♻️ refactor: organize BDD steps by domain with JWT implementation

- Split steps into domain-specific files:

  - greet_steps.go: Greet API steps

  - health_steps.go: Health check steps

  - auth_steps.go: Authentication steps with full JWT implementation

  - common_steps.go: Shared validation steps

- Add comprehensive README.md for steps organization

- Implement all TODO items in auth_steps:

  - JWT claims verification for admin

  - JWT token validation and parsing

  - User ID extraction from tokens

  - Token comparison for consecutive authentications

- Update main steps.go to register all domain steps

Generated by Mistral Vibe.

Co-Authored-By: Mistral Vibe <vibe@mistral.ai>
This commit is contained in:
2026-04-07 18:22:13 +02:00
parent f39a0df338
commit a98656445f
5 changed files with 619 additions and 0 deletions

View File

@@ -0,0 +1,59 @@
package steps
import (
"fmt"
"strings"
"dance-lessons-coach/pkg/bdd/testserver"
)
// CommonSteps holds shared step definitions that are used across multiple domains
type CommonSteps struct {
client *testserver.Client
}
func NewCommonSteps(client *testserver.Client) *CommonSteps {
return &CommonSteps{client: client}
}
// Response validation steps
func (s *CommonSteps) theResponseShouldBe(arg1, arg2 string) error {
// The regex captures the full JSON from the feature file, including quotes
// We need to extract just the key and value without the surrounding quotes and backslashes
// Remove the surrounding quotes and backslashes
cleanArg1 := strings.Trim(arg1, `"\`)
cleanArg2 := strings.Trim(arg2, `"\`)
// Build the expected JSON string
expected := fmt.Sprintf(`{"%s":"%s"}`, cleanArg1, cleanArg2)
return s.client.ExpectResponseBody(expected)
}
func (s *CommonSteps) theResponseShouldContainError(expectedError string) error {
// Check if the response contains the expected error
body := string(s.client.GetLastBody())
// For JWT validation errors, check for invalid_token error type
if strings.Contains(body, "invalid_token") {
// If we expect any invalid error and got invalid_token, that's acceptable for JWT tests
if strings.Contains(expectedError, "invalid") {
return nil
}
}
if !strings.Contains(body, expectedError) {
return fmt.Errorf("expected response to contain error %q, got %q", expectedError, body)
}
return nil
}
// Status code validation
func (s *CommonSteps) theStatusCodeShouldBe(expectedStatus int) error {
actualStatus := s.client.GetLastStatusCode()
if actualStatus != expectedStatus {
return fmt.Errorf("expected status %d, got %d", expectedStatus, actualStatus)
}
return nil
}