1 /* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
3 import { omit } from 'lodash'
5 import { CustomConfig } from '../../../../shared/models/server/custom-config.model'
16 setAccessTokensToServers,
18 } from '../../../../shared/extra-utils'
19 import { HttpStatusCode } from '../../../../shared/core-utils/miscs/http-error-codes'
21 describe('Test config API validators', function () {
22 const path = '/api/v1/config/custom'
23 let server: ServerInfo
24 let userAccessToken: string
25 const updateParams: CustomConfig = {
27 name: 'PeerTube updated',
28 shortDescription: 'my short description',
29 description: 'my super description',
30 terms: 'my super terms',
31 codeOfConduct: 'my super coc',
33 creationReason: 'my super reason',
34 moderationInformation: 'my super moderation information',
35 administrator: 'Kuja',
36 maintenanceLifetime: 'forever',
37 businessModel: 'my super business model',
38 hardwareInformation: '2vCore 3GB RAM',
40 languages: [ 'en', 'es' ],
44 defaultNSFWPolicy: 'blur',
46 defaultClientRoute: '/videos/recently-added',
49 javascript: 'alert("coucou")',
50 css: 'body { background-color: red; }'
58 username: '@MySuperUsername',
76 requiresEmailVerification: false
79 email: 'superadmin1@example.com'
86 videoQuotaDaily: 318742
90 allowAdditionalExtensions: true,
91 allowAudioFiles: true,
94 profile: 'vod_profile',
117 maxInstanceLives: -1,
123 profile: 'live_profile',
149 enabled: [ 'best', 'hot', 'most-viewed', 'most-liked' ],
150 default: 'most-viewed'
174 indexUrl: 'https://index.example.com'
181 message: 'super message',
191 url: 'https://search.joinpeertube.org',
192 disableLocalSearch: true,
193 isDefaultSearch: true
198 // ---------------------------------------------------------------
200 before(async function () {
203 server = await flushAndRunServer(1)
205 await setAccessTokensToServers([ server ])
211 await createUser({ url: server.url, accessToken: server.accessToken, username: user.username, password: user.password })
212 userAccessToken = await userLogin(server, user)
215 describe('When getting the configuration', function () {
216 it('Should fail without token', async function () {
217 await makeGetRequest({
220 statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
224 it('Should fail if the user is not an administrator', async function () {
225 await makeGetRequest({
228 token: userAccessToken,
229 statusCodeExpected: HttpStatusCode.FORBIDDEN_403
234 describe('When updating the configuration', function () {
235 it('Should fail without token', async function () {
236 await makePutBodyRequest({
239 fields: updateParams,
240 statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
244 it('Should fail if the user is not an administrator', async function () {
245 await makePutBodyRequest({
248 fields: updateParams,
249 token: userAccessToken,
250 statusCodeExpected: HttpStatusCode.FORBIDDEN_403
254 it('Should fail if it misses a key', async function () {
255 const newUpdateParams = omit(updateParams, 'admin.email')
257 await makePutBodyRequest({
260 fields: newUpdateParams,
261 token: server.accessToken,
262 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
266 it('Should fail with a bad default NSFW policy', async function () {
267 const newUpdateParams = immutableAssign(updateParams, {
269 defaultNSFWPolicy: 'hello'
273 await makePutBodyRequest({
276 fields: newUpdateParams,
277 token: server.accessToken,
278 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
282 it('Should fail if email disabled and signup requires email verification', async function () {
283 // opposite scenario - success when enable enabled - covered via tests/api/users/user-verification.ts
284 const newUpdateParams = immutableAssign(updateParams, {
288 requiresEmailVerification: true
292 await makePutBodyRequest({
295 fields: newUpdateParams,
296 token: server.accessToken,
297 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
301 it('Should fail with a disabled webtorrent & hls transcoding', async function () {
302 const newUpdateParams = immutableAssign(updateParams, {
313 await makePutBodyRequest({
316 fields: newUpdateParams,
317 token: server.accessToken,
318 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
322 it('Should success with the correct parameters', async function () {
323 await makePutBodyRequest({
326 fields: updateParams,
327 token: server.accessToken,
328 statusCodeExpected: HttpStatusCode.OK_200
333 describe('When deleting the configuration', function () {
334 it('Should fail without token', async function () {
335 await makeDeleteRequest({
338 statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
342 it('Should fail if the user is not an administrator', async function () {
343 await makeDeleteRequest({
346 token: userAccessToken,
347 statusCodeExpected: HttpStatusCode.FORBIDDEN_403
352 after(async function () {
353 await cleanupTests([ server ])