steam 2fa for polling and security
This commit is contained in:
@@ -4,7 +4,9 @@ import (
|
||||
"acc-server-manager/local/middleware"
|
||||
"acc-server-manager/local/service"
|
||||
"acc-server-manager/local/utl/cache"
|
||||
"acc-server-manager/local/utl/jwt"
|
||||
"acc-server-manager/tests"
|
||||
"os"
|
||||
|
||||
"github.com/gofiber/fiber/v2"
|
||||
)
|
||||
@@ -15,9 +17,18 @@ type MockMiddleware struct{}
|
||||
// GetTestAuthMiddleware returns a mock auth middleware that can be used in place of the real one
|
||||
// This works because we're adding real authentication tokens to requests
|
||||
func GetTestAuthMiddleware(ms *service.MembershipService, cache *cache.InMemoryCache) *middleware.AuthMiddleware {
|
||||
// Use environment JWT secrets for consistency with token generation
|
||||
jwtSecret := os.Getenv("JWT_SECRET")
|
||||
if jwtSecret == "" {
|
||||
jwtSecret = "test-secret-that-is-at-least-32-bytes-long-for-security"
|
||||
}
|
||||
|
||||
jwtHandler := jwt.NewJWTHandler(jwtSecret)
|
||||
openJWTHandler := jwt.NewOpenJWTHandler(jwtSecret) // Use same secret for test consistency
|
||||
|
||||
// Cast our mock to the real type for testing
|
||||
// This is a type-unsafe cast but works for testing because we're using real JWT tokens
|
||||
return middleware.NewAuthMiddleware(ms, cache)
|
||||
return middleware.NewAuthMiddleware(ms, cache, jwtHandler, openJWTHandler)
|
||||
}
|
||||
|
||||
// AddAuthToRequest adds a valid authentication token to a test request
|
||||
|
||||
@@ -7,6 +7,7 @@ import (
|
||||
"acc-server-manager/local/service"
|
||||
"acc-server-manager/local/utl/cache"
|
||||
"acc-server-manager/local/utl/common"
|
||||
"acc-server-manager/local/utl/jwt"
|
||||
"acc-server-manager/tests"
|
||||
"acc-server-manager/tests/testdata"
|
||||
"encoding/json"
|
||||
@@ -14,6 +15,7 @@ import (
|
||||
"io"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"os"
|
||||
"testing"
|
||||
|
||||
"github.com/gofiber/fiber/v2"
|
||||
@@ -32,7 +34,13 @@ func TestStateHistoryController_GetAll_Success(t *testing.T) {
|
||||
stateHistoryService := service.NewStateHistoryService(repo)
|
||||
|
||||
membershipRepo := repository.NewMembershipRepository(helper.DB)
|
||||
membershipService := service.NewMembershipService(membershipRepo)
|
||||
jwtSecret := os.Getenv("JWT_SECRET")
|
||||
if jwtSecret == "" {
|
||||
jwtSecret = "test-secret-that-is-at-least-32-bytes-long-for-security"
|
||||
}
|
||||
jwtHandler := jwt.NewJWTHandler(jwtSecret)
|
||||
openJWTHandler := jwt.NewOpenJWTHandler(jwtSecret)
|
||||
membershipService := service.NewMembershipService(membershipRepo, jwtHandler, openJWTHandler)
|
||||
|
||||
inMemCache := cache.NewInMemoryCache()
|
||||
|
||||
@@ -86,7 +94,13 @@ func TestStateHistoryController_GetAll_WithSessionFilter(t *testing.T) {
|
||||
stateHistoryService := service.NewStateHistoryService(repo)
|
||||
|
||||
membershipRepo := repository.NewMembershipRepository(helper.DB)
|
||||
membershipService := service.NewMembershipService(membershipRepo)
|
||||
jwtSecret := os.Getenv("JWT_SECRET")
|
||||
if jwtSecret == "" {
|
||||
jwtSecret = "test-secret-that-is-at-least-32-bytes-long-for-security"
|
||||
}
|
||||
jwtHandler := jwt.NewJWTHandler(jwtSecret)
|
||||
openJWTHandler := jwt.NewOpenJWTHandler(jwtSecret)
|
||||
membershipService := service.NewMembershipService(membershipRepo, jwtHandler, openJWTHandler)
|
||||
|
||||
inMemCache := cache.NewInMemoryCache()
|
||||
|
||||
@@ -145,7 +159,13 @@ func TestStateHistoryController_GetAll_EmptyResult(t *testing.T) {
|
||||
stateHistoryService := service.NewStateHistoryService(repo)
|
||||
|
||||
membershipRepo := repository.NewMembershipRepository(helper.DB)
|
||||
membershipService := service.NewMembershipService(membershipRepo)
|
||||
jwtSecret := os.Getenv("JWT_SECRET")
|
||||
if jwtSecret == "" {
|
||||
jwtSecret = "test-secret-that-is-at-least-32-bytes-long-for-security"
|
||||
}
|
||||
jwtHandler := jwt.NewJWTHandler(jwtSecret)
|
||||
openJWTHandler := jwt.NewOpenJWTHandler(jwtSecret)
|
||||
membershipService := service.NewMembershipService(membershipRepo, jwtHandler, openJWTHandler)
|
||||
|
||||
inMemCache := cache.NewInMemoryCache()
|
||||
|
||||
@@ -185,7 +205,13 @@ func TestStateHistoryController_GetStatistics_Success(t *testing.T) {
|
||||
stateHistoryService := service.NewStateHistoryService(repo)
|
||||
|
||||
membershipRepo := repository.NewMembershipRepository(helper.DB)
|
||||
membershipService := service.NewMembershipService(membershipRepo)
|
||||
jwtSecret := os.Getenv("JWT_SECRET")
|
||||
if jwtSecret == "" {
|
||||
jwtSecret = "test-secret-that-is-at-least-32-bytes-long-for-security"
|
||||
}
|
||||
jwtHandler := jwt.NewJWTHandler(jwtSecret)
|
||||
openJWTHandler := jwt.NewOpenJWTHandler(jwtSecret)
|
||||
membershipService := service.NewMembershipService(membershipRepo, jwtHandler, openJWTHandler)
|
||||
|
||||
inMemCache := cache.NewInMemoryCache()
|
||||
|
||||
@@ -262,7 +288,13 @@ func TestStateHistoryController_GetStatistics_NoData(t *testing.T) {
|
||||
stateHistoryService := service.NewStateHistoryService(repo)
|
||||
|
||||
membershipRepo := repository.NewMembershipRepository(helper.DB)
|
||||
membershipService := service.NewMembershipService(membershipRepo)
|
||||
jwtSecret := os.Getenv("JWT_SECRET")
|
||||
if jwtSecret == "" {
|
||||
jwtSecret = "test-secret-that-is-at-least-32-bytes-long-for-security"
|
||||
}
|
||||
jwtHandler := jwt.NewJWTHandler(jwtSecret)
|
||||
openJWTHandler := jwt.NewOpenJWTHandler(jwtSecret)
|
||||
membershipService := service.NewMembershipService(membershipRepo, jwtHandler, openJWTHandler)
|
||||
|
||||
inMemCache := cache.NewInMemoryCache()
|
||||
|
||||
@@ -321,7 +353,13 @@ func TestStateHistoryController_GetStatistics_InvalidQueryParams(t *testing.T) {
|
||||
stateHistoryService := service.NewStateHistoryService(repo)
|
||||
|
||||
membershipRepo := repository.NewMembershipRepository(helper.DB)
|
||||
membershipService := service.NewMembershipService(membershipRepo)
|
||||
jwtSecret := os.Getenv("JWT_SECRET")
|
||||
if jwtSecret == "" {
|
||||
jwtSecret = "test-secret-that-is-at-least-32-bytes-long-for-security"
|
||||
}
|
||||
jwtHandler := jwt.NewJWTHandler(jwtSecret)
|
||||
openJWTHandler := jwt.NewOpenJWTHandler(jwtSecret)
|
||||
membershipService := service.NewMembershipService(membershipRepo, jwtHandler, openJWTHandler)
|
||||
|
||||
inMemCache := cache.NewInMemoryCache()
|
||||
|
||||
@@ -365,7 +403,13 @@ func TestStateHistoryController_HTTPMethods(t *testing.T) {
|
||||
stateHistoryService := service.NewStateHistoryService(repo)
|
||||
|
||||
membershipRepo := repository.NewMembershipRepository(helper.DB)
|
||||
membershipService := service.NewMembershipService(membershipRepo)
|
||||
jwtSecret := os.Getenv("JWT_SECRET")
|
||||
if jwtSecret == "" {
|
||||
jwtSecret = "test-secret-that-is-at-least-32-bytes-long-for-security"
|
||||
}
|
||||
jwtHandler := jwt.NewJWTHandler(jwtSecret)
|
||||
openJWTHandler := jwt.NewOpenJWTHandler(jwtSecret)
|
||||
membershipService := service.NewMembershipService(membershipRepo, jwtHandler, openJWTHandler)
|
||||
|
||||
inMemCache := cache.NewInMemoryCache()
|
||||
|
||||
@@ -419,7 +463,13 @@ func TestStateHistoryController_ContentType(t *testing.T) {
|
||||
stateHistoryService := service.NewStateHistoryService(repo)
|
||||
|
||||
membershipRepo := repository.NewMembershipRepository(helper.DB)
|
||||
membershipService := service.NewMembershipService(membershipRepo)
|
||||
jwtSecret := os.Getenv("JWT_SECRET")
|
||||
if jwtSecret == "" {
|
||||
jwtSecret = "test-secret-that-is-at-least-32-bytes-long-for-security"
|
||||
}
|
||||
jwtHandler := jwt.NewJWTHandler(jwtSecret)
|
||||
openJWTHandler := jwt.NewOpenJWTHandler(jwtSecret)
|
||||
membershipService := service.NewMembershipService(membershipRepo, jwtHandler, openJWTHandler)
|
||||
|
||||
inMemCache := cache.NewInMemoryCache()
|
||||
|
||||
@@ -481,7 +531,13 @@ func TestStateHistoryController_ResponseStructure(t *testing.T) {
|
||||
stateHistoryService := service.NewStateHistoryService(repo)
|
||||
|
||||
membershipRepo := repository.NewMembershipRepository(helper.DB)
|
||||
membershipService := service.NewMembershipService(membershipRepo)
|
||||
jwtSecret := os.Getenv("JWT_SECRET")
|
||||
if jwtSecret == "" {
|
||||
jwtSecret = "test-secret-that-is-at-least-32-bytes-long-for-security"
|
||||
}
|
||||
jwtHandler := jwt.NewJWTHandler(jwtSecret)
|
||||
openJWTHandler := jwt.NewOpenJWTHandler(jwtSecret)
|
||||
membershipService := service.NewMembershipService(membershipRepo, jwtHandler, openJWTHandler)
|
||||
|
||||
inMemCache := cache.NewInMemoryCache()
|
||||
|
||||
|
||||
@@ -5,6 +5,7 @@ import (
|
||||
"acc-server-manager/local/utl/jwt"
|
||||
"acc-server-manager/local/utl/password"
|
||||
"acc-server-manager/tests"
|
||||
"os"
|
||||
"testing"
|
||||
|
||||
"github.com/google/uuid"
|
||||
@@ -15,6 +16,8 @@ func TestJWT_GenerateAndValidateToken(t *testing.T) {
|
||||
helper := tests.NewTestHelper(t)
|
||||
defer helper.Cleanup()
|
||||
|
||||
jwtHandler := jwt.NewJWTHandler(os.Getenv("JWT_SECRET"))
|
||||
|
||||
// Create test user
|
||||
user := &model.User{
|
||||
ID: uuid.New(),
|
||||
@@ -23,7 +26,7 @@ func TestJWT_GenerateAndValidateToken(t *testing.T) {
|
||||
}
|
||||
|
||||
// Test JWT generation
|
||||
token, err := jwt.GenerateToken(user)
|
||||
token, err := jwtHandler.GenerateToken(user)
|
||||
tests.AssertNoError(t, err)
|
||||
tests.AssertNotNil(t, token)
|
||||
|
||||
@@ -33,7 +36,7 @@ func TestJWT_GenerateAndValidateToken(t *testing.T) {
|
||||
}
|
||||
|
||||
// Test JWT validation
|
||||
claims, err := jwt.ValidateToken(token)
|
||||
claims, err := jwtHandler.ValidateToken(token)
|
||||
tests.AssertNoError(t, err)
|
||||
tests.AssertNotNil(t, claims)
|
||||
tests.AssertEqual(t, user.ID.String(), claims.UserID)
|
||||
@@ -43,9 +46,10 @@ func TestJWT_ValidateToken_InvalidToken(t *testing.T) {
|
||||
// Setup
|
||||
helper := tests.NewTestHelper(t)
|
||||
defer helper.Cleanup()
|
||||
jwtHandler := jwt.NewJWTHandler(os.Getenv("JWT_SECRET"))
|
||||
|
||||
// Test with invalid token
|
||||
claims, err := jwt.ValidateToken("invalid-token")
|
||||
claims, err := jwtHandler.ValidateToken("invalid-token")
|
||||
if err == nil {
|
||||
t.Fatal("Expected error for invalid token, got nil")
|
||||
}
|
||||
@@ -59,9 +63,10 @@ func TestJWT_ValidateToken_EmptyToken(t *testing.T) {
|
||||
// Setup
|
||||
helper := tests.NewTestHelper(t)
|
||||
defer helper.Cleanup()
|
||||
jwtHandler := jwt.NewJWTHandler(os.Getenv("JWT_SECRET"))
|
||||
|
||||
// Test with empty token
|
||||
claims, err := jwt.ValidateToken("")
|
||||
claims, err := jwtHandler.ValidateToken("")
|
||||
if err == nil {
|
||||
t.Fatal("Expected error for empty token, got nil")
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user