]>
Commit | Line | Data |
---|---|---|
d9eaee39 JM |
1 | /* tslint:disable:no-unused-expression */ |
2 | ||
3 | import * as chai from 'chai' | |
4 | import 'mocha' | |
5 | import { | |
6 | registerUser, flushTests, getUserInformation, getMyUserInformation, killallServers, | |
7c3b7976 | 7 | userLogin, login, flushAndRunServer, ServerInfo, verifyEmail, updateCustomSubConfig, wait, cleanupTests |
94565d52 C |
8 | } from '../../../../shared/extra-utils' |
9 | import { setAccessTokensToServers } from '../../../../shared/extra-utils/users/login' | |
10 | import { MockSmtpServer } from '../../../../shared/extra-utils/miscs/email' | |
11 | import { waitJobs } from '../../../../shared/extra-utils/server/jobs' | |
d9eaee39 JM |
12 | |
13 | const expect = chai.expect | |
14 | ||
15 | describe('Test users account verification', function () { | |
16 | let server: ServerInfo | |
17 | let userId: number | |
18 | let verificationString: string | |
19 | let expectedEmailsLength = 0 | |
20 | const user1 = { | |
21 | username: 'user_1', | |
22 | password: 'super password' | |
23 | } | |
24 | const user2 = { | |
25 | username: 'user_2', | |
26 | password: 'super password' | |
27 | } | |
28 | const emails: object[] = [] | |
29 | ||
30 | before(async function () { | |
31 | this.timeout(30000) | |
32 | ||
7243f84d | 33 | const port = await MockSmtpServer.Instance.collectEmails(emails) |
d9eaee39 | 34 | |
d9eaee39 JM |
35 | const overrideConfig = { |
36 | smtp: { | |
7243f84d C |
37 | hostname: 'localhost', |
38 | port | |
d9eaee39 JM |
39 | } |
40 | } | |
210feb6c | 41 | server = await flushAndRunServer(1, overrideConfig) |
d9eaee39 JM |
42 | |
43 | await setAccessTokensToServers([ server ]) | |
44 | }) | |
45 | ||
46 | it('Should register user and send verification email if verification required', async function () { | |
47 | this.timeout(5000) | |
48 | await updateCustomSubConfig(server.url, server.accessToken, { | |
49 | signup: { | |
50 | enabled: true, | |
51 | requiresEmailVerification: true, | |
52 | limit: 10 | |
53 | } | |
54 | }) | |
55 | ||
56 | await registerUser(server.url, user1.username, user1.password) | |
57 | ||
58 | await waitJobs(server) | |
59 | expectedEmailsLength++ | |
60 | expect(emails).to.have.lengthOf(expectedEmailsLength) | |
61 | ||
62 | const email = emails[expectedEmailsLength - 1] | |
63 | ||
64 | const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text']) | |
65 | expect(verificationStringMatches).not.to.be.null | |
66 | ||
67 | verificationString = verificationStringMatches[1] | |
68 | expect(verificationString).to.have.length.above(2) | |
69 | ||
70 | const userIdMatches = /userId=([0-9]+)/.exec(email['text']) | |
71 | expect(userIdMatches).not.to.be.null | |
72 | ||
73 | userId = parseInt(userIdMatches[1], 10) | |
74 | ||
75 | const resUserInfo = await getUserInformation(server.url, server.accessToken, userId) | |
76 | expect(resUserInfo.body.emailVerified).to.be.false | |
77 | }) | |
78 | ||
79 | it('Should not allow login for user with unverified email', async function () { | |
80 | const resLogin = await login(server.url, server.client, user1, 400) | |
81 | expect(resLogin.body.error).to.contain('User email is not verified.') | |
82 | }) | |
83 | ||
84 | it('Should verify the user via email and allow login', async function () { | |
85 | await verifyEmail(server.url, userId, verificationString) | |
86 | await login(server.url, server.client, user1) | |
87 | const resUserVerified = await getUserInformation(server.url, server.accessToken, userId) | |
88 | expect(resUserVerified.body.emailVerified).to.be.true | |
89 | }) | |
90 | ||
91 | it('Should register user not requiring email verification if setting not enabled', async function () { | |
92 | this.timeout(5000) | |
93 | await updateCustomSubConfig(server.url, server.accessToken, { | |
94 | signup: { | |
95 | enabled: true, | |
96 | requiresEmailVerification: false, | |
97 | limit: 10 | |
98 | } | |
99 | }) | |
100 | ||
101 | await registerUser(server.url, user2.username, user2.password) | |
102 | ||
103 | await waitJobs(server) | |
104 | expect(emails).to.have.lengthOf(expectedEmailsLength) | |
105 | ||
106 | const accessToken = await userLogin(server, user2) | |
107 | ||
108 | const resMyUserInfo = await getMyUserInformation(server.url, accessToken) | |
109 | expect(resMyUserInfo.body.emailVerified).to.be.null | |
110 | }) | |
111 | ||
112 | it('Should allow login for user with unverified email when setting later enabled', async function () { | |
113 | await updateCustomSubConfig(server.url, server.accessToken, { | |
114 | signup: { | |
115 | enabled: true, | |
116 | requiresEmailVerification: true, | |
117 | limit: 10 | |
118 | } | |
119 | }) | |
120 | ||
121 | await userLogin(server, user2) | |
122 | }) | |
123 | ||
7c3b7976 | 124 | after(async function () { |
89ada4e2 | 125 | MockSmtpServer.Instance.kill() |
7c3b7976 C |
126 | |
127 | await cleanupTests([ server ]) | |
d9eaee39 JM |
128 | }) |
129 | }) |