]> git.immae.eu Git - github/Chocobozzz/PeerTube.git/blame - server/tests/plugins/id-and-pass-auth.ts
Translated using Weblate (Croatian)
[github/Chocobozzz/PeerTube.git] / server / tests / plugins / id-and-pass-auth.ts
CommitLineData
7fed6375
C
1/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
2
3import 'mocha'
ae2abfd3 4import { expect } from 'chai'
c55e3d72 5import { wait } from '@shared/core-utils'
4c7e60bc 6import { HttpStatusCode, UserRole } from '@shared/models'
c55e3d72 7import { cleanupTests, createSingleServer, PeerTubeServer, PluginsCommand, setAccessTokensToServers } from '@shared/server-commands'
7fed6375
C
8
9describe('Test id and pass auth plugins', function () {
254d3579 10 let server: PeerTubeServer
e307e4fc
C
11
12 let crashAccessToken: string
13 let crashRefreshToken: string
14
15 let lagunaAccessToken: string
16 let lagunaRefreshToken: string
7fed6375
C
17
18 before(async function () {
19 this.timeout(30000)
20
254d3579 21 server = await createSingleServer(1)
7fed6375
C
22 await setAccessTokensToServers([ server ])
23
e1c55031 24 for (const suffix of [ 'one', 'two', 'three' ]) {
89d241a7 25 await server.plugins.install({ path: PluginsCommand.getPluginTestPath('-id-pass-auth-' + suffix) })
e1c55031 26 }
7fed6375
C
27 })
28
9107d791 29 it('Should display the correct configuration', async function () {
89d241a7 30 const config = await server.config.getConfig()
9107d791
C
31
32 const auths = config.plugin.registeredIdAndPassAuths
33 expect(auths).to.have.lengthOf(8)
34
35 const crashAuth = auths.find(a => a.authName === 'crash-auth')
36 expect(crashAuth).to.exist
37 expect(crashAuth.npmName).to.equal('peertube-plugin-test-id-pass-auth-one')
38 expect(crashAuth.weight).to.equal(50)
39 })
40
e1c55031 41 it('Should not login', async function () {
89d241a7 42 await server.login.login({ user: { username: 'toto', password: 'password' }, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
7fed6375
C
43 })
44
e1c55031 45 it('Should login Spyro, create the user and use the token', async function () {
89d241a7 46 const accessToken = await server.login.getAccessToken({ username: 'spyro', password: 'spyro password' })
7fed6375 47
89d241a7 48 const body = await server.users.getMyInfo({ token: accessToken })
e1c55031 49
e1c55031
C
50 expect(body.username).to.equal('spyro')
51 expect(body.account.displayName).to.equal('Spyro the Dragon')
52 expect(body.role).to.equal(UserRole.USER)
7fed6375
C
53 })
54
e1c55031 55 it('Should login Crash, create the user and use the token', async function () {
e307e4fc 56 {
89d241a7 57 const body = await server.login.login({ user: { username: 'crash', password: 'crash password' } })
41d1d075
C
58 crashAccessToken = body.access_token
59 crashRefreshToken = body.refresh_token
e307e4fc 60 }
e1c55031 61
e307e4fc 62 {
89d241a7 63 const body = await server.users.getMyInfo({ token: crashAccessToken })
7fed6375 64
e307e4fc
C
65 expect(body.username).to.equal('crash')
66 expect(body.account.displayName).to.equal('Crash Bandicoot')
67 expect(body.role).to.equal(UserRole.MODERATOR)
68 }
7fed6375
C
69 })
70
e1c55031 71 it('Should login the first Laguna, create the user and use the token', async function () {
e307e4fc 72 {
89d241a7 73 const body = await server.login.login({ user: { username: 'laguna', password: 'laguna password' } })
41d1d075
C
74 lagunaAccessToken = body.access_token
75 lagunaRefreshToken = body.refresh_token
e307e4fc 76 }
7fed6375 77
e307e4fc 78 {
89d241a7 79 const body = await server.users.getMyInfo({ token: lagunaAccessToken })
e1c55031 80
e307e4fc
C
81 expect(body.username).to.equal('laguna')
82 expect(body.account.displayName).to.equal('laguna')
83 expect(body.role).to.equal(UserRole.USER)
84 }
85 })
86
87 it('Should refresh crash token, but not laguna token', async function () {
88 {
89d241a7 89 const resRefresh = await server.login.refreshToken({ refreshToken: crashRefreshToken })
e307e4fc
C
90 crashAccessToken = resRefresh.body.access_token
91 crashRefreshToken = resRefresh.body.refresh_token
92
89d241a7 93 const body = await server.users.getMyInfo({ token: crashAccessToken })
7926c5f9 94 expect(body.username).to.equal('crash')
e307e4fc
C
95 }
96
97 {
89d241a7 98 await server.login.refreshToken({ refreshToken: lagunaRefreshToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
e307e4fc 99 }
7fed6375
C
100 })
101
102 it('Should update Crash profile', async function () {
89d241a7 103 await server.users.updateMe({
7926c5f9 104 token: crashAccessToken,
e1c55031
C
105 displayName: 'Beautiful Crash',
106 description: 'Mutant eastern barred bandicoot'
107 })
7fed6375 108
89d241a7 109 const body = await server.users.getMyInfo({ token: crashAccessToken })
e1c55031 110
e1c55031
C
111 expect(body.account.displayName).to.equal('Beautiful Crash')
112 expect(body.account.description).to.equal('Mutant eastern barred bandicoot')
7fed6375
C
113 })
114
115 it('Should logout Crash', async function () {
89d241a7 116 await server.login.logout({ token: crashAccessToken })
7fed6375
C
117 })
118
e1c55031 119 it('Should have logged out Crash', async function () {
89d241a7 120 await server.servers.waitUntilLog('On logout for auth 1 - 2')
e307e4fc 121
89d241a7 122 await server.users.getMyInfo({ token: crashAccessToken, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
7fed6375
C
123 })
124
125 it('Should login Crash and keep the old existing profile', async function () {
89d241a7 126 crashAccessToken = await server.login.getAccessToken({ username: 'crash', password: 'crash password' })
7fed6375 127
89d241a7 128 const body = await server.users.getMyInfo({ token: crashAccessToken })
e1c55031 129
e1c55031
C
130 expect(body.username).to.equal('crash')
131 expect(body.account.displayName).to.equal('Beautiful Crash')
132 expect(body.account.description).to.equal('Mutant eastern barred bandicoot')
133 expect(body.role).to.equal(UserRole.MODERATOR)
7fed6375
C
134 })
135
055cfb11 136 it('Should reject token of laguna by the plugin hook', async function () {
e307e4fc
C
137 this.timeout(10000)
138
139 await wait(5000)
140
89d241a7 141 await server.users.getMyInfo({ token: lagunaAccessToken, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
e307e4fc
C
142 })
143
98813e69 144 it('Should reject an invalid username, email, role or display name', async function () {
89d241a7 145 const command = server.login
41d1d075
C
146
147 await command.login({ user: { username: 'ward', password: 'ward password' }, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
89d241a7 148 await server.servers.waitUntilLog('valid username')
98813e69 149
41d1d075 150 await command.login({ user: { username: 'kiros', password: 'kiros password' }, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
89d241a7 151 await server.servers.waitUntilLog('valid display name')
98813e69 152
41d1d075 153 await command.login({ user: { username: 'raine', password: 'raine password' }, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
89d241a7 154 await server.servers.waitUntilLog('valid role')
98813e69 155
41d1d075 156 await command.login({ user: { username: 'ellone', password: 'elonne password' }, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
89d241a7 157 await server.servers.waitUntilLog('valid email')
98813e69
C
158 })
159
a4995eb7 160 it('Should unregister spyro-auth and do not login existing Spyro', async function () {
89d241a7 161 await server.plugins.updateSettings({
a4995eb7
C
162 npmName: 'peertube-plugin-test-id-pass-auth-one',
163 settings: { disableSpyro: true }
164 })
165
89d241a7 166 const command = server.login
41d1d075
C
167 await command.login({ user: { username: 'spyro', password: 'spyro password' }, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
168 await command.login({ user: { username: 'spyro', password: 'fake' }, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
a4995eb7
C
169 })
170
171 it('Should have disabled this auth', async function () {
89d241a7 172 const config = await server.config.getConfig()
a4995eb7
C
173
174 const auths = config.plugin.registeredIdAndPassAuths
175 expect(auths).to.have.lengthOf(7)
176
177 const spyroAuth = auths.find(a => a.authName === 'spyro-auth')
178 expect(spyroAuth).to.not.exist
179 })
180
7fed6375 181 it('Should uninstall the plugin one and do not login existing Crash', async function () {
89d241a7 182 await server.plugins.uninstall({ npmName: 'peertube-plugin-test-id-pass-auth-one' })
7fed6375 183
89d241a7 184 await server.login.login({
41d1d075
C
185 user: { username: 'crash', password: 'crash password' },
186 expectedStatus: HttpStatusCode.BAD_REQUEST_400
187 })
7fed6375
C
188 })
189
9107d791 190 it('Should display the correct configuration', async function () {
89d241a7 191 const config = await server.config.getConfig()
9107d791
C
192
193 const auths = config.plugin.registeredIdAndPassAuths
194 expect(auths).to.have.lengthOf(6)
195
196 const crashAuth = auths.find(a => a.authName === 'crash-auth')
197 expect(crashAuth).to.not.exist
198 })
199
8bb71f2e 200 it('Should display plugin auth information in users list', async function () {
89d241a7 201 const { data } = await server.users.list()
8bb71f2e 202
7926c5f9
C
203 const root = data.find(u => u.username === 'root')
204 const crash = data.find(u => u.username === 'crash')
205 const laguna = data.find(u => u.username === 'laguna')
8bb71f2e
C
206
207 expect(root.pluginAuth).to.be.null
208 expect(crash.pluginAuth).to.equal('peertube-plugin-test-id-pass-auth-one')
209 expect(laguna.pluginAuth).to.equal('peertube-plugin-test-id-pass-auth-two')
210 })
211
7fed6375
C
212 after(async function () {
213 await cleanupTests([ server ])
214 })
215})