summaryrefslogtreecommitdiff
path: root/internal/handlers/handler_authz_test.go
diff options
context:
space:
mode:
authorJames Elliott <james-d-elliott@users.noreply.github.com>2023-11-23 08:20:36 +1100
committerGitHub <noreply@github.com>2023-11-23 08:20:36 +1100
commitc49b973120c7fd755923a2b88afd794c7d320d6e (patch)
tree5fcef6de1a85568eee3c67470f73b790b294dda8 /internal/handlers/handler_authz_test.go
parentfa141929a39e546f3f3ca6bcbc7bd72c64e575c8 (diff)
fix(configuration): illogical refresh interval default (#6319)
When using the file provider with watch enabled, the refresh interval should just be set to always default as the cost is minimal. Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
Diffstat (limited to 'internal/handlers/handler_authz_test.go')
-rw-r--r--internal/handlers/handler_authz_test.go32
1 files changed, 17 insertions, 15 deletions
diff --git a/internal/handlers/handler_authz_test.go b/internal/handlers/handler_authz_test.go
index bd32a0228..19d670400 100644
--- a/internal/handlers/handler_authz_test.go
+++ b/internal/handlers/handler_authz_test.go
@@ -279,14 +279,16 @@ func (s *AuthzSuite) TestShouldNotFailOnMissingEmail() {
s.T().Skip()
}
- authz := s.Builder().Build()
-
mock := mocks.NewMockAutheliaCtx(s.T())
defer mock.Close()
+ mock.Ctx.Clock = &mock.Clock
+
mock.Clock.Set(time.Now())
+ authz := s.Builder().WithConfig(&mock.Ctx.Configuration).Build()
+
s.ConfigureMockSessionProviderWithAutomaticAutheliaURLs(mock)
targetURI := s.RequireParseRequestURI("https://bypass.example.com")
@@ -675,7 +677,7 @@ func (s *AuthzSuite) TestShouldDestroySessionWhenInactiveForTooLong() {
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(testInactivity),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),
)
authz := builder.Build()
@@ -725,7 +727,7 @@ func (s *AuthzSuite) TestShouldNotDestroySessionWhenInactiveForTooLongRememberMe
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(testInactivity),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),
)
authz := builder.Build()
@@ -775,7 +777,7 @@ func (s *AuthzSuite) TestShouldNotDestroySessionWhenNotInactiveForTooLong() {
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(testInactivity),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),
)
authz := builder.Build()
@@ -826,7 +828,7 @@ func (s *AuthzSuite) TestShouldUpdateInactivityTimestampEvenWhenHittingForbidden
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(testInactivity),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),
)
authz := builder.Build()
@@ -877,7 +879,7 @@ func (s *AuthzSuite) TestShouldNotRefreshUserDetailsFromBackendWhenRefreshDisabl
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(-1 * time.Second),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDurationNever()),
)
authz := builder.Build()
@@ -900,7 +902,7 @@ func (s *AuthzSuite) TestShouldNotRefreshUserDetailsFromBackendWhenRefreshDisabl
mock.Clock.Set(time.Now())
mock.Ctx.Clock = &mock.Clock
- mock.Ctx.Configuration.AuthenticationBackend.RefreshInterval = schema.ProfileRefreshDisabled
+ mock.Ctx.Configuration.AuthenticationBackend.RefreshInterval = schema.NewRefreshIntervalDurationNever()
mock.Ctx.Configuration.Session.Cookies[0].Inactivity = testInactivity
s.ConfigureMockSessionProviderWithAutomaticAutheliaURLs(mock)
@@ -970,7 +972,7 @@ func (s *AuthzSuite) TestShouldDestroySessionWhenUserDoesNotExist() {
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(5 * time.Minute),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(5 * time.Minute)),
)
authz := builder.Build()
@@ -1058,7 +1060,7 @@ func (s *AuthzSuite) TestShouldUpdateRemovedUserGroupsFromBackendAndDeny() {
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(5 * time.Minute),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(5 * time.Minute)),
)
authz := builder.Build()
@@ -1144,7 +1146,7 @@ func (s *AuthzSuite) TestShouldUpdateAddedUserGroupsFromBackendAndDeny() {
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(5 * time.Minute),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(5 * time.Minute)),
)
authz := builder.Build()
@@ -1229,7 +1231,7 @@ func (s *AuthzSuite) TestShouldCheckValidSessionUsernameHeaderAndReturn200() {
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(testInactivity),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),
)
authz := builder.Build()
@@ -1282,7 +1284,7 @@ func (s *AuthzSuite) TestShouldCheckInvalidSessionUsernameHeaderAndReturn401AndD
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(testInactivity),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(5 * time.Minute)),
)
authz := builder.Build()
@@ -1353,7 +1355,7 @@ func (s *AuthzSuite) TestShouldNotRedirectRequestsForBypassACLWhenInactiveForToo
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(testInactivity),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),
)
authz := builder.Build()
@@ -1431,7 +1433,7 @@ func (s *AuthzSuite) TestShouldFailToParsePortalURL() {
builder := s.Builder()
builder = builder.WithStrategies(
- NewCookieSessionAuthnStrategy(testInactivity),
+ NewCookieSessionAuthnStrategy(schema.NewRefreshIntervalDuration(testInactivity)),
)
authz := builder.Build()