diff options
author | Chocobozzz <me@florianbigard.com> | 2020-11-10 14:41:20 +0100 |
---|---|---|
committer | Chocobozzz <me@florianbigard.com> | 2020-11-10 14:50:16 +0100 |
commit | 7a4ea932461f228ae44a173ddcd48ffb088aa023 (patch) | |
tree | 429b6fa7dae496d339a9f22e4076e39ffda97461 /server/tests/api | |
parent | 403c69c5a34e6db621f30c7b2bfb2b80dc8e74c1 (diff) | |
download | PeerTube-7a4ea932461f228ae44a173ddcd48ffb088aa023.tar.gz PeerTube-7a4ea932461f228ae44a173ddcd48ffb088aa023.tar.zst PeerTube-7a4ea932461f228ae44a173ddcd48ffb088aa023.zip |
Remove deprecated abuse api
Diffstat (limited to 'server/tests/api')
-rw-r--r-- | server/tests/api/check-params/index.ts | 1 | ||||
-rw-r--r-- | server/tests/api/check-params/video-abuses.ts | 216 | ||||
-rw-r--r-- | server/tests/api/moderation/index.ts | 1 | ||||
-rw-r--r-- | server/tests/api/moderation/video-abuse.ts | 386 |
4 files changed, 0 insertions, 604 deletions
diff --git a/server/tests/api/check-params/index.ts b/server/tests/api/check-params/index.ts index b5f0d07be..d0b0b9c21 100644 --- a/server/tests/api/check-params/index.ts +++ b/server/tests/api/check-params/index.ts | |||
@@ -16,7 +16,6 @@ import './services' | |||
16 | import './user-notifications' | 16 | import './user-notifications' |
17 | import './user-subscriptions' | 17 | import './user-subscriptions' |
18 | import './users' | 18 | import './users' |
19 | import './video-abuses' | ||
20 | import './video-blacklist' | 19 | import './video-blacklist' |
21 | import './video-captions' | 20 | import './video-captions' |
22 | import './video-channels' | 21 | import './video-channels' |
diff --git a/server/tests/api/check-params/video-abuses.ts b/server/tests/api/check-params/video-abuses.ts deleted file mode 100644 index 3b361ca79..000000000 --- a/server/tests/api/check-params/video-abuses.ts +++ /dev/null | |||
@@ -1,216 +0,0 @@ | |||
1 | /* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */ | ||
2 | |||
3 | import 'mocha' | ||
4 | import { AbuseState, VideoAbuseCreate } from '@shared/models' | ||
5 | import { | ||
6 | cleanupTests, | ||
7 | createUser, | ||
8 | deleteVideoAbuse, | ||
9 | flushAndRunServer, | ||
10 | makeGetRequest, | ||
11 | makePostBodyRequest, | ||
12 | ServerInfo, | ||
13 | setAccessTokensToServers, | ||
14 | updateVideoAbuse, | ||
15 | uploadVideo, | ||
16 | userLogin | ||
17 | } from '../../../../shared/extra-utils' | ||
18 | import { | ||
19 | checkBadCountPagination, | ||
20 | checkBadSortPagination, | ||
21 | checkBadStartPagination | ||
22 | } from '../../../../shared/extra-utils/requests/check-api-params' | ||
23 | |||
24 | // FIXME: deprecated in 2.3. Remove this controller | ||
25 | |||
26 | describe('Test video abuses API validators', function () { | ||
27 | let server: ServerInfo | ||
28 | let userAccessToken = '' | ||
29 | let videoAbuseId: number | ||
30 | |||
31 | // --------------------------------------------------------------- | ||
32 | |||
33 | before(async function () { | ||
34 | this.timeout(30000) | ||
35 | |||
36 | server = await flushAndRunServer(1) | ||
37 | |||
38 | await setAccessTokensToServers([ server ]) | ||
39 | |||
40 | const username = 'user1' | ||
41 | const password = 'my super password' | ||
42 | await createUser({ url: server.url, accessToken: server.accessToken, username: username, password: password }) | ||
43 | userAccessToken = await userLogin(server, { username, password }) | ||
44 | |||
45 | const res = await uploadVideo(server.url, server.accessToken, {}) | ||
46 | server.video = res.body.video | ||
47 | }) | ||
48 | |||
49 | describe('When listing video abuses', function () { | ||
50 | const path = '/api/v1/videos/abuse' | ||
51 | |||
52 | it('Should fail with a bad start pagination', async function () { | ||
53 | await checkBadStartPagination(server.url, path, server.accessToken) | ||
54 | }) | ||
55 | |||
56 | it('Should fail with a bad count pagination', async function () { | ||
57 | await checkBadCountPagination(server.url, path, server.accessToken) | ||
58 | }) | ||
59 | |||
60 | it('Should fail with an incorrect sort', async function () { | ||
61 | await checkBadSortPagination(server.url, path, server.accessToken) | ||
62 | }) | ||
63 | |||
64 | it('Should fail with a non authenticated user', async function () { | ||
65 | await makeGetRequest({ | ||
66 | url: server.url, | ||
67 | path, | ||
68 | statusCodeExpected: 401 | ||
69 | }) | ||
70 | }) | ||
71 | |||
72 | it('Should fail with a non admin user', async function () { | ||
73 | await makeGetRequest({ | ||
74 | url: server.url, | ||
75 | path, | ||
76 | token: userAccessToken, | ||
77 | statusCodeExpected: 403 | ||
78 | }) | ||
79 | }) | ||
80 | |||
81 | it('Should fail with a bad id filter', async function () { | ||
82 | await makeGetRequest({ url: server.url, path, token: server.accessToken, query: { id: 'toto' } }) | ||
83 | }) | ||
84 | |||
85 | it('Should fail with a bad state filter', async function () { | ||
86 | await makeGetRequest({ url: server.url, path, token: server.accessToken, query: { state: 'toto' } }) | ||
87 | }) | ||
88 | |||
89 | it('Should fail with a bad videoIs filter', async function () { | ||
90 | await makeGetRequest({ url: server.url, path, token: server.accessToken, query: { videoIs: 'toto' } }) | ||
91 | }) | ||
92 | |||
93 | it('Should succeed with the correct params', async function () { | ||
94 | await makeGetRequest({ url: server.url, path, token: server.accessToken, query: { id: 13 }, statusCodeExpected: 200 }) | ||
95 | }) | ||
96 | }) | ||
97 | |||
98 | describe('When reporting a video abuse', function () { | ||
99 | const basePath = '/api/v1/videos/' | ||
100 | let path: string | ||
101 | |||
102 | before(() => { | ||
103 | path = basePath + server.video.id + '/abuse' | ||
104 | }) | ||
105 | |||
106 | it('Should fail with nothing', async function () { | ||
107 | const fields = {} | ||
108 | await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields }) | ||
109 | }) | ||
110 | |||
111 | it('Should fail with a wrong video', async function () { | ||
112 | const wrongPath = '/api/v1/videos/blabla/abuse' | ||
113 | const fields = { reason: 'my super reason' } | ||
114 | |||
115 | await makePostBodyRequest({ url: server.url, path: wrongPath, token: server.accessToken, fields }) | ||
116 | }) | ||
117 | |||
118 | it('Should fail with a non authenticated user', async function () { | ||
119 | const fields = { reason: 'my super reason' } | ||
120 | |||
121 | await makePostBodyRequest({ url: server.url, path, token: 'hello', fields, statusCodeExpected: 401 }) | ||
122 | }) | ||
123 | |||
124 | it('Should fail with a reason too short', async function () { | ||
125 | const fields = { reason: 'h' } | ||
126 | |||
127 | await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields }) | ||
128 | }) | ||
129 | |||
130 | it('Should fail with a too big reason', async function () { | ||
131 | const fields = { reason: 'super'.repeat(605) } | ||
132 | |||
133 | await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields }) | ||
134 | }) | ||
135 | |||
136 | it('Should succeed with the correct parameters (basic)', async function () { | ||
137 | const fields = { reason: 'my super reason' } | ||
138 | |||
139 | const res = await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields, statusCodeExpected: 200 }) | ||
140 | videoAbuseId = res.body.abuse.id | ||
141 | }) | ||
142 | |||
143 | it('Should fail with a wrong predefined reason', async function () { | ||
144 | const fields = { reason: 'my super reason', predefinedReasons: [ 'wrongPredefinedReason' ] } | ||
145 | |||
146 | await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields }) | ||
147 | }) | ||
148 | |||
149 | it('Should fail with negative timestamps', async function () { | ||
150 | const fields = { reason: 'my super reason', startAt: -1 } | ||
151 | |||
152 | await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields }) | ||
153 | }) | ||
154 | |||
155 | it('Should succeed with the corret parameters (advanced)', async function () { | ||
156 | const fields: VideoAbuseCreate = { reason: 'my super reason', predefinedReasons: [ 'serverRules' ], startAt: 1, endAt: 5 } | ||
157 | |||
158 | await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields, statusCodeExpected: 200 }) | ||
159 | }) | ||
160 | }) | ||
161 | |||
162 | describe('When updating a video abuse', function () { | ||
163 | |||
164 | it('Should fail with a non authenticated user', async function () { | ||
165 | await updateVideoAbuse(server.url, 'blabla', server.video.uuid, videoAbuseId, {}, 401) | ||
166 | }) | ||
167 | |||
168 | it('Should fail with a non admin user', async function () { | ||
169 | await updateVideoAbuse(server.url, userAccessToken, server.video.uuid, videoAbuseId, {}, 403) | ||
170 | }) | ||
171 | |||
172 | it('Should fail with a bad video id or bad video abuse id', async function () { | ||
173 | await updateVideoAbuse(server.url, server.accessToken, server.video.uuid, 45, {}, 404) | ||
174 | await updateVideoAbuse(server.url, server.accessToken, 52, videoAbuseId, {}, 404) | ||
175 | }) | ||
176 | |||
177 | it('Should fail with a bad state', async function () { | ||
178 | const body = { state: 5 } | ||
179 | await updateVideoAbuse(server.url, server.accessToken, server.video.uuid, videoAbuseId, body, 400) | ||
180 | }) | ||
181 | |||
182 | it('Should fail with a bad moderation comment', async function () { | ||
183 | const body = { moderationComment: 'b'.repeat(3001) } | ||
184 | await updateVideoAbuse(server.url, server.accessToken, server.video.uuid, videoAbuseId, body, 400) | ||
185 | }) | ||
186 | |||
187 | it('Should succeed with the correct params', async function () { | ||
188 | const body = { state: AbuseState.ACCEPTED } | ||
189 | await updateVideoAbuse(server.url, server.accessToken, server.video.uuid, videoAbuseId, body) | ||
190 | }) | ||
191 | }) | ||
192 | |||
193 | describe('When deleting a video abuse', function () { | ||
194 | |||
195 | it('Should fail with a non authenticated user', async function () { | ||
196 | await deleteVideoAbuse(server.url, 'blabla', server.video.uuid, videoAbuseId, 401) | ||
197 | }) | ||
198 | |||
199 | it('Should fail with a non admin user', async function () { | ||
200 | await deleteVideoAbuse(server.url, userAccessToken, server.video.uuid, videoAbuseId, 403) | ||
201 | }) | ||
202 | |||
203 | it('Should fail with a bad video id or bad video abuse id', async function () { | ||
204 | await deleteVideoAbuse(server.url, server.accessToken, server.video.uuid, 45, 404) | ||
205 | await deleteVideoAbuse(server.url, server.accessToken, 52, videoAbuseId, 404) | ||
206 | }) | ||
207 | |||
208 | it('Should succeed with the correct params', async function () { | ||
209 | await deleteVideoAbuse(server.url, server.accessToken, server.video.uuid, videoAbuseId) | ||
210 | }) | ||
211 | }) | ||
212 | |||
213 | after(async function () { | ||
214 | await cleanupTests([ server ]) | ||
215 | }) | ||
216 | }) | ||
diff --git a/server/tests/api/moderation/index.ts b/server/tests/api/moderation/index.ts index ceb223003..6593c001f 100644 --- a/server/tests/api/moderation/index.ts +++ b/server/tests/api/moderation/index.ts | |||
@@ -1,4 +1,3 @@ | |||
1 | export * from './abuses' | 1 | export * from './abuses' |
2 | export * from './blocklist' | 2 | export * from './blocklist' |
3 | export * from './video-abuse' | ||
4 | export * from './video-blacklist' | 3 | export * from './video-blacklist' |
diff --git a/server/tests/api/moderation/video-abuse.ts b/server/tests/api/moderation/video-abuse.ts deleted file mode 100644 index 0b6a0e8ae..000000000 --- a/server/tests/api/moderation/video-abuse.ts +++ /dev/null | |||
@@ -1,386 +0,0 @@ | |||
1 | /* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */ | ||
2 | |||
3 | import 'mocha' | ||
4 | import * as chai from 'chai' | ||
5 | import { AbusePredefinedReasonsString, AbuseState, AdminAbuse } from '@shared/models' | ||
6 | import { | ||
7 | cleanupTests, | ||
8 | createUser, | ||
9 | deleteVideoAbuse, | ||
10 | flushAndRunMultipleServers, | ||
11 | getVideoAbusesList, | ||
12 | getVideosList, | ||
13 | removeVideo, | ||
14 | reportVideoAbuse, | ||
15 | ServerInfo, | ||
16 | setAccessTokensToServers, | ||
17 | updateVideoAbuse, | ||
18 | uploadVideo, | ||
19 | userLogin | ||
20 | } from '../../../../shared/extra-utils/index' | ||
21 | import { doubleFollow } from '../../../../shared/extra-utils/server/follows' | ||
22 | import { waitJobs } from '../../../../shared/extra-utils/server/jobs' | ||
23 | import { | ||
24 | addAccountToServerBlocklist, | ||
25 | addServerToServerBlocklist, | ||
26 | removeAccountFromServerBlocklist, | ||
27 | removeServerFromServerBlocklist | ||
28 | } from '../../../../shared/extra-utils/users/blocklist' | ||
29 | |||
30 | const expect = chai.expect | ||
31 | |||
32 | // FIXME: deprecated in 2.3. Remove this controller | ||
33 | |||
34 | describe('Test video abuses', function () { | ||
35 | let servers: ServerInfo[] = [] | ||
36 | let abuseServer2: AdminAbuse | ||
37 | |||
38 | before(async function () { | ||
39 | this.timeout(50000) | ||
40 | |||
41 | // Run servers | ||
42 | servers = await flushAndRunMultipleServers(2) | ||
43 | |||
44 | // Get the access tokens | ||
45 | await setAccessTokensToServers(servers) | ||
46 | |||
47 | // Server 1 and server 2 follow each other | ||
48 | await doubleFollow(servers[0], servers[1]) | ||
49 | |||
50 | // Upload some videos on each servers | ||
51 | const video1Attributes = { | ||
52 | name: 'my super name for server 1', | ||
53 | description: 'my super description for server 1' | ||
54 | } | ||
55 | await uploadVideo(servers[0].url, servers[0].accessToken, video1Attributes) | ||
56 | |||
57 | const video2Attributes = { | ||
58 | name: 'my super name for server 2', | ||
59 | description: 'my super description for server 2' | ||
60 | } | ||
61 | await uploadVideo(servers[1].url, servers[1].accessToken, video2Attributes) | ||
62 | |||
63 | // Wait videos propagation, server 2 has transcoding enabled | ||
64 | await waitJobs(servers) | ||
65 | |||
66 | const res = await getVideosList(servers[0].url) | ||
67 | const videos = res.body.data | ||
68 | |||
69 | expect(videos.length).to.equal(2) | ||
70 | |||
71 | servers[0].video = videos.find(video => video.name === 'my super name for server 1') | ||
72 | servers[1].video = videos.find(video => video.name === 'my super name for server 2') | ||
73 | }) | ||
74 | |||
75 | it('Should not have video abuses', async function () { | ||
76 | const res = await getVideoAbusesList({ url: servers[0].url, token: servers[0].accessToken }) | ||
77 | |||
78 | expect(res.body.total).to.equal(0) | ||
79 | expect(res.body.data).to.be.an('array') | ||
80 | expect(res.body.data.length).to.equal(0) | ||
81 | }) | ||
82 | |||
83 | it('Should report abuse on a local video', async function () { | ||
84 | this.timeout(15000) | ||
85 | |||
86 | const reason = 'my super bad reason' | ||
87 | await reportVideoAbuse(servers[0].url, servers[0].accessToken, servers[0].video.id, reason) | ||
88 | |||
89 | // We wait requests propagation, even if the server 1 is not supposed to make a request to server 2 | ||
90 | await waitJobs(servers) | ||
91 | }) | ||
92 | |||
93 | it('Should have 1 video abuses on server 1 and 0 on server 2', async function () { | ||
94 | const res1 = await getVideoAbusesList({ url: servers[0].url, token: servers[0].accessToken }) | ||
95 | |||
96 | expect(res1.body.total).to.equal(1) | ||
97 | expect(res1.body.data).to.be.an('array') | ||
98 | expect(res1.body.data.length).to.equal(1) | ||
99 | |||
100 | const abuse: AdminAbuse = res1.body.data[0] | ||
101 | expect(abuse.reason).to.equal('my super bad reason') | ||
102 | expect(abuse.reporterAccount.name).to.equal('root') | ||
103 | expect(abuse.reporterAccount.host).to.equal('localhost:' + servers[0].port) | ||
104 | expect(abuse.video.id).to.equal(servers[0].video.id) | ||
105 | expect(abuse.video.channel).to.exist | ||
106 | expect(abuse.video.countReports).to.equal(1) | ||
107 | expect(abuse.video.nthReport).to.equal(1) | ||
108 | expect(abuse.countReportsForReporter).to.equal(1) | ||
109 | expect(abuse.countReportsForReportee).to.equal(1) | ||
110 | |||
111 | const res2 = await getVideoAbusesList({ url: servers[1].url, token: servers[1].accessToken }) | ||
112 | expect(res2.body.total).to.equal(0) | ||
113 | expect(res2.body.data).to.be.an('array') | ||
114 | expect(res2.body.data.length).to.equal(0) | ||
115 | }) | ||
116 | |||
117 | it('Should report abuse on a remote video', async function () { | ||
118 | this.timeout(10000) | ||
119 | |||
120 | const reason = 'my super bad reason 2' | ||
121 | await reportVideoAbuse(servers[0].url, servers[0].accessToken, servers[1].video.id, reason) | ||
122 | |||
123 | // We wait requests propagation | ||
124 | await waitJobs(servers) | ||
125 | }) | ||
126 | |||
127 | it('Should have 2 video abuses on server 1 and 1 on server 2', async function () { | ||
128 | const res1 = await getVideoAbusesList({ url: servers[0].url, token: servers[0].accessToken }) | ||
129 | expect(res1.body.total).to.equal(2) | ||
130 | expect(res1.body.data).to.be.an('array') | ||
131 | expect(res1.body.data.length).to.equal(2) | ||
132 | |||
133 | const abuse1: AdminAbuse = res1.body.data[0] | ||
134 | expect(abuse1.reason).to.equal('my super bad reason') | ||
135 | expect(abuse1.reporterAccount.name).to.equal('root') | ||
136 | expect(abuse1.reporterAccount.host).to.equal('localhost:' + servers[0].port) | ||
137 | expect(abuse1.video.id).to.equal(servers[0].video.id) | ||
138 | expect(abuse1.state.id).to.equal(AbuseState.PENDING) | ||
139 | expect(abuse1.state.label).to.equal('Pending') | ||
140 | expect(abuse1.moderationComment).to.be.null | ||
141 | expect(abuse1.video.countReports).to.equal(1) | ||
142 | expect(abuse1.video.nthReport).to.equal(1) | ||
143 | |||
144 | const abuse2: AdminAbuse = res1.body.data[1] | ||
145 | expect(abuse2.reason).to.equal('my super bad reason 2') | ||
146 | expect(abuse2.reporterAccount.name).to.equal('root') | ||
147 | expect(abuse2.reporterAccount.host).to.equal('localhost:' + servers[0].port) | ||
148 | expect(abuse2.video.id).to.equal(servers[1].video.id) | ||
149 | expect(abuse2.state.id).to.equal(AbuseState.PENDING) | ||
150 | expect(abuse2.state.label).to.equal('Pending') | ||
151 | expect(abuse2.moderationComment).to.be.null | ||
152 | |||
153 | const res2 = await getVideoAbusesList({ url: servers[1].url, token: servers[1].accessToken }) | ||
154 | expect(res2.body.total).to.equal(1) | ||
155 | expect(res2.body.data).to.be.an('array') | ||
156 | expect(res2.body.data.length).to.equal(1) | ||
157 | |||
158 | abuseServer2 = res2.body.data[0] | ||
159 | expect(abuseServer2.reason).to.equal('my super bad reason 2') | ||
160 | expect(abuseServer2.reporterAccount.name).to.equal('root') | ||
161 | expect(abuseServer2.reporterAccount.host).to.equal('localhost:' + servers[0].port) | ||
162 | expect(abuseServer2.state.id).to.equal(AbuseState.PENDING) | ||
163 | expect(abuseServer2.state.label).to.equal('Pending') | ||
164 | expect(abuseServer2.moderationComment).to.be.null | ||
165 | }) | ||
166 | |||
167 | it('Should update the state of a video abuse', async function () { | ||
168 | const body = { state: AbuseState.REJECTED } | ||
169 | await updateVideoAbuse(servers[1].url, servers[1].accessToken, abuseServer2.video.uuid, abuseServer2.id, body) | ||
170 | |||
171 | const res = await getVideoAbusesList({ url: servers[1].url, token: servers[1].accessToken }) | ||
172 | expect(res.body.data[0].state.id).to.equal(AbuseState.REJECTED) | ||
173 | }) | ||
174 | |||
175 | it('Should add a moderation comment', async function () { | ||
176 | const body = { state: AbuseState.ACCEPTED, moderationComment: 'It is valid' } | ||
177 | await updateVideoAbuse(servers[1].url, servers[1].accessToken, abuseServer2.video.uuid, abuseServer2.id, body) | ||
178 | |||
179 | const res = await getVideoAbusesList({ url: servers[1].url, token: servers[1].accessToken }) | ||
180 | expect(res.body.data[0].state.id).to.equal(AbuseState.ACCEPTED) | ||
181 | expect(res.body.data[0].moderationComment).to.equal('It is valid') | ||
182 | }) | ||
183 | |||
184 | it('Should hide video abuses from blocked accounts', async function () { | ||
185 | this.timeout(10000) | ||
186 | |||
187 | { | ||
188 | await reportVideoAbuse(servers[1].url, servers[1].accessToken, servers[0].video.uuid, 'will mute this') | ||
189 | await waitJobs(servers) | ||
190 | |||
191 | const res = await getVideoAbusesList({ url: servers[0].url, token: servers[0].accessToken }) | ||
192 | expect(res.body.total).to.equal(3) | ||
193 | } | ||
194 | |||
195 | const accountToBlock = 'root@localhost:' + servers[1].port | ||
196 | |||
197 | { | ||
198 | await addAccountToServerBlocklist(servers[0].url, servers[0].accessToken, accountToBlock) | ||
199 | |||
200 | const res = await getVideoAbusesList({ url: servers[0].url, token: servers[0].accessToken }) | ||
201 | expect(res.body.total).to.equal(2) | ||
202 | |||
203 | const abuse = res.body.data.find(a => a.reason === 'will mute this') | ||
204 | expect(abuse).to.be.undefined | ||
205 | } | ||
206 | |||
207 | { | ||
208 | await removeAccountFromServerBlocklist(servers[0].url, servers[0].accessToken, accountToBlock) | ||
209 | |||
210 | const res = await getVideoAbusesList({ url: servers[0].url, token: servers[0].accessToken }) | ||
211 | expect(res.body.total).to.equal(3) | ||
212 | } | ||
213 | }) | ||
214 | |||
215 | it('Should hide video abuses from blocked servers', async function () { | ||
216 | const serverToBlock = servers[1].host | ||
217 | |||
218 | { | ||
219 | await addServerToServerBlocklist(servers[0].url, servers[0].accessToken, servers[1].host) | ||
220 | |||
221 | const res = await getVideoAbusesList({ url: servers[0].url, token: servers[0].accessToken }) | ||
222 | expect(res.body.total).to.equal(2) | ||
223 | |||
224 | const abuse = res.body.data.find(a => a.reason === 'will mute this') | ||
225 | expect(abuse).to.be.undefined | ||
226 | } | ||
227 | |||
228 | { | ||
229 | await removeServerFromServerBlocklist(servers[0].url, servers[0].accessToken, serverToBlock) | ||
230 | |||
231 | const res = await getVideoAbusesList({ url: servers[0].url, token: servers[0].accessToken }) | ||
232 | expect(res.body.total).to.equal(3) | ||
233 | } | ||
234 | }) | ||
235 | |||
236 | it('Should keep the video abuse when deleting the video', async function () { | ||
237 | this.timeout(10000) | ||
238 | |||
239 | await removeVideo(servers[1].url, servers[1].accessToken, abuseServer2.video.uuid) | ||
240 | |||
241 | await waitJobs(servers) | ||
242 | |||
243 | const res = await getVideoAbusesList({ url: servers[1].url, token: servers[1].accessToken }) | ||
244 | expect(res.body.total).to.equal(2, "wrong number of videos returned") | ||
245 | expect(res.body.data.length).to.equal(2, "wrong number of videos returned") | ||
246 | expect(res.body.data[0].id).to.equal(abuseServer2.id, "wrong origin server id for first video") | ||
247 | |||
248 | const abuse: AdminAbuse = res.body.data[0] | ||
249 | expect(abuse.video.id).to.equal(abuseServer2.video.id, "wrong video id") | ||
250 | expect(abuse.video.channel).to.exist | ||
251 | expect(abuse.video.deleted).to.be.true | ||
252 | }) | ||
253 | |||
254 | it('Should include counts of reports from reporter and reportee', async function () { | ||
255 | this.timeout(10000) | ||
256 | |||
257 | // register a second user to have two reporters/reportees | ||
258 | const user = { username: 'user2', password: 'password' } | ||
259 | await createUser({ url: servers[0].url, accessToken: servers[0].accessToken, ...user }) | ||
260 | const userAccessToken = await userLogin(servers[0], user) | ||
261 | |||
262 | // upload a third video via this user | ||
263 | const video3Attributes = { | ||
264 | name: 'my second super name for server 1', | ||
265 | description: 'my second super description for server 1' | ||
266 | } | ||
267 | await uploadVideo(servers[0].url, userAccessToken, video3Attributes) | ||
268 | |||
269 | const res1 = await getVideosList(servers[0].url) | ||
270 | const videos = res1.body.data | ||
271 | const video3 = videos.find(video => video.name === 'my second super name for server 1') | ||
272 | |||
273 | // resume with the test | ||
274 | const reason3 = 'my super bad reason 3' | ||
275 | await reportVideoAbuse(servers[0].url, servers[0].accessToken, video3.id, reason3) | ||
276 | const reason4 = 'my super bad reason 4' | ||
277 | await reportVideoAbuse(servers[0].url, userAccessToken, servers[0].video.id, reason4) | ||
278 | |||
279 | const res2 = await getVideoAbusesList({ url: servers[0].url, token: servers[0].accessToken }) | ||
280 | |||
281 | { | ||
282 | for (const abuse of res2.body.data as AdminAbuse[]) { | ||
283 | if (abuse.video.id === video3.id) { | ||
284 | expect(abuse.video.countReports).to.equal(1, "wrong reports count for video 3") | ||
285 | expect(abuse.video.nthReport).to.equal(1, "wrong report position in report list for video 3") | ||
286 | expect(abuse.countReportsForReportee).to.equal(1, "wrong reports count for reporter on video 3 abuse") | ||
287 | expect(abuse.countReportsForReporter).to.equal(3, "wrong reports count for reportee on video 3 abuse") | ||
288 | } | ||
289 | if (abuse.video.id === servers[0].video.id) { | ||
290 | expect(abuse.countReportsForReportee).to.equal(3, "wrong reports count for reporter on video 1 abuse") | ||
291 | } | ||
292 | } | ||
293 | } | ||
294 | }) | ||
295 | |||
296 | it('Should list predefined reasons as well as timestamps for the reported video', async function () { | ||
297 | this.timeout(10000) | ||
298 | |||
299 | const reason5 = 'my super bad reason 5' | ||
300 | const predefinedReasons5: AbusePredefinedReasonsString[] = [ 'violentOrRepulsive', 'captions' ] | ||
301 | const createdAbuse = (await reportVideoAbuse( | ||
302 | servers[0].url, | ||
303 | servers[0].accessToken, | ||
304 | servers[0].video.id, | ||
305 | reason5, | ||
306 | predefinedReasons5, | ||
307 | 1, | ||
308 | 5 | ||
309 | )).body.abuse | ||
310 | |||
311 | const res = await getVideoAbusesList({ url: servers[0].url, token: servers[0].accessToken }) | ||
312 | |||
313 | { | ||
314 | const abuse = (res.body.data as AdminAbuse[]).find(a => a.id === createdAbuse.id) | ||
315 | expect(abuse.reason).to.equals(reason5) | ||
316 | expect(abuse.predefinedReasons).to.deep.equals(predefinedReasons5, "predefined reasons do not match the one reported") | ||
317 | expect(abuse.video.startAt).to.equal(1, "starting timestamp doesn't match the one reported") | ||
318 | expect(abuse.video.endAt).to.equal(5, "ending timestamp doesn't match the one reported") | ||
319 | } | ||
320 | }) | ||
321 | |||
322 | it('Should delete the video abuse', async function () { | ||
323 | this.timeout(10000) | ||
324 | |||
325 | await deleteVideoAbuse(servers[1].url, servers[1].accessToken, abuseServer2.video.uuid, abuseServer2.id) | ||
326 | |||
327 | await waitJobs(servers) | ||
328 | |||
329 | { | ||
330 | const res = await getVideoAbusesList({ url: servers[1].url, token: servers[1].accessToken }) | ||
331 | expect(res.body.total).to.equal(1) | ||
332 | expect(res.body.data.length).to.equal(1) | ||
333 | expect(res.body.data[0].id).to.not.equal(abuseServer2.id) | ||
334 | } | ||
335 | |||
336 | { | ||
337 | const res = await getVideoAbusesList({ url: servers[0].url, token: servers[0].accessToken }) | ||
338 | expect(res.body.total).to.equal(6) | ||
339 | } | ||
340 | }) | ||
341 | |||
342 | it('Should list and filter video abuses', async function () { | ||
343 | async function list (query: Omit<Parameters<typeof getVideoAbusesList>[0], 'url' | 'token'>) { | ||
344 | const options = { | ||
345 | url: servers[0].url, | ||
346 | token: servers[0].accessToken | ||
347 | } | ||
348 | |||
349 | Object.assign(options, query) | ||
350 | |||
351 | const res = await getVideoAbusesList(options) | ||
352 | |||
353 | return res.body.data as AdminAbuse[] | ||
354 | } | ||
355 | |||
356 | expect(await list({ id: 56 })).to.have.lengthOf(0) | ||
357 | expect(await list({ id: 1 })).to.have.lengthOf(1) | ||
358 | |||
359 | expect(await list({ search: 'my super name for server 1' })).to.have.lengthOf(4) | ||
360 | expect(await list({ search: 'aaaaaaaaaaaaaaaaaaaaaaaaaa' })).to.have.lengthOf(0) | ||
361 | |||
362 | expect(await list({ searchVideo: 'my second super name for server 1' })).to.have.lengthOf(1) | ||
363 | |||
364 | expect(await list({ searchVideoChannel: 'root' })).to.have.lengthOf(4) | ||
365 | expect(await list({ searchVideoChannel: 'aaaa' })).to.have.lengthOf(0) | ||
366 | |||
367 | expect(await list({ searchReporter: 'user2' })).to.have.lengthOf(1) | ||
368 | expect(await list({ searchReporter: 'root' })).to.have.lengthOf(5) | ||
369 | |||
370 | expect(await list({ searchReportee: 'root' })).to.have.lengthOf(5) | ||
371 | expect(await list({ searchReportee: 'aaaa' })).to.have.lengthOf(0) | ||
372 | |||
373 | expect(await list({ videoIs: 'deleted' })).to.have.lengthOf(1) | ||
374 | expect(await list({ videoIs: 'blacklisted' })).to.have.lengthOf(0) | ||
375 | |||
376 | expect(await list({ state: AbuseState.ACCEPTED })).to.have.lengthOf(0) | ||
377 | expect(await list({ state: AbuseState.PENDING })).to.have.lengthOf(6) | ||
378 | |||
379 | expect(await list({ predefinedReason: 'violentOrRepulsive' })).to.have.lengthOf(1) | ||
380 | expect(await list({ predefinedReason: 'serverRules' })).to.have.lengthOf(0) | ||
381 | }) | ||
382 | |||
383 | after(async function () { | ||
384 | await cleanupTests(servers) | ||
385 | }) | ||
386 | }) | ||