Files
cloudron-box/src/routes/test/users-test.js

767 lines
28 KiB
JavaScript
Raw Normal View History

/* global it:false */
/* global describe:false */
/* global before:false */
/* global after:false */
'use strict';
var accesscontrol = require('../../accesscontrol.js'),
async = require('async'),
2018-01-26 21:31:04 +01:00
config = require('../../config.js'),
database = require('../../database.js'),
2018-01-26 21:31:04 +01:00
domains = require('../../domains.js'),
tokendb = require('../../tokendb.js'),
expect = require('expect.js'),
2019-02-15 14:40:15 -08:00
hat = require('../../hat.js'),
groups = require('../../groups.js'),
2018-01-26 21:31:04 +01:00
mail = require('../../mail.js'),
2016-01-18 15:37:03 +01:00
mailer = require('../../mailer.js'),
superagent = require('superagent'),
server = require('../../server.js'),
users = require('../../users.js');
2018-01-26 21:31:04 +01:00
const SERVER_URL = 'http://localhost:' + config.get('port');
2018-01-26 21:31:04 +01:00
const DOMAIN_0 = {
domain: 'example-user-test.com',
zoneName: 'example-user-test.com',
config: {},
provider: 'noop',
fallbackCertificate: null,
tlsConfig: { provider: 'fallback' }
2018-01-26 21:31:04 +01:00
};
2018-11-10 00:43:46 -08:00
let AUDIT_SOURCE = { ip: '1.2.3.4' };
2018-01-26 21:31:04 +01:00
const USERNAME_0 = 'superaDmIn', PASSWORD = 'Foobar?1337', EMAIL_0 = 'silLY@me.com', EMAIL_0_NEW = 'stupID@me.com', DISPLAY_NAME_0_NEW = 'New Name';
const USERNAME_1 = 'userTheFirst', EMAIL_1 = 'taO@zen.mac';
const USERNAME_2 = 'userTheSecond', EMAIL_2 = 'USER@foo.bar', EMAIL_2_NEW = 'happy@ME.com';
const USERNAME_3 = 'ut', EMAIL_3 = 'user3@FOO.bar';
const USERNAME_4 = 'importedUser', EMAIL_4 = 'import@external.com';
2016-09-30 10:17:50 -07:00
var groupObject;
function setup(done) {
2017-11-27 15:30:55 -08:00
config._reset();
2018-01-26 21:31:04 +01:00
async.series([
server.start,
database._clear,
mailer._clearMailQueue,
2018-11-10 00:43:46 -08:00
domains.add.bind(null, DOMAIN_0.domain, DOMAIN_0, AUDIT_SOURCE),
2018-04-03 14:37:52 -07:00
mail.addDomain.bind(null, DOMAIN_0.domain)
2018-01-26 21:31:04 +01:00
], function (error) {
expect(error).to.not.be.ok();
2016-01-18 15:37:03 +01:00
2018-07-26 10:20:19 -07:00
groups.create('somegroupname', function (error, result) {
2018-01-26 21:31:04 +01:00
expect(error).to.not.be.ok();
2016-01-18 15:37:03 +01:00
2018-01-26 21:31:04 +01:00
groupObject = result;
2018-01-26 21:31:04 +01:00
done();
});
});
}
function cleanup(done) {
database._clear(function (error) {
expect(!error).to.be.ok();
2016-01-18 15:37:03 +01:00
mailer._clearMailQueue();
server.stop(done);
});
}
2016-01-18 15:37:03 +01:00
function checkMails(number, done) {
// mails are enqueued async
setTimeout(function () {
expect(mailer._getMailQueue().length).to.equal(number);
mailer._clearMailQueue();
done();
}, 500);
}
2018-04-29 11:29:21 -07:00
describe('Users API', function () {
var user_0, user_1, user_2, user_4;
var token = null, userToken = null;
2019-02-15 14:40:15 -08:00
var token_1 = hat(8 * 32);
before(setup);
after(cleanup);
it('device is in first time mode', function (done) {
superagent.get(SERVER_URL + '/api/v1/cloudron/status')
2018-01-18 13:41:10 -08:00
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.activated).to.not.be.ok();
done(err);
});
});
it('create admin fails due to missing parameters', function (done) {
superagent.post(SERVER_URL + '/api/v1/cloudron/activate')
2018-01-18 13:41:10 -08:00
.query({ setupToken: 'somesetuptoken' })
.send({ username: USERNAME_0 })
.end(function (err, res) {
expect(res.statusCode).to.equal(400);
done();
});
});
it('create admin fails because only POST is allowed', function (done) {
superagent.get(SERVER_URL + '/api/v1/cloudron/activate')
2018-01-18 13:41:10 -08:00
.end(function (err, res) {
expect(res.statusCode).to.equal(404);
done();
});
});
it('create admin', function (done) {
superagent.post(SERVER_URL + '/api/v1/cloudron/activate')
2018-01-18 13:41:10 -08:00
.query({ setupToken: 'somesetuptoken' })
.send({ username: USERNAME_0, password: PASSWORD, email: EMAIL_0 })
.end(function (err, res) {
expect(err).to.eql(null);
expect(res.statusCode).to.equal(201);
2018-01-18 13:41:10 -08:00
// stash for later use
token = res.body.token;
2016-04-04 16:17:50 +02:00
2018-05-13 21:52:48 -07:00
superagent.get(SERVER_URL + '/api/v1/profile').query({ access_token: token }).end(function (error, result) {
2018-01-18 13:41:10 -08:00
expect(error).to.eql(null);
expect(result.status).to.equal(200);
2016-04-04 16:17:50 +02:00
2018-01-18 13:41:10 -08:00
// stash for further use
user_0 = result.body;
2016-04-04 16:17:50 +02:00
2018-01-18 13:41:10 -08:00
done();
});
2016-04-04 16:17:50 +02:00
});
});
it('device left first time mode', function (done) {
superagent.get(SERVER_URL + '/api/v1/cloudron/status')
2018-01-18 13:41:10 -08:00
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.activated).to.be.ok();
done();
});
});
2016-04-13 11:33:01 +02:00
it('cannot get userInfo by username', function (done) {
superagent.get(SERVER_URL + '/api/v1/users/' + USERNAME_0)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(404);
2016-04-04 16:17:50 +02:00
2018-01-18 13:41:10 -08:00
done();
});
2016-04-04 16:17:50 +02:00
});
it('can get userInfo with token', function (done) {
superagent.get(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.username).to.equal(USERNAME_0.toLowerCase());
expect(res.body.email).to.equal(EMAIL_0.toLowerCase());
expect(res.body.groupIds).to.eql([]);
expect(res.body.admin).to.be(true);
2018-01-18 13:41:10 -08:00
done();
});
});
it('cannot get userInfo with expired token', function (done) {
var expires = Date.now() + 2000; // 1 sec
2019-02-15 14:40:15 -08:00
let token = {
id: 'tid-0',
accessToken: hat(8 * 32),
identifier: user_0.id,
clientId: null,
expires: expires,
scope: accesscontrol.SCOPE_PROFILE,
name: 'tokenname'
};
tokendb.add(token, function (error) {
expect(error).to.not.be.ok();
setTimeout(function () {
superagent.get(SERVER_URL + '/api/v1/users/' + user_0.username)
2019-02-15 14:40:15 -08:00
.query({ access_token: token.accessToken })
2018-01-18 13:41:10 -08:00
.end(function (error, result) {
expect(result.statusCode).to.equal(401);
done();
});
}, 2000);
});
});
it('can get userInfo with token', function (done) {
2016-04-04 16:17:50 +02:00
superagent.get(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.username).to.equal(USERNAME_0.toLowerCase());
expect(res.body.email).to.equal(EMAIL_0.toLowerCase());
expect(res.body.groupIds).to.eql([]);
expect(res.body.admin).to.be(true);
2018-01-18 13:41:10 -08:00
done();
});
});
it('cannot get userInfo only with basic auth', function (done) {
2016-04-04 16:17:50 +02:00
superagent.get(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.auth(USERNAME_0, PASSWORD)
.end(function (err, res) {
expect(res.statusCode).to.equal(401);
done();
});
});
it('cannot get userInfo with invalid token (token length)', function (done) {
2016-04-04 16:17:50 +02:00
superagent.get(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: 'x' + token })
.end(function (err, res) {
expect(res.statusCode).to.equal(401);
done();
});
});
it('cannot get userInfo with invalid token (wrong token)', function (done) {
2016-04-04 16:17:50 +02:00
superagent.get(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token.toUpperCase() })
.end(function (err, res) {
expect(res.statusCode).to.equal(401);
done();
});
});
it('can get userInfo with token in auth header', function (done) {
2016-04-04 16:17:50 +02:00
superagent.get(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.set('Authorization', 'Bearer ' + token)
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.username).to.equal(USERNAME_0.toLowerCase());
expect(res.body.email).to.equal(EMAIL_0.toLowerCase());
expect(res.body.groupIds).to.eql([]);
expect(res.body.admin).to.be(true);
2018-01-18 13:41:10 -08:00
expect(res.body.displayName).to.be.a('string');
expect(res.body.password).to.not.be.ok();
expect(res.body.salt).to.not.be.ok();
done();
});
});
it('cannot get userInfo with invalid token in auth header', function (done) {
2016-04-04 16:17:50 +02:00
superagent.get(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.set('Authorization', 'Bearer ' + 'x' + token)
.end(function (err, res) {
expect(res.statusCode).to.equal(401);
done();
});
});
it('cannot get userInfo with invalid token (wrong token)', function (done) {
2016-04-04 16:17:50 +02:00
superagent.get(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.set('Authorization', 'Bearer ' + 'x' + token.toUpperCase())
.end(function (err, res) {
expect(res.statusCode).to.equal(401);
done();
});
});
it('cannot create user without email', function (done) {
superagent.post(SERVER_URL + '/api/v1/users')
.query({ access_token: token })
2018-08-17 09:49:58 -07:00
.send({ username: USERNAME_1 })
.end(function (error, result) {
expect(error).to.be.ok();
expect(result.statusCode).to.equal(400);
done();
});
});
it('create second user succeeds', function (done) {
superagent.post(SERVER_URL + '/api/v1/users')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
2018-08-17 09:49:58 -07:00
.send({ username: USERNAME_1, email: EMAIL_1 })
2018-01-18 13:41:10 -08:00
.end(function (error, result) {
expect(error).to.not.be.ok();
expect(result.statusCode).to.equal(201);
2016-04-04 16:17:50 +02:00
2018-01-18 13:41:10 -08:00
user_1 = result.body;
2018-08-17 09:49:58 -07:00
// HACK to get a token for second user (passwords are generated and the user should have gotten a password setup link...)
2019-02-15 14:40:15 -08:00
tokendb.add({ id: 'tid-3', accessToken: token_1, identifier: user_1.id, clientId: 'test-client-id', expires: Date.now() + 10000, scope: accesscontrol.SCOPE_PROFILE, name: 'fromtest' }, done);
2016-01-18 15:37:03 +01:00
});
});
it('reinvite unknown user fails', function (done) {
2018-08-17 09:49:58 -07:00
superagent.post(SERVER_URL + '/api/v1/users/' + USERNAME_1+USERNAME_1 + '/create_invite')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({})
.end(function (err, res) {
expect(err).to.be.an(Error);
expect(res.statusCode).to.equal(404);
2018-08-17 09:49:58 -07:00
done();
2018-01-18 13:41:10 -08:00
});
2016-01-18 15:37:03 +01:00
});
2018-08-17 09:49:58 -07:00
it('send invite without creating invite fails succeeds', function (done) {
superagent.post(SERVER_URL + '/api/v1/users/' + user_1.id + '/send_invite')
.query({ access_token: token })
.send({})
.end(function (err, res) {
expect(err).to.be.an(Error);
expect(res.statusCode).to.equal(409);
done();
});
});
2016-01-18 15:37:03 +01:00
2018-08-17 09:49:58 -07:00
it('create invite second user succeeds', function (done) {
superagent.post(SERVER_URL + '/api/v1/users/' + user_1.id + '/create_invite')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({})
.end(function (err, res) {
expect(err).to.not.be.ok();
expect(res.statusCode).to.equal(200);
2018-08-17 09:49:58 -07:00
expect(res.body.resetToken).to.be.ok();
done();
});
});
it('can send invite', function (done) {
mailer._clearMailQueue();
superagent.post(SERVER_URL + '/api/v1/users/' + user_1.id + '/send_invite')
.query({ access_token: token })
.send({})
.end(function (err, res) {
expect(err).to.be(null);
expect(res.statusCode).to.equal(200);
2018-01-18 13:41:10 -08:00
checkMails(1, done);
});
});
it('set second user as admin succeeds', function (done) {
superagent.post(SERVER_URL + '/api/v1/users/' + user_1.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ admin: true })
2018-01-18 13:41:10 -08:00
.end(function (err, res) {
expect(res.statusCode).to.equal(204);
superagent.get(SERVER_URL + '/api/v1/users/' + user_1.id)
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.admin).to.be(true);
2018-01-18 13:41:10 -08:00
done();
});
});
});
it('does not list groupIds when listing users', function (done) {
2016-06-03 00:14:52 -07:00
superagent.get(SERVER_URL + '/api/v1/users')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.end(function (error, res) {
expect(error).to.be(null);
expect(res.statusCode).to.equal(200);
expect(res.body.users).to.be.an('array');
2016-06-03 00:14:52 -07:00
2018-01-18 13:41:10 -08:00
res.body.users.forEach(function (user) {
expect('groupIds' in user).to.be(false);
2018-01-18 13:41:10 -08:00
});
done();
2016-06-03 00:14:52 -07:00
});
});
it('remove self as admin fails', function (done) {
superagent.post(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ admin: false })
2018-01-18 13:41:10 -08:00
.end(function (err, res) {
expect(res.statusCode).to.equal(409);
2018-01-18 13:41:10 -08:00
done();
});
});
it('remove second user from admins succeeds', function (done) {
2016-06-02 12:01:48 -07:00
superagent.put(SERVER_URL + '/api/v1/users/' + user_1.id + '/groups')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ groupIds: [ groupObject.id ] })
.end(function (err, res) {
expect(res.statusCode).to.equal(204);
superagent.get(SERVER_URL + '/api/v1/users/' + user_1.id)
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.groupIds).to.eql([ groupObject.id ]);
2018-01-18 13:41:10 -08:00
done();
});
});
});
2018-08-17 09:49:58 -07:00
it('create user missing username succeeds', function (done) {
superagent.post(SERVER_URL + '/api/v1/users')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
2018-08-17 09:49:58 -07:00
.send({ email: `unnamed${EMAIL_2}` })
2018-01-18 13:41:10 -08:00
.end(function (error, result) {
2018-08-17 09:49:58 -07:00
expect(result.statusCode).to.equal(201);
2018-01-18 13:41:10 -08:00
done();
});
});
it('create user missing email fails', function (done) {
superagent.post(SERVER_URL + '/api/v1/users')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ username: USERNAME_2 })
.end(function (error, result) {
expect(result.statusCode).to.equal(400);
done();
});
});
2016-05-23 15:00:21 -07:00
it('create user reserved name fails', function (done) {
superagent.post(SERVER_URL + '/api/v1/users')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ username: 'no-reply' })
.end(function (error, result) {
expect(result.statusCode).to.equal(400);
done();
});
2016-05-23 15:00:21 -07:00
});
it('create user with short name fails', function (done) {
superagent.post(SERVER_URL + '/api/v1/users')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ username: 'n' })
.end(function (error, result) {
expect(result.statusCode).to.equal(400);
done();
});
2016-05-23 15:00:21 -07:00
});
it('create second and third user', function (done) {
mailer._clearMailQueue();
superagent.post(SERVER_URL + '/api/v1/users')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
2018-08-17 09:49:58 -07:00
.send({ username: USERNAME_2, email: EMAIL_2 })
2018-01-18 13:41:10 -08:00
.end(function (error, result) {
2016-04-04 16:17:50 +02:00
expect(result.statusCode).to.equal(201);
2018-01-18 13:41:10 -08:00
user_2 = result.body;
superagent.post(SERVER_URL + '/api/v1/users')
.query({ access_token: token })
2018-08-17 09:49:58 -07:00
.send({ username: USERNAME_3, email: EMAIL_3 })
2018-01-18 13:41:10 -08:00
.end(function (error, result) {
expect(result.statusCode).to.equal(201);
2019-01-04 10:04:28 -08:00
done();
2018-01-18 13:41:10 -08:00
});
});
});
2016-04-17 18:39:00 +02:00
it('get userInfo succeeds for second user', function (done) {
2016-04-04 16:17:50 +02:00
superagent.get(SERVER_URL + '/api/v1/users/' + user_2.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.end(function (error, result) {
expect(result.statusCode).to.equal(200);
expect(result.body.username).to.equal(USERNAME_2.toLowerCase());
expect(result.body.email).to.equal(EMAIL_2.toLowerCase());
expect(result.body.groupIds).to.eql([]);
2018-01-18 13:41:10 -08:00
done();
});
});
it('create user with same username should fail', function (done) {
superagent.post(SERVER_URL + '/api/v1/users')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ username: USERNAME_2, email: EMAIL_0, invite: false })
.end(function (err, res) {
expect(res.statusCode).to.equal(409);
done();
});
});
it('list users fails for normal user', function (done) {
superagent.get(SERVER_URL + '/api/v1/users')
2018-01-18 13:41:10 -08:00
.query({ access_token: token_1 })
.end(function (error, res) {
expect(res.statusCode).to.equal(403);
done();
});
});
it('list users succeeds for admin', function (done) {
superagent.get(SERVER_URL + '/api/v1/users')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.end(function (error, res) {
expect(error).to.be(null);
expect(res.statusCode).to.equal(200);
expect(res.body.users).to.be.an('array');
2018-08-17 09:49:58 -07:00
expect(res.body.users.length).to.equal(5);
2018-01-18 13:41:10 -08:00
res.body.users.forEach(function (user) {
expect(user).to.be.an('object');
expect(user.id).to.be.ok();
expect(user.email).to.be.ok();
2018-08-17 09:49:58 -07:00
if (!user.email.startsWith('unnamed')) expect(user.username).to.be.ok();
2018-01-18 13:41:10 -08:00
expect(user.password).to.not.be.ok();
expect(user.salt).to.not.be.ok();
expect(user.groupIds).to.not.be.ok();
2018-01-18 13:41:10 -08:00
});
done();
});
});
2016-06-02 22:25:48 -07:00
it('remove random user fails', function (done) {
superagent.del(SERVER_URL + '/api/v1/users/randomid')
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ password: PASSWORD })
.end(function (err, res) {
expect(res.statusCode).to.equal(404);
done();
});
2016-06-02 22:25:48 -07:00
});
it('user removes himself is not allowed', function (done) {
2016-04-04 16:17:50 +02:00
superagent.del(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ password: PASSWORD })
.end(function (err, res) {
expect(res.statusCode).to.equal(409);
2018-01-18 13:41:10 -08:00
done();
});
});
it('admin cannot remove normal user without giving a password', function (done) {
2016-04-04 16:17:50 +02:00
superagent.del(SERVER_URL + '/api/v1/users/' + user_1.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(400);
done();
});
});
it('admin cannot remove normal user with empty password', function (done) {
2016-04-04 16:17:50 +02:00
superagent.del(SERVER_URL + '/api/v1/users/' + user_1.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ password: '' })
.end(function (err, res) {
2018-06-20 09:27:24 -07:00
expect(res.statusCode).to.equal(403);
2018-01-18 13:41:10 -08:00
done();
});
});
it('admin cannot remove normal user with giving wrong password', function (done) {
2016-04-04 16:17:50 +02:00
superagent.del(SERVER_URL + '/api/v1/users/' + user_1.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ password: PASSWORD + PASSWORD })
.end(function (err, res) {
2018-06-20 09:27:24 -07:00
expect(res.statusCode).to.equal(403);
2018-01-18 13:41:10 -08:00
done();
});
});
it('admin removes normal user', function (done) {
2016-04-04 16:17:50 +02:00
superagent.del(SERVER_URL + '/api/v1/users/' + user_1.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ password: PASSWORD })
.end(function (err, res) {
expect(res.statusCode).to.equal(204);
done();
});
});
it('admin removes himself should not be allowed', function (done) {
2016-04-04 16:17:50 +02:00
superagent.del(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ password: PASSWORD })
.end(function (err, res) {
expect(res.statusCode).to.equal(409);
2018-01-18 13:41:10 -08:00
done();
});
});
// Change email
it('change email fails due to missing token', function (done) {
2016-06-02 00:20:33 -07:00
superagent.post(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.send({ email: EMAIL_0_NEW })
.end(function (error, result) {
expect(result.statusCode).to.equal(401);
done();
});
});
it('change email fails due to invalid email', function (done) {
2016-06-02 00:20:33 -07:00
superagent.post(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ email: 'foo@bar' })
.end(function (error, result) {
expect(result.statusCode).to.equal(400);
done();
});
});
2016-01-25 14:12:09 +01:00
it('change user succeeds without email nor displayName', function (done) {
2016-06-02 00:20:33 -07:00
superagent.post(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({})
.end(function (error, result) {
expect(result.statusCode).to.equal(204);
done();
});
2016-01-25 14:12:09 +01:00
});
2016-04-17 18:39:00 +02:00
it('change email succeeds', function (done) {
2016-06-02 00:20:33 -07:00
superagent.post(SERVER_URL + '/api/v1/users/' + user_2.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ email: EMAIL_2_NEW })
.end(function (error, result) {
expect(result.statusCode).to.equal(204);
superagent.get(SERVER_URL + '/api/v1/users/' + user_2.id)
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.username).to.equal(USERNAME_2.toLowerCase());
expect(res.body.email).to.equal(EMAIL_2_NEW.toLowerCase());
expect(res.body.displayName).to.equal('');
done();
});
});
});
it('change email as admin for other user succeeds', function (done) {
2016-06-02 00:20:33 -07:00
superagent.post(SERVER_URL + '/api/v1/users/' + user_2.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ email: EMAIL_2 })
.end(function (error, result) {
expect(result.statusCode).to.equal(204);
superagent.get(SERVER_URL + '/api/v1/users/' + user_2.id)
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.username).to.equal(USERNAME_2.toLowerCase());
expect(res.body.email).to.equal(EMAIL_2.toLowerCase());
expect(res.body.displayName).to.equal('');
done();
});
2016-01-25 14:08:35 +01:00
});
});
it('change displayName succeeds', function (done) {
2016-06-02 00:20:33 -07:00
superagent.post(SERVER_URL + '/api/v1/users/' + user_0.id)
2018-01-18 13:41:10 -08:00
.query({ access_token: token })
.send({ displayName: DISPLAY_NAME_0_NEW })
.end(function (error, result) {
expect(result.statusCode).to.equal(204);
superagent.get(SERVER_URL + '/api/v1/users/' + user_0.id)
.query({ access_token: token })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.username).to.equal(USERNAME_0.toLowerCase());
expect(res.body.email).to.equal(EMAIL_0.toLowerCase());
expect(res.body.displayName).to.equal(DISPLAY_NAME_0_NEW);
done();
});
2016-01-25 14:08:35 +01:00
});
});
it('cannot create user with bad password', function (done) {
mailer._clearMailQueue();
superagent.post(SERVER_URL + '/api/v1/users')
.query({ access_token: token })
.send({ username: USERNAME_4, email: EMAIL_4, password: 'tooweak' })
.end(function (error, result) {
expect(error).to.be.ok();
expect(result.statusCode).to.equal(400);
done();
});
});
it('can create user with a password', function (done) {
superagent.post(SERVER_URL + '/api/v1/users')
.query({ access_token: token })
.send({ username: USERNAME_4, email: EMAIL_4, password: 'Secret1#' })
.end(function (error, result) {
expect(error).to.not.be.ok();
expect(result.statusCode).to.equal(201);
user_4 = result.body;
2019-02-15 14:40:15 -08:00
userToken = hat(8 * 32);
var expires = Date.now() + 2000; // 1 sec
2019-02-15 14:40:15 -08:00
tokendb.add({ id: 'tid-2', accessToken: userToken, identifier: user_4.id, clientId: null, expires: expires, scope: accesscontrol.SCOPE_PROFILE, name: '' }, done);
});
});
it('can get profile of user with pre-set password', function (done) {
2018-05-13 21:52:48 -07:00
superagent.get(SERVER_URL + '/api/v1/profile')
.query({ access_token: userToken })
.end(function (err, res) {
expect(res.statusCode).to.equal(200);
expect(res.body.email).to.be(EMAIL_4);
done();
});
});
// Change password
it('change password fails due to missing token', function (done) {
superagent.post(SERVER_URL + '/api/v1/users/' + user_0.id + '/password')
.send({ password: 'youdontsay' })
.end(function (error, result) {
expect(result.statusCode).to.equal(401);
done();
});
});
it('change password fails due to small password', function (done) {
superagent.post(SERVER_URL + '/api/v1/users/' + user_0.id + '/password')
.query({ access_token: token })
.send({ password: 'small' })
.end(function (error, result) {
expect(result.statusCode).to.equal(400);
done();
});
});
it('change password succeeds', function (done) {
superagent.post(SERVER_URL + '/api/v1/users/' + user_0.id + '/password')
.query({ access_token: token })
.send({ password: 'bigenough' })
.end(function (error, result) {
expect(result.statusCode).to.equal(204);
done();
});
});
it('did change the user password', function (done) {
users.verify(user_0.id, 'bigenough', function (error) {
expect(error).to.be(null);
done();
});
});
});