PeerTube/packages/tests/src/api/check-params/live.ts

564 lines
20 KiB
TypeScript
Raw Normal View History

2020-10-30 15:09:00 +01:00
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
import { omit } from '@peertube/peertube-core-utils'
import { HttpStatusCode, LiveVideoLatencyMode, VideoCreateResult, VideoPrivacy } from '@peertube/peertube-models'
import { buildAbsoluteFixturePath } from '@peertube/peertube-node-utils'
2020-10-30 15:09:00 +01:00
import {
LiveCommand,
PeerTubeServer,
2020-10-30 15:09:00 +01:00
cleanupTests,
2021-07-16 09:47:51 +02:00
createSingleServer,
2020-10-30 15:09:00 +01:00
makePostBodyRequest,
makeUploadRequest,
2021-07-16 14:27:30 +02:00
sendRTMPStream,
2020-10-30 15:09:00 +01:00
setAccessTokensToServers,
2021-07-15 10:02:54 +02:00
stopFfmpeg
} from '@peertube/peertube-server-commands'
import { expect } from 'chai'
2020-10-30 15:09:00 +01:00
describe('Test video lives API validator', function () {
const path = '/api/v1/videos/live'
2021-07-16 09:47:51 +02:00
let server: PeerTubeServer
2020-10-30 15:09:00 +01:00
let userAccessToken = ''
let channelId: number
let video: VideoCreateResult
2020-10-30 15:09:00 +01:00
let videoIdNotLive: number
2021-07-08 10:18:40 +02:00
let command: LiveCommand
2020-10-30 15:09:00 +01:00
// ---------------------------------------------------------------
before(async function () {
this.timeout(30000)
2021-07-16 09:47:51 +02:00
server = await createSingleServer(1)
2020-10-30 15:09:00 +01:00
await setAccessTokensToServers([ server ])
await server.config.enableMinimumTranscoding()
await server.config.updateExistingConfig({
2021-07-07 11:51:09 +02:00
newConfig: {
live: {
enabled: true,
2022-03-04 13:40:02 +01:00
latencySetting: {
enabled: false
},
2021-07-07 11:51:09 +02:00
maxInstanceLives: 20,
maxUserLives: 20,
allowReplay: true
}
2020-10-30 15:09:00 +01:00
}
})
const username = 'user1'
const password = 'my super password'
2022-07-13 11:58:01 +02:00
await server.users.create({ username, password })
2021-07-16 09:04:35 +02:00
userAccessToken = await server.login.getAccessToken({ username, password })
2020-10-30 15:09:00 +01:00
{
2021-07-16 09:04:35 +02:00
const { videoChannels } = await server.users.getMyInfo()
2021-07-13 14:23:01 +02:00
channelId = videoChannels[0].id
2020-10-30 15:09:00 +01:00
}
{
2021-07-16 09:04:35 +02:00
videoIdNotLive = (await server.videos.quickUpload({ name: 'not live' })).id
2020-10-30 15:09:00 +01:00
}
2021-07-08 10:18:40 +02:00
2021-07-16 09:04:35 +02:00
command = server.live
2020-10-30 15:09:00 +01:00
})
describe('When creating a live', function () {
let baseCorrectParams
before(function () {
baseCorrectParams = {
name: 'my super name',
category: 5,
licence: 1,
language: 'pt',
nsfw: false,
commentsEnabled: true,
downloadEnabled: true,
waitTranscoding: true,
description: 'my super description',
support: 'my super support text',
tags: [ 'tag1', 'tag2' ],
privacy: VideoPrivacy.PUBLIC,
channelId,
2020-12-03 14:10:54 +01:00
saveReplay: false,
replaySettings: undefined,
permanentLive: true,
2022-03-04 13:40:02 +01:00
latencyMode: LiveVideoLatencyMode.DEFAULT
2020-10-30 15:09:00 +01:00
}
})
it('Should fail with nothing', async function () {
const fields = {}
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with a long name', async function () {
2021-07-13 09:43:59 +02:00
const fields = { ...baseCorrectParams, name: 'super'.repeat(65) }
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with a bad category', async function () {
2021-07-13 09:43:59 +02:00
const fields = { ...baseCorrectParams, category: 125 }
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with a bad licence', async function () {
2021-07-13 09:43:59 +02:00
const fields = { ...baseCorrectParams, licence: 125 }
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with a bad language', async function () {
2021-07-13 09:43:59 +02:00
const fields = { ...baseCorrectParams, language: 'a'.repeat(15) }
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with a long description', async function () {
2021-07-13 09:43:59 +02:00
const fields = { ...baseCorrectParams, description: 'super'.repeat(2500) }
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with a long support text', async function () {
2021-07-13 09:43:59 +02:00
const fields = { ...baseCorrectParams, support: 'super'.repeat(201) }
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail without a channel', async function () {
2022-08-17 15:25:58 +02:00
const fields = omit(baseCorrectParams, [ 'channelId' ])
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with a bad channel', async function () {
2021-07-13 09:43:59 +02:00
const fields = { ...baseCorrectParams, channelId: 545454 }
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with a bad privacy for replay settings', async function () {
const fields = { ...baseCorrectParams, saveReplay: true, replaySettings: { privacy: 999 } }
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
2020-10-30 15:09:00 +01:00
it('Should fail with another user channel', async function () {
const user = {
username: 'fake',
password: 'fake_password'
}
2021-07-16 09:04:35 +02:00
await server.users.create({ username: user.username, password: user.password })
2020-10-30 15:09:00 +01:00
2021-07-16 09:04:35 +02:00
const accessTokenUser = await server.login.getAccessToken(user)
const { videoChannels } = await server.users.getMyInfo({ token: accessTokenUser })
2021-07-13 14:23:01 +02:00
const customChannelId = videoChannels[0].id
2020-10-30 15:09:00 +01:00
2021-07-13 09:43:59 +02:00
const fields = { ...baseCorrectParams, channelId: customChannelId }
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: userAccessToken, fields })
})
it('Should fail with too many tags', async function () {
2021-07-13 09:43:59 +02:00
const fields = { ...baseCorrectParams, tags: [ 'tag1', 'tag2', 'tag3', 'tag4', 'tag5', 'tag6' ] }
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with a tag length too low', async function () {
2021-07-13 09:43:59 +02:00
const fields = { ...baseCorrectParams, tags: [ 'tag1', 't' ] }
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with a tag length too big', async function () {
2021-07-13 09:43:59 +02:00
const fields = { ...baseCorrectParams, tags: [ 'tag1', 'my_super_tag_too_long_long_long_long_long_long' ] }
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with an incorrect thumbnail file', async function () {
const fields = baseCorrectParams
const attaches = {
2021-06-14 16:52:22 +02:00
thumbnailfile: buildAbsoluteFixturePath('video_short.mp4')
2020-10-30 15:09:00 +01:00
}
await makeUploadRequest({ url: server.url, path, token: server.accessToken, fields, attaches })
})
it('Should fail with a big thumbnail file', async function () {
const fields = baseCorrectParams
const attaches = {
2023-06-06 11:14:13 +02:00
thumbnailfile: buildAbsoluteFixturePath('custom-preview-big.png')
2020-10-30 15:09:00 +01:00
}
await makeUploadRequest({ url: server.url, path, token: server.accessToken, fields, attaches })
})
it('Should fail with an incorrect preview file', async function () {
const fields = baseCorrectParams
const attaches = {
2021-06-14 16:52:22 +02:00
previewfile: buildAbsoluteFixturePath('video_short.mp4')
2020-10-30 15:09:00 +01:00
}
await makeUploadRequest({ url: server.url, path, token: server.accessToken, fields, attaches })
})
it('Should fail with a big preview file', async function () {
const fields = baseCorrectParams
const attaches = {
2023-06-06 11:14:13 +02:00
previewfile: buildAbsoluteFixturePath('custom-preview-big.png')
2020-10-30 15:09:00 +01:00
}
await makeUploadRequest({ url: server.url, path, token: server.accessToken, fields, attaches })
})
2022-03-04 13:40:02 +01:00
it('Should fail with bad latency setting', async function () {
const fields = { ...baseCorrectParams, latencyMode: 42 }
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail to set latency if the server does not allow it', async function () {
const fields = { ...baseCorrectParams, latencyMode: LiveVideoLatencyMode.HIGH_LATENCY }
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields, expectedStatus: HttpStatusCode.FORBIDDEN_403 })
})
2020-10-30 15:09:00 +01:00
it('Should succeed with the correct parameters', async function () {
this.timeout(30000)
const res = await makePostBodyRequest({
url: server.url,
path,
token: server.accessToken,
fields: baseCorrectParams,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.OK_200
2020-10-30 15:09:00 +01:00
})
video = res.body.video
2020-10-30 15:09:00 +01:00
})
it('Should forbid if live is disabled', async function () {
await server.config.updateExistingConfig({
2021-07-07 11:51:09 +02:00
newConfig: {
live: {
enabled: false
}
2020-10-30 15:09:00 +01:00
}
})
await makePostBodyRequest({
url: server.url,
path,
token: server.accessToken,
fields: baseCorrectParams,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
2020-10-30 15:09:00 +01:00
})
})
it('Should forbid to save replay if not enabled by the admin', async function () {
const fields = { ...baseCorrectParams, saveReplay: true, replaySettings: { privacy: VideoPrivacy.PUBLIC } }
2020-10-30 15:09:00 +01:00
await server.config.enableLive({ allowReplay: false, transcoding: false })
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({
url: server.url,
path,
token: server.accessToken,
fields,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
2020-10-30 15:09:00 +01:00
})
})
it('Should allow to save replay if enabled by the admin', async function () {
const fields = { ...baseCorrectParams, saveReplay: true, replaySettings: { privacy: VideoPrivacy.PUBLIC } }
2020-10-30 15:09:00 +01:00
await server.config.enableLive({ allowReplay: true, transcoding: false })
2020-10-30 15:09:00 +01:00
await makePostBodyRequest({
url: server.url,
path,
token: server.accessToken,
fields,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.OK_200
2020-10-30 15:09:00 +01:00
})
})
it('Should not allow live if max instance lives is reached', async function () {
await server.config.updateExistingConfig({
2021-07-07 11:51:09 +02:00
newConfig: {
live: {
enabled: true,
maxInstanceLives: 1
}
2020-10-30 15:09:00 +01:00
}
})
await makePostBodyRequest({
url: server.url,
path,
token: server.accessToken,
fields: baseCorrectParams,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
2020-10-30 15:09:00 +01:00
})
})
it('Should not allow live if max user lives is reached', async function () {
await server.config.updateExistingConfig({
2021-07-07 11:51:09 +02:00
newConfig: {
live: {
enabled: true,
maxInstanceLives: 20,
maxUserLives: 1
}
2020-10-30 15:09:00 +01:00
}
})
await makePostBodyRequest({
url: server.url,
path,
token: server.accessToken,
fields: baseCorrectParams,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
2020-10-30 15:09:00 +01:00
})
})
})
describe('When getting live information', function () {
it('Should fail with a bad access token', async function () {
2021-07-08 10:25:50 +02:00
await command.get({ token: 'toto', videoId: video.id, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
2020-10-30 15:09:00 +01:00
})
2022-04-22 09:50:20 +02:00
it('Should not display private information without access token', async function () {
const live = await command.get({ token: '', videoId: video.id })
expect(live.rtmpUrl).to.not.exist
expect(live.streamKey).to.not.exist
expect(live.latencyMode).to.exist
})
it('Should not display private information with token of another user', async function () {
const live = await command.get({ token: userAccessToken, videoId: video.id })
expect(live.rtmpUrl).to.not.exist
expect(live.streamKey).to.not.exist
expect(live.latencyMode).to.exist
})
it('Should display private information with appropriate token', async function () {
const live = await command.get({ videoId: video.id })
expect(live.rtmpUrl).to.exist
expect(live.streamKey).to.exist
expect(live.latencyMode).to.exist
2020-10-30 15:09:00 +01:00
})
it('Should fail with a bad video id', async function () {
2021-07-08 10:25:50 +02:00
await command.get({ videoId: 'toto', expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
2020-10-30 15:09:00 +01:00
})
it('Should fail with an unknown video id', async function () {
2021-07-08 10:25:50 +02:00
await command.get({ videoId: 454555, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
2020-10-30 15:09:00 +01:00
})
it('Should fail with a non live video', async function () {
2021-07-08 10:25:50 +02:00
await command.get({ videoId: videoIdNotLive, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
2020-10-30 15:09:00 +01:00
})
it('Should succeed with the correct params', async function () {
2021-07-08 10:25:50 +02:00
await command.get({ videoId: video.id })
await command.get({ videoId: video.uuid })
await command.get({ videoId: video.shortUUID })
2020-10-30 15:09:00 +01:00
})
})
2022-05-03 11:38:07 +02:00
describe('When getting live sessions', function () {
it('Should fail with a bad access token', async function () {
await command.listSessions({ token: 'toto', videoId: video.id, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
})
it('Should fail without token', async function () {
await command.listSessions({ token: null, videoId: video.id, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
})
it('Should fail with the token of another user', async function () {
await command.listSessions({ token: userAccessToken, videoId: video.id, expectedStatus: HttpStatusCode.FORBIDDEN_403 })
})
it('Should fail with a bad video id', async function () {
await command.listSessions({ videoId: 'toto', expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
})
it('Should fail with an unknown video id', async function () {
await command.listSessions({ videoId: 454555, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
})
it('Should fail with a non live video', async function () {
await command.listSessions({ videoId: videoIdNotLive, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
})
it('Should succeed with the correct params', async function () {
await command.listSessions({ videoId: video.id })
})
})
describe('When getting live session of a replay', function () {
it('Should fail with a bad video id', async function () {
await command.getReplaySession({ videoId: 'toto', expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
})
it('Should fail with an unknown video id', async function () {
await command.getReplaySession({ videoId: 454555, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
})
it('Should fail with a non replay video', async function () {
await command.getReplaySession({ videoId: videoIdNotLive, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
})
})
2020-10-30 15:09:00 +01:00
describe('When updating live information', async function () {
it('Should fail without access token', async function () {
2021-07-08 10:25:50 +02:00
await command.update({ token: '', videoId: video.id, fields: {}, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
2020-10-30 15:09:00 +01:00
})
it('Should fail with a bad access token', async function () {
2021-07-08 10:25:50 +02:00
await command.update({ token: 'toto', videoId: video.id, fields: {}, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
2020-10-30 15:09:00 +01:00
})
it('Should fail with access token of another user', async function () {
2021-07-08 10:25:50 +02:00
await command.update({ token: userAccessToken, videoId: video.id, fields: {}, expectedStatus: HttpStatusCode.FORBIDDEN_403 })
2020-10-30 15:09:00 +01:00
})
it('Should fail with a bad video id', async function () {
2021-07-08 10:25:50 +02:00
await command.update({ videoId: 'toto', fields: {}, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
2020-10-30 15:09:00 +01:00
})
it('Should fail with an unknown video id', async function () {
2021-07-08 10:25:50 +02:00
await command.update({ videoId: 454555, fields: {}, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
2020-10-30 15:09:00 +01:00
})
it('Should fail with a non live video', async function () {
2021-07-08 10:25:50 +02:00
await command.update({ videoId: videoIdNotLive, fields: {}, expectedStatus: HttpStatusCode.NOT_FOUND_404 })
2020-10-30 15:09:00 +01:00
})
2022-03-04 13:40:02 +01:00
it('Should fail with bad latency setting', async function () {
const fields = { latencyMode: 42 as any }
2022-03-04 13:40:02 +01:00
await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
})
it('Should fail with a bad privacy for replay settings', async function () {
const fields = { saveReplay: true, replaySettings: { privacy: 999 as any } }
await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
})
it('Should fail with save replay enabled but without replay settings', async function () {
await server.config.enableLive({ allowReplay: true, transcoding: false })
const fields = { saveReplay: true }
await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
})
it('Should fail with save replay disabled and replay settings', async function () {
const fields = { saveReplay: false, replaySettings: { privacy: VideoPrivacy.INTERNAL } }
await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
})
it('Should fail with only replay settings when save replay is disabled', async function () {
const fields = { replaySettings: { privacy: VideoPrivacy.INTERNAL } }
await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
})
2022-03-04 13:40:02 +01:00
it('Should fail to set latency if the server does not allow it', async function () {
const fields = { latencyMode: LiveVideoLatencyMode.HIGH_LATENCY }
await command.update({ videoId: video.id, fields, expectedStatus: HttpStatusCode.FORBIDDEN_403 })
})
2020-10-30 15:09:00 +01:00
it('Should succeed with the correct params', async function () {
2021-07-08 10:25:50 +02:00
await command.update({ videoId: video.id, fields: { saveReplay: false } })
await command.update({ videoId: video.uuid, fields: { saveReplay: false } })
await command.update({ videoId: video.shortUUID, fields: { saveReplay: false } })
await command.update({ videoId: video.id, fields: { saveReplay: true, replaySettings: { privacy: VideoPrivacy.PUBLIC } } })
2020-10-30 15:09:00 +01:00
})
it('Should fail to update replay status if replay is not allowed on the instance', async function () {
await server.config.enableLive({ allowReplay: false, transcoding: false })
2020-10-30 15:09:00 +01:00
2021-07-08 10:25:50 +02:00
await command.update({ videoId: video.id, fields: { saveReplay: true }, expectedStatus: HttpStatusCode.FORBIDDEN_403 })
2020-10-30 15:09:00 +01:00
})
it('Should succeed to live attributes if it has already started', async function () {
2020-12-11 10:36:05 +01:00
this.timeout(40000)
2020-10-30 15:09:00 +01:00
2021-07-08 10:25:50 +02:00
const live = await command.get({ videoId: video.id })
2020-10-30 15:09:00 +01:00
2021-08-06 10:39:40 +02:00
const ffmpegCommand = sendRTMPStream({ rtmpBaseUrl: live.rtmpUrl, streamKey: live.streamKey })
2020-10-30 15:09:00 +01:00
2021-07-08 10:25:50 +02:00
await command.waitUntilPublished({ videoId: video.id })
await command.update({ videoId: video.id, fields: { permanentLive: false }, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
2020-10-30 15:09:00 +01:00
2021-07-08 10:18:40 +02:00
await stopFfmpeg(ffmpegCommand)
2020-10-30 15:09:00 +01:00
})
2020-11-03 15:33:30 +01:00
it('Should fail to change live privacy if it has already started', async function () {
this.timeout(40000)
const live = await command.get({ videoId: video.id })
const ffmpegCommand = sendRTMPStream({ rtmpBaseUrl: live.rtmpUrl, streamKey: live.streamKey })
await command.waitUntilPublished({ videoId: video.id })
await server.videos.update({
id: video.id,
attributes: { privacy: VideoPrivacy.PUBLIC } // Same privacy, it's fine
})
await server.videos.update({
id: video.id,
attributes: { privacy: VideoPrivacy.UNLISTED },
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
await stopFfmpeg(ffmpegCommand)
})
2020-11-03 15:33:30 +01:00
it('Should fail to stream twice in the save live', async function () {
2020-12-11 10:36:05 +01:00
this.timeout(40000)
2020-11-03 15:33:30 +01:00
2021-07-08 10:25:50 +02:00
const live = await command.get({ videoId: video.id })
2020-11-03 15:33:30 +01:00
2021-08-06 10:39:40 +02:00
const ffmpegCommand = sendRTMPStream({ rtmpBaseUrl: live.rtmpUrl, streamKey: live.streamKey })
2020-11-03 15:33:30 +01:00
2021-07-08 10:25:50 +02:00
await command.waitUntilPublished({ videoId: video.id })
2020-11-03 15:33:30 +01:00
2021-07-08 10:25:50 +02:00
await command.runAndTestStreamError({ videoId: video.id, shouldHaveError: true })
2020-11-03 15:33:30 +01:00
2021-07-08 10:18:40 +02:00
await stopFfmpeg(ffmpegCommand)
2020-11-03 15:33:30 +01:00
})
2020-10-30 15:09:00 +01:00
})
after(async function () {
await cleanupTests([ server ])
})
})