X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=server%2Ftests%2Fapi%2Fcheck-params%2Fvideo-abuses.ts;h=bf29f8d4d9126369d1b6521716932419cffec828;hb=00aab0666c6f772548c160fdfa871a8843b88f37;hp=68e2ce7860bb9bb7588b16856927b3b832c2951d;hpb=11ba2ab3f1e3ec29b3765fa0c1ff4ed410c851a9;p=github%2FChocobozzz%2FPeerTube.git diff --git a/server/tests/api/check-params/video-abuses.ts b/server/tests/api/check-params/video-abuses.ts index 68e2ce786..bf29f8d4d 100644 --- a/server/tests/api/check-params/video-abuses.ts +++ b/server/tests/api/check-params/video-abuses.ts @@ -3,29 +3,42 @@ import 'mocha' import { - createUser, flushTests, killallServers, makeGetRequest, makePostBodyRequest, runServer, ServerInfo, setAccessTokensToServers, - uploadVideo, userLogin -} from '../../utils' -import { checkBadCountPagination, checkBadSortPagination, checkBadStartPagination } from '../../utils/requests/check-api-params' + cleanupTests, + createUser, + deleteVideoAbuse, + flushAndRunServer, + makeGetRequest, + makePostBodyRequest, + ServerInfo, + setAccessTokensToServers, + updateVideoAbuse, + uploadVideo, + userLogin +} from '../../../../shared/extra-utils' +import { + checkBadCountPagination, + checkBadSortPagination, + checkBadStartPagination +} from '../../../../shared/extra-utils/requests/check-api-params' +import { VideoAbuseState } from '../../../../shared/models/videos' describe('Test video abuses API validators', function () { let server: ServerInfo let userAccessToken = '' + let videoAbuseId: number // --------------------------------------------------------------- before(async function () { - this.timeout(20000) - - await flushTests() + this.timeout(30000) - server = await runServer(1) + server = await flushAndRunServer(1) await setAccessTokensToServers([ server ]) const username = 'user1' const password = 'my super password' - await createUser(server.url, server.accessToken, username, password) + await createUser({ url: server.url, accessToken: server.accessToken, username: username, password: password }) userAccessToken = await userLogin(server, { username, password }) const res = await uploadVideo(server.url, server.accessToken, {}) @@ -67,52 +80,114 @@ describe('Test video abuses API validators', function () { describe('When reporting a video abuse', function () { const basePath = '/api/v1/videos/' + let path: string + + before(() => { + path = basePath + server.video.id + '/abuse' + }) it('Should fail with nothing', async function () { - const path = basePath + server.video.id + '/abuse' const fields = {} await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields }) }) it('Should fail with a wrong video', async function () { const wrongPath = '/api/v1/videos/blabla/abuse' - const fields = { - reason: 'my super reason' - } + const fields = { reason: 'my super reason' } + await makePostBodyRequest({ url: server.url, path: wrongPath, token: server.accessToken, fields }) }) it('Should fail with a non authenticated user', async function () { - const path = basePath + server.video.id + '/abuse' - const fields = { - reason: 'my super reason' - } + const fields = { reason: 'my super reason' } + await makePostBodyRequest({ url: server.url, path, token: 'hello', fields, statusCodeExpected: 401 }) }) it('Should fail with a reason too short', async function () { - const path = basePath + server.video.id + '/abuse' - const fields = { - reason: 'h' - } + const fields = { reason: 'h' } + await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields }) }) - it('Should fail with a reason too big', async function () { - const path = basePath + server.video.id + '/abuse' - const fields = { - reason: 'super'.repeat(61) - } + it('Should fail with a too big reason', async function () { + const fields = { reason: 'super'.repeat(605) } + await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields }) }) + + it('Should succeed with the correct parameters', async function () { + const fields = { reason: 'super reason' } + + const res = await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields, statusCodeExpected: 200 }) + videoAbuseId = res.body.videoAbuse.id + }) }) - after(async function () { - killallServers([ server ]) + describe('When updating a video abuse', function () { + const basePath = '/api/v1/videos/' + let path: string + + before(() => { + path = basePath + server.video.id + '/abuse/' + videoAbuseId + }) + + it('Should fail with a non authenticated user', async function () { + await updateVideoAbuse(server.url, 'blabla', server.video.uuid, videoAbuseId, {}, 401) + }) + + it('Should fail with a non admin user', async function () { + await updateVideoAbuse(server.url, userAccessToken, server.video.uuid, videoAbuseId, {}, 403) + }) + + it('Should fail with a bad video id or bad video abuse id', async function () { + await updateVideoAbuse(server.url, server.accessToken, server.video.uuid, 45, {}, 404) + await updateVideoAbuse(server.url, server.accessToken, 52, videoAbuseId, {}, 404) + }) - // Keep the logs if the test failed - if (this['ok']) { - await flushTests() - } + it('Should fail with a bad state', async function () { + const body = { state: 5 } + await updateVideoAbuse(server.url, server.accessToken, server.video.uuid, videoAbuseId, body, 400) + }) + + it('Should fail with a bad moderation comment', async function () { + const body = { moderationComment: 'b'.repeat(3001) } + await updateVideoAbuse(server.url, server.accessToken, server.video.uuid, videoAbuseId, body, 400) + }) + + it('Should succeed with the correct params', async function () { + const body = { state: VideoAbuseState.ACCEPTED } + await updateVideoAbuse(server.url, server.accessToken, server.video.uuid, videoAbuseId, body) + }) + }) + + describe('When deleting a video abuse', function () { + const basePath = '/api/v1/videos/' + let path: string + + before(() => { + path = basePath + server.video.id + '/abuse/' + videoAbuseId + }) + + it('Should fail with a non authenticated user', async function () { + await deleteVideoAbuse(server.url, 'blabla', server.video.uuid, videoAbuseId, 401) + }) + + it('Should fail with a non admin user', async function () { + await deleteVideoAbuse(server.url, userAccessToken, server.video.uuid, videoAbuseId, 403) + }) + + it('Should fail with a bad video id or bad video abuse id', async function () { + await deleteVideoAbuse(server.url, server.accessToken, server.video.uuid, 45, 404) + await deleteVideoAbuse(server.url, server.accessToken, 52, videoAbuseId, 404) + }) + + it('Should succeed with the correct params', async function () { + await deleteVideoAbuse(server.url, server.accessToken, server.video.uuid, videoAbuseId) + }) + }) + + after(async function () { + await cleanupTests([ server ]) }) })