package test import ( "fmt" "net/url" "testing" "github.com/authorizerdev/authorizer/server/constants" "github.com/authorizerdev/authorizer/server/db" "github.com/authorizerdev/authorizer/server/envstore" "github.com/authorizerdev/authorizer/server/graph/model" "github.com/authorizerdev/authorizer/server/resolvers" "github.com/authorizerdev/authorizer/server/sessionstore" "github.com/authorizerdev/authorizer/server/utils" "github.com/stretchr/testify/assert" ) func sessionTests(t *testing.T, s TestSetup) { t.Helper() t.Run(`should allow access to profile with session only`, func(t *testing.T) { req, ctx := createContext(s) email := "session." + s.TestInfo.Email resolvers.SignupResolver(ctx, model.SignUpInput{ Email: email, Password: s.TestInfo.Password, ConfirmPassword: s.TestInfo.Password, }) _, err := resolvers.SessionResolver(ctx, &model.SessionQueryInput{}) assert.NotNil(t, err, "unauthorized") verificationRequest, err := db.Provider.GetVerificationRequestByEmail(email, constants.VerificationTypeBasicAuthSignup) verifyRes, err := resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{ Token: verificationRequest.Token, }) sessions := sessionstore.GetUserSessions(verifyRes.User.ID) fingerPrint := "" refreshToken := "" for key, val := range sessions { fingerPrint = key refreshToken = val } fingerPrintHash, _ := utils.EncryptAES([]byte(fingerPrint)) token := *verifyRes.AccessToken cookie := fmt.Sprintf("%s=%s;%s=%s;%s=%s", envstore.EnvStoreObj.GetStringStoreEnvVariable(constants.EnvKeyCookieName)+".fingerprint", url.QueryEscape(string(fingerPrintHash)), envstore.EnvStoreObj.GetStringStoreEnvVariable(constants.EnvKeyCookieName)+".refresh_token", refreshToken, envstore.EnvStoreObj.GetStringStoreEnvVariable(constants.EnvKeyCookieName)+".access_token", token) req.Header.Set("Cookie", cookie) _, err = resolvers.SessionResolver(ctx, &model.SessionQueryInput{}) assert.Nil(t, err) cleanData(email) }) }