2021-12-23 10:31:52 +05:30
|
|
|
package test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
|
2022-01-17 11:32:13 +05:30
|
|
|
"github.com/authorizerdev/authorizer/server/constants"
|
2021-12-23 10:31:52 +05:30
|
|
|
"github.com/authorizerdev/authorizer/server/db"
|
|
|
|
"github.com/authorizerdev/authorizer/server/graph/model"
|
2023-10-22 02:33:36 +05:30
|
|
|
"github.com/authorizerdev/authorizer/server/refs"
|
2021-12-23 10:31:52 +05:30
|
|
|
"github.com/authorizerdev/authorizer/server/resolvers"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
)
|
|
|
|
|
2022-01-17 11:32:13 +05:30
|
|
|
func resetPasswordTest(t *testing.T, s TestSetup) {
|
|
|
|
t.Helper()
|
2021-12-24 06:27:39 +05:30
|
|
|
t.Run(`should reset password`, func(t *testing.T) {
|
|
|
|
email := "reset_password." + s.TestInfo.Email
|
|
|
|
_, ctx := createContext(s)
|
2022-01-17 11:32:13 +05:30
|
|
|
_, err := resolvers.SignupResolver(ctx, model.SignUpInput{
|
2023-10-22 02:33:36 +05:30
|
|
|
Email: refs.NewStringRef(email),
|
2021-12-24 06:27:39 +05:30
|
|
|
Password: s.TestInfo.Password,
|
|
|
|
ConfirmPassword: s.TestInfo.Password,
|
|
|
|
})
|
2023-03-29 07:06:33 +05:30
|
|
|
assert.NoError(t, err)
|
2022-01-17 11:32:13 +05:30
|
|
|
_, err = resolvers.ForgotPasswordResolver(ctx, model.ForgotPasswordInput{
|
2023-12-22 01:26:14 +05:30
|
|
|
Email: refs.NewStringRef(email),
|
2021-12-24 06:27:39 +05:30
|
|
|
})
|
|
|
|
assert.Nil(t, err, "no errors for forgot password")
|
2022-07-10 21:49:33 +05:30
|
|
|
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(ctx, email, constants.VerificationTypeForgotPassword)
|
2021-12-24 06:27:39 +05:30
|
|
|
assert.Nil(t, err, "should get forgot password request")
|
2023-03-29 07:06:33 +05:30
|
|
|
assert.NotNil(t, verificationRequest)
|
2022-01-17 11:32:13 +05:30
|
|
|
_, err = resolvers.ResetPasswordResolver(ctx, model.ResetPasswordInput{
|
2023-12-22 01:26:14 +05:30
|
|
|
Token: refs.NewStringRef(verificationRequest.Token),
|
2021-12-24 06:27:39 +05:30
|
|
|
Password: "test1",
|
|
|
|
ConfirmPassword: "test",
|
|
|
|
})
|
2023-11-16 11:25:57 +08:00
|
|
|
assert.NotNil(t, err, "passwords don't match")
|
2022-01-17 11:32:13 +05:30
|
|
|
_, err = resolvers.ResetPasswordResolver(ctx, model.ResetPasswordInput{
|
2023-12-22 01:26:14 +05:30
|
|
|
Token: refs.NewStringRef(verificationRequest.Token),
|
2021-12-24 06:27:39 +05:30
|
|
|
Password: "test1",
|
|
|
|
ConfirmPassword: "test1",
|
|
|
|
})
|
2022-03-17 15:35:07 +05:30
|
|
|
assert.NotNil(t, err, "invalid password")
|
|
|
|
_, err = resolvers.ResetPasswordResolver(ctx, model.ResetPasswordInput{
|
2023-12-22 01:26:14 +05:30
|
|
|
Token: refs.NewStringRef(verificationRequest.Token),
|
2022-03-17 15:35:07 +05:30
|
|
|
Password: "Test@1234",
|
|
|
|
ConfirmPassword: "Test@1234",
|
|
|
|
})
|
2021-12-24 06:27:39 +05:30
|
|
|
assert.Nil(t, err, "password changed successfully")
|
|
|
|
cleanData(email)
|
2021-12-23 10:31:52 +05:30
|
|
|
})
|
|
|
|
}
|