import 'mocha'
import * as chai from 'chai'
+import { HttpStatusCode } from '../../../../shared/core-utils/miscs/http-error-codes'
import {
- addVideoToBlacklist,
askResetPassword,
askSendVerifyEmail,
blockUser,
cleanupTests,
createUser,
flushAndRunServer,
- removeVideoFromBlacklist,
- reportAbuse,
resetPassword,
ServerInfo,
setAccessTokensToServers,
userLogin,
verifyEmail
} from '../../../../shared/extra-utils'
-import { MockSmtpServer } from '../../../../shared/extra-utils/miscs/email'
+import { MockSmtpServer } from '../../../../shared/extra-utils/mock-servers/mock-email'
import { waitJobs } from '../../../../shared/extra-utils/server/jobs'
const expect = chai.expect
const email = emails[0]
- expect(email['from'][0]['name']).equal('localhost:' + server.port)
+ expect(email['from'][0]['name']).equal('PeerTube')
expect(email['from'][0]['address']).equal('test-admin@localhost')
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains('password')
})
it('Should not reset the password with an invalid verification string', async function () {
- await resetPassword(server.url, userId, verificationString + 'b', 'super_password2', 403)
+ await resetPassword(server.url, userId, verificationString + 'b', 'super_password2', HttpStatusCode.FORBIDDEN_403)
})
it('Should reset the password', async function () {
await resetPassword(server.url, userId, verificationString, 'super_password2')
})
+ it('Should not reset the password with the same verification string', async function () {
+ await resetPassword(server.url, userId, verificationString, 'super_password3', HttpStatusCode.FORBIDDEN_403)
+ })
+
it('Should login with this new password', async function () {
user.password = 'super_password2'
const email = emails[1]
- expect(email['from'][0]['name']).equal('localhost:' + server.port)
+ expect(email['from'][0]['name']).equal('PeerTube')
expect(email['from'][0]['address']).equal('test-admin@localhost')
expect(email['to'][0]['address']).equal('create_password@example.com')
expect(email['subject']).contains('account')
})
it('Should not reset the password with an invalid verification string', async function () {
- await resetPassword(server.url, userId2, verificationString2 + 'c', 'newly_created_password', 403)
+ await resetPassword(server.url, userId2, verificationString2 + 'c', 'newly_created_password', HttpStatusCode.FORBIDDEN_403)
})
it('Should reset the password', async function () {
})
})
- describe('When creating a video abuse', function () {
+ describe('When creating an abuse', function () {
it('Should send the notification email', async function () {
this.timeout(10000)
const reason = 'my super bad reason'
- await reportAbuse({ url: server.url, token: server.accessToken, videoId, reason })
+ await server.abusesCommand.report({ videoId, reason })
await waitJobs(server)
expect(emails).to.have.lengthOf(3)
const email = emails[2]
- expect(email['from'][0]['name']).equal('localhost:' + server.port)
+ expect(email['from'][0]['name']).equal('PeerTube')
expect(email['from'][0]['address']).equal('test-admin@localhost')
expect(email['to'][0]['address']).equal('admin' + server.internalServerNumber + '@example.com')
expect(email['subject']).contains('abuse')
this.timeout(10000)
const reason = 'my super bad reason'
- await blockUser(server.url, userId, server.accessToken, 204, reason)
+ await blockUser(server.url, userId, server.accessToken, HttpStatusCode.NO_CONTENT_204, reason)
await waitJobs(server)
expect(emails).to.have.lengthOf(4)
const email = emails[3]
- expect(email['from'][0]['name']).equal('localhost:' + server.port)
+ expect(email['from'][0]['name']).equal('PeerTube')
expect(email['from'][0]['address']).equal('test-admin@localhost')
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains(' blocked')
expect(email['text']).contains(' blocked')
- expect(email['text']).contains(reason)
+ expect(email['text']).contains('bad reason')
})
it('Should send the notification email when unblocking a user', async function () {
this.timeout(10000)
- await unblockUser(server.url, userId, server.accessToken, 204)
+ await unblockUser(server.url, userId, server.accessToken, HttpStatusCode.NO_CONTENT_204)
await waitJobs(server)
expect(emails).to.have.lengthOf(5)
const email = emails[4]
- expect(email['from'][0]['name']).equal('localhost:' + server.port)
+ expect(email['from'][0]['name']).equal('PeerTube')
expect(email['from'][0]['address']).equal('test-admin@localhost')
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains(' unblocked')
this.timeout(10000)
const reason = 'my super reason'
- await addVideoToBlacklist(server.url, server.accessToken, videoUserUUID, reason)
+ await server.blacklistCommand.add({ videoId: videoUserUUID, reason })
await waitJobs(server)
expect(emails).to.have.lengthOf(6)
const email = emails[5]
- expect(email['from'][0]['name']).equal('localhost:' + server.port)
+ expect(email['from'][0]['name']).equal('PeerTube')
expect(email['from'][0]['address']).equal('test-admin@localhost')
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains(' blacklisted')
it('Should send the notification email', async function () {
this.timeout(10000)
- await removeVideoFromBlacklist(server.url, server.accessToken, videoUserUUID)
+ await server.blacklistCommand.remove({ videoId: videoUserUUID })
await waitJobs(server)
expect(emails).to.have.lengthOf(7)
const email = emails[6]
- expect(email['from'][0]['name']).equal('localhost:' + server.port)
+ expect(email['from'][0]['name']).equal('PeerTube')
expect(email['from'][0]['address']).equal('test-admin@localhost')
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains(' unblacklisted')
expect(email['text']).contains('my super user video')
})
+
+ it('Should have the manage preferences link in the email', async function () {
+ const email = emails[6]
+ expect(email['text']).to.contain('Manage your notification preferences')
+ })
})
describe('When verifying a user email', function () {
const email = emails[7]
- expect(email['from'][0]['name']).equal('localhost:' + server.port)
+ expect(email['from'][0]['name']).equal('PeerTube')
expect(email['from'][0]['address']).equal('test-admin@localhost')
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains('Verify')
})
it('Should not verify the email with an invalid verification string', async function () {
- await verifyEmail(server.url, userId, verificationString + 'b', false, 403)
+ await verifyEmail(server.url, userId, verificationString + 'b', false, HttpStatusCode.FORBIDDEN_403)
})
it('Should verify the email', async function () {