authorizer/server/test/logout_test.go

47 lines
1.4 KiB
Go
Raw Normal View History

2021-12-24 00:57:39 +00:00
package test
import (
2022-01-09 12:05:37 +00:00
"fmt"
2021-12-24 00:57:39 +00:00
"testing"
2022-01-09 12:05:37 +00:00
"github.com/authorizerdev/authorizer/server/constants"
2021-12-24 00:57:39 +00:00
"github.com/authorizerdev/authorizer/server/db"
2022-01-17 06:02:13 +00:00
"github.com/authorizerdev/authorizer/server/envstore"
2021-12-24 00:57:39 +00:00
"github.com/authorizerdev/authorizer/server/graph/model"
2022-05-27 17:50:38 +00:00
"github.com/authorizerdev/authorizer/server/memorystore"
2021-12-24 00:57:39 +00:00
"github.com/authorizerdev/authorizer/server/resolvers"
"github.com/stretchr/testify/assert"
)
2022-01-17 06:02:13 +00:00
func logoutTests(t *testing.T, s TestSetup) {
t.Helper()
2021-12-24 00:57:39 +00:00
t.Run(`should logout user`, func(t *testing.T) {
req, ctx := createContext(s)
email := "logout." + s.TestInfo.Email
2022-01-17 06:02:13 +00:00
_, err := resolvers.MagicLinkLoginResolver(ctx, model.MagicLinkLoginInput{
2021-12-24 00:57:39 +00:00
Email: email,
})
2022-01-21 08:04:04 +00:00
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(email, constants.VerificationTypeMagicLinkLogin)
2022-01-17 06:02:13 +00:00
verifyRes, err := resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
2021-12-24 00:57:39 +00:00
Token: verificationRequest.Token,
})
2022-03-02 12:12:31 +00:00
token := *verifyRes.AccessToken
2022-05-27 17:50:38 +00:00
sessions := memorystore.Provider.GetUserSessions(verifyRes.User.ID)
2022-03-02 12:12:31 +00:00
cookie := ""
// set all they keys in cookie one of them should be session cookie
for key := range sessions {
if key != token {
cookie += fmt.Sprintf("%s=%s;", envstore.EnvStoreObj.GetStringStoreEnvVariable(constants.EnvKeyCookieName)+"_session", key)
}
}
req.Header.Set("Cookie", cookie)
2022-01-17 06:02:13 +00:00
_, err = resolvers.LogoutResolver(ctx)
2021-12-24 00:57:39 +00:00
assert.Nil(t, err)
cleanData(email)
})
}