2014-05-15 12:16:20 -04:00
|
|
|
should = require('chai').should()
|
|
|
|
SandboxedModule = require('sandboxed-module')
|
|
|
|
assert = require('assert')
|
|
|
|
path = require('path')
|
|
|
|
sinon = require('sinon')
|
2014-05-16 05:43:55 -04:00
|
|
|
modulePath = path.join __dirname, "../../../../app/js/Features/PasswordReset/PasswordResetTokenHandler"
|
2014-05-15 12:16:20 -04:00
|
|
|
expect = require("chai").expect
|
|
|
|
|
2014-05-16 05:43:55 -04:00
|
|
|
describe "PasswordResetTokenHandler", ->
|
2014-05-15 12:16:20 -04:00
|
|
|
|
|
|
|
beforeEach ->
|
|
|
|
@user_id = "user id here"
|
2014-05-16 05:52:31 -04:00
|
|
|
@stubbedToken = require("crypto").randomBytes(32)
|
2014-05-15 12:16:20 -04:00
|
|
|
|
|
|
|
@settings =
|
|
|
|
redis:
|
|
|
|
web:{}
|
|
|
|
@redisMulti =
|
|
|
|
set:sinon.stub()
|
2014-05-15 12:20:42 -04:00
|
|
|
get:sinon.stub()
|
|
|
|
del:sinon.stub()
|
2014-05-15 12:16:20 -04:00
|
|
|
expire:sinon.stub()
|
|
|
|
exec:sinon.stub()
|
|
|
|
self = @
|
2014-05-16 05:43:55 -04:00
|
|
|
@PasswordResetTokenHandler = SandboxedModule.require modulePath, requires:
|
2014-09-26 12:49:31 -04:00
|
|
|
"redis-sharelatex" :
|
2014-05-15 12:16:20 -04:00
|
|
|
createClient: =>
|
|
|
|
auth:->
|
|
|
|
multi: -> return self.redisMulti
|
|
|
|
|
|
|
|
"settings-sharelatex":@settings
|
|
|
|
"logger-sharelatex": log:->
|
2014-05-16 06:01:36 -04:00
|
|
|
"crypto": randomBytes: () => @stubbedToken
|
2014-05-15 12:16:20 -04:00
|
|
|
|
|
|
|
|
|
|
|
describe "getNewToken", ->
|
|
|
|
|
|
|
|
it "should set a new token into redis with a ttl", (done)->
|
|
|
|
@redisMulti.exec.callsArgWith(0)
|
2014-05-16 06:01:36 -04:00
|
|
|
@PasswordResetTokenHandler.getNewToken @user_id, (err, token) =>
|
|
|
|
@redisMulti.set.calledWith("password_token:#{@stubbedToken.toString("hex")}", @user_id).should.equal true
|
|
|
|
@redisMulti.expire.calledWith("password_token:#{@stubbedToken.toString("hex")}", 60 * 60).should.equal true
|
2014-05-15 12:16:20 -04:00
|
|
|
done()
|
|
|
|
|
|
|
|
it "should return if there was an error", (done)->
|
|
|
|
@redisMulti.exec.callsArgWith(0, "error")
|
2014-05-16 05:43:55 -04:00
|
|
|
@PasswordResetTokenHandler.getNewToken @user_id, (err, token)=>
|
2014-05-15 12:16:20 -04:00
|
|
|
err.should.exist
|
|
|
|
done()
|
2014-05-15 12:20:42 -04:00
|
|
|
|
2015-03-19 10:22:48 -04:00
|
|
|
it "should allow the expiry time to be overridden", (done) ->
|
|
|
|
@redisMulti.exec.callsArgWith(0)
|
|
|
|
@ttl = 42
|
|
|
|
@PasswordResetTokenHandler.getNewToken @user_id, {expiresIn: @ttl}, (err, token) =>
|
|
|
|
@redisMulti.expire.calledWith("password_token:#{@stubbedToken.toString("hex")}", @ttl).should.equal true
|
|
|
|
done()
|
2014-05-15 12:20:42 -04:00
|
|
|
|
2014-05-16 05:43:55 -04:00
|
|
|
describe "getUserIdFromTokenAndExpire", ->
|
2014-05-15 12:20:42 -04:00
|
|
|
|
|
|
|
it "should get and delete the token", (done)->
|
|
|
|
@redisMulti.exec.callsArgWith(0, null, [@user_id])
|
2014-05-16 05:43:55 -04:00
|
|
|
@PasswordResetTokenHandler.getUserIdFromTokenAndExpire @stubbedToken, (err, user_id)=>
|
2014-05-15 12:20:42 -04:00
|
|
|
user_id.should.equal @user_id
|
2014-05-15 12:58:25 -04:00
|
|
|
@redisMulti.get.calledWith("password_token:#{@stubbedToken}").should.equal true
|
|
|
|
@redisMulti.del.calledWith("password_token:#{@stubbedToken}").should.equal true
|
2014-05-15 12:20:42 -04:00
|
|
|
done()
|
|
|
|
|
|
|
|
|
|
|
|
|