test(#134): auth.py Coverage 47.1% → 86%

Security-kritisch — jetzt mit umfassender Test-Abdeckung:

- TestKeycloakUrls: issuer + jwks-URL-Konstruktion
- TestGetJwks: Cache-Hit (frisch), Fetch bei leerem Cache, Stale-Cache
  bei HTTP-Fehler (statt komplettem Crash)
- TestValidateToken: kein JWKS → None
- TestGetCurrentUser: Auth-disabled → None, kein Token → None
- TestRequireAuth: Dev-Modus, 401 ohne Token, 401 ungueltig, 200 mit
  validem Token
- TestRequireAdmin: Dev-admin, admin-Rolle, gwoe-admin-Rolle, 403 ohne
  Admin-Rolle
- TestKeycloakAdminToken: keine Credentials → 500, Erfolg → access_token,
  Keycloak-Fehler → 500

Verbleibend: kid-not-found-Pfad, ExpiredSignature/JWTError/ImportError-
Branches im _validate_token-Inneren — wuerden voll gemockten jose-Stack
brauchen.

Total Coverage: 51.2% → 52.1%, 750 → 769 Tests.
This commit is contained in:
Dotty Dotter 2026-04-28 11:10:08 +02:00
parent 3edb1e7501
commit 58bfc84c41

View File

@ -212,3 +212,257 @@ class TestPickBestTitle:
def test_empty_doc_title_uses_llm(self):
assert _pick_best_title("Guter LLM-Titel", "", "18/123") == "Guter LLM-Titel"
# ─── Coverage-Backfill (#134) ────────────────────────────────────────────────
class TestKeycloakUrls:
def test_issuer_includes_realm(self, monkeypatch):
from app import auth
from app.config import settings
monkeypatch.setattr(settings, "keycloak_url", "https://sso.example")
monkeypatch.setattr(settings, "keycloak_realm", "myrealm")
assert auth._keycloak_issuer() == "https://sso.example/realms/myrealm"
def test_jwks_url_appends_certs(self, monkeypatch):
from app import auth
from app.config import settings
monkeypatch.setattr(settings, "keycloak_url", "https://sso.example")
monkeypatch.setattr(settings, "keycloak_realm", "myrealm")
assert auth._keycloak_jwks_url() == (
"https://sso.example/realms/myrealm/protocol/openid-connect/certs"
)
class TestGetJwks:
"""JWKS-Cache-Verhalten + HTTP-Fehler-Pfad."""
@pytest.mark.asyncio
async def test_returns_cached_when_fresh(self, monkeypatch):
from app import auth
import time as _time
# Stelle sicher: Cache ist gesetzt + nicht abgelaufen
monkeypatch.setattr(auth, "_jwks_cache", {"keys": [{"kid": "abc"}]})
monkeypatch.setattr(auth, "_jwks_cache_time", _time.time())
result = await auth._get_jwks()
assert result == {"keys": [{"kid": "abc"}]}
@pytest.mark.asyncio
async def test_fetches_when_cache_empty(self, monkeypatch):
from app import auth
import httpx as _httpx
from unittest.mock import AsyncMock, MagicMock, patch
monkeypatch.setattr(auth, "_jwks_cache", {})
monkeypatch.setattr(auth, "_jwks_cache_time", 0)
fake_resp = MagicMock(status_code=200, json=lambda: {"keys": [{"kid": "new"}]})
async def fake_get(self, url):
return fake_resp
with patch.object(_httpx.AsyncClient, "get", fake_get):
result = await auth._get_jwks()
assert "keys" in result
assert result["keys"][0]["kid"] == "new"
@pytest.mark.asyncio
async def test_http_error_returns_stale_cache(self, monkeypatch):
from app import auth
import httpx as _httpx
from unittest.mock import patch
# Stale cache vorhanden
monkeypatch.setattr(auth, "_jwks_cache", {"keys": [{"kid": "old"}]})
monkeypatch.setattr(auth, "_jwks_cache_time", 0) # abgelaufen
async def failing_get(self, url):
raise _httpx.ConnectError("network down")
with patch.object(_httpx.AsyncClient, "get", failing_get):
result = await auth._get_jwks()
# Stale-Cache wird zurueckgegeben
assert result == {"keys": [{"kid": "old"}]}
class TestValidateToken:
"""_validate_token: Schlüssel-Lookup, Payload-Mapping."""
@pytest.mark.asyncio
async def test_no_jwks_returns_none(self, monkeypatch):
from app import auth
async def fake_jwks():
return {}
monkeypatch.setattr(auth, "_get_jwks", fake_jwks)
result = await auth._validate_token("any-token")
assert result is None
class TestGetCurrentUser:
@pytest.mark.asyncio
async def test_returns_none_when_auth_disabled(self, monkeypatch):
from app import auth
from unittest.mock import MagicMock
monkeypatch.setattr(auth, "_is_auth_enabled", lambda: False)
request = MagicMock(headers={}, cookies={})
assert await auth.get_current_user(request) is None
@pytest.mark.asyncio
async def test_returns_none_when_no_token(self, monkeypatch):
from app import auth
from unittest.mock import MagicMock
monkeypatch.setattr(auth, "_is_auth_enabled", lambda: True)
request = MagicMock()
request.headers.get = lambda k, d="": ""
request.cookies.get = lambda k: None
assert await auth.get_current_user(request) is None
class TestRequireAuth:
@pytest.mark.asyncio
async def test_dev_mode_returns_anonymous(self, monkeypatch):
from app import auth
from unittest.mock import MagicMock
monkeypatch.setattr(auth, "_is_auth_enabled", lambda: False)
request = MagicMock()
user = await auth.require_auth(request)
assert user["sub"] == "anonymous"
assert "Dev-Modus" in user["name"]
@pytest.mark.asyncio
async def test_no_token_raises_401(self, monkeypatch):
from fastapi import HTTPException
from app import auth
from unittest.mock import MagicMock
monkeypatch.setattr(auth, "_is_auth_enabled", lambda: True)
request = MagicMock()
request.headers.get = lambda k, d="": ""
request.cookies.get = lambda k: None
with pytest.raises(HTTPException) as exc:
await auth.require_auth(request)
assert exc.value.status_code == 401
@pytest.mark.asyncio
async def test_invalid_token_raises_401(self, monkeypatch):
from fastapi import HTTPException
from app import auth
from unittest.mock import MagicMock
monkeypatch.setattr(auth, "_is_auth_enabled", lambda: True)
async def fake_validate(t): return None
monkeypatch.setattr(auth, "_validate_token", fake_validate)
request = MagicMock()
request.headers.get = lambda k, d="": "Bearer bad-token"
request.cookies.get = lambda k: None
with pytest.raises(HTTPException) as exc:
await auth.require_auth(request)
assert exc.value.status_code == 401
@pytest.mark.asyncio
async def test_valid_token_returns_user(self, monkeypatch):
from app import auth
from unittest.mock import MagicMock
monkeypatch.setattr(auth, "_is_auth_enabled", lambda: True)
async def fake_validate(t): return {"sub": "u1", "email": "a@b", "name": "X", "roles": []}
monkeypatch.setattr(auth, "_validate_token", fake_validate)
request = MagicMock()
request.headers.get = lambda k, d="": "Bearer ok-token"
user = await auth.require_auth(request)
assert user["sub"] == "u1"
class TestRequireAdmin:
@pytest.mark.asyncio
async def test_dev_mode_returns_anonymous_admin(self, monkeypatch):
from app import auth
from unittest.mock import MagicMock
monkeypatch.setattr(auth, "_is_auth_enabled", lambda: False)
user = await auth.require_admin(MagicMock())
assert "admin" in user["roles"]
@pytest.mark.asyncio
async def test_admin_role_passes(self, monkeypatch):
from app import auth
from unittest.mock import MagicMock
monkeypatch.setattr(auth, "_is_auth_enabled", lambda: True)
async def fake_require_auth(req): return {"sub": "u1", "roles": ["admin"]}
monkeypatch.setattr(auth, "require_auth", fake_require_auth)
user = await auth.require_admin(MagicMock())
assert "admin" in user["roles"]
@pytest.mark.asyncio
async def test_gwoe_admin_role_passes(self, monkeypatch):
from app import auth
from unittest.mock import MagicMock
monkeypatch.setattr(auth, "_is_auth_enabled", lambda: True)
async def fake_require_auth(req): return {"sub": "u1", "roles": ["gwoe-admin"]}
monkeypatch.setattr(auth, "require_auth", fake_require_auth)
user = await auth.require_admin(MagicMock())
assert "gwoe-admin" in user["roles"]
@pytest.mark.asyncio
async def test_no_admin_role_raises_403(self, monkeypatch):
from fastapi import HTTPException
from app import auth
from unittest.mock import MagicMock
monkeypatch.setattr(auth, "_is_auth_enabled", lambda: True)
async def fake_require_auth(req): return {"sub": "u1", "roles": ["user"]}
monkeypatch.setattr(auth, "require_auth", fake_require_auth)
with pytest.raises(HTTPException) as exc:
await auth.require_admin(MagicMock())
assert exc.value.status_code == 403
class TestKeycloakAdminToken:
@pytest.mark.asyncio
async def test_no_credentials_raises(self, monkeypatch):
from fastapi import HTTPException
from app import auth
from app.config import settings
monkeypatch.setattr(settings, "keycloak_admin_user", "")
with pytest.raises(HTTPException) as exc:
await auth.keycloak_admin_token()
assert exc.value.status_code == 500
@pytest.mark.asyncio
async def test_returns_access_token_on_success(self, monkeypatch):
from app import auth
from app.config import settings
from unittest.mock import MagicMock, patch
import httpx as _httpx
monkeypatch.setattr(settings, "keycloak_admin_user", "admin")
monkeypatch.setattr(settings, "keycloak_admin_password", "secret")
monkeypatch.setattr(settings, "keycloak_url", "https://sso.example")
fake_resp = MagicMock(status_code=200,
json=lambda: {"access_token": "TOKEN-123"})
async def fake_post(self, url, data=None, **kw):
return fake_resp
with patch.object(_httpx.AsyncClient, "post", fake_post):
tok = await auth.keycloak_admin_token()
assert tok == "TOKEN-123"
@pytest.mark.asyncio
async def test_keycloak_error_raises_500(self, monkeypatch):
from fastapi import HTTPException
from app import auth
from app.config import settings
from unittest.mock import MagicMock, patch
import httpx as _httpx
monkeypatch.setattr(settings, "keycloak_admin_user", "admin")
monkeypatch.setattr(settings, "keycloak_admin_password", "secret")
fake_resp = MagicMock(status_code=500, text="server error")
async def fake_post(self, url, data=None, **kw):
return fake_resp
with patch.object(_httpx.AsyncClient, "post", fake_post):
with pytest.raises(HTTPException) as exc:
await auth.keycloak_admin_token()
assert exc.value.status_code == 500