-- Test encrypt_password
set client_min_messages to warning;
create extension if not exists pgtap;
reset client_min_messages;

begin;

select plan(11);

set search_path to auth, camper, public;

select has_function('auth', 'encrypt_password', array []::name[]);
select function_lang_is('auth', 'encrypt_password', array []::name[], 'plpgsql');
select function_returns('auth', 'encrypt_password', array []::name[], 'trigger');
select isnt_definer('auth', 'encrypt_password', array []::name[]);
select volatility_is('auth', 'encrypt_password', array []::name[], 'volatile');
select function_privs_are('auth', 'encrypt_password', array []::name[], 'guest', array []::text[]);
select function_privs_are('auth', 'encrypt_password', array []::name[], 'employee', array []::text[]);
select function_privs_are('auth', 'encrypt_password', array []::name[], 'admin', array []::text[]);
select function_privs_are('auth', 'encrypt_password', array []::name[], 'authenticator', array []::text[]);

select trigger_is('user', 'encrypt_password', 'encrypt_password');

set client_min_messages to warning;
truncate "user" cascade;
reset client_min_messages;

insert into "user" (email, name, password)
values ('info@tandem.blog', 'Perita', 'test');

select row_eq(
	$$ select email from "user" where password = crypt('test', password) $$,
	row ('info@tandem.blog'::email),
	'Should find the new user using its encrypted password'
);

select *
from finish();

rollback;