2026-04-01 17:57:10 +02:00
|
|
|
<?php
|
|
|
|
|
|
|
|
|
|
namespace App\Tests\Security;
|
|
|
|
|
|
|
|
|
|
use App\Entity\User;
|
|
|
|
|
use App\Repository\UserRepository;
|
|
|
|
|
use App\Security\KeycloakAuthenticator;
|
|
|
|
|
use Doctrine\ORM\EntityManagerInterface;
|
|
|
|
|
use KnpU\OAuth2ClientBundle\Client\ClientRegistry;
|
|
|
|
|
use KnpU\OAuth2ClientBundle\Client\OAuth2ClientInterface;
|
2026-04-01 19:30:53 +02:00
|
|
|
use League\OAuth2\Client\Provider\ResourceOwnerInterface;
|
2026-04-01 17:57:10 +02:00
|
|
|
use League\OAuth2\Client\Token\AccessToken;
|
|
|
|
|
use PHPUnit\Framework\TestCase;
|
|
|
|
|
use Symfony\Component\HttpFoundation\RedirectResponse;
|
|
|
|
|
use Symfony\Component\HttpFoundation\Request;
|
2026-04-01 19:30:53 +02:00
|
|
|
use Symfony\Component\HttpFoundation\Session\Flash\FlashBagInterface;
|
2026-04-01 17:57:10 +02:00
|
|
|
use Symfony\Component\HttpFoundation\Session\FlashBagAwareSessionInterface;
|
|
|
|
|
use Symfony\Component\Routing\RouterInterface;
|
|
|
|
|
use Symfony\Component\Security\Core\Authentication\Token\TokenInterface;
|
|
|
|
|
use Symfony\Component\Security\Core\Exception\AuthenticationException;
|
2026-04-01 19:30:53 +02:00
|
|
|
use Symfony\Component\Security\Http\Authenticator\Passport\Badge\UserBadge;
|
2026-04-01 17:57:10 +02:00
|
|
|
use Symfony\Component\Security\Http\Authenticator\Passport\SelfValidatingPassport;
|
|
|
|
|
|
|
|
|
|
class KeycloakAuthenticatorTest extends TestCase
|
|
|
|
|
{
|
|
|
|
|
private ClientRegistry $clientRegistry;
|
|
|
|
|
private EntityManagerInterface $em;
|
|
|
|
|
private UserRepository $userRepository;
|
|
|
|
|
private RouterInterface $router;
|
|
|
|
|
private KeycloakAuthenticator $authenticator;
|
|
|
|
|
|
|
|
|
|
protected function setUp(): void
|
|
|
|
|
{
|
2026-04-01 19:30:53 +02:00
|
|
|
$this->clientRegistry = $this->createStub(ClientRegistry::class);
|
|
|
|
|
$this->em = $this->createStub(EntityManagerInterface::class);
|
|
|
|
|
$this->userRepository = $this->createStub(UserRepository::class);
|
|
|
|
|
$this->router = $this->createStub(RouterInterface::class);
|
2026-04-01 17:57:10 +02:00
|
|
|
|
|
|
|
|
$this->authenticator = new KeycloakAuthenticator(
|
|
|
|
|
$this->clientRegistry,
|
|
|
|
|
$this->em,
|
|
|
|
|
$this->userRepository,
|
2026-04-01 19:30:53 +02:00
|
|
|
$this->router,
|
2026-04-01 17:57:10 +02:00
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testSupports(): void
|
|
|
|
|
{
|
|
|
|
|
$request = new Request();
|
|
|
|
|
$request->attributes->set('_route', 'connect_keycloak_check');
|
|
|
|
|
$this->assertTrue($this->authenticator->supports($request));
|
|
|
|
|
|
|
|
|
|
$request->attributes->set('_route', 'other_route');
|
|
|
|
|
$this->assertFalse($this->authenticator->supports($request));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testAuthenticate(): void
|
|
|
|
|
{
|
|
|
|
|
$request = new Request();
|
2026-04-01 19:30:53 +02:00
|
|
|
$client = $this->createStub(OAuth2ClientInterface::class);
|
|
|
|
|
|
2026-04-01 17:57:10 +02:00
|
|
|
$accessToken = new AccessToken(['access_token' => 'fake-token']);
|
|
|
|
|
|
2026-04-01 19:30:53 +02:00
|
|
|
$this->clientRegistry->method('getClient')->willReturn($client);
|
2026-04-01 17:57:10 +02:00
|
|
|
$client->method('getAccessToken')->willReturn($accessToken);
|
|
|
|
|
|
|
|
|
|
$passport = $this->authenticator->authenticate($request);
|
|
|
|
|
$this->assertInstanceOf(SelfValidatingPassport::class, $passport);
|
2026-04-01 19:30:53 +02:00
|
|
|
|
|
|
|
|
$userBadge = $passport->getBadge(UserBadge::class);
|
2026-04-01 17:57:10 +02:00
|
|
|
$this->assertNotNull($userBadge);
|
|
|
|
|
|
2026-04-01 19:30:53 +02:00
|
|
|
$keycloakUser = $this->createStub(ResourceOwnerInterface::class);
|
2026-04-01 17:57:10 +02:00
|
|
|
$keycloakUser->method('toArray')->willReturn([
|
|
|
|
|
'sub' => '123',
|
2026-04-07 23:50:19 +02:00
|
|
|
'email' => 'test@e-cosplay.fr',
|
2026-04-01 17:57:10 +02:00
|
|
|
'given_name' => 'John',
|
|
|
|
|
'family_name' => 'Doe',
|
feat: comptabilite + prestataires + rapport financier + stats dynamiques
Comptabilite (Super Admin) :
- ComptabiliteController avec 7 exports CSV/JSON compatibles SAGE
(journal ventes, grand livre, FEC, balance agee, reglements,
commissions Stripe 1.5%+0.25E, couts services)
- Export PDF via ComptaPdf (FPDF) avec bloc legal pre-rempli,
tableau pagine, champ signature DocuSeal
- Signature electronique DocuSeal + callback + envoi email signe
avec template dedie (compta_export_signed.html.twig)
- Rapport financier public (RapportFinancierPdf) : recettes par
service, depenses (Stripe, infra, prestataires), bilan excedent/deficit
- Codes comptables clients EC-XXXX (plus de 411xxx)
Prestataires (Super Admin) :
- Entite Prestataire (raisonSociale, siret, email, phone, adresse)
- Entite FacturePrestataire (numFacture, montantHt, montantTtc,
year, month, isPaid, PDF via Vich)
- CRUD complet avec recherche SIRET via proxy API data.gouv.fr
- Commande cron app:reminder:factures-prestataire (5 du mois)
- Factures prestataires integrees dans export couts services
- Sidebar Super Admin : entree Prestataires + Comptabilite
Stats (/admin/stats) :
- Cout prestataire dynamique depuis FacturePrestataire
- Fusion Infra + Prestataire en "Cout de fonctionnement"
- Commission Stripe corrigee (1.5% + 0.25E par transaction)
Divers :
- DocuSealService::sendComptaForSignature() + getApi()
- Customer::generateCodeComptable() format EC-XXXX-XXXXX
- Protection double prefixe EC- a la creation client
- Bouton regenerer PDF cache quand advert state=accepted
- Modals sans script inline (data-modal-open/close dans app.js)
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-07 23:39:31 +02:00
|
|
|
'groups' => ['superadmin'],
|
2026-04-01 17:57:10 +02:00
|
|
|
]);
|
|
|
|
|
|
|
|
|
|
$client->method('fetchUserFromToken')->willReturn($keycloakUser);
|
|
|
|
|
$this->userRepository->method('findOneBy')->willReturn(null);
|
|
|
|
|
|
2026-04-01 19:30:53 +02:00
|
|
|
$em = $this->createMock(EntityManagerInterface::class);
|
|
|
|
|
$em->expects($this->once())->method('persist');
|
|
|
|
|
$em->expects($this->once())->method('flush');
|
|
|
|
|
|
|
|
|
|
// Recreate authenticator with mock em for expectations
|
|
|
|
|
$authenticator = new KeycloakAuthenticator(
|
|
|
|
|
$this->clientRegistry,
|
|
|
|
|
$em,
|
|
|
|
|
$this->userRepository,
|
|
|
|
|
$this->router,
|
|
|
|
|
);
|
|
|
|
|
$passport = $authenticator->authenticate($request);
|
|
|
|
|
$userBadge = $passport->getBadge(UserBadge::class);
|
2026-04-01 17:57:10 +02:00
|
|
|
|
|
|
|
|
$user = $userBadge->getUser();
|
|
|
|
|
$this->assertInstanceOf(User::class, $user);
|
|
|
|
|
$this->assertEquals('123', $user->getKeycloakId());
|
2026-04-07 23:50:19 +02:00
|
|
|
$this->assertEquals('test@e-cosplay.fr', $user->getEmail());
|
2026-04-01 17:57:10 +02:00
|
|
|
$this->assertContains('ROLE_ROOT', $user->getRoles());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testAuthenticateExistingUserByEmail(): void
|
|
|
|
|
{
|
|
|
|
|
$request = new Request();
|
2026-04-01 19:30:53 +02:00
|
|
|
$client = $this->createStub(OAuth2ClientInterface::class);
|
2026-04-01 17:57:10 +02:00
|
|
|
$accessToken = new AccessToken(['access_token' => 'fake-token']);
|
|
|
|
|
$this->clientRegistry->method('getClient')->willReturn($client);
|
|
|
|
|
$client->method('getAccessToken')->willReturn($accessToken);
|
|
|
|
|
|
|
|
|
|
$passport = $this->authenticator->authenticate($request);
|
2026-04-01 19:30:53 +02:00
|
|
|
$userBadge = $passport->getBadge(UserBadge::class);
|
2026-04-01 17:57:10 +02:00
|
|
|
|
2026-04-01 19:30:53 +02:00
|
|
|
$keycloakUser = $this->createStub(ResourceOwnerInterface::class);
|
2026-04-01 17:57:10 +02:00
|
|
|
$keycloakUser->method('toArray')->willReturn([
|
|
|
|
|
'sub' => '123',
|
2026-04-07 23:50:19 +02:00
|
|
|
'email' => 'existing@e-cosplay.fr',
|
|
|
|
|
'groups' => ['gp_member'],
|
2026-04-01 17:57:10 +02:00
|
|
|
]);
|
|
|
|
|
$client->method('fetchUserFromToken')->willReturn($keycloakUser);
|
|
|
|
|
|
|
|
|
|
$existingUser = new User();
|
2026-04-01 19:30:53 +02:00
|
|
|
$this->userRepository->method('findOneBy')->willReturnCallback(function ($criteria) use ($existingUser) {
|
2026-04-07 23:50:19 +02:00
|
|
|
if (isset($criteria['email']) && 'existing@e-cosplay.fr' === $criteria['email']) {
|
2026-04-01 17:57:10 +02:00
|
|
|
return $existingUser;
|
|
|
|
|
}
|
2026-04-01 19:30:53 +02:00
|
|
|
|
2026-04-01 17:57:10 +02:00
|
|
|
return null;
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
$user = $userBadge->getUser();
|
|
|
|
|
$this->assertSame($existingUser, $user);
|
|
|
|
|
$this->assertEquals('123', $user->getKeycloakId());
|
|
|
|
|
$this->assertContains('ROLE_EMPLOYE', $user->getRoles());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testOnAuthenticationSuccess(): void
|
|
|
|
|
{
|
|
|
|
|
$request = new Request();
|
2026-04-01 19:30:53 +02:00
|
|
|
$token = $this->createStub(TokenInterface::class);
|
|
|
|
|
$this->router->method('generate')->willReturn('/home');
|
2026-04-01 17:57:10 +02:00
|
|
|
|
|
|
|
|
$response = $this->authenticator->onAuthenticationSuccess($request, $token, 'main');
|
|
|
|
|
$this->assertInstanceOf(RedirectResponse::class, $response);
|
|
|
|
|
$this->assertEquals('/home', $response->getTargetUrl());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testOnAuthenticationFailure(): void
|
|
|
|
|
{
|
2026-04-01 19:30:53 +02:00
|
|
|
$request = $this->createStub(Request::class);
|
2026-04-01 17:57:10 +02:00
|
|
|
|
2026-04-01 19:30:53 +02:00
|
|
|
$flashBag = $this->createMock(FlashBagInterface::class);
|
2026-04-01 17:57:10 +02:00
|
|
|
$flashBag->expects($this->once())->method('add')->with('error', $this->anything());
|
|
|
|
|
|
2026-04-01 19:30:53 +02:00
|
|
|
$session = $this->createStub(FlashBagAwareSessionInterface::class);
|
|
|
|
|
$session->method('getFlashBag')->willReturn($flashBag);
|
|
|
|
|
|
|
|
|
|
$request->method('getSession')->willReturn($session);
|
|
|
|
|
$this->router->method('generate')->willReturn('/home');
|
2026-04-01 17:57:10 +02:00
|
|
|
|
|
|
|
|
$response = $this->authenticator->onAuthenticationFailure($request, new AuthenticationException());
|
|
|
|
|
$this->assertInstanceOf(RedirectResponse::class, $response);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testStart(): void
|
|
|
|
|
{
|
|
|
|
|
$request = new Request();
|
2026-04-01 19:30:53 +02:00
|
|
|
$this->router->method('generate')->willReturn('/home');
|
2026-04-01 17:57:10 +02:00
|
|
|
|
|
|
|
|
$response = $this->authenticator->start($request);
|
|
|
|
|
$this->assertInstanceOf(RedirectResponse::class, $response);
|
|
|
|
|
$this->assertEquals('/home', $response->getTargetUrl());
|
|
|
|
|
}
|
test: couverture 83% methodes (1046 tests, 2135 assertions)
Entites completes a 100% :
- AdvertTest : 12 nouveaux (state, customer, totals, hmac, lines, payments)
- CustomerTest : 3 nouveaux (isPendingDelete, revendeurCode, updatedAt)
- DevisTest : 6 nouveaux (customer, submissionId, lines, state constants)
- FactureTest : 10 nouveaux (state, totals, isPaid, lines, hmac, splitIndex)
- OrderNumberTest : 1 nouveau (markAsUnused)
- WebsiteTest : 1 nouveau (revendeurCode)
Services completes/ameliores :
- DocuSealServiceTest : 30 nouveaux (sendDevis, resendDevis, download, compta)
- AdvertServiceTest : 6 nouveaux (isTvaEnabled, getTvaRate, computeTotals)
- DevisServiceTest : 6 nouveaux (idem)
- FactureServiceTest : 8 nouveaux (idem + createPaidFactureFromAdvert)
- MailerServiceTest : 7 nouveaux (unsubscribe headers, VCF, formatFileSize)
- MeilisearchServiceTest : 42 nouveaux (index/remove/search tous types)
- RgpdServiceTest : 6 nouveaux (sendVerificationCode, verifyCode)
- OrderNumberServiceTest : 2 nouveaux (preview/generate unused)
- TarificationServiceTest : 1 nouveau (stripe error logger)
- ComptaPdfTest : 4 nouveaux (totaux, colonnes numeriques, signature)
- FacturePdfTest : 6 nouveaux (QR code, RIB, CGV Twig, footer skip)
Controllers ameliores :
- ComptabiliteControllerTest : 13 nouveaux (JSON, PDF, sign, callback)
- StatsControllerTest : 2 nouveaux (rich data, 6-month evolution)
- SyncControllerTest : 13 nouveaux (sync 6 types + purge)
- ClientsControllerTest : 7 nouveaux (show, delete, resendWelcome)
- FactureControllerTest : 2 nouveaux (generatePdf 404, send success)
- LegalControllerTest : 6 nouveaux (rgpdVerify GET/POST)
- TarificationControllerTest : 3 nouveaux (purge paths)
- AdminControllersTest : 9 nouveaux (dashboard search, services)
- WebhookStripeControllerTest : 3 nouveaux (invalid signatures)
- KeycloakAuthenticatorTest : 4 nouveaux (groups, domain check)
Commands :
- PaymentReminderCommandTest : 1 nouveau (formalNotice step)
- TestMailCommandTest : 2 nouveaux (force-dsn success/failure)
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-08 00:13:00 +02:00
|
|
|
|
|
|
|
|
public function testAuthenticateSuperAdminAssoGroup(): void
|
|
|
|
|
{
|
|
|
|
|
$request = new Request();
|
|
|
|
|
$client = $this->createStub(OAuth2ClientInterface::class);
|
|
|
|
|
$accessToken = new AccessToken(['access_token' => 'fake-token']);
|
|
|
|
|
$this->clientRegistry->method('getClient')->willReturn($client);
|
|
|
|
|
$client->method('getAccessToken')->willReturn($accessToken);
|
|
|
|
|
|
|
|
|
|
$keycloakUser = $this->createStub(ResourceOwnerInterface::class);
|
|
|
|
|
$keycloakUser->method('toArray')->willReturn([
|
|
|
|
|
'sub' => '456',
|
|
|
|
|
'email' => 'asso@e-cosplay.fr',
|
|
|
|
|
'given_name' => 'Asso',
|
|
|
|
|
'family_name' => 'Admin',
|
|
|
|
|
'groups' => ['super_admin_asso'],
|
|
|
|
|
]);
|
|
|
|
|
$client->method('fetchUserFromToken')->willReturn($keycloakUser);
|
|
|
|
|
$this->userRepository->method('findOneBy')->willReturn(null);
|
|
|
|
|
|
|
|
|
|
$em = $this->createStub(EntityManagerInterface::class);
|
|
|
|
|
$authenticator = new KeycloakAuthenticator(
|
|
|
|
|
$this->clientRegistry,
|
|
|
|
|
$em,
|
|
|
|
|
$this->userRepository,
|
|
|
|
|
$this->router,
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
$passport = $authenticator->authenticate($request);
|
|
|
|
|
$userBadge = $passport->getBadge(UserBadge::class);
|
|
|
|
|
$user = $userBadge->getUser();
|
|
|
|
|
|
|
|
|
|
$this->assertContains('ROLE_ROOT', $user->getRoles());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testAuthenticateUnknownGroupGetsRoleUser(): void
|
|
|
|
|
{
|
|
|
|
|
$request = new Request();
|
|
|
|
|
$client = $this->createStub(OAuth2ClientInterface::class);
|
|
|
|
|
$accessToken = new AccessToken(['access_token' => 'fake-token']);
|
|
|
|
|
$this->clientRegistry->method('getClient')->willReturn($client);
|
|
|
|
|
$client->method('getAccessToken')->willReturn($accessToken);
|
|
|
|
|
|
|
|
|
|
$keycloakUser = $this->createStub(ResourceOwnerInterface::class);
|
|
|
|
|
$keycloakUser->method('toArray')->willReturn([
|
|
|
|
|
'sub' => '789',
|
|
|
|
|
'email' => 'user@e-cosplay.fr',
|
|
|
|
|
'given_name' => 'Regular',
|
|
|
|
|
'family_name' => 'User',
|
|
|
|
|
'groups' => ['some_other_group'],
|
|
|
|
|
]);
|
|
|
|
|
$client->method('fetchUserFromToken')->willReturn($keycloakUser);
|
|
|
|
|
$this->userRepository->method('findOneBy')->willReturn(null);
|
|
|
|
|
|
|
|
|
|
$passport = $this->authenticator->authenticate($request);
|
|
|
|
|
$userBadge = $passport->getBadge(UserBadge::class);
|
|
|
|
|
$user = $userBadge->getUser();
|
|
|
|
|
|
|
|
|
|
$this->assertContains('ROLE_USER', $user->getRoles());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testAuthenticateNonEcosplayEmailThrows(): void
|
|
|
|
|
{
|
|
|
|
|
$request = new Request();
|
|
|
|
|
$client = $this->createStub(OAuth2ClientInterface::class);
|
|
|
|
|
$accessToken = new AccessToken(['access_token' => 'fake-token']);
|
|
|
|
|
$this->clientRegistry->method('getClient')->willReturn($client);
|
|
|
|
|
$client->method('getAccessToken')->willReturn($accessToken);
|
|
|
|
|
|
|
|
|
|
$keycloakUser = $this->createStub(ResourceOwnerInterface::class);
|
|
|
|
|
$keycloakUser->method('toArray')->willReturn([
|
|
|
|
|
'sub' => '000',
|
|
|
|
|
'email' => 'hacker@example.com',
|
|
|
|
|
'groups' => [],
|
|
|
|
|
]);
|
|
|
|
|
$client->method('fetchUserFromToken')->willReturn($keycloakUser);
|
|
|
|
|
|
|
|
|
|
$passport = $this->authenticator->authenticate($request);
|
|
|
|
|
$userBadge = $passport->getBadge(UserBadge::class);
|
|
|
|
|
|
|
|
|
|
$this->expectException(AuthenticationException::class);
|
|
|
|
|
$userBadge->getUser();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function testOnAuthenticationFailureWithoutFlashBagSession(): void
|
|
|
|
|
{
|
|
|
|
|
$request = new Request();
|
|
|
|
|
// Session that does NOT implement FlashBagAwareSessionInterface
|
|
|
|
|
$session = $this->createStub(\Symfony\Component\HttpFoundation\Session\SessionInterface::class);
|
|
|
|
|
$request->setSession($session);
|
|
|
|
|
|
|
|
|
|
$this->router->method('generate')->willReturn('/home');
|
|
|
|
|
|
|
|
|
|
$response = $this->authenticator->onAuthenticationFailure($request, new AuthenticationException('test'));
|
|
|
|
|
$this->assertInstanceOf(RedirectResponse::class, $response);
|
|
|
|
|
}
|
2026-04-01 17:57:10 +02:00
|
|
|
}
|