1
0
mirror of https://github.com/verdaccio/verdaccio.git synced 2024-11-13 03:35:52 +01:00
verdaccio/test/unit/api/api.spec.js

731 lines
23 KiB
JavaScript
Raw Normal View History

import request from 'supertest';
2018-01-25 23:14:03 +01:00
import _ from 'lodash';
import path from 'path';
import rimraf from 'rimraf';
import configDefault from '../partials/config/index';
import publishMetadata from '../partials/publish-api';
import forbiddenPlace from '../partials/forbidden-place';
import Config from '../../../src/lib/config';
import endPointAPI from '../../../src/api/index';
2018-06-24 22:39:09 +02:00
2018-06-25 07:59:35 +02:00
import {HEADERS, API_ERROR, HTTP_STATUS, HEADER_TYPE, API_MESSAGE} from '../../../src/lib/constants';
2018-06-24 22:39:09 +02:00
import {mockServer} from './mock';
import {DOMAIN_SERVERS} from '../../functional/config.functional';
2018-06-25 07:59:35 +02:00
import {DIST_TAGS} from '../../../src/lib/utils';
require('../../../src/lib/logger').setup([]);
2018-03-18 13:41:36 +01:00
const credentials = { name: 'Jota', password: 'secretPass' };
describe('endpoint unit test', () => {
let config;
let app;
2018-06-24 22:39:09 +02:00
let mockRegistry;
2018-01-25 23:14:03 +01:00
beforeAll(function(done) {
const store = path.join(__dirname, '../partials/store/test-storage');
2018-06-24 22:39:09 +02:00
const mockServerPort = 55549;
rimraf(store, async () => {
2018-01-25 23:14:03 +01:00
const configForTest = _.clone(configDefault);
configForTest.auth = {
htpasswd: {
2018-06-30 17:13:53 +02:00
file: './test-storage/.htpasswd'
2018-01-25 23:14:03 +01:00
}
};
2018-06-24 22:39:09 +02:00
configForTest.uplinks = {
npmjs: {
url: `http://${DOMAIN_SERVERS}:${mockServerPort}`
}
};
2018-01-25 23:14:03 +01:00
configForTest.self_path = store;
config = new Config(configForTest);
app = await endPointAPI(config);
2018-06-24 22:39:09 +02:00
mockRegistry = await mockServer(mockServerPort).init();
2018-01-25 23:14:03 +01:00
done();
});
});
2018-06-24 22:39:09 +02:00
afterAll(function(done) {
mockRegistry[0].stop();
done();
});
describe('Registry API Endpoints', () => {
describe('should test ping api', () => {
test('should test endpoint /-/ping', (done) => {
request(app)
.get('/-/ping')
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
2018-06-25 07:59:35 +02:00
.end(function(err) {
if (err) {
return done(err);
}
done();
});
});
});
2018-01-25 23:14:03 +01:00
describe('should test whoami api', () => {
test('should test /-/whoami endpoint', (done) => {
request(app)
.get('/-/whoami')
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
if (err) {
return done(err);
}
done();
});
});
test('should test /whoami endpoint', (done) => {
request(app)
.get('/-/whoami')
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
if (err) {
return done(err);
}
done();
});
});
});
2018-01-25 23:14:03 +01:00
describe('should test user api', () => {
describe('should test authorization headers with tokens only errors', () => {
test('should fails on protected endpoint /-/auth-package bad format', (done) => {
request(app)
.get('/auth-package')
.set('authorization', 'FakeHader')
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.FORBIDDEN)
.end(function(err, res) {
expect(res.body.error).toBeDefined();
expect(res.body.error).toMatch(/authorization required to access package auth-package/);
done();
});
});
test('should fails on protected endpoint /-/auth-package bad JWT Bearer format', (done) => {
request(app)
.get('/auth-package')
.set('authorization', 'Bearer')
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.FORBIDDEN)
.end(function(err, res) {
expect(res.body.error).toBeDefined();
expect(res.body.error).toMatch(/authorization required to access package auth-package/);
done();
});
});
test('should fails on protected endpoint /-/auth-package well JWT Bearer', (done) => {
request(app)
.get('/auth-package')
.set('authorization', 'Bearer 12345')
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.FORBIDDEN)
.end(function(err, res) {
expect(res.body.error).toBeDefined();
expect(res.body.error).toMatch(/authorization required to access package auth-package/);
done();
});
});
});
test('should test add a new user', (done) => {
request(app)
.put('/-/user/org.couchdb.user:jota')
.send(credentials)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.CREATED)
.end(function(err, res) {
if (err) {
return done(err);
}
expect(res.body.ok).toBeDefined();
expect(res.body.token).toBeDefined();
const token = res.body.token;
expect(typeof token).toBe('string');
expect(res.body.ok).toMatch(`user '${credentials.name}' created`);
// testing JWT auth headers with token
// we need it here, because token is required
request(app)
.get('/vue')
.set('authorization', `Bearer ${token}`)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
expect(err).toBeNull();
expect(res.body).toBeDefined();
expect(res.body.name).toMatch(/vue/);
done();
});
});
});
test('should test fails add a new user with missing name', (done) => {
const credentialsShort = _.clone(credentials);
delete credentialsShort.name;
request(app)
.put('/-/user/org.couchdb.user:jota')
.send(credentialsShort)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.BAD_REQUEST)
.end(function(err, res) {
if (err) {
return done(err);
}
expect(res.body.error).toBeDefined();
expect(res.body.error).toMatch(/username and password is required/);
done();
});
});
test('should test fails add a new user with missing password', (done) => {
const credentialsShort = _.clone(credentials);
delete credentialsShort.password;
request(app)
.put('/-/user/org.couchdb.user:jota')
.send(credentialsShort)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.BAD_REQUEST)
.end(function(err, res) {
if (err) {
return done(err);
}
expect(res.body.error).toBeDefined();
//FIXME: message is not 100% accurate
expect(res.body.error).toMatch(/username and password is required/);
done();
});
});
test('should test add a new user with login', (done) => {
const newCredentials = _.clone(credentials);
newCredentials.name = 'jotaNew';
request(app)
.put('/-/user/org.couchdb.user:jotaNew')
.send(newCredentials)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.CREATED)
.end(function(err, res) {
if (err) {
return done(err);
}
expect(res.body).toBeTruthy();
done();
});
});
test('should test fails on add a existing user with login', (done) => {
request(app)
.put('/-/user/org.couchdb.user:jotaNew')
.send(credentials)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.CONFLICT)
.end(function(err, res) {
if (err) {
return done(err);
}
expect(res.body.error).toBeDefined();
expect(res.body.error).toMatch(/username is already registered/);
done();
});
});
test('should test fails add a new user with wrong password', (done) => {
const credentialsShort = _.clone(credentials);
credentialsShort.password = 'failPassword';
request(app)
.put('/-/user/org.couchdb.user:jota')
.send(credentialsShort)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.UNAUTHORIZED)
.end(function(err, res) {
if (err) {
return done(err);
}
expect(res.body.error).toBeDefined();
expect(res.body.error).toMatch(/unauthorized/);
done();
});
});
});
describe('should test package api', () => {
test('should fetch jquery package from remote uplink', (done) => {
request(app)
.get('/jquery')
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
if (err) {
return done(err);
}
expect(res.body).toBeDefined();
expect(res.body.name).toMatch(/jquery/);
done();
});
});
test('should fetch jquery specific version package from remote uplink', (done) => {
request(app)
.get('/jquery/1.5.1')
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
if (err) {
return done(err);
}
expect(res.body).toBeDefined();
expect(res.body.name).toMatch(/jquery/);
done();
});
});
test('should fetch jquery specific tag package from remote uplink', (done) => {
request(app)
.get('/jquery/latest')
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
if (err) {
return done(err);
}
expect(res.body).toBeDefined();
expect(res.body.name).toMatch(/jquery/);
done();
});
});
test('should fails on fetch jquery specific tag package from remote uplink', (done) => {
request(app)
.get('/jquery/never-will-exist-this-tag')
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.NOT_FOUND)
2018-06-25 07:59:35 +02:00
.end(function(err) {
if (err) {
return done(err);
}
done();
});
});
test('should not found a unexisting remote package under scope', (done) => {
request(app)
.get('/@verdaccio/not-found')
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.NOT_FOUND)
.end(function(err, res) {
if (err) {
return done(err);
}
done();
});
});
test('should forbid access to remote package', (done) => {
request(app)
.get('/forbidden-place')
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
.expect(HTTP_STATUS.UNAUTHORIZED)
2018-06-25 07:59:35 +02:00
.end(function(err) {
if (err) {
return done(err);
}
done();
});
});
test('should fetch a tarball from remote uplink', (done) => {
request(app)
.get('/jquery/-/jquery-1.5.1.tgz')
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.OCTET_STREAM)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
if (err) {
return done(err);
}
expect(res.body).toBeDefined();
done();
});
});
test('should fails fetch a tarball from remote uplink', (done) => {
request(app)
.get('/jquery/-/jquery-0.0.1.tgz')
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.OCTET_STREAM)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.NOT_FOUND)
2018-06-25 07:59:35 +02:00
.end(function(err) {
if (err) {
2018-06-25 07:59:35 +02:00
expect(err).not.toBeNull();
return done(err);
}
done();
});
});
});
describe('should test dist-tag api', () => {
const jqueryVersion = '2.1.2';
const jqueryUpdatedVersion = {
'beta': '3.0.0',
'jota': '1.6.3'
};
test('should set a new tag on jquery', (done) => {
request(app)
.put('/jquery/verdaccio-tag')
.send(JSON.stringify(jqueryVersion))
.set('accept', 'gzip')
.set('accept-encoding', HEADERS.JSON)
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
.expect(HTTP_STATUS.CREATED)
.end(function(err, res) {
if (err) {
2018-06-25 07:59:35 +02:00
expect.toBeNull();
return done(err);
}
expect(res.body.ok).toBeDefined();
expect(res.body.ok).toMatch(/package tagged/);
done();
});
});
test('should fetch all tag for jquery', (done) => {
request(app)
.get('/-/package/jquery/dist-tags')
.set('accept-encoding', HEADERS.JSON)
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
if (err) {
2018-06-25 07:59:35 +02:00
expect.toBeNull();
return done(err);
}
expect(res.body).toBeDefined();
expect(res.body['verdaccio-tag']).toMatch(jqueryVersion);
done();
});
});
test('should update a new tag on jquery', (done) => {
request(app)
.post('/-/package/jquery/dist-tags')
.send(JSON.stringify(jqueryUpdatedVersion))
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
.expect(HTTP_STATUS.CREATED)
.end(function(err, res) {
if (err) {
2018-06-25 07:59:35 +02:00
expect.toBeNull();
return done(err);
}
expect(res.body.ok).toBeDefined();
2018-06-25 07:59:35 +02:00
expect(res.body.ok).toMatch(API_MESSAGE.TAG_UPDATED);
done();
});
});
test('should fetch all tags for jquery and ccheck previous update', (done) => {
request(app)
.get('/-/package/jquery/dist-tags')
.set('accept-encoding', HEADERS.JSON)
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
if (err) {
2018-06-25 07:59:35 +02:00
expect.toBeNull();
return done(err);
}
expect(res.body).toBeDefined();
expect(res.body['beta']).toMatch(jqueryUpdatedVersion['beta']);
done();
});
});
test('should set a remove a tag on jquery', (done) => {
request(app)
.del('/-/package/jquery/dist-tags/verdaccio-tag')
.set('accept-encoding', HEADERS.JSON)
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
2018-06-25 07:59:35 +02:00
//.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.CREATED)
.end(function(err, res) {
if (err) {
2018-06-25 07:59:35 +02:00
expect.toBeNull();
return done(err);
}
expect(res.body.ok).toBeDefined();
2018-06-25 07:59:35 +02:00
expect(res.body.ok).toMatch(API_MESSAGE.TAG_REMOVED);
done();
});
});
});
describe('should test search api', () => {
test('should perform a search', (done) => {
const now = Date.now()
const cacheTime = now - 6000000;
request(app)
.get('/-/all/since?stale=update_after&startkey=' + cacheTime)
// .set('accept-encoding', HEADERS.JSON)
2018-06-24 22:39:09 +02:00
// .set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
2018-06-25 07:59:35 +02:00
//.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
2018-06-25 07:59:35 +02:00
.end(function(err) {
if (err) {
2018-06-25 07:59:35 +02:00
expect.toBeNull();
return done(err);
}
//TODO: we have to catch the stream check whether it returns something
// we should not spend much time on this api since is deprecated somehow.
done();
});
});
});
describe('should test publish api', () => {
test('should publish a new package', (done) => {
request(app)
.put('/@scope%2fpk1-test')
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
.send(JSON.stringify(publishMetadata))
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.CREATED)
.end(function(err, res) {
if (err) {
2018-06-25 07:59:35 +02:00
expect.toBeNull();
return done(err);
}
expect(res.body.ok).toBeDefined();
expect(res.body.success).toBeDefined();
expect(res.body.success).toBeTruthy();
2018-06-25 07:59:35 +02:00
expect(res.body.ok).toMatch(API_MESSAGE.PKG_CREATED);
done();
});
});
test('should unpublish a new package', (done) => {
//FUTURE: for some reason it does not remove the scope folder
request(app)
.del('/@scope%2fpk1-test/-rev/4-6abcdb4efd41a576')
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
.expect(HTTP_STATUS.CREATED)
.end(function(err, res) {
if (err) {
2018-06-25 07:59:35 +02:00
expect.toBeNull();
return done(err);
}
expect(res.body.ok).toBeDefined();
2018-06-25 07:59:35 +02:00
expect(res.body.ok).toMatch(API_MESSAGE.PKG_REMOVED);
done();
});
});
});
});
describe('Registry WebUI endpoints', () => {
beforeAll(async function() {
await request(app)
.put('/@scope%2fpk1-test')
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
.send(JSON.stringify(publishMetadata))
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.CREATED);
await request(app)
.put('/forbidden-place')
2018-06-24 22:39:09 +02:00
.set(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON)
.send(JSON.stringify(forbiddenPlace))
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.CREATED);
});
describe('Packages', () => {
test('should display all packages', (done) => {
request(app)
.get('/-/verdaccio/packages' )
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
expect(res.body).toHaveLength(1);
done();
});
});
2018-03-20 17:46:20 +01:00
test.skip('should display scoped readme', (done) => {
request(app)
.get('/-/verdaccio/package/readme/@scope/pk1-test')
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.TEXT_CHARSET)
.end(function(err, res) {
expect(res.text).toMatch('<h1 id="test">test</h1>\n');
done();
});
});
2018-03-20 17:01:40 +01:00
//FIXME: disable, we need to inspect why fails randomly
test.skip('should display scoped readme 404', (done) => {
request(app)
.get('/-/verdaccio/package/readme/@scope/404')
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.TEXT_CHARSET)
.end(function(err, res) {
2018-06-23 01:03:25 +02:00
expect(res.body.error).toMatch(API_ERROR.NO_PACKAGE);
done();
});
});
test('should display sidebar info', (done) => {
request(app)
.get('/-/verdaccio/sidebar/@scope/pk1-test')
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
.end(function(err, res) {
const sideBarInfo = res.body;
2018-06-25 07:59:35 +02:00
const latestVersion = publishMetadata.versions[publishMetadata[DIST_TAGS].latest];
expect(sideBarInfo.latest.author).toBeDefined();
expect(sideBarInfo.latest.author.avatar).toMatch(/www.gravatar.com/);
expect(sideBarInfo.latest.author.name).toBe(latestVersion.author.name);
expect(sideBarInfo.latest.author.email).toBe(latestVersion.author.email);
done();
});
});
test('should display sidebar info 404', (done) => {
request(app)
.get('/-/verdaccio/sidebar/@scope/404')
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.NOT_FOUND)
2018-06-25 07:59:35 +02:00
.expect(HEADER_TYPE.CONTENT_TYPE, HEADERS.JSON_CHARSET)
.end(function() {
done();
});
});
});
describe('Search', () => {
test('should search pk1-test', (done) => {
request(app)
.get('/-/verdaccio/search/scope')
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
expect(res.body).toHaveLength(1);
done();
});
});
test('should search with 404', (done) => {
request(app)
.get('/-/verdaccio/search/@')
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
// in a normal world, the output would be 1
// https://github.com/verdaccio/verdaccio/issues/345
// should fix this
expect(res.body).toHaveLength(0);
done();
});
});
test('should not find forbidden-place', (done) => {
request(app)
.get('/-/verdaccio/search/forbidden-place')
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
.end(function(err, res) {
//this is expected since we are not logged
// and forbidden-place is allow_access: 'nobody'
expect(res.body).toHaveLength(0);
done();
});
});
});
2018-03-18 13:41:36 +01:00
describe('User', () => {
describe('login webui', () => {
test('should log a user jota', (done) => {
request(app)
.post('/-/verdaccio/login')
.send({
username: credentials.name,
password: credentials.password
})
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
2018-03-18 13:41:36 +01:00
.end(function(err, res) {
expect(res.body.error).toBeUndefined();
expect(res.body.token).toBeDefined();
expect(res.body.token).toBeTruthy();
expect(res.body.username).toMatch(credentials.name);
done();
});
});
test('should fails on log unvalid user', (done) => {
request(app)
.post('/-/verdaccio/login')
.send(JSON.stringify({
username: 'fake',
password: 'fake'
}))
//FIXME: there should be 401
2018-06-24 22:39:09 +02:00
.expect(HTTP_STATUS.OK)
2018-03-18 13:41:36 +01:00
.end(function(err, res) {
expect(res.body.error).toMatch(/bad username\/password, access denied/);
done();
});
});
});
});
});
});