mirror of
https://github.com/rcourtman/Pulse.git
synced 2026-05-02 21:40:14 +00:00
Coverage for sessionHash, CreateSession, ValidateSession, ValidateAndExtendSession, DeleteSession, persistence, and cleanup. 21 test cases covering session lifecycle, expiration handling, and disk persistence. Coverage 25.0% → 25.3%.
524 lines
12 KiB
Go
524 lines
12 KiB
Go
package api
|
|
|
|
import (
|
|
"os"
|
|
"path/filepath"
|
|
"testing"
|
|
"time"
|
|
)
|
|
|
|
func TestSessionHash(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
token1 string
|
|
token2 string
|
|
same bool
|
|
}{
|
|
{
|
|
name: "same token produces same hash",
|
|
token1: "test-token-123",
|
|
token2: "test-token-123",
|
|
same: true,
|
|
},
|
|
{
|
|
name: "different tokens produce different hashes",
|
|
token1: "token-a",
|
|
token2: "token-b",
|
|
same: false,
|
|
},
|
|
{
|
|
name: "empty token produces consistent hash",
|
|
token1: "",
|
|
token2: "",
|
|
same: true,
|
|
},
|
|
{
|
|
name: "empty vs non-empty token",
|
|
token1: "",
|
|
token2: "something",
|
|
same: false,
|
|
},
|
|
{
|
|
name: "case sensitive",
|
|
token1: "Token",
|
|
token2: "token",
|
|
same: false,
|
|
},
|
|
}
|
|
|
|
for _, tc := range tests {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
hash1 := sessionHash(tc.token1)
|
|
hash2 := sessionHash(tc.token2)
|
|
|
|
if tc.same && hash1 != hash2 {
|
|
t.Errorf("sessionHash(%q) = %q, sessionHash(%q) = %q; want same", tc.token1, hash1, tc.token2, hash2)
|
|
}
|
|
if !tc.same && hash1 == hash2 {
|
|
t.Errorf("sessionHash(%q) and sessionHash(%q) produced same hash %q; want different", tc.token1, tc.token2, hash1)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSessionHash_Format(t *testing.T) {
|
|
hash := sessionHash("test-token")
|
|
|
|
// SHA256 produces 64 hex characters
|
|
if len(hash) != 64 {
|
|
t.Errorf("sessionHash length = %d, want 64", len(hash))
|
|
}
|
|
|
|
// Should only contain hex characters
|
|
for _, c := range hash {
|
|
if !((c >= '0' && c <= '9') || (c >= 'a' && c <= 'f')) {
|
|
t.Errorf("sessionHash contains non-hex character: %c", c)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestSessionHash_Deterministic(t *testing.T) {
|
|
token := "reproducible-token-value"
|
|
|
|
// Call multiple times
|
|
results := make([]string, 100)
|
|
for i := range results {
|
|
results[i] = sessionHash(token)
|
|
}
|
|
|
|
// All results should be identical
|
|
for i := 1; i < len(results); i++ {
|
|
if results[i] != results[0] {
|
|
t.Errorf("sessionHash call %d returned %q, want %q", i, results[i], results[0])
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestSessionData_Fields(t *testing.T) {
|
|
now := time.Now()
|
|
duration := 24 * time.Hour
|
|
|
|
data := SessionData{
|
|
ExpiresAt: now.Add(duration),
|
|
CreatedAt: now,
|
|
UserAgent: "Mozilla/5.0",
|
|
IP: "192.168.1.100",
|
|
OriginalDuration: duration,
|
|
}
|
|
|
|
if data.ExpiresAt.Before(data.CreatedAt) {
|
|
t.Error("ExpiresAt should be after CreatedAt")
|
|
}
|
|
if data.UserAgent != "Mozilla/5.0" {
|
|
t.Errorf("UserAgent = %q, want Mozilla/5.0", data.UserAgent)
|
|
}
|
|
if data.IP != "192.168.1.100" {
|
|
t.Errorf("IP = %q, want 192.168.1.100", data.IP)
|
|
}
|
|
if data.OriginalDuration != duration {
|
|
t.Errorf("OriginalDuration = %v, want %v", data.OriginalDuration, duration)
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_CreateAndValidate(t *testing.T) {
|
|
tmpDir := t.TempDir()
|
|
|
|
store := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: tmpDir,
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
token := "test-session-token"
|
|
duration := time.Hour
|
|
|
|
// Create session
|
|
store.CreateSession(token, duration, "TestAgent", "127.0.0.1")
|
|
|
|
// Validate session
|
|
if !store.ValidateSession(token) {
|
|
t.Error("ValidateSession returned false for valid session")
|
|
}
|
|
|
|
// Verify internal state
|
|
store.mu.RLock()
|
|
key := sessionHash(token)
|
|
session, exists := store.sessions[key]
|
|
store.mu.RUnlock()
|
|
|
|
if !exists {
|
|
t.Fatal("Session not found in store")
|
|
}
|
|
if session.UserAgent != "TestAgent" {
|
|
t.Errorf("UserAgent = %q, want TestAgent", session.UserAgent)
|
|
}
|
|
if session.IP != "127.0.0.1" {
|
|
t.Errorf("IP = %q, want 127.0.0.1", session.IP)
|
|
}
|
|
if session.OriginalDuration != duration {
|
|
t.Errorf("OriginalDuration = %v, want %v", session.OriginalDuration, duration)
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_ValidateSession_NonExistent(t *testing.T) {
|
|
store := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: t.TempDir(),
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
if store.ValidateSession("nonexistent-token") {
|
|
t.Error("ValidateSession returned true for nonexistent session")
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_ValidateSession_Expired(t *testing.T) {
|
|
store := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: t.TempDir(),
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
token := "expired-token"
|
|
key := sessionHash(token)
|
|
|
|
// Add an already-expired session
|
|
store.mu.Lock()
|
|
store.sessions[key] = &SessionData{
|
|
ExpiresAt: time.Now().Add(-time.Hour), // Expired an hour ago
|
|
CreatedAt: time.Now().Add(-2 * time.Hour),
|
|
}
|
|
store.mu.Unlock()
|
|
|
|
if store.ValidateSession(token) {
|
|
t.Error("ValidateSession returned true for expired session")
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_DeleteSession(t *testing.T) {
|
|
tmpDir := t.TempDir()
|
|
|
|
store := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: tmpDir,
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
token := "delete-me-token"
|
|
|
|
// Create session
|
|
store.CreateSession(token, time.Hour, "", "")
|
|
|
|
// Verify exists
|
|
if !store.ValidateSession(token) {
|
|
t.Fatal("Session should exist before deletion")
|
|
}
|
|
|
|
// Delete session
|
|
store.DeleteSession(token)
|
|
|
|
// Verify deleted
|
|
if store.ValidateSession(token) {
|
|
t.Error("Session should not exist after deletion")
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_ValidateAndExtendSession(t *testing.T) {
|
|
store := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: t.TempDir(),
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
token := "extend-me-token"
|
|
duration := time.Hour
|
|
|
|
// Create session
|
|
store.CreateSession(token, duration, "", "")
|
|
|
|
// Get original expiry
|
|
store.mu.RLock()
|
|
key := sessionHash(token)
|
|
originalExpiry := store.sessions[key].ExpiresAt
|
|
store.mu.RUnlock()
|
|
|
|
// Wait a moment
|
|
time.Sleep(10 * time.Millisecond)
|
|
|
|
// Validate and extend
|
|
if !store.ValidateAndExtendSession(token) {
|
|
t.Error("ValidateAndExtendSession returned false for valid session")
|
|
}
|
|
|
|
// Verify expiry was extended
|
|
store.mu.RLock()
|
|
newExpiry := store.sessions[key].ExpiresAt
|
|
store.mu.RUnlock()
|
|
|
|
if !newExpiry.After(originalExpiry) {
|
|
t.Error("Session expiry was not extended")
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_ValidateAndExtendSession_NonExistent(t *testing.T) {
|
|
store := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: t.TempDir(),
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
if store.ValidateAndExtendSession("nonexistent-token") {
|
|
t.Error("ValidateAndExtendSession returned true for nonexistent session")
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_ValidateAndExtendSession_Expired(t *testing.T) {
|
|
store := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: t.TempDir(),
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
token := "expired-extend-token"
|
|
key := sessionHash(token)
|
|
|
|
// Add an already-expired session
|
|
store.mu.Lock()
|
|
store.sessions[key] = &SessionData{
|
|
ExpiresAt: time.Now().Add(-time.Hour),
|
|
CreatedAt: time.Now().Add(-2 * time.Hour),
|
|
OriginalDuration: time.Hour,
|
|
}
|
|
store.mu.Unlock()
|
|
|
|
if store.ValidateAndExtendSession(token) {
|
|
t.Error("ValidateAndExtendSession returned true for expired session")
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_ValidateAndExtendSession_ZeroDuration(t *testing.T) {
|
|
store := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: t.TempDir(),
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
token := "zero-duration-token"
|
|
key := sessionHash(token)
|
|
|
|
// Add session with zero original duration
|
|
store.mu.Lock()
|
|
store.sessions[key] = &SessionData{
|
|
ExpiresAt: time.Now().Add(time.Hour),
|
|
CreatedAt: time.Now(),
|
|
OriginalDuration: 0, // Zero duration - should not extend
|
|
}
|
|
store.mu.Unlock()
|
|
|
|
originalExpiry := store.sessions[key].ExpiresAt
|
|
|
|
// Validate and extend
|
|
if !store.ValidateAndExtendSession(token) {
|
|
t.Error("ValidateAndExtendSession returned false for valid session")
|
|
}
|
|
|
|
// Expiry should not change (zero duration means no sliding)
|
|
store.mu.RLock()
|
|
newExpiry := store.sessions[key].ExpiresAt
|
|
store.mu.RUnlock()
|
|
|
|
if !newExpiry.Equal(originalExpiry) {
|
|
t.Error("Session with zero OriginalDuration should not have expiry extended")
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_MultipleSessions(t *testing.T) {
|
|
store := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: t.TempDir(),
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
tokens := []string{"token-1", "token-2", "token-3"}
|
|
|
|
// Create multiple sessions
|
|
for _, token := range tokens {
|
|
store.CreateSession(token, time.Hour, "Agent-"+token, "")
|
|
}
|
|
|
|
// All should be valid
|
|
for _, token := range tokens {
|
|
if !store.ValidateSession(token) {
|
|
t.Errorf("ValidateSession(%q) = false, want true", token)
|
|
}
|
|
}
|
|
|
|
// Delete middle one
|
|
store.DeleteSession("token-2")
|
|
|
|
// First and last should still be valid
|
|
if !store.ValidateSession("token-1") {
|
|
t.Error("token-1 should still be valid")
|
|
}
|
|
if store.ValidateSession("token-2") {
|
|
t.Error("token-2 should be deleted")
|
|
}
|
|
if !store.ValidateSession("token-3") {
|
|
t.Error("token-3 should still be valid")
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_Persistence(t *testing.T) {
|
|
tmpDir := t.TempDir()
|
|
|
|
// Create store and add session
|
|
store1 := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: tmpDir,
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
token := "persistent-token"
|
|
store1.CreateSession(token, time.Hour, "PersistAgent", "10.0.0.1")
|
|
|
|
// Verify file was created
|
|
sessionsFile := filepath.Join(tmpDir, "sessions.json")
|
|
if _, err := os.Stat(sessionsFile); os.IsNotExist(err) {
|
|
t.Fatal("sessions.json was not created")
|
|
}
|
|
|
|
// Create new store that should load from disk
|
|
store2 := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: tmpDir,
|
|
stopChan: make(chan bool),
|
|
}
|
|
store2.load()
|
|
|
|
// Session should be loaded
|
|
if !store2.ValidateSession(token) {
|
|
t.Error("Session was not persisted and loaded correctly")
|
|
}
|
|
|
|
// Verify metadata was preserved
|
|
store2.mu.RLock()
|
|
key := sessionHash(token)
|
|
session := store2.sessions[key]
|
|
store2.mu.RUnlock()
|
|
|
|
if session == nil {
|
|
t.Fatal("Session not found after load")
|
|
}
|
|
if session.UserAgent != "PersistAgent" {
|
|
t.Errorf("UserAgent = %q, want PersistAgent", session.UserAgent)
|
|
}
|
|
if session.IP != "10.0.0.1" {
|
|
t.Errorf("IP = %q, want 10.0.0.1", session.IP)
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_LoadExpiredSessions(t *testing.T) {
|
|
tmpDir := t.TempDir()
|
|
|
|
// Manually create a sessions file with an expired session
|
|
store := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: tmpDir,
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
token := "already-expired"
|
|
key := sessionHash(token)
|
|
|
|
// Add expired session
|
|
store.mu.Lock()
|
|
store.sessions[key] = &SessionData{
|
|
ExpiresAt: time.Now().Add(-time.Hour),
|
|
CreatedAt: time.Now().Add(-2 * time.Hour),
|
|
}
|
|
store.mu.Unlock()
|
|
store.save()
|
|
|
|
// Create new store and load
|
|
store2 := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: tmpDir,
|
|
stopChan: make(chan bool),
|
|
}
|
|
store2.load()
|
|
|
|
// Expired session should not be loaded
|
|
store2.mu.RLock()
|
|
_, exists := store2.sessions[key]
|
|
store2.mu.RUnlock()
|
|
|
|
if exists {
|
|
t.Error("Expired session should not be loaded from disk")
|
|
}
|
|
}
|
|
|
|
func TestSessionStore_Cleanup(t *testing.T) {
|
|
store := &SessionStore{
|
|
sessions: make(map[string]*SessionData),
|
|
dataPath: t.TempDir(),
|
|
stopChan: make(chan bool),
|
|
}
|
|
|
|
// Add a valid and an expired session
|
|
validKey := sessionHash("valid-session")
|
|
expiredKey := sessionHash("expired-session")
|
|
|
|
store.mu.Lock()
|
|
store.sessions[validKey] = &SessionData{
|
|
ExpiresAt: time.Now().Add(time.Hour),
|
|
CreatedAt: time.Now(),
|
|
}
|
|
store.sessions[expiredKey] = &SessionData{
|
|
ExpiresAt: time.Now().Add(-time.Hour),
|
|
CreatedAt: time.Now().Add(-2 * time.Hour),
|
|
}
|
|
store.mu.Unlock()
|
|
|
|
// Run cleanup
|
|
store.cleanup()
|
|
|
|
// Valid session should remain
|
|
store.mu.RLock()
|
|
_, validExists := store.sessions[validKey]
|
|
_, expiredExists := store.sessions[expiredKey]
|
|
store.mu.RUnlock()
|
|
|
|
if !validExists {
|
|
t.Error("Valid session was incorrectly removed during cleanup")
|
|
}
|
|
if expiredExists {
|
|
t.Error("Expired session was not removed during cleanup")
|
|
}
|
|
}
|
|
|
|
func TestSessionPersistedStruct_Fields(t *testing.T) {
|
|
now := time.Now()
|
|
duration := 2 * time.Hour
|
|
|
|
persisted := sessionPersisted{
|
|
Key: "abc123",
|
|
ExpiresAt: now.Add(duration),
|
|
CreatedAt: now,
|
|
UserAgent: "TestUA",
|
|
IP: "1.2.3.4",
|
|
OriginalDuration: duration,
|
|
}
|
|
|
|
if persisted.Key != "abc123" {
|
|
t.Errorf("Key = %q, want abc123", persisted.Key)
|
|
}
|
|
if persisted.UserAgent != "TestUA" {
|
|
t.Errorf("UserAgent = %q, want TestUA", persisted.UserAgent)
|
|
}
|
|
if persisted.IP != "1.2.3.4" {
|
|
t.Errorf("IP = %q, want 1.2.3.4", persisted.IP)
|
|
}
|
|
if persisted.OriginalDuration != duration {
|
|
t.Errorf("OriginalDuration = %v, want %v", persisted.OriginalDuration, duration)
|
|
}
|
|
}
|