authorizer/server/test/session_test.go
2022-06-11 19:10:39 +05:30

51 lines
1.5 KiB
Go

package test
import (
"fmt"
"strings"
"testing"
"github.com/authorizerdev/authorizer/server/constants"
"github.com/authorizerdev/authorizer/server/db"
"github.com/authorizerdev/authorizer/server/graph/model"
"github.com/authorizerdev/authorizer/server/memorystore"
"github.com/authorizerdev/authorizer/server/resolvers"
"github.com/stretchr/testify/assert"
)
func sessionTests(t *testing.T, s TestSetup) {
t.Helper()
t.Run(`should allow access to profile with session only`, func(t *testing.T) {
req, ctx := createContext(s)
email := "session." + s.TestInfo.Email
resolvers.SignupResolver(ctx, model.SignUpInput{
Email: email,
Password: s.TestInfo.Password,
ConfirmPassword: s.TestInfo.Password,
})
_, err := resolvers.SessionResolver(ctx, &model.SessionQueryInput{})
assert.NotNil(t, err, "unauthorized")
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(email, constants.VerificationTypeBasicAuthSignup)
verifyRes, err := resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
Token: verificationRequest.Token,
})
token := *verifyRes.AccessToken
session, err := memorystore.Provider.GetUserSession(verifyRes.User.ID, token)
assert.NoError(t, err)
assert.NotEmpty(t, session)
cookie := fmt.Sprintf("%s=%s;", constants.AppCookieName+"_session", session)
cookie = strings.TrimSuffix(cookie, ";")
req.Header.Set("Cookie", cookie)
_, err = resolvers.SessionResolver(ctx, &model.SessionQueryInput{})
assert.Nil(t, err)
cleanData(email)
})
}