371 lines
11 KiB
TypeScript
371 lines
11 KiB
TypeScript
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
|
|
|
|
import 'mocha'
|
|
|
|
import {
|
|
cleanupTests,
|
|
createSingleServer,
|
|
makeDeleteRequest, makeGetRequest,
|
|
makePostBodyRequest,
|
|
PeerTubeServer,
|
|
setAccessTokensToServers
|
|
} from '../../../../shared/extra-utils'
|
|
import {
|
|
checkBadCountPagination,
|
|
checkBadSortPagination,
|
|
checkBadStartPagination
|
|
} from '../../../../shared/extra-utils/requests/check-api-params'
|
|
import { HttpStatusCode } from '../../../../shared/core-utils/miscs/http-error-codes'
|
|
|
|
describe('Test server follows API validators', function () {
|
|
let server: PeerTubeServer
|
|
|
|
// ---------------------------------------------------------------
|
|
|
|
before(async function () {
|
|
this.timeout(30000)
|
|
|
|
server = await createSingleServer(1)
|
|
|
|
await setAccessTokensToServers([ server ])
|
|
})
|
|
|
|
describe('When managing following', function () {
|
|
let userAccessToken = null
|
|
|
|
before(async function () {
|
|
const user = {
|
|
username: 'user1',
|
|
password: 'password'
|
|
}
|
|
|
|
await server.users.create({ username: user.username, password: user.password })
|
|
userAccessToken = await server.login.getAccessToken(user)
|
|
})
|
|
|
|
describe('When adding follows', function () {
|
|
const path = '/api/v1/server/following'
|
|
|
|
it('Should fail without hosts', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
token: server.accessToken,
|
|
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail if hosts is not an array', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
token: server.accessToken,
|
|
fields: { hosts: 'localhost:9002' },
|
|
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail if the array is not composed by hosts', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: { hosts: [ 'localhost:9002', 'localhost:coucou' ] },
|
|
token: server.accessToken,
|
|
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail if the array is composed with http schemes', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: { hosts: [ 'localhost:9002', 'http://localhost:9003' ] },
|
|
token: server.accessToken,
|
|
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail if hosts are not unique', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: { urls: [ 'localhost:9002', 'localhost:9002' ] },
|
|
token: server.accessToken,
|
|
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail with an invalid token', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: { hosts: [ 'localhost:9002' ] },
|
|
token: 'fake_token',
|
|
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
|
|
})
|
|
})
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: { hosts: [ 'localhost:9002' ] },
|
|
token: userAccessToken,
|
|
statusCodeExpected: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('When listing followings', function () {
|
|
const path = '/api/v1/server/following'
|
|
|
|
it('Should fail with a bad start pagination', async function () {
|
|
await checkBadStartPagination(server.url, path)
|
|
})
|
|
|
|
it('Should fail with a bad count pagination', async function () {
|
|
await checkBadCountPagination(server.url, path)
|
|
})
|
|
|
|
it('Should fail with an incorrect sort', async function () {
|
|
await checkBadSortPagination(server.url, path)
|
|
})
|
|
|
|
it('Should fail with an incorrect state', async function () {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path,
|
|
query: {
|
|
state: 'blabla'
|
|
}
|
|
})
|
|
})
|
|
|
|
it('Should fail with an incorrect actor type', async function () {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path,
|
|
query: {
|
|
actorType: 'blabla'
|
|
}
|
|
})
|
|
})
|
|
|
|
it('Should fail succeed with the correct params', async function () {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path,
|
|
statusCodeExpected: HttpStatusCode.OK_200,
|
|
query: {
|
|
state: 'accepted',
|
|
actorType: 'Application'
|
|
}
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('When listing followers', function () {
|
|
const path = '/api/v1/server/followers'
|
|
|
|
it('Should fail with a bad start pagination', async function () {
|
|
await checkBadStartPagination(server.url, path)
|
|
})
|
|
|
|
it('Should fail with a bad count pagination', async function () {
|
|
await checkBadCountPagination(server.url, path)
|
|
})
|
|
|
|
it('Should fail with an incorrect sort', async function () {
|
|
await checkBadSortPagination(server.url, path)
|
|
})
|
|
|
|
it('Should fail with an incorrect actor type', async function () {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path,
|
|
query: {
|
|
actorType: 'blabla'
|
|
}
|
|
})
|
|
})
|
|
|
|
it('Should fail with an incorrect state', async function () {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path,
|
|
query: {
|
|
state: 'blabla',
|
|
actorType: 'Application'
|
|
}
|
|
})
|
|
})
|
|
|
|
it('Should fail succeed with the correct params', async function () {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path,
|
|
statusCodeExpected: HttpStatusCode.OK_200,
|
|
query: {
|
|
state: 'accepted'
|
|
}
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('When removing a follower', function () {
|
|
const path = '/api/v1/server/followers'
|
|
|
|
it('Should fail with an invalid token', async function () {
|
|
await makeDeleteRequest({
|
|
url: server.url,
|
|
path: path + '/toto@localhost:9002',
|
|
token: 'fake_token',
|
|
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
|
|
})
|
|
})
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
await makeDeleteRequest({
|
|
url: server.url,
|
|
path: path + '/toto@localhost:9002',
|
|
token: userAccessToken,
|
|
statusCodeExpected: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
|
|
it('Should fail with an invalid follower', async function () {
|
|
await makeDeleteRequest({
|
|
url: server.url,
|
|
path: path + '/toto',
|
|
token: server.accessToken,
|
|
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail with an unknown follower', async function () {
|
|
await makeDeleteRequest({
|
|
url: server.url,
|
|
path: path + '/toto@localhost:9003',
|
|
token: server.accessToken,
|
|
statusCodeExpected: HttpStatusCode.NOT_FOUND_404
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('When accepting a follower', function () {
|
|
const path = '/api/v1/server/followers'
|
|
|
|
it('Should fail with an invalid token', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path: path + '/toto@localhost:9002/accept',
|
|
token: 'fake_token',
|
|
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
|
|
})
|
|
})
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path: path + '/toto@localhost:9002/accept',
|
|
token: userAccessToken,
|
|
statusCodeExpected: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
|
|
it('Should fail with an invalid follower', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path: path + '/toto/accept',
|
|
token: server.accessToken,
|
|
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail with an unknown follower', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path: path + '/toto@localhost:9003/accept',
|
|
token: server.accessToken,
|
|
statusCodeExpected: HttpStatusCode.NOT_FOUND_404
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('When rejecting a follower', function () {
|
|
const path = '/api/v1/server/followers'
|
|
|
|
it('Should fail with an invalid token', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path: path + '/toto@localhost:9002/reject',
|
|
token: 'fake_token',
|
|
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
|
|
})
|
|
})
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path: path + '/toto@localhost:9002/reject',
|
|
token: userAccessToken,
|
|
statusCodeExpected: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
|
|
it('Should fail with an invalid follower', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path: path + '/toto/reject',
|
|
token: server.accessToken,
|
|
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail with an unknown follower', async function () {
|
|
await makePostBodyRequest({
|
|
url: server.url,
|
|
path: path + '/toto@localhost:9003/reject',
|
|
token: server.accessToken,
|
|
statusCodeExpected: HttpStatusCode.NOT_FOUND_404
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('When removing following', function () {
|
|
const path = '/api/v1/server/following'
|
|
|
|
it('Should fail with an invalid token', async function () {
|
|
await makeDeleteRequest({
|
|
url: server.url,
|
|
path: path + '/localhost:9002',
|
|
token: 'fake_token',
|
|
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
|
|
})
|
|
})
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
await makeDeleteRequest({
|
|
url: server.url,
|
|
path: path + '/localhost:9002',
|
|
token: userAccessToken,
|
|
statusCodeExpected: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
|
|
it('Should fail if we do not follow this server', async function () {
|
|
await makeDeleteRequest({
|
|
url: server.url,
|
|
path: path + '/example.com',
|
|
token: server.accessToken,
|
|
statusCodeExpected: HttpStatusCode.NOT_FOUND_404
|
|
})
|
|
})
|
|
})
|
|
})
|
|
|
|
after(async function () {
|
|
await cleanupTests([ server ])
|
|
})
|
|
})
|