X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=server%2Ftests%2Fapi%2Fcheck-params%2Ffollows.ts;h=3c911dcee820341ae4ea990de465be7558a8eb97;hb=c5c95361e6adca439ae316066366e520797f9ec0;hp=6121d22022c251f35595a08a6726eb402ace63bb;hpb=bf54587a3e2ad9c2c186828f2a5682b91ee2cc00;p=github%2FChocobozzz%2FPeerTube.git diff --git a/server/tests/api/check-params/follows.ts b/server/tests/api/check-params/follows.ts index 6121d2202..3c911dcee 100644 --- a/server/tests/api/check-params/follows.ts +++ b/server/tests/api/check-params/follows.ts @@ -1,10 +1,8 @@ /* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */ -import 'mocha' +import { checkBadCountPagination, checkBadSortPagination, checkBadStartPagination } from '@server/tests/shared' +import { HttpStatusCode } from '@shared/models' import { - checkBadCountPagination, - checkBadSortPagination, - checkBadStartPagination, cleanupTests, createSingleServer, makeDeleteRequest, @@ -13,7 +11,6 @@ import { PeerTubeServer, setAccessTokensToServers } from '@shared/server-commands' -import { HttpStatusCode } from '@shared/models' describe('Test server follows API validators', function () { let server: PeerTubeServer @@ -51,7 +48,7 @@ describe('Test server follows API validators', function () { await makePostBodyRequest({ url: server.url, path, - fields: { hosts: [ 'localhost:9002', 'localhost:coucou' ] }, + fields: { hosts: [ '127.0.0.1:9002', '127.0.0.1:coucou' ] }, token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) @@ -61,7 +58,7 @@ describe('Test server follows API validators', function () { await makePostBodyRequest({ url: server.url, path, - fields: { hosts: [ 'localhost:9002', 'http://localhost:9003' ] }, + fields: { hosts: [ '127.0.0.1:9002', 'http://127.0.0.1:9003' ] }, token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) @@ -71,7 +68,7 @@ describe('Test server follows API validators', function () { await makePostBodyRequest({ url: server.url, path, - fields: { urls: [ 'localhost:9002', 'localhost:9002' ] }, + fields: { urls: [ '127.0.0.1:9002', '127.0.0.1:9002' ] }, token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) @@ -81,7 +78,7 @@ describe('Test server follows API validators', function () { await makePostBodyRequest({ url: server.url, path, - fields: { handles: [ 'hello@example.com', 'localhost:9001' ] }, + fields: { handles: [ 'hello@example.com', '127.0.0.1:9001' ] }, token: server.accessToken, expectedStatus: HttpStatusCode.BAD_REQUEST_400 }) @@ -101,7 +98,7 @@ describe('Test server follows API validators', function () { await makePostBodyRequest({ url: server.url, path, - fields: { hosts: [ 'localhost:9002' ] }, + fields: { hosts: [ '127.0.0.1:9002' ] }, token: 'fake_token', expectedStatus: HttpStatusCode.UNAUTHORIZED_401 }) @@ -111,7 +108,7 @@ describe('Test server follows API validators', function () { await makePostBodyRequest({ url: server.url, path, - fields: { hosts: [ 'localhost:9002' ] }, + fields: { hosts: [ '127.0.0.1:9002' ] }, token: userAccessToken, expectedStatus: HttpStatusCode.FORBIDDEN_403 }) @@ -220,7 +217,7 @@ describe('Test server follows API validators', function () { it('Should fail with an invalid token', async function () { await makeDeleteRequest({ url: server.url, - path: path + '/toto@localhost:9002', + path: path + '/toto@127.0.0.1:9002', token: 'fake_token', expectedStatus: HttpStatusCode.UNAUTHORIZED_401 }) @@ -229,7 +226,7 @@ describe('Test server follows API validators', function () { it('Should fail if the user is not an administrator', async function () { await makeDeleteRequest({ url: server.url, - path: path + '/toto@localhost:9002', + path: path + '/toto@127.0.0.1:9002', token: userAccessToken, expectedStatus: HttpStatusCode.FORBIDDEN_403 }) @@ -247,7 +244,7 @@ describe('Test server follows API validators', function () { it('Should fail with an unknown follower', async function () { await makeDeleteRequest({ url: server.url, - path: path + '/toto@localhost:9003', + path: path + '/toto@127.0.0.1:9003', token: server.accessToken, expectedStatus: HttpStatusCode.NOT_FOUND_404 }) @@ -260,7 +257,7 @@ describe('Test server follows API validators', function () { it('Should fail with an invalid token', async function () { await makePostBodyRequest({ url: server.url, - path: path + '/toto@localhost:9002/accept', + path: path + '/toto@127.0.0.1:9002/accept', token: 'fake_token', expectedStatus: HttpStatusCode.UNAUTHORIZED_401 }) @@ -269,7 +266,7 @@ describe('Test server follows API validators', function () { it('Should fail if the user is not an administrator', async function () { await makePostBodyRequest({ url: server.url, - path: path + '/toto@localhost:9002/accept', + path: path + '/toto@127.0.0.1:9002/accept', token: userAccessToken, expectedStatus: HttpStatusCode.FORBIDDEN_403 }) @@ -287,7 +284,7 @@ describe('Test server follows API validators', function () { it('Should fail with an unknown follower', async function () { await makePostBodyRequest({ url: server.url, - path: path + '/toto@localhost:9003/accept', + path: path + '/toto@127.0.0.1:9003/accept', token: server.accessToken, expectedStatus: HttpStatusCode.NOT_FOUND_404 }) @@ -300,7 +297,7 @@ describe('Test server follows API validators', function () { it('Should fail with an invalid token', async function () { await makePostBodyRequest({ url: server.url, - path: path + '/toto@localhost:9002/reject', + path: path + '/toto@127.0.0.1:9002/reject', token: 'fake_token', expectedStatus: HttpStatusCode.UNAUTHORIZED_401 }) @@ -309,7 +306,7 @@ describe('Test server follows API validators', function () { it('Should fail if the user is not an administrator', async function () { await makePostBodyRequest({ url: server.url, - path: path + '/toto@localhost:9002/reject', + path: path + '/toto@127.0.0.1:9002/reject', token: userAccessToken, expectedStatus: HttpStatusCode.FORBIDDEN_403 }) @@ -327,7 +324,7 @@ describe('Test server follows API validators', function () { it('Should fail with an unknown follower', async function () { await makePostBodyRequest({ url: server.url, - path: path + '/toto@localhost:9003/reject', + path: path + '/toto@127.0.0.1:9003/reject', token: server.accessToken, expectedStatus: HttpStatusCode.NOT_FOUND_404 }) @@ -340,7 +337,7 @@ describe('Test server follows API validators', function () { it('Should fail with an invalid token', async function () { await makeDeleteRequest({ url: server.url, - path: path + '/localhost:9002', + path: path + '/127.0.0.1:9002', token: 'fake_token', expectedStatus: HttpStatusCode.UNAUTHORIZED_401 }) @@ -349,7 +346,7 @@ describe('Test server follows API validators', function () { it('Should fail if the user is not an administrator', async function () { await makeDeleteRequest({ url: server.url, - path: path + '/localhost:9002', + path: path + '/127.0.0.1:9002', token: userAccessToken, expectedStatus: HttpStatusCode.FORBIDDEN_403 })