
* fix: * removed hasReversedValue in playground * feat: * added totp methods in db's providers * adding totp in login method * feat: * added toggle in dashboard * fixing issue with env set * feat: * integrated totp * feat: * encrypted userid * added totp_verified column in user table * started test for totp * feat: * test cases totp * test-cases: * completed test cases * tested for all dbs * fixes: * return variable to snake case * import refactoring * feat: * created seperate folder for authenticator with totp subfolder * refactored code * created new table for authenticators * added recovery code for totp * feat: * adding functions to different db providers * feat: * added authenticators method for all db * feat: * added logic for updating mfa in user_profile update * fix: * merge conflict * fix: * resolved mongodb, dynamodb and arangodb test case bug * added new condition for checking first time totp user or not * feat: * changes in all respective db with authenticator * fix: * PR suggested changes * fix(cassandra): list users * Update verify otp * fix totp login api --------- Co-authored-by: lemonScaletech <anand.panigrahi@scaletech.xyz>
68 lines
2.0 KiB
Go
68 lines
2.0 KiB
Go
package test
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/authorizerdev/authorizer/server/constants"
|
|
"github.com/authorizerdev/authorizer/server/db"
|
|
"github.com/authorizerdev/authorizer/server/db/models"
|
|
"github.com/authorizerdev/authorizer/server/graph/model"
|
|
"github.com/authorizerdev/authorizer/server/refs"
|
|
"github.com/authorizerdev/authorizer/server/utils"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func updateAllUsersTest(t *testing.T, s TestSetup) {
|
|
t.Helper()
|
|
t.Run("Should update all users", func(t *testing.T) {
|
|
_, ctx := createContext(s)
|
|
for i := 0; i < 10; i++ {
|
|
user := &models.User{
|
|
Email: refs.NewStringRef(fmt.Sprintf("update_all_user_%d_%s", i, s.TestInfo.Email)),
|
|
SignupMethods: constants.AuthRecipeMethodBasicAuth,
|
|
Roles: "user",
|
|
}
|
|
u, err := db.Provider.AddUser(ctx, user)
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, u)
|
|
}
|
|
|
|
err := db.Provider.UpdateUsers(ctx, map[string]interface{}{
|
|
"is_multi_factor_auth_enabled": true,
|
|
}, nil)
|
|
assert.NoError(t, err)
|
|
|
|
listUsers, err := db.Provider.ListUsers(ctx, &model.Pagination{
|
|
Limit: 20,
|
|
Offset: 0,
|
|
})
|
|
assert.NoError(t, err)
|
|
assert.Greater(t, len(listUsers.Users), 0)
|
|
for _, u := range listUsers.Users {
|
|
assert.True(t, refs.BoolValue(u.IsMultiFactorAuthEnabled))
|
|
}
|
|
// // update few users
|
|
updateIds := []string{listUsers.Users[0].ID, listUsers.Users[1].ID}
|
|
err = db.Provider.UpdateUsers(ctx, map[string]interface{}{
|
|
"is_multi_factor_auth_enabled": false,
|
|
}, updateIds)
|
|
assert.NoError(t, err)
|
|
listUsers, err = db.Provider.ListUsers(ctx, &model.Pagination{
|
|
Limit: 20,
|
|
Offset: 0,
|
|
})
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, listUsers)
|
|
assert.Greater(t, len(listUsers.Users), 0)
|
|
for _, u := range listUsers.Users {
|
|
if utils.StringSliceContains(updateIds, u.ID) {
|
|
assert.False(t, refs.BoolValue(u.IsMultiFactorAuthEnabled))
|
|
} else {
|
|
assert.True(t, refs.BoolValue(u.IsMultiFactorAuthEnabled))
|
|
}
|
|
cleanData(refs.StringValue(u.Email))
|
|
}
|
|
})
|
|
}
|