-
Notifications
You must be signed in to change notification settings - Fork 8
/
results2.txt
2716 lines (2169 loc) · 282 KB
/
results2.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
> [email protected] test-windows
> DEBUG=hackboard:* SET NODE_ENV=test & mocha -r dotenv/config --reporter spec tests/**.js --exit
info: [ DATABASE SERVICE ] Connecting to db on mongodb://127.0.0.1:27017/hackboard?authSource=admin
info: Account router activated
info: Auth router activated
info: Hacker router activated
info: Team router activated
info: Travel router activated
info: Sponsor router activated
info: Volunteer router activated
info: Search router activated
info: Settings router activated
info: Role router activated
info: [ DATABASE SERVICE ] Connected to database on mongodb://127.0.0.1:27017/hackboard?authSource=admin
GET user account
2024-11-11T20:20:29.223Z - [32minfo[39m: GET /api/account/self 401 6ms
Ô£ö should FAIL to list the user's account on /api/account/self GET due to authentication
2024-11-11T20:20:31.770Z - [32minfo[39m: POST /api/auth/login 401 152ms
Ô£ö should FAIL due to invalid password (157ms)
2024-11-11T20:20:34.110Z - [32minfo[39m: POST /api/auth/login 200 84ms
2024-11-11T20:20:34.114Z - [32minfo[39m: GET /api/account/self 401 1ms
1) should list the user's account on /api/account/self GET
2024-11-11T20:20:36.532Z - [32minfo[39m: POST /api/auth/login 200 71ms
2024-11-11T20:20:36.538Z - [32minfo[39m: GET /api/account/673267091ffee080f4728ee5 401 2ms
2) should list another account specified by id using admin priviledge on /api/account/:id/ GET
2024-11-11T20:20:38.974Z - [32minfo[39m: POST /api/auth/login 200 110ms
2024-11-11T20:20:38.979Z - [32minfo[39m: GET /api/account/673267091ffee080f4728ee5 401 2ms
3) should list an account specified by id on /api/account/:id/ GET
2024-11-11T20:20:41.302Z - [32minfo[39m: POST /api/auth/login 200 85ms
2024-11-11T20:20:41.307Z - [32minfo[39m: GET /api/account/673267091ffee080f4728f17 401 1ms
4) should FAIL to list an account specified by id on /api/account/:id/ GET due to lack of authorization
POST create account
2024-11-11T20:20:44.704Z - [32minfo[39m: POST /api/account/ 200 995ms
Ô£ö should SUCCEED and create a new account (1007ms)
2024-11-11T20:20:47.251Z - [32minfo[39m: POST /api/account/ 422 88ms
Ô£ö should FAIL to create an account because the email is already in use (92ms)
2024-11-11T20:20:49.715Z - [32minfo[39m: POST /api/account 200 187ms
Ô£ö should SUCCEED and create a new account without a phone number (198ms)
POST confirm account
2024-11-11T20:20:50.282Z - [32minfo[39m: POST /api/auth/confirm/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhY2NvdW50Q29uZmlybWF0aW9uSWQiOiI2NzMyNjcwOTFmZmVlMDgwZjQ3MjhmNzAiLCJhY2NvdW50SWQiOiI2NzMyNjcwOTFmZmVlMDgwZjQ3MjhmNmMiLCJpYXQiOjE3MzEzNTY0MjUsImV4cCI6MTczMTk2MTIyNX0.G7AhkxKkj2M29Cl66sir6qb9OcUZuZImNtuuE4wxSZM 200 15ms
Ô£ö should SUCCEED and confirm the account
2024-11-11T20:20:50.808Z - [32minfo[39m: POST /api/auth/confirm/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhY2NvdW50Q29uZmlybWF0aW9uSWQiOiI2NzMyNjcwOTFmZmVlMDgwZjQ3MjhmNzAiLCJhY2NvdW50SWQiOiI2NzMyNjcwOTFmZmVlMDgwZjQ3MjhmMjEiLCJpYXQiOjE3MzEzNTY0MjUsImV4cCI6MTczMTk2MTIyNX0.Lvjx_jXu157IkxWFnVOT8AfolCGnm4CdWFeZanLmVKs 401 10ms
Ô£ö should FAIL confirming the account
2024-11-11T20:20:51.322Z - [32minfo[39m: POST /api/auth/confirm/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhY2NvdW50Q29uZmlybWF0aW9uSWQiOiI2NzMyNjcwOTFmZmVlMDgwZjQ3MjhmNzAiLCJhY2NvdW50SWQiOiI2NzMyNjcwOTFmZmVlMDgwZjQ3MjhmMjEiLCJpYXQiOjE3MzEzNTY0MjUsImV4cCI6MTczMTk2MTIyNX0.Lvjx_jXu157IkxWFnVOT8AfolCGnm4CdWFeZanLmVKs 401 7ms
Ô£ö should FAIL to confirm account that has token with email but no account
PATCH update account
2024-11-11T20:20:53.824Z - [32minfo[39m: PATCH /api/account/673267091ffee080f4728ee5 401 1ms
Ô£ö should FAIL to update an account due to authentication
2024-11-11T20:20:56.586Z - [32minfo[39m: POST /api/auth/login 200 81ms
2024-11-11T20:20:56.596Z - [32minfo[39m: PATCH /api/account/673267091ffee080f4728ee5 401 1ms
5) should SUCCEED and use admin to update another account
2024-11-11T20:20:59.326Z - [32minfo[39m: POST /api/auth/login 200 82ms
2024-11-11T20:20:59.331Z - [32minfo[39m: PATCH /api/account/673267091ffee080f4728ee5 401 2ms
6) should SUCCEED and update the user's own account
2024-11-11T20:21:02.265Z - [32minfo[39m: POST /api/auth/login 200 135ms
2024-11-11T20:21:02.270Z - [32minfo[39m: PATCH /api/account/673267091ffee080f4728f17 401 2ms
7) should FAIL to update an account due to lack of authorization
2024-11-11T20:21:05.362Z - [32minfo[39m: POST /api/auth/login 200 75ms
2024-11-11T20:21:05.365Z - [32minfo[39m: PATCH /api/account/673267091ffee080f4728f17 401 1ms
8) should FAIL to update email to one that already exists
POST reset password
2024-11-11T20:21:06.458Z - [32minfo[39m: POST /api/auth/password/reset 200 92ms
Ô£ö should SUCCEED and change the password (96ms)
PATCH change password for logged in user
2024-11-11T20:21:07.944Z - [32minfo[39m: PATCH /api/auth/password/change 401 1ms
Ô£ö should FAIL to change the user's password because they are not logged in
2024-11-11T20:21:09.743Z - [32minfo[39m: POST /api/auth/login 200 113ms
2024-11-11T20:21:09.746Z - [32minfo[39m: PATCH /api/auth/password/change 401 1ms
9) should change the logged in user's password to a new password
2024-11-11T20:21:11.722Z - [32minfo[39m: POST /api/auth/login 200 96ms
2024-11-11T20:21:11.725Z - [32minfo[39m: PATCH /api/auth/password/change 401 1ms
Ô£ö should FAIL to change the logged in user's password to a new password because old password is incorrect (103ms)
GET retrieve permissions
2024-11-11T20:21:15.300Z - [32minfo[39m: POST /api/auth/login 200 191ms
2024-11-11T20:21:15.309Z - [32minfo[39m: GET /api/auth/rolebindings/673267091ffee080f4728ee5 401 3ms
10) should SUCCEED and retrieve the rolebindings for the user
2024-11-11T20:21:20.027Z - [32minfo[39m: GET /api/auth/rolebindings/673267091ffee080f4728ee5 401 2ms
Ô£ö should FAIL to retrieve the rolebindings as the account is not authenticated
GET resend confirmation email
2024-11-11T20:21:22.820Z - [32minfo[39m: POST /api/auth/login 200 219ms
2024-11-11T20:21:22.829Z - [32minfo[39m: GET /api/auth/confirm/resend 401 2ms
11) should SUCCEED and resend the confirmation email
2024-11-11T20:21:25.586Z - [32minfo[39m: POST /api/auth/login 200 182ms
2024-11-11T20:21:25.592Z - [32minfo[39m: GET /api/auth/confirm/resend 401 1ms
12) should FAIL as the account is already confirmed
2024-11-11T20:21:28.174Z - [32minfo[39m: POST /api/auth/login 200 135ms
2024-11-11T20:21:28.178Z - [32minfo[39m: GET /api/auth/confirm/resend 401 1ms
13) should FAIL as account confirmation token does not exist
POST invite account
2024-11-11T20:21:29.829Z - [32minfo[39m: POST /api/auth/login 200 212ms
2024-11-11T20:21:29.836Z - [32minfo[39m: POST /api/account/invite 401 1ms
14) Should succeed to invite a user to create an account
GET invites
2024-11-11T20:21:32.705Z - [32minfo[39m: GET /api/account/invite 401 2ms
Ô£ö Should FAIL to get all invites due to Authentication
2024-11-11T20:21:35.777Z - [32minfo[39m: POST /api/auth/login 200 158ms
2024-11-11T20:21:35.783Z - [32minfo[39m: GET /api/account/invite 401 2ms
15) Should FAIL to get all invites due to Authorization
2024-11-11T20:21:38.367Z - [32minfo[39m: POST /api/auth/login 200 122ms
2024-11-11T20:21:38.374Z - [32minfo[39m: GET /api/account/invite 401 1ms
16) Should SUCCEED to get all invites
GET roles
2024-11-11T20:21:38.468Z - [32minfo[39m: POST /api/auth/login 401 4ms
2024-11-11T20:21:38.505Z - [32minfo[39m: GET /api/auth/roles 200 32ms
Ô£ö should list all roles GET (51ms)
Email Service
Ô£ö It should send an email (219ms)
Ô£ö It should send multiple emails (43ms)
Ô£ö It should compile a handlebars email
GET hacker
2024-11-11T20:21:48.230Z - [32minfo[39m: GET /api/hacker/673267091ffee080f4728f78 401 3ms
Ô£ö should FAIL to list a hacker's information on /api/hacker/:id GET due to authentication
2024-11-11T20:21:58.290Z - [32minfo[39m: POST /api/auth/login 200 221ms
2024-11-11T20:21:58.300Z - [32minfo[39m: GET /api/hacker/self 401 2ms
17) should list the user's hacker info on /api/hacker/self GET
2024-11-11T20:22:06.746Z - [32minfo[39m: POST /api/auth/login 200 139ms
2024-11-11T20:22:06.752Z - [32minfo[39m: GET /api/hacker/self 401 1ms
18) should FAIL to list the hacker info of an admin due to wrong account type /api/account/self GET
2024-11-11T20:22:15.682Z - [32minfo[39m: POST /api/auth/login 200 210ms
2024-11-11T20:22:15.690Z - [32minfo[39m: GET /api/hacker/self 401 2ms
19) should FAIL to list the user's hacker info due to unconfirmed email on /api/hacker/self GET
2024-11-11T20:22:23.891Z - [32minfo[39m: POST /api/auth/login 200 164ms
2024-11-11T20:22:23.898Z - [32minfo[39m: GET /api/hacker/673267091ffee080f4728f78 401 2ms
20) should list a hacker's information using admin power on /api/hacker/:id GET
2024-11-11T20:22:33.054Z - [32minfo[39m: POST /api/auth/login 200 225ms
2024-11-11T20:22:33.064Z - [32minfo[39m: GET /api/hacker/673267091ffee080f4728f78 401 2ms
21) should list the user's hacker information on /api/hacker/:id GET
2024-11-11T20:22:42.428Z - [32minfo[39m: POST /api/auth/login 200 210ms
2024-11-11T20:22:42.435Z - [32minfo[39m: GET /api/hacker/673267091ffee080f4728f78 401 2ms
22) should FAIL to list a hacker information due to lack of authorization on /api/hacker/:id GET
2024-11-11T20:22:51.714Z - [32minfo[39m: POST /api/auth/login 200 202ms
2024-11-11T20:22:51.721Z - [32minfo[39m: GET /api/hacker/673267091ffee080f4728f80 401 2ms
23) should FAIL to list an invalid hacker /api/hacker/:id GET
2024-11-11T20:23:00.977Z - [32minfo[39m: POST /api/auth/login 200 161ms
2024-11-11T20:23:00.988Z - [32minfo[39m: GET /api/hacker/email/[email protected] 401 2ms
24) should list a hacker's information using admin power on /api/hacker/email/:email GET
2024-11-11T20:23:10.351Z - [32minfo[39m: POST /api/auth/login 200 201ms
2024-11-11T20:23:10.357Z - [32minfo[39m: GET /api/hacker/email/[email protected] 401 2ms
25) should list the user's hacker information on /api/hacker/email/:email GET
2024-11-11T20:23:18.846Z - [32minfo[39m: POST /api/auth/login 200 214ms
2024-11-11T20:23:18.852Z - [32minfo[39m: GET /api/hacker/email/[email protected] 401 1ms
26) should FAIL to list a hacker information due to lack of authorization on /api/hacker/email/:id GET
POST create hacker
2024-11-11T20:23:30.426Z - [32minfo[39m: POST /api/hacker/ 401 2ms
Ô£ö should FAIL to create a new hacker due to lack of authentication
2024-11-11T20:23:42.287Z - [32minfo[39m: POST /api/auth/login 200 216ms
2024-11-11T20:23:42.295Z - [32minfo[39m: POST /api/hacker/ 401 1ms
27) should SUCCEED and create a new hacker (with an account that has been confirmed) using admin credentials
2024-11-11T20:23:53.315Z - [32minfo[39m: POST /api/auth/login 200 207ms
2024-11-11T20:23:53.321Z - [32minfo[39m: POST /api/hacker/ 401 1ms
28) should SUCCEED and create a new hacker for user (with an account that has been confirmed)
2024-11-11T20:24:05.269Z - [32minfo[39m: POST /api/auth/login 200 220ms
2024-11-11T20:24:05.281Z - [32minfo[39m: POST /api/hacker/ 401 2ms
29) should FAIL to create a new hacker when applications have not yet opened.
2024-11-11T20:24:16.744Z - [32minfo[39m: POST /api/auth/login 200 168ms
2024-11-11T20:24:16.749Z - [32minfo[39m: POST /api/hacker/ 401 1ms
30) should FAIL to create a new hacker when applications have closed.
2024-11-11T20:24:28.120Z - [32minfo[39m: POST /api/auth/login 200 216ms
2024-11-11T20:24:28.128Z - [32minfo[39m: POST /api/hacker/ 401 1ms
31) should FAIL if the new hacker does not accept code of conduct
2024-11-11T20:24:40.140Z - [32minfo[39m: POST /api/auth/login 200 214ms
2024-11-11T20:24:40.148Z - [32minfo[39m: POST /api/hacker/ 401 1ms
32) should FAIL if the new hacker does not have valid attendance preference
2024-11-11T20:24:49.700Z - [32minfo[39m: POST /api/auth/login 200 116ms
2024-11-11T20:24:49.703Z - [32minfo[39m: POST /api/hacker/ 401 1ms
33) should FAIL if the new hacker does not have attendance preference
2024-11-11T20:24:55.427Z - [32minfo[39m: POST /api/auth/login 200 76ms
2024-11-11T20:24:55.430Z - [32minfo[39m: POST /api/hacker/ 401 0ms
34) should FAIL to create a new hacker if the account hasn't been confirmed
2024-11-11T20:25:01.045Z - [32minfo[39m: POST /api/auth/login 200 77ms
2024-11-11T20:25:01.048Z - [32minfo[39m: POST /api/hacker/ 401 1ms
35) should FAIL to create new hacker due to duplicate account link
2024-11-11T20:25:06.769Z - [32minfo[39m: POST /api/auth/login 200 144ms
2024-11-11T20:25:06.777Z - [32minfo[39m: POST /api/hacker/ 401 1ms
36) should FAIL to create new hacker due to invalid input
PATCH update multiple hackers
2024-11-11T20:25:12.539Z - [32minfo[39m: POST /api/auth/login 200 72ms
2024-11-11T20:25:12.542Z - [32minfo[39m: PATCH /api/hacker/batchAccept/ 401 0ms
37) should FAIL input validation on /api/hacker/batchAccept as an Admin
2024-11-11T20:25:18.498Z - [32minfo[39m: POST /api/auth/login 200 95ms
2024-11-11T20:25:18.500Z - [32minfo[39m: PATCH /api/hacker/batchAccept/ 401 1ms
38) should FAIL authorization on /api/hacker/batchAccept as a non-Admin
2024-11-11T20:25:24.209Z - [32minfo[39m: POST /api/auth/login 200 152ms
2024-11-11T20:25:24.213Z - [32minfo[39m: PATCH /api/hacker/batchAccept/ 401 0ms
39) should SUCCEED and accept 2 hackers on /api/hacker/batchAccept as an Admin
2024-11-11T20:25:34.749Z - [32minfo[39m: POST /api/auth/login 200 205ms
2024-11-11T20:25:34.758Z - [32minfo[39m: PATCH /api/hacker/batchAccept/ 401 3ms
40) should SUCCEED and accept 0 out of 2 hackers on /api/hacker/batchAccept as an Admin
PATCH update one hacker
2024-11-11T20:25:45.728Z - [32minfo[39m: PATCH /api/hacker/673267091ffee080f4728f78 401 3ms
Ô£ö should FAIL to update a hacker on /api/hacker/:id GET due to authentication
2024-11-11T20:25:56.743Z - [32minfo[39m: PATCH /api/hacker/accept/673267091ffee080f4728f78 401 2ms
Ô£ö should FAIL to accept a hacker on /api/hacker/accept/:id due to authentication
2024-11-11T20:26:08.134Z - [32minfo[39m: POST /api/auth/login 200 210ms
2024-11-11T20:26:08.141Z - [32minfo[39m: PATCH /api/hacker/accept/673267091ffee080f4728f78 401 2ms
41) should FAIL to accept hacker info due to lack of authorization on /api/hacker/accept/:id
2024-11-11T20:26:19.594Z - [32minfo[39m: POST /api/auth/login 200 208ms
2024-11-11T20:26:19.600Z - [32minfo[39m: PATCH /api/hacker/accept/673267091ffee080f4728f80 401 2ms
42) should FAIL to accept an invalid hacker's info on /api/hacker/accept/:id
2024-11-11T20:26:30.715Z - [32minfo[39m: POST /api/auth/login 200 172ms
2024-11-11T20:26:30.721Z - [32minfo[39m: PATCH /api/hacker/accept/673267091ffee080f4728f78 401 2ms
43) should SUCCEED and accept a hacker on /api/hacker/accept/:id as an Admin
2024-11-11T20:26:40.448Z - [32minfo[39m: PATCH /api/hacker/acceptEmail/[email protected] 401 0ms
Ô£ö should FAIL to accept a hacker on /api/hacker/acceptEmail/:email due to authentication
2024-11-11T20:26:46.801Z - [32minfo[39m: POST /api/auth/login 200 148ms
2024-11-11T20:26:46.806Z - [32minfo[39m: PATCH /api/hacker/acceptEmail/[email protected] 401 0ms
44) should FAIL to accept hacker info due to lack of authorization on /api/hacker/acceptEmail/:email
2024-11-11T20:26:52.785Z - [32minfo[39m: POST /api/auth/login 200 83ms
2024-11-11T20:26:52.793Z - [32minfo[39m: PATCH /api/hacker/acceptEmail/[email protected] 401 1ms
45) should FAIL to accept an invalid hacker's info on /api/hacker/acceptEmail/:email
2024-11-11T20:26:58.778Z - [32minfo[39m: POST /api/auth/login 200 159ms
2024-11-11T20:26:58.783Z - [32minfo[39m: PATCH /api/hacker/acceptEmail/[email protected] 401 1ms
46) should SUCCEED and accept a hacker on /api/hacker/acceptEmail/:email as an Admin
2024-11-11T20:27:04.673Z - [32minfo[39m: POST /api/auth/login 200 78ms
2024-11-11T20:27:04.677Z - [32minfo[39m: PATCH /api/hacker/673267091ffee080f4728f78 401 1ms
47) should SUCCEED and update a hacker using admin power
2024-11-11T20:27:10.705Z - [32minfo[39m: POST /api/auth/login 200 82ms
2024-11-11T20:27:10.709Z - [32minfo[39m: PATCH /api/hacker/status/673267091ffee080f4728f78 401 1ms
48) should SUCCEED and update a hacker STATUS as an Admin
2024-11-11T20:27:16.953Z - [32minfo[39m: POST /api/auth/login 200 94ms
2024-11-11T20:27:16.957Z - [32minfo[39m: PATCH /api/hacker/status/673267091ffee080f4728f78 401 1ms
49) should FAIL and NOT update a hacker STATUS as a Hacker
2024-11-11T20:27:22.936Z - [32minfo[39m: POST /api/auth/login 200 113ms
2024-11-11T20:27:22.939Z - [32minfo[39m: PATCH /api/hacker/status/673267091ffee080f4728f7f 401 1ms
50) should FAIL and NOT update a hacker STATUS as a Hacker due to unconfirmed email
2024-11-11T20:27:28.540Z - [32minfo[39m: POST /api/auth/login 200 82ms
2024-11-11T20:27:28.545Z - [32minfo[39m: PATCH /api/hacker/checkin/673267091ffee080f4728f78 401 1ms
51) should SUCCEED and check in hacker as a volunteer
2024-11-11T20:27:34.982Z - [32minfo[39m: POST /api/auth/login 200 84ms
2024-11-11T20:27:34.984Z - [32minfo[39m: PATCH /api/hacker/checkin/673267091ffee080f4728f78 401 0ms
52) should FAIL to check in hacker as a hacker
2024-11-11T20:27:40.809Z - [32minfo[39m: POST /api/auth/login 200 90ms
2024-11-11T20:27:40.813Z - [32minfo[39m: PATCH /api/hacker/checkin/673267091ffee080f4728f7f 401 1ms
53) should FAIL to check in hacker as a volunteer due to unconfirmed email
2024-11-11T20:27:46.645Z - [32minfo[39m: POST /api/auth/login 200 76ms
2024-11-11T20:27:46.648Z - [32minfo[39m: PATCH /api/hacker/673267091ffee080f4728f79 401 1ms
54) should SUCCEED and update the user's hacker info
2024-11-11T20:27:54.922Z - [32minfo[39m: POST /api/auth/login 200 169ms
2024-11-11T20:27:54.931Z - [32minfo[39m: PATCH /api/hacker/673267091ffee080f4728f7f 401 2ms
55) should FAIL and not update the user's hacker info due to unconfirmed email
2024-11-11T20:28:06.224Z - [32minfo[39m: POST /api/auth/login 200 212ms
2024-11-11T20:28:06.231Z - [32minfo[39m: PATCH /api/hacker/673267091ffee080f4728f78 401 2ms
56) should Fail to update hacker info due to lack of authorization
2024-11-11T20:28:17.549Z - [32minfo[39m: POST /api/auth/login 200 197ms
2024-11-11T20:28:17.567Z - [32minfo[39m: GET /api/hacker/673267091ffee080f4728f80 401 12ms
57) should fail to change an invalid hacker's info
2024-11-11T20:28:26.732Z - [32minfo[39m: POST /api/auth/login 200 80ms
2024-11-11T20:28:26.737Z - [32minfo[39m: PATCH /api/hacker/confirmation/673267091ffee080f4728f79 401 2ms
58) should succeed for hacker to update their own status from accepted to confirmed
2024-11-11T20:28:32.585Z - [32minfo[39m: POST /api/auth/login 200 96ms
2024-11-11T20:28:32.589Z - [32minfo[39m: PATCH /api/hacker/confirmation/673267091ffee080f4728f7f 401 2ms
59) should FAIL for hacker to update their own status from accepted to confirmed due to unconfirmed email
2024-11-11T20:28:38.472Z - [32minfo[39m: POST /api/auth/login 200 139ms
2024-11-11T20:28:38.478Z - [32minfo[39m: PATCH /api/hacker/confirmation/673267091ffee080f4728f78 401 1ms
60) should succeed for hacker to update their own status from confirmed to accepted
2024-11-11T20:28:44.188Z - [32minfo[39m: POST /api/auth/login 200 82ms
2024-11-11T20:28:44.193Z - [32minfo[39m: PATCH /api/hacker/confirmation/673267091ffee080f4728f7a 401 1ms
61) should FAIL to update hacker status when hacker status is not accepted or confirmed
2024-11-11T20:28:50.202Z - [32minfo[39m: POST /api/auth/login 200 91ms
2024-11-11T20:28:50.205Z - [32minfo[39m: PATCH /api/hacker/confirmation/673267091ffee080f4728f79 401 0ms
62) should fail for hacker trying to confirm someone else
POST add a hacker resume
2024-11-11T20:28:55.911Z - [32minfo[39m: POST /api/auth/login 401 1ms
2024-11-11T20:28:55.932Z - [32minfo[39m: POST /api/hacker/resume/673267091ffee080f4728f79 403 5ms
63) It should SUCCEED and upload a resume for a hacker
GET Hacker stats
2024-11-11T20:28:58.139Z - [32minfo[39m: POST /api/auth/login 200 86ms
2024-11-11T20:28:58.144Z - [32minfo[39m: GET /api/hacker/stats 401 1ms
64) It should FAIL and get hacker stats (invalid validation)
2024-11-11T20:29:00.930Z - [32minfo[39m: POST /api/auth/login 200 100ms
2024-11-11T20:29:00.941Z - [32minfo[39m: GET /api/hacker/stats?model=hacker&q=%5B%5D 401 1ms
65) It should SUCCEED and get hacker stats
2024-11-11T20:29:03.637Z - [32minfo[39m: POST /api/auth/login 200 134ms
2024-11-11T20:29:03.640Z - [32minfo[39m: GET /api/hacker/stats 401 1ms
66) It should FAIL and get hacker stats due to invalid Authorization
2024-11-11T20:29:06.384Z - [32minfo[39m: GET /api/hacker/stats 401 1ms
Ô£ö It should FAIL and get hacker stats due to invalid Authentication
POST send week-of email
2024-11-11T20:29:11.128Z - [32minfo[39m: POST /api/hacker/email/weekOf/673267091ffee080f4728f79 401 2ms
Ô£ö It should FAIL to send the week-of email due to invalid Authentication
2024-11-11T20:29:16.139Z - [32minfo[39m: POST /api/auth/login 401 1ms
2024-11-11T20:29:16.142Z - [32minfo[39m: POST /api/hacker/email/weekOf/673267091ffee080f4728f79 401 1ms
67) It should FAIL to send the week-of email due to invalid Authorization
2024-11-11T20:29:20.956Z - [32minfo[39m: POST /api/auth/login 200 97ms
2024-11-11T20:29:20.960Z - [32minfo[39m: POST /api/hacker/email/weekOf/673267091ffee080f4728f78 401 1ms
68) It should SUCCEED to send the week-of email
2024-11-11T20:29:25.793Z - [32minfo[39m: POST /api/auth/login 200 84ms
2024-11-11T20:29:25.797Z - [32minfo[39m: POST /api/hacker/email/weekOf/673267091ffee080f4728f7f 401 1ms
69) It should FAIL to send the week-of email due to unconfirmed email of hacker
POST send day-of email
2024-11-11T20:29:31.417Z - [32minfo[39m: POST /api/hacker/email/dayOf/673267091ffee080f4728f7b 401 1ms
Ô£ö It should FAIL to send the day-of email due to invalid Authentication
2024-11-11T20:29:37.079Z - [32minfo[39m: POST /api/auth/login 200 80ms
2024-11-11T20:29:37.083Z - [32minfo[39m: POST /api/hacker/email/dayOf/673267091ffee080f4728f7b 401 1ms
70) It should FAIL to send the day-of email due to invalid Authorization
2024-11-11T20:29:42.933Z - [32minfo[39m: POST /api/auth/login 200 85ms
2024-11-11T20:29:42.936Z - [32minfo[39m: POST /api/hacker/email/dayOf/673267091ffee080f4728f7b 401 1ms
71) It should SUCCEED to send the day-of email
2024-11-11T20:29:47.994Z - [32minfo[39m: POST /api/auth/login 200 86ms
2024-11-11T20:29:48.003Z - [32minfo[39m: POST /api/hacker/email/dayOf/673267091ffee080f4728f7f 401 1ms
72) It should FAIL to send the day-of email due to unconfirmed email of hacker
POST create role
2024-11-11T20:29:50.468Z - [32minfo[39m: POST /api/role/ 401 0ms
Ô£ö should Fail to create a role because staff is not logged in
2024-11-11T20:29:52.712Z - [32minfo[39m: POST /api/auth/login 200 87ms
2024-11-11T20:29:52.716Z - [32minfo[39m: POST /api/role/ 401 1ms
73) should SUCCEED and add new role
2024-11-11T20:29:55.116Z - [32minfo[39m: POST /api/auth/login 200 77ms
2024-11-11T20:29:55.119Z - [32minfo[39m: POST /api/role/ 401 1ms
74) should Fail to add new role due to lack of authorization
2024-11-11T20:29:57.484Z - [32minfo[39m: POST /api/auth/login 200 93ms
2024-11-11T20:29:57.488Z - [32minfo[39m: POST /api/role/ 401 2ms
75) should Suceed to add new role despite to duplicate routes
Searching for hackers
2024-11-11T20:30:02.540Z - [32minfo[39m: POST /api/auth/login 401 4ms
2024-11-11T20:30:02.545Z - [32minfo[39m: GET /api/search?model=account&q=%5B%7B%22param%22%3A%22application.general.degree%22%2C%22operation%22%3A%22equals%22%2C%22value%22%3A%22Undergraduate%22%7D%5D 401 1ms
Ô£ö Should FAIL to search due to invalid authentication
2024-11-11T20:30:08.756Z - [32minfo[39m: POST /api/auth/login 200 103ms
2024-11-11T20:30:08.761Z - [32minfo[39m: GET /api/search?model=account&q=%5B%7B%22param%22%3A%22application.general.degree%22%2C%22operation%22%3A%22equals%22%2C%22value%22%3A%22Undergraduate%22%7D%5D 401 1ms
76) Should FAIL to search due to invalid authorization
2024-11-11T20:30:14.964Z - [32minfo[39m: POST /api/auth/login 200 133ms
2024-11-11T20:30:14.969Z - [32minfo[39m: GET /api/search?model=hacker&q=%5B%7B%22param%22%3A%22application.general.degree%22%2C%22operation%22%3A%22equals%22%2C%22value%22%3A%22Undergraduate%22%7D%5D 401 1ms
77) Should return all undergraduate hackers
2024-11-11T20:30:21.474Z - [32minfo[39m: POST /api/auth/login 200 150ms
2024-11-11T20:30:21.480Z - [32minfo[39m: GET /api/search?model=hacker&q=%5B%7B%22param%22%3A%22password%22%2C%22operation%22%3A%22equals%22%2C%22value%22%3A%22passowrd%22%7D%5D 401 1ms
78) Should return an error as hackers don't have password stored
2024-11-11T20:30:28.024Z - [32minfo[39m: POST /api/auth/login 200 87ms
2024-11-11T20:30:28.027Z - [32minfo[39m: GET /api/search?model=staff&q=%5B%7B%22param%22%3A%22password%22%2C%22operation%22%3A%22equals%22%2C%22value%22%3A%22passowrd%22%7D%5D 401 1ms
79) Should return an error as staff aren't searchable
2024-11-11T20:30:33.482Z - [32minfo[39m: POST /api/auth/login 200 89ms
2024-11-11T20:30:33.485Z - [32minfo[39m: GET /api/search?model=Hacker&q=%5B%7B%22param%22%3A%22application.general.school%22%2C%22operation%22%3A%22ne%22%2C%22value%22%3A%22McGill%22%7D%5D 401 0ms
80) Should throw an error because model is not lowercase
2024-11-11T20:30:39.245Z - [32minfo[39m: POST /api/auth/login 200 78ms
2024-11-11T20:30:39.249Z - [32minfo[39m: GET /api/search?model=hackerz&q=%5B%7B%22param%22%3A%22application.general.school%22%2C%22operation%22%3A%22ne%22%2C%22value%22%3A%22McGill%22%7D%5D 401 1ms
81) Should throw an error because of a fake model
2024-11-11T20:30:45.311Z - [32minfo[39m: POST /api/auth/login 200 83ms
2024-11-11T20:30:45.315Z - [32minfo[39m: GET /api/search?model=hacker&q=%5B%7B%22param%22%3A%22application.general.school%22%2C%22operation%22%3A%22ne%22%2C%22value%22%3A%22McGill%22%7D%5D&limit=1 401 1ms
82) Should only return 1 hacker (page size)
2024-11-11T20:30:50.372Z - [32minfo[39m: POST /api/auth/login 200 76ms
2024-11-11T20:30:50.375Z - [32minfo[39m: GET /api/search?model=hacker&q=%5B%7B%22param%22%3A%22application.general.school%22%2C%22operation%22%3A%22ne%22%2C%22value%22%3A%22McGill%22%7D%5D&limit=1&page=1 401 1ms
83) Should only return 1 hacker (pagination)
2024-11-11T20:30:55.569Z - [32minfo[39m: POST /api/auth/login 200 95ms
2024-11-11T20:30:55.574Z - [32minfo[39m: GET /api/search?model=hacker&q=%5B%7B%22param%22%3A%22application.general.school%22%2C%22operation%22%3A%22ne%22%2C%22value%22%3A%22McGill%22%7D%5D&limit=5000 401 1ms
84) Should throw an error because out of bounds (page size)
2024-11-11T20:31:00.949Z - [32minfo[39m: POST /api/auth/login 200 77ms
2024-11-11T20:31:00.953Z - [32minfo[39m: GET /api/search?model=hacker&q=%5B%7B%22param%22%3A%22application.general.school%22%2C%22operation%22%3A%22ne%22%2C%22value%22%3A%22McGill%22%7D%5D&limit=1&page=-1 401 1ms
85) Should throw an error because out of bounds (pagination)
2024-11-11T20:31:06.502Z - [32minfo[39m: POST /api/auth/login 200 82ms
2024-11-11T20:31:06.505Z - [32minfo[39m: GET /api/search?model=hacker&q=%5B%7B%22param%22%3A%22application.general.degree%22%2C%22operation%22%3A%22equals%22%2C%22value%22%3A%22Undergraduate%22%7D%5D&expand=true 401 1ms
86) Should expand the accountId when expand is set to true
GET settings
2024-11-11T20:31:09.271Z - [32minfo[39m: GET /api/settings/ 200 4ms
Ô£ö should get the current settings
PATCH settings
2024-11-11T20:31:11.946Z - [32minfo[39m: PATCH /api/settings/ 401 0ms
Ô£ö should FAIL to update the settings due to lack of authentication
2024-11-11T20:31:14.844Z - [32minfo[39m: POST /api/auth/login 200 82ms
2024-11-11T20:31:14.850Z - [32minfo[39m: PATCH /api/settings/ 401 1ms
87) should FAIL to update the settings due to lack of authorization
2024-11-11T20:31:17.473Z - [32minfo[39m: POST /api/auth/login 200 84ms
2024-11-11T20:31:17.476Z - [32minfo[39m: PATCH /api/settings/ 401 1ms
88) should succeed to update the settings
2024-11-11T20:31:20.452Z - [32minfo[39m: POST /api/auth/login 200 78ms
2024-11-11T20:31:20.455Z - [32minfo[39m: PATCH /api/settings/ 401 1ms
89) should succeed to make the hackathon remote
GET user's sponsor info
2024-11-11T20:31:23.699Z - [32minfo[39m: GET /api/sponsor/self 401 1ms
Ô£ö should FAIL list a sponsor's information due to authentication from /api/sponsor/self GET
2024-11-11T20:31:27.212Z - [32minfo[39m: POST /api/auth/login 200 90ms
2024-11-11T20:31:27.216Z - [32minfo[39m: GET /api/sponsor/self 401 1ms
90) should FAIL to list a sponsor's info due to authorization /api/sponsor/self GET
2024-11-11T20:31:30.650Z - [32minfo[39m: POST /api/auth/login 200 92ms
2024-11-11T20:31:30.653Z - [32minfo[39m: GET /api/sponsor/self 401 1ms
91) should FAIL to list a sponsor's info due to wrong account type on /api/sponsor/self GET
2024-11-11T20:31:34.033Z - [32minfo[39m: POST /api/auth/login 200 79ms
2024-11-11T20:31:34.038Z - [32minfo[39m: GET /api/sponsor/self 401 1ms
92) should FAIL to list a sponsor's info due to lack of sponsor on /api/sponsor/self GET
2024-11-11T20:31:37.566Z - [32minfo[39m: POST /api/auth/login 200 74ms
2024-11-11T20:31:37.569Z - [32minfo[39m: GET /api/sponsor/self 401 1ms
93) should SUCCEED to list user's sponsor info /api/sponsor/self GET
GET sponsor by id
2024-11-11T20:31:40.943Z - [32minfo[39m: GET /api/sponsor/673267091ffee080f4728f82 401 1ms
Ô£ö should FAIL list a sponsor's information due to authentication from /api/sponsor/:id GET
2024-11-11T20:31:44.416Z - [32minfo[39m: POST /api/auth/login 200 82ms
2024-11-11T20:31:44.420Z - [32minfo[39m: GET /api/sponsor/673267091ffee080f4728f82 401 1ms
94) should succeed to list a sponsor's info using admin power on /api/sponsor/:id GET
2024-11-11T20:31:48.135Z - [32minfo[39m: POST /api/auth/login 200 111ms
2024-11-11T20:31:48.139Z - [32minfo[39m: GET /api/sponsor/673267091ffee080f4728f82 401 1ms
95) should succeed to list a user's sponsor info on /api/sponsor/:id GET
2024-11-11T20:31:51.618Z - [32minfo[39m: POST /api/auth/login 200 87ms
2024-11-11T20:31:51.628Z - [32minfo[39m: GET /api/sponsor/673267091ffee080f4728f82 401 1ms
96) should FAIL to list a user's sponsor info due to lack of authorization /api/sponsor/:id GET
2024-11-11T20:31:55.341Z - [32minfo[39m: POST /api/auth/login 200 108ms
2024-11-11T20:31:55.345Z - [32minfo[39m: GET /api/sponsor/673269bb1ffee080f4736fff 401 1ms
97) should FAIL to list non existant info on /api/sponsor/:id GET
POST create sponsor
2024-11-11T20:31:59.096Z - [32minfo[39m: POST /api/sponsor 401 0ms
Ô£ö should FAIL to create a new sponsor due to lack of authentication
2024-11-11T20:32:02.456Z - [32minfo[39m: POST /api/auth/login 200 93ms
2024-11-11T20:32:02.459Z - [32minfo[39m: POST /api/sponsor/ 401 1ms
98) should SUCCEED and create a new sponsor
2024-11-11T20:32:06.248Z - [32minfo[39m: POST /api/auth/login 200 77ms
2024-11-11T20:32:06.255Z - [32minfo[39m: POST /api/sponsor/ 401 1ms
99) should FAIL to create a sponsor due to duplicate accountId
2024-11-11T20:32:10.259Z - [32minfo[39m: POST /api/auth/login 200 96ms
2024-11-11T20:32:10.264Z - [32minfo[39m: POST /api/sponsor/ 401 0ms
100) should FAIL to create a new sponsor
PATCH update sponsor
2024-11-11T20:32:13.924Z - [32minfo[39m: PATCH /api/sponsor/673267091ffee080f4728f82/ 401 1ms
Ô£ö should FAIL to update a sponsor due to lack of authentication
2024-11-11T20:32:17.500Z - [32minfo[39m: POST /api/auth/login 200 92ms
2024-11-11T20:32:17.505Z - [32minfo[39m: PATCH /api/sponsor/673267091ffee080f4728f82/ 401 1ms
101) should FAIL to update a sponsor due to authorization
2024-11-11T20:32:21.344Z - [32minfo[39m: POST /api/auth/login 200 116ms
2024-11-11T20:32:21.349Z - [32minfo[39m: PATCH /api/sponsor/673267091ffee080f4728f17/ 401 1ms
102) should FAIL to update a sponsor due wrong id
2024-11-11T20:32:25.299Z - [32minfo[39m: POST /api/auth/login 200 83ms
2024-11-11T20:32:25.302Z - [32minfo[39m: PATCH /api/sponsor/673267091ffee080f4728f82/ 401 1ms
103) should SUCCEED and update a sponsor
Storage service
Ô£ö Should upload new file (384ms)
Ô£ö should get test file (182ms)
Ô£ö should delete test file (134ms)
GET team
2024-11-11T20:32:28.980Z - [32minfo[39m: GET /api/team/673267091ffee080f4728f77 401 1ms
Ô£ö should FAIL to list a team's information due to lack of authentication
2024-11-11T20:32:32.281Z - [32minfo[39m: POST /api/auth/login 200 94ms
2024-11-11T20:32:32.287Z - [32minfo[39m: GET /api/team/673267091ffee080f4728f85 401 2ms
104) should Fail and list a team's information from /api/team/ GET due to non existant team id
2024-11-11T20:32:35.507Z - [32minfo[39m: POST /api/auth/login 401 2ms
2024-11-11T20:32:35.510Z - [32minfo[39m: GET /api/team/673267091ffee080f4728f77 401 1ms
105) should SUCCEED and list a team's information from /api/team/ GET
POST create team
2024-11-11T20:32:39.069Z - [32minfo[39m: POST /api/team/ 401 0ms
Ô£ö should FAIL to create a new team due to lack of authentication
2024-11-11T20:32:42.280Z - [32minfo[39m: POST /api/auth/login 200 101ms
2024-11-11T20:32:42.282Z - [32minfo[39m: POST /api/team/ 401 0ms
106) should FAIL to create a new team due to lack of authorization
2024-11-11T20:32:45.663Z - [32minfo[39m: POST /api/auth/login 200 86ms
2024-11-11T20:32:45.667Z - [32minfo[39m: POST /api/team/ 401 1ms
107) should FAIL to create a new team due to logged in user not being a hacker
2024-11-11T20:32:49.061Z - [32minfo[39m: POST /api/auth/login 200 84ms
2024-11-11T20:32:49.063Z - [32minfo[39m: POST /api/team/ 401 0ms
108) should FAIL to create a new team due to duplicate team name
2024-11-11T20:32:52.087Z - [32minfo[39m: POST /api/auth/login 200 74ms
2024-11-11T20:32:52.091Z - [32minfo[39m: POST /api/team/ 401 1ms
109) should Fail to create a new team due to hacker already being in a team
2024-11-11T20:32:54.782Z - [32minfo[39m: POST /api/auth/login 200 78ms
2024-11-11T20:32:54.785Z - [32minfo[39m: POST /api/team/ 401 1ms
110) should SUCCEED and create a new team
PATCH join team
2024-11-11T20:33:00.261Z - [32minfo[39m: PATCH /api/team/join/ 401 1ms
Ô£ö should FAIL to join a hacker to a team due to lack of authentication
2024-11-11T20:33:06.062Z - [32minfo[39m: POST /api/auth/login 200 76ms
2024-11-11T20:33:06.067Z - [32minfo[39m: PATCH /api/team/join/ 401 0ms
111) should FAIL to join a volunteer to a team.
2024-11-11T20:33:11.750Z - [32minfo[39m: POST /api/auth/login 200 115ms
2024-11-11T20:33:11.753Z - [32minfo[39m: PATCH /api/team/join/ 401 1ms
112) should FAIL to join a hacker to a team that doesn't exist.
2024-11-11T20:33:17.382Z - [32minfo[39m: POST /api/auth/login 200 114ms
2024-11-11T20:33:17.386Z - [32minfo[39m: PATCH /api/team/join/ 401 0ms
113) should FAIL to join a hacker to a team that is full.
2024-11-11T20:33:22.980Z - [32minfo[39m: POST /api/auth/login 200 72ms
2024-11-11T20:33:22.984Z - [32minfo[39m: PATCH /api/team/join/ 401 1ms
114) should SUCCEED and join a hacker without a team to a team.
2024-11-11T20:33:28.790Z - [32minfo[39m: POST /api/auth/login 200 88ms
2024-11-11T20:33:28.793Z - [32minfo[39m: PATCH /api/team/join/ 401 1ms
115) should SUCCEED and join a hacker on a team to aother team.
PATCH change team info
2024-11-11T20:33:32.007Z - [32minfo[39m: PATCH /api/team/673267091ffee080f4728f7e 401 2ms
Ô£ö should FAIL to change a hacker's team information due to invalid authentication
2024-11-11T20:33:35.656Z - [32minfo[39m: POST /api/auth/login 200 172ms
2024-11-11T20:33:35.661Z - [32minfo[39m: PATCH /api/team/673267091ffee080f4728f78 401 0ms
116) should FAIL for a hacker to change another team's information due to invalid authorization
2024-11-11T20:33:39.116Z - [32minfo[39m: POST /api/auth/login 200 116ms
2024-11-11T20:33:39.119Z - [32minfo[39m: PATCH /api/team/673267091ffee080f4728f7b 401 1ms
117) should SUCCEED to change the hacker's team information
2024-11-11T20:33:42.284Z - [32minfo[39m: POST /api/auth/login 200 113ms
2024-11-11T20:33:42.289Z - [32minfo[39m: PATCH /api/team/leave/ 401 1ms
118) should SUCCEED and leave a team.
2024-11-11T20:33:45.522Z - [32minfo[39m: POST /api/auth/login 200 81ms
2024-11-11T20:33:45.529Z - [32minfo[39m: PATCH /api/team/673267091ffee080f4728f7d 401 1ms
119) should SUCCEED for an admin to change a team information
2024-11-11T20:33:48.468Z - [32minfo[39m: PATCH /api/team/leave/ 401 0ms
Ô£ö should FAIL to leave a team due to invalid authentication.
GET volunteer
2024-11-11T20:33:54.361Z - [32minfo[39m: GET /api/volunteer/673267091ffee080f4728f86 401 2ms
Ô£ö should FAIL to get volunteer due to lack of authentication
2024-11-11T20:34:00.662Z - [32minfo[39m: POST /api/auth/login 200 92ms
2024-11-11T20:34:00.667Z - [32minfo[39m: GET /api/volunteer/673267091ffee080f4728f86 401 1ms
120) should Fail to GET volunteer due inappropriate authorization
2024-11-11T20:34:06.298Z - [32minfo[39m: POST /api/auth/login 200 85ms
2024-11-11T20:34:06.302Z - [32minfo[39m: GET /api/volunteer/673267091ffee080f4728f17 401 1ms
121) should Fail to GET volunteer due to non existant volunteer id
2024-11-11T20:34:12.116Z - [32minfo[39m: POST /api/auth/login 200 131ms
2024-11-11T20:34:12.119Z - [32minfo[39m: GET /api/volunteer/673267091ffee080f4728f86 401 1ms
122) should GET volunteer info by id with admin credentials
2024-11-11T20:34:17.973Z - [32minfo[39m: POST /api/auth/login 200 113ms
2024-11-11T20:34:17.977Z - [32minfo[39m: GET /api/volunteer/673267091ffee080f4728f86 401 1ms
123) should GET the user's volunteer info by id
POST create volunteer
2024-11-11T20:34:23.260Z - [32minfo[39m: POST /api/volunteer 401 0ms
Ô£ö should FAIL to create a new volunteer due to lack of authentication
2024-11-11T20:34:28.669Z - [32minfo[39m: POST /api/auth/login 200 99ms
2024-11-11T20:34:28.673Z - [32minfo[39m: POST /api/volunteer 401 1ms
124) fail to create a volunteer when the logged in account is not a volunteer /api/volunteer POST
2024-11-11T20:34:34.458Z - [32minfo[39m: POST /api/auth/login 200 82ms
2024-11-11T20:34:34.461Z - [32minfo[39m: POST /api/volunteer 401 0ms
125) should create a volunteer for the user /api/volunteer POST
2024-11-11T20:34:40.109Z - [32minfo[39m: POST /api/auth/login 200 124ms
2024-11-11T20:34:40.112Z - [32minfo[39m: POST /api/volunteer 401 1ms
126) should create a volunteer for the user /api/volunteer POST
2024-11-11T20:34:45.627Z - [32minfo[39m: POST /api/auth/login 200 83ms
2024-11-11T20:34:45.632Z - [32minfo[39m: POST /api/volunteer 401 0ms
127) should FAIL to create a volunteer due to authorization /api/volunteer POST
44 passing (14m)
127 failing
1) GET user account
should list the user's account on /api/account/self GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:107:41
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
2) GET user account
should list another account specified by id using admin priviledge on /api/account/:id/ GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:143:41
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
3) GET user account
should list an account specified by id on /api/account/:id/ GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:177:41
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
4) GET user account
should FAIL to list an account specified by id on /api/account/:id/ GET due to lack of authorization:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 403 but got 401
+ expected - actual
-401
+403
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:212:41
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
5) PATCH update account
should SUCCEED and use admin to update another account:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:417:37
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
6) PATCH update account
should SUCCEED and update the user's own account:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:444:37
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
7) PATCH update account
should FAIL to update an account due to lack of authorization:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 403 but got 401
+ expected - actual
-401
+403
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:472:37
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
8) PATCH update account
should FAIL to update email to one that already exists:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 409 but got 401
+ expected - actual
-401
+409
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:497:37
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
9) PATCH change password for logged in user
should change the logged in user's password to a new password:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:597:37
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
10) GET retrieve permissions
should SUCCEED and retrieve the rolebindings for the user:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:657:37
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
11) GET resend confirmation email
should SUCCEED and resend the confirmation email:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:711:37
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
12) GET resend confirmation email
should FAIL as the account is already confirmed:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 422 but got 401
+ expected - actual
-401
+422
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:731:37
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
13) GET resend confirmation email
should FAIL as account confirmation token does not exist:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 428 but got 401
+ expected - actual
-401
+428
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:749:37
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
14) POST invite account
Should succeed to invite a user to create an account:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:796:41
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
15) GET invites
Should FAIL to get all invites due to Authorization:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 403 but got 401
+ expected - actual
-401
+403
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:842:33
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
16) GET invites
Should SUCCEED to get all invites:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\account.test.js:859:33
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
17) GET hacker
should list the user's hacker info on /api/hacker/self GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\hacker.test.js:109:33
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
18) GET hacker
should FAIL to list the hacker info of an admin due to wrong account type /api/account/self GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 409 but got 401
+ expected - actual
-401
+409
at C:\Users\allen\mcHacks\hackerAPI\tests\hacker.test.js:133:33
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
19) GET hacker
should FAIL to list the user's hacker info due to unconfirmed email on /api/hacker/self GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 409 but got 401
+ expected - actual
-401
+409
at C:\Users\allen\mcHacks\hackerAPI\tests\hacker.test.js:152:33
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
20) GET hacker
should list a hacker's information using admin power on /api/hacker/:id GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\hacker.test.js:178:41
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
21) GET hacker
should list the user's hacker information on /api/hacker/:id GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\hacker.test.js:213:41
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
22) GET hacker
should FAIL to list a hacker information due to lack of authorization on /api/hacker/:id GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 403 but got 401
+ expected - actual
-401
+403
at C:\Users\allen\mcHacks\hackerAPI\tests\hacker.test.js:249:41
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
23) GET hacker
should FAIL to list an invalid hacker /api/hacker/:id GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 404 but got 401
+ expected - actual
-401
+404
at C:\Users\allen\mcHacks\hackerAPI\tests\hacker.test.js:276:37
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
24) GET hacker
should list a hacker's information using admin power on /api/hacker/email/:email GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\hacker.test.js:304:41
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
25) GET hacker
should list the user's hacker information on /api/hacker/email/:email GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 200 but got 401
+ expected - actual
-401
+200
at C:\Users\allen\mcHacks\hackerAPI\tests\hacker.test.js:339:41
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)
26) GET hacker
should FAIL to list a hacker information due to lack of authorization on /api/hacker/email/:id GET:
Uncaught AssertionError: expected Response{ _events: {}, (35), (2) } to have status code 403 but got 401
+ expected - actual
-401
+403
at C:\Users\allen\mcHacks\hackerAPI\tests\hacker.test.js:375:41
at Request.callback (node_modules\superagent\lib\node\index.js:857:12)
at C:\Users\allen\mcHacks\hackerAPI\node_modules\superagent\lib\node\index.js:1070:18
at IncomingMessage.<anonymous> (node_modules\superagent\lib\node\parsers\json.js:21:7)
at IncomingMessage.emit (node:events:531:35)
at endReadableNT (node:internal/streams/readable:1696:12)
at process.processTicksAndRejections (node:internal/process/task_queues:82:21)