/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */ import { checkBadCountPagination, checkBadSortPagination, checkBadStartPagination } from '@server/tests/shared' import { HttpStatusCode } from '@shared/models' import { cleanupTests, createSingleServer, makeDeleteRequest, makeGetRequest, makePostBodyRequest, PeerTubeServer, setAccessTokensToServers } from '@shared/server-commands' describe('Test server follows API validators', function () { let server: PeerTubeServer // --------------------------------------------------------------- before(async function () { this.timeout(30000) server = await createSingleServer(1) await setAccessTokensToServers([ server ]) }) describe('When managing following', function () { let userAccessToken = null before(async function () { userAccessToken = await server.users.generateUserAndToken('user1') }) describe('When adding follows', function () { const path = '/api/v1/server/following' it('Should fail with nothing', async function () { await makePostBodyRequest({ url: server.url, path, token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) }) it('Should fail if hosts is not composed by hosts', async function () { await makePostBodyRequest({ url: server.url, path, fields: { hosts: [ '127.0.0.1:9002', '127.0.0.1:coucou' ] }, token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) }) it('Should fail if hosts is composed with http schemes', async function () { await makePostBodyRequest({ url: server.url, path, fields: { hosts: [ '127.0.0.1:9002', 'http://127.0.0.1:9003' ] }, token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) }) it('Should fail if hosts are not unique', async function () { await makePostBodyRequest({ url: server.url, path, fields: { urls: [ '127.0.0.1:9002', '127.0.0.1:9002' ] }, token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) }) it('Should fail if handles is not composed by handles', async function () { await makePostBodyRequest({ url: server.url, path, fields: { handles: [ 'hello@example.com', '127.0.0.1:9001' ] }, token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) }) it('Should fail if handles are not unique', async function () { await makePostBodyRequest({ url: server.url, path, fields: { urls: [ 'hello@example.com', 'hello@example.com' ] }, token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) }) it('Should fail with an invalid token', async function () { await makePostBodyRequest({ url: server.url, path, fields: { hosts: [ '127.0.0.1:9002' ] }, token: 'fake_token', expectedStatus: HttpStatusCode.UNAUTHORIZED_401 }) }) it('Should fail if the user is not an administrator', async function () { await makePostBodyRequest({ url: server.url, path, fields: { hosts: [ '127.0.0.1:9002' ] }, token: userAccessToken, expectedStatus: HttpStatusCode.FORBIDDEN_403 }) }) }) describe('When listing followings', function () { const path = '/api/v1/server/following' it('Should fail with a bad start pagination', async function () { await checkBadStartPagination(server.url, path) }) it('Should fail with a bad count pagination', async function () { await checkBadCountPagination(server.url, path) }) it('Should fail with an incorrect sort', async function () { await checkBadSortPagination(server.url, path) }) it('Should fail with an incorrect state', async function () { await makeGetRequest({ url: server.url, path, query: { state: 'blabla' } }) }) it('Should fail with an incorrect actor type', async function () { await makeGetRequest({ url: server.url, path, query: { actorType: 'blabla' } }) }) it('Should fail succeed with the correct params', async function () { await makeGetRequest({ url: server.url, path, expectedStatus: HttpStatusCode.OK_200, query: { state: 'accepted', actorType: 'Application' } }) }) }) describe('When listing followers', function () { const path = '/api/v1/server/followers' it('Should fail with a bad start pagination', async function () { await checkBadStartPagination(server.url, path) }) it('Should fail with a bad count pagination', async function () { await checkBadCountPagination(server.url, path) }) it('Should fail with an incorrect sort', async function () { await checkBadSortPagination(server.url, path) }) it('Should fail with an incorrect actor type', async function () { await makeGetRequest({ url: server.url, path, query: { actorType: 'blabla' } }) }) it('Should fail with an incorrect state', async function () { await makeGetRequest({ url: server.url, path, query: { state: 'blabla', actorType: 'Application' } }) }) it('Should fail succeed with the correct params', async function () { await makeGetRequest({ url: server.url, path, expectedStatus: HttpStatusCode.OK_200, query: { state: 'accepted' } }) }) }) describe('When removing a follower', function () { const path = '/api/v1/server/followers' it('Should fail with an invalid token', async function () { await makeDeleteRequest({ url: server.url, path: path + '/toto@127.0.0.1:9002', token: 'fake_token', expectedStatus: HttpStatusCode.UNAUTHORIZED_401 }) }) it('Should fail if the user is not an administrator', async function () { await makeDeleteRequest({ url: server.url, path: path + '/toto@127.0.0.1:9002', token: userAccessToken, expectedStatus: HttpStatusCode.FORBIDDEN_403 }) }) it('Should fail with an invalid follower', async function () { await makeDeleteRequest({ url: server.url, path: path + '/toto', token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) }) it('Should fail with an unknown follower', async function () { await makeDeleteRequest({ url: server.url, path: path + '/toto@127.0.0.1:9003', token: server.accessToken, expectedStatus: HttpStatusCode.NOT_FOUND_404 }) }) }) describe('When accepting a follower', function () { const path = '/api/v1/server/followers' it('Should fail with an invalid token', async function () { await makePostBodyRequest({ url: server.url, path: path + '/toto@127.0.0.1:9002/accept', token: 'fake_token', expectedStatus: HttpStatusCode.UNAUTHORIZED_401 }) }) it('Should fail if the user is not an administrator', async function () { await makePostBodyRequest({ url: server.url, path: path + '/toto@127.0.0.1:9002/accept', token: userAccessToken, expectedStatus: HttpStatusCode.FORBIDDEN_403 }) }) it('Should fail with an invalid follower', async function () { await makePostBodyRequest({ url: server.url, path: path + '/toto/accept', token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) }) it('Should fail with an unknown follower', async function () { await makePostBodyRequest({ url: server.url, path: path + '/toto@127.0.0.1:9003/accept', token: server.accessToken, expectedStatus: HttpStatusCode.NOT_FOUND_404 }) }) }) describe('When rejecting a follower', function () { const path = '/api/v1/server/followers' it('Should fail with an invalid token', async function () { await makePostBodyRequest({ url: server.url, path: path + '/toto@127.0.0.1:9002/reject', token: 'fake_token', expectedStatus: HttpStatusCode.UNAUTHORIZED_401 }) }) it('Should fail if the user is not an administrator', async function () { await makePostBodyRequest({ url: server.url, path: path + '/toto@127.0.0.1:9002/reject', token: userAccessToken, expectedStatus: HttpStatusCode.FORBIDDEN_403 }) }) it('Should fail with an invalid follower', async function () { await makePostBodyRequest({ url: server.url, path: path + '/toto/reject', token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) }) it('Should fail with an unknown follower', async function () { await makePostBodyRequest({ url: server.url, path: path + '/toto@127.0.0.1:9003/reject', token: server.accessToken, expectedStatus: HttpStatusCode.NOT_FOUND_404 }) }) }) describe('When removing following', function () { const path = '/api/v1/server/following' it('Should fail with an invalid token', async function () { await makeDeleteRequest({ url: server.url, path: path + '/127.0.0.1:9002', token: 'fake_token', expectedStatus: HttpStatusCode.UNAUTHORIZED_401 }) }) it('Should fail if the user is not an administrator', async function () { await makeDeleteRequest({ url: server.url, path: path + '/127.0.0.1:9002', token: userAccessToken, expectedStatus: HttpStatusCode.FORBIDDEN_403 }) }) it('Should fail if we do not follow this server', async function () { await makeDeleteRequest({ url: server.url, path: path + '/example.com', token: server.accessToken, expectedStatus: HttpStatusCode.NOT_FOUND_404 }) }) }) }) after(async function () { await cleanupTests([ server ]) }) })