feat: persist encrypted env
This commit is contained in:
@@ -24,7 +24,7 @@ func deleteUserTest(s TestSetup, t *testing.T) {
|
||||
})
|
||||
assert.NotNil(t, err, "unauthorized")
|
||||
|
||||
req.Header.Add("x-authorizer-admin-secret", constants.ADMIN_SECRET)
|
||||
req.Header.Add("x-authorizer-admin-secret", constants.EnvData.ADMIN_SECRET)
|
||||
_, err = resolvers.DeleteUser(ctx, model.DeleteUserInput{
|
||||
Email: email,
|
||||
})
|
||||
|
@@ -8,18 +8,18 @@ import (
|
||||
)
|
||||
|
||||
func TestEnvs(t *testing.T) {
|
||||
constants.ENV_PATH = "../../.env.sample"
|
||||
constants.EnvData.ENV_PATH = "../../.env.sample"
|
||||
|
||||
assert.Equal(t, constants.ADMIN_SECRET, "admin")
|
||||
assert.Equal(t, constants.ENV, "production")
|
||||
assert.False(t, constants.DISABLE_EMAIL_VERIFICATION)
|
||||
assert.False(t, constants.DISABLE_MAGIC_LINK_LOGIN)
|
||||
assert.False(t, constants.DISABLE_BASIC_AUTHENTICATION)
|
||||
assert.Equal(t, constants.JWT_TYPE, "HS256")
|
||||
assert.Equal(t, constants.JWT_SECRET, "random_string")
|
||||
assert.Equal(t, constants.JWT_ROLE_CLAIM, "role")
|
||||
assert.EqualValues(t, constants.ROLES, []string{"user"})
|
||||
assert.EqualValues(t, constants.DEFAULT_ROLES, []string{"user"})
|
||||
assert.EqualValues(t, constants.PROTECTED_ROLES, []string{"admin"})
|
||||
assert.EqualValues(t, constants.ALLOWED_ORIGINS, []string{"*"})
|
||||
assert.Equal(t, constants.EnvData.ADMIN_SECRET, "admin")
|
||||
assert.Equal(t, constants.EnvData.ENV, "production")
|
||||
assert.False(t, constants.EnvData.DISABLE_EMAIL_VERIFICATION)
|
||||
assert.False(t, constants.EnvData.DISABLE_MAGIC_LINK_LOGIN)
|
||||
assert.False(t, constants.EnvData.DISABLE_BASIC_AUTHENTICATION)
|
||||
assert.Equal(t, constants.EnvData.JWT_TYPE, "HS256")
|
||||
assert.Equal(t, constants.EnvData.JWT_SECRET, "random_string")
|
||||
assert.Equal(t, constants.EnvData.JWT_ROLE_CLAIM, "role")
|
||||
assert.EqualValues(t, constants.EnvData.ROLES, []string{"user"})
|
||||
assert.EqualValues(t, constants.EnvData.DEFAULT_ROLES, []string{"user"})
|
||||
assert.EqualValues(t, constants.EnvData.PROTECTED_ROLES, []string{"admin"})
|
||||
assert.EqualValues(t, constants.EnvData.ALLOWED_ORIGINS, []string{"*"})
|
||||
}
|
||||
|
@@ -16,8 +16,8 @@ func TestResolvers(t *testing.T) {
|
||||
}
|
||||
|
||||
for dbType, dbURL := range databases {
|
||||
constants.DATABASE_URL = dbURL
|
||||
constants.DATABASE_TYPE = dbType
|
||||
constants.EnvData.DATABASE_URL = dbURL
|
||||
constants.EnvData.DATABASE_TYPE = dbType
|
||||
db.InitDB()
|
||||
|
||||
s := testSetup()
|
||||
|
@@ -70,7 +70,7 @@ func testSetup() TestSetup {
|
||||
Password: "test",
|
||||
}
|
||||
|
||||
constants.ENV_PATH = "../../.env.sample"
|
||||
constants.EnvData.ENV_PATH = "../../.env.sample"
|
||||
env.InitEnv()
|
||||
session.InitSession()
|
||||
|
||||
|
@@ -29,7 +29,7 @@ func updateUserTest(s TestSetup, t *testing.T) {
|
||||
})
|
||||
assert.NotNil(t, err, "unauthorized")
|
||||
|
||||
req.Header.Add("x-authorizer-admin-secret", constants.ADMIN_SECRET)
|
||||
req.Header.Add("x-authorizer-admin-secret", constants.EnvData.ADMIN_SECRET)
|
||||
_, err = resolvers.UpdateUser(ctx, model.UpdateUserInput{
|
||||
ID: user.ID,
|
||||
Roles: newRoles,
|
||||
|
@@ -22,7 +22,7 @@ func usersTest(s TestSetup, t *testing.T) {
|
||||
users, err := resolvers.Users(ctx)
|
||||
assert.NotNil(t, err, "unauthorized")
|
||||
|
||||
req.Header.Add("x-authorizer-admin-secret", constants.ADMIN_SECRET)
|
||||
req.Header.Add("x-authorizer-admin-secret", constants.EnvData.ADMIN_SECRET)
|
||||
users, err = resolvers.Users(ctx)
|
||||
assert.Nil(t, err)
|
||||
rLen := len(users)
|
||||
|
@@ -22,7 +22,7 @@ func TestIsValidEmail(t *testing.T) {
|
||||
func TestIsValidOrigin(t *testing.T) {
|
||||
// don't use portocal(http/https) for ALLOWED_ORIGINS while testing,
|
||||
// as we trim them off while running the main function
|
||||
constants.ALLOWED_ORIGINS = []string{"localhost:8080", "*.google.com", "*.google.in", "*abc.*"}
|
||||
constants.EnvData.ALLOWED_ORIGINS = []string{"localhost:8080", "*.google.com", "*.google.in", "*abc.*"}
|
||||
|
||||
assert.False(t, utils.IsValidOrigin("http://myapp.com"), "it should be invalid origin")
|
||||
assert.False(t, utils.IsValidOrigin("http://appgoogle.com"), "it should be invalid origin")
|
||||
|
@@ -23,7 +23,7 @@ func verificationRequestsTest(s TestSetup, t *testing.T) {
|
||||
requests, err := resolvers.VerificationRequests(ctx)
|
||||
assert.NotNil(t, err, "unauthorizer")
|
||||
|
||||
req.Header.Add("x-authorizer-admin-secret", constants.ADMIN_SECRET)
|
||||
req.Header.Add("x-authorizer-admin-secret", constants.EnvData.ADMIN_SECRET)
|
||||
requests, err = resolvers.VerificationRequests(ctx)
|
||||
|
||||
assert.Nil(t, err)
|
||||
|
Reference in New Issue
Block a user