backend: Add integration tests for authentication API
This commit is contained in:
parent
675050b7a4
commit
c94f262240
@ -76,7 +76,7 @@ describe('Room Request Validation Tests', () => {
|
|||||||
expect(response.body).toHaveProperty('preferences');
|
expect(response.body).toHaveProperty('preferences');
|
||||||
expect(response.body.preferences).toEqual({
|
expect(response.body.preferences).toEqual({
|
||||||
recordingPreferences: { enabled: true },
|
recordingPreferences: { enabled: true },
|
||||||
¡ chatPreferences: { enabled: true },
|
chatPreferences: { enabled: true },
|
||||||
virtualBackgroundPreferences: { enabled: true }
|
virtualBackgroundPreferences: { enabled: true }
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|||||||
230
backend/tests/integration/api/security/auth.test.ts
Normal file
230
backend/tests/integration/api/security/auth.test.ts
Normal file
@ -0,0 +1,230 @@
|
|||||||
|
import request from 'supertest';
|
||||||
|
import { describe, it, expect, beforeAll, afterAll } from '@jest/globals';
|
||||||
|
import { Express } from 'express';
|
||||||
|
import { startTestServer, stopTestServer } from '../../../utils/server-setup.js';
|
||||||
|
|
||||||
|
const INTERNAL_BASE_URL = '/meet/internal-api/v1';
|
||||||
|
const AUTH_BASE_URL = `${INTERNAL_BASE_URL}/auth`;
|
||||||
|
|
||||||
|
describe('OpenVidu Meet Authentication API Tests', () => {
|
||||||
|
let app: Express;
|
||||||
|
|
||||||
|
beforeAll(async () => {
|
||||||
|
app = await startTestServer();
|
||||||
|
});
|
||||||
|
|
||||||
|
afterAll(async () => {
|
||||||
|
await stopTestServer();
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('Login Tests', () => {
|
||||||
|
it('should successfully login with valid credentials', async () => {
|
||||||
|
const response = await request(app)
|
||||||
|
.post(`${AUTH_BASE_URL}/login`)
|
||||||
|
.send({
|
||||||
|
username: 'user',
|
||||||
|
password: 'user'
|
||||||
|
})
|
||||||
|
.expect(200);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('message');
|
||||||
|
expect(response.body.message).toBe('Login succeeded');
|
||||||
|
|
||||||
|
// Check for access token and refresh token cookies
|
||||||
|
expect(response.headers['set-cookie']).toBeDefined();
|
||||||
|
const cookies = response.headers['set-cookie'] as unknown as string[];
|
||||||
|
const accessTokenCookie = cookies.find((cookie) => cookie.startsWith('OvMeetAccessToken='));
|
||||||
|
const refreshTokenCookie = cookies.find((cookie) => cookie.startsWith('OvMeetRefreshToken='));
|
||||||
|
expect(accessTokenCookie).toBeDefined();
|
||||||
|
expect(refreshTokenCookie).toBeDefined();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return 404 for invalid credentials', async () => {
|
||||||
|
const response = await request(app)
|
||||||
|
.post(`${AUTH_BASE_URL}/login`)
|
||||||
|
.send({
|
||||||
|
username: 'user',
|
||||||
|
password: 'invalidpassword'
|
||||||
|
})
|
||||||
|
.expect(404);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('message');
|
||||||
|
expect(response.body.message).toContain('Invalid username or password');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return 422 when username is missing', async () => {
|
||||||
|
const response = await request(app)
|
||||||
|
.post(`${AUTH_BASE_URL}/login`)
|
||||||
|
.send({
|
||||||
|
password: 'user'
|
||||||
|
})
|
||||||
|
.expect(422);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('error', 'Unprocessable Entity');
|
||||||
|
expect(response.body.details[0].field).toBe('username');
|
||||||
|
expect(response.body.details[0].message).toContain('Required');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return 422 when password is missing', async () => {
|
||||||
|
const response = await request(app)
|
||||||
|
.post(`${AUTH_BASE_URL}/login`)
|
||||||
|
.send({
|
||||||
|
username: 'user'
|
||||||
|
})
|
||||||
|
.expect(422);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('error', 'Unprocessable Entity');
|
||||||
|
expect(response.body.details[0].field).toBe('password');
|
||||||
|
expect(response.body.details[0].message).toContain('Required');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return 422 when username is too short', async () => {
|
||||||
|
const response = await request(app)
|
||||||
|
.post(`${AUTH_BASE_URL}/login`)
|
||||||
|
.send({
|
||||||
|
username: 'usr',
|
||||||
|
password: 'user'
|
||||||
|
})
|
||||||
|
.expect(422);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('error', 'Unprocessable Entity');
|
||||||
|
expect(response.body.details[0].field).toBe('username');
|
||||||
|
expect(response.body.details[0].message).toContain('Username must be at least 4 characters long');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return 422 when password is too short', async () => {
|
||||||
|
const response = await request(app)
|
||||||
|
.post(`${AUTH_BASE_URL}/login`)
|
||||||
|
.send({
|
||||||
|
username: 'user',
|
||||||
|
password: 'usr'
|
||||||
|
})
|
||||||
|
.expect(422);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('error', 'Unprocessable Entity');
|
||||||
|
expect(response.body.details[0].field).toBe('password');
|
||||||
|
expect(response.body.details[0].message).toContain('Password must be at least 4 characters long');
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('Logout Tests', () => {
|
||||||
|
it('should successfully logout', async () => {
|
||||||
|
const response = await request(app).post(`${AUTH_BASE_URL}/logout`).expect(200);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('message');
|
||||||
|
expect(response.body.message).toBe('Logout successful');
|
||||||
|
|
||||||
|
// Check for cleared cookies
|
||||||
|
const cookies = response.headers['set-cookie'] as unknown as string[];
|
||||||
|
const accessTokenCookie = cookies.find((cookie) => cookie.startsWith('OvMeetAccessToken=;'));
|
||||||
|
const refreshTokenCookie = cookies.find((cookie) => cookie.startsWith('OvMeetRefreshToken=;'));
|
||||||
|
expect(accessTokenCookie).toBeDefined();
|
||||||
|
expect(refreshTokenCookie).toBeDefined();
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('Refresh Token Tests', () => {
|
||||||
|
it('should successfully refresh token with valid refresh token', async () => {
|
||||||
|
// First, login to get a valid refresh token
|
||||||
|
const loginResponse = await request(app)
|
||||||
|
.post(`${AUTH_BASE_URL}/login`)
|
||||||
|
.send({
|
||||||
|
username: 'user',
|
||||||
|
password: 'user'
|
||||||
|
})
|
||||||
|
.expect(200);
|
||||||
|
|
||||||
|
const cookies = loginResponse.headers['set-cookie'] as unknown as string[];
|
||||||
|
const refreshTokenCookie = cookies.find((cookie) => cookie.startsWith('OvMeetRefreshToken=')) as string;
|
||||||
|
|
||||||
|
const response = await request(app)
|
||||||
|
.post(`${AUTH_BASE_URL}/refresh`)
|
||||||
|
.set('Cookie', [refreshTokenCookie])
|
||||||
|
.expect(200);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('message');
|
||||||
|
expect(response.body.message).toBe('Token refreshed');
|
||||||
|
|
||||||
|
// Check for new access token cookie
|
||||||
|
const newCookies = response.headers['set-cookie'] as unknown as string[];
|
||||||
|
const newAccessTokenCookie = newCookies.find((cookie) => cookie.startsWith('OvMeetAccessToken='));
|
||||||
|
expect(newAccessTokenCookie).toBeDefined();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return 400 when no refresh token is provided', async () => {
|
||||||
|
const response = await request(app).post(`${AUTH_BASE_URL}/refresh`).expect(400);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('message');
|
||||||
|
expect(response.body.message).toContain('No refresh token provided');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return 400 when refresh token is invalid', async () => {
|
||||||
|
const response = await request(app)
|
||||||
|
.post(`${AUTH_BASE_URL}/refresh`)
|
||||||
|
.set('Cookie', 'OvMeetRefreshToken=invalidtoken')
|
||||||
|
.expect(400);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('message');
|
||||||
|
expect(response.body.message).toContain('Invalid refresh token');
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('Profile Tests', () => {
|
||||||
|
it('should return 200 and user profile', async () => {
|
||||||
|
// First, login to get a valid access token
|
||||||
|
const loginResponse = await request(app)
|
||||||
|
.post(`${AUTH_BASE_URL}/login`)
|
||||||
|
.send({
|
||||||
|
username: 'user',
|
||||||
|
password: 'user'
|
||||||
|
})
|
||||||
|
.expect(200);
|
||||||
|
|
||||||
|
const cookies = loginResponse.headers['set-cookie'] as unknown as string[];
|
||||||
|
|
||||||
|
const response = await request(app).get(`${AUTH_BASE_URL}/profile`).set('Cookie', cookies).expect(200);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('username');
|
||||||
|
expect(response.body.username).toBe('user');
|
||||||
|
expect(response.body).toHaveProperty('role');
|
||||||
|
expect(response.body.role).toContain('user');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return 200 and admin profile', async () => {
|
||||||
|
// First, login to get a valid access token
|
||||||
|
const loginResponse = await request(app)
|
||||||
|
.post(`${AUTH_BASE_URL}/login`)
|
||||||
|
.send({
|
||||||
|
username: 'admin',
|
||||||
|
password: 'admin'
|
||||||
|
})
|
||||||
|
.expect(200);
|
||||||
|
|
||||||
|
const cookies = loginResponse.headers['set-cookie'] as unknown as string[];
|
||||||
|
|
||||||
|
const response = await request(app).get(`${AUTH_BASE_URL}/profile`).set('Cookie', cookies).expect(200);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('username');
|
||||||
|
expect(response.body.username).toBe('admin');
|
||||||
|
expect(response.body).toHaveProperty('role');
|
||||||
|
expect(response.body.role).toContain('admin');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return 401 when no access token is provided', async () => {
|
||||||
|
const response = await request(app).get(`${AUTH_BASE_URL}/profile`).expect(401);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('message');
|
||||||
|
expect(response.body.message).toContain('Unauthorized');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return 401 when access token is invalid', async () => {
|
||||||
|
const response = await request(app)
|
||||||
|
.get(`${AUTH_BASE_URL}/profile`)
|
||||||
|
.set('Cookie', 'OvMeetAccessToken=invalidtoken')
|
||||||
|
.expect(401);
|
||||||
|
|
||||||
|
expect(response.body).toHaveProperty('message');
|
||||||
|
expect(response.body.message).toContain('Invalid token');
|
||||||
|
});
|
||||||
|
});
|
||||||
|
});
|
||||||
Loading…
x
Reference in New Issue
Block a user