mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
40574bc8ec
Before this fix an anonymous user was not able to access a resource that were configured with a bypass policy. This was due to a useless check of the userid in the auth session. Moreover, in the case of an anonymous user, we should not check the inactivity period since there is no session. Also refactor /verify endpoint for better testability and add tests in a new suite.
36 lines
1.1 KiB
TypeScript
36 lines
1.1 KiB
TypeScript
import fs from 'fs';
|
|
import { exec } from "../../helpers/utils/exec";
|
|
import AutheliaServer from "../../helpers/context/AutheliaServer";
|
|
import DockerEnvironment from "../../helpers/context/DockerEnvironment";
|
|
|
|
const autheliaServer = new AutheliaServer(__dirname + '/config.yml');
|
|
const dockerEnv = new DockerEnvironment([
|
|
'docker-compose.yml',
|
|
'example/compose/nginx/backend/docker-compose.yml',
|
|
'example/compose/nginx/portal/docker-compose.yml',
|
|
'example/compose/smtp/docker-compose.yml',
|
|
])
|
|
|
|
async function setup() {
|
|
await exec(`cp ${__dirname}/users_database.yml ${__dirname}/users_database.test.yml`);
|
|
await exec('mkdir -p /tmp/authelia/db');
|
|
await exec('./example/compose/nginx/portal/render.js ' + (fs.existsSync('.suite') ? '': '--production'));
|
|
await dockerEnv.start();
|
|
await autheliaServer.start();
|
|
}
|
|
|
|
async function teardown() {
|
|
await autheliaServer.stop();
|
|
await dockerEnv.stop();
|
|
await exec('rm -rf /tmp/authelia/db');
|
|
}
|
|
|
|
const setup_timeout = 30000;
|
|
const teardown_timeout = 30000;
|
|
|
|
export {
|
|
setup,
|
|
setup_timeout,
|
|
teardown,
|
|
teardown_timeout
|
|
}; |