-/* tslint:disable:no-unused-expression */
+/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
import 'mocha'
-
import {
- createUser,
+ checkBadCountPagination,
+ checkBadSortPagination,
+ checkBadStartPagination,
+ cleanupTests,
+ createMultipleServers,
doubleFollow,
- flushAndRunMultipleServers,
- flushTests,
- killallServers,
makeDeleteRequest,
makeGetRequest,
makePostBodyRequest,
- ServerInfo,
- setAccessTokensToServers, userLogin
-} from '../../../../shared/utils'
-import {
- checkBadCountPagination,
- checkBadSortPagination,
- checkBadStartPagination
-} from '../../../../shared/utils/requests/check-api-params'
+ PeerTubeServer,
+ setAccessTokensToServers
+} from '@shared/extra-utils'
+import { HttpStatusCode } from '@shared/models'
describe('Test blocklist API validators', function () {
- let servers: ServerInfo[]
- let server: ServerInfo
+ let servers: PeerTubeServer[]
+ let server: PeerTubeServer
let userAccessToken: string
before(async function () {
this.timeout(60000)
- await flushTests()
-
- servers = await flushAndRunMultipleServers(2)
+ servers = await createMultipleServers(2)
await setAccessTokensToServers(servers)
server = servers[0]
const user = { username: 'user1', password: 'password' }
- await createUser(server.url, server.accessToken, user.username, user.password)
+ await server.users.create({ username: user.username, password: user.password })
- userAccessToken = await userLogin(server, user)
+ userAccessToken = await server.login.getAccessToken(user)
await doubleFollow(servers[0], servers[1])
})
await makeGetRequest({
url: server.url,
path,
- statusCodeExpected: 401
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
url: server.url,
path,
fields: { accountName: 'user1' },
- statusCodeExpected: 401
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
token: server.accessToken,
path,
fields: { accountName: 'user2' },
- statusCodeExpected: 404
+ expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
token: server.accessToken,
path,
fields: { accountName: 'root' },
- statusCodeExpected: 409
+ expectedStatus: HttpStatusCode.CONFLICT_409
})
})
token: server.accessToken,
path,
fields: { accountName: 'user1' },
- statusCodeExpected: 204
+ expectedStatus: HttpStatusCode.NO_CONTENT_204
})
})
})
await makeDeleteRequest({
url: server.url,
path: path + '/user1',
- statusCodeExpected: 401
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
url: server.url,
path: path + '/user2',
token: server.accessToken,
- statusCodeExpected: 404
+ expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
url: server.url,
path: path + '/user1',
token: server.accessToken,
- statusCodeExpected: 204
+ expectedStatus: HttpStatusCode.NO_CONTENT_204
})
})
})
await makeGetRequest({
url: server.url,
path,
- statusCodeExpected: 401
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
url: server.url,
path,
fields: { host: 'localhost:9002' },
- statusCodeExpected: 401
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
- it('Should fail with an unknown server', async function () {
+ it('Should succeed with an unknown server', async function () {
await makePostBodyRequest({
url: server.url,
token: server.accessToken,
path,
fields: { host: 'localhost:9003' },
- statusCodeExpected: 404
+ expectedStatus: HttpStatusCode.NO_CONTENT_204
})
})
url: server.url,
token: server.accessToken,
path,
- fields: { host: 'localhost:9001' },
- statusCodeExpected: 409
+ fields: { host: 'localhost:' + server.port },
+ expectedStatus: HttpStatusCode.CONFLICT_409
})
})
url: server.url,
token: server.accessToken,
path,
- fields: { host: 'localhost:9002' },
- statusCodeExpected: 204
+ fields: { host: 'localhost:' + servers[1].port },
+ expectedStatus: HttpStatusCode.NO_CONTENT_204
})
})
})
it('Should fail with an unauthenticated user', async function () {
await makeDeleteRequest({
url: server.url,
- path: path + '/localhost:9002',
- statusCodeExpected: 401
+ path: path + '/localhost:' + servers[1].port,
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
it('Should fail with an unknown server block', async function () {
await makeDeleteRequest({
url: server.url,
- path: path + '/localhost:9003',
+ path: path + '/localhost:9004',
token: server.accessToken,
- statusCodeExpected: 404
+ expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
it('Should succeed with the correct params', async function () {
await makeDeleteRequest({
url: server.url,
- path: path + '/localhost:9002',
+ path: path + '/localhost:' + servers[1].port,
token: server.accessToken,
- statusCodeExpected: 204
+ expectedStatus: HttpStatusCode.NO_CONTENT_204
})
})
})
await makeGetRequest({
url: server.url,
path,
- statusCodeExpected: 401
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
url: server.url,
token: userAccessToken,
path,
- statusCodeExpected: 403
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
url: server.url,
path,
fields: { accountName: 'user1' },
- statusCodeExpected: 401
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
token: userAccessToken,
path,
fields: { accountName: 'user1' },
- statusCodeExpected: 403
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
token: server.accessToken,
path,
fields: { accountName: 'user2' },
- statusCodeExpected: 404
+ expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
token: server.accessToken,
path,
fields: { accountName: 'root' },
- statusCodeExpected: 409
+ expectedStatus: HttpStatusCode.CONFLICT_409
})
})
token: server.accessToken,
path,
fields: { accountName: 'user1' },
- statusCodeExpected: 204
+ expectedStatus: HttpStatusCode.NO_CONTENT_204
})
})
})
await makeDeleteRequest({
url: server.url,
path: path + '/user1',
- statusCodeExpected: 401
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
url: server.url,
path: path + '/user1',
token: userAccessToken,
- statusCodeExpected: 403
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
url: server.url,
path: path + '/user2',
token: server.accessToken,
- statusCodeExpected: 404
+ expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
url: server.url,
path: path + '/user1',
token: server.accessToken,
- statusCodeExpected: 204
+ expectedStatus: HttpStatusCode.NO_CONTENT_204
})
})
})
await makeGetRequest({
url: server.url,
path,
- statusCodeExpected: 401
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
url: server.url,
token: userAccessToken,
path,
- statusCodeExpected: 403
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
await makePostBodyRequest({
url: server.url,
path,
- fields: { host: 'localhost:9002' },
- statusCodeExpected: 401
+ fields: { host: 'localhost:' + servers[1].port },
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
url: server.url,
token: userAccessToken,
path,
- fields: { host: 'localhost:9002' },
- statusCodeExpected: 403
+ fields: { host: 'localhost:' + servers[1].port },
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
- it('Should fail with an unknown server', async function () {
+ it('Should succeed with an unknown server', async function () {
await makePostBodyRequest({
url: server.url,
token: server.accessToken,
path,
fields: { host: 'localhost:9003' },
- statusCodeExpected: 404
+ expectedStatus: HttpStatusCode.NO_CONTENT_204
})
})
url: server.url,
token: server.accessToken,
path,
- fields: { host: 'localhost:9001' },
- statusCodeExpected: 409
+ fields: { host: 'localhost:' + server.port },
+ expectedStatus: HttpStatusCode.CONFLICT_409
})
})
url: server.url,
token: server.accessToken,
path,
- fields: { host: 'localhost:9002' },
- statusCodeExpected: 204
+ fields: { host: 'localhost:' + servers[1].port },
+ expectedStatus: HttpStatusCode.NO_CONTENT_204
})
})
})
it('Should fail with an unauthenticated user', async function () {
await makeDeleteRequest({
url: server.url,
- path: path + '/localhost:9002',
- statusCodeExpected: 401
+ path: path + '/localhost:' + servers[1].port,
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
it('Should fail with a user without the appropriate rights', async function () {
await makeDeleteRequest({
url: server.url,
- path: path + '/localhost:9002',
+ path: path + '/localhost:' + servers[1].port,
token: userAccessToken,
- statusCodeExpected: 403
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
it('Should fail with an unknown server block', async function () {
await makeDeleteRequest({
url: server.url,
- path: path + '/localhost:9003',
+ path: path + '/localhost:9004',
token: server.accessToken,
- statusCodeExpected: 404
+ expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
it('Should succeed with the correct params', async function () {
await makeDeleteRequest({
url: server.url,
- path: path + '/localhost:9002',
+ path: path + '/localhost:' + servers[1].port,
token: server.accessToken,
- statusCodeExpected: 204
+ expectedStatus: HttpStatusCode.NO_CONTENT_204
})
})
})
})
})
- after(async function () {
- killallServers(servers)
+ describe('When getting blocklist status', function () {
+ const path = '/api/v1/blocklist/status'
+
+ it('Should fail with a bad token', async function () {
+ await makeGetRequest({
+ url: server.url,
+ path,
+ token: 'false',
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
+ })
+ })
+
+ it('Should fail with a bad accounts field', async function () {
+ await makeGetRequest({
+ url: server.url,
+ path,
+ query: {
+ accounts: 1
+ },
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
+
+ await makeGetRequest({
+ url: server.url,
+ path,
+ query: {
+ accounts: [ 1 ]
+ },
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
+ })
+
+ it('Should fail with a bad hosts field', async function () {
+ await makeGetRequest({
+ url: server.url,
+ path,
+ query: {
+ hosts: 1
+ },
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
+
+ await makeGetRequest({
+ url: server.url,
+ path,
+ query: {
+ hosts: [ 1 ]
+ },
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
+ })
+
+ it('Should succeed with the correct parameters', async function () {
+ await makeGetRequest({
+ url: server.url,
+ path,
+ query: {},
+ expectedStatus: HttpStatusCode.OK_200
+ })
+
+ await makeGetRequest({
+ url: server.url,
+ path,
+ query: {
+ hosts: [ 'example.com' ],
+ accounts: [ 'john@example.com' ]
+ },
+ expectedStatus: HttpStatusCode.OK_200
+ })
+ })
+ })
- // Keep the logs if the test failed
- if (this['ok']) {
- await flushTests()
- }
+ after(async function () {
+ await cleanupTests(servers)
})
})