2020-01-31 16:56:52 +01:00
|
|
|
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
|
2017-11-29 13:18:05 +01:00
|
|
|
|
2017-11-17 11:35:10 +01:00
|
|
|
import 'mocha'
|
2020-07-07 14:34:16 +02:00
|
|
|
import * as chai from 'chai'
|
|
|
|
import { AbuseState, AbuseUpdate, MyUser, User, UserRole, Video, VideoPlaylistType } from '@shared/models'
|
2021-06-02 14:28:30 +02:00
|
|
|
import { CustomConfig, OAuth2ErrorCode } from '@shared/models/server'
|
2021-03-12 15:20:46 +01:00
|
|
|
import { HttpStatusCode } from '../../../../shared/core-utils/miscs/http-error-codes'
|
2017-09-04 21:21:47 +02:00
|
|
|
import {
|
2020-04-23 11:36:50 +02:00
|
|
|
addVideoCommentThread,
|
2018-09-26 16:28:15 +02:00
|
|
|
blockUser,
|
2019-04-24 15:10:37 +02:00
|
|
|
cleanupTests,
|
2021-03-12 15:20:46 +01:00
|
|
|
closeAllSequelize,
|
2018-09-26 16:28:15 +02:00
|
|
|
createUser,
|
|
|
|
deleteMe,
|
2019-04-24 15:10:37 +02:00
|
|
|
flushAndRunServer,
|
2019-04-09 11:02:02 +02:00
|
|
|
getAccountRatings,
|
2020-07-24 15:05:51 +02:00
|
|
|
getAdminAbusesList,
|
2018-09-26 16:28:15 +02:00
|
|
|
getBlacklistedVideosList,
|
2020-04-23 11:36:50 +02:00
|
|
|
getCustomConfig,
|
2018-09-26 16:28:15 +02:00
|
|
|
getMyUserInformation,
|
|
|
|
getMyUserVideoQuotaUsed,
|
|
|
|
getMyUserVideoRating,
|
|
|
|
getUserInformation,
|
|
|
|
getUsersList,
|
|
|
|
getUsersListPaginationAndSort,
|
2019-06-07 16:59:53 +02:00
|
|
|
getVideoChannel,
|
2020-01-31 16:56:52 +01:00
|
|
|
getVideosList,
|
|
|
|
installPlugin,
|
2021-03-12 15:20:46 +01:00
|
|
|
killallServers,
|
2018-09-26 16:28:15 +02:00
|
|
|
login,
|
|
|
|
makePutBodyRequest,
|
|
|
|
rateVideo,
|
2019-06-07 16:59:53 +02:00
|
|
|
registerUserWithChannel,
|
2018-09-26 16:28:15 +02:00
|
|
|
removeUser,
|
|
|
|
removeVideo,
|
2020-07-07 14:34:16 +02:00
|
|
|
reportAbuse,
|
2021-03-12 15:20:46 +01:00
|
|
|
reRunServer,
|
2018-09-26 16:28:15 +02:00
|
|
|
ServerInfo,
|
2021-03-12 15:20:46 +01:00
|
|
|
setTokenField,
|
2018-09-26 16:28:15 +02:00
|
|
|
testImage,
|
|
|
|
unblockUser,
|
2020-07-07 14:34:16 +02:00
|
|
|
updateAbuse,
|
2020-04-23 11:36:50 +02:00
|
|
|
updateCustomSubConfig,
|
2018-09-26 16:28:15 +02:00
|
|
|
updateMyAvatar,
|
|
|
|
updateMyUser,
|
|
|
|
updateUser,
|
|
|
|
uploadVideo,
|
2020-03-27 15:19:03 +01:00
|
|
|
userLogin,
|
2020-04-23 11:36:50 +02:00
|
|
|
waitJobs
|
2019-04-15 15:26:15 +02:00
|
|
|
} from '../../../../shared/extra-utils'
|
|
|
|
import { follow } from '../../../../shared/extra-utils/server/follows'
|
2021-03-12 15:20:46 +01:00
|
|
|
import { logout, refreshToken, setAccessTokensToServers } from '../../../../shared/extra-utils/users/login'
|
2019-04-15 15:26:15 +02:00
|
|
|
import { getMyVideos } from '../../../../shared/extra-utils/videos/videos'
|
2019-04-15 10:49:46 +02:00
|
|
|
import { UserAdminFlag } from '../../../../shared/models/users/user-flag.model'
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2017-11-17 11:35:10 +01:00
|
|
|
const expect = chai.expect
|
|
|
|
|
2017-09-04 21:21:47 +02:00
|
|
|
describe('Test users', function () {
|
|
|
|
let server: ServerInfo
|
|
|
|
let accessToken: string
|
|
|
|
let accessTokenUser: string
|
|
|
|
let videoId: number
|
|
|
|
let userId: number
|
2018-01-23 09:15:36 +01:00
|
|
|
const user = {
|
|
|
|
username: 'user_1',
|
|
|
|
password: 'super password'
|
|
|
|
}
|
2017-09-04 21:21:47 +02:00
|
|
|
|
|
|
|
before(async function () {
|
2018-01-18 18:10:45 +01:00
|
|
|
this.timeout(30000)
|
2020-04-23 11:36:50 +02:00
|
|
|
|
|
|
|
server = await flushAndRunServer(1, {
|
|
|
|
rates_limit: {
|
|
|
|
login: {
|
|
|
|
max: 30
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
2017-11-29 13:18:05 +01:00
|
|
|
|
|
|
|
await setAccessTokensToServers([ server ])
|
2019-07-19 10:37:35 +02:00
|
|
|
|
|
|
|
await installPlugin({ url: server.url, accessToken: server.accessToken, npmName: 'peertube-theme-background-red' })
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('OAuth client', function () {
|
|
|
|
it('Should create a new client')
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should return the first client')
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should remove the last client')
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should not login with an invalid client id', async function () {
|
|
|
|
const client = { id: 'client', secret: server.client.secret }
|
2020-12-07 14:32:36 +01:00
|
|
|
const res = await login(server.url, client, server.user, HttpStatusCode.BAD_REQUEST_400)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2021-06-02 14:28:30 +02:00
|
|
|
expect(res.body.code).to.equal(OAuth2ErrorCode.INVALID_CLIENT)
|
2021-06-01 16:07:58 +02:00
|
|
|
expect(res.body.error).to.contain('client is invalid')
|
|
|
|
expect(res.body.type.startsWith('https://')).to.be.true
|
2021-06-02 14:28:30 +02:00
|
|
|
expect(res.body.type).to.contain(OAuth2ErrorCode.INVALID_CLIENT)
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should not login with an invalid client secret', async function () {
|
|
|
|
const client = { id: server.client.id, secret: 'coucou' }
|
2020-12-07 14:32:36 +01:00
|
|
|
const res = await login(server.url, client, server.user, HttpStatusCode.BAD_REQUEST_400)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2021-06-02 14:28:30 +02:00
|
|
|
expect(res.body.code).to.equal(OAuth2ErrorCode.INVALID_CLIENT)
|
2021-06-01 16:07:58 +02:00
|
|
|
expect(res.body.error).to.contain('client is invalid')
|
|
|
|
expect(res.body.type.startsWith('https://')).to.be.true
|
2021-06-02 14:28:30 +02:00
|
|
|
expect(res.body.type).to.contain(OAuth2ErrorCode.INVALID_CLIENT)
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Login', function () {
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should not login with an invalid username', async function () {
|
|
|
|
const user = { username: 'captain crochet', password: server.user.password }
|
2020-12-07 14:32:36 +01:00
|
|
|
const res = await login(server.url, server.client, user, HttpStatusCode.BAD_REQUEST_400)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2021-06-02 14:28:30 +02:00
|
|
|
expect(res.body.code).to.equal(OAuth2ErrorCode.INVALID_GRANT)
|
2021-06-01 16:07:58 +02:00
|
|
|
expect(res.body.error).to.contain('credentials are invalid')
|
|
|
|
expect(res.body.type.startsWith('https://')).to.be.true
|
2021-06-02 14:28:30 +02:00
|
|
|
expect(res.body.type).to.contain(OAuth2ErrorCode.INVALID_GRANT)
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should not login with an invalid password', async function () {
|
|
|
|
const user = { username: server.user.username, password: 'mew_three' }
|
2020-12-07 14:32:36 +01:00
|
|
|
const res = await login(server.url, server.client, user, HttpStatusCode.BAD_REQUEST_400)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2021-06-02 14:28:30 +02:00
|
|
|
expect(res.body.code).to.equal(OAuth2ErrorCode.INVALID_GRANT)
|
2021-06-01 16:07:58 +02:00
|
|
|
expect(res.body.error).to.contain('credentials are invalid')
|
|
|
|
expect(res.body.type.startsWith('https://')).to.be.true
|
2021-06-02 14:28:30 +02:00
|
|
|
expect(res.body.type).to.contain(OAuth2ErrorCode.INVALID_GRANT)
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should not be able to upload a video', async function () {
|
|
|
|
accessToken = 'my_super_token'
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
const videoAttributes = {}
|
2020-12-07 14:32:36 +01:00
|
|
|
await uploadVideo(server.url, accessToken, videoAttributes, HttpStatusCode.UNAUTHORIZED_401)
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should not be able to follow', async function () {
|
|
|
|
accessToken = 'my_super_token'
|
2020-12-07 14:32:36 +01:00
|
|
|
await follow(server.url, [ 'http://example.com' ], accessToken, HttpStatusCode.UNAUTHORIZED_401)
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should not be able to unfollow')
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to login', async function () {
|
2020-12-07 14:32:36 +01:00
|
|
|
const res = await login(server.url, server.client, server.user, HttpStatusCode.OK_200)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
accessToken = res.body.access_token
|
|
|
|
})
|
2019-07-02 11:16:33 +02:00
|
|
|
|
|
|
|
it('Should be able to login with an insensitive username', async function () {
|
|
|
|
const user = { username: 'RoOt', password: server.user.password }
|
2020-12-07 14:32:36 +01:00
|
|
|
await login(server.url, server.client, user, HttpStatusCode.OK_200)
|
2019-07-02 11:16:33 +02:00
|
|
|
|
|
|
|
const user2 = { username: 'rOoT', password: server.user.password }
|
2020-12-07 14:32:36 +01:00
|
|
|
await login(server.url, server.client, user2, HttpStatusCode.OK_200)
|
2019-07-02 11:16:33 +02:00
|
|
|
|
|
|
|
const user3 = { username: 'ROOt', password: server.user.password }
|
2020-12-07 14:32:36 +01:00
|
|
|
await login(server.url, server.client, user3, HttpStatusCode.OK_200)
|
2019-07-02 11:16:33 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Upload', function () {
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should upload the video with the correct token', async function () {
|
|
|
|
const videoAttributes = {}
|
|
|
|
await uploadVideo(server.url, accessToken, videoAttributes)
|
|
|
|
const res = await getVideosList(server.url)
|
2020-01-31 16:56:52 +01:00
|
|
|
const video = res.body.data[0]
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(video.account.name).to.equal('root')
|
|
|
|
videoId = video.id
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should upload the video again with the correct token', async function () {
|
|
|
|
const videoAttributes = {}
|
|
|
|
await uploadVideo(server.url, accessToken, videoAttributes)
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Ratings', function () {
|
2019-04-09 11:21:36 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should retrieve a video rating', async function () {
|
|
|
|
await rateVideo(server.url, accessToken, videoId, 'like')
|
|
|
|
const res = await getMyUserVideoRating(server.url, accessToken, videoId)
|
|
|
|
const rating = res.body
|
2019-04-09 11:02:02 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(rating.videoId).to.equal(videoId)
|
|
|
|
expect(rating.rating).to.equal('like')
|
|
|
|
})
|
2019-04-09 11:02:02 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should retrieve ratings list', async function () {
|
|
|
|
await rateVideo(server.url, accessToken, videoId, 'like')
|
2019-04-09 11:21:36 +02:00
|
|
|
|
2020-12-07 14:32:36 +01:00
|
|
|
const res = await getAccountRatings(server.url, server.user.username, server.accessToken, null, HttpStatusCode.OK_200)
|
2019-04-09 11:21:36 +02:00
|
|
|
const ratings = res.body
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(ratings.total).to.equal(1)
|
2020-01-31 16:56:52 +01:00
|
|
|
expect(ratings.data[0].video.id).to.equal(videoId)
|
|
|
|
expect(ratings.data[0].rating).to.equal('like')
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should retrieve ratings list by rating type', async function () {
|
|
|
|
{
|
|
|
|
const res = await getAccountRatings(server.url, server.user.username, server.accessToken, 'like')
|
|
|
|
const ratings = res.body
|
|
|
|
expect(ratings.data.length).to.equal(1)
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
const res = await getAccountRatings(server.url, server.user.username, server.accessToken, 'dislike')
|
|
|
|
const ratings = res.body
|
|
|
|
expect(ratings.data.length).to.equal(0)
|
|
|
|
}
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Remove video', function () {
|
|
|
|
it('Should not be able to remove the video with an incorrect token', async function () {
|
2020-12-07 14:32:36 +01:00
|
|
|
await removeVideo(server.url, 'bad_token', videoId, HttpStatusCode.UNAUTHORIZED_401)
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should not be able to remove the video with the token of another account')
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to remove the video with the correct token', async function () {
|
|
|
|
await removeVideo(server.url, accessToken, videoId)
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Logout', function () {
|
2020-04-22 16:07:04 +02:00
|
|
|
it('Should logout (revoke token)', async function () {
|
|
|
|
await logout(server.url, server.accessToken)
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2020-04-22 16:07:04 +02:00
|
|
|
it('Should not be able to get the user information', async function () {
|
2020-12-07 14:32:36 +01:00
|
|
|
await getMyUserInformation(server.url, server.accessToken, HttpStatusCode.UNAUTHORIZED_401)
|
2020-04-22 16:07:04 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2020-04-22 16:07:04 +02:00
|
|
|
it('Should not be able to upload a video', async function () {
|
2020-12-07 14:32:36 +01:00
|
|
|
await uploadVideo(server.url, server.accessToken, { name: 'video' }, HttpStatusCode.UNAUTHORIZED_401)
|
2020-04-22 16:07:04 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should not be able to rate a video', async function () {
|
|
|
|
const path = '/api/v1/videos/'
|
|
|
|
const data = {
|
|
|
|
rating: 'likes'
|
|
|
|
}
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
const options = {
|
|
|
|
url: server.url,
|
|
|
|
path: path + videoId,
|
|
|
|
token: 'wrong token',
|
|
|
|
fields: data,
|
2020-12-07 14:32:36 +01:00
|
|
|
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
|
2019-04-15 10:49:46 +02:00
|
|
|
}
|
|
|
|
await makePutBodyRequest(options)
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2020-04-23 11:36:50 +02:00
|
|
|
it('Should be able to login again', async function () {
|
2021-03-12 15:20:46 +01:00
|
|
|
const res = await login(server.url, server.client, server.user)
|
|
|
|
server.accessToken = res.body.access_token
|
|
|
|
server.refreshToken = res.body.refresh_token
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should be able to get my user information again', async function () {
|
|
|
|
await getMyUserInformation(server.url, server.accessToken)
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should have an expired access token', async function () {
|
|
|
|
this.timeout(15000)
|
|
|
|
|
|
|
|
await setTokenField(server.internalServerNumber, server.accessToken, 'accessTokenExpiresAt', new Date().toISOString())
|
|
|
|
await setTokenField(server.internalServerNumber, server.accessToken, 'refreshTokenExpiresAt', new Date().toISOString())
|
|
|
|
|
|
|
|
killallServers([ server ])
|
|
|
|
await reRunServer(server)
|
|
|
|
|
|
|
|
await getMyUserInformation(server.url, server.accessToken, 401)
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should not be able to refresh an access token with an expired refresh token', async function () {
|
|
|
|
await refreshToken(server, server.refreshToken, 400)
|
2020-04-23 11:36:50 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2021-03-12 15:20:46 +01:00
|
|
|
it('Should refresh the token', async function () {
|
|
|
|
this.timeout(15000)
|
|
|
|
|
|
|
|
const futureDate = new Date(new Date().getTime() + 1000 * 60).toISOString()
|
|
|
|
await setTokenField(server.internalServerNumber, server.accessToken, 'refreshTokenExpiresAt', futureDate)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2021-03-12 15:20:46 +01:00
|
|
|
killallServers([ server ])
|
|
|
|
await reRunServer(server)
|
|
|
|
|
|
|
|
const res = await refreshToken(server, server.refreshToken)
|
|
|
|
server.accessToken = res.body.access_token
|
|
|
|
server.refreshToken = res.body.refresh_token
|
|
|
|
})
|
2019-04-15 10:49:46 +02:00
|
|
|
|
2020-04-23 11:36:50 +02:00
|
|
|
it('Should be able to get my user information again', async function () {
|
|
|
|
await getMyUserInformation(server.url, server.accessToken)
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Creating a user', function () {
|
2018-01-08 12:53:09 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to create a new user', async function () {
|
|
|
|
await createUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessToken,
|
|
|
|
username: user.username,
|
|
|
|
password: user.password,
|
|
|
|
videoQuota: 2 * 1024 * 1024,
|
2020-06-09 16:07:10 +02:00
|
|
|
adminFlags: UserAdminFlag.BYPASS_VIDEO_AUTO_BLACKLIST
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
|
|
|
})
|
2018-08-14 17:56:51 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to login with this user', async function () {
|
|
|
|
accessTokenUser = await userLogin(server, user)
|
|
|
|
})
|
2018-08-14 17:56:51 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to get user information', async function () {
|
|
|
|
const res1 = await getMyUserInformation(server.url, accessTokenUser)
|
2020-01-03 14:17:57 +01:00
|
|
|
const userMe: MyUser = res1.body
|
2019-04-15 10:49:46 +02:00
|
|
|
|
2020-03-27 15:19:03 +01:00
|
|
|
const res2 = await getUserInformation(server.url, server.accessToken, userMe.id, true)
|
2019-04-15 10:49:46 +02:00
|
|
|
const userGet: User = res2.body
|
|
|
|
|
|
|
|
for (const user of [ userMe, userGet ]) {
|
|
|
|
expect(user.username).to.equal('user_1')
|
|
|
|
expect(user.email).to.equal('user_1@example.com')
|
|
|
|
expect(user.nsfwPolicy).to.equal('display')
|
|
|
|
expect(user.videoQuota).to.equal(2 * 1024 * 1024)
|
|
|
|
expect(user.roleLabel).to.equal('User')
|
|
|
|
expect(user.id).to.be.a('number')
|
|
|
|
expect(user.account.displayName).to.equal('user_1')
|
|
|
|
expect(user.account.description).to.be.null
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(userMe.adminFlags).to.be.undefined
|
2020-06-09 16:07:10 +02:00
|
|
|
expect(userGet.adminFlags).to.equal(UserAdminFlag.BYPASS_VIDEO_AUTO_BLACKLIST)
|
2020-01-02 13:07:18 +01:00
|
|
|
|
|
|
|
expect(userMe.specialPlaylists).to.have.lengthOf(1)
|
2020-01-03 14:17:57 +01:00
|
|
|
expect(userMe.specialPlaylists[0].type).to.equal(VideoPlaylistType.WATCH_LATER)
|
2020-03-27 15:19:03 +01:00
|
|
|
|
|
|
|
// Check stats are included with withStats
|
|
|
|
expect(userGet.videosCount).to.be.a('number')
|
|
|
|
expect(userGet.videosCount).to.equal(0)
|
|
|
|
expect(userGet.videoCommentsCount).to.be.a('number')
|
|
|
|
expect(userGet.videoCommentsCount).to.equal(0)
|
2020-07-07 14:34:16 +02:00
|
|
|
expect(userGet.abusesCount).to.be.a('number')
|
|
|
|
expect(userGet.abusesCount).to.equal(0)
|
|
|
|
expect(userGet.abusesAcceptedCount).to.be.a('number')
|
|
|
|
expect(userGet.abusesAcceptedCount).to.equal(0)
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2018-01-08 12:53:09 +01:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('My videos & quotas', function () {
|
2017-10-31 15:20:35 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to upload a video with this user', async function () {
|
2020-04-16 15:13:46 +02:00
|
|
|
this.timeout(10000)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
const videoAttributes = {
|
|
|
|
name: 'super user video',
|
|
|
|
fixture: 'video_short.webm'
|
|
|
|
}
|
|
|
|
await uploadVideo(server.url, accessTokenUser, videoAttributes)
|
|
|
|
})
|
2017-11-17 11:35:10 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should have video quota updated', async function () {
|
|
|
|
const res = await getMyUserVideoQuotaUsed(server.url, accessTokenUser)
|
|
|
|
const data = res.body
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(data.videoQuotaUsed).to.equal(218910)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
const resUsers = await getUsersList(server.url, server.accessToken)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
const users: User[] = resUsers.body.data
|
|
|
|
const tmpUser = users.find(u => u.username === user.username)
|
|
|
|
expect(tmpUser.videoQuotaUsed).to.equal(218910)
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to list my videos', async function () {
|
|
|
|
const res = await getMyVideos(server.url, accessTokenUser, 0, 5)
|
|
|
|
expect(res.body.total).to.equal(1)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
const videos = res.body.data
|
|
|
|
expect(videos).to.have.lengthOf(1)
|
2017-11-17 11:35:10 +01:00
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
const video: Video = videos[0]
|
2019-04-26 10:20:58 +02:00
|
|
|
expect(video.name).to.equal('super user video')
|
|
|
|
expect(video.thumbnailPath).to.not.be.null
|
|
|
|
expect(video.previewPath).to.not.be.null
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2019-12-30 14:31:39 +01:00
|
|
|
|
|
|
|
it('Should be able to search in my videos', async function () {
|
|
|
|
{
|
|
|
|
const res = await getMyVideos(server.url, accessTokenUser, 0, 5, '-createdAt', 'user video')
|
|
|
|
expect(res.body.total).to.equal(1)
|
|
|
|
|
|
|
|
const videos = res.body.data
|
|
|
|
expect(videos).to.have.lengthOf(1)
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
const res = await getMyVideos(server.url, accessTokenUser, 0, 5, '-createdAt', 'toto')
|
|
|
|
expect(res.body.total).to.equal(0)
|
|
|
|
|
|
|
|
const videos = res.body.data
|
|
|
|
expect(videos).to.have.lengthOf(0)
|
|
|
|
}
|
|
|
|
})
|
2020-04-16 15:13:46 +02:00
|
|
|
|
|
|
|
it('Should disable webtorrent, enable HLS, and update my quota', async function () {
|
|
|
|
this.timeout(60000)
|
|
|
|
|
|
|
|
{
|
|
|
|
const res = await getCustomConfig(server.url, server.accessToken)
|
|
|
|
const config = res.body as CustomConfig
|
|
|
|
config.transcoding.webtorrent.enabled = false
|
|
|
|
config.transcoding.hls.enabled = true
|
|
|
|
config.transcoding.enabled = true
|
|
|
|
await updateCustomSubConfig(server.url, server.accessToken, config)
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
const videoAttributes = {
|
|
|
|
name: 'super user video 2',
|
|
|
|
fixture: 'video_short.webm'
|
|
|
|
}
|
|
|
|
await uploadVideo(server.url, accessTokenUser, videoAttributes)
|
|
|
|
|
|
|
|
await waitJobs([ server ])
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
const res = await getMyUserVideoQuotaUsed(server.url, accessTokenUser)
|
|
|
|
const data = res.body
|
|
|
|
|
|
|
|
expect(data.videoQuotaUsed).to.be.greaterThan(220000)
|
|
|
|
}
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Users listing', function () {
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should list all the users', async function () {
|
|
|
|
const res = await getUsersList(server.url, server.accessToken)
|
|
|
|
const result = res.body
|
|
|
|
const total = result.total
|
|
|
|
const users = result.data
|
2017-11-17 11:35:10 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(total).to.equal(2)
|
|
|
|
expect(users).to.be.an('array')
|
|
|
|
expect(users.length).to.equal(2)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
const user = users[0]
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(user.username).to.equal('user_1')
|
|
|
|
expect(user.email).to.equal('user_1@example.com')
|
|
|
|
expect(user.nsfwPolicy).to.equal('display')
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
const rootUser = users[1]
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(rootUser.username).to.equal('root')
|
2019-04-26 08:50:52 +02:00
|
|
|
expect(rootUser.email).to.equal('admin' + server.internalServerNumber + '@example.com')
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(user.nsfwPolicy).to.equal('display')
|
2017-11-17 11:35:10 +01:00
|
|
|
|
2020-05-07 10:39:09 +02:00
|
|
|
expect(rootUser.lastLoginDate).to.exist
|
|
|
|
expect(user.lastLoginDate).to.exist
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
userId = user.id
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should list only the first user by username asc', async function () {
|
|
|
|
const res = await getUsersListPaginationAndSort(server.url, server.accessToken, 0, 1, 'username')
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
const result = res.body
|
|
|
|
const total = result.total
|
|
|
|
const users = result.data
|
2017-12-29 10:04:15 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(total).to.equal(2)
|
|
|
|
expect(users.length).to.equal(1)
|
2017-11-17 11:35:10 +01:00
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
const user = users[0]
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(user.username).to.equal('root')
|
2019-04-26 08:50:52 +02:00
|
|
|
expect(user.email).to.equal('admin' + server.internalServerNumber + '@example.com')
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(user.roleLabel).to.equal('Administrator')
|
|
|
|
expect(user.nsfwPolicy).to.equal('display')
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should list only the first user by username desc', async function () {
|
|
|
|
const res = await getUsersListPaginationAndSort(server.url, server.accessToken, 0, 1, '-username')
|
|
|
|
const result = res.body
|
|
|
|
const total = result.total
|
|
|
|
const users = result.data
|
2018-10-08 15:51:38 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(total).to.equal(2)
|
|
|
|
expect(users.length).to.equal(1)
|
2018-10-08 15:51:38 +02:00
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
const user = users[0]
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(user.username).to.equal('user_1')
|
|
|
|
expect(user.email).to.equal('user_1@example.com')
|
|
|
|
expect(user.nsfwPolicy).to.equal('display')
|
|
|
|
})
|
2018-10-08 15:51:38 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should list only the second user by createdAt desc', async function () {
|
|
|
|
const res = await getUsersListPaginationAndSort(server.url, server.accessToken, 0, 1, '-createdAt')
|
|
|
|
const result = res.body
|
|
|
|
const total = result.total
|
|
|
|
const users = result.data
|
2018-10-08 15:51:38 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(total).to.equal(2)
|
2018-10-08 15:51:38 +02:00
|
|
|
expect(users.length).to.equal(1)
|
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
const user = users[0]
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(user.username).to.equal('user_1')
|
|
|
|
expect(user.email).to.equal('user_1@example.com')
|
|
|
|
expect(user.nsfwPolicy).to.equal('display')
|
|
|
|
})
|
2018-10-08 15:51:38 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should list all the users by createdAt asc', async function () {
|
|
|
|
const res = await getUsersListPaginationAndSort(server.url, server.accessToken, 0, 2, 'createdAt')
|
|
|
|
const result = res.body
|
|
|
|
const total = result.total
|
|
|
|
const users = result.data
|
2018-10-08 15:51:38 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(total).to.equal(2)
|
2018-10-08 15:51:38 +02:00
|
|
|
expect(users.length).to.equal(2)
|
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
expect(users[0].username).to.equal('root')
|
|
|
|
expect(users[0].email).to.equal('admin' + server.internalServerNumber + '@example.com')
|
|
|
|
expect(users[0].nsfwPolicy).to.equal('display')
|
2018-10-08 15:51:38 +02:00
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
expect(users[1].username).to.equal('user_1')
|
|
|
|
expect(users[1].email).to.equal('user_1@example.com')
|
|
|
|
expect(users[1].nsfwPolicy).to.equal('display')
|
2017-12-28 16:26:28 +01:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should search user by username', async function () {
|
|
|
|
const res = await getUsersListPaginationAndSort(server.url, server.accessToken, 0, 2, 'createdAt', 'oot')
|
|
|
|
const users = res.body.data as User[]
|
|
|
|
|
|
|
|
expect(res.body.total).to.equal(1)
|
|
|
|
expect(users.length).to.equal(1)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
expect(users[0].username).to.equal('root')
|
2017-12-28 16:26:28 +01:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should search user by email', async function () {
|
|
|
|
{
|
|
|
|
const res = await getUsersListPaginationAndSort(server.url, server.accessToken, 0, 2, 'createdAt', 'r_1@exam')
|
|
|
|
const users = res.body.data as User[]
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(res.body.total).to.equal(1)
|
|
|
|
expect(users.length).to.equal(1)
|
2017-09-05 22:09:16 +02:00
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
expect(users[0].username).to.equal('user_1')
|
|
|
|
expect(users[0].email).to.equal('user_1@example.com')
|
2019-04-15 10:49:46 +02:00
|
|
|
}
|
2017-12-19 10:45:49 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
{
|
|
|
|
const res = await getUsersListPaginationAndSort(server.url, server.accessToken, 0, 2, 'createdAt', 'example')
|
|
|
|
const users = res.body.data as User[]
|
2017-12-19 10:45:49 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(res.body.total).to.equal(2)
|
|
|
|
expect(users.length).to.equal(2)
|
2017-12-19 10:45:49 +01:00
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
expect(users[0].username).to.equal('root')
|
|
|
|
expect(users[1].username).to.equal('user_1')
|
2019-04-15 10:49:46 +02:00
|
|
|
}
|
2017-12-28 16:26:28 +01:00
|
|
|
})
|
2017-09-05 22:09:16 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Update my account', function () {
|
|
|
|
it('Should update my password', async function () {
|
|
|
|
await updateMyUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessTokenUser,
|
|
|
|
currentPassword: 'super password',
|
2019-08-28 14:40:06 +02:00
|
|
|
password: 'new password'
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
|
|
|
user.password = 'new password'
|
2017-12-29 19:10:13 +01:00
|
|
|
|
2020-12-07 14:32:36 +01:00
|
|
|
await userLogin(server, user, HttpStatusCode.OK_200)
|
2017-12-29 19:10:13 +01:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to change the NSFW display attribute', async function () {
|
|
|
|
await updateMyUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessTokenUser,
|
|
|
|
nsfwPolicy: 'do_not_list'
|
|
|
|
})
|
|
|
|
|
|
|
|
const res = await getMyUserInformation(server.url, accessTokenUser)
|
|
|
|
const user = res.body
|
|
|
|
|
|
|
|
expect(user.username).to.equal('user_1')
|
|
|
|
expect(user.email).to.equal('user_1@example.com')
|
|
|
|
expect(user.nsfwPolicy).to.equal('do_not_list')
|
|
|
|
expect(user.videoQuota).to.equal(2 * 1024 * 1024)
|
|
|
|
expect(user.id).to.be.a('number')
|
|
|
|
expect(user.account.displayName).to.equal('user_1')
|
|
|
|
expect(user.account.description).to.be.null
|
|
|
|
})
|
2017-12-29 19:10:13 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to change the autoPlayVideo attribute', async function () {
|
|
|
|
await updateMyUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessTokenUser,
|
|
|
|
autoPlayVideo: false
|
|
|
|
})
|
2017-12-29 19:10:13 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
const res = await getMyUserInformation(server.url, accessTokenUser)
|
|
|
|
const user = res.body
|
|
|
|
|
|
|
|
expect(user.autoPlayVideo).to.be.false
|
2018-04-26 10:03:40 +02:00
|
|
|
})
|
|
|
|
|
2019-09-24 08:48:01 +02:00
|
|
|
it('Should be able to change the autoPlayNextVideo attribute', async function () {
|
|
|
|
await updateMyUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessTokenUser,
|
|
|
|
autoPlayNextVideo: true
|
|
|
|
})
|
|
|
|
|
|
|
|
const res = await getMyUserInformation(server.url, accessTokenUser)
|
|
|
|
const user = res.body
|
|
|
|
|
|
|
|
expect(user.autoPlayNextVideo).to.be.true
|
|
|
|
})
|
|
|
|
|
2019-06-11 16:13:50 +02:00
|
|
|
it('Should be able to change the email attribute', async function () {
|
2019-04-15 10:49:46 +02:00
|
|
|
await updateMyUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessTokenUser,
|
2019-06-11 16:13:50 +02:00
|
|
|
currentPassword: 'new password',
|
2019-04-15 10:49:46 +02:00
|
|
|
email: 'updated@example.com'
|
|
|
|
})
|
|
|
|
|
|
|
|
const res = await getMyUserInformation(server.url, accessTokenUser)
|
|
|
|
const user = res.body
|
|
|
|
|
|
|
|
expect(user.username).to.equal('user_1')
|
|
|
|
expect(user.email).to.equal('updated@example.com')
|
|
|
|
expect(user.nsfwPolicy).to.equal('do_not_list')
|
|
|
|
expect(user.videoQuota).to.equal(2 * 1024 * 1024)
|
|
|
|
expect(user.id).to.be.a('number')
|
|
|
|
expect(user.account.displayName).to.equal('user_1')
|
|
|
|
expect(user.account.description).to.be.null
|
|
|
|
})
|
2018-04-26 10:03:40 +02:00
|
|
|
|
2020-11-25 09:50:12 +01:00
|
|
|
it('Should be able to update my avatar with a gif', async function () {
|
|
|
|
const fixture = 'avatar.gif'
|
2018-04-26 10:03:40 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
await updateMyAvatar({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessTokenUser,
|
|
|
|
fixture
|
|
|
|
})
|
2018-02-15 14:46:26 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
const res = await getMyUserInformation(server.url, accessTokenUser)
|
|
|
|
const user = res.body
|
2018-02-15 14:46:26 +01:00
|
|
|
|
2020-11-25 09:50:12 +01:00
|
|
|
await testImage(server.url, 'avatar-resized', user.account.avatar.path, '.gif')
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should be able to update my avatar with a gif, and then a png', async function () {
|
|
|
|
for (const extension of [ '.png', '.gif' ]) {
|
|
|
|
const fixture = 'avatar' + extension
|
|
|
|
|
|
|
|
await updateMyAvatar({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessTokenUser,
|
|
|
|
fixture
|
|
|
|
})
|
|
|
|
|
|
|
|
const res = await getMyUserInformation(server.url, accessTokenUser)
|
|
|
|
const user = res.body
|
|
|
|
|
|
|
|
await testImage(server.url, 'avatar-resized', user.account.avatar.path, extension)
|
|
|
|
}
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
it('Should be able to update my display name', async function () {
|
|
|
|
await updateMyUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessTokenUser,
|
|
|
|
displayName: 'new display name'
|
|
|
|
})
|
|
|
|
|
|
|
|
const res = await getMyUserInformation(server.url, accessTokenUser)
|
|
|
|
const user = res.body
|
|
|
|
|
|
|
|
expect(user.username).to.equal('user_1')
|
|
|
|
expect(user.email).to.equal('updated@example.com')
|
|
|
|
expect(user.nsfwPolicy).to.equal('do_not_list')
|
|
|
|
expect(user.videoQuota).to.equal(2 * 1024 * 1024)
|
|
|
|
expect(user.id).to.be.a('number')
|
|
|
|
expect(user.account.displayName).to.equal('new display name')
|
|
|
|
expect(user.account.description).to.be.null
|
|
|
|
})
|
2018-02-15 14:46:26 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to update my description', async function () {
|
|
|
|
await updateMyUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessTokenUser,
|
|
|
|
description: 'my super description updated'
|
|
|
|
})
|
|
|
|
|
|
|
|
const res = await getMyUserInformation(server.url, accessTokenUser)
|
2019-08-28 14:40:06 +02:00
|
|
|
const user: User = res.body
|
2019-04-15 10:49:46 +02:00
|
|
|
|
|
|
|
expect(user.username).to.equal('user_1')
|
|
|
|
expect(user.email).to.equal('updated@example.com')
|
|
|
|
expect(user.nsfwPolicy).to.equal('do_not_list')
|
|
|
|
expect(user.videoQuota).to.equal(2 * 1024 * 1024)
|
|
|
|
expect(user.id).to.be.a('number')
|
|
|
|
expect(user.account.displayName).to.equal('new display name')
|
|
|
|
expect(user.account.description).to.equal('my super description updated')
|
2019-08-28 14:40:06 +02:00
|
|
|
expect(user.noWelcomeModal).to.be.false
|
|
|
|
expect(user.noInstanceConfigWarningModal).to.be.false
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2019-07-19 10:37:35 +02:00
|
|
|
|
|
|
|
it('Should be able to update my theme', async function () {
|
|
|
|
for (const theme of [ 'background-red', 'default', 'instance-default' ]) {
|
|
|
|
await updateMyUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessTokenUser,
|
|
|
|
theme
|
|
|
|
})
|
|
|
|
|
|
|
|
const res = await getMyUserInformation(server.url, accessTokenUser)
|
|
|
|
const body: User = res.body
|
|
|
|
|
|
|
|
expect(body.theme).to.equal(theme)
|
|
|
|
}
|
|
|
|
})
|
2019-08-28 14:40:06 +02:00
|
|
|
|
|
|
|
it('Should be able to update my modal preferences', async function () {
|
|
|
|
await updateMyUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: accessTokenUser,
|
|
|
|
noInstanceConfigWarningModal: true,
|
|
|
|
noWelcomeModal: true
|
|
|
|
})
|
|
|
|
|
|
|
|
const res = await getMyUserInformation(server.url, accessTokenUser)
|
|
|
|
const user: User = res.body
|
|
|
|
|
|
|
|
expect(user.noWelcomeModal).to.be.true
|
|
|
|
expect(user.noInstanceConfigWarningModal).to.be.true
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Updating another user', function () {
|
|
|
|
it('Should be able to update another user', async function () {
|
|
|
|
await updateUser({
|
|
|
|
url: server.url,
|
|
|
|
userId,
|
|
|
|
accessToken,
|
|
|
|
email: 'updated2@example.com',
|
|
|
|
emailVerified: true,
|
|
|
|
videoQuota: 42,
|
|
|
|
role: UserRole.MODERATOR,
|
2021-02-01 15:39:13 +01:00
|
|
|
adminFlags: UserAdminFlag.NONE,
|
|
|
|
pluginAuth: 'toto'
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
const res = await getUserInformation(server.url, accessToken, userId)
|
2021-02-01 15:39:13 +01:00
|
|
|
const user = res.body as User
|
2019-04-15 10:49:46 +02:00
|
|
|
|
|
|
|
expect(user.username).to.equal('user_1')
|
|
|
|
expect(user.email).to.equal('updated2@example.com')
|
|
|
|
expect(user.emailVerified).to.be.true
|
|
|
|
expect(user.nsfwPolicy).to.equal('do_not_list')
|
|
|
|
expect(user.videoQuota).to.equal(42)
|
|
|
|
expect(user.roleLabel).to.equal('Moderator')
|
|
|
|
expect(user.id).to.be.a('number')
|
|
|
|
expect(user.adminFlags).to.equal(UserAdminFlag.NONE)
|
2021-02-01 15:39:13 +01:00
|
|
|
expect(user.pluginAuth).to.equal('toto')
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should reset the auth plugin', async function () {
|
|
|
|
await updateUser({ url: server.url, userId, accessToken, pluginAuth: null })
|
|
|
|
|
|
|
|
const res = await getUserInformation(server.url, accessToken, userId)
|
|
|
|
const user = res.body as User
|
|
|
|
expect(user.pluginAuth).to.be.null
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2018-01-23 09:15:36 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should have removed the user token', async function () {
|
2020-12-07 14:32:36 +01:00
|
|
|
await getMyUserVideoQuotaUsed(server.url, accessTokenUser, HttpStatusCode.UNAUTHORIZED_401)
|
2018-01-23 09:15:36 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
accessTokenUser = await userLogin(server, user)
|
2019-02-11 09:30:29 +01:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to update another user password', async function () {
|
|
|
|
await updateUser({
|
|
|
|
url: server.url,
|
|
|
|
userId,
|
|
|
|
accessToken,
|
|
|
|
password: 'password updated'
|
|
|
|
})
|
2019-02-11 09:30:29 +01:00
|
|
|
|
2020-12-07 14:32:36 +01:00
|
|
|
await getMyUserVideoQuotaUsed(server.url, accessTokenUser, HttpStatusCode.UNAUTHORIZED_401)
|
2019-02-11 09:30:29 +01:00
|
|
|
|
2020-12-07 14:32:36 +01:00
|
|
|
await userLogin(server, user, HttpStatusCode.BAD_REQUEST_400)
|
2019-02-11 09:30:29 +01:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
user.password = 'password updated'
|
|
|
|
accessTokenUser = await userLogin(server, user)
|
|
|
|
})
|
2017-10-27 17:27:06 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Video blacklists', function () {
|
|
|
|
it('Should be able to list video blacklist by a moderator', async function () {
|
|
|
|
await getBlacklistedVideosList({ url: server.url, token: accessTokenUser })
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Remove a user', function () {
|
|
|
|
it('Should be able to remove this user', async function () {
|
|
|
|
await removeUser(server.url, userId, accessToken)
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should not be able to login with this user', async function () {
|
2020-12-07 14:32:36 +01:00
|
|
|
await userLogin(server, user, HttpStatusCode.BAD_REQUEST_400)
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should not have videos of this user', async function () {
|
|
|
|
const res = await getVideosList(server.url)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(res.body.total).to.equal(1)
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2020-01-31 16:56:52 +01:00
|
|
|
const video = res.body.data[0]
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(video.account.name).to.equal('root')
|
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('Registering a new user', function () {
|
2020-03-27 15:19:03 +01:00
|
|
|
let user15AccessToken
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should register a new user', async function () {
|
2019-06-07 16:59:53 +02:00
|
|
|
const user = { displayName: 'super user 15', username: 'user_15', password: 'my super password' }
|
2019-05-28 10:46:32 +02:00
|
|
|
const channel = { name: 'my_user_15_channel', displayName: 'my channel rocks' }
|
|
|
|
|
|
|
|
await registerUserWithChannel({ url: server.url, user, channel })
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should be able to login with this registered user', async function () {
|
|
|
|
const user15 = {
|
|
|
|
username: 'user_15',
|
|
|
|
password: 'my super password'
|
|
|
|
}
|
2017-09-05 22:09:16 +02:00
|
|
|
|
2020-03-27 15:19:03 +01:00
|
|
|
user15AccessToken = await userLogin(server, user15)
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2017-09-05 22:09:16 +02:00
|
|
|
|
2019-06-07 16:59:53 +02:00
|
|
|
it('Should have the correct display name', async function () {
|
2020-03-27 15:19:03 +01:00
|
|
|
const res = await getMyUserInformation(server.url, user15AccessToken)
|
2019-06-07 16:59:53 +02:00
|
|
|
const user: User = res.body
|
|
|
|
|
|
|
|
expect(user.account.displayName).to.equal('super user 15')
|
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should have the correct video quota', async function () {
|
2020-03-27 15:19:03 +01:00
|
|
|
const res = await getMyUserInformation(server.url, user15AccessToken)
|
2019-04-15 10:49:46 +02:00
|
|
|
const user = res.body
|
2017-09-04 21:21:47 +02:00
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
expect(user.videoQuota).to.equal(5 * 1024 * 1024)
|
|
|
|
})
|
2018-08-08 10:55:27 +02:00
|
|
|
|
2019-05-28 10:46:32 +02:00
|
|
|
it('Should have created the channel', async function () {
|
|
|
|
const res = await getVideoChannel(server.url, 'my_user_15_channel')
|
|
|
|
|
|
|
|
expect(res.body.displayName).to.equal('my channel rocks')
|
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
it('Should remove me', async function () {
|
|
|
|
{
|
|
|
|
const res = await getUsersList(server.url, server.accessToken)
|
|
|
|
expect(res.body.data.find(u => u.username === 'user_15')).to.not.be.undefined
|
|
|
|
}
|
2018-08-08 10:55:27 +02:00
|
|
|
|
2020-03-27 15:19:03 +01:00
|
|
|
await deleteMe(server.url, user15AccessToken)
|
2019-04-15 10:49:46 +02:00
|
|
|
|
|
|
|
{
|
|
|
|
const res = await getUsersList(server.url, server.accessToken)
|
|
|
|
expect(res.body.data.find(u => u.username === 'user_15')).to.be.undefined
|
|
|
|
}
|
|
|
|
})
|
2018-08-08 10:55:27 +02:00
|
|
|
})
|
|
|
|
|
2019-04-15 10:49:46 +02:00
|
|
|
describe('User blocking', function () {
|
2020-03-27 15:19:03 +01:00
|
|
|
let user16Id
|
|
|
|
let user16AccessToken
|
2020-07-02 22:49:51 +02:00
|
|
|
const user16 = {
|
|
|
|
username: 'user_16',
|
|
|
|
password: 'my super password'
|
|
|
|
}
|
2020-03-27 15:19:03 +01:00
|
|
|
|
2020-07-02 22:49:51 +02:00
|
|
|
it('Should block a user', async function () {
|
2019-04-15 10:49:46 +02:00
|
|
|
const resUser = await createUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: server.accessToken,
|
|
|
|
username: user16.username,
|
|
|
|
password: user16.password
|
|
|
|
})
|
2020-03-27 15:19:03 +01:00
|
|
|
user16Id = resUser.body.user.id
|
2018-08-08 14:58:21 +02:00
|
|
|
|
2020-03-27 15:19:03 +01:00
|
|
|
user16AccessToken = await userLogin(server, user16)
|
2018-08-08 14:58:21 +02:00
|
|
|
|
2020-12-07 14:32:36 +01:00
|
|
|
await getMyUserInformation(server.url, user16AccessToken, HttpStatusCode.OK_200)
|
2019-04-15 10:49:46 +02:00
|
|
|
await blockUser(server.url, user16Id, server.accessToken)
|
2018-08-08 14:58:21 +02:00
|
|
|
|
2020-12-07 14:32:36 +01:00
|
|
|
await getMyUserInformation(server.url, user16AccessToken, HttpStatusCode.UNAUTHORIZED_401)
|
|
|
|
await userLogin(server, user16, HttpStatusCode.BAD_REQUEST_400)
|
2020-07-02 22:49:51 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
it('Should search user by banned status', async function () {
|
|
|
|
{
|
|
|
|
const res = await getUsersListPaginationAndSort(server.url, server.accessToken, 0, 2, 'createdAt', undefined, true)
|
|
|
|
const users = res.body.data as User[]
|
|
|
|
|
|
|
|
expect(res.body.total).to.equal(1)
|
|
|
|
expect(users.length).to.equal(1)
|
|
|
|
|
|
|
|
expect(users[0].username).to.equal(user16.username)
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
const res = await getUsersListPaginationAndSort(server.url, server.accessToken, 0, 2, 'createdAt', undefined, false)
|
|
|
|
const users = res.body.data as User[]
|
|
|
|
|
|
|
|
expect(res.body.total).to.equal(1)
|
|
|
|
expect(users.length).to.equal(1)
|
|
|
|
|
|
|
|
expect(users[0].username).to.not.equal(user16.username)
|
|
|
|
}
|
|
|
|
})
|
2018-08-08 14:58:21 +02:00
|
|
|
|
2020-07-02 22:49:51 +02:00
|
|
|
it('Should unblock a user', async function () {
|
2019-04-15 10:49:46 +02:00
|
|
|
await unblockUser(server.url, user16Id, server.accessToken)
|
2020-03-27 15:19:03 +01:00
|
|
|
user16AccessToken = await userLogin(server, user16)
|
2020-12-07 14:32:36 +01:00
|
|
|
await getMyUserInformation(server.url, user16AccessToken, HttpStatusCode.OK_200)
|
2020-03-27 15:19:03 +01:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('User stats', function () {
|
|
|
|
let user17Id
|
|
|
|
let user17AccessToken
|
|
|
|
|
|
|
|
it('Should report correct initial statistics about a user', async function () {
|
|
|
|
const user17 = {
|
|
|
|
username: 'user_17',
|
|
|
|
password: 'my super password'
|
|
|
|
}
|
|
|
|
const resUser = await createUser({
|
|
|
|
url: server.url,
|
|
|
|
accessToken: server.accessToken,
|
|
|
|
username: user17.username,
|
|
|
|
password: user17.password
|
|
|
|
})
|
|
|
|
|
|
|
|
user17Id = resUser.body.user.id
|
|
|
|
user17AccessToken = await userLogin(server, user17)
|
|
|
|
|
|
|
|
const res = await getUserInformation(server.url, server.accessToken, user17Id, true)
|
|
|
|
const user: User = res.body
|
|
|
|
|
|
|
|
expect(user.videosCount).to.equal(0)
|
|
|
|
expect(user.videoCommentsCount).to.equal(0)
|
2020-07-07 14:34:16 +02:00
|
|
|
expect(user.abusesCount).to.equal(0)
|
|
|
|
expect(user.abusesCreatedCount).to.equal(0)
|
|
|
|
expect(user.abusesAcceptedCount).to.equal(0)
|
2020-03-27 15:19:03 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
it('Should report correct videos count', async function () {
|
|
|
|
const videoAttributes = {
|
|
|
|
name: 'video to test user stats'
|
|
|
|
}
|
|
|
|
await uploadVideo(server.url, user17AccessToken, videoAttributes)
|
|
|
|
const res1 = await getVideosList(server.url)
|
|
|
|
videoId = res1.body.data.find(video => video.name === videoAttributes.name).id
|
|
|
|
|
|
|
|
const res2 = await getUserInformation(server.url, server.accessToken, user17Id, true)
|
|
|
|
const user: User = res2.body
|
|
|
|
|
|
|
|
expect(user.videosCount).to.equal(1)
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should report correct video comments for user', async function () {
|
|
|
|
const text = 'super comment'
|
|
|
|
await addVideoCommentThread(server.url, user17AccessToken, videoId, text)
|
|
|
|
|
|
|
|
const res = await getUserInformation(server.url, server.accessToken, user17Id, true)
|
|
|
|
const user: User = res.body
|
|
|
|
|
|
|
|
expect(user.videoCommentsCount).to.equal(1)
|
|
|
|
})
|
|
|
|
|
2020-07-07 14:34:16 +02:00
|
|
|
it('Should report correct abuses counts', async function () {
|
2020-03-27 15:19:03 +01:00
|
|
|
const reason = 'my super bad reason'
|
2020-07-07 14:34:16 +02:00
|
|
|
await reportAbuse({ url: server.url, token: user17AccessToken, videoId, reason })
|
2020-03-27 15:19:03 +01:00
|
|
|
|
2020-07-24 15:05:51 +02:00
|
|
|
const res1 = await getAdminAbusesList({ url: server.url, token: server.accessToken })
|
2020-03-27 15:19:03 +01:00
|
|
|
const abuseId = res1.body.data[0].id
|
|
|
|
|
|
|
|
const res2 = await getUserInformation(server.url, server.accessToken, user17Id, true)
|
|
|
|
const user2: User = res2.body
|
|
|
|
|
2020-07-07 14:34:16 +02:00
|
|
|
expect(user2.abusesCount).to.equal(1) // number of incriminations
|
|
|
|
expect(user2.abusesCreatedCount).to.equal(1) // number of reports created
|
2020-03-27 15:19:03 +01:00
|
|
|
|
2020-07-01 16:05:30 +02:00
|
|
|
const body: AbuseUpdate = { state: AbuseState.ACCEPTED }
|
2020-07-07 14:34:16 +02:00
|
|
|
await updateAbuse(server.url, server.accessToken, abuseId, body)
|
2020-03-27 15:19:03 +01:00
|
|
|
|
|
|
|
const res3 = await getUserInformation(server.url, server.accessToken, user17Id, true)
|
|
|
|
const user3: User = res3.body
|
|
|
|
|
2020-07-07 14:34:16 +02:00
|
|
|
expect(user3.abusesAcceptedCount).to.equal(1) // number of reports created accepted
|
2019-04-15 10:49:46 +02:00
|
|
|
})
|
2018-08-08 14:58:21 +02:00
|
|
|
})
|
|
|
|
|
2019-04-24 15:10:37 +02:00
|
|
|
after(async function () {
|
2021-03-12 15:20:46 +01:00
|
|
|
await closeAllSequelize([ server ])
|
2019-04-24 15:10:37 +02:00
|
|
|
await cleanupTests([ server ])
|
2017-09-04 21:21:47 +02:00
|
|
|
})
|
|
|
|
})
|