+ expect(email['to'][0]['address']).equal('create_password@example.com')
+ expect(email['subject']).contains('account')
+ expect(email['subject']).contains('password')
+
+ const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text'])
+ expect(verificationStringMatches).not.to.be.null
+
+ verificationString2 = verificationStringMatches[1]
+ expect(verificationString2).to.have.length.above(2)
+
+ const userIdMatches = /userId=([0-9]+)/.exec(email['text'])
+ expect(userIdMatches).not.to.be.null
+
+ userId2 = parseInt(userIdMatches[1], 10)
+ })
+
+ it('Should not reset the password with an invalid verification string', async function () {
+ await server.users.resetPassword({
+ userId: userId2,
+ verificationString: verificationString2 + 'c',
+ password: 'newly_created_password',
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
+ })
+ })
+
+ it('Should reset the password', async function () {
+ await server.users.resetPassword({
+ userId: userId2,
+ verificationString: verificationString2,
+ password: 'newly_created_password'
+ })
+ })
+
+ it('Should login with this new password', async function () {
+ await server.login.getAccessToken({
+ username: 'create_password',
+ password: 'newly_created_password'
+ })
+ })
+ })
+
+ describe('When creating an abuse', function () {
+
+ it('Should send the notification email', async function () {
+ this.timeout(10000)
+
+ const reason = 'my super bad reason'
+ await server.abuses.report({ token: userAccessToken, videoId, reason })
+
+ await waitJobs(server)
+ expect(emails).to.have.lengthOf(3)
+
+ const email = emails[2]
+
+ expect(email['from'][0]['name']).equal('PeerTube')
+ expect(email['from'][0]['address']).equal('test-admin@localhost')
+ expect(email['to'][0]['address']).equal('admin' + server.internalServerNumber + '@example.com')