Skip to content
GitHub Actions / Test report for security:test succeeded Mar 5, 2025 in 0s. View latest attempt.

55 passed, 0 failed and 0 skipped

Tests passed successfully

Report Passed Failed Skipped Time
backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationDisabledFilterTest.xml 3βœ… 155ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationFilterTest.xml 10βœ… 151ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationInterceptorTest.xml 4βœ… 133ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.EmailValidInterceptorTest.xml 2βœ… 25ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.SsoAuthenticationInterceptorTest.xml 6βœ… 76ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authorization.OrganizationAuthorizationInterceptorTest.xml 5βœ… 120ms
backend/security/build/test-results/test/TEST-io.tolgee.security.authorization.ProjectAuthorizationInterceptorTest.xml 11βœ… 244ms
backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.GlobalIpRateLimitFilterTest.xml 3βœ… 9ms
backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.GlobalUserRateLimitFilterTest.xml 3βœ… 5ms
backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.RateLimitInterceptorTest.xml 8βœ… 131ms

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationDisabledFilterTest.xml

3 tests were completed in 155ms with 3 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authentication.AuthenticationDisabledFilterTest 3βœ… 155ms

βœ…Β io.tolgee.security.authentication.AuthenticationDisabledFilterTest

βœ… it does not filter when request is OPTIONS()
βœ… it does not require authentication to go through()
βœ… it does not authenticate when authentication is enabled()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationFilterTest.xml

10 tests were completed in 151ms with 10 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authentication.AuthenticationFilterTest 10βœ… 151ms

βœ…Β io.tolgee.security.authentication.AuthenticationFilterTest

βœ… it does not allow request to go through with invalid JWT tokens()
βœ… it does not filter when request is OPTIONS()
βœ… it applies a rate limit on authentication attempts()
βœ… it allows request to go through when using invalid PAK()
βœ… it allows request to go through when using invalid PAT()
βœ… it allows request to go through with valid JWT token()
βœ… it allows request to go through when using expired PAK()
βœ… it allows request to go through when using expired PAT()
βœ… it allows request to go through when using valid PAK()
βœ… it allows request to go through when using valid PAT()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.AuthenticationInterceptorTest.xml

4 tests were completed in 133ms with 4 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authentication.AuthenticationInterceptorTest 4βœ… 133ms

βœ…Β io.tolgee.security.authentication.AuthenticationInterceptorTest

βœ… it ignores super JWT requirement when authentication is disabled()
βœ… it doesn't allow API key authentication by default()
βœ… it enforces the super JWT requirement()
βœ… it doesn't interfere with basic endpoints()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.EmailValidInterceptorTest.xml

2 tests were completed in 25ms with 2 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authentication.EmailValidInterceptorTest 2βœ… 25ms

βœ…Β io.tolgee.security.authentication.EmailValidInterceptorTest

βœ… not throw when annotated by email verification bypass()
βœ… rejects access if the user does not have a verified email()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authentication.SsoAuthenticationInterceptorTest.xml

6 tests were completed in 76ms with 6 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authentication.SsoAuthenticationInterceptorTest 6βœ… 76ms

βœ…Β io.tolgee.security.authentication.SsoAuthenticationInterceptorTest

βœ… it allows access when sso is not forced for the user()
βœ… it allows access for user using sso authentication()
βœ… it rejects access if sso is forced for the user()
βœ… it allows access for user with invalid email as username()
βœ… it allows access for user using sso global authentication()
βœ… it allows access when annotated by email verification bypass()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authorization.OrganizationAuthorizationInterceptorTest.xml

5 tests were completed in 120ms with 5 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authorization.OrganizationAuthorizationInterceptorTest 5βœ… 120ms

βœ…Β io.tolgee.security.authorization.OrganizationAuthorizationInterceptorTest

βœ… rejects access if the user does not have a sufficiently high role()
βœ… it hides the organization if the user cannot see it()
βœ… it has no effect on endpoints not specific to a single organization()
βœ… it requires an annotation to be present on the handler()
βœ… it does not allow both annotations to be present()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.authorization.ProjectAuthorizationInterceptorTest.xml

11 tests were completed in 244ms with 11 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.authorization.ProjectAuthorizationInterceptorTest 11βœ… 244ms

βœ…Β io.tolgee.security.authorization.ProjectAuthorizationInterceptorTest

βœ… it hides the organization if the user cannot see it()
βœ… permissions work as intended when using implicit project id()
βœ… it does not let scopes on the key work if the authenticated user does not have them()
βœ… it has no effect on endpoints not specific to a single project()
βœ… ensures API key works only for the project it is bound to()
βœ… rejects access if the user is admin and authorizes with API key()
βœ… rejects access if the user does not have the required scope (single scope)()
βœ… it restricts scopes (multiple scopes)()
βœ… it requires an annotation to be present on the handler()
βœ… it does not allow both annotations to be present()
βœ… rejects access if the user does not have the required scope (multiple scopes)()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.GlobalIpRateLimitFilterTest.xml

3 tests were completed in 9ms with 3 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.ratelimit.GlobalIpRateLimitFilterTest 3βœ… 9ms

βœ…Β io.tolgee.security.ratelimit.GlobalIpRateLimitFilterTest

βœ… it lets requests through()
βœ… it does not let rate limited requests through()
βœ… it does rate limit if request is OPTIONS()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.GlobalUserRateLimitFilterTest.xml

3 tests were completed in 5ms with 3 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.ratelimit.GlobalUserRateLimitFilterTest 3βœ… 5ms

βœ…Β io.tolgee.security.ratelimit.GlobalUserRateLimitFilterTest

βœ… it lets requests through()
βœ… it does not let rate limited requests through()
βœ… it does rate limit if request is OPTIONS()

βœ…Β backend/security/build/test-results/test/TEST-io.tolgee.security.ratelimit.RateLimitInterceptorTest.xml

8 tests were completed in 131ms with 8 passed, 0 failed and 0 skipped.

Test suite Passed Failed Skipped Time
io.tolgee.security.ratelimit.RateLimitInterceptorTest 8βœ… 131ms

βœ…Β io.tolgee.security.ratelimit.RateLimitInterceptorTest

βœ… it rate limits requests according to the specified policy()
βœ… endpoint rate limit policy is correctly extracted from annotations()
βœ… endpoint rate limit bucket correctly discriminates against major path variables()
βœ… endpoint rate limit uses the correct user or ip discrimination method()
βœ… it uses different buckets for different paths()
βœ… it does not rate limit when limits are disabled()
βœ… it does not rate limit when there are no annotations()
βœ… it uses the same buckets for paths with a shared bucket()