Files
readur/tests/integration_users_tests.rs

519 lines
18 KiB
Rust

#[cfg(test)]
mod tests {
use crate::models::{CreateUser, UpdateUser, UserResponse, AuthProvider, UserRole};
use crate::test_utils::{TestContext, TestAuthHelper};
use axum::http::StatusCode;
use serde_json::json;
use tower::util::ServiceExt;
use uuid;
#[tokio::test]
async fn test_list_users() {
let ctx = TestContext::new().await;
let db = &ctx.state.db;
// Create admin user using direct database approach
let admin_data = CreateUser {
username: "adminuser".to_string(),
email: "admin@example.com".to_string(),
password: "adminpass123".to_string(),
role: Some(UserRole::Admin),
};
let admin = db.create_user(admin_data).await.expect("Failed to create admin");
// Login using TestAuthHelper for token generation
let auth_helper = TestAuthHelper::new(ctx.app.clone());
let token = auth_helper.login_user(&admin.username, "adminpass123").await;
// Create another user
let user2_data = json!({
"username": "testuser2",
"email": "test2@example.com",
"password": "password456"
});
ctx.app.clone()
.oneshot(
axum::http::Request::builder()
.method("POST")
.uri("/api/auth/register")
.header("Content-Type", "application/json")
.body(axum::body::Body::from(serde_json::to_vec(&user2_data).unwrap()))
.unwrap(),
)
.await
.unwrap();
let response = ctx.app
.oneshot(
axum::http::Request::builder()
.method("GET")
.uri("/api/users")
.header("Authorization", format!("Bearer {}", token))
.body(axum::body::Body::empty())
.unwrap(),
)
.await
.unwrap();
assert_eq!(response.status(), StatusCode::OK);
let body = axum::body::to_bytes(response.into_body(), usize::MAX)
.await
.unwrap();
let users: Vec<UserResponse> = serde_json::from_slice(&body).unwrap();
assert_eq!(users.len(), 2);
assert!(users.iter().any(|u| u.username == "adminuser"));
assert!(users.iter().any(|u| u.username == "testuser2"));
}
#[tokio::test]
async fn test_get_user_by_id() {
let ctx = TestContext::new().await;
let auth_helper = TestAuthHelper::new(ctx.app.clone());
let admin = auth_helper.create_admin_user().await;
let token = auth_helper.login_user(&admin.username, "adminpass123").await;
let response = ctx.app
.oneshot(
axum::http::Request::builder()
.method("GET")
.uri(format!("/api/users/{}", admin.id()))
.header("Authorization", format!("Bearer {}", token))
.body(axum::body::Body::empty())
.unwrap(),
)
.await
.unwrap();
assert_eq!(response.status(), StatusCode::OK);
let body = axum::body::to_bytes(response.into_body(), usize::MAX)
.await
.unwrap();
let fetched_user: UserResponse = serde_json::from_slice(&body).unwrap();
assert_eq!(fetched_user.id.to_string(), admin.id());
assert_eq!(fetched_user.username, admin.username);
assert_eq!(fetched_user.email, admin.user_response.email);
}
#[tokio::test]
async fn test_create_user_via_api() {
let ctx = TestContext::new().await;
let auth_helper = TestAuthHelper::new(ctx.app.clone());
let admin = auth_helper.create_admin_user().await;
let token = auth_helper.login_user(&admin.username, "adminpass123").await;
let new_user_data = CreateUser {
username: "newuser".to_string(),
email: "new@example.com".to_string(),
password: "newpassword".to_string(),
role: Some(crate::models::UserRole::User),
};
let response = ctx.app
.oneshot(
axum::http::Request::builder()
.method("POST")
.uri("/api/users")
.header("Authorization", format!("Bearer {}", token))
.header("Content-Type", "application/json")
.body(axum::body::Body::from(serde_json::to_vec(&new_user_data).unwrap()))
.unwrap(),
)
.await
.unwrap();
assert_eq!(response.status(), StatusCode::OK);
let body = axum::body::to_bytes(response.into_body(), usize::MAX)
.await
.unwrap();
let created_user: UserResponse = serde_json::from_slice(&body).unwrap();
assert_eq!(created_user.username, "newuser");
assert_eq!(created_user.email, "new@example.com");
}
#[tokio::test]
async fn test_update_user() {
let ctx = TestContext::new().await;
let db = &ctx.state.db;
// Create admin user using direct database approach
let admin_data = CreateUser {
username: "adminuser".to_string(),
email: "admin@example.com".to_string(),
password: "adminpass123".to_string(),
role: Some(UserRole::Admin),
};
let admin = db.create_user(admin_data).await.expect("Failed to create admin");
// Login using TestAuthHelper for token generation
let auth_helper = TestAuthHelper::new(ctx.app.clone());
let token = auth_helper.login_user(&admin.username, "adminpass123").await;
// Create a regular user using direct database approach
let user_data = CreateUser {
username: "testuser".to_string(),
email: "test@example.com".to_string(),
password: "password123".to_string(),
role: Some(UserRole::User),
};
let user = db.create_user(user_data).await.expect("Failed to create user");
let update_data = UpdateUser {
username: Some("updateduser".to_string()),
email: Some("updated@example.com".to_string()),
password: None,
};
let response = ctx.app
.oneshot(
axum::http::Request::builder()
.method("PUT")
.uri(format!("/api/users/{}", user.id))
.header("Authorization", format!("Bearer {}", token))
.header("Content-Type", "application/json")
.body(axum::body::Body::from(serde_json::to_vec(&update_data).unwrap()))
.unwrap(),
)
.await
.unwrap();
assert_eq!(response.status(), StatusCode::OK);
let body = axum::body::to_bytes(response.into_body(), usize::MAX)
.await
.unwrap();
let updated_user: UserResponse = serde_json::from_slice(&body).unwrap();
assert_eq!(updated_user.username, "updateduser");
assert_eq!(updated_user.email, "updated@example.com");
}
#[tokio::test]
async fn test_update_user_password() {
let ctx = TestContext::new().await;
let db = &ctx.state.db;
// Create admin user using direct database approach
let admin_data = CreateUser {
username: "adminuser".to_string(),
email: "admin@example.com".to_string(),
password: "adminpass123".to_string(),
role: Some(UserRole::Admin),
};
let admin = db.create_user(admin_data).await.expect("Failed to create admin");
// Login using TestAuthHelper for token generation
let auth_helper = TestAuthHelper::new(ctx.app.clone());
let token = auth_helper.login_user(&admin.username, "adminpass123").await;
// Create a regular user using direct database approach
let user_data = CreateUser {
username: "testuser".to_string(),
email: "test@example.com".to_string(),
password: "password123".to_string(),
role: Some(UserRole::User),
};
let user = db.create_user(user_data).await.expect("Failed to create user");
let update_data = UpdateUser {
username: None,
email: None,
password: Some("newpassword456".to_string()),
};
let response = ctx.app
.clone()
.oneshot(
axum::http::Request::builder()
.method("PUT")
.uri(format!("/api/users/{}", user.id))
.header("Authorization", format!("Bearer {}", token))
.header("Content-Type", "application/json")
.body(axum::body::Body::from(serde_json::to_vec(&update_data).unwrap()))
.unwrap(),
)
.await
.unwrap();
assert_eq!(response.status(), StatusCode::OK);
// Verify new password works
let new_token = auth_helper.login_user("testuser", "newpassword456").await;
assert!(!new_token.is_empty());
}
#[tokio::test]
async fn test_delete_user() {
let ctx = TestContext::new().await;
let auth_helper = TestAuthHelper::new(ctx.app.clone());
let admin = auth_helper.create_admin_user().await;
let token = auth_helper.login_user(&admin.username, "adminpass123").await;
// Create another user to delete
let user2_data = json!({
"username": "deleteuser",
"email": "delete@example.com",
"password": "password456"
});
let response = ctx.app
.clone()
.oneshot(
axum::http::Request::builder()
.method("POST")
.uri("/api/auth/register")
.header("Content-Type", "application/json")
.body(axum::body::Body::from(serde_json::to_vec(&user2_data).unwrap()))
.unwrap(),
)
.await
.unwrap();
let body = axum::body::to_bytes(response.into_body(), usize::MAX)
.await
.unwrap();
let user2: UserResponse = serde_json::from_slice(&body).unwrap();
// Delete the user
let response = ctx.app
.clone()
.oneshot(
axum::http::Request::builder()
.method("DELETE")
.uri(format!("/api/users/{}", user2.id))
.header("Authorization", format!("Bearer {}", token))
.body(axum::body::Body::empty())
.unwrap(),
)
.await
.unwrap();
assert_eq!(response.status(), StatusCode::NO_CONTENT);
// Verify user is deleted
let response = ctx.app
.oneshot(
axum::http::Request::builder()
.method("GET")
.uri(format!("/api/users/{}", user2.id))
.header("Authorization", format!("Bearer {}", token))
.body(axum::body::Body::empty())
.unwrap(),
)
.await
.unwrap();
assert_eq!(response.status(), StatusCode::NOT_FOUND);
}
#[tokio::test]
async fn test_cannot_delete_self() {
let ctx = TestContext::new().await;
let auth_helper = TestAuthHelper::new(ctx.app.clone());
let admin = auth_helper.create_admin_user().await;
let token = auth_helper.login_user(&admin.username, "adminpass123").await;
let response = ctx.app
.oneshot(
axum::http::Request::builder()
.method("DELETE")
.uri(format!("/api/users/{}", admin.id()))
.header("Authorization", format!("Bearer {}", token))
.body(axum::body::Body::empty())
.unwrap(),
)
.await
.unwrap();
assert_eq!(response.status(), StatusCode::FORBIDDEN);
}
#[tokio::test]
async fn test_users_require_auth() {
let ctx = TestContext::new().await;
let response = ctx.app
.oneshot(
axum::http::Request::builder()
.method("GET")
.uri("/api/users")
.body(axum::body::Body::empty())
.unwrap(),
)
.await
.unwrap();
assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
}
// OIDC Database Tests
#[tokio::test]
async fn test_create_oidc_user() {
let ctx = TestContext::new().await;
let db = &ctx.state.db;
// Generate random identifiers to avoid test interference
let test_id = uuid::Uuid::new_v4().to_string()[..8].to_string();
let test_username = format!("oidcuser_{}", test_id);
let test_email = format!("oidc_{}@example.com", test_id);
let test_subject = format!("oidc-subject-{}", test_id);
let create_user = CreateUser {
username: test_username.clone(),
email: test_email.clone(),
password: "".to_string(), // Not used for OIDC
role: Some(UserRole::User),
};
let user = db.create_oidc_user(
create_user,
&test_subject,
"https://provider.example.com",
&test_email,
).await.unwrap();
assert_eq!(user.username, test_username);
assert_eq!(user.email, test_email);
assert_eq!(user.oidc_subject, Some(test_subject));
assert_eq!(user.oidc_issuer, Some("https://provider.example.com".to_string()));
assert_eq!(user.oidc_email, Some(test_email.clone()));
assert_eq!(user.auth_provider, AuthProvider::Oidc);
assert!(user.password_hash.is_none());
}
#[tokio::test]
async fn test_get_user_by_oidc_subject() {
let ctx = TestContext::new().await;
let db = &ctx.state.db;
// Generate random identifiers to avoid test interference
let test_id = uuid::Uuid::new_v4().to_string()[..8].to_string();
let test_username = format!("oidcuser_{}", test_id);
let test_email = format!("oidc_{}@example.com", test_id);
let test_subject = format!("oidc-subject-{}", test_id);
// Create OIDC user
let create_user = CreateUser {
username: test_username,
email: test_email.clone(),
password: "".to_string(),
role: Some(UserRole::User),
};
let created_user = db.create_oidc_user(
create_user,
&test_subject,
"https://provider.example.com",
&test_email,
).await.unwrap();
// Retrieve by OIDC subject
let found_user = db.get_user_by_oidc_subject(
&test_subject,
"https://provider.example.com"
).await.unwrap();
assert!(found_user.is_some());
let user = found_user.unwrap();
assert_eq!(user.id, created_user.id);
assert_eq!(user.oidc_subject, Some(test_subject));
}
#[tokio::test]
async fn test_get_user_by_oidc_subject_not_found() {
let ctx = TestContext::new().await;
let db = &ctx.state.db;
// Generate random subject that definitely doesn't exist
let test_id = uuid::Uuid::new_v4().to_string();
let nonexistent_subject = format!("nonexistent-subject-{}", test_id);
let found_user = db.get_user_by_oidc_subject(
&nonexistent_subject,
"https://provider.example.com"
).await.unwrap();
assert!(found_user.is_none());
}
#[tokio::test]
async fn test_oidc_user_different_issuer() {
let ctx = TestContext::new().await;
let db = &ctx.state.db;
// Generate random identifiers to avoid test interference
let test_id = uuid::Uuid::new_v4().to_string()[..8].to_string();
let test_username = format!("oidcuser_{}", test_id);
let test_email = format!("oidc_{}@example.com", test_id);
let test_subject = format!("same-subject-{}", test_id);
// Create OIDC user with one issuer
let create_user = CreateUser {
username: test_username,
email: test_email.clone(),
password: "".to_string(),
role: Some(UserRole::User),
};
db.create_oidc_user(
create_user,
&test_subject,
"https://provider1.example.com",
&test_email,
).await.unwrap();
// Try to find with different issuer (should not find)
let found_user = db.get_user_by_oidc_subject(
&test_subject,
"https://provider2.example.com"
).await.unwrap();
assert!(found_user.is_none());
}
#[tokio::test]
async fn test_local_user_login_works() {
let ctx = TestContext::new().await;
let db = &ctx.state.db;
// Create regular local user
let create_user = CreateUser {
username: "localuser".to_string(),
email: "local@example.com".to_string(),
password: "password123".to_string(),
role: Some(UserRole::User),
};
let user = db.create_user(create_user).await.unwrap();
assert_eq!(user.auth_provider, AuthProvider::Local);
assert!(user.password_hash.is_some());
assert!(user.oidc_subject.is_none());
// Test login still works
let login_data = json!({
"username": "localuser",
"password": "password123"
});
let response = ctx.app
.oneshot(
axum::http::Request::builder()
.method("POST")
.uri("/api/auth/login")
.header("Content-Type", "application/json")
.body(axum::body::Body::from(serde_json::to_vec(&login_data).unwrap()))
.unwrap(),
)
.await
.unwrap();
assert_eq!(response.status(), StatusCode::OK);
}
}