auth.rs 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132
  1. use flowy_test::prelude::*;
  2. use flowy_user::{event::UserEvent::*, prelude::*};
  3. #[test]
  4. fn sign_up_success() {
  5. let request = SignUpRequest {
  6. email: valid_email(),
  7. name: valid_name(),
  8. password: valid_password(),
  9. };
  10. let response = EventTester::new(SignUp)
  11. .request(request)
  12. .sync_send()
  13. .parse::<SignUpResponse>();
  14. dbg!(&response);
  15. }
  16. #[test]
  17. fn sign_in_success() {
  18. let request = SignInRequest {
  19. email: valid_email(),
  20. password: valid_password(),
  21. };
  22. let response = EventTester::new(SignIn)
  23. .request(request)
  24. .sync_send()
  25. .parse::<SignInResponse>();
  26. dbg!(&response);
  27. }
  28. #[test]
  29. fn sign_up_with_invalid_email() {
  30. for email in invalid_email_test_case() {
  31. let request = SignUpRequest {
  32. email: email.to_string(),
  33. name: valid_name(),
  34. password: valid_password(),
  35. };
  36. let _ = EventTester::new(SignUp)
  37. .request(request)
  38. .assert_error()
  39. .sync_send();
  40. }
  41. }
  42. #[test]
  43. fn sign_up_with_invalid_password() {
  44. for password in invalid_password_test_case() {
  45. let request = SignUpRequest {
  46. email: valid_email(),
  47. name: valid_name(),
  48. password,
  49. };
  50. let _ = EventTester::new(SignUp)
  51. .request(request)
  52. .assert_error()
  53. .sync_send();
  54. }
  55. }
  56. #[test]
  57. fn sign_in_with_invalid_email() {
  58. for email in invalid_email_test_case() {
  59. let request = SignInRequest {
  60. email: email.to_string(),
  61. password: valid_password(),
  62. };
  63. let _ = EventTester::new(SignIn)
  64. .request(request)
  65. .assert_error()
  66. .sync_send();
  67. }
  68. }
  69. #[test]
  70. fn sign_in_with_invalid_password() {
  71. for password in invalid_password_test_case() {
  72. let request = SignInRequest {
  73. email: valid_email(),
  74. password,
  75. };
  76. let _ = EventTester::new(SignIn)
  77. .request(request)
  78. .assert_error()
  79. .sync_send();
  80. }
  81. }
  82. fn invalid_email_test_case() -> Vec<String> {
  83. // https://gist.github.com/cjaoude/fd9910626629b53c4d25
  84. vec![
  85. "",
  86. "annie@",
  87. "annie@gmail@",
  88. "#@%^%#$@#$@#.com",
  89. "@example.com",
  90. "Joe Smith <[email protected]>",
  91. "email.example.com",
  92. "email@[email protected]",
  93. "[email protected]",
  94. "[email protected]",
  95. "あいうえお@example.com",
  96. /* The following email is valid according to the validate_email function return
  97. * "[email protected]",
  98. * "[email protected]",
  99. * "[email protected]",
  100. * "email@example",
  101. * "[email protected]",
  102. * "[email protected]",
  103. * "[email protected]", */
  104. ]
  105. .iter()
  106. .map(|s| s.to_string())
  107. .collect::<Vec<_>>()
  108. }
  109. fn invalid_password_test_case() -> Vec<String> {
  110. vec!["", "123456", "1234".repeat(100).as_str()]
  111. .iter()
  112. .map(|s| s.to_string())
  113. .collect::<Vec<_>>()
  114. }
  115. fn valid_email() -> String { "[email protected]".to_string() }
  116. fn valid_password() -> String { "HelloWorld!123".to_string() }
  117. fn valid_name() -> String { "AppFlowy".to_string() }