You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
96 lines
3.0 KiB
JavaScript
96 lines
3.0 KiB
JavaScript
3 years ago
|
'use strict';
|
||
|
|
||
|
const assert = require('assert');
|
||
|
const db = require('./mocks/databasemock');
|
||
|
const middleware = require('../src/middleware');
|
||
|
const user = require('../src/user');
|
||
|
const groups = require('../src/groups');
|
||
|
|
||
|
describe('Middlewares', () => {
|
||
|
let adminUid;
|
||
|
before(async () => {
|
||
|
adminUid = await user.create({ username: 'admin', password: '123456' });
|
||
|
await groups.join('administrators', adminUid);
|
||
|
});
|
||
|
describe('expose', () => {
|
||
|
it('should expose res.locals.isAdmin = false', (done) => {
|
||
|
const resMock = { locals: {} };
|
||
|
middleware.exposeAdmin({}, resMock, () => {
|
||
|
assert.strictEqual(resMock.locals.isAdmin, false);
|
||
|
done();
|
||
|
});
|
||
|
});
|
||
|
|
||
|
it('should expose res.locals.isAdmin = true', (done) => {
|
||
|
const reqMock = { user: { uid: adminUid } };
|
||
|
const resMock = { locals: {} };
|
||
|
middleware.exposeAdmin(reqMock, resMock, () => {
|
||
|
assert.strictEqual(resMock.locals.isAdmin, true);
|
||
|
done();
|
||
|
});
|
||
|
});
|
||
|
|
||
|
it('should expose privileges in res.locals.privileges and isSelf=true', (done) => {
|
||
|
const reqMock = { user: { uid: adminUid }, params: { uid: adminUid } };
|
||
|
const resMock = { locals: {} };
|
||
|
middleware.exposePrivileges(reqMock, resMock, () => {
|
||
|
assert(resMock.locals.privileges);
|
||
|
assert.strictEqual(resMock.locals.privileges.isAdmin, true);
|
||
|
assert.strictEqual(resMock.locals.privileges.isGmod, false);
|
||
|
assert.strictEqual(resMock.locals.privileges.isPrivileged, true);
|
||
|
assert.strictEqual(resMock.locals.privileges.isSelf, true);
|
||
|
done();
|
||
|
});
|
||
|
});
|
||
|
|
||
|
it('should expose privileges in res.locals.privileges and isSelf=false', (done) => {
|
||
|
const reqMock = { user: { uid: 0 }, params: { uid: adminUid } };
|
||
|
const resMock = { locals: {} };
|
||
|
middleware.exposePrivileges(reqMock, resMock, () => {
|
||
|
assert(resMock.locals.privileges);
|
||
|
assert.strictEqual(resMock.locals.privileges.isAdmin, false);
|
||
|
assert.strictEqual(resMock.locals.privileges.isGmod, false);
|
||
|
assert.strictEqual(resMock.locals.privileges.isPrivileged, false);
|
||
|
assert.strictEqual(resMock.locals.privileges.isSelf, false);
|
||
|
done();
|
||
|
});
|
||
|
});
|
||
|
|
||
|
it('should expose privilege set', (done) => {
|
||
|
const reqMock = { user: { uid: adminUid } };
|
||
|
const resMock = { locals: {} };
|
||
|
middleware.exposePrivilegeSet(reqMock, resMock, () => {
|
||
|
assert(resMock.locals.privileges);
|
||
|
assert.deepStrictEqual(resMock.locals.privileges, {
|
||
|
chat: true,
|
||
|
'upload:post:image': true,
|
||
|
'upload:post:file': true,
|
||
|
signature: true,
|
||
|
invite: true,
|
||
|
'group:create': true,
|
||
|
'search:content': true,
|
||
|
'search:users': true,
|
||
|
'search:tags': true,
|
||
|
'view:users': true,
|
||
|
'view:tags': true,
|
||
|
'view:groups': true,
|
||
|
'local:login': true,
|
||
|
ban: true,
|
||
|
'view:users:info': true,
|
||
|
'admin:dashboard': true,
|
||
|
'admin:categories': true,
|
||
|
'admin:privileges': true,
|
||
|
'admin:admins-mods': true,
|
||
|
'admin:users': true,
|
||
|
'admin:groups': true,
|
||
|
'admin:tags': true,
|
||
|
'admin:settings': true,
|
||
|
superadmin: true,
|
||
|
});
|
||
|
done();
|
||
|
});
|
||
|
});
|
||
|
});
|
||
|
});
|
||
|
|