2020-01-31 16:56:52 +01:00
|
|
|
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
|
2017-11-17 15:20:42 +01:00
|
|
|
|
2021-12-17 11:58:15 +01:00
|
|
|
import { checkBadCountPagination, checkBadSortPagination, checkBadStartPagination } from '@server/tests/shared'
|
|
|
|
import { HttpStatusCode } from '@shared/models'
|
2017-11-17 15:20:42 +01:00
|
|
|
import {
|
2019-04-24 15:10:37 +02:00
|
|
|
cleanupTests,
|
2021-07-16 09:47:51 +02:00
|
|
|
createSingleServer,
|
2021-07-16 10:42:24 +02:00
|
|
|
makeDeleteRequest,
|
|
|
|
makeGetRequest,
|
2019-04-24 15:10:37 +02:00
|
|
|
makePostBodyRequest,
|
2021-07-16 09:47:51 +02:00
|
|
|
PeerTubeServer,
|
2021-07-13 11:05:15 +02:00
|
|
|
setAccessTokensToServers
|
2021-12-17 09:29:23 +01:00
|
|
|
} from '@shared/server-commands'
|
2017-11-17 15:20:42 +01:00
|
|
|
|
|
|
|
describe('Test server follows API validators', function () {
|
2021-07-16 09:47:51 +02:00
|
|
|
let server: PeerTubeServer
|
2017-11-17 15:20:42 +01:00
|
|
|
|
|
|
|
// ---------------------------------------------------------------
|
|
|
|
|
|
|
|
before(async function () {
|
2018-01-18 18:10:45 +01:00
|
|
|
this.timeout(30000)
|
2017-11-17 15:20:42 +01:00
|
|
|
|
2021-07-16 09:47:51 +02:00
|
|
|
server = await createSingleServer(1)
|
2017-11-17 15:20:42 +01:00
|
|
|
|
|
|
|
await setAccessTokensToServers([ server ])
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('When managing following', function () {
|
|
|
|
let userAccessToken = null
|
|
|
|
|
|
|
|
before(async function () {
|
2021-07-20 14:15:15 +02:00
|
|
|
userAccessToken = await server.users.generateUserAndToken('user1')
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
describe('When adding follows', function () {
|
|
|
|
const path = '/api/v1/server/following'
|
|
|
|
|
2021-07-20 14:15:15 +02:00
|
|
|
it('Should fail with nothing', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
2017-12-28 14:29:57 +01:00
|
|
|
})
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
2021-07-20 14:15:15 +02:00
|
|
|
it('Should fail if hosts is not composed by hosts', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
2022-12-09 11:14:47 +01:00
|
|
|
fields: { hosts: [ '127.0.0.1:9002', '127.0.0.1:coucou' ] },
|
2017-12-28 14:29:57 +01:00
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
2017-12-28 14:29:57 +01:00
|
|
|
})
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
2021-07-20 14:15:15 +02:00
|
|
|
it('Should fail if hosts is composed with http schemes', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
2022-12-09 11:14:47 +01:00
|
|
|
fields: { hosts: [ '127.0.0.1:9002', 'http://127.0.0.1:9003' ] },
|
2017-12-28 14:29:57 +01:00
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
2017-12-28 14:29:57 +01:00
|
|
|
})
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
2021-07-20 14:15:15 +02:00
|
|
|
it('Should fail if hosts are not unique', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
2022-12-09 11:14:47 +01:00
|
|
|
fields: { urls: [ '127.0.0.1:9002', '127.0.0.1:9002' ] },
|
2017-12-28 14:29:57 +01:00
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
2017-12-28 14:29:57 +01:00
|
|
|
})
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
2021-07-20 14:15:15 +02:00
|
|
|
it('Should fail if handles is not composed by handles', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
2022-12-09 11:14:47 +01:00
|
|
|
fields: { handles: [ 'hello@example.com', '127.0.0.1:9001' ] },
|
2021-07-20 14:15:15 +02:00
|
|
|
token: server.accessToken,
|
|
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if handles are not unique', async function () {
|
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
fields: { urls: [ 'hello@example.com', 'hello@example.com' ] },
|
2017-12-28 14:29:57 +01:00
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
2017-12-28 14:29:57 +01:00
|
|
|
})
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with an invalid token', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
2022-12-09 11:14:47 +01:00
|
|
|
fields: { hosts: [ '127.0.0.1:9002' ] },
|
2017-12-28 14:29:57 +01:00
|
|
|
token: 'fake_token',
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
|
2017-12-28 14:29:57 +01:00
|
|
|
})
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
2022-12-09 11:14:47 +01:00
|
|
|
fields: { hosts: [ '127.0.0.1:9002' ] },
|
2017-12-28 14:29:57 +01:00
|
|
|
token: userAccessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
2017-12-28 14:29:57 +01:00
|
|
|
})
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('When listing followings', function () {
|
|
|
|
const path = '/api/v1/server/following'
|
|
|
|
|
|
|
|
it('Should fail with a bad start pagination', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await checkBadStartPagination(server.url, path)
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with a bad count pagination', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await checkBadCountPagination(server.url, path)
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with an incorrect sort', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await checkBadSortPagination(server.url, path)
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
2019-11-28 11:37:32 +01:00
|
|
|
|
|
|
|
it('Should fail with an incorrect state', async function () {
|
|
|
|
await makeGetRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
query: {
|
|
|
|
state: 'blabla'
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-11-29 10:55:17 +01:00
|
|
|
it('Should fail with an incorrect actor type', async function () {
|
|
|
|
await makeGetRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
query: {
|
|
|
|
actorType: 'blabla'
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-11-28 11:37:32 +01:00
|
|
|
it('Should fail succeed with the correct params', async function () {
|
|
|
|
await makeGetRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.OK_200,
|
2019-11-28 11:37:32 +01:00
|
|
|
query: {
|
2019-11-29 10:55:17 +01:00
|
|
|
state: 'accepted',
|
|
|
|
actorType: 'Application'
|
2019-11-28 11:37:32 +01:00
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
describe('When listing followers', function () {
|
|
|
|
const path = '/api/v1/server/followers'
|
|
|
|
|
|
|
|
it('Should fail with a bad start pagination', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await checkBadStartPagination(server.url, path)
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with a bad count pagination', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await checkBadCountPagination(server.url, path)
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with an incorrect sort', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await checkBadSortPagination(server.url, path)
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
2019-11-28 11:37:32 +01:00
|
|
|
|
2019-11-29 10:55:17 +01:00
|
|
|
it('Should fail with an incorrect actor type', async function () {
|
|
|
|
await makeGetRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
query: {
|
|
|
|
actorType: 'blabla'
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-11-28 11:37:32 +01:00
|
|
|
it('Should fail with an incorrect state', async function () {
|
|
|
|
await makeGetRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
|
|
|
query: {
|
2019-11-29 10:55:17 +01:00
|
|
|
state: 'blabla',
|
|
|
|
actorType: 'Application'
|
2019-11-28 11:37:32 +01:00
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail succeed with the correct params', async function () {
|
|
|
|
await makeGetRequest({
|
|
|
|
url: server.url,
|
|
|
|
path,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.OK_200,
|
2019-11-28 11:37:32 +01:00
|
|
|
query: {
|
|
|
|
state: 'accepted'
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
|
2019-04-08 14:04:57 +02:00
|
|
|
describe('When removing a follower', function () {
|
|
|
|
const path = '/api/v1/server/followers'
|
|
|
|
|
|
|
|
it('Should fail with an invalid token', async function () {
|
|
|
|
await makeDeleteRequest({
|
|
|
|
url: server.url,
|
2022-12-09 11:14:47 +01:00
|
|
|
path: path + '/toto@127.0.0.1:9002',
|
2019-04-08 14:04:57 +02:00
|
|
|
token: 'fake_token',
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
|
2019-04-08 14:04:57 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
|
|
await makeDeleteRequest({
|
|
|
|
url: server.url,
|
2022-12-09 11:14:47 +01:00
|
|
|
path: path + '/toto@127.0.0.1:9002',
|
2019-04-08 14:04:57 +02:00
|
|
|
token: userAccessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
2019-04-08 14:04:57 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with an invalid follower', async function () {
|
|
|
|
await makeDeleteRequest({
|
|
|
|
url: server.url,
|
|
|
|
path: path + '/toto',
|
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
2019-04-08 14:04:57 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with an unknown follower', async function () {
|
|
|
|
await makeDeleteRequest({
|
|
|
|
url: server.url,
|
2022-12-09 11:14:47 +01:00
|
|
|
path: path + '/toto@127.0.0.1:9003',
|
2019-04-08 14:04:57 +02:00
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.NOT_FOUND_404
|
2019-04-08 14:04:57 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-08 15:18:04 +02:00
|
|
|
describe('When accepting a follower', function () {
|
|
|
|
const path = '/api/v1/server/followers'
|
|
|
|
|
|
|
|
it('Should fail with an invalid token', async function () {
|
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
2022-12-09 11:14:47 +01:00
|
|
|
path: path + '/toto@127.0.0.1:9002/accept',
|
2019-04-08 15:18:04 +02:00
|
|
|
token: 'fake_token',
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
|
2019-04-08 15:18:04 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
2022-12-09 11:14:47 +01:00
|
|
|
path: path + '/toto@127.0.0.1:9002/accept',
|
2019-04-08 15:18:04 +02:00
|
|
|
token: userAccessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
2019-04-08 15:18:04 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with an invalid follower', async function () {
|
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path: path + '/toto/accept',
|
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
2019-04-08 15:18:04 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with an unknown follower', async function () {
|
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
2022-12-09 11:14:47 +01:00
|
|
|
path: path + '/toto@127.0.0.1:9003/accept',
|
2019-04-08 15:18:04 +02:00
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.NOT_FOUND_404
|
2019-04-08 15:18:04 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('When rejecting a follower', function () {
|
|
|
|
const path = '/api/v1/server/followers'
|
|
|
|
|
|
|
|
it('Should fail with an invalid token', async function () {
|
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
2022-12-09 11:14:47 +01:00
|
|
|
path: path + '/toto@127.0.0.1:9002/reject',
|
2019-04-08 15:18:04 +02:00
|
|
|
token: 'fake_token',
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
|
2019-04-08 15:18:04 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
2022-12-09 11:14:47 +01:00
|
|
|
path: path + '/toto@127.0.0.1:9002/reject',
|
2019-04-08 15:18:04 +02:00
|
|
|
token: userAccessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
2019-04-08 15:18:04 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with an invalid follower', async function () {
|
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
|
|
|
path: path + '/toto/reject',
|
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
2019-04-08 15:18:04 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail with an unknown follower', async function () {
|
|
|
|
await makePostBodyRequest({
|
|
|
|
url: server.url,
|
2022-12-09 11:14:47 +01:00
|
|
|
path: path + '/toto@127.0.0.1:9003/reject',
|
2019-04-08 15:18:04 +02:00
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.NOT_FOUND_404
|
2019-04-08 15:18:04 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-11-17 15:20:42 +01:00
|
|
|
describe('When removing following', function () {
|
2017-11-21 13:43:29 +01:00
|
|
|
const path = '/api/v1/server/following'
|
|
|
|
|
|
|
|
it('Should fail with an invalid token', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await makeDeleteRequest({
|
|
|
|
url: server.url,
|
2022-12-09 11:14:47 +01:00
|
|
|
path: path + '/127.0.0.1:9002',
|
2017-12-28 14:29:57 +01:00
|
|
|
token: 'fake_token',
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
|
2017-12-28 14:29:57 +01:00
|
|
|
})
|
2017-11-21 13:43:29 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
2017-12-28 14:29:57 +01:00
|
|
|
await makeDeleteRequest({
|
|
|
|
url: server.url,
|
2022-12-09 11:14:47 +01:00
|
|
|
path: path + '/127.0.0.1:9002',
|
2017-12-28 14:29:57 +01:00
|
|
|
token: userAccessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
2017-12-28 14:29:57 +01:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('Should fail if we do not follow this server', async function () {
|
|
|
|
await makeDeleteRequest({
|
|
|
|
url: server.url,
|
|
|
|
path: path + '/example.com',
|
|
|
|
token: server.accessToken,
|
2021-07-16 10:42:24 +02:00
|
|
|
expectedStatus: HttpStatusCode.NOT_FOUND_404
|
2017-12-28 14:29:57 +01:00
|
|
|
})
|
|
|
|
})
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-24 15:10:37 +02:00
|
|
|
after(async function () {
|
|
|
|
await cleanupTests([ server ])
|
2017-11-17 15:20:42 +01:00
|
|
|
})
|
|
|
|
})
|