225 lines
8.3 KiB
TypeScript

import { afterAll, beforeAll, describe, expect, it } from '@jest/globals';
import { MeetRoomMemberRole, MeetRoomMemberTokenMetadata } from '@openvidu-meet/typings';
import { Express } from 'express';
import request from 'supertest';
import { INTERNAL_CONFIG } from '../../../../src/config/internal-config.js';
import { MEET_ENV } from '../../../../src/environment.js';
import { getPermissions } from '../../../helpers/assertion-helpers.js';
import {
deleteAllRooms,
disconnectFakeParticipants,
joinFakeParticipant,
loginRootAdmin,
startTestServer,
updateParticipantMetadata
} from '../../../helpers/request-helpers.js';
import { setupRoomMember, setupSingleRoom, updateRoomMemberPermissions } from '../../../helpers/test-scenarios.js';
import { RoomData, RoomMemberData } from '../../../interfaces/scenarios.js';
const MEETINGS_PATH = `${INTERNAL_CONFIG.INTERNAL_API_BASE_PATH_V1}/meetings`;
describe('Meeting API Security Tests', () => {
const participantIdentity = 'TEST_PARTICIPANT';
let app: Express;
let rootAdminAccessToken: string;
let roomData: RoomData;
let roomId: string;
let roomMember: RoomMemberData;
beforeAll(async () => {
app = await startTestServer();
({ accessToken: rootAdminAccessToken } = await loginRootAdmin());
roomData = await setupSingleRoom();
roomId = roomData.room.roomId;
roomMember = await setupRoomMember(roomId, {
name: 'External Member',
baseRole: MeetRoomMemberRole.MODERATOR
});
});
afterAll(async () => {
await disconnectFakeParticipants();
await deleteAllRooms();
});
describe('End Meeting Tests', () => {
it('should fail when request includes API key', async () => {
const response = await request(app)
.delete(`${MEETINGS_PATH}/${roomId}`)
.set(INTERNAL_CONFIG.API_KEY_HEADER, MEET_ENV.INITIAL_API_KEY);
expect(response.status).toBe(401);
});
it('should fail when using access token', async () => {
const response = await request(app)
.delete(`${MEETINGS_PATH}/${roomId}`)
.set(INTERNAL_CONFIG.ACCESS_TOKEN_HEADER, rootAdminAccessToken);
expect(response.status).toBe(401);
});
it('should succeed when using room member token with canEndMeeting permission', async () => {
// Update room member to have canEndMeeting permission
roomMember = await updateRoomMemberPermissions(roomId, roomMember.member.memberId, { canEndMeeting: true });
const response = await request(app)
.delete(`${MEETINGS_PATH}/${roomId}`)
.set(INTERNAL_CONFIG.ROOM_MEMBER_TOKEN_HEADER, roomMember.memberToken);
expect(response.status).toBe(200);
// Re-join participant for further tests
await joinFakeParticipant(roomId, participantIdentity);
});
it('should fail when using room member token without canEndMeeting permission', async () => {
// Update room member to not have canEndMeeting permission
roomMember = await updateRoomMemberPermissions(roomId, roomMember.member.memberId, {
canEndMeeting: false
});
const response = await request(app)
.delete(`${MEETINGS_PATH}/${roomId}`)
.set(INTERNAL_CONFIG.ROOM_MEMBER_TOKEN_HEADER, roomMember.memberToken);
expect(response.status).toBe(403);
});
it('should fail when using room member token from a different room', async () => {
const newRoomData = await setupSingleRoom();
const response = await request(app)
.delete(`${MEETINGS_PATH}/${roomId}`)
.set(INTERNAL_CONFIG.ROOM_MEMBER_TOKEN_HEADER, newRoomData.moderatorToken);
expect(response.status).toBe(403);
});
});
describe('Update Participant in Meeting Tests', () => {
const role = MeetRoomMemberRole.MODERATOR;
const setParticipantMetadata = async () => {
const metadata: MeetRoomMemberTokenMetadata = {
livekitUrl: MEET_ENV.LIVEKIT_URL,
roomId,
baseRole: MeetRoomMemberRole.SPEAKER,
effectivePermissions: getPermissions(MeetRoomMemberRole.SPEAKER)
};
await updateParticipantMetadata(roomId, participantIdentity, metadata);
};
beforeAll(async () => {
// Ensure participant has the correct metadata before tests
await setParticipantMetadata();
});
it('should fail when request includes API key', async () => {
const response = await request(app)
.put(`${MEETINGS_PATH}/${roomId}/participants/${participantIdentity}/role`)
.set(INTERNAL_CONFIG.API_KEY_HEADER, MEET_ENV.INITIAL_API_KEY)
.send({ role });
expect(response.status).toBe(401);
});
it('should fail when using access token', async () => {
const response = await request(app)
.put(`${MEETINGS_PATH}/${roomId}/participants/${participantIdentity}/role`)
.set(INTERNAL_CONFIG.ACCESS_TOKEN_HEADER, rootAdminAccessToken)
.send({ role });
expect(response.status).toBe(401);
});
it('should succeed when using room member token with canMakeModerator permission', async () => {
// Update room member to have canMakeModerator permission
roomMember = await updateRoomMemberPermissions(roomId, roomMember.member.memberId, {
canMakeModerator: true
});
const response = await request(app)
.put(`${MEETINGS_PATH}/${roomId}/participants/${participantIdentity}/role`)
.set(INTERNAL_CONFIG.ROOM_MEMBER_TOKEN_HEADER, roomMember.memberToken)
.send({ role });
expect(response.status).toBe(200);
// Re-join participant for further tests
await joinFakeParticipant(roomId, participantIdentity);
await setParticipantMetadata();
});
it('should fail when using room member token without canMakeModerator permission', async () => {
// Update room member to not have canMakeModerator permission
roomMember = await updateRoomMemberPermissions(roomId, roomMember.member.memberId, {
canMakeModerator: false
});
const response = await request(app)
.put(`${MEETINGS_PATH}/${roomId}/participants/${participantIdentity}/role`)
.set(INTERNAL_CONFIG.ROOM_MEMBER_TOKEN_HEADER, roomMember.memberToken)
.send({ role });
expect(response.status).toBe(403);
});
it('should fail when using room member token from a different room', async () => {
const newRoomData = await setupSingleRoom();
const response = await request(app)
.put(`${MEETINGS_PATH}/${roomId}/participants/${participantIdentity}/role`)
.set(INTERNAL_CONFIG.ROOM_MEMBER_TOKEN_HEADER, newRoomData.moderatorToken)
.send({ role });
expect(response.status).toBe(403);
});
});
describe('Kick Participant from Meeting Tests', () => {
it('should fail when request includes API key', async () => {
const response = await request(app)
.delete(`${MEETINGS_PATH}/${roomId}/participants/${participantIdentity}`)
.set(INTERNAL_CONFIG.API_KEY_HEADER, MEET_ENV.INITIAL_API_KEY);
expect(response.status).toBe(401);
});
it('should fail when using access token', async () => {
const response = await request(app)
.delete(`${MEETINGS_PATH}/${roomId}/participants/${participantIdentity}`)
.set(INTERNAL_CONFIG.ACCESS_TOKEN_HEADER, rootAdminAccessToken);
expect(response.status).toBe(401);
});
it('should succeed when using room member token with canKickParticipants permission', async () => {
// Update room member to have canKickParticipants permission
roomMember = await updateRoomMemberPermissions(roomId, roomMember.member.memberId, {
canKickParticipants: true
});
const response = await request(app)
.delete(`${MEETINGS_PATH}/${roomId}/participants/${participantIdentity}`)
.set(INTERNAL_CONFIG.ROOM_MEMBER_TOKEN_HEADER, roomMember.memberToken);
expect(response.status).toBe(200);
// Re-join participant for further tests
await joinFakeParticipant(roomId, participantIdentity);
});
it('should fail when using room member token without canKickParticipants permission', async () => {
// Update room member to not have canKickParticipants permission
roomMember = await updateRoomMemberPermissions(roomId, roomMember.member.memberId, {
canKickParticipants: false
});
const response = await request(app)
.delete(`${MEETINGS_PATH}/${roomId}/participants/${participantIdentity}`)
.set(INTERNAL_CONFIG.ROOM_MEMBER_TOKEN_HEADER, roomMember.memberToken);
expect(response.status).toBe(403);
});
it('should fail when using room member token from a different room', async () => {
const newRoomData = await setupSingleRoom();
const response = await request(app)
.delete(`${MEETINGS_PATH}/${roomId}/participants/${participantIdentity}`)
.set(INTERNAL_CONFIG.ROOM_MEMBER_TOKEN_HEADER, newRoomData.moderatorToken);
expect(response.status).toBe(403);
});
});
});