summaryrefslogtreecommitdiff
path: root/internal/auth/handlers_test.go
blob: 3e154ce0ec0360e805c32c1ca1afd61102e43c4b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
package auth

import (
	"database/sql"
	"html/template"
	"net/http"
	"net/http/httptest"
	"net/url"
	"strings"
	"testing"
	"time"

	"github.com/DATA-DOG/go-sqlmock"
	"github.com/alexedwards/scs/v2"
	"golang.org/x/crypto/bcrypt"
)

func TestHandleLogin(t *testing.T) {
	db, mock, err := sqlmock.New()
	if err != nil {
		t.Fatalf("an error '%s' was not expected when opening a stub database connection", err)
	}
	defer db.Close()

	service := NewService(db)
	sessionManager := scs.New()
	templates := template.Must(template.New("login.html").Parse("{{.Error}}"))

	handlers := NewHandlers(service, sessionManager, templates)

	// Setup mock user
	password := "password"
	hash, _ := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)
	rows := sqlmock.NewRows([]string{"id", "username", "password_hash", "created_at"}).
		AddRow(1, "testuser", string(hash), time.Now())

	mock.ExpectQuery("SELECT id, username, password_hash, created_at FROM users WHERE username = ?").
		WithArgs("testuser").
		WillReturnRows(rows)

	// Create request
	form := url.Values{}
	form.Add("username", "testuser")
	form.Add("password", "password")
	req := httptest.NewRequest("POST", "/login", strings.NewReader(form.Encode()))
	req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
	
	// Wrap request with session middleware
	ctx, _ := sessionManager.Load(req.Context(), "")
	req = req.WithContext(ctx)

	rr := httptest.NewRecorder()

	handlers.HandleLogin(rr, req)

	if status := rr.Code; status != http.StatusSeeOther {
		t.Errorf("handler returned wrong status code: got %v want %v",
			status, http.StatusSeeOther)
	}

	if err := mock.ExpectationsWereMet(); err != nil {
		t.Errorf("there were unfulfilled expectations: %s", err)
	}
}

func TestHandleLogin_InvalidCredentials(t *testing.T) {
	db, mock, err := sqlmock.New()
	if err != nil {
		t.Fatalf("an error '%s' was not expected when opening a stub database connection", err)
	}
	defer db.Close()

	service := NewService(db)
	sessionManager := scs.New()
	templates := template.Must(template.New("login.html").Parse("{{.Error}}"))

	handlers := NewHandlers(service, sessionManager, templates)

	mock.ExpectQuery("SELECT id, username, password_hash, created_at FROM users WHERE username = ?").
		WithArgs("testuser").
		WillReturnError(sql.ErrNoRows)

	// Create request
	form := url.Values{}
	form.Add("username", "testuser")
	form.Add("password", "wrongpassword")
	req := httptest.NewRequest("POST", "/login", strings.NewReader(form.Encode()))
	req.Header.Set("Content-Type", "application/x-www-form-urlencoded")

	// Wrap request with session middleware
	ctx, _ := sessionManager.Load(req.Context(), "")
	req = req.WithContext(ctx)

	rr := httptest.NewRecorder()

	handlers.HandleLogin(rr, req)

	if status := rr.Code; status != http.StatusUnauthorized {
		t.Errorf("handler returned wrong status code: got %v want %v",
			status, http.StatusUnauthorized)
	}

	if err := mock.ExpectationsWereMet(); err != nil {
		t.Errorf("there were unfulfilled expectations: %s", err)
	}
}