PeerTube/server/tests/api/check-params/video-blacklist.ts

196 lines
5.9 KiB
TypeScript

/* tslint:disable:no-unused-expression */
import 'mocha'
import * as request from 'supertest'
import {
ServerInfo,
flushTests,
runServer,
uploadVideo,
getVideosList,
createUser,
setAccessTokensToServers,
killallServers,
makePostBodyRequest,
userLogin
} from '../../utils'
describe('Test video blacklist API validators', function () {
let server: ServerInfo
let userAccessToken = ''
// ---------------------------------------------------------------
before(async function () {
this.timeout(120000)
await flushTests()
server = await runServer(1)
await setAccessTokensToServers([ server ])
const username = 'user1'
const password = 'my super password'
await createUser(server.url, server.accessToken, username, password)
userAccessToken = await userLogin(server, { username, password })
// Upload a video
const videoAttributes = {}
await uploadVideo(server.url, server.accessToken, videoAttributes)
const res = await getVideosList(server.url)
const videos = res.body.data
server.video = videos[0]
})
describe('When adding a video in blacklist', function () {
const basePath = '/api/v1/videos/'
it('Should fail with nothing', async function () {
const path = basePath + server.video + '/blacklist'
const fields = {}
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields })
})
it('Should fail with a wrong video', async function () {
const wrongPath = '/api/v1/videos/blabla/blacklist'
const fields = {}
await makePostBodyRequest({ url: server.url, path: wrongPath, token: server.accessToken, fields })
})
it('Should fail with a non authenticated user', async function () {
const fields = {}
const path = basePath + server.video + '/blacklist'
await makePostBodyRequest({ url: server.url, path, token: 'hello', fields, statusCodeExpected: 401 })
})
it('Should fail with a non admin user', async function () {
const fields = {}
const path = basePath + server.video + '/blacklist'
await makePostBodyRequest({ url: server.url, path, token: userAccessToken, fields, statusCodeExpected: 403 })
})
it('Should fail with a local video', async function () {
const fields = {}
const path = basePath + server.video.id + '/blacklist'
await makePostBodyRequest({ url: server.url, path, token: server.accessToken, fields, statusCodeExpected: 403 })
})
})
describe('When removing a video in blacklist', function () {
const basePath = '/api/v1/videos/'
it('Should fail with a non authenticated user', async function () {
const path = basePath + server.video.id + '/blacklist'
await request(server.url)
.delete(path)
.set('Authorization', 'Bearer ' + 'fake token')
.set('Accept', 'application/json')
.expect(401)
})
it('Should fail with a non admin user', async function () {
const path = basePath + server.video.id + '/blacklist'
await request(server.url)
.delete(path)
.set('Authorization', 'Bearer ' + userAccessToken)
.set('Accept', 'application/json')
.expect(403)
})
it('Should fail with an incorrect id', async function () {
const path = basePath + 'foobar/blacklist'
await request(server.url)
.delete(path)
.set('Authorization', 'Bearer ' + server.accessToken)
.set('Accept', 'application/json')
.expect(400)
})
it('Should fail with a not blacklisted video', async function () {
// The video was not added to the blacklist so it should fail
const path = basePath + server.video.id + '/blacklist'
await request(server.url)
.delete(path)
.set('Authorization', 'Bearer ' + server.accessToken)
.set('Accept', 'application/json')
.expect(404)
})
})
describe('When listing videos in blacklist', function () {
const basePath = '/api/v1/videos/blacklist/'
it('Should fail with a non authenticated user', async function () {
const path = basePath
await request(server.url)
.get(path)
.query({ sort: 'createdAt' })
.set('Accept', 'application/json')
.set('Authorization', 'Bearer ' + 'fake token')
.expect(401)
})
it('Should fail with a non admin user', async function () {
const path = basePath
await request(server.url)
.get(path)
.query({ sort: 'createdAt' })
.set('Authorization', 'Bearer ' + userAccessToken)
.set('Accept', 'application/json')
.expect(403)
})
it('Should fail with a bad start pagination', async function () {
const path = basePath
await request(server.url)
.get(path)
.query({ start: 'foobar' })
.set('Accept', 'application/json')
.set('Authorization', 'Bearer ' + server.accessToken)
.expect(400)
})
it('Should fail with a bad count pagination', async function () {
const path = basePath
await request(server.url)
.get(path)
.query({ count: 'foobar' })
.set('Accept', 'application/json')
.set('Authorization', 'Bearer ' + server.accessToken)
.expect(400)
})
it('Should fail with an incorrect sort', async function () {
const path = basePath
await request(server.url)
.get(path)
.query({ sort: 'foobar' })
.set('Accept', 'application/json')
.set('Authorization', 'Bearer ' + server.accessToken)
.expect(400)
})
})
after(async function () {
killallServers([ server ])
// Keep the logs if the test failed
if (this['ok']) {
await flushTests()
}
})
})