Files
authorizer/server/test/magic_link_login_test.go

39 lines
1.2 KiB
Go
Raw Normal View History

2021-12-24 06:27:39 +05:30
package test
import (
2022-03-02 17:42:31 +05:30
"context"
2021-12-24 06:27:39 +05:30
"testing"
2022-01-09 17:35:37 +05:30
"github.com/authorizerdev/authorizer/server/constants"
2021-12-24 06:27:39 +05:30
"github.com/authorizerdev/authorizer/server/db"
"github.com/authorizerdev/authorizer/server/graph/model"
"github.com/authorizerdev/authorizer/server/resolvers"
"github.com/stretchr/testify/assert"
)
2022-01-17 11:32:13 +05:30
func magicLinkLoginTests(t *testing.T, s TestSetup) {
t.Helper()
2021-12-24 06:27:39 +05:30
t.Run(`should login with magic link`, func(t *testing.T) {
req, ctx := createContext(s)
email := "magic_link_login." + s.TestInfo.Email
2022-01-17 11:32:13 +05:30
_, err := resolvers.MagicLinkLoginResolver(ctx, model.MagicLinkLoginInput{
2021-12-24 06:27:39 +05:30
Email: email,
})
assert.Nil(t, err)
2022-01-21 13:34:04 +05:30
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(email, constants.VerificationTypeMagicLinkLogin)
2022-01-17 11:32:13 +05:30
verifyRes, err := resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
2021-12-24 06:27:39 +05:30
Token: verificationRequest.Token,
})
2022-03-02 17:42:31 +05:30
assert.NoError(t, err)
assert.NotNil(t, verifyRes.AccessToken)
s.GinContext.Request.Header.Set("Authorization", "Bearer "+*verifyRes.AccessToken)
ctx = context.WithValue(req.Context(), "GinContextKey", s.GinContext)
2022-01-17 11:32:13 +05:30
_, err = resolvers.ProfileResolver(ctx)
2021-12-24 06:27:39 +05:30
assert.Nil(t, err)
2022-03-02 17:42:31 +05:30
s.GinContext.Request.Header.Set("Authorization", "")
2021-12-24 06:27:39 +05:30
cleanData(email)
})
}