- Introduced new unit tests for session CRUD operations, including `update_refresh_token`, `cleanup_expired`, and multi-user session handling. - Added comprehensive tests for `CRUDBase` methods, covering edge cases, error handling, and UUID validation. - Reduced default test session creation from 5 to 2 for performance optimization. - Enhanced pagination, filtering, and sorting validations in `get_multi_with_total`. - Improved error handling with descriptive assertions for database exceptions. - Introduced tests for eager-loaded relationships in user sessions for comprehensive coverage.
75 lines
3.0 KiB
Python
Executable File
75 lines
3.0 KiB
Python
Executable File
# tests/api/test_security_headers.py
|
|
import pytest
|
|
from fastapi.testclient import TestClient
|
|
from unittest.mock import patch
|
|
|
|
from app.main import app
|
|
|
|
|
|
@pytest.fixture(scope="module")
|
|
def client():
|
|
"""Create a FastAPI test client for the main app (module-scoped for speed)."""
|
|
# Mock get_db to avoid database connection issues
|
|
with patch("app.core.database.get_db") as mock_get_db:
|
|
async def mock_session_generator():
|
|
from unittest.mock import MagicMock, AsyncMock
|
|
mock_session = MagicMock()
|
|
mock_session.execute = AsyncMock(return_value=None)
|
|
mock_session.close = AsyncMock(return_value=None)
|
|
yield mock_session
|
|
|
|
mock_get_db.side_effect = lambda: mock_session_generator()
|
|
yield TestClient(app)
|
|
|
|
|
|
class TestSecurityHeaders:
|
|
"""Tests for security headers middleware"""
|
|
|
|
def test_all_security_headers(self, client):
|
|
"""Test all security headers in a single request for speed"""
|
|
response = client.get("/health")
|
|
|
|
# Test X-Frame-Options
|
|
assert "X-Frame-Options" in response.headers
|
|
assert response.headers["X-Frame-Options"] == "DENY"
|
|
|
|
# Test X-Content-Type-Options
|
|
assert "X-Content-Type-Options" in response.headers
|
|
assert response.headers["X-Content-Type-Options"] == "nosniff"
|
|
|
|
# Test X-XSS-Protection
|
|
assert "X-XSS-Protection" in response.headers
|
|
assert response.headers["X-XSS-Protection"] == "1; mode=block"
|
|
|
|
# Test Content-Security-Policy
|
|
assert "Content-Security-Policy" in response.headers
|
|
assert "default-src 'self'" in response.headers["Content-Security-Policy"]
|
|
assert "frame-ancestors 'none'" in response.headers["Content-Security-Policy"]
|
|
|
|
# Test Permissions-Policy
|
|
assert "Permissions-Policy" in response.headers
|
|
assert "geolocation=()" in response.headers["Permissions-Policy"]
|
|
assert "microphone=()" in response.headers["Permissions-Policy"]
|
|
assert "camera=()" in response.headers["Permissions-Policy"]
|
|
|
|
# Test Referrer-Policy
|
|
assert "Referrer-Policy" in response.headers
|
|
assert response.headers["Referrer-Policy"] == "strict-origin-when-cross-origin"
|
|
|
|
def test_hsts_not_in_development(self, client):
|
|
"""Test that Strict-Transport-Security header is not set in development"""
|
|
from app.core.config import settings
|
|
|
|
# In development, HSTS should not be present
|
|
if settings.ENVIRONMENT == "development":
|
|
response = client.get("/health")
|
|
assert "Strict-Transport-Security" not in response.headers
|
|
|
|
def test_security_headers_on_404(self, client):
|
|
"""Test that security headers are present even on 404 responses"""
|
|
response = client.get("/nonexistent-endpoint")
|
|
assert response.status_code == 404
|
|
assert "X-Frame-Options" in response.headers
|
|
assert "X-Content-Type-Options" in response.headers
|
|
assert "X-XSS-Protection" in response.headers
|