* feat(auth): add email verification login flow with 401 auto-redirect Replace the old OAuth-based login with email verification codes: - Backend: send-code / verify-code endpoints, verification_codes table (migration 009), rate limiting, Resend email service - Frontend: two-step login UI (email → 6-digit OTP), auth store with sendCode/verifyCode - SDK: ApiClient gains onUnauthorized callback; 401 responses auto-clear token and redirect to /login - Fix login button staying disabled due to global isLoading state Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * fix(auth): add brute-force protection, redirect loop guard, and expired code cleanup - VerifyCode: increment attempts on wrong code, reject after 5 failed tries (migration 010) - onUnauthorized: skip redirect if already on /login to prevent infinite loops - SendCode: best-effort cleanup of expired verification codes older than 1 hour Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * feat(auth): add master verification code for non-production environments Allow code "888888" to bypass email verification in non-production environments to simplify development and testing workflows. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * feat(auth): add personal access tokens for CLI and API authentication Add full-stack PAT support: users create tokens in Settings, CLI authenticates via `multica auth login`. Server stores SHA-256 hashes only. Auth middleware extended to accept both JWTs and PATs (distinguished by `mul_` prefix). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
197 lines
5.6 KiB
Go
197 lines
5.6 KiB
Go
package middleware
|
|
|
|
import (
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
"github.com/multica-ai/multica/server/internal/auth"
|
|
)
|
|
|
|
func generateToken(claims jwt.MapClaims, secret []byte) string {
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
s, _ := token.SignedString(secret)
|
|
return s
|
|
}
|
|
|
|
func validClaims() jwt.MapClaims {
|
|
return jwt.MapClaims{
|
|
"sub": "test-user-id",
|
|
"email": "test@multica.ai",
|
|
"exp": time.Now().Add(time.Hour).Unix(),
|
|
}
|
|
}
|
|
|
|
// authMiddleware returns the Auth middleware with nil queries (JWT-only tests).
|
|
func authMiddleware(next http.Handler) http.Handler {
|
|
return Auth(nil)(next)
|
|
}
|
|
|
|
func TestAuth_MissingHeader(t *testing.T) {
|
|
handler := authMiddleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
t.Fatal("next handler should not be called")
|
|
}))
|
|
|
|
req := httptest.NewRequest("GET", "/api/me", nil)
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusUnauthorized {
|
|
t.Fatalf("expected 401, got %d", w.Code)
|
|
}
|
|
if body := w.Body.String(); body != `{"error":"missing authorization header"}`+"\n" {
|
|
t.Fatalf("unexpected body: %s", body)
|
|
}
|
|
}
|
|
|
|
func TestAuth_NoBearerPrefix(t *testing.T) {
|
|
handler := authMiddleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
t.Fatal("next handler should not be called")
|
|
}))
|
|
|
|
req := httptest.NewRequest("GET", "/api/me", nil)
|
|
req.Header.Set("Authorization", "Token some-token")
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusUnauthorized {
|
|
t.Fatalf("expected 401, got %d", w.Code)
|
|
}
|
|
if body := w.Body.String(); body != `{"error":"invalid authorization format"}`+"\n" {
|
|
t.Fatalf("unexpected body: %s", body)
|
|
}
|
|
}
|
|
|
|
func TestAuth_InvalidToken(t *testing.T) {
|
|
handler := authMiddleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
t.Fatal("next handler should not be called")
|
|
}))
|
|
|
|
req := httptest.NewRequest("GET", "/api/me", nil)
|
|
req.Header.Set("Authorization", "Bearer not-a-valid-jwt")
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusUnauthorized {
|
|
t.Fatalf("expected 401, got %d", w.Code)
|
|
}
|
|
}
|
|
|
|
func TestAuth_ExpiredToken(t *testing.T) {
|
|
handler := authMiddleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
t.Fatal("next handler should not be called")
|
|
}))
|
|
|
|
claims := validClaims()
|
|
claims["exp"] = time.Now().Add(-time.Hour).Unix()
|
|
token := generateToken(claims, auth.JWTSecret())
|
|
|
|
req := httptest.NewRequest("GET", "/api/me", nil)
|
|
req.Header.Set("Authorization", "Bearer "+token)
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusUnauthorized {
|
|
t.Fatalf("expected 401, got %d", w.Code)
|
|
}
|
|
}
|
|
|
|
func TestAuth_WrongSecret(t *testing.T) {
|
|
handler := authMiddleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
t.Fatal("next handler should not be called")
|
|
}))
|
|
|
|
token := generateToken(validClaims(), []byte("wrong-secret"))
|
|
|
|
req := httptest.NewRequest("GET", "/api/me", nil)
|
|
req.Header.Set("Authorization", "Bearer "+token)
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusUnauthorized {
|
|
t.Fatalf("expected 401, got %d", w.Code)
|
|
}
|
|
}
|
|
|
|
func TestAuth_WrongSigningMethod(t *testing.T) {
|
|
handler := authMiddleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
t.Fatal("next handler should not be called")
|
|
}))
|
|
|
|
// Use "none" signing method
|
|
token := jwt.NewWithClaims(jwt.SigningMethodNone, validClaims())
|
|
s, _ := token.SignedString(jwt.UnsafeAllowNoneSignatureType)
|
|
|
|
req := httptest.NewRequest("GET", "/api/me", nil)
|
|
req.Header.Set("Authorization", "Bearer "+s)
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusUnauthorized {
|
|
t.Fatalf("expected 401, got %d", w.Code)
|
|
}
|
|
}
|
|
|
|
func TestAuth_ValidToken(t *testing.T) {
|
|
var gotUserID, gotEmail string
|
|
handler := authMiddleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
gotUserID = r.Header.Get("X-User-ID")
|
|
gotEmail = r.Header.Get("X-User-Email")
|
|
w.WriteHeader(http.StatusOK)
|
|
}))
|
|
|
|
token := generateToken(validClaims(), auth.JWTSecret())
|
|
|
|
req := httptest.NewRequest("GET", "/api/me", nil)
|
|
req.Header.Set("Authorization", "Bearer "+token)
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Fatalf("expected 200, got %d", w.Code)
|
|
}
|
|
if gotUserID != "test-user-id" {
|
|
t.Fatalf("expected X-User-ID 'test-user-id', got '%s'", gotUserID)
|
|
}
|
|
if gotEmail != "test@multica.ai" {
|
|
t.Fatalf("expected X-User-Email 'test@multica.ai', got '%s'", gotEmail)
|
|
}
|
|
}
|
|
|
|
func TestAuth_MissingClaims(t *testing.T) {
|
|
handler := authMiddleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
t.Fatal("next handler should not be called")
|
|
}))
|
|
|
|
// Token with no sub or email claims, only exp
|
|
claims := jwt.MapClaims{
|
|
"exp": time.Now().Add(time.Hour).Unix(),
|
|
}
|
|
token := generateToken(claims, auth.JWTSecret())
|
|
|
|
req := httptest.NewRequest("GET", "/api/me", nil)
|
|
req.Header.Set("Authorization", "Bearer "+token)
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusUnauthorized {
|
|
t.Fatalf("expected 401, got %d", w.Code)
|
|
}
|
|
}
|
|
|
|
func TestAuth_InvalidPAT(t *testing.T) {
|
|
handler := authMiddleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
t.Fatal("next handler should not be called")
|
|
}))
|
|
|
|
req := httptest.NewRequest("GET", "/api/me", nil)
|
|
req.Header.Set("Authorization", "Bearer mul_invalid_token_here")
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusUnauthorized {
|
|
t.Fatalf("expected 401, got %d", w.Code)
|
|
}
|
|
}
|