1 /* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
4 import { omit } from 'lodash'
5 import { HttpStatusCode } from '@shared/core-utils'
13 setAccessTokensToServers
14 } from '@shared/extra-utils'
15 import { CustomConfig } from '@shared/models'
17 describe('Test config API validators', function () {
18 const path = '/api/v1/config/custom'
19 let server: PeerTubeServer
20 let userAccessToken: string
21 const updateParams: CustomConfig = {
23 name: 'PeerTube updated',
24 shortDescription: 'my short description',
25 description: 'my super description',
26 terms: 'my super terms',
27 codeOfConduct: 'my super coc',
29 creationReason: 'my super reason',
30 moderationInformation: 'my super moderation information',
31 administrator: 'Kuja',
32 maintenanceLifetime: 'forever',
33 businessModel: 'my super business model',
34 hardwareInformation: '2vCore 3GB RAM',
36 languages: [ 'en', 'es' ],
40 defaultNSFWPolicy: 'blur',
42 defaultClientRoute: '/videos/recently-added',
45 javascript: 'alert("coucou")',
46 css: 'body { background-color: red; }'
54 username: '@MySuperUsername',
72 requiresEmailVerification: false,
76 email: 'superadmin1@example.com'
83 videoQuotaDaily: 318742
87 allowAdditionalExtensions: true,
88 allowAudioFiles: true,
91 profile: 'vod_profile',
114 maxInstanceLives: -1,
120 profile: 'live_profile',
146 enabled: [ 'best', 'hot', 'most-viewed', 'most-liked' ],
147 default: 'most-viewed'
171 indexUrl: 'https://index.example.com'
178 message: 'super message',
188 url: 'https://search.joinpeertube.org',
189 disableLocalSearch: true,
190 isDefaultSearch: true
195 // ---------------------------------------------------------------
197 before(async function () {
200 server = await createSingleServer(1)
202 await setAccessTokensToServers([ server ])
208 await server.users.create({ username: user.username, password: user.password })
209 userAccessToken = await server.login.getAccessToken(user)
212 describe('When getting the configuration', function () {
213 it('Should fail without token', async function () {
214 await makeGetRequest({
217 statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
221 it('Should fail if the user is not an administrator', async function () {
222 await makeGetRequest({
225 token: userAccessToken,
226 statusCodeExpected: HttpStatusCode.FORBIDDEN_403
231 describe('When updating the configuration', function () {
232 it('Should fail without token', async function () {
233 await makePutBodyRequest({
236 fields: updateParams,
237 statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
241 it('Should fail if the user is not an administrator', async function () {
242 await makePutBodyRequest({
245 fields: updateParams,
246 token: userAccessToken,
247 statusCodeExpected: HttpStatusCode.FORBIDDEN_403
251 it('Should fail if it misses a key', async function () {
252 const newUpdateParams = omit(updateParams, 'admin.email')
254 await makePutBodyRequest({
257 fields: newUpdateParams,
258 token: server.accessToken,
259 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
263 it('Should fail with a bad default NSFW policy', async function () {
264 const newUpdateParams = {
268 defaultNSFWPolicy: 'hello'
272 await makePutBodyRequest({
275 fields: newUpdateParams,
276 token: server.accessToken,
277 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
281 it('Should fail if email disabled and signup requires email verification', async function () {
282 // opposite scenario - success when enable enabled - covered via tests/api/users/user-verification.ts
283 const newUpdateParams = {
289 requiresEmailVerification: true
293 await makePutBodyRequest({
296 fields: newUpdateParams,
297 token: server.accessToken,
298 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
302 it('Should fail with a disabled webtorrent & hls transcoding', async function () {
303 const newUpdateParams = {
316 await makePutBodyRequest({
319 fields: newUpdateParams,
320 token: server.accessToken,
321 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
325 it('Should success with the correct parameters', async function () {
326 await makePutBodyRequest({
329 fields: updateParams,
330 token: server.accessToken,
331 statusCodeExpected: HttpStatusCode.OK_200
336 describe('When deleting the configuration', function () {
337 it('Should fail without token', async function () {
338 await makeDeleteRequest({
341 statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
345 it('Should fail if the user is not an administrator', async function () {
346 await makeDeleteRequest({
349 token: userAccessToken,
350 statusCodeExpected: HttpStatusCode.FORBIDDEN_403
355 after(async function () {
356 await cleanupTests([ server ])