PeerTube/server/tests/api/check-params/follows.ts

370 lines
11 KiB
TypeScript
Raw Normal View History

2020-01-31 16:56:52 +01:00
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
2017-11-17 15:20:42 +01:00
import { checkBadCountPagination, checkBadSortPagination, checkBadStartPagination } from '@server/tests/shared'
import { HttpStatusCode } from '@shared/models'
2017-11-17 15:20:42 +01:00
import {
2019-04-24 15:10:37 +02:00
cleanupTests,
2021-07-16 09:47:51 +02:00
createSingleServer,
2021-07-16 10:42:24 +02:00
makeDeleteRequest,
makeGetRequest,
2019-04-24 15:10:37 +02:00
makePostBodyRequest,
2021-07-16 09:47:51 +02:00
PeerTubeServer,
2021-07-13 11:05:15 +02:00
setAccessTokensToServers
} from '@shared/server-commands'
2017-11-17 15:20:42 +01:00
describe('Test server follows API validators', function () {
2021-07-16 09:47:51 +02:00
let server: PeerTubeServer
2017-11-17 15:20:42 +01:00
// ---------------------------------------------------------------
before(async function () {
2018-01-18 18:10:45 +01:00
this.timeout(30000)
2017-11-17 15:20:42 +01:00
2021-07-16 09:47:51 +02:00
server = await createSingleServer(1)
2017-11-17 15:20:42 +01:00
await setAccessTokensToServers([ server ])
})
describe('When managing following', function () {
let userAccessToken = null
before(async function () {
userAccessToken = await server.users.generateUserAndToken('user1')
2017-11-17 15:20:42 +01:00
})
describe('When adding follows', function () {
const path = '/api/v1/server/following'
it('Should fail with nothing', async function () {
2017-12-28 14:29:57 +01:00
await makePostBodyRequest({
url: server.url,
path,
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2017-12-28 14:29:57 +01:00
})
2017-11-17 15:20:42 +01:00
})
it('Should fail if hosts is not composed by hosts', async function () {
2017-12-28 14:29:57 +01:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 11:14:47 +01:00
fields: { hosts: [ '127.0.0.1:9002', '127.0.0.1:coucou' ] },
2017-12-28 14:29:57 +01:00
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2017-12-28 14:29:57 +01:00
})
2017-11-17 15:20:42 +01:00
})
it('Should fail if hosts is composed with http schemes', async function () {
2017-12-28 14:29:57 +01:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 11:14:47 +01:00
fields: { hosts: [ '127.0.0.1:9002', 'http://127.0.0.1:9003' ] },
2017-12-28 14:29:57 +01:00
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2017-12-28 14:29:57 +01:00
})
2017-11-17 15:20:42 +01:00
})
it('Should fail if hosts are not unique', async function () {
2017-12-28 14:29:57 +01:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 11:14:47 +01:00
fields: { urls: [ '127.0.0.1:9002', '127.0.0.1:9002' ] },
2017-12-28 14:29:57 +01:00
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2017-12-28 14:29:57 +01:00
})
2017-11-17 15:20:42 +01:00
})
it('Should fail if handles is not composed by handles', async function () {
2017-12-28 14:29:57 +01:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 11:14:47 +01:00
fields: { handles: [ 'hello@example.com', '127.0.0.1:9001' ] },
token: server.accessToken,
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
})
it('Should fail if handles are not unique', async function () {
await makePostBodyRequest({
url: server.url,
path,
fields: { urls: [ 'hello@example.com', 'hello@example.com' ] },
2017-12-28 14:29:57 +01:00
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2017-12-28 14:29:57 +01:00
})
2017-11-17 15:20:42 +01:00
})
it('Should fail with an invalid token', async function () {
2017-12-28 14:29:57 +01:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 11:14:47 +01:00
fields: { hosts: [ '127.0.0.1:9002' ] },
2017-12-28 14:29:57 +01:00
token: 'fake_token',
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
2017-12-28 14:29:57 +01:00
})
2017-11-17 15:20:42 +01:00
})
it('Should fail if the user is not an administrator', async function () {
2017-12-28 14:29:57 +01:00
await makePostBodyRequest({
url: server.url,
path,
2022-12-09 11:14:47 +01:00
fields: { hosts: [ '127.0.0.1:9002' ] },
2017-12-28 14:29:57 +01:00
token: userAccessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
2017-12-28 14:29:57 +01:00
})
2017-11-17 15:20:42 +01:00
})
})
describe('When listing followings', function () {
const path = '/api/v1/server/following'
it('Should fail with a bad start pagination', async function () {
2017-12-28 14:29:57 +01:00
await checkBadStartPagination(server.url, path)
2017-11-17 15:20:42 +01:00
})
it('Should fail with a bad count pagination', async function () {
2017-12-28 14:29:57 +01:00
await checkBadCountPagination(server.url, path)
2017-11-17 15:20:42 +01:00
})
it('Should fail with an incorrect sort', async function () {
2017-12-28 14:29:57 +01:00
await checkBadSortPagination(server.url, path)
2017-11-17 15:20:42 +01:00
})
it('Should fail with an incorrect state', async function () {
await makeGetRequest({
url: server.url,
path,
query: {
state: 'blabla'
}
})
})
it('Should fail with an incorrect actor type', async function () {
await makeGetRequest({
url: server.url,
path,
query: {
actorType: 'blabla'
}
})
})
it('Should fail succeed with the correct params', async function () {
await makeGetRequest({
url: server.url,
path,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.OK_200,
query: {
state: 'accepted',
actorType: 'Application'
}
})
})
2017-11-17 15:20:42 +01:00
})
describe('When listing followers', function () {
const path = '/api/v1/server/followers'
it('Should fail with a bad start pagination', async function () {
2017-12-28 14:29:57 +01:00
await checkBadStartPagination(server.url, path)
2017-11-17 15:20:42 +01:00
})
it('Should fail with a bad count pagination', async function () {
2017-12-28 14:29:57 +01:00
await checkBadCountPagination(server.url, path)
2017-11-17 15:20:42 +01:00
})
it('Should fail with an incorrect sort', async function () {
2017-12-28 14:29:57 +01:00
await checkBadSortPagination(server.url, path)
2017-11-17 15:20:42 +01:00
})
it('Should fail with an incorrect actor type', async function () {
await makeGetRequest({
url: server.url,
path,
query: {
actorType: 'blabla'
}
})
})
it('Should fail with an incorrect state', async function () {
await makeGetRequest({
url: server.url,
path,
query: {
state: 'blabla',
actorType: 'Application'
}
})
})
it('Should fail succeed with the correct params', async function () {
await makeGetRequest({
url: server.url,
path,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.OK_200,
query: {
state: 'accepted'
}
})
})
2017-11-17 15:20:42 +01:00
})
2019-04-08 14:04:57 +02:00
describe('When removing a follower', function () {
const path = '/api/v1/server/followers'
it('Should fail with an invalid token', async function () {
await makeDeleteRequest({
url: server.url,
2022-12-09 11:14:47 +01:00
path: path + '/toto@127.0.0.1:9002',
2019-04-08 14:04:57 +02:00
token: 'fake_token',
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
2019-04-08 14:04:57 +02:00
})
})
it('Should fail if the user is not an administrator', async function () {
await makeDeleteRequest({
url: server.url,
2022-12-09 11:14:47 +01:00
path: path + '/toto@127.0.0.1:9002',
2019-04-08 14:04:57 +02:00
token: userAccessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
2019-04-08 14:04:57 +02:00
})
})
it('Should fail with an invalid follower', async function () {
await makeDeleteRequest({
url: server.url,
path: path + '/toto',
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
2019-04-08 14:04:57 +02:00
})
})
it('Should fail with an unknown follower', async function () {
await makeDeleteRequest({
url: server.url,
2022-12-09 11:14:47 +01:00
path: path + '/toto@127.0.0.1:9003',
2019-04-08 14:04:57 +02:00
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.NOT_FOUND_404
2019-04-08 14:04:57 +02:00
})
})
})
describe('When accepting a follower', function () {
const path = '/api/v1/server/followers'
it('Should fail with an invalid token', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 11:14:47 +01:00
path: path + '/toto@127.0.0.1:9002/accept',
token: 'fake_token',
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
it('Should fail if the user is not an administrator', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 11:14:47 +01:00
path: path + '/toto@127.0.0.1:9002/accept',
token: userAccessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
it('Should fail with an invalid follower', async function () {
await makePostBodyRequest({
url: server.url,
path: path + '/toto/accept',
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
})
it('Should fail with an unknown follower', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 11:14:47 +01:00
path: path + '/toto@127.0.0.1:9003/accept',
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
})
describe('When rejecting a follower', function () {
const path = '/api/v1/server/followers'
it('Should fail with an invalid token', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 11:14:47 +01:00
path: path + '/toto@127.0.0.1:9002/reject',
token: 'fake_token',
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
it('Should fail if the user is not an administrator', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 11:14:47 +01:00
path: path + '/toto@127.0.0.1:9002/reject',
token: userAccessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
})
})
it('Should fail with an invalid follower', async function () {
await makePostBodyRequest({
url: server.url,
path: path + '/toto/reject',
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
})
it('Should fail with an unknown follower', async function () {
await makePostBodyRequest({
url: server.url,
2022-12-09 11:14:47 +01:00
path: path + '/toto@127.0.0.1:9003/reject',
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
})
2017-11-17 15:20:42 +01:00
describe('When removing following', function () {
2017-11-21 13:43:29 +01:00
const path = '/api/v1/server/following'
it('Should fail with an invalid token', async function () {
2017-12-28 14:29:57 +01:00
await makeDeleteRequest({
url: server.url,
2022-12-09 11:14:47 +01:00
path: path + '/127.0.0.1:9002',
2017-12-28 14:29:57 +01:00
token: 'fake_token',
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
2017-12-28 14:29:57 +01:00
})
2017-11-21 13:43:29 +01:00
})
it('Should fail if the user is not an administrator', async function () {
2017-12-28 14:29:57 +01:00
await makeDeleteRequest({
url: server.url,
2022-12-09 11:14:47 +01:00
path: path + '/127.0.0.1:9002',
2017-12-28 14:29:57 +01:00
token: userAccessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
2017-12-28 14:29:57 +01:00
})
})
it('Should fail if we do not follow this server', async function () {
await makeDeleteRequest({
url: server.url,
path: path + '/example.com',
token: server.accessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.NOT_FOUND_404
2017-12-28 14:29:57 +01:00
})
})
2017-11-17 15:20:42 +01:00
})
})
2019-04-24 15:10:37 +02:00
after(async function () {
await cleanupTests([ server ])
2017-11-17 15:20:42 +01:00
})
})