Edit

kmx.io/kmxgit/test/kmxgit

Branch :

  • user_manager_test.exs
  • defmodule Kmxgit.UserManagerTest do
      use Kmxgit.DataCase
    
      alias Kmxgit.UserManager
    
      import Kmxgit.UserManagerFixtures
      alias Kmxgit.UserManager.{User, UserToken}
    
      describe "get_user_by_email/1" do
        test "does not return the user if the email does not exist" do
          refute UserManager.get_user_by_email("unknown@example.com")
        end
    
        test "returns the user if the email exists" do
          %{id: id} = user = user_fixture()
          assert %User{id: ^id} = UserManager.get_user_by_email(user.email)
        end
      end
    
      describe "get_user_by_email_and_password/2" do
        test "does not return the user if the email does not exist" do
          refute UserManager.get_user_by_email_and_password("unknown@example.com", "hello world!")
        end
    
        test "does not return the user if the password is not valid" do
          user = user_fixture()
          refute UserManager.get_user_by_email_and_password(user.email, "invalid")
        end
    
        test "returns the user if the email and password are valid" do
          %{id: id} = user = user_fixture()
    
          assert %User{id: ^id} =
                   UserManager.get_user_by_email_and_password(user.email, valid_user_password())
        end
      end
    
      describe "get_user!/1" do
        test "raises if id is invalid" do
          assert_raise Ecto.NoResultsError, fn ->
            UserManager.get_user!(-1)
          end
        end
    
        test "returns the user with the given id" do
          %{id: id} = user = user_fixture()
          assert %User{id: ^id} = UserManager.get_user!(user.id)
        end
      end
    
      describe "register_user/1" do
        test "requires email and password to be set" do
          {:error, changeset} = UserManager.register_user(%{})
    
          assert %{
                   password: ["can't be blank"],
                   email: ["can't be blank"]
                 } = errors_on(changeset)
        end
    
        test "validates email and password when given" do
          {:error, changeset} = UserManager.register_user(%{email: "not valid", password: "not valid"})
    
          assert %{
                   email: ["must have the @ sign and no spaces"],
                   password: ["should be at least 12 character(s)"]
                 } = errors_on(changeset)
        end
    
        test "validates maximum values for email and password for security" do
          too_long = String.duplicate("db", 100)
          {:error, changeset} = UserManager.register_user(%{email: too_long, password: too_long})
          assert "should be at most 160 character(s)" in errors_on(changeset).email
          assert "should be at most 72 character(s)" in errors_on(changeset).password
        end
    
        test "validates email uniqueness" do
          %{email: email} = user_fixture()
          {:error, changeset} = UserManager.register_user(%{email: email})
          assert "has already been taken" in errors_on(changeset).email
    
          # Now try with the upper cased email too, to check that email case is ignored.
          {:error, changeset} = UserManager.register_user(%{email: String.upcase(email)})
          assert "has already been taken" in errors_on(changeset).email
        end
    
        test "registers users with a hashed password" do
          email = unique_user_email()
          {:ok, user} = UserManager.register_user(valid_user_attributes(email: email))
          assert user.email == email
          assert is_binary(user.hashed_password)
          assert is_nil(user.confirmed_at)
          assert is_nil(user.password)
        end
      end
    
      describe "change_user_registration/2" do
        test "returns a changeset" do
          assert %Ecto.Changeset{} = changeset = UserManager.change_user_registration(%User{})
          assert changeset.required == [:password, :email]
        end
    
        test "allows fields to be set" do
          email = unique_user_email()
          password = valid_user_password()
    
          changeset =
            UserManager.change_user_registration(
              %User{},
              valid_user_attributes(email: email, password: password)
            )
    
          assert changeset.valid?
          assert get_change(changeset, :email) == email
          assert get_change(changeset, :password) == password
          assert is_nil(get_change(changeset, :hashed_password))
        end
      end
    
      describe "change_user_email/2" do
        test "returns a user changeset" do
          assert %Ecto.Changeset{} = changeset = UserManager.change_user_email(%User{})
          assert changeset.required == [:email]
        end
      end
    
      describe "apply_user_email/3" do
        setup do
          %{user: user_fixture()}
        end
    
        test "requires email to change", %{user: user} do
          {:error, changeset} = UserManager.apply_user_email(user, valid_user_password(), %{})
          assert %{email: ["did not change"]} = errors_on(changeset)
        end
    
        test "validates email", %{user: user} do
          {:error, changeset} =
            UserManager.apply_user_email(user, valid_user_password(), %{email: "not valid"})
    
          assert %{email: ["must have the @ sign and no spaces"]} = errors_on(changeset)
        end
    
        test "validates maximum value for email for security", %{user: user} do
          too_long = String.duplicate("db", 100)
    
          {:error, changeset} =
            UserManager.apply_user_email(user, valid_user_password(), %{email: too_long})
    
          assert "should be at most 160 character(s)" in errors_on(changeset).email
        end
    
        test "validates email uniqueness", %{user: user} do
          %{email: email} = user_fixture()
    
          {:error, changeset} =
            UserManager.apply_user_email(user, valid_user_password(), %{email: email})
    
          assert "has already been taken" in errors_on(changeset).email
        end
    
        test "validates current password", %{user: user} do
          {:error, changeset} =
            UserManager.apply_user_email(user, "invalid", %{email: unique_user_email()})
    
          assert %{current_password: ["is not valid"]} = errors_on(changeset)
        end
    
        test "applies the email without persisting it", %{user: user} do
          email = unique_user_email()
          {:ok, user} = UserManager.apply_user_email(user, valid_user_password(), %{email: email})
          assert user.email == email
          assert UserManager.get_user!(user.id).email != email
        end
      end
    
      describe "deliver_update_email_instructions/3" do
        setup do
          %{user: user_fixture()}
        end
    
        test "sends token through notification", %{user: user} do
          token =
            extract_user_token(fn url ->
              UserManager.deliver_update_email_instructions(user, "current@example.com", url)
            end)
    
          {:ok, token} = Base.url_decode64(token, padding: false)
          assert user_token = Repo.get_by(UserToken, token: :crypto.hash(:sha256, token))
          assert user_token.user_id == user.id
          assert user_token.sent_to == user.email
          assert user_token.context == "change:current@example.com"
        end
      end
    
      describe "update_user_email/2" do
        setup do
          user = user_fixture()
          email = unique_user_email()
    
          token =
            extract_user_token(fn url ->
              UserManager.deliver_update_email_instructions(%{user | email: email}, user.email, url)
            end)
    
          %{user: user, token: token, email: email}
        end
    
        test "updates the email with a valid token", %{user: user, token: token, email: email} do
          assert UserManager.update_user_email(user, token) == :ok
          changed_user = Repo.get!(User, user.id)
          assert changed_user.email != user.email
          assert changed_user.email == email
          assert changed_user.confirmed_at
          assert changed_user.confirmed_at != user.confirmed_at
          refute Repo.get_by(UserToken, user_id: user.id)
        end
    
        test "does not update email with invalid token", %{user: user} do
          assert UserManager.update_user_email(user, "oops") == :error
          assert Repo.get!(User, user.id).email == user.email
          assert Repo.get_by(UserToken, user_id: user.id)
        end
    
        test "does not update email if user email changed", %{user: user, token: token} do
          assert UserManager.update_user_email(%{user | email: "current@example.com"}, token) == :error
          assert Repo.get!(User, user.id).email == user.email
          assert Repo.get_by(UserToken, user_id: user.id)
        end
    
        test "does not update email if token expired", %{user: user, token: token} do
          {1, nil} = Repo.update_all(UserToken, set: [inserted_at: ~N[2020-01-01 00:00:00]])
          assert UserManager.update_user_email(user, token) == :error
          assert Repo.get!(User, user.id).email == user.email
          assert Repo.get_by(UserToken, user_id: user.id)
        end
      end
    
      describe "change_user_password/2" do
        test "returns a user changeset" do
          assert %Ecto.Changeset{} = changeset = UserManager.change_user_password(%User{})
          assert changeset.required == [:password]
        end
    
        test "allows fields to be set" do
          changeset =
            UserManager.change_user_password(%User{}, %{
              "password" => "new valid password"
            })
    
          assert changeset.valid?
          assert get_change(changeset, :password) == "new valid password"
          assert is_nil(get_change(changeset, :hashed_password))
        end
      end
    
      describe "update_user_password/3" do
        setup do
          %{user: user_fixture()}
        end
    
        test "validates password", %{user: user} do
          {:error, changeset} =
            UserManager.update_user_password(user, valid_user_password(), %{
              password: "not valid",
              password_confirmation: "another"
            })
    
          assert %{
                   password: ["should be at least 12 character(s)"],
                   password_confirmation: ["does not match password"]
                 } = errors_on(changeset)
        end
    
        test "validates maximum values for password for security", %{user: user} do
          too_long = String.duplicate("db", 100)
    
          {:error, changeset} =
            UserManager.update_user_password(user, valid_user_password(), %{password: too_long})
    
          assert "should be at most 72 character(s)" in errors_on(changeset).password
        end
    
        test "validates current password", %{user: user} do
          {:error, changeset} =
            UserManager.update_user_password(user, "invalid", %{password: valid_user_password()})
    
          assert %{current_password: ["is not valid"]} = errors_on(changeset)
        end
    
        test "updates the password", %{user: user} do
          {:ok, user} =
            UserManager.update_user_password(user, valid_user_password(), %{
              password: "new valid password"
            })
    
          assert is_nil(user.password)
          assert UserManager.get_user_by_email_and_password(user.email, "new valid password")
        end
    
        test "deletes all tokens for the given user", %{user: user} do
          _ = UserManager.generate_user_session_token(user)
    
          {:ok, _} =
            UserManager.update_user_password(user, valid_user_password(), %{
              password: "new valid password"
            })
    
          refute Repo.get_by(UserToken, user_id: user.id)
        end
      end
    
      describe "generate_user_session_token/1" do
        setup do
          %{user: user_fixture()}
        end
    
        test "generates a token", %{user: user} do
          token = UserManager.generate_user_session_token(user)
          assert user_token = Repo.get_by(UserToken, token: token)
          assert user_token.context == "session"
    
          # Creating the same token for another user should fail
          assert_raise Ecto.ConstraintError, fn ->
            Repo.insert!(%UserToken{
              token: user_token.token,
              user_id: user_fixture().id,
              context: "session"
            })
          end
        end
      end
    
      describe "get_user_by_session_token/1" do
        setup do
          user = user_fixture()
          token = UserManager.generate_user_session_token(user)
          %{user: user, token: token}
        end
    
        test "returns user by token", %{user: user, token: token} do
          assert session_user = UserManager.get_user_by_session_token(token)
          assert session_user.id == user.id
        end
    
        test "does not return user for invalid token" do
          refute UserManager.get_user_by_session_token("oops")
        end
    
        test "does not return user for expired token", %{token: token} do
          {1, nil} = Repo.update_all(UserToken, set: [inserted_at: ~N[2020-01-01 00:00:00]])
          refute UserManager.get_user_by_session_token(token)
        end
      end
    
      describe "delete_session_token/1" do
        test "deletes the token" do
          user = user_fixture()
          token = UserManager.generate_user_session_token(user)
          assert UserManager.delete_session_token(token) == :ok
          refute UserManager.get_user_by_session_token(token)
        end
      end
    
      describe "deliver_user_confirmation_instructions/2" do
        setup do
          %{user: user_fixture()}
        end
    
        test "sends token through notification", %{user: user} do
          token =
            extract_user_token(fn url ->
              UserManager.deliver_user_confirmation_instructions(user, url)
            end)
    
          {:ok, token} = Base.url_decode64(token, padding: false)
          assert user_token = Repo.get_by(UserToken, token: :crypto.hash(:sha256, token))
          assert user_token.user_id == user.id
          assert user_token.sent_to == user.email
          assert user_token.context == "confirm"
        end
      end
    
      describe "confirm_user/1" do
        setup do
          user = user_fixture()
    
          token =
            extract_user_token(fn url ->
              UserManager.deliver_user_confirmation_instructions(user, url)
            end)
    
          %{user: user, token: token}
        end
    
        test "confirms the email with a valid token", %{user: user, token: token} do
          assert {:ok, confirmed_user} = UserManager.confirm_user(token)
          assert confirmed_user.confirmed_at
          assert confirmed_user.confirmed_at != user.confirmed_at
          assert Repo.get!(User, user.id).confirmed_at
          refute Repo.get_by(UserToken, user_id: user.id)
        end
    
        test "does not confirm with invalid token", %{user: user} do
          assert UserManager.confirm_user("oops") == :error
          refute Repo.get!(User, user.id).confirmed_at
          assert Repo.get_by(UserToken, user_id: user.id)
        end
    
        test "does not confirm email if token expired", %{user: user, token: token} do
          {1, nil} = Repo.update_all(UserToken, set: [inserted_at: ~N[2020-01-01 00:00:00]])
          assert UserManager.confirm_user(token) == :error
          refute Repo.get!(User, user.id).confirmed_at
          assert Repo.get_by(UserToken, user_id: user.id)
        end
      end
    
      describe "deliver_user_reset_password_instructions/2" do
        setup do
          %{user: user_fixture()}
        end
    
        test "sends token through notification", %{user: user} do
          token =
            extract_user_token(fn url ->
              UserManager.deliver_user_reset_password_instructions(user, url)
            end)
    
          {:ok, token} = Base.url_decode64(token, padding: false)
          assert user_token = Repo.get_by(UserToken, token: :crypto.hash(:sha256, token))
          assert user_token.user_id == user.id
          assert user_token.sent_to == user.email
          assert user_token.context == "reset_password"
        end
      end
    
      describe "get_user_by_reset_password_token/1" do
        setup do
          user = user_fixture()
    
          token =
            extract_user_token(fn url ->
              UserManager.deliver_user_reset_password_instructions(user, url)
            end)
    
          %{user: user, token: token}
        end
    
        test "returns the user with valid token", %{user: %{id: id}, token: token} do
          assert %User{id: ^id} = UserManager.get_user_by_reset_password_token(token)
          assert Repo.get_by(UserToken, user_id: id)
        end
    
        test "does not return the user with invalid token", %{user: user} do
          refute UserManager.get_user_by_reset_password_token("oops")
          assert Repo.get_by(UserToken, user_id: user.id)
        end
    
        test "does not return the user if token expired", %{user: user, token: token} do
          {1, nil} = Repo.update_all(UserToken, set: [inserted_at: ~N[2020-01-01 00:00:00]])
          refute UserManager.get_user_by_reset_password_token(token)
          assert Repo.get_by(UserToken, user_id: user.id)
        end
      end
    
      describe "reset_user_password/2" do
        setup do
          %{user: user_fixture()}
        end
    
        test "validates password", %{user: user} do
          {:error, changeset} =
            UserManager.reset_user_password(user, %{
              password: "not valid",
              password_confirmation: "another"
            })
    
          assert %{
                   password: ["should be at least 12 character(s)"],
                   password_confirmation: ["does not match password"]
                 } = errors_on(changeset)
        end
    
        test "validates maximum values for password for security", %{user: user} do
          too_long = String.duplicate("db", 100)
          {:error, changeset} = UserManager.reset_user_password(user, %{password: too_long})
          assert "should be at most 72 character(s)" in errors_on(changeset).password
        end
    
        test "updates the password", %{user: user} do
          {:ok, updated_user} = UserManager.reset_user_password(user, %{password: "new valid password"})
          assert is_nil(updated_user.password)
          assert UserManager.get_user_by_email_and_password(user.email, "new valid password")
        end
    
        test "deletes all tokens for the given user", %{user: user} do
          _ = UserManager.generate_user_session_token(user)
          {:ok, _} = UserManager.reset_user_password(user, %{password: "new valid password"})
          refute Repo.get_by(UserToken, user_id: user.id)
        end
      end
    
      describe "inspect/2" do
        test "does not include password" do
          refute inspect(%User{password: "123456"}) =~ "password: \"123456\""
        end
      end
    end