+ expect(email['from'][0]['name']).equal('PeerTube')
+ expect(email['from'][0]['address']).equal('test-admin@localhost')
+ expect(email['to'][0]['address']).equal('create_password@example.com')
+ expect(email['subject']).contains('account')
+ expect(email['subject']).contains('password')
+
+ const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text'])
+ expect(verificationStringMatches).not.to.be.null
+
+ verificationString2 = verificationStringMatches[1]
+ expect(verificationString2).to.have.length.above(2)
+
+ const userIdMatches = /userId=([0-9]+)/.exec(email['text'])
+ expect(userIdMatches).not.to.be.null
+
+ userId2 = parseInt(userIdMatches[1], 10)
+ })
+
+ it('Should not reset the password with an invalid verification string', async function () {
+ await resetPassword(server.url, userId2, verificationString2 + 'c', 'newly_created_password', HttpStatusCode.FORBIDDEN_403)
+ })
+
+ it('Should reset the password', async function () {
+ await resetPassword(server.url, userId2, verificationString2, 'newly_created_password')
+ })
+
+ it('Should login with this new password', async function () {
+ await userLogin(server, {
+ username: 'create_password',
+ password: 'newly_created_password'
+ })
+ })
+ })
+
+ describe('When creating an abuse', function () {
+ it('Should send the notification email', async function () {
+ this.timeout(10000)
+
+ const reason = 'my super bad reason'
+ await reportAbuse({ url: server.url, token: server.accessToken, videoId, reason })
+
+ await waitJobs(server)
+ expect(emails).to.have.lengthOf(3)
+
+ const email = emails[2]
+
+ expect(email['from'][0]['name']).equal('PeerTube')