
* fix: * removed hasReversedValue in playground * feat: * added totp methods in db's providers * adding totp in login method * feat: * added toggle in dashboard * fixing issue with env set * feat: * integrated totp * feat: * encrypted userid * added totp_verified column in user table * started test for totp * feat: * test cases totp * test-cases: * completed test cases * tested for all dbs * fixes: * return variable to snake case * import refactoring * feat: * created seperate folder for authenticator with totp subfolder * refactored code * created new table for authenticators * added recovery code for totp * feat: * adding functions to different db providers * feat: * added authenticators method for all db * feat: * added logic for updating mfa in user_profile update * fix: * merge conflict * fix: * resolved mongodb, dynamodb and arangodb test case bug * added new condition for checking first time totp user or not * feat: * changes in all respective db with authenticator * fix: * PR suggested changes * fix(cassandra): list users * Update verify otp * fix totp login api --------- Co-authored-by: lemonScaletech <anand.panigrahi@scaletech.xyz>
119 lines
4.0 KiB
Go
119 lines
4.0 KiB
Go
package test
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/authorizerdev/authorizer/server/constants"
|
|
"github.com/authorizerdev/authorizer/server/db"
|
|
"github.com/authorizerdev/authorizer/server/graph/model"
|
|
"github.com/authorizerdev/authorizer/server/memorystore"
|
|
"github.com/authorizerdev/authorizer/server/refs"
|
|
"github.com/authorizerdev/authorizer/server/resolvers"
|
|
"github.com/google/uuid"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func resendOTPTest(t *testing.T, s TestSetup) {
|
|
t.Helper()
|
|
t.Run(`should resend otp`, func(t *testing.T) {
|
|
req, ctx := createContext(s)
|
|
email := "resend_otp." + s.TestInfo.Email
|
|
res, err := resolvers.SignupResolver(ctx, model.SignUpInput{
|
|
Email: refs.NewStringRef(email),
|
|
Password: s.TestInfo.Password,
|
|
ConfirmPassword: s.TestInfo.Password,
|
|
})
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, res)
|
|
|
|
// Login should fail as email is not verified
|
|
loginRes, err := resolvers.LoginResolver(ctx, model.LoginInput{
|
|
Email: refs.NewStringRef(email),
|
|
Password: s.TestInfo.Password,
|
|
})
|
|
assert.Error(t, err)
|
|
assert.Nil(t, loginRes)
|
|
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(ctx, email, constants.VerificationTypeBasicAuthSignup)
|
|
assert.Nil(t, err)
|
|
assert.Equal(t, email, verificationRequest.Email)
|
|
verifyRes, err := resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
|
|
Token: verificationRequest.Token,
|
|
})
|
|
assert.Nil(t, err)
|
|
assert.NotEqual(t, verifyRes.AccessToken, "", "access token should not be empty")
|
|
|
|
// Using access token update profile
|
|
s.GinContext.Request.Header.Set("Authorization", "Bearer "+refs.StringValue(verifyRes.AccessToken))
|
|
ctx = context.WithValue(req.Context(), "GinContextKey", s.GinContext)
|
|
updateRes, err := resolvers.UpdateProfileResolver(ctx, model.UpdateProfileInput{
|
|
IsMultiFactorAuthEnabled: refs.NewBoolRef(true),
|
|
})
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, updateRes)
|
|
memorystore.Provider.UpdateEnvVariable(constants.EnvKeyDisableMailOTPLogin, false)
|
|
memorystore.Provider.UpdateEnvVariable(constants.EnvKeyDisableTOTPLogin, true)
|
|
|
|
// Resend otp should return error as no initial opt is being sent
|
|
resendOtpRes, err := resolvers.ResendOTPResolver(ctx, model.ResendOTPRequest{
|
|
Email: refs.NewStringRef(email),
|
|
})
|
|
assert.Error(t, err)
|
|
assert.Nil(t, resendOtpRes)
|
|
|
|
// Login should not return error but access token should be empty as otp should have been sent
|
|
loginRes, err = resolvers.LoginResolver(ctx, model.LoginInput{
|
|
Email: refs.NewStringRef(email),
|
|
Password: s.TestInfo.Password,
|
|
})
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, loginRes)
|
|
assert.Nil(t, loginRes.AccessToken)
|
|
|
|
// Get otp from db
|
|
otp, err := db.Provider.GetOTPByEmail(ctx, email)
|
|
assert.NoError(t, err)
|
|
assert.NotEmpty(t, otp.Otp)
|
|
|
|
// resend otp
|
|
resendOtpRes, err = resolvers.ResendOTPResolver(ctx, model.ResendOTPRequest{
|
|
Email: refs.NewStringRef(email),
|
|
})
|
|
assert.NoError(t, err)
|
|
assert.NotEmpty(t, resendOtpRes.Message)
|
|
|
|
newOtp, err := db.Provider.GetOTPByEmail(ctx, email)
|
|
assert.NoError(t, err)
|
|
assert.NotEmpty(t, newOtp.Otp)
|
|
assert.NotEqual(t, otp.Otp, newOtp)
|
|
|
|
// Should return error for older otp
|
|
verifyOtpRes, err := resolvers.VerifyOtpResolver(ctx, model.VerifyOTPRequest{
|
|
Email: &email,
|
|
Otp: otp.Otp,
|
|
})
|
|
assert.Error(t, err)
|
|
assert.Nil(t, verifyOtpRes)
|
|
// Get user by email
|
|
user, err := db.Provider.GetUserByEmail(ctx, email)
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, user)
|
|
// Set mfa cookie session
|
|
mfaSession := uuid.NewString()
|
|
memorystore.Provider.SetMfaSession(user.ID, mfaSession, time.Now().Add(1*time.Minute).Unix())
|
|
cookie := fmt.Sprintf("%s=%s;", constants.MfaCookieName+"_session", mfaSession)
|
|
cookie = strings.TrimSuffix(cookie, ";")
|
|
req.Header.Set("Cookie", cookie)
|
|
verifyOtpRes, err = resolvers.VerifyOtpResolver(ctx, model.VerifyOTPRequest{
|
|
Email: &email,
|
|
Otp: newOtp.Otp,
|
|
})
|
|
assert.NoError(t, err)
|
|
assert.NotEqual(t, verifyOtpRes.AccessToken, "", "access token should not be empty")
|
|
cleanData(email)
|
|
})
|
|
}
|