mirror of
https://github.com/zvx-echo6/central.git
synced 2026-05-21 18:14:44 +02:00
* feat(gui): implement first-run setup wizard (1b-8) Add a 5-step setup wizard that replaces the single-step /setup: 1. Create Operator - create initial operator account 2. System Settings - configure map tile URL and attribution 3. API Keys - optionally add API keys for adapters 4. Configure Adapters - enable/disable adapters with region picker 5. Finish Setup - review and complete setup Key changes: - Update middleware to handle wizard URL structure and step routing - Add wizard routes for each step with proper auth checks - Create new templates using base_wizard.html for consistent styling - Add audit events for system.update and setup.complete - Update tests for new middleware behavior Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * fix(gui): handle CSRF errors on wizard paths Update csrf_exception_handler to re-render wizard forms with error message instead of redirecting to /login when CSRF validation fails. - /setup/operator: re-render with error - /setup/system: re-render with current system values + error - /setup/keys: re-render with current keys list + error - /setup/adapters: re-render with current adapter config + error - /setup/finish: re-render with summary data + error - /setup: redirect to /setup (middleware routes to appropriate step) Add error display to setup_keys.html and setup_finish.html templates. Add 7 new CSRF handler tests for wizard paths. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * fix(gui): region picker render + click-to-draw Bug A: Maps render blank on /setup/adapters for FIRMS and USGS because Leaflet computed zero dimensions before container layout settled. Fix: add setTimeout invalidateSize() after map creation. Bug B: No click-to-draw functionality - only drag corners. Fix: add L.Control.Draw for rectangle drawing with CREATED event handler to replace existing rectangle. Both fixes applied to: - setup_adapters.html (wizard inline JS) - _region_picker.html (standalone edit page) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * fix(gui): handle revisiting /setup/operator after operator created When an operator already exists, /setup/operator now shows a confirmation page instead of the create form. This prevents: - Unique constraint violations on duplicate username - Silent creation of duplicate operators GET /setup/operator: queries config.operators; if any exist, renders confirmation state with existing_operator context. POST /setup/operator: checks operator count before INSERT; if non-zero, renders confirmation state without inserting. Template updated with conditional to show "Operator Already Configured" message when existing_operator is set. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * fix(csrf): replace fastapi-csrf-protect with session-bound CSRF Fixes CSRF race condition where every GET rotated the CSRF token, causing POST failures when users had multiple tabs or slow connections. Changes: - Remove fastapi-csrf-protect dependency - Add session-bound CSRF tokens stored in config.sessions table - Add pre-auth CSRF for unauthenticated routes (/login, /setup/operator) - Add csrf.py module for pre-auth token generation/validation - Update routes to use new CSRF token handling - Add migration 013 to add csrf_token column to sessions The session-bound approach ensures CSRF tokens remain stable for the duration of a session, eliminating the race condition. Note: Route tests (test_wizard.py, test_adapters.py, etc.) need refactoring to mock get_settings() instead of CsrfProtect dependency. Core auth/CSRF handler tests pass (74 tests). Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * test(csrf): update test suite for session-bound CSRF tokens - Add CSRF fixtures to conftest.py for pre-auth and session CSRF - Update test_wizard.py: use bypass_pre_auth_csrf and patch_route_settings - Update test_adapters.py: set request.state.csrf_token and form mock data - Update test_api_keys.py: add CSRF token to form data for POST routes - Update test_streams.py: change return_value to side_effect for CSRF support - Update test_region_picker.py: add CSRF token handling - Update test_config_store.py: set CENTRAL_CSRF_SECRET env var in fixture All 285 tests now pass with session-bound CSRF validation. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com> Co-authored-by: Matt Johnson <mj@k7zvx.com>
96 lines
2.5 KiB
Python
96 lines
2.5 KiB
Python
"""Shared fixtures for auth tests."""
|
|
|
|
import asyncio
|
|
import tempfile
|
|
from pathlib import Path
|
|
from typing import AsyncGenerator
|
|
|
|
import asyncpg
|
|
import pytest
|
|
import pytest_asyncio
|
|
from unittest.mock import AsyncMock, MagicMock, patch
|
|
|
|
from central.bootstrap_config import Settings
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def event_loop():
|
|
"""Create an event loop for the test session."""
|
|
loop = asyncio.new_event_loop()
|
|
yield loop
|
|
loop.close()
|
|
|
|
|
|
@pytest.fixture
|
|
def mock_settings():
|
|
"""Create mock settings for testing."""
|
|
return Settings(
|
|
db_dsn="postgresql://test:test@localhost/test",
|
|
nats_url="nats://localhost:4222",
|
|
csrf_secret="test-csrf-secret-for-testing-only-32chars",
|
|
)
|
|
|
|
|
|
@pytest.fixture
|
|
def mock_pool():
|
|
"""Create a mock database pool."""
|
|
pool = MagicMock()
|
|
pool.acquire = MagicMock()
|
|
pool.close = AsyncMock()
|
|
return pool
|
|
|
|
|
|
@pytest.fixture
|
|
def mock_conn():
|
|
"""Create a mock database connection."""
|
|
conn = MagicMock()
|
|
conn.fetchrow = AsyncMock()
|
|
conn.fetchval = AsyncMock()
|
|
conn.execute = AsyncMock()
|
|
return conn
|
|
|
|
|
|
# CSRF fixtures for route tests
|
|
|
|
@pytest.fixture
|
|
def bypass_pre_auth_csrf():
|
|
"""Patch pre-auth CSRF validation to always pass.
|
|
|
|
Use for tests of pre-auth routes: /login, /setup/operator
|
|
"""
|
|
with patch("central.gui.routes.validate_pre_auth_csrf", return_value=True):
|
|
with patch("central.gui.routes.generate_pre_auth_csrf", return_value=("test_csrf_token", "test_signed_token")):
|
|
yield
|
|
|
|
|
|
@pytest.fixture
|
|
def bypass_session_csrf():
|
|
"""Create a mock request with session CSRF properly configured.
|
|
|
|
Use for tests of authenticated routes that check request.state.csrf_token.
|
|
Returns a configured mock_request.
|
|
"""
|
|
request = MagicMock()
|
|
request.state.csrf_token = "test_csrf_token_12345"
|
|
request.state.operator = MagicMock()
|
|
request.state.operator.id = 1
|
|
request.state.operator.username = "testuser"
|
|
|
|
# Mock form() to return dict with matching CSRF token
|
|
form_data = {"csrf_token": "test_csrf_token_12345"}
|
|
|
|
async def mock_form():
|
|
return form_data
|
|
|
|
request.form = mock_form
|
|
request._form_data = form_data # Allow tests to modify form data
|
|
|
|
return request
|
|
|
|
|
|
@pytest.fixture
|
|
def patch_route_settings():
|
|
"""Patch get_settings in routes module."""
|
|
with patch("central.gui.routes.get_settings") as mock:
|
|
mock.return_value.csrf_secret = "test-csrf-secret-for-testing-only-32chars"
|
|
yield mock
|