1
0
Fork 0
mirror of https://github.com/Chocobozzz/PeerTube.git synced 2025-10-05 10:49:28 +02:00

Refactor requests

This commit is contained in:
Chocobozzz 2021-07-16 10:42:24 +02:00
parent 08642a765e
commit c0e8b12e7f
No known key found for this signature in database
GPG key ID: 583A612D890159BE
230 changed files with 948 additions and 1064 deletions

View file

@ -1,24 +1,20 @@
/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
import 'mocha'
import {
checkBadCountPagination,
checkBadSortPagination,
checkBadStartPagination,
cleanupTests,
createSingleServer,
makeDeleteRequest,
makeGetRequest,
makePostBodyRequest,
PeerTubeServer,
setAccessTokensToServers
} from '../../../../shared/extra-utils'
import {
checkBadCountPagination,
checkBadSortPagination,
checkBadStartPagination
} from '../../../../shared/extra-utils/requests/check-api-params'
import { waitJobs } from '../../../../shared/extra-utils/server/jobs'
import { HttpStatusCode } from '../../../../shared/core-utils/miscs/http-error-codes'
setAccessTokensToServers,
waitJobs
} from '@shared/extra-utils'
import { HttpStatusCode } from '@shared/models'
describe('Test user subscriptions API validators', function () {
const path = '/api/v1/users/me/subscriptions'
@ -59,7 +55,7 @@ describe('Test user subscriptions API validators', function () {
await makeGetRequest({
url: server.url,
path,
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
@ -68,7 +64,7 @@ describe('Test user subscriptions API validators', function () {
url: server.url,
path,
token: userAccessToken,
statusCodeExpected: HttpStatusCode.OK_200
expectedStatus: HttpStatusCode.OK_200
})
})
})
@ -92,7 +88,7 @@ describe('Test user subscriptions API validators', function () {
await makeGetRequest({
url: server.url,
path,
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
@ -101,7 +97,7 @@ describe('Test user subscriptions API validators', function () {
url: server.url,
path,
token: userAccessToken,
statusCodeExpected: HttpStatusCode.OK_200
expectedStatus: HttpStatusCode.OK_200
})
})
})
@ -112,7 +108,7 @@ describe('Test user subscriptions API validators', function () {
url: server.url,
path,
fields: { uri: 'user1_channel@localhost:' + server.port },
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
@ -122,7 +118,7 @@ describe('Test user subscriptions API validators', function () {
path,
token: server.accessToken,
fields: { uri: 'root' },
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
await makePostBodyRequest({
@ -130,7 +126,7 @@ describe('Test user subscriptions API validators', function () {
path,
token: server.accessToken,
fields: { uri: 'root@' },
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
await makePostBodyRequest({
@ -138,7 +134,7 @@ describe('Test user subscriptions API validators', function () {
path,
token: server.accessToken,
fields: { uri: 'root@hello@' },
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
})
@ -150,7 +146,7 @@ describe('Test user subscriptions API validators', function () {
path,
token: server.accessToken,
fields: { uri: 'user1_channel@localhost:' + server.port },
statusCodeExpected: HttpStatusCode.NO_CONTENT_204
expectedStatus: HttpStatusCode.NO_CONTENT_204
})
await waitJobs([ server ])
@ -162,7 +158,7 @@ describe('Test user subscriptions API validators', function () {
await makeGetRequest({
url: server.url,
path: path + '/user1_channel@localhost:' + server.port,
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
@ -171,21 +167,21 @@ describe('Test user subscriptions API validators', function () {
url: server.url,
path: path + '/root',
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
await makeGetRequest({
url: server.url,
path: path + '/root@',
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
await makeGetRequest({
url: server.url,
path: path + '/root@hello@',
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
})
@ -194,7 +190,7 @@ describe('Test user subscriptions API validators', function () {
url: server.url,
path: path + '/root1@localhost:' + server.port,
token: server.accessToken,
statusCodeExpected: HttpStatusCode.NOT_FOUND_404
expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
@ -203,7 +199,7 @@ describe('Test user subscriptions API validators', function () {
url: server.url,
path: path + '/user1_channel@localhost:' + server.port,
token: server.accessToken,
statusCodeExpected: HttpStatusCode.OK_200
expectedStatus: HttpStatusCode.OK_200
})
})
})
@ -215,7 +211,7 @@ describe('Test user subscriptions API validators', function () {
await makeGetRequest({
url: server.url,
path: existPath,
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
@ -225,7 +221,7 @@ describe('Test user subscriptions API validators', function () {
path: existPath,
query: { uris: 'toto' },
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
await makeGetRequest({
@ -233,7 +229,7 @@ describe('Test user subscriptions API validators', function () {
path: existPath,
query: { 'uris[]': 1 },
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
})
@ -243,7 +239,7 @@ describe('Test user subscriptions API validators', function () {
path: existPath,
query: { 'uris[]': 'coucou@localhost:' + server.port },
token: server.accessToken,
statusCodeExpected: HttpStatusCode.OK_200
expectedStatus: HttpStatusCode.OK_200
})
})
})
@ -253,7 +249,7 @@ describe('Test user subscriptions API validators', function () {
await makeDeleteRequest({
url: server.url,
path: path + '/user1_channel@localhost:' + server.port,
statusCodeExpected: HttpStatusCode.UNAUTHORIZED_401
expectedStatus: HttpStatusCode.UNAUTHORIZED_401
})
})
@ -262,21 +258,21 @@ describe('Test user subscriptions API validators', function () {
url: server.url,
path: path + '/root',
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
await makeDeleteRequest({
url: server.url,
path: path + '/root@',
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
await makeDeleteRequest({
url: server.url,
path: path + '/root@hello@',
token: server.accessToken,
statusCodeExpected: HttpStatusCode.BAD_REQUEST_400
expectedStatus: HttpStatusCode.BAD_REQUEST_400
})
})
@ -285,7 +281,7 @@ describe('Test user subscriptions API validators', function () {
url: server.url,
path: path + '/root1@localhost:' + server.port,
token: server.accessToken,
statusCodeExpected: HttpStatusCode.NOT_FOUND_404
expectedStatus: HttpStatusCode.NOT_FOUND_404
})
})
@ -294,7 +290,7 @@ describe('Test user subscriptions API validators', function () {
url: server.url,
path: path + '/user1_channel@localhost:' + server.port,
token: server.accessToken,
statusCodeExpected: HttpStatusCode.NO_CONTENT_204
expectedStatus: HttpStatusCode.NO_CONTENT_204
})
})
})