-/* tslint:disable:no-unused-expression */
+/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
import 'mocha'
-import * as request from 'supertest'
-
import {
- createUser,
- flushTests,
- killallServers,
- loginAndGetAccessToken,
- runServer,
- ServerInfo,
+ checkBadCountPagination,
+ checkBadSortPagination,
+ checkBadStartPagination,
+ cleanupTests,
+ createSingleServer,
+ makeDeleteRequest,
+ makeGetRequest,
+ makePostBodyRequest,
+ PeerTubeServer,
setAccessTokensToServers
-} from '../../utils'
+} from '@shared/extra-utils'
+import { HttpStatusCode } from '@shared/models'
describe('Test server follows API validators', function () {
- let server: ServerInfo
+ let server: PeerTubeServer
// ---------------------------------------------------------------
before(async function () {
- this.timeout(45000)
+ this.timeout(30000)
- await flushTests()
- server = await runServer(1)
+ server = await createSingleServer(1)
await setAccessTokensToServers([ server ])
})
let userAccessToken = null
before(async function () {
- await createUser(server.url, server.accessToken, 'user1', 'password')
- server.user = {
- username: 'user1',
- password: 'password'
- }
-
- userAccessToken = await loginAndGetAccessToken(server)
+ userAccessToken = await server.users.generateUserAndToken('user1')
})
describe('When adding follows', function () {
const path = '/api/v1/server/following'
- const body = {
- hosts: [ 'localhost:9002' ]
- }
- it('Should fail without hosts', async function () {
- await request(server.url)
- .post(path)
- .set('Authorization', 'Bearer ' + server.accessToken)
- .set('Accept', 'application/json')
- .expect(400)
+ it('Should fail with nothing', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path,
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
})
- it('Should fail if hosts is not an array', async function () {
- await request(server.url)
- .post(path)
- .send({ hosts: 'localhost:9002' })
- .set('Authorization', 'Bearer ' + server.accessToken)
- .set('Accept', 'application/json')
- .expect(400)
+ it('Should fail if hosts is not composed by hosts', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path,
+ fields: { hosts: [ 'localhost:9002', 'localhost:coucou' ] },
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
})
- it('Should fail if the array is not composed by hosts', async function () {
- await request(server.url)
- .post(path)
- .send({ hosts: [ 'localhost:9002', 'localhost:coucou' ] })
- .set('Authorization', 'Bearer ' + server.accessToken)
- .set('Accept', 'application/json')
- .expect(400)
+ it('Should fail if hosts is composed with http schemes', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path,
+ fields: { hosts: [ 'localhost:9002', 'http://localhost:9003' ] },
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
})
- it('Should fail if the array is composed with http schemes', async function () {
- await request(server.url)
- .post(path)
- .send({ hosts: [ 'localhost:9002', 'http://localhost:9003' ] })
- .set('Authorization', 'Bearer ' + server.accessToken)
- .set('Accept', 'application/json')
- .expect(400)
+ it('Should fail if hosts are not unique', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path,
+ fields: { urls: [ 'localhost:9002', 'localhost:9002' ] },
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
})
- it('Should fail if hosts are not unique', async function () {
- await request(server.url)
- .post(path)
- .send({ urls: [ 'localhost:9002', 'localhost:9002' ] })
- .set('Authorization', 'Bearer ' + server.accessToken)
- .set('Accept', 'application/json')
- .expect(400)
+ it('Should fail if handles is not composed by handles', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path,
+ fields: { handles: [ 'hello@example.com', 'localhost:9001' ] },
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
+ })
+
+ it('Should fail if handles are not unique', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path,
+ fields: { urls: [ 'hello@example.com', 'hello@example.com' ] },
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
})
it('Should fail with an invalid token', async function () {
- await request(server.url)
- .post(path)
- .send(body)
- .set('Authorization', 'Bearer fake_token')
- .set('Accept', 'application/json')
- .expect(401)
+ await makePostBodyRequest({
+ url: server.url,
+ path,
+ fields: { hosts: [ 'localhost:9002' ] },
+ token: 'fake_token',
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
+ })
})
it('Should fail if the user is not an administrator', async function () {
- await request(server.url)
- .post(path)
- .send(body)
- .set('Authorization', 'Bearer ' + userAccessToken)
- .set('Accept', 'application/json')
- .expect(403)
+ await makePostBodyRequest({
+ url: server.url,
+ path,
+ fields: { hosts: [ 'localhost:9002' ] },
+ token: userAccessToken,
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
+ })
})
})
const path = '/api/v1/server/following'
it('Should fail with a bad start pagination', async function () {
- await request(server.url)
- .get(path)
- .query({ start: 'hello' })
- .set('Accept', 'application/json')
- .expect(400)
+ await checkBadStartPagination(server.url, path)
})
it('Should fail with a bad count pagination', async function () {
- await request(server.url)
- .get(path)
- .query({ count: 'hello' })
- .set('Accept', 'application/json')
- .expect(400)
+ await checkBadCountPagination(server.url, path)
})
it('Should fail with an incorrect sort', async function () {
- await request(server.url)
- .get(path)
- .query({ sort: 'hello' })
- .set('Accept', 'application/json')
- .expect(400)
+ await checkBadSortPagination(server.url, path)
+ })
+
+ it('Should fail with an incorrect state', async function () {
+ await makeGetRequest({
+ url: server.url,
+ path,
+ query: {
+ state: 'blabla'
+ }
+ })
+ })
+
+ it('Should fail with an incorrect actor type', async function () {
+ await makeGetRequest({
+ url: server.url,
+ path,
+ query: {
+ actorType: 'blabla'
+ }
+ })
+ })
+
+ it('Should fail succeed with the correct params', async function () {
+ await makeGetRequest({
+ url: server.url,
+ path,
+ expectedStatus: HttpStatusCode.OK_200,
+ query: {
+ state: 'accepted',
+ actorType: 'Application'
+ }
+ })
})
})
const path = '/api/v1/server/followers'
it('Should fail with a bad start pagination', async function () {
- await request(server.url)
- .get(path)
- .query({ start: 'hello' })
- .set('Accept', 'application/json')
- .expect(400)
+ await checkBadStartPagination(server.url, path)
})
it('Should fail with a bad count pagination', async function () {
- await request(server.url)
- .get(path)
- .query({ count: 'hello' })
- .set('Accept', 'application/json')
- .expect(400)
+ await checkBadCountPagination(server.url, path)
})
it('Should fail with an incorrect sort', async function () {
- await request(server.url)
- .get(path)
- .query({ sort: 'hello' })
- .set('Accept', 'application/json')
- .expect(400)
+ await checkBadSortPagination(server.url, path)
+ })
+
+ it('Should fail with an incorrect actor type', async function () {
+ await makeGetRequest({
+ url: server.url,
+ path,
+ query: {
+ actorType: 'blabla'
+ }
+ })
+ })
+
+ it('Should fail with an incorrect state', async function () {
+ await makeGetRequest({
+ url: server.url,
+ path,
+ query: {
+ state: 'blabla',
+ actorType: 'Application'
+ }
+ })
+ })
+
+ it('Should fail succeed with the correct params', async function () {
+ await makeGetRequest({
+ url: server.url,
+ path,
+ expectedStatus: HttpStatusCode.OK_200,
+ query: {
+ state: 'accepted'
+ }
+ })
+ })
+ })
+
+ describe('When removing a follower', function () {
+ const path = '/api/v1/server/followers'
+
+ it('Should fail with an invalid token', async function () {
+ await makeDeleteRequest({
+ url: server.url,
+ path: path + '/toto@localhost:9002',
+ token: 'fake_token',
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
+ })
+ })
+
+ it('Should fail if the user is not an administrator', async function () {
+ await makeDeleteRequest({
+ url: server.url,
+ path: path + '/toto@localhost:9002',
+ token: userAccessToken,
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
+ })
+ })
+
+ it('Should fail with an invalid follower', async function () {
+ await makeDeleteRequest({
+ url: server.url,
+ path: path + '/toto',
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
+ })
+
+ it('Should fail with an unknown follower', async function () {
+ await makeDeleteRequest({
+ url: server.url,
+ path: path + '/toto@localhost:9003',
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.NOT_FOUND_404
+ })
+ })
+ })
+
+ describe('When accepting a follower', function () {
+ const path = '/api/v1/server/followers'
+
+ it('Should fail with an invalid token', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path: path + '/toto@localhost:9002/accept',
+ token: 'fake_token',
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
+ })
+ })
+
+ it('Should fail if the user is not an administrator', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path: path + '/toto@localhost:9002/accept',
+ token: userAccessToken,
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
+ })
+ })
+
+ it('Should fail with an invalid follower', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path: path + '/toto/accept',
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
+ })
+
+ it('Should fail with an unknown follower', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path: path + '/toto@localhost:9003/accept',
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.NOT_FOUND_404
+ })
+ })
+ })
+
+ describe('When rejecting a follower', function () {
+ const path = '/api/v1/server/followers'
+
+ it('Should fail with an invalid token', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path: path + '/toto@localhost:9002/reject',
+ token: 'fake_token',
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
+ })
+ })
+
+ it('Should fail if the user is not an administrator', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path: path + '/toto@localhost:9002/reject',
+ token: userAccessToken,
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
+ })
+ })
+
+ it('Should fail with an invalid follower', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path: path + '/toto/reject',
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
+ })
+
+ it('Should fail with an unknown follower', async function () {
+ await makePostBodyRequest({
+ url: server.url,
+ path: path + '/toto@localhost:9003/reject',
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.NOT_FOUND_404
+ })
})
})
describe('When removing following', function () {
- // it('Should fail with an invalid token', async function () {
- // await request(server.url)
- // .delete(path + '/1')
- // .set('Authorization', 'Bearer faketoken')
- // .set('Accept', 'application/json')
- // .expect(401)
- // })
- //
- // it('Should fail if the user is not an administrator', async function () {
- // await request(server.url)
- // .delete(path + '/1')
- // .set('Authorization', 'Bearer ' + userAccessToken)
- // .set('Accept', 'application/json')
- // .expect(403)
- // })
- //
- // it('Should fail with an undefined id', async function () {
- // await request(server.url)
- // .delete(path + '/' + undefined)
- // .set('Authorization', 'Bearer ' + server.accessToken)
- // .set('Accept', 'application/json')
- // .expect(400)
- // })
- //
- // it('Should fail with an invalid id', async function () {
- // await request(server.url)
- // .delete(path + '/foobar')
- // .set('Authorization', 'Bearer ' + server.accessToken)
- // .set('Accept', 'application/json')
- // .expect(400)
- // })
- //
- // it('Should fail we do not follow this server', async function () {
- // await request(server.url)
- // .delete(path + '/-1')
- // .set('Authorization', 'Bearer ' + server.accessToken)
- // .set('Accept', 'application/json')
- // .expect(404)
- // })
- //
- // it('Should succeed with the correct parameters')
+ const path = '/api/v1/server/following'
+
+ it('Should fail with an invalid token', async function () {
+ await makeDeleteRequest({
+ url: server.url,
+ path: path + '/localhost:9002',
+ token: 'fake_token',
+ expectedStatus: HttpStatusCode.UNAUTHORIZED_401
+ })
+ })
+
+ it('Should fail if the user is not an administrator', async function () {
+ await makeDeleteRequest({
+ url: server.url,
+ path: path + '/localhost:9002',
+ token: userAccessToken,
+ expectedStatus: HttpStatusCode.FORBIDDEN_403
+ })
+ })
+
+ it('Should fail if we do not follow this server', async function () {
+ await makeDeleteRequest({
+ url: server.url,
+ path: path + '/example.com',
+ token: server.accessToken,
+ expectedStatus: HttpStatusCode.NOT_FOUND_404
+ })
+ })
})
})
after(async function () {
- killallServers([ server ])
-
- // Keep the logs if the test failed
- if (this['ok']) {
- await flushTests()
- }
+ await cleanupTests([ server ])
})
})