|
1 | 1 | package com.back.domain.auth.controller; |
2 | 2 |
|
3 | | -import com.back.domain.auth.controller.AuthController; |
4 | | -import com.back.domain.auth.dto.request.TokenRefreshRequest; |
5 | | -import com.back.domain.auth.dto.response.AuthResponse; |
6 | | -import com.back.domain.user.entity.Role; |
7 | | -import com.back.global.exception.ServiceException; |
8 | | -import com.back.global.rsData.RsData; |
9 | | -import org.junit.jupiter.api.DisplayName; |
10 | | -import org.junit.jupiter.api.Test; |
11 | | -import org.springframework.http.ResponseEntity; |
12 | | - |
13 | | -import java.util.List; |
14 | | - |
15 | 3 | import com.back.domain.auth.dto.request.LoginRequest; |
16 | 4 | import com.back.domain.auth.dto.request.SignUpRequest; |
17 | 5 | import com.back.domain.auth.dto.request.TokenRefreshRequest; |
18 | 6 | import com.back.domain.auth.dto.response.AuthResponse; |
19 | 7 | import com.back.domain.auth.dto.response.SignUpResponse; |
20 | 8 | import com.back.domain.auth.service.AuthService; |
21 | 9 | import com.back.domain.user.entity.Role; |
| 10 | +import com.back.global.exception.ServiceException; |
22 | 11 | import com.back.global.rsData.RsData; |
23 | 12 | import com.back.global.security.auth.CustomUserDetails; |
24 | 13 | import jakarta.servlet.http.HttpServletRequest; |
@@ -357,145 +346,196 @@ void login_TokenExpirationIncluded() { |
357 | 346 | class LogoutTest { |
358 | 347 |
|
359 | 348 | @Test |
360 | | - @DisplayName("정상적인 로그아웃 요청 성공") |
361 | | - void logout_Success() { |
| 349 | + @DisplayName("쿠키에 RefreshToken이 있는 경우 정상 로그아웃") |
| 350 | + void logout_WithRefreshTokenCookie_Success() { |
362 | 351 | // given |
363 | | - TokenRefreshRequest request = new TokenRefreshRequest("validRefreshToken"); |
| 352 | + String refreshToken = "validRefreshToken"; |
364 | 353 |
|
365 | 354 | // when |
366 | | - ResponseEntity<RsData<Void>> response = authController.logout(request); |
| 355 | + ResponseEntity<RsData<Void>> response = authController.logout(refreshToken); |
367 | 356 |
|
368 | 357 | // then |
369 | 358 | assertThat(response.getStatusCode()).isEqualTo(HttpStatus.OK); |
370 | 359 | assertThat(response.getBody().resultCode()).isEqualTo("200"); |
371 | 360 | assertThat(response.getBody().msg()).isEqualTo("로그아웃 성공"); |
372 | 361 | assertThat(response.getBody().data()).isNull(); |
| 362 | + assertThat(response.getHeaders().get("Set-Cookie")).isNotNull(); |
373 | 363 |
|
374 | 364 | verify(authService).logout("validRefreshToken"); |
375 | 365 | } |
376 | 366 |
|
377 | 367 | @Test |
378 | | - @DisplayName("다양한 형태의 RefreshToken으로 로그아웃 처리") |
379 | | - void logout_DifferentTokenFormats() { |
| 368 | + @DisplayName("쿠키에 RefreshToken이 없는 경우에도 로그아웃 성공 (쿠키만 삭제)") |
| 369 | + void logout_WithoutRefreshTokenCookie_Success() { |
| 370 | + // given - RefreshToken이 null인 경우 |
| 371 | + |
| 372 | + // when |
| 373 | + ResponseEntity<RsData<Void>> response = authController.logout(null); |
| 374 | + |
| 375 | + // then |
| 376 | + assertThat(response.getStatusCode()).isEqualTo(HttpStatus.OK); |
| 377 | + assertThat(response.getBody().resultCode()).isEqualTo("200"); |
| 378 | + assertThat(response.getBody().msg()).isEqualTo("로그아웃 성공"); |
| 379 | + assertThat(response.getBody().data()).isNull(); |
| 380 | + assertThat(response.getHeaders().get("Set-Cookie")).isNotNull(); |
| 381 | + |
| 382 | + // RefreshToken이 없으면 authService.logout()이 호출되지 않음 |
| 383 | + verify(authService, never()).logout(any()); |
| 384 | + } |
| 385 | + |
| 386 | + @Test |
| 387 | + @DisplayName("빈 문자열 RefreshToken인 경우 로그아웃 (쿠키만 삭제)") |
| 388 | + void logout_WithEmptyRefreshToken_Success() { |
380 | 389 | // given |
381 | | - String[] tokens = { |
| 390 | + String emptyRefreshToken = ""; |
| 391 | + |
| 392 | + // when |
| 393 | + ResponseEntity<RsData<Void>> response = authController.logout(emptyRefreshToken); |
| 394 | + |
| 395 | + // then |
| 396 | + assertThat(response.getStatusCode()).isEqualTo(HttpStatus.OK); |
| 397 | + assertThat(response.getBody().resultCode()).isEqualTo("200"); |
| 398 | + assertThat(response.getBody().msg()).isEqualTo("로그아웃 성공"); |
| 399 | + assertThat(response.getHeaders().get("Set-Cookie")).isNotNull(); |
| 400 | + |
| 401 | + // 빈 문자열이면 authService.logout()이 호출되지 않음 |
| 402 | + verify(authService, never()).logout(any()); |
| 403 | + } |
| 404 | + |
| 405 | + @Test |
| 406 | + @DisplayName("공백 문자열 RefreshToken인 경우 로그아웃 (쿠키만 삭제)") |
| 407 | + void logout_WithBlankRefreshToken_Success() { |
| 408 | + // given |
| 409 | + String blankRefreshToken = " "; |
| 410 | + |
| 411 | + // when |
| 412 | + ResponseEntity<RsData<Void>> response = authController.logout(blankRefreshToken); |
| 413 | + |
| 414 | + // then |
| 415 | + assertThat(response.getStatusCode()).isEqualTo(HttpStatus.OK); |
| 416 | + assertThat(response.getBody().resultCode()).isEqualTo("200"); |
| 417 | + assertThat(response.getBody().msg()).isEqualTo("로그아웃 성공"); |
| 418 | + assertThat(response.getHeaders().get("Set-Cookie")).isNotNull(); |
| 419 | + |
| 420 | + // 공백 문자열이면 authService.logout()이 호출되지 않음 |
| 421 | + verify(authService, never()).logout(any()); |
| 422 | + } |
| 423 | + |
| 424 | + @Test |
| 425 | + @DisplayName("다양한 형태의 유효한 RefreshToken으로 로그아웃") |
| 426 | + void logout_WithVariousValidTokens_Success() { |
| 427 | + // given |
| 428 | + String[] validTokens = { |
382 | 429 | "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWI.signature", |
383 | 430 | "shortToken123", |
384 | 431 | "veryLongTokenWith1234567890AbcdefghijklmnopqrstuvwxyzMore", |
385 | 432 | "token-with-dashes-and-underscores_123" |
386 | 433 | }; |
387 | 434 |
|
388 | | - for (String token : tokens) { |
389 | | - TokenRefreshRequest request = new TokenRefreshRequest(token); |
390 | | - |
| 435 | + for (String token : validTokens) { |
391 | 436 | // when |
392 | | - ResponseEntity<RsData<Void>> response = authController.logout(request); |
| 437 | + ResponseEntity<RsData<Void>> response = authController.logout(token); |
393 | 438 |
|
394 | 439 | // then |
395 | 440 | assertThat(response.getStatusCode()).isEqualTo(HttpStatus.OK); |
396 | 441 | verify(authService).logout(token); |
397 | 442 | } |
398 | 443 |
|
399 | | - verify(authService, times(tokens.length)).logout(anyString()); |
| 444 | + verify(authService, times(validTokens.length)).logout(anyString()); |
400 | 445 | } |
401 | 446 |
|
402 | 447 | @Test |
403 | 448 | @DisplayName("로그아웃 응답에 쿠키 삭제 헤더가 포함되는지 확인") |
404 | | - void logout_ResponseContainsCookieDeletion() { |
| 449 | + void logout_ResponseContainsCookieDeletionHeaders() { |
405 | 450 | // given |
406 | | - TokenRefreshRequest request = new TokenRefreshRequest("validRefreshToken"); |
| 451 | + String refreshToken = "validRefreshToken"; |
407 | 452 |
|
408 | 453 | // when |
409 | | - ResponseEntity<RsData<Void>> response = authController.logout(request); |
| 454 | + ResponseEntity<RsData<Void>> response = authController.logout(refreshToken); |
410 | 455 |
|
411 | 456 | // then |
412 | 457 | assertThat(response.getStatusCode()).isEqualTo(HttpStatus.OK); |
413 | 458 | assertThat(response.getHeaders().get("Set-Cookie")).isNotNull(); |
414 | | - // Set-Cookie 헤더로 쿠키 삭제(MaxAge=0) 헤더가 추가됨을 확인 |
| 459 | + assertThat(response.getHeaders().get("Set-Cookie").size()).isEqualTo(2); |
| 460 | + // refreshToken과 accessToken 쿠키 삭제 헤더 2개 포함됨 |
415 | 461 | } |
416 | 462 |
|
417 | 463 | @Test |
418 | | - @DisplayName("빈 문자열 토큰으로 로그아웃 시도") |
419 | | - void logout_EmptyToken() { |
| 464 | + @DisplayName("동일한 RefreshToken으로 연속 로그아웃 요청") |
| 465 | + void logout_ConsecutiveRequestsWithSameToken() { |
420 | 466 | // given |
421 | | - TokenRefreshRequest request = new TokenRefreshRequest(""); |
| 467 | + String refreshToken = "sameToken"; |
422 | 468 |
|
423 | 469 | // when |
424 | | - ResponseEntity<RsData<Void>> response = authController.logout(request); |
| 470 | + ResponseEntity<RsData<Void>> response1 = authController.logout(refreshToken); |
| 471 | + ResponseEntity<RsData<Void>> response2 = authController.logout(refreshToken); |
425 | 472 |
|
426 | 473 | // then |
427 | | - assertThat(response.getStatusCode()).isEqualTo(HttpStatus.OK); |
428 | | - // Controller는 빈 문자열도 그대로 Service에 전달 |
429 | | - verify(authService).logout(""); |
| 474 | + assertThat(response1.getStatusCode()).isEqualTo(HttpStatus.OK); |
| 475 | + assertThat(response2.getStatusCode()).isEqualTo(HttpStatus.OK); |
| 476 | + verify(authService, times(2)).logout("sameToken"); |
430 | 477 | } |
431 | 478 |
|
432 | 479 | @Test |
433 | | - @DisplayName("공백으로만 이루어진 토큰으로 로그아웃 시도") |
434 | | - void logout_WhitespaceToken() { |
| 480 | + @DisplayName("여러 사용자의 동시 로그아웃 요청 처리") |
| 481 | + void logout_MultipleConcurrentUsers() { |
435 | 482 | // given |
436 | | - TokenRefreshRequest request = new TokenRefreshRequest(" "); |
| 483 | + String[] userTokens = {"userToken1", "userToken2", "userToken3"}; |
437 | 484 |
|
438 | | - // when |
439 | | - ResponseEntity<RsData<Void>> response = authController.logout(request); |
| 485 | + for (String token : userTokens) { |
| 486 | + // when |
| 487 | + ResponseEntity<RsData<Void>> response = authController.logout(token); |
440 | 488 |
|
441 | | - // then |
442 | | - assertThat(response.getStatusCode()).isEqualTo(HttpStatus.OK); |
443 | | - verify(authService).logout(" "); |
| 489 | + // then |
| 490 | + assertThat(response.getStatusCode()).isEqualTo(HttpStatus.OK); |
| 491 | + assertThat(response.getBody().msg()).isEqualTo("로그아웃 성공"); |
| 492 | + verify(authService).logout(token); |
| 493 | + } |
| 494 | + |
| 495 | + verify(authService, times(userTokens.length)).logout(anyString()); |
444 | 496 | } |
445 | 497 |
|
446 | 498 | @Test |
447 | | - @DisplayName("연속 로그아웃 요청 처리") |
448 | | - void logout_MultipleLogoutRequests() { |
| 499 | + @DisplayName("로그아웃 후 응답 데이터가 null인지 확인") |
| 500 | + void logout_ResponseDataIsNull() { |
449 | 501 | // given |
450 | | - TokenRefreshRequest request1 = new TokenRefreshRequest("token1"); |
451 | | - TokenRefreshRequest request2 = new TokenRefreshRequest("token2"); |
452 | | - TokenRefreshRequest request3 = new TokenRefreshRequest("token3"); |
| 502 | + String refreshToken = "validRefreshToken"; |
453 | 503 |
|
454 | 504 | // when |
455 | | - ResponseEntity<RsData<Void>> response1 = authController.logout(request1); |
456 | | - ResponseEntity<RsData<Void>> response2 = authController.logout(request2); |
457 | | - ResponseEntity<RsData<Void>> response3 = authController.logout(request3); |
| 505 | + ResponseEntity<RsData<Void>> response = authController.logout(refreshToken); |
458 | 506 |
|
459 | 507 | // then |
460 | | - assertThat(response1.getStatusCode()).isEqualTo(HttpStatus.OK); |
461 | | - assertThat(response2.getStatusCode()).isEqualTo(HttpStatus.OK); |
462 | | - assertThat(response3.getStatusCode()).isEqualTo(HttpStatus.OK); |
463 | | - |
464 | | - verify(authService).logout("token1"); |
465 | | - verify(authService).logout("token2"); |
466 | | - verify(authService).logout("token3"); |
467 | | - verify(authService, times(3)).logout(anyString()); |
| 508 | + assertThat(response.getBody().data()).isNull(); |
| 509 | + // Void 타입이므로 data는 항상 null |
468 | 510 | } |
469 | 511 |
|
470 | 512 | @Test |
471 | | - @DisplayName("동일한 토큰으로 중복 로그아웃 요청") |
472 | | - void logout_DuplicateLogoutRequests() { |
| 513 | + @DisplayName("만료된 RefreshToken으로도 쿠키 삭제는 정상 수행") |
| 514 | + void logout_WithExpiredToken_StillDeletesCookies() { |
473 | 515 | // given |
474 | | - TokenRefreshRequest request = new TokenRefreshRequest("sameToken"); |
| 516 | + String expiredToken = "expiredRefreshToken"; |
| 517 | + // Service에서 만료된 토큰 처리 시 예외가 발생할 수 있지만 |
| 518 | + // Controller는 쿠키 삭제를 정상 수행해야 함 |
475 | 519 |
|
476 | 520 | // when |
477 | | - ResponseEntity<RsData<Void>> response1 = authController.logout(request); |
478 | | - ResponseEntity<RsData<Void>> response2 = authController.logout(request); |
| 521 | + ResponseEntity<RsData<Void>> response = authController.logout(expiredToken); |
479 | 522 |
|
480 | 523 | // then |
481 | | - assertThat(response1.getStatusCode()).isEqualTo(HttpStatus.OK); |
482 | | - assertThat(response2.getStatusCode()).isEqualTo(HttpStatus.OK); |
483 | | - // Controller는 중복 요청도 동일하게 처리 |
484 | | - verify(authService, times(2)).logout("sameToken"); |
| 524 | + assertThat(response.getStatusCode()).isEqualTo(HttpStatus.OK); |
| 525 | + assertThat(response.getHeaders().get("Set-Cookie")).isNotNull(); |
| 526 | + // 쿠키 삭제는 토큰 유효성과 관계없이 항상 수행됨 |
485 | 527 | } |
486 | 528 |
|
487 | 529 | @Test |
488 | | - @DisplayName("로그아웃 후 응답 데이터가 null인지 확인") |
489 | | - void logout_ResponseDataIsNull() { |
490 | | - // given |
491 | | - TokenRefreshRequest request = new TokenRefreshRequest("validRefreshToken"); |
492 | | - |
| 530 | + @DisplayName("RefreshToken이 null이어도 HTTP 200 응답") |
| 531 | + void logout_NullToken_Returns200() { |
493 | 532 | // when |
494 | | - ResponseEntity<RsData<Void>> response = authController.logout(request); |
| 533 | + ResponseEntity<RsData<Void>> response = authController.logout(null); |
495 | 534 |
|
496 | 535 | // then |
497 | | - assertThat(response.getBody().data()).isNull(); |
498 | | - // Void 타입이므로 data는 항상 null이어야 함 |
| 536 | + assertThat(response.getStatusCode()).isEqualTo(HttpStatus.OK); |
| 537 | + assertThat(response.getBody().resultCode()).isEqualTo("200"); |
| 538 | + assertThat(response.getBody().msg()).isEqualTo("로그아웃 성공"); |
499 | 539 | } |
500 | 540 | } |
501 | 541 |
|
|
0 commit comments