2021-12-24 00:57:39 +00:00
|
|
|
package test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/authorizerdev/authorizer/server/constants"
|
|
|
|
"github.com/authorizerdev/authorizer/server/graph/model"
|
|
|
|
"github.com/authorizerdev/authorizer/server/resolvers"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
)
|
|
|
|
|
|
|
|
func updateUserTest(s TestSetup, t *testing.T) {
|
|
|
|
t.Run(`should update the user with admin secret only`, func(t *testing.T) {
|
|
|
|
req, ctx := createContext(s)
|
|
|
|
email := "update_user." + s.TestInfo.Email
|
|
|
|
signupRes, _ := resolvers.Signup(ctx, model.SignUpInput{
|
|
|
|
Email: email,
|
|
|
|
Password: s.TestInfo.Password,
|
|
|
|
ConfirmPassword: s.TestInfo.Password,
|
|
|
|
})
|
|
|
|
|
|
|
|
user := *signupRes.User
|
|
|
|
adminRole := "admin"
|
|
|
|
userRole := "user"
|
|
|
|
newRoles := []*string{&adminRole, &userRole}
|
|
|
|
_, err := resolvers.UpdateUser(ctx, model.UpdateUserInput{
|
|
|
|
ID: user.ID,
|
|
|
|
Roles: newRoles,
|
|
|
|
})
|
|
|
|
assert.NotNil(t, err, "unauthorized")
|
|
|
|
|
2021-12-31 08:22:10 +00:00
|
|
|
req.Header.Add("x-authorizer-admin-secret", constants.EnvData.ADMIN_SECRET)
|
2021-12-24 00:57:39 +00:00
|
|
|
_, err = resolvers.UpdateUser(ctx, model.UpdateUserInput{
|
|
|
|
ID: user.ID,
|
|
|
|
Roles: newRoles,
|
|
|
|
})
|
|
|
|
assert.Nil(t, err)
|
|
|
|
cleanData(email)
|
|
|
|
})
|
|
|
|
}
|