Files
hanko/backend/session/session_test.go
Matthew H. Irby e7a5c2df27 Feat: Add logout method to sdk (#566)
* Add endpoint to invalidate HTTP-Only cookie from the backend

* Add methods to the UserClient SDK for logout

* Remove session token fetch and add unit test for logout

* Update public router to use JWT middleware

* Add logout button to frontend. Route back to login page once logout is successful.

* Add a logout failur event

* Update logout logic in SDK

* Remove unneeded endpoint from main.go

* Update logoutlink reference

* Fix request path; undo change in package order

* Update common.css to incldue hanko-logout

* feat(fronend-sdk): remove cookie during cross-domain operations

* fix(frontend-sdk): No unauthorized error during logout, when the user is already logged out

* feat(backend): Create an audit log entry when the user logs off

* chore(frontend-sdk): re-generate jsdoc

* fix: Adjust logout response codes and the corresponding frontend sdk error handling

* chore(frontend-sdk): re-generate jsdoc

* feat: add logout endpoint specification to the docs

* Fix broken unit test

* Remove logout button from elements

* Add event listener on frontend to call the logout method from SDK

* Rollback changes to SecuredContent on e2e tests

* Update logout test on user

* Update quickstart/public/assets/css/common.css

Co-authored-by: bjoern-m <56024829+bjoern-m@users.noreply.github.com>

---------

Co-authored-by: Björn Müller <bjoern.mueller@hanko.io>
Co-authored-by: bjoern-m <56024829+bjoern-m@users.noreply.github.com>
2023-03-03 10:48:33 +01:00

104 lines
3.9 KiB
Go

package session
import (
"github.com/gofrs/uuid"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/teamhanko/hanko/backend/config"
"github.com/teamhanko/hanko/backend/test"
"testing"
"time"
)
func TestNewGenerator(t *testing.T) {
manager := test.JwkManager{}
cfg := config.Session{}
sessionGenerator, err := NewManager(&manager, cfg)
assert.NoError(t, err)
require.NotEmpty(t, sessionGenerator)
}
func TestGenerator_Generate(t *testing.T) {
manager := test.JwkManager{}
cfg := config.Session{}
sessionGenerator, err := NewManager(&manager, cfg)
assert.NoError(t, err)
require.NotEmpty(t, sessionGenerator)
userId, err := uuid.NewV4()
assert.NoError(t, err)
session, err := sessionGenerator.GenerateJWT(userId)
assert.NoError(t, err)
require.NotEmpty(t, session)
}
func TestGenerator_Verify(t *testing.T) {
sessionLifespan := "5m"
manager := test.JwkManager{}
cfg := config.Session{Lifespan: sessionLifespan}
sessionGenerator, err := NewManager(&manager, cfg)
assert.NoError(t, err)
require.NotEmpty(t, sessionGenerator)
userId, err := uuid.NewV4()
assert.NoError(t, err)
session, err := sessionGenerator.GenerateJWT(userId)
assert.NoError(t, err)
require.NotEmpty(t, session)
token, err := sessionGenerator.Verify(session)
assert.NoError(t, err)
require.NotEmpty(t, token)
assert.Equal(t, token.Subject(), userId.String())
assert.False(t, time.Time{}.Equal(token.IssuedAt()))
assert.False(t, time.Time{}.Equal(token.Expiration()))
sessionDuration, _ := time.ParseDuration(sessionLifespan)
assert.True(t, token.IssuedAt().Add(sessionDuration).Equal(token.Expiration()))
}
func TestGenerator_Verify_Error(t *testing.T) {
manager := test.JwkManager{}
cfg := config.Session{}
sessionGenerator, err := NewManager(&manager, cfg)
assert.NoError(t, err)
require.NotEmpty(t, sessionGenerator)
tests := []struct {
Name string
Input string
WantErr error
}{
{
Name: "expired",
Input: "eyJhbGciOiJSUzI1NiIsImtpZCI6ImtleTEiLCJ0eXAiOiJKV1QifQ.eyJleHAiOjE2NTIxNzM4NTAsImlhdCI6MTY1MjE3Mzc5MCwic3ViIjoiYzU0YTZlZTUtZjNmMy00YzExLTlhMWMtYWUzOTgyYTQxMzYyIn0.AEzZ0M1_3HnOtqd8Dz-BliHkEUc4c5mu97eXhoErgG7qbVWisJP0qfz_KrwL9VYFOYuDAmfRZ3ABnaOg-S53wlRndfL-ulk68lY34otGZfXKhk2P3GJRH8Dq7hW83KnwkSPF5_iOaIIDfUwrWOaavvtLJFgg5RcehuwLkYEA5X17ek6cUNsqz7Vw-x2REReh_f31f5zneqKN9CeVnup5_ZgtMYpOXVvXAORs3b7y2oMwFdXs-hVal9ZVunNPo3iZmaTFMHUSNXX8MceOy_dUofxtd9JDzliiPrjNWDjU5Jx5paLBA5CUc4SctBURi2oJABbkeE1l4ug6-rTOYB04-UW8XAnPZONBTnv3AjtzvScvkpUj-OFKVQLGgcXZHUo1J7ftLaezpWrGTbhlC8TVvXdX1ms5w9D1uqEUZ94lhvVSW_lGGX2DGqMWaT6tOcSpDHFQ0NR5FD3MiNGV-z43AUOOSzilAKS2WaHDS7v43PeJ75xzAAS_7xOoc6L3Z9msdToQIauLYuCrivoOVcCqrEHugknpxO8M0xo6f1fHws8RocT3S7B76YJUIBeAj2F31wJne5xtbiRF5GWiV8uS3ZTXqrPp7y4U6Btf-h6mvEos_Q9o9w5hck-8lixUs5mObPDsT-W6PdEehRaSL7-13dy1GpB8wMP5fGlnRSff9y4",
},
{
Name: "wrong signature",
Input: "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJodHRwOi8vbG9jYWxob3N0OjgwODAiLCJleHAiOjE2NDg2MjgzODAsImlhdCI6MTY0ODYyNDc4MCwiaXNzIjoiSG90M3RlOWlJbHVwbm5scDBld1E1RWJmIiwic3ViIjoiaU9ielRWdUc2bjl6Um1TY2ZMb0RFT1NiIn0.QZPEyEaGCJikNP2slVTGdsT3x8CuT4ynd5tdj-7c38Aa54277MPgGbapQ7JGrvwyjhAihzvvlqCxn2oX3zIFdu0HmSlxAXQ6Ah1K0KlQabneG8XNSed3sgp9xM0BYV1rB2SCuyXwE3U3zj5zFc4g4-v2Y1hpn7z4n3n9IlnnShK7NTUaaELlWPD8FQyp8mzZmJVSDoWbCMdywGHkX5ZWMUAwPfvC17kYZj6nqXC5ZJm3i2u-488cDeE5NxCFe-0ey14NtNtM9xTaPy5U8zvoqeCik1-ZNbxR_NJC4H25Cth2pm__e-W4KepGy7i-cLZ1T_DqNNk8HX9zX_Quj88FJw",
},
}
for _, test := range tests {
t.Run(test.Name, func(t *testing.T) {
_, err := sessionGenerator.Verify(test.Input)
assert.Error(t, err)
})
}
}
func TestGenerator_DeleteCookie(t *testing.T) {
manager := test.JwkManager{}
cfg := config.Session{}
sessionGenerator, err := NewManager(&manager, cfg)
assert.NoError(t, err)
require.NotEmpty(t, sessionGenerator)
cookie, err := sessionGenerator.DeleteCookie()
assert.NoError(t, err)
assert.Equal(t, -1, cookie.MaxAge)
assert.Equal(t, "hanko", cookie.Name)
}