PeerTube/server/tests/api/server/email.ts

125 lines
3.5 KiB
TypeScript
Raw Normal View History

2018-01-30 15:16:24 +01:00
/* tslint:disable:no-unused-expression */
import * as chai from 'chai'
import 'mocha'
2018-02-01 11:08:10 +01:00
import { askResetPassword, createUser, reportVideoAbuse, resetPassword, runServer, uploadVideo, userLogin, wait } from '../../utils'
2018-01-30 15:16:24 +01:00
import { flushTests, killallServers, ServerInfo, setAccessTokensToServers } from '../../utils/index'
import { mockSmtpServer } from '../../utils/miscs/email'
const expect = chai.expect
describe('Test emails', function () {
let server: ServerInfo
let userId: number
2018-02-01 11:08:10 +01:00
let videoUUID: string
2018-01-30 15:16:24 +01:00
let verificationString: string
const emails: object[] = []
const user = {
username: 'user_1',
password: 'super_password'
}
before(async function () {
this.timeout(30000)
await mockSmtpServer(emails)
await flushTests()
const overrideConfig = {
smtp: {
hostname: 'localhost'
}
}
server = await runServer(1, overrideConfig)
await wait(5000)
await setAccessTokensToServers([ server ])
2018-02-01 11:08:10 +01:00
{
const res = await createUser(server.url, server.accessToken, user.username, user.password)
userId = res.body.user.id
}
{
const attributes = {
name: 'my super name'
}
const res = await uploadVideo(server.url, server.accessToken, attributes)
videoUUID = res.body.video.uuid
}
2018-01-30 15:16:24 +01:00
})
describe('When resetting user password', function () {
it('Should ask to reset the password', async function () {
this.timeout(10000)
await askResetPassword(server.url, 'user_1@example.com')
await wait(3000)
expect(emails).to.have.lengthOf(1)
const email = emails[0]
expect(email['from'][0]['address']).equal('test-admin@localhost')
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains('password')
const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text'])
expect(verificationStringMatches).not.to.be.null
verificationString = verificationStringMatches[1]
expect(verificationString).to.have.length.above(2)
const userIdMatches = /userId=([0-9]+)/.exec(email['text'])
expect(userIdMatches).not.to.be.null
userId = parseInt(userIdMatches[1], 10)
expect(verificationString).to.not.be.undefined
})
it('Should not reset the password with an invalid verification string', async function () {
await resetPassword(server.url, userId, verificationString + 'b', 'super_password2', 403)
})
it('Should reset the password', async function () {
await resetPassword(server.url, userId, verificationString, 'super_password2')
})
it('Should login with this new password', async function () {
user.password = 'super_password2'
await userLogin(server, user)
})
})
2018-02-01 11:08:10 +01:00
describe('When creating a video abuse', function () {
it('Should send the notification email', async function () {
this.timeout(10000)
const reason = 'my super bad reason'
await reportVideoAbuse(server.url, server.accessToken, videoUUID, reason)
await wait(3000)
expect(emails).to.have.lengthOf(2)
const email = emails[1]
expect(email['from'][0]['address']).equal('test-admin@localhost')
expect(email['to'][0]['address']).equal('admin1@example.com')
expect(email['subject']).contains('abuse')
expect(email['text']).contains(videoUUID)
})
})
2018-01-30 15:16:24 +01:00
after(async function () {
killallServers([ server ])
// Keep the logs if the test failed
if (this['ok']) {
await flushTests()
}
})
})