Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature to Encrypt user email in database #2627

Open
wants to merge 50 commits into
base: develop
Choose a base branch
from

Conversation

prayanshchh
Copy link

@prayanshchh prayanshchh commented Oct 29, 2024

What kind of change does this PR introduce?
Feature to encrypt user email addresses in the Database

Issue Number:
#1756
Fixes #

Did you add tests for your changes?
Yes

Snapshots/Videos:

If relevant, did you update the documentation?
No

Summary
two functionalities have been implemented

encryption and decryption of emails
storing hashingEmails in db
storing encrypted emails in db, decrypted function is implemented to decrypt emails
hashed version of email is also stored in db, for faster lookups we can use hashing if a match occurs then we can return a encrypted or a decrypted email based on the functionality.

hashing was introduced to avoid going through all the users and decrypting every email to find a match, hashing makes this faster.

Does this PR introduce a breaking change?
Yes this is a significant change in the codebase

Other information

Have you read the contributing guide?

Summary by CodeRabbit

Release Notes

  • New Features

    • Introduced email encryption and hashing for enhanced security across user-related functionalities.
    • Added environment variables ENCRYPTION_KEY and HASH_PEPPER for secure email handling.
    • Updated user profile to include hashedEmail and encrypted email fields.
  • Bug Fixes

    • Improved error handling in various resolvers to ensure accurate feedback during user retrieval and email processing.
  • Documentation

    • Enhanced documentation for environment variables and their usage in the setup process.
  • Tests

    • Updated tests to incorporate email encryption and hashing, ensuring that user data is handled securely in all scenarios.

Copy link

coderabbitai bot commented Oct 29, 2024

Walkthrough

This pull request introduces significant changes to enhance email security within the application. It adds new environment variables ENCRYPTION_KEY and HASH_PEPPER to manage email encryption and hashing. The user data structure is updated to include a hashed email and an encrypted email, which are processed during user creation, login, and other operations. Additionally, the GraphQL schema is modified to include the new hashedEmail field, and various resolver functions are updated to incorporate email decryption and hashing mechanisms.

Changes

File Path Change Summary
.env.sample Added ENCRYPTION_KEY and HASH_PEPPER environment variables.
sample_data/defaultUser.json Updated email field to encrypted format; added hashedEmail field.
schema.graphql Added hashedEmail to User type; reformatted method signatures for clarity.
setup.ts Introduced setEncryptionKey and setHashPepper functions; improved error handling.
src/env.ts Added ENCRYPTION_KEY property with validation logic.
src/models/User.ts Added hashedEmail property; modified email validation logic with pre-save hook.
src/resolvers/MembershipRequest/user.ts Updated logic to decrypt email in the user resolver.
src/resolvers/Mutation/forgotPassword.ts Changed email lookup to use hashed email instead of plain email.
src/resolvers/Mutation/login.ts Updated login logic to use hashed email for user retrieval.
src/resolvers/Mutation/otp.ts Modified to use hashed email for user identification.
src/resolvers/Mutation/signUp.ts Enhanced email processing to include encryption and hashing.
src/resolvers/Mutation/updateUserProfile.ts Updated email handling to use decryption and hashing.
src/utilities/createSampleOrganizationUtil.ts Enhanced user data generation with email encryption and hashing.
src/utilities/encryption.ts Implemented email encryption and decryption functions.
src/utilities/hashEmail.ts Introduced functions for hashing emails and securely comparing hashed values.
tests/... Various test files updated to incorporate new email handling logic, including encryption and hashing.
.github/workflows/pull-request.yml Added new environment variables for email handling in CI jobs.

Possibly related PRs

Poem

In the burrows deep, where secrets lie,
We guard our emails, oh so spry.
With keys of encryption, and hashes so grand,
Our data's secure, just as we planned.
So hop with joy, for safety's our quest,
In the world of code, we do our best! 🐇✨


📜 Recent review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between cac3465 and 12a7e58.

📒 Files selected for processing (2)
  • .github/workflows/pull-request.yml (1 hunks)
  • src/resolvers/Post/creator.ts (2 hunks)
🚧 Files skipped from review as they are similar to previous changes (1)
  • src/resolvers/Post/creator.ts
🧰 Additional context used
🪛 Gitleaks
.github/workflows/pull-request.yml

221-221: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)

🔇 Additional comments (1)
.github/workflows/pull-request.yml (1)

221-223: ⚠️ Potential issue

CRITICAL: Remove hardcoded encryption keys from workflow file

The hardcoded encryption and hash pepper keys in the workflow file pose a significant security risk, even for test environments. These cryptographic materials should never be committed to version control.

Please follow the previous review suggestion to:

  1. Remove the hardcoded values
  2. Use GitHub secrets instead:
-      ENCRYPTION_KEY: 64730e71158b84687f01237d8f8128cc9cb7804d2d68c36823880456adad48c7
-      HASH_PEPPER: 56195a1bd9b062fc4a63afff383ec28bf1464706725ae744c9fe7fc459426074
+      ENCRYPTION_KEY: ${{ secrets.TEST_ENCRYPTION_KEY }}
+      HASH_PEPPER: ${{ secrets.TEST_HASH_PEPPER }}
  1. Set up new test-specific keys in GitHub Actions secrets (do not reuse these exposed values)
🧰 Tools
🪛 Gitleaks

221-221: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link

Our Pull Request Approval Process

We have these basic policies to make the approval process smoother for our volunteer team.

Testing Your Code

Please make sure your code passes all tests. Our test code coverage system will fail if these conditions occur:

  1. The overall code coverage drops below the target threshold of the repository
  2. Any file in the pull request has code coverage levels below the repository threshold
  3. Merge conflicts

The process helps maintain the overall reliability of the code base and is a prerequisite for getting your PR approved. Assigned reviewers regularly review the PR queue and tend to focus on PRs that are passing.

Reviewers

Do not assign reviewers. Our Queue Monitors will review your PR and assign them.
When your PR has been assigned reviewers contact them to get your code reviewed and approved via:

  1. comments in this PR or
  2. our slack channel

Reviewing Your Code

Your reviewer(s) will have the following roles:

  1. arbitrators of future discussions with other contributors about the validity of your changes
  2. point of contact for evaluating the validity of your work
  3. person who verifies matching issues by others that should be closed.
  4. person who gives general guidance in fixing your tests

CONTRIBUTING.md

Read our CONTRIBUTING.md file. Most importantly:

  1. PRs with issues not assigned to you will be closed by the reviewer
  2. Fix the first comment in the PR so that each issue listed automatically closes

Other

  1. 🎯 Please be considerate of our volunteers' time. Contacting the person who assigned the reviewers is not advised unless they ask for your input. Do not @ the person who did the assignment otherwise.
  2. Read the CONTRIBUTING.md file make

@prayanshchh
Copy link
Author

prayanshchh commented Oct 29, 2024

will fix these linting errors, and I have to edit .env.sample, setup.ts and schema.graphql to implement this functionality

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Caution

Inline review comments failed to post. This is likely due to GitHub's limits when posting large numbers of comments.

🛑 Comments failed to post (68)
sample_data/defaultUser.json (1)

13-14: ⚠️ Potential issue

⚠️ Security: Avoid committing real encryption outputs in sample data

While the encryption implementation looks solid, it's recommended to use placeholder/mock encrypted and hashed values in sample data files to avoid potentially leaking information about the encryption patterns (IV/salt).

Consider replacing with clearly marked sample values:

-    "email": "84ced9952afed3c0ef7b998a835603f6:0da463e5928e34c4d32a1117b8c77649:8c28567b1daa0427f8214873e241392eebf94d913b97",
-    "hashedEmail": "d8efa7dd6141f95c75295d4f9beacd06216d0f72450ed99b87231f5909cbc190",
+    "email": "SAMPLE_IV:SAMPLE_SALT:SAMPLE_ENCRYPTED_EMAIL",
+    "hashedEmail": "SAMPLE_HASHED_EMAIL_VALUE",
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

    "email": "SAMPLE_IV:SAMPLE_SALT:SAMPLE_ENCRYPTED_EMAIL",
    "hashedEmail": "SAMPLE_HASHED_EMAIL_VALUE",
tests/utilities/encryptionModule.spec.ts (3)

1-7: ⚠️ Potential issue

Add test cases for error scenarios

The test suite currently only covers the happy path. For security-critical features like encryption, it's crucial to test error scenarios.

Consider adding test cases for:

  • Invalid encryption key
  • Malformed encrypted data
  • Empty or invalid email input
  • Buffer overflow attempts with very long emails

Would you like me to help generate these additional test cases?


16-26: ⚠️ Potential issue

Strengthen encryption/decryption test coverage

The current test case is basic and doesn't cover important scenarios for email encryption.

  1. Add type information for decrypted result:
-      const { decrypted } = decryptEmail(encryptedWithEmailSalt);
+      const { decrypted }: { decrypted: string } = decryptEmail(encryptedWithEmailSalt);
  1. Add more test cases:
    it("should handle email addresses with special characters", () => {
      const email = "[email protected]";
      const encrypted = encryptEmail(email);
      const { decrypted } = decryptEmail(encrypted);
      expect(decrypted).toEqual(email);
    });

    it("should use a unique IV for each encryption", () => {
      const email = "[email protected]";
      const encrypted1 = encryptEmail(email);
      const encrypted2 = encryptEmail(email);
      expect(encrypted1).not.toEqual(encrypted2);
    });

    it("should maintain consistent encryption format", () => {
      const email = "[email protected]";
      const encrypted = encryptEmail(email);
      // Format should be: hex(iv):hex(encryptedData)
      expect(encrypted).toMatch(/^[0-9a-f]+:[0-9a-f]+$/i);
    });

9-14: ⚠️ Potential issue

Enhance IV generation tests for cryptographic security

The current test has several issues:

  1. Test description uses "Salt" while function name uses "IV" - maintain consistent terminology
  2. Only testing the length isn't sufficient for a cryptographic function

Consider these improvements:

-  describe("generateRandomSalt", () => {
+  describe("generateRandomIV", () => {
     it("should generate a random salt of the specified length", () => {
       const salt = generateRandomIV();
       expect(salt.length).toEqual(2 * 16);
     });
+
+    it("should generate unique IVs for each call", () => {
+      const iv1 = generateRandomIV();
+      const iv2 = generateRandomIV();
+      expect(iv1).not.toEqual(iv2);
+    });
+
+    it("should generate IV with valid hex characters", () => {
+      const iv = generateRandomIV();
+      expect(iv).toMatch(/^[0-9a-f]+$/i);
+    });
   });
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

  describe("generateRandomIV", () => {
    it("should generate a random salt of the specified length", () => {
      const salt = generateRandomIV();
      expect(salt.length).toEqual(2 * 16);
    });

    it("should generate unique IVs for each call", () => {
      const iv1 = generateRandomIV();
      const iv2 = generateRandomIV();
      expect(iv1).not.toEqual(iv2);
    });

    it("should generate IV with valid hex characters", () => {
      const iv = generateRandomIV();
      expect(iv).toMatch(/^[0-9a-f]+$/i);
    });
  });
src/resolvers/Post/creator.ts (2)

22-24: ⚠️ Potential issue

Add error handling for decryption and improve null checks.

  1. The decryption operation could fail and should be wrapped in a try-catch
  2. The code can be simplified using optional chaining as suggested by static analysis
  3. The decryption result's structure should be validated
-  if (creator && creator.email) {
-    creator.email = decryptEmail(creator.email).decrypted;
-  }
+  if (creator?.email) {
+    try {
+      const decryptionResult = decryptEmail(creator.email);
+      if (!decryptionResult?.decrypted) {
+        console.error('Invalid decryption result');
+        throw new Error('Failed to decrypt email');
+      }
+      creator.email = decryptionResult.decrypted;
+    } catch (error) {
+      console.error('Failed to decrypt email:', error);
+      throw new Error('Failed to process creator email');
+    }
+  }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

  if (creator?.email) {
    try {
      const decryptionResult = decryptEmail(creator.email);
      if (!decryptionResult?.decrypted) {
        console.error('Invalid decryption result');
        throw new Error('Failed to decrypt email');
      }
      creator.email = decryptionResult.decrypted;
    } catch (error) {
      console.error('Failed to decrypt email:', error);
      throw new Error('Failed to process creator email');
    }
  }
🧰 Tools
🪛 Biome

[error] 22-22: Change to an optional chain.

Unsafe fix: Change to an optional chain.

(lint/complexity/useOptionalChain)


18-27: 💡 Codebase verification

Based on the evidence gathered, I can now generate the final response:

Performance concerns about email decryption are valid and need attention

The codebase shows that posts are indeed fetched in bulk through paginated queries using PostsConnection. The Organization's posts resolver implementation confirms that multiple posts are retrieved in a single query, with each post potentially requiring email decryption for its creator. This can lead to performance issues when:

  1. Fetching posts with high pagination limits (up to MAXIMUM_FETCH_LIMIT)
  2. Each post triggers a separate creator resolution with email decryption
  3. No caching mechanism exists for decrypted emails

Consider implementing:

  • Email decryption caching using a short-lived cache
  • Batch loading of creators using DataLoader
  • Making email an optional field in the creator type
🔗 Analysis chain

Consider performance implications of email decryption.

The current implementation decrypts emails on every creator resolution, which could impact performance for queries returning multiple posts. Consider:

  1. Implementing caching for decrypted emails
  2. Making email decryption optional through GraphQL field selection

Let's check if this resolver is used in any queries that might fetch multiple posts:


The previous attempt might have failed due to the schema being defined differently. Let's try these alternative approaches to:

  1. Find the GraphQL schema file directly
  2. Look for query definitions in the code
  3. Find files related to Posts to understand the query patterns

I want to verify:

  1. If there are queries that return multiple posts
  2. How the posts resolver is implemented
  3. If pagination is used for post queries, which would indicate bulk fetching
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Search for GraphQL queries that might fetch multiple posts
ast-grep --pattern 'type Query {
  $$$
  $posts$$$ {
    $$$
    creator {
      $$$
    }
    $$$
  }
  $$$
}'

Length of output: 113


Script:

#!/bin/bash
# Let's try a different approach to find GraphQL schema definitions
fd "schema.graphql" --type f --exec cat {}

# Also search for query definitions in TypeScript files
ast-grep --pattern 'const $_ = gql`
  query {
    $$$
  }
`'

# And look for resolver implementations that might fetch multiple posts
rg -l "Posts?" --type ts

Length of output: 45358


Script:

#!/bin/bash
# Let's check the GraphQL schema for queries that return multiple posts
rg -A 10 "type Query" src/typeDefs/queries.ts

# Also check the posts resolver implementation
cat src/resolvers/Organization/posts.ts

# And check if there's a connection type for posts pagination
rg "PostsConnection" src/typeDefs/types.ts -A 5

Length of output: 6461

🧰 Tools
🪛 Biome

[error] 22-22: Change to an optional chain.

Unsafe fix: Change to an optional chain.

(lint/complexity/useOptionalChain)

tests/utilities/hashingModule.spec.ts (2)

25-34: ⚠️ Potential issue

Improve robustness of HASH_PEPPER test.

The current implementation has several issues:

  1. Missing try-finally block to ensure pepper restoration
  2. No validation of originalPepper
  3. Inconsistent indentation
 it("should produce different hashes with different HASH_PEPPER values", () => {
-    const email = "[email protected]"
-    const originalPepper = process.env.HASH_PEPPER;
-    process.env.HASH_PEPPER = "pepper1";
-    const hash1 = hashEmail(email);
-    process.env.HASH_PEPPER = "pepper2";
-    const hash2 = hashEmail(email);
-    expect(hash1).not.toEqual(hash2);
-    process.env.HASH_PEPPER = originalPepper;
+    const email = "[email protected]";
+    const originalPepper = process.env.HASH_PEPPER;
+    
+    if (!originalPepper) {
+        throw new Error("HASH_PEPPER environment variable is required");
+    }
+    
+    try {
+        process.env.HASH_PEPPER = "pepper1";
+        const hash1 = hashEmail(email);
+        process.env.HASH_PEPPER = "pepper2";
+        const hash2 = hashEmail(email);
+        expect(hash1).not.toEqual(hash2);
+    } finally {
+        process.env.HASH_PEPPER = originalPepper;
+    }
 });
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

        it("should produce different hashes with different HASH_PEPPER values", () => {
            const email = "[email protected]";
            const originalPepper = process.env.HASH_PEPPER;
            
            if (!originalPepper) {
                throw new Error("HASH_PEPPER environment variable is required");
            }
            
            try {
                process.env.HASH_PEPPER = "pepper1";
                const hash1 = hashEmail(email);
                process.env.HASH_PEPPER = "pepper2";
                const hash2 = hashEmail(email);
                expect(hash1).not.toEqual(hash2);
            } finally {
                process.env.HASH_PEPPER = originalPepper;
            }
        });

12-23: 🛠️ Refactor suggestion

Add error handling tests and improve maintainability.

The hash consistency tests are good, but consider these improvements:

  1. Extract the hash format regex as a constant
  2. Add explicit error handling tests
+const HASH_FORMAT_REGEX = /^[a-f0-9]{64}$/i;
+
 testCases.forEach((email)=> {
     it(`should correctly hash email: ${email}`, () => {
         const hashedFirstEmail =  hashEmail(email);
         const hashedSecondEmail = hashEmail(email);

         expect(hashedFirstEmail).toEqual(hashedSecondEmail);
         expect(email.toLowerCase()).not.toEqual(hashedFirstEmail);
-        expect(hashedFirstEmail).toMatch(/^[a-f0-9]{64}$/i);
+        expect(hashedFirstEmail).toMatch(HASH_FORMAT_REGEX);
     });
 });
+
+it("should handle null/undefined gracefully", () => {
+    expect(() => hashEmail(null)).toThrow();
+    expect(() => hashEmail(undefined)).toThrow();
+});
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

        const HASH_FORMAT_REGEX = /^[a-f0-9]{64}$/i;

        testCases.forEach((email)=> {
            it(`should correctly hash email: ${email}`, () => {
                const hashedFirstEmail =  hashEmail(email);
                const hashedSecondEmail = hashEmail(email);

                expect(hashedFirstEmail).toEqual(hashedSecondEmail);
                expect(email.toLowerCase()).not.toEqual(hashedFirstEmail);
                expect(hashedFirstEmail).toMatch(HASH_FORMAT_REGEX);
            });
        });

        it("should handle null/undefined gracefully", () => {
            expect(() => hashEmail(null)).toThrow();
            expect(() => hashEmail(undefined)).toThrow();
        });
src/resolvers/Organization/admins.ts (2)

33-33: ⚠️ Potential issue

Avoid logging sensitive information in error messages

Logging user IDs alongside encryption errors could potentially expose sensitive information in logs. Consider using a more generic error message or implementing structured logging with appropriate masking.

-      console.error(`Failed to decrypt email for user ${admin._id}:`, error);
+      console.error('Email decryption failed:', { userId: admin._id.toString(), error: error.message });
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

      console.error('Email decryption failed:', { userId: admin._id.toString(), error: error.message });

24-24: ⚠️ Potential issue

Replace any type with proper User type

Using any type reduces type safety. Let's properly type the admin parameter.

-  const decryptedAdmins = admins.map((admin: any) => {
+  const decryptedAdmins = admins.map((admin: User) => {

Committable suggestion was skipped due to low confidence.

🧰 Tools
🪛 GitHub Check: Check for linting, formatting, and type errors

[warning] 24-24:
Unexpected any. Specify a different type

src/resolvers/Organization/creator.ts (1)

32-38: 💡 Codebase verification

⚠️ Potential issue

Email decryption error handling needs to be standardized across resolvers

The verification revealed inconsistent error handling patterns across email decryption implementations:

  1. Several resolvers expose sensitive information in error logs:

    • Organization/creator.ts
    • Organization/admins.ts
    • Organization/blockedUsers.ts
    • Organization/members.ts
  2. Some resolvers handle decryption errors with try-catch (e.g., Organization resolvers), while others don't implement error handling at all (e.g., Query/me.ts, Query/user.ts).

  3. Inconsistent decryption result handling:

    • Some use destructuring: const { decrypted } = decryptEmail(user.email)
    • Others direct access: decryptEmail(creator.email).decrypted

Recommendations:

  • Standardize error handling across all resolvers using email decryption
  • Remove sensitive information from error logs
  • Implement consistent error recovery strategy
  • Consider extracting the decryption logic with error handling into a shared utility function
🔗 Analysis chain

Several concerns regarding error handling and security.

  1. Error logging exposes sensitive information:
-    console.error(`Failed to decrypt email for user ${user._id}:`, error);
+    console.error(`Failed to decrypt email for user ${user._id}`);
  1. Silent fallback to encrypted email might cause issues in UI/downstream systems expecting decrypted emails.

  2. Consider adding type safety checks:

-    const { decrypted } = decryptEmail(user.email);
+    const result = decryptEmail(user.email);
+    if (!result?.decrypted) {
+      throw new Error('Decryption failed: Invalid result format');
+    }
+    return { ...user, email: result.decrypted };
  1. Consider implementing caching to avoid repeated decryption of the same email.

Let's verify if this decryption is consistently implemented across all user-related resolvers:


Let's analyze the email decryption implementation and its usage across resolvers to verify our concerns.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Search for other resolvers that might need similar email decryption
rg -l "User.*findOne" "src/resolvers"

# Check for existing caching implementations
rg -l "cache.*email" "src"

Length of output: 5446


Script:

#!/bin/bash
# Check for email decryption usage across resolvers
rg -A 2 "decryptEmail" "src/resolvers"

# Check for the decryptEmail implementation
rg -l "decryptEmail" "src"

# Check for other email-related operations
rg "email.*user" "src/resolvers"

Length of output: 6935

src/utilities/hashEmail.ts (2)

33-51: ⚠️ Potential issue

Improve error handling and fix unused variable

The implementation is secure with timing-safe comparison, but has some minor issues:

  1. Unused error variable in catch block
  2. Hex validation could be more precise

Apply these improvements:

 export function compareHashedEmails(a: string, b: string): boolean {
     if (!a || !b || typeof a !== 'string' || typeof b !== 'string') {
       return false;
     }
     
-    if (!/^[0-9a-f]+$/i.test(a) || !/^[0-9a-f]+$/i.test(b)) {
+    // SHA-256 produces 64 character hex string
+    if (!/^[0-9a-f]{64}$/i.test(a) || !/^[0-9a-f]{64}$/i.test(b)) {
       return false;
     }
   
     try {
        return crypto.timingSafeEqual(
          Buffer.from(a, 'hex'),
          Buffer.from(b, 'hex')
        );
-    } catch (error) {
+    } catch {
       console.error("Failed to compare hashes, likely due to invalid hex encoding");
       return false;
     }
    }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

export function compareHashedEmails(a: string, b: string): boolean {
    if (!a || !b || typeof a !== 'string' || typeof b !== 'string') {
      return false;
    }
    
    // SHA-256 produces 64 character hex string
    if (!/^[0-9a-f]{64}$/i.test(a) || !/^[0-9a-f]{64}$/i.test(b)) {
      return false;
    }
  
    try {
       return crypto.timingSafeEqual(
         Buffer.from(a, 'hex'),
         Buffer.from(b, 'hex')
       );
    } catch {
      console.error("Failed to compare hashes, likely due to invalid hex encoding");
      return false;
    }
   }
🧰 Tools
🪛 eslint

[error] 47-47: 'error' is defined but never used.

(@typescript-eslint/no-unused-vars)


16-31: ⚠️ Potential issue

Strengthen input validation and security checks

While the basic validation is good, consider these security improvements:

  1. Add email format validation
  2. Validate HASH_PEPPER minimum length
  3. Consider additional email normalization (e.g., trimming whitespace)

Here's a suggested implementation:

 export function hashEmail(email: string) : string  {
   if (!email || typeof email !== 'string') {
         throw new Error('Email parameter must be a non-empty string');
       }
+  // Basic email format validation
+  const emailRegex = /^[^\s@]+@[^\s@]+\.[^\s@]+$/;
+  if (!emailRegex.test(email)) {
+    throw new Error('Invalid email format');
+  }
   if(!process.env.HASH_PEPPER)
   {
       throw new Error('Missing HASH_PEPPER environment variable required for secure email hashing');
   }
+  if(process.env.HASH_PEPPER.length < 32) {
+    throw new Error('HASH_PEPPER must be at least 32 characters long');
+  }

   const hashedEmail = crypto
   .createHmac("sha256", process.env.HASH_PEPPER)
-  .update(email.toLowerCase())
+  .update(email.toLowerCase().trim())
   .digest("hex");

   return hashedEmail;
 }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

export function hashEmail(email: string) : string  {
  if (!email || typeof email !== 'string') {
        throw new Error('Email parameter must be a non-empty string');
      }
  // Basic email format validation
  const emailRegex = /^[^\s@]+@[^\s@]+\.[^\s@]+$/;
  if (!emailRegex.test(email)) {
    throw new Error('Invalid email format');
  }
  if(!process.env.HASH_PEPPER)
  {
      throw new Error('Missing HASH_PEPPER environment variable required for secure email hashing');
  }
  if(process.env.HASH_PEPPER.length < 32) {
    throw new Error('HASH_PEPPER must be at least 32 characters long');
  }

  const hashedEmail = crypto
  .createHmac("sha256", process.env.HASH_PEPPER)
  .update(email.toLowerCase().trim())
  .digest("hex");

  return hashedEmail;
}
src/resolvers/Query/checkAuth.ts (1)

41-45: 💡 Codebase verification

⚠️ Potential issue

Add error handling for email decryption across all resolvers

The review comment is valid and reveals a broader pattern. Only Organization/members.ts implements proper error handling for decryption failures. All other resolvers using decryptEmail are missing try-catch blocks and error validation, making them vulnerable to:

  • Silent failures during decryption
  • Potential exposure of sensitive information in error states
  • Missing audit trails for security-related operations

Key locations requiring error handling:

  • src/resolvers/Query/usersConnection.ts
  • src/resolvers/Query/users.ts
  • src/resolvers/Query/user.ts
  • src/resolvers/Query/organizationsMemberConnection.ts
  • src/resolvers/Query/me.ts
  • src/resolvers/Post/creator.ts

Each resolver should follow the pattern implemented in Organization/members.ts which properly:

  1. Wraps decryption in try-catch
  2. Logs errors without exposing sensitive data
  3. Handles the error gracefully
🔗 Analysis chain

Add error handling for email decryption.

The current implementation has several security considerations:

  1. No error handling for decryption failures
  2. Missing validation of the decrypted email format
  3. No audit logging for security-sensitive operations

Consider implementing this safer approach:

-  const { decrypted } = decryptEmail(currentUser.email);
+  try {
+    const { decrypted } = decryptEmail(currentUser.email);
+    
+    // Validate email format
+    if (!decrypted || !/^[^\s@]+@[^\s@]+\.[^\s@]+$/.test(decrypted)) {
+      throw new Error('Invalid email format after decryption');
+    }
+    
+    return {
+      ...currentUser,
+      email: decrypted,
+      image: currentUser.image
+        ? `${context.apiRootUrl}${currentUser.image}`
+        : null,
+      organizationsBlockedBy: [],
+    };
+  } catch (error) {
+    // Log the error for security audit (avoid logging the actual email)
+    console.error('Failed to decrypt user email', {
+      userId: currentUser._id,
+      error: error.message
+    });
+    throw new errors.InternalServerError(
+      'Failed to process user data',
+      'DECRYPTION_ERROR'
+    );
+  }

Let's verify the error handling in other authentication-related resolvers:


Let me check the implementation of these resolvers to see if they handle decryption errors properly.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Check if other resolvers properly handle decryption errors
ast-grep --pattern 'decryptEmail($_)' 

Length of output: 4851


Script:

#!/bin/bash
# Check implementation of resolvers that use decryptEmail
echo "=== Query/usersConnection.ts ==="
rg -A 5 "decryptEmail" src/resolvers/Query/usersConnection.ts

echo -e "\n=== Query/users.ts ==="
rg -A 5 "decryptEmail" src/resolvers/Query/users.ts

echo -e "\n=== Query/user.ts ==="
rg -A 5 "decryptEmail" src/resolvers/Query/user.ts

echo -e "\n=== Query/organizationsMemberConnection.ts ==="
rg -A 5 "decryptEmail" src/resolvers/Query/organizationsMemberConnection.ts

echo -e "\n=== Query/me.ts ==="
rg -A 5 "decryptEmail" src/resolvers/Query/me.ts

echo -e "\n=== Post/creator.ts ==="
rg -A 5 "decryptEmail" src/resolvers/Post/creator.ts

echo -e "\n=== Organization/members.ts ==="
rg -A 5 "decryptEmail" src/resolvers/Organization/members.ts

Length of output: 4220

src/env.ts (1)

35-35: ⚠️ Potential issue

Enhance ENCRYPTION_KEY validation and documentation.

The current implementation only validates that ENCRYPTION_KEY is a string. Since this is used for email encryption, it requires stricter validation to ensure security:

  1. The key should be a valid Base64-encoded 32-byte string
  2. The validation requirements should be documented

Apply this diff to add proper validation:

-  ENCRYPTION_KEY: z.string(),
+  ENCRYPTION_KEY: z
+    .string()
+    .describe("Base64-encoded 32-byte encryption key for securing user emails")
+    .refine(
+      (value) => {
+        // Validate Base64 format and length
+        try {
+          const decoded = Buffer.from(value, 'base64');
+          return decoded.length === 32;
+        } catch {
+          return false;
+        }
+      },
+      "ENCRYPTION_KEY must be a valid Base64-encoded 32-byte string"
+    ),
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

  ENCRYPTION_KEY: z
    .string()
    .describe("Base64-encoded 32-byte encryption key for securing user emails")
    .refine(
      (value) => {
        // Validate Base64 format and length
        try {
          const decoded = Buffer.from(value, 'base64');
          return decoded.length === 32;
        } catch {
          return false;
        }
      },
      "ENCRYPTION_KEY must be a valid Base64-encoded 32-byte string"
    ),
src/resolvers/Query/usersConnection.ts (1)

35-37: ⚠️ Potential issue

Add error handling and avoid direct mutations.

The current implementation has several potential issues:

  1. Missing error handling for decryption failures
  2. Directly mutating the lean object
  3. No type safety for the decrypted email

Consider this safer implementation:

- const { decrypted } = decryptEmail(user.email);
- user.email = decrypted;
+ try {
+   const { decrypted } = decryptEmail(user.email);
+   return {
+     ...user,
+     email: decrypted
+   };
+ } catch (error) {
+   throw new Error(`Failed to decrypt email: ${error.message}`);
+ }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

      try {
        const { decrypted } = decryptEmail(user.email);
        return {
          ...user,
          email: decrypted
        };
      } catch (error) {
        throw new Error(`Failed to decrypt email: ${error.message}`);
      }
src/resolvers/Query/me.ts (1)

56-57: ⚠️ Potential issue

Add error handling and improve data handling security.

The current implementation has several potential issues:

  1. No error handling for decryption failures
  2. Directly mutating the currentUser object after .lean()
  3. Decrypted email remains in memory longer than necessary

Consider this safer implementation:

-  const { decrypted } = decryptEmail(currentUser.email);
-  currentUser.email = decrypted;
+  try {
+    const { decrypted } = decryptEmail(currentUser.email);
+    return {
+      user: {
+        ...currentUser,
+        email: decrypted
+      } as InterfaceUser,
+      appUserProfile: userAppProfile as InterfaceAppUserProfile,
+    };
+  } catch (error) {
+    throw new errors.ValidationError(
+      "Failed to decrypt email",
+      "EMAIL_DECRYPTION_FAILED",
+      "email"
+    );
+  }

Committable suggestion was skipped due to low confidence.

tests/resolvers/Organization/blockedUsers.spec.ts (1)

35-51: 🛠️ Refactor suggestion

Enhance error handling and test robustness.

While the test logic is sound, there are several areas for improvement:

  1. Error handling could be more specific about which email failed to decrypt
  2. The test should verify that the encryption key is properly configured
  3. The second expectation's logic could be more readable

Consider this improved implementation:

      try {
+       // Verify encryption key is configured
+       if (!process.env.ENCRYPTION_KEY) {
+         throw new Error('ENCRYPTION_KEY is not configured');
+       }
+
        const decryptedBlockedUsers = blockedUsers.map((user) => {
+         try {
            return {
              ...user,
              email: decryptEmail(user.email).decrypted,
            };
+         } catch (error) {
+           throw new Error(`Failed to decrypt email for user ${user._id}: ${error.message}`);
+         }
        });

        expect(blockedUsersPayload).toEqual(decryptedBlockedUsers);
        expect(
-         decryptedBlockedUsers.every(
-           (user) =>
-             user.email !== blockedUsers.find((u) => u._id == user._id)?.email,
-         ),
+         decryptedBlockedUsers.every((decryptedUser) => {
+           const originalUser = blockedUsers.find(u => u._id.equals(decryptedUser._id));
+           return originalUser && decryptedUser.email !== originalUser.email;
+         }),
        ).toBe(true);
      } catch (error) {
-       console.error("Error decrypting emails:", error);
+       console.error("Test failed:", error.message);
        throw error;
      }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

      try {
        // Verify encryption key is configured
        if (!process.env.ENCRYPTION_KEY) {
          throw new Error('ENCRYPTION_KEY is not configured');
        }

        const decryptedBlockedUsers = blockedUsers.map((user) => {
          try {
            return {
              ...user,
              email: decryptEmail(user.email).decrypted,
            };
          } catch (error) {
            throw new Error(`Failed to decrypt email for user ${user._id}: ${error.message}`);
          }
        });

        expect(blockedUsersPayload).toEqual(decryptedBlockedUsers);
        expect(
          decryptedBlockedUsers.every((decryptedUser) => {
            const originalUser = blockedUsers.find(u => u._id.equals(decryptedUser._id));
            return originalUser && decryptedUser.email !== originalUser.email;
          }),
        ).toBe(true);
      } catch (error) {
        console.error("Test failed:", error.message);
        throw error;
      }
src/resolvers/Query/user.ts (1)

37-37: ⚠️ Potential issue

Add error handling for email decryption failures.

The current implementation assumes decryption will always succeed. This could lead to runtime errors if the encryption key is invalid or the email data is corrupted.

-  const { decrypted } = decryptEmail(user.email);
+  try {
+    const { decrypted } = decryptEmail(user.email);
+    user.email = decrypted;
+  } catch (error) {
+    throw new errors.ValidationError(
+      "Failed to decrypt user email",
+      "EMAIL_DECRYPTION_ERROR",
+      "email"
+    );
+  }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

  try {
    const { decrypted } = decryptEmail(user.email);
    user.email = decrypted;
  } catch (error) {
    throw new errors.ValidationError(
      "Failed to decrypt user email",
      "EMAIL_DECRYPTION_ERROR",
      "email"
    );
  }
tests/helpers/advertisement.ts (1)

45-46: ⚠️ Potential issue

Move email generation inside the function scope.

The current implementation has several potential issues:

  1. Global email variable could lead to test interference in parallel test execution
  2. The email format is hardcoded to Gmail, which might not cover all test cases

Consider refactoring like this:

-const email = `email${nanoid().toLowerCase()}@gmail.com`;
-const hashedEmail = hashEmail(email)

 export const createTestSuperAdmin = async (): Promise<TestSuperAdminType> => {
+  const email = `email${nanoid().toLowerCase()}@gmail.com`;
+  const hashedEmail = hashEmail(email);
   const testSuperAdmin = await User.create({
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

export const createTestSuperAdmin = async (): Promise<TestSuperAdminType> => {
  const email = `email${nanoid().toLowerCase()}@gmail.com`;
  const hashedEmail = hashEmail(email);
  const testSuperAdmin = await User.create({
tests/helpers/userAndUserFamily.ts (1)

19-19: 🛠️ Refactor suggestion

Consider using varied email domains in tests.

Using a fixed domain (@gmail.com) might miss edge cases. Consider generating test emails with different domains to ensure the encryption and hashing work correctly across various email formats.

- const email = `email${nanoid().toLowerCase()}@gmail.com`;
+ const domains = ['gmail.com', 'example.com', 'test.org'];
+ const randomDomain = domains[Math.floor(Math.random() * domains.length)];
+ const email = `email${nanoid().toLowerCase()}@${randomDomain}`;
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

  const domains = ['gmail.com', 'example.com', 'test.org'];
  const randomDomain = domains[Math.floor(Math.random() * domains.length)];
  const email = `email${nanoid().toLowerCase()}@${randomDomain}`;
tests/resolvers/MembershipRequest/user.spec.ts (1)

38-43: ⚠️ Potential issue

Multiple improvements needed in error handling and data security

Several issues need to be addressed in this test case:

  1. The error message "User not found" is inconsistent with USER_NOT_FOUND_ERROR.MESSAGE used in the second test case
  2. Using a generic Error instead of the specific error type
  3. The decrypted email remains in memory after the test
  4. No type validation for the decrypted email

Here's the suggested fix:

    if (!user) {
-      throw new Error("User not found");
+      throw new Error(USER_NOT_FOUND_ERROR.MESSAGE);
    }
    const { decrypted } = decryptEmail(user.email);
+    // Validate email format
+    if (typeof decrypted !== 'string' || !decrypted.includes('@')) {
+      throw new Error('Invalid decrypted email format');
+    }
    user.email = decrypted;
+    // Clear sensitive data after test
+    afterEach(() => {
+      user.email = undefined;
+    });

Committable suggestion was skipped due to low confidence.

tests/resolvers/Query/me.spec.ts (2)

8-8: ⚠️ Potential issue

Use type-only import for InterfaceUser

Since InterfaceUser is only used as a type, it should be imported using the type-only import syntax.

Apply this change:

-import { AppUserProfile, InterfaceUser, User } from "../../../src/models";
+import { AppUserProfile, User } from "../../../src/models";
+import type { InterfaceUser } from "../../../src/models";
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

import { AppUserProfile, User } from "../../../src/models";
import type { InterfaceUser } from "../../../src/models";
🧰 Tools
🪛 eslint

[error] 8-8: Imports "InterfaceUser" are only used as type.

(@typescript-eslint/consistent-type-imports)


64-65: 💡 Codebase verification

⚠️ Potential issue

Add email decryption verification

The test should decrypt the email using decryptEmail to maintain consistency with other test files in the codebase. All other test files that handle user emails properly decrypt them using decryptEmail().decrypted.

Consider this change:

+import { decryptEmail } from "../../../src/utilities/encryption";

 const currentUser = mePayload.user as InterfaceUser;
-currentUser.email = user.email;
+currentUser.email = decryptEmail(user.email).decrypted;
🔗 Analysis chain

Add email decryption verification

Since this PR implements email encryption, the test should verify that emails are properly decrypted when fetched. Currently, the test bypasses the decryption process by directly assigning the email.

Consider this change:

+import { decryptEmail } from "../../../src/utilities/encryption";

 const currentUser = mePayload.user as InterfaceUser;
-currentUser.email = user.email;
+currentUser.email = await decryptEmail(user.email);
+
+// Add assertion to verify email decryption
+expect(currentUser.email).toBe(testUser.email);

Let me verify how email decryption is handled in other test files to ensure consistency.


Let me check how the email decryption is actually used in these test files.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Verify if decryptEmail utility is imported in other test files
rg -l "decryptEmail.*from.*utilities/encryption" "tests/"

Length of output: 495


Script:

#!/bin/bash
# Check how other test files handle email decryption
rg -A 5 "decryptEmail.*from.*utilities/encryption" "tests/"

Length of output: 4704


Script:

#!/bin/bash
# Check actual usage of decryptEmail in test files
rg -B 2 -A 2 "decryptEmail\(" "tests/"

Length of output: 14050

tests/resolvers/Query/checkAuth.spec.ts (2)

75-79: 🛠️ Refactor suggestion

Refactor duplicate error handling logic.

This error handling code is duplicated from the previous test case. Consider extracting it into a helper function.

Create a helper function:

const assertUsersExist = (testUser: any, user: any) => {
  if (!testUser || !user) {
    throw new Error(!testUser ? "Test user not found" : "User not returned from resolver");
  }
  testUser.email = user.email;
  
  // Verify email encryption/decryption
  expect(user.email).toBeDefined();
  expect(user.email).not.toMatch(/^[a-zA-Z0-9+/]*={0,2}$/); // Not base64 encoded
};

Then use it in both test cases:

-if (!testUser || !user) {
-  throw new Error("Error fetching users");
-}
-testUser.email = user.email;
+assertUsersExist(testUser, user);

44-48: 🛠️ Refactor suggestion

Improve error handling and add encryption verification.

The error handling could be more specific and the test should verify the email encryption:

  1. The error message "Error fetching users" is too generic. Consider separate messages for each case.
  2. The test should explicitly verify that the email is properly decrypted.

Consider this improvement:

 if (!testUser || !user) {
-  throw new Error("Error fetching users");
+  throw new Error(!testUser ? "Test user not found" : "User not returned from resolver");
 }
 testUser.email = user.email;
+
+// Verify email encryption/decryption
+expect(user.email).toBeDefined();
+expect(user.email).not.toMatch(/^[a-zA-Z0-9+/]*={0,2}$/); // Not base64 encoded

Committable suggestion was skipped due to low confidence.

tests/resolvers/Query/user.spec.ts (2)

95-101: 🛠️ Refactor suggestion

Consider refactoring duplicate user validation

The user existence check is duplicated across test cases. Consider extracting this into a helper function to maintain DRY principles and ensure consistent error handling.

// Add at the top of the file
const validateUser = (user: any) => {
  if (!user) {
    throw new Error(USER_NOT_FOUND_ERROR.DESC);
  }
  return user;
};

// Then use in test cases:
const user = validateUser(await User.findOne({
  _id: testUser?._id,
}).lean());

106-106: 💡 Codebase verification

Additional test cases needed for email encryption robustness

The current test suite in encryptionModule.spec.ts only covers the basic happy path. Please add the following test cases:

describe("encryptEmail and decryptEmail", () => {
  it("should handle empty email string", () => {
    const email = "";
    // Test implementation
  });

  it("should handle malformed encrypted data", () => {
    const invalidEncrypted = "invalid-encrypted-string";
    // Test implementation
  });

  it("should validate email format after decryption", () => {
    const email = "not-an-email";
    // Test implementation
  });
});
🔗 Analysis chain

Consider adding edge cases for email encryption

The current tests verify the happy path for email decryption, but consider adding test cases for:

  1. Handling malformed encrypted emails
  2. Verifying behavior with empty/null email values
  3. Testing email format validation post-decryption

This will ensure the encryption feature remains robust and secure.


Let me search for email validation test cases more specifically.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Check if there are any existing test cases for email validation
rg -l "test|describe.*email" tests/

Length of output: 16433


Script:

#!/bin/bash
# Check for email validation and encryption test cases
rg -A 5 "test.*email.*encryption|test.*email.*validation|test.*malformed.*email" tests/
# Also check encryption module tests specifically
cat tests/utilities/encryptionModule.spec.ts

Length of output: 930

src/resolvers/Query/users.ts (1)

65-65: ⚠️ Potential issue

Add error handling for email decryption.

The decryption operation could fail but there's no error handling in place. This could lead to unhandled exceptions and API failures.

Consider adding try-catch:

- const { decrypted } = decryptEmail(user.email);
+ let decrypted;
+ try {
+   ({ decrypted } = decryptEmail(user.email));
+ } catch (error) {
+   console.error(`Failed to decrypt email for user ${user._id}:`, error);
+   decrypted = null; // or handle as appropriate for your use case
+ }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

      let decrypted;
      try {
        ({ decrypted } = decryptEmail(user.email));
      } catch (error) {
        console.error(`Failed to decrypt email for user ${user._id}:`, error);
        decrypted = null; // or handle as appropriate for your use case
      }
tests/directives/directiveTransformer/roleDirectiveTransformer.spec.ts (2)

66-67: 🛠️ Refactor suggestion

Consider mocking encryption functions and adding validation.

A few suggestions to improve test robustness:

  1. Consider mocking encryptEmail and hashEmail functions to avoid dependency on actual encryption in tests
  2. Add assertions to verify that the stored email is actually encrypted/hashed
  3. Add test cases for encryption/hashing edge cases

Example test improvements:

// Mock setup
vi.mock('../../../src/utilities/encryption', () => ({
  encryptEmail: vi.fn((email) => `encrypted_${email}`),
}));

// Validation
expect(testUser.email).toMatch(/^encrypted_/);
expect(testUser.hashedEmail).toBeDefined();
expect(testUser.email).not.toBe(email);

61-67: 💡 Codebase verification

Documentation update needed for email encryption changes

The documentation needs to be updated to reflect the new email encryption workflow. Please add the following:

  • Add a new section in DOCUMENTATION.md about email encryption and hashing
  • Update INSTALLATION.md to include the new environment variables (ENCRYPTION_KEY, HASH_PEPPER)
  • Add a section about migrating existing test data to use encrypted emails

Locations requiring updates:

  • DOCUMENTATION.md: Add under "Other information" section
  • INSTALLATION.md: Add under "The Environment Variables in .env" section
  • docs/README.md: Add a note about email encryption in API documentation
🔗 Analysis chain

Documentation update needed for email encryption changes.

As mentioned in the PR objectives, documentation updates are pending. Please ensure the following are documented:

  1. The new email encryption/hashing workflow
  2. Required environment variables (ENCRYPTION_KEY, HASH_PEPPER)
  3. Impact on existing tests and how to update them
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Check if documentation files exist and contain encryption-related updates
rg -l "(?i)encrypt|hash" docs/ README.md

Length of output: 42


Script:

#!/bin/bash
# First, let's check if docs directory exists and what files are in it
fd . "docs" || echo "No docs directory found"

# Then check for any markdown files in the root that might contain documentation
fd -e md . --max-depth 1

# Finally, let's check for any documentation-related files that might have different extensions
fd "(doc|docs|documentation|guide|readme)" --type f

Length of output: 620


Script:

#!/bin/bash
# Let's check the content of main documentation files for any existing encryption-related information
echo "=== Checking DOCUMENTATION.md ==="
cat DOCUMENTATION.md

echo -e "\n=== Checking docs/README.md ==="
cat docs/README.md

echo -e "\n=== Checking main README.md ==="
cat README.md

echo -e "\n=== Checking INSTALLATION.md for env vars ==="
cat INSTALLATION.md

Length of output: 60475

.env.sample (1)

115-119: ⚠️ Potential issue

Fix HASH_PEPPER format and enhance documentation.

Issues found:

  1. Variable format has inconsistent spacing HASH_PEPPER = vs other variables
  2. Missing implementation guidance

Apply this diff to fix the format and enhance documentation:

 # This environment variable provides additional entropy for email hashing
 # Format: Random string of at least 32 characters
 # Generation: Use a cryptographically secure random string generator
+# Example generation: openssl rand -hex 32
+# Example format: HASH_PEPPER=YOUR_HEX_STRING
 # WARNING: Keep this value secret and never commit it to version control
-HASH_PEPPER = 
+# NOTE: Changing this value will invalidate all existing email hashes.
+#       Ensure database migration strategy is in place before changing.
+HASH_PEPPER=
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

# This environment variable provides additional entropy for email hashing
# Format: Random string of at least 32 characters
# Generation: Use a cryptographically secure random string generator
# Example generation: openssl rand -hex 32
# Example format: HASH_PEPPER=YOUR_HEX_STRING
# WARNING: Keep this value secret and never commit it to version control
# NOTE: Changing this value will invalidate all existing email hashes.
#       Ensure database migration strategy is in place before changing.
HASH_PEPPER=
tests/helpers/userAndOrg.ts (2)

10-12: ⚠️ Potential issue

Remove unused crypto import

The crypto module is imported but never used in this file.

Apply this diff to remove the unused import:

import { encryptEmail } from "../../src/utilities/encryption";
-import crypto from "crypto";
import { hashEmail } from "../../src/utilities/hashEmail";
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

import { encryptEmail } from "../../src/utilities/encryption";
import { hashEmail } from "../../src/utilities/hashEmail";
🧰 Tools
🪛 eslint

[error] 11-11: 'crypto' is defined but never used.

(@typescript-eslint/no-unused-vars)


24-29: 🛠️ Refactor suggestion

Enhance test email generation and validation

While the encryption implementation looks correct, there are a few suggestions to improve the test data generation:

  1. Consider using a more diverse email generation pattern to better test the encryption/hashing with various email formats:
-  const email = `email${nanoid().toLowerCase()}@gmail.com`;
+  const email = `${nanoid(8)}${['', '.', '_'][Math.floor(Math.random() * 3)]}${nanoid(8)}@${['gmail.com', 'example.com', 'test.org'][Math.floor(Math.random() * 3)]}`;
  1. Add validation to ensure the encryption/hashing worked as expected:
   const email = `email${nanoid().toLowerCase()}@gmail.com`;
   const hashedEmail = hashEmail(email);
+  // Validate hashing/encryption
+  if (!hashedEmail || hashedEmail.length < 32) {
+    throw new Error('Invalid hashed email generated');
+  }
+  const encryptedEmail = encryptEmail(email);
+  if (!encryptedEmail) {
+    throw new Error('Email encryption failed');
+  }
 
   let testUser = await User.create({
-    email: encryptEmail(email),
+    email: encryptedEmail,
     hashedEmail: hashedEmail,
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

  const email = `${nanoid(8)}${['', '.', '_'][Math.floor(Math.random() * 3)]}${nanoid(8)}@${['gmail.com', 'example.com', 'test.org'][Math.floor(Math.random() * 3)]}`;
  const hashedEmail = hashEmail(email);
  // Validate hashing/encryption
  if (!hashedEmail || hashedEmail.length < 32) {
    throw new Error('Invalid hashed email generated');
  }
  const encryptedEmail = encryptEmail(email);
  if (!encryptedEmail) {
    throw new Error('Email encryption failed');
  }

  let testUser = await User.create({
    email: encryptedEmail,
    hashedEmail: hashedEmail,
tests/resolvers/Mutation/resetCommunity.spec.ts (1)

86-88: 🛠️ Refactor suggestion

Consider extracting email generation into a helper function.

While the implementation is correct, consider creating a helper function to encapsulate email generation, hashing, and encryption. This would improve reusability across tests and make the test setup more maintainable.

// In tests/helpers/user.ts
export const generateTestEmail = () => {
  const email = `email${nanoid().toLowerCase()}@gmail.com`;
  return {
    email,
    hashedEmail: hashEmail(email),
    encryptedEmail: encryptEmail(email)
  };
};
src/resolvers/Mutation/updateUserProfile.ts (1)

13-14: ⚠️ Potential issue

Remove unused crypto import.

The crypto import is not being used in this file. Please remove it to keep the codebase clean.

Apply this diff:

-import crypto from "crypto";

for the hashEmail import as it's properly utilized.

📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

import { hashEmail } from "../../utilities/hashEmail";
🧰 Tools
🪛 GitHub Check: Check for linting, formatting, and type errors

[failure] 13-13:
'crypto' is defined but never used

🪛 eslint

[error] 13-13: 'crypto' is defined but never used.

(@typescript-eslint/no-unused-vars)

src/resolvers/Mutation/signUp.ts (1)

36-38: 💡 Codebase verification

Email validation is missing in the signup process

The isValidEmail function exists in the codebase at src/setup/isValidEmail.ts but is not being used in the signup process. The code only normalizes and hashes the email without validating its format. You should add email validation before processing:

const normalizedEmail = args.data.email.toLowerCase();
if (!isValidEmail(normalizedEmail)) {
  throw new errors.ValidationError("Invalid email format");
}
const hashedEmail = hashEmail(normalizedEmail);
🔗 Analysis chain

Verify email validation before processing.

While email normalization and hashing are implemented correctly, ensure that email validation is performed before these operations. This is particularly important since the validation imports were removed.


Let me search for email validation patterns in the codebase.


Let me check the implementation of email validation in the isValidEmail function.


Let me check if the isValidEmail function is being used in the signup process.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Search for email validation in the codebase
rg -A 5 "validateEmail|email.*validation" 

Length of output: 46469


Script:

#!/bin/bash
# Search for email validation patterns in the codebase
ast-grep --pattern 'validateEmail($$$)'

# Also search for any email validation regex or patterns
rg -A 3 "email.*pattern|email.*regex|email.*validate"

Length of output: 1515


Script:

#!/bin/bash
# Check the implementation of isValidEmail function
cat src/setup/isValidEmail.ts

Length of output: 577


Script:

#!/bin/bash
# Check if isValidEmail is imported and used in signUp.ts
rg -A 5 "isValidEmail" src/resolvers/Mutation/signUp.ts

# Also check the entire signUp.ts file for context
cat src/resolvers/Mutation/signUp.ts

Length of output: 5711

tests/resolvers/Mutation/blockPluginCreationBySuperadmin.spec.ts (1)

106-112: 🛠️ Refactor suggestion

Reduce code duplication in test data generation.

This block duplicates the email generation and encryption logic from the previous test case. Consider using the suggested generateTestEmail helper function here as well to maintain DRY principles and consistency across test cases.

src/resolvers/Query/organizationsMemberConnection.ts (2)

165-166: 🛠️ Refactor suggestion

Refactor duplicated email handling logic

The email handling logic is duplicated between the paginated and non-paginated user mappings. Consider extracting this into a helper function:

// Add at the top of the file
const mapUserWithDecryptedEmail = (user: InterfaceUser, context: any) => {
  const decryptUserEmail = (email: string) => {
    try {
      const decrypted = decryptEmail(email);
      return decrypted.decrypted;
    } catch (error) {
      console.error('Failed to decrypt user email', { userId: user._id });
      return null;
    }
  };

  return {
    // ... other user fields ...
    email: decryptUserEmail(user.email),
    hashedEmail: user.hashedEmail,
    // ... remaining user fields ...
  };
};

Then use this helper in both mapping blocks:

users = usersModel.docs.map((user) => mapUserWithDecryptedEmail(user, context));

130-131: ⚠️ Potential issue

Add error handling for email decryption

The current implementation might throw runtime errors if email decryption fails. Consider implementing proper error handling:

-        email: decryptEmail(user.email).decrypted,
+        email: (() => {
+          try {
+            const decrypted = decryptEmail(user.email);
+            return decrypted.decrypted;
+          } catch (error) {
+            // Log the error securely without exposing the email
+            console.error('Failed to decrypt user email', { userId: user._id });
+            return null; // or handle the error case appropriately
+          }
+        })(),
         hashedEmail: user.hashedEmail,
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

        email: (() => {
          try {
            const decrypted = decryptEmail(user.email);
            return decrypted.decrypted;
          } catch (error) {
            // Log the error securely without exposing the email
            console.error('Failed to decrypt user email', { userId: user._id });
            return null; // or handle the error case appropriately
          }
        })(),
        hashedEmail: user.hashedEmail,
tests/resolvers/Mutation/updateUserPassword.spec.ts (1)

41-47: 🛠️ Refactor suggestion

Consider adding specific tests for email encryption scenarios.

While the password update tests are comprehensive, consider adding test cases to verify:

  1. Email encryption/decryption roundtrip works correctly
  2. System handles encryption failures gracefully
  3. Hash comparison works as expected for email lookups

Would you like me to help generate these additional test cases?

tests/resolvers/Mutation/createMember.spec.ts (1)

207-212: ⚠️ Potential issue

Test case needs expansion to cover email encryption functionality.

While the test successfully creates a user with encrypted and hashed email, it has several gaps in coverage:

  1. The test title doesn't reflect that it's also testing email encryption
  2. There's no verification that the stored encrypted email can be decrypted
  3. The test doesn't assert that both encrypted and hashed emails are stored correctly

Consider expanding the test or adding a new test case:

 const email = `email2${nanoid().toLowerCase()}@gmail.com`;
 const hashedEmail = hashEmail(email)

 const testUser2 = await User.create({
   email: encryptEmail(email),
   hashedEmail,
   password: `pass2${nanoid().toLowerCase()}`,
   firstName: `firstName2${nanoid().toLowerCase()}`,
   lastName: `lastName2${nanoid().toLowerCase()}`,
   image: null,
   appLanguageCode: "en",
 });
+
+// Verify email encryption and hashing
+const createdUser = await User.findById(testUser2._id);
+expect(createdUser.hashedEmail).toBe(hashedEmail);
+const decryptedEmail = decryptEmail(createdUser.email);
+expect(decryptedEmail).toBe(email);
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

    const email = `email2${nanoid().toLowerCase()}@gmail.com`;
    const hashedEmail = hashEmail(email)

    const testUser2 = await User.create({
      email: encryptEmail(email),
      hashedEmail,
      password: `pass2${nanoid().toLowerCase()}`,
      firstName: `firstName2${nanoid().toLowerCase()}`,
      lastName: `lastName2${nanoid().toLowerCase()}`,
      image: null,
      appLanguageCode: "en",
    });

    // Verify email encryption and hashing
    const createdUser = await User.findById(testUser2._id);
    expect(createdUser.hashedEmail).toBe(hashedEmail);
    const decryptedEmail = decryptEmail(createdUser.email);
    expect(decryptedEmail).toBe(email);
src/utilities/createSampleOrganizationUtil.ts (2)

44-51: 🛠️ Refactor suggestion

Enhance email generation for more realistic test data.

Several improvements could make the email generation more robust:

  1. Use faker's email generator for more realistic domains
  2. Add validation for generated email format
  3. Add error handling for encryption/hashing operations
  4. Consider adding uniqueness check
-  const email = `${fname.toLowerCase()}${lname.toLowerCase()}@${faker.helpers.arrayElement([
-      "xyz",
-      "abc",
-      "lmnop",
-    ])}.com`
+  const email = faker.internet.email({
+    firstName: fname,
+    lastName: lname,
+    provider: faker.internet.domainName(),
+  });
+
+  // Validate email format
+  if (!email.match(/^[^\s@]+@[^\s@]+\.[^\s@]+$/)) {
+    throw new Error(`Invalid email format generated: ${email}`);
+  }
 
-  const hashedEmail = hashEmail(email);
+  let hashedEmail;
+  try {
+    hashedEmail = hashEmail(email);
+  } catch (error) {
+    throw new Error(`Failed to hash email: ${error.message}`);
+  }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

  const email = faker.internet.email({
    firstName: fname,
    lastName: lname,
    provider: faker.internet.domainName(),
  });

  // Validate email format
  if (!email.match(/^[^\s@]+@[^\s@]+\.[^\s@]+$/)) {
    throw new Error(`Invalid email format generated: ${email}`);
  }

  let hashedEmail;
  try {
    hashedEmail = hashEmail(email);
  } catch (error) {
    throw new Error(`Failed to hash email: ${error.message}`);
  }

55-56: ⚠️ Potential issue

Add error handling and documentation for email encryption.

The email encryption process needs better error handling and documentation to explain the dual storage approach.

+  let encryptedEmail;
+  try {
+    encryptedEmail = encryptEmail(email);
+  } catch (error) {
+    throw new Error(`Failed to encrypt email: ${error.message}`);
+  }
+
   const user = new User({
     firstName: fname,
     lastName: lname,
-    email: encryptEmail(email),
-    hashedEmail: hashedEmail,
+    // Store encrypted email for retrieval and hashed email for efficient lookups
+    email: encryptedEmail,
+    hashedEmail,
     password: "$2a$12$bSYpay6TRMpTOaAmYPFXku4avwmqfFBtmgg39TabxmtFEiz4plFtW",
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

    let encryptedEmail;
    try {
      encryptedEmail = encryptEmail(email);
    } catch (error) {
      throw new Error(`Failed to encrypt email: ${error.message}`);
    }

    // Store encrypted email for retrieval and hashed email for efficient lookups
    email: encryptedEmail,
    hashedEmail,
tests/resolvers/Mutation/login.spec.ts (1)

272-274: 🛠️ Refactor suggestion

Consider refactoring repeated null checks.

The null checks for testUser are duplicated across multiple test cases. Consider extracting this into a helper function or using a beforeEach hook.

+ function ensureTestUser(): void {
+   if (!testUser) {
+     throw new Error("Error creating test user.");
+   }
+ }

  it("throws ValidationError if password is incorrect", async () => {
-   if (!testUser) {
-     throw new Error("Error creating Test User.");
-   }
+   ensureTestUser();
    // ... rest of the test
  });

Also applies to: 298-300, 307-309, 354-356

tests/resolvers/Query/usersConnection.spec.ts (1)

61-65: ⚠️ Potential issue

Strengthen assertions and add encryption-specific test cases

The current changes have significantly weakened the test coverage:

  1. Basic existence checks (toBeDefined()) replace detailed equality assertions
  2. No validation of email encryption/decryption
  3. Missing verification of email search functionality with encrypted data

Enhance the assertions to include:

// Example for the first test case
expect(usersPayload).toBeDefined();
expect(Array.isArray(usersPayload)).toBe(true);
// Verify email encryption
expect(usersPayload.every(user => {
  const decryptedEmail = decryptEmail(user.email);
  return decryptedEmail === users.find(u => u._id === user._id)?.email;
})).toBe(true);

Also applies to: 109-112, 172-173, 230-231, 291-292, 350-351, 395-396, 431-432, 467-468, 502-503

tests/resolvers/Query/users.spec.ts (2)

262-262: 🛠️ Refactor suggestion

Consider optimizing repeated email decryption logic.

The email decryption is consistently implemented across all test cases, but the pattern is repeated multiple times. Consider extracting this transformation into a helper function to improve maintainability.

+ function transformUserForTest(user) {
+   return {
+     ...user,
+     email: decryptEmail(user.email).decrypted,
+     organizationsBlockedBy: [],
+     image: user.image ? `${BASE_URL}${user.image}` : null,
+   };
+ }

  users = users.map((user) => ({
-   ...user,
-   email: decryptEmail(user.email).decrypted,
-   organizationsBlockedBy: [],
-   image: user.image ? `${BASE_URL}${user.image}` : null,
+   ...transformUserForTest(user)
  }));

Also applies to: 298-298, 348-348, 409-409, 468-468, 528-528, 593-593, 645-645, 685-685, 723-723, 772-772


86-122: 🛠️ Refactor suggestion

Consider refactoring test data setup for better maintainability.

The current implementation correctly handles both encryption and hashing but contains repetitive code. Consider refactoring this into a helper function.

+ function createTestEmail() {
+   const email = `email${nanoid().toLowerCase()}@gmail.com`;
+   return {
+     email: encryptEmail(email),
+     hashedEmail: hashEmail(email),
+     rawEmail: email  // useful for test assertions
+   };
+ }

- const email1 = `email${nanoid().toLowerCase()}@gmail.com`;
- const email2 = `email${nanoid().toLowerCase()}@gmail.com`;
- const email3 = `email${nanoid().toLowerCase()}@gmail.com`;
- const email4 = `email${nanoid().toLowerCase()}@gmail.com`;
- const email5 = `email${nanoid().toLowerCase()}@gmail.com`;
+ const testEmails = Array.from({ length: 5 }, () => createTestEmail());

  testUsers = await User.insertMany([
    {
-     email: encryptEmail(email1),
-     hashedEmail: hashEmail(email1),
+     ...testEmails[0],
      password: "password",
      firstName: `firstName${nanoid()}`,
      lastName: `lastName${nanoid()}`,
    },
    // Repeat for other users using testEmails[1] through testEmails[4]

Committable suggestion was skipped due to low confidence.

tests/resolvers/Query/organizationsMemberConnection.spec.ts (1)

236-236: 🛠️ Refactor suggestion

Refactor repeated decryption logic and add error handling.

The email decryption logic is duplicated across multiple test cases. Consider:

  1. Creating a helper function to handle user mapping with decryption
  2. Adding error handling for decryption failures

Create a helper function at the top of the test file:

const mapUserWithDecryptedEmail = (user: any) => {
  try {
    const decryptedData = decryptEmail(user.email);
    return {
      _id: user._id,
      appUserProfileId: user.appUserProfileId,
      address: user.address,
      birthDate: user.birthDate,
      createdAt: user.createdAt,
      educationGrade: user.educationGrade,
      email: decryptedData.decrypted,
      employmentStatus: user.employmentStatus,
      firstName: user.firstName,
      gender: user.gender,
      image: user.image || null,
      joinedOrganizations: user.joinedOrganizations,
      lastName: user.lastName,
      maritalStatus: user.maritalStatus,
      membershipRequests: user.membershipRequests,
      organizationsBlockedBy: user.organizationsBlockedBy,
      password: null,
      phone: user.phone,
      registeredEvents: user.registeredEvents,
      status: user.status,
      updatedAt: user.updatedAt,
    };
  } catch (error) {
    throw new Error(`Failed to decrypt email: ${error.message}`);
  }
};

Then replace all instances of the user mapping with:

const usersWithPassword = users.map(mapUserWithDecryptedEmail);

Also applies to: 328-328, 419-419, 513-513, 607-607, 689-689, 870-870, 941-941, 1041-1041, 1122-1122

src/resolvers/Organization/members.ts (1)

1-1: ⚠️ Potential issue

Use type-only import for InterfaceUser

The InterfaceUser is only used as a type in this file. To comply with TypeScript best practices and linting rules, it should be imported using a type-only import.

Apply this diff to fix the import statement:

-import { InterfaceUser, User } from "../../models";
+import { User } from "../../models";
+import type { InterfaceUser } from "../../models";
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

import { User } from "../../models";
import type { InterfaceUser } from "../../models";
🧰 Tools
🪛 GitHub Check: Check for linting, formatting, and type errors

[failure] 1-1:
Imports "InterfaceUser" are only used as type

🪛 eslint

[error] 1-1: Imports "InterfaceUser" are only used as type.

(@typescript-eslint/consistent-type-imports)

src/resolvers/Organization/blockedUsers.ts (2)

32-41: ⚠️ Potential issue

Handle decryption failures to avoid returning encrypted emails.

When email decryption fails, the code logs the error but returns the user object with the encrypted email. This could result in inconsistent data being sent to the client. Consider returning the user with the email set to null to indicate that the email is unavailable.

Apply this diff to set the email to null when decryption fails:

          } catch (error) {
            console.error(
              `Failed to decrypt email for user ${blockedUser._id}:`,
              error,
            );
-           return blockedUser;
+           return { ...blockedUser, email: null };
          }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

      try {
        const { decrypted } = decryptEmail(blockedUser.email);
        return { ...blockedUser, email: decrypted };
      } catch (error) {
        console.error(
          `Failed to decrypt email for user ${blockedUser._id}:`,
          error,
        );
        return { ...blockedUser, email: null };
      }

1-1: ⚠️ Potential issue

Use type-only import for InterfaceUser to comply with TypeScript best practices.

The InterfaceUser is only used as a type annotation. Adjusting the import to a type-only import enhances code clarity and complies with the linting rule @typescript-eslint/consistent-type-imports.

Apply this diff to fix the issue:

-import { InterfaceUser, User } from "../../models";
+import { User } from "../../models";
+import type { InterfaceUser } from "../../models";
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

import { User } from "../../models";
import type { InterfaceUser } from "../../models";
🧰 Tools
🪛 GitHub Check: Check for linting, formatting, and type errors

[failure] 1-1:
Imports "InterfaceUser" are only used as type

🪛 eslint

[error] 1-1: Imports "InterfaceUser" are only used as type.

(@typescript-eslint/consistent-type-imports)

src/resolvers/Mutation/forgotPassword.ts (1)

11-11: ⚠️ Potential issue

Remove unused import 'crypto' module.

The 'crypto' module is imported but not used anywhere in the file. This can be safely removed to clean up the code.

Apply this diff to remove the unused import:

-import crypto from "crypto";
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.


🧰 Tools
🪛 GitHub Check: Check for linting, formatting, and type errors

[failure] 11-11:
'crypto' is defined but never used

🪛 eslint

[error] 11-11: 'crypto' is defined but never used.

(@typescript-eslint/no-unused-vars)

src/resolvers/Mutation/login.ts (1)

27-28: ⚠️ Potential issue

Validate email input before hashing

Before hashing the email, consider adding validation to ensure that args.data.email is neither undefined nor null. This prevents potential errors during the hashing process.

Apply this change to add email validation:

+ if (!args.data.email) {
+   throw new errors.ValidationError(
+     [
+       {
+         message: 'Email is required',
+         code: 'EMAIL_REQUIRED',
+         param: 'email',
+       },
+     ],
+     'Email is required',
+   );
+ }
  
  const hashedEmail = hashEmail(args.data.email);
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

  if (!args.data.email) {
    throw new errors.ValidationError(
      [
        {
          message: 'Email is required',
          code: 'EMAIL_REQUIRED',
          param: 'email',
        },
      ],
      'Email is required',
    );
  }
  
  const hashedEmail = hashEmail(args.data.email);

src/utilities/loadSampleData.ts (2)

122-122: ⚠️ Potential issue

Fix TSDoc syntax error in @throws tag

The TSDoc parser reports a syntax error due to an unescaped "}" character in the @throws tag. To resolve this, escape the "}" character with a backslash.

Apply this diff to fix the issue:

-  * @throws {Error} If encryption or hashing fails
+  * @throws \{Error\} If encryption or hashing fails
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

          * @throws \{Error\} If encryption or hashing fails
🧰 Tools
🪛 eslint

[error] 122-122: tsdoc-escape-right-brace: The "}" character should be escaped using a backslash to avoid confusion with a TSDoc inline tag

(tsdoc/syntax)


135-135: ⚠️ Potential issue

Avoid logging potentially sensitive error information

Logging the entire error object may inadvertently expose sensitive information. Consider logging only the error message or a sanitized version of the error.

Apply this diff to modify the error logging:

-         console.error(`Failed to process email for user: ${error}`);
+         console.error(`Failed to process email for user ID ${user.id}: ${error.message}`);

Committable suggestion was skipped due to low confidence.

src/models/User.ts (3)

249-249: ⚠️ Potential issue

Use 'next(new Error(...))' instead of 'throw' in Mongoose middleware

In Mongoose middleware, errors should be passed to the next function rather than thrown. Throwing an error may bypass Mongoose's error handling mechanisms and lead to unexpected behavior.

Modify the error handling as follows:

- throw new Error('HASH_PEPPER environment variable is not configured');
+ return next(new Error('HASH_PEPPER environment variable is not configured'));
- throw new Error('The provided email address is invalid');
+ return next(new Error('The provided email address is invalid'));
- throw new Error(`Email validation failed: ${errorMessage}`);
+ return next(new Error(`Email validation failed: ${errorMessage}`));

Also applies to: 255-255, 262-262


12-12: ⚠️ Potential issue

Unused import 'crypto'

The crypto module is imported but never used. Consider removing it to keep the code clean.

Apply this diff to remove the unused import:

- import crypto from 'crypto'
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.


🧰 Tools
🪛 GitHub Check: Check for linting, formatting, and type errors

[failure] 12-12:
'crypto' is defined but never used


261-262: 🛠️ Refactor suggestion

Use 'errorMessage' variable to enhance error reporting

The variable errorMessage is assigned but not used. Incorporate it into the thrown error to provide more detailed information, which can aid in debugging.

Apply this diff to include errorMessage in the error message:

  const errorMessage = error instanceof Error ? error.message : 'Unknown error';
- throw new Error('Email validation failed. Please ensure the email is valid.');
+ throw new Error(`Email validation failed: ${errorMessage}`);
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

      const errorMessage = error instanceof Error ? error.message : 'Unknown error';
      throw new Error(`Email validation failed: ${errorMessage}`);
🧰 Tools
🪛 GitHub Check: Check for linting, formatting, and type errors

[failure] 261-261:
'errorMessage' is assigned a value but never used

🪛 eslint

[error] 261-261: 'errorMessage' is assigned a value but never used.

(@typescript-eslint/no-unused-vars)

setup.ts (3)

1-1: ⚠️ Potential issue

Remove duplicate imports of the 'crypto' module

The 'crypto' module is imported twice, once as cryptolib on line 1 and again as crypto on line 18. This duplication can cause confusion and is unnecessary. Consider consolidating these imports into a single import statement and ensure consistent usage throughout the code.

Apply this diff to remove the duplicate import:

- import * as cryptolib from "crypto";

If cryptolib is used in the code, replace its usage with crypto or vice versa to maintain consistency.

Also applies to: 18-18


391-393: ⚠️ Potential issue

Adjust regex validation to be case-insensitive for hexadecimal keys

The regex used to validate the ENCRYPTION_KEY and HASH_PEPPER only allows lowercase hexadecimal characters. Hexadecimal strings can contain both uppercase and lowercase characters. Modify the regex to be case-insensitive to accept valid keys regardless of character case.

Apply this diff to update the regex patterns:

- if (!/^[a-f0-9]{64}$/.test(process.env.ENCRYPTION_KEY)) {
+ if (!/^[a-f0-9]{64}$/i.test(process.env.ENCRYPTION_KEY)) {
- if (!/^[a-f0-9]{64}$/.test(process.env.HASH_PEPPER)) {
+ if (!/^[a-f0-9]{64}$/i.test(process.env.HASH_PEPPER)) {

Also applies to: 412-414


405-406: ⚠️ Potential issue

Ensure the setup process halts on critical failures

In the catch blocks of setEncryptionKey and setHashPepper, errors are logged but the setup process continues. If generating or setting the encryption key or hash pepper fails, it's crucial to halt the setup to prevent running with invalid or insecure configurations. Consider calling abort() after logging the error to stop the process.

Apply this diff to modify the error handling:

      } catch (err) {
          console.error("An error occurred:", err);
+         abort();
      }

Also applies to: 426-427

src/utilities/encryption.ts (6)

10-13: ⚠️ Potential issue

Fix TSDoc @returns syntax errors

The TSDoc comments in the functions generateRandomIV, encryptEmail, decryptEmail, and isValidHex include types in braces in the @returns tags, which is not standard in TSDoc and causes syntax errors identified by static analysis tools.

Apply this diff to fix the TSDoc comments:

- * @returns {string} A randomly generated IV as a hexadecimal string.
+ * @returns A randomly generated IV as a hexadecimal string.

- * @returns {string} The encrypted email in the format "iv:authTag:encryptedData".
+ * @returns The encrypted email in the format "iv:authTag:encryptedData".

- * @returns {object} An object containing the decrypted email.
+ * @returns An object containing the decrypted email.

- * @returns {boolean} True if the string is valid hexadecimal, false otherwise.
+ * @returns True if the string is valid hexadecimal, false otherwise.

Also applies to: 18-23, 50-55, 112-116

🧰 Tools
🪛 GitHub Check: Check for linting, formatting, and type errors

[failure] 12-12:
tsdoc-malformed-inline-tag: Expecting a TSDoc tag starting with "{@"


[failure] 12-12:
tsdoc-escape-right-brace: The "}" character should be escaped using a backslash to avoid confusion with a TSDoc inline tag


27-33: ⚠️ Potential issue

Validate that ENCRYPTION_KEY is a valid hexadecimal string

In both encryptEmail and decryptEmail functions, we check that ENCRYPTION_KEY is defined and has a length of 64 characters but do not validate that it contains only hexadecimal characters. This could lead to runtime errors if ENCRYPTION_KEY includes invalid characters.

Apply this diff to include validation of ENCRYPTION_KEY:

  } else if (
    encryptionKey.length !== 64
+   || !isValidHex(encryptionKey)
  ) {
    throw new Error(
-     "Encryption key must be a 256-bit hexadecimal string (64 characters).",
+     "Encryption key must be a 256-bit hexadecimal string (64 hex characters).",
    );
  }

Also applies to: 81-87


25-33: ⚠️ Potential issue

Resolve inconsistency between ENCRYPTION_KEY format

The code expects ENCRYPTION_KEY to be a 256-bit hexadecimal string (64 characters), but the environment variable documentation indicates it should be a Base64-encoded 32-byte key. This inconsistency may cause configuration errors.

Consider updating the code to handle a Base64-encoded key, or adjust the documentation to specify that a hexadecimal string is required. If you opt for Base64 encoding, modify the Buffer.from calls and adjust validations:

- Buffer.from(encryptionKey, "hex"),
+ Buffer.from(encryptionKey, "base64"),

And update the validation:

- } else if (
-   encryptionKey.length !== 64
-   || !isValidHex(encryptionKey)
- ) {
+ } else {
+   const keyBuffer = Buffer.from(encryptionKey, 'base64');
+   if (keyBuffer.length !== 32) {
      throw new Error(
-       "Encryption key must be a 256-bit hexadecimal string (64 hex characters).",
+       "Encryption key must be a 256-bit key encoded in base64 (32 bytes).",
      );
+   }
  }

Ensure consistency between the code and documentation to prevent potential misconfigurations.

Also applies to: 79-87


56-58: 🛠️ Refactor suggestion

Simplify the return type of decryptEmail

The decryptEmail function returns an object { decrypted: string }, but since it only returns one value, it might be simpler to return the decrypted string directly.

Update the function signature and return statement:

- export function decryptEmail(encryptedData: string): {
-   decrypted: string;
- } {
+ export function decryptEmail(encryptedData: string): string {
...
- return { decrypted };
+ return decrypted;

This simplifies the usage of the function and aligns with common practice.

Also applies to: 109-110


66-66: ⚠️ Potential issue

Validate the format of encryptedData

After splitting encryptedData, ensure that it results in exactly three components (iv, authTagHex, and encryptedHex). If encryptedData does not contain exactly two colons, it may cause unexpected behavior.

Add a validation check:

  const [iv, authTagHex, encryptedHex] = encryptedData.split(":");
+ if (!iv || !authTagHex || !encryptedHex) {
+   throw new Error("Invalid encrypted data format: expected 'iv:authTag:encryptedData'.");
+ }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

  const [iv, authTagHex, encryptedHex] = encryptedData.split(":");
  if (!iv || !authTagHex || !encryptedHex) {
    throw new Error("Invalid encrypted data format: expected 'iv:authTag:encryptedData'.");
  }

42-47: ⚠️ Potential issue

Add error handling for the encryption process

The encryptEmail function does not handle potential errors during encryption. If cipher.update or cipher.final throws an error, it will not be caught.

Wrap the encryption process in a try-catch block:

+ let encrypted;
+ try {
  encrypted = Buffer.concat([
    cipher.update(email, "utf8"),
    cipher.final(),
  ]);
+ } catch (err) {
+   throw new Error("Encryption failed: " + err.message);
+ }

Committable suggestion was skipped due to low confidence.

@prayanshchh
Copy link
Author

I did reset-hard to "fixing import errors" as in my last push i removed eslint-disable in setup.ts to resolve eslint checks, i can't check my changes until and unless I resolve these checks and these eslint-disable lines were already present in setup.ts, they have not been added in any of the 20 commits

how can i proceed?

@prayanshchh
Copy link
Author

also please note, I will resume my work on this in 3-4 days as festive season is going on

@prayanshchh
Copy link
Author

@pranshugupta54 does everything look good now, there are no comments by coderrabit ai, also it would be great if you could guide me with resolving linting errors

@pranshugupta54
Copy link
Member

please fix conflicting files first

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Outside diff range and nitpick comments (4)
tests/utilities/encryptionModule.spec.ts (1)

33-84: Add type checking and error message validation tests.

While the current test coverage is good, consider adding these additional test cases:

  1. Verify exact error message strings
  2. Type checking for the decrypted result object
it("should return properly typed decryption result", () => {
  const email = "[email protected]";
  const encrypted = encryptEmail(email);
  const result = decryptEmail(encrypted);
  
  expect(result).toHaveProperty('decrypted');
  expect(typeof result.decrypted).toBe('string');
});

it("should throw specific error messages", () => {
  expect(() => encryptEmail(null as any)).toThrow("Empty or invalid email input");
  expect(() => encryptEmail(undefined as any)).toThrow("Empty or invalid email input");
  expect(() => encryptEmail(123 as any)).toThrow("Empty or invalid email input");
});
setup.ts (3)

373-425: Consider refactoring encryption key setup functions to reduce duplication.

The setEncryptionKey and setHashPepper functions share almost identical logic. Consider extracting the common functionality into a reusable helper function.

+function setupSecureKey(
+  keyType: 'ENCRYPTION_KEY' | 'HASH_PEPPER',
+  envVar: string | undefined
+): void {
+  try {
+    if (envVar) {
+      if (!/^[a-f0-9]{64}$/i.test(envVar)) {
+        throw new Error(`Existing ${keyType.toLowerCase()} has invalid format`);
+      }
+      console.log(`\n ${keyType} is already present.`);
+    } else {
+      const newKey = crypto.randomBytes(32).toString("hex");
+      process.env[keyType] = newKey;
+      updateEnvVariable({ [keyType]: newKey });
+      console.log(`\n ${keyType} set successfully.`);
+    }
+  } catch (err) {
+    console.error("An error occurred:", err);
+    abort();
+  }
+}

+export async function setEncryptionKey(): Promise<void> {
+  setupSecureKey('ENCRYPTION_KEY', process.env.ENCRYPTION_KEY);
+}

+export async function setHashPepper(): Promise<void> {
+  setupSecureKey('HASH_PEPPER', process.env.HASH_PEPPER);
+}

Line range hint 171-198: Add timeout mechanism to prevent infinite loops.

While the while(true) loop with validation is good, consider adding a maximum retry limit to prevent infinite loops in case of persistent issues.

 async function askForTransactionLogPath(): Promise<string> {
   let logPath: string | null;
+  const MAX_RETRIES = 3;
+  let attempts = 0;
   // Keep asking for path, until user gives a valid path
-  while (true) {
+  while (attempts < MAX_RETRIES) {
+    attempts++;
     const response = await inquirer.prompt([
       {
         type: "input",
         name: "logPath",
         message: "Enter absolute path of log file:",
         default: null,
       },
     ]);
     logPath = response.logPath;
     if (logPath && fs.existsSync(logPath)) {
       try {
         fs.accessSync(logPath, fs.constants.R_OK | fs.constants.W_OK);
         break;
       } catch {
         console.error(
           "The file is not readable/writable. Please enter a valid file path.",
         );
       }
     } else {
       console.error(
         "Invalid path or file does not exist. Please enter a valid file path.",
       );
     }
   }
+  if (attempts >= MAX_RETRIES) {
+    console.error("Maximum retry attempts reached. Using default log path.");
+    return path.resolve(__dirname, "logs", "transaction.log");
+  }
   return logPath;
 }

Line range hint 1030-1053: Maintain consistent message capitalization in prompts.

The word "Sample" is capitalized in some prompts but not in others:

  • Line 1030: "default data" (not capitalized)
  • Line 1040: "sample data" (not capitalized)
  • Line 1053: "Sample data" (capitalized)

Consider standardizing the capitalization across all prompts.

-          message: "Do you want to import default data?",
+          message: "Do you want to import Default data?",
-            message: "Do you want to import sample data?",
+            message: "Do you want to import Sample data?",
-        message: "Do you want to import Sample data?",
+        message: "Do you want to import Sample data?",
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 4d298c1 and 476e9a3.

📒 Files selected for processing (3)
  • setup.ts (13 hunks)
  • tests/utilities/encryptionModule.spec.ts (1 hunks)
  • tests/utilities/hashingModule.spec.ts (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (1)
  • tests/utilities/hashingModule.spec.ts
🔇 Additional comments (3)
tests/utilities/encryptionModule.spec.ts (2)

1-8: LGTM! Clean and focused imports.

The test file correctly imports the necessary testing utilities and encryption functions.


1-85: Verify encryption format compatibility with database storage.

The tests validate the encryption functionality but we should verify that the encrypted format (hex strings with colons) is compatible with the database schema and indexing requirements.

✅ Verification successful

Based on the search results, I can now provide a definitive response about the encryption format compatibility with the database:

Encrypted email format is compatible with database storage requirements

The codebase analysis reveals:

  • The User model stores emails in two forms: email (encrypted) and hashedEmail (for lookups)
  • The encrypted format follows a consistent pattern: iv:authTag:encryptedData (hex strings with colons)
  • No explicit length constraints are enforced on these fields in the database schema
  • The encryption implementation is already being used successfully throughout the codebase for database operations

The tests verify that:

  • The encryption produces valid hex characters (/^[0-9a-f]+:[0-9a-f]+:[0-9a-f]+$/i)
  • Long email inputs are handled gracefully (tested up to 10,000 characters)
  • The format is consistently maintained across all database operations
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Check database schema and related files for encryption compatibility

# Check schema definitions
echo "Checking schema files for email field definitions..."
rg -l "email|encrypted|hashed" --type=graphql

# Check database models
echo "Checking model files for email field handling..."
rg -l "email|encrypted|hashed" --type=typescript --glob="**/models/**"

# Check maximum field lengths
echo "Checking for field length constraints..."
rg "length|maxLength|size" --type=typescript --glob="**/models/**"

Length of output: 604


Script:

#!/bin/bash
# Let's try different search patterns without type constraints

# Check for schema files and their content
echo "Checking for schema files..."
fd "schema|\.graphql|\.gql"

echo "\nChecking for model definitions..."
fd "model|entity" -e ts -e js

echo "\nSearching for email field definitions..."
rg -A 5 "email.*string|email.*varchar|email.*text" 

echo "\nChecking for encrypted email patterns..."
rg -A 5 "encrypted.*email|hashed.*email"

echo "\nLooking for database field constraints..."
rg -A 5 "column.*email|@Column.*email"

Length of output: 36734

setup.ts (1)

Line range hint 761-777: LGTM! Improved user prompts.

The changes to the token generation prompts provide better context and sensible defaults based on existing environment variables.

🧰 Tools
🪛 Biome

[error] 762-763: Unnecessary use of boolean literals in conditional expression.

Simplify your code by directly assigning the result without using a ternary operator.
If your goal is negation, you may use the logical NOT (!) or double NOT (!!) operator for clearer and concise code.
Check for more details about NOT operator.
Unsafe fix: Remove the conditional expression with

(lint/complexity/noUselessTernary)

Comment on lines +26 to +30
it("should handle malformed encrypted data gracefully", () => {
expect(() => decryptEmail("invalid:format")).toThrow();
expect(() => decryptEmail("invalid:format:data")).toThrow();
expect(() => decryptEmail("::::")).toThrow();
});
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Move malformed data test to appropriate describe block.

The test for handling malformed encrypted data should be moved to the "encryptEmail and decryptEmail" describe block since it's testing decryptEmail functionality, not generateRandomIV.

-  describe("generateRandomIV", () => {
-    // ... other generateRandomIV tests ...
-
-    it("should handle malformed encrypted data gracefully", () => {
-      expect(() => decryptEmail("invalid:format")).toThrow();
-      expect(() => decryptEmail("invalid:format:data")).toThrow();
-      expect(() => decryptEmail("::::")).toThrow();
-    });
-  });
+  describe("generateRandomIV", () => {
+    // ... other generateRandomIV tests ...
+  });
+
+  describe("encryptEmail and decryptEmail", () => {
+    // ... at the beginning of this block ...
+    it("should handle malformed encrypted data gracefully", () => {
+      expect(() => decryptEmail("invalid:format")).toThrow();
+      expect(() => decryptEmail("invalid:format:data")).toThrow();
+      expect(() => decryptEmail("::::")).toThrow();
+    });

Committable suggestion skipped: line range outside the PR's diff.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Outside diff range and nitpick comments (1)
.github/workflows/pull-request.yml (1)

221-223: Consider adding validation for encryption key format.

Since email encryption is a critical security feature, consider adding a step to validate the format and strength of the encryption key during CI.

Example validation step to add after the environment variables:

      ENCRYPTION_KEY: ${{secrets.ENCRYPTION_KEY}}
      HASH_PEPPER: ${{secrets.HASH_PEPPER}}

+     - name: Validate encryption key format
+       run: |
+         if [[ ${#ENCRYPTION_KEY} -lt 32 ]]; then
+           echo "Error: ENCRYPTION_KEY must be at least 32 characters long"
+           exit 1
+         fi
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 476e9a3 and 0a2fcbd.

📒 Files selected for processing (1)
  • .github/workflows/pull-request.yml (1 hunks)

Comment on lines 221 to 223
ENCRYPTION_KEY: ${{secrets.ENCRYPTION_KEY}}
HASH_PEPPER: ${{secrets.HASH_PEPPER}}

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codebase verification

Environment variables properly configured, but documentation needed

The verification shows:

  1. .env.sample includes both variables with appropriate placeholders
  2. GraphQL schema confirms email encryption implementation with hashedEmail field and encryption boolean
  3. No setup documentation found for the new encryption variables

Please add documentation in a README.md or docs folder explaining:

  • Purpose and format of ENCRYPTION_KEY and HASH_PEPPER
  • Steps to generate secure values for these variables
  • How to configure them in GitHub secrets
🔗 Analysis chain

Verify GitHub secrets configuration for encryption.

The new environment variables for email encryption look good. However, please ensure:

  1. These secrets are properly configured in the GitHub repository settings
  2. Documentation is updated to explain how to set up these secrets
  3. The .env.sample file includes these variables with appropriate descriptions

Let's verify the integration points:

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Check if .env.sample has been updated with the new variables
echo "Checking .env.sample for new variables..."
rg "ENCRYPTION_KEY|HASH_PEPPER" .env.sample

# Check if documentation has been updated
echo "Checking documentation for setup instructions..."
rg -i "encryption.*key|hash.*pepper" "*.md"

Length of output: 411


Script:

#!/bin/bash
# Check for documentation in docs directory and other common locations
echo "Checking for documentation in various locations..."
fd -e md -x rg -i "encryption.*key|hash.*pepper" {}

# Check for setup instructions in repository
echo "Checking for setup related files..."
fd -g "*setup*" -g "*install*" -g "*config*" -x rg -i "encryption.*key|hash.*pepper" {}

# Look for any GraphQL schema changes related to email encryption
echo "Checking GraphQL schema..."
fd -g "schema.graphql" -x cat {}

Length of output: 46113


Script:

#!/bin/bash
# Check for email-related fields and types in GraphQL schema
echo "Checking for email-related fields in User type..."
rg -A 5 -B 5 "email.*:" schema.graphql

# Check for setup/config files that might need encryption key configuration
echo "Checking for setup and config files..."
fd -g "*setup*" -g "*config*" -g "*.env*" -x cat {}

# Look for any email-related mutations or types
echo "Checking for email-related mutations and types..."
rg -i "email|encrypt" schema.graphql

Length of output: 2317

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 0a2fcbd and e68a298.

📒 Files selected for processing (1)
  • .github/workflows/pull-request.yml (1 hunks)
🧰 Additional context used
🪛 Gitleaks
.github/workflows/pull-request.yml

221-221: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)

Comment on lines +221 to +222
ENCRYPTION_KEY: 64730e71158b84687f01237d8f8128cc9cb7804d2d68c36823880456adad48c7
HASH_PEPPER: 56195a1bd9b062fc4a63afff383ec28bf1464706725ae744c9fe7fc459426074
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codebase verification

⚠️ Potential issue

Based on the evidence gathered, I can now generate the final response:

⚠️ Replace hardcoded test encryption keys with GitHub Actions secrets

The hardcoded encryption keys in the workflow file pose a security risk. The codebase shows proper encryption key handling:

  1. .env.sample demonstrates proper configuration with empty ENCRYPTION_KEY and HASH_PEPPER variables
  2. src/utilities/encryption.ts validates key formats and handles them securely
  3. No other instances of these hardcoded values were found in the codebase

Please make these changes:

  • Remove hardcoded values from the workflow file
  • Use GitHub Actions secrets instead:
      ENCRYPTION_KEY: ${{ secrets.TEST_ENCRYPTION_KEY }}
      HASH_PEPPER: ${{ secrets.TEST_HASH_PEPPER }}
  • Generate new test-specific keys for the GitHub secrets (do not reuse these exposed values)
🔗 Analysis chain

CRITICAL: Remove hardcoded cryptographic keys from workflow file

Exposing cryptographic keys in version control poses a severe security risk, even for test environments. These keys should be managed through GitHub secrets.

Please make the following changes:

  1. Remove the hardcoded values
  2. Use GitHub secrets instead:
-      ENCRYPTION_KEY: 64730e71158b84687f01237d8f8128cc9cb7804d2d68c36823880456adad48c7
-      HASH_PEPPER: 56195a1bd9b062fc4a63afff383ec28bf1464706725ae744c9fe7fc459426074
+      ENCRYPTION_KEY: ${{ secrets.TEST_ENCRYPTION_KEY }}
+      HASH_PEPPER: ${{ secrets.TEST_HASH_PEPPER }}
  1. Set up the corresponding secrets in your repository:
    • Go to Settings → Secrets and variables → Actions
    • Add TEST_ENCRYPTION_KEY and TEST_HASH_PEPPER with test-specific values
    • Ensure these test keys are different from production keys

Consider implementing a key rotation mechanism and documenting the process for generating and managing these cryptographic materials securely.

Let's verify if these keys are used elsewhere in the codebase:

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Search for potential hardcoded keys
echo "Checking for exposed keys in the codebase..."
rg -i "64730e71158b84687f01237d8f8128cc9cb7804d2d68c36823880456adad48c7|56195a1bd9b062fc4a63afff383ec28bf1464706725ae744c9fe7fc459426074"

Length of output: 238


Script:

#!/bin/bash
# Let's check for any environment files or configuration files that might contain these keys
echo "Checking for environment and config files..."
fd -e env -e env.example -e env.sample -e config -e yml -e yaml

# Let's also check for any encryption-related code to understand the usage
echo -e "\nChecking for encryption-related code..."
rg -i "encryption|encrypt|crypto" -A 3 -B 3

# Check for any test files that might be using these keys
echo -e "\nChecking test files..."
fd -e test.js -e spec.js -e test.ts -e spec.ts

Length of output: 114823


Script:

#!/bin/bash
# Let's check if these keys are used in any environment files or configuration
echo "Checking environment files..."
fd -e env -e env.example -e env.sample -e env.test -x cat {} \; 2>/dev/null

# Let's also check for any encryption key setup or initialization code
echo -e "\nChecking encryption key setup code..."
ast-grep --pattern 'ENCRYPTION_KEY = $_' -l

# Let's check for any test setup files that might be configuring these keys
echo -e "\nChecking test setup files..."
rg -l "ENCRYPTION_KEY|HASH_PEPPER" "tests/setup" "tests/helpers"

Length of output: 516


Script:

#!/bin/bash
# Let's check for any test environment setup files
echo "Checking test environment files..."
find . -type f -name ".env.test" -o -name ".env.example" -o -name ".env.sample" -exec cat {} \;

# Let's check for encryption key initialization in setup code
echo -e "\nChecking encryption setup in code..."
rg -A 5 -B 5 "process\.env\.ENCRYPTION_KEY" src/

# Let's check for test configuration
echo -e "\nChecking test configuration..."
rg -A 5 -B 5 "ENCRYPTION_KEY.*=.*64730e71" .
rg -A 5 -B 5 "HASH_PEPPER.*=.*56195a1b" .

Length of output: 6330

🧰 Tools
🪛 Gitleaks

221-221: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 4

🧹 Outside diff range and nitpick comments (14)
tests/resolvers/Mutation/forgotPassword.spec.ts (3)

Line range hint 68-108: Test implementation doesn't match its description.

The test description states it "throws an error when the email is changed in the token", but the implementation doesn't actually modify the email in the token. To properly test email tampering, you should create a token with one email and then modify it to use a different email.

Here's a suggested implementation:

  it("throws an error when the email is changed in the token", async () => {
    const otp = "correctOtp";
    const hashedOtp = await bcrypt.hash(otp, 1);

+   // Create token with original email
    const otpToken = jwt.sign(
      {
-       email: testUser?.email ?? "",
+       email: "[email protected]", // Use a different email to simulate tampering
        otp: hashedOtp,
      },
      process.env.NODE_ENV ?? "",
      {
        expiresIn: 99999999,
      },
    );

    const oldPassword = testUser?.password;
    const args: MutationForgotPasswordArgs = {
      data: {
        newPassword: oldPassword!,
        otpToken,
        userOtp: otp,
      },
    };

    try {
      await forgotPasswordResolver?.({}, args, {});
      throw new Error("Should not reach this point");
    } catch (error: unknown) {
      if (error instanceof Error) {
        expect(error.message).toEqual(INVALID_OTP);
      }
    }
  });

168-176: Simplify email decryption logic and add error handling.

While the implementation works, it could be more concise and robust.

Consider this improvement:

-    let email = "";
-
-    if (testUser?.email) {
-      email = decryptEmail(testUser.email).decrypted;
-    }
-
+    const email = testUser?.email 
+      ? decryptEmail(testUser.email).decrypted 
+      : throw new Error("Test user email is required");

     const otpToken = jwt.sign(
       {
         email,

This change:

  1. Uses a more concise conditional expression
  2. Fails fast if email is missing, which shouldn't happen in a test environment

Line range hint 33-203: Consider adding more security-focused test cases.

Given that this is a security-critical feature handling encrypted emails, consider adding these test cases:

  1. Test with malformed encrypted email format
  2. Test with expired OTP token
  3. Test with invalid encryption key format

Would you like me to provide example implementations for these test cases?

tests/resolvers/Mutation/updateCommunity.spec.ts (1)

107-109: Consider extracting email generation to a test helper.

The email generation logic could be moved to a helper function to maintain DRY principles across test files and ensure consistent test data generation.

- const email = `email${nanoid().toLowerCase()}@gmail.com`;
- const hashedEmail = hashEmail(email);
+ const { email, hashedEmail } = generateTestEmail();

Consider adding this helper to tests/helpers/user.ts:

export function generateTestEmail() {
  const email = `email${nanoid().toLowerCase()}@gmail.com`;
  return {
    email,
    hashedEmail: hashEmail(email),
    encryptedEmail: encryptEmail(email)
  };
}
tests/resolvers/Mutation/login.spec.ts (4)

98-102: Consider adding validation for encrypted and hashed email formats.

While the test correctly creates users with encrypted and hashed emails, it would be beneficial to add assertions that verify the correct format and structure of the encrypted and hashed data.

Add these assertions after user creation:

// Add after user creation
expect(newUser.email).not.toBe(email); // Verify email was actually encrypted
expect(newUser.hashedEmail).not.toBe(email); // Verify email was actually hashed
expect(newUser.hashedEmail).toBe(hashEmail(email)); // Verify hash is reproducible

Also applies to: 139-144


272-274: Consider centralizing testUser null checks.

The same null check for testUser is repeated in multiple test cases. Consider extracting this into a helper function or beforeEach hook to reduce duplication.

Example refactor:

const getTestUserOrFail = () => {
  if (!testUser) {
    throw new Error("Error creating test user.");
  }
  return testUser;
};

// Then in tests:
const user = getTestUserOrFail();

Also applies to: 298-300, 307-309, 354-356


277-277: Consider making email decryption more explicit in test args.

The decryption of emails for login arguments could be more explicit to improve test readability. Consider extracting the decryption into a named variable.

Example:

const decryptedEmail = decryptEmail(testUser.email).decrypted;
const args: MutationLoginArgs = {
  data: {
    email: decryptedEmail,
    password: "password",
  },
};

Also applies to: 313-313, 360-360


Line range hint 326-326: Remove commented out expectation.

There's a commented out expectation: // expect((await loginPayload?.user)?.userType).toEqual("SUPERADMIN");. Either remove it or uncomment and fix it if it's still relevant.

tests/resolvers/Mutation/signUp.spec.ts (4)

87-94: Consider extracting common test setup.

While the email hashing implementation is correct, consider extracting the email generation and hashing into a test helper function since this pattern is repeated across multiple test cases. This would reduce code duplication and make tests more maintainable.

// Suggested helper function:
function generateTestEmail() {
  const email = `email${nanoid().toLowerCase()}@gmail.com`;
  const hashedEmail = hashEmail(email);
  return { email, hashedEmail };
}

148-152: Enhance error message for configuration issue.

While the null check is good, consider making the error message more descriptive to help with troubleshooting:

-      throw new Error("LAST_RESORT_SUPERADMIN_EMAIL is undefined");
+      throw new Error("LAST_RESORT_SUPERADMIN_EMAIL must be defined in environment variables for SUPER ADMIN creation");

Line range hint 274-293: Add verification for encrypted email field.

While the test verifies the hashed email lookup, it should also verify that the email was properly encrypted in the database:

    const createdUser = await User.findOne({
      hashedEmail: hashedEmail,
    }).select("-password");

+   // Verify that the email was encrypted
+   expect(createdUser?.email).not.toBe(email);
+   expect(decryptEmail(createdUser?.email).decrypted).toBe(email);

314-316: Consider moving test organization setup to beforeEach.

The test organization creation logic could be moved to a beforeEach block to keep the test focused on the membership request functionality:

describe("membership request tests", () => {
  let testOrg;
  
  beforeEach(async () => {
    testOrg = await Organization.create({
      name: `orgName${nanoid().toLowerCase()}`,
      description: `orgDesc${nanoid().toLowerCase()}`,
      userRegistrationRequired: true,
      creatorId: testUser?._id,
      admins: [],
      membershipRequests: [],
      members: [testUser?._id],
      visibleInSearch: false,
    });
  });
  
  it("send membership request if the user registration is required", async () => {
    const { email, hashedEmail } = generateTestEmail();
    // ... rest of the test
  });
});
tests/resolvers/Query/users.spec.ts (2)

87-123: Consider extracting test data setup into helper functions.

The current implementation correctly handles email encryption and hashing but could be more maintainable. Consider:

  1. Creating a helper function to generate test emails
  2. Using a factory pattern for test user creation with encrypted emails

Example implementation:

function generateTestEmail(): string {
  return `email${nanoid().toLowerCase()}@gmail.com`;
}

function createTestUserWithEncryptedEmail(email: string) {
  return {
    email: encryptEmail(email),
    hashedEmail: hashEmail(email),
    password: "password",
    firstName: `firstName${nanoid()}`,
    lastName: `lastName${nanoid()}`,
  };
}

// Usage
const testEmails = Array.from({ length: 5 }, generateTestEmail);
const testUsers = await User.insertMany(
  testEmails.map(createTestUserWithEncryptedEmail)
);

263-263: Consider extracting email decryption transformation.

The email decryption logic is repeated across multiple test cases. Consider extracting this transformation into a helper function to improve maintainability and reduce duplication.

function transformUserWithDecryptedEmail(user: any) {
  return {
    ...user,
    email: decryptEmail(user.email).decrypted,
    organizationsBlockedBy: [],
    image: user.image ? `${BASE_URL}${user.image}` : null,
  };
}

// Usage in tests
users = users.map(transformUserWithDecryptedEmail);

Also applies to: 299-299, 349-349, 410-410, 469-469, 529-529, 594-594, 646-646, 686-686, 724-724, 773-773

📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between e68a298 and 7e0242c.

📒 Files selected for processing (12)
  • src/resolvers/MembershipRequest/user.ts (2 hunks)
  • src/resolvers/Mutation/updateUserProfile.ts (2 hunks)
  • src/resolvers/Query/checkAuth.ts (2 hunks)
  • tests/resolvers/Mutation/forgotPassword.spec.ts (2 hunks)
  • tests/resolvers/Mutation/login.spec.ts (10 hunks)
  • tests/resolvers/Mutation/otp.spec.ts (2 hunks)
  • tests/resolvers/Mutation/signUp.spec.ts (16 hunks)
  • tests/resolvers/Mutation/updateCommunity.spec.ts (2 hunks)
  • tests/resolvers/Mutation/updateUserProfile.spec.ts (6 hunks)
  • tests/resolvers/Query/me.spec.ts (2 hunks)
  • tests/resolvers/Query/organizationsMemberConnection.spec.ts (14 hunks)
  • tests/resolvers/Query/users.spec.ts (13 hunks)
🚧 Files skipped from review as they are similar to previous changes (5)
  • src/resolvers/MembershipRequest/user.ts
  • src/resolvers/Mutation/updateUserProfile.ts
  • src/resolvers/Query/checkAuth.ts
  • tests/resolvers/Mutation/updateUserProfile.spec.ts
  • tests/resolvers/Query/me.spec.ts
🔇 Additional comments (13)
tests/resolvers/Mutation/otp.spec.ts (2)

12-12: LGTM: Import statement correctly added for encryption utility.

The import statement is properly placed and necessary for the new email encryption functionality.


Line range hint 31-69: Verify test coverage for all email encryption scenarios.

The test suite should be expanded to cover additional scenarios introduced by email encryption.

Let's check for other test files that might need similar updates:

Consider adding test cases for:

  1. Invalid encrypted email format
  2. Decryption failures
  3. Edge cases with special characters in emails
tests/resolvers/Mutation/forgotPassword.spec.ts (1)

18-18: LGTM! Import statement is correctly added.

The import of decryptEmail aligns with the PR's objective of implementing email encryption.

tests/resolvers/Mutation/updateCommunity.spec.ts (2)

26-27: LGTM! Imports align with email encryption feature.

The new utility imports for email hashing and encryption are appropriate for implementing the email security feature.


112-113: 🛠️ Refactor suggestion

Verify email encryption in the test.

While the test stores both encrypted and hashed emails, it doesn't verify if the encryption was successful. Consider adding assertions to ensure the stored email is actually encrypted.

   const newUser = await User.create({
     email: encryptEmail(email),
     hashedEmail: hashedEmail,
     password: `pass${nanoid().toLowerCase()}`,
     firstName: `firstName${nanoid().toLowerCase()}`,
     lastName: `lastName${nanoid().toLowerCase()}`,
     image: null,
   });
+
+  // Verify email encryption
+  expect(newUser.email).not.toBe(email);
+  expect(newUser.hashedEmail).toBe(hashedEmail);

Let's verify if similar test improvements are needed in other test files:

tests/resolvers/Mutation/login.spec.ts (2)

29-30: LGTM! Import changes align with email encryption requirements.

The new imports for encryption utilities are correctly added and necessary for the email encryption feature.


Line range hint 1-385: Verify encryption key configuration in test environment.

The tests use encryption/decryption functions but we should verify that the encryption key is properly configured in the test environment.

✅ Verification successful

Encryption configuration is properly handled in tests

The verification shows that:

  1. The test file correctly imports dotenv/config for environment variables
  2. The encryption tests properly handle both ENCRYPTION_KEY and HASH_PEPPER
  3. The test environment maintains encryption key configuration through environment variables
  4. The hashing tests include proper cleanup of environment variables after modification
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Check if encryption key is properly configured in test environment
echo "Checking for encryption key configuration..."
rg -l "ENCRYPTION_KEY|HASH_PEPPER" .env* test* 

Length of output: 244


Script:

#!/bin/bash
# Let's check the content of encryption test files and env sample
echo "=== Checking .env.sample ==="
rg "ENCRYPTION_KEY|HASH_PEPPER" .env.sample

echo -e "\n=== Checking encryption test setup ==="
rg "beforeAll|beforeEach.*ENCRYPTION_KEY|HASH_PEPPER" tests/utilities/encryptionModule.spec.ts tests/utilities/hashingModule.spec.ts

echo -e "\n=== Checking if tests mock the encryption keys ==="
rg "mock.*ENCRYPTION_KEY|HASH_PEPPER" tests/utilities/

Length of output: 1763


Script:

#!/bin/bash
# Let's check how encryption is handled in the login test file
echo "=== Checking login test setup ==="
rg "process\.env|beforeAll.*env" tests/resolvers/Mutation/login.spec.ts -A 5

echo -e "\n=== Checking if dotenv is properly loaded ==="
rg "^import.*dotenv" tests/resolvers/Mutation/login.spec.ts tests/setup.ts

Length of output: 457

tests/resolvers/Mutation/signUp.spec.ts (1)

29-30: LGTM: Import statements are correctly added.

The new imports for email hashing and decryption utilities align with the PR's objective of implementing secure email handling.

tests/resolvers/Query/users.spec.ts (1)

22-22: Verify the necessity of dynamic import.

The dynamic import of FundraisingCampaignPledge seems unrelated to the email encryption changes. Consider moving this import to the top with other imports if it's required, or remove it if unused.

✅ Verification successful

Let me check how FundraisingCampaignPledge is actually used in the test file.


Dynamic import of FundraisingCampaignPledge is correctly placed

The dynamic import is intentionally placed in the beforeAll setup hook to ensure the model is registered with Mongoose before the tests run. This is a common pattern in Mongoose testing to handle model registration. Moving it to the top with static imports would not serve the same purpose.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Check if FundraisingCampaignPledge is used in the test file
rg -l "FundraisingCampaignPledge" tests/resolvers/Query/users.spec.ts

Length of output: 105


Script:

#!/bin/bash
# Show the usage of FundraisingCampaignPledge in the test file with context
rg -A 5 -B 5 "FundraisingCampaignPledge" tests/resolvers/Query/users.spec.ts

Length of output: 311

tests/resolvers/Query/organizationsMemberConnection.spec.ts (4)

14-15: LGTM: Encryption utility imports added correctly.

The new imports for email encryption and hashing utilities align with the PR objective.


24-31: LGTM: Email encryption properly implemented in test data.

The test data creation correctly implements both encryption and hashing of emails, which aligns with the PR's objective of storing both versions for efficient lookups.

Also applies to: 47-48, 64-65


243-244: Code duplication in user mapping functions.

The same user mapping logic with email decryption is repeated across multiple test cases. This duplication was previously noted and the suggestion to extract it into a helper function is still valid.

Also applies to: 338-339, 432-433, 529-530, 626-627, 711-712, 895-896, 969-970, 1072-1073, 1156-1157


243-244: Verify consistent email encryption handling.

While the email decryption is correctly implemented across all test cases, let's verify that all email-related operations are consistently using the encryption utilities.

Also applies to: 338-339, 432-433, 529-530, 626-627, 711-712, 895-896, 969-970, 1072-1073, 1156-1157

✅ Verification successful

Let me analyze the results from the shell scripts to verify the email encryption handling consistency.

The results show:

  1. Direct email assignments (potential issues):
  • Found in tests/resolvers/Mutation/forgotPassword.spec.ts
  • Found in tests/resolvers/Query/helperFunctions/getWhere.spec.ts

Let's verify these potential issues:


Email encryption handling is consistently implemented

The direct email assignments found are in test fixtures and mock data scenarios where encryption is not required:

  • In forgotPassword.spec.ts: Used for testing non-existent email case
  • In getWhere.spec.ts: Used for testing query conditions

All actual email handling in the test assertions properly uses:

  • decryptEmail() for reading emails (41 occurrences across test files)
  • encryptEmail() for storing emails (39 occurrences across test files)
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify consistent usage of email encryption utilities across test files

# Test 1: Check for any direct email assignments without encryption
echo "Checking for direct email assignments..."
rg -l "email: ['\"].*@.*['\"]" "tests/"

# Test 2: Verify all email decryption calls
echo "Checking email decryption usage..."
rg "decryptEmail\(" "tests/"

# Test 3: Verify all email encryption calls
echo "Checking email encryption usage..."
rg "encryptEmail\(" "tests/"

Length of output: 8739


Script:

#!/bin/bash
# Check the context of direct email assignments
echo "Checking context in forgotPassword.spec.ts..."
rg -B 2 -A 2 "email: ['\"].*@.*['\"]" "tests/resolvers/Mutation/forgotPassword.spec.ts"

echo "\nChecking context in getWhere.spec.ts..."
rg -B 2 -A 2 "email: ['\"].*@.*['\"]" "tests/resolvers/Query/helperFunctions/getWhere.spec.ts"

Length of output: 657

Comment on lines +41 to +44
let email = "";
if (testUser?.email) {
email = decryptEmail(testUser.email).decrypted;
}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Improve error handling in email decryption logic.

The current implementation has several potential issues:

  1. No error handling for decryption failures
  2. Empty string initialization could mask errors
  3. Implicit handling of null/undefined emails

Consider this improved implementation:

-let email = "";
-if (testUser?.email) {
-  email = decryptEmail(testUser.email).decrypted;
-}
+if (!testUser?.email) {
+  throw new Error('Test user email is required');
+}
+const { decrypted: email } = decryptEmail(testUser.email);

This change will:

  • Fail fast if email is missing
  • Use destructuring for clearer intent
  • Prevent potential undefined email usage in the test
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
let email = "";
if (testUser?.email) {
email = decryptEmail(testUser.email).decrypted;
}
if (!testUser?.email) {
throw new Error('Test user email is required');
}
const { decrypted: email } = decryptEmail(testUser.email);

Comment on lines 46 to 48
data: {
email: testUser?.email,
email: email,
},
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Add assertions to verify email encryption handling.

While the test verifies OTP generation, it doesn't explicitly verify the email encryption/decryption flow.

Consider adding these assertions:

 const args: MutationOtpArgs = {
   data: {
     email: email,
   },
 };
+
+// Verify the decrypted email matches expected format
+expect(email).not.toBe(testUser.email); // Should not be encrypted
+expect(email).toMatch(/^[^\s@]+@[^\s@]+\.[^\s@]+$/); // Should be valid email format

Committable suggestion skipped: line range outside the PR's diff.

@@ -330,6 +344,7 @@ describe("resolvers -> Mutation -> signUp", () => {
});
it("creates appUserProfile with userId === createdUser._id", async () => {
const email = `email${nanoid().toLowerCase()}@gmail.com`;
const hashedEmail = hashEmail(email);
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Enhance app user profile verification.

While the test verifies the existence of the app user profile, consider adding more specific assertions:

    const appUserProfile = await AppUserProfile.findOne({
      userId: createdUser?._id,
    });

    expect(appUserProfile).toBeTruthy();
+   // Verify specific app user profile fields
+   expect(appUserProfile?.appLanguageCode).toBe(args.data.appLanguageCode);
+   expect(appUserProfile?.isSuperAdmin).toBe(false);

Also applies to: 366-366

Comment on lines +210 to +213
let email = "";
if (testUser?.email) {
email = decryptEmail(testUser.email).decrypted;
}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Add error handling for email decryption.

The current implementation assumes decryption will always succeed. Consider adding error handling:

    let email = "";
    if (testUser?.email) {
-      email = decryptEmail(testUser.email).decrypted;
+      try {
+        email = decryptEmail(testUser.email).decrypted;
+      } catch (error) {
+        throw new Error(`Failed to decrypt test user email: ${error.message}`);
+      }
    }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
let email = "";
if (testUser?.email) {
email = decryptEmail(testUser.email).decrypted;
}
let email = "";
if (testUser?.email) {
try {
email = decryptEmail(testUser.email).decrypted;
} catch (error) {
throw new Error(`Failed to decrypt test user email: ${error.message}`);
}
}

Copy link

codecov bot commented Nov 9, 2024

Codecov Report

Attention: Patch coverage is 70.99698% with 96 lines in your changes missing coverage. Please review.

Project coverage is 97.19%. Comparing base (03bad97) to head (27916b7).
Report is 5 commits behind head on develop.

Files with missing lines Patch % Lines
src/resolvers/Organization/members.ts 36.36% 14 Missing ⚠️
src/resolvers/Organization/blockedUsers.ts 29.41% 12 Missing ⚠️
src/utilities/encryption.ts 89.13% 10 Missing ⚠️
src/utilities/hashEmail.ts 79.06% 9 Missing ⚠️
src/resolvers/Organization/admins.ts 46.66% 8 Missing ⚠️
src/resolvers/Post/creator.ts 50.00% 8 Missing ⚠️
src/resolvers/Query/user.ts 38.46% 8 Missing ⚠️
src/resolvers/Mutation/login.ts 68.18% 7 Missing ⚠️
src/resolvers/Organization/creator.ts 42.85% 4 Missing ⚠️
src/env.ts 72.72% 3 Missing ⚠️
... and 5 more
Additional details and impacted files
@@             Coverage Diff             @@
##           develop    #2627      +/-   ##
===========================================
- Coverage    97.74%   97.19%   -0.56%     
===========================================
  Files          358      360       +2     
  Lines        18114    18405     +291     
  Branches      2600     2666      +66     
===========================================
+ Hits         17706    17889     +183     
- Misses         404      511     +107     
- Partials         4        5       +1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 5

🧹 Outside diff range and nitpick comments (10)
tests/utilities/hashingModule.spec.ts (1)

7-12: Add test case for email case sensitivity.

The test cases should explicitly verify that hashing is case-insensitive for email addresses.

Add this test case to the array:

     const testCases = [
       "[email protected]",
       "[email protected]",
       "[email protected]",
+      "[email protected]",  // Same as first case but with different casing
     ];
tests/utilities/encryptionModule.spec.ts (2)

9-10: Avoid hard-coding encrypted test data.

The validEncryptedData constant contains a hard-coded encrypted string which could become invalid if the encryption method changes. Consider generating this data dynamically in a beforeEach hook using the actual encryption functions.

-  const validEncryptedData =
-    "11898325fe8807edeb99d37f0b168eaa:3991cd4d1a6372ed70492e23d499b066:4f209bb501460537fa9345ca16361023a19f9b2eff1860e8dadc80f29705d469cbe46edc4913e77d3418814b8eb7";
+  let validEncryptedData: string;
+  
+  beforeEach(() => {
+    validEncryptedData = encryptEmail("[email protected]");
+  });

99-129: Enhance error handling test coverage.

While basic error cases are covered, consider adding tests for:

  1. Specific error types/classes
  2. Error message consistency
  3. Error handling during concurrent operations
it("should throw specific error types for different failure scenarios", () => {
  class EncryptionError extends Error {
    constructor(message: string) {
      super(message);
      this.name = 'EncryptionError';
    }
  }
  
  expect(() => decryptEmail("invalid")).toThrow(EncryptionError);
  expect(() => decryptEmail("invalid")).toThrow(/format/i);
});

it("should handle concurrent encryption/decryption errors gracefully", async () => {
  const promises = Array.from({ length: 10 }, () => 
    Promise.all([
      encryptEmail("[email protected]"),
      decryptEmail("invalid:data:format"),
      encryptEmail("[email protected]")
    ].map(p => p.catch(e => e)))
  );
  
  const results = await Promise.all(promises);
  for (const [encrypted1, error, encrypted2] of results) {
    expect(error).toBeInstanceOf(Error);
    expect(encrypted1).toMatch(/^[0-9a-f]+:[0-9a-f]+:[0-9a-f]+$/i);
    expect(encrypted2).toMatch(/^[0-9a-f]+:[0-9a-f]+:[0-9a-f]+$/i);
  }
});
tests/resolvers/Mutation/login.spec.ts (4)

90-117: Clean up unused variables in validation test.

The test case correctly verifies email validation, but contains unused variables:

  • requestContext is imported but never used
  • hashedEmail is computed but never used

Apply this diff to clean up the test:

-    const { requestContext } = await import("../../../src/libraries");
     const email = `nonexistentuser${nanoid().toLowerCase()}@gmail.com`;
-    const hashedEmail = hashEmail(email);
🧰 Tools
🪛 GitHub Check: Check for linting, formatting, and type errors

[failure] 91-91:
'requestContext' is assigned a value but never used


[failure] 97-97:
'hashedEmail' is assigned a value but never used


168-173: Consider extracting repeated user creation logic.

The user creation logic with encryption and hashing is duplicated across multiple test cases. Consider extracting this into a test helper function.

Example helper function:

async function createTestUserWithEncryptedEmail(email: string, password: string) {
  const hashedEmail = hashEmail(email);
  return await User.create({
    email: encryptEmail(email),
    hashedEmail,
    password,
    firstName: "firstName",
    lastName: "lastName",
  });
}

Also applies to: 247-252


301-303: Extract duplicated error message to a constant.

The error message "Error creating test user" is duplicated across multiple null checks. Consider extracting it to a constant at the top of the file.

+ const TEST_USER_ERROR = "Error creating test user.";

- throw new Error("Error creating test user.");
+ throw new Error(TEST_USER_ERROR);

Also applies to: 327-329, 336-338, 383-385


306-306: Consider extracting email decryption logic.

The pattern decryptEmail(user.email).decrypted is repeated multiple times. Consider extracting this into a helper function for better readability and maintainability.

function getDecryptedEmail(encryptedEmail: string): string {
  return decryptEmail(encryptedEmail).decrypted;
}

Then use it like:

- email: decryptEmail(testUser.email).decrypted,
+ email: getDecryptedEmail(testUser.email),

Also applies to: 342-342, 389-389

tests/resolvers/Mutation/signUp.spec.ts (3)

87-94: Consider adding error handling for email hashing.

While the implementation is correct, consider adding error handling for the hashing operation:

-    const hashedEmail = hashEmail(email);
+    let hashedEmail;
+    try {
+      hashedEmail = hashEmail(email);
+    } catch (error) {
+      throw new Error(`Failed to hash email: ${error.message}`);
+    }

Also applies to: 103-103


209-230: Enhance email validation test coverage.

While testing with an empty string is valid, consider adding more test cases for different invalid email formats:

+ it.each([
+   ['invalid-email'],
+   ['invalid@'],
+   ['@invalid.com'],
+   ['[email protected]'],
+   ['invalid@com.'],
+   ['invalid@@com.com'],
+ ])('throws error for invalid email format: %s', async (invalidEmail) => {
+   try {
+     const args: MutationSignUpArgs = {
+       data: {
+         email: invalidEmail,
+         firstName: "firstName",
+         lastName: "lastName",
+         password: "password",
+         appLanguageCode: "en",
+         selectedOrganization: testOrganization?._id,
+       },
+     };
+     const { signUp: signUpResolver } = await import(
+       "../../../src/resolvers/Mutation/signUp"
+     );
+     await signUpResolver?.({}, args, {});
+     fail('Should have thrown an error');
+   } catch (error: unknown) {
+     expect((error as Error).message).toEqual("Invalid email format");
+   }
+ });

297-297: Consider creating a test helper for email hashing.

There are multiple instances of email hashing throughout the tests. Consider creating a test helper function to reduce duplication:

const createTestEmail = () => {
  const email = `email${nanoid().toLowerCase()}@gmail.com`;
  return {
    email,
    hashedEmail: hashEmail(email)
  };
};

This would simplify the test cases:

- const email = `email${nanoid().toLowerCase()}@gmail.com`;
- const hashedEmail = hashEmail(email);
+ const { email, hashedEmail } = createTestEmail();

Also applies to: 316-316, 338-339, 357-357, 370-370, 389-389

📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 9737ca1 and be77cba.

📒 Files selected for processing (4)
  • tests/resolvers/Mutation/login.spec.ts (11 hunks)
  • tests/resolvers/Mutation/signUp.spec.ts (16 hunks)
  • tests/utilities/encryptionModule.spec.ts (1 hunks)
  • tests/utilities/hashingModule.spec.ts (1 hunks)
🧰 Additional context used
🪛 GitHub Check: Check for linting, formatting, and type errors
tests/resolvers/Mutation/login.spec.ts

[failure] 91-91:
'requestContext' is assigned a value but never used


[failure] 97-97:
'hashedEmail' is assigned a value but never used

🪛 Biome
tests/utilities/hashingModule.spec.ts

[error] 68-68: Avoid the delete operator which can impact performance.

Unsafe fix: Use an undefined assignment instead.

(lint/performance/noDelete)

🔇 Additional comments (7)
tests/utilities/hashingModule.spec.ts (2)

1-4: LGTM! Test setup and imports are well-structured.


1-125: Overall, well-structured and comprehensive test suite.

The test file provides good coverage of the email hashing functionality, including security-critical aspects, input validation, and error handling. The suggested improvements will make the tests more robust and reliable.

Let's verify the test coverage:

✅ Verification successful

Test coverage is complete and well-aligned with implementation

The test file comprehensively covers both exported functions (hashEmail and compareHashedEmails) from the source file, including:

  • All error conditions in hashEmail:
    • Invalid email format
    • Missing HASH_PEPPER
    • Short HASH_PEPPER
    • Null/undefined inputs
  • Security aspects:
    • Different pepper values produce different hashes
    • Consistent hashing for same input
    • Hash format validation
  • All error conditions in compareHashedEmails:
    • Invalid hash formats
    • Hex encoding errors
    • Null/undefined inputs

The test implementation correctly matches the source code's functionality and error handling.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Check if all exported functions from hashEmail utility are tested
ast-grep --pattern 'export function $func' src/utilities/hashEmail.ts

Length of output: 71


Script:

#!/bin/bash
# Let's try to find the hashEmail.ts file first
fd hashEmail.ts

# Then let's examine its content
cat src/utilities/hashEmail.ts

Length of output: 2404

🧰 Tools
🪛 Biome

[error] 68-68: Avoid the delete operator which can impact performance.

Unsafe fix: Use an undefined assignment instead.

(lint/performance/noDelete)

tests/resolvers/Mutation/login.spec.ts (2)

29-31: LGTM: New imports align with encryption requirements.

The added imports for encryption/decryption and hashing utilities are consistent with the PR's objective of implementing email encryption.


Line range hint 1-415: Overall implementation looks good with thorough test coverage.

The test suite effectively covers the new email encryption functionality including:

  • Validation of email presence
  • Proper encryption/decryption flow
  • Error handling
  • Edge cases

The suggested improvements are mainly for code maintainability and don't affect the functionality.

🧰 Tools
🪛 GitHub Check: Check for linting, formatting, and type errors

[failure] 91-91:
'requestContext' is assigned a value but never used


[failure] 97-97:
'hashedEmail' is assigned a value but never used

tests/resolvers/Mutation/signUp.spec.ts (3)

29-30: LGTM: Required imports for email encryption feature.

The imports for hashEmail and decryptEmail utilities are correctly added.


148-152: LGTM: Good defensive programming with null check.

The null check for LAST_RESORT_SUPERADMIN_EMAIL is a good practice to prevent runtime errors.


233-236: Past comment about error handling for email decryption still applies.


it("should throw an error if HASH_PEPPER is missing", () => {
const originalPepper = process.env.HASH_PEPPER;
delete process.env.HASH_PEPPER;
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Replace delete operator with undefined assignment.

Using the delete operator can impact performance.

Apply this diff:

-      delete process.env.HASH_PEPPER;
+      process.env.HASH_PEPPER = undefined;
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
delete process.env.HASH_PEPPER;
process.env.HASH_PEPPER = undefined;
🧰 Tools
🪛 Biome

[error] 68-68: Avoid the delete operator which can impact performance.

Unsafe fix: Use an undefined assignment instead.

(lint/performance/noDelete)

Comment on lines +110 to +123
it("should log an error and return false if crypto.timingSafeEqual fails due to invalid hex encoding", () => {
const invalidHash = "z".repeat(64); // deliberately invalid hex
let result;
try {
result = compareHashedEmails(invalidHash, invalidHash);
} catch (error) {
expect(result).toBe(false);
if (error instanceof Error) {
expect(error.message).toBe(
"Failed to compare hashes, likely due to invalid hex encoding",
);
}
}
});
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Fix assertion placement and add positive test case.

The test has two issues:

  1. The expect(result).toBe(false) assertion is inside the catch block, but result is undefined at that point
  2. Missing test for successful comparison of valid hashes

Apply these changes:

     it("should log an error and return false if crypto.timingSafeEqual fails due to invalid hex encoding", () => {
       const invalidHash = "z".repeat(64); // deliberately invalid hex
-      let result;
-      try {
-        result = compareHashedEmails(invalidHash, invalidHash);
-      } catch (error) {
-        expect(result).toBe(false);
-        if (error instanceof Error) {
-          expect(error.message).toBe(
-            "Failed to compare hashes, likely due to invalid hex encoding",
-          );
-        }
-      }
+      expect(() => compareHashedEmails(invalidHash, invalidHash)).toThrow(
+        "Failed to compare hashes, likely due to invalid hex encoding"
+      );
     });
+
+    it("should return true for matching valid hashes", () => {
+      const validHash = "a".repeat(64);
+      expect(compareHashedEmails(validHash, validHash)).toBe(true);
+    });
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
it("should log an error and return false if crypto.timingSafeEqual fails due to invalid hex encoding", () => {
const invalidHash = "z".repeat(64); // deliberately invalid hex
let result;
try {
result = compareHashedEmails(invalidHash, invalidHash);
} catch (error) {
expect(result).toBe(false);
if (error instanceof Error) {
expect(error.message).toBe(
"Failed to compare hashes, likely due to invalid hex encoding",
);
}
}
});
it("should log an error and return false if crypto.timingSafeEqual fails due to invalid hex encoding", () => {
const invalidHash = "z".repeat(64); // deliberately invalid hex
expect(() => compareHashedEmails(invalidHash, invalidHash)).toThrow(
"Failed to compare hashes, likely due to invalid hex encoding"
);
});
it("should return true for matching valid hashes", () => {
const validHash = "a".repeat(64);
expect(compareHashedEmails(validHash, validHash)).toBe(true);
});

Comment on lines +42 to +48
if (pepper1 != undefined && pepper2 != undefined) {
process.env.HASH_PEPPER = pepper1;
const hash1 = hashEmail(email);
process.env.HASH_PEPPER = "pepper2";
const hash2 = hashEmail(email);
expect(hash1).not.toEqual(hash2);
}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Fix pepper comparison test logic.

The test has two issues:

  1. Uses hardcoded "pepper2" instead of the generated pepper2 variable
  2. Weak assertion of pepper existence using optional chaining

Apply this diff to fix the issues:

-        if (pepper1 != undefined && pepper2 != undefined) {
+        if (!pepper1 || !pepper2) {
+          throw new Error("Failed to generate test peppers");
+        }
         process.env.HASH_PEPPER = pepper1;
         const hash1 = hashEmail(email);
-        process.env.HASH_PEPPER = "pepper2";
+        process.env.HASH_PEPPER = pepper2;
         const hash2 = hashEmail(email);
         expect(hash1).not.toEqual(hash2);
-        }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
if (pepper1 != undefined && pepper2 != undefined) {
process.env.HASH_PEPPER = pepper1;
const hash1 = hashEmail(email);
process.env.HASH_PEPPER = "pepper2";
const hash2 = hashEmail(email);
expect(hash1).not.toEqual(hash2);
}
if (!pepper1 || !pepper2) {
throw new Error("Failed to generate test peppers");
}
process.env.HASH_PEPPER = pepper1;
const hash1 = hashEmail(email);
process.env.HASH_PEPPER = pepper2;
const hash2 = hashEmail(email);
expect(hash1).not.toEqual(hash2);

Comment on lines +17 to +31
it("should generate a random salt of the specified length", () => {
const salt = generateRandomIV();
expect(salt.length).toEqual(2 * 16);
});

it("should generate unique IVs for each call", () => {
const iv1 = generateRandomIV();
const iv2 = generateRandomIV();
expect(iv1).not.toEqual(iv2);
});

it("should generate IV with valid hex characters", () => {
const iv = generateRandomIV();
expect(iv).toMatch(/^[0-9a-f]+$/i);
});
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Enhance IV generation tests with cryptographic randomness checks.

While the current tests verify length, uniqueness, and format, they don't verify the cryptographic quality of the generated IVs. Consider adding statistical tests to ensure proper randomness.

it("should generate cryptographically random IVs", () => {
  // Generate a large sample of IVs
  const samples = Array.from({ length: 1000 }, () => generateRandomIV());
  
  // Check byte distribution
  const byteFrequency = new Map<string, number>();
  for (const iv of samples) {
    for (let i = 0; i < iv.length; i += 2) {
      const byte = iv.substr(i, 2);
      byteFrequency.set(byte, (byteFrequency.get(byte) || 0) + 1);
    }
  }
  
  // Chi-square test for uniform distribution
  const expected = samples.length * 2 / 256; // Expected frequency per byte
  let chiSquare = 0;
  byteFrequency.forEach((freq) => {
    chiSquare += Math.pow(freq - expected, 2) / expected;
  });
  
  // With 255 degrees of freedom, chi-square should be between 200 and 310 (p=0.99)
  expect(chiSquare).toBeGreaterThan(200);
  expect(chiSquare).toBeLessThan(310);
});

Comment on lines +40 to +98
describe("encryptEmail and decryptEmail", () => {
it("should encrypt and decrypt an email correctly", () => {
const email = "[email protected]";
const encryptedWithEmailSalt = encryptEmail(email);
const { decrypted }: { decrypted: string } = decryptEmail(
encryptedWithEmailSalt,
);
expect(encryptedWithEmailSalt).not.toEqual(email);
expect(decrypted).toEqual(email);
});

it("throws an error for invalid email format", () => {
expect(() => encryptEmail("a".repeat(10000))).toThrow(
"Invalid email format",
);
});

it("throws an error for empty email input", () => {
expect(() => encryptEmail("")).toThrow("Empty or invalid email input.");
});

it("throws an error for an invalid encryption key", () => {
const originalKey = process.env.ENCRYPTION_KEY;
process.env.ENCRYPTION_KEY = "invalid_key";
expect(() => encryptEmail("[email protected]")).toThrow(
"Encryption key must be a valid 256-bit hexadecimal string (64 characters).",
);
process.env.ENCRYPTION_KEY = originalKey;
});

it("should handle email addresses with special characters", () => {
const email = "[email protected]";
const encrypted = encryptEmail(email);
const { decrypted } = decryptEmail(encrypted);
expect(decrypted).toEqual(email);
});

it("handles very long email input gracefully", () => {
const longEmail = "a".repeat(10000) + "@example.com";
expect(() => encryptEmail(longEmail)).not.toThrow();
const encrypted = encryptEmail(longEmail);
const decrypted = decryptEmail(encrypted).decrypted;
expect(decrypted).toBe(longEmail);
});

it("should use a unique IV for each encryption", () => {
const email = "[email protected]";
const encrypted1 = encryptEmail(email);
const encrypted2 = encryptEmail(email);
expect(encrypted1).not.toEqual(encrypted2);
});

it("should maintain consistent encryption format", () => {
const email = "[email protected]";
const encrypted = encryptEmail(email);
expect(encrypted).toMatch(/^[0-9a-f]+:[0-9a-f]+:[0-9a-f]+$/i);
});
});

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Add security-critical test cases.

The test suite is missing several important security scenarios:

  1. Memory cleanup after encryption/decryption
  2. Key rotation support
  3. Timing attack prevention (as noted in past comments)
it("should clear sensitive data from memory after encryption/decryption", () => {
  const email = "[email protected]";
  const encrypted = encryptEmail(email);
  const heapDump = process.memoryUsage();
  
  // Force garbage collection
  if (global.gc) {
    global.gc();
  }
  
  // Search for email in memory (this is a simplified example)
  const heapStr = JSON.stringify(heapDump);
  expect(heapStr).not.toContain(email);
});

it("should support key rotation", () => {
  const email = "[email protected]";
  const oldKey = "0".repeat(64);
  const newKey = "1".repeat(64);
  
  // Encrypt with old key
  process.env.ENCRYPTION_KEY = oldKey;
  const encrypted = encryptEmail(email);
  
  // Decrypt with new key should fail
  process.env.ENCRYPTION_KEY = newKey;
  expect(() => decryptEmail(encrypted)).toThrow();
  
  // Re-encrypt with new key
  const reencrypted = reencryptEmail(encrypted, oldKey, newKey);
  const { decrypted } = decryptEmail(reencrypted);
  expect(decrypted).toEqual(email);
});

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Outside diff range and nitpick comments (5)
tests/resolvers/Mutation/login.spec.ts (5)

90-112: Consider adding more validation test cases.

While the test case correctly validates null email, consider adding tests for:

  • Empty string email ("")
  • Undefined email
  • Invalid email format

This would provide more comprehensive validation coverage.

it("throws ValidationError for empty string email", async () => {
  const args: MutationLoginArgs = {
    data: {
      email: "",
      password: "password",
    },
  };
  
  await expect(loginResolver?.({}, args, {}))
    .rejects
    .toThrow(ValidationError);
});

296-298: Improve error handling for testUser null checks.

While the null checks are good, consider:

  1. Using a more descriptive error message that includes the test context
  2. Extracting the check into a helper function since it's used multiple times
function assertTestUser(context: string): asserts testUser {
  if (!testUser) {
    throw new Error(`Test user not found in context: ${context}`);
  }
}

Also applies to: 322-324, 331-333, 378-380


301-301: Create a helper function for email decryption.

The pattern of accessing .decrypted from decryptEmail result is repeated. Consider creating a helper function to make this more concise and maintainable.

function getDecryptedEmail(encryptedEmail: string): string {
  return decryptEmail(encryptedEmail).decrypted;
}

Also applies to: 327-327, 337-337, 384-384


Line range hint 90-404: Add test coverage for encryption edge cases.

Consider adding tests for:

  1. Handling encryption/decryption failures
  2. Verifying the format of encrypted and hashed emails
  3. Attempting to login with an already encrypted email
it("throws error when trying to login with an encrypted email", async () => {
  const encryptedEmail = encryptEmail("[email protected]");
  const args: MutationLoginArgs = {
    data: {
      email: encryptedEmail, // Attempting to use already encrypted email
      password: "password",
    },
  };
  
  await expect(loginResolver?.({}, args, {}))
    .rejects
    .toThrow();
});

Line range hint 1-404: Update documentation to reflect email encryption changes.

As mentioned in the PR objectives, documentation needs to be updated to reflect these changes. Consider:

  1. Adding JSDoc comments explaining the encryption/hashing flow
  2. Updating relevant documentation files
  3. Adding comments explaining the test scenarios
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between be77cba and cac3465.

📒 Files selected for processing (3)
  • tests/resolvers/Mutation/login.spec.ts (11 hunks)
  • tests/resolvers/Mutation/removeMember.spec.ts (1 hunks)
  • tests/resolvers/Query/getVolunteerRanks.spec.ts (1 hunks)
🔇 Additional comments (3)
tests/resolvers/Query/getVolunteerRanks.spec.ts (1)

61-61: Verify if changing weekly volunteer hours to 0 is intentional.

This change appears unrelated to the PR's objective of implementing email encryption. The modification reduces the expected weekly volunteer hours from 2 to 0, which could impact volunteer rank calculations.

Please confirm:

  1. Is this change intentional?
  2. If yes, why should weekly volunteer hours be 0 when other time periods (monthly: 2 hours, yearly: 8 hours, all-time: 10 hours) show non-zero values?
✅ Verification successful

Expected weekly hours of 0 is correct - no changes needed

After reviewing the implementation and test data setup, the change from 2 to 0 hours for weekly volunteer ranks is correct. The test data shows that the most recent volunteer hours were logged "yesterday" in the test setup, but the weekly calculation uses startOfWeek() which resets to the beginning of the current week. Since the test runs in an isolated environment with its own clock, there are no hours recorded within the current week, making 0 the expected value.

Key evidence:

  • The getVolunteerRanks resolver uses startOfWeek(now) for weekly calculations
  • Test data in createVolunteerAndActions sets hours for "yesterday" (2 hours), "two weeks ago" (4 hours), and older dates
  • When tests run, these dates are relative to the test environment's clock, falling outside the current week
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Check for related changes in volunteer hours calculation logic

# Look for recent changes in files related to volunteer hours calculation
rg -l "hoursVolunteered|getVolunteerRanks" src/

Length of output: 341


Script:

#!/bin/bash
# Let's check the implementation of getVolunteerRanks resolver and its test
cat src/resolvers/Query/getVolunteerRanks.ts
echo "---"
cat tests/resolvers/Query/getVolunteerRanks.spec.ts

Length of output: 7773


Script:

#!/bin/bash
# Let's check the test helper function that sets up the test data
cat tests/helpers/volunteers.ts

Length of output: 7342

tests/resolvers/Mutation/removeMember.spec.ts (1)

Line range hint 1-400: Consider separating unrelated changes.

The changes to error handling in this test file appear unrelated to the PR's objective of implementing email encryption. To maintain focus and facilitate easier review:

  1. Consider reverting these changes and including them in a separate PR focused on error handling improvements.
  2. If these changes are necessary for email encryption, please explain the connection in the PR description.

Let's verify if this file needs changes for email encryption:

tests/resolvers/Mutation/login.spec.ts (1)

29-30: LGTM! Necessary imports added for email encryption.

The new imports for encryption utilities align well with the PR's objective of implementing email encryption.

Comment on lines +143 to 145
} catch {
expect(spy).toHaveBeenCalledWith(ORGANIZATION_NOT_FOUND_ERROR.MESSAGE);
}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Add error message validation for consistency.

This test case handles the organization not found error differently from other test cases in the file. While other test cases validate both the translation call and the error message, this one only checks the translation call. For consistency and thorough testing, consider adding error message validation.

Apply this diff to align with other test cases:

-    } catch {
+    } catch (error: unknown) {
       expect(spy).toHaveBeenCalledWith(ORGANIZATION_NOT_FOUND_ERROR.MESSAGE);
+      expect((error as Error).message).toEqual(
+        `Translated ${ORGANIZATION_NOT_FOUND_ERROR.MESSAGE}`
+      );
     }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
} catch {
expect(spy).toHaveBeenCalledWith(ORGANIZATION_NOT_FOUND_ERROR.MESSAGE);
}
} catch (error: unknown) {
expect(spy).toHaveBeenCalledWith(ORGANIZATION_NOT_FOUND_ERROR.MESSAGE);
expect((error as Error).message).toEqual(
`Translated ${ORGANIZATION_NOT_FOUND_ERROR.MESSAGE}`
);
}

tests/resolvers/Mutation/login.spec.ts Show resolved Hide resolved
@prayanshchh
Copy link
Author

prayanshchh commented Nov 11, 2024

I can't increase the code coverage as due to the recent changes in the repo, the codecov report has no files that this pr have changed, this is happening after I updated my branch, can you help @pranshugupta54

@pranshugupta54
Copy link
Member

Those files are in File changes in your PR. If some files got added to this PR due to some merge conflicts then u can get them back from develop branch and push into your PR

@prayanshchh
Copy link
Author

Those files are in File changes in your PR. If some files got added to this PR due to some merge conflicts then u can get them back from develop branch and push into your PR

It worked now, thanks!

@prayanshchh
Copy link
Author

prayanshchh commented Nov 14, 2024

I wanted to clear some doubts, these are related to increase code coverage -
for example this a file for which I have to write a test for:
export const members: OrganizationResolvers["members"] = async (parent) => {
const users = await User.find({
_id: {
$in: parent.members,
},
}).lean();
const decryptedUsers = users.map((user: InterfaceUser) => {
if (!user.email) {
logger.warn("User missing email field", { userId: user._id });
return user;
}
try {
const { decrypted } = decryptEmail(user.email);
if (!decrypted) {
throw new Error("Decryption resulted in null or empty email");
}
return { ...user, email: decrypted };
} catch (error) {
logger.error("Email decryption failed", {
userId: user._id,
error: error instanceof Error ? error.message : "Unknown error",
});
// Consider throwing an error instead of silently continuing
throw new GraphQLError("Failed to process user data");
}
});
return decryptedUsers;
};
how can I test that this code throws warn if user.email doesn't exist, and if code throws error if decryption has failed or not
I am asking this as we have not implemented tests where we handle errors for fields that were queried from the db (in this case users is queried from the db)
just nudge me in the right direction

@coderabbitai

Copy link

coderabbitai bot commented Nov 14, 2024

Tip

For best results, initiate chat on the files or code changes.

@prayanshchh

To test the scenarios you mentioned, you can use mocking and stubbing to simulate the conditions where user.email does not exist and where decryption fails. Here’s how you can approach each test:

  1. Testing when user.email doesn't exist and logs a warning:

    You can mock the User.find method to return a user without an email field. Then, use a spy or stub on your logger to assert that the warning is logged.

    import { members } from 'path/to/your/resolver';
    import { User } from 'path/to/user/model';
    import logger from 'path/to/logger';
    import sinon from 'sinon';
    
    describe('members resolver', () => {
      afterEach(() => {
        sinon.restore();
      });
    
      it('should log a warning if user.email does not exist', async () => {
        // Arrange
        const parent = { members: ['userId1'] };
        const mockUsers = [{ _id: 'userId1' }]; // User without email
        sinon.stub(User, 'find').returns({ lean: () => mockUsers } as any);
        const loggerWarnStub = sinon.stub(logger, 'warn');
    
        // Act
        await members(parent);
    
        // Assert
        sinon.assert.calledWith(loggerWarnStub, 'User missing email field', { userId: 'userId1' });
      });
    });
  2. Testing when decryption fails and throws an error:

    Mock the decryptEmail function to throw an error, and assert that your resolver catches it and throws a GraphQLError.

    import { members } from 'path/to/your/resolver';
    import { User } from 'path/to/user/model';
    import { decryptEmail } from 'path/to/decryptEmail';
    import logger from 'path/to/logger';
    import sinon from 'sinon';
    import { GraphQLError } from 'graphql';
    
    describe('members resolver', () => {
      afterEach(() => {
        sinon.restore();
      });
    
      it('should throw GraphQLError if email decryption fails', async () => {
        // Arrange
        const parent = { members: ['userId1'] };
        const mockUsers = [{ _id: 'userId1', email: 'encryptedEmail' }];
        sinon.stub(User, 'find').returns({ lean: () => mockUsers } as any);
        sinon.stub(decryptEmail, 'decryptEmail').throws(new Error('Decryption failed'));
        const loggerErrorStub = sinon.stub(logger, 'error');
    
        // Act & Assert
        await expect(members(parent)).rejects.toThrow(GraphQLError);
        sinon.assert.calledWith(loggerErrorStub, 'Email decryption failed', sinon.match.object);
      });
    });

Explanation:

  • Mocking Database Calls:

    • Use sinon.stub to mock User.find so you can control the data returned without hitting the actual database.
  • Testing Logger Outputs:

    • Stub the logger methods (warn and error) to intercept and assert that they are called with the correct messages and arguments.
  • Simulating Errors:

    • Stub decryptEmail to throw an error when simulating decryption failure.
    • Use Jest's expect(...).rejects.toThrow() to assert that the resolver throws the expected error.
  • Restoring Stubs:

    • After each test, call sinon.restore() to reset the stubs and avoid side effects on other tests.

Additional Tips:

  • Make sure to import your resolver and any utilities from the correct paths relative to your test file.
  • If you're using Jest instead of Mocha and Sinon, you can use Jest's built-in mocking functions.
  • Ensure that your test environment is properly configured to handle async tests and that you return or await asynchronous calls.

Resources:

Let me know if you need further guidance!

Copy link

coderabbitai bot commented Nov 14, 2024

Tip

For best results, initiate chat on the files or code changes.

@prayanshchh:

To test that your members resolver correctly logs a warning when user.email doesn't exist and throws an error when decryption fails, you can mock the database responses and the decryptEmail function. Here's how you can approach it:

  1. Testing when user.email is missing:

    • Mock the User.find method to return a user object where the email field is undefined or null.
    • Mock the logger.warn function to verify that it's called with the correct parameters.
  2. Testing when decryption fails:

    • Mock the decryptEmail function to throw an error, simulating a decryption failure.
    • Mock the logger.error function to verify that it logs the error correctly.
    • Assert that a GraphQLError is thrown when decryption fails.

Here's an example of how you might write the tests:

// tests/resolvers/Organization/members.spec.ts
import { members } from '../../../src/resolvers/Organization/members';
import { User } from '../../../src/models/User';
import { decryptEmail } from '../../../src/utilities/encryption';
import logger from '../../../src/logger';
import { GraphQLError } from 'graphql';

jest.mock('../../../src/models/User');
jest.mock('../../../src/utilities/encryption');
jest.mock('../../../src/logger');

describe('Organization members resolver', () => {

  afterEach(() => {
    jest.clearAllMocks();
  });

  it('should log a warning when user.email does not exist', async () => {
    const mockUsers = [
      { _id: 'userId1', email: undefined },
    ];
    (User.find as jest.Mock).mockResolvedValue(mockUsers);

    const parent = { members: ['userId1'] };
    await members(parent);

    expect(logger.warn).toHaveBeenCalledWith('User missing email field', { userId: 'userId1' });
  });

  it('should throw an error when email decryption fails', async () => {
    const mockUsers = [
      { _id: 'userId2', email: 'encryptedEmail' },
    ];
    (User.find as jest.Mock).mockResolvedValue(mockUsers);

    (decryptEmail as jest.Mock).mockImplementation(() => {
      throw new Error('Decryption error');
    });

    const parent = { members: ['userId2'] };

    await expect(members(parent)).rejects.toThrow(new GraphQLError('Failed to process user data'));

    expect(logger.error).toHaveBeenCalledWith('Email decryption failed', {
      userId: 'userId2',
      error: 'Decryption error',
    });
  });

});

Explanation:

  • Mocking User.find: By mocking User.find, you control the data returned from the database, allowing you to simulate the scenarios you want to test.
  • Testing missing user.email: In the first test, the user object has email set to undefined. The test checks if logger.warn is called with the correct message and parameters.
  • Testing decryption failure: In the second test, you mock decryptEmail to throw an error, simulating a decryption failure. The test then checks that a GraphQLError is thrown and that logger.error logs the expected error message.

Additional Tips:

  • Using jest.mock: Mocking dependencies like User, decryptEmail, and logger allows you to isolate and test the behavior of your resolver without relying on actual database operations or implementations.
  • Clearing mocks after each test: Use jest.clearAllMocks() to ensure that mocks from one test don't affect others.
  • Testing other scenarios: Consider adding tests for successful decryption to ensure that valid data flows through as expected.

This approach should help you increase code coverage by testing the different branches and error handling in your resolver.

Let me know if you need further assistance!

Copy link

coderabbitai bot commented Nov 14, 2024

Tip

For best results, initiate chat on the files or code changes.

@prayanshchh,

To test the scenarios you mentioned and increase code coverage, you can mock the database queries and the decryptEmail function to simulate different conditions. Here's how you can approach each case:


1. Testing when user.email doesn't exist and the code logs a warning:

You can mock the User.find method to return users without the email field and use a spy on the logger.warn method to assert that it logs the correct warning.

Example using Jest:

// tests/resolvers/Organization/members.spec.ts
import { members } from '../../../src/resolvers/Organization/members';
import { User } from '../../../src/models/User';
import logger from '../../../src/logger';
import { InterfaceUser } from '../../../src/models/User';

jest.mock('../../../src/models/User');
jest.mock('../../../src/logger');

describe('Organization members resolver', () => {
  afterEach(() => {
    jest.clearAllMocks();
  });

  it('should log a warning if user.email does not exist', async () => {
    const parent = { members: ['user1'] };
    const mockUsers: InterfaceUser[] = [
      {
        _id: 'user1',
        // email is missing
        name: 'Test User',
      },
    ];

    (User.find as jest.Mock).mockReturnValue({
      lean: () => mockUsers,
    });

    const loggerWarnSpy = jest.spyOn(logger, 'warn');

    const result = await members(parent);

    expect(loggerWarnSpy).toHaveBeenCalledWith('User missing email field', {
      userId: 'user1',
    });
    expect(result).toEqual(mockUsers);
  });
});

Explanation:

  • Mock User.find to return a user without an email field.
  • Spy on logger.warn to verify it's called with the expected message.
  • Assert that the resolver returns the user as-is when the email is missing.

2. Testing when decryptEmail fails and the code throws an error:

Mock the decryptEmail function to throw an error and assert that your resolver logs the error and throws a GraphQLError.

Example:

import { members } from '../../../src/resolvers/Organization/members';
import { User } from '../../../src/models/User';
import { decryptEmail } from '../../../src/utilities/encryption';
import logger from '../../../src/logger';
import { GraphQLError } from 'graphql';

jest.mock('../../../src/models/User');
jest.mock('../../../src/utilities/encryption');
jest.mock('../../../src/logger');

describe('Organization members resolver', () => {
  afterEach(() => {
    jest.clearAllMocks();
  });

  it('should log an error and throw GraphQLError if decryptEmail fails', async () => {
    const parent = { members: ['user1'] };
    const mockUsers = [
      {
        _id: 'user1',
        email: 'encryptedEmail',
        name: 'Test User',
      },
    ];

    (User.find as jest.Mock).mockReturnValue({
      lean: () => mockUsers,
    });

    (decryptEmail as jest.Mock).mockImplementation(() => {
      throw new Error('Decryption failed');
    });

    const loggerErrorSpy = jest.spyOn(logger, 'error');

    await expect(members(parent)).rejects.toThrow(GraphQLError);

    expect(loggerErrorSpy).toHaveBeenCalledWith('Email decryption failed', {
      userId: 'user1',
      error: 'Decryption failed',
    });
  });
});

Explanation:

  • Mock decryptEmail to throw an error.
  • Expect the resolver to throw a GraphQLError when decryption fails.
  • Verify that logger.error is called with the correct message.

3. Testing successful decryption:

Ensure that when decryptEmail works correctly, the resolver returns users with decrypted emails.

Example:

it('should decrypt emails and return users with decrypted emails', async () => {
  const parent = { members: ['user1'] };
  const mockUsers = [
    {
      _id: 'user1',
      email: 'encryptedEmail',
      name: 'Test User',
    },
  ];

  (User.find as jest.Mock).mockReturnValue({
    lean: () => mockUsers,
  });

  (decryptEmail as jest.Mock).mockReturnValue({
    decrypted: '[email protected]',
  });

  const result = await members(parent);

  expect(result).toEqual([
    {
      _id: 'user1',
      email: '[email protected]',
      name: 'Test User',
    },
  ]);
});

Explanation:

  • Mock decryptEmail to return a decrypted email.
  • Assert that the resolver returns the user with the decrypted email.

Additional Tips:

  • Mocking Database Calls:

    • Use (User.find as jest.Mock) to mock the database query.
    • Return a controlled set of users to simulate different scenarios.
  • Testing Logger Outputs:

    • Use jest.spyOn(logger, 'warn') and jest.spyOn(logger, 'error') to monitor logger calls.
  • TypeScript Considerations:

    • Cast functions to jest.Mock to avoid TypeScript errors:
      (User.find as jest.Mock)
      (decryptEmail as jest.Mock)
  • Clearing Mocks:

    • Call jest.clearAllMocks() in afterEach to prevent mocks from affecting other tests.
  • Testing Error Handling:

    • Use await expect(...).rejects.toThrow() to assert that an async function throws an error.
  • Organizing Tests:

    • Keep your test files in a similar directory structure to your source code for clarity.

By writing these tests, you'll cover the scenarios where user.email is missing, where decryption fails, and where everything works as expected. This should help increase your code coverage and ensure your resolver handles all cases properly.

Let me know if you need further assistance!

@prayanshchh
Copy link
Author

prayanshchh commented Nov 14, 2024

the reason why code cov is less, is that we haven't implemented testing for scenarios where we do a db call (for example extracting users from db) and then testing if application throws error if user.email doesn't exist...can I follow the approach given by codderrabitai, or can you help me with this

@pranshugupta54 (I slacked the same thing, but I didn't get reply)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants