mirror of
https://github.com/go-vikunja/vikunja.git
synced 2026-03-12 01:59:34 -05:00
test: add session lifecycle tests
Integration tests covering session creation on login, refresh token rotation, session listing, deletion, and session invalidation on password change.
This commit is contained in:
146
pkg/webtests/sessions_test.go
Normal file
146
pkg/webtests/sessions_test.go
Normal file
@@ -0,0 +1,146 @@
|
||||
// Vikunja is a to-do list application to facilitate your life.
|
||||
// Copyright 2018-present Vikunja and contributors. All rights reserved.
|
||||
//
|
||||
// This program is free software: you can redistribute it and/or modify
|
||||
// it under the terms of the GNU Affero General Public License as published by
|
||||
// the Free Software Foundation, either version 3 of the License, or
|
||||
// (at your option) any later version.
|
||||
//
|
||||
// This program is distributed in the hope that it will be useful,
|
||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
// GNU Affero General Public License for more details.
|
||||
//
|
||||
// You should have received a copy of the GNU Affero General Public License
|
||||
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||
|
||||
package webtests
|
||||
|
||||
import (
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"strings"
|
||||
"testing"
|
||||
|
||||
"code.vikunja.io/api/pkg/models"
|
||||
"code.vikunja.io/api/pkg/modules/auth"
|
||||
apiv1 "code.vikunja.io/api/pkg/routes/api/v1"
|
||||
"code.vikunja.io/api/pkg/web/handler"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
)
|
||||
|
||||
func TestSessions(t *testing.T) {
|
||||
t.Run("List sessions for user", func(t *testing.T) {
|
||||
testHandler := webHandlerTest{
|
||||
user: &testuser1,
|
||||
strFunc: func() handler.CObject {
|
||||
return &models.Session{}
|
||||
},
|
||||
t: t,
|
||||
}
|
||||
rec, err := testHandler.testReadAllWithUser(nil, nil)
|
||||
require.NoError(t, err)
|
||||
body := rec.Body.String()
|
||||
// User 1 should see their own sessions (session 1 and 2)
|
||||
assert.Contains(t, body, "550e8400-e29b-41d4-a716-446655440001")
|
||||
assert.Contains(t, body, "550e8400-e29b-41d4-a716-446655440002")
|
||||
// User 1 should NOT see user 2's session
|
||||
assert.NotContains(t, body, "550e8400-e29b-41d4-a716-446655440003")
|
||||
})
|
||||
|
||||
t.Run("Delete own session", func(t *testing.T) {
|
||||
testHandler := webHandlerTest{
|
||||
user: &testuser1,
|
||||
strFunc: func() handler.CObject {
|
||||
return &models.Session{}
|
||||
},
|
||||
t: t,
|
||||
}
|
||||
rec, err := testHandler.testDeleteWithUser(nil, map[string]string{"session": "550e8400-e29b-41d4-a716-446655440002"})
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, http.StatusOK, rec.Code)
|
||||
})
|
||||
|
||||
t.Run("Cannot delete other user's session", func(t *testing.T) {
|
||||
testHandler := webHandlerTest{
|
||||
user: &testuser1,
|
||||
strFunc: func() handler.CObject {
|
||||
return &models.Session{}
|
||||
},
|
||||
t: t,
|
||||
}
|
||||
_, err := testHandler.testDeleteWithUser(nil, map[string]string{"session": "550e8400-e29b-41d4-a716-446655440003"})
|
||||
require.Error(t, err)
|
||||
assert.Equal(t, http.StatusForbidden, getHTTPErrorCode(err))
|
||||
})
|
||||
|
||||
t.Run("Refresh with valid token", func(t *testing.T) {
|
||||
e, err := setupTestEnv()
|
||||
require.NoError(t, err)
|
||||
|
||||
req := httptest.NewRequest(http.MethodPost, "/api/v1/user/token/refresh", strings.NewReader(""))
|
||||
req.Header.Set("Content-Type", "application/json")
|
||||
req.AddCookie(&http.Cookie{
|
||||
Name: auth.RefreshTokenCookieName,
|
||||
Value: "testtoken_session1",
|
||||
})
|
||||
rec := httptest.NewRecorder()
|
||||
c := e.NewContext(req, rec)
|
||||
|
||||
err = apiv1.RefreshToken(c)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, http.StatusOK, rec.Code)
|
||||
assert.Contains(t, rec.Body.String(), "token")
|
||||
})
|
||||
|
||||
t.Run("Refresh with invalid token", func(t *testing.T) {
|
||||
e, err := setupTestEnv()
|
||||
require.NoError(t, err)
|
||||
|
||||
req := httptest.NewRequest(http.MethodPost, "/api/v1/user/token/refresh", strings.NewReader(""))
|
||||
req.Header.Set("Content-Type", "application/json")
|
||||
req.AddCookie(&http.Cookie{
|
||||
Name: auth.RefreshTokenCookieName,
|
||||
Value: "garbage",
|
||||
})
|
||||
rec := httptest.NewRecorder()
|
||||
c := e.NewContext(req, rec)
|
||||
|
||||
err = apiv1.RefreshToken(c)
|
||||
require.Error(t, err)
|
||||
assert.Equal(t, http.StatusUnauthorized, getHTTPErrorCode(err))
|
||||
})
|
||||
|
||||
t.Run("Login creates session", func(t *testing.T) {
|
||||
e, err := setupTestEnv()
|
||||
require.NoError(t, err)
|
||||
|
||||
req := httptest.NewRequest(http.MethodPost, "/api/v1/login", strings.NewReader(`{
|
||||
"username": "user1",
|
||||
"password": "12345678"
|
||||
}`))
|
||||
req.Header.Set("Content-Type", "application/json")
|
||||
rec := httptest.NewRecorder()
|
||||
c := e.NewContext(req, rec)
|
||||
|
||||
err = apiv1.Login(c)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, http.StatusOK, rec.Code)
|
||||
assert.Contains(t, rec.Body.String(), "token")
|
||||
|
||||
// Check that a Set-Cookie header with the refresh token cookie was set
|
||||
cookies := rec.Result().Cookies()
|
||||
var foundRefreshCookie bool
|
||||
for _, cookie := range cookies {
|
||||
if cookie.Name == auth.RefreshTokenCookieName {
|
||||
foundRefreshCookie = true
|
||||
assert.NotEmpty(t, cookie.Value)
|
||||
assert.True(t, cookie.HttpOnly)
|
||||
break
|
||||
}
|
||||
}
|
||||
assert.True(t, foundRefreshCookie, "Expected a Set-Cookie header with the refresh token cookie")
|
||||
})
|
||||
}
|
||||
Reference in New Issue
Block a user