authorizer/server/test/reset_password_test.go

98 lines
3.1 KiB
Go
Raw Normal View History

package test
import (
"testing"
2023-06-26 11:53:57 +00:00
"github.com/authorizerdev/authorizer/server/refs"
2022-01-17 06:02:13 +00:00
"github.com/authorizerdev/authorizer/server/constants"
"github.com/authorizerdev/authorizer/server/db"
"github.com/authorizerdev/authorizer/server/graph/model"
"github.com/authorizerdev/authorizer/server/resolvers"
"github.com/stretchr/testify/assert"
)
2022-01-17 06:02:13 +00:00
func resetPasswordTest(t *testing.T, s TestSetup) {
t.Helper()
2021-12-24 00:57:39 +00:00
t.Run(`should reset password`, func(t *testing.T) {
2023-06-26 11:53:57 +00:00
phoneNumber := "2234567890"
phonePointer := &phoneNumber
2021-12-24 00:57:39 +00:00
email := "reset_password." + s.TestInfo.Email
_, ctx := createContext(s)
2022-01-17 06:02:13 +00:00
_, err := resolvers.SignupResolver(ctx, model.SignUpInput{
2021-12-24 00:57:39 +00:00
Email: email,
Password: s.TestInfo.Password,
ConfirmPassword: s.TestInfo.Password,
})
assert.NoError(t, err)
2022-01-17 06:02:13 +00:00
_, err = resolvers.ForgotPasswordResolver(ctx, model.ForgotPasswordInput{
2023-06-26 11:53:57 +00:00
EmailOrPhone: email,
2021-12-24 00:57:39 +00:00
})
assert.Nil(t, err, "no errors for forgot password")
2022-07-10 16:19:33 +00:00
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(ctx, email, constants.VerificationTypeForgotPassword)
2021-12-24 00:57:39 +00:00
assert.Nil(t, err, "should get forgot password request")
assert.NotNil(t, verificationRequest)
2022-01-17 06:02:13 +00:00
_, err = resolvers.ResetPasswordResolver(ctx, model.ResetPasswordInput{
2023-06-26 11:53:57 +00:00
TokenOrCode: verificationRequest.Token,
2021-12-24 00:57:39 +00:00
Password: "test1",
ConfirmPassword: "test",
})
assert.NotNil(t, err, "passowrds don't match")
2022-01-17 06:02:13 +00:00
_, err = resolvers.ResetPasswordResolver(ctx, model.ResetPasswordInput{
2023-06-26 11:53:57 +00:00
TokenOrCode: verificationRequest.Token,
2021-12-24 00:57:39 +00:00
Password: "test1",
ConfirmPassword: "test1",
})
assert.NotNil(t, err, "invalid password")
_, err = resolvers.ResetPasswordResolver(ctx, model.ResetPasswordInput{
2023-06-26 11:53:57 +00:00
TokenOrCode: verificationRequest.Token,
Password: "Test@1234",
ConfirmPassword: "Test@1234",
})
2021-12-24 00:57:39 +00:00
assert.Nil(t, err, "password changed successfully")
2023-06-26 11:53:57 +00:00
// Signup with phone, forget password and then - reset it.
signUpRes, err := resolvers.MobileSignupResolver(ctx, &model.MobileSignUpInput{
Email: refs.NewStringRef(email),
PhoneNumber: phoneNumber,
Password: s.TestInfo.Password,
ConfirmPassword: s.TestInfo.Password,
})
assert.NoError(t, err)
assert.NotNil(t, signUpRes)
forgotPasswordWithPhone, err := resolvers.ForgotPasswordResolver(ctx, model.ForgotPasswordInput{
EmailOrPhone: phoneNumber,
})
assert.Nil(t, err)
assert.NotNil(t, forgotPasswordWithPhone)
// get code from db
smsRequestForReset, err := db.Provider.GetCodeByPhone(ctx, phoneNumber)
assert.Nil(t, err)
assert.NotNil(t, smsRequestForReset)
// throw an error if the code is not correct
resetPasswordResponse, err := resolvers.ResetPasswordResolver(ctx, model.ResetPasswordInput{
PhoneNumber: phonePointer,
TokenOrCode: "abcd@EFG",
})
assert.NotNil(t, err, "should fail because of bad credentials")
assert.Nil(t, resetPasswordResponse)
resetPasswordResponse, err = resolvers.ResetPasswordResolver(ctx, model.ResetPasswordInput{
PhoneNumber: phonePointer,
TokenOrCode: smsRequestForReset.Code,
})
assert.Nil(t, err)
assert.NotNil(t, resetPasswordResponse)
2021-12-24 00:57:39 +00:00
cleanData(email)
})
}