authorizer/server/test/mobile_login_test.go

66 lines
2.2 KiB
Go
Raw Normal View History

2022-12-24 21:52:42 +00:00
package test
import (
"fmt"
"strings"
2022-12-24 21:52:42 +00:00
"testing"
"time"
2022-12-24 21:52:42 +00:00
"github.com/authorizerdev/authorizer/server/constants"
2023-06-11 13:01:49 +00:00
"github.com/authorizerdev/authorizer/server/db"
2023-07-13 06:09:22 +00:00
"github.com/authorizerdev/authorizer/server/graph/model"
"github.com/authorizerdev/authorizer/server/memorystore"
2022-12-24 21:52:42 +00:00
"github.com/authorizerdev/authorizer/server/refs"
"github.com/authorizerdev/authorizer/server/resolvers"
"github.com/google/uuid"
2022-12-24 21:52:42 +00:00
"github.com/stretchr/testify/assert"
)
func mobileLoginTests(t *testing.T, s TestSetup) {
t.Helper()
t.Run(`should login via mobile`, func(t *testing.T) {
_, ctx := createContext(s)
phoneNumber := "2234567890"
signUpRes, err := resolvers.SignupResolver(ctx, model.SignUpInput{
PhoneNumber: refs.NewStringRef(phoneNumber),
2022-12-24 21:52:42 +00:00
Password: s.TestInfo.Password,
ConfirmPassword: s.TestInfo.Password,
})
assert.NoError(t, err)
assert.NotNil(t, signUpRes)
2023-06-11 13:01:49 +00:00
// should fail because phone is not verified
res, err := resolvers.LoginResolver(ctx, model.LoginInput{
PhoneNumber: refs.NewStringRef(phoneNumber),
2023-06-11 13:01:49 +00:00
Password: s.TestInfo.Password,
})
2024-04-02 09:55:11 +00:00
// access token should be empty as email is not verified
assert.NoError(t, err)
assert.NotNil(t, res)
assert.Nil(t, res.AccessToken)
assert.NotEmpty(t, res.Message)
assert.True(t, *res.ShouldShowMobileOtpScreen)
2023-07-13 06:09:22 +00:00
smsRequest, err := db.Provider.GetOTPByPhoneNumber(ctx, phoneNumber)
2023-06-11 13:01:49 +00:00
assert.NoError(t, err)
2023-07-13 06:09:22 +00:00
assert.NotEmpty(t, smsRequest.Otp)
// Get user by phone number
user, err := db.Provider.GetUserByPhoneNumber(ctx, phoneNumber)
assert.NoError(t, err)
assert.NotNil(t, user)
// Set mfa cookie session
mfaSession := uuid.NewString()
memorystore.Provider.SetMfaSession(user.ID, mfaSession, time.Now().Add(1*time.Minute).Unix())
cookie := fmt.Sprintf("%s=%s;", constants.MfaCookieName+"_session", mfaSession)
cookie = strings.TrimSuffix(cookie, ";")
req, ctx := createContext(s)
req.Header.Set("Cookie", cookie)
2023-07-13 06:09:22 +00:00
verifySMSRequest, err := resolvers.VerifyOtpResolver(ctx, model.VerifyOTPRequest{
PhoneNumber: &phoneNumber,
Otp: smsRequest.Otp,
2023-06-11 13:01:49 +00:00
})
assert.Nil(t, err)
assert.NotEqual(t, verifySMSRequest.Message, "", "message should not be empty")
2023-07-18 17:20:23 +00:00
assert.NotEmpty(t, verifySMSRequest.AccessToken)
assert.NotEmpty(t, verifySMSRequest.IDToken)
2022-12-24 21:52:42 +00:00
})
}