logo

pleroma

My custom branche(s) on git.pleroma.social/pleroma/pleroma git clone https://hacktivis.me/git/pleroma.git

announcement_controller_test.exs (4788B)


  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.Web.MastodonAPI.AnnouncementControllerTest do
  5. use Pleroma.Web.ConnCase
  6. import Pleroma.Factory
  7. alias Pleroma.Announcement
  8. alias Pleroma.AnnouncementReadRelationship
  9. describe "GET /api/v1/announcements" do
  10. setup do
  11. %{conn: conn} = oauth_access([])
  12. {:ok, conn: conn}
  13. end
  14. test "it does not allow guests", %{conn: conn} do
  15. _response =
  16. conn
  17. |> assign(:token, nil)
  18. |> get("/api/v1/announcements")
  19. |> json_response_and_validate_schema(:forbidden)
  20. end
  21. test "it allows users with scopes" do
  22. %{conn: conn} = oauth_access(["read:accounts"])
  23. _response =
  24. conn
  25. |> get("/api/v1/announcements")
  26. |> json_response_and_validate_schema(:ok)
  27. end
  28. test "it lists all announcements", %{conn: conn} do
  29. %{id: id} = insert(:announcement)
  30. response =
  31. conn
  32. |> get("/api/v1/announcements")
  33. |> json_response_and_validate_schema(:ok)
  34. assert [%{"id" => ^id}] = response
  35. end
  36. test "it returns time with utc timezone", %{conn: conn} do
  37. start_time =
  38. NaiveDateTime.utc_now()
  39. |> NaiveDateTime.add(-999_999, :second)
  40. |> NaiveDateTime.truncate(:second)
  41. end_time =
  42. NaiveDateTime.utc_now()
  43. |> NaiveDateTime.add(999_999, :second)
  44. |> NaiveDateTime.truncate(:second)
  45. %{id: id} = insert(:announcement, %{starts_at: start_time, ends_at: end_time})
  46. response =
  47. conn
  48. |> get("/api/v1/announcements")
  49. |> json_response_and_validate_schema(:ok)
  50. assert [%{"id" => ^id}] = [announcement] = response
  51. assert String.ends_with?(announcement["starts_at"], "Z")
  52. assert String.ends_with?(announcement["ends_at"], "Z")
  53. end
  54. test "it does not list announcements starting after current time", %{conn: conn} do
  55. time = NaiveDateTime.utc_now() |> NaiveDateTime.add(999_999, :second)
  56. insert(:announcement, starts_at: time)
  57. response =
  58. conn
  59. |> get("/api/v1/announcements")
  60. |> json_response_and_validate_schema(:ok)
  61. assert [] = response
  62. end
  63. test "it does not list announcements ending before current time", %{conn: conn} do
  64. time = NaiveDateTime.utc_now() |> NaiveDateTime.add(-999_999, :second)
  65. insert(:announcement, ends_at: time)
  66. response =
  67. conn
  68. |> get("/api/v1/announcements")
  69. |> json_response_and_validate_schema(:ok)
  70. assert [] = response
  71. end
  72. test "when authenticated, also expose read property", %{conn: conn} do
  73. %{id: id} = insert(:announcement)
  74. response =
  75. conn
  76. |> get("/api/v1/announcements")
  77. |> json_response_and_validate_schema(:ok)
  78. assert [%{"id" => ^id, "read" => false}] = response
  79. end
  80. test "when authenticated and announcement is read by user" do
  81. %{id: id} = announcement = insert(:announcement)
  82. user = insert(:user)
  83. AnnouncementReadRelationship.mark_read(user, announcement)
  84. %{conn: conn} = oauth_access(["read:accounts"], user: user)
  85. response =
  86. conn
  87. |> get("/api/v1/announcements")
  88. |> json_response_and_validate_schema(:ok)
  89. assert [%{"id" => ^id, "read" => true}] = response
  90. end
  91. end
  92. describe "POST /api/v1/announcements/:id/dismiss" do
  93. setup do: oauth_access(["write:accounts"])
  94. test "it requires auth", %{conn: conn} do
  95. %{id: id} = insert(:announcement)
  96. _response =
  97. conn
  98. |> assign(:token, nil)
  99. |> post("/api/v1/announcements/#{id}/dismiss")
  100. |> json_response_and_validate_schema(:forbidden)
  101. end
  102. test "it requires write:accounts oauth scope" do
  103. %{id: id} = insert(:announcement)
  104. %{conn: conn} = oauth_access(["read:accounts"])
  105. _response =
  106. conn
  107. |> post("/api/v1/announcements/#{id}/dismiss")
  108. |> json_response_and_validate_schema(:forbidden)
  109. end
  110. test "it gives 404 for non-existent announcements", %{conn: conn} do
  111. %{id: id} = insert(:announcement)
  112. _response =
  113. conn
  114. |> post("/api/v1/announcements/#{id}xxx/dismiss")
  115. |> json_response_and_validate_schema(:not_found)
  116. end
  117. test "it marks announcement as read", %{user: user, conn: conn} do
  118. %{id: id} = announcement = insert(:announcement)
  119. refute Announcement.read_by?(announcement, user)
  120. _response =
  121. conn
  122. |> post("/api/v1/announcements/#{id}/dismiss")
  123. |> json_response_and_validate_schema(:ok)
  124. assert Announcement.read_by?(announcement, user)
  125. end
  126. end
  127. end