1
0
Fork 0
peertube/server/tests/api/server/email.ts

331 lines
10 KiB
TypeScript
Raw Normal View History

2020-01-31 15:56:52 +00:00
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
2018-01-30 14:16:24 +00:00
2022-08-17 13:44:32 +00:00
import { expect } from 'chai'
import { MockSmtpServer } from '@server/tests/shared'
2021-07-16 12:27:30 +00:00
import { HttpStatusCode } from '@shared/models'
import { cleanupTests, createSingleServer, PeerTubeServer, setAccessTokensToServers, waitJobs } from '@shared/server-commands'
2018-01-30 14:16:24 +00:00
describe('Test emails', function () {
2021-07-16 07:47:51 +00:00
let server: PeerTubeServer
2018-01-30 14:16:24 +00:00
let userId: number
let userId2: number
2018-08-13 14:57:13 +00:00
let userAccessToken: string
2020-07-07 12:34:16 +00:00
let videoShortUUID: string
2020-07-07 12:34:16 +00:00
let videoId: number
2018-08-13 14:57:13 +00:00
let videoUserUUID: string
2020-07-07 12:34:16 +00:00
2018-01-30 14:16:24 +00:00
let verificationString: string
let verificationString2: string
2020-07-07 12:34:16 +00:00
2018-01-30 14:16:24 +00:00
const emails: object[] = []
const user = {
username: 'user_1',
password: 'super_password'
}
2019-04-26 06:50:52 +00:00
let emailPort: number
2018-01-30 14:16:24 +00:00
before(async function () {
2019-07-29 09:59:29 +00:00
this.timeout(50000)
2018-01-30 14:16:24 +00:00
2019-04-26 06:50:52 +00:00
emailPort = await MockSmtpServer.Instance.collectEmails(emails)
2018-01-30 14:16:24 +00:00
const overrideConfig = {
smtp: {
2022-12-09 10:14:47 +00:00
hostname: '127.0.0.1',
2019-04-26 06:50:52 +00:00
port: emailPort
2018-01-30 14:16:24 +00:00
}
}
2021-07-16 07:47:51 +00:00
server = await createSingleServer(1, overrideConfig)
2018-01-30 14:16:24 +00:00
await setAccessTokensToServers([ server ])
2018-02-01 10:08:10 +00:00
{
2021-07-16 07:04:35 +00:00
const created = await server.users.create({ username: user.username, password: user.password })
2021-07-13 12:23:01 +00:00
userId = created.id
2018-08-13 14:57:13 +00:00
2021-07-16 07:04:35 +00:00
userAccessToken = await server.login.getAccessToken(user)
2018-08-13 14:57:13 +00:00
}
{
2021-07-15 08:02:54 +00:00
const attributes = { name: 'my super user video' }
2021-07-16 07:04:35 +00:00
const { uuid } = await server.videos.upload({ token: userAccessToken, attributes })
2021-07-15 08:02:54 +00:00
videoUserUUID = uuid
2018-02-01 10:08:10 +00:00
}
{
const attributes = {
name: 'my super name'
}
const { shortUUID, id } = await server.videos.upload({ attributes })
videoShortUUID = shortUUID
2021-07-15 08:02:54 +00:00
videoId = id
2018-02-01 10:08:10 +00:00
}
2018-01-30 14:16:24 +00:00
})
describe('When resetting user password', function () {
it('Should ask to reset the password', async function () {
2021-07-16 07:04:35 +00:00
await server.users.askResetPassword({ email: 'user_1@example.com' })
2018-01-30 14:16:24 +00:00
await waitJobs(server)
2018-01-30 14:16:24 +00:00
expect(emails).to.have.lengthOf(1)
const email = emails[0]
expect(email['from'][0]['name']).equal('PeerTube')
2022-12-09 10:14:47 +00:00
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
2018-01-30 14:16:24 +00:00
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains('password')
const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text'])
expect(verificationStringMatches).not.to.be.null
verificationString = verificationStringMatches[1]
expect(verificationString).to.have.length.above(2)
const userIdMatches = /userId=([0-9]+)/.exec(email['text'])
expect(userIdMatches).not.to.be.null
userId = parseInt(userIdMatches[1], 10)
expect(verificationString).to.not.be.undefined
})
it('Should not reset the password with an invalid verification string', async function () {
2021-07-16 07:04:35 +00:00
await server.users.resetPassword({
2021-07-13 12:23:01 +00:00
userId,
verificationString: verificationString + 'b',
password: 'super_password2',
expectedStatus: HttpStatusCode.FORBIDDEN_403
})
2018-01-30 14:16:24 +00:00
})
it('Should reset the password', async function () {
2021-07-16 07:04:35 +00:00
await server.users.resetPassword({ userId, verificationString, password: 'super_password2' })
2018-01-30 14:16:24 +00:00
})
2020-08-12 07:15:31 +00:00
it('Should not reset the password with the same verification string', async function () {
2021-07-16 07:04:35 +00:00
await server.users.resetPassword({
2021-07-13 12:23:01 +00:00
userId,
verificationString,
password: 'super_password3',
expectedStatus: HttpStatusCode.FORBIDDEN_403
})
2020-08-12 07:15:31 +00:00
})
2018-01-30 14:16:24 +00:00
it('Should login with this new password', async function () {
user.password = 'super_password2'
2021-07-16 07:04:35 +00:00
await server.login.getAccessToken(user)
2018-01-30 14:16:24 +00:00
})
})
describe('When creating a user without password', function () {
2021-07-13 12:23:01 +00:00
it('Should send a create password email', async function () {
this.timeout(10000)
2021-07-16 07:04:35 +00:00
await server.users.create({ username: 'create_password', password: '' })
await waitJobs(server)
expect(emails).to.have.lengthOf(2)
const email = emails[1]
expect(email['from'][0]['name']).equal('PeerTube')
2022-12-09 10:14:47 +00:00
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
expect(email['to'][0]['address']).equal('create_password@example.com')
expect(email['subject']).contains('account')
expect(email['subject']).contains('password')
const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text'])
expect(verificationStringMatches).not.to.be.null
verificationString2 = verificationStringMatches[1]
expect(verificationString2).to.have.length.above(2)
const userIdMatches = /userId=([0-9]+)/.exec(email['text'])
expect(userIdMatches).not.to.be.null
userId2 = parseInt(userIdMatches[1], 10)
})
it('Should not reset the password with an invalid verification string', async function () {
2021-07-16 07:04:35 +00:00
await server.users.resetPassword({
2021-07-13 12:23:01 +00:00
userId: userId2,
verificationString: verificationString2 + 'c',
password: 'newly_created_password',
expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
it('Should reset the password', async function () {
2021-07-16 07:04:35 +00:00
await server.users.resetPassword({
2021-07-13 12:23:01 +00:00
userId: userId2,
verificationString: verificationString2,
password: 'newly_created_password'
})
})
it('Should login with this new password', async function () {
2021-07-16 07:04:35 +00:00
await server.login.getAccessToken({
username: 'create_password',
password: 'newly_created_password'
})
})
})
2020-07-08 13:51:46 +00:00
describe('When creating an abuse', function () {
2018-02-01 10:08:10 +00:00
it('Should send the notification email', async function () {
this.timeout(10000)
const reason = 'my super bad reason'
2021-12-09 14:44:54 +00:00
await server.abuses.report({ token: userAccessToken, videoId, reason })
2018-02-01 10:08:10 +00:00
await waitJobs(server)
expect(emails).to.have.lengthOf(3)
2018-02-01 10:08:10 +00:00
const email = emails[2]
2018-02-01 10:08:10 +00:00
expect(email['from'][0]['name']).equal('PeerTube')
2022-12-09 10:14:47 +00:00
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
2019-04-26 06:50:52 +00:00
expect(email['to'][0]['address']).equal('admin' + server.internalServerNumber + '@example.com')
2018-02-01 10:08:10 +00:00
expect(email['subject']).contains('abuse')
expect(email['text']).contains(videoShortUUID)
2018-02-01 10:08:10 +00:00
})
})
2019-02-21 13:28:06 +00:00
describe('When blocking/unblocking user', function () {
2018-08-08 15:36:10 +00:00
it('Should send the notification email when blocking a user', async function () {
this.timeout(10000)
const reason = 'my super bad reason'
2021-07-16 07:04:35 +00:00
await server.users.banUser({ userId, reason })
2018-08-08 15:36:10 +00:00
await waitJobs(server)
expect(emails).to.have.lengthOf(4)
2018-08-08 15:36:10 +00:00
const email = emails[3]
2018-08-08 15:36:10 +00:00
expect(email['from'][0]['name']).equal('PeerTube')
2022-12-09 10:14:47 +00:00
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
2018-08-08 15:36:10 +00:00
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains(' blocked')
expect(email['text']).contains(' blocked')
expect(email['text']).contains('bad reason')
2018-08-08 15:36:10 +00:00
})
it('Should send the notification email when unblocking a user', async function () {
this.timeout(10000)
2021-07-16 07:04:35 +00:00
await server.users.unbanUser({ userId })
2018-08-08 15:36:10 +00:00
await waitJobs(server)
expect(emails).to.have.lengthOf(5)
2018-08-08 15:36:10 +00:00
const email = emails[4]
2018-08-08 15:36:10 +00:00
expect(email['from'][0]['name']).equal('PeerTube')
2022-12-09 10:14:47 +00:00
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
2018-08-08 15:36:10 +00:00
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains(' unblocked')
expect(email['text']).contains(' unblocked')
})
})
2018-08-13 14:57:13 +00:00
describe('When blacklisting a video', function () {
it('Should send the notification email', async function () {
this.timeout(10000)
const reason = 'my super reason'
2021-07-16 07:04:35 +00:00
await server.blacklist.add({ videoId: videoUserUUID, reason })
2018-08-13 14:57:13 +00:00
await waitJobs(server)
expect(emails).to.have.lengthOf(6)
2018-08-13 14:57:13 +00:00
const email = emails[5]
2018-08-13 14:57:13 +00:00
expect(email['from'][0]['name']).equal('PeerTube')
2022-12-09 10:14:47 +00:00
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
2018-08-13 14:57:13 +00:00
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains(' blacklisted')
expect(email['text']).contains('my super user video')
expect(email['text']).contains('my super reason')
})
it('Should send the notification email', async function () {
this.timeout(10000)
2021-07-16 07:04:35 +00:00
await server.blacklist.remove({ videoId: videoUserUUID })
2018-08-13 14:57:13 +00:00
await waitJobs(server)
expect(emails).to.have.lengthOf(7)
2018-08-13 14:57:13 +00:00
const email = emails[6]
2018-08-13 14:57:13 +00:00
expect(email['from'][0]['name']).equal('PeerTube')
2022-12-09 10:14:47 +00:00
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
2018-08-13 14:57:13 +00:00
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains(' unblacklisted')
expect(email['text']).contains('my super user video')
})
it('Should have the manage preferences link in the email', async function () {
const email = emails[6]
expect(email['text']).to.contain('Manage your notification preferences')
})
2018-08-13 14:57:13 +00:00
})
describe('When verifying a user email', function () {
it('Should ask to send the verification email', async function () {
this.timeout(10000)
2021-07-16 07:04:35 +00:00
await server.users.askSendVerifyEmail({ email: 'user_1@example.com' })
await waitJobs(server)
expect(emails).to.have.lengthOf(8)
const email = emails[7]
expect(email['from'][0]['name']).equal('PeerTube')
2022-12-09 10:14:47 +00:00
expect(email['from'][0]['address']).equal('test-admin@127.0.0.1')
expect(email['to'][0]['address']).equal('user_1@example.com')
expect(email['subject']).contains('Verify')
const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text'])
expect(verificationStringMatches).not.to.be.null
verificationString = verificationStringMatches[1]
expect(verificationString).to.not.be.undefined
expect(verificationString).to.have.length.above(2)
const userIdMatches = /userId=([0-9]+)/.exec(email['text'])
expect(userIdMatches).not.to.be.null
userId = parseInt(userIdMatches[1], 10)
})
it('Should not verify the email with an invalid verification string', async function () {
2021-07-16 07:04:35 +00:00
await server.users.verifyEmail({
2021-07-13 12:23:01 +00:00
userId,
verificationString: verificationString + 'b',
isPendingEmail: false,
expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
it('Should verify the email', async function () {
2021-07-16 07:04:35 +00:00
await server.users.verifyEmail({ userId, verificationString })
})
})
2019-04-24 13:10:37 +00:00
after(async function () {
2019-01-08 14:51:52 +00:00
MockSmtpServer.Instance.kill()
2019-04-24 13:10:37 +00:00
await cleanupTests([ server ])
2018-01-30 14:16:24 +00:00
})
})