PeerTube/server/tests/plugins/id-and-pass-auth.ts

232 lines
7.4 KiB
TypeScript
Raw Normal View History

2020-04-22 09:07:04 -05:00
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
import 'mocha'
import { cleanupTests, flushAndRunServer, ServerInfo, waitUntilLog } from '../../../shared/extra-utils/server/servers'
import {
getMyUserInformation,
getPluginTestPath,
installPlugin,
logout,
setAccessTokensToServers,
uninstallPlugin,
updateMyUser,
userLogin,
wait,
2020-04-30 03:03:09 -05:00
login, refreshToken, getConfig, updatePluginSettings
} from '../../../shared/extra-utils'
2020-04-29 02:04:42 -05:00
import { User, UserRole, ServerConfig } from '@shared/models'
import { expect } from 'chai'
2020-04-22 09:07:04 -05:00
describe('Test id and pass auth plugins', function () {
let server: ServerInfo
let crashAccessToken: string
let crashRefreshToken: string
let lagunaAccessToken: string
let lagunaRefreshToken: string
2020-04-22 09:07:04 -05:00
before(async function () {
this.timeout(30000)
server = await flushAndRunServer(1)
await setAccessTokensToServers([ server ])
for (const suffix of [ 'one', 'two', 'three' ]) {
await installPlugin({
url: server.url,
accessToken: server.accessToken,
path: getPluginTestPath('-id-pass-auth-' + suffix)
})
}
2020-04-22 09:07:04 -05:00
})
2020-04-29 02:04:42 -05:00
it('Should display the correct configuration', async function () {
const res = await getConfig(server.url)
const config: ServerConfig = res.body
const auths = config.plugin.registeredIdAndPassAuths
expect(auths).to.have.lengthOf(8)
const crashAuth = auths.find(a => a.authName === 'crash-auth')
expect(crashAuth).to.exist
expect(crashAuth.npmName).to.equal('peertube-plugin-test-id-pass-auth-one')
expect(crashAuth.weight).to.equal(50)
})
it('Should not login', async function () {
await userLogin(server, { username: 'toto', password: 'password' }, 400)
2020-04-22 09:07:04 -05:00
})
it('Should login Spyro, create the user and use the token', async function () {
const accessToken = await userLogin(server, { username: 'spyro', password: 'spyro password' })
2020-04-22 09:07:04 -05:00
const res = await getMyUserInformation(server.url, accessToken)
const body: User = res.body
expect(body.username).to.equal('spyro')
expect(body.account.displayName).to.equal('Spyro the Dragon')
expect(body.role).to.equal(UserRole.USER)
2020-04-22 09:07:04 -05:00
})
it('Should login Crash, create the user and use the token', async function () {
{
const res = await login(server.url, server.client, { username: 'crash', password: 'crash password' })
crashAccessToken = res.body.access_token
crashRefreshToken = res.body.refresh_token
}
{
const res = await getMyUserInformation(server.url, crashAccessToken)
2020-04-22 09:07:04 -05:00
const body: User = res.body
expect(body.username).to.equal('crash')
expect(body.account.displayName).to.equal('Crash Bandicoot')
expect(body.role).to.equal(UserRole.MODERATOR)
}
2020-04-22 09:07:04 -05:00
})
it('Should login the first Laguna, create the user and use the token', async function () {
{
const res = await login(server.url, server.client, { username: 'laguna', password: 'laguna password' })
lagunaAccessToken = res.body.access_token
lagunaRefreshToken = res.body.refresh_token
}
2020-04-22 09:07:04 -05:00
{
const res = await getMyUserInformation(server.url, lagunaAccessToken)
const body: User = res.body
expect(body.username).to.equal('laguna')
expect(body.account.displayName).to.equal('laguna')
expect(body.role).to.equal(UserRole.USER)
}
})
it('Should refresh crash token, but not laguna token', async function () {
{
const resRefresh = await refreshToken(server, crashRefreshToken)
crashAccessToken = resRefresh.body.access_token
crashRefreshToken = resRefresh.body.refresh_token
const res = await getMyUserInformation(server.url, crashAccessToken)
const user: User = res.body
expect(user.username).to.equal('crash')
}
{
await refreshToken(server, lagunaRefreshToken, 400)
}
2020-04-22 09:07:04 -05:00
})
it('Should update Crash profile', async function () {
await updateMyUser({
url: server.url,
accessToken: crashAccessToken,
displayName: 'Beautiful Crash',
description: 'Mutant eastern barred bandicoot'
})
2020-04-22 09:07:04 -05:00
const res = await getMyUserInformation(server.url, crashAccessToken)
const body: User = res.body
expect(body.account.displayName).to.equal('Beautiful Crash')
expect(body.account.description).to.equal('Mutant eastern barred bandicoot')
2020-04-22 09:07:04 -05:00
})
it('Should logout Crash', async function () {
await logout(server.url, crashAccessToken)
2020-04-22 09:07:04 -05:00
})
it('Should have logged out Crash', async function () {
await waitUntilLog(server, 'On logout for auth 1 - 2')
await getMyUserInformation(server.url, crashAccessToken, 401)
2020-04-22 09:07:04 -05:00
})
it('Should login Crash and keep the old existing profile', async function () {
crashAccessToken = await userLogin(server, { username: 'crash', password: 'crash password' })
2020-04-22 09:07:04 -05:00
const res = await getMyUserInformation(server.url, crashAccessToken)
const body: User = res.body
expect(body.username).to.equal('crash')
expect(body.account.displayName).to.equal('Beautiful Crash')
expect(body.account.description).to.equal('Mutant eastern barred bandicoot')
expect(body.role).to.equal(UserRole.MODERATOR)
2020-04-22 09:07:04 -05:00
})
2020-04-27 03:19:14 -05:00
it('Should reject token of laguna by the plugin hook', async function () {
this.timeout(10000)
await wait(5000)
await getMyUserInformation(server.url, lagunaAccessToken, 401)
})
2020-04-27 04:42:01 -05:00
it('Should reject an invalid username, email, role or display name', async function () {
await userLogin(server, { username: 'ward', password: 'ward password' }, 400)
await waitUntilLog(server, 'valid username')
await userLogin(server, { username: 'kiros', password: 'kiros password' }, 400)
await waitUntilLog(server, 'valid display name')
await userLogin(server, { username: 'raine', password: 'raine password' }, 400)
await waitUntilLog(server, 'valid role')
await userLogin(server, { username: 'ellone', password: 'elonne password' }, 400)
await waitUntilLog(server, 'valid email')
})
2020-04-30 03:03:09 -05:00
it('Should unregister spyro-auth and do not login existing Spyro', async function () {
await updatePluginSettings({
url: server.url,
accessToken: server.accessToken,
npmName: 'peertube-plugin-test-id-pass-auth-one',
settings: { disableSpyro: true }
})
await userLogin(server, { username: 'spyro', password: 'spyro password' }, 400)
await userLogin(server, { username: 'spyro', password: 'fake' }, 400)
})
it('Should have disabled this auth', async function () {
const res = await getConfig(server.url)
const config: ServerConfig = res.body
const auths = config.plugin.registeredIdAndPassAuths
expect(auths).to.have.lengthOf(7)
const spyroAuth = auths.find(a => a.authName === 'spyro-auth')
expect(spyroAuth).to.not.exist
})
2020-04-22 09:07:04 -05:00
it('Should uninstall the plugin one and do not login existing Crash', async function () {
await uninstallPlugin({
url: server.url,
accessToken: server.accessToken,
npmName: 'peertube-plugin-test-id-pass-auth-one'
})
2020-04-22 09:07:04 -05:00
await userLogin(server, { username: 'crash', password: 'crash password' }, 400)
2020-04-22 09:07:04 -05:00
})
2020-04-29 02:04:42 -05:00
it('Should display the correct configuration', async function () {
const res = await getConfig(server.url)
const config: ServerConfig = res.body
const auths = config.plugin.registeredIdAndPassAuths
expect(auths).to.have.lengthOf(6)
const crashAuth = auths.find(a => a.authName === 'crash-auth')
expect(crashAuth).to.not.exist
})
2020-04-22 09:07:04 -05:00
after(async function () {
await cleanupTests([ server ])
})
})