This commit is contained in:
@@ -2,8 +2,10 @@ package test_test
|
||||
|
||||
import (
|
||||
"context"
|
||||
"spend-sparrow/internal/auth_types"
|
||||
"spend-sparrow/internal/authentication"
|
||||
"spend-sparrow/internal/core"
|
||||
"spend-sparrow/internal/db"
|
||||
"spend-sparrow/internal/types"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
@@ -42,11 +44,11 @@ func TestUser(t *testing.T) {
|
||||
t.Parallel()
|
||||
d := setupDb(t)
|
||||
|
||||
underTest := db.NewAuthSqlite(d)
|
||||
underTest := authentication.NewDbSqlite(d)
|
||||
|
||||
verifiedAt := time.Date(2020, 1, 5, 13, 0, 0, 0, time.UTC)
|
||||
createAt := time.Date(2020, 1, 5, 12, 0, 0, 0, time.UTC)
|
||||
expected := types.NewUser(uuid.New(), "some@email.de", true, &verifiedAt, false, []byte("somePass"), []byte("someSalt"), createAt)
|
||||
expected := auth_types.NewUser(uuid.New(), "some@email.de", true, &verifiedAt, false, []byte("somePass"), []byte("someSalt"), createAt)
|
||||
|
||||
err := underTest.InsertUser(context.Background(), expected)
|
||||
require.NoError(t, err)
|
||||
@@ -63,38 +65,38 @@ func TestUser(t *testing.T) {
|
||||
t.Parallel()
|
||||
d := setupDb(t)
|
||||
|
||||
underTest := db.NewAuthSqlite(d)
|
||||
underTest := authentication.NewDbSqlite(d)
|
||||
|
||||
_, err := underTest.GetUserByEmail(context.Background(), "nonExistentEmail")
|
||||
assert.Equal(t, db.ErrNotFound, err)
|
||||
assert.Equal(t, core.ErrNotFound, err)
|
||||
})
|
||||
t.Run("should return ErrUserExist", func(t *testing.T) {
|
||||
t.Parallel()
|
||||
d := setupDb(t)
|
||||
|
||||
underTest := db.NewAuthSqlite(d)
|
||||
underTest := authentication.NewDbSqlite(d)
|
||||
|
||||
verifiedAt := time.Date(2020, 1, 5, 13, 0, 0, 0, time.UTC)
|
||||
createAt := time.Date(2020, 1, 5, 12, 0, 0, 0, time.UTC)
|
||||
user := types.NewUser(uuid.New(), "some@email.de", true, &verifiedAt, false, []byte("somePass"), []byte("someSalt"), createAt)
|
||||
user := auth_types.NewUser(uuid.New(), "some@email.de", true, &verifiedAt, false, []byte("somePass"), []byte("someSalt"), createAt)
|
||||
|
||||
err := underTest.InsertUser(context.Background(), user)
|
||||
require.NoError(t, err)
|
||||
|
||||
err = underTest.InsertUser(context.Background(), user)
|
||||
assert.Equal(t, db.ErrAlreadyExists, err)
|
||||
assert.Equal(t, core.ErrAlreadyExists, err)
|
||||
})
|
||||
t.Run("should return ErrInternal on missing NOT NULL fields", func(t *testing.T) {
|
||||
t.Parallel()
|
||||
d := setupDb(t)
|
||||
|
||||
underTest := db.NewAuthSqlite(d)
|
||||
underTest := authentication.NewDbSqlite(d)
|
||||
|
||||
createAt := time.Date(2020, 1, 5, 12, 0, 0, 0, time.UTC)
|
||||
user := types.NewUser(uuid.New(), "some@email.de", false, nil, false, []byte("somePass"), nil, createAt)
|
||||
user := auth_types.NewUser(uuid.New(), "some@email.de", false, nil, false, []byte("somePass"), nil, createAt)
|
||||
|
||||
err := underTest.InsertUser(context.Background(), user)
|
||||
assert.Equal(t, types.ErrInternal, err)
|
||||
assert.Equal(t, core.ErrInternal, err)
|
||||
})
|
||||
}
|
||||
|
||||
@@ -105,11 +107,11 @@ func TestToken(t *testing.T) {
|
||||
t.Parallel()
|
||||
d := setupDb(t)
|
||||
|
||||
underTest := db.NewAuthSqlite(d)
|
||||
underTest := authentication.NewDbSqlite(d)
|
||||
|
||||
createAt := time.Date(2020, 1, 5, 12, 0, 0, 0, time.UTC)
|
||||
expiresAt := createAt.Add(24 * time.Hour)
|
||||
expected := types.NewToken(uuid.New(), "sessionId", "token", types.TokenTypeCsrf, createAt, expiresAt)
|
||||
expected := auth_types.NewToken(uuid.New(), "sessionId", "token", auth_types.TokenTypeCsrf, createAt, expiresAt)
|
||||
|
||||
err := underTest.InsertToken(context.Background(), expected)
|
||||
require.NoError(t, err)
|
||||
@@ -121,25 +123,25 @@ func TestToken(t *testing.T) {
|
||||
expected.SessionId = ""
|
||||
actuals, err := underTest.GetTokensByUserIdAndType(context.Background(), expected.UserId, expected.Type)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, []*types.Token{expected}, actuals)
|
||||
assert.Equal(t, []*auth_types.Token{expected}, actuals)
|
||||
|
||||
expected.SessionId = "sessionId"
|
||||
expected.UserId = uuid.Nil
|
||||
actuals, err = underTest.GetTokensBySessionIdAndType(context.Background(), expected.SessionId, expected.Type)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, []*types.Token{expected}, actuals)
|
||||
assert.Equal(t, []*auth_types.Token{expected}, actuals)
|
||||
})
|
||||
t.Run("should insert and return multiple tokens", func(t *testing.T) {
|
||||
t.Parallel()
|
||||
d := setupDb(t)
|
||||
|
||||
underTest := db.NewAuthSqlite(d)
|
||||
underTest := authentication.NewDbSqlite(d)
|
||||
|
||||
createAt := time.Date(2020, 1, 5, 12, 0, 0, 0, time.UTC)
|
||||
expiresAt := createAt.Add(24 * time.Hour)
|
||||
userId := uuid.New()
|
||||
expected1 := types.NewToken(userId, "sessionId", "token1", types.TokenTypeCsrf, createAt, expiresAt)
|
||||
expected2 := types.NewToken(userId, "sessionId", "token2", types.TokenTypeCsrf, createAt, expiresAt)
|
||||
expected1 := auth_types.NewToken(userId, "sessionId", "token1", auth_types.TokenTypeCsrf, createAt, expiresAt)
|
||||
expected2 := auth_types.NewToken(userId, "sessionId", "token2", auth_types.TokenTypeCsrf, createAt, expiresAt)
|
||||
|
||||
err := underTest.InsertToken(context.Background(), expected1)
|
||||
require.NoError(t, err)
|
||||
@@ -150,7 +152,7 @@ func TestToken(t *testing.T) {
|
||||
expected2.UserId = uuid.Nil
|
||||
actuals, err := underTest.GetTokensBySessionIdAndType(context.Background(), expected1.SessionId, expected1.Type)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, []*types.Token{expected1, expected2}, actuals)
|
||||
assert.Equal(t, []*auth_types.Token{expected1, expected2}, actuals)
|
||||
|
||||
expected1.SessionId = ""
|
||||
expected2.SessionId = ""
|
||||
@@ -158,49 +160,49 @@ func TestToken(t *testing.T) {
|
||||
expected2.UserId = userId
|
||||
actuals, err = underTest.GetTokensByUserIdAndType(context.Background(), userId, expected1.Type)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, []*types.Token{expected1, expected2}, actuals)
|
||||
assert.Equal(t, []*auth_types.Token{expected1, expected2}, actuals)
|
||||
})
|
||||
t.Run("should return ErrNotFound", func(t *testing.T) {
|
||||
t.Parallel()
|
||||
d := setupDb(t)
|
||||
|
||||
underTest := db.NewAuthSqlite(d)
|
||||
underTest := authentication.NewDbSqlite(d)
|
||||
|
||||
_, err := underTest.GetToken(context.Background(), "nonExistent")
|
||||
assert.Equal(t, db.ErrNotFound, err)
|
||||
assert.Equal(t, core.ErrNotFound, err)
|
||||
|
||||
_, err = underTest.GetTokensByUserIdAndType(context.Background(), uuid.New(), types.TokenTypeEmailVerify)
|
||||
assert.Equal(t, db.ErrNotFound, err)
|
||||
_, err = underTest.GetTokensByUserIdAndType(context.Background(), uuid.New(), auth_types.TokenTypeEmailVerify)
|
||||
assert.Equal(t, core.ErrNotFound, err)
|
||||
|
||||
_, err = underTest.GetTokensBySessionIdAndType(context.Background(), "sessionId", types.TokenTypeEmailVerify)
|
||||
assert.Equal(t, db.ErrNotFound, err)
|
||||
_, err = underTest.GetTokensBySessionIdAndType(context.Background(), "sessionId", auth_types.TokenTypeEmailVerify)
|
||||
assert.Equal(t, core.ErrNotFound, err)
|
||||
})
|
||||
t.Run("should return ErrAlreadyExists", func(t *testing.T) {
|
||||
t.Parallel()
|
||||
d := setupDb(t)
|
||||
|
||||
underTest := db.NewAuthSqlite(d)
|
||||
underTest := authentication.NewDbSqlite(d)
|
||||
|
||||
verifiedAt := time.Date(2020, 1, 5, 13, 0, 0, 0, time.UTC)
|
||||
createAt := time.Date(2020, 1, 5, 12, 0, 0, 0, time.UTC)
|
||||
user := types.NewUser(uuid.New(), "some@email.de", true, &verifiedAt, false, []byte("somePass"), []byte("someSalt"), createAt)
|
||||
user := auth_types.NewUser(uuid.New(), "some@email.de", true, &verifiedAt, false, []byte("somePass"), []byte("someSalt"), createAt)
|
||||
|
||||
err := underTest.InsertUser(context.Background(), user)
|
||||
require.NoError(t, err)
|
||||
|
||||
err = underTest.InsertUser(context.Background(), user)
|
||||
assert.Equal(t, db.ErrAlreadyExists, err)
|
||||
assert.Equal(t, core.ErrAlreadyExists, err)
|
||||
})
|
||||
t.Run("should return ErrInternal on missing NOT NULL fields", func(t *testing.T) {
|
||||
t.Parallel()
|
||||
d := setupDb(t)
|
||||
|
||||
underTest := db.NewAuthSqlite(d)
|
||||
underTest := authentication.NewDbSqlite(d)
|
||||
|
||||
createAt := time.Date(2020, 1, 5, 12, 0, 0, 0, time.UTC)
|
||||
user := types.NewUser(uuid.New(), "some@email.de", false, nil, false, []byte("somePass"), nil, createAt)
|
||||
user := auth_types.NewUser(uuid.New(), "some@email.de", false, nil, false, []byte("somePass"), nil, createAt)
|
||||
|
||||
err := underTest.InsertUser(context.Background(), user)
|
||||
assert.Equal(t, types.ErrInternal, err)
|
||||
assert.Equal(t, core.ErrInternal, err)
|
||||
})
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user