/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */ import { expect } from 'chai' import { MockSmtpServer } from '@server/tests/shared' import { HttpStatusCode } from '@shared/models' import { cleanupTests, createSingleServer, PeerTubeServer, setAccessTokensToServers, waitJobs } from '@shared/server-commands' describe('Test emails', function () { let server: PeerTubeServer let userId: number let userId2: number let userAccessToken: string let videoShortUUID: string let videoId: number let videoUserUUID: string let verificationString: string let verificationString2: string const emails: object[] = [] const user = { username: 'user_1', password: 'super_password' } let emailPort: number before(async function () { this.timeout(50000) emailPort = await MockSmtpServer.Instance.collectEmails(emails) const overrideConfig = { smtp: { hostname: '127.0.0.1', port: emailPort } } server = await createSingleServer(1, overrideConfig) await setAccessTokensToServers([ server ]) { const created = await server.users.create({ username: user.username, password: user.password }) userId = created.id userAccessToken = await server.login.getAccessToken(user) } { const attributes = { name: 'my super user video' } const { uuid } = await server.videos.upload({ token: userAccessToken, attributes }) videoUserUUID = uuid } { const attributes = { name: 'my super name' } const { shortUUID, id } = await server.videos.upload({ attributes }) videoShortUUID = shortUUID videoId = id } }) describe('When resetting user password', function () { it('Should ask to reset the password', async function () { await server.users.askResetPassword({ email: 'user_1@example.com' }) await waitJobs(server) expect(emails).to.have.lengthOf(1) const email = emails[0] expect(email['from'][0]['name']).equal('PeerTube') expect(email['from'][0]['address']).equal('test-admin@127.0.0.1') expect(email['to'][0]['address']).equal('user_1@example.com') expect(email['subject']).contains('password') const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text']) expect(verificationStringMatches).not.to.be.null verificationString = verificationStringMatches[1] expect(verificationString).to.have.length.above(2) const userIdMatches = /userId=([0-9]+)/.exec(email['text']) expect(userIdMatches).not.to.be.null userId = parseInt(userIdMatches[1], 10) expect(verificationString).to.not.be.undefined }) it('Should not reset the password with an invalid verification string', async function () { await server.users.resetPassword({ userId, verificationString: verificationString + 'b', password: 'super_password2', expectedStatus: HttpStatusCode.FORBIDDEN_403 }) }) it('Should reset the password', async function () { await server.users.resetPassword({ userId, verificationString, password: 'super_password2' }) }) it('Should not reset the password with the same verification string', async function () { await server.users.resetPassword({ userId, verificationString, password: 'super_password3', expectedStatus: HttpStatusCode.FORBIDDEN_403 }) }) it('Should login with this new password', async function () { user.password = 'super_password2' await server.login.getAccessToken(user) }) }) describe('When creating a user without password', function () { it('Should send a create password email', async function () { this.timeout(10000) await server.users.create({ username: 'create_password', password: '' }) await waitJobs(server) expect(emails).to.have.lengthOf(2) const email = emails[1] expect(email['from'][0]['name']).equal('PeerTube') expect(email['from'][0]['address']).equal('test-admin@127.0.0.1') expect(email['to'][0]['address']).equal('create_password@example.com') expect(email['subject']).contains('account') expect(email['subject']).contains('password') const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text']) expect(verificationStringMatches).not.to.be.null verificationString2 = verificationStringMatches[1] expect(verificationString2).to.have.length.above(2) const userIdMatches = /userId=([0-9]+)/.exec(email['text']) expect(userIdMatches).not.to.be.null userId2 = parseInt(userIdMatches[1], 10) }) it('Should not reset the password with an invalid verification string', async function () { await server.users.resetPassword({ userId: userId2, verificationString: verificationString2 + 'c', password: 'newly_created_password', expectedStatus: HttpStatusCode.FORBIDDEN_403 }) }) it('Should reset the password', async function () { await server.users.resetPassword({ userId: userId2, verificationString: verificationString2, password: 'newly_created_password' }) }) it('Should login with this new password', async function () { await server.login.getAccessToken({ username: 'create_password', password: 'newly_created_password' }) }) }) describe('When creating an abuse', function () { it('Should send the notification email', async function () { this.timeout(10000) const reason = 'my super bad reason' await server.abuses.report({ token: userAccessToken, videoId, reason }) await waitJobs(server) expect(emails).to.have.lengthOf(3) const email = emails[2] expect(email['from'][0]['name']).equal('PeerTube') expect(email['from'][0]['address']).equal('test-admin@127.0.0.1') expect(email['to'][0]['address']).equal('admin' + server.internalServerNumber + '@example.com') expect(email['subject']).contains('abuse') expect(email['text']).contains(videoShortUUID) }) }) describe('When blocking/unblocking user', function () { it('Should send the notification email when blocking a user', async function () { this.timeout(10000) const reason = 'my super bad reason' await server.users.banUser({ userId, reason }) await waitJobs(server) expect(emails).to.have.lengthOf(4) const email = emails[3] expect(email['from'][0]['name']).equal('PeerTube') expect(email['from'][0]['address']).equal('test-admin@127.0.0.1') expect(email['to'][0]['address']).equal('user_1@example.com') expect(email['subject']).contains(' blocked') expect(email['text']).contains(' blocked') expect(email['text']).contains('bad reason') }) it('Should send the notification email when unblocking a user', async function () { this.timeout(10000) await server.users.unbanUser({ userId }) await waitJobs(server) expect(emails).to.have.lengthOf(5) const email = emails[4] expect(email['from'][0]['name']).equal('PeerTube') expect(email['from'][0]['address']).equal('test-admin@127.0.0.1') expect(email['to'][0]['address']).equal('user_1@example.com') expect(email['subject']).contains(' unblocked') expect(email['text']).contains(' unblocked') }) }) describe('When blacklisting a video', function () { it('Should send the notification email', async function () { this.timeout(10000) const reason = 'my super reason' await server.blacklist.add({ videoId: videoUserUUID, reason }) await waitJobs(server) expect(emails).to.have.lengthOf(6) const email = emails[5] expect(email['from'][0]['name']).equal('PeerTube') expect(email['from'][0]['address']).equal('test-admin@127.0.0.1') expect(email['to'][0]['address']).equal('user_1@example.com') expect(email['subject']).contains(' blacklisted') expect(email['text']).contains('my super user video') expect(email['text']).contains('my super reason') }) it('Should send the notification email', async function () { this.timeout(10000) await server.blacklist.remove({ videoId: videoUserUUID }) await waitJobs(server) expect(emails).to.have.lengthOf(7) const email = emails[6] expect(email['from'][0]['name']).equal('PeerTube') expect(email['from'][0]['address']).equal('test-admin@127.0.0.1') expect(email['to'][0]['address']).equal('user_1@example.com') expect(email['subject']).contains(' unblacklisted') expect(email['text']).contains('my super user video') }) it('Should have the manage preferences link in the email', async function () { const email = emails[6] expect(email['text']).to.contain('Manage your notification preferences') }) }) describe('When verifying a user email', function () { it('Should ask to send the verification email', async function () { this.timeout(10000) await server.users.askSendVerifyEmail({ email: 'user_1@example.com' }) await waitJobs(server) expect(emails).to.have.lengthOf(8) const email = emails[7] expect(email['from'][0]['name']).equal('PeerTube') expect(email['from'][0]['address']).equal('test-admin@127.0.0.1') expect(email['to'][0]['address']).equal('user_1@example.com') expect(email['subject']).contains('Verify') const verificationStringMatches = /verificationString=([a-z0-9]+)/.exec(email['text']) expect(verificationStringMatches).not.to.be.null verificationString = verificationStringMatches[1] expect(verificationString).to.not.be.undefined expect(verificationString).to.have.length.above(2) const userIdMatches = /userId=([0-9]+)/.exec(email['text']) expect(userIdMatches).not.to.be.null userId = parseInt(userIdMatches[1], 10) }) it('Should not verify the email with an invalid verification string', async function () { await server.users.verifyEmail({ userId, verificationString: verificationString + 'b', isPendingEmail: false, expectedStatus: HttpStatusCode.FORBIDDEN_403 }) }) it('Should verify the email', async function () { await server.users.verifyEmail({ userId, verificationString }) }) }) after(async function () { MockSmtpServer.Instance.kill() await cleanupTests([ server ]) }) })