loopback/test/user.test.js

991 lines
29 KiB
JavaScript
Raw Normal View History

2014-01-23 22:39:15 +00:00
var User;
2013-11-13 19:49:08 +00:00
var AccessToken = loopback.AccessToken;
var MailConnector = require('../lib/connectors/mail');
2013-07-02 23:51:38 +00:00
2013-07-16 17:49:25 +00:00
var userMemory = loopback.createDataSource({
connector: 'memory'
2013-07-03 05:37:31 +00:00
});
2014-11-21 02:35:36 +00:00
describe('User', function() {
var validCredentialsEmail = 'foo@bar.com';
var validCredentials = {email: validCredentialsEmail, password: 'bar'};
var validCredentialsEmailVerified = {email: 'foo1@bar.com', password: 'bar1', emailVerified: true};
var validCredentialsEmailVerifiedOverREST = {email: 'foo2@bar.com', password: 'bar2', emailVerified: true};
var validCredentialsWithTTL = {email: 'foo@bar.com', password: 'bar', ttl: 3600};
var invalidCredentials = {email: 'foo1@bar.com', password: 'invalid'};
var incompleteCredentials = {password: 'bar1'};
2014-01-23 22:39:15 +00:00
beforeEach(function() {
User = loopback.User.extend('user');
User.email = loopback.Email.extend('email');
loopback.autoAttach();
// Update the AccessToken relation to use the subclass of User
AccessToken.belongsTo(User);
2014-01-23 22:39:15 +00:00
// allow many User.afterRemote's to be called
User.setMaxListeners(0);
2013-11-19 18:29:02 +00:00
});
2014-11-21 02:35:36 +00:00
beforeEach(function(done) {
app.enableAuth();
app.use(loopback.token());
2013-07-16 17:49:25 +00:00
app.use(loopback.rest());
2013-07-16 01:22:33 +00:00
app.model(User);
User.create(validCredentials, function(err, user) {
User.create(validCredentialsEmailVerified, done);
});
2013-07-02 23:51:38 +00:00
});
2014-11-21 02:35:36 +00:00
afterEach(function(done) {
User.destroyAll(function(err) {
2013-11-13 19:49:08 +00:00
User.accessToken.destroyAll(done);
});
});
2014-11-21 02:35:36 +00:00
describe('User.create', function() {
2013-07-16 20:41:17 +00:00
it('Create a new user', function(done) {
2014-11-21 02:35:36 +00:00
User.create({email: 'f@b.com', password: 'bar'}, function(err, user) {
assert(!err);
assert(user.id);
assert(user.email);
done();
});
});
2014-11-21 02:35:36 +00:00
it('credentials/challenges are object types', function(done) {
User.create({email: 'f1@b.com', password: 'bar1',
credentials: {cert: 'xxxxx', key: '111'},
challenges: {x: 'X', a: 1}
2014-11-21 02:35:36 +00:00
}, function(err, user) {
assert(!err);
2014-11-21 02:35:36 +00:00
User.findById(user.id, function(err, user) {
assert(user.id);
assert(user.email);
assert.deepEqual(user.credentials, {cert: 'xxxxx', key: '111'});
assert.deepEqual(user.challenges, {x: 'X', a: 1});
done();
});
});
});
2014-11-21 02:35:36 +00:00
it('Email is required', function(done) {
User.create({password: '123'}, function(err) {
2014-05-20 21:39:28 +00:00
assert(err);
assert.equal(err.name, 'ValidationError');
2014-05-20 21:39:28 +00:00
assert.equal(err.statusCode, 422);
assert.equal(err.details.context, 'user');
2014-05-20 21:39:28 +00:00
assert.deepEqual(err.details.codes.email, [
'presence',
2015-01-30 16:52:45 +00:00
'format.null'
2014-05-20 21:39:28 +00:00
]);
done();
});
});
// will change in future versions where password will be optional by default
it('Password is required', function(done) {
var u = new User({email: '123@456.com'});
2014-11-21 02:35:36 +00:00
User.create({email: 'c@d.com'}, function(err) {
assert(err);
done();
});
});
2013-07-16 20:41:17 +00:00
it('Requires a valid email', function(done) {
2014-11-21 02:35:36 +00:00
User.create({email: 'foo@', password: '123'}, function(err) {
assert(err);
done();
});
});
2013-07-16 20:41:17 +00:00
it('Requires a unique email', function(done) {
2014-11-21 02:35:36 +00:00
User.create({email: 'a@b.com', password: 'foobar'}, function() {
User.create({email: 'a@b.com', password: 'batbaz'}, function(err) {
assert(err, 'should error because the email is not unique!');
done();
});
});
});
it('Requires a unique username', function(done) {
2014-11-21 02:35:36 +00:00
User.create({email: 'a@b.com', username: 'abc', password: 'foobar'}, function() {
User.create({email: 'b@b.com', username: 'abc', password: 'batbaz'}, function(err) {
assert(err, 'should error because the username is not unique!');
done();
});
});
});
2013-07-16 20:41:17 +00:00
it('Requires a password to login with basic auth', function(done) {
2014-11-21 02:35:36 +00:00
User.create({email: 'b@c.com'}, function(err) {
User.login({email: 'b@c.com'}, function(err, accessToken) {
2013-11-13 19:49:08 +00:00
assert(!accessToken, 'should not create a accessToken without a valid password');
assert(err, 'should not login without a password');
assert.equal(err.code, 'LOGIN_FAILED');
done();
});
});
});
2013-07-16 20:41:17 +00:00
it('Hashes the given password', function() {
2013-07-16 01:22:33 +00:00
var u = new User({username: 'foo', password: 'bar'});
assert(u.password !== 'bar');
});
describe('custom password hash', function() {
var defaultHashPassword;
var defaultValidatePassword;
beforeEach(function() {
defaultHashPassword = User.hashPassword;
defaultValidatePassword = User.defaultValidatePassword;
User.hashPassword = function(plain) {
return plain.toUpperCase();
};
User.validatePassword = function(plain) {
if (!plain || plain.length < 3) {
throw new Error('Password must have at least 3 chars');
}
return true;
};
});
afterEach(function() {
User.hashPassword = defaultHashPassword;
});
it('Reports invalid password', function() {
try {
var u = new User({username: 'foo', password: 'aa'});
assert(false, 'Error should have been thrown');
} catch (e) {
// Ignore
}
});
it('Hashes the given password', function() {
var u = new User({username: 'foo', password: 'bar'});
assert(u.password === 'BAR');
});
});
it('Create a user over REST should remove emailVerified property', function(done) {
request(app)
.post('/users')
.expect('Content-Type', /json/)
.expect(200)
.send(validCredentialsEmailVerifiedOverREST)
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
assert(!res.body.emailVerified);
done();
});
});
2013-07-03 05:37:31 +00:00
});
2013-07-03 05:37:31 +00:00
describe('User.login', function() {
2013-07-16 20:41:17 +00:00
it('Login a user by providing credentials', function(done) {
2014-11-21 02:35:36 +00:00
User.login(validCredentials, function(err, accessToken) {
assert(accessToken.userId);
2013-11-13 19:49:08 +00:00
assert(accessToken.id);
2013-11-14 21:01:47 +00:00
assert.equal(accessToken.id.length, 64);
done();
});
});
it('Login a user by providing credentials with TTL', function(done) {
2014-11-21 02:35:36 +00:00
User.login(validCredentialsWithTTL, function(err, accessToken) {
assert(accessToken.userId);
assert(accessToken.id);
assert.equal(accessToken.ttl, validCredentialsWithTTL.ttl);
assert.equal(accessToken.id.length, 64);
done();
});
});
it('Login a user using a custom createAccessToken', function(done) {
var createToken = User.prototype.createAccessToken; // Save the original method
// Override createAccessToken
User.prototype.createAccessToken = function(ttl, cb) {
// Reduce the ttl by half for testing purpose
2014-11-21 02:35:36 +00:00
this.accessTokens.create({ttl: ttl / 2 }, cb);
};
2014-11-21 02:35:36 +00:00
User.login(validCredentialsWithTTL, function(err, accessToken) {
assert(accessToken.userId);
assert(accessToken.id);
assert.equal(accessToken.ttl, 1800);
assert.equal(accessToken.id.length, 64);
User.findById(accessToken.userId, function(err, user) {
2014-11-21 02:35:36 +00:00
user.createAccessToken(120, function(err, accessToken) {
assert(accessToken.userId);
assert(accessToken.id);
assert.equal(accessToken.ttl, 60);
assert.equal(accessToken.id.length, 64);
// Restore create access token
User.prototype.createAccessToken = createToken;
done();
});
});
});
});
it('Login should only allow correct credentials', function(done) {
User.login(invalidCredentials, function(err, accessToken) {
assert(err);
assert.equal(err.code, 'LOGIN_FAILED');
assert(!accessToken);
done();
});
});
it('Login a user providing incomplete credentials', function(done) {
User.login(incompleteCredentials, function(err, accessToken) {
assert(err);
assert.equal(err.code, 'USERNAME_EMAIL_REQUIRED');
done();
});
});
it('Login a user over REST by providing credentials', function(done) {
2013-07-02 23:51:38 +00:00
request(app)
.post('/users/login')
.expect('Content-Type', /json/)
.expect(200)
.send(validCredentials)
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
2013-11-13 19:49:08 +00:00
var accessToken = res.body;
assert(accessToken.userId);
2013-11-13 19:49:08 +00:00
assert(accessToken.id);
2013-11-14 21:01:47 +00:00
assert.equal(accessToken.id.length, 64);
assert(accessToken.user === undefined);
2013-07-02 23:51:38 +00:00
done();
});
});
it('Login a user over REST by providing invalid credentials', function(done) {
request(app)
.post('/users/login')
.expect('Content-Type', /json/)
.expect(401)
.send(invalidCredentials)
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
var errorResponse = res.body.error;
assert.equal(errorResponse.code, 'LOGIN_FAILED');
done();
});
});
it('Login a user over REST by providing incomplete credentials', function(done) {
request(app)
.post('/users/login')
.expect('Content-Type', /json/)
.expect(400)
.send(incompleteCredentials)
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
var errorResponse = res.body.error;
assert.equal(errorResponse.code, 'USERNAME_EMAIL_REQUIRED');
done();
});
});
it('Login a user over REST with the wrong Content-Type', function(done) {
request(app)
.post('/users/login')
.set('Content-Type', null)
.expect('Content-Type', /json/)
.expect(400)
.send(JSON.stringify(validCredentials))
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
var errorResponse = res.body.error;
assert.equal(errorResponse.code, 'USERNAME_EMAIL_REQUIRED');
done();
});
});
it('Returns current user when `include` is `USER`', function(done) {
request(app)
.post('/users/login?include=USER')
.send(validCredentials)
.expect(200)
.expect('Content-Type', /json/)
.end(function(err, res) {
if (err) {
return done(err);
}
var token = res.body;
expect(token.user, 'body.user').to.not.equal(undefined);
expect(token.user, 'body.user')
.to.have.property('email', validCredentials.email);
done();
});
});
it('should handle multiple `include`', function(done) {
request(app)
.post('/users/login?include=USER&include=Post')
.send(validCredentials)
.expect(200)
.expect('Content-Type', /json/)
.end(function(err, res) {
if (err) {
return done(err);
}
var token = res.body;
expect(token.user, 'body.user').to.not.equal(undefined);
expect(token.user, 'body.user')
.to.have.property('email', validCredentials.email);
done();
});
});
2013-07-02 23:51:38 +00:00
});
2014-10-23 18:10:39 +00:00
function assertGoodToken(accessToken) {
assert(accessToken.userId);
assert(accessToken.id);
assert.equal(accessToken.id.length, 64);
}
describe('User.login requiring email verification', function() {
beforeEach(function() {
User.settings.emailVerificationRequired = true;
});
afterEach(function() {
User.settings.emailVerificationRequired = false;
});
it('Require valid and complete credentials for email verification error', function(done) {
User.login({ email: validCredentialsEmail }, function(err, accessToken) {
// strongloop/loopback#931
// error message should be "login failed" and not "login failed as the email has not been verified"
assert(err && !/verified/.test(err.message), ('expecting "login failed" error message, received: "' + err.message + '"'));
assert.equal(err.code, 'LOGIN_FAILED');
done();
});
});
it('Login a user by without email verification', function(done) {
2014-11-21 02:35:36 +00:00
User.login(validCredentials, function(err, accessToken) {
assert(err);
assert.equal(err.code, 'LOGIN_FAILED_EMAIL_NOT_VERIFIED');
done();
});
});
it('Login a user by with email verification', function(done) {
2014-11-21 02:35:36 +00:00
User.login(validCredentialsEmailVerified, function(err, accessToken) {
2014-10-23 18:10:39 +00:00
assertGoodToken(accessToken);
done();
});
});
it('Login a user over REST when email verification is required', function(done) {
request(app)
.post('/users/login')
.expect('Content-Type', /json/)
.expect(200)
.send(validCredentialsEmailVerified)
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
var accessToken = res.body;
2014-10-23 18:10:39 +00:00
assertGoodToken(accessToken);
assert(accessToken.user === undefined);
done();
});
});
it('Login a user over REST require complete and valid credentials for email verification error message', function(done) {
request(app)
.post('/users/login')
.expect('Content-Type', /json/)
.expect(401)
.send({ email: validCredentialsEmail })
.end(function(err, res) {
if (err) {
return done(err);
}
// strongloop/loopback#931
// error message should be "login failed" and not "login failed as the email has not been verified"
var errorResponse = res.body.error;
assert(errorResponse && !/verified/.test(errorResponse.message), ('expecting "login failed" error message, received: "' + errorResponse.message + '"'));
assert.equal(errorResponse.code, 'LOGIN_FAILED');
done();
});
});
it('Login a user over REST without email verification when it is required', function(done) {
request(app)
.post('/users/login')
.expect('Content-Type', /json/)
.expect(401)
.send(validCredentials)
.end(function(err, res) {
if (err) {
return done(err);
}
var errorResponse = res.body.error;
assert.equal(errorResponse.code, 'LOGIN_FAILED_EMAIL_NOT_VERIFIED');
done();
});
});
});
2014-10-23 18:10:39 +00:00
describe('User.login requiring realm', function() {
2014-11-21 02:35:36 +00:00
var User;
var AccessToken;
2014-10-23 18:10:39 +00:00
before(function() {
User = loopback.User.extend('RealmUser', {},
{realmRequired: true, realmDelimiter: ':'});
AccessToken = loopback.AccessToken.extend('RealmAccessToken');
loopback.autoAttach();
// Update the AccessToken relation to use the subclass of User
AccessToken.belongsTo(User);
User.hasMany(AccessToken);
// allow many User.afterRemote's to be called
User.setMaxListeners(0);
});
var realm1User = {
realm: 'realm1',
username: 'foo100',
email: 'foo100@bar.com',
password: 'pass100'
};
var realm2User = {
realm: 'realm2',
username: 'foo100',
email: 'foo100@bar.com',
password: 'pass200'
};
var credentialWithoutRealm = {
username: 'foo100',
email: 'foo100@bar.com',
password: 'pass100'
};
var credentialWithBadPass = {
realm: 'realm1',
username: 'foo100',
email: 'foo100@bar.com',
password: 'pass001'
};
var credentialWithBadRealm = {
realm: 'realm3',
username: 'foo100',
email: 'foo100@bar.com',
password: 'pass100'
};
var credentialWithRealm = {
realm: 'realm1',
username: 'foo100',
password: 'pass100'
};
var credentialRealmInUsername = {
username: 'realm1:foo100',
password: 'pass100'
};
var credentialRealmInEmail = {
email: 'realm1:foo100@bar.com',
password: 'pass100'
};
var user1;
beforeEach(function(done) {
User.create(realm1User, function(err, u) {
if (err) {
return done(err);
}
user1 = u;
User.create(realm2User, done);
});
});
afterEach(function(done) {
User.deleteAll({realm: 'realm1'}, function(err) {
if (err) {
return done(err);
}
User.deleteAll({realm: 'realm2'}, done);
});
});
it('rejects a user by without realm', function(done) {
User.login(credentialWithoutRealm, function(err, accessToken) {
assert(err);
assert.equal(err.code, 'REALM_REQUIRED');
2014-10-23 18:10:39 +00:00
done();
});
});
it('rejects a user by with bad realm', function(done) {
User.login(credentialWithBadRealm, function(err, accessToken) {
assert(err);
assert.equal(err.code, 'LOGIN_FAILED');
2014-10-23 18:10:39 +00:00
done();
});
});
it('rejects a user by with bad pass', function(done) {
User.login(credentialWithBadPass, function(err, accessToken) {
assert(err);
assert.equal(err.code, 'LOGIN_FAILED');
2014-10-23 18:10:39 +00:00
done();
});
});
it('logs in a user by with realm', function(done) {
User.login(credentialWithRealm, function(err, accessToken) {
assertGoodToken(accessToken);
assert.equal(accessToken.userId, user1.id);
done();
});
});
it('logs in a user by with realm in username', function(done) {
User.login(credentialRealmInUsername, function(err, accessToken) {
assertGoodToken(accessToken);
assert.equal(accessToken.userId, user1.id);
done();
});
});
it('logs in a user by with realm in email', function(done) {
User.login(credentialRealmInEmail, function(err, accessToken) {
assertGoodToken(accessToken);
assert.equal(accessToken.userId, user1.id);
done();
});
});
describe('User.login with realmRequired but no realmDelimiter', function() {
before(function() {
User.settings.realmDelimiter = undefined;
});
after(function() {
User.settings.realmDelimiter = ':';
});
it('logs in a user by with realm', function(done) {
User.login(credentialWithRealm, function(err, accessToken) {
assertGoodToken(accessToken);
assert.equal(accessToken.userId, user1.id);
done();
});
});
it('rejects a user by with realm in email if realmDelimiter is not set',
function(done) {
User.login(credentialRealmInEmail, function(err, accessToken) {
assert(err);
assert.equal(err.code, 'REALM_REQUIRED');
2014-10-23 18:10:39 +00:00
done();
});
});
});
});
2013-07-03 05:37:31 +00:00
describe('User.logout', function() {
2013-11-13 19:49:08 +00:00
it('Logout a user by providing the current accessToken id (using node)', function(done) {
login(logout);
function login(fn) {
User.login({email: 'foo@bar.com', password: 'bar'}, fn);
}
2013-11-13 19:49:08 +00:00
function logout(err, accessToken) {
User.logout(accessToken.id, verify(accessToken.id, done));
}
});
2013-11-13 19:49:08 +00:00
it('Logout a user by providing the current accessToken id (over rest)', function(done) {
2013-07-03 05:37:31 +00:00
login(logout);
function login(fn) {
request(app)
.post('/users/login')
.expect('Content-Type', /json/)
.expect(200)
.send({email: 'foo@bar.com', password: 'bar'})
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
2013-11-13 19:49:08 +00:00
var accessToken = res.body;
assert(accessToken.userId);
2013-11-13 19:49:08 +00:00
assert(accessToken.id);
2013-11-13 19:49:08 +00:00
fn(null, accessToken.id);
2013-07-03 05:37:31 +00:00
});
}
function logout(err, token) {
2013-07-03 05:37:31 +00:00
request(app)
.post('/users/logout')
.set('Authorization', token)
2013-07-25 00:21:15 +00:00
.expect(204)
.end(verify(token, done));
2013-07-03 05:37:31 +00:00
}
});
function verify(token, done) {
assert(token);
2014-11-21 02:35:36 +00:00
return function(err) {
if (err) {
return done(err);
}
2014-11-21 02:35:36 +00:00
AccessToken.findById(token, function(err, accessToken) {
2013-11-13 19:49:08 +00:00
assert(!accessToken, 'accessToken should not exist after logging out');
done(err);
});
};
}
2013-07-03 05:37:31 +00:00
});
2014-11-21 02:35:36 +00:00
describe('user.hasPassword(plain, fn)', function() {
2013-07-16 20:41:17 +00:00
it('Determine if the password matches the stored password', function(done) {
2013-07-03 05:37:31 +00:00
var u = new User({username: 'foo', password: 'bar'});
2014-11-21 02:35:36 +00:00
u.hasPassword('bar', function(err, isMatch) {
2013-07-03 05:37:31 +00:00
assert(isMatch, 'password doesnt match');
done();
});
2013-07-15 21:07:17 +00:00
});
2013-07-16 01:22:33 +00:00
it('should match a password when saved', function(done) {
var u = new User({username: 'a', password: 'b', email: 'z@z.net'});
2014-11-21 02:35:36 +00:00
u.save(function(err, user) {
User.findById(user.id, function(err, uu) {
uu.hasPassword('b', function(err, isMatch) {
2013-07-16 01:22:33 +00:00
assert(isMatch);
done();
});
});
});
});
2013-07-15 21:07:17 +00:00
it('should match a password after it is changed', function(done) {
2014-11-21 02:35:36 +00:00
User.create({email: 'foo@baz.net', username: 'bat', password: 'baz'}, function(err, user) {
User.findById(user.id, function(err, foundUser) {
assert(foundUser);
foundUser.hasPassword('baz', function(err, isMatch) {
assert(isMatch);
foundUser.password = 'baz2';
foundUser.save(function(err, updatedUser) {
updatedUser.hasPassword('baz2', function(err, isMatch) {
assert(isMatch);
User.findById(user.id, function(err, uu) {
uu.hasPassword('baz2', function(err, isMatch) {
assert(isMatch);
done();
});
});
});
});
});
});
});
2013-07-03 05:37:31 +00:00
});
});
2014-11-21 02:35:36 +00:00
describe('Verification', function() {
2014-11-21 02:35:36 +00:00
describe('user.verify(options, fn)', function() {
2013-07-03 05:37:31 +00:00
it('Verify a user\'s email address', function(done) {
User.afterRemote('create', function(ctx, user, next) {
assert(user, 'afterRemote should include result');
2013-07-03 05:37:31 +00:00
var options = {
type: 'email',
to: user.email,
from: 'noreply@myapp.org',
redirect: '/',
protocol: ctx.req.protocol,
host: ctx.req.get('host')
};
2014-11-21 02:35:36 +00:00
user.verify(options, function(err, result) {
2013-07-03 05:37:31 +00:00
assert(result.email);
2014-07-15 23:46:43 +00:00
assert(result.email.response);
2013-07-03 05:37:31 +00:00
assert(result.token);
var msg = result.email.response.toString('utf-8');
assert(~msg.indexOf('/api/users/confirm'));
assert(~msg.indexOf('To: bar@bat.com'));
2013-07-03 05:37:31 +00:00
done();
});
});
2013-07-03 05:37:31 +00:00
request(app)
.post('/users')
.expect('Content-Type', /json/)
.expect(200)
.send({email: 'bar@bat.com', password: 'bar'})
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
2013-07-03 05:37:31 +00:00
});
});
2014-10-24 05:46:23 +00:00
it('Verify a user\'s email address with custom header', function(done) {
User.afterRemote('create', function(ctx, user, next) {
assert(user, 'afterRemote should include result');
2014-10-24 05:46:23 +00:00
var options = {
type: 'email',
to: user.email,
from: 'noreply@myapp.org',
redirect: '/',
protocol: ctx.req.protocol,
host: ctx.req.get('host'),
headers: {'message-id':'custom-header-value'}
};
2014-11-21 02:35:36 +00:00
user.verify(options, function(err, result) {
2014-10-24 05:46:23 +00:00
assert(result.email);
assert.equal(result.email.messageId, 'custom-header-value');
done();
});
});
2014-10-24 05:46:23 +00:00
request(app)
.post('/users')
.expect('Content-Type', /json/)
.expect(200)
.send({email: 'bar@bat.com', password: 'bar'})
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
2014-10-24 05:46:23 +00:00
});
});
2013-07-03 05:37:31 +00:00
});
2014-11-21 02:35:36 +00:00
describe('User.confirm(options, fn)', function() {
var options;
function testConfirm(testFunc, done) {
2014-11-21 02:35:36 +00:00
User.afterRemote('create', function(ctx, user, next) {
2013-07-03 05:37:31 +00:00
assert(user, 'afterRemote should include result');
options = {
2013-07-03 05:37:31 +00:00
type: 'email',
to: user.email,
from: 'noreply@myapp.org',
redirect: 'http://foo.com/bar',
protocol: ctx.req.protocol,
host: ctx.req.get('host')
};
2014-11-21 02:35:36 +00:00
user.verify(options, function(err, result) {
if (err) {
return done(err);
}
testFunc(result, done);
2013-07-03 05:37:31 +00:00
});
});
2013-07-03 05:37:31 +00:00
request(app)
.post('/users')
.expect('Content-Type', /json/)
.expect(302)
.send({email: 'bar@bat.com', password: 'bar'})
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
2013-07-03 05:37:31 +00:00
});
}
2014-11-21 02:35:36 +00:00
it('Confirm a user verification', function(done) {
testConfirm(function(result, done) {
request(app)
.get('/users/confirm?uid=' + (result.uid) +
'&token=' + encodeURIComponent(result.token) +
'&redirect=' + encodeURIComponent(options.redirect))
.expect(302)
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
done();
});
}, done);
});
2014-11-21 02:35:36 +00:00
it('Report error for invalid user id during verification', function(done) {
testConfirm(function(result, done) {
request(app)
.get('/users/confirm?uid=' + (result.uid + '_invalid') +
'&token=' + encodeURIComponent(result.token) +
'&redirect=' + encodeURIComponent(options.redirect))
.expect(404)
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
var errorResponse = res.body.error;
assert(errorResponse);
assert.equal(errorResponse.code, 'USER_NOT_FOUND');
done();
});
}, done);
});
2014-11-21 02:35:36 +00:00
it('Report error for invalid token during verification', function(done) {
testConfirm(function(result, done) {
request(app)
.get('/users/confirm?uid=' + result.uid +
'&token=' + encodeURIComponent(result.token) + '_invalid' +
'&redirect=' + encodeURIComponent(options.redirect))
.expect(400)
2014-11-21 02:35:36 +00:00
.end(function(err, res) {
if (err) {
return done(err);
}
var errorResponse = res.body.error;
assert(errorResponse);
assert.equal(errorResponse.code, 'INVALID_TOKEN');
done();
});
}, done);
2013-07-03 05:37:31 +00:00
});
});
});
2013-11-20 18:59:29 +00:00
2014-11-21 02:35:36 +00:00
describe('Password Reset', function() {
describe('User.resetPassword(options, cb)', function() {
var email = 'foo@bar.com';
it('Requires email address to reset password', function(done) {
User.resetPassword({ }, function(err) {
assert(err);
assert.equal(err.code, 'EMAIL_REQUIRED');
done();
});
});
2014-11-21 02:35:36 +00:00
it('Creates a temp accessToken to allow a user to change password', function(done) {
2013-11-20 18:59:29 +00:00
var calledBack = false;
User.resetPassword({
email: email
2014-11-21 02:35:36 +00:00
}, function() {
2013-11-20 18:59:29 +00:00
calledBack = true;
});
2014-11-21 02:35:36 +00:00
User.once('resetPasswordRequest', function(info) {
2013-11-20 18:59:29 +00:00
assert(info.email);
assert(info.accessToken);
assert(info.accessToken.id);
assert.equal(info.accessToken.ttl / 60, 15);
assert(calledBack);
2014-11-21 02:35:36 +00:00
info.accessToken.user(function(err, user) {
2013-11-20 18:59:29 +00:00
assert.equal(user.email, email);
done();
});
});
});
it('Password reset over REST rejected without email address', function(done) {
request(app)
.post('/users/reset')
.expect('Content-Type', /json/)
.expect(400)
.send({ })
.end(function(err, res) {
if (err) {
return done(err);
}
var errorResponse = res.body.error;
assert(errorResponse);
assert.equal(errorResponse.code, 'EMAIL_REQUIRED');
done();
});
});
it('Password reset over REST requires email address', function(done) {
request(app)
.post('/users/reset')
.expect('Content-Type', /json/)
.expect(204)
.send({ email: email })
.end(function(err, res) {
if (err) {
return done(err);
}
assert.deepEqual(res.body, { });
done();
});
});
2013-11-20 18:59:29 +00:00
});
});
2014-10-10 09:21:15 +00:00
describe('ctor', function() {
it('exports default Email model', function() {
expect(User.email, 'User.email').to.be.a('function');
expect(User.email.modelName, 'modelName').to.eql('email');
});
it('exports default AccessToken model', function() {
expect(User.accessToken, 'User.accessToken').to.be.a('function');
expect(User.accessToken.modelName, 'modelName').to.eql('AccessToken');
});
});
describe('ttl', function() {
var User2;
beforeEach(function() {
User2 = loopback.User.extend('User2', {}, { ttl: 10 });
});
it('should override ttl setting in based User model', function() {
expect(User2.settings.ttl).to.equal(10);
});
});
});