summaryrefslogtreecommitdiff
path: root/src/user/handlers/login/test.rs
blob: b8f24f68c74e12f7ba137960f75fc8a0bc767e5d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
use axum::extract::{Json, State};

use crate::{test::fixtures, token::app};

#[tokio::test]
async fn correct_credentials() {
    // Set up the environment

    let app = fixtures::scratch_app().await;
    let (name, password) = fixtures::user::create_with_password(&app, &fixtures::now()).await;

    // Call the endpoint

    let identity = fixtures::cookie::not_logged_in();
    let logged_in_at = fixtures::now();
    let request = super::Request {
        name: name.clone(),
        password,
    };
    let (identity, Json(response)) =
        super::handler(State(app.clone()), logged_in_at, identity, Json(request))
            .await
            .expect("logged in with valid credentials");

    // Verify the return value's basic structure

    assert_eq!(name, response.name);
    let secret = identity
        .secret()
        .expect("logged in with valid credentials issues an identity cookie");

    // Verify the semantics

    let validated_at = fixtures::now();
    let (_, validated_login) = app
        .tokens()
        .validate(&secret, &validated_at)
        .await
        .expect("identity secret is valid");

    assert_eq!(response, validated_login);
}

#[tokio::test]
async fn invalid_name() {
    // Set up the environment

    let app = fixtures::scratch_app().await;

    // Call the endpoint

    let identity = fixtures::cookie::not_logged_in();
    let logged_in_at = fixtures::now();
    let (name, password) = fixtures::user::propose();
    let request = super::Request {
        name: name.clone(),
        password,
    };
    let super::Error(error) =
        super::handler(State(app.clone()), logged_in_at, identity, Json(request))
            .await
            .expect_err("logged in with an incorrect password fails");

    // Verify the return value's basic structure

    assert!(matches!(error, app::LoginError::Rejected));
}

#[tokio::test]
async fn incorrect_password() {
    // Set up the environment

    let app = fixtures::scratch_app().await;
    let login = fixtures::user::create(&app, &fixtures::now()).await;

    // Call the endpoint

    let logged_in_at = fixtures::now();
    let identity = fixtures::cookie::not_logged_in();
    let request = super::Request {
        name: login.name,
        password: fixtures::user::propose_password(),
    };
    let super::Error(error) =
        super::handler(State(app.clone()), logged_in_at, identity, Json(request))
            .await
            .expect_err("logged in with an incorrect password");

    // Verify the return value's basic structure

    assert!(matches!(error, app::LoginError::Rejected));
}

#[tokio::test]
async fn token_expires() {
    // Set up the environment

    let app = fixtures::scratch_app().await;
    let (name, password) = fixtures::user::create_with_password(&app, &fixtures::now()).await;

    // Call the endpoint

    let logged_in_at = fixtures::ancient();
    let identity = fixtures::cookie::not_logged_in();
    let request = super::Request { name, password };
    let (identity, _) = super::handler(State(app.clone()), logged_in_at, identity, Json(request))
        .await
        .expect("logged in with valid credentials");
    let secret = identity.secret().expect("logged in with valid credentials");

    // Verify the semantics

    let expired_at = fixtures::now();
    app.tokens()
        .expire(&expired_at)
        .await
        .expect("expiring tokens never fails");

    let verified_at = fixtures::now();
    let error = app
        .tokens()
        .validate(&secret, &verified_at)
        .await
        .expect_err("validating an expired token");

    assert!(matches!(error, app::ValidateError::InvalidToken));
}