mirror of
https://github.com/Chocobozzz/PeerTube.git
synced 2024-05-18 04:42:40 +00:00
e57c3024f4
* testing not removing old file and adding columb to db * implement feature * remove unnecessary config changes * use only keptOriginalFileName, change keptOriginalFileName to keptOriginalFilename for consistency with with videoFile table, slight refactor with basename() * save original video files to dedicated directory original-video-files * begin implementing object storage (bucket) support --------- Co-authored-by: chagai.friedlander <chagai.friedlander@fairkom.eu> Co-authored-by: Ian <ian.kraft@hotmail.com> Co-authored-by: Chocobozzz <me@florianbigard.com>
306 lines
8.5 KiB
TypeScript
306 lines
8.5 KiB
TypeScript
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
|
|
import merge from 'lodash-es/merge.js'
|
|
import { omit } from '@peertube/peertube-core-utils'
|
|
import { ActorImageType, CustomConfig, HttpStatusCode } from '@peertube/peertube-models'
|
|
import {
|
|
cleanupTests,
|
|
createSingleServer,
|
|
makeDeleteRequest,
|
|
makeGetRequest,
|
|
makePutBodyRequest,
|
|
makeUploadRequest,
|
|
PeerTubeServer,
|
|
setAccessTokensToServers
|
|
} from '@peertube/peertube-server-commands'
|
|
import { buildAbsoluteFixturePath } from '@peertube/peertube-node-utils'
|
|
|
|
describe('Test config API validators', function () {
|
|
const path = '/api/v1/config/custom'
|
|
let server: PeerTubeServer
|
|
let userAccessToken: string
|
|
|
|
let updateParams: CustomConfig
|
|
|
|
// ---------------------------------------------------------------
|
|
|
|
before(async function () {
|
|
this.timeout(30000)
|
|
|
|
server = await createSingleServer(1)
|
|
|
|
await setAccessTokensToServers([ server ])
|
|
updateParams = await server.config.getCustomConfig()
|
|
|
|
const user = {
|
|
username: 'user1',
|
|
password: 'password'
|
|
}
|
|
await server.users.create({ username: user.username, password: user.password })
|
|
userAccessToken = await server.login.getAccessToken(user)
|
|
})
|
|
|
|
describe('When getting the configuration', function () {
|
|
it('Should fail without token', async function () {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path,
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
|
|
})
|
|
})
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
await makeGetRequest({
|
|
url: server.url,
|
|
path,
|
|
token: userAccessToken,
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('When updating the configuration', function () {
|
|
it('Should fail without token', async function () {
|
|
await makePutBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: updateParams,
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
|
|
})
|
|
})
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
await makePutBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: updateParams,
|
|
token: userAccessToken,
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
|
|
it('Should fail if it misses a key', async function () {
|
|
const newUpdateParams = { ...updateParams, admin: omit(updateParams.admin, [ 'email' ]) }
|
|
|
|
await makePutBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: newUpdateParams,
|
|
token: server.accessToken,
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail with a bad default NSFW policy', async function () {
|
|
const newUpdateParams = {
|
|
...updateParams,
|
|
|
|
instance: {
|
|
defaultNSFWPolicy: 'hello'
|
|
}
|
|
}
|
|
|
|
await makePutBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: newUpdateParams,
|
|
token: server.accessToken,
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail if email disabled and signup requires email verification', async function () {
|
|
// opposite scenario - success when enable enabled - covered via tests/api/users/user-verification.ts
|
|
const newUpdateParams = {
|
|
...updateParams,
|
|
|
|
signup: {
|
|
enabled: true,
|
|
limit: 5,
|
|
requiresApproval: true,
|
|
requiresEmailVerification: true
|
|
}
|
|
}
|
|
|
|
await makePutBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: newUpdateParams,
|
|
token: server.accessToken,
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail with a disabled web videos & hls transcoding', async function () {
|
|
const newUpdateParams = {
|
|
...updateParams,
|
|
|
|
transcoding: {
|
|
hls: {
|
|
enabled: false
|
|
},
|
|
web_videos: {
|
|
enabled: false
|
|
}
|
|
}
|
|
}
|
|
|
|
await makePutBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: newUpdateParams,
|
|
token: server.accessToken,
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should fail with a disabled http upload & enabled sync', async function () {
|
|
const newUpdateParams: CustomConfig = merge({}, updateParams, {
|
|
import: {
|
|
videos: {
|
|
http: { enabled: false }
|
|
},
|
|
videoChannelSynchronization: { enabled: true }
|
|
}
|
|
})
|
|
|
|
await makePutBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: newUpdateParams,
|
|
token: server.accessToken,
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
})
|
|
|
|
it('Should succeed with the correct parameters', async function () {
|
|
await makePutBodyRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: updateParams,
|
|
token: server.accessToken,
|
|
expectedStatus: HttpStatusCode.OK_200
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('When deleting the configuration', function () {
|
|
|
|
it('Should fail without token', async function () {
|
|
await makeDeleteRequest({
|
|
url: server.url,
|
|
path,
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
|
|
})
|
|
})
|
|
|
|
it('Should fail if the user is not an administrator', async function () {
|
|
await makeDeleteRequest({
|
|
url: server.url,
|
|
path,
|
|
token: userAccessToken,
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('Updating instance image', function () {
|
|
const toTest = [
|
|
{ path: '/api/v1/config/instance-banner/pick', attachName: 'bannerfile' },
|
|
{ path: '/api/v1/config/instance-avatar/pick', attachName: 'avatarfile' }
|
|
]
|
|
|
|
it('Should fail with an incorrect input file', async function () {
|
|
for (const { attachName, path } of toTest) {
|
|
const attaches = { [attachName]: buildAbsoluteFixturePath('video_short.mp4') }
|
|
|
|
await makeUploadRequest({ url: server.url, path, token: server.accessToken, fields: {}, attaches })
|
|
}
|
|
})
|
|
|
|
it('Should fail with a big file', async function () {
|
|
for (const { attachName, path } of toTest) {
|
|
const attaches = { [attachName]: buildAbsoluteFixturePath('avatar-big.png') }
|
|
|
|
await makeUploadRequest({
|
|
url: server.url,
|
|
path,
|
|
token: server.accessToken,
|
|
fields: {},
|
|
attaches,
|
|
expectedStatus: HttpStatusCode.BAD_REQUEST_400
|
|
})
|
|
}
|
|
})
|
|
|
|
it('Should fail without token', async function () {
|
|
for (const { attachName, path } of toTest) {
|
|
const attaches = { [attachName]: buildAbsoluteFixturePath('avatar.png') }
|
|
|
|
await makeUploadRequest({
|
|
url: server.url,
|
|
path,
|
|
fields: {},
|
|
attaches,
|
|
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
|
|
})
|
|
}
|
|
})
|
|
|
|
it('Should fail without the appropriate rights', async function () {
|
|
for (const { attachName, path } of toTest) {
|
|
const attaches = { [attachName]: buildAbsoluteFixturePath('avatar.png') }
|
|
|
|
await makeUploadRequest({
|
|
url: server.url,
|
|
path,
|
|
token: userAccessToken,
|
|
fields: {},
|
|
attaches,
|
|
expectedStatus: HttpStatusCode.FORBIDDEN_403
|
|
})
|
|
}
|
|
})
|
|
|
|
it('Should succeed with the correct params', async function () {
|
|
for (const { attachName, path } of toTest) {
|
|
const attaches = { [attachName]: buildAbsoluteFixturePath('avatar.png') }
|
|
|
|
await makeUploadRequest({
|
|
url: server.url,
|
|
path,
|
|
token: server.accessToken,
|
|
fields: {},
|
|
attaches,
|
|
expectedStatus: HttpStatusCode.NO_CONTENT_204
|
|
})
|
|
}
|
|
})
|
|
})
|
|
|
|
describe('Deleting instance image', function () {
|
|
const types = [ ActorImageType.BANNER, ActorImageType.AVATAR ]
|
|
|
|
it('Should fail without token', async function () {
|
|
for (const type of types) {
|
|
await server.config.deleteInstanceImage({ type, token: null, expectedStatus: HttpStatusCode.UNAUTHORIZED_401 })
|
|
}
|
|
})
|
|
|
|
it('Should fail without the appropriate rights', async function () {
|
|
for (const type of types) {
|
|
await server.config.deleteInstanceImage({ type, token: userAccessToken, expectedStatus: HttpStatusCode.FORBIDDEN_403 })
|
|
}
|
|
})
|
|
|
|
it('Should succeed with the correct params', async function () {
|
|
for (const type of types) {
|
|
await server.config.deleteInstanceImage({ type })
|
|
}
|
|
})
|
|
})
|
|
|
|
after(async function () {
|
|
await cleanupTests([ server ])
|
|
})
|
|
})
|