1 /* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
2 import { merge } from 'lodash'
3 import { omit } from '@shared/core-utils'
4 import { CustomConfig, HttpStatusCode } from '@shared/models'
12 setAccessTokensToServers
13 } from '@shared/server-commands'
15 describe('Test config API validators', function () {
16 const path = '/api/v1/config/custom'
17 let server: PeerTubeServer
18 let userAccessToken: string
19 const updateParams: CustomConfig = {
21 name: 'PeerTube updated',
22 shortDescription: 'my short description',
23 description: 'my super description',
24 terms: 'my super terms',
25 codeOfConduct: 'my super coc',
27 creationReason: 'my super reason',
28 moderationInformation: 'my super moderation information',
29 administrator: 'Kuja',
30 maintenanceLifetime: 'forever',
31 businessModel: 'my super business model',
32 hardwareInformation: '2vCore 3GB RAM',
34 languages: [ 'en', 'es' ],
38 defaultNSFWPolicy: 'blur',
40 defaultClientRoute: '/videos/recently-added',
43 javascript: 'alert("coucou")',
44 css: 'body { background-color: red; }'
52 username: '@MySuperUsername',
59 preferAuthorDisplayName: false
64 redirectOnSingleExternalAuth: false
82 requiresApproval: false,
83 requiresEmailVerification: false,
87 email: 'superadmin1@example.com'
99 videoQuotaDaily: 318742
109 allowAdditionalExtensions: true,
110 allowAudioFiles: true,
113 profile: 'vod_profile',
125 alwaysTranscodeOriginalResolution: false,
141 maxInstanceLives: -1,
150 profile: 'live_profile',
161 alwaysTranscodeOriginalResolution: false
177 videoChannelSynchronization: {
185 enabled: [ 'hot', 'most-viewed', 'most-liked' ],
186 default: 'most-viewed'
210 indexUrl: 'https://index.example.com'
217 message: 'super message',
227 url: 'https://search.joinpeertube.org',
228 disableLocalSearch: true,
229 isDefaultSearch: true
234 // ---------------------------------------------------------------
236 before(async function () {
239 server = await createSingleServer(1)
241 await setAccessTokensToServers([ server ])
247 await server.users.create({ username: user.username, password: user.password })
248 userAccessToken = await server.login.getAccessToken(user)
251 describe('When getting the configuration', function () {
252 it('Should fail without token', async function () {
253 await makeGetRequest({
256 expectedStatus: HttpStatusCode.UNAUTHORIZED_401
260 it('Should fail if the user is not an administrator', async function () {
261 await makeGetRequest({
264 token: userAccessToken,
265 expectedStatus: HttpStatusCode.FORBIDDEN_403
270 describe('When updating the configuration', function () {
271 it('Should fail without token', async function () {
272 await makePutBodyRequest({
275 fields: updateParams,
276 expectedStatus: HttpStatusCode.UNAUTHORIZED_401
280 it('Should fail if the user is not an administrator', async function () {
281 await makePutBodyRequest({
284 fields: updateParams,
285 token: userAccessToken,
286 expectedStatus: HttpStatusCode.FORBIDDEN_403
290 it('Should fail if it misses a key', async function () {
291 const newUpdateParams = { ...updateParams, admin: omit(updateParams.admin, [ 'email' ]) }
293 await makePutBodyRequest({
296 fields: newUpdateParams,
297 token: server.accessToken,
298 expectedStatus: HttpStatusCode.BAD_REQUEST_400
302 it('Should fail with a bad default NSFW policy', async function () {
303 const newUpdateParams = {
307 defaultNSFWPolicy: 'hello'
311 await makePutBodyRequest({
314 fields: newUpdateParams,
315 token: server.accessToken,
316 expectedStatus: HttpStatusCode.BAD_REQUEST_400
320 it('Should fail if email disabled and signup requires email verification', async function () {
321 // opposite scenario - success when enable enabled - covered via tests/api/users/user-verification.ts
322 const newUpdateParams = {
328 requiresApproval: true,
329 requiresEmailVerification: true
333 await makePutBodyRequest({
336 fields: newUpdateParams,
337 token: server.accessToken,
338 expectedStatus: HttpStatusCode.BAD_REQUEST_400
342 it('Should fail with a disabled webtorrent & hls transcoding', async function () {
343 const newUpdateParams = {
356 await makePutBodyRequest({
359 fields: newUpdateParams,
360 token: server.accessToken,
361 expectedStatus: HttpStatusCode.BAD_REQUEST_400
365 it('Should fail with a disabled http upload & enabled sync', async function () {
366 const newUpdateParams: CustomConfig = merge({}, updateParams, {
369 http: { enabled: false }
371 videoChannelSynchronization: { enabled: true }
375 await makePutBodyRequest({
378 fields: newUpdateParams,
379 token: server.accessToken,
380 expectedStatus: HttpStatusCode.BAD_REQUEST_400
384 it('Should succeed with the correct parameters', async function () {
385 await makePutBodyRequest({
388 fields: updateParams,
389 token: server.accessToken,
390 expectedStatus: HttpStatusCode.OK_200
395 describe('When deleting the configuration', function () {
396 it('Should fail without token', async function () {
397 await makeDeleteRequest({
400 expectedStatus: HttpStatusCode.UNAUTHORIZED_401
404 it('Should fail if the user is not an administrator', async function () {
405 await makeDeleteRequest({
408 token: userAccessToken,
409 expectedStatus: HttpStatusCode.FORBIDDEN_403
414 after(async function () {
415 await cleanupTests([ server ])