fix(tests): resolve some difficult race conditions in test
This commit is contained in:
parent
3c5b7c7dfb
commit
12cdd0ffd6
|
|
@ -19,6 +19,8 @@ use testcontainers::{runners::AsyncRunner, ContainerAsync, ImageExt};
|
||||||
use testcontainers_modules::postgres::Postgres;
|
use testcontainers_modules::postgres::Postgres;
|
||||||
#[cfg(any(test, feature = "test-utils"))]
|
#[cfg(any(test, feature = "test-utils"))]
|
||||||
use tower::util::ServiceExt;
|
use tower::util::ServiceExt;
|
||||||
|
#[cfg(any(test, feature = "test-utils"))]
|
||||||
|
use uuid;
|
||||||
|
|
||||||
/// Test image information with expected OCR content
|
/// Test image information with expected OCR content
|
||||||
#[derive(Debug, Clone)]
|
#[derive(Debug, Clone)]
|
||||||
|
|
@ -221,9 +223,14 @@ pub async fn create_test_app() -> (Router, ContainerAsync<Postgres>) {
|
||||||
|
|
||||||
#[cfg(any(test, feature = "test-utils"))]
|
#[cfg(any(test, feature = "test-utils"))]
|
||||||
pub async fn create_test_user(app: &Router) -> UserResponse {
|
pub async fn create_test_user(app: &Router) -> UserResponse {
|
||||||
|
// Generate random identifiers to avoid test interference
|
||||||
|
let test_id = uuid::Uuid::new_v4().to_string()[..8].to_string();
|
||||||
|
let test_username = format!("testuser_{}", test_id);
|
||||||
|
let test_email = format!("test_{}@example.com", test_id);
|
||||||
|
|
||||||
let user_data = json!({
|
let user_data = json!({
|
||||||
"username": "testuser",
|
"username": test_username,
|
||||||
"email": "test@example.com",
|
"email": test_email,
|
||||||
"password": "password123"
|
"password": "password123"
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|
@ -248,9 +255,14 @@ pub async fn create_test_user(app: &Router) -> UserResponse {
|
||||||
|
|
||||||
#[cfg(any(test, feature = "test-utils"))]
|
#[cfg(any(test, feature = "test-utils"))]
|
||||||
pub async fn create_admin_user(app: &Router) -> UserResponse {
|
pub async fn create_admin_user(app: &Router) -> UserResponse {
|
||||||
|
// Generate random identifiers to avoid test interference
|
||||||
|
let test_id = uuid::Uuid::new_v4().to_string()[..8].to_string();
|
||||||
|
let admin_username = format!("adminuser_{}", test_id);
|
||||||
|
let admin_email = format!("admin_{}@example.com", test_id);
|
||||||
|
|
||||||
let admin_data = json!({
|
let admin_data = json!({
|
||||||
"username": "adminuser",
|
"username": admin_username,
|
||||||
"email": "admin@example.com",
|
"email": admin_email,
|
||||||
"password": "adminpass123",
|
"password": "adminpass123",
|
||||||
"role": "admin"
|
"role": "admin"
|
||||||
});
|
});
|
||||||
|
|
|
||||||
|
|
@ -120,6 +120,15 @@ mod tests {
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_oidc_partial_config() {
|
fn test_oidc_partial_config() {
|
||||||
|
// Clean up environment first to ensure test isolation
|
||||||
|
env::remove_var("OIDC_ENABLED");
|
||||||
|
env::remove_var("OIDC_CLIENT_ID");
|
||||||
|
env::remove_var("OIDC_CLIENT_SECRET");
|
||||||
|
env::remove_var("OIDC_ISSUER_URL");
|
||||||
|
env::remove_var("OIDC_REDIRECT_URI");
|
||||||
|
env::remove_var("DATABASE_URL");
|
||||||
|
env::remove_var("JWT_SECRET");
|
||||||
|
|
||||||
// Only set some OIDC vars
|
// Only set some OIDC vars
|
||||||
env::set_var("OIDC_ENABLED", "true");
|
env::set_var("OIDC_ENABLED", "true");
|
||||||
env::set_var("OIDC_CLIENT_ID", "test-client-id");
|
env::set_var("OIDC_CLIENT_ID", "test-client-id");
|
||||||
|
|
@ -138,12 +147,24 @@ mod tests {
|
||||||
// Clean up
|
// Clean up
|
||||||
env::remove_var("OIDC_ENABLED");
|
env::remove_var("OIDC_ENABLED");
|
||||||
env::remove_var("OIDC_CLIENT_ID");
|
env::remove_var("OIDC_CLIENT_ID");
|
||||||
|
env::remove_var("OIDC_CLIENT_SECRET");
|
||||||
|
env::remove_var("OIDC_ISSUER_URL");
|
||||||
|
env::remove_var("OIDC_REDIRECT_URI");
|
||||||
env::remove_var("DATABASE_URL");
|
env::remove_var("DATABASE_URL");
|
||||||
env::remove_var("JWT_SECRET");
|
env::remove_var("JWT_SECRET");
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_oidc_disabled_with_config_present() {
|
fn test_oidc_disabled_with_config_present() {
|
||||||
|
// Clean up environment first to ensure test isolation
|
||||||
|
env::remove_var("OIDC_ENABLED");
|
||||||
|
env::remove_var("OIDC_CLIENT_ID");
|
||||||
|
env::remove_var("OIDC_CLIENT_SECRET");
|
||||||
|
env::remove_var("OIDC_ISSUER_URL");
|
||||||
|
env::remove_var("OIDC_REDIRECT_URI");
|
||||||
|
env::remove_var("DATABASE_URL");
|
||||||
|
env::remove_var("JWT_SECRET");
|
||||||
|
|
||||||
// OIDC disabled but config present
|
// OIDC disabled but config present
|
||||||
env::set_var("OIDC_ENABLED", "false");
|
env::set_var("OIDC_ENABLED", "false");
|
||||||
env::set_var("OIDC_CLIENT_ID", "test-client-id");
|
env::set_var("OIDC_CLIENT_ID", "test-client-id");
|
||||||
|
|
@ -173,6 +194,15 @@ mod tests {
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_oidc_empty_values() {
|
fn test_oidc_empty_values() {
|
||||||
|
// Clean up environment first to ensure test isolation
|
||||||
|
env::remove_var("OIDC_ENABLED");
|
||||||
|
env::remove_var("OIDC_CLIENT_ID");
|
||||||
|
env::remove_var("OIDC_CLIENT_SECRET");
|
||||||
|
env::remove_var("OIDC_ISSUER_URL");
|
||||||
|
env::remove_var("OIDC_REDIRECT_URI");
|
||||||
|
env::remove_var("DATABASE_URL");
|
||||||
|
env::remove_var("JWT_SECRET");
|
||||||
|
|
||||||
env::set_var("OIDC_ENABLED", "true");
|
env::set_var("OIDC_ENABLED", "true");
|
||||||
env::set_var("OIDC_CLIENT_ID", "");
|
env::set_var("OIDC_CLIENT_ID", "");
|
||||||
env::set_var("OIDC_CLIENT_SECRET", "");
|
env::set_var("OIDC_CLIENT_SECRET", "");
|
||||||
|
|
@ -202,6 +232,15 @@ mod tests {
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_oidc_config_validation_output() {
|
fn test_oidc_config_validation_output() {
|
||||||
|
// Clean up environment first to ensure test isolation
|
||||||
|
env::remove_var("OIDC_ENABLED");
|
||||||
|
env::remove_var("OIDC_CLIENT_ID");
|
||||||
|
env::remove_var("OIDC_CLIENT_SECRET");
|
||||||
|
env::remove_var("OIDC_ISSUER_URL");
|
||||||
|
env::remove_var("OIDC_REDIRECT_URI");
|
||||||
|
env::remove_var("DATABASE_URL");
|
||||||
|
env::remove_var("JWT_SECRET");
|
||||||
|
|
||||||
// Test that validation warnings are properly formatted
|
// Test that validation warnings are properly formatted
|
||||||
env::set_var("OIDC_ENABLED", "true");
|
env::set_var("OIDC_ENABLED", "true");
|
||||||
env::set_var("DATABASE_URL", "postgresql://test:test@localhost/test");
|
env::set_var("DATABASE_URL", "postgresql://test:test@localhost/test");
|
||||||
|
|
@ -215,12 +254,25 @@ mod tests {
|
||||||
|
|
||||||
// Clean up
|
// Clean up
|
||||||
env::remove_var("OIDC_ENABLED");
|
env::remove_var("OIDC_ENABLED");
|
||||||
|
env::remove_var("OIDC_CLIENT_ID");
|
||||||
|
env::remove_var("OIDC_CLIENT_SECRET");
|
||||||
|
env::remove_var("OIDC_ISSUER_URL");
|
||||||
|
env::remove_var("OIDC_REDIRECT_URI");
|
||||||
env::remove_var("DATABASE_URL");
|
env::remove_var("DATABASE_URL");
|
||||||
env::remove_var("JWT_SECRET");
|
env::remove_var("JWT_SECRET");
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_oidc_complete_configuration() {
|
fn test_oidc_complete_configuration() {
|
||||||
|
// Clean up environment first to ensure test isolation
|
||||||
|
env::remove_var("OIDC_ENABLED");
|
||||||
|
env::remove_var("OIDC_CLIENT_ID");
|
||||||
|
env::remove_var("OIDC_CLIENT_SECRET");
|
||||||
|
env::remove_var("OIDC_ISSUER_URL");
|
||||||
|
env::remove_var("OIDC_REDIRECT_URI");
|
||||||
|
env::remove_var("DATABASE_URL");
|
||||||
|
env::remove_var("JWT_SECRET");
|
||||||
|
|
||||||
env::set_var("OIDC_ENABLED", "true");
|
env::set_var("OIDC_ENABLED", "true");
|
||||||
env::set_var("OIDC_CLIENT_ID", "my-app-client-id");
|
env::set_var("OIDC_CLIENT_ID", "my-app-client-id");
|
||||||
env::set_var("OIDC_CLIENT_SECRET", "super-secret-client-secret");
|
env::set_var("OIDC_CLIENT_SECRET", "super-secret-client-secret");
|
||||||
|
|
|
||||||
|
|
@ -7,6 +7,7 @@ mod tests {
|
||||||
use wiremock::{matchers::{method, path, query_param, header}, Mock, MockServer, ResponseTemplate};
|
use wiremock::{matchers::{method, path, query_param, header}, Mock, MockServer, ResponseTemplate};
|
||||||
use std::sync::Arc;
|
use std::sync::Arc;
|
||||||
use crate::{AppState, oidc::OidcClient};
|
use crate::{AppState, oidc::OidcClient};
|
||||||
|
use uuid;
|
||||||
|
|
||||||
async fn create_test_app_simple() -> (axum::Router, ()) {
|
async fn create_test_app_simple() -> (axum::Router, ()) {
|
||||||
// Use TEST_DATABASE_URL directly, no containers
|
// Use TEST_DATABASE_URL directly, no containers
|
||||||
|
|
@ -239,6 +240,12 @@ mod tests {
|
||||||
async fn test_oidc_callback_success_new_user() {
|
async fn test_oidc_callback_success_new_user() {
|
||||||
let (app, mock_server) = create_test_app_with_oidc().await;
|
let (app, mock_server) = create_test_app_with_oidc().await;
|
||||||
|
|
||||||
|
// Generate random identifiers to avoid test interference
|
||||||
|
let test_id = uuid::Uuid::new_v4().to_string()[..8].to_string();
|
||||||
|
let test_username = format!("oidcuser_{}", test_id);
|
||||||
|
let test_email = format!("oidc_{}@example.com", test_id);
|
||||||
|
let test_subject = format!("oidc-user-{}", test_id);
|
||||||
|
|
||||||
// Clean up any existing test user to ensure test isolation
|
// Clean up any existing test user to ensure test isolation
|
||||||
let database_url = std::env::var("TEST_DATABASE_URL")
|
let database_url = std::env::var("TEST_DATABASE_URL")
|
||||||
.or_else(|_| std::env::var("DATABASE_URL"))
|
.or_else(|_| std::env::var("DATABASE_URL"))
|
||||||
|
|
@ -247,8 +254,8 @@ mod tests {
|
||||||
|
|
||||||
// Delete any existing user with the test username or OIDC subject
|
// Delete any existing user with the test username or OIDC subject
|
||||||
let _ = sqlx::query("DELETE FROM users WHERE username = $1 OR oidc_subject = $2")
|
let _ = sqlx::query("DELETE FROM users WHERE username = $1 OR oidc_subject = $2")
|
||||||
.bind("oidcuser")
|
.bind(&test_username)
|
||||||
.bind("oidc-user-123")
|
.bind(&test_subject)
|
||||||
.execute(&db.pool)
|
.execute(&db.pool)
|
||||||
.await;
|
.await;
|
||||||
|
|
||||||
|
|
@ -271,10 +278,10 @@ mod tests {
|
||||||
|
|
||||||
// Mock user info
|
// Mock user info
|
||||||
let user_info_response = json!({
|
let user_info_response = json!({
|
||||||
"sub": "oidc-user-123",
|
"sub": test_subject,
|
||||||
"email": "oidc@example.com",
|
"email": test_email,
|
||||||
"name": "OIDC User",
|
"name": "OIDC User",
|
||||||
"preferred_username": "oidcuser"
|
"preferred_username": test_username
|
||||||
});
|
});
|
||||||
|
|
||||||
Mock::given(method("GET"))
|
Mock::given(method("GET"))
|
||||||
|
|
@ -327,8 +334,8 @@ mod tests {
|
||||||
let login_response: serde_json::Value = serde_json::from_slice(&body).unwrap();
|
let login_response: serde_json::Value = serde_json::from_slice(&body).unwrap();
|
||||||
|
|
||||||
assert!(login_response["token"].is_string());
|
assert!(login_response["token"].is_string());
|
||||||
assert_eq!(login_response["user"]["username"], "oidcuser");
|
assert_eq!(login_response["user"]["username"], test_username);
|
||||||
assert_eq!(login_response["user"]["email"], "oidc@example.com");
|
assert_eq!(login_response["user"]["email"], test_email);
|
||||||
}
|
}
|
||||||
|
|
||||||
#[tokio::test]
|
#[tokio::test]
|
||||||
|
|
@ -362,6 +369,11 @@ mod tests {
|
||||||
async fn test_oidc_callback_invalid_user_info() {
|
async fn test_oidc_callback_invalid_user_info() {
|
||||||
let (app, mock_server) = create_test_app_with_oidc().await;
|
let (app, mock_server) = create_test_app_with_oidc().await;
|
||||||
|
|
||||||
|
// Generate random identifiers to avoid test interference
|
||||||
|
let test_id = uuid::Uuid::new_v4().to_string()[..8].to_string();
|
||||||
|
let test_username = format!("oidcuser_{}", test_id);
|
||||||
|
let test_subject = format!("oidc-user-{}", test_id);
|
||||||
|
|
||||||
// Clean up any existing test user to ensure test isolation
|
// Clean up any existing test user to ensure test isolation
|
||||||
let database_url = std::env::var("TEST_DATABASE_URL")
|
let database_url = std::env::var("TEST_DATABASE_URL")
|
||||||
.or_else(|_| std::env::var("DATABASE_URL"))
|
.or_else(|_| std::env::var("DATABASE_URL"))
|
||||||
|
|
@ -369,7 +381,9 @@ mod tests {
|
||||||
let db = crate::db::Database::new(&database_url).await.unwrap();
|
let db = crate::db::Database::new(&database_url).await.unwrap();
|
||||||
|
|
||||||
// Delete any existing user that might conflict
|
// Delete any existing user that might conflict
|
||||||
let _ = sqlx::query("DELETE FROM users WHERE username LIKE 'oidc%' OR oidc_subject IS NOT NULL")
|
let _ = sqlx::query("DELETE FROM users WHERE username = $1 OR oidc_subject = $2")
|
||||||
|
.bind(&test_username)
|
||||||
|
.bind(&test_subject)
|
||||||
.execute(&db.pool)
|
.execute(&db.pool)
|
||||||
.await;
|
.await;
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -5,6 +5,7 @@ mod tests {
|
||||||
use axum::http::StatusCode;
|
use axum::http::StatusCode;
|
||||||
use serde_json::json;
|
use serde_json::json;
|
||||||
use tower::util::ServiceExt;
|
use tower::util::ServiceExt;
|
||||||
|
use uuid;
|
||||||
|
|
||||||
#[tokio::test]
|
#[tokio::test]
|
||||||
async fn test_list_users() {
|
async fn test_list_users() {
|
||||||
|
|
@ -302,77 +303,93 @@ mod tests {
|
||||||
// OIDC Database Tests
|
// OIDC Database Tests
|
||||||
#[tokio::test]
|
#[tokio::test]
|
||||||
async fn test_create_oidc_user() {
|
async fn test_create_oidc_user() {
|
||||||
let (app, container) = create_test_app().await;
|
let (_app, container) = create_test_app().await;
|
||||||
let port = container.get_host_port_ipv4(5432).await.unwrap();
|
let port = container.get_host_port_ipv4(5432).await.unwrap();
|
||||||
let database_url = format!("postgresql://test:test@localhost:{}/test", port);
|
let database_url = format!("postgresql://test:test@localhost:{}/test", port);
|
||||||
let db = crate::db::Database::new(&database_url).await.unwrap();
|
let db = crate::db::Database::new(&database_url).await.unwrap();
|
||||||
|
|
||||||
|
// Generate random identifiers to avoid test interference
|
||||||
|
let test_id = uuid::Uuid::new_v4().to_string()[..8].to_string();
|
||||||
|
let test_username = format!("oidcuser_{}", test_id);
|
||||||
|
let test_email = format!("oidc_{}@example.com", test_id);
|
||||||
|
let test_subject = format!("oidc-subject-{}", test_id);
|
||||||
|
|
||||||
let create_user = CreateUser {
|
let create_user = CreateUser {
|
||||||
username: "oidcuser".to_string(),
|
username: test_username.clone(),
|
||||||
email: "oidc@example.com".to_string(),
|
email: test_email.clone(),
|
||||||
password: "".to_string(), // Not used for OIDC
|
password: "".to_string(), // Not used for OIDC
|
||||||
role: Some(UserRole::User),
|
role: Some(UserRole::User),
|
||||||
};
|
};
|
||||||
|
|
||||||
let user = db.create_oidc_user(
|
let user = db.create_oidc_user(
|
||||||
create_user,
|
create_user,
|
||||||
"oidc-subject-123",
|
&test_subject,
|
||||||
"https://provider.example.com",
|
"https://provider.example.com",
|
||||||
"oidc@example.com",
|
"oidc@example.com",
|
||||||
).await.unwrap();
|
).await.unwrap();
|
||||||
|
|
||||||
assert_eq!(user.username, "oidcuser");
|
assert_eq!(user.username, test_username);
|
||||||
assert_eq!(user.email, "oidc@example.com");
|
assert_eq!(user.email, test_email);
|
||||||
assert_eq!(user.oidc_subject, Some("oidc-subject-123".to_string()));
|
assert_eq!(user.oidc_subject, Some(test_subject));
|
||||||
assert_eq!(user.oidc_issuer, Some("https://provider.example.com".to_string()));
|
assert_eq!(user.oidc_issuer, Some("https://provider.example.com".to_string()));
|
||||||
assert_eq!(user.oidc_email, Some("oidc@example.com".to_string()));
|
assert_eq!(user.oidc_email, Some(test_email.clone()));
|
||||||
assert_eq!(user.auth_provider, AuthProvider::Oidc);
|
assert_eq!(user.auth_provider, AuthProvider::Oidc);
|
||||||
assert!(user.password_hash.is_none());
|
assert!(user.password_hash.is_none());
|
||||||
}
|
}
|
||||||
|
|
||||||
#[tokio::test]
|
#[tokio::test]
|
||||||
async fn test_get_user_by_oidc_subject() {
|
async fn test_get_user_by_oidc_subject() {
|
||||||
let (app, container) = create_test_app().await;
|
let (_app, container) = create_test_app().await;
|
||||||
let port = container.get_host_port_ipv4(5432).await.unwrap();
|
let port = container.get_host_port_ipv4(5432).await.unwrap();
|
||||||
let database_url = format!("postgresql://test:test@localhost:{}/test", port);
|
let database_url = format!("postgresql://test:test@localhost:{}/test", port);
|
||||||
let db = crate::db::Database::new(&database_url).await.unwrap();
|
let db = crate::db::Database::new(&database_url).await.unwrap();
|
||||||
|
|
||||||
|
// Generate random identifiers to avoid test interference
|
||||||
|
let test_id = uuid::Uuid::new_v4().to_string()[..8].to_string();
|
||||||
|
let test_username = format!("oidcuser_{}", test_id);
|
||||||
|
let test_email = format!("oidc_{}@example.com", test_id);
|
||||||
|
let test_subject = format!("oidc-subject-{}", test_id);
|
||||||
|
|
||||||
// Create OIDC user
|
// Create OIDC user
|
||||||
let create_user = CreateUser {
|
let create_user = CreateUser {
|
||||||
username: "oidcuser2".to_string(),
|
username: test_username,
|
||||||
email: "oidc2@example.com".to_string(),
|
email: test_email.clone(),
|
||||||
password: "".to_string(),
|
password: "".to_string(),
|
||||||
role: Some(UserRole::User),
|
role: Some(UserRole::User),
|
||||||
};
|
};
|
||||||
|
|
||||||
let created_user = db.create_oidc_user(
|
let created_user = db.create_oidc_user(
|
||||||
create_user,
|
create_user,
|
||||||
"oidc-subject-456",
|
&test_subject,
|
||||||
"https://provider.example.com",
|
"https://provider.example.com",
|
||||||
"oidc2@example.com",
|
&test_email,
|
||||||
).await.unwrap();
|
).await.unwrap();
|
||||||
|
|
||||||
// Retrieve by OIDC subject
|
// Retrieve by OIDC subject
|
||||||
let found_user = db.get_user_by_oidc_subject(
|
let found_user = db.get_user_by_oidc_subject(
|
||||||
"oidc-subject-456",
|
&test_subject,
|
||||||
"https://provider.example.com"
|
"https://provider.example.com"
|
||||||
).await.unwrap();
|
).await.unwrap();
|
||||||
|
|
||||||
assert!(found_user.is_some());
|
assert!(found_user.is_some());
|
||||||
let user = found_user.unwrap();
|
let user = found_user.unwrap();
|
||||||
assert_eq!(user.id, created_user.id);
|
assert_eq!(user.id, created_user.id);
|
||||||
assert_eq!(user.oidc_subject, Some("oidc-subject-456".to_string()));
|
assert_eq!(user.oidc_subject, Some(test_subject));
|
||||||
}
|
}
|
||||||
|
|
||||||
#[tokio::test]
|
#[tokio::test]
|
||||||
async fn test_get_user_by_oidc_subject_not_found() {
|
async fn test_get_user_by_oidc_subject_not_found() {
|
||||||
let (app, container) = create_test_app().await;
|
let (_app, container) = create_test_app().await;
|
||||||
let port = container.get_host_port_ipv4(5432).await.unwrap();
|
let port = container.get_host_port_ipv4(5432).await.unwrap();
|
||||||
let database_url = format!("postgresql://test:test@localhost:{}/test", port);
|
let database_url = format!("postgresql://test:test@localhost:{}/test", port);
|
||||||
let db = crate::db::Database::new(&database_url).await.unwrap();
|
let db = crate::db::Database::new(&database_url).await.unwrap();
|
||||||
|
|
||||||
|
// Generate random subject that definitely doesn't exist
|
||||||
|
let test_id = uuid::Uuid::new_v4().to_string();
|
||||||
|
let nonexistent_subject = format!("nonexistent-subject-{}", test_id);
|
||||||
|
|
||||||
let found_user = db.get_user_by_oidc_subject(
|
let found_user = db.get_user_by_oidc_subject(
|
||||||
"nonexistent-subject",
|
&nonexistent_subject,
|
||||||
"https://provider.example.com"
|
"https://provider.example.com"
|
||||||
).await.unwrap();
|
).await.unwrap();
|
||||||
|
|
||||||
|
|
@ -381,29 +398,35 @@ mod tests {
|
||||||
|
|
||||||
#[tokio::test]
|
#[tokio::test]
|
||||||
async fn test_oidc_user_different_issuer() {
|
async fn test_oidc_user_different_issuer() {
|
||||||
let (app, container) = create_test_app().await;
|
let (_app, container) = create_test_app().await;
|
||||||
let port = container.get_host_port_ipv4(5432).await.unwrap();
|
let port = container.get_host_port_ipv4(5432).await.unwrap();
|
||||||
let database_url = format!("postgresql://test:test@localhost:{}/test", port);
|
let database_url = format!("postgresql://test:test@localhost:{}/test", port);
|
||||||
let db = crate::db::Database::new(&database_url).await.unwrap();
|
let db = crate::db::Database::new(&database_url).await.unwrap();
|
||||||
|
|
||||||
|
// Generate random identifiers to avoid test interference
|
||||||
|
let test_id = uuid::Uuid::new_v4().to_string()[..8].to_string();
|
||||||
|
let test_username = format!("oidcuser_{}", test_id);
|
||||||
|
let test_email = format!("oidc_{}@example.com", test_id);
|
||||||
|
let test_subject = format!("same-subject-{}", test_id);
|
||||||
|
|
||||||
// Create OIDC user with one issuer
|
// Create OIDC user with one issuer
|
||||||
let create_user = CreateUser {
|
let create_user = CreateUser {
|
||||||
username: "oidcuser3".to_string(),
|
username: test_username,
|
||||||
email: "oidc3@example.com".to_string(),
|
email: test_email.clone(),
|
||||||
password: "".to_string(),
|
password: "".to_string(),
|
||||||
role: Some(UserRole::User),
|
role: Some(UserRole::User),
|
||||||
};
|
};
|
||||||
|
|
||||||
db.create_oidc_user(
|
db.create_oidc_user(
|
||||||
create_user,
|
create_user,
|
||||||
"same-subject",
|
&test_subject,
|
||||||
"https://provider1.example.com",
|
"https://provider1.example.com",
|
||||||
"oidc3@example.com",
|
&test_email,
|
||||||
).await.unwrap();
|
).await.unwrap();
|
||||||
|
|
||||||
// Try to find with different issuer (should not find)
|
// Try to find with different issuer (should not find)
|
||||||
let found_user = db.get_user_by_oidc_subject(
|
let found_user = db.get_user_by_oidc_subject(
|
||||||
"same-subject",
|
&test_subject,
|
||||||
"https://provider2.example.com"
|
"https://provider2.example.com"
|
||||||
).await.unwrap();
|
).await.unwrap();
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue