvider.js.map +1 -0
- package/dist/src/shared/providers/TokenProvider.d.ts +18 -0
- package/dist/src/shared/providers/TokenProvider.d.ts.map +1 -0
- package/dist/src/shared/providers/TokenProvider.js +53 -0
- package/dist/src/shared/providers/TokenProvider.js.map +1 -0
- package/dist/{cjs/src/shared → src/shared/providers}/UserProvider.d.ts +7 -6
- package/dist/src/shared/providers/UserProvider.d.ts.map +1 -0
- package/dist/src/shared/providers/UserProvider.js +38 -0
- package/dist/src/shared/providers/UserProvider.js.map +1 -0
- package/dist/src/types.d.ts +146 -0
- package/dist/src/types.d.ts.map +1 -0
- package/dist/src/types.js +2 -0
- package/dist/src/types.js.map +1 -0
- package/dist/src/utils.d.ts +15 -0
- package/dist/src/utils.d.ts.map +1 -0
- package/dist/src/utils.js +43 -0
- package/dist/src/utils.js.map +1 -0
- package/dist/test/integration/sdk.test.d.ts +2 -0
- package/dist/test/integration/sdk.test.js +183 -0
- package/dist/test/integration/sdk.test.js.map +1 -0
- package/dist/test/support/fixtures.d.ts +26 -0
- package/dist/test/support/fixtures.d.ts.map +1 -0
- package/dist/test/support/fixtures.js +55 -0
- package/dist/test/support/fixtures.js.map +1 -0
- package/dist/test/support/tokens.json +26 -0
- package/dist/test/unit/lib/oauth.test.d.ts +2 -0
- package/dist/test/unit/lib/oauth.test.d.ts.map +1 -0
- package/dist/test/unit/lib/oauth.test.js +55 -0
- package/dist/test/unit/lib/oauth.test.js.map +1 -0
- package/dist/test/unit/logger.test.d.ts +2 -0
- package/dist/test/unit/logger.test.d.ts.map +1 -0
- package/dist/test/unit/logger.test.js +141 -0
- package/dist/test/unit/logger.test.js.map +1 -0
- package/dist/test/unit/nextjs/NextAuthProvider.test.d.ts +2 -0
- package/dist/test/unit/nextjs/NextAuthProvider.test.js +29 -0
- package/dist/test/unit/nextjs/NextAuthProvider.test.js.map +1 -0
- package/dist/test/unit/nextjs/config.test.d.ts +2 -0
- package/dist/test/unit/nextjs/config.test.d.ts.map +1 -0
- package/dist/test/unit/nextjs/config.test.js +189 -0
- package/dist/test/unit/nextjs/config.test.js.map +1 -0
- package/dist/test/unit/nextjs/getUser.test.d.ts +2 -0
- package/dist/test/unit/nextjs/getUser.test.js +36 -0
- package/dist/test/unit/nextjs/getUser.test.js.map +1 -0
- package/dist/test/unit/nextjs/middleware.test.d.ts +2 -0
- package/dist/test/unit/nextjs/middleware.test.d.ts.map +1 -0
- package/dist/test/unit/nextjs/middleware.test.js +113 -0
- package/dist/test/unit/nextjs/middleware.test.js.map +1 -0
- package/dist/test/unit/nextjs/utils.test.d.ts +2 -0
- package/dist/test/unit/nextjs/utils.test.d.ts.map +1 -0
- package/dist/test/unit/nextjs/utils.test.js +13 -0
- package/dist/test/unit/nextjs/utils.test.js.map +1 -0
- package/dist/test/unit/publicApi/apiSnapshot.test.d.ts +2 -0
- package/dist/test/unit/publicApi/apiSnapshot.test.js +10 -0
- package/dist/test/unit/publicApi/apiSnapshot.test.js.map +1 -0
- package/dist/test/unit/react/components/SignInButton.test.d.ts +2 -0
- package/dist/test/unit/react/components/SignInButton.test.js +31 -0
- package/dist/test/unit/react/components/SignInButton.test.js.map +1 -0
- package/dist/test/unit/react/components/SignOutButton.test.d.ts +2 -0
- package/dist/test/unit/react/components/SignOutButton.test.js +30 -0
- package/dist/test/unit/react/components/SignOutButton.test.js.map +1 -0
- package/dist/test/unit/server/login.test.d.ts +2 -0
- package/dist/test/unit/server/session.test.d.ts +2 -0
- package/dist/test/unit/services/AuthenticationService.test.d.ts +2 -0
- package/dist/test/unit/services/ServerAuthenticationResolver.test.d.ts +2 -0
- package/dist/test/unit/shared/GenericAuthenticationRefresher.test.d.ts +2 -0
- package/dist/test/unit/shared/UserSession.test.d.ts +2 -0
- package/dist/test/unit/shared/UserSession.test.d.ts.map +1 -0
- package/dist/test/unit/shared/UserSession.test.js +37 -0
- package/dist/test/unit/shared/UserSession.test.js.map +1 -0
- package/dist/test/unit/shared/components/CivicAuthIframeContainer.test.d.ts +2 -0
- package/dist/test/unit/shared/components/CivicAuthIframeContainer.test.js +120 -0
- package/dist/test/unit/shared/components/CivicAuthIframeContainer.test.js.map +1 -0
- package/dist/test/unit/shared/storage.test.d.ts +2 -0
- package/dist/test/unit/shared/storage.test.d.ts.map +1 -0
- package/dist/test/unit/shared/storage.test.js +53 -0
- package/dist/test/unit/shared/storage.test.js.map +1 -0
- package/dist/test/unit/utils.test.d.ts +2 -0
- package/dist/test/unit/utils.test.d.ts.map +1 -0
- package/dist/test/unit/utils.test.js +40 -0
- package/dist/test/unit/utils.test.js.map +1 -0
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/dist/vitest.config.d.ts +3 -0
- package/dist/vitest.config.d.ts.map +1 -0
- package/dist/vitest.config.js +40 -0
- package/dist/vitest.config.js.map +1 -0
- package/package.json +2 -2
- package/src/reactjs/components/UserButton.tsx +1 -1
- package/src/server/ServerAuthenticationResolver.ts +7 -2
- package/src/server/config.ts +1 -9
- package/src/server/index.ts +1 -0
- package/src/shared/lib/GenericAuthenticationRefresher.ts +6 -1
- package/dist/cjs/src/shared/AuthProvider.d.ts +0 -18
- package/dist/cjs/src/shared/AuthProvider.d.ts.map +0 -1
- package/dist/cjs/src/shared/AuthProvider.js +0 -246
- package/dist/cjs/src/shared/AuthProvider.js.map +0 -1
- package/dist/cjs/src/shared/CivicAuthProvider.d.ts.map +0 -1
- package/dist/cjs/src/shared/CivicAuthProvider.js +0 -19
- package/dist/cjs/src/shared/CivicAuthProvider.js.map +0 -1
- package/dist/cjs/src/shared/GenericAuthenticationRefresher.d.ts.map +0 -1
- package/dist/cjs/src/shared/GenericAuthenticationRefresher.js +0 -47
- package/dist/cjs/src/shared/GenericAuthenticationRefresher.js.map +0 -1
- package/dist/cjs/src/shared/UserProvider.d.ts.map +0 -1
- package/dist/cjs/src/shared/UserProvider.js +0 -42
- package/dist/cjs/src/shared/UserProvider.js.map +0 -1
- package/dist/cjs/src/shared/UserSession.d.ts.map +0 -1
- package/dist/cjs/src/shared/UserSession.js +0 -24
- package/dist/cjs/src/shared/UserSession.js.map +0 -1
- package/dist/cjs/src/shared/session.d.ts +0 -3
- package/dist/cjs/src/shared/session.d.ts.map +0 -1
- package/dist/cjs/src/shared/session.js +0 -13
- package/dist/cjs/src/shared/session.js.map +0 -1
- package/dist/cjs/src/shared/util.d.ts +0 -39
- package/dist/cjs/src/shared/util.d.ts.map +0 -1
- package/dist/cjs/src/shared/util.js +0 -162
- package/dist/cjs/src/shared/util.js.map +0 -1
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
import { render } from "@testing-library/react";
|
|
2
|
+
import { describe, it, vi, expect } from "vitest";
|
|
3
|
+
import { CivicNextAuthProvider } from "@/nextjs/providers/NextAuthProvider.js";
|
|
4
|
+
import { resolveAuthConfig } from "@/nextjs/config.js";
|
|
5
|
+
import React from "react";
|
|
6
|
+
vi.mock("@/nextjs/config.js", () => ({
|
|
7
|
+
resolveAuthConfig: vi.fn(() => ({
|
|
8
|
+
clientId: "test-client-id",
|
|
9
|
+
oauthServer: "https://example.com",
|
|
10
|
+
callbackUrl: "https://example.com/callback",
|
|
11
|
+
challengeUrl: "https://example.com/challenge",
|
|
12
|
+
logoutUrl: "https://example.com/logout",
|
|
13
|
+
})),
|
|
14
|
+
}));
|
|
15
|
+
vi.mock("@/nextjs/hooks/useUserCookie", () => ({
|
|
16
|
+
useUserCookie: vi.fn(),
|
|
17
|
+
}));
|
|
18
|
+
vi.mock("@/nextjs/hooks/useTokenCookie", () => ({
|
|
19
|
+
useTokenCookie: vi.fn(),
|
|
20
|
+
}));
|
|
21
|
+
describe("CivicNextAuthProvider", () => {
|
|
22
|
+
it("should call resolveAuthConfig with no arguments", () => {
|
|
23
|
+
const children = React.createElement("div", null, "Test Content");
|
|
24
|
+
render(React.createElement(CivicNextAuthProvider, null, children));
|
|
25
|
+
// The Next implementation should take all config from the next.config.js file, no config taken from provider props.
|
|
26
|
+
expect(resolveAuthConfig).toHaveBeenCalledWith();
|
|
27
|
+
});
|
|
28
|
+
});
|
|
29
|
+
//# sourceMappingURL=NextAuthProvider.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"NextAuthProvider.test.js","sourceRoot":"","sources":["../../../../test/unit/nextjs/NextAuthProvider.test.tsx"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AAChD,OAAO,EAAE,QAAQ,EAAE,EAAE,EAAE,EAAE,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAClD,OAAO,EAAE,qBAAqB,EAAE,MAAM,wCAAwC,CAAC;AAC/E,OAAO,EAAE,iBAAiB,EAAE,MAAM,oBAAoB,CAAC;AACvD,OAAO,KAAK,MAAM,OAAO,CAAC;AAE1B,EAAE,CAAC,IAAI,CAAC,oBAAoB,EAAE,GAAG,EAAE,CAAC,CAAC;IACnC,iBAAiB,EAAE,EAAE,CAAC,EAAE,CAAC,GAAG,EAAE,CAAC,CAAC;QAC9B,QAAQ,EAAE,gBAAgB;QAC1B,WAAW,EAAE,qBAAqB;QAClC,WAAW,EAAE,8BAA8B;QAC3C,YAAY,EAAE,+BAA+B;QAC7C,SAAS,EAAE,4BAA4B;KACxC,CAAC,CAAC;CACJ,CAAC,CAAC,CAAC;AAEJ,EAAE,CAAC,IAAI,CAAC,8BAA8B,EAAE,GAAG,EAAE,CAAC,CAAC;IAC7C,aAAa,EAAE,EAAE,CAAC,EAAE,EAAE;CACvB,CAAC,CAAC,CAAC;AAEJ,EAAE,CAAC,IAAI,CAAC,+BAA+B,EAAE,GAAG,EAAE,CAAC,CAAC;IAC9C,cAAc,EAAE,EAAE,CAAC,EAAE,EAAE;CACxB,CAAC,CAAC,CAAC;AAEJ,QAAQ,CAAC,uBAAuB,EAAE,GAAG,EAAE;IACrC,EAAE,CAAC,iDAAiD,EAAE,GAAG,EAAE;QACzD,MAAM,QAAQ,GAAG,gDAAuB,CAAC;QAEzC,MAAM,CACJ,oBAAC,qBAAqB,QACnB,QAAQ,CACa,CACzB,CAAC;QAEF,oHAAoH;QACpH,MAAM,CAAC,iBAAiB,CAAC,CAAC,oBAAoB,EAAE,CAAC;IACnD,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["import { render } from \"@testing-library/react\";\nimport { describe, it, vi, expect } from \"vitest\";\nimport { CivicNextAuthProvider } from \"@/nextjs/providers/NextAuthProvider.js\";\nimport { resolveAuthConfig } from \"@/nextjs/config.js\";\nimport React from \"react\";\n\nvi.mock(\"@/nextjs/config.js\", () => ({\n resolveAuthConfig: vi.fn(() => ({\n clientId: \"test-client-id\",\n oauthServer: \"https://example.com\",\n callbackUrl: \"https://example.com/callback\",\n challengeUrl: \"https://example.com/challenge\",\n logoutUrl: \"https://example.com/logout\",\n })),\n}));\n\nvi.mock(\"@/nextjs/hooks/useUserCookie\", () => ({\n useUserCookie: vi.fn(),\n}));\n\nvi.mock(\"@/nextjs/hooks/useTokenCookie\", () => ({\n useTokenCookie: vi.fn(),\n}));\n\ndescribe(\"CivicNextAuthProvider\", () => {\n it(\"should call resolveAuthConfig with no arguments\", () => {\n const children = <div>Test Content</div>;\n\n render(\n <CivicNextAuthProvider>\n {children}\n </CivicNextAuthProvider>\n );\n\n // The Next implementation should take all config from the next.config.js file, no config taken from provider props.\n expect(resolveAuthConfig).toHaveBeenCalledWith();\n });\n});"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"config.test.d.ts","sourceRoot":"","sources":["../../../../test/unit/nextjs/config.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,189 @@
|
|
|
1
|
+
/* eslint-disable turbo/no-undeclared-env-vars */
|
|
2
|
+
import { describe, it, expect, beforeEach, afterEach, vi } from "vitest";
|
|
3
|
+
import { resolveAuthConfig, createCivicAuthPlugin, defaultAuthConfig, } from "@/nextjs/config.js";
|
|
4
|
+
import { DEFAULT_AUTH_SERVER } from "@/constants.js";
|
|
5
|
+
const defaultCookies = {
|
|
6
|
+
id_token: {
|
|
7
|
+
httpOnly: true,
|
|
8
|
+
path: "/",
|
|
9
|
+
sameSite: "strict",
|
|
10
|
+
secure: false,
|
|
11
|
+
},
|
|
12
|
+
access_token: {
|
|
13
|
+
httpOnly: true,
|
|
14
|
+
path: "/",
|
|
15
|
+
sameSite: "strict",
|
|
16
|
+
secure: false,
|
|
17
|
+
},
|
|
18
|
+
refresh_token: {
|
|
19
|
+
httpOnly: true,
|
|
20
|
+
path: "/",
|
|
21
|
+
sameSite: "strict",
|
|
22
|
+
secure: false,
|
|
23
|
+
},
|
|
24
|
+
code_verifier: {
|
|
25
|
+
httpOnly: true,
|
|
26
|
+
path: "/",
|
|
27
|
+
sameSite: "strict",
|
|
28
|
+
secure: false,
|
|
29
|
+
},
|
|
30
|
+
app_url: {
|
|
31
|
+
httpOnly: true,
|
|
32
|
+
path: "/",
|
|
33
|
+
sameSite: "strict",
|
|
34
|
+
secure: false,
|
|
35
|
+
},
|
|
36
|
+
};
|
|
37
|
+
describe("nextjs/config", () => {
|
|
38
|
+
const originalEnv = process.env;
|
|
39
|
+
beforeEach(() => {
|
|
40
|
+
vi.resetModules();
|
|
41
|
+
process.env = { ...originalEnv, NODE_ENV: "development" };
|
|
42
|
+
});
|
|
43
|
+
afterEach(() => {
|
|
44
|
+
process.env = originalEnv;
|
|
45
|
+
vi.restoreAllMocks();
|
|
46
|
+
});
|
|
47
|
+
describe("resolveAuthConfig", () => {
|
|
48
|
+
it("should throw an error if clientId is not provided", () => {
|
|
49
|
+
expect(() => resolveAuthConfig()).toThrowError("Civic Auth client ID is required");
|
|
50
|
+
});
|
|
51
|
+
it("should use default values when no config is provided", () => {
|
|
52
|
+
// client id must be defined
|
|
53
|
+
process.env._civic_auth_client_id = "clientId";
|
|
54
|
+
const result = resolveAuthConfig();
|
|
55
|
+
expect(result).toEqual({ ...defaultAuthConfig, clientId: "clientId" });
|
|
56
|
+
});
|
|
57
|
+
it("should override default values with provided config", () => {
|
|
58
|
+
const config = {
|
|
59
|
+
clientId: "clientId",
|
|
60
|
+
callbackUrl: "/custom/callback",
|
|
61
|
+
loginUrl: "/custom/login",
|
|
62
|
+
include: ["/protected/*"],
|
|
63
|
+
exclude: ["/public/*"],
|
|
64
|
+
};
|
|
65
|
+
const result = resolveAuthConfig(config);
|
|
66
|
+
expect(result.callbackUrl).toBe("/custom/callback");
|
|
67
|
+
expect(result.loginUrl).toBe("/custom/login");
|
|
68
|
+
expect(result.include).toEqual(["/protected/*"]);
|
|
69
|
+
expect(result.exclude).toEqual(["/public/*"]);
|
|
70
|
+
});
|
|
71
|
+
it("should use environment variables if set", () => {
|
|
72
|
+
process.env._civic_auth_client_id = "clientId";
|
|
73
|
+
process.env._civic_auth_callback_url = "/env/callback";
|
|
74
|
+
process.env._civic_auth_login_url = "/env/login";
|
|
75
|
+
process.env._civic_auth_includes = "/env/protected/*";
|
|
76
|
+
process.env._civic_auth_excludes = "/env/public/*";
|
|
77
|
+
const result = resolveAuthConfig();
|
|
78
|
+
expect(result.callbackUrl).toBe("/env/callback");
|
|
79
|
+
expect(result.loginUrl).toBe("/env/login");
|
|
80
|
+
expect(result.include).toEqual(["/env/protected/*"]);
|
|
81
|
+
expect(result.exclude).toEqual(["/env/public/*"]);
|
|
82
|
+
});
|
|
83
|
+
it("should prioritize provided config over environment variables", () => {
|
|
84
|
+
process.env._civic_auth_callback_url = "/env/callback";
|
|
85
|
+
const config = {
|
|
86
|
+
clientId: "clientId",
|
|
87
|
+
callbackUrl: "/config/callback",
|
|
88
|
+
};
|
|
89
|
+
const result = resolveAuthConfig(config);
|
|
90
|
+
expect(result.callbackUrl).toBe("/config/callback");
|
|
91
|
+
});
|
|
92
|
+
it("should merge cookie configurations correctly", () => {
|
|
93
|
+
const config = {
|
|
94
|
+
clientId: "clientId",
|
|
95
|
+
cookies: {
|
|
96
|
+
tokens: {
|
|
97
|
+
id_token: { ...defaultCookies.id_token, secure: false },
|
|
98
|
+
},
|
|
99
|
+
user: {
|
|
100
|
+
httpOnly: false,
|
|
101
|
+
secure: false,
|
|
102
|
+
sameSite: "strict",
|
|
103
|
+
},
|
|
104
|
+
},
|
|
105
|
+
};
|
|
106
|
+
const result = resolveAuthConfig(config);
|
|
107
|
+
expect(result.cookies.tokens).toEqual({
|
|
108
|
+
...defaultCookies,
|
|
109
|
+
id_token: { ...defaultCookies.id_token, secure: false },
|
|
110
|
+
});
|
|
111
|
+
expect(result.cookies.user).toEqual({
|
|
112
|
+
httpOnly: false,
|
|
113
|
+
secure: false,
|
|
114
|
+
sameSite: "strict",
|
|
115
|
+
path: "/",
|
|
116
|
+
maxAge: 3600,
|
|
117
|
+
});
|
|
118
|
+
});
|
|
119
|
+
it("should set secure to true in the default cookie configs if NODE_ENV is not development", async () => {
|
|
120
|
+
process.env = { ...originalEnv, NODE_ENV: "production" };
|
|
121
|
+
// re-import to get the configs with the updated NODE_ENV
|
|
122
|
+
const configs = await import("../../../src/nextjs/config.js");
|
|
123
|
+
const result = configs.resolveAuthConfig({ clientId: "clientId" });
|
|
124
|
+
Object.values(result.cookies.tokens).forEach((cookie) => {
|
|
125
|
+
expect(cookie.secure).toBe(true);
|
|
126
|
+
});
|
|
127
|
+
});
|
|
128
|
+
});
|
|
129
|
+
describe("createCivicAuthPlugin", () => {
|
|
130
|
+
it("should return a function", () => {
|
|
131
|
+
const plugin = createCivicAuthPlugin({ clientId: "clientId" });
|
|
132
|
+
expect(typeof plugin).toBe("function");
|
|
133
|
+
});
|
|
134
|
+
it("should set environment variables based on resolved config", () => {
|
|
135
|
+
const config = {
|
|
136
|
+
clientId: "clientId",
|
|
137
|
+
callbackUrl: "/custom/callback",
|
|
138
|
+
loginUrl: "/custom/login",
|
|
139
|
+
logoutUrl: "/custom/logout",
|
|
140
|
+
include: ["/protected/*"],
|
|
141
|
+
exclude: ["/public/*"],
|
|
142
|
+
cookies: {
|
|
143
|
+
tokens: defaultCookies,
|
|
144
|
+
user: {
|
|
145
|
+
secure: false,
|
|
146
|
+
sameSite: "strict",
|
|
147
|
+
maxAge: 3600,
|
|
148
|
+
},
|
|
149
|
+
},
|
|
150
|
+
};
|
|
151
|
+
const plugin = createCivicAuthPlugin(config);
|
|
152
|
+
const nextConfig = plugin({});
|
|
153
|
+
expect(nextConfig.env).toEqual({
|
|
154
|
+
_civic_auth_client_id: "clientId",
|
|
155
|
+
_civic_auth_callback_url: "/custom/callback",
|
|
156
|
+
_civic_auth_challenge_url: "/api/auth/challenge",
|
|
157
|
+
_civic_auth_login_url: "/custom/login",
|
|
158
|
+
_civic_auth_logout_url: "/custom/logout",
|
|
159
|
+
_civic_auth_includes: "/protected/*",
|
|
160
|
+
_civic_auth_excludes: "/public/*",
|
|
161
|
+
_civic_oauth_server: DEFAULT_AUTH_SERVER,
|
|
162
|
+
_civic_auth_cookie_config: JSON.stringify({
|
|
163
|
+
tokens: defaultCookies,
|
|
164
|
+
user: {
|
|
165
|
+
secure: false,
|
|
166
|
+
httpOnly: false,
|
|
167
|
+
sameSite: "strict",
|
|
168
|
+
path: "/",
|
|
169
|
+
maxAge: 3600,
|
|
170
|
+
},
|
|
171
|
+
}),
|
|
172
|
+
});
|
|
173
|
+
});
|
|
174
|
+
it("should merge with existing Next.js config", () => {
|
|
175
|
+
const existingConfig = {
|
|
176
|
+
reactStrictMode: true,
|
|
177
|
+
env: {
|
|
178
|
+
CUSTOM_VAR: "value",
|
|
179
|
+
},
|
|
180
|
+
};
|
|
181
|
+
const plugin = createCivicAuthPlugin({ clientId: "clientId" });
|
|
182
|
+
const nextConfig = plugin(existingConfig);
|
|
183
|
+
expect(nextConfig.reactStrictMode).toBe(true);
|
|
184
|
+
expect(nextConfig.env).toHaveProperty("CUSTOM_VAR", "value");
|
|
185
|
+
expect(nextConfig.env).toHaveProperty("_civic_auth_callback_url");
|
|
186
|
+
});
|
|
187
|
+
});
|
|
188
|
+
});
|
|
189
|
+
//# sourceMappingURL=config.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"config.test.js","sourceRoot":"","sources":["../../../../test/unit/nextjs/config.test.ts"],"names":[],"mappings":"AAAA,iDAAiD;AACjD,OAAO,EAAE,QAAQ,EAAE,EAAE,EAAE,MAAM,EAAE,UAAU,EAAE,SAAS,EAAE,EAAE,EAAE,MAAM,QAAQ,CAAC;AACzE,OAAO,EACL,iBAAiB,EACjB,qBAAqB,EAErB,iBAAiB,GAClB,MAAM,oBAAoB,CAAC;AAE5B,OAAO,EAAE,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AAErD,MAAM,cAAc,GAAG;IACrB,QAAQ,EAAE;QACR,QAAQ,EAAE,IAAI;QACd,IAAI,EAAE,GAAG;QACT,QAAQ,EAAE,QAAQ;QAClB,MAAM,EAAE,KAAK;KACd;IACD,YAAY,EAAE;QACZ,QAAQ,EAAE,IAAI;QACd,IAAI,EAAE,GAAG;QACT,QAAQ,EAAE,QAAQ;QAClB,MAAM,EAAE,KAAK;KACd;IACD,aAAa,EAAE;QACb,QAAQ,EAAE,IAAI;QACd,IAAI,EAAE,GAAG;QACT,QAAQ,EAAE,QAAQ;QAClB,MAAM,EAAE,KAAK;KACd;IACD,aAAa,EAAE;QACb,QAAQ,EAAE,IAAI;QACd,IAAI,EAAE,GAAG;QACT,QAAQ,EAAE,QAAQ;QAClB,MAAM,EAAE,KAAK;KACd;IACD,OAAO,EAAE;QACP,QAAQ,EAAE,IAAI;QACd,IAAI,EAAE,GAAG;QACT,QAAQ,EAAE,QAAQ;QAClB,MAAM,EAAE,KAAK;KACd;CACoB,CAAC;AAExB,QAAQ,CAAC,eAAe,EAAE,GAAG,EAAE;IAC7B,MAAM,WAAW,GAAG,OAAO,CAAC,GAAG,CAAC;IAEhC,UAAU,CAAC,GAAG,EAAE;QACd,EAAE,CAAC,YAAY,EAAE,CAAC;QAClB,OAAO,CAAC,GAAG,GAAG,EAAE,GAAG,WAAW,EAAE,QAAQ,EAAE,aAAa,EAAE,CAAC;IAC5D,CAAC,CAAC,CAAC;IAEH,SAAS,CAAC,GAAG,EAAE;QACb,OAAO,CAAC,GAAG,GAAG,WAAW,CAAC;QAC1B,EAAE,CAAC,eAAe,EAAE,CAAC;IACvB,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,mBAAmB,EAAE,GAAG,EAAE;QACjC,EAAE,CAAC,mDAAmD,EAAE,GAAG,EAAE;YAC3D,MAAM,CAAC,GAAG,EAAE,CAAC,iBAAiB,EAAE,CAAC,CAAC,YAAY,CAC5C,kCAAkC,CACnC,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,sDAAsD,EAAE,GAAG,EAAE;YAC9D,4BAA4B;YAC5B,OAAO,CAAC,GAAG,CAAC,qBAAqB,GAAG,UAAU,CAAC;YAC/C,MAAM,MAAM,GAAG,iBAAiB,EAAE,CAAC;YACnC,MAAM,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,EAAE,GAAG,iBAAiB,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAC;QACzE,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,qDAAqD,EAAE,GAAG,EAAE;YAC7D,MAAM,MAAM,GAAe;gBACzB,QAAQ,EAAE,UAAU;gBACpB,WAAW,EAAE,kBAAkB;gBAC/B,QAAQ,EAAE,eAAe;gBACzB,OAAO,EAAE,CAAC,cAAc,CAAC;gBACzB,OAAO,EAAE,CAAC,WAAW,CAAC;aACvB,CAAC;YACF,MAAM,MAAM,GAAG,iBAAiB,CAAC,MAAM,CAAC,CAAC;YACzC,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;YAC9C,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,OAAO,CAAC,CAAC,cAAc,CAAC,CAAC,CAAC;YACjD,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,OAAO,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC;QAChD,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,yCAAyC,EAAE,GAAG,EAAE;YACjD,OAAO,CAAC,GAAG,CAAC,qBAAqB,GAAG,UAAU,CAAC;YAC/C,OAAO,CAAC,GAAG,CAAC,wBAAwB,GAAG,eAAe,CAAC;YACvD,OAAO,CAAC,GAAG,CAAC,qBAAqB,GAAG,YAAY,CAAC;YACjD,OAAO,CAAC,GAAG,CAAC,oBAAoB,GAAG,kBAAkB,CAAC;YACtD,OAAO,CAAC,GAAG,CAAC,oBAAoB,GAAG,eAAe,CAAC;YAEnD,MAAM,MAAM,GAAG,iBAAiB,EAAE,CAAC;YACnC,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;YACjD,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YAC3C,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,OAAO,CAAC,CAAC,kBAAkB,CAAC,CAAC,CAAC;YACrD,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,OAAO,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC;QACpD,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,8DAA8D,EAAE,GAAG,EAAE;YACtE,OAAO,CAAC,GAAG,CAAC,wBAAwB,GAAG,eAAe,CAAC;YACvD,MAAM,MAAM,GAAe;gBACzB,QAAQ,EAAE,UAAU;gBACpB,WAAW,EAAE,kBAAkB;aAChC,CAAC;YAEF,MAAM,MAAM,GAAG,iBAAiB,CAAC,MAAM,CAAC,CAAC;YACzC,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;QACtD,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,8CAA8C,EAAE,GAAG,EAAE;YACtD,MAAM,MAAM,GAAe;gBACzB,QAAQ,EAAE,UAAU;gBACpB,OAAO,EAAE;oBACP,MAAM,EAAE;wBACN,QAAQ,EAAE,EAAE,GAAG,cAAc,CAAC,QAAQ,EAAE,MAAM,EAAE,KAAK,EAAE;qBAClC;oBACvB,IAAI,EAAE;wBACJ,QAAQ,EAAE,KAAK;wBACf,MAAM,EAAE,KAAK;wBACb,QAAQ,EAAE,QAAQ;qBACnB;iBACF;aACF,CAAC;YAEF,MAAM,MAAM,GAAG,iBAAiB,CAAC,MAAM,CAAC,CAAC;YACzC,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC;gBACpC,GAAG,cAAc;gBACjB,QAAQ,EAAE,EAAE,GAAG,cAAc,CAAC,QAAQ,EAAE,MAAM,EAAE,KAAK,EAAE;aACxD,CAAC,CAAC;YAEH,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC;gBAClC,QAAQ,EAAE,KAAK;gBACf,MAAM,EAAE,KAAK;gBACb,QAAQ,EAAE,QAAQ;gBAClB,IAAI,EAAE,GAAG;gBACT,MAAM,EAAE,IAAI;aACb,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,wFAAwF,EAAE,KAAK,IAAI,EAAE;YACtG,OAAO,CAAC,GAAG,GAAG,EAAE,GAAG,WAAW,EAAE,QAAQ,EAAE,YAAY,EAAE,CAAC;YACzD,yDAAyD;YACzD,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,+BAA+B,CAAC,CAAC;YAC9D,MAAM,MAAM,GAAG,OAAO,CAAC,iBAAiB,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAC;YACnE,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,CAAC,MAAM,EAAE,EAAE;gBACtD,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACnC,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,uBAAuB,EAAE,GAAG,EAAE;QACrC,EAAE,CAAC,0BAA0B,EAAE,GAAG,EAAE;YAClC,MAAM,MAAM,GAAG,qBAAqB,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAC;YAC/D,MAAM,CAAC,OAAO,MAAM,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,2DAA2D,EAAE,GAAG,EAAE;YACnE,MAAM,MAAM,GAAG;gBACb,QAAQ,EAAE,UAAU;gBACpB,WAAW,EAAE,kBAAkB;gBAC/B,QAAQ,EAAE,eAAe;gBACzB,SAAS,EAAE,gBAAgB;gBAC3B,OAAO,EAAE,CAAC,cAAc,CAAC;gBACzB,OAAO,EAAE,CAAC,WAAW,CAAC;gBACtB,OAAO,EAAE;oBACP,MAAM,EAAE,cAAc;oBACtB,IAAI,EAAE;wBACJ,MAAM,EAAE,KAAK;wBACb,QAAQ,EAAE,QAAQ;wBAClB,MAAM,EAAE,IAAI;qBACJ;iBACX;aACF,CAAC;YAEF,MAAM,MAAM,GAAG,qBAAqB,CAAC,MAAM,CAAC,CAAC;YAC7C,MAAM,UAAU,GAAG,MAAM,CAAC,EAAE,CAAC,CAAC;YAE9B,MAAM,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,OAAO,CAAC;gBAC7B,qBAAqB,EAAE,UAAU;gBACjC,wBAAwB,EAAE,kBAAkB;gBAC5C,yBAAyB,EAAE,qBAAqB;gBAChD,qBAAqB,EAAE,eAAe;gBACtC,sBAAsB,EAAE,gBAAgB;gBACxC,oBAAoB,EAAE,cAAc;gBACpC,oBAAoB,EAAE,WAAW;gBACjC,mBAAmB,EAAE,mBAAmB;gBACxC,yBAAyB,EAAE,IAAI,CAAC,SAAS,CAAC;oBACxC,MAAM,EAAE,cAAc;oBACtB,IAAI,EAAE;wBACJ,MAAM,EAAE,KAAK;wBACb,QAAQ,EAAE,KAAK;wBACf,QAAQ,EAAE,QAAQ;wBAClB,IAAI,EAAE,GAAG;wBACT,MAAM,EAAE,IAAI;qBACb;iBACF,CAAC;aACH,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,2CAA2C,EAAE,GAAG,EAAE;YACnD,MAAM,cAAc,GAAG;gBACrB,eAAe,EAAE,IAAI;gBACrB,GAAG,EAAE;oBACH,UAAU,EAAE,OAAO;iBACpB;aACF,CAAC;YAEF,MAAM,MAAM,GAAG,qBAAqB,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAC;YAC/D,MAAM,UAAU,GAAG,MAAM,CAAC,cAAc,CAAC,CAAC;YAE1C,MAAM,CAAC,UAAU,CAAC,eAAe,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAC9C,MAAM,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,cAAc,CAAC,YAAY,EAAE,OAAO,CAAC,CAAC;YAC7D,MAAM,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,cAAc,CAAC,0BAA0B,CAAC,CAAC;QACpE,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["/* eslint-disable turbo/no-undeclared-env-vars */\nimport { describe, it, expect, beforeEach, afterEach, vi } from \"vitest\";\nimport {\n resolveAuthConfig,\n createCivicAuthPlugin,\n type AuthConfig,\n defaultAuthConfig,\n} from \"@/nextjs/config.js\";\nimport type { TokensCookieConfig } from \"@/index.js\";\nimport { DEFAULT_AUTH_SERVER } from \"@/constants.js\";\n\nconst defaultCookies = {\n id_token: {\n httpOnly: true,\n path: \"/\",\n sameSite: \"strict\",\n secure: false,\n },\n access_token: {\n httpOnly: true,\n path: \"/\",\n sameSite: \"strict\",\n secure: false,\n },\n refresh_token: {\n httpOnly: true,\n path: \"/\",\n sameSite: \"strict\",\n secure: false,\n },\n code_verifier: {\n httpOnly: true,\n path: \"/\",\n sameSite: \"strict\",\n secure: false,\n },\n app_url: {\n httpOnly: true,\n path: \"/\",\n sameSite: \"strict\",\n secure: false,\n },\n} as TokensCookieConfig;\n\ndescribe(\"nextjs/config\", () => {\n const originalEnv = process.env;\n\n beforeEach(() => {\n vi.resetModules();\n process.env = { ...originalEnv, NODE_ENV: \"development\" };\n });\n\n afterEach(() => {\n process.env = originalEnv;\n vi.restoreAllMocks();\n });\n\n describe(\"resolveAuthConfig\", () => {\n it(\"should throw an error if clientId is not provided\", () => {\n expect(() => resolveAuthConfig()).toThrowError(\n \"Civic Auth client ID is required\",\n );\n });\n\n it(\"should use default values when no config is provided\", () => {\n // client id must be defined\n process.env._civic_auth_client_id = \"clientId\";\n const result = resolveAuthConfig();\n expect(result).toEqual({ ...defaultAuthConfig, clientId: \"clientId\" });\n });\n\n it(\"should override default values with provided config\", () => {\n const config: AuthConfig = {\n clientId: \"clientId\",\n callbackUrl: \"/custom/callback\",\n loginUrl: \"/custom/login\",\n include: [\"/protected/*\"],\n exclude: [\"/public/*\"],\n };\n const result = resolveAuthConfig(config);\n expect(result.callbackUrl).toBe(\"/custom/callback\");\n expect(result.loginUrl).toBe(\"/custom/login\");\n expect(result.include).toEqual([\"/protected/*\"]);\n expect(result.exclude).toEqual([\"/public/*\"]);\n });\n\n it(\"should use environment variables if set\", () => {\n process.env._civic_auth_client_id = \"clientId\";\n process.env._civic_auth_callback_url = \"/env/callback\";\n process.env._civic_auth_login_url = \"/env/login\";\n process.env._civic_auth_includes = \"/env/protected/*\";\n process.env._civic_auth_excludes = \"/env/public/*\";\n\n const result = resolveAuthConfig();\n expect(result.callbackUrl).toBe(\"/env/callback\");\n expect(result.loginUrl).toBe(\"/env/login\");\n expect(result.include).toEqual([\"/env/protected/*\"]);\n expect(result.exclude).toEqual([\"/env/public/*\"]);\n });\n\n it(\"should prioritize provided config over environment variables\", () => {\n process.env._civic_auth_callback_url = \"/env/callback\";\n const config: AuthConfig = {\n clientId: \"clientId\",\n callbackUrl: \"/config/callback\",\n };\n\n const result = resolveAuthConfig(config);\n expect(result.callbackUrl).toBe(\"/config/callback\");\n });\n\n it(\"should merge cookie configurations correctly\", () => {\n const config: AuthConfig = {\n clientId: \"clientId\",\n cookies: {\n tokens: {\n id_token: { ...defaultCookies.id_token, secure: false },\n } as TokensCookieConfig,\n user: {\n httpOnly: false,\n secure: false,\n sameSite: \"strict\",\n },\n },\n };\n\n const result = resolveAuthConfig(config);\n expect(result.cookies.tokens).toEqual({\n ...defaultCookies,\n id_token: { ...defaultCookies.id_token, secure: false },\n });\n\n expect(result.cookies.user).toEqual({\n httpOnly: false,\n secure: false,\n sameSite: \"strict\",\n path: \"/\",\n maxAge: 3600,\n });\n });\n\n it(\"should set secure to true in the default cookie configs if NODE_ENV is not development\", async () => {\n process.env = { ...originalEnv, NODE_ENV: \"production\" };\n // re-import to get the configs with the updated NODE_ENV\n const configs = await import(\"../../../src/nextjs/config.js\");\n const result = configs.resolveAuthConfig({ clientId: \"clientId\" });\n Object.values(result.cookies.tokens).forEach((cookie) => {\n expect(cookie.secure).toBe(true);\n });\n });\n });\n\n describe(\"createCivicAuthPlugin\", () => {\n it(\"should return a function\", () => {\n const plugin = createCivicAuthPlugin({ clientId: \"clientId\" });\n expect(typeof plugin).toBe(\"function\");\n });\n\n it(\"should set environment variables based on resolved config\", () => {\n const config = {\n clientId: \"clientId\",\n callbackUrl: \"/custom/callback\",\n loginUrl: \"/custom/login\",\n logoutUrl: \"/custom/logout\",\n include: [\"/protected/*\"],\n exclude: [\"/public/*\"],\n cookies: {\n tokens: defaultCookies,\n user: {\n secure: false,\n sameSite: \"strict\",\n maxAge: 3600,\n } as const,\n },\n };\n\n const plugin = createCivicAuthPlugin(config);\n const nextConfig = plugin({});\n\n expect(nextConfig.env).toEqual({\n _civic_auth_client_id: \"clientId\",\n _civic_auth_callback_url: \"/custom/callback\",\n _civic_auth_challenge_url: \"/api/auth/challenge\",\n _civic_auth_login_url: \"/custom/login\",\n _civic_auth_logout_url: \"/custom/logout\",\n _civic_auth_includes: \"/protected/*\",\n _civic_auth_excludes: \"/public/*\",\n _civic_oauth_server: DEFAULT_AUTH_SERVER,\n _civic_auth_cookie_config: JSON.stringify({\n tokens: defaultCookies,\n user: {\n secure: false,\n httpOnly: false,\n sameSite: \"strict\",\n path: \"/\",\n maxAge: 3600,\n },\n }),\n });\n });\n\n it(\"should merge with existing Next.js config\", () => {\n const existingConfig = {\n reactStrictMode: true,\n env: {\n CUSTOM_VAR: \"value\",\n },\n };\n\n const plugin = createCivicAuthPlugin({ clientId: \"clientId\" });\n const nextConfig = plugin(existingConfig);\n\n expect(nextConfig.reactStrictMode).toBe(true);\n expect(nextConfig.env).toHaveProperty(\"CUSTOM_VAR\", \"value\");\n expect(nextConfig.env).toHaveProperty(\"_civic_auth_callback_url\");\n });\n });\n});\n"]}
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
import { describe, it, expect, beforeEach, vi } from "vitest";
|
|
2
|
+
import { GenericUserSession } from "@/shared/lib/UserSession.js";
|
|
3
|
+
import { getUser } from "@/nextjs/index.js";
|
|
4
|
+
import { NextjsClientStorage } from "@/nextjs/cookies.js";
|
|
5
|
+
const mockUser = {
|
|
6
|
+
id: "user123",
|
|
7
|
+
name: "John Doe",
|
|
8
|
+
email: "john@example.com",
|
|
9
|
+
picture: "https://example.com/john.jpg",
|
|
10
|
+
idToken: "test-id-token",
|
|
11
|
+
accessToken: "test-access-token",
|
|
12
|
+
refreshToken: "test-refresh-token",
|
|
13
|
+
};
|
|
14
|
+
describe("getUser", () => {
|
|
15
|
+
beforeEach(() => {
|
|
16
|
+
vi.clearAllMocks();
|
|
17
|
+
vi.spyOn(GenericUserSession.prototype, "get").mockResolvedValue(mockUser);
|
|
18
|
+
vi.spyOn(NextjsClientStorage.prototype, "get").mockImplementation(async (cookieName) => {
|
|
19
|
+
switch (cookieName) {
|
|
20
|
+
case "access_token":
|
|
21
|
+
return Promise.resolve("test-access-token");
|
|
22
|
+
case "id_token":
|
|
23
|
+
return Promise.resolve("test-id-token");
|
|
24
|
+
case "refresh_token":
|
|
25
|
+
return Promise.resolve("test-refresh-token");
|
|
26
|
+
default:
|
|
27
|
+
return Promise.resolve(null);
|
|
28
|
+
}
|
|
29
|
+
});
|
|
30
|
+
});
|
|
31
|
+
it("should get the user from session", async () => {
|
|
32
|
+
const user = await getUser();
|
|
33
|
+
expect(user).toEqual(mockUser);
|
|
34
|
+
});
|
|
35
|
+
});
|
|
36
|
+
//# sourceMappingURL=getUser.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getUser.test.js","sourceRoot":"","sources":["../../../../test/unit/nextjs/getUser.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,EAAE,EAAE,MAAM,EAAE,UAAU,EAAE,EAAE,EAAE,MAAM,QAAQ,CAAC;AAC9D,OAAO,EAAE,kBAAkB,EAAE,MAAM,6BAA6B,CAAC;AAEjE,OAAO,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;AAC5C,OAAO,EAAE,mBAAmB,EAAE,MAAM,qBAAqB,CAAC;AAE1D,MAAM,QAAQ,GAAS;IACrB,EAAE,EAAE,SAAS;IACb,IAAI,EAAE,UAAU;IAChB,KAAK,EAAE,kBAAkB;IACzB,OAAO,EAAE,8BAA8B;IACvC,OAAO,EAAE,eAAe;IACxB,WAAW,EAAE,mBAAmB;IAChC,YAAY,EAAE,oBAAoB;CAChB,CAAC;AAErB,QAAQ,CAAC,SAAS,EAAE,GAAG,EAAE;IACvB,UAAU,CAAC,GAAG,EAAE;QACd,EAAE,CAAC,aAAa,EAAE,CAAC;QACnB,EAAE,CAAC,KAAK,CAAC,kBAAkB,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC1E,EAAE,CAAC,KAAK,CAAC,mBAAmB,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC,kBAAkB,CAC/D,KAAK,EAAE,UAAkB,EAAE,EAAE;YAC3B,QAAQ,UAAU,EAAE,CAAC;gBACnB,KAAK,cAAc;oBACjB,OAAO,OAAO,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC;gBAC9C,KAAK,UAAU;oBACb,OAAO,OAAO,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC;gBAC1C,KAAK,eAAe;oBAClB,OAAO,OAAO,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC;gBAC/C;oBACE,OAAO,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YACjC,CAAC;QACH,CAAC,CACF,CAAC;IACJ,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,kCAAkC,EAAE,KAAK,IAAI,EAAE;QAChD,MAAM,IAAI,GAAG,MAAM,OAAO,EAAE,CAAC;QAC7B,MAAM,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;IACjC,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["import { describe, it, expect, beforeEach, vi } from \"vitest\";\nimport { GenericUserSession } from \"@/shared/lib/UserSession.js\";\nimport type { User } from \"@/types.ts\";\nimport { getUser } from \"@/nextjs/index.js\";\nimport { NextjsClientStorage } from \"@/nextjs/cookies.js\";\n\nconst mockUser: User = {\n id: \"user123\",\n name: \"John Doe\",\n email: \"john@example.com\",\n picture: \"https://example.com/john.jpg\",\n idToken: \"test-id-token\",\n accessToken: \"test-access-token\",\n refreshToken: \"test-refresh-token\",\n} as unknown as User;\n\ndescribe(\"getUser\", () => {\n beforeEach(() => {\n vi.clearAllMocks();\n vi.spyOn(GenericUserSession.prototype, \"get\").mockResolvedValue(mockUser);\n vi.spyOn(NextjsClientStorage.prototype, \"get\").mockImplementation(\n async (cookieName: string) => {\n switch (cookieName) {\n case \"access_token\":\n return Promise.resolve(\"test-access-token\");\n case \"id_token\":\n return Promise.resolve(\"test-id-token\");\n case \"refresh_token\":\n return Promise.resolve(\"test-refresh-token\");\n default:\n return Promise.resolve(null);\n }\n },\n );\n });\n\n it(\"should get the user from session\", async () => {\n const user = await getUser();\n expect(user).toEqual(mockUser);\n });\n});\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"middleware.test.d.ts","sourceRoot":"","sources":["../../../../test/unit/nextjs/middleware.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,113 @@
|
|
|
1
|
+
import { describe, it, expect, beforeEach, vi } from "vitest";
|
|
2
|
+
import { NextResponse } from "next/server.js";
|
|
3
|
+
import { authMiddleware, withAuth } from "@/nextjs/middleware/index.js";
|
|
4
|
+
import { defaultAuthConfig } from "@/nextjs/config.js";
|
|
5
|
+
// Mock next/server
|
|
6
|
+
vi.mock("next/server.js", () => ({
|
|
7
|
+
NextResponse: {
|
|
8
|
+
next: vi.fn(() => ({ type: "next" })),
|
|
9
|
+
redirect: vi.fn((url) => ({ type: "redirect", url })),
|
|
10
|
+
},
|
|
11
|
+
}));
|
|
12
|
+
describe("Auth Middleware", () => {
|
|
13
|
+
let request;
|
|
14
|
+
beforeEach(() => {
|
|
15
|
+
// Reset mocks
|
|
16
|
+
vi.clearAllMocks();
|
|
17
|
+
// Create base request
|
|
18
|
+
request = {
|
|
19
|
+
nextUrl: {
|
|
20
|
+
pathname: "/protected",
|
|
21
|
+
},
|
|
22
|
+
cookies: {
|
|
23
|
+
get: vi.fn(),
|
|
24
|
+
},
|
|
25
|
+
method: "GET",
|
|
26
|
+
url: "http://example.com/protected",
|
|
27
|
+
};
|
|
28
|
+
process.env._civic_auth_client_id = "abc";
|
|
29
|
+
});
|
|
30
|
+
describe("authMiddleware", () => {
|
|
31
|
+
/* FIXME
|
|
32
|
+
it("should redirect to login when no token present", async () => {
|
|
33
|
+
const middleware = authMiddleware();
|
|
34
|
+
const response = await middleware(request);
|
|
35
|
+
|
|
36
|
+
expect(NextResponse.redirect).toHaveBeenCalledWith("http://example.com/");
|
|
37
|
+
expect(response.type).toBe("redirect");
|
|
38
|
+
});
|
|
39
|
+
*/
|
|
40
|
+
it("should allow access when token is present", async () => {
|
|
41
|
+
request.cookies.get = vi.fn().mockReturnValue({ value: "valid-token" });
|
|
42
|
+
const middleware = authMiddleware();
|
|
43
|
+
const response = await middleware(request);
|
|
44
|
+
expect(NextResponse.next).toHaveBeenCalled();
|
|
45
|
+
expect(response.type).toBe("next");
|
|
46
|
+
});
|
|
47
|
+
it("should skip auth check for redirect to login page", async () => {
|
|
48
|
+
request.nextUrl.pathname = "/login";
|
|
49
|
+
const middleware = authMiddleware({
|
|
50
|
+
...defaultAuthConfig,
|
|
51
|
+
loginUrl: "/login",
|
|
52
|
+
});
|
|
53
|
+
const response = await middleware(request);
|
|
54
|
+
expect(NextResponse.next).toHaveBeenCalled();
|
|
55
|
+
expect(response.type).toBe("next");
|
|
56
|
+
});
|
|
57
|
+
it("should not skip auth check for non-GET to login page", async () => {
|
|
58
|
+
request.nextUrl.pathname = "/login";
|
|
59
|
+
const middleware = authMiddleware({
|
|
60
|
+
...defaultAuthConfig,
|
|
61
|
+
loginUrl: "/login",
|
|
62
|
+
});
|
|
63
|
+
const response = await middleware({
|
|
64
|
+
...request,
|
|
65
|
+
method: "POST",
|
|
66
|
+
});
|
|
67
|
+
// should have redirected to the login page
|
|
68
|
+
expect(NextResponse.next).not.toHaveBeenCalled();
|
|
69
|
+
expect(response.type).toBe("redirect");
|
|
70
|
+
});
|
|
71
|
+
});
|
|
72
|
+
describe("withAuth", () => {
|
|
73
|
+
it("should chain custom middleware when authenticated", async () => {
|
|
74
|
+
request.cookies.get = vi.fn().mockReturnValue({ value: "valid-token" });
|
|
75
|
+
const customMiddleware = vi.fn(() => NextResponse.next());
|
|
76
|
+
const middleware = withAuth(customMiddleware);
|
|
77
|
+
await middleware(request);
|
|
78
|
+
expect(customMiddleware).toHaveBeenCalled();
|
|
79
|
+
});
|
|
80
|
+
it("should not chain custom middleware when unauthorized", async () => {
|
|
81
|
+
const customMiddleware = vi.fn(() => NextResponse.next());
|
|
82
|
+
const middleware = withAuth(customMiddleware);
|
|
83
|
+
const response = await middleware(request);
|
|
84
|
+
expect(customMiddleware).not.toHaveBeenCalled();
|
|
85
|
+
expect(NextResponse.redirect).toHaveBeenCalled();
|
|
86
|
+
expect(response.type).toBe("redirect");
|
|
87
|
+
});
|
|
88
|
+
});
|
|
89
|
+
describe("path matching", () => {
|
|
90
|
+
it("should respect include patterns", async () => {
|
|
91
|
+
request.cookies.get = vi.fn().mockReturnValue({ value: "valid-token" });
|
|
92
|
+
request.nextUrl.pathname = "/public";
|
|
93
|
+
const middleware = authMiddleware({
|
|
94
|
+
include: ["/protected/**"],
|
|
95
|
+
});
|
|
96
|
+
const response = await middleware(request);
|
|
97
|
+
expect(NextResponse.next).toHaveBeenCalled();
|
|
98
|
+
expect(response.type).toBe("next");
|
|
99
|
+
});
|
|
100
|
+
it("should respect exclude patterns", async () => {
|
|
101
|
+
request.cookies.get = vi.fn().mockReturnValue({ value: "valid-token" });
|
|
102
|
+
request.nextUrl.pathname = "/protected/public";
|
|
103
|
+
const middleware = authMiddleware({
|
|
104
|
+
include: ["/protected/**"],
|
|
105
|
+
exclude: ["/protected/public"],
|
|
106
|
+
});
|
|
107
|
+
const response = await middleware(request);
|
|
108
|
+
expect(NextResponse.next).toHaveBeenCalled();
|
|
109
|
+
expect(response.type).toBe("next");
|
|
110
|
+
});
|
|
111
|
+
});
|
|
112
|
+
});
|
|
113
|
+
//# sourceMappingURL=middleware.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"middleware.test.js","sourceRoot":"","sources":["../../../../test/unit/nextjs/middleware.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,EAAE,EAAE,MAAM,EAAE,UAAU,EAAE,EAAE,EAAE,MAAM,QAAQ,CAAC;AAC9D,OAAO,EAAE,YAAY,EAAoB,MAAM,gBAAgB,CAAC;AAChE,OAAO,EAAE,cAAc,EAAE,QAAQ,EAAE,MAAM,8BAA8B,CAAC;AACxE,OAAO,EAAE,iBAAiB,EAAE,MAAM,oBAAoB,CAAC;AAEvD,mBAAmB;AACnB,EAAE,CAAC,IAAI,CAAC,gBAAgB,EAAE,GAAG,EAAE,CAAC,CAAC;IAC/B,YAAY,EAAE;QACZ,IAAI,EAAE,EAAE,CAAC,EAAE,CAAC,GAAG,EAAE,CAAC,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC,CAAC;QACrC,QAAQ,EAAE,EAAE,CAAC,EAAE,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC,EAAE,IAAI,EAAE,UAAU,EAAE,GAAG,EAAE,CAAC,CAAC;KACtD;CACF,CAAC,CAAC,CAAC;AAEJ,QAAQ,CAAC,iBAAiB,EAAE,GAAG,EAAE;IAC/B,IAAI,OAAoB,CAAC;IAEzB,UAAU,CAAC,GAAG,EAAE;QACd,cAAc;QACd,EAAE,CAAC,aAAa,EAAE,CAAC;QAEnB,sBAAsB;QACtB,OAAO,GAAG;YACR,OAAO,EAAE;gBACP,QAAQ,EAAE,YAAY;aACvB;YACD,OAAO,EAAE;gBACP,GAAG,EAAE,EAAE,CAAC,EAAE,EAAE;aACb;YACD,MAAM,EAAE,KAAK;YACb,GAAG,EAAE,8BAA8B;SACV,CAAC;QAE5B,OAAO,CAAC,GAAG,CAAC,qBAAqB,GAAG,KAAK,CAAC;IAC5C,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,gBAAgB,EAAE,GAAG,EAAE;QAC9B;;;;;;;;UAQE;QAEF,EAAE,CAAC,2CAA2C,EAAE,KAAK,IAAI,EAAE;YACzD,OAAO,CAAC,OAAO,CAAC,GAAG,GAAG,EAAE,CAAC,EAAE,EAAE,CAAC,eAAe,CAAC,EAAE,KAAK,EAAE,aAAa,EAAE,CAAC,CAAC;YACxE,MAAM,UAAU,GAAG,cAAc,EAAE,CAAC;YACpC,MAAM,QAAQ,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,CAAC;YAE3C,MAAM,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC,gBAAgB,EAAE,CAAC;YAC7C,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACrC,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,mDAAmD,EAAE,KAAK,IAAI,EAAE;YACjE,OAAO,CAAC,OAAO,CAAC,QAAQ,GAAG,QAAQ,CAAC;YACpC,MAAM,UAAU,GAAG,cAAc,CAAC;gBAChC,GAAG,iBAAiB;gBACpB,QAAQ,EAAE,QAAQ;aACnB,CAAC,CAAC;YACH,MAAM,QAAQ,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,CAAC;YAE3C,MAAM,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC,gBAAgB,EAAE,CAAC;YAC7C,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACrC,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,sDAAsD,EAAE,KAAK,IAAI,EAAE;YACpE,OAAO,CAAC,OAAO,CAAC,QAAQ,GAAG,QAAQ,CAAC;YACpC,MAAM,UAAU,GAAG,cAAc,CAAC;gBAChC,GAAG,iBAAiB;gBACpB,QAAQ,EAAE,QAAQ;aACnB,CAAC,CAAC;YACH,MAAM,QAAQ,GAAG,MAAM,UAAU,CAAC;gBAChC,GAAG,OAAO;gBACV,MAAM,EAAE,MAAM;aACA,CAAC,CAAC;YAElB,2CAA2C;YAC3C,MAAM,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,gBAAgB,EAAE,CAAC;YACjD,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QACzC,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,UAAU,EAAE,GAAG,EAAE;QACxB,EAAE,CAAC,mDAAmD,EAAE,KAAK,IAAI,EAAE;YACjE,OAAO,CAAC,OAAO,CAAC,GAAG,GAAG,EAAE,CAAC,EAAE,EAAE,CAAC,eAAe,CAAC,EAAE,KAAK,EAAE,aAAa,EAAE,CAAC,CAAC;YACxE,MAAM,gBAAgB,GAAG,EAAE,CAAC,EAAE,CAAC,GAAG,EAAE,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC,CAAC;YAC1D,MAAM,UAAU,GAAG,QAAQ,CAAC,gBAAgB,CAAC,CAAC;YAE9C,MAAM,UAAU,CAAC,OAAO,CAAC,CAAC;YAE1B,MAAM,CAAC,gBAAgB,CAAC,CAAC,gBAAgB,EAAE,CAAC;QAC9C,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,sDAAsD,EAAE,KAAK,IAAI,EAAE;YACpE,MAAM,gBAAgB,GAAG,EAAE,CAAC,EAAE,CAAC,GAAG,EAAE,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC,CAAC;YAC1D,MAAM,UAAU,GAAG,QAAQ,CAAC,gBAAgB,CAAC,CAAC;YAE9C,MAAM,QAAQ,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,CAAC;YAE3C,MAAM,CAAC,gBAAgB,CAAC,CAAC,GAAG,CAAC,gBAAgB,EAAE,CAAC;YAChD,MAAM,CAAC,YAAY,CAAC,QAAQ,CAAC,CAAC,gBAAgB,EAAE,CAAC;YACjD,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QACzC,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,eAAe,EAAE,GAAG,EAAE;QAC7B,EAAE,CAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;YAC/C,OAAO,CAAC,OAAO,CAAC,GAAG,GAAG,EAAE,CAAC,EAAE,EAAE,CAAC,eAAe,CAAC,EAAE,KAAK,EAAE,aAAa,EAAE,CAAC,CAAC;YACxE,OAAO,CAAC,OAAO,CAAC,QAAQ,GAAG,SAAS,CAAC;YAErC,MAAM,UAAU,GAAG,cAAc,CAAC;gBAChC,OAAO,EAAE,CAAC,eAAe,CAAC;aAC3B,CAAC,CAAC;YAEH,MAAM,QAAQ,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,CAAC;YAE3C,MAAM,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC,gBAAgB,EAAE,CAAC;YAC7C,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACrC,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;YAC/C,OAAO,CAAC,OAAO,CAAC,GAAG,GAAG,EAAE,CAAC,EAAE,EAAE,CAAC,eAAe,CAAC,EAAE,KAAK,EAAE,aAAa,EAAE,CAAC,CAAC;YACxE,OAAO,CAAC,OAAO,CAAC,QAAQ,GAAG,mBAAmB,CAAC;YAE/C,MAAM,UAAU,GAAG,cAAc,CAAC;gBAChC,OAAO,EAAE,CAAC,eAAe,CAAC;gBAC1B,OAAO,EAAE,CAAC,mBAAmB,CAAC;aAC/B,CAAC,CAAC;YAEH,MAAM,QAAQ,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,CAAC;YAE3C,MAAM,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC,gBAAgB,EAAE,CAAC;YAC7C,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACrC,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["import { describe, it, expect, beforeEach, vi } from \"vitest\";\nimport { NextResponse, type NextRequest } from \"next/server.js\";\nimport { authMiddleware, withAuth } from \"@/nextjs/middleware/index.js\";\nimport { defaultAuthConfig } from \"@/nextjs/config.js\";\n\n// Mock next/server\nvi.mock(\"next/server.js\", () => ({\n NextResponse: {\n next: vi.fn(() => ({ type: \"next\" })),\n redirect: vi.fn((url) => ({ type: \"redirect\", url })),\n },\n}));\n\ndescribe(\"Auth Middleware\", () => {\n let request: NextRequest;\n\n beforeEach(() => {\n // Reset mocks\n vi.clearAllMocks();\n\n // Create base request\n request = {\n nextUrl: {\n pathname: \"/protected\",\n },\n cookies: {\n get: vi.fn(),\n },\n method: \"GET\",\n url: \"http://example.com/protected\",\n } as unknown as NextRequest;\n\n process.env._civic_auth_client_id = \"abc\";\n });\n\n describe(\"authMiddleware\", () => {\n /* FIXME\n it(\"should redirect to login when no token present\", async () => {\n const middleware = authMiddleware();\n const response = await middleware(request);\n\n expect(NextResponse.redirect).toHaveBeenCalledWith(\"http://example.com/\");\n expect(response.type).toBe(\"redirect\");\n });\n */\n\n it(\"should allow access when token is present\", async () => {\n request.cookies.get = vi.fn().mockReturnValue({ value: \"valid-token\" });\n const middleware = authMiddleware();\n const response = await middleware(request);\n\n expect(NextResponse.next).toHaveBeenCalled();\n expect(response.type).toBe(\"next\");\n });\n\n it(\"should skip auth check for redirect to login page\", async () => {\n request.nextUrl.pathname = \"/login\";\n const middleware = authMiddleware({\n ...defaultAuthConfig,\n loginUrl: \"/login\",\n });\n const response = await middleware(request);\n\n expect(NextResponse.next).toHaveBeenCalled();\n expect(response.type).toBe(\"next\");\n });\n\n it(\"should not skip auth check for non-GET to login page\", async () => {\n request.nextUrl.pathname = \"/login\";\n const middleware = authMiddleware({\n ...defaultAuthConfig,\n loginUrl: \"/login\",\n });\n const response = await middleware({\n ...request,\n method: \"POST\",\n } as NextRequest);\n\n // should have redirected to the login page\n expect(NextResponse.next).not.toHaveBeenCalled();\n expect(response.type).toBe(\"redirect\");\n });\n });\n\n describe(\"withAuth\", () => {\n it(\"should chain custom middleware when authenticated\", async () => {\n request.cookies.get = vi.fn().mockReturnValue({ value: \"valid-token\" });\n const customMiddleware = vi.fn(() => NextResponse.next());\n const middleware = withAuth(customMiddleware);\n\n await middleware(request);\n\n expect(customMiddleware).toHaveBeenCalled();\n });\n\n it(\"should not chain custom middleware when unauthorized\", async () => {\n const customMiddleware = vi.fn(() => NextResponse.next());\n const middleware = withAuth(customMiddleware);\n\n const response = await middleware(request);\n\n expect(customMiddleware).not.toHaveBeenCalled();\n expect(NextResponse.redirect).toHaveBeenCalled();\n expect(response.type).toBe(\"redirect\");\n });\n });\n\n describe(\"path matching\", () => {\n it(\"should respect include patterns\", async () => {\n request.cookies.get = vi.fn().mockReturnValue({ value: \"valid-token\" });\n request.nextUrl.pathname = \"/public\";\n\n const middleware = authMiddleware({\n include: [\"/protected/**\"],\n });\n\n const response = await middleware(request);\n\n expect(NextResponse.next).toHaveBeenCalled();\n expect(response.type).toBe(\"next\");\n });\n\n it(\"should respect exclude patterns\", async () => {\n request.cookies.get = vi.fn().mockReturnValue({ value: \"valid-token\" });\n request.nextUrl.pathname = \"/protected/public\";\n\n const middleware = authMiddleware({\n include: [\"/protected/**\"],\n exclude: [\"/protected/public\"],\n });\n\n const response = await middleware(request);\n\n expect(NextResponse.next).toHaveBeenCalled();\n expect(response.type).toBe(\"next\");\n });\n });\n});\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"utils.test.d.ts","sourceRoot":"","sources":["../../../../test/unit/nextjs/utils.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
import { describe, it, expect } from "vitest";
|
|
2
|
+
import { resolveCallbackUrl } from "@/nextjs/utils.js";
|
|
3
|
+
describe("Nextjs utils", () => {
|
|
4
|
+
describe("resolveCallbackUrl", () => {
|
|
5
|
+
it("should resolve the callbackUrl by combining the relative callbackUrl from config with baseUrl", () => {
|
|
6
|
+
const callbackUrl = resolveCallbackUrl({
|
|
7
|
+
callbackUrl: "/callback",
|
|
8
|
+
}, "https://example.com");
|
|
9
|
+
expect(callbackUrl).toBe("https://example.com/callback");
|
|
10
|
+
});
|
|
11
|
+
});
|
|
12
|
+
});
|
|
13
|
+
//# sourceMappingURL=utils.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"utils.test.js","sourceRoot":"","sources":["../../../../test/unit/nextjs/utils.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,EAAE,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAE9C,OAAO,EAAE,kBAAkB,EAAE,MAAM,mBAAmB,CAAC;AAEvD,QAAQ,CAAC,cAAc,EAAE,GAAG,EAAE;IAC5B,QAAQ,CAAC,oBAAoB,EAAE,GAAG,EAAE;QAClC,EAAE,CAAC,+FAA+F,EAAE,GAAG,EAAE;YACvG,MAAM,WAAW,GAAG,kBAAkB,CACpC;gBACE,WAAW,EAAE,WAAW;aACY,EACtC,qBAAqB,CACtB,CAAC;YACF,MAAM,CAAC,WAAW,CAAC,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC;QAC3D,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["import { describe, it, expect } from \"vitest\";\nimport type { AuthConfigWithDefaults } from \"@/nextjs/config.js\";\nimport { resolveCallbackUrl } from \"@/nextjs/utils.js\";\n\ndescribe(\"Nextjs utils\", () => {\n describe(\"resolveCallbackUrl\", () => {\n it(\"should resolve the callbackUrl by combining the relative callbackUrl from config with baseUrl\", () => {\n const callbackUrl = resolveCallbackUrl(\n {\n callbackUrl: \"/callback\",\n } as unknown as AuthConfigWithDefaults,\n \"https://example.com\",\n );\n expect(callbackUrl).toBe(\"https://example.com/callback\");\n });\n });\n});\n"]}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import * as authClient from "../../../src/reactjs/index.js";
|
|
2
|
+
import { describe, expect, it } from "vitest";
|
|
3
|
+
// This test checks if the current state of the authClient matches the previously saved snapshot.
|
|
4
|
+
// If the API updates, you will need to update the snapshot by running the test:update script, i.e. `pnpm test:update`
|
|
5
|
+
describe("Auth Client Public API Snapshot", () => {
|
|
6
|
+
it("should match the previous API snapshot", () => {
|
|
7
|
+
expect(authClient).toMatchSnapshot();
|
|
8
|
+
});
|
|
9
|
+
});
|
|
10
|
+
//# sourceMappingURL=apiSnapshot.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"apiSnapshot.test.js","sourceRoot":"","sources":["../../../../test/unit/publicApi/apiSnapshot.test.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,UAAU,MAAM,+BAA+B,CAAC;AAE5D,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,EAAE,EAAE,MAAM,QAAQ,CAAC;AAE9C,iGAAiG;AACjG,sHAAsH;AACtH,QAAQ,CAAC,iCAAiC,EAAE,GAAG,EAAE;IAC/C,EAAE,CAAC,wCAAwC,EAAE,GAAG,EAAE;QAChD,MAAM,CAAC,UAAU,CAAC,CAAC,eAAe,EAAE,CAAC;IACvC,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["import * as authClient from \"../../../src/reactjs/index.js\";\n\nimport { describe, expect, it } from \"vitest\";\n\n// This test checks if the current state of the authClient matches the previously saved snapshot.\n// If the API updates, you will need to update the snapshot by running the test:update script, i.e. `pnpm test:update`\ndescribe(\"Auth Client Public API Snapshot\", () => {\n it(\"should match the previous API snapshot\", () => {\n expect(authClient).toMatchSnapshot();\n });\n});\n"]}
|
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
import { describe, it, expect, vi } from "vitest";
|
|
2
|
+
import React from "react";
|
|
3
|
+
import { fireEvent, render, screen } from "@testing-library/react";
|
|
4
|
+
import { CivicAuthProvider } from "@/shared/providers/CivicAuthProvider.js";
|
|
5
|
+
import { SignInButton } from "@/reactjs/components/SignInButton.js";
|
|
6
|
+
import * as civicHook from "@/reactjs/hooks/useUser.js";
|
|
7
|
+
describe("SignInButton Component", () => {
|
|
8
|
+
beforeEach(() => {
|
|
9
|
+
vi.clearAllMocks();
|
|
10
|
+
});
|
|
11
|
+
it("should render a SignInButton component", () => {
|
|
12
|
+
render(React.createElement(CivicAuthProvider, { clientId: "test-client-id", redirectUrl: "https://example.com" },
|
|
13
|
+
React.createElement(SignInButton, null)));
|
|
14
|
+
expect(screen.getByText("Sign In")).toBeDefined();
|
|
15
|
+
});
|
|
16
|
+
it("should call signIn when the button is clicked", () => {
|
|
17
|
+
const mockSignIn = vi.fn();
|
|
18
|
+
vi.spyOn(civicHook, "useUser").mockReturnValue({
|
|
19
|
+
signIn: mockSignIn,
|
|
20
|
+
signOut: async () => { },
|
|
21
|
+
error: null,
|
|
22
|
+
isLoading: false,
|
|
23
|
+
user: null,
|
|
24
|
+
});
|
|
25
|
+
render(React.createElement(CivicAuthProvider, { clientId: "test-client-id", redirectUrl: "https://example.com" },
|
|
26
|
+
React.createElement(SignInButton, null)));
|
|
27
|
+
fireEvent.click(screen.getByText("Sign In"));
|
|
28
|
+
expect(mockSignIn).toHaveBeenCalled();
|
|
29
|
+
});
|
|
30
|
+
});
|
|
31
|
+
//# sourceMappingURL=SignInButton.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SignInButton.test.js","sourceRoot":"","sources":["../../../../../test/unit/react/components/SignInButton.test.tsx"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,EAAE,MAAM,QAAQ,CAAC;AAClD,OAAO,KAAK,MAAM,OAAO,CAAC;AAC1B,OAAO,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AACnE,OAAO,EAAE,iBAAiB,EAAE,MAAM,yCAAyC,CAAC;AAC5E,OAAO,EAAE,YAAY,EAAE,MAAM,sCAAsC,CAAC;AACpE,OAAO,KAAK,SAAS,MAAM,4BAA4B,CAAC;AAExD,QAAQ,CAAC,wBAAwB,EAAE,GAAG,EAAE;IACtC,UAAU,CAAC,GAAG,EAAE;QACd,EAAE,CAAC,aAAa,EAAE,CAAC;IACrB,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,wCAAwC,EAAE,GAAG,EAAE;QAChD,MAAM,CACJ,oBAAC,iBAAiB,IAChB,QAAQ,EAAC,gBAAgB,EACzB,WAAW,EAAC,qBAAqB;YAEjC,oBAAC,YAAY,OAAG,CACE,CACrB,CAAC;QAEF,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,CAAC,WAAW,EAAE,CAAC;IACpD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,+CAA+C,EAAE,GAAG,EAAE;QACvD,MAAM,UAAU,GAAG,EAAE,CAAC,EAAE,EAAE,CAAC;QAE3B,EAAE,CAAC,KAAK,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC,eAAe,CAAC;YAC7C,MAAM,EAAE,UAAU;YAClB,OAAO,EAAE,KAAK,IAAI,EAAE,GAAE,CAAC;YACvB,KAAK,EAAE,IAAI;YACX,SAAS,EAAE,KAAK;YAChB,IAAI,EAAE,IAAI;SACX,CAAC,CAAC;QAEH,MAAM,CACJ,oBAAC,iBAAiB,IAChB,QAAQ,EAAC,gBAAgB,EACzB,WAAW,EAAC,qBAAqB;YAEjC,oBAAC,YAAY,OAAG,CACE,CACrB,CAAC;QAEF,SAAS,CAAC,KAAK,CAAC,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,CAAC;QAE7C,MAAM,CAAC,UAAU,CAAC,CAAC,gBAAgB,EAAE,CAAC;IACxC,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["import { describe, it, expect, vi } from \"vitest\";\nimport React from \"react\";\nimport { fireEvent, render, screen } from \"@testing-library/react\";\nimport { CivicAuthProvider } from \"@/shared/providers/CivicAuthProvider.js\";\nimport { SignInButton } from \"@/reactjs/components/SignInButton.js\";\nimport * as civicHook from \"@/reactjs/hooks/useUser.js\";\n\ndescribe(\"SignInButton Component\", () => {\n beforeEach(() => {\n vi.clearAllMocks();\n });\n\n it(\"should render a SignInButton component\", () => {\n render(\n <CivicAuthProvider\n clientId=\"test-client-id\"\n redirectUrl=\"https://example.com\"\n >\n <SignInButton />\n </CivicAuthProvider>,\n );\n\n expect(screen.getByText(\"Sign In\")).toBeDefined();\n });\n\n it(\"should call signIn when the button is clicked\", () => {\n const mockSignIn = vi.fn();\n\n vi.spyOn(civicHook, \"useUser\").mockReturnValue({\n signIn: mockSignIn,\n signOut: async () => {},\n error: null,\n isLoading: false,\n user: null,\n });\n\n render(\n <CivicAuthProvider\n clientId=\"test-client-id\"\n redirectUrl=\"https://example.com\"\n >\n <SignInButton />\n </CivicAuthProvider>,\n );\n\n fireEvent.click(screen.getByText(\"Sign In\"));\n\n expect(mockSignIn).toHaveBeenCalled();\n });\n});\n"]}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
import { describe, it, expect, vi } from "vitest";
|
|
2
|
+
import { fireEvent, render, screen } from "@testing-library/react";
|
|
3
|
+
import { CivicAuthProvider, SignOutButton } from "@/reactjs/index.js";
|
|
4
|
+
import * as userHook from "@/reactjs/hooks/useUser.js";
|
|
5
|
+
import React from "react";
|
|
6
|
+
describe("SignOutButton Component", () => {
|
|
7
|
+
beforeEach(() => {
|
|
8
|
+
vi.clearAllMocks();
|
|
9
|
+
});
|
|
10
|
+
it("should render a SignOutButton component", () => {
|
|
11
|
+
render(React.createElement(CivicAuthProvider, { clientId: "test-client-id", redirectUrl: "https://example.com" },
|
|
12
|
+
React.createElement(SignOutButton, null)));
|
|
13
|
+
expect(screen.getByText("Sign Out")).toBeDefined();
|
|
14
|
+
});
|
|
15
|
+
it("should call signIn when the button is clicked", () => {
|
|
16
|
+
const mockSignOut = vi.fn();
|
|
17
|
+
vi.spyOn(userHook, "useUser").mockReturnValue({
|
|
18
|
+
signOut: mockSignOut,
|
|
19
|
+
signIn: async () => { },
|
|
20
|
+
error: null,
|
|
21
|
+
isLoading: false,
|
|
22
|
+
user: null,
|
|
23
|
+
});
|
|
24
|
+
render(React.createElement(CivicAuthProvider, { clientId: "test-client-id", redirectUrl: "https://example.com" },
|
|
25
|
+
React.createElement(SignOutButton, null)));
|
|
26
|
+
fireEvent.click(screen.getByText("Sign Out"));
|
|
27
|
+
expect(mockSignOut).toHaveBeenCalled();
|
|
28
|
+
});
|
|
29
|
+
});
|
|
30
|
+
//# sourceMappingURL=SignOutButton.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SignOutButton.test.js","sourceRoot":"","sources":["../../../../../test/unit/react/components/SignOutButton.test.tsx"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,EAAE,MAAM,QAAQ,CAAC;AAClD,OAAO,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AACnE,OAAO,EAAE,iBAAiB,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AACtE,OAAO,KAAK,QAAQ,MAAM,4BAA4B,CAAC;AACvD,OAAO,KAAK,MAAM,OAAO,CAAC;AAE1B,QAAQ,CAAC,yBAAyB,EAAE,GAAG,EAAE;IACvC,UAAU,CAAC,GAAG,EAAE;QACd,EAAE,CAAC,aAAa,EAAE,CAAC;IACrB,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,yCAAyC,EAAE,GAAG,EAAE;QACjD,MAAM,CACJ,oBAAC,iBAAiB,IAChB,QAAQ,EAAC,gBAAgB,EACzB,WAAW,EAAC,qBAAqB;YAEjC,oBAAC,aAAa,OAAG,CACC,CACrB,CAAC;QAEF,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,WAAW,EAAE,CAAC;IACrD,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,+CAA+C,EAAE,GAAG,EAAE;QACvD,MAAM,WAAW,GAAG,EAAE,CAAC,EAAE,EAAE,CAAC;QAE5B,EAAE,CAAC,KAAK,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC,eAAe,CAAC;YAC5C,OAAO,EAAE,WAAW;YACpB,MAAM,EAAE,KAAK,IAAI,EAAE,GAAE,CAAC;YACtB,KAAK,EAAE,IAAI;YACX,SAAS,EAAE,KAAK;YAChB,IAAI,EAAE,IAAI;SACX,CAAC,CAAC;QAEH,MAAM,CACJ,oBAAC,iBAAiB,IAChB,QAAQ,EAAC,gBAAgB,EACzB,WAAW,EAAC,qBAAqB;YAEjC,oBAAC,aAAa,OAAG,CACC,CACrB,CAAC;QAEF,SAAS,CAAC,KAAK,CAAC,MAAM,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC;QAE9C,MAAM,CAAC,WAAW,CAAC,CAAC,gBAAgB,EAAE,CAAC;IACzC,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["import { describe, it, expect, vi } from \"vitest\";\nimport { fireEvent, render, screen } from \"@testing-library/react\";\nimport { CivicAuthProvider, SignOutButton } from \"@/reactjs/index.js\";\nimport * as userHook from \"@/reactjs/hooks/useUser.js\";\nimport React from \"react\";\n\ndescribe(\"SignOutButton Component\", () => {\n beforeEach(() => {\n vi.clearAllMocks();\n });\n\n it(\"should render a SignOutButton component\", () => {\n render(\n <CivicAuthProvider\n clientId=\"test-client-id\"\n redirectUrl=\"https://example.com\"\n >\n <SignOutButton />\n </CivicAuthProvider>,\n );\n\n expect(screen.getByText(\"Sign Out\")).toBeDefined();\n });\n\n it(\"should call signIn when the button is clicked\", () => {\n const mockSignOut = vi.fn();\n\n vi.spyOn(userHook, \"useUser\").mockReturnValue({\n signOut: mockSignOut,\n signIn: async () => {},\n error: null,\n isLoading: false,\n user: null,\n });\n\n render(\n <CivicAuthProvider\n clientId=\"test-client-id\"\n redirectUrl=\"https://example.com\"\n >\n <SignOutButton />\n </CivicAuthProvider>,\n );\n\n fireEvent.click(screen.getByText(\"Sign Out\"));\n\n expect(mockSignOut).toHaveBeenCalled();\n });\n});\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserSession.test.d.ts","sourceRoot":"","sources":["../../../../test/unit/shared/UserSession.test.ts"],"names":[],"mappings":""}
|