2023-02-22 11:55:31 +11:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2022-03-29 08:57:38 +11:00
|
|
|
require 'rails_helper'
|
|
|
|
|
2024-01-27 04:41:13 +11:00
|
|
|
RSpec.describe 'API V2 Admin Accounts' do
|
2022-07-05 10:41:40 +10:00
|
|
|
let(:role) { UserRole.find_by(name: 'Moderator') }
|
2022-03-29 08:57:38 +11:00
|
|
|
let(:user) { Fabricate(:user, role: role) }
|
|
|
|
let(:scopes) { 'admin:read admin:write' }
|
|
|
|
let(:token) { Fabricate(:accessible_access_token, resource_owner_id: user.id, scopes: scopes) }
|
2024-01-27 04:41:13 +11:00
|
|
|
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
2022-03-29 08:57:38 +11:00
|
|
|
let(:account) { Fabricate(:account) }
|
|
|
|
|
|
|
|
describe 'GET #index' do
|
|
|
|
let!(:remote_account) { Fabricate(:account, domain: 'example.org') }
|
|
|
|
let!(:other_remote_account) { Fabricate(:account, domain: 'foo.bar') }
|
|
|
|
let!(:suspended_account) { Fabricate(:account, suspended: true) }
|
|
|
|
let!(:suspended_remote) { Fabricate(:account, domain: 'foo.bar', suspended: true) }
|
|
|
|
let!(:disabled_account) { Fabricate(:user, disabled: true).account }
|
|
|
|
let!(:pending_account) { Fabricate(:user, approved: false).account }
|
|
|
|
let!(:admin_account) { user.account }
|
|
|
|
|
|
|
|
let(:params) { {} }
|
|
|
|
|
|
|
|
before do
|
|
|
|
pending_account.user.update(approved: false)
|
2024-01-27 04:41:13 +11:00
|
|
|
|
|
|
|
get '/api/v2/admin/accounts', params: params, headers: headers
|
2022-03-29 08:57:38 +11:00
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'forbidden for wrong scope', 'write:statuses'
|
2022-07-05 10:41:40 +10:00
|
|
|
it_behaves_like 'forbidden for wrong role', ''
|
2022-03-29 08:57:38 +11:00
|
|
|
|
2023-12-21 21:10:18 +11:00
|
|
|
context 'when called with status active and origin local and permissions staff' do
|
|
|
|
let(:params) { { status: 'active', origin: 'local', permissions: 'staff' } }
|
|
|
|
|
|
|
|
it 'returns the correct accounts' do
|
|
|
|
expect(response).to have_http_status(200)
|
|
|
|
expect(body_json_ids).to eq([admin_account.id])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when called with by_domain value and origin remote' do
|
|
|
|
let(:params) { { by_domain: 'example.org', origin: 'remote' } }
|
|
|
|
|
|
|
|
it 'returns the correct accounts' do
|
|
|
|
expect(response).to have_http_status(200)
|
|
|
|
expect(body_json_ids).to include(remote_account.id)
|
|
|
|
expect(body_json_ids).to_not include(other_remote_account.id)
|
2022-03-29 08:57:38 +11:00
|
|
|
end
|
|
|
|
end
|
2023-06-19 16:53:05 +10:00
|
|
|
|
2023-12-21 21:10:18 +11:00
|
|
|
context 'when called with status suspended' do
|
|
|
|
let(:params) { { status: 'suspended' } }
|
|
|
|
|
|
|
|
it 'returns the correct accounts' do
|
|
|
|
expect(response).to have_http_status(200)
|
|
|
|
expect(body_json_ids).to include(suspended_remote.id, suspended_account.id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when called with status disabled' do
|
|
|
|
let(:params) { { status: 'disabled' } }
|
|
|
|
|
|
|
|
it 'returns the correct accounts' do
|
|
|
|
expect(response).to have_http_status(200)
|
|
|
|
expect(body_json_ids).to include(disabled_account.id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when called with status pending' do
|
|
|
|
let(:params) { { status: 'pending' } }
|
|
|
|
|
|
|
|
it 'returns the correct accounts' do
|
|
|
|
expect(response).to have_http_status(200)
|
|
|
|
expect(body_json_ids).to include(pending_account.id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def body_json_ids
|
|
|
|
body_as_json.map { |a| a[:id].to_i }
|
|
|
|
end
|
|
|
|
|
2023-06-19 16:53:05 +10:00
|
|
|
context 'with limit param' do
|
|
|
|
let(:params) { { limit: 1 } }
|
|
|
|
|
|
|
|
it 'sets the correct pagination headers' do
|
|
|
|
expect(response.headers['Link'].find_link(%w(rel next)).href).to eq api_v2_admin_accounts_url(limit: 1, max_id: admin_account.id)
|
|
|
|
end
|
|
|
|
end
|
2022-03-29 08:57:38 +11:00
|
|
|
end
|
|
|
|
end
|