mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
e041143f87
* feat(session): add redis sentinel provider * refactor(session): use int for ports as per go standards * refactor(configuration): adjust tests and validation * refactor(configuration): add err format consts * refactor(configuration): explicitly map redis structs * refactor(session): merge redis/redis sentinel providers * refactor(session): add additional checks to redis providers * feat(session): add redis cluster provider * fix: update config for new values * fix: provide nil certpool to affected tests/mocks * test: add additional tests to cover uncovered code * docs: expand explanation of host and nodes relation for redis * ci: add redis-sentinel to suite highavailability, add redis-sentinel quorum * fix(session): sentinel password * test: use redis alpine library image for redis sentinel, use expose instead of ports, use redis ip, adjust redis ip range, adjust redis config * test: make entrypoint.sh executable, fix entrypoint.sh if/elif * test: add redis failover tests * test: defer docker start, adjust sleep, attempt logout before login, attempt visit before login and tune timeouts, add additional logging * test: add sentinel integration test * test: add secondary node failure to tests, fix password usage, bump test timeout, add sleep * feat: use sentinel failover cluster * fix: renamed addrs to sentineladdrs upstream * test(session): sentinel failover * test: add redis standard back into testing * test: move redis standalone test to traefik2 * fix/docs: apply suggestions from code review
63 lines
1.3 KiB
Go
63 lines
1.3 KiB
Go
package suites
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/suite"
|
|
)
|
|
|
|
type Traefik2Suite struct {
|
|
*SeleniumSuite
|
|
}
|
|
|
|
func NewTraefik2Suite() *Traefik2Suite {
|
|
return &Traefik2Suite{SeleniumSuite: new(SeleniumSuite)}
|
|
}
|
|
|
|
func (s *Traefik2Suite) TestOneFactorScenario() {
|
|
suite.Run(s.T(), NewOneFactorScenario())
|
|
}
|
|
|
|
func (s *Traefik2Suite) TestTwoFactorScenario() {
|
|
suite.Run(s.T(), NewTwoFactorScenario())
|
|
}
|
|
|
|
func (s *Traefik2Suite) TestCustomHeaders() {
|
|
suite.Run(s.T(), NewCustomHeadersScenario())
|
|
}
|
|
|
|
func (s *Traefik2Suite) TestShouldKeepSessionAfterRedisRestart() {
|
|
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
defer cancel()
|
|
|
|
wds, err := StartWebDriver()
|
|
s.Require().NoError(err)
|
|
|
|
defer func() {
|
|
err = wds.Stop()
|
|
s.Require().NoError(err)
|
|
}()
|
|
|
|
secret := wds.doRegisterThenLogout(ctx, s.T(), "john", "password")
|
|
|
|
wds.doLoginTwoFactor(ctx, s.T(), "john", "password", false, secret, "")
|
|
|
|
wds.doVisit(s.T(), fmt.Sprintf("%s/secret.html", SecureBaseURL))
|
|
wds.verifySecretAuthorized(ctx, s.T())
|
|
|
|
err = traefik2DockerEnvironment.Restart("redis")
|
|
s.Require().NoError(err)
|
|
|
|
time.Sleep(5 * time.Second)
|
|
|
|
wds.doVisit(s.T(), fmt.Sprintf("%s/secret.html", SecureBaseURL))
|
|
wds.verifySecretAuthorized(ctx, s.T())
|
|
}
|
|
|
|
func TestTraefik2Suite(t *testing.T) {
|
|
suite.Run(t, NewTraefik2Suite())
|
|
}
|