2018-01-17 04:32:03 -05:00
|
|
|
/* tslint:disable:no-unused-expression */
|
|
|
|
|
|
|
|
import { omit } from 'lodash'
|
|
|
|
import 'mocha'
|
2018-02-28 12:04:46 -05:00
|
|
|
import { CustomConfig } from '../../../../shared/models/server/custom-config.model'
|
2018-01-17 04:32:03 -05:00
|
|
|
|
|
|
|
import {
|
|
|
|
createUser, flushTests, killallServers, makeDeleteRequest, makeGetRequest, makePutBodyRequest, runServer, ServerInfo,
|
2018-04-19 05:01:34 -04:00
|
|
|
setAccessTokensToServers, userLogin, immutableAssign
|
2018-10-29 12:48:31 -04:00
|
|
|
} from '../../../../shared/utils'
|
2018-01-17 04:32:03 -05:00
|
|
|
|
|
|
|
describe('Test config API validators', function () {
|
|
|
|
const path = '/api/v1/config/custom'
|
|
|
|
let server: ServerInfo
|
|
|
|
let userAccessToken: string
|
|
|
|
const updateParams: CustomConfig = {
|
2018-01-31 10:42:40 -05:00
|
|
|
instance: {
|
|
|
|
name: 'PeerTube updated',
|
2018-03-15 09:31:08 -04:00
|
|
|
shortDescription: 'my short description',
|
2018-01-31 10:42:40 -05:00
|
|
|
description: 'my super description',
|
2018-02-22 04:22:53 -05:00
|
|
|
terms: 'my super terms',
|
2019-02-20 09:36:43 -05:00
|
|
|
isNSFW: true,
|
2018-03-01 07:57:29 -05:00
|
|
|
defaultClientRoute: '/videos/recently-added',
|
2018-04-19 05:01:34 -04:00
|
|
|
defaultNSFWPolicy: 'blur',
|
2018-02-22 04:22:53 -05:00
|
|
|
customizations: {
|
|
|
|
javascript: 'alert("coucou")',
|
|
|
|
css: 'body { background-color: red; }'
|
|
|
|
}
|
2018-01-31 10:42:40 -05:00
|
|
|
},
|
2018-05-10 06:26:47 -04:00
|
|
|
services: {
|
|
|
|
twitter: {
|
|
|
|
username: '@MySuperUsername',
|
|
|
|
whitelisted: true
|
|
|
|
}
|
|
|
|
},
|
2018-01-17 04:32:03 -05:00
|
|
|
cache: {
|
|
|
|
previews: {
|
|
|
|
size: 2
|
2018-07-12 13:02:00 -04:00
|
|
|
},
|
|
|
|
captions: {
|
|
|
|
size: 3
|
2018-01-17 04:32:03 -05:00
|
|
|
}
|
|
|
|
},
|
|
|
|
signup: {
|
|
|
|
enabled: false,
|
2018-08-31 03:18:19 -04:00
|
|
|
limit: 5,
|
|
|
|
requiresEmailVerification: false
|
2018-01-17 04:32:03 -05:00
|
|
|
},
|
|
|
|
admin: {
|
|
|
|
email: 'superadmin1@example.com'
|
|
|
|
},
|
2019-01-09 09:14:29 -05:00
|
|
|
contactForm: {
|
|
|
|
enabled: false
|
|
|
|
},
|
2018-01-17 04:32:03 -05:00
|
|
|
user: {
|
2018-08-28 03:01:35 -04:00
|
|
|
videoQuota: 5242881,
|
|
|
|
videoQuotaDaily: 318742
|
2018-01-17 04:32:03 -05:00
|
|
|
},
|
|
|
|
transcoding: {
|
|
|
|
enabled: true,
|
2018-12-11 08:52:50 -05:00
|
|
|
allowAdditionalExtensions: true,
|
2018-01-17 04:32:03 -05:00
|
|
|
threads: 1,
|
|
|
|
resolutions: {
|
|
|
|
'240p': false,
|
|
|
|
'360p': true,
|
|
|
|
'480p': true,
|
|
|
|
'720p': false,
|
|
|
|
'1080p': false
|
2019-01-29 02:37:25 -05:00
|
|
|
},
|
|
|
|
hls: {
|
|
|
|
enabled: false
|
2018-01-17 04:32:03 -05:00
|
|
|
}
|
2018-08-03 05:10:31 -04:00
|
|
|
},
|
|
|
|
import: {
|
|
|
|
videos: {
|
|
|
|
http: {
|
|
|
|
enabled: false
|
2018-08-07 04:07:53 -04:00
|
|
|
},
|
|
|
|
torrent: {
|
|
|
|
enabled: false
|
2018-08-03 05:10:31 -04:00
|
|
|
}
|
|
|
|
}
|
2018-01-17 04:32:03 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ---------------------------------------------------------------
|
|
|
|
|
|
|
|
before(async function () {
|
2018-01-18 12:10:45 -05:00
|
|
|
this.timeout(30000)
|
2018-01-17 04:32:03 -05:00
|
|
|
|
|
|
|
await flushTests()
|
|
|
|
server = await runServer(1)
|
|
|
|
|
|
|
|
await setAccessTokensToServers([ server ])
|
|
|
|
|
|
|
|
const user = {
|
|
|
|
username: 'user1',
|
|
|
|
password: 'password'
|
|
|
|
}
|
|
|
|
await createUser(server.url, server.accessToken, user.username, user.password)
|
|
|
|
userAccessToken = await userLogin(server, user)
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('When getting the configuration', function () {
|
|
|
|
it('Should fail without token', async function () {
|
|
|
|
await makeGetRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
statusCodeExpected: 401
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
|
|
await makeGetRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
token: userAccessToken,
|
|
|
|
statusCodeExpected: 403
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('When updating the configuration', function () {
|
|
|
|
it('Should fail without token', async function () {
|
|
|
|
await makePutBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
fields: updateParams,
|
|
|
|
statusCodeExpected: 401
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
|
|
await makePutBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
fields: updateParams,
|
|
|
|
token: userAccessToken,
|
|
|
|
statusCodeExpected: 403
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if it misses a key', async function () {
|
|
|
|
const newUpdateParams = omit(updateParams, 'admin.email')
|
|
|
|
|
|
|
|
await makePutBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
2018-04-19 05:01:34 -04:00
|
|
|
fields: newUpdateParams,
|
|
|
|
token: server.accessToken,
|
|
|
|
statusCodeExpected: 400
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with a bad default NSFW policy', async function () {
|
|
|
|
const newUpdateParams = immutableAssign(updateParams, {
|
|
|
|
instance: {
|
|
|
|
defaultNSFWPolicy: 'hello'
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
await makePutBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
2019-02-17 13:14:00 -05:00
|
|
|
fields: newUpdateParams,
|
|
|
|
token: server.accessToken,
|
|
|
|
statusCodeExpected: 400
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if email disabled and signup requires email verification', async function () {
|
|
|
|
// opposite scenario - succcess when enable enabled - covered via tests/api/users/user-verification.ts
|
|
|
|
const newUpdateParams = immutableAssign(updateParams, {
|
|
|
|
signup: {
|
|
|
|
enabled: true,
|
|
|
|
limit: 5,
|
|
|
|
requiresEmailVerification: true
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
await makePutBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
2018-01-17 04:32:03 -05:00
|
|
|
fields: newUpdateParams,
|
|
|
|
token: server.accessToken,
|
|
|
|
statusCodeExpected: 400
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should success with the correct parameters', async function () {
|
|
|
|
await makePutBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
fields: updateParams,
|
|
|
|
token: server.accessToken,
|
|
|
|
statusCodeExpected: 200
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('When deleting the configuration', function () {
|
|
|
|
it('Should fail without token', async function () {
|
|
|
|
await makeDeleteRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
statusCodeExpected: 401
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
|
|
await makeDeleteRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
token: userAccessToken,
|
|
|
|
statusCodeExpected: 403
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
after(async function () {
|
|
|
|
killallServers([ server ])
|
|
|
|
|
|
|
|
// Keep the logs if the test failed
|
|
|
|
if (this['ok']) {
|
|
|
|
await flushTests()
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|