authorizer/server/test/update_user_test.go

70 lines
2.1 KiB
Go
Raw Permalink Normal View History

2021-12-24 00:57:39 +00:00
package test
import (
2022-01-09 12:05:37 +00:00
"fmt"
2021-12-24 00:57:39 +00:00
"testing"
"github.com/authorizerdev/authorizer/server/constants"
2022-02-28 15:56:49 +00:00
"github.com/authorizerdev/authorizer/server/crypto"
2021-12-24 00:57:39 +00:00
"github.com/authorizerdev/authorizer/server/graph/model"
2022-05-30 03:49:55 +00:00
"github.com/authorizerdev/authorizer/server/memorystore"
"github.com/authorizerdev/authorizer/server/refs"
2021-12-24 00:57:39 +00:00
"github.com/authorizerdev/authorizer/server/resolvers"
"github.com/stretchr/testify/assert"
)
2022-01-17 06:02:13 +00:00
func updateUserTest(t *testing.T, s TestSetup) {
t.Helper()
2021-12-24 00:57:39 +00:00
t.Run(`should update the user with admin secret only`, func(t *testing.T) {
req, ctx := createContext(s)
email := "update_user." + s.TestInfo.Email
2022-01-17 06:02:13 +00:00
signupRes, _ := resolvers.SignupResolver(ctx, model.SignUpInput{
Email: refs.NewStringRef(email),
2021-12-24 00:57:39 +00:00
Password: s.TestInfo.Password,
ConfirmPassword: s.TestInfo.Password,
})
user := *signupRes.User
2022-05-13 02:19:45 +00:00
2022-01-31 06:05:24 +00:00
adminRole := "supplier"
2021-12-24 00:57:39 +00:00
userRole := "user"
newRoles := []*string{&adminRole, &userRole}
2022-01-17 06:02:13 +00:00
_, err := resolvers.UpdateUserResolver(ctx, model.UpdateUserInput{
2021-12-24 00:57:39 +00:00
ID: user.ID,
Roles: newRoles,
})
assert.NotNil(t, err, "unauthorized")
2022-05-30 07:17:50 +00:00
adminSecret, err := memorystore.Provider.GetStringStoreEnvVariable(constants.EnvKeyAdminSecret)
assert.Nil(t, err)
h, err := crypto.EncryptPassword(adminSecret)
2022-01-09 12:05:37 +00:00
assert.Nil(t, err)
2022-05-30 07:17:50 +00:00
req.Header.Set("Cookie", fmt.Sprintf("%s=%s", constants.AdminCookieName, h))
2022-01-17 06:02:13 +00:00
_, err = resolvers.UpdateUserResolver(ctx, model.UpdateUserInput{
2021-12-24 00:57:39 +00:00
ID: user.ID,
Roles: newRoles,
})
2022-05-13 02:19:45 +00:00
// supplier is not part of envs
assert.Error(t, err)
adminRole = "admin"
2022-05-31 07:41:54 +00:00
memorystore.Provider.UpdateEnvVariable(constants.EnvKeyProtectedRoles, adminRole)
2022-05-13 02:19:45 +00:00
newRoles = []*string{&adminRole, &userRole}
_, err = resolvers.UpdateUserResolver(ctx, model.UpdateUserInput{
ID: user.ID,
Roles: newRoles,
AppData: map[string]interface{}{
"test": "test",
},
2022-05-13 02:19:45 +00:00
})
2021-12-24 00:57:39 +00:00
assert.Nil(t, err)
// Get user and check if roles are updated
users, err := resolvers.UsersResolver(ctx, nil)
assert.Nil(t, err)
for _, u := range users.Users {
if u.ID == user.ID {
assert.Equal(t, u.AppData["test"], "test")
}
}
2021-12-24 00:57:39 +00:00
cleanData(email)
})
}