/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
-import 'mocha'
-import { omit } from 'lodash'
-import { buildAbsoluteFixturePath } from '@shared/core-utils'
-import { HttpStatusCode, VideoCreateResult, VideoPrivacy } from '@shared/models'
+import { expect } from 'chai'
+import { buildAbsoluteFixturePath, omit } from '@shared/core-utils'
+import { HttpStatusCode, LiveVideoLatencyMode, VideoCreateResult, VideoPrivacy } from '@shared/models'
import {
cleanupTests,
createSingleServer,
newConfig: {
live: {
enabled: true,
+ latencySetting: {
+ enabled: false
+ },
maxInstanceLives: 20,
maxUserLives: 20,
allowReplay: true
const username = 'user1'
const password = 'my super password'
- await server.users.create({ username: username, password: password })
+ await server.users.create({ username, password })
userAccessToken = await server.login.getAccessToken({ username, password })
{
privacy: VideoPrivacy.PUBLIC,
channelId,
saveReplay: false,
- permanentLive: false
+ replaySettings: undefined,
+ permanentLive: false,
+ latencyMode: LiveVideoLatencyMode.DEFAULT
}
})
})
it('Should fail without a channel', async function () {
- const fields = omit(baseCorrectParams, 'channelId')
+ const fields = omit(baseCorrectParams, [ 'channelId' ])
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
+ it('Should fail with a bad privacy for replay settings', async function () {
+ const fields = { ...baseCorrectParams, replaySettings: { privacy: 5 } }
+
+ await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
+ })
+
it('Should fail with another user channel', async function () {
const user = {
username: 'fake',
await makeUploadRequest({ url: server.url, path, token: server.accessToken, fields, attaches })
})
- it('Should fail with save replay and permanent live set to true', async function () {
- const fields = { ...baseCorrectParams, saveReplay: true, permanentLive: true }
+ it('Should fail with bad latency setting', async function () {
+ const fields = { ...baseCorrectParams, latencyMode: 42 }
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
+ it('Should fail to set latency if the server does not allow it', async function () {
+ const fields = { ...baseCorrectParams, latencyMode: LiveVideoLatencyMode.HIGH_LATENCY }
+
+ await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields, expectedStatus: HttpStatusCode.FORBIDDEN_403 })
+ })
+
it('Should succeed with the correct parameters', async function () {
this.timeout(30000)
})
it('Should forbid to save replay if not enabled by the admin', async function () {
- const fields = { ...baseCorrectParams, saveReplay: true }
+ const fields = { ...baseCorrectParams, saveReplay: true, replaySettings: { privacy: VideoPrivacy.PUBLIC } }
await server.config.updateCustomSubConfig({
newConfig: {
})
it('Should allow to save replay if enabled by the admin', async function () {
- const fields = { ...baseCorrectParams, saveReplay: true }
+ const fields = { ...baseCorrectParams, saveReplay: true, replaySettings: { privacy: VideoPrivacy.PUBLIC } }
await server.config.updateCustomSubConfig({
newConfig: {
describe('When getting live information', function () {
- it('Should fail without access token', async function () {
- await command.get({ token: '', videoId: video.id, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
- })
-
it('Should fail with a bad access token', async function () {
await command.get({ token: 'toto', videoId: video.id, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
})
- it('Should fail with access token of another user', async function () {
- await command.get({ token: userAccessToken, videoId: video.id, expectedStatus: HttpStatusCode.FORBIDDEN_403 })
+ it('Should not display private information without access token', async function () {
+ const live = await command.get({ token: '', videoId: video.id })
+
+ expect(live.rtmpUrl).to.not.exist
+ expect(live.streamKey).to.not.exist
+ expect(live.latencyMode).to.exist
+ })
+
+ it('Should not display private information with token of another user', async function () {
+ const live = await command.get({ token: userAccessToken, videoId: video.id })
+
+ expect(live.rtmpUrl).to.not.exist
+ expect(live.streamKey).to.not.exist
+ expect(live.latencyMode).to.exist
+ })
+
+ it('Should display private information with appropriate token', async function () {
+ const live = await command.get({ videoId: video.id })
+
+ expect(live.rtmpUrl).to.exist
+ expect(live.streamKey).to.exist
+ expect(live.latencyMode).to.exist
})
it('Should fail with a bad video id', async function () {
})
})
+ describe('When getting live sessions', function () {
+
+ it('Should fail with a bad access token', async function () {
+ await command.listSessions({ token: 'toto', videoId: video.id, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
+ })
+
+ it('Should fail without token', async function () {
+ await command.listSessions({ token: null, videoId: video.id, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
+ })
+
+ it('Should fail with the token of another user', async function () {
+ await command.listSessions({ token: userAccessToken, videoId: video.id, expectedStatus: HttpStatusCode.FORBIDDEN_403 })
+ })
+
+ it('Should fail with a bad video id', async function () {
+ await command.listSessions({ videoId: 'toto', expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
+ })
+
+ it('Should fail with an unknown video id', async function () {
+ await command.listSessions({ videoId: 454555, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
+ })
+
+ it('Should fail with a non live video', async function () {
+ await command.listSessions({ videoId: videoIdNotLive, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
+ })
+
+ it('Should succeed with the correct params', async function () {
+ await command.listSessions({ videoId: video.id })
+ })
+ })
+
+ describe('When getting live session of a replay', function () {
+
+ it('Should fail with a bad video id', async function () {
+ await command.getReplaySession({ videoId: 'toto', expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
+ })
+
+ it('Should fail with an unknown video id', async function () {
+ await command.getReplaySession({ videoId: 454555, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
+ })
+
+ it('Should fail with a non replay video', async function () {
+ await command.getReplaySession({ videoId: videoIdNotLive, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
+ })
+ })
+
describe('When updating live information', async function () {
it('Should fail without access token', async function () {
await command.update({ videoId: videoIdNotLive, fields: {}, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
})
- it('Should fail with save replay and permanent live set to true', async function () {
- const fields = { saveReplay: true, permanentLive: true }
+ it('Should fail with bad latency setting', async function () {
+ const fields = { latencyMode: 42 }
+
+ await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
+ })
+
+ it('Should fail with a bad privacy for replay settings', async function () {
+ const fields = { saveReplay: true, replaySettings: { privacy: 5 } }
+
+ await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
+ })
+
+ it('Should fail with save replay enabled but without replay settings', async function () {
+ await server.config.updateCustomSubConfig({
+ newConfig: {
+ live: {
+ enabled: true,
+ allowReplay: true
+ }
+ }
+ })
+
+ const fields = { saveReplay: true }
+
+ await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
+ })
+
+ it('Should fail with save replay disabled and replay settings', async function () {
+ const fields = { saveReplay: false, replaySettings: { privacy: VideoPrivacy.INTERNAL } }
await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
})
+ it('Should fail with only replay settings when save replay is disabled', async function () {
+ const fields = { replaySettings: { privacy: VideoPrivacy.INTERNAL } }
+
+ await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
+ })
+
+ it('Should fail to set latency if the server does not allow it', async function () {
+ const fields = { latencyMode: LiveVideoLatencyMode.HIGH_LATENCY }
+
+ await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.FORBIDDEN_403 })
+ })
+
it('Should succeed with the correct params', async function () {
await command.update({ videoId: video.id, fields: { saveReplay: false } })
await command.update({ videoId: video.uuid, fields: { saveReplay: false } })
await command.update({ videoId: video.shortUUID, fields: { saveReplay: false } })
+
+ await command.update({ videoId: video.id, fields: { saveReplay: true, replaySettings: { privacy: VideoPrivacy.PUBLIC } } })
+
})
it('Should fail to update replay status if replay is not allowed on the instance', async function () {
await stopFfmpeg(ffmpegCommand)
})
+ it('Should fail to change live privacy if it has already started', async function () {
+ this.timeout(40000)
+
+ const live = await command.get({ videoId: video.id })
+
+ const ffmpegCommand = sendRTMPStream({ rtmpBaseUrl: live.rtmpUrl, streamKey: live.streamKey })
+
+ await command.waitUntilPublished({ videoId: video.id })
+
+ await server.videos.update({
+ id: video.id,
+ attributes: { privacy: VideoPrivacy.PUBLIC } // Same privacy, it's fine
+ })
+
+ await server.videos.update({
+ id: video.id,
+ attributes: { privacy: VideoPrivacy.UNLISTED },
+ expectedStatus: HttpStatusCode.BAD_REQUEST_400
+ })
+
+ await stopFfmpeg(ffmpegCommand)
+ })
+
it('Should fail to stream twice in the save live', async function () {
this.timeout(40000)