mirror of
				https://github.com/NodeBB/NodeBB.git
				synced 2025-11-03 20:45:58 +01:00 
			
		
		
		
	* axios migration * controller tests * add missing deps * feeds * remove unused async * flags * locale-detect * messaging/middleware * remove log * meta * plugins * posts * search * topics/thumbs * user/emails * uploads.js * socket.io * cleaunup * test native fetch * cleanup * increase engine to 18 fix remaining tests * remove testing file * fix comments,typo * revert debug
		
			
				
	
	
		
			178 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			178 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
'use strict';
 | 
						|
 | 
						|
const assert = require('assert');
 | 
						|
const nconf = require('nconf');
 | 
						|
 | 
						|
const db = require('./mocks/databasemock');
 | 
						|
 | 
						|
const user = require('../src/user');
 | 
						|
const groups = require('../src/groups');
 | 
						|
const utils = require('../src/utils');
 | 
						|
const request = require('../src/request');
 | 
						|
const helpers = require('./helpers');
 | 
						|
 | 
						|
describe('Middlewares', () => {
 | 
						|
	describe('expose', () => {
 | 
						|
		let adminUid;
 | 
						|
 | 
						|
		before(async () => {
 | 
						|
			adminUid = await user.create({ username: 'admin', password: '123456' });
 | 
						|
			await groups.join('administrators', adminUid);
 | 
						|
		});
 | 
						|
 | 
						|
		it('should expose res.locals.isAdmin = false', (done) => {
 | 
						|
			const middleware = require('../src/middleware');
 | 
						|
			const resMock = { locals: {} };
 | 
						|
			middleware.exposeAdmin({}, resMock, () => {
 | 
						|
				assert.strictEqual(resMock.locals.isAdmin, false);
 | 
						|
				done();
 | 
						|
			});
 | 
						|
		});
 | 
						|
 | 
						|
		it('should expose res.locals.isAdmin = true', (done) => {
 | 
						|
			const middleware = require('../src/middleware');
 | 
						|
			const reqMock = { user: { uid: adminUid } };
 | 
						|
			const resMock = { locals: {} };
 | 
						|
			middleware.exposeAdmin(reqMock, resMock, () => {
 | 
						|
				assert.strictEqual(resMock.locals.isAdmin, true);
 | 
						|
				done();
 | 
						|
			});
 | 
						|
		});
 | 
						|
 | 
						|
		it('should expose privileges in res.locals.privileges and isSelf=true', (done) => {
 | 
						|
			const middleware = require('../src/middleware');
 | 
						|
			const reqMock = { user: { uid: adminUid }, params: { uid: adminUid } };
 | 
						|
			const resMock = { locals: {} };
 | 
						|
			middleware.exposePrivileges(reqMock, resMock, () => {
 | 
						|
				assert(resMock.locals.privileges);
 | 
						|
				assert.strictEqual(resMock.locals.privileges.isAdmin, true);
 | 
						|
				assert.strictEqual(resMock.locals.privileges.isGmod, false);
 | 
						|
				assert.strictEqual(resMock.locals.privileges.isPrivileged, true);
 | 
						|
				assert.strictEqual(resMock.locals.privileges.isSelf, true);
 | 
						|
				done();
 | 
						|
			});
 | 
						|
		});
 | 
						|
 | 
						|
		it('should expose privileges in res.locals.privileges and isSelf=false', (done) => {
 | 
						|
			const middleware = require('../src/middleware');
 | 
						|
			const reqMock = { user: { uid: 0 }, params: { uid: adminUid } };
 | 
						|
			const resMock = { locals: {} };
 | 
						|
			middleware.exposePrivileges(reqMock, resMock, () => {
 | 
						|
				assert(resMock.locals.privileges);
 | 
						|
				assert.strictEqual(resMock.locals.privileges.isAdmin, false);
 | 
						|
				assert.strictEqual(resMock.locals.privileges.isGmod, false);
 | 
						|
				assert.strictEqual(resMock.locals.privileges.isPrivileged, false);
 | 
						|
				assert.strictEqual(resMock.locals.privileges.isSelf, false);
 | 
						|
				done();
 | 
						|
			});
 | 
						|
		});
 | 
						|
 | 
						|
		it('should expose privilege set', (done) => {
 | 
						|
			const middleware = require('../src/middleware');
 | 
						|
			const reqMock = { user: { uid: adminUid } };
 | 
						|
			const resMock = { locals: {} };
 | 
						|
			middleware.exposePrivilegeSet(reqMock, resMock, () => {
 | 
						|
				assert(resMock.locals.privileges);
 | 
						|
				assert.deepStrictEqual(resMock.locals.privileges, {
 | 
						|
					chat: true,
 | 
						|
					'chat:privileged': true,
 | 
						|
					'upload:post:image': true,
 | 
						|
					'upload:post:file': true,
 | 
						|
					signature: true,
 | 
						|
					invite: true,
 | 
						|
					'group:create': true,
 | 
						|
					'search:content': true,
 | 
						|
					'search:users': true,
 | 
						|
					'search:tags': true,
 | 
						|
					'view:users': true,
 | 
						|
					'view:tags': true,
 | 
						|
					'view:groups': true,
 | 
						|
					'local:login': true,
 | 
						|
					ban: true,
 | 
						|
					mute: true,
 | 
						|
					'view:users:info': true,
 | 
						|
					'admin:dashboard': true,
 | 
						|
					'admin:categories': true,
 | 
						|
					'admin:privileges': true,
 | 
						|
					'admin:admins-mods': true,
 | 
						|
					'admin:users': true,
 | 
						|
					'admin:groups': true,
 | 
						|
					'admin:tags': true,
 | 
						|
					'admin:settings': true,
 | 
						|
					superadmin: true,
 | 
						|
				});
 | 
						|
				done();
 | 
						|
			});
 | 
						|
		});
 | 
						|
	});
 | 
						|
 | 
						|
	describe('cache-control header', () => {
 | 
						|
		let uid;
 | 
						|
		let jar;
 | 
						|
 | 
						|
		before(async () => {
 | 
						|
			uid = await user.create({ username: 'testuser', password: '123456' });
 | 
						|
			({ jar } = await helpers.loginUser('testuser', '123456'));
 | 
						|
		});
 | 
						|
 | 
						|
		it('should be absent on non-existent routes, for guests', async () => {
 | 
						|
			const { response } = await request.get(`${nconf.get('url')}/${utils.generateUUID()}`);
 | 
						|
 | 
						|
			assert.strictEqual(response.statusCode, 404);
 | 
						|
			assert(!Object.keys(response.headers).includes('cache-control'));
 | 
						|
		});
 | 
						|
 | 
						|
		it('should be set to "private" on non-existent routes, for logged in users', async () => {
 | 
						|
			const { response } = await request.get(`${nconf.get('url')}/${utils.generateUUID()}`, {
 | 
						|
				jar,
 | 
						|
				headers: {
 | 
						|
					accept: 'text/html',
 | 
						|
				},
 | 
						|
			});
 | 
						|
 | 
						|
			assert.strictEqual(response.statusCode, 404);
 | 
						|
			assert(Object.keys(response.headers).includes('cache-control'));
 | 
						|
			assert.strictEqual(response.headers['cache-control'], 'private');
 | 
						|
		});
 | 
						|
 | 
						|
		it('should be absent on regular routes, for guests', async () => {
 | 
						|
			const { response } = await request.get(nconf.get('url'));
 | 
						|
 | 
						|
			assert.strictEqual(response.statusCode, 200);
 | 
						|
			assert(!Object.keys(response.headers).includes('cache-control'));
 | 
						|
		});
 | 
						|
 | 
						|
		it('should be absent on api routes, for guests', async () => {
 | 
						|
			const { response } = await request.get(`${nconf.get('url')}/api`);
 | 
						|
 | 
						|
			assert.strictEqual(response.statusCode, 200);
 | 
						|
			assert(!Object.keys(response.headers).includes('cache-control'));
 | 
						|
		});
 | 
						|
 | 
						|
		it('should be set to "private" on regular routes, for logged-in users', async () => {
 | 
						|
			const { response } = await request.get(nconf.get('url'), { jar });
 | 
						|
 | 
						|
			assert.strictEqual(response.statusCode, 200);
 | 
						|
			assert(Object.keys(response.headers).includes('cache-control'));
 | 
						|
			assert.strictEqual(response.headers['cache-control'], 'private');
 | 
						|
		});
 | 
						|
 | 
						|
		it('should be set to "private" on api routes, for logged-in users', async () => {
 | 
						|
			const { response } = await request.get(`${nconf.get('url')}/api`, { jar });
 | 
						|
 | 
						|
			assert.strictEqual(response.statusCode, 200);
 | 
						|
			assert(Object.keys(response.headers).includes('cache-control'));
 | 
						|
			assert.strictEqual(response.headers['cache-control'], 'private');
 | 
						|
		});
 | 
						|
 | 
						|
		it('should be set to "private" on apiv3 routes, for logged-in users', async () => {
 | 
						|
			const { response } = await request.get(`${nconf.get('url')}/api/v3/users/${uid}`, { jar });
 | 
						|
 | 
						|
			assert.strictEqual(response.statusCode, 200);
 | 
						|
			assert(Object.keys(response.headers).includes('cache-control'));
 | 
						|
			assert.strictEqual(response.headers['cache-control'], 'private');
 | 
						|
		});
 | 
						|
	});
 | 
						|
});
 | 
						|
 |