|
| 1 | +<?php |
| 2 | +/** |
| 3 | + * Unit test for QL_Session_Handler |
| 4 | + */ |
| 5 | + |
| 6 | +use Firebase\JWT\JWT; |
| 7 | +use WPGraphQL\WooCommerce\Utils\QL_Session_Handler; |
| 8 | + |
| 9 | +if ( ! defined( 'GRAPHQL_WOOCOMMERCE_SECRET_KEY' ) ) { |
| 10 | + define( 'GRAPHQL_WOOCOMMERCE_SECRET_KEY', 'graphql-woo-cart-session' ); |
| 11 | +} |
| 12 | + |
| 13 | +class QLSessionHandlerTest extends \Tests\WPGraphQL\WooCommerce\TestCase\WooGraphQLTestCase { |
| 14 | + public function tearDown(): void { |
| 15 | + unset( $_SERVER ); |
| 16 | + |
| 17 | + // after |
| 18 | + parent::tearDown(); |
| 19 | + } |
| 20 | + |
| 21 | + // Tests |
| 22 | + public function test_initializes() { |
| 23 | + // Create session handler. |
| 24 | + $session = new QL_Session_Handler(); |
| 25 | + |
| 26 | + $this->assertInstanceOf( QL_Session_Handler::class, $session ); |
| 27 | + } |
| 28 | + |
| 29 | + public function test_init_session_token() { |
| 30 | + // Create session handler. |
| 31 | + $session = new QL_Session_Handler(); |
| 32 | + |
| 33 | + // Assert session hasn't started. |
| 34 | + $this->assertFalse( $session->has_session(), 'Shouldn\'t have a session yet' ); |
| 35 | + |
| 36 | + // Initialize session. |
| 37 | + $session->init_session_token(); |
| 38 | + |
| 39 | + // Assert session has started. |
| 40 | + $this->assertTrue( $session->has_session(), 'Should have session.' ); |
| 41 | + |
| 42 | + // Get token for future request. |
| 43 | + $old_token = $session->build_token(); |
| 44 | + $decoded_old_token = JWT::decode( $old_token, GRAPHQL_WOOCOMMERCE_SECRET_KEY, array( 'HS256' ) ); |
| 45 | + |
| 46 | + // Sent token to HTTP header to simulate a new request. |
| 47 | + $_SERVER['HTTP_WOOCOMMERCE_SESSION'] = 'Session ' . $old_token; |
| 48 | + |
| 49 | + // Stale for 5 seconds so timers can update. |
| 50 | + usleep( 1000000 ); |
| 51 | + |
| 52 | + // Initialize session token for next request. |
| 53 | + $session->init_session_token(); |
| 54 | + $new_token = $session->build_token(); |
| 55 | + $decoded_new_token = JWT::decode( $new_token, GRAPHQL_WOOCOMMERCE_SECRET_KEY, array( 'HS256' ) ); |
| 56 | + |
| 57 | + // Assert new token is different than old token. |
| 58 | + $this->assertNotEquals( $old_token, $new_token, 'New token should not match token from last request.' ); |
| 59 | + $this->assertGreaterThan( $decoded_old_token->exp, $decoded_new_token->exp ); |
| 60 | + } |
| 61 | + |
| 62 | + public function test_get_session_token() { |
| 63 | + // Create session handler. |
| 64 | + $session = new QL_Session_Handler(); |
| 65 | + |
| 66 | + // Expect token to be null. |
| 67 | + $null_token = $session->get_session_token(); |
| 68 | + $this->assertFalse( $null_token, 'No token should exist.' ); |
| 69 | + |
| 70 | + // Set token in header. |
| 71 | + $session->init_session_token(); |
| 72 | + $_SERVER['HTTP_WOOCOMMERCE_SESSION'] = 'Session ' . $session->build_token(); |
| 73 | + |
| 74 | + // Expect token to be value. |
| 75 | + $token = $session->get_session_token(); |
| 76 | + $this->assertObjectHasAttribute( 'iat', $token ); |
| 77 | + $this->assertObjectHasAttribute( 'exp', $token ); |
| 78 | + $this->assertObjectHasAttribute( 'data', $token ); |
| 79 | + } |
| 80 | + |
| 81 | + public function test_get_session_header() { |
| 82 | + // Create session handler. |
| 83 | + $session = new QL_Session_Handler(); |
| 84 | + $session->init_session_token(); |
| 85 | + |
| 86 | + // Get the Auth header. |
| 87 | + $null_header = $session->get_session_header(); |
| 88 | + |
| 89 | + $this->assertFalse( $null_header, 'No HTTP Header with session token should exist.' ); |
| 90 | + |
| 91 | + // Set token in header. |
| 92 | + $_SERVER['HTTP_WOOCOMMERCE_SESSION'] = 'Session ' . $session->build_token(); |
| 93 | + |
| 94 | + $this->assertIsString( $session->get_session_header() ); |
| 95 | + } |
| 96 | + |
| 97 | + public function test_build_token() { |
| 98 | + // Create session handler. |
| 99 | + $session = new QL_Session_Handler(); |
| 100 | + |
| 101 | + // Should be invalid if run before initialization. |
| 102 | + $invalid_token = $session->build_token(); |
| 103 | + $this->assertFalse( $invalid_token, 'Should be an invalid session token' ); |
| 104 | + |
| 105 | + // Should valid when run after initialization. |
| 106 | + $session->init_session_token(); |
| 107 | + $token = $session->build_token(); |
| 108 | + |
| 109 | + $decode_token = JWT::decode( $token, GRAPHQL_WOOCOMMERCE_SECRET_KEY, array( 'HS256' ) ); |
| 110 | + $this->assertObjectHasAttribute( 'iat', $decode_token ); |
| 111 | + $this->assertObjectHasAttribute( 'exp', $decode_token ); |
| 112 | + $this->assertObjectHasAttribute( 'data', $decode_token ); |
| 113 | + |
| 114 | + $this->assertEquals( $token, $session->build_token() ); |
| 115 | + } |
| 116 | + |
| 117 | + public function test_set_customer_session_token() { |
| 118 | + // Create session handler. |
| 119 | + $session = new QL_Session_Handler(); |
| 120 | + |
| 121 | + // Should fail to set headers if run before initialization. |
| 122 | + $session->set_customer_session_token( true ); |
| 123 | + $graphql_response_headers = apply_filters( 'graphql_response_headers_to_send', array() ); |
| 124 | + $this->assertArrayNotHasKey( 'woocommerce-session', $graphql_response_headers ); |
| 125 | + |
| 126 | + // Should success when run after initialization. |
| 127 | + $session->init_session_token(); |
| 128 | + $graphql_response_headers = apply_filters( 'graphql_response_headers_to_send', array() ); |
| 129 | + $this->assertArrayHasKey( 'woocommerce-session', $graphql_response_headers ); |
| 130 | + } |
| 131 | + |
| 132 | + public function test_forget_session() { |
| 133 | + // Create session handler. |
| 134 | + $session = new QL_Session_Handler(); |
| 135 | + $session->init_session_token(); |
| 136 | + |
| 137 | + // Get old token |
| 138 | + $old_token = $session->build_token(); |
| 139 | + $this->assertIsString( $old_token ); |
| 140 | + |
| 141 | + // Forget session |
| 142 | + $session->forget_session(); |
| 143 | + |
| 144 | + // Get new token. |
| 145 | + $new_token = $session->build_token(); |
| 146 | + $this->assertIsString( $old_token ); |
| 147 | + |
| 148 | + $this->assertNotEquals( $old_token, $new_token, 'Tokens should not match' ); |
| 149 | + } |
| 150 | +} |
0 commit comments