mirror of https://github.com/Chocobozzz/PeerTube
372 lines
12 KiB
TypeScript
372 lines
12 KiB
TypeScript
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
|
|
|
|
import { expect } from 'chai'
|
|
import { MockSmtpServer } from '@server/tests/shared'
|
|
import { HttpStatusCode } from '@shared/models'
|
|
import {
|
|
cleanupTests,
|
|
ConfigCommand,
|
|
createSingleServer,
|
|
PeerTubeServer,
|
|
setAccessTokensToServers,
|
|
waitJobs
|
|
} from '@shared/server-commands'
|
|
|
|
describe('Test emails', function () {
|
|
let server: PeerTubeServer
|
|
let userId: number
|
|
let userId2: number
|
|
let userAccessToken: string
|
|
|
|
let videoShortUUID: string
|
|
let videoId: number
|
|
|
|
let videoUserUUID: string
|
|
|
|
let verificationString: string
|
|
let verificationString2: string
|
|
|
|
const emails: object[] = []
|
|
const user = {
|
|
username: 'user_1',
|
|
password: 'super_password'
|
|
}
|
|
|
|
before(async function () {
|
|
this.timeout(120000)
|
|
|
|
const emailPort = await MockSmtpServer.Instance.collectEmails(emails)
|
|
server = await createSingleServer(1, ConfigCommand.getEmailOverrideConfig(emailPort))
|
|
|
|
await setAccessTokensToServers([ server ])
|
|
await server.config.enableSignup(true)
|
|
|
|
{
|
|
const created = await server.users.create({ username: user.username, password: user.password })
|
|
userId = created.id
|
|
|
|
userAccessToken = await server.login.getAccessToken(user)
|
|
}
|
|
|
|
{
|
|
const attributes = { name: 'my super user video' }
|
|
const { uuid } = await server.videos.upload({ token: userAccessToken, attributes })
|
|
videoUserUUID = uuid
|
|
}
|
|
|
|
{
|
|
const attributes = {
|
|
name: 'my super name'
|
|
}
|
|
const { shortUUID, id } = await server.videos.upload({ attributes })
|
|
videoShortUUID = shortUUID
|
|
videoId = id
|
|
}
|
|
})
|
|
|
|
describe('When resetting user password', function () {
|
|
|
|
it('Should ask to reset the password', async function () {
|
|
await server.users.askResetPassword({ email: 'user_1@example.com' })
|
|
|
|
await waitJobs(server)
|
|
expect(emails).to.have.lengthOf(1)
|
|
|
|
const email = emails[0]
|
|
|
|
expect(email['from'][0]['name']).equal('PeerTube')
|
|
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
|
|
expect(email['to'][0]['address']).equal('user_1@example.com')
|
|
expect(email['subject']).contains('password')
|
|
|
|
const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text'])
|
|
expect(verificationStringMatches).not.to.be.null
|
|
|
|
verificationString = verificationStringMatches[1]
|
|
expect(verificationString).to.have.length.above(2)
|
|
|
|
const userIdMatches = /userId=([0-9]+)/.exec(email['text'])
|
|
expect(userIdMatches).not.to.be.null
|
|
|
|
userId = parseInt(userIdMatches[1], 10)
|
|
expect(verificationString).to.not.be.undefined
|
|
})
|
|
|
|
it('Should not reset the password with an invalid verification string', async function () {
|
|
await server.users.resetPassword({
|
|
userId,
|
|
verificationString: verificationString + 'b',
|
|
password: 'super_password2',
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
|
|
it('Should reset the password', async function () {
|
|
await server.users.resetPassword({ userId, verificationString, password: 'super_password2' })
|
|
})
|
|
|
|
it('Should not reset the password with the same verification string', async function () {
|
|
await server.users.resetPassword({
|
|
userId,
|
|
verificationString,
|
|
password: 'super_password3',
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
|
|
it('Should login with this new password', async function () {
|
|
user.password = 'super_password2'
|
|
|
|
await server.login.getAccessToken(user)
|
|
})
|
|
})
|
|
|
|
describe('When creating a user without password', function () {
|
|
|
|
it('Should send a create password email', async function () {
|
|
await server.users.create({ username: 'create_password', password: '' })
|
|
|
|
await waitJobs(server)
|
|
expect(emails).to.have.lengthOf(2)
|
|
|
|
const email = emails[1]
|
|
|
|
expect(email['from'][0]['name']).equal('PeerTube')
|
|
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
|
|
expect(email['to'][0]['address']).equal('create_password@example.com')
|
|
expect(email['subject']).contains('account')
|
|
expect(email['subject']).contains('password')
|
|
|
|
const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text'])
|
|
expect(verificationStringMatches).not.to.be.null
|
|
|
|
verificationString2 = verificationStringMatches[1]
|
|
expect(verificationString2).to.have.length.above(2)
|
|
|
|
const userIdMatches = /userId=([0-9]+)/.exec(email['text'])
|
|
expect(userIdMatches).not.to.be.null
|
|
|
|
userId2 = parseInt(userIdMatches[1], 10)
|
|
})
|
|
|
|
it('Should not reset the password with an invalid verification string', async function () {
|
|
await server.users.resetPassword({
|
|
userId: userId2,
|
|
verificationString: verificationString2 + 'c',
|
|
password: 'newly_created_password',
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
|
|
it('Should reset the password', async function () {
|
|
await server.users.resetPassword({
|
|
userId: userId2,
|
|
verificationString: verificationString2,
|
|
password: 'newly_created_password'
|
|
})
|
|
})
|
|
|
|
it('Should login with this new password', async function () {
|
|
await server.login.getAccessToken({
|
|
username: 'create_password',
|
|
password: 'newly_created_password'
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('When creating an abuse', function () {
|
|
|
|
it('Should send the notification email', async function () {
|
|
const reason = 'my super bad reason'
|
|
await server.abuses.report({ token: userAccessToken, videoId, reason })
|
|
|
|
await waitJobs(server)
|
|
expect(emails).to.have.lengthOf(3)
|
|
|
|
const email = emails[2]
|
|
|
|
expect(email['from'][0]['name']).equal('PeerTube')
|
|
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
|
|
expect(email['to'][0]['address']).equal('admin' + server.internalServerNumber + '@example.com')
|
|
expect(email['subject']).contains('abuse')
|
|
expect(email['text']).contains(videoShortUUID)
|
|
})
|
|
})
|
|
|
|
describe('When blocking/unblocking user', function () {
|
|
|
|
it('Should send the notification email when blocking a user', async function () {
|
|
const reason = 'my super bad reason'
|
|
await server.users.banUser({ userId, reason })
|
|
|
|
await waitJobs(server)
|
|
expect(emails).to.have.lengthOf(4)
|
|
|
|
const email = emails[3]
|
|
|
|
expect(email['from'][0]['name']).equal('PeerTube')
|
|
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
|
|
expect(email['to'][0]['address']).equal('user_1@example.com')
|
|
expect(email['subject']).contains(' blocked')
|
|
expect(email['text']).contains(' blocked')
|
|
expect(email['text']).contains('bad reason')
|
|
})
|
|
|
|
it('Should send the notification email when unblocking a user', async function () {
|
|
await server.users.unbanUser({ userId })
|
|
|
|
await waitJobs(server)
|
|
expect(emails).to.have.lengthOf(5)
|
|
|
|
const email = emails[4]
|
|
|
|
expect(email['from'][0]['name']).equal('PeerTube')
|
|
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
|
|
expect(email['to'][0]['address']).equal('user_1@example.com')
|
|
expect(email['subject']).contains(' unblocked')
|
|
expect(email['text']).contains(' unblocked')
|
|
})
|
|
})
|
|
|
|
describe('When blacklisting a video', function () {
|
|
it('Should send the notification email', async function () {
|
|
const reason = 'my super reason'
|
|
await server.blacklist.add({ videoId: videoUserUUID, reason })
|
|
|
|
await waitJobs(server)
|
|
expect(emails).to.have.lengthOf(6)
|
|
|
|
const email = emails[5]
|
|
|
|
expect(email['from'][0]['name']).equal('PeerTube')
|
|
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
|
|
expect(email['to'][0]['address']).equal('user_1@example.com')
|
|
expect(email['subject']).contains(' blacklisted')
|
|
expect(email['text']).contains('my super user video')
|
|
expect(email['text']).contains('my super reason')
|
|
})
|
|
|
|
it('Should send the notification email', async function () {
|
|
await server.blacklist.remove({ videoId: videoUserUUID })
|
|
|
|
await waitJobs(server)
|
|
expect(emails).to.have.lengthOf(7)
|
|
|
|
const email = emails[6]
|
|
|
|
expect(email['from'][0]['name']).equal('PeerTube')
|
|
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
|
|
expect(email['to'][0]['address']).equal('user_1@example.com')
|
|
expect(email['subject']).contains(' unblacklisted')
|
|
expect(email['text']).contains('my super user video')
|
|
})
|
|
|
|
it('Should have the manage preferences link in the email', async function () {
|
|
const email = emails[6]
|
|
expect(email['text']).to.contain('Manage your notification preferences')
|
|
})
|
|
})
|
|
|
|
describe('When verifying a user email', function () {
|
|
|
|
it('Should ask to send the verification email', async function () {
|
|
await server.users.askSendVerifyEmail({ email: 'user_1@example.com' })
|
|
|
|
await waitJobs(server)
|
|
expect(emails).to.have.lengthOf(8)
|
|
|
|
const email = emails[7]
|
|
|
|
expect(email['from'][0]['name']).equal('PeerTube')
|
|
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
|
|
expect(email['to'][0]['address']).equal('user_1@example.com')
|
|
expect(email['subject']).contains('Verify')
|
|
|
|
const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text'])
|
|
expect(verificationStringMatches).not.to.be.null
|
|
|
|
verificationString = verificationStringMatches[1]
|
|
expect(verificationString).to.not.be.undefined
|
|
expect(verificationString).to.have.length.above(2)
|
|
|
|
const userIdMatches = /userId=([0-9]+)/.exec(email['text'])
|
|
expect(userIdMatches).not.to.be.null
|
|
|
|
userId = parseInt(userIdMatches[1], 10)
|
|
})
|
|
|
|
it('Should not verify the email with an invalid verification string', async function () {
|
|
await server.users.verifyEmail({
|
|
userId,
|
|
verificationString: verificationString + 'b',
|
|
isPendingEmail: false,
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
|
|
it('Should verify the email', async function () {
|
|
await server.users.verifyEmail({ userId, verificationString })
|
|
})
|
|
})
|
|
|
|
describe('When verifying a registration email', function () {
|
|
let registrationId: number
|
|
let registrationIdEmail: number
|
|
|
|
before(async function () {
|
|
const { id } = await server.registrations.requestRegistration({
|
|
username: 'request_1',
|
|
email: 'request_1@example.com',
|
|
registrationReason: 'tt'
|
|
})
|
|
registrationId = id
|
|
})
|
|
|
|
it('Should ask to send the verification email', async function () {
|
|
await server.registrations.askSendVerifyEmail({ email: 'request_1@example.com' })
|
|
|
|
await waitJobs(server)
|
|
expect(emails).to.have.lengthOf(9)
|
|
|
|
const email = emails[8]
|
|
|
|
expect(email['from'][0]['name']).equal('PeerTube')
|
|
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
|
|
expect(email['to'][0]['address']).equal('request_1@example.com')
|
|
expect(email['subject']).contains('Verify')
|
|
|
|
const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text'])
|
|
expect(verificationStringMatches).not.to.be.null
|
|
|
|
verificationString = verificationStringMatches[1]
|
|
expect(verificationString).to.not.be.undefined
|
|
expect(verificationString).to.have.length.above(2)
|
|
|
|
const registrationIdMatches = /registrationId=([0-9]+)/.exec(email['text'])
|
|
expect(registrationIdMatches).not.to.be.null
|
|
|
|
registrationIdEmail = parseInt(registrationIdMatches[1], 10)
|
|
|
|
expect(registrationId).to.equal(registrationIdEmail)
|
|
})
|
|
|
|
it('Should not verify the email with an invalid verification string', async function () {
|
|
await server.registrations.verifyEmail({
|
|
registrationId: registrationIdEmail,
|
|
verificationString: verificationString + 'b',
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
|
|
it('Should verify the email', async function () {
|
|
await server.registrations.verifyEmail({ registrationId: registrationIdEmail, verificationString })
|
|
})
|
|
})
|
|
|
|
after(async function () {
|
|
MockSmtpServer.Instance.kill()
|
|
|
|
await cleanupTests([ server ])
|
|
})
|
|
})
|