mirror of https://github.com/Chocobozzz/PeerTube
222 lines
7.1 KiB
TypeScript
222 lines
7.1 KiB
TypeScript
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
|
|
|
|
import 'mocha'
|
|
import {
|
|
cleanupTests,
|
|
createSingleServer,
|
|
makeGetRequest,
|
|
PeerTubeServer,
|
|
setAccessTokensToServers,
|
|
setDefaultVideoChannel
|
|
} from '@shared/server-commands'
|
|
import { HttpStatusCode, UserRole, VideoInclude, VideoPrivacy } from '@shared/models'
|
|
|
|
describe('Test video filters validators', function () {
|
|
let server: PeerTubeServer
|
|
let userAccessToken: string
|
|
let moderatorAccessToken: string
|
|
|
|
// ---------------------------------------------------------------
|
|
|
|
before(async function () {
|
|
this.timeout(30000)
|
|
|
|
server = await createSingleServer(1)
|
|
|
|
await setAccessTokensToServers([ server ])
|
|
await setDefaultVideoChannel([ server ])
|
|
|
|
const user = { username: 'user1', password: 'my super password' }
|
|
await server.users.create({ username: user.username, password: user.password })
|
|
userAccessToken = await server.login.getAccessToken(user)
|
|
|
|
const moderator = { username: 'moderator', password: 'my super password' }
|
|
await server.users.create({ username: moderator.username, password: moderator.password, role: UserRole.MODERATOR })
|
|
|
|
moderatorAccessToken = await server.login.getAccessToken(moderator)
|
|
})
|
|
|
|
describe('When setting a deprecated video filter', function () {
|
|
|
|
async function testEndpoints (token: string, filter: string, expectedStatus: HttpStatusCode) {
|
|
const paths = [
|
|
'/api/v1/video-channels/root_channel/videos',
|
|
'/api/v1/accounts/root/videos',
|
|
'/api/v1/videos',
|
|
'/api/v1/search/videos'
|
|
]
|
|
|
|
for (const path of paths) {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path,
|
|
token,
|
|
query: {
|
|
filter
|
|
},
|
|
expectedStatus
|
|
})
|
|
}
|
|
}
|
|
|
|
it('Should fail with a bad filter', async function () {
|
|
await testEndpoints(server.accessToken, 'bad-filter', HttpStatusCode.BAD_REQUEST_400)
|
|
})
|
|
|
|
it('Should succeed with a good filter', async function () {
|
|
await testEndpoints(server.accessToken, 'local', HttpStatusCode.OK_200)
|
|
})
|
|
|
|
it('Should fail to list all-local/all with a simple user', async function () {
|
|
await testEndpoints(userAccessToken, 'all-local', HttpStatusCode.UNAUTHORIZED_401)
|
|
await testEndpoints(userAccessToken, 'all', HttpStatusCode.UNAUTHORIZED_401)
|
|
})
|
|
|
|
it('Should succeed to list all-local/all with a moderator', async function () {
|
|
await testEndpoints(moderatorAccessToken, 'all-local', HttpStatusCode.OK_200)
|
|
await testEndpoints(moderatorAccessToken, 'all', HttpStatusCode.OK_200)
|
|
})
|
|
|
|
it('Should succeed to list all-local/all with an admin', async function () {
|
|
await testEndpoints(server.accessToken, 'all-local', HttpStatusCode.OK_200)
|
|
await testEndpoints(server.accessToken, 'all', HttpStatusCode.OK_200)
|
|
})
|
|
|
|
// Because we cannot authenticate the user on the RSS endpoint
|
|
it('Should fail on the feeds endpoint with the all-local/all filter', async function () {
|
|
for (const filter of [ 'all', 'all-local' ]) {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path: '/feeds/videos.json',
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401,
|
|
query: {
|
|
filter
|
|
}
|
|
})
|
|
}
|
|
})
|
|
|
|
it('Should succeed on the feeds endpoint with the local filter', async function () {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path: '/feeds/videos.json',
|
|
expectedStatus: HttpStatusCode.OK_200,
|
|
query: {
|
|
filter: 'local'
|
|
}
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('When setting video filters', function () {
|
|
|
|
const validIncludes = [
|
|
VideoInclude.NONE,
|
|
VideoInclude.BLOCKED_OWNER,
|
|
VideoInclude.NOT_PUBLISHED_STATE | VideoInclude.BLACKLISTED
|
|
]
|
|
|
|
async function testEndpoints (options: {
|
|
token?: string
|
|
isLocal?: boolean
|
|
include?: VideoInclude
|
|
privacyOneOf?: VideoPrivacy[]
|
|
expectedStatus: HttpStatusCode
|
|
}) {
|
|
const paths = [
|
|
'/api/v1/video-channels/root_channel/videos',
|
|
'/api/v1/accounts/root/videos',
|
|
'/api/v1/videos',
|
|
'/api/v1/search/videos'
|
|
]
|
|
|
|
for (const path of paths) {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path,
|
|
token: options.token || server.accessToken,
|
|
query: {
|
|
isLocal: options.isLocal,
|
|
privacyOneOf: options.privacyOneOf,
|
|
include: options.include
|
|
},
|
|
expectedStatus: options.expectedStatus
|
|
})
|
|
}
|
|
}
|
|
|
|
it('Should fail with a bad privacyOneOf', async function () {
|
|
await testEndpoints({ privacyOneOf: [ 'toto' ] as any, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
|
|
})
|
|
|
|
it('Should succeed with a good privacyOneOf', async function () {
|
|
await testEndpoints({ privacyOneOf: [ VideoPrivacy.INTERNAL ], expectedStatus: HttpStatusCode.OK_200 })
|
|
})
|
|
|
|
it('Should fail to use privacyOneOf with a simple user', async function () {
|
|
await testEndpoints({
|
|
privacyOneOf: [ VideoPrivacy.INTERNAL ],
|
|
token: userAccessToken,
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
|
|
})
|
|
})
|
|
|
|
it('Should fail with a bad include', async function () {
|
|
await testEndpoints({ include: 'toto' as any, expectedStatus: HttpStatusCode.BAD_REQUEST_400 })
|
|
})
|
|
|
|
it('Should succeed with a good include', async function () {
|
|
for (const include of validIncludes) {
|
|
await testEndpoints({ include, expectedStatus: HttpStatusCode.OK_200 })
|
|
}
|
|
})
|
|
|
|
it('Should fail to include more videos with a simple user', async function () {
|
|
for (const include of validIncludes) {
|
|
await testEndpoints({ token: userAccessToken, include, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
|
|
}
|
|
})
|
|
|
|
it('Should succeed to list all local/all with a moderator', async function () {
|
|
for (const include of validIncludes) {
|
|
await testEndpoints({ token: moderatorAccessToken, include, expectedStatus: HttpStatusCode.OK_200 })
|
|
}
|
|
})
|
|
|
|
it('Should succeed to list all local/all with an admin', async function () {
|
|
for (const include of validIncludes) {
|
|
await testEndpoints({ token: server.accessToken, include, expectedStatus: HttpStatusCode.OK_200 })
|
|
}
|
|
})
|
|
|
|
// Because we cannot authenticate the user on the RSS endpoint
|
|
it('Should fail on the feeds endpoint with the all filter', async function () {
|
|
for (const include of [ VideoInclude.NOT_PUBLISHED_STATE ]) {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path: '/feeds/videos.json',
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401,
|
|
query: {
|
|
include
|
|
}
|
|
})
|
|
}
|
|
})
|
|
|
|
it('Should succeed on the feeds endpoint with the local filter', async function () {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path: '/feeds/videos.json',
|
|
expectedStatus: HttpStatusCode.OK_200,
|
|
query: {
|
|
isLocal: true
|
|
}
|
|
})
|
|
})
|
|
})
|
|
|
|
after(async function () {
|
|
await cleanupTests([ server ])
|
|
})
|
|
})
|