@hoodie/account-server
Version:
Account JSON API backed by PouchDB
177 lines (144 loc) • 5.44 kB
JavaScript
var defaultsDeep = require('lodash/defaultsDeep')
var nock = require('nock')
var test = require('tap').test
var getServer = require('../../utils/get-server')
var couchdbErrorTests = require('../../utils/couchdb-error-tests')
var routeOptions = {
method: 'GET',
url: '/session',
headers: {
accept: 'application/vnd.api+json',
authorization: 'Session cGF0LWRvZTpCQkZFMzg4MDqp7ppCNngda1JMi7XcyhtaUxf2nA',
'content-type': 'application/vnd.api+json'
}
}
var mockCouchDbGetUser = nock('http://localhost:5984')
.get('/_users/org.couchdb.user%3Apat-doe')
.query(true)
test('GET /session', function (group) {
group.beforeEach(getServer)
couchdbErrorTests(group, mockCouchDbGetUser, routeOptions)
group.test('No Authorization header sent', function (t) {
this.server.inject({
method: 'GET',
url: '/session',
headers: {}
}, function (response) {
t.is(response.statusCode, 401, 'returns 401 status')
t.is(response.result.error, 'Unauthorized', 'returns "Unauthorized" error')
t.is(response.result.message, 'Authorization header missing', 'returns "Authorization header missing" error')
// TODO:
// - response.result.error should be response.result.errors[0].title
// - response.result.message should be response.result.errors[0].msesage
// - and we should check for response.result.errors.length === 1
// ^ these are currently blocked by https://github.com/wraithgar/hapi-json-api/issues/20
t.end()
})
})
group.test('User not found', function (t) {
var couchdb = mockCouchDbGetUser.reply(404, {error: 'Not Found'})
this.server.inject(routeOptions, function (response) {
t.is(couchdb.pendingMocks()[0], undefined, 'CouchDB received request')
t.is(response.statusCode, 401, 'returns 401 status')
t.is(response.result.errors.length, 1, 'returns one error')
t.is(response.result.errors[0].title, 'Unauthorized', 'returns "Session invalid" error')
t.end()
})
})
group.test('User found', function (subGroup) {
subGroup.test('Session valid', function (t) {
mockCouchDbGetUser.reply(200, {
name: 'pat-doe',
roles: [
'id:userid123', 'mycustomrole'
],
salt: 'salt123'
})
var sessionResponse = require('../../fixtures/session-response.json')
this.server.inject(routeOptions, function (response) {
delete response.result.meta
t.is(response.statusCode, 200, 'returns 200 status')
t.deepEqual(response.result, sessionResponse, 'returns the right content')
t.end()
})
})
subGroup.test('Session invalid', function (t) {
mockCouchDbGetUser.reply(200, {
name: 'pat-doe',
roles: [
'id:userid123', 'mycustomrole'
],
salt: 'salt123'
})
var requestOptions = defaultsDeep({
headers: {
// Token calculated with invalid salt (salt456)
authorization: 'Session cGF0LWRvZToxMjc1MDA6YMtzOJDSC7iTA4cB2kjfjqbfk1Y'
}
}, routeOptions)
this.server.inject(requestOptions, function (response) {
t.is(response.statusCode, 401, 'returns 401 status')
t.is(response.result.errors.length, 1, 'returns one error')
t.is(response.result.errors[0].title, 'Unauthorized', 'returns "Unauthorized" error')
t.is(response.result.errors[0].detail, 'Session invalid', 'returns "Session invalid" message')
t.end()
})
})
subGroup.end()
})
group.test('User is admin', function (t) {
var requestOptions = defaultsDeep({
headers: {
// calculateSessionId('admin', '1081b31861bd1e91611341da16c11c16a12c13718d1f712e', 'secret', 1209600)
authorization: 'Session YWRtaW46MTI3NTAwOh08V1EljPqAPAnv8mtxWNF87zdW'
}
}, routeOptions)
var sessionAdminResponse = require('../../fixtures/session-admin-response.json')
this.server.inject(requestOptions, function (response) {
delete response.result.meta
t.is(response.statusCode, 200, 'returns 200 status')
t.deepEqual(response.result, sessionAdminResponse, 'returns the right content')
t.end()
})
})
group.end()
})
test('GET /session?include=account.profile', function (group) {
group.beforeEach(getServer)
group.test('User found & Session valid', function (t) {
mockCouchDbGetUser.reply(200, {
name: 'pat-doe',
roles: [
'id:userid123', 'mycustomrole'
],
profile: {
fullName: 'pat Doe',
email: 'pat@example.com'
},
salt: 'salt123'
})
var options = defaultsDeep({
url: '/session?include=account.profile'
}, routeOptions)
var sessionWithProfileResponse = require('../../fixtures/session-with-profile-response.json')
this.server.inject(options, function (response) {
delete response.result.meta
t.is(response.statusCode, 200, 'returns 200 status')
t.deepEqual(response.result, sessionWithProfileResponse, 'returns the right content')
t.end()
})
})
group.end()
})
test('GET /session?include=foobar', function (t) {
t.plan(2)
getServer(function (error, server) {
t.error(error)
var options = defaultsDeep({
url: '/session?include=foobar'
}, routeOptions)
server.inject(options, function (response) {
t.is(response.statusCode, 400, 'returns 400 status')
})
})
})