PeerTube/server/tests/api/check-params/config.ts

361 lines
8.3 KiB
TypeScript
Raw Normal View History

2020-01-31 09:56:52 -06:00
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
import 'mocha'
2021-07-13 02:43:59 -05:00
import { omit } from 'lodash'
import { HttpStatusCode } from '@shared/core-utils'
import {
cleanupTests,
createUser,
flushAndRunServer,
makeDeleteRequest,
makeGetRequest,
makePutBodyRequest,
ServerInfo,
setAccessTokensToServers,
userLogin
2021-07-13 02:43:59 -05:00
} from '@shared/extra-utils'
import { CustomConfig } from '@shared/models'
describe('Test config API validators', function () {
const path = '/api/v1/config/custom'
let server: ServerInfo
let userAccessToken: string
const updateParams: CustomConfig = {
instance: {
name: 'PeerTube updated',
2018-03-15 08:31:08 -05:00
shortDescription: 'my short description',
description: 'my super description',
terms: 'my super terms',
2019-08-23 08:23:27 -05:00
codeOfConduct: 'my super coc',
2019-09-03 02:49:04 -05:00
creationReason: 'my super reason',
2019-08-23 08:23:27 -05:00
moderationInformation: 'my super moderation information',
administrator: 'Kuja',
maintenanceLifetime: 'forever',
businessModel: 'my super business model',
hardwareInformation: '2vCore 3GB RAM',
2019-08-23 08:23:27 -05:00
languages: [ 'en', 'es' ],
categories: [ 1, 2 ],
2019-02-20 08:36:43 -06:00
isNSFW: true,
defaultNSFWPolicy: 'blur',
defaultClientRoute: '/videos/recently-added',
customizations: {
javascript: 'alert("coucou")',
css: 'body { background-color: red; }'
}
},
2019-07-09 04:45:19 -05:00
theme: {
default: 'default'
},
services: {
twitter: {
username: '@MySuperUsername',
whitelisted: true
}
},
cache: {
previews: {
size: 2
2018-07-12 12:02:00 -05:00
},
captions: {
size: 3
},
torrents: {
size: 4
}
},
signup: {
enabled: false,
limit: 5,
requiresEmailVerification: false,
minimumAge: 16
},
admin: {
email: 'superadmin1@example.com'
},
2019-01-09 08:14:29 -06:00
contactForm: {
enabled: false
},
user: {
videoQuota: 5242881,
videoQuotaDaily: 318742
},
transcoding: {
enabled: true,
2018-12-11 07:52:50 -06:00
allowAdditionalExtensions: true,
2019-05-16 09:55:34 -05:00
allowAudioFiles: true,
concurrency: 1,
threads: 1,
profile: 'vod_profile',
resolutions: {
'0p': false,
'240p': false,
'360p': true,
'480p': true,
'720p': false,
2019-06-12 10:33:29 -05:00
'1080p': false,
'1440p': false,
2019-06-12 10:33:29 -05:00
'2160p': false
2019-01-29 01:37:25 -06:00
},
webtorrent: {
enabled: true
},
2019-01-29 01:37:25 -06:00
hls: {
enabled: false
}
2018-08-03 04:10:31 -05:00
},
live: {
enabled: true,
2020-09-25 09:19:35 -05:00
allowReplay: false,
2020-12-15 02:23:28 -06:00
maxDuration: 30,
2020-10-28 09:24:40 -05:00
maxInstanceLives: -1,
maxUserLives: 50,
2020-09-25 09:19:35 -05:00
transcoding: {
enabled: true,
threads: 4,
profile: 'live_profile',
resolutions: {
'240p': true,
'360p': true,
'480p': true,
'720p': true,
'1080p': true,
'1440p': true,
'2160p': true
}
}
},
2018-08-03 04:10:31 -05:00
import: {
videos: {
concurrency: 1,
2018-08-03 04:10:31 -05:00
http: {
enabled: false
2018-08-07 03:07:53 -05:00
},
torrent: {
enabled: false
2018-08-03 04:10:31 -05:00
}
}
},
2021-01-27 10:15:21 -06:00
trending: {
videos: {
algorithms: {
enabled: [ 'best', 'hot', 'most-viewed', 'most-liked' ],
2021-01-27 10:15:21 -06:00
default: 'most-viewed'
}
}
},
autoBlacklist: {
videos: {
ofUsers: {
enabled: false
}
}
2019-04-08 07:04:57 -05:00
},
followers: {
instance: {
enabled: false,
manualApproval: true
2019-04-08 07:04:57 -05:00
}
},
followings: {
instance: {
autoFollowBack: {
enabled: true
},
autoFollowIndex: {
enabled: true,
indexUrl: 'https://index.example.com'
}
}
2020-05-28 04:15:38 -05:00
},
broadcastMessage: {
enabled: true,
dismissable: true,
message: 'super message',
level: 'warning'
2020-05-29 09:16:24 -05:00
},
search: {
remoteUri: {
users: true,
anonymous: true
},
searchIndex: {
enabled: true,
url: 'https://search.joinpeertube.org',
disableLocalSearch: true,
isDefaultSearch: true
}
}
}
// ---------------------------------------------------------------
before(async function () {
2018-01-18 11:10:45 -06:00
this.timeout(30000)
2019-04-24 03:53:40 -05:00
server = await flushAndRunServer(1)
await setAccessTokensToServers([ server ])
const user = {
username: 'user1',
password: 'password'
}
2019-04-15 03:49:46 -05:00
await createUser({ url: server.url, accessToken: server.accessToken, username: user.username, password: user.password })
userAccessToken = await userLogin(server, user)
})
describe('When getting the configuration', function () {
it('Should fail without token', async function () {
await makeGetRequest({
url: server.url,
path,
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
})
})
it('Should fail if the user is not an administrator', async function () {
await makeGetRequest({
url: server.url,
path,
token: userAccessToken,
statusCodeExpected: HttpStatusCode.FORBIDDEN_403
})
})
})
describe('When updating the configuration', function () {
it('Should fail without token', async function () {
await makePutBodyRequest({
url: server.url,
path,
fields: updateParams,
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
})
})
it('Should fail if the user is not an administrator', async function () {
await makePutBodyRequest({
url: server.url,
path,
fields: updateParams,
token: userAccessToken,
statusCodeExpected: HttpStatusCode.FORBIDDEN_403
})
})
it('Should fail if it misses a key', async function () {
const newUpdateParams = omit(updateParams, 'admin.email')
await makePutBodyRequest({
url: server.url,
path,
fields: newUpdateParams,
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
})
})
it('Should fail with a bad default NSFW policy', async function () {
2021-07-13 02:43:59 -05:00
const newUpdateParams = {
...updateParams,
instance: {
defaultNSFWPolicy: 'hello'
}
2021-07-13 02:43:59 -05:00
}
await makePutBodyRequest({
url: server.url,
path,
fields: newUpdateParams,
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
})
})
it('Should fail if email disabled and signup requires email verification', async function () {
2019-04-24 08:10:37 -05:00
// opposite scenario - success when enable enabled - covered via tests/api/users/user-verification.ts
2021-07-13 02:43:59 -05:00
const newUpdateParams = {
...updateParams,
signup: {
enabled: true,
limit: 5,
requiresEmailVerification: true
}
2021-07-13 02:43:59 -05:00
}
await makePutBodyRequest({
url: server.url,
path,
fields: newUpdateParams,
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
})
})
it('Should fail with a disabled webtorrent & hls transcoding', async function () {
2021-07-13 02:43:59 -05:00
const newUpdateParams = {
...updateParams,
transcoding: {
hls: {
enabled: false
},
webtorrent: {
enabled: false
}
}
2021-07-13 02:43:59 -05:00
}
await makePutBodyRequest({
url: server.url,
path,
fields: newUpdateParams,
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
})
})
it('Should success with the correct parameters', async function () {
await makePutBodyRequest({
url: server.url,
path,
fields: updateParams,
token: server.accessToken,
statusCodeExpected: HttpStatusCode.OK_200
})
})
})
describe('When deleting the configuration', function () {
it('Should fail without token', async function () {
await makeDeleteRequest({
url: server.url,
path,
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
})
})
it('Should fail if the user is not an administrator', async function () {
await makeDeleteRequest({
url: server.url,
path,
token: userAccessToken,
statusCodeExpected: HttpStatusCode.FORBIDDEN_403
})
})
})
2019-04-24 08:10:37 -05:00
after(async function () {
await cleanupTests([ server ])
})
})