* test cases totp
This commit is contained in:
lemonScaletech 2023-09-11 11:45:32 +05:30
parent a3fa0eb6cd
commit 0e931d6e65

View File

@ -1,76 +1,81 @@
package test package test
import ( import (
"github.com/authorizerdev/authorizer/server/db"
"github.com/authorizerdev/authorizer/server/graph/model"
"github.com/authorizerdev/authorizer/server/resolvers"
"github.com/stretchr/testify/assert"
"testing" "testing"
) )
func verifyTOTPTest(t *testing.T, s TestSetup) { func verifyTOTPTest(t *testing.T, s TestSetup) {
//t.Helper() t.Helper()
//t.Run(`should verify totp`, func(t *testing.T) { t.Run(`should verify totp`, func(t *testing.T) {
// req, ctx := createContext(s) _, ctx := createContext(s)
// email := "verify_otp." + s.TestInfo.Email email := "verify_otp." + s.TestInfo.Email
// res, err := resolvers.SignupResolver(ctx, model.SignUpInput{ res, err := resolvers.SignupResolver(ctx, model.SignUpInput{
// Email: email, Email: email,
// Password: s.TestInfo.Password, Password: s.TestInfo.Password,
// ConfirmPassword: s.TestInfo.Password, ConfirmPassword: s.TestInfo.Password,
// }) })
// assert.NoError(t, err) assert.NoError(t, err)
// assert.NotNil(t, res) assert.NotNil(t, res)
//
// // Login should fail as email is not verified // Login should fail as email is not verified
// loginRes, err := resolvers.LoginResolver(ctx, model.LoginInput{ loginRes, err := resolvers.LoginResolver(ctx, model.LoginInput{
// Email: email, Email: email,
// Password: s.TestInfo.Password, Password: s.TestInfo.Password,
// }) })
// assert.Error(t, err) assert.Error(t, err)
// assert.Nil(t, loginRes) assert.Nil(t, loginRes)
// verificationRequest, err := db.Provider.GenerateTotp(ctx, loginRes.User.ID) _, err = db.Provider.GenerateTotp(ctx, loginRes.User.ID)
// assert.Nil(t, err) assert.Nil(t, err)
// assert.Equal(t, email, verificationRequest.Email) //assert.Equal(t, ??, string)
// verifyRes, err := resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{ // verifyRes, err := resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
// Token: verificationRequest.Token, // Token: verificationRequest.Token,
// }) // })
// assert.Nil(t, err) // assert.Nil(t, err)
// assert.NotEqual(t, verifyRes.AccessToken, "", "access token should not be empty") // assert.NotEqual(t, verifyRes.AccessToken, "", "access token should not be empty")
// //
// // Using access token update profile // // Using access token update profile
// s.GinContext.Request.Header.Set("Authorization", "Bearer "+refs.StringValue(verifyRes.AccessToken)) // s.GinContext.Request.Header.Set("Authorization", "Bearer "+refs.StringValue(verifyRes.AccessToken))
// ctx = context.WithValue(req.Context(), "GinContextKey", s.GinContext) // ctx = context.WithValue(req.Context(), "GinContextKey", s.GinContext)
// updateProfileRes, err := resolvers.UpdateProfileResolver(ctx, model.UpdateProfileInput{ // updateProfileRes, err := resolvers.UpdateProfileResolver(ctx, model.UpdateProfileInput{
// IsMultiFactorAuthEnabled: refs.NewBoolRef(true), // IsMultiFactorAuthEnabled: refs.NewBoolRef(true),
// }) // })
// assert.NoError(t, err) // assert.NoError(t, err)
// assert.NotEmpty(t, updateProfileRes.Message) // assert.NotEmpty(t, updateProfileRes.Message)
// //
// // Login should not return error but access token should be empty as otp should have been sent // // Login should not return error but access token should be empty as otp should have been sent
// loginRes, err = resolvers.LoginResolver(ctx, model.LoginInput{ // loginRes, err = resolvers.LoginResolver(ctx, model.LoginInput{
// Email: email, // Email: email,
// Password: s.TestInfo.Password, // Password: s.TestInfo.Password,
// }) // })
// assert.NoError(t, err) // assert.NoError(t, err)
// assert.NotNil(t, loginRes) // assert.NotNil(t, loginRes)
// assert.Nil(t, loginRes.AccessToken) // assert.Nil(t, loginRes.AccessToken)
// //
// // Get otp from db // // Get otp from db
// otp, err := db.Provider.GetOTPByEmail(ctx, email) // otp, err := db.Provider.GetOTPByEmail(ctx, email)
// assert.NoError(t, err) // assert.NoError(t, err)
// assert.NotEmpty(t, otp.Otp) // assert.NotEmpty(t, otp.Otp)
// // Get user by email // // Get user by email
// user, err := db.Provider.GetUserByEmail(ctx, email) // user, err := db.Provider.GetUserByEmail(ctx, email)
// assert.NoError(t, err) // assert.NoError(t, err)
// assert.NotNil(t, user) // assert.NotNil(t, user)
// // Set mfa cookie session // // Set mfa cookie session
// mfaSession := uuid.NewString() // mfaSession := uuid.NewString()
// memorystore.Provider.SetMfaSession(user.ID, mfaSession, time.Now().Add(1*time.Minute).Unix()) // memorystore.Provider.SetMfaSession(user.ID, mfaSession, time.Now().Add(1*time.Minute).Unix())
// cookie := fmt.Sprintf("%s=%s;", constants.MfaCookieName+"_session", mfaSession) // cookie := fmt.Sprintf("%s=%s;", constants.MfaCookieName+"_session", mfaSession)
// cookie = strings.TrimSuffix(cookie, ";") // cookie = strings.TrimSuffix(cookie, ";")
// req.Header.Set("Cookie", cookie) // req.Header.Set("Cookie", cookie)
// verifyOtpRes, err := resolvers.VerifyOtpResolver(ctx, model.VerifyOTPRequest{ // verifyOtpRes, err := resolvers.VerifyOtpResolver(ctx, model.VerifyOTPRequest{
// Email: &email, // Email: &email,
// Otp: otp.Otp, // Otp: otp.Otp,
// }) // })
// assert.Nil(t, err) // assert.Nil(t, err)
// assert.NotEqual(t, verifyOtpRes.AccessToken, "", "access token should not be empty") // assert.NotEqual(t, verifyOtpRes.AccessToken, "", "access token should not be empty")
// cleanData(email) // cleanData(email)
//}) //})
})
} }