mirror of
https://github.com/verdaccio/verdaccio.git
synced 2024-12-16 21:56:25 -05:00
13310814da
* #2606 add prettier plugin sort imprts * #2606 update pnpm-lock.yaml * #2606 update eslint rules * #2606 fixes website directory formatting Co-authored-by: Ayush Sharma <ayush.sharma@trivago.com>
129 lines
3.9 KiB
TypeScript
129 lines
3.9 KiB
TypeScript
import path from 'path';
|
|
import request from 'supertest';
|
|
|
|
import { API_ERROR, HTTP_STATUS, SUPPORT_ERRORS } from '@verdaccio/core';
|
|
import { logger, setup } from '@verdaccio/logger';
|
|
import { mockServer } from '@verdaccio/mock';
|
|
import {
|
|
DOMAIN_SERVERS,
|
|
configExample,
|
|
generateRamdonStorage,
|
|
getNewToken,
|
|
getProfile,
|
|
postProfile,
|
|
} from '@verdaccio/mock';
|
|
|
|
import endPointAPI from '../../src';
|
|
|
|
setup([]);
|
|
|
|
describe('endpoint user profile', () => {
|
|
let app;
|
|
let mockRegistry;
|
|
jest.setTimeout(20000);
|
|
|
|
beforeAll(async () => {
|
|
const store = generateRamdonStorage();
|
|
const mockServerPort = 55544;
|
|
const configForTest = configExample(
|
|
{
|
|
storage: store,
|
|
uplinks: {
|
|
remote: {
|
|
url: `http://${DOMAIN_SERVERS}:${mockServerPort}`,
|
|
},
|
|
},
|
|
config_path: store,
|
|
},
|
|
'profile.yaml',
|
|
__dirname
|
|
);
|
|
|
|
app = await endPointAPI(configForTest);
|
|
const binPath = require.resolve('verdaccio/bin/verdaccio');
|
|
const storePath = path.join(__dirname, '/mock/store');
|
|
mockRegistry = await mockServer(mockServerPort, { storePath, silence: true }).init(binPath);
|
|
});
|
|
|
|
afterAll(function () {
|
|
const [registry, pid] = mockRegistry;
|
|
registry.stop();
|
|
logger.info(`registry ${pid} has been stopped`);
|
|
});
|
|
|
|
test('should fetch a profile of logged user', async () => {
|
|
const credentials = { name: 'JotaJWT', password: 'secretPass' };
|
|
const token = await getNewToken(request(app), credentials);
|
|
const [err1, res1] = await getProfile(request(app), token);
|
|
expect(err1).toBeNull();
|
|
expect(res1.body.name).toBe(credentials.name);
|
|
});
|
|
|
|
describe('change password', () => {
|
|
test('should change password successfully', async () => {
|
|
const credentials = { name: 'userTest2000', password: 'secretPass000' };
|
|
const body = {
|
|
password: {
|
|
new: '12345678',
|
|
old: credentials.password,
|
|
},
|
|
};
|
|
const token = await getNewToken(request(app), credentials);
|
|
const [err1, res1] = await postProfile(request(app), body, token);
|
|
|
|
expect(err1).toBeNull();
|
|
expect(res1.body.name).toBe(credentials.name);
|
|
});
|
|
|
|
test('should change password is too short', async () => {
|
|
const credentials = { name: 'userTest2001', password: 'secretPass001' };
|
|
const body = {
|
|
password: {
|
|
new: 'p1',
|
|
old: credentials.password,
|
|
},
|
|
};
|
|
const token = await getNewToken(request(app), credentials);
|
|
const [, resp] = await postProfile(request(app), body, token, HTTP_STATUS.UNAUTHORIZED);
|
|
|
|
expect(resp.error).not.toBeNull();
|
|
/* eslint new-cap: 0 */
|
|
expect(resp.error.text).toMatch(API_ERROR.PASSWORD_SHORT());
|
|
});
|
|
});
|
|
|
|
describe('change tfa', () => {
|
|
test('should report TFA is disabled', async () => {
|
|
const credentials = { name: 'userTest2002', password: 'secretPass002' };
|
|
const body = {
|
|
tfa: {},
|
|
};
|
|
const token = await getNewToken(request(app), credentials);
|
|
const [, resp] = await postProfile(
|
|
request(app),
|
|
body,
|
|
token,
|
|
HTTP_STATUS.SERVICE_UNAVAILABLE
|
|
);
|
|
|
|
expect(resp.error).not.toBeNull();
|
|
expect(resp.error.text).toMatch(SUPPORT_ERRORS.TFA_DISABLED);
|
|
});
|
|
});
|
|
|
|
describe('error handling', () => {
|
|
test('should forbid to fetch a profile with invalid token', async () => {
|
|
const [, resp] = await getProfile(request(app), `fakeToken`, HTTP_STATUS.UNAUTHORIZED);
|
|
|
|
expect(resp.error).not.toBeNull();
|
|
expect(resp.error.text).toMatch(API_ERROR.MUST_BE_LOGGED);
|
|
});
|
|
|
|
test('should forbid to update a profile with invalid token', async () => {
|
|
const [, resp] = await postProfile(request(app), {}, `fakeToken`, HTTP_STATUS.UNAUTHORIZED);
|
|
|
|
expect(resp.error).not.toBeNull();
|
|
expect(resp.error.text).toMatch(API_ERROR.MUST_BE_LOGGED);
|
|
});
|
|
});
|
|
});
|