-/* tslint:disable:no-unused-expression */
+/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
import 'mocha'
-import * as request from 'supertest'
import {
- ServerInfo,
- flushTests,
- runServer,
- uploadVideo,
- getVideosList,
+ cleanupTests,
createUser,
- setAccessTokensToServers,
- killallServers,
+ doubleFollow,
+ flushAndRunMultipleServers,
+ getBlacklistedVideosList,
+ getVideo,
+ getVideoWithToken,
makePostBodyRequest,
- getUserAccessToken
-} from '../../utils'
+ makePutBodyRequest,
+ removeVideoFromBlacklist,
+ ServerInfo,
+ setAccessTokensToServers,
+ uploadVideo,
+ userLogin,
+ waitJobs
+} from '../../../../shared/extra-utils'
+import {
+ checkBadCountPagination,
+ checkBadSortPagination,
+ checkBadStartPagination
+} from '../../../../shared/extra-utils/requests/check-api-params'
+import { VideoBlacklistType, VideoDetails } from '../../../../shared/models/videos'
+import { expect } from 'chai'
+import { HttpStatusCode } from '../../../../shared/core-utils/miscs/http-error-codes'
describe('Test video blacklist API validators', function () {
- let server: ServerInfo
- let userAccessToken = ''
+ let servers: ServerInfo[]
+ let notBlacklistedVideoId: number
+ let remoteVideoUUID: string
+ let userAccessToken1 = ''
+ let userAccessToken2 = ''
// ---------------------------------------------------------------
before(async function () {
this.timeout(120000)
- await flushTests()
+ servers = await flushAndRunMultipleServers(2)
- server = await runServer(1)
+ await setAccessTokensToServers(servers)
+ await doubleFollow(servers[0], servers[1])
- await setAccessTokensToServers([ server ])
+ {
+ const username = 'user1'
+ const password = 'my super password'
+ await createUser({ url: servers[0].url, accessToken: servers[0].accessToken, username: username, password: password })
+ userAccessToken1 = await userLogin(servers[0], { username, password })
+ }
- const username = 'user1'
- const password = 'my super password'
- await createUser(server.url, server.accessToken, username, password)
- userAccessToken = await getUserAccessToken(server, { username, password })
+ {
+ const username = 'user2'
+ const password = 'my super password'
+ await createUser({ url: servers[0].url, accessToken: servers[0].accessToken, username: username, password: password })
+ userAccessToken2 = await userLogin(servers[0], { username, password })
+ }
- // Upload a video
- const videoAttributes = {}
- await uploadVideo(server.url, server.accessToken, videoAttributes)
+ {
+ const res = await uploadVideo(servers[0].url, userAccessToken1, {})
+ servers[0].video = res.body.video
+ }
+
+ {
+ const res = await uploadVideo(servers[0].url, servers[0].accessToken, {})
+ notBlacklistedVideoId = res.body.video.uuid
+ }
- const res = await getVideosList(server.url)
+ {
+ const res = await uploadVideo(servers[1].url, servers[1].accessToken, {})
+ remoteVideoUUID = res.body.video.uuid
+ }
- const videos = res.body.data
- server.video = videos[0]
+ await waitJobs(servers)
})
describe('When adding a video in blacklist', function () {
const basePath = '/api/v1/videos/'
it('Should fail with nothing', async function () {
- const path = basePath + server.video + '/blacklist'
+ const path = basePath + servers[0].video + '/blacklist'
const fields = {}
- await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
+ await makePostBodyRequest({ url: servers[0].url, path, token: servers[0].accessToken, fields })
})
it('Should fail with a wrong video', async function () {
const wrongPath = '/api/v1/videos/blabla/blacklist'
const fields = {}
- await makePostBodyRequest({ url: server.url, path: wrongPath, token: server.accessToken, fields })
+ await makePostBodyRequest({ url: servers[0].url, path: wrongPath, token: servers[0].accessToken, fields })
})
it('Should fail with a non authenticated user', async function () {
+ const path = basePath + servers[0].video + '/blacklist'
const fields = {}
- const path = basePath + server.video + '/blacklist'
- await makePostBodyRequest({ url: server.url, path, token: 'hello', fields, statusCodeExpected: 401 })
+ await makePostBodyRequest({ url: servers[0].url, path, token: 'hello', fields, statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401 })
})
it('Should fail with a non admin user', async function () {
+ const path = basePath + servers[0].video + '/blacklist'
const fields = {}
- const path = basePath + server.video + '/blacklist'
- await makePostBodyRequest({ url: server.url, path, token: userAccessToken, fields, statusCodeExpected: 403 })
+ await makePostBodyRequest({
+ url: servers[0].url,
+ path,
+ token: userAccessToken2,
+ fields,
+ statusCodeExpected: HttpStatusCode.FORBIDDEN_403
+ })
+ })
+
+ it('Should fail with an invalid reason', async function () {
+ const path = basePath + servers[0].video.uuid + '/blacklist'
+ const fields = { reason: 'a'.repeat(305) }
+
+ await makePostBodyRequest({ url: servers[0].url, path, token: servers[0].accessToken, fields })
+ })
+
+ it('Should fail to unfederate a remote video', async function () {
+ const path = basePath + remoteVideoUUID + '/blacklist'
+ const fields = { unfederate: true }
+
+ await makePostBodyRequest({
+ url: servers[0].url,
+ path,
+ token: servers[0].accessToken,
+ fields,
+ statusCodeExpected: HttpStatusCode.CONFLICT_409
+ })
})
- it('Should fail with a local video', async function () {
+ it('Should succeed with the correct params', async function () {
+ const path = basePath + servers[0].video.uuid + '/blacklist'
const fields = {}
- const path = basePath + server.video.id + '/blacklist'
- await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields, statusCodeExpected: 403 })
+
+ await makePostBodyRequest({
+ url: servers[0].url,
+ path,
+ token: servers[0].accessToken,
+ fields,
+ statusCodeExpected: HttpStatusCode.NO_CONTENT_204
+ })
})
})
- describe('When removing a video in blacklist', function () {
+ describe('When updating a video in blacklist', function () {
const basePath = '/api/v1/videos/'
- it('Should fail with a non authenticated user', async function () {
- const path = basePath + server.video.id + '/blacklist'
+ it('Should fail with a wrong video', async function () {
+ const wrongPath = '/api/v1/videos/blabla/blacklist'
+ const fields = {}
+ await makePutBodyRequest({ url: servers[0].url, path: wrongPath, token: servers[0].accessToken, fields })
+ })
- await request(server.url)
- .delete(path)
- .set('Authorization', 'Bearer ' + 'fake token')
- .set('Accept', 'application/json')
- .expect(401)
+ it('Should fail with a video not blacklisted', async function () {
+ const path = '/api/v1/videos/' + notBlacklistedVideoId + '/blacklist'
+ const fields = {}
+ await makePutBodyRequest({
+ url: servers[0].url,
+ path,
+ token: servers[0].accessToken,
+ fields,
+ statusCodeExpected: HttpStatusCode.NOT_FOUND_404
+ })
+ })
+
+ it('Should fail with a non authenticated user', async function () {
+ const path = basePath + servers[0].video + '/blacklist'
+ const fields = {}
+ await makePutBodyRequest({ url: servers[0].url, path, token: 'hello', fields, statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401 })
})
it('Should fail with a non admin user', async function () {
- const path = basePath + server.video.id + '/blacklist'
+ const path = basePath + servers[0].video + '/blacklist'
+ const fields = {}
+ await makePutBodyRequest({
+ url: servers[0].url,
+ path,
+ token: userAccessToken2,
+ fields,
+ statusCodeExpected: HttpStatusCode.FORBIDDEN_403
+ })
+ })
- await request(server.url)
- .delete(path)
- .set('Authorization', 'Bearer ' + userAccessToken)
- .set('Accept', 'application/json')
- .expect(403)
+ it('Should fail with an invalid reason', async function () {
+ const path = basePath + servers[0].video.uuid + '/blacklist'
+ const fields = { reason: 'a'.repeat(305) }
+
+ await makePutBodyRequest({ url: servers[0].url, path, token: servers[0].accessToken, fields })
})
- it('Should fail with an incorrect id', async function () {
- const path = basePath + 'foobar/blacklist'
+ it('Should succeed with the correct params', async function () {
+ const path = basePath + servers[0].video.uuid + '/blacklist'
+ const fields = { reason: 'hello' }
+
+ await makePutBodyRequest({
+ url: servers[0].url,
+ path,
+ token: servers[0].accessToken,
+ fields,
+ statusCodeExpected: HttpStatusCode.NO_CONTENT_204
+ })
+ })
+ })
+
+ describe('When getting blacklisted video', function () {
+
+ it('Should fail with a non authenticated user', async function () {
+ await getVideo(servers[0].url, servers[0].video.uuid, HttpStatusCode.UNAUTHORIZED_401)
+ })
+
+ it('Should fail with another user', async function () {
+ await getVideoWithToken(servers[0].url, userAccessToken2, servers[0].video.uuid, HttpStatusCode.FORBIDDEN_403)
+ })
+
+ it('Should succeed with the owner authenticated user', async function () {
+ const res = await getVideoWithToken(servers[0].url, userAccessToken1, servers[0].video.uuid, HttpStatusCode.OK_200)
+ const video: VideoDetails = res.body
- await request(server.url)
- .delete(path)
- .set('Authorization', 'Bearer ' + server.accessToken)
- .set('Accept', 'application/json')
- .expect(400)
+ expect(video.blacklisted).to.be.true
+ })
+
+ it('Should succeed with an admin', async function () {
+ const res = await getVideoWithToken(servers[0].url, servers[0].accessToken, servers[0].video.uuid, HttpStatusCode.OK_200)
+ const video: VideoDetails = res.body
+
+ expect(video.blacklisted).to.be.true
+ })
+ })
+
+ describe('When removing a video in blacklist', function () {
+ it('Should fail with a non authenticated user', async function () {
+ await removeVideoFromBlacklist(servers[0].url, 'fake token', servers[0].video.uuid, HttpStatusCode.UNAUTHORIZED_401)
+ })
+
+ it('Should fail with a non admin user', async function () {
+ await removeVideoFromBlacklist(servers[0].url, userAccessToken2, servers[0].video.uuid, HttpStatusCode.FORBIDDEN_403)
+ })
+
+ it('Should fail with an incorrect id', async function () {
+ await removeVideoFromBlacklist(servers[0].url, servers[0].accessToken, 'hello', HttpStatusCode.BAD_REQUEST_400)
})
it('Should fail with a not blacklisted video', async function () {
// The video was not added to the blacklist so it should fail
- const path = basePath + server.video.id + '/blacklist'
+ await removeVideoFromBlacklist(servers[0].url, servers[0].accessToken, notBlacklistedVideoId, HttpStatusCode.NOT_FOUND_404)
+ })
- await request(server.url)
- .delete(path)
- .set('Authorization', 'Bearer ' + server.accessToken)
- .set('Accept', 'application/json')
- .expect(404)
+ it('Should succeed with the correct params', async function () {
+ await removeVideoFromBlacklist(servers[0].url, servers[0].accessToken, servers[0].video.uuid, HttpStatusCode.NO_CONTENT_204)
})
})
const basePath = '/api/v1/videos/blacklist/'
it('Should fail with a non authenticated user', async function () {
- const path = basePath
-
- await request(server.url)
- .get(path)
- .query({ sort: 'createdAt' })
- .set('Accept', 'application/json')
- .set('Authorization', 'Bearer ' + 'fake token')
- .expect(401)
+ await getBlacklistedVideosList({ url: servers[0].url, token: 'fake token', specialStatus: HttpStatusCode.UNAUTHORIZED_401 })
})
it('Should fail with a non admin user', async function () {
- const path = basePath
-
- await request(server.url)
- .get(path)
- .query({ sort: 'createdAt' })
- .set('Authorization', 'Bearer ' + userAccessToken)
- .set('Accept', 'application/json')
- .expect(403)
+ await getBlacklistedVideosList({ url: servers[0].url, token: userAccessToken2, specialStatus: HttpStatusCode.FORBIDDEN_403 })
})
it('Should fail with a bad start pagination', async function () {
- const path = basePath
-
- await request(server.url)
- .get(path)
- .query({ start: 'foobar' })
- .set('Accept', 'application/json')
- .set('Authorization', 'Bearer ' + server.accessToken)
- .expect(400)
+ await checkBadStartPagination(servers[0].url, basePath, servers[0].accessToken)
})
it('Should fail with a bad count pagination', async function () {
- const path = basePath
-
- await request(server.url)
- .get(path)
- .query({ count: 'foobar' })
- .set('Accept', 'application/json')
- .set('Authorization', 'Bearer ' + server.accessToken)
- .expect(400)
+ await checkBadCountPagination(servers[0].url, basePath, servers[0].accessToken)
})
it('Should fail with an incorrect sort', async function () {
- const path = basePath
+ await checkBadSortPagination(servers[0].url, basePath, servers[0].accessToken)
+ })
- await request(server.url)
- .get(path)
- .query({ sort: 'foobar' })
- .set('Accept', 'application/json')
- .set('Authorization', 'Bearer ' + server.accessToken)
- .expect(400)
+ it('Should fail with an invalid type', async function () {
+ await getBlacklistedVideosList({
+ url: servers[0].url,
+ token: servers[0].accessToken,
+ type: 0,
+ specialStatus: HttpStatusCode.BAD_REQUEST_400
+ })
+ })
+
+ it('Should succeed with the correct parameters', async function () {
+ await getBlacklistedVideosList({ url: servers[0].url, token: servers[0].accessToken, type: VideoBlacklistType.MANUAL })
})
})
after(async function () {
- killallServers([ server ])
-
- // Keep the logs if the test failed
- if (this['ok']) {
- await flushTests()
- }
+ await cleanupTests(servers)
})
})