2021-12-23 05:01:52 +00:00
|
|
|
package test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
|
2022-01-17 06:02:13 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/constants"
|
2021-12-23 05:01:52 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/db"
|
|
|
|
"github.com/authorizerdev/authorizer/server/graph/model"
|
2023-10-21 21:03:36 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/refs"
|
2021-12-23 05:01:52 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/resolvers"
|
2022-03-02 12:12:31 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/utils"
|
2021-12-23 05:01:52 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
)
|
|
|
|
|
2022-01-17 06:02:13 +00:00
|
|
|
func loginTests(t *testing.T, s TestSetup) {
|
|
|
|
t.Helper()
|
2021-12-24 00:57:39 +00:00
|
|
|
t.Run(`should login`, func(t *testing.T) {
|
|
|
|
_, ctx := createContext(s)
|
|
|
|
email := "login." + s.TestInfo.Email
|
2023-03-29 01:36:33 +00:00
|
|
|
signUpRes, err := resolvers.SignupResolver(ctx, model.SignUpInput{
|
2023-10-21 21:03:36 +00:00
|
|
|
Email: refs.NewStringRef(email),
|
2021-12-24 00:57:39 +00:00
|
|
|
Password: s.TestInfo.Password,
|
|
|
|
ConfirmPassword: s.TestInfo.Password,
|
|
|
|
})
|
2023-03-29 01:36:33 +00:00
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotNil(t, signUpRes)
|
2022-03-02 12:12:31 +00:00
|
|
|
res, err := resolvers.LoginResolver(ctx, model.LoginInput{
|
2023-10-21 21:03:36 +00:00
|
|
|
Email: refs.NewStringRef(email),
|
2021-12-24 00:57:39 +00:00
|
|
|
Password: s.TestInfo.Password,
|
|
|
|
})
|
2024-04-02 09:55:11 +00:00
|
|
|
// access token should be empty as email is not verified
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotNil(t, res)
|
|
|
|
assert.Nil(t, res.AccessToken)
|
|
|
|
assert.NotEmpty(t, res.Message)
|
2022-07-10 16:19:33 +00:00
|
|
|
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(ctx, email, constants.VerificationTypeBasicAuthSignup)
|
2023-03-29 01:36:33 +00:00
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotNil(t, verificationRequest)
|
2022-03-02 12:12:31 +00:00
|
|
|
n, err := utils.EncryptNonce(verificationRequest.Nonce)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotEmpty(t, n)
|
|
|
|
assert.NotNil(t, verificationRequest)
|
|
|
|
res, err = resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
|
2021-12-24 00:57:39 +00:00
|
|
|
Token: verificationRequest.Token,
|
|
|
|
})
|
2022-02-28 02:25:01 +00:00
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotNil(t, res)
|
2022-01-17 06:02:13 +00:00
|
|
|
_, err = resolvers.LoginResolver(ctx, model.LoginInput{
|
2023-10-21 21:03:36 +00:00
|
|
|
Email: refs.NewStringRef(email),
|
2021-12-24 00:57:39 +00:00
|
|
|
Password: s.TestInfo.Password,
|
|
|
|
Roles: []string{"test"},
|
|
|
|
})
|
|
|
|
assert.NotNil(t, err, "invalid roles")
|
|
|
|
|
2022-01-17 06:02:13 +00:00
|
|
|
_, err = resolvers.LoginResolver(ctx, model.LoginInput{
|
2023-10-21 21:03:36 +00:00
|
|
|
Email: refs.NewStringRef(email),
|
2021-12-24 00:57:39 +00:00
|
|
|
Password: s.TestInfo.Password + "s",
|
|
|
|
})
|
|
|
|
assert.NotNil(t, err, "invalid password")
|
|
|
|
|
2022-01-17 06:02:13 +00:00
|
|
|
loginRes, err := resolvers.LoginResolver(ctx, model.LoginInput{
|
2023-10-21 21:03:36 +00:00
|
|
|
Email: refs.NewStringRef(email),
|
2021-12-24 00:57:39 +00:00
|
|
|
Password: s.TestInfo.Password,
|
|
|
|
})
|
|
|
|
|
|
|
|
assert.Nil(t, err, "login successful")
|
|
|
|
assert.NotNil(t, loginRes.AccessToken, "access token should not be empty")
|
|
|
|
|
|
|
|
cleanData(email)
|
2021-12-23 05:01:52 +00:00
|
|
|
})
|
|
|
|
}
|