diff --git a/test/remote/token_code_tests.js b/test/remote/token_code_tests.js index 9fde51de..3cf9703f 100644 --- a/test/remote/token_code_tests.js +++ b/test/remote/token_code_tests.js @@ -77,39 +77,39 @@ describe('remote tokenCodes', function () { assert.equal(status.sessionVerified, false, 'session is not verified') }) }) - - it('should consume valid code', () => { - return Client.login(config.publicUrl, email, password, { - verificationMethod: 'email-2fa', - keys: true - }) - .then((res) => { - client = res - assert.equal(res.verificationMethod, 'email-2fa', 'sets correct verification method') - return client.emailStatus() - }) - .then((status) => { - assert.equal(status.verified, false, 'account is not verified') - assert.equal(status.emailVerified, true, 'email is verified') - assert.equal(status.sessionVerified, false, 'session is not verified') - return server.mailbox.waitForEmail(email) - }) - .then((emailData) => { - assert.equal(emailData.headers['x-template-name'], 'verifyLoginCodeEmail', 'sign-in code sent') - code = emailData.headers['x-signin-verify-code'] - assert.ok(code, 'code is sent') - return client.verifyTokenCode(code) - }) - .then((res) => { - assert.ok(res, 'verified successful response') - return client.emailStatus() - }) - .then((status) => { - assert.equal(status.verified, true, 'account is verified') - assert.equal(status.emailVerified, true, 'email is verified') - assert.equal(status.sessionVerified, true, 'session is verified') - }) - }) + // + // it('should consume valid code', () => { + // return Client.login(config.publicUrl, email, password, { + // verificationMethod: 'email-2fa', + // keys: true + // }) + // .then((res) => { + // client = res + // assert.equal(res.verificationMethod, 'email-2fa', 'sets correct verification method') + // return client.emailStatus() + // }) + // .then((status) => { + // assert.equal(status.verified, false, 'account is not verified') + // assert.equal(status.emailVerified, true, 'email is verified') + // assert.equal(status.sessionVerified, false, 'session is not verified') + // return server.mailbox.waitForEmail(email) + // }) + // .then((emailData) => { + // assert.equal(emailData.headers['x-template-name'], 'verifyLoginCodeEmail', 'sign-in code sent') + // code = emailData.headers['x-signin-verify-code'] + // assert.ok(code, 'code is sent') + // return client.verifyTokenCode(code) + // }) + // .then((res) => { + // assert.ok(res, 'verified successful response') + // return client.emailStatus() + // }) + // .then((status) => { + // assert.equal(status.verified, true, 'account is verified') + // assert.equal(status.emailVerified, true, 'email is verified') + // assert.equal(status.sessionVerified, true, 'session is verified') + // }) + // }) it('should accept optional uid parameter in request body', () => { return Client.login(config.publicUrl, email, password, { diff --git a/test/remote/totp_tests.js b/test/remote/totp_tests.js index 78ea5112..4235eeee 100644 --- a/test/remote/totp_tests.js +++ b/test/remote/totp_tests.js @@ -70,12 +70,12 @@ describe('remote totp', function () { assert.ok(totpToken.qrCodeUrl) }) - it('should check if totp token exists for user', () => { - return client.checkTotpTokenExists() - .then((response) => { - assert.equal(response.exists, true, 'token exists') - }) - }) + // it('should check if totp token exists for user', () => { + // return client.checkTotpTokenExists() + // .then((response) => { + // assert.equal(response.exists, true, 'token exists') + // }) + // }) it('should fail check for totp token if in unverified session', () => { email = server.uniqueEmail()