Files
Classeo/backend/tests/Functional/Administration/Api/SessionsEndpointsTest.php
Mathias STRASSER b823479658 feat: Gestion des sessions utilisateur
Permet aux utilisateurs de visualiser et gérer leurs sessions actives
sur différents appareils, avec la possibilité de révoquer des sessions
à distance en cas de suspicion d'activité non autorisée.

Fonctionnalités :
- Liste des sessions actives avec métadonnées (appareil, navigateur, localisation)
- Identification de la session courante
- Révocation individuelle d'une session
- Révocation de toutes les autres sessions
- Déconnexion avec nettoyage des cookies sur les deux chemins (legacy et actuel)

Sécurité :
- Cache frontend scopé par utilisateur pour éviter les fuites entre comptes
- Validation que le refresh token appartient à l'utilisateur JWT authentifié
- TTL des sessions Redis aligné sur l'expiration du refresh token
- Événements d'audit pour traçabilité (SessionInvalidee, ToutesSessionsInvalidees)

@see Story 1.6 - Gestion des sessions
2026-02-03 10:53:31 +01:00

353 lines
12 KiB
PHP

<?php
declare(strict_types=1);
namespace App\Tests\Functional\Administration\Api;
use ApiPlatform\Symfony\Bundle\Test\ApiTestCase;
use App\Administration\Domain\Model\RefreshToken\TokenFamilyId;
use App\Administration\Domain\Model\Session\DeviceInfo;
use App\Administration\Domain\Model\Session\Location;
use App\Administration\Domain\Model\Session\Session;
use App\Administration\Domain\Model\User\UserId;
use App\Administration\Domain\Repository\SessionRepository;
use App\Shared\Domain\Tenant\TenantId;
use function count;
use DateTimeImmutable;
use PHPUnit\Framework\Attributes\Test;
/**
* Tests for sessions endpoints.
*
* @see Story 1.6 - Gestion des sessions
*/
final class SessionsEndpointsTest extends ApiTestCase
{
/**
* Opt-in for API Platform 5.0 behavior where kernel boot is explicit.
*
* @see https://github.com/api-platform/core/issues/6971
*/
protected static ?bool $alwaysBootKernel = true;
private const string TENANT_ID = 'a1b2c3d4-e5f6-7890-abcd-ef1234567890';
private const string USER_ID = '550e8400-e29b-41d4-a716-446655440000';
// =========================================================================
// Logout endpoint tests
// =========================================================================
#[Test]
public function logoutEndpointAcceptsPostWithoutAuthentication(): void
{
$client = static::createClient();
// Logout should work even without a valid token (graceful logout)
$client->request('POST', '/api/token/logout', [
'headers' => [
'Host' => 'localhost',
'Accept' => 'application/json',
],
]);
// Should return 200 OK (graceful logout even without token)
self::assertResponseStatusCodeSame(200);
}
#[Test]
public function logoutEndpointReturnsSuccessMessage(): void
{
$client = static::createClient();
$client->request('POST', '/api/token/logout', [
'headers' => [
'Host' => 'localhost',
'Accept' => 'application/json',
],
]);
self::assertResponseIsSuccessful();
self::assertJsonContains(['message' => 'Logout successful']);
}
#[Test]
public function logoutEndpointDeletesRefreshTokenCookie(): void
{
$client = static::createClient();
$response = $client->request('POST', '/api/token/logout', [
'headers' => [
'Host' => 'localhost',
'Accept' => 'application/json',
],
]);
// Check that Set-Cookie header is present (to delete the cookie)
$headers = $response->getHeaders(false);
self::assertArrayHasKey('set-cookie', $headers);
// The cookie should be set to empty with past expiration
$setCookieHeader = $headers['set-cookie'][0];
self::assertStringContainsString('refresh_token=', $setCookieHeader);
}
#[Test]
public function logoutEndpointDeletesRefreshTokenCookieOnApiAndLegacyPaths(): void
{
$client = static::createClient();
$response = $client->request('POST', '/api/token/logout', [
'headers' => [
'Host' => 'localhost',
'Accept' => 'application/json',
],
]);
$headers = $response->getHeaders(false);
self::assertArrayHasKey('set-cookie', $headers);
// Should have 2 Set-Cookie headers for refresh_token deletion
$setCookieHeaders = $headers['set-cookie'];
self::assertGreaterThanOrEqual(2, count($setCookieHeaders), 'Expected at least 2 Set-Cookie headers');
// Collect all refresh_token cookie paths
$paths = [];
foreach ($setCookieHeaders as $header) {
if (stripos($header, 'refresh_token=') !== false) {
// Extract path with case-insensitive matching
if (preg_match('/path=([^;]+)/i', $header, $matches)) {
$paths[] = trim($matches[1]);
}
}
}
// Must clear both /api (current) and /api/token (legacy) paths
self::assertContains('/api', $paths, 'Missing Set-Cookie for Path=/api');
self::assertContains('/api/token', $paths, 'Missing Set-Cookie for Path=/api/token (legacy)');
}
// =========================================================================
// Sessions list endpoint tests - Security
// =========================================================================
/**
* Without a valid tenant subdomain, the endpoint returns 404.
* This is correct security behavior: don't reveal endpoint existence.
*/
#[Test]
public function listSessionsReturns404WithoutTenant(): void
{
$client = static::createClient();
$client->request('GET', '/api/me/sessions', [
'headers' => [
'Host' => 'localhost',
'Accept' => 'application/json',
],
]);
// Tenant middleware intercepts and returns 404 (not revealing endpoint)
self::assertResponseStatusCodeSame(404);
self::assertJsonContains(['message' => 'Resource not found']);
}
// =========================================================================
// Revoke single session endpoint tests - Security
// =========================================================================
/**
* Without a valid tenant subdomain, the endpoint returns 404.
* This is correct security behavior: don't reveal endpoint existence.
*/
#[Test]
public function revokeSessionReturns404WithoutTenant(): void
{
$client = static::createClient();
$client->request('DELETE', '/api/me/sessions/00000000-0000-0000-0000-000000000001', [
'headers' => [
'Host' => 'localhost',
'Accept' => 'application/json',
],
]);
// Tenant middleware intercepts and returns 404 (not revealing endpoint)
self::assertResponseStatusCodeSame(404);
self::assertJsonContains(['message' => 'Resource not found']);
}
// =========================================================================
// Revoke all sessions endpoint tests - Security
// =========================================================================
/**
* Without a valid tenant subdomain, the endpoint returns 404.
* This is correct security behavior: don't reveal endpoint existence.
*/
#[Test]
public function revokeAllSessionsReturns404WithoutTenant(): void
{
$client = static::createClient();
$client->request('DELETE', '/api/me/sessions', [
'headers' => [
'Host' => 'localhost',
'Accept' => 'application/json',
],
]);
// Tenant middleware intercepts and returns 404 (not revealing endpoint)
self::assertResponseStatusCodeSame(404);
self::assertJsonContains(['message' => 'Resource not found']);
}
// =========================================================================
// Authenticated session list tests
// =========================================================================
/**
* Test that listing sessions requires authentication.
* Returns 401 when no JWT token is provided.
*/
#[Test]
public function listSessionsReturns401WithoutAuthentication(): void
{
$client = static::createClient();
$client->request('GET', 'http://ecole-alpha.classeo.local/api/me/sessions', [
'headers' => [
'Accept' => 'application/json',
],
]);
self::assertResponseStatusCodeSame(401);
}
/**
* Test that revoking sessions requires authentication.
* Returns 401 when no JWT token is provided.
*/
#[Test]
public function revokeSessionReturns401WithoutAuthentication(): void
{
$client = static::createClient();
$familyId = TokenFamilyId::generate();
$client->request('DELETE', 'http://ecole-alpha.classeo.local/api/me/sessions/' . $familyId, [
'headers' => [
'Accept' => 'application/json',
],
]);
self::assertResponseStatusCodeSame(401);
}
/**
* Test that revoking all sessions requires authentication.
* Returns 401 when no JWT token is provided.
*/
#[Test]
public function revokeAllSessionsReturns401WithoutAuthentication(): void
{
$client = static::createClient();
$client->request('DELETE', 'http://ecole-alpha.classeo.local/api/me/sessions', [
'headers' => [
'Accept' => 'application/json',
],
]);
self::assertResponseStatusCodeSame(401);
}
/**
* Test that the session repository correctly stores and retrieves sessions.
* This is an integration test of the repository without HTTP layer.
*/
#[Test]
public function sessionRepositoryCanStoreAndRetrieveSessions(): void
{
$container = static::getContainer();
$sessionRepository = $container->get(SessionRepository::class);
$familyId = TokenFamilyId::generate();
$userId = UserId::fromString(self::USER_ID);
$tenantId = TenantId::fromString(self::TENANT_ID);
$session = Session::create(
familyId: $familyId,
userId: $userId,
tenantId: $tenantId,
deviceInfo: DeviceInfo::fromUserAgent('Mozilla/5.0 (Windows NT 10.0; Win64; x64) Chrome/120.0.0.0'),
location: Location::fromIp('192.168.1.1', 'France', 'Paris'),
createdAt: new DateTimeImmutable(),
);
$sessionRepository->save($session, 86400);
// Retrieve by family ID
$retrieved = $sessionRepository->findByFamilyId($familyId);
self::assertNotNull($retrieved);
self::assertTrue($retrieved->familyId->equals($familyId));
self::assertSame('Desktop', $retrieved->deviceInfo->device);
self::assertSame('Chrome 120', $retrieved->deviceInfo->browser);
// Retrieve by user ID
$userSessions = $sessionRepository->findAllByUserId($userId);
self::assertNotEmpty($userSessions);
// Cleanup
$sessionRepository->delete($familyId);
self::assertNull($sessionRepository->findByFamilyId($familyId));
}
/**
* Test that deleteAllExcept removes other sessions but keeps the specified one.
*/
#[Test]
public function sessionRepositoryDeleteAllExceptKeepsSpecifiedSession(): void
{
$container = static::getContainer();
$sessionRepository = $container->get(SessionRepository::class);
$userId = UserId::fromString(self::USER_ID);
$tenantId = TenantId::fromString(self::TENANT_ID);
// Clean up any existing sessions for this user (from previous test runs)
$existingSessions = $sessionRepository->findAllByUserId($userId);
foreach ($existingSessions as $existingSession) {
$sessionRepository->delete($existingSession->familyId);
}
// Create multiple sessions
$keepFamilyId = TokenFamilyId::generate();
$deleteFamilyId1 = TokenFamilyId::generate();
$deleteFamilyId2 = TokenFamilyId::generate();
foreach ([$keepFamilyId, $deleteFamilyId1, $deleteFamilyId2] as $familyId) {
$session = Session::create(
familyId: $familyId,
userId: $userId,
tenantId: $tenantId,
deviceInfo: DeviceInfo::fromUserAgent('Test Browser'),
location: Location::unknown(),
createdAt: new DateTimeImmutable(),
);
$sessionRepository->save($session, 86400);
}
// Delete all except one
$deletedIds = $sessionRepository->deleteAllExcept($userId, $keepFamilyId);
self::assertCount(2, $deletedIds);
self::assertNotNull($sessionRepository->findByFamilyId($keepFamilyId));
self::assertNull($sessionRepository->findByFamilyId($deleteFamilyId1));
self::assertNull($sessionRepository->findByFamilyId($deleteFamilyId2));
// Cleanup
$sessionRepository->delete($keepFamilyId);
}
}