mirror of
https://github.com/hedgedoc/hedgedoc.git
synced 2024-12-26 14:12:29 +00:00
bf30cbcf48
Signed-off-by: Tilman Vatteroth <git@tilmanvatteroth.de>
139 lines
4.5 KiB
TypeScript
139 lines
4.5 KiB
TypeScript
/*
|
|
* SPDX-FileCopyrightText: 2022 The HedgeDoc developers (see AUTHORS file)
|
|
*
|
|
* SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
import { ConfigModule } from '@nestjs/config';
|
|
import { Test, TestingModule } from '@nestjs/testing';
|
|
import { getRepositoryToken } from '@nestjs/typeorm';
|
|
import { Repository } from 'typeorm';
|
|
|
|
import appConfigMock from '../config/mock/app.config.mock';
|
|
import authConfigMock from '../config/mock/auth.config.mock';
|
|
import {
|
|
InvalidCredentialsError,
|
|
NoLocalIdentityError,
|
|
PasswordTooWeakError,
|
|
} from '../errors/errors';
|
|
import { LoggerModule } from '../logger/logger.module';
|
|
import { User } from '../users/user.entity';
|
|
import { checkPassword, hashPassword } from '../utils/password';
|
|
import { Identity } from './identity.entity';
|
|
import { IdentityService } from './identity.service';
|
|
import { ProviderType } from './provider-type.enum';
|
|
|
|
describe('IdentityService', () => {
|
|
let service: IdentityService;
|
|
let user: User;
|
|
let identityRepo: Repository<Identity>;
|
|
const password = 'AStrongPasswordToStartWith123';
|
|
|
|
beforeEach(async () => {
|
|
const module: TestingModule = await Test.createTestingModule({
|
|
providers: [
|
|
IdentityService,
|
|
{
|
|
provide: getRepositoryToken(Identity),
|
|
useClass: Repository,
|
|
},
|
|
],
|
|
imports: [
|
|
ConfigModule.forRoot({
|
|
isGlobal: true,
|
|
load: [appConfigMock, authConfigMock],
|
|
}),
|
|
LoggerModule,
|
|
],
|
|
}).compile();
|
|
|
|
service = module.get<IdentityService>(IdentityService);
|
|
user = User.create('test', 'Testy') as User;
|
|
identityRepo = module.get<Repository<Identity>>(
|
|
getRepositoryToken(Identity),
|
|
);
|
|
});
|
|
|
|
describe('createLocalIdentity', () => {
|
|
it('works', async () => {
|
|
jest
|
|
.spyOn(identityRepo, 'save')
|
|
.mockImplementationOnce(
|
|
async (identity: Identity): Promise<Identity> => identity,
|
|
);
|
|
const identity = await service.createLocalIdentity(user, password);
|
|
await checkPassword(password, identity.passwordHash ?? '').then(
|
|
(result) => expect(result).toBeTruthy(),
|
|
);
|
|
expect(await identity.user).toEqual(user);
|
|
});
|
|
});
|
|
|
|
describe('updateLocalPassword', () => {
|
|
beforeEach(async () => {
|
|
jest
|
|
.spyOn(identityRepo, 'save')
|
|
.mockImplementationOnce(
|
|
async (identity: Identity): Promise<Identity> => identity,
|
|
)
|
|
.mockImplementationOnce(
|
|
async (identity: Identity): Promise<Identity> => identity,
|
|
);
|
|
const identity = await service.createLocalIdentity(user, password);
|
|
user.identities = Promise.resolve([identity]);
|
|
});
|
|
it('works', async () => {
|
|
const newPassword = 'ThisIsAStrongNewP@ssw0rd';
|
|
const identity = await service.updateLocalPassword(user, newPassword);
|
|
await checkPassword(newPassword, identity.passwordHash ?? '').then(
|
|
(result) => expect(result).toBeTruthy(),
|
|
);
|
|
expect(await identity.user).toEqual(user);
|
|
});
|
|
it('fails, when user has no local identity', async () => {
|
|
user.identities = Promise.resolve([]);
|
|
await expect(service.updateLocalPassword(user, password)).rejects.toThrow(
|
|
NoLocalIdentityError,
|
|
);
|
|
});
|
|
it('fails, when new password is too weak', async () => {
|
|
await expect(
|
|
service.updateLocalPassword(user, 'password1'),
|
|
).rejects.toThrow(PasswordTooWeakError);
|
|
});
|
|
});
|
|
|
|
describe('loginWithLocalIdentity', () => {
|
|
it('works', async () => {
|
|
const identity = Identity.create(
|
|
user,
|
|
ProviderType.LOCAL,
|
|
false,
|
|
) as Identity;
|
|
identity.passwordHash = await hashPassword(password);
|
|
user.identities = Promise.resolve([identity]);
|
|
await expect(service.checkLocalPassword(user, password)).resolves.toEqual(
|
|
undefined,
|
|
);
|
|
});
|
|
describe('fails', () => {
|
|
it('when the password is wrong', async () => {
|
|
const identity = Identity.create(
|
|
user,
|
|
ProviderType.LOCAL,
|
|
false,
|
|
) as Identity;
|
|
identity.passwordHash = await hashPassword(password);
|
|
user.identities = Promise.resolve([identity]);
|
|
await expect(
|
|
service.checkLocalPassword(user, 'wrong_password'),
|
|
).rejects.toThrow(InvalidCredentialsError);
|
|
});
|
|
it('when user has no local identity', async () => {
|
|
user.identities = Promise.resolve([]);
|
|
await expect(
|
|
service.checkLocalPassword(user, password),
|
|
).rejects.toThrow(NoLocalIdentityError);
|
|
});
|
|
});
|
|
});
|
|
});
|