Skip to content

fix: explicitly redirect user to next page when oauth login succeeds

Sign in for the full log view
GitHub Actions / Test report for security:test succeeded Mar 4, 2025 in 0s

55 passed, 0 failed and 0 skipped

Tests passed successfully

Report Passed Failed Skipped Time
backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationDisabledFilterTest.xml 3βœ… 165ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationFilterTest.xml 10βœ… 142ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationInterceptorTest.xml 4βœ… 135ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.EmailValidInterceptorTest.xml 2βœ… 20ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.SsoAuthenticationInterceptorTest.xml 6βœ… 82ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authorization.OrganizationAuthorizationInterceptorTest.xml 5βœ… 102ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authorization.ProjectAuthorizationInterceptorTest.xml 11βœ… 249ms
backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.GlobalIpRateLimitFilterTest.xml 3βœ… 10ms
backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.GlobalUserRateLimitFilterTest.xml 3βœ… 6ms
backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.RateLimitInterceptorTest.xml 8βœ… 117ms

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationDisabledFilterTest.xml

3 tests were completed in 165ms with 3 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authentication.AuthenticationDisabledFilterTest 3βœ… 165ms

βœ…Β io.tolgee.security.authentication.AuthenticationDisabledFilterTest

βœ… it does not filter when request is OPTIONS()
βœ… it does not require authentication to go through()
βœ… it does not authenticate when authentication is enabled()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationFilterTest.xml

10 tests were completed in 142ms with 10 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authentication.AuthenticationFilterTest 10βœ… 142ms

βœ…Β io.tolgee.security.authentication.AuthenticationFilterTest

βœ… it does not allow request to go through with invalid JWT tokens()
βœ… it does not filter when request is OPTIONS()
βœ… it applies a rate limit on authentication attempts()
βœ… it allows request to go through when using invalid PAK()
βœ… it allows request to go through when using invalid PAT()
βœ… it allows request to go through with valid JWT token()
βœ… it allows request to go through when using expired PAK()
βœ… it allows request to go through when using expired PAT()
βœ… it allows request to go through when using valid PAK()
βœ… it allows request to go through when using valid PAT()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationInterceptorTest.xml

4 tests were completed in 135ms with 4 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authentication.AuthenticationInterceptorTest 4βœ… 135ms

βœ…Β io.tolgee.security.authentication.AuthenticationInterceptorTest

βœ… it ignores super JWT requirement when authentication is disabled()
βœ… it doesn't allow API key authentication by default()
βœ… it enforces the super JWT requirement()
βœ… it doesn't interfere with basic endpoints()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.EmailValidInterceptorTest.xml

2 tests were completed in 20ms with 2 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authentication.EmailValidInterceptorTest 2βœ… 20ms

βœ…Β io.tolgee.security.authentication.EmailValidInterceptorTest

βœ… not throw when annotated by email verification bypass()
βœ… rejects access if the user does not have a verified email()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.SsoAuthenticationInterceptorTest.xml

6 tests were completed in 82ms with 6 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authentication.SsoAuthenticationInterceptorTest 6βœ… 82ms

βœ…Β io.tolgee.security.authentication.SsoAuthenticationInterceptorTest

βœ… it allows access when sso is not forced for the user()
βœ… it allows access for user using sso authentication()
βœ… it rejects access if sso is forced for the user()
βœ… it allows access for user with invalid email as username()
βœ… it allows access for user using sso global authentication()
βœ… it allows access when annotated by email verification bypass()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authorization.OrganizationAuthorizationInterceptorTest.xml

5 tests were completed in 102ms with 5 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authorization.OrganizationAuthorizationInterceptorTest 5βœ… 102ms

βœ…Β io.tolgee.security.authorization.OrganizationAuthorizationInterceptorTest

βœ… rejects access if the user does not have a sufficiently high role()
βœ… it hides the organization if the user cannot see it()
βœ… it has no effect on endpoints not specific to a single organization()
βœ… it requires an annotation to be present on the handler()
βœ… it does not allow both annotations to be present()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authorization.ProjectAuthorizationInterceptorTest.xml

11 tests were completed in 249ms with 11 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authorization.ProjectAuthorizationInterceptorTest 11βœ… 249ms

βœ…Β io.tolgee.security.authorization.ProjectAuthorizationInterceptorTest

βœ… it hides the organization if the user cannot see it()
βœ… permissions work as intended when using implicit project id()
βœ… it does not let scopes on the key work if the authenticated user does not have them()
βœ… it has no effect on endpoints not specific to a single project()
βœ… ensures API key works only for the project it is bound to()
βœ… rejects access if the user is admin and authorizes with API key()
βœ… rejects access if the user does not have the required scope (single scope)()
βœ… it restricts scopes (multiple scopes)()
βœ… it requires an annotation to be present on the handler()
βœ… it does not allow both annotations to be present()
βœ… rejects access if the user does not have the required scope (multiple scopes)()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.GlobalIpRateLimitFilterTest.xml

3 tests were completed in 10ms with 3 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.ratelimit.GlobalIpRateLimitFilterTest 3βœ… 10ms

βœ…Β io.tolgee.security.ratelimit.GlobalIpRateLimitFilterTest

βœ… it lets requests through()
βœ… it does not let rate limited requests through()
βœ… it does rate limit if request is OPTIONS()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.GlobalUserRateLimitFilterTest.xml

3 tests were completed in 6ms with 3 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.ratelimit.GlobalUserRateLimitFilterTest 3βœ… 6ms

βœ…Β io.tolgee.security.ratelimit.GlobalUserRateLimitFilterTest

βœ… it lets requests through()
βœ… it does not let rate limited requests through()
βœ… it does rate limit if request is OPTIONS()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.RateLimitInterceptorTest.xml

8 tests were completed in 117ms with 8 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.ratelimit.RateLimitInterceptorTest 8βœ… 117ms

βœ…Β io.tolgee.security.ratelimit.RateLimitInterceptorTest

βœ… it rate limits requests according to the specified policy()
βœ… endpoint rate limit policy is correctly extracted from annotations()
βœ… endpoint rate limit bucket correctly discriminates against major path variables()
βœ… endpoint rate limit uses the correct user or ip discrimination method()
βœ… it uses different buckets for different paths()
βœ… it does not rate limit when limits are disabled()
βœ… it does not rate limit when there are no annotations()
βœ… it uses the same buckets for paths with a shared bucket()