123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338 |
- /* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
- import { omit } from 'lodash'
- import 'mocha'
- import { CustomConfig } from '../../../../shared/models/server/custom-config.model'
- import {
- cleanupTests,
- createUser,
- flushAndRunServer,
- immutableAssign,
- makeDeleteRequest,
- makeGetRequest,
- makePutBodyRequest,
- ServerInfo,
- setAccessTokensToServers,
- userLogin
- } from '../../../../shared/extra-utils'
- import { HttpStatusCode } from '../../../../shared/core-utils/miscs/http-error-codes'
- describe('Test config API validators', function () {
- const path = '/api/v1/config/custom'
- let server: ServerInfo
- let userAccessToken: string
- const updateParams: CustomConfig = {
- instance: {
- name: 'PeerTube updated',
- shortDescription: 'my short description',
- description: 'my super description',
- terms: 'my super terms',
- codeOfConduct: 'my super coc',
- creationReason: 'my super reason',
- moderationInformation: 'my super moderation information',
- administrator: 'Kuja',
- maintenanceLifetime: 'forever',
- businessModel: 'my super business model',
- hardwareInformation: '2vCore 3GB RAM',
- languages: [ 'en', 'es' ],
- categories: [ 1, 2 ],
- isNSFW: true,
- defaultClientRoute: '/videos/recently-added',
- defaultNSFWPolicy: 'blur',
- customizations: {
- javascript: 'alert("coucou")',
- css: 'body { background-color: red; }'
- }
- },
- theme: {
- default: 'default'
- },
- services: {
- twitter: {
- username: '@MySuperUsername',
- whitelisted: true
- }
- },
- cache: {
- previews: {
- size: 2
- },
- captions: {
- size: 3
- }
- },
- signup: {
- enabled: false,
- limit: 5,
- requiresEmailVerification: false
- },
- admin: {
- email: 'superadmin1@example.com'
- },
- contactForm: {
- enabled: false
- },
- user: {
- videoQuota: 5242881,
- videoQuotaDaily: 318742
- },
- transcoding: {
- enabled: true,
- allowAdditionalExtensions: true,
- allowAudioFiles: true,
- threads: 1,
- resolutions: {
- '0p': false,
- '240p': false,
- '360p': true,
- '480p': true,
- '720p': false,
- '1080p': false,
- '1440p': false,
- '2160p': false
- },
- webtorrent: {
- enabled: true
- },
- hls: {
- enabled: false
- }
- },
- live: {
- enabled: true,
- allowReplay: false,
- maxDuration: 30,
- maxInstanceLives: -1,
- maxUserLives: 50,
- transcoding: {
- enabled: true,
- threads: 4,
- resolutions: {
- '240p': true,
- '360p': true,
- '480p': true,
- '720p': true,
- '1080p': true,
- '1440p': true,
- '2160p': true
- }
- }
- },
- import: {
- videos: {
- http: {
- enabled: false
- },
- torrent: {
- enabled: false
- }
- }
- },
- autoBlacklist: {
- videos: {
- ofUsers: {
- enabled: false
- }
- }
- },
- followers: {
- instance: {
- enabled: false,
- manualApproval: true
- }
- },
- followings: {
- instance: {
- autoFollowBack: {
- enabled: true
- },
- autoFollowIndex: {
- enabled: true,
- indexUrl: 'https://index.example.com'
- }
- }
- },
- broadcastMessage: {
- enabled: true,
- dismissable: true,
- message: 'super message',
- level: 'warning'
- },
- search: {
- remoteUri: {
- users: true,
- anonymous: true
- },
- searchIndex: {
- enabled: true,
- url: 'https://search.joinpeertube.org',
- disableLocalSearch: true,
- isDefaultSearch: true
- }
- }
- }
- // ---------------------------------------------------------------
- before(async function () {
- this.timeout(30000)
- server = await flushAndRunServer(1)
- await setAccessTokensToServers([ server ])
- const user = {
- username: 'user1',
- password: 'password'
- }
- await createUser({ url: server.url, accessToken: server.accessToken, username: user.username, password: user.password })
- userAccessToken = await userLogin(server, user)
- })
- describe('When getting the configuration', function () {
- it('Should fail without token', async function () {
- await makeGetRequest({
- url: server.url,
- path,
- statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
- })
- })
- it('Should fail if the user is not an administrator', async function () {
- await makeGetRequest({
- url: server.url,
- path,
- token: userAccessToken,
- statusCodeExpected: HttpStatusCode.FORBIDDEN_403
- })
- })
- })
- describe('When updating the configuration', function () {
- it('Should fail without token', async function () {
- await makePutBodyRequest({
- url: server.url,
- path,
- fields: updateParams,
- statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
- })
- })
- it('Should fail if the user is not an administrator', async function () {
- await makePutBodyRequest({
- url: server.url,
- path,
- fields: updateParams,
- token: userAccessToken,
- statusCodeExpected: HttpStatusCode.FORBIDDEN_403
- })
- })
- it('Should fail if it misses a key', async function () {
- const newUpdateParams = omit(updateParams, 'admin.email')
- await makePutBodyRequest({
- url: server.url,
- path,
- fields: newUpdateParams,
- token: server.accessToken,
- statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
- })
- })
- it('Should fail with a bad default NSFW policy', async function () {
- const newUpdateParams = immutableAssign(updateParams, {
- instance: {
- defaultNSFWPolicy: 'hello'
- }
- })
- await makePutBodyRequest({
- url: server.url,
- path,
- fields: newUpdateParams,
- token: server.accessToken,
- statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
- })
- })
- it('Should fail if email disabled and signup requires email verification', async function () {
- // opposite scenario - success when enable enabled - covered via tests/api/users/user-verification.ts
- const newUpdateParams = immutableAssign(updateParams, {
- signup: {
- enabled: true,
- limit: 5,
- requiresEmailVerification: true
- }
- })
- await makePutBodyRequest({
- url: server.url,
- path,
- fields: newUpdateParams,
- token: server.accessToken,
- statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
- })
- })
- it('Should fail with a disabled webtorrent & hls transcoding', async function () {
- const newUpdateParams = immutableAssign(updateParams, {
- transcoding: {
- hls: {
- enabled: false
- },
- webtorrent: {
- enabled: false
- }
- }
- })
- await makePutBodyRequest({
- url: server.url,
- path,
- fields: newUpdateParams,
- token: server.accessToken,
- statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
- })
- })
- it('Should success with the correct parameters', async function () {
- await makePutBodyRequest({
- url: server.url,
- path,
- fields: updateParams,
- token: server.accessToken,
- statusCodeExpected: HttpStatusCode.OK_200
- })
- })
- })
- describe('When deleting the configuration', function () {
- it('Should fail without token', async function () {
- await makeDeleteRequest({
- url: server.url,
- path,
- statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
- })
- })
- it('Should fail if the user is not an administrator', async function () {
- await makeDeleteRequest({
- url: server.url,
- path,
- token: userAccessToken,
- statusCodeExpected: HttpStatusCode.FORBIDDEN_403
- })
- })
- })
- after(async function () {
- await cleanupTests([ server ])
- })
- })
|