Skip to content

Conversation

@coratgerl
Copy link
Contributor

@coratgerl coratgerl commented Nov 6, 2025

Issue

Fixes: #9510

  • Add tests
  • Add changes to documentation (guides, repository pages, code comments)

Summary by CodeRabbit

  • New Features

    • Added a beforePasswordResetRequest Cloud Code hook that receives request metadata, expanded user data (including attached files), and supports optional rate-limiting.
  • Bug Fixes / Improvements

    • Hook validated for user accounts only; clearer validation messages; password-reset flow now preloads, sanitizes, and runs triggers before sending emails.
  • Tests

    • Expanded tests for success, error blocking, file-attached users, non-existent emails, and request-context availability.

@parse-github-assistant
Copy link

I will reformat the title to use the proper commit message syntax.

@parse-github-assistant parse-github-assistant bot changed the title feat: add beforePasswordResetRequest hook feat: Add beforePasswordResetRequest hook Nov 6, 2025
@parse-github-assistant
Copy link

parse-github-assistant bot commented Nov 6, 2025

🚀 Thanks for opening this pull request!

@coratgerl coratgerl changed the title feat: Add beforePasswordResetRequest hook feat: add beforePasswordResetRequest hook Nov 6, 2025
@parseplatformorg
Copy link
Contributor

parseplatformorg commented Nov 6, 2025

Snyk checks have passed. No issues have been found so far.

Status Scanner Critical High Medium Low Total (0)
Open Source Security 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

@parse-github-assistant
Copy link

I will reformat the title to use the proper commit message syntax.

@parse-github-assistant parse-github-assistant bot changed the title feat: add beforePasswordResetRequest hook feat: Add beforePasswordResetRequest hook Nov 6, 2025
@coderabbitai
Copy link

coderabbitai bot commented Nov 6, 2025

📝 Walkthrough

Walkthrough

Adds a beforePasswordResetRequest Cloud trigger: registers the trigger type, exposes Parse.Cloud.beforePasswordResetRequest(...), invokes it during password reset requests in UsersRouter, and adds tests covering flows, validation, and request context.

Changes

Cohort / File(s) Change Summary
Tests
spec/CloudCode.spec.js
Adds comprehensive tests for beforePasswordResetRequest: successful flow, blocking behavior (including with attached files), non-existent email handling, request object contents (object, headers, ip, installationId, context, config), and updates trigger validation expectations.
Router / Password Reset Flow
src/Routers/UsersRouter.js
Enhances handleResetRequest: supports lookup by token or email/username (ambiguity handling), sanitizes auth data, expands attached user files, inflates user object, and invokes beforePasswordResetRequest before sending reset email. Adds inflate import from ../triggers.
Cloud Code API
src/cloud-code/Parse.Cloud.js
Adds Parse.Cloud.beforePasswordResetRequest(handler, validationHandler) with optional class/constructor shaping and optional validationHandler.rateLimit to register rate limits for /requestPasswordReset POST; registers trigger via triggers.addTrigger.
Trigger Types & Request Handling
src/triggers.js
Adds beforePasswordResetRequest to exported Types, updates validation/error messages to include it for _User, and updates getRequestObject logic to include context copying for this trigger.
Manifest
package.json
Listed in manifest; no functional changes described in diff.

Sequence Diagram(s)

sequenceDiagram
    autonumber
    participant Client
    participant UsersRouter as UsersRouter\n(handleResetRequest)
    participant Triggers as TriggerRegistry
    participant Hook as beforePasswordResetRequest\nHandler
    participant Email as EmailAdapter

    Client->>UsersRouter: POST /requestPasswordReset (email or token)
    UsersRouter->>UsersRouter: Lookup user (token or email/username)
    UsersRouter->>UsersRouter: Sanitize auth data & expand attached files
    UsersRouter->>Triggers: Invoke beforePasswordResetRequest(req with inflated user)
    Triggers->>Hook: Call handler(req)
    alt Handler allows
        Hook-->>Triggers: Return success
        Triggers-->>UsersRouter: Continue flow
        UsersRouter->>Email: sendPasswordResetEmail(user)
        Email-->>Client: 200 OK
    else Handler throws
        Hook-->>Triggers: Throw error
        Triggers-->>UsersRouter: Propagate error
        UsersRouter-->>Client: Error response
    end
Loading

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~25 minutes

  • Focus review areas:
    • spec/CloudCode.spec.js — many new scenarios and expectations.
    • src/Routers/UsersRouter.js — multiple lookup branches, auth-data sanitization, file expansion, and trigger invocation.
    • src/cloud-code/Parse.Cloud.js — argument normalization and rate-limit wiring.
    • src/triggers.js — Types addition and request-object behavior for new trigger.

Possibly related PRs

Suggested reviewers

  • Moumouls

Pre-merge checks and finishing touches

❌ Failed checks (1 warning)
Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 0.00% which is insufficient. The required threshold is 80.00%. You can run @coderabbitai generate docstrings to improve docstring coverage.
✅ Passed checks (4 passed)
Check name Status Explanation
Title check ✅ Passed The title clearly and concisely describes the main feature being added: a new beforePasswordResetRequest hook for Cloud Code.
Description check ✅ Passed The description links the PR to issue #9510, marks required tasks as completed (tests and documentation), but uses minimal detail.
Linked Issues check ✅ Passed The code changes implement all primary objectives: the new beforePasswordResetRequest hook validates requests before token generation/storage, prevents premature email sending, and includes comprehensive test coverage.
Out of Scope Changes check ✅ Passed All changes are directly related to implementing the beforePasswordResetRequest hook; no unrelated modifications are present.
✨ Finishing touches
  • 📝 Generate docstrings
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@coderabbitai
Copy link

coderabbitai bot commented Nov 6, 2025

✅ Actions performed

Review triggered.

Note: CodeRabbit is an incremental review system and does not re-review already reviewed commits. This command is applicable only when automatic reviews are paused.

@codecov
Copy link

codecov bot commented Nov 6, 2025

Codecov Report

❌ Patch coverage is 96.29630% with 1 line in your changes missing coverage. Please review.
✅ Project coverage is 93.05%. Comparing base (cff451e) to head (659ab5e).
⚠️ Report is 1 commits behind head on alpha.

Files with missing lines Patch % Lines
src/cloud-code/Parse.Cloud.js 88.88% 1 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##            alpha    #9906      +/-   ##
==========================================
- Coverage   93.06%   93.05%   -0.01%     
==========================================
  Files         187      187              
  Lines       15187    15209      +22     
  Branches      177      177              
==========================================
+ Hits        14134    14153      +19     
- Misses       1041     1044       +3     
  Partials       12       12              

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Nitpick comments (5)
src/triggers.js (1)

62-66: Validation updated to restrict to _User — OK; consider throwing Error objects.

Logic is correct; throwing strings matches existing pattern but is brittle. Consider new Parse.Error for future cleanup.

src/Routers/UsersRouter.js (1)

449-474: Minor: reduce variables and narrow scope.

userResults is only used to grab the first element. Simplify to a single const userRecord to reduce cognitive load.

src/cloud-code/Parse.Cloud.js (1)

352-394: Add validator wiring and validate input (parity + future-proofing).

Current implementation mirrors beforeLogin (rateLimit only). If you want validator features (skipWithMasterKey, requireMaster, etc.) or just to validate rateLimit shape, call validateValidator and pass validationHandler to addTrigger.

 ParseCloud.beforePasswordResetRequest = function (handler, validationHandler) {
   let className = '_User';
   if (typeof handler === 'string' || isParseObjectConstructor(handler)) {
     // validation will occur downstream, this is to maintain internal
     // code consistency with the other hook types.
     className = triggers.getClassName(handler);
     handler = arguments[1];
     validationHandler = arguments.length >= 2 ? arguments[2] : null;
   }
-  triggers.addTrigger(triggers.Types.beforePasswordResetRequest, className, handler, Parse.applicationId);
+  validateValidator(validationHandler);
+  triggers.addTrigger(
+    triggers.Types.beforePasswordResetRequest,
+    className,
+    handler,
+    Parse.applicationId,
+    validationHandler
+  );
   if (validationHandler && validationHandler.rateLimit) {
     addRateLimit(
       { requestPath: `/requestPasswordReset`, requestMethods: 'POST', ...validationHandler.rateLimit },
       Parse.applicationId,
       true
     );
   }
 };

Also consider documenting the optional validationHandler param in the JSDoc.

spec/CloudCode.spec.js (2)

3782-3978: Prefer async/await without done in new tests to reduce flakiness.

The new tests use async done => { ...; done(); }. Drop done and rely on async function completion/throws instead. This is the repository’s preferred pattern. Based on learnings.


3800-3816: Add an assertion that password/authData are not exposed to Cloud Code.

After the UsersRouter sanitization fix, add a quick check:

 Parse.Cloud.beforePasswordResetRequest(req => {
   // existing expectations...
+  expect(req.object.get('password')).toBeUndefined();
+  expect(req.object.get('authData')).toBeUndefined();
 });

Helps prevent regressions.

Also applies to: 3836-3859, 3878-3904, 3932-3962

📜 Review details

Configuration used: CodeRabbit UI

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between f27b050 and c354da3.

📒 Files selected for processing (4)
  • spec/CloudCode.spec.js (2 hunks)
  • src/Routers/UsersRouter.js (2 hunks)
  • src/cloud-code/Parse.Cloud.js (1 hunks)
  • src/triggers.js (3 hunks)
🧰 Additional context used
🧠 Learnings (5)
📚 Learning: 2025-10-16T19:27:05.311Z
Learnt from: Moumouls
Repo: parse-community/parse-server PR: 9883
File: spec/CloudCodeLogger.spec.js:410-412
Timestamp: 2025-10-16T19:27:05.311Z
Learning: In spec/CloudCodeLogger.spec.js, the test "should log cloud function triggers using the silent log level" (around lines 383-420) is known to be flaky and requires the extra `await new Promise(resolve => setTimeout(resolve, 100))` timeout after awaiting `afterSavePromise` for reliability, even though it may appear redundant.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-08-27T12:33:06.237Z
Learnt from: EmpiDev
Repo: parse-community/parse-server PR: 9770
File: src/triggers.js:467-477
Timestamp: 2025-08-27T12:33:06.237Z
Learning: In the Parse Server codebase, maybeRunAfterFindTrigger is called in production with Parse.Query objects constructed via withJSON(), so the plain object query handling bug only affects tests, not production code paths.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-05-09T09:59:06.289Z
Learnt from: mtrezza
Repo: parse-community/parse-server PR: 9445
File: spec/ParseLiveQuery.spec.js:1340-1375
Timestamp: 2025-05-09T09:59:06.289Z
Learning: Tests in the parse-server repository should use promise-based approaches rather than callback patterns with `done()`. Use a pattern where a Promise is created that resolves when the event occurs, then await that promise.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-05-09T09:59:06.289Z
Learnt from: mtrezza
Repo: parse-community/parse-server PR: 9445
File: spec/ParseLiveQuery.spec.js:1340-1375
Timestamp: 2025-05-09T09:59:06.289Z
Learning: New tests in the parse-server repository should use async/await with promise-based patterns rather than callback patterns with `done()`. The preferred pattern is to create a Promise that resolves when an expected event occurs, then await that Promise.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-05-04T20:41:05.147Z
Learnt from: mtrezza
Repo: parse-community/parse-server PR: 9445
File: spec/ParseLiveQuery.spec.js:1312-1338
Timestamp: 2025-05-04T20:41:05.147Z
Learning: New tests in the parse-server repository should use async/await with promise-based patterns rather than callback patterns with `done()`.

Applied to files:

  • spec/CloudCode.spec.js
🧬 Code graph analysis (3)
src/Routers/UsersRouter.js (1)
src/triggers.js (2)
  • inflate (1002-1008)
  • maybeRunTrigger (895-998)
src/cloud-code/Parse.Cloud.js (2)
src/Routers/CloudCodeRouter.js (1)
  • triggers (4-4)
src/middlewares.js (2)
  • addRateLimit (520-623)
  • addRateLimit (520-623)
spec/CloudCode.spec.js (2)
spec/helper.js (2)
  • Parse (4-4)
  • reconfigureServer (180-214)
src/cloud-code/Parse.Cloud.js (1)
  • emailAdapter (604-604)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (14)
  • GitHub Check: Docker Build
  • GitHub Check: PostgreSQL 18, PostGIS 3.6
  • GitHub Check: PostgreSQL 15, PostGIS 3.5
  • GitHub Check: Node 22
  • GitHub Check: PostgreSQL 17, PostGIS 3.5
  • GitHub Check: PostgreSQL 15, PostGIS 3.4
  • GitHub Check: Node 18
  • GitHub Check: PostgreSQL 16, PostGIS 3.5
  • GitHub Check: MongoDB 6, ReplicaSet
  • GitHub Check: MongoDB 8, ReplicaSet
  • GitHub Check: PostgreSQL 15, PostGIS 3.3
  • GitHub Check: Node 20
  • GitHub Check: MongoDB 7, ReplicaSet
  • GitHub Check: Redis Cache
🔇 Additional comments (2)
src/triggers.js (2)

9-9: New trigger type added correctly.

Entry in Types for beforePasswordResetRequest looks consistent and non-breaking.


291-296: Context exposure includes beforePasswordResetRequest — LGTM.

Request.context now set for this trigger type; aligns with other auth-related hooks.

Comment on lines +454 to +471
userResults = await req.config.database.find('_User', {
_perishable_token: token,
_perishable_token_expires_at: { $lt: Parse._encode(new Date()) },
});
if (results && results[0] && results[0].email) {
email = results[0].email;
if (userResults && userResults.length > 0) {
userData = userResults[0];
if (userData.email) {
email = userData.email;
}
}
// Or using email if no token provided
} else if (typeof email === 'string') {
userResults = await req.config.database.find(
'_User',
{ $or: [{ email }, { username: email, email: { $exists: false } }] },
{ limit: 1 },
Auth.maintenance(req.config)
);
Copy link

@coderabbitai coderabbitai bot Nov 6, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🔴 Critical

Token lookup uses inverted expiry comparator and lacks Auth.maintenance/limit.

  • _perishable_token_expires_at should be greater than “now” for a valid token.
  • Use Auth.maintenance like the email path for consistency.
  • Limit results to 1.

Apply:

-      userResults = await req.config.database.find('_User', {
-        _perishable_token: token,
-        _perishable_token_expires_at: { $lt: Parse._encode(new Date()) },
-      });
+      userResults = await req.config.database.find(
+        '_User',
+        {
+          _perishable_token: token,
+          _perishable_token_expires_at: { $gt: Parse._encode(new Date()) },
+        },
+        { limit: 1 },
+        Auth.maintenance(req.config)
+      );
🤖 Prompt for AI Agents
In src/Routers/UsersRouter.js around lines 454 to 471, the token lookup query
uses the wrong expiry comparator and is missing the same options as the email
path; change the _perishable_token_expires_at check to $gt Parse._encode(new
Date()) so only unexpired tokens match, and call req.config.database.find with
the same options as the email branch: pass { limit: 1 } and
Auth.maintenance(req.config) as the query options so the lookup is limited to
one result and runs under maintenance context.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mtrezza an opininion since this code already exists before my modifcations ?

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Seems like the humans are having a chat. I'll hop back into my burrow for now. If you need me again, just tag @coderabbitai in a new comment, and I'll come hopping out!

@mtrezza
Copy link
Member

mtrezza commented Nov 7, 2025

Note that I proposed the name beforePasswordResetRequest to distinguish between the user's request to initiate the reset process (/requestPasswordReset), and the user's form submission (/request_password_reset), which in the future could be named beforePasswordResetSubmission. Let's briefly validate that idea:

  • beforePasswordResetRequest --> user requests email
  • beforePasswordResetSubmission --> user submits form
  • afterPasswordReset --> password reset completed

Maybe this would be more intuitive:

  • beforePasswordResetEmailRequest --> user requests email
  • beforePasswordReset --> user submits form, password reset process is about to start
  • afterPasswordReset --> password reset process completed

Then again, a password reset could be sent via other channels in the future, so maybe we stick with this:

  • beforePasswordResetRequest --> user requests email
  • beforePasswordReset --> user submits form, password reset process is about to start
  • afterPasswordReset --> password reset process completed

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (3)
spec/CloudCode.spec.js (3)

3623-3675: Consider modernizing test pattern

This test correctly validates that afterFind hooks are not triggered during save operations. However, consider converting from async done callback pattern to pure async/await:

Based on learnings

Apply this diff:

-  it('afterFind should not be triggered when saving an object', async () => {
+  it('afterFind should not be triggered when saving an object', async () => {
     let beforeSaves = 0;
     Parse.Cloud.beforeSave('SavingTest', () => {
       beforeSaves++;
     });
     
     // ... rest of test logic ...
     
     expect(beforeSaves).toEqual(3);
     expect(afterSaves).toEqual(3);
     expect(beforeFinds).toEqual(1);
     expect(afterFinds).toEqual(1);
-    done();
   });

3836-3870: Test logic is correct; consider modernizing pattern

The test properly validates that beforePasswordResetRequest runs with a valid user and that the email is sent. However, similar to other tests in this suite, consider removing the done callback and using pure async/await pattern.

Based on learnings


3959-3983: Improve error handling specificity

The try/catch block swallows all errors, which could mask unexpected failures. Consider testing both scenarios explicitly or at least validating the error type when one is thrown.

Apply this diff to make the test more explicit:

   it('should not run beforePasswordResetRequest if email does not exist', async done => {
     let hit = 0;
     const emailAdapter = {
       sendVerificationEmail: () => Promise.resolve(),
       sendPasswordResetEmail: () => {},
       sendMail: () => {},
     };
 
     await reconfigureServer({
       emailAdapter: emailAdapter,
       publicServerURL: 'http://localhost:8378/1',
+      passwordPolicy: {
+        resetPasswordSuccessOnInvalidEmail: true
+      }
     });
 
     Parse.Cloud.beforePasswordResetRequest(req => {
       hit++;
     });
 
-    try {
-      await Parse.User.requestPasswordReset('nonexistent@parse.com');
-    } catch (e) {
-      // May or may not throw depending on passwordPolicy.resetPasswordSuccessOnInvalidEmail
-    }
+    // Should not throw when resetPasswordSuccessOnInvalidEmail is true
+    await Parse.User.requestPasswordReset('nonexistent@parse.com');
     expect(hit).toBe(0);
     done();
   });

Alternatively, add a second test for the case where resetPasswordSuccessOnInvalidEmail is false to ensure comprehensive coverage.

📜 Review details

Configuration used: CodeRabbit UI

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 2971acf and 8076a65.

📒 Files selected for processing (1)
  • spec/CloudCode.spec.js (3 hunks)
🧰 Additional context used
🧠 Learnings (5)
📚 Learning: 2025-10-16T19:27:05.311Z
Learnt from: Moumouls
Repo: parse-community/parse-server PR: 9883
File: spec/CloudCodeLogger.spec.js:410-412
Timestamp: 2025-10-16T19:27:05.311Z
Learning: In spec/CloudCodeLogger.spec.js, the test "should log cloud function triggers using the silent log level" (around lines 383-420) is known to be flaky and requires the extra `await new Promise(resolve => setTimeout(resolve, 100))` timeout after awaiting `afterSavePromise` for reliability, even though it may appear redundant.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-05-04T20:41:05.147Z
Learnt from: mtrezza
Repo: parse-community/parse-server PR: 9445
File: spec/ParseLiveQuery.spec.js:1312-1338
Timestamp: 2025-05-04T20:41:05.147Z
Learning: New tests in the parse-server repository should use async/await with promise-based patterns rather than callback patterns with `done()`.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-08-27T12:33:06.237Z
Learnt from: EmpiDev
Repo: parse-community/parse-server PR: 9770
File: src/triggers.js:467-477
Timestamp: 2025-08-27T12:33:06.237Z
Learning: In the Parse Server codebase, maybeRunAfterFindTrigger is called in production with Parse.Query objects constructed via withJSON(), so the plain object query handling bug only affects tests, not production code paths.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-05-09T09:59:06.289Z
Learnt from: mtrezza
Repo: parse-community/parse-server PR: 9445
File: spec/ParseLiveQuery.spec.js:1340-1375
Timestamp: 2025-05-09T09:59:06.289Z
Learning: Tests in the parse-server repository should use promise-based approaches rather than callback patterns with `done()`. Use a pattern where a Promise is created that resolves when the event occurs, then await that promise.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-05-09T09:59:06.289Z
Learnt from: mtrezza
Repo: parse-community/parse-server PR: 9445
File: spec/ParseLiveQuery.spec.js:1340-1375
Timestamp: 2025-05-09T09:59:06.289Z
Learning: New tests in the parse-server repository should use async/await with promise-based patterns rather than callback patterns with `done()`. The preferred pattern is to create a Promise that resolves when an expected event occurs, then await that Promise.

Applied to files:

  • spec/CloudCode.spec.js
🧬 Code graph analysis (1)
spec/CloudCode.spec.js (1)
spec/helper.js (2)
  • Parse (4-4)
  • reconfigureServer (180-214)
🪛 GitHub Check: Lint
spec/CloudCode.spec.js

[warning] 4034-4034:
More than 2 blank lines not allowed

⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (5)
  • GitHub Check: Redis Cache
  • GitHub Check: MongoDB 8, ReplicaSet
  • GitHub Check: MongoDB 6, ReplicaSet
  • GitHub Check: Docker Build
  • GitHub Check: Code Analysis (javascript)
🔇 Additional comments (3)
spec/CloudCode.spec.js (3)

3310-3322: LGTM: Trigger validation messages updated correctly

The error messages have been properly updated to include the new beforePasswordResetRequest trigger alongside beforeLogin and afterLogin. The changes are consistent across all validation checks.


3872-3957: LGTM: Blocking behavior well-tested

These tests properly validate that beforePasswordResetRequest can block password reset requests by throwing errors. The inclusion of a test with an attached file is important as it verifies that file expansion occurs before the hook invocation, preventing unnecessary token generation and email sending (as noted in the PR objectives).


3985-4030: LGTM: Request data and class validation tests

These tests properly validate that:

  1. The hook receives all expected request fields (object, headers, ip, installationId, context, config)
  2. Only the _User class is allowed for beforePasswordResetRequest, consistent with other user-authentication triggers

The test patterns match those used for beforeLogin and other triggers, ensuring consistency across the test suite.

@coratgerl
Copy link
Contributor Author

I think beforePasswordResetEmailRequest would be clearer, as it explicitly describes the action (email request). However, if other reset channels (SMS, etc.) are planned for the future, keeping the more generic beforePasswordResetRequest might be a better long-term choice. What do you think?

@coratgerl coratgerl requested a review from mtrezza November 8, 2025 13:51
Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

♻️ Duplicate comments (1)
spec/CloudCode.spec.js (1)

4659-4659: Remove extra blank lines.

More than 2 blank lines are not allowed before the new describe block. Please remove the extra blank line to comply with the project's style guidelines.

📜 Review details

Configuration used: CodeRabbit UI

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 8076a65 and 659ab5e.

📒 Files selected for processing (1)
  • spec/CloudCode.spec.js (2 hunks)
🧰 Additional context used
🧠 Learnings (5)
📚 Learning: 2025-10-16T19:27:05.311Z
Learnt from: Moumouls
Repo: parse-community/parse-server PR: 9883
File: spec/CloudCodeLogger.spec.js:410-412
Timestamp: 2025-10-16T19:27:05.311Z
Learning: In spec/CloudCodeLogger.spec.js, the test "should log cloud function triggers using the silent log level" (around lines 383-420) is known to be flaky and requires the extra `await new Promise(resolve => setTimeout(resolve, 100))` timeout after awaiting `afterSavePromise` for reliability, even though it may appear redundant.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-05-04T20:41:05.147Z
Learnt from: mtrezza
Repo: parse-community/parse-server PR: 9445
File: spec/ParseLiveQuery.spec.js:1312-1338
Timestamp: 2025-05-04T20:41:05.147Z
Learning: New tests in the parse-server repository should use async/await with promise-based patterns rather than callback patterns with `done()`.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-05-09T09:59:06.289Z
Learnt from: mtrezza
Repo: parse-community/parse-server PR: 9445
File: spec/ParseLiveQuery.spec.js:1340-1375
Timestamp: 2025-05-09T09:59:06.289Z
Learning: Tests in the parse-server repository should use promise-based approaches rather than callback patterns with `done()`. Use a pattern where a Promise is created that resolves when the event occurs, then await that promise.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-05-09T09:59:06.289Z
Learnt from: mtrezza
Repo: parse-community/parse-server PR: 9445
File: spec/ParseLiveQuery.spec.js:1340-1375
Timestamp: 2025-05-09T09:59:06.289Z
Learning: New tests in the parse-server repository should use async/await with promise-based patterns rather than callback patterns with `done()`. The preferred pattern is to create a Promise that resolves when an expected event occurs, then await that Promise.

Applied to files:

  • spec/CloudCode.spec.js
📚 Learning: 2025-08-27T12:33:06.237Z
Learnt from: EmpiDev
Repo: parse-community/parse-server PR: 9770
File: src/triggers.js:467-477
Timestamp: 2025-08-27T12:33:06.237Z
Learning: In the Parse Server codebase, maybeRunAfterFindTrigger is called in production with Parse.Query objects constructed via withJSON(), so the plain object query handling bug only affects tests, not production code paths.

Applied to files:

  • spec/CloudCode.spec.js
🧬 Code graph analysis (1)
spec/CloudCode.spec.js (2)
spec/helper.js (2)
  • Parse (4-4)
  • reconfigureServer (180-214)
src/cloud-code/Parse.Cloud.js (1)
  • emailAdapter (604-604)
🔇 Additional comments (1)
spec/CloudCode.spec.js (1)

3310-3322: LGTM!

The trigger validation error messages have been correctly updated to include beforePasswordResetRequest in the list of user-specific triggers. The changes are consistent across all test assertions.

Comment on lines +4660 to +4856
describe('beforePasswordResetRequest hook', () => {
it('should run beforePasswordResetRequest with valid user', async done => {
let hit = 0;
let sendPasswordResetEmailCalled = false;
const emailAdapter = {
sendVerificationEmail: () => Promise.resolve(),
sendPasswordResetEmail: () => {
sendPasswordResetEmailCalled = true;
},
sendMail: () => {},
};

await reconfigureServer({
appName: 'test',
emailAdapter: emailAdapter,
publicServerURL: 'http://localhost:8378/1',
});

Parse.Cloud.beforePasswordResetRequest(req => {
hit++;
expect(req.object).toBeDefined();
expect(req.object.get('email')).toEqual('test@parse.com');
expect(req.object.get('username')).toEqual('testuser');
});

const user = new Parse.User();
user.setUsername('testuser');
user.setPassword('password');
user.set('email', 'test@parse.com');
await user.signUp();

await Parse.User.requestPasswordReset('test@parse.com');
expect(hit).toBe(1);
expect(sendPasswordResetEmailCalled).toBe(true);
done();
});

it('should be able to block password reset request if an error is thrown', async done => {
let hit = 0;
let sendPasswordResetEmailCalled = false;
const emailAdapter = {
sendVerificationEmail: () => Promise.resolve(),
sendPasswordResetEmail: () => {
sendPasswordResetEmailCalled = true;
},
sendMail: () => {},
};

await reconfigureServer({
appName: 'test',
emailAdapter: emailAdapter,
publicServerURL: 'http://localhost:8378/1',
});

Parse.Cloud.beforePasswordResetRequest(req => {
hit++;
if (req.object.get('isBanned')) {
throw new Error('banned account');
}
});

const user = new Parse.User();
user.setUsername('banneduser');
user.setPassword('password');
user.set('email', 'banned@parse.com');
await user.signUp();
await user.save({ isBanned: true });

try {
await Parse.User.requestPasswordReset('banned@parse.com');
throw new Error('should not have sent password reset email.');
} catch (e) {
expect(e.message).toBe('banned account');
}
expect(hit).toBe(1);
expect(sendPasswordResetEmailCalled).toBe(false);
done();
});

it('should be able to block password reset request if an error is thrown even if the user has an attached file', async done => {
let hit = 0;
let sendPasswordResetEmailCalled = false;
const emailAdapter = {
sendVerificationEmail: () => Promise.resolve(),
sendPasswordResetEmail: () => {
sendPasswordResetEmailCalled = true;
},
sendMail: () => {},
};

await reconfigureServer({
appName: 'test',
emailAdapter: emailAdapter,
publicServerURL: 'http://localhost:8378/1',
});

Parse.Cloud.beforePasswordResetRequest(req => {
hit++;
if (req.object.get('isBanned')) {
throw new Error('banned account');
}
});

const user = new Parse.User();
user.setUsername('banneduser2');
user.setPassword('password');
user.set('email', 'banned2@parse.com');
await user.signUp();
const base64 = 'V29ya2luZyBhdCBQYXJzZSBpcyBncmVhdCE=';
const file = new Parse.File('myfile.txt', { base64 });
await file.save();
await user.save({ isBanned: true, file });

try {
await Parse.User.requestPasswordReset('banned2@parse.com');
throw new Error('should not have sent password reset email.');
} catch (e) {
expect(e.message).toBe('banned account');
}
expect(hit).toBe(1);
expect(sendPasswordResetEmailCalled).toBe(false);
done();
});

it('should not run beforePasswordResetRequest if email does not exist', async done => {
let hit = 0;
const emailAdapter = {
sendVerificationEmail: () => Promise.resolve(),
sendPasswordResetEmail: () => {},
sendMail: () => {},
};

await reconfigureServer({
emailAdapter: emailAdapter,
publicServerURL: 'http://localhost:8378/1',
});

Parse.Cloud.beforePasswordResetRequest(req => {
hit++;
});

try {
await Parse.User.requestPasswordReset('nonexistent@parse.com');
} catch (e) {
// May or may not throw depending on passwordPolicy.resetPasswordSuccessOnInvalidEmail
}
expect(hit).toBe(0);
done();
});

it('should have expected data in request in beforePasswordResetRequest', async done => {
const emailAdapter = {
sendVerificationEmail: () => Promise.resolve(),
sendPasswordResetEmail: () => {},
sendMail: () => {},
};

await reconfigureServer({
appName: 'test',
emailAdapter: emailAdapter,
publicServerURL: 'http://localhost:8378/1',
});

Parse.Cloud.beforePasswordResetRequest(req => {
expect(req.object).toBeDefined();
expect(req.object.get('email')).toBeDefined();
expect(req.headers).toBeDefined();
expect(req.ip).toBeDefined();
expect(req.installationId).toBeDefined();
expect(req.context).toBeDefined();
expect(req.config).toBeDefined();
});

const user = new Parse.User();
user.setUsername('testuser2');
user.setPassword('password');
user.set('email', 'test2@parse.com');
await user.signUp();
await Parse.User.requestPasswordReset('test2@parse.com');
done();
});

it('should validate that only _User class is allowed for beforePasswordResetRequest', () => {
expect(() => {
Parse.Cloud.beforePasswordResetRequest('SomeClass', () => { });
}).toThrow('Only the _User class is allowed for the beforeLogin, afterLogin, and beforePasswordResetRequest triggers');
expect(() => {
Parse.Cloud.beforePasswordResetRequest(() => { });
}).not.toThrow();
expect(() => {
Parse.Cloud.beforePasswordResetRequest('_User', () => { });
}).not.toThrow();
expect(() => {
Parse.Cloud.beforePasswordResetRequest(Parse.User, () => { });
}).not.toThrow();
});
});
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion | 🟠 Major

Refactor tests to use async/await instead of callback pattern.

The test suite provides excellent coverage of the beforePasswordResetRequest hook functionality. However, tests should use async/await with promise-based patterns rather than callback patterns with done(), which is the preferred pattern for new tests in this repository.

Based on learnings.

Apply this refactor pattern to tests 1-5 (test 6 is already correct):

Example refactor for test 1:

-  it('should run beforePasswordResetRequest with valid user', async done => {
+  it('should run beforePasswordResetRequest with valid user', async () => {
     let hit = 0;
     let sendPasswordResetEmailCalled = false;
     const emailAdapter = {
       sendVerificationEmail: () => Promise.resolve(),
       sendPasswordResetEmail: () => {
         sendPasswordResetEmailCalled = true;
       },
       sendMail: () => {},
     };
 
     await reconfigureServer({
       appName: 'test',
       emailAdapter: emailAdapter,
       publicServerURL: 'http://localhost:8378/1',
     });
 
     Parse.Cloud.beforePasswordResetRequest(req => {
       hit++;
       expect(req.object).toBeDefined();
       expect(req.object.get('email')).toEqual('test@parse.com');
       expect(req.object.get('username')).toEqual('testuser');
     });
 
     const user = new Parse.User();
     user.setUsername('testuser');
     user.setPassword('password');
     user.set('email', 'test@parse.com');
     await user.signUp();
 
     await Parse.User.requestPasswordReset('test@parse.com');
     expect(hit).toBe(1);
     expect(sendPasswordResetEmailCalled).toBe(true);
-    done();
   });

Apply the same pattern to tests 2-5 by removing async done =>, removing the done() calls at the end, and ensuring all async operations use await.

🤖 Prompt for AI Agents
In spec/CloudCode.spec.js around lines 4660 to 4856, tests 1–5 for
beforePasswordResetRequest currently use the callback-style "async done =>" and
explicit done() calls; refactor each of those five tests to use promise-style
async/await by removing the done parameter and all done() invocations, ensure
every asynchronous call is awaited (e.g., reconfigureServer, user.signUp,
user.save, Parse.User.requestPasswordReset), and remove any try/catch that only
exists to call done(); keep existing assertions and control-flow (throwing on
unexpected success) but rely on async/await to surface failures.

@mtrezza
Copy link
Member

mtrezza commented Nov 8, 2025

@coratgerl Yes, I think if new channel are introduced, we don't want a separate trigger, but just a parameter that indicates the channel for example. So I'd stick with:

  • beforePasswordResetRequest --> user requests reset (via email, phone, etc)
  • beforePasswordReset --> user submits form, password reset process is about to start
  • afterPasswordReset --> password reset process completed

Which is what you currently have, so I think we're good, right?

@coratgerl
Copy link
Contributor Author

Yes seems logic for me

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Add beforePasswordResetRequest trigger

3 participants