diff options
| author | James Elliott <james-d-elliott@users.noreply.github.com> | 2023-11-23 08:20:36 +1100 | 
|---|---|---|
| committer | GitHub <noreply@github.com> | 2023-11-23 08:20:36 +1100 | 
| commit | c49b973120c7fd755923a2b88afd794c7d320d6e (patch) | |
| tree | 5fcef6de1a85568eee3c67470f73b790b294dda8 /internal/handlers/handler_authz_test.go | |
| parent | fa141929a39e546f3f3ca6bcbc7bd72c64e575c8 (diff) | |
fix(configuration): illogical refresh interval default (#6319)
When using the file provider with watch enabled, the refresh interval should just be set to always default as the cost is minimal.
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
Diffstat (limited to 'internal/handlers/handler_authz_test.go')
| -rw-r--r-- | internal/handlers/handler_authz_test.go | 32 | 
1 files changed, 17 insertions, 15 deletions
diff --git a/internal/handlers/handler_authz_test.go b/internal/handlers/handler_authz_test.go index bd32a0228..19d670400 100644 --- a/internal/handlers/handler_authz_test.go +++ b/internal/handlers/handler_authz_test.go @@ -279,14 +279,16 @@ func (s *AuthzSuite) TestShouldNotFailOnMissingEmail() {  		s.T().Skip()  	} -	authz := s.Builder().Build() -  	mock := mocks.NewMockAutheliaCtx(s.T())  	defer mock.Close() +	mock.Ctx.Clock = &mock.Clock +  	mock.Clock.Set(time.Now()) +	authz := s.Builder().WithConfig(&mock.Ctx.Configuration).Build() +  	s.ConfigureMockSessionProviderWithAutomaticAutheliaURLs(mock)  	targetURI := s.RequireParseRequestURI("https://bypass.example.com") @@ -675,7 +677,7 @@ func (s *AuthzSuite) TestShouldDestroySessionWhenInactiveForTooLong() {  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(testInactivity), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),  	)  	authz := builder.Build() @@ -725,7 +727,7 @@ func (s *AuthzSuite) TestShouldNotDestroySessionWhenInactiveForTooLongRememberMe  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(testInactivity), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),  	)  	authz := builder.Build() @@ -775,7 +777,7 @@ func (s *AuthzSuite) TestShouldNotDestroySessionWhenNotInactiveForTooLong() {  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(testInactivity), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),  	)  	authz := builder.Build() @@ -826,7 +828,7 @@ func (s *AuthzSuite) TestShouldUpdateInactivityTimestampEvenWhenHittingForbidden  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(testInactivity), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),  	)  	authz := builder.Build() @@ -877,7 +879,7 @@ func (s *AuthzSuite) TestShouldNotRefreshUserDetailsFromBackendWhenRefreshDisabl  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(-1 * time.Second), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDurationNever()),  	)  	authz := builder.Build() @@ -900,7 +902,7 @@ func (s *AuthzSuite) TestShouldNotRefreshUserDetailsFromBackendWhenRefreshDisabl  	mock.Clock.Set(time.Now())  	mock.Ctx.Clock = &mock.Clock -	mock.Ctx.Configuration.AuthenticationBackend.RefreshInterval = schema.ProfileRefreshDisabled +	mock.Ctx.Configuration.AuthenticationBackend.RefreshInterval = schema.NewRefreshIntervalDurationNever()  	mock.Ctx.Configuration.Session.Cookies[0].Inactivity = testInactivity  	s.ConfigureMockSessionProviderWithAutomaticAutheliaURLs(mock) @@ -970,7 +972,7 @@ func (s *AuthzSuite) TestShouldDestroySessionWhenUserDoesNotExist() {  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(5 * time.Minute), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(5 * time.Minute)),  	)  	authz := builder.Build() @@ -1058,7 +1060,7 @@ func (s *AuthzSuite) TestShouldUpdateRemovedUserGroupsFromBackendAndDeny() {  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(5 * time.Minute), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(5 * time.Minute)),  	)  	authz := builder.Build() @@ -1144,7 +1146,7 @@ func (s *AuthzSuite) TestShouldUpdateAddedUserGroupsFromBackendAndDeny() {  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(5 * time.Minute), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(5 * time.Minute)),  	)  	authz := builder.Build() @@ -1229,7 +1231,7 @@ func (s *AuthzSuite) TestShouldCheckValidSessionUsernameHeaderAndReturn200() {  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(testInactivity), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),  	)  	authz := builder.Build() @@ -1282,7 +1284,7 @@ func (s *AuthzSuite) TestShouldCheckInvalidSessionUsernameHeaderAndReturn401AndD  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(testInactivity), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(5 * time.Minute)),  	)  	authz := builder.Build() @@ -1353,7 +1355,7 @@ func (s *AuthzSuite) TestShouldNotRedirectRequestsForBypassACLWhenInactiveForToo  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(testInactivity), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),  	)  	authz := builder.Build() @@ -1431,7 +1433,7 @@ func (s *AuthzSuite) TestShouldFailToParsePortalURL() {  	builder := s.Builder()  	builder = builder.WithStrategies( -		NewCookieSessionAuthnStrategy(testInactivity), +		NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),  	)  	authz := builder.Build()  | 
