mirror of
https://github.com/rcourtman/Pulse.git
synced 2026-02-18 00:17:39 +01:00
Cover tenant user membership checks
This commit is contained in:
121
internal/api/tenant_user_membership_test.go
Normal file
121
internal/api/tenant_user_membership_test.go
Normal file
@@ -0,0 +1,121 @@
|
||||
package api
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"strings"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/rcourtman/pulse-go-rewrite/internal/config"
|
||||
"github.com/rcourtman/pulse-go-rewrite/internal/models"
|
||||
internalauth "github.com/rcourtman/pulse-go-rewrite/pkg/auth"
|
||||
)
|
||||
|
||||
func TestTenantMiddlewareAllowsMemberSession(t *testing.T) {
|
||||
defer SetMultiTenantEnabled(false)
|
||||
SetMultiTenantEnabled(true)
|
||||
// Dev mode enables license checks for multi-tenant features.
|
||||
t.Setenv("PULSE_DEV", "true")
|
||||
|
||||
dataDir := t.TempDir()
|
||||
hashed, err := internalauth.HashPassword("Password!1")
|
||||
if err != nil {
|
||||
t.Fatalf("hash password: %v", err)
|
||||
}
|
||||
|
||||
cfg := &config.Config{
|
||||
DataPath: dataDir,
|
||||
ConfigPath: dataDir,
|
||||
AuthUser: "admin",
|
||||
AuthPass: hashed,
|
||||
}
|
||||
|
||||
org := &models.Organization{
|
||||
ID: "org-a",
|
||||
DisplayName: "Org A",
|
||||
OwnerUserID: "alice",
|
||||
Members: []models.OrganizationMember{
|
||||
{UserID: "alice", Role: models.OrgRoleOwner, AddedAt: time.Now()},
|
||||
},
|
||||
}
|
||||
mtp := config.NewMultiTenantPersistence(dataDir)
|
||||
if err := mtp.SaveOrganization(org); err != nil {
|
||||
t.Fatalf("save organization: %v", err)
|
||||
}
|
||||
|
||||
router := NewRouter(cfg, nil, nil, nil, nil, "1.0.0")
|
||||
|
||||
sessionToken := "member-session-token"
|
||||
GetSessionStore().CreateSession(sessionToken, time.Hour, "agent", "127.0.0.1", "alice")
|
||||
|
||||
req := httptest.NewRequest(http.MethodGet, "/api/config", nil)
|
||||
req.Header.Set("X-Pulse-Org-ID", "org-a")
|
||||
req.AddCookie(&http.Cookie{Name: "pulse_session", Value: sessionToken})
|
||||
rec := httptest.NewRecorder()
|
||||
router.Handler().ServeHTTP(rec, req)
|
||||
|
||||
if rec.Code != http.StatusOK {
|
||||
t.Fatalf("expected 200 for org member, got %d", rec.Code)
|
||||
}
|
||||
}
|
||||
|
||||
func TestTenantMiddlewareRejectsNonMemberSession(t *testing.T) {
|
||||
defer SetMultiTenantEnabled(false)
|
||||
SetMultiTenantEnabled(true)
|
||||
// Dev mode enables license checks for multi-tenant features.
|
||||
t.Setenv("PULSE_DEV", "true")
|
||||
|
||||
dataDir := t.TempDir()
|
||||
hashed, err := internalauth.HashPassword("Password!1")
|
||||
if err != nil {
|
||||
t.Fatalf("hash password: %v", err)
|
||||
}
|
||||
|
||||
cfg := &config.Config{
|
||||
DataPath: dataDir,
|
||||
ConfigPath: dataDir,
|
||||
AuthUser: "admin",
|
||||
AuthPass: hashed,
|
||||
}
|
||||
|
||||
org := &models.Organization{
|
||||
ID: "org-a",
|
||||
DisplayName: "Org A",
|
||||
OwnerUserID: "alice",
|
||||
Members: []models.OrganizationMember{
|
||||
{UserID: "alice", Role: models.OrgRoleOwner, AddedAt: time.Now()},
|
||||
},
|
||||
}
|
||||
mtp := config.NewMultiTenantPersistence(dataDir)
|
||||
if err := mtp.SaveOrganization(org); err != nil {
|
||||
t.Fatalf("save organization: %v", err)
|
||||
}
|
||||
|
||||
router := NewRouter(cfg, nil, nil, nil, nil, "1.0.0")
|
||||
|
||||
sessionToken := "nonmember-session-token"
|
||||
GetSessionStore().CreateSession(sessionToken, time.Hour, "agent", "127.0.0.1", "bob")
|
||||
|
||||
req := httptest.NewRequest(http.MethodGet, "/api/config", nil)
|
||||
req.Header.Set("X-Pulse-Org-ID", "org-a")
|
||||
req.AddCookie(&http.Cookie{Name: "pulse_session", Value: sessionToken})
|
||||
rec := httptest.NewRecorder()
|
||||
router.Handler().ServeHTTP(rec, req)
|
||||
|
||||
if rec.Code != http.StatusForbidden {
|
||||
t.Fatalf("expected 403 for non-member, got %d", rec.Code)
|
||||
}
|
||||
|
||||
var payload map[string]string
|
||||
if err := json.Unmarshal(rec.Body.Bytes(), &payload); err != nil {
|
||||
t.Fatalf("decode response: %v", err)
|
||||
}
|
||||
if payload["error"] != "access_denied" {
|
||||
t.Fatalf("expected error=access_denied, got %q", payload["error"])
|
||||
}
|
||||
if msg := payload["message"]; msg == "" || !strings.Contains(msg, "member") {
|
||||
t.Fatalf("expected member access denied message, got %q", msg)
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user