Files
cloudron-box/src/routes/test/settings-test.js
T

530 lines
21 KiB
JavaScript
Raw Normal View History

/* global it:false */
/* global describe:false */
/* global before:false */
/* global after:false */
'use strict';
var appdb = require('../../appdb.js'),
async = require('async'),
2016-11-08 17:33:43 +05:30
child_process = require('child_process'),
config = require('../../config.js'),
database = require('../../database.js'),
expect = require('expect.js'),
2015-10-27 18:38:13 +01:00
path = require('path'),
paths = require('../../paths.js'),
2015-12-15 09:12:52 -08:00
superagent = require('superagent'),
server = require('../../server.js'),
settings = require('../../settings.js'),
fs = require('fs'),
nock = require('nock'),
userdb = require('../../userdb.js');
var SERVER_URL = 'http://localhost:' + config.get('port');
2016-04-13 16:50:20 -07:00
var USERNAME = 'superadmin', PASSWORD = 'Foobar?1337', EMAIL ='silly@me.com';
var token = null;
var server;
function setup(done) {
2015-10-28 16:00:51 +01:00
config.set('fqdn', 'foobar.com');
async.series([
server.start.bind(server),
2016-08-30 21:12:14 -07:00
database._clear,
function createAdmin(callback) {
var scope1 = nock(config.apiServerOrigin()).get('/api/v1/boxes/' + config.fqdn() + '/setup/verify?setupToken=somesetuptoken').reply(200, {});
var scope2 = nock(config.apiServerOrigin()).post('/api/v1/boxes/' + config.fqdn() + '/setup/done?setupToken=somesetuptoken').reply(201, {});
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/cloudron/activate')
.query({ setupToken: 'somesetuptoken' })
.send({ username: USERNAME, password: PASSWORD, email: EMAIL })
.end(function (error, result) {
expect(result).to.be.ok();
expect(result.statusCode).to.eql(201);
expect(scope1.isDone()).to.be.ok();
expect(scope2.isDone()).to.be.ok();
// stash token for further use
token = result.body.token;
callback();
});
},
function addApp(callback) {
var manifest = { version: '0.0.1', manifestVersion: 1, dockerImage: 'foo', healthCheckPath: '/', httpPort: 3, title: 'ok' };
2016-06-17 16:43:35 -05:00
appdb.add('appid', 'appStoreId', manifest, 'location', [ ] /* portBindings */, { }, callback);
}
], done);
}
function cleanup(done) {
database._clear(function (error) {
expect(!error).to.be.ok();
server.stop(done);
});
}
describe('Settings API', function () {
this.timeout(10000);
before(setup);
after(cleanup);
describe('autoupdate_pattern', function () {
it('can get auto update pattern (default)', function (done) {
2015-12-15 09:12:52 -08:00
superagent.get(SERVER_URL + '/api/v1/settings/autoupdate_pattern')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.pattern).to.be.ok();
2015-12-15 09:12:52 -08:00
done();
});
});
it('cannot set autoupdate_pattern without pattern', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/autoupdate_pattern')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(400);
done();
});
});
it('can set autoupdate_pattern', function (done) {
var eventPattern = null;
settings.events.on(settings.AUTOUPDATE_PATTERN_KEY, function (pattern) {
eventPattern = pattern;
});
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/autoupdate_pattern')
.query({ access_token: token })
.send({ pattern: '00 30 11 * * 1-5' })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(eventPattern === '00 30 11 * * 1-5').to.be.ok();
done();
});
});
it('can set autoupdate_pattern to never', function (done) {
var eventPattern = null;
settings.events.on(settings.AUTOUPDATE_PATTERN_KEY, function (pattern) {
eventPattern = pattern;
});
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/autoupdate_pattern')
.query({ access_token: token })
.send({ pattern: 'never' })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(eventPattern).to.eql('never');
done();
});
});
it('cannot set invalid autoupdate_pattern', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/autoupdate_pattern')
.query({ access_token: token })
.send({ pattern: '1 3 x 5 6' })
.end(function (err, res) {
expect(res.statusCode).to.equal(400);
done();
});
});
});
describe('cloudron_name', function () {
var name = 'foobar';
it('get default succeeds', function (done) {
2015-12-15 09:12:52 -08:00
superagent.get(SERVER_URL + '/api/v1/settings/cloudron_name')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.name).to.be.ok();
2015-12-15 09:12:52 -08:00
done();
});
});
it('cannot set without name', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/cloudron_name')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(400);
done();
});
});
it('cannot set empty name', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/cloudron_name')
.query({ access_token: token })
.send({ name: '' })
.end(function (err, res) {
expect(res.statusCode).to.equal(400);
done();
});
});
it('set succeeds', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/cloudron_name')
.query({ access_token: token })
.send({ name: name })
.end(function (err, res) {
2016-07-28 12:40:36 +02:00
expect(res.statusCode).to.equal(202);
done();
});
});
it('get succeeds', function (done) {
2015-12-15 09:12:52 -08:00
superagent.get(SERVER_URL + '/api/v1/settings/cloudron_name')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.name).to.eql(name);
2015-12-15 09:12:52 -08:00
done();
});
});
});
describe('cloudron_avatar', function () {
it('get default succeeds', function (done) {
2015-12-15 09:12:52 -08:00
superagent.get(SERVER_URL + '/api/v1/settings/cloudron_avatar')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body).to.be.a(Buffer);
2015-12-15 09:12:52 -08:00
done();
});
});
it('cannot set without data', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/cloudron_avatar')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(400);
done();
});
});
it('set succeeds', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/cloudron_avatar')
.query({ access_token: token })
2015-11-05 19:20:59 +01:00
.attach('avatar', paths.CLOUDRON_DEFAULT_AVATAR_FILE)
.end(function (err, res) {
expect(res.statusCode).to.equal(202);
done();
});
});
it('get succeeds', function (done) {
2015-12-15 09:12:52 -08:00
superagent.get(SERVER_URL + '/api/v1/settings/cloudron_avatar')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
2015-11-05 19:20:59 +01:00
expect(res.body.toString()).to.eql(fs.readFileSync(paths.CLOUDRON_DEFAULT_AVATAR_FILE, 'utf-8'));
done(err);
});
});
});
2015-10-26 00:59:20 -07:00
describe('dns_config', function () {
it('get dns_config fails', function (done) {
2015-12-15 09:12:52 -08:00
superagent.get(SERVER_URL + '/api/v1/settings/dns_config')
2015-10-26 00:59:20 -07:00
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
2016-10-25 11:37:24 -07:00
expect(res.body).to.eql({ provider: 'noop' });
2015-12-15 09:12:52 -08:00
done();
2015-10-26 00:59:20 -07:00
});
});
it('cannot set without data', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/dns_config')
2015-10-26 00:59:20 -07:00
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(400);
done();
});
});
it('set succeeds', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/dns_config')
2015-10-26 00:59:20 -07:00
.query({ access_token: token })
.send({ provider: 'route53', accessKeyId: 'accessKey', secretAccessKey: 'secretAccessKey' })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
done();
});
});
it('get succeeds', function (done) {
2015-12-15 09:12:52 -08:00
superagent.get(SERVER_URL + '/api/v1/settings/dns_config')
2015-10-26 00:59:20 -07:00
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body).to.eql({ provider: 'route53', accessKeyId: 'accessKey', secretAccessKey: 'secretAccessKey', region: 'us-east-1', endpoint: null });
2015-12-15 09:12:52 -08:00
done();
2015-10-26 00:59:20 -07:00
});
});
});
2015-10-27 18:38:13 +01:00
2016-08-30 21:12:14 -07:00
describe('mail_config', function () {
it('get mail_config succeeds', function (done) {
superagent.get(SERVER_URL + '/api/v1/settings/mail_config')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body).to.eql({ enabled: false });
done();
});
});
it('cannot set without enabled field', function (done) {
superagent.post(SERVER_URL + '/api/v1/settings/mail_config')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(400);
done();
});
});
it('set succeeds', function (done) {
superagent.post(SERVER_URL + '/api/v1/settings/mail_config')
.query({ access_token: token })
.send({ enabled: true })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
done();
});
});
it('get succeeds', function (done) {
superagent.get(SERVER_URL + '/api/v1/settings/mail_config')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body).to.eql({ enabled: true });
done();
});
});
});
2015-10-27 18:38:13 +01:00
describe('Certificates API', function () {
2016-11-08 17:33:43 +05:30
var validCert0, validKey0, // foobar.com
validCert1, validKey1; // *.foobar.com
2015-10-27 18:38:13 +01:00
2016-11-08 17:33:43 +05:30
before(function () {
child_process.execSync('openssl req -subj "/CN=foobar.com/O=My Company Name LTD./C=US" -new -newkey rsa:2048 -days 365 -nodes -x509 -keyout /tmp/server.key -out /tmp/server.crt');
validKey0 = fs.readFileSync('/tmp/server.key', 'utf8');
validCert0 = fs.readFileSync('/tmp/server.crt', 'utf8');
child_process.execSync('openssl req -subj "/CN=*.foobar.com/O=My Company Name LTD./C=US" -new -newkey rsa:2048 -days 365 -nodes -x509 -keyout /tmp/server.key -out /tmp/server.crt');
validKey1 = fs.readFileSync('/tmp/server.key', 'utf8');
validCert1 = fs.readFileSync('/tmp/server.crt', 'utf8');
});
2015-10-27 18:38:13 +01:00
it('cannot set certificate without token', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/certificate')
2015-10-27 18:38:13 +01:00
.end(function (error, result) {
expect(result.statusCode).to.equal(401);
done();
});
});
it('cannot set certificate without certificate', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/certificate')
2015-10-27 18:38:13 +01:00
.query({ access_token: token })
2015-10-28 16:00:51 +01:00
.send({ key: validKey1 })
2015-10-27 18:38:13 +01:00
.end(function (error, result) {
expect(result.statusCode).to.equal(400);
done();
});
});
it('cannot set certificate without key', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/certificate')
2015-10-27 18:38:13 +01:00
.query({ access_token: token })
2015-10-28 16:00:51 +01:00
.send({ cert: validCert1 })
.end(function (error, result) {
expect(result.statusCode).to.equal(400);
done();
});
});
it('cannot set certificate with cert not being a string', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/certificate')
.query({ access_token: token })
2015-10-28 16:00:51 +01:00
.send({ cert: 1234, key: validKey1 })
.end(function (error, result) {
expect(result.statusCode).to.equal(400);
done();
});
});
it('cannot set certificate with key not being a string', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/certificate')
.query({ access_token: token })
2015-10-28 16:00:51 +01:00
.send({ cert: validCert1, key: true })
.end(function (error, result) {
expect(result.statusCode).to.equal(400);
done();
});
});
it('cannot set non wildcard certificate', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/certificate')
2015-10-28 16:00:51 +01:00
.query({ access_token: token })
.send({ cert: validCert0, key: validKey0 })
2015-10-27 18:38:13 +01:00
.end(function (error, result) {
expect(result.statusCode).to.equal(400);
done();
});
});
it('can set certificate', function (done) {
2015-12-15 09:12:52 -08:00
superagent.post(SERVER_URL + '/api/v1/settings/certificate')
2015-10-27 18:38:13 +01:00
.query({ access_token: token })
2015-10-28 16:00:51 +01:00
.send({ cert: validCert1, key: validKey1 })
2015-10-27 18:38:13 +01:00
.end(function (error, result) {
expect(result.statusCode).to.equal(202);
done();
});
});
it('did set the certificate', function (done) {
2015-10-28 16:00:51 +01:00
var cert = fs.readFileSync(path.join(paths.NGINX_CERT_DIR, 'host.cert'), 'utf-8');
expect(cert).to.eql(validCert1);
2015-10-27 18:38:13 +01:00
2015-10-28 16:00:51 +01:00
var key = fs.readFileSync(path.join(paths.NGINX_CERT_DIR, 'host.key'), 'utf-8');
expect(key).to.eql(validKey1);
2015-10-27 18:38:13 +01:00
done();
});
});
2016-05-03 12:10:16 -07:00
describe('time_zone', function () {
it('succeeds', function (done) {
superagent.get(SERVER_URL + '/api/v1/settings/time_zone')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.timeZone).to.be('America/Los_Angeles');
done();
});
});
});
describe('appstore_config', function () {
it('get appstore_config fails', function (done) {
superagent.get(SERVER_URL + '/api/v1/settings/appstore_config')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body).to.eql({});
done();
});
});
it('cannot set without data', function (done) {
superagent.post(SERVER_URL + '/api/v1/settings/appstore_config')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(400);
done();
});
});
it('set fails with wrong appstore token', function (done) {
var scope = nock(config.apiServerOrigin()).post('/api/v1/users/nebulon/cloudrons?accessToken=sometoken').reply(401);
superagent.post(SERVER_URL + '/api/v1/settings/appstore_config')
.query({ access_token: token })
.send({ userId: 'nebulon', token: 'sometoken' })
.end(function (err, res) {
expect(scope.isDone()).to.be.ok();
expect(res.statusCode).to.equal(406);
expect(res.body.message).to.equal('invalid appstore token');
done();
});
});
it('set succeeds for unknown cloudron', function (done) {
var scope = nock(config.apiServerOrigin()).post('/api/v1/users/nebulon/cloudrons?accessToken=sometoken').reply(201, { cloudron: { id: 'cloudron0' }});
superagent.post(SERVER_URL + '/api/v1/settings/appstore_config')
.query({ access_token: token })
.send({ userId: 'nebulon', token: 'sometoken' })
.end(function (err, res) {
expect(scope.isDone()).to.be.ok();
expect(res.statusCode).to.equal(202);
expect(res.body).to.eql({ userId: 'nebulon', token: 'sometoken', cloudronId: 'cloudron0' });
done();
});
});
it('set fails with wrong appstore user', function (done) {
var scope = nock(config.apiServerOrigin()).get('/api/v1/users/nebulon/cloudrons/cloudron0?accessToken=sometoken').reply(403);
superagent.post(SERVER_URL + '/api/v1/settings/appstore_config')
.query({ access_token: token })
.send({ userId: 'nebulon', token: 'sometoken' })
.end(function (err, res) {
expect(scope.isDone()).to.be.ok();
expect(res.statusCode).to.equal(406);
expect(res.body.message).to.equal('wrong user');
done();
});
});
it('get succeeds', function (done) {
superagent.get(SERVER_URL + '/api/v1/settings/appstore_config')
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body).to.eql({ userId: 'nebulon', token: 'sometoken', cloudronId: 'cloudron0' });
done();
});
});
it('set succeeds with cloudronId', function (done) {
var scope = nock(config.apiServerOrigin()).get('/api/v1/users/nebulon/cloudrons/cloudron0?accessToken=someothertoken').reply(200, { cloudron: { id: 'cloudron0' }});
superagent.post(SERVER_URL + '/api/v1/settings/appstore_config')
.query({ access_token: token })
.send({ userId: 'nebulon', token: 'someothertoken' })
.end(function (err, res) {
expect(scope.isDone()).to.be.ok();
expect(res.statusCode).to.equal(202);
expect(res.body).to.eql({ userId: 'nebulon', token: 'someothertoken', cloudronId: 'cloudron0' });
done();
});
});
it('set succeeds with cloudronId but unkown one (reregister)', function (done) {
var scope0 = nock(config.apiServerOrigin()).get('/api/v1/users/nebulon/cloudrons/cloudron0?accessToken=someothertoken').reply(404);
var scope1 = nock(config.apiServerOrigin()).post('/api/v1/users/nebulon/cloudrons?accessToken=someothertoken').reply(201, { cloudron: { id: 'cloudron1' }});
superagent.post(SERVER_URL + '/api/v1/settings/appstore_config')
.query({ access_token: token })
.send({ userId: 'nebulon', token: 'someothertoken' })
.end(function (err, res) {
expect(scope0.isDone()).to.be.ok();
expect(scope1.isDone()).to.be.ok();
expect(res.statusCode).to.equal(202);
expect(res.body).to.eql({ userId: 'nebulon', token: 'someothertoken', cloudronId: 'cloudron1' });
done();
});
});
});
});