authorizer/server/test/login_test.go

68 lines
2.1 KiB
Go
Raw Normal View History

package test
import (
"testing"
2022-01-17 06:02:13 +00:00
"github.com/authorizerdev/authorizer/server/constants"
"github.com/authorizerdev/authorizer/server/db"
2022-03-02 12:12:31 +00:00
"github.com/authorizerdev/authorizer/server/envstore"
"github.com/authorizerdev/authorizer/server/graph/model"
"github.com/authorizerdev/authorizer/server/resolvers"
2022-03-02 12:12:31 +00:00
"github.com/authorizerdev/authorizer/server/utils"
"github.com/stretchr/testify/assert"
)
2022-01-17 06:02:13 +00:00
func loginTests(t *testing.T, s TestSetup) {
t.Helper()
2021-12-24 00:57:39 +00:00
t.Run(`should login`, func(t *testing.T) {
2022-03-02 12:12:31 +00:00
t.Logf("=> is enabled: %v", envstore.EnvStoreObj.GetBoolStoreEnvVariable(constants.EnvKeyDisableEmailVerification))
2021-12-24 00:57:39 +00:00
_, ctx := createContext(s)
email := "login." + s.TestInfo.Email
2022-01-17 06:02:13 +00:00
_, err := resolvers.SignupResolver(ctx, model.SignUpInput{
2021-12-24 00:57:39 +00:00
Email: email,
Password: s.TestInfo.Password,
ConfirmPassword: s.TestInfo.Password,
})
2022-03-02 12:12:31 +00:00
res, err := resolvers.LoginResolver(ctx, model.LoginInput{
2021-12-24 00:57:39 +00:00
Email: email,
Password: s.TestInfo.Password,
})
assert.NotNil(t, err, "should fail because email is not verified")
2022-03-02 12:12:31 +00:00
assert.Nil(t, res)
2022-01-21 08:04:04 +00:00
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(email, constants.VerificationTypeBasicAuthSignup)
2022-03-02 12:12:31 +00:00
n, err := utils.EncryptNonce(verificationRequest.Nonce)
assert.NoError(t, err)
assert.NotEmpty(t, n)
assert.NotNil(t, verificationRequest)
res, err = resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
2021-12-24 00:57:39 +00:00
Token: verificationRequest.Token,
})
2022-02-28 02:25:01 +00:00
assert.NoError(t, err)
assert.NotNil(t, res)
2022-01-17 06:02:13 +00:00
_, err = resolvers.LoginResolver(ctx, model.LoginInput{
2021-12-24 00:57:39 +00:00
Email: email,
Password: s.TestInfo.Password,
Roles: []string{"test"},
})
assert.NotNil(t, err, "invalid roles")
2022-01-17 06:02:13 +00:00
_, err = resolvers.LoginResolver(ctx, model.LoginInput{
2021-12-24 00:57:39 +00:00
Email: email,
Password: s.TestInfo.Password + "s",
})
assert.NotNil(t, err, "invalid password")
2022-01-17 06:02:13 +00:00
loginRes, err := resolvers.LoginResolver(ctx, model.LoginInput{
2021-12-24 00:57:39 +00:00
Email: email,
Password: s.TestInfo.Password,
})
assert.Nil(t, err, "login successful")
assert.NotNil(t, loginRes.AccessToken, "access token should not be empty")
cleanData(email)
})
}