2021-12-24 00:57:39 +00:00
|
|
|
package test
|
|
|
|
|
|
|
|
import (
|
2022-01-09 12:05:37 +00:00
|
|
|
"fmt"
|
2022-06-11 13:40:39 +00:00
|
|
|
"strings"
|
2021-12-24 00:57:39 +00:00
|
|
|
"testing"
|
|
|
|
|
2022-01-09 12:05:37 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/constants"
|
2021-12-24 00:57:39 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/db"
|
|
|
|
"github.com/authorizerdev/authorizer/server/graph/model"
|
2022-05-27 17:50:38 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/memorystore"
|
2021-12-24 00:57:39 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/resolvers"
|
2022-06-11 18:57:21 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/token"
|
2021-12-24 00:57:39 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
)
|
|
|
|
|
2022-01-17 06:02:13 +00:00
|
|
|
func logoutTests(t *testing.T, s TestSetup) {
|
|
|
|
t.Helper()
|
2021-12-24 00:57:39 +00:00
|
|
|
t.Run(`should logout user`, func(t *testing.T) {
|
|
|
|
req, ctx := createContext(s)
|
|
|
|
email := "logout." + s.TestInfo.Email
|
|
|
|
|
2022-01-17 06:02:13 +00:00
|
|
|
_, err := resolvers.MagicLinkLoginResolver(ctx, model.MagicLinkLoginInput{
|
2021-12-24 00:57:39 +00:00
|
|
|
Email: email,
|
|
|
|
})
|
|
|
|
|
2022-07-10 16:19:33 +00:00
|
|
|
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(ctx, email, constants.VerificationTypeMagicLinkLogin)
|
2022-11-27 15:10:45 +00:00
|
|
|
assert.NoError(t, err)
|
2022-01-17 06:02:13 +00:00
|
|
|
verifyRes, err := resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
|
2021-12-24 00:57:39 +00:00
|
|
|
Token: verificationRequest.Token,
|
|
|
|
})
|
2022-11-27 15:10:45 +00:00
|
|
|
assert.NoError(t, err)
|
2021-12-24 00:57:39 +00:00
|
|
|
|
2022-06-11 18:57:21 +00:00
|
|
|
accessToken := *verifyRes.AccessToken
|
|
|
|
assert.NotEmpty(t, accessToken)
|
|
|
|
|
|
|
|
claims, err := token.ParseJWTToken(accessToken)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotEmpty(t, claims)
|
|
|
|
|
2022-06-29 16:54:00 +00:00
|
|
|
loginMethod := claims["login_method"]
|
|
|
|
sessionKey := verifyRes.User.ID
|
|
|
|
if loginMethod != nil && loginMethod != "" {
|
|
|
|
sessionKey = loginMethod.(string) + ":" + verifyRes.User.ID
|
|
|
|
}
|
|
|
|
|
|
|
|
sessionToken, err := memorystore.Provider.GetUserSession(sessionKey, constants.TokenTypeSessionToken+"_"+claims["nonce"].(string))
|
2022-06-11 13:40:39 +00:00
|
|
|
assert.NoError(t, err)
|
2022-06-11 18:57:21 +00:00
|
|
|
assert.NotEmpty(t, sessionToken)
|
|
|
|
|
|
|
|
cookie := fmt.Sprintf("%s=%s;", constants.AppCookieName+"_session", sessionToken)
|
2022-06-11 13:40:39 +00:00
|
|
|
cookie = strings.TrimSuffix(cookie, ";")
|
2022-01-22 19:54:41 +00:00
|
|
|
|
|
|
|
req.Header.Set("Cookie", cookie)
|
2022-01-17 06:02:13 +00:00
|
|
|
_, err = resolvers.LogoutResolver(ctx)
|
2021-12-24 00:57:39 +00:00
|
|
|
assert.Nil(t, err)
|
|
|
|
cleanData(email)
|
|
|
|
})
|
|
|
|
}
|