1 /* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
3 import { omit } from 'lodash'
5 import { CustomConfig } from '../../../../shared/models/server/custom-config.model'
16 setAccessTokensToServers,
18 } from '../../../../shared/extra-utils'
19 import { HttpStatusCode } from '../../../../shared/core-utils/miscs/http-error-codes'
21 describe('Test config API validators', function () {
22 const path = '/api/v1/config/custom'
23 let server: ServerInfo
24 let userAccessToken: string
25 const updateParams: CustomConfig = {
27 name: 'PeerTube updated',
28 shortDescription: 'my short description',
29 description: 'my super description',
30 terms: 'my super terms',
31 codeOfConduct: 'my super coc',
33 creationReason: 'my super reason',
34 moderationInformation: 'my super moderation information',
35 administrator: 'Kuja',
36 maintenanceLifetime: 'forever',
37 businessModel: 'my super business model',
38 hardwareInformation: '2vCore 3GB RAM',
40 languages: [ 'en', 'es' ],
44 defaultClientRoute: '/videos/recently-added',
45 defaultNSFWPolicy: 'blur',
47 javascript: 'alert("coucou")',
48 css: 'body { background-color: red; }'
56 username: '@MySuperUsername',
71 requiresEmailVerification: false
74 email: 'superadmin1@example.com'
81 videoQuotaDaily: 318742
85 allowAdditionalExtensions: true,
86 allowAudioFiles: true,
110 maxInstanceLives: -1,
157 indexUrl: 'https://index.example.com'
164 message: 'super message',
174 url: 'https://search.joinpeertube.org',
175 disableLocalSearch: true,
176 isDefaultSearch: true
181 // ---------------------------------------------------------------
183 before(async function () {
186 server = await flushAndRunServer(1)
188 await setAccessTokensToServers([ server ])
194 await createUser({ url: server.url, accessToken: server.accessToken, username: user.username, password: user.password })
195 userAccessToken = await userLogin(server, user)
198 describe('When getting the configuration', function () {
199 it('Should fail without token', async function () {
200 await makeGetRequest({
203 statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
207 it('Should fail if the user is not an administrator', async function () {
208 await makeGetRequest({
211 token: userAccessToken,
212 statusCodeExpected: HttpStatusCode.FORBIDDEN_403
217 describe('When updating the configuration', function () {
218 it('Should fail without token', async function () {
219 await makePutBodyRequest({
222 fields: updateParams,
223 statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
227 it('Should fail if the user is not an administrator', async function () {
228 await makePutBodyRequest({
231 fields: updateParams,
232 token: userAccessToken,
233 statusCodeExpected: HttpStatusCode.FORBIDDEN_403
237 it('Should fail if it misses a key', async function () {
238 const newUpdateParams = omit(updateParams, 'admin.email')
240 await makePutBodyRequest({
243 fields: newUpdateParams,
244 token: server.accessToken,
245 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
249 it('Should fail with a bad default NSFW policy', async function () {
250 const newUpdateParams = immutableAssign(updateParams, {
252 defaultNSFWPolicy: 'hello'
256 await makePutBodyRequest({
259 fields: newUpdateParams,
260 token: server.accessToken,
261 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
265 it('Should fail if email disabled and signup requires email verification', async function () {
266 // opposite scenario - success when enable enabled - covered via tests/api/users/user-verification.ts
267 const newUpdateParams = immutableAssign(updateParams, {
271 requiresEmailVerification: true
275 await makePutBodyRequest({
278 fields: newUpdateParams,
279 token: server.accessToken,
280 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
284 it('Should fail with a disabled webtorrent & hls transcoding', async function () {
285 const newUpdateParams = immutableAssign(updateParams, {
296 await makePutBodyRequest({
299 fields: newUpdateParams,
300 token: server.accessToken,
301 statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
305 it('Should success with the correct parameters', async function () {
306 await makePutBodyRequest({
309 fields: updateParams,
310 token: server.accessToken,
311 statusCodeExpected: HttpStatusCode.OK_200
316 describe('When deleting the configuration', function () {
317 it('Should fail without token', async function () {
318 await makeDeleteRequest({
321 statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
325 it('Should fail if the user is not an administrator', async function () {
326 await makeDeleteRequest({
329 token: userAccessToken,
330 statusCodeExpected: HttpStatusCode.FORBIDDEN_403
335 after(async function () {
336 await cleanupTests([ server ])