PeerTube/server/tests/api/check-params/jobs.ts

126 lines
3.4 KiB
TypeScript
Raw Normal View History

2020-01-31 16:56:52 +01:00
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
2017-11-30 10:51:13 +01:00
import { checkBadCountPagination, checkBadSortPagination, checkBadStartPagination } from '@server/tests/shared'
2021-07-16 10:42:24 +02:00
import { HttpStatusCode } from '@shared/models'
import {
cleanupTests,
createSingleServer,
makeGetRequest,
makePostBodyRequest,
PeerTubeServer,
setAccessTokensToServers
} from '@shared/server-commands'
2017-11-30 10:51:13 +01:00
describe('Test jobs API validators', function () {
const path = '/api/v1/jobs/failed'
2021-07-16 09:47:51 +02:00
let server: PeerTubeServer
2017-11-30 10:51:13 +01:00
let userAccessToken = ''
// ---------------------------------------------------------------
before(async function () {
this.timeout(120000)
2021-07-16 09:47:51 +02:00
server = await createSingleServer(1)
2017-11-30 10:51:13 +01:00
await setAccessTokensToServers([ server ])
const user = {
username: 'user1',
password: 'my super password'
}
2021-07-16 09:04:35 +02:00
await server.users.create({ username: user.username, password: user.password })
userAccessToken = await server.login.getAccessToken(user)
2017-11-30 10:51:13 +01:00
})
describe('When listing jobs', function () {
it('Should fail with a bad state', async function () {
await makeGetRequest({
url: server.url,
token: server.accessToken,
path: path + 'ade'
})
})
2019-12-04 14:49:59 +01:00
it('Should fail with an incorrect job type', async function () {
await makeGetRequest({
url: server.url,
token: server.accessToken,
path,
query: {
jobType: 'toto'
}
})
})
2017-11-30 10:51:13 +01:00
it('Should fail with a bad start pagination', async function () {
2017-12-28 14:40:11 +01:00
await checkBadStartPagination(server.url, path, server.accessToken)
2017-11-30 10:51:13 +01:00
})
it('Should fail with a bad count pagination', async function () {
2017-12-28 14:40:11 +01:00
await checkBadCountPagination(server.url, path, server.accessToken)
2017-11-30 10:51:13 +01:00
})
it('Should fail with an incorrect sort', async function () {
2017-12-28 14:40:11 +01:00
await checkBadSortPagination(server.url, path, server.accessToken)
2017-11-30 10:51:13 +01:00
})
it('Should fail with a non authenticated user', async function () {
2017-12-28 14:40:11 +01:00
await makeGetRequest({
url: server.url,
path,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
2017-12-28 14:40:11 +01:00
})
2017-11-30 10:51:13 +01:00
})
it('Should fail with a non admin user', async function () {
2017-12-28 14:40:11 +01:00
await makeGetRequest({
url: server.url,
path,
token: userAccessToken,
2021-07-16 10:42:24 +02:00
expectedStatus: HttpStatusCode.FORBIDDEN_403
2017-12-28 14:40:11 +01:00
})
2017-11-30 10:51:13 +01:00
})
})
describe('When pausing/resuming the job queue', async function () {
const commands = [ 'pause', 'resume' ]
it('Should fail with a non authenticated user', async function () {
for (const command of commands) {
await makePostBodyRequest({
url: server.url,
path: '/api/v1/jobs/' + command,
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
}
})
2019-12-04 14:49:59 +01:00
it('Should fail with a non admin user', async function () {
for (const command of commands) {
await makePostBodyRequest({
url: server.url,
path: '/api/v1/jobs/' + command,
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
}
})
it('Should succeed with the correct params', async function () {
for (const command of commands) {
await makePostBodyRequest({
url: server.url,
path: '/api/v1/jobs/' + command,
token: server.accessToken,
expectedStatus: HttpStatusCode.NO_CONTENT_204
})
}
})
2017-11-30 10:51:13 +01:00
})
2019-04-24 15:10:37 +02:00
after(async function () {
await cleanupTests([ server ])
2017-11-30 10:51:13 +01:00
})
})