chore(auth): #331 add sign up verify tests #350
@@ -171,11 +171,17 @@ func (handler AuthImpl) handleSignUpVerifyResponsePage() http.HandlerFunc {
|
|||||||
|
|
||||||
err := handler.service.VerifyUserEmail(token)
|
err := handler.service.VerifyUserEmail(token)
|
||||||
|
|
||||||
if err != nil {
|
isVerified := err == nil
|
||||||
utils.DoRedirect(w, r, "/auth/signin")
|
comp := auth.VerifyResponseComp(isVerified)
|
||||||
|
|
||||||
|
var status int
|
||||||
|
if isVerified {
|
||||||
|
status = http.StatusOK
|
||||||
} else {
|
} else {
|
||||||
utils.DoRedirect(w, r, "/")
|
status = http.StatusBadRequest
|
||||||
}
|
}
|
||||||
|
|
||||||
|
handler.render.RenderLayoutWithStatus(r, w, comp, nil, status)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -21,8 +21,9 @@ func NewRender(settings *types.Settings) *Render {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (render *Render) Render(r *http.Request, w http.ResponseWriter, comp templ.Component) {
|
func (render *Render) RenderWithStatus(r *http.Request, w http.ResponseWriter, comp templ.Component, status int) {
|
||||||
w.Header().Set("Content-Type", "text/html")
|
w.Header().Set("Content-Type", "text/html")
|
||||||
|
w.WriteHeader(status)
|
||||||
err := comp.Render(r.Context(), w)
|
err := comp.Render(r.Context(), w)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error("Failed to render layout: %v", err)
|
log.Error("Failed to render layout: %v", err)
|
||||||
@@ -30,11 +31,19 @@ func (render *Render) Render(r *http.Request, w http.ResponseWriter, comp templ.
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (render *Render) Render(r *http.Request, w http.ResponseWriter, comp templ.Component) {
|
||||||
|
render.RenderWithStatus(r, w, comp, http.StatusOK)
|
||||||
|
}
|
||||||
|
|
||||||
func (render *Render) RenderLayout(r *http.Request, w http.ResponseWriter, slot templ.Component, user *types.User) {
|
func (render *Render) RenderLayout(r *http.Request, w http.ResponseWriter, slot templ.Component, user *types.User) {
|
||||||
|
render.RenderLayoutWithStatus(r, w, slot, user, http.StatusOK)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (render *Render) RenderLayoutWithStatus(r *http.Request, w http.ResponseWriter, slot templ.Component, user *types.User, status int) {
|
||||||
userComp := render.getUserComp(user)
|
userComp := render.getUserComp(user)
|
||||||
layout := template.Layout(slot, userComp, render.settings.Environment)
|
layout := template.Layout(slot, userComp, render.settings.Environment)
|
||||||
|
|
||||||
render.Render(r, w, layout)
|
render.RenderWithStatus(r, w, layout, status)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (render *Render) getUserComp(user *types.User) templ.Component {
|
func (render *Render) getUserComp(user *types.User) templ.Component {
|
||||||
|
|||||||
88
main_test.go
88
main_test.go
@@ -618,6 +618,94 @@ func TestIntegrationAuth(t *testing.T) {
|
|||||||
err = db.QueryRow("SELECT COUNT(*) FROM user WHERE email = ? AND email_verified = FALSE", "mail@mail.de").Scan(&rows)
|
err = db.QueryRow("SELECT COUNT(*) FROM user WHERE email = ? AND email_verified = FALSE", "mail@mail.de").Scan(&rows)
|
||||||
assert.Nil(t, err)
|
assert.Nil(t, err)
|
||||||
assert.Equal(t, 1, rows)
|
assert.Equal(t, 1, rows)
|
||||||
|
var token string
|
||||||
|
err = db.QueryRow("SELECT t.token FROM token t INNER JOIN user u ON u.user_id = t.user_id WHERE u.email = ? AND t.type = ?", "mail@mail.de", types.TokenTypeEmailVerify).Scan(&token)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
assert.NotEqual(t, "", token)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
t.Run("SignUpVerification", func(t *testing.T) {
|
||||||
|
t.Run(`should fail verifying email with non existent token`, func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
db, basePath, ctx := setupIntegrationTest(t)
|
||||||
|
|
||||||
|
userId := uuid.New()
|
||||||
|
|
||||||
|
_, err := db.Exec(`
|
||||||
|
INSERT INTO user (user_id, email, email_verified, is_admin, password, salt, created_at)
|
||||||
|
VALUES (?, "mail@mail.de", FALSE, FALSE, ?, ?, datetime())`, userId, []byte("pass"), []byte("salt"))
|
||||||
|
assert.Nil(t, err)
|
||||||
|
|
||||||
|
req, err := http.NewRequestWithContext(ctx, "GET", basePath+"/auth/verify-email?token=invalid-token", nil)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
resp, err := httpClient.Do(req)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
|
||||||
|
assert.Equal(t, http.StatusBadRequest, resp.StatusCode)
|
||||||
|
|
||||||
|
var rows int
|
||||||
|
err = db.QueryRow("SELECT COUNT(*) FROM user WHERE user_id = ? AND email_verified = FALSE", userId).Scan(&rows)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
assert.Equal(t, 1, rows)
|
||||||
|
})
|
||||||
|
t.Run(`should fail verifying email with outdated token`, func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
db, basePath, ctx := setupIntegrationTest(t)
|
||||||
|
|
||||||
|
userId := uuid.New()
|
||||||
|
token := "my-outdated-verifying-token"
|
||||||
|
|
||||||
|
_, err := db.Exec(`
|
||||||
|
INSERT INTO user (user_id, email, email_verified, is_admin, password, salt, created_at)
|
||||||
|
VALUES (?, "mail@mail.de", FALSE, FALSE, ?, ?, datetime())`, userId, []byte("pass"), []byte("salt"))
|
||||||
|
assert.Nil(t, err)
|
||||||
|
_, err = db.Exec(`
|
||||||
|
INSERT INTO token (token, user_id, type, created_at, expires_at)
|
||||||
|
VALUES (?, ?, ?, datetime("now", "-16 minute"), datetime("now", "-1 minute"))`, token, userId, types.TokenTypeEmailVerify)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
|
||||||
|
req, err := http.NewRequestWithContext(ctx, "GET", basePath+"/auth/verify-email?token="+token, nil)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
resp, err := httpClient.Do(req)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
|
||||||
|
assert.Equal(t, http.StatusBadRequest, resp.StatusCode)
|
||||||
|
|
||||||
|
var rows int
|
||||||
|
err = db.QueryRow("SELECT COUNT(*) FROM user WHERE user_id = ? AND email_verified = FALSE", userId).Scan(&rows)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
assert.Equal(t, 1, rows)
|
||||||
|
})
|
||||||
|
t.Run(`should verify email with correct token`, func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
db, basePath, ctx := setupIntegrationTest(t)
|
||||||
|
|
||||||
|
userId := uuid.New()
|
||||||
|
token := "my-verifying-token"
|
||||||
|
|
||||||
|
_, err := db.Exec(`
|
||||||
|
INSERT INTO user (user_id, email, email_verified, is_admin, password, salt, created_at)
|
||||||
|
VALUES (?, "mail@mail.de", FALSE, FALSE, ?, ?, datetime())`, userId, []byte("pass"), []byte("salt"))
|
||||||
|
assert.Nil(t, err)
|
||||||
|
_, err = db.Exec(`
|
||||||
|
INSERT INTO token (token, user_id, session_id, type, created_at, expires_at)
|
||||||
|
VALUES (?, ?, "", ?, datetime("now"), datetime("now", "+15 minute"))`, token, userId, types.TokenTypeEmailVerify)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
|
||||||
|
req, err := http.NewRequestWithContext(ctx, "GET", basePath+"/auth/verify-email?token="+token, nil)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
resp, err := httpClient.Do(req)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
|
||||||
|
assert.Equal(t, http.StatusOK, resp.StatusCode)
|
||||||
|
|
||||||
|
var rows int
|
||||||
|
err = db.QueryRow("SELECT COUNT(*) FROM user WHERE user_id = ? AND email_verified = TRUE", userId).Scan(&rows)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
assert.Equal(t, 1, rows)
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
t.Run("SignOut", func(t *testing.T) {
|
t.Run("SignOut", func(t *testing.T) {
|
||||||
|
|||||||
29
template/auth/verify_response.templ
Normal file
29
template/auth/verify_response.templ
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
package auth
|
||||||
|
|
||||||
|
templ VerifyResponseComp(isVerified bool) {
|
||||||
|
<main>
|
||||||
|
<div class="flex flex-col items-center justify-center h-screen">
|
||||||
|
if isVerified {
|
||||||
|
<h2 class="text-6xl mb-10">
|
||||||
|
Your email has been verified
|
||||||
|
</h2>
|
||||||
|
<p class="text-lg text-center">
|
||||||
|
You have completed the verification process. Thank you!
|
||||||
|
</p>
|
||||||
|
<a class="btn btn-primary mt-8" href="/">
|
||||||
|
Go Home
|
||||||
|
</a>
|
||||||
|
} else {
|
||||||
|
<h2 class="text-6xl mb-10">
|
||||||
|
Error during verification
|
||||||
|
</h2>
|
||||||
|
<p class="text-lg text-center">
|
||||||
|
Please try again by sign up process
|
||||||
|
</p>
|
||||||
|
<a class="btn btn-primary mt-8" href="/auth/signup">
|
||||||
|
Sign Up
|
||||||
|
</a>
|
||||||
|
}
|
||||||
|
</div>
|
||||||
|
</main>
|
||||||
|
}
|
||||||
@@ -3,17 +3,21 @@ package mail;
|
|||||||
import "net/url"
|
import "net/url"
|
||||||
|
|
||||||
templ Register(baseUrl string, token string) {
|
templ Register(baseUrl string, token string) {
|
||||||
<!DOCTYPE html>
|
<!DOCTYPE html>
|
||||||
<html lang="en">
|
<html lang="en">
|
||||||
<head>
|
|
||||||
<meta charset="UTF-8"/>
|
<head>
|
||||||
<meta name="viewport" content="width=device-width, initial-scale=1.0"/>
|
<meta charset="UTF-8" />
|
||||||
|
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||||||
<title>Welcome</title>
|
<title>Welcome</title>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
|
||||||
|
<body>
|
||||||
<h4>Thank you for Sign Up!</h4>
|
<h4>Thank you for Sign Up!</h4>
|
||||||
<p>Click <a href={ templ.URL(baseUrl + "/auth/verify-email?token=" + url.QueryEscape(token)) }>here</a> to verify your account.</p>
|
<p>Click <a href={ templ.URL(baseUrl + "/auth/verify-email?token=" + url.QueryEscape(token)) }>here</a> to finalize
|
||||||
|
your registration.</p>
|
||||||
<p>Kind regards</p>
|
<p>Kind regards</p>
|
||||||
</body>
|
</body>
|
||||||
</html>
|
|
||||||
|
</html>
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user