1
0
Fork 0
peertube/server/tests/api/check-params/follows.ts

370 lines
11 KiB
TypeScript
Raw Normal View History

2020-01-31 15:56:52 +00:00
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
2017-11-17 14:20:42 +00:00
import { checkBadCountPagination, checkBadSortPagination, checkBadStartPagination } from '@server/tests/shared'
import { HttpStatusCode } from '@shared/models'
2017-11-17 14:20:42 +00:00
import {
2019-04-24 13:10:37 +00:00
cleanupTests,
2021-07-16 07:47:51 +00:00
createSingleServer,
2021-07-16 08:42:24 +00:00
makeDeleteRequest,
makeGetRequest,
2019-04-24 13:10:37 +00:00
makePostBodyRequest,
2021-07-16 07:47:51 +00:00
PeerTubeServer,
2021-07-13 09:05:15 +00:00
setAccessTokensToServers
} from '@shared/server-commands'
2017-11-17 14:20:42 +00:00
describe('Test server follows API validators', function () {
2021-07-16 07:47:51 +00:00
let server: PeerTubeServer
2017-11-17 14:20:42 +00:00
// ---------------------------------------------------------------
before(async function () {
2018-01-18 17:10:45 +00:00
this.timeout(30000)
2017-11-17 14:20:42 +00:00
2021-07-16 07:47:51 +00:00
server = await createSingleServer(1)
2017-11-17 14:20:42 +00:00
await setAccessTokensToServers([ server ])
})
describe('When managing following', function () {
let userAccessToken = null
before(async function () {
userAccessToken = await server.users.generateUserAndToken('user1')
2017-11-17 14:20:42 +00:00
})
describe('When adding follows', function () {
const path = '/api/v1/server/following'
it('Should fail with nothing', async function () {
2017-12-28 13:29:57 +00:00
await makePostBodyRequest({
url: server.url,
path,
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2017-12-28 13:29:57 +00:00
})
2017-11-17 14:20:42 +00:00
})
it('Should fail if hosts is not composed by hosts', async function () {
2017-12-28 13:29:57 +00:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 10:14:47 +00:00
fields: { hosts: [ '127.0.0.1:9002', '127.0.0.1:coucou' ] },
2017-12-28 13:29:57 +00:00
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2017-12-28 13:29:57 +00:00
})
2017-11-17 14:20:42 +00:00
})
it('Should fail if hosts is composed with http schemes', async function () {
2017-12-28 13:29:57 +00:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 10:14:47 +00:00
fields: { hosts: [ '127.0.0.1:9002', 'http://127.0.0.1:9003' ] },
2017-12-28 13:29:57 +00:00
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2017-12-28 13:29:57 +00:00
})
2017-11-17 14:20:42 +00:00
})
it('Should fail if hosts are not unique', async function () {
2017-12-28 13:29:57 +00:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 10:14:47 +00:00
fields: { urls: [ '127.0.0.1:9002', '127.0.0.1:9002' ] },
2017-12-28 13:29:57 +00:00
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2017-12-28 13:29:57 +00:00
})
2017-11-17 14:20:42 +00:00
})
it('Should fail if handles is not composed by handles', async function () {
2017-12-28 13:29:57 +00:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 10:14:47 +00:00
fields: { handles: [ 'hello@example.com', '127.0.0.1:9001' ] },
token: server.accessToken,
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
})
it('Should fail if handles are not unique', async function () {
await makePostBodyRequest({
url: server.url,
path,
fields: { urls: [ 'hello@example.com', 'hello@example.com' ] },
2017-12-28 13:29:57 +00:00
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2017-12-28 13:29:57 +00:00
})
2017-11-17 14:20:42 +00:00
})
it('Should fail with an invalid token', async function () {
2017-12-28 13:29:57 +00:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 10:14:47 +00:00
fields: { hosts: [ '127.0.0.1:9002' ] },
2017-12-28 13:29:57 +00:00
token: 'fake_token',
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
2017-12-28 13:29:57 +00:00
})
2017-11-17 14:20:42 +00:00
})
it('Should fail if the user is not an administrator', async function () {
2017-12-28 13:29:57 +00:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 10:14:47 +00:00
fields: { hosts: [ '127.0.0.1:9002' ] },
2017-12-28 13:29:57 +00:00
token: userAccessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
2017-12-28 13:29:57 +00:00
})
2017-11-17 14:20:42 +00:00
})
})
describe('When listing followings', function () {
const path = '/api/v1/server/following'
it('Should fail with a bad start pagination', async function () {
2017-12-28 13:29:57 +00:00
await checkBadStartPagination(server.url, path)
2017-11-17 14:20:42 +00:00
})
it('Should fail with a bad count pagination', async function () {
2017-12-28 13:29:57 +00:00
await checkBadCountPagination(server.url, path)
2017-11-17 14:20:42 +00:00
})
it('Should fail with an incorrect sort', async function () {
2017-12-28 13:29:57 +00:00
await checkBadSortPagination(server.url, path)
2017-11-17 14:20:42 +00:00
})
it('Should fail with an incorrect state', async function () {
await makeGetRequest({
url: server.url,
path,
query: {
state: 'blabla'
}
})
})
it('Should fail with an incorrect actor type', async function () {
await makeGetRequest({
url: server.url,
path,
query: {
actorType: 'blabla'
}
})
})
it('Should fail succeed with the correct params', async function () {
await makeGetRequest({
url: server.url,
path,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.OK_200,
query: {
state: 'accepted',
actorType: 'Application'
}
})
})
2017-11-17 14:20:42 +00:00
})
describe('When listing followers', function () {
const path = '/api/v1/server/followers'
it('Should fail with a bad start pagination', async function () {
2017-12-28 13:29:57 +00:00
await checkBadStartPagination(server.url, path)
2017-11-17 14:20:42 +00:00
})
it('Should fail with a bad count pagination', async function () {
2017-12-28 13:29:57 +00:00
await checkBadCountPagination(server.url, path)
2017-11-17 14:20:42 +00:00
})
it('Should fail with an incorrect sort', async function () {
2017-12-28 13:29:57 +00:00
await checkBadSortPagination(server.url, path)
2017-11-17 14:20:42 +00:00
})
it('Should fail with an incorrect actor type', async function () {
await makeGetRequest({
url: server.url,
path,
query: {
actorType: 'blabla'
}
})
})
it('Should fail with an incorrect state', async function () {
await makeGetRequest({
url: server.url,
path,
query: {
state: 'blabla',
actorType: 'Application'
}
})
})
it('Should fail succeed with the correct params', async function () {
await makeGetRequest({
url: server.url,
path,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.OK_200,
query: {
state: 'accepted'
}
})
})
2017-11-17 14:20:42 +00:00
})
2019-04-08 12:04:57 +00:00
describe('When removing a follower', function () {
const path = '/api/v1/server/followers'
it('Should fail with an invalid token', async function () {
await makeDeleteRequest({
url: server.url,
2022-12-09 10:14:47 +00:00
path: path + '/toto@127.0.0.1:9002',
2019-04-08 12:04:57 +00:00
token: 'fake_token',
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
2019-04-08 12:04:57 +00:00
})
})
it('Should fail if the user is not an administrator', async function () {
await makeDeleteRequest({
url: server.url,
2022-12-09 10:14:47 +00:00
path: path + '/toto@127.0.0.1:9002',
2019-04-08 12:04:57 +00:00
token: userAccessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
2019-04-08 12:04:57 +00:00
})
})
it('Should fail with an invalid follower', async function () {
await makeDeleteRequest({
url: server.url,
path: path + '/toto',
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2019-04-08 12:04:57 +00:00
})
})
it('Should fail with an unknown follower', async function () {
await makeDeleteRequest({
url: server.url,
2022-12-09 10:14:47 +00:00
path: path + '/toto@127.0.0.1:9003',
2019-04-08 12:04:57 +00:00
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.NOT_FOUND_404
2019-04-08 12:04:57 +00:00
})
})
})
describe('When accepting a follower', function () {
const path = '/api/v1/server/followers'
it('Should fail with an invalid token', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 10:14:47 +00:00
path: path + '/toto@127.0.0.1:9002/accept',
token: 'fake_token',
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
it('Should fail if the user is not an administrator', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 10:14:47 +00:00
path: path + '/toto@127.0.0.1:9002/accept',
token: userAccessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
it('Should fail with an invalid follower', async function () {
await makePostBodyRequest({
url: server.url,
path: path + '/toto/accept',
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
})
it('Should fail with an unknown follower', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 10:14:47 +00:00
path: path + '/toto@127.0.0.1:9003/accept',
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
})
describe('When rejecting a follower', function () {
const path = '/api/v1/server/followers'
it('Should fail with an invalid token', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 10:14:47 +00:00
path: path + '/toto@127.0.0.1:9002/reject',
token: 'fake_token',
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
it('Should fail if the user is not an administrator', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 10:14:47 +00:00
path: path + '/toto@127.0.0.1:9002/reject',
token: userAccessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
it('Should fail with an invalid follower', async function () {
await makePostBodyRequest({
url: server.url,
path: path + '/toto/reject',
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
})
it('Should fail with an unknown follower', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 10:14:47 +00:00
path: path + '/toto@127.0.0.1:9003/reject',
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
})
2017-11-17 14:20:42 +00:00
describe('When removing following', function () {
2017-11-21 12:43:29 +00:00
const path = '/api/v1/server/following'
it('Should fail with an invalid token', async function () {
2017-12-28 13:29:57 +00:00
await makeDeleteRequest({
url: server.url,
2022-12-09 10:14:47 +00:00
path: path + '/127.0.0.1:9002',
2017-12-28 13:29:57 +00:00
token: 'fake_token',
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
2017-12-28 13:29:57 +00:00
})
2017-11-21 12:43:29 +00:00
})
it('Should fail if the user is not an administrator', async function () {
2017-12-28 13:29:57 +00:00
await makeDeleteRequest({
url: server.url,
2022-12-09 10:14:47 +00:00
path: path + '/127.0.0.1:9002',
2017-12-28 13:29:57 +00:00
token: userAccessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
2017-12-28 13:29:57 +00:00
})
})
it('Should fail if we do not follow this server', async function () {
await makeDeleteRequest({
url: server.url,
path: path + '/example.com',
token: server.accessToken,
2021-07-16 08:42:24 +00:00
expectedStatus: HttpStatusCode.NOT_FOUND_404
2017-12-28 13:29:57 +00:00
})
})
2017-11-17 14:20:42 +00:00
})
})
2019-04-24 13:10:37 +00:00
after(async function () {
await cleanupTests([ server ])
2017-11-17 14:20:42 +00:00
})
})