]>
Commit | Line | Data |
---|---|---|
a1587156 | 1 | /* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */ |
d9eaee39 | 2 | |
d9eaee39 | 3 | import 'mocha' |
8ef9457f | 4 | import * as chai from 'chai' |
254d3579 | 5 | import { cleanupTests, createSingleServer, MockSmtpServer, PeerTubeServer, setAccessTokensToServers, waitJobs } from '@shared/extra-utils' |
4c7e60bc | 6 | import { HttpStatusCode } from '@shared/models' |
d9eaee39 JM |
7 | |
8 | const expect = chai.expect | |
9 | ||
10 | describe('Test users account verification', function () { | |
254d3579 | 11 | let server: PeerTubeServer |
d9eaee39 | 12 | let userId: number |
d1ab89de | 13 | let userAccessToken: string |
d9eaee39 JM |
14 | let verificationString: string |
15 | let expectedEmailsLength = 0 | |
16 | const user1 = { | |
17 | username: 'user_1', | |
18 | password: 'super password' | |
19 | } | |
20 | const user2 = { | |
21 | username: 'user_2', | |
22 | password: 'super password' | |
23 | } | |
24 | const emails: object[] = [] | |
25 | ||
26 | before(async function () { | |
27 | this.timeout(30000) | |
28 | ||
7243f84d | 29 | const port = await MockSmtpServer.Instance.collectEmails(emails) |
d9eaee39 | 30 | |
d9eaee39 JM |
31 | const overrideConfig = { |
32 | smtp: { | |
7243f84d C |
33 | hostname: 'localhost', |
34 | port | |
d9eaee39 JM |
35 | } |
36 | } | |
254d3579 | 37 | server = await createSingleServer(1, overrideConfig) |
d9eaee39 JM |
38 | |
39 | await setAccessTokensToServers([ server ]) | |
40 | }) | |
41 | ||
42 | it('Should register user and send verification email if verification required', async function () { | |
59fd824c C |
43 | this.timeout(30000) |
44 | ||
89d241a7 | 45 | await server.config.updateCustomSubConfig({ |
65e6e260 C |
46 | newConfig: { |
47 | signup: { | |
48 | enabled: true, | |
49 | requiresEmailVerification: true, | |
50 | limit: 10 | |
51 | } | |
d9eaee39 JM |
52 | } |
53 | }) | |
54 | ||
89d241a7 | 55 | await server.users.register(user1) |
d9eaee39 JM |
56 | |
57 | await waitJobs(server) | |
58 | expectedEmailsLength++ | |
59 | expect(emails).to.have.lengthOf(expectedEmailsLength) | |
60 | ||
61 | const email = emails[expectedEmailsLength - 1] | |
62 | ||
63 | const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text']) | |
64 | expect(verificationStringMatches).not.to.be.null | |
65 | ||
66 | verificationString = verificationStringMatches[1] | |
67 | expect(verificationString).to.have.length.above(2) | |
68 | ||
69 | const userIdMatches = /userId=([0-9]+)/.exec(email['text']) | |
70 | expect(userIdMatches).not.to.be.null | |
71 | ||
72 | userId = parseInt(userIdMatches[1], 10) | |
73 | ||
89d241a7 | 74 | const body = await server.users.get({ userId }) |
7926c5f9 | 75 | expect(body.emailVerified).to.be.false |
d9eaee39 JM |
76 | }) |
77 | ||
78 | it('Should not allow login for user with unverified email', async function () { | |
89d241a7 | 79 | const { detail } = await server.login.login({ user: user1, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) |
41d1d075 | 80 | expect(detail).to.contain('User email is not verified.') |
d9eaee39 JM |
81 | }) |
82 | ||
83 | it('Should verify the user via email and allow login', async function () { | |
89d241a7 | 84 | await server.users.verifyEmail({ userId, verificationString }) |
d1ab89de | 85 | |
89d241a7 | 86 | const body = await server.login.login({ user: user1 }) |
41d1d075 | 87 | userAccessToken = body.access_token |
d1ab89de | 88 | |
89d241a7 | 89 | const user = await server.users.get({ userId }) |
7926c5f9 | 90 | expect(user.emailVerified).to.be.true |
d9eaee39 JM |
91 | }) |
92 | ||
d1ab89de | 93 | it('Should be able to change the user email', async function () { |
2dbc170d C |
94 | this.timeout(10000) |
95 | ||
d1ab89de C |
96 | let updateVerificationString: string |
97 | ||
98 | { | |
89d241a7 | 99 | await server.users.updateMe({ |
7926c5f9 | 100 | token: userAccessToken, |
5efab546 C |
101 | email: 'updated@example.com', |
102 | currentPassword: user1.password | |
d1ab89de C |
103 | }) |
104 | ||
105 | await waitJobs(server) | |
106 | expectedEmailsLength++ | |
107 | expect(emails).to.have.lengthOf(expectedEmailsLength) | |
108 | ||
109 | const email = emails[expectedEmailsLength - 1] | |
110 | ||
111 | const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text']) | |
112 | updateVerificationString = verificationStringMatches[1] | |
113 | } | |
114 | ||
115 | { | |
89d241a7 | 116 | const me = await server.users.getMyInfo({ token: userAccessToken }) |
d1ab89de C |
117 | expect(me.email).to.equal('user_1@example.com') |
118 | expect(me.pendingEmail).to.equal('updated@example.com') | |
119 | } | |
120 | ||
121 | { | |
89d241a7 | 122 | await server.users.verifyEmail({ userId, verificationString: updateVerificationString, isPendingEmail: true }) |
d1ab89de | 123 | |
89d241a7 | 124 | const me = await server.users.getMyInfo({ token: userAccessToken }) |
d1ab89de C |
125 | expect(me.email).to.equal('updated@example.com') |
126 | expect(me.pendingEmail).to.be.null | |
127 | } | |
128 | }) | |
129 | ||
d9eaee39 JM |
130 | it('Should register user not requiring email verification if setting not enabled', async function () { |
131 | this.timeout(5000) | |
89d241a7 | 132 | await server.config.updateCustomSubConfig({ |
65e6e260 C |
133 | newConfig: { |
134 | signup: { | |
135 | enabled: true, | |
136 | requiresEmailVerification: false, | |
137 | limit: 10 | |
138 | } | |
d9eaee39 JM |
139 | } |
140 | }) | |
141 | ||
89d241a7 | 142 | await server.users.register(user2) |
d9eaee39 JM |
143 | |
144 | await waitJobs(server) | |
145 | expect(emails).to.have.lengthOf(expectedEmailsLength) | |
146 | ||
89d241a7 | 147 | const accessToken = await server.login.getAccessToken(user2) |
d9eaee39 | 148 | |
89d241a7 | 149 | const user = await server.users.getMyInfo({ token: accessToken }) |
7926c5f9 | 150 | expect(user.emailVerified).to.be.null |
d9eaee39 JM |
151 | }) |
152 | ||
153 | it('Should allow login for user with unverified email when setting later enabled', async function () { | |
89d241a7 | 154 | await server.config.updateCustomSubConfig({ |
65e6e260 C |
155 | newConfig: { |
156 | signup: { | |
157 | enabled: true, | |
158 | requiresEmailVerification: true, | |
159 | limit: 10 | |
160 | } | |
d9eaee39 JM |
161 | } |
162 | }) | |
163 | ||
89d241a7 | 164 | await server.login.getAccessToken(user2) |
d9eaee39 JM |
165 | }) |
166 | ||
7c3b7976 | 167 | after(async function () { |
89ada4e2 | 168 | MockSmtpServer.Instance.kill() |
7c3b7976 C |
169 | |
170 | await cleanupTests([ server ]) | |
d9eaee39 JM |
171 | }) |
172 | }) |