/* * Copyright (C) 2026 Fluxer Contributors * * This file is part of Fluxer. * * Fluxer is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * Fluxer is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License * along with Fluxer. If not, see . */ import crypto from 'node:crypto'; import {initializeLogger} from '@fluxer/api/src/Logger'; import {NoopLogger} from '@fluxer/api/src/test/mocks/NoopLogger'; import { type ISweegoGatewayService, type ISweegoUserRepository, type SweegoEvent, SweegoWebhookService, } from '@fluxer/api/src/webhook/SweegoWebhookService'; import {SuspiciousActivityFlags} from '@fluxer/constants/src/UserConstants'; import {beforeAll, describe, expect, it, vi} from 'vitest'; beforeAll(() => { initializeLogger(new NoopLogger()); }); function createMockUserRepository(): ISweegoUserRepository { return { findByEmail: vi.fn().mockResolvedValue(null), patchUpsert: vi.fn().mockResolvedValue(null), }; } function createMockGatewayService(): ISweegoGatewayService { return { dispatchPresence: vi.fn().mockResolvedValue(undefined), }; } function signPayload(secret: string, webhookId: string, timestamp: string, body: string): string { const secretBytes = Buffer.from(secret, 'base64'); const contentToSign = `${webhookId}.${timestamp}.${body}`; return crypto.createHmac('sha256', secretBytes).update(contentToSign).digest('base64'); } describe('SweegoWebhookService', () => { const testSecret = crypto.randomBytes(32).toString('base64'); describe('verifySignature', () => { it('returns true for valid HMAC-SHA256 signature', () => { const userRepo = createMockUserRepository(); const gateway = createMockGatewayService(); const service = new SweegoWebhookService(userRepo, gateway); const body = JSON.stringify({event_type: 'hard_bounce', recipient: 'test@example.com'}); const webhookId = '237e3736c687425d9ea8665216bcfe8a'; const timestamp = '1769696506'; const signature = signPayload(testSecret, webhookId, timestamp, body); const result = service.verifySignature(body, webhookId, timestamp, signature, testSecret); expect(result).toBe(true); }); it('returns false for invalid signature', () => { const userRepo = createMockUserRepository(); const gateway = createMockGatewayService(); const service = new SweegoWebhookService(userRepo, gateway); const body = JSON.stringify({event_type: 'hard_bounce', recipient: 'test@example.com'}); const webhookId = '237e3736c687425d9ea8665216bcfe8a'; const timestamp = '1769696506'; const result = service.verifySignature(body, webhookId, timestamp, 'invalid-signature', testSecret); expect(result).toBe(false); }); it('returns false for tampered body', () => { const userRepo = createMockUserRepository(); const gateway = createMockGatewayService(); const service = new SweegoWebhookService(userRepo, gateway); const originalBody = JSON.stringify({event_type: 'hard_bounce', recipient: 'test@example.com'}); const webhookId = '237e3736c687425d9ea8665216bcfe8a'; const timestamp = '1769696506'; const signature = signPayload(testSecret, webhookId, timestamp, originalBody); const tamperedBody = JSON.stringify({event_type: 'hard_bounce', recipient: 'other@example.com'}); const result = service.verifySignature(tamperedBody, webhookId, timestamp, signature, testSecret); expect(result).toBe(false); }); }); describe('processEvent', () => { it('ignores non-bounce events', async () => { const userRepo = createMockUserRepository(); const gateway = createMockGatewayService(); const service = new SweegoWebhookService(userRepo, gateway); const event: SweegoEvent = { event_type: 'delivered', timestamp: '2026-01-29T14:21:46.729251+00:00', recipient: 'soft@example.com', }; await service.processEvent(event); expect(userRepo.findByEmail).not.toHaveBeenCalled(); expect(userRepo.patchUpsert).not.toHaveBeenCalled(); }); it('logs soft bounces without marking as bounced', async () => { const userRepo = createMockUserRepository(); const gateway = createMockGatewayService(); const service = new SweegoWebhookService(userRepo, gateway); const event: SweegoEvent = { event_type: 'soft-bounce', timestamp: '2026-01-29T14:21:46.729251+00:00', recipient: 'soft@example.com', details: 'Temporary failure', }; await service.processEvent(event); expect(userRepo.findByEmail).not.toHaveBeenCalled(); expect(userRepo.patchUpsert).not.toHaveBeenCalled(); }); it('marks hard bounces as unverified', async () => { const userRepo = createMockUserRepository(); const gateway = createMockGatewayService(); const service = new SweegoWebhookService(userRepo, gateway); const mockUser = { id: BigInt(123), email: 'bounced@example.com', emailBounced: false, emailVerified: true, suspiciousActivityFlags: 0, toRow: () => ({}), }; (userRepo.findByEmail as ReturnType).mockResolvedValue(mockUser); (userRepo.patchUpsert as ReturnType).mockResolvedValue(null); const event: SweegoEvent = { event_type: 'hard_bounce', timestamp: '2026-01-29T14:21:46.729251+00:00', recipient: 'bounced@example.com', event_id: 'event-1', }; await service.processEvent(event); expect(userRepo.findByEmail).toHaveBeenCalledWith('bounced@example.com'); expect(userRepo.patchUpsert).toHaveBeenCalledWith( mockUser.id, { email_bounced: true, email_verified: false, suspicious_activity_flags: SuspiciousActivityFlags.REQUIRE_REVERIFIED_EMAIL, }, mockUser.toRow(), ); }); it('skips already bounced users', async () => { const userRepo = createMockUserRepository(); const gateway = createMockGatewayService(); const service = new SweegoWebhookService(userRepo, gateway); const mockUser = { id: BigInt(456), email: 'already@example.com', emailBounced: true, suspiciousActivityFlags: 0, toRow: () => ({}), }; (userRepo.findByEmail as ReturnType).mockResolvedValue(mockUser); const event: SweegoEvent = { event_type: 'hard_bounce', timestamp: '2026-01-29T14:21:46.729251+00:00', recipient: 'already@example.com', }; await service.processEvent(event); expect(userRepo.patchUpsert).not.toHaveBeenCalled(); }); }); });