Files
authorizer/server/test/logout_test.go

84 lines
2.8 KiB
Go
Raw Normal View History

2021-12-24 06:27:39 +05:30
package test
import (
2022-01-09 17:35:37 +05:30
"fmt"
2022-06-11 19:10:39 +05:30
"strings"
2021-12-24 06:27:39 +05:30
"testing"
2022-01-09 17:35:37 +05:30
"github.com/authorizerdev/authorizer/server/constants"
2021-12-24 06:27:39 +05:30
"github.com/authorizerdev/authorizer/server/db"
"github.com/authorizerdev/authorizer/server/graph/model"
2022-05-27 23:20:38 +05:30
"github.com/authorizerdev/authorizer/server/memorystore"
2021-12-24 06:27:39 +05:30
"github.com/authorizerdev/authorizer/server/resolvers"
2022-06-12 00:27:21 +05:30
"github.com/authorizerdev/authorizer/server/token"
2021-12-24 06:27:39 +05:30
"github.com/stretchr/testify/assert"
)
2022-01-17 11:32:13 +05:30
func logoutTests(t *testing.T, s TestSetup) {
t.Helper()
2021-12-24 06:27:39 +05:30
t.Run(`should logout user`, func(t *testing.T) {
req, ctx := createContext(s)
email := "logout." + s.TestInfo.Email
magicLoginRes, err := resolvers.MagicLinkLoginResolver(ctx, model.MagicLinkLoginInput{
2021-12-24 06:27:39 +05:30
Email: email,
})
assert.NoError(t, err)
assert.NotNil(t, magicLoginRes)
2022-07-10 21:49:33 +05:30
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(ctx, email, constants.VerificationTypeMagicLinkLogin)
assert.NoError(t, err)
assert.NotNil(t, verificationRequest)
2022-01-17 11:32:13 +05:30
verifyRes, err := resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
2021-12-24 06:27:39 +05:30
Token: verificationRequest.Token,
})
assert.NoError(t, err)
assert.NotNil(t, verifyRes)
2022-06-12 00:27:21 +05:30
accessToken := *verifyRes.AccessToken
assert.NotEmpty(t, accessToken)
2023-12-14 22:12:03 +05:30
// Test logout with access token
req.Header.Set("Authorization", "Bearer "+accessToken)
logoutRes, err := resolvers.LogoutResolver(ctx)
assert.Nil(t, err)
assert.NotNil(t, logoutRes)
assert.NotEmpty(t, logoutRes.Message)
req.Header.Set("Authorization", "")
// Test logout with session cookie
magicLoginRes, err = resolvers.MagicLinkLoginResolver(ctx, model.MagicLinkLoginInput{
Email: email,
})
assert.NoError(t, err)
assert.NotNil(t, magicLoginRes)
verificationRequest, err = db.Provider.GetVerificationRequestByEmail(ctx, email, constants.VerificationTypeMagicLinkLogin)
assert.NoError(t, err)
assert.NotNil(t, verificationRequest)
verifyRes, err = resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
Token: verificationRequest.Token,
})
assert.NoError(t, err)
assert.NotNil(t, verifyRes)
accessToken = *verifyRes.AccessToken
assert.NotEmpty(t, accessToken)
2022-06-12 00:27:21 +05:30
claims, err := token.ParseJWTToken(accessToken)
assert.NoError(t, err)
assert.NotEmpty(t, claims)
loginMethod := claims["login_method"]
sessionKey := verifyRes.User.ID
if loginMethod != nil && loginMethod != "" {
sessionKey = loginMethod.(string) + ":" + verifyRes.User.ID
}
sessionToken, err := memorystore.Provider.GetUserSession(sessionKey, constants.TokenTypeSessionToken+"_"+claims["nonce"].(string))
2022-06-11 19:10:39 +05:30
assert.NoError(t, err)
2022-06-12 00:27:21 +05:30
assert.NotEmpty(t, sessionToken)
cookie := fmt.Sprintf("%s=%s;", constants.AppCookieName+"_session", sessionToken)
2022-06-11 19:10:39 +05:30
cookie = strings.TrimSuffix(cookie, ";")
req.Header.Set("Cookie", cookie)
2022-01-17 11:32:13 +05:30
_, err = resolvers.LogoutResolver(ctx)
2021-12-24 06:27:39 +05:30
assert.Nil(t, err)
cleanData(email)
})
}