Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions .changeset/fix-astro-v6-cloudflare.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
'@clerk/astro': patch
---

Fix compatibility with Astro v6 Cloudflare adapter by using `cloudflare:workers` env when `locals.runtime.env` is unavailable
2 changes: 1 addition & 1 deletion packages/astro/package.json
Original file line number Diff line number Diff line change
Expand Up @@ -100,7 +100,7 @@
"astro": "^5.17.1"
},
"peerDependencies": {
"astro": "^4.15.0 || ^5.0.0"
"astro": "^4.15.0 || ^5.0.0 || ^6.0.0"
},
"engines": {
"node": ">=20.9.0"
Expand Down
2 changes: 1 addition & 1 deletion packages/astro/src/env.d.ts
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ interface ImportMeta {

declare namespace App {
interface Locals {
runtime: { env: InternalEnv };
runtime?: { env: InternalEnv };
keylessClaimUrl?: string;
keylessApiKeysUrl?: string;
keylessPublishableKey?: string;
Expand Down
131 changes: 131 additions & 0 deletions packages/astro/src/server/__tests__/get-safe-env.test.ts
Original file line number Diff line number Diff line change
@@ -0,0 +1,131 @@
import { afterEach, beforeEach, describe, expect, it, vi } from 'vitest';

describe('get-safe-env', () => {
beforeEach(() => {
vi.resetModules();
});

afterEach(() => {
vi.restoreAllMocks();
});

describe('initCloudflareEnv', () => {
it('caches env from cloudflare:workers when available', async () => {
vi.doMock('cloudflare:workers', () => ({
env: { CLERK_SECRET_KEY: 'sk_test_cf' },
}));

const { initCloudflareEnv, getSafeEnv } = await import('../get-safe-env');

await initCloudflareEnv();

const env = getSafeEnv({ locals: {} } as any);
expect(env.sk).toBe('sk_test_cf');
});

it('sets cache to null when cloudflare:workers is not available', async () => {
vi.doMock('cloudflare:workers', () => {
throw new Error('Module not found');
});

const { initCloudflareEnv, getSafeEnv } = await import('../get-safe-env');

await initCloudflareEnv();

// Should fall through to import.meta.env (undefined in test)
const env = getSafeEnv({ locals: {} } as any);
expect(env.sk).toBeUndefined();
});

it('only imports once (caches result)', async () => {
let importCount = 0;
vi.doMock('cloudflare:workers', () => {
importCount++;
return { env: { CLERK_SECRET_KEY: 'sk_test_cf' } };
});

const { initCloudflareEnv } = await import('../get-safe-env');

await initCloudflareEnv();
await initCloudflareEnv();
await initCloudflareEnv();

expect(importCount).toBe(1);
});

it('only imports once even when cloudflare:workers throws', async () => {
let importCount = 0;
vi.doMock('cloudflare:workers', () => {
importCount++;
throw new Error('Module not found');
});

const { initCloudflareEnv } = await import('../get-safe-env');

await initCloudflareEnv();
await initCloudflareEnv();

expect(importCount).toBe(1);
});
});

describe('getContextEnvVar fallback chain', () => {
it('reads from locals.runtime.env (Astro v4/v5)', async () => {
const { getSafeEnv } = await import('../get-safe-env');
const locals = { runtime: { env: { CLERK_SECRET_KEY: 'sk_from_runtime' } } };

const env = getSafeEnv({ locals } as any);
expect(env.sk).toBe('sk_from_runtime');
});

it('falls back to cloudflareEnv when locals.runtime.env is absent', async () => {
vi.doMock('cloudflare:workers', () => ({
env: { CLERK_SECRET_KEY: 'sk_from_cf_workers' },
}));

const { initCloudflareEnv, getSafeEnv } = await import('../get-safe-env');
await initCloudflareEnv();

const env = getSafeEnv({ locals: {} } as any);
expect(env.sk).toBe('sk_from_cf_workers');
});

it('falls back to cloudflareEnv when locals.runtime throws (Astro v6)', async () => {
vi.doMock('cloudflare:workers', () => ({
env: { CLERK_SECRET_KEY: 'sk_from_cf_workers' },
}));

const { initCloudflareEnv, getSafeEnv } = await import('../get-safe-env');
await initCloudflareEnv();

// Simulate Astro v6 behavior: accessing runtime throws
const locals = new Proxy(
{},
{
get(_, prop) {
if (prop === 'runtime') {
throw new Error('locals.runtime is not available in Astro v6 Cloudflare');
}
return undefined;
},
},
);

const env = getSafeEnv({ locals } as any);
expect(env.sk).toBe('sk_from_cf_workers');
});

it('prefers locals.runtime.env over cloudflareEnv', async () => {
vi.doMock('cloudflare:workers', () => ({
env: { CLERK_SECRET_KEY: 'sk_from_cf_workers' },
}));

const { initCloudflareEnv, getSafeEnv } = await import('../get-safe-env');
await initCloudflareEnv();

const locals = { runtime: { env: { CLERK_SECRET_KEY: 'sk_from_runtime' } } };
const env = getSafeEnv({ locals } as any);
expect(env.sk).toBe('sk_from_runtime');
});
});
});
4 changes: 3 additions & 1 deletion packages/astro/src/server/clerk-middleware.ts
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ import { canUseKeyless } from '../utils/feature-flags';
import { buildClerkHotloadScript } from './build-clerk-hotload-script';
import { clerkClient } from './clerk-client';
import { createCurrentUser } from './current-user';
import { getClientSafeEnv, getSafeEnv } from './get-safe-env';
import { getClientSafeEnv, getSafeEnv, initCloudflareEnv } from './get-safe-env';
import { resolveKeysWithKeylessFallback } from './keyless/utils';
import { serverRedirectWithAuth } from './server-redirect-with-auth';
import type {
Expand Down Expand Up @@ -79,6 +79,8 @@ export const clerkMiddleware: ClerkMiddleware = (...args: unknown[]): any => {
return next();
}

await initCloudflareEnv();

const clerkRequest = createClerkRequest(context.request);

// Resolve keyless URLs per-request in development
Expand Down
44 changes: 41 additions & 3 deletions packages/astro/src/server/get-safe-env.ts
Original file line number Diff line number Diff line change
Expand Up @@ -3,15 +3,53 @@ import type { APIContext } from 'astro';

type ContextOrLocals = APIContext | APIContext['locals'];

/**
* Cached env object from `cloudflare:workers` for Astro v6+ Cloudflare adapter.
* - `undefined`: not yet attempted
* - `null`: attempted but not available (non-Cloudflare environment)
* - object: the env object from `cloudflare:workers`
*/
let cloudflareEnv: Record<string, string> | null | undefined;

/**
* @internal
* Attempts to import env from `cloudflare:workers` and caches the result.
* This is needed for Astro v6+ where `locals.runtime.env` is no longer available.
* Safe to call in non-Cloudflare environments — will no-op.
*/
async function initCloudflareEnv(): Promise<void> {
if (cloudflareEnv !== undefined) {
return;
}
try {
// Use a variable to prevent TypeScript from resolving the module specifier
const moduleName = 'cloudflare:workers';
const mod = await import(/* @vite-ignore */ moduleName);
cloudflareEnv = mod.env;
} catch {
cloudflareEnv = null;
}
}
Comment on lines +6 to +32
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

🧩 Analysis chain

🏁 Script executed:

#!/bin/bash
# Check whether any tests were changed in this PR
git diff --name-only origin/main...HEAD | rg -i '(__tests__|test|spec)\.(ts|tsx|js|jsx)$' 

# Search for existing tests covering the new Cloudflare env fallback path
rg -n 'initCloudflareEnv|getContextEnvVar|cloudflare:workers' \
  -g '**/__tests__/**' -g '*.{test,spec}.{ts,tsx,js,jsx}' 2>/dev/null || true

Repository: clerk/javascript

Length of output: 100


🏁 Script executed:

#!/bin/bash
# Find the packages/astro directory and look for test files
find packages/astro -type f \( -name '*.test.ts' -o -name '*.test.tsx' -o -name '*.spec.ts' -o -name '*.spec.tsx' -o -path '*/__tests__/*' \) | head -20

# Also check the structure of the packages/astro directory
echo "=== packages/astro structure ==="
find packages/astro -type d | head -20

# Search across all test files for cloudflare-related tests
echo "=== Searching for cloudflare env tests ==="
rg 'cloudflare.*env|initCloudflareEnv' --type ts --type tsx 2>/dev/null || echo "No matches found"

# Look for getContextEnvVar or get-safe-env related tests
echo "=== Searching for get-safe-env tests ==="
rg 'getSafeEnv|getContextEnvVar|get-safe-env' --type ts --type tsx 2>/dev/null | head -20 || echo "No matches found"

Repository: clerk/javascript

Length of output: 995


🏁 Script executed:

#!/bin/bash
# Read the complete get-safe-env.ts file
echo "=== packages/astro/src/server/get-safe-env.ts ==="
cat packages/astro/src/server/get-safe-env.ts

echo ""
echo "=== Checking if any test files import get-safe-env ==="
rg 'get-safe-env|getSafeEnv' packages/astro/src --type ts --type tsx

echo ""
echo "=== Contents of the existing test file ==="
cat packages/astro/src/internal/__tests__/create-clerk-instance.test.ts | head -100

Repository: clerk/javascript

Length of output: 8030


Add tests for the Cloudflare env fallback logic.

The new initCloudflareEnv() function and the cloudflareEnv fallback path in getContextEnvVar() (lines 20–33 and 47–50) lack test coverage. Add tests to verify that the fallback correctly imports from cloudflare:workers in Cloudflare environments and gracefully handles non-Cloudflare environments.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@packages/astro/src/server/get-safe-env.ts` around lines 6 - 32, Add unit
tests covering the Cloudflare env fallback: write tests for initCloudflareEnv,
the cached cloudflareEnv value, and getContextEnvVar's fallback behavior when
cloudflare:workers is present and when it throws. In one test mock dynamic
import of the moduleName 'cloudflare:workers' to return an object with env
(e.g., {env: {KEY: "value"}}), call initCloudflareEnv() and assert cloudflareEnv
is set and getContextEnvVar('KEY') returns the mocked value; in another test
mock the dynamic import to throw, call initCloudflareEnv(), assert cloudflareEnv
becomes null and getContextEnvVar('KEY') falls back to the non-Cloudflare path.
Ensure tests reset/clear the cloudflareEnv cache between cases so caching
behavior is validated.


/**
* @internal
* Isomorphic handler for reading environment variables defined from Vite or are injected in the request context (CF Pages)
*/
function getContextEnvVar(envVarName: keyof InternalEnv, contextOrLocals: ContextOrLocals): string | undefined {
const locals = 'locals' in contextOrLocals ? contextOrLocals.locals : contextOrLocals;

if (locals?.runtime?.env) {
return locals.runtime.env[envVarName];
// Astro v4/v5 Cloudflare adapter: env is on locals.runtime.env
try {
if (locals?.runtime?.env) {
return locals.runtime.env[envVarName];
}
} catch {
// Astro v6 Cloudflare adapter throws when accessing locals.runtime.env
}

// Astro v6 Cloudflare adapter: env from cloudflare:workers
if (cloudflareEnv) {
return cloudflareEnv[envVarName];
}

return import.meta.env[envVarName];
Expand Down Expand Up @@ -72,4 +110,4 @@ function getClientSafeEnv(context: ContextOrLocals) {
};
}

export { getSafeEnv, getClientSafeEnv };
export { getSafeEnv, getClientSafeEnv, initCloudflareEnv };
Loading