|
|
|
@ -16,44 +16,35 @@ const privileges = require('../src/privileges');
|
|
|
|
|
const helpers = require('./helpers');
|
|
|
|
|
|
|
|
|
|
describe('authentication', () => {
|
|
|
|
|
function loginUser(username, password, callback) {
|
|
|
|
|
const jar = request.jar();
|
|
|
|
|
request({
|
|
|
|
|
url: `${nconf.get('url')}/api/config`,
|
|
|
|
|
json: true,
|
|
|
|
|
jar: jar,
|
|
|
|
|
}, (err, response, body) => {
|
|
|
|
|
if (err) {
|
|
|
|
|
return callback(err);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
request.post(`${nconf.get('url')}/login`, {
|
|
|
|
|
form: {
|
|
|
|
|
username: username,
|
|
|
|
|
password: password,
|
|
|
|
|
},
|
|
|
|
|
json: true,
|
|
|
|
|
jar: jar,
|
|
|
|
|
headers: {
|
|
|
|
|
'x-csrf-token': body.csrf_token,
|
|
|
|
|
},
|
|
|
|
|
}, (err, response, body) => {
|
|
|
|
|
callback(err, response, body, jar);
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
const loginUserPromisified = util.promisify(loginUser);
|
|
|
|
|
|
|
|
|
|
const jar = request.jar();
|
|
|
|
|
let regularUid;
|
|
|
|
|
before((done) => {
|
|
|
|
|
user.create({ username: 'regular', password: 'regularpwd', email: 'regular@nodebb.org' }, (err, uid) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
regularUid = uid;
|
|
|
|
|
assert.strictEqual(uid, 1);
|
|
|
|
|
done();
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should allow login with email for uid 1', async () => {
|
|
|
|
|
const oldValue = meta.config.allowLoginWith;
|
|
|
|
|
meta.config.allowLoginWith = 'email';
|
|
|
|
|
const { res } = await helpers.loginUser('regular@nodebb.org', 'regularpwd');
|
|
|
|
|
assert.strictEqual(res.statusCode, 200);
|
|
|
|
|
meta.config.allowLoginWith = oldValue;
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('second user should fail to login with email since email is not confirmed', async () => {
|
|
|
|
|
const oldValue = meta.config.allowLoginWith;
|
|
|
|
|
meta.config.allowLoginWith = 'email';
|
|
|
|
|
const uid = await user.create({ username: '2nduser', password: '2ndpassword', email: '2nduser@nodebb.org' });
|
|
|
|
|
const { res, body } = await helpers.loginUser('2nduser@nodebb.org', '2ndpassword');
|
|
|
|
|
assert.strictEqual(res.statusCode, 403);
|
|
|
|
|
assert.strictEqual(body, '[[error:invalid-login-credentials]]');
|
|
|
|
|
meta.config.allowLoginWith = oldValue;
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should fail to create user if username is too short', (done) => {
|
|
|
|
|
helpers.registerUser({
|
|
|
|
|
username: 'a',
|
|
|
|
@ -164,13 +155,13 @@ describe('authentication', () => {
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should login a user', (done) => {
|
|
|
|
|
loginUser('regular', 'regularpwd', (err, response, body, jar) => {
|
|
|
|
|
helpers.loginUser('regular', 'regularpwd', (err, data) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert(body);
|
|
|
|
|
assert(data.body);
|
|
|
|
|
request({
|
|
|
|
|
url: `${nconf.get('url')}/api/self`,
|
|
|
|
|
json: true,
|
|
|
|
|
jar: jar,
|
|
|
|
|
jar: data.jar,
|
|
|
|
|
}, (err, response, body) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert(body);
|
|
|
|
@ -245,37 +236,37 @@ describe('authentication', () => {
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should fail to login if user does not exist', (done) => {
|
|
|
|
|
loginUser('doesnotexist', 'nopassword', (err, response, body) => {
|
|
|
|
|
helpers.loginUser('doesnotexist', 'nopassword', (err, data) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert.equal(response.statusCode, 403);
|
|
|
|
|
assert.equal(body, '[[error:invalid-login-credentials]]');
|
|
|
|
|
assert.equal(data.res.statusCode, 403);
|
|
|
|
|
assert.equal(data.body, '[[error:invalid-login-credentials]]');
|
|
|
|
|
done();
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should fail to login if username is empty', (done) => {
|
|
|
|
|
loginUser('', 'some password', (err, response, body) => {
|
|
|
|
|
helpers.loginUser('', 'some password', (err, data) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert.equal(response.statusCode, 403);
|
|
|
|
|
assert.equal(body, '[[error:invalid-username-or-password]]');
|
|
|
|
|
assert.equal(data.res.statusCode, 403);
|
|
|
|
|
assert.equal(data.body, '[[error:invalid-username-or-password]]');
|
|
|
|
|
done();
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should fail to login if password is empty', (done) => {
|
|
|
|
|
loginUser('someuser', '', (err, response, body) => {
|
|
|
|
|
helpers.loginUser('someuser', '', (err, data) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert.equal(response.statusCode, 403);
|
|
|
|
|
assert.equal(body, '[[error:invalid-username-or-password]]');
|
|
|
|
|
assert.equal(data.res.statusCode, 403);
|
|
|
|
|
assert.equal(data.body, '[[error:invalid-username-or-password]]');
|
|
|
|
|
done();
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should fail to login if username and password are empty', (done) => {
|
|
|
|
|
loginUser('', '', (err, response, body) => {
|
|
|
|
|
helpers.loginUser('', '', (err, data) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert.equal(response.statusCode, 403);
|
|
|
|
|
assert.equal(body, '[[error:invalid-username-or-password]]');
|
|
|
|
|
assert.equal(data.res.statusCode, 403);
|
|
|
|
|
assert.equal(data.body, '[[error:invalid-username-or-password]]');
|
|
|
|
|
done();
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
@ -283,10 +274,10 @@ describe('authentication', () => {
|
|
|
|
|
it('should fail to login if user does not have password field in db', (done) => {
|
|
|
|
|
user.create({ username: 'hasnopassword', email: 'no@pass.org' }, (err, uid) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
loginUser('hasnopassword', 'doesntmatter', (err, response, body) => {
|
|
|
|
|
helpers.loginUser('hasnopassword', 'doesntmatter', (err, data) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert.equal(response.statusCode, 403);
|
|
|
|
|
assert.equal(body, '[[error:invalid-login-credentials]]');
|
|
|
|
|
assert.equal(data.res.statusCode, 403);
|
|
|
|
|
assert.equal(data.body, '[[error:invalid-login-credentials]]');
|
|
|
|
|
done();
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
@ -297,10 +288,10 @@ describe('authentication', () => {
|
|
|
|
|
for (let i = 0; i < 5000; i++) {
|
|
|
|
|
longPassword += 'a';
|
|
|
|
|
}
|
|
|
|
|
loginUser('someuser', longPassword, (err, response, body) => {
|
|
|
|
|
helpers.loginUser('someuser', longPassword, (err, data) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert.equal(response.statusCode, 403);
|
|
|
|
|
assert.equal(body, '[[error:password-too-long]]');
|
|
|
|
|
assert.equal(data.res.statusCode, 403);
|
|
|
|
|
assert.equal(data.body, '[[error:password-too-long]]');
|
|
|
|
|
done();
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
@ -308,10 +299,10 @@ describe('authentication', () => {
|
|
|
|
|
it('should fail to login if local login is disabled', (done) => {
|
|
|
|
|
privileges.global.rescind(['groups:local:login'], 'registered-users', (err) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
loginUser('regular', 'regularpwd', (err, response, body) => {
|
|
|
|
|
helpers.loginUser('regular', 'regularpwd', (err, data) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert.equal(response.statusCode, 403);
|
|
|
|
|
assert.equal(body, '[[error:local-login-disabled]]');
|
|
|
|
|
assert.equal(data.res.statusCode, 403);
|
|
|
|
|
assert.equal(data.body, '[[error:local-login-disabled]]');
|
|
|
|
|
privileges.global.give(['groups:local:login'], 'registered-users', done);
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
@ -396,17 +387,17 @@ describe('authentication', () => {
|
|
|
|
|
it('should be able to login with email', async () => {
|
|
|
|
|
const uid = await user.create({ username: 'ginger', password: '123456', email: 'ginger@nodebb.org' });
|
|
|
|
|
await user.email.confirmByUid(uid);
|
|
|
|
|
const response = await loginUserPromisified('ginger@nodebb.org', '123456');
|
|
|
|
|
assert.equal(response.statusCode, 200);
|
|
|
|
|
const { res } = await helpers.loginUser('ginger@nodebb.org', '123456');
|
|
|
|
|
assert.equal(res.statusCode, 200);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should fail to login if login type is username and an email is sent', (done) => {
|
|
|
|
|
meta.config.allowLoginWith = 'username';
|
|
|
|
|
loginUser('ginger@nodebb.org', '123456', (err, response, body) => {
|
|
|
|
|
helpers.loginUser('ginger@nodebb.org', '123456', (err, data) => {
|
|
|
|
|
meta.config.allowLoginWith = 'username-email';
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert.equal(response.statusCode, 400);
|
|
|
|
|
assert.equal(body, '[[error:wrong-login-type-username]]');
|
|
|
|
|
assert.equal(data.res.statusCode, 400);
|
|
|
|
|
assert.equal(data.body, '[[error:wrong-login-type-username]]');
|
|
|
|
|
done();
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
@ -450,28 +441,28 @@ describe('authentication', () => {
|
|
|
|
|
it('should prevent banned user from logging in', (done) => {
|
|
|
|
|
user.bans.ban(bannedUser.uid, 0, 'spammer', (err) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
loginUser(bannedUser.username, bannedUser.pw, (err, res, body) => {
|
|
|
|
|
helpers.loginUser(bannedUser.username, bannedUser.pw, (err, data) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert.equal(res.statusCode, 403);
|
|
|
|
|
delete body.timestamp;
|
|
|
|
|
assert.deepStrictEqual(body, {
|
|
|
|
|
assert.equal(data.res.statusCode, 403);
|
|
|
|
|
delete data.body.timestamp;
|
|
|
|
|
assert.deepStrictEqual(data.body, {
|
|
|
|
|
banned_until: 0,
|
|
|
|
|
banned_until_readable: '',
|
|
|
|
|
expiry: 0,
|
|
|
|
|
expiry_readable: '',
|
|
|
|
|
reason: 'spammer',
|
|
|
|
|
uid: 6,
|
|
|
|
|
uid: bannedUser.uid,
|
|
|
|
|
});
|
|
|
|
|
user.bans.unban(bannedUser.uid, (err) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
const expiry = Date.now() + 10000;
|
|
|
|
|
user.bans.ban(bannedUser.uid, expiry, '', (err) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
loginUser(bannedUser.username, bannedUser.pw, (err, res, body) => {
|
|
|
|
|
helpers.loginUser(bannedUser.username, bannedUser.pw, (err, data) => {
|
|
|
|
|
assert.ifError(err);
|
|
|
|
|
assert.equal(res.statusCode, 403);
|
|
|
|
|
assert(body.banned_until);
|
|
|
|
|
assert(body.reason, '[[user:info.banned-no-reason]]');
|
|
|
|
|
assert.equal(data.res.statusCode, 403);
|
|
|
|
|
assert(data.body.banned_until);
|
|
|
|
|
assert(data.body.reason, '[[user:info.banned-no-reason]]');
|
|
|
|
|
done();
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
@ -482,14 +473,14 @@ describe('authentication', () => {
|
|
|
|
|
|
|
|
|
|
it('should allow banned user to log in if the "banned-users" group has "local-login" privilege', async () => {
|
|
|
|
|
await privileges.global.give(['groups:local:login'], 'banned-users');
|
|
|
|
|
const res = await loginUserPromisified(bannedUser.username, bannedUser.pw);
|
|
|
|
|
const { res } = await helpers.loginUser(bannedUser.username, bannedUser.pw);
|
|
|
|
|
assert.strictEqual(res.statusCode, 200);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
it('should allow banned user to log in if the user herself has "local-login" privilege', async () => {
|
|
|
|
|
await privileges.global.rescind(['groups:local:login'], 'banned-users');
|
|
|
|
|
await privileges.categories.give(['local:login'], 0, bannedUser.uid);
|
|
|
|
|
const res = await loginUserPromisified(bannedUser.username, bannedUser.pw);
|
|
|
|
|
const { res } = await helpers.loginUser(bannedUser.username, bannedUser.pw);
|
|
|
|
|
assert.strictEqual(res.statusCode, 200);
|
|
|
|
|
});
|
|
|
|
|
});
|
|
|
|
@ -503,26 +494,26 @@ describe('authentication', () => {
|
|
|
|
|
},
|
|
|
|
|
function (_uid, next) {
|
|
|
|
|
uid = _uid;
|
|
|
|
|
loginUser('lockme', 'abcdef', next);
|
|
|
|
|
helpers.loginUser('lockme', 'abcdef', next);
|
|
|
|
|
},
|
|
|
|
|
function (res, body, jar, next) {
|
|
|
|
|
loginUser('lockme', 'abcdef', next);
|
|
|
|
|
function (data, next) {
|
|
|
|
|
helpers.loginUser('lockme', 'abcdef', next);
|
|
|
|
|
},
|
|
|
|
|
function (res, body, jar, next) {
|
|
|
|
|
loginUser('lockme', 'abcdef', next);
|
|
|
|
|
function (data, next) {
|
|
|
|
|
helpers.loginUser('lockme', 'abcdef', next);
|
|
|
|
|
},
|
|
|
|
|
function (res, body, jar, next) {
|
|
|
|
|
loginUser('lockme', 'abcdef', next);
|
|
|
|
|
function (data, next) {
|
|
|
|
|
helpers.loginUser('lockme', 'abcdef', next);
|
|
|
|
|
},
|
|
|
|
|
function (res, body, jar, next) {
|
|
|
|
|
function (data, next) {
|
|
|
|
|
meta.config.loginAttempts = 5;
|
|
|
|
|
assert.equal(res.statusCode, 403);
|
|
|
|
|
assert.equal(body, '[[error:account-locked]]');
|
|
|
|
|
loginUser('lockme', 'abcdef', next);
|
|
|
|
|
assert.equal(data.res.statusCode, 403);
|
|
|
|
|
assert.equal(data.body, '[[error:account-locked]]');
|
|
|
|
|
helpers.loginUser('lockme', 'abcdef', next);
|
|
|
|
|
},
|
|
|
|
|
function (res, body, jar, next) {
|
|
|
|
|
assert.equal(res.statusCode, 403);
|
|
|
|
|
assert.equal(body, '[[error:account-locked]]');
|
|
|
|
|
function (data, next) {
|
|
|
|
|
assert.equal(data.res.statusCode, 403);
|
|
|
|
|
assert.equal(data.body, '[[error:account-locked]]');
|
|
|
|
|
db.exists(`lockout:${uid}`, next);
|
|
|
|
|
},
|
|
|
|
|
function (locked, next) {
|
|
|
|
@ -534,7 +525,7 @@ describe('authentication', () => {
|
|
|
|
|
|
|
|
|
|
it('should clear all reset tokens upon successful login', async () => {
|
|
|
|
|
const code = await user.reset.generate(regularUid);
|
|
|
|
|
await loginUserPromisified('regular', 'regularpwd');
|
|
|
|
|
await helpers.loginUser('regular', 'regularpwd');
|
|
|
|
|
const valid = await user.reset.validate(code);
|
|
|
|
|
assert.strictEqual(valid, false);
|
|
|
|
|
});
|
|
|
|
|