2019-04-30 08:27:42 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2022-07-28 10:27:38 +08:00
|
|
|
RSpec.describe GroupsController do
|
2023-11-10 06:47:59 +08:00
|
|
|
fab!(:user)
|
2021-12-23 01:09:43 +08:00
|
|
|
fab!(:user2) { Fabricate(:user) }
|
2021-12-04 04:54:07 +08:00
|
|
|
fab!(:other_user) { Fabricate(:user) }
|
2017-07-21 14:12:24 +08:00
|
|
|
let(:group) { Fabricate(:group, users: [user]) }
|
2018-03-21 16:32:08 +08:00
|
|
|
let(:moderator_group_id) { Group::AUTO_GROUPS[:moderators] }
|
2023-11-10 06:47:59 +08:00
|
|
|
fab!(:admin)
|
|
|
|
fab!(:moderator)
|
2016-11-29 16:25:02 +08:00
|
|
|
|
2017-08-24 11:01:11 +08:00
|
|
|
describe "#index" do
|
2018-03-20 15:50:46 +08:00
|
|
|
let(:staff_group) do
|
2020-01-15 18:21:58 +08:00
|
|
|
Fabricate(:group, name: "staff_group", visibility_level: Group.visibility_levels[:staff])
|
2016-12-20 14:26:15 +08:00
|
|
|
end
|
2016-12-14 17:26:16 +08:00
|
|
|
|
2020-01-17 06:57:34 +08:00
|
|
|
it "ensures that groups can be paginated" do
|
|
|
|
50.times { Fabricate(:group) }
|
|
|
|
|
|
|
|
get "/groups.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2020-01-17 06:57:34 +08:00
|
|
|
|
|
|
|
expect(body["groups"].size).to eq(36)
|
|
|
|
expect(body["total_rows_groups"]).to eq(50)
|
|
|
|
expect(body["load_more_groups"]).to eq("/groups?page=1")
|
|
|
|
|
|
|
|
get "/groups.json", params: { page: 1 }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2020-01-17 06:57:34 +08:00
|
|
|
|
|
|
|
expect(body["groups"].size).to eq(14)
|
|
|
|
expect(body["total_rows_groups"]).to eq(50)
|
|
|
|
expect(body["load_more_groups"]).to eq("/groups?page=2")
|
|
|
|
end
|
|
|
|
|
2023-07-31 22:00:05 +08:00
|
|
|
it "only accepts valid page numbers" do
|
|
|
|
get "/groups.json", params: { page: -1 }
|
|
|
|
expect(response.status).to eq(400)
|
|
|
|
|
|
|
|
get "/groups.json", params: { page: 0 }
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
|
|
|
get "/groups.json", params: { page: 1 }
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
2016-12-22 14:14:03 +08:00
|
|
|
context "when group directory is disabled" do
|
2017-01-28 10:55:49 +08:00
|
|
|
before { SiteSetting.enable_group_directory = false }
|
2018-04-10 09:22:01 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
it "should deny access for an anon" do
|
2018-04-10 09:22:01 +08:00
|
|
|
get "/groups.json"
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should deny access for a normal user" do
|
2020-01-15 18:21:58 +08:00
|
|
|
sign_in(user)
|
2018-04-10 09:22:01 +08:00
|
|
|
get "/groups.json"
|
2020-01-15 18:21:58 +08:00
|
|
|
|
2018-04-10 09:22:01 +08:00
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
it "should allow access for an admin" do
|
2018-04-10 09:22:01 +08:00
|
|
|
sign_in(admin)
|
|
|
|
get "/groups.json"
|
2017-01-28 10:55:49 +08:00
|
|
|
|
2018-04-10 09:22:01 +08:00
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
it "should allow access for a moderator" do
|
2018-04-10 09:22:01 +08:00
|
|
|
sign_in(moderator)
|
2016-12-22 14:14:03 +08:00
|
|
|
get "/groups.json"
|
2018-04-10 09:22:01 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2016-12-22 14:14:03 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "with searchable" do
|
2020-01-15 18:21:58 +08:00
|
|
|
it "should return the searched groups" do
|
|
|
|
testing_group = Fabricate(:group, name: "testing")
|
|
|
|
|
2018-03-19 17:16:51 +08:00
|
|
|
get "/groups.json", params: { filter: "test" }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2018-08-20 17:08:50 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2018-08-20 17:08:50 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["groups"].first["id"]).to eq(testing_group.id)
|
|
|
|
expect(body["load_more_groups"]).to eq("/groups?filter=test&page=1")
|
2018-03-19 17:16:51 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "with sortable" do
|
2019-07-09 03:09:50 +08:00
|
|
|
before do
|
2020-01-15 18:21:58 +08:00
|
|
|
group
|
2019-07-09 03:09:50 +08:00
|
|
|
sign_in(user)
|
|
|
|
end
|
|
|
|
|
2022-05-10 23:02:28 +08:00
|
|
|
fab!(:group_with_2_users) do
|
|
|
|
Fabricate(:group, name: "other_group", users: [user, other_user])
|
2023-01-09 19:18:21 +08:00
|
|
|
end
|
2018-03-19 16:14:50 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
context "with default (descending) order" do
|
|
|
|
it "sorts by name" do
|
|
|
|
get "/groups.json", params: { order: "name" }
|
2018-03-19 16:14:50 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(response.status).to eq(200)
|
2018-03-19 16:14:50 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2018-03-19 16:14:50 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["groups"].map { |g| g["id"] }).to eq(
|
2022-05-10 23:02:28 +08:00
|
|
|
[group_with_2_users.id, group.id, moderator_group_id],
|
2020-01-15 18:21:58 +08:00
|
|
|
)
|
2018-08-20 17:08:50 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["load_more_groups"]).to eq("/groups?order=name&page=1")
|
|
|
|
end
|
2018-08-20 17:08:50 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
it "sorts by user_count" do
|
|
|
|
get "/groups.json", params: { order: "user_count" }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2020-01-15 18:21:58 +08:00
|
|
|
|
|
|
|
expect(body["groups"].map { |g| g["id"] }).to eq(
|
2022-05-10 23:02:28 +08:00
|
|
|
[group_with_2_users.id, moderator_group_id, group.id],
|
2020-01-15 18:21:58 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
expect(body["load_more_groups"]).to eq("/groups?order=user_count&page=1")
|
2018-03-19 16:14:50 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
context "with ascending order" do
|
|
|
|
it "sorts by name" do
|
|
|
|
get "/groups.json", params: { order: "name", asc: true }
|
2018-03-19 16:14:50 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2018-08-20 17:08:50 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["groups"].map { |g| g["id"] }).to eq(
|
2022-05-10 23:02:28 +08:00
|
|
|
[moderator_group_id, group.id, group_with_2_users.id],
|
2020-01-15 18:21:58 +08:00
|
|
|
)
|
2018-08-20 17:08:50 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["load_more_groups"]).to eq("/groups?asc=true&order=name&page=1")
|
|
|
|
end
|
|
|
|
|
|
|
|
it "sorts by user_count" do
|
|
|
|
get "/groups.json", params: { order: "user_count", asc: "true" }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2020-01-15 18:21:58 +08:00
|
|
|
|
|
|
|
expect(body["groups"].map { |g| g["id"] }).to eq(
|
2022-05-10 23:02:28 +08:00
|
|
|
[moderator_group_id, group.id, group_with_2_users.id],
|
2020-01-15 18:21:58 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
expect(body["load_more_groups"]).to eq("/groups?asc=true&order=user_count&page=1")
|
2018-03-19 16:14:50 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-12-20 14:26:15 +08:00
|
|
|
it "should return the right response" do
|
2017-07-21 14:12:24 +08:00
|
|
|
group
|
2018-03-20 15:50:46 +08:00
|
|
|
staff_group
|
2020-01-15 18:21:58 +08:00
|
|
|
|
2016-12-14 17:26:16 +08:00
|
|
|
get "/groups.json"
|
|
|
|
|
2018-03-21 16:32:08 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-14 17:26:16 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2016-12-14 17:26:16 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
group_ids = body["groups"].map { |g| g["id"] }
|
2016-12-14 17:26:16 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(group_ids).to contain_exactly(group.id)
|
2018-03-20 15:50:46 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["load_more_groups"]).to eq("/groups?page=1")
|
|
|
|
expect(body["total_rows_groups"]).to eq(1)
|
|
|
|
expect(body["extras"]["type_filters"].map(&:to_sym)).to eq(
|
2020-10-21 06:46:45 +08:00
|
|
|
described_class::TYPE_FILTERS.keys - %i[my owner automatic non_automatic],
|
2018-03-20 15:50:46 +08:00
|
|
|
)
|
2016-12-14 17:26:16 +08:00
|
|
|
end
|
2016-12-20 14:26:15 +08:00
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when viewing groups of another user" do
|
2018-03-21 16:32:08 +08:00
|
|
|
describe "when an invalid username is given" do
|
|
|
|
it "should return the right response" do
|
|
|
|
group
|
|
|
|
get "/groups.json", params: { username: "asdasd" }
|
|
|
|
|
|
|
|
expect(response.status).to eq(404)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should return the right response" do
|
2020-01-15 18:21:58 +08:00
|
|
|
u = Fabricate(:user)
|
|
|
|
m = Fabricate(:user)
|
|
|
|
o = Fabricate(:user)
|
|
|
|
|
|
|
|
levels = Group.visibility_levels.values
|
|
|
|
|
|
|
|
levels
|
|
|
|
.product(levels)
|
|
|
|
.each do |group_level, members_level|
|
|
|
|
g =
|
|
|
|
Fabricate(
|
|
|
|
:group,
|
|
|
|
name: "#{group_level}_#{members_level}",
|
|
|
|
visibility_level: group_level,
|
|
|
|
members_visibility_level: members_level,
|
|
|
|
users: [u],
|
|
|
|
)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
if group_level == Group.visibility_levels[:members] ||
|
|
|
|
members_level == Group.visibility_levels[:members]
|
|
|
|
g.add(m)
|
2023-01-09 19:18:21 +08:00
|
|
|
end
|
2020-01-15 18:21:58 +08:00
|
|
|
if group_level == Group.visibility_levels[:owners] ||
|
|
|
|
members_level == Group.visibility_levels[:owners]
|
|
|
|
g.add_owner(o)
|
2023-01-09 19:18:21 +08:00
|
|
|
end
|
|
|
|
end
|
2020-01-15 18:21:58 +08:00
|
|
|
|
|
|
|
# anonymous user
|
|
|
|
get "/groups.json", params: { username: u.username }
|
2018-03-21 16:32:08 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
group_names = response.parsed_body["groups"].map { |g| g["name"] }
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(group_names).to contain_exactly("0_0")
|
|
|
|
|
|
|
|
# logged in user
|
2021-12-04 04:54:07 +08:00
|
|
|
sign_in(user)
|
2020-01-15 18:21:58 +08:00
|
|
|
get "/groups.json", params: { username: u.username }
|
2018-03-21 16:32:08 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
group_names = response.parsed_body["groups"].map { |g| g["name"] }
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(group_names).to contain_exactly("0_0", "0_1", "1_0", "1_1")
|
2018-03-21 16:32:08 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
# member of the group
|
|
|
|
sign_in(m)
|
|
|
|
get "/groups.json", params: { username: u.username }
|
2018-03-21 16:32:08 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
group_names = response.parsed_body["groups"].map { |g| g["name"] }
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(group_names).to contain_exactly(
|
|
|
|
"0_0",
|
|
|
|
"0_1",
|
|
|
|
"0_2",
|
|
|
|
"1_0",
|
|
|
|
"1_1",
|
|
|
|
"1_2",
|
|
|
|
"2_0",
|
|
|
|
"2_1",
|
|
|
|
"2_2",
|
|
|
|
)
|
2018-03-21 16:32:08 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
# owner
|
|
|
|
sign_in(o)
|
|
|
|
get "/groups.json", params: { username: u.username }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
group_names = response.parsed_body["groups"].map { |g| g["name"] }
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(group_names).to contain_exactly(
|
|
|
|
"0_0",
|
|
|
|
"0_1",
|
|
|
|
"0_4",
|
|
|
|
"1_0",
|
|
|
|
"1_1",
|
|
|
|
"1_4",
|
|
|
|
"2_4",
|
|
|
|
"3_4",
|
|
|
|
"4_0",
|
|
|
|
"4_1",
|
|
|
|
"4_2",
|
|
|
|
"4_3",
|
|
|
|
"4_4",
|
|
|
|
)
|
|
|
|
|
|
|
|
# moderator
|
|
|
|
sign_in(moderator)
|
|
|
|
get "/groups.json", params: { username: u.username }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
group_names = response.parsed_body["groups"].map { |g| g["name"] }
|
2020-09-11 10:50:13 +08:00
|
|
|
expect(group_names).to contain_exactly(
|
|
|
|
"0_0",
|
|
|
|
"0_1",
|
|
|
|
"0_2",
|
|
|
|
"0_3",
|
|
|
|
"1_0",
|
|
|
|
"1_1",
|
|
|
|
"1_2",
|
|
|
|
"1_3",
|
|
|
|
"2_0",
|
|
|
|
"2_1",
|
|
|
|
"2_2",
|
|
|
|
"2_3",
|
|
|
|
"3_0",
|
|
|
|
"3_1",
|
|
|
|
"3_2",
|
|
|
|
"3_3",
|
|
|
|
)
|
2020-01-15 18:21:58 +08:00
|
|
|
|
|
|
|
# admin
|
|
|
|
sign_in(admin)
|
|
|
|
get "/groups.json", params: { username: u.username }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
group_names = response.parsed_body["groups"].map { |g| g["name"] }
|
2020-01-15 18:21:58 +08:00
|
|
|
all_group_names = levels.product(levels).map { |a, b| "#{a}_#{b}" }
|
|
|
|
expect(group_names).to contain_exactly(*all_group_names)
|
2018-03-21 16:32:08 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when viewing as an admin" do
|
2018-03-20 15:50:46 +08:00
|
|
|
before do
|
2016-12-21 21:21:39 +08:00
|
|
|
sign_in(admin)
|
|
|
|
group.add(admin)
|
2018-03-19 18:28:57 +08:00
|
|
|
group.add_owner(admin)
|
2018-03-20 15:50:46 +08:00
|
|
|
end
|
2016-12-20 14:26:15 +08:00
|
|
|
|
2018-03-20 15:50:46 +08:00
|
|
|
it "should return the right response" do
|
|
|
|
staff_group
|
2016-12-20 14:26:15 +08:00
|
|
|
get "/groups.json"
|
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-20 14:26:15 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2016-12-20 14:26:15 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
group_ids = body["groups"].map { |g| g["id"] }
|
|
|
|
group_body = body["groups"].find { |g| g["id"] == group.id }
|
2016-12-20 14:26:15 +08:00
|
|
|
|
2018-03-19 18:28:57 +08:00
|
|
|
expect(group_body["is_group_user"]).to eq(true)
|
|
|
|
expect(group_body["is_group_owner"]).to eq(true)
|
2017-07-04 03:26:46 +08:00
|
|
|
expect(group_ids).to include(group.id, staff_group.id)
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["load_more_groups"]).to eq("/groups?page=1")
|
|
|
|
expect(body["total_rows_groups"]).to eq(10)
|
2018-03-20 15:50:46 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["extras"]["type_filters"].map(&:to_sym)).to eq(
|
2020-10-21 06:46:45 +08:00
|
|
|
described_class::TYPE_FILTERS.keys - [:non_automatic],
|
2018-03-20 15:50:46 +08:00
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when filterable by type" do
|
2018-03-20 15:50:46 +08:00
|
|
|
def expect_type_to_return_right_groups(type, expected_group_ids)
|
|
|
|
get "/groups.json", params: { type: type }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2020-01-15 18:21:58 +08:00
|
|
|
group_ids = body["groups"].map { |g| g["id"] }
|
2018-03-20 15:50:46 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["total_rows_groups"]).to eq(expected_group_ids.count)
|
2018-03-20 15:50:46 +08:00
|
|
|
expect(group_ids).to contain_exactly(*expected_group_ids)
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "my groups" do
|
2022-05-10 23:02:28 +08:00
|
|
|
it "should return the groups admin is a member of" do
|
|
|
|
expect_type_to_return_right_groups("my", admin.group_users.map(&:group_id))
|
2018-03-20 15:50:46 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "owner groups" do
|
2022-05-10 23:02:28 +08:00
|
|
|
it "should return the groups admin is a owner of" do
|
2018-03-20 15:50:46 +08:00
|
|
|
group2 = Fabricate(:group)
|
2018-06-05 15:29:17 +08:00
|
|
|
_group3 = Fabricate(:group)
|
2018-03-20 15:50:46 +08:00
|
|
|
group2.add_owner(admin)
|
|
|
|
|
2022-05-10 23:02:28 +08:00
|
|
|
expect_type_to_return_right_groups(
|
|
|
|
"owner",
|
|
|
|
admin.group_users.where(owner: true).map(&:group_id),
|
|
|
|
)
|
2018-03-20 15:50:46 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "automatic groups" do
|
|
|
|
it "should return the right response" do
|
|
|
|
expect_type_to_return_right_groups("automatic", Group::AUTO_GROUP_IDS.keys - [0])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-10-21 06:46:45 +08:00
|
|
|
describe "non automatic groups" do
|
|
|
|
it "should return the right response" do
|
|
|
|
group2 = Fabricate(:group)
|
|
|
|
expect_type_to_return_right_groups("non_automatic", [group.id, group2.id])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-03-20 15:50:46 +08:00
|
|
|
describe "public groups" do
|
|
|
|
it "should return the right response" do
|
|
|
|
group2 = Fabricate(:group, public_admission: true)
|
|
|
|
|
|
|
|
expect_type_to_return_right_groups("public", [group2.id])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "close groups" do
|
|
|
|
it "should return the right response" do
|
|
|
|
group2 = Fabricate(:group, public_admission: false)
|
2018-06-05 15:29:17 +08:00
|
|
|
_group3 = Fabricate(:group, public_admission: true)
|
2018-03-20 15:50:46 +08:00
|
|
|
|
|
|
|
expect_type_to_return_right_groups("close", [group.id, group2.id])
|
|
|
|
end
|
|
|
|
end
|
2016-12-20 14:26:15 +08:00
|
|
|
end
|
|
|
|
end
|
2023-05-31 05:41:50 +08:00
|
|
|
|
|
|
|
describe "groups_index_query modifier" do
|
2023-11-10 06:47:59 +08:00
|
|
|
fab!(:user)
|
2023-05-31 05:41:50 +08:00
|
|
|
fab!(:cool_group) { Fabricate(:group, name: "cool-group") }
|
|
|
|
fab!(:boring_group) { Fabricate(:group, name: "boring-group") }
|
|
|
|
|
|
|
|
it "allows changing the query" do
|
|
|
|
get "/groups.json"
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["groups"].map { |g| g["id"] }).to include(
|
|
|
|
cool_group.id,
|
|
|
|
boring_group.id,
|
|
|
|
)
|
|
|
|
|
|
|
|
get "/groups.json", params: { filter: "cool" }
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["groups"].map { |g| g["id"] }).to include(cool_group.id)
|
|
|
|
expect(response.parsed_body["groups"].map { |g| g["id"] }).not_to include(boring_group.id)
|
|
|
|
|
|
|
|
Plugin::Instance
|
|
|
|
.new
|
|
|
|
.register_modifier(:groups_index_query) do |query|
|
|
|
|
query.where("groups.name LIKE 'cool%'")
|
|
|
|
end
|
|
|
|
|
|
|
|
get "/groups.json"
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["groups"].map { |g| g["id"] }).to include(cool_group.id)
|
|
|
|
expect(response.parsed_body["groups"].map { |g| g["id"] }).not_to include(boring_group.id)
|
|
|
|
|
|
|
|
get "/groups.json", params: { filter: "boring" }
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["groups"].map { |g| g["id"] }).not_to include(
|
|
|
|
cool_group.id,
|
|
|
|
boring_group.id,
|
|
|
|
)
|
|
|
|
ensure
|
|
|
|
DiscoursePluginRegistry.clear_modifiers!
|
|
|
|
end
|
|
|
|
end
|
2016-12-14 17:26:16 +08:00
|
|
|
end
|
|
|
|
|
2018-02-01 04:04:09 +08:00
|
|
|
describe "#show" do
|
2018-03-29 14:57:10 +08:00
|
|
|
it "ensures the group can be seen" do
|
2021-12-04 04:54:07 +08:00
|
|
|
sign_in(user)
|
2018-03-29 14:57:10 +08:00
|
|
|
group.update!(visibility_level: Group.visibility_levels[:owners])
|
|
|
|
|
|
|
|
get "/groups/#{group.name}.json"
|
|
|
|
|
2020-09-08 10:52:29 +08:00
|
|
|
expect(response.status).to eq(404)
|
2018-03-29 14:57:10 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns the right response" do
|
|
|
|
sign_in(user)
|
2020-09-11 02:36:40 +08:00
|
|
|
mod_group = Group.find(moderator_group_id)
|
2018-03-29 14:57:10 +08:00
|
|
|
get "/groups/#{group.name}.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2018-03-29 14:57:10 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["group"]["id"]).to eq(group.id)
|
2020-09-11 02:36:40 +08:00
|
|
|
expect(body["extras"]["visible_group_names"]).to eq([mod_group.name, group.name])
|
2020-05-11 13:05:42 +08:00
|
|
|
expect(response.headers["X-Robots-Tag"]).to eq("noindex")
|
2018-03-29 14:57:10 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "as an admin" do
|
|
|
|
it "returns the right response" do
|
2021-12-04 04:54:07 +08:00
|
|
|
sign_in(admin)
|
2018-03-29 14:57:10 +08:00
|
|
|
get "/groups/#{group.name}.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2018-03-29 14:57:10 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["group"]["id"]).to eq(group.id)
|
2018-03-29 14:57:10 +08:00
|
|
|
|
|
|
|
groups = Group::AUTO_GROUPS.keys
|
|
|
|
groups.delete(:everyone)
|
|
|
|
groups.push(group.name)
|
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["extras"]["visible_group_names"]).to contain_exactly(*groups.map(&:to_s))
|
2018-03-29 14:57:10 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-02-01 04:04:09 +08:00
|
|
|
it "should respond to HTML" do
|
2019-06-12 14:31:50 +08:00
|
|
|
group.update!(bio_raw: "testing **group** bio")
|
2018-02-01 04:04:09 +08:00
|
|
|
|
|
|
|
get "/groups/#{group.name}.html"
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2021-07-12 22:35:57 +08:00
|
|
|
expect(response.body).to have_tag "title", text: "#{group.name} - #{SiteSetting.title}"
|
2018-02-01 04:04:09 +08:00
|
|
|
expect(response.body).to have_tag(:meta, with: { property: "og:title", content: group.name })
|
|
|
|
|
2019-06-12 14:31:50 +08:00
|
|
|
# note this uses an excerpt so it strips html
|
2018-02-01 04:04:09 +08:00
|
|
|
expect(response.body).to have_tag(
|
|
|
|
:meta,
|
|
|
|
with: {
|
2019-06-12 14:31:50 +08:00
|
|
|
property: "og:description",
|
|
|
|
content: "testing group bio",
|
2018-02-01 04:04:09 +08:00
|
|
|
},
|
|
|
|
)
|
|
|
|
end
|
2018-02-27 13:43:22 +08:00
|
|
|
|
|
|
|
describe "when viewing activity filters" do
|
|
|
|
it "should return the right response" do
|
|
|
|
get "/groups/#{group.name}/activity/posts.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body["group"]
|
2018-02-27 13:43:22 +08:00
|
|
|
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["id"]).to eq(group.id)
|
2018-02-27 13:43:22 +08:00
|
|
|
end
|
|
|
|
end
|
2018-02-01 04:04:09 +08:00
|
|
|
end
|
|
|
|
|
2018-03-29 14:57:10 +08:00
|
|
|
describe "#posts" do
|
|
|
|
it "ensures the group can be seen" do
|
2021-12-04 04:54:07 +08:00
|
|
|
sign_in(user)
|
2018-03-29 14:57:10 +08:00
|
|
|
group.update!(visibility_level: Group.visibility_levels[:owners])
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/posts.json"
|
|
|
|
|
2020-09-08 10:52:29 +08:00
|
|
|
expect(response.status).to eq(404)
|
2018-03-29 14:57:10 +08:00
|
|
|
end
|
|
|
|
|
2019-08-14 21:30:04 +08:00
|
|
|
it "ensures the group members can be seen" do
|
2021-12-04 04:54:07 +08:00
|
|
|
sign_in(user)
|
2019-08-14 21:30:04 +08:00
|
|
|
group.update!(members_visibility_level: Group.visibility_levels[:owners])
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/posts.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
|
2018-03-29 14:57:10 +08:00
|
|
|
it "calls `posts_for` and responds with JSON" do
|
|
|
|
sign_in(user)
|
|
|
|
post = Fabricate(:post, user: user)
|
|
|
|
get "/groups/#{group.name}/posts.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
expect(response.parsed_body.first["id"]).to eq(post.id)
|
2018-03-29 14:57:10 +08:00
|
|
|
end
|
2020-12-11 03:55:53 +08:00
|
|
|
|
|
|
|
it "returns moderator actions" do
|
|
|
|
sign_in(user)
|
|
|
|
post = Fabricate(:post, user: user, post_type: Post.types[:moderator_action])
|
|
|
|
get "/groups/#{group.name}/posts.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body.first["id"]).to eq(post.id)
|
|
|
|
end
|
2018-03-29 14:57:10 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "#members" do
|
2018-06-29 08:14:50 +08:00
|
|
|
it "returns correct error code with invalid params" do
|
2021-12-04 04:54:07 +08:00
|
|
|
sign_in(user)
|
2018-06-29 08:14:50 +08:00
|
|
|
|
|
|
|
get "/groups/#{group.name}/members.json?limit=-1"
|
|
|
|
expect(response.status).to eq(400)
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/members.json?offset=-1"
|
|
|
|
expect(response.status).to eq(400)
|
2019-06-17 13:32:06 +08:00
|
|
|
|
|
|
|
get "/groups/trust_level_0/members.json?limit=2000"
|
|
|
|
expect(response.status).to eq(400)
|
2018-06-29 08:14:50 +08:00
|
|
|
end
|
|
|
|
|
2018-03-29 14:57:10 +08:00
|
|
|
it "ensures the group can be seen" do
|
2021-12-04 04:54:07 +08:00
|
|
|
sign_in(user)
|
2018-03-29 14:57:10 +08:00
|
|
|
group.update!(visibility_level: Group.visibility_levels[:owners])
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/members.json"
|
|
|
|
|
2020-09-08 10:52:29 +08:00
|
|
|
expect(response.status).to eq(404)
|
2018-03-29 14:57:10 +08:00
|
|
|
end
|
|
|
|
|
2019-08-14 21:30:04 +08:00
|
|
|
it "ensures the group members can be seen" do
|
|
|
|
group.update!(members_visibility_level: Group.visibility_levels[:logged_on_users])
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/members.json", params: { limit: 1 }
|
|
|
|
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
|
2018-03-29 14:57:10 +08:00
|
|
|
it "ensures that membership can be paginated" do
|
2018-11-01 12:33:28 +08:00
|
|
|
freeze_time
|
|
|
|
|
|
|
|
first_user = Fabricate(:user)
|
|
|
|
group.add(first_user)
|
|
|
|
|
|
|
|
freeze_time 1.day.from_now
|
|
|
|
|
|
|
|
4.times { group.add(Fabricate(:user)) }
|
2018-03-29 14:57:10 +08:00
|
|
|
usernames = group.users.map { |m| m.username }.sort
|
|
|
|
|
2020-05-15 10:10:59 +08:00
|
|
|
get "/groups/#{group.name}/members.json", params: { limit: 3, asc: true }
|
2018-03-29 14:57:10 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
members = response.parsed_body["members"]
|
2018-03-29 14:57:10 +08:00
|
|
|
|
|
|
|
expect(members.map { |m| m["username"] }).to eq(usernames[0..2])
|
|
|
|
|
2020-05-15 10:10:59 +08:00
|
|
|
get "/groups/#{group.name}/members.json", params: { limit: 3, offset: 3, asc: true }
|
2018-03-29 14:57:10 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
members = response.parsed_body["members"]
|
2018-03-29 14:57:10 +08:00
|
|
|
|
|
|
|
expect(members.map { |m| m["username"] }).to eq(usernames[3..5])
|
2018-11-01 12:33:28 +08:00
|
|
|
|
2020-05-15 10:10:59 +08:00
|
|
|
get "/groups/#{group.name}/members.json", params: { order: "added_at" }
|
2020-05-07 23:04:12 +08:00
|
|
|
members = response.parsed_body["members"]
|
2018-11-01 12:33:28 +08:00
|
|
|
|
|
|
|
expect(members.last["added_at"]).to eq(first_user.created_at.as_json)
|
2018-03-29 14:57:10 +08:00
|
|
|
end
|
2022-02-09 17:43:58 +08:00
|
|
|
|
|
|
|
it "can sort items" do
|
|
|
|
sign_in(user)
|
|
|
|
group.update!(visibility_level: Group.visibility_levels[:logged_on_users])
|
|
|
|
other_user = Fabricate(:user)
|
|
|
|
group.add_owner(other_user)
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/members.json"
|
|
|
|
|
|
|
|
expect(response.parsed_body["members"].map { |u| u["id"] }).to eq([other_user.id, user.id])
|
|
|
|
expect(response.parsed_body["owners"].map { |u| u["id"] }).to eq([other_user.id])
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/members.json?order=added_at&asc=1"
|
|
|
|
|
|
|
|
expect(response.parsed_body["members"].map { |u| u["id"] }).to eq([user.id, other_user.id])
|
|
|
|
expect(response.parsed_body["owners"].map { |u| u["id"] }).to eq([other_user.id])
|
|
|
|
end
|
2023-11-07 22:06:47 +08:00
|
|
|
|
|
|
|
context "when include_custom_fields is true" do
|
2023-11-10 06:47:59 +08:00
|
|
|
fab!(:user_field)
|
2023-11-07 22:06:47 +08:00
|
|
|
let(:user_field_name) { "user_field_#{user_field.id}" }
|
|
|
|
let!(:custom_user_field) do
|
|
|
|
UserCustomField.create!(user_id: user.id, name: user_field_name, value: "A custom field")
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
sign_in(user)
|
|
|
|
SiteSetting.public_user_custom_fields = user_field_name
|
|
|
|
end
|
|
|
|
|
2024-01-12 00:39:17 +08:00
|
|
|
it "shows the custom fields" do
|
2023-11-07 22:06:47 +08:00
|
|
|
get "/groups/#{group.name}/members.json", params: { include_custom_fields: true }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
response_custom_fields = response.parsed_body["members"].first["custom_fields"]
|
|
|
|
expect(response_custom_fields[user_field_name]).to eq("A custom field")
|
|
|
|
end
|
2024-01-12 00:39:17 +08:00
|
|
|
|
|
|
|
it "allows sorting by custom fields" do
|
|
|
|
group.add(user2)
|
|
|
|
UserCustomField.create!(user_id: user2.id, name: user_field_name, value: "C custom field")
|
|
|
|
group.add(other_user)
|
|
|
|
UserCustomField.create!(
|
|
|
|
user_id: other_user.id,
|
|
|
|
name: user_field_name,
|
|
|
|
value: "B custom field",
|
|
|
|
)
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/members.json",
|
|
|
|
params: {
|
|
|
|
include_custom_fields: true,
|
|
|
|
order: "custom_field",
|
|
|
|
order_field: user_field_name,
|
|
|
|
asc: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["members"].pluck("id")).to eq(
|
|
|
|
[user.id, other_user.id, user2.id],
|
|
|
|
)
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/members.json",
|
|
|
|
params: {
|
|
|
|
include_custom_fields: true,
|
|
|
|
order: "custom_field",
|
|
|
|
order_field: user_field_name,
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["members"].pluck("id")).to eq(
|
|
|
|
[user2.id, other_user.id, user.id],
|
|
|
|
)
|
|
|
|
end
|
2023-11-07 22:06:47 +08:00
|
|
|
end
|
2018-03-29 14:57:10 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "#posts_feed" do
|
|
|
|
it "renders RSS" do
|
|
|
|
get "/groups/#{group.name}/posts.rss"
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2019-09-12 08:41:50 +08:00
|
|
|
expect(response.media_type).to eq("application/rss+xml")
|
2018-03-29 14:57:10 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "#mentions_feed" do
|
|
|
|
it "renders RSS" do
|
|
|
|
get "/groups/#{group.name}/mentions.rss"
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2019-09-12 08:41:50 +08:00
|
|
|
expect(response.media_type).to eq("application/rss+xml")
|
2018-03-29 14:57:10 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "fails when disabled" do
|
|
|
|
SiteSetting.enable_mentions = false
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/mentions.rss"
|
|
|
|
|
|
|
|
expect(response.status).to eq(404)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-24 11:01:11 +08:00
|
|
|
describe "#mentionable" do
|
2016-11-25 16:45:15 +08:00
|
|
|
it "should return the right response" do
|
2016-12-07 17:28:43 +08:00
|
|
|
sign_in(user)
|
2016-11-25 16:45:15 +08:00
|
|
|
|
2019-12-12 19:13:40 +08:00
|
|
|
group.update!(
|
|
|
|
mentionable_level: Group::ALIAS_LEVELS[:owners_mods_and_admins],
|
|
|
|
visibility_level: Group.visibility_levels[:logged_on_users],
|
|
|
|
)
|
|
|
|
|
2018-06-06 09:42:09 +08:00
|
|
|
get "/groups/#{group.name}/mentionable.json"
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-11-25 16:45:15 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["mentionable"]).to eq(false)
|
2016-11-25 16:45:15 +08:00
|
|
|
|
2019-04-29 15:32:25 +08:00
|
|
|
group.update!(
|
2018-06-06 09:42:09 +08:00
|
|
|
mentionable_level: Group::ALIAS_LEVELS[:everyone],
|
|
|
|
visibility_level: Group.visibility_levels[:staff],
|
|
|
|
)
|
2016-11-25 16:45:15 +08:00
|
|
|
|
2018-06-06 09:42:09 +08:00
|
|
|
get "/groups/#{group.name}/mentionable.json"
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-11-25 16:45:15 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["mentionable"]).to eq(true)
|
2019-12-12 19:13:40 +08:00
|
|
|
|
|
|
|
group.update!(
|
|
|
|
mentionable_level: Group::ALIAS_LEVELS[:nobody],
|
|
|
|
visibility_level: Group.visibility_levels[:public],
|
|
|
|
)
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/mentionable.json"
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["mentionable"]).to eq(true)
|
2016-11-25 16:45:15 +08:00
|
|
|
end
|
|
|
|
end
|
2016-11-29 16:25:02 +08:00
|
|
|
|
2018-06-05 18:56:51 +08:00
|
|
|
describe "#messageable" do
|
|
|
|
it "should return the right response" do
|
2022-09-26 11:58:40 +08:00
|
|
|
user.change_trust_level!(1)
|
2018-06-05 18:56:51 +08:00
|
|
|
sign_in(user)
|
|
|
|
|
2018-06-06 09:42:09 +08:00
|
|
|
get "/groups/#{group.name}/messageable.json"
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2018-06-05 18:56:51 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["messageable"]).to eq(false)
|
2018-06-05 18:56:51 +08:00
|
|
|
|
2018-06-06 09:42:09 +08:00
|
|
|
group.update!(
|
|
|
|
messageable_level: Group::ALIAS_LEVELS[:everyone],
|
|
|
|
visibility_level: Group.visibility_levels[:staff],
|
|
|
|
)
|
2018-06-05 18:56:51 +08:00
|
|
|
|
2018-06-06 09:42:09 +08:00
|
|
|
get "/groups/#{group.name}/messageable.json"
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2018-06-05 18:56:51 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2020-01-15 18:21:58 +08:00
|
|
|
expect(body["messageable"]).to eq(true)
|
2021-08-30 13:08:33 +08:00
|
|
|
|
2022-09-26 11:58:40 +08:00
|
|
|
SiteSetting.personal_message_enabled_groups = Group::AUTO_GROUPS[:staff]
|
2021-08-30 13:08:33 +08:00
|
|
|
|
|
|
|
get "/groups/#{group.name}/messageable.json"
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2022-12-20 11:11:14 +08:00
|
|
|
body = response.parsed_body
|
|
|
|
expect(body["messageable"]).to eq(true)
|
|
|
|
|
|
|
|
group.update!(messageable_level: Group::ALIAS_LEVELS[:only_admins])
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/messageable.json"
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2021-08-30 13:08:33 +08:00
|
|
|
body = response.parsed_body
|
|
|
|
expect(body["messageable"]).to eq(false)
|
2018-06-05 18:56:51 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-24 11:01:11 +08:00
|
|
|
describe "#update" do
|
2019-06-06 10:05:33 +08:00
|
|
|
let!(:group) do
|
2017-07-28 10:37:10 +08:00
|
|
|
Fabricate(:group, name: "test", users: [user], public_admission: false, public_exit: false)
|
|
|
|
end
|
2020-08-07 00:27:27 +08:00
|
|
|
let(:category) { Fabricate(:category) }
|
|
|
|
let(:tag) { Fabricate(:tag) }
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "with custom_fields" do
|
2019-06-06 10:05:33 +08:00
|
|
|
before do
|
|
|
|
user.update!(admin: true)
|
|
|
|
sign_in(user)
|
|
|
|
plugin = Plugin::Instance.new
|
|
|
|
plugin.register_editable_group_custom_field :test
|
|
|
|
@group = Fabricate(:group)
|
|
|
|
end
|
|
|
|
|
2020-05-15 21:04:38 +08:00
|
|
|
after { DiscoursePluginRegistry.reset! }
|
2019-06-06 10:05:33 +08:00
|
|
|
|
|
|
|
it "only updates allowed user fields" do
|
|
|
|
put "/groups/#{@group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
|
|
|
custom_fields: {
|
|
|
|
test: :hello1,
|
|
|
|
test2: :hello2,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
@group.reload
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(@group.custom_fields["test"]).to eq("hello1")
|
|
|
|
expect(@group.custom_fields["test2"]).to be_blank
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is secure when there are no registered editable fields" do
|
2020-05-15 21:04:38 +08:00
|
|
|
DiscoursePluginRegistry.reset!
|
2019-06-06 10:05:33 +08:00
|
|
|
put "/groups/#{@group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
|
|
|
custom_fields: {
|
|
|
|
test: :hello1,
|
|
|
|
test2: :hello2,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
@group.reload
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(@group.custom_fields["test"]).to be_blank
|
|
|
|
expect(@group.custom_fields["test2"]).to be_blank
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-11-29 16:25:02 +08:00
|
|
|
context "when user is group owner" do
|
|
|
|
before do
|
|
|
|
group.add_owner(user)
|
2016-12-07 17:28:43 +08:00
|
|
|
sign_in(user)
|
2016-11-29 16:25:02 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "should be able update the group" do
|
2018-04-05 13:53:00 +08:00
|
|
|
group.update!(
|
|
|
|
allow_membership_requests: false,
|
|
|
|
visibility_level: 2,
|
|
|
|
mentionable_level: 2,
|
|
|
|
messageable_level: 2,
|
|
|
|
default_notification_level: 0,
|
2020-04-23 00:37:39 +08:00
|
|
|
grant_trust_level: 0,
|
2018-04-05 13:53:00 +08:00
|
|
|
)
|
2016-12-20 15:14:35 +08:00
|
|
|
|
2016-12-11 23:36:15 +08:00
|
|
|
expect do
|
2017-08-31 12:06:56 +08:00
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
2018-04-05 13:53:00 +08:00
|
|
|
mentionable_level: 1,
|
|
|
|
messageable_level: 1,
|
|
|
|
visibility_level: 1,
|
|
|
|
automatic_membership_email_domains: "test.org",
|
|
|
|
title: "haha",
|
|
|
|
primary_group: true,
|
|
|
|
grant_trust_level: 1,
|
|
|
|
incoming_email: "test@mail.org",
|
2017-08-31 12:06:56 +08:00
|
|
|
flair_bg_color: "FFF",
|
|
|
|
flair_color: "BBB",
|
2020-05-25 13:38:47 +08:00
|
|
|
flair_icon: "fa-adjust",
|
2017-08-31 12:06:56 +08:00
|
|
|
bio_raw: "testing",
|
|
|
|
full_name: "awesome team",
|
|
|
|
public_admission: true,
|
|
|
|
public_exit: true,
|
2017-11-02 08:51:43 +08:00
|
|
|
allow_membership_requests: true,
|
|
|
|
membership_request_template: "testing",
|
2018-04-05 13:53:00 +08:00
|
|
|
default_notification_level: 1,
|
2020-08-07 00:27:27 +08:00
|
|
|
name: "testing",
|
|
|
|
tracking_category_ids: [category.id],
|
|
|
|
tracking_tags: [tag.name],
|
2021-07-15 22:23:57 +08:00
|
|
|
},
|
|
|
|
update_existing_users: false,
|
2016-12-11 23:36:15 +08:00
|
|
|
}
|
2018-04-06 11:44:58 +08:00
|
|
|
end.to change { GroupHistory.count }.by(13)
|
2016-11-29 16:25:02 +08:00
|
|
|
|
2018-03-27 12:18:03 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-11-29 16:25:02 +08:00
|
|
|
|
|
|
|
group.reload
|
|
|
|
|
2021-08-10 19:55:11 +08:00
|
|
|
expect(group.flair_bg_color).to eq("FFF")
|
2016-11-29 16:25:02 +08:00
|
|
|
expect(group.flair_color).to eq("BBB")
|
2021-08-10 19:55:11 +08:00
|
|
|
expect(group.flair_url).to eq("fa-adjust")
|
2016-12-05 16:18:24 +08:00
|
|
|
expect(group.bio_raw).to eq("testing")
|
2016-12-13 16:16:26 +08:00
|
|
|
expect(group.full_name).to eq("awesome team")
|
2017-07-28 10:37:10 +08:00
|
|
|
expect(group.public_admission).to eq(true)
|
|
|
|
expect(group.public_exit).to eq(true)
|
2016-12-12 22:46:45 +08:00
|
|
|
expect(group.allow_membership_requests).to eq(true)
|
2017-11-02 08:51:43 +08:00
|
|
|
expect(group.membership_request_template).to eq("testing")
|
2018-03-27 12:18:03 +08:00
|
|
|
expect(group.name).to eq("test")
|
2018-04-06 11:44:58 +08:00
|
|
|
expect(group.visibility_level).to eq(2)
|
2018-04-05 13:53:00 +08:00
|
|
|
expect(group.mentionable_level).to eq(1)
|
|
|
|
expect(group.messageable_level).to eq(1)
|
|
|
|
expect(group.default_notification_level).to eq(1)
|
2018-04-06 11:44:58 +08:00
|
|
|
expect(group.automatic_membership_email_domains).to eq(nil)
|
2018-04-05 13:53:00 +08:00
|
|
|
expect(group.title).to eq("haha")
|
2018-04-06 11:44:58 +08:00
|
|
|
expect(group.primary_group).to eq(false)
|
|
|
|
expect(group.incoming_email).to eq(nil)
|
|
|
|
expect(group.grant_trust_level).to eq(0)
|
2020-08-07 00:27:27 +08:00
|
|
|
expect(group.group_category_notification_defaults.first&.category).to eq(category)
|
|
|
|
expect(group.group_tag_notification_defaults.first&.tag).to eq(tag)
|
2016-11-29 16:25:02 +08:00
|
|
|
end
|
2018-04-05 16:31:09 +08:00
|
|
|
|
|
|
|
it "should not be allowed to update automatic groups" do
|
|
|
|
group = Group.find(Group::AUTO_GROUPS[:admins])
|
|
|
|
|
|
|
|
put "/groups/#{group.id}.json", params: { group: { messageable_level: 1 } }
|
|
|
|
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
2016-11-29 16:25:02 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "when user is group admin" do
|
2022-05-10 23:02:28 +08:00
|
|
|
before { sign_in(admin) }
|
2018-04-06 11:44:58 +08:00
|
|
|
|
2022-05-10 23:02:28 +08:00
|
|
|
it "should be able to update the group" do
|
2018-03-27 12:18:03 +08:00
|
|
|
group.update!(visibility_level: 2, members_visibility_level: 2, grant_trust_level: 0)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
2018-03-27 12:18:03 +08:00
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
|
|
|
flair_color: "BBB",
|
2018-04-06 11:44:58 +08:00
|
|
|
name: "testing",
|
|
|
|
incoming_email: "test@mail.org",
|
|
|
|
primary_group: true,
|
|
|
|
automatic_membership_email_domains: "test.org",
|
|
|
|
grant_trust_level: 2,
|
2019-08-14 21:30:04 +08:00
|
|
|
visibility_level: 1,
|
2020-08-07 00:27:27 +08:00
|
|
|
members_visibility_level: 3,
|
|
|
|
tracking_category_ids: [category.id],
|
|
|
|
tracking_tags: [tag.name],
|
2021-07-15 22:23:57 +08:00
|
|
|
},
|
|
|
|
update_existing_users: false,
|
2018-03-27 12:18:03 +08:00
|
|
|
}
|
2016-11-29 16:25:02 +08:00
|
|
|
|
2018-03-27 12:18:03 +08:00
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
|
|
|
group.reload
|
|
|
|
expect(group.flair_color).to eq("BBB")
|
|
|
|
expect(group.name).to eq("testing")
|
2018-04-06 11:44:58 +08:00
|
|
|
expect(group.incoming_email).to eq("test@mail.org")
|
|
|
|
expect(group.primary_group).to eq(true)
|
|
|
|
expect(group.visibility_level).to eq(1)
|
2019-08-14 21:30:04 +08:00
|
|
|
expect(group.members_visibility_level).to eq(3)
|
2018-04-06 11:44:58 +08:00
|
|
|
expect(group.automatic_membership_email_domains).to eq("test.org")
|
|
|
|
expect(group.grant_trust_level).to eq(2)
|
2020-08-07 00:27:27 +08:00
|
|
|
expect(group.group_category_notification_defaults.first&.category).to eq(category)
|
|
|
|
expect(group.group_tag_notification_defaults.first&.tag).to eq(tag)
|
2018-04-06 17:11:00 +08:00
|
|
|
|
|
|
|
expect(Jobs::AutomaticGroupMembership.jobs.first["args"].first["group_id"]).to eq(group.id)
|
2016-11-29 16:25:02 +08:00
|
|
|
end
|
2018-03-27 14:23:35 +08:00
|
|
|
|
2022-05-10 23:02:28 +08:00
|
|
|
it "they should be able to update an automatic group" do
|
2018-04-05 13:53:00 +08:00
|
|
|
group = Group.find(Group::AUTO_GROUPS[:admins])
|
|
|
|
|
|
|
|
group.update!(
|
|
|
|
visibility_level: 2,
|
|
|
|
mentionable_level: 2,
|
|
|
|
messageable_level: 2,
|
|
|
|
default_notification_level: 2,
|
2024-01-18 01:54:52 +08:00
|
|
|
members_visibility_level: 2,
|
2018-04-05 13:53:00 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
2021-04-06 23:13:06 +08:00
|
|
|
flair_bg_color: "FFF",
|
2018-04-05 13:53:00 +08:00
|
|
|
flair_color: "BBB",
|
2021-04-06 23:13:06 +08:00
|
|
|
flair_icon: "fa-adjust",
|
2018-04-05 13:53:00 +08:00
|
|
|
name: "testing",
|
|
|
|
visibility_level: 1,
|
|
|
|
mentionable_level: 1,
|
|
|
|
messageable_level: 1,
|
2020-08-07 00:27:27 +08:00
|
|
|
default_notification_level: 1,
|
2024-01-18 01:54:52 +08:00
|
|
|
members_visibility_level: 1,
|
2020-08-07 00:27:27 +08:00
|
|
|
tracking_category_ids: [category.id],
|
|
|
|
tracking_tags: [tag.name],
|
2022-05-10 23:02:28 +08:00
|
|
|
},
|
|
|
|
update_existing_users: false,
|
2018-04-05 13:53:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
|
|
|
group.reload
|
2021-08-10 19:55:11 +08:00
|
|
|
expect(group.flair_bg_color).to eq("FFF")
|
2021-04-06 23:13:06 +08:00
|
|
|
expect(group.flair_color).to eq("BBB")
|
|
|
|
expect(group.flair_icon).to eq("fa-adjust")
|
2021-08-10 19:55:11 +08:00
|
|
|
expect(group.flair_url).to eq("fa-adjust")
|
2018-04-05 13:53:00 +08:00
|
|
|
expect(group.name).to eq("admins")
|
|
|
|
expect(group.visibility_level).to eq(1)
|
|
|
|
expect(group.mentionable_level).to eq(1)
|
|
|
|
expect(group.messageable_level).to eq(1)
|
|
|
|
expect(group.default_notification_level).to eq(1)
|
2024-01-18 01:54:52 +08:00
|
|
|
expect(group.members_visibility_level).to eq(1)
|
2020-08-07 00:27:27 +08:00
|
|
|
expect(group.group_category_notification_defaults.first&.category).to eq(category)
|
|
|
|
expect(group.group_tag_notification_defaults.first&.tag).to eq(tag)
|
2018-04-05 13:53:00 +08:00
|
|
|
end
|
|
|
|
|
2018-03-27 14:23:35 +08:00
|
|
|
it "triggers a extensibility event" do
|
2020-08-19 22:41:40 +08:00
|
|
|
event =
|
|
|
|
DiscourseEvent
|
|
|
|
.track_events do
|
|
|
|
put "/groups/#{group.id}.json", params: { group: { flair_color: "BBB" } }
|
2023-01-09 19:18:21 +08:00
|
|
|
end
|
2020-08-19 22:41:40 +08:00
|
|
|
.last
|
|
|
|
|
|
|
|
expect(event[:event_name]).to eq(:group_updated)
|
|
|
|
expect(event[:params].first).to eq(group)
|
|
|
|
end
|
2021-07-15 22:23:57 +08:00
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "with user default notifications" do
|
2021-07-15 22:23:57 +08:00
|
|
|
it "should update default notification preference for existing users" do
|
2021-08-31 18:41:26 +08:00
|
|
|
group.update!(default_notification_level: NotificationLevels.all[:watching])
|
|
|
|
user1 = Fabricate(:user)
|
|
|
|
group.add(user1)
|
|
|
|
group.add(user2)
|
|
|
|
group_user1 = user1.group_users.first
|
|
|
|
group_user2 = user2.group_users.first
|
|
|
|
|
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
|
|
|
default_notification_level: NotificationLevels.all[:tracking],
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2022-03-24 20:50:44 +08:00
|
|
|
expect(response.status).to eq(422)
|
|
|
|
expect(response.parsed_body["user_count"]).to eq(group.group_users.count)
|
|
|
|
expect(response.parsed_body["errors"].first).to include("update_existing_users")
|
2021-08-31 18:41:26 +08:00
|
|
|
expect(group_user1.reload.notification_level).to eq(NotificationLevels.all[:watching])
|
|
|
|
expect(group_user2.reload.notification_level).to eq(NotificationLevels.all[:watching])
|
|
|
|
|
|
|
|
group_user1.update!(notification_level: NotificationLevels.all[:regular])
|
|
|
|
|
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
|
|
|
default_notification_level: NotificationLevels.all[:tracking],
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2022-03-24 20:50:44 +08:00
|
|
|
expect(response.status).to eq(422)
|
2021-08-31 18:41:26 +08:00
|
|
|
expect(response.parsed_body["user_count"]).to eq(group.group_users.count - 1)
|
|
|
|
expect(group_user1.reload.notification_level).to eq(NotificationLevels.all[:regular])
|
|
|
|
expect(group_user2.reload.notification_level).to eq(NotificationLevels.all[:watching])
|
|
|
|
|
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
|
|
|
default_notification_level: NotificationLevels.all[:tracking],
|
|
|
|
},
|
|
|
|
update_existing_users: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["success"]).to eq("OK")
|
|
|
|
expect(group_user1.reload.notification_level).to eq(NotificationLevels.all[:regular])
|
|
|
|
expect(group_user2.reload.notification_level).to eq(NotificationLevels.all[:tracking])
|
|
|
|
|
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
|
|
|
default_notification_level: NotificationLevels.all[:regular],
|
|
|
|
},
|
|
|
|
update_existing_users: false,
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["success"]).to eq("OK")
|
|
|
|
expect(group_user1.reload.notification_level).to eq(NotificationLevels.all[:regular])
|
|
|
|
expect(group_user2.reload.notification_level).to eq(NotificationLevels.all[:tracking])
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should update category & tag notification preferences for existing users" do
|
2021-07-15 22:23:57 +08:00
|
|
|
user1 = Fabricate(:user)
|
|
|
|
CategoryUser.create!(user: user1, category: category, notification_level: 4)
|
|
|
|
TagUser.create!(user: user1, tag: tag, notification_level: 4)
|
|
|
|
TagUser.create!(user: user2, tag: tag, notification_level: 4)
|
|
|
|
group.add(user1)
|
|
|
|
group.add(user2)
|
|
|
|
|
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
|
|
|
flair_color: "BBB",
|
|
|
|
name: "testing",
|
|
|
|
incoming_email: "test@mail.org",
|
|
|
|
primary_group: true,
|
|
|
|
automatic_membership_email_domains: "test.org",
|
|
|
|
grant_trust_level: 2,
|
|
|
|
visibility_level: 1,
|
|
|
|
members_visibility_level: 3,
|
|
|
|
tracking_category_ids: [category.id],
|
|
|
|
tracking_tags: [tag.name],
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2022-03-24 20:50:44 +08:00
|
|
|
expect(response.status).to eq(422)
|
2021-07-15 22:23:57 +08:00
|
|
|
expect(response.parsed_body["user_count"]).to eq(group.group_users.count - 1)
|
|
|
|
|
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
|
|
|
flair_color: "BBB",
|
|
|
|
name: "testing",
|
|
|
|
incoming_email: "test@mail.org",
|
|
|
|
primary_group: true,
|
|
|
|
automatic_membership_email_domains: "test.org",
|
|
|
|
grant_trust_level: 2,
|
|
|
|
visibility_level: 1,
|
|
|
|
members_visibility_level: 3,
|
|
|
|
tracking_category_ids: [category.id],
|
|
|
|
tracking_tags: [tag.name],
|
|
|
|
},
|
|
|
|
update_existing_users: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["success"]).to eq("OK")
|
|
|
|
|
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
|
|
|
flair_color: "BBB",
|
|
|
|
name: "testing",
|
|
|
|
incoming_email: "test@mail.org",
|
|
|
|
primary_group: true,
|
|
|
|
automatic_membership_email_domains: "test.org",
|
|
|
|
grant_trust_level: 2,
|
|
|
|
visibility_level: 1,
|
|
|
|
members_visibility_level: 3,
|
|
|
|
watching_category_ids: [category.id],
|
|
|
|
tracking_tags: [tag.name],
|
|
|
|
},
|
|
|
|
update_existing_users: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["success"]).to eq("OK")
|
|
|
|
expect(
|
|
|
|
CategoryUser.exists?(user: user2, category: category, notification_level: 3),
|
|
|
|
).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
2020-08-19 22:41:40 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "when user is a site moderator" do
|
|
|
|
before do
|
|
|
|
SiteSetting.moderators_manage_categories_and_groups = true
|
|
|
|
sign_in(moderator)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should not be able to update the group if the SiteSetting is false" do
|
|
|
|
SiteSetting.moderators_manage_categories_and_groups = false
|
|
|
|
|
|
|
|
put "/groups/#{group.id}.json", params: { group: { name: "testing" } }
|
|
|
|
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should not be able to update a group it cannot see" do
|
2020-09-22 00:32:43 +08:00
|
|
|
group.update!(visibility_level: Group.visibility_levels[:owners])
|
2020-08-19 22:41:40 +08:00
|
|
|
|
|
|
|
put "/groups/#{group.id}.json", params: { group: { name: "testing" } }
|
|
|
|
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should be able to update the group" do
|
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
|
|
|
flair_color: "BBB",
|
|
|
|
name: "testing",
|
|
|
|
incoming_email: "test@mail.org",
|
|
|
|
primary_group: true,
|
|
|
|
automatic_membership_email_domains: "test.org",
|
|
|
|
grant_trust_level: 2,
|
|
|
|
visibility_level: 1,
|
|
|
|
members_visibility_level: 3,
|
|
|
|
tracking_category_ids: [category.id],
|
|
|
|
tracking_tags: [tag.name],
|
2021-07-15 22:23:57 +08:00
|
|
|
},
|
|
|
|
update_existing_users: false,
|
2020-08-19 22:41:40 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
|
|
|
group.reload
|
|
|
|
expect(group.flair_color).to eq("BBB")
|
|
|
|
expect(group.name).to eq("testing")
|
|
|
|
expect(group.incoming_email).to eq("test@mail.org")
|
|
|
|
expect(group.primary_group).to eq(true)
|
|
|
|
expect(group.visibility_level).to eq(1)
|
|
|
|
expect(group.members_visibility_level).to eq(3)
|
|
|
|
expect(group.automatic_membership_email_domains).to eq("test.org")
|
|
|
|
expect(group.grant_trust_level).to eq(2)
|
|
|
|
expect(group.group_category_notification_defaults.first&.category).to eq(category)
|
|
|
|
expect(group.group_tag_notification_defaults.first&.tag).to eq(tag)
|
|
|
|
|
|
|
|
expect(Jobs::AutomaticGroupMembership.jobs.first["args"].first["group_id"]).to eq(group.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should be able to update an automatic group" do
|
|
|
|
group = Group.find(Group::AUTO_GROUPS[:trust_level_4])
|
|
|
|
|
|
|
|
group.update!(mentionable_level: 2, messageable_level: 2, default_notification_level: 2)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
2020-08-19 22:41:40 +08:00
|
|
|
put "/groups/#{group.id}.json",
|
|
|
|
params: {
|
|
|
|
group: {
|
2021-04-06 23:13:06 +08:00
|
|
|
flair_bg_color: "FFF",
|
|
|
|
flair_color: "BBB",
|
|
|
|
flair_icon: "fa-adjust",
|
2020-08-19 22:41:40 +08:00
|
|
|
mentionable_level: 1,
|
|
|
|
messageable_level: 1,
|
|
|
|
default_notification_level: 1,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
|
|
|
group.reload
|
2021-08-10 19:55:11 +08:00
|
|
|
expect(group.flair_bg_color).to eq("FFF")
|
2021-04-06 23:13:06 +08:00
|
|
|
expect(group.flair_color).to eq("BBB")
|
|
|
|
expect(group.flair_icon).to eq("fa-adjust")
|
2021-08-10 19:55:11 +08:00
|
|
|
expect(group.flair_url).to eq("fa-adjust")
|
2020-08-19 22:41:40 +08:00
|
|
|
expect(group.name).to eq("trust_level_4")
|
|
|
|
expect(group.mentionable_level).to eq(1)
|
|
|
|
expect(group.messageable_level).to eq(1)
|
|
|
|
expect(group.default_notification_level).to eq(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "triggers a extensibility event" do
|
2018-03-27 14:23:35 +08:00
|
|
|
event =
|
|
|
|
DiscourseEvent
|
|
|
|
.track_events do
|
|
|
|
put "/groups/#{group.id}.json", params: { group: { flair_color: "BBB" } }
|
2023-01-09 19:18:21 +08:00
|
|
|
end
|
2018-03-27 14:23:35 +08:00
|
|
|
.last
|
|
|
|
|
|
|
|
expect(event[:event_name]).to eq(:group_updated)
|
|
|
|
expect(event[:params].first).to eq(group)
|
|
|
|
end
|
2016-11-29 16:25:02 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "when user is not a group owner or admin" do
|
|
|
|
it "should not be able to update the group" do
|
2016-12-07 17:28:43 +08:00
|
|
|
sign_in(user)
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
put "/groups/#{group.id}.json", params: { group: { name: "testing" } }
|
2016-11-29 16:25:02 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2017-08-24 11:01:11 +08:00
|
|
|
describe "#members" do
|
2016-12-07 17:28:43 +08:00
|
|
|
let(:user1) do
|
|
|
|
Fabricate(
|
|
|
|
:user,
|
|
|
|
last_seen_at: Time.zone.now,
|
|
|
|
last_posted_at: Time.zone.now - 1.day,
|
|
|
|
email: "b@test.org",
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:user2) do
|
|
|
|
Fabricate(
|
|
|
|
:user,
|
|
|
|
last_seen_at: Time.zone.now - 1.day,
|
|
|
|
last_posted_at: Time.zone.now,
|
|
|
|
email: "a@test.org",
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2016-12-22 14:55:24 +08:00
|
|
|
fab!(:user3) { Fabricate(:user, last_seen_at: nil, last_posted_at: nil, email: "c@test.org") }
|
|
|
|
|
2023-11-10 06:47:59 +08:00
|
|
|
fab!(:bot)
|
2017-10-06 10:35:40 +08:00
|
|
|
let(:group) { Fabricate(:group, users: [user1, user2, user3, bot]) }
|
2016-12-07 17:28:43 +08:00
|
|
|
|
|
|
|
it "should allow members to be sorted by" do
|
2017-08-31 12:06:56 +08:00
|
|
|
get "/groups/#{group.name}/members.json", params: { order: "last_seen_at" }
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
members = response.parsed_body["members"]
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2016-12-22 14:55:24 +08:00
|
|
|
expect(members.map { |m| m["id"] }).to eq([user1.id, user2.id, user3.id])
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2020-05-15 10:10:59 +08:00
|
|
|
get "/groups/#{group.name}/members.json", params: { order: "last_seen_at", asc: true }
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
members = response.parsed_body["members"]
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2016-12-22 14:55:24 +08:00
|
|
|
expect(members.map { |m| m["id"] }).to eq([user2.id, user1.id, user3.id])
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
get "/groups/#{group.name}/members.json", params: { order: "last_posted_at" }
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
members = response.parsed_body["members"]
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2016-12-22 14:55:24 +08:00
|
|
|
expect(members.map { |m| m["id"] }).to eq([user2.id, user1.id, user3.id])
|
2016-12-07 17:28:43 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "should not allow members to be sorted by columns that are not allowed" do
|
2017-08-31 12:06:56 +08:00
|
|
|
get "/groups/#{group.name}/members.json", params: { order: "email" }
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
members = response.parsed_body["members"]
|
2016-12-07 17:28:43 +08:00
|
|
|
|
2018-03-19 18:28:57 +08:00
|
|
|
expect(members.map { |m| m["id"] }).to contain_exactly(user1.id, user2.id, user3.id)
|
2016-12-07 17:28:43 +08:00
|
|
|
end
|
2018-03-22 13:42:46 +08:00
|
|
|
|
2019-03-27 19:30:59 +08:00
|
|
|
it "can show group requests" do
|
2021-12-04 04:54:07 +08:00
|
|
|
sign_in(admin)
|
2019-03-27 19:30:59 +08:00
|
|
|
|
|
|
|
user4 = Fabricate(:user)
|
|
|
|
request4 = Fabricate(:group_request, user: user4, group: group)
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/members.json", params: { requesters: true }
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
members = response.parsed_body["members"]
|
2019-03-27 19:30:59 +08:00
|
|
|
expect(members.length).to eq(1)
|
|
|
|
expect(members.first["username"]).to eq(user4.username)
|
|
|
|
expect(members.first["reason"]).to eq(request4.reason)
|
|
|
|
end
|
|
|
|
|
2018-03-22 13:42:46 +08:00
|
|
|
describe "filterable" do
|
|
|
|
describe "as a normal user" do
|
|
|
|
it "should not allow members to be filterable by email" do
|
|
|
|
email = "uniquetest@discourse.org"
|
|
|
|
user1.update!(email: email)
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/members.json", params: { filter: email }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
members = response.parsed_body["members"]
|
2018-03-22 13:42:46 +08:00
|
|
|
expect(members).to eq([])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "as an admin" do
|
2021-12-04 04:54:07 +08:00
|
|
|
before { sign_in(admin) }
|
2018-03-22 13:42:46 +08:00
|
|
|
|
|
|
|
it "should allow members to be filterable by username" do
|
|
|
|
email = "uniquetest@discourse.org"
|
|
|
|
user1.update!(email: email)
|
|
|
|
|
2018-03-26 14:30:37 +08:00
|
|
|
{
|
|
|
|
email.upcase => [user1.id],
|
|
|
|
"QUEtes" => [user1.id],
|
|
|
|
"#{user1.email},#{user2.email}" => [user1.id, user2.id],
|
|
|
|
}.each do |filter, ids|
|
2018-03-22 13:42:46 +08:00
|
|
|
get "/groups/#{group.name}/members.json", params: { filter: filter }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
members = response.parsed_body["members"]
|
2018-03-26 14:30:37 +08:00
|
|
|
expect(members.map { |m| m["id"] }).to contain_exactly(*ids)
|
2018-03-22 13:42:46 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should allow members to be filterable by email" do
|
|
|
|
username = "uniquetest"
|
|
|
|
user1.update!(username: username)
|
|
|
|
|
|
|
|
[username.upcase, "QUEtes"].each do |filter|
|
|
|
|
get "/groups/#{group.name}/members.json", params: { filter: filter }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
members = response.parsed_body["members"]
|
2018-03-22 13:42:46 +08:00
|
|
|
expect(members.map { |m| m["id"] }).to contain_exactly(user1.id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-12-07 17:28:43 +08:00
|
|
|
end
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2018-02-01 04:04:09 +08:00
|
|
|
describe "#edit" do
|
2023-11-10 06:47:59 +08:00
|
|
|
fab!(:group)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
|
|
|
context "when user is not signed in" do
|
2021-05-21 09:43:47 +08:00
|
|
|
it "should be forbidden" do
|
2017-08-31 12:06:56 +08:00
|
|
|
put "/groups/#{group.id}/members.json", params: { usernames: "bob" }
|
2016-12-07 12:06:56 +08:00
|
|
|
expect(response).to be_forbidden
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
delete "/groups/#{group.id}/members.json", params: { username: "bob" }
|
2016-12-07 12:06:56 +08:00
|
|
|
expect(response).to be_forbidden
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "with public group" do
|
2021-05-21 09:43:47 +08:00
|
|
|
it "should be forbidden" do
|
2017-07-28 10:37:10 +08:00
|
|
|
group.update!(public_admission: true, public_exit: true)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2018-01-12 11:15:10 +08:00
|
|
|
put "/groups/#{group.id}/members.json", params: { usernames: "bob" }
|
|
|
|
expect(response.status).to eq(403)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2018-01-12 11:15:10 +08:00
|
|
|
delete "/groups/#{group.id}/members.json", params: { username: "bob" }
|
|
|
|
expect(response.status).to eq(403)
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when user is not an owner of the group" do
|
|
|
|
before { sign_in(user) }
|
|
|
|
|
|
|
|
it "refuses membership changes to unauthorized users" do
|
2017-08-31 12:06:56 +08:00
|
|
|
put "/groups/#{group.id}/members.json", params: { usernames: "bob" }
|
2016-12-07 12:06:56 +08:00
|
|
|
expect(response).to be_forbidden
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
delete "/groups/#{group.id}/members.json", params: { username: "bob" }
|
2016-12-07 12:06:56 +08:00
|
|
|
expect(response).to be_forbidden
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when user is an admin" do
|
2021-12-04 04:54:07 +08:00
|
|
|
fab!(:group) { Fabricate(:group, users: [admin], automatic: true) }
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2021-12-04 04:54:07 +08:00
|
|
|
before { sign_in(admin) }
|
2016-12-07 12:06:56 +08:00
|
|
|
|
|
|
|
it "cannot add members to automatic groups" do
|
2017-08-31 12:06:56 +08:00
|
|
|
put "/groups/#{group.id}/members.json", params: { usernames: "bob" }
|
2016-12-07 12:06:56 +08:00
|
|
|
expect(response).to be_forbidden
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
delete "/groups/#{group.id}/members.json", params: { username: "bob" }
|
2016-12-07 12:06:56 +08:00
|
|
|
expect(response).to be_forbidden
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "membership edits" do
|
2022-07-27 18:21:10 +08:00
|
|
|
describe "#add_members" do
|
2021-07-23 00:14:18 +08:00
|
|
|
before { sign_in(admin) }
|
|
|
|
|
2016-12-07 12:06:56 +08:00
|
|
|
it "can make incremental adds" do
|
2016-12-11 23:36:15 +08:00
|
|
|
expect do
|
2017-08-31 12:06:56 +08:00
|
|
|
put "/groups/#{group.id}/members.json", params: { usernames: user2.username }
|
2016-12-11 23:36:15 +08:00
|
|
|
end.to change { group.users.count }.by(1)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-11 23:36:15 +08:00
|
|
|
|
|
|
|
group_history = GroupHistory.last
|
|
|
|
|
|
|
|
expect(group_history.action).to eq(GroupHistory.actions[:add_user_to_group])
|
|
|
|
expect(group_history.acting_user).to eq(admin)
|
|
|
|
expect(group_history.target_user).to eq(user2)
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "cannot add members to automatic groups" do
|
|
|
|
group.update!(automatic: true)
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
put "/groups/#{group.id}/members.json", params: { usernames: "l77t" }
|
2016-12-07 12:06:56 +08:00
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
|
2020-08-04 23:02:01 +08:00
|
|
|
it "does not notify users when the param is not present" do
|
|
|
|
expect {
|
|
|
|
put "/groups/#{group.id}/members.json", params: { usernames: user2.username }
|
2022-07-19 22:03:03 +08:00
|
|
|
}.not_to change { Topic.where(archetype: "private_message").count }
|
2020-08-04 23:02:01 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "notifies users when the param is present" do
|
|
|
|
expect {
|
|
|
|
put "/groups/#{group.id}/members.json",
|
|
|
|
params: {
|
|
|
|
usernames: user2.username,
|
|
|
|
notify_users: true,
|
|
|
|
}
|
|
|
|
}.to change { Topic.where(archetype: "private_message").count }.by(1)
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
|
|
|
expect(Topic.last.topic_users.map(&:user_id)).to include(
|
|
|
|
Discourse::SYSTEM_USER_ID,
|
|
|
|
user2.id,
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2021-05-11 00:47:32 +08:00
|
|
|
it "does not add users without sufficient permission" do
|
2021-06-02 21:28:21 +08:00
|
|
|
group.add_owner(user)
|
2021-05-11 00:47:32 +08:00
|
|
|
sign_in(user)
|
|
|
|
|
2021-12-04 04:54:07 +08:00
|
|
|
put "/groups/#{group.id}/members.json", params: { usernames: other_user.username }
|
2021-06-02 21:28:21 +08:00
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not send invites if user cannot invite" do
|
|
|
|
group.add_owner(user)
|
|
|
|
sign_in(user)
|
2021-05-11 00:47:32 +08:00
|
|
|
|
2021-06-02 21:28:21 +08:00
|
|
|
put "/groups/#{group.id}/members.json", params: { emails: "test@example.com" }
|
2021-05-11 00:47:32 +08:00
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when is able to add several members to a group" do
|
2019-05-07 11:12:20 +08:00
|
|
|
fab!(:user1) { Fabricate(:user) }
|
|
|
|
fab!(:user2) { Fabricate(:user, username: "UsEr2") }
|
2016-12-07 12:06:56 +08:00
|
|
|
|
|
|
|
it "adds by username" do
|
2017-08-31 12:06:56 +08:00
|
|
|
expect do
|
|
|
|
put "/groups/#{group.id}/members.json",
|
2018-10-19 03:32:36 +08:00
|
|
|
params: {
|
|
|
|
usernames: [user1.username, user2.username.upcase].join(","),
|
|
|
|
}
|
2017-08-31 12:06:56 +08:00
|
|
|
end.to change { group.users.count }.by(2)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "adds by id" do
|
2017-08-31 12:06:56 +08:00
|
|
|
expect do
|
|
|
|
put "/groups/#{group.id}/members.json",
|
|
|
|
params: {
|
|
|
|
user_ids: [user1.id, user2.id].join(","),
|
|
|
|
}
|
|
|
|
end.to change { group.users.count }.by(2)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
2017-04-27 02:47:36 +08:00
|
|
|
|
|
|
|
it "adds by email" do
|
2017-08-31 12:06:56 +08:00
|
|
|
expect do
|
|
|
|
put "/groups/#{group.id}/members.json",
|
|
|
|
params: {
|
|
|
|
user_emails: [user1.email, user2.email].join(","),
|
|
|
|
}
|
|
|
|
end.to change { group.users.count }.by(2)
|
2017-04-27 02:47:36 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2017-04-27 02:47:36 +08:00
|
|
|
end
|
2018-03-26 14:30:37 +08:00
|
|
|
|
2020-08-21 11:38:09 +08:00
|
|
|
it "adds missing users even if some exists" do
|
2018-03-27 17:14:06 +08:00
|
|
|
user2.update!(username: "alice")
|
|
|
|
user3 = Fabricate(:user, username: "bob")
|
2018-03-26 14:30:37 +08:00
|
|
|
[user2, user3].each { |user| group.add(user) }
|
|
|
|
|
2020-08-21 11:38:09 +08:00
|
|
|
expect do
|
|
|
|
put "/groups/#{group.id}/members.json",
|
|
|
|
params: {
|
|
|
|
user_emails: [user1.email, user2.email, user3.email].join(","),
|
|
|
|
}
|
|
|
|
end.to change { group.users.count }.by(1)
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
2021-02-04 18:06:08 +08:00
|
|
|
it "sends invites to new users and ignores existing users" do
|
|
|
|
user1.update!(username: "john")
|
|
|
|
user2.update!(username: "alice")
|
|
|
|
[user1, user2].each { |user| group.add(user) }
|
|
|
|
emails = %w[something@gmail.com anotherone@yahoo.com]
|
|
|
|
put "/groups/#{group.id}/members.json",
|
|
|
|
params: {
|
|
|
|
user_emails: [user1.email, user2.email].join(","),
|
|
|
|
emails: emails.join(","),
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["emails"]).to eq(emails)
|
|
|
|
|
|
|
|
emails.each do |email|
|
|
|
|
invite = Invite.find_by(email: email)
|
|
|
|
expect(invite.groups).to eq([group])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-08-21 11:38:09 +08:00
|
|
|
it "displays warning when all members already exists" do
|
|
|
|
user1.update!(username: "john")
|
|
|
|
user2.update!(username: "alice")
|
|
|
|
user3 = Fabricate(:user, username: "bob")
|
|
|
|
[user1, user2, user3].each { |user| group.add(user) }
|
|
|
|
|
2018-03-26 14:30:37 +08:00
|
|
|
expect do
|
|
|
|
put "/groups/#{group.id}/members.json",
|
|
|
|
params: {
|
|
|
|
user_emails: [user1.email, user2.email, user3.email].join(","),
|
|
|
|
}
|
2022-07-19 22:03:03 +08:00
|
|
|
end.not_to change { group.users.count }
|
2018-03-26 14:30:37 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(422)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
expect(response.parsed_body["errors"]).to include(
|
2018-03-26 14:30:37 +08:00
|
|
|
I18n.t("groups.errors.member_already_exist", username: "alice, bob, john", count: 3),
|
|
|
|
)
|
|
|
|
end
|
2020-08-25 06:55:21 +08:00
|
|
|
|
|
|
|
it "display error when try to add to many users at once" do
|
2021-06-21 09:50:52 +08:00
|
|
|
stub_const(GroupsController, "ADD_MEMBERS_LIMIT", 1) do
|
2020-08-25 06:55:21 +08:00
|
|
|
expect do
|
|
|
|
put "/groups/#{group.id}/members.json",
|
2020-08-25 09:24:59 +08:00
|
|
|
params: {
|
|
|
|
user_emails: [user1.email, user2.email].join(","),
|
|
|
|
}
|
2022-07-19 22:03:03 +08:00
|
|
|
end.not_to change { group.reload.users.count }
|
2020-08-25 06:55:21 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(422)
|
|
|
|
|
|
|
|
expect(response.parsed_body["errors"]).to include(
|
|
|
|
I18n.t("groups.errors.adding_too_many_users", count: 1),
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns 422 if member already exists" do
|
2017-08-31 12:06:56 +08:00
|
|
|
put "/groups/#{group.id}/members.json", params: { usernames: user.username }
|
2016-12-07 12:06:56 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(422)
|
2018-03-26 14:30:37 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
expect(response.parsed_body["errors"]).to include(
|
2018-03-26 14:30:37 +08:00
|
|
|
I18n.t("groups.errors.member_already_exist", username: user.username, count: 1),
|
|
|
|
)
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
|
|
|
|
2018-04-20 10:12:16 +08:00
|
|
|
it "returns 400 if member is not found" do
|
|
|
|
[
|
|
|
|
{ usernames: "some thing" },
|
|
|
|
{ user_ids: "-5,-6" },
|
|
|
|
{ user_emails: "some@test.org" },
|
|
|
|
].each do |params|
|
|
|
|
put "/groups/#{group.id}/members.json", params: params
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2018-04-20 10:12:16 +08:00
|
|
|
expect(response.status).to eq(400)
|
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2018-04-20 10:12:16 +08:00
|
|
|
|
|
|
|
expect(body["error_type"]).to eq("invalid_parameters")
|
|
|
|
end
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
|
|
|
|
2020-08-04 23:02:01 +08:00
|
|
|
it "return a 400 if no user or emails are present" do
|
|
|
|
[
|
|
|
|
{ usernames: "nouserwiththisusername", emails: "" },
|
|
|
|
{ usernames: "", emails: "" },
|
|
|
|
].each do |params|
|
|
|
|
put "/groups/#{group.id}/members.json", params: params
|
|
|
|
expect(response.status).to eq(400)
|
|
|
|
body = response.parsed_body
|
|
|
|
|
|
|
|
expect(body["error_type"]).to eq("invalid_parameters")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "will send invites to each email with group_id set" do
|
|
|
|
emails = %w[something@gmail.com anotherone@yahoo.com]
|
|
|
|
put "/groups/#{group.id}/members.json", params: { emails: emails.join(",") }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
body = response.parsed_body
|
|
|
|
|
|
|
|
expect(body["emails"]).to eq(emails)
|
|
|
|
|
|
|
|
emails.each do |email|
|
|
|
|
invite = Invite.find_by(email: email)
|
|
|
|
expect(invite.groups).to eq([group])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-02-17 17:31:20 +08:00
|
|
|
it "adds known users by email when DiscourseConnect is enabled" do
|
|
|
|
SiteSetting.discourse_connect_url = "https://www.example.com/sso"
|
|
|
|
SiteSetting.enable_discourse_connect = true
|
2021-02-04 01:13:00 +08:00
|
|
|
|
|
|
|
expect do
|
|
|
|
put "/groups/#{group.id}/members.json", params: { emails: other_user.email }
|
|
|
|
end.to change { group.users.count }.by(1)
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
2020-08-04 23:02:01 +08:00
|
|
|
it "will find users by email, and invite the correct user" do
|
|
|
|
new_user = Fabricate(:user)
|
|
|
|
expect(new_user.group_ids.include?(group.id)).to eq(false)
|
|
|
|
|
|
|
|
put "/groups/#{group.id}/members.json", params: { emails: new_user.email }
|
|
|
|
|
|
|
|
expect(new_user.reload.group_ids.include?(group.id)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "will invite the user if their username and email are both invited" do
|
|
|
|
new_user = Fabricate(:user)
|
|
|
|
put "/groups/#{group.id}/members.json",
|
|
|
|
params: {
|
|
|
|
usernames: new_user.username,
|
|
|
|
emails: new_user.email,
|
|
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(new_user.reload.group_ids.include?(group.id)).to eq(true)
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "with public group" do
|
2017-07-28 10:37:10 +08:00
|
|
|
before { group.update!(public_admission: true, public_exit: true) }
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when admin" do
|
2016-12-13 16:39:44 +08:00
|
|
|
it "can make incremental adds" do
|
|
|
|
expect do
|
2017-08-31 12:06:56 +08:00
|
|
|
put "/groups/#{group.id}/members.json", params: { usernames: other_user.username }
|
2016-12-13 16:39:44 +08:00
|
|
|
end.to change { group.users.count }.by(1)
|
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-13 16:39:44 +08:00
|
|
|
|
|
|
|
group_history = GroupHistory.last
|
|
|
|
|
|
|
|
expect(group_history.action).to eq(GroupHistory.actions[:add_user_to_group])
|
|
|
|
expect(group_history.acting_user).to eq(admin)
|
|
|
|
expect(group_history.target_user).to eq(other_user)
|
|
|
|
end
|
|
|
|
end
|
2021-07-22 15:11:23 +08:00
|
|
|
end
|
|
|
|
end
|
2016-12-13 16:39:44 +08:00
|
|
|
|
2023-01-11 16:43:18 +08:00
|
|
|
describe "#add_owners" do
|
|
|
|
context "when logged in as an admin" do
|
|
|
|
before { sign_in(admin) }
|
|
|
|
|
|
|
|
it "should work" do
|
|
|
|
put "/groups/#{group.id}/owners.json",
|
|
|
|
params: {
|
|
|
|
usernames: [user.username, admin.username].join(","),
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
|
|
|
response_body = response.parsed_body
|
|
|
|
|
|
|
|
expect(response_body["usernames"]).to contain_exactly(user.username, admin.username)
|
|
|
|
|
|
|
|
expect(group.group_users.where(owner: true).map(&:user)).to contain_exactly(user, admin)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns not-found error when there is no group" do
|
|
|
|
group.destroy!
|
|
|
|
|
|
|
|
put "/groups/#{group.id}/owners.json", params: { usernames: user.username }
|
|
|
|
|
|
|
|
expect(response.status).to eq(404)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not allow adding owners to an automatic group" do
|
|
|
|
group.update!(automatic: true)
|
|
|
|
|
|
|
|
expect do
|
|
|
|
put "/groups/#{group.id}/owners.json", params: { usernames: user.username }
|
|
|
|
end.to_not change { group.group_users.count }
|
|
|
|
|
|
|
|
expect(response.status).to eq(422)
|
|
|
|
expect(response.parsed_body["errors"]).to eq(
|
|
|
|
[I18n.t("groups.errors.can_not_modify_automatic")],
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not notify users when the param is not present" do
|
|
|
|
put "/groups/#{group.id}/owners.json", params: { usernames: user.username }
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
|
|
|
topic =
|
|
|
|
Topic.find_by(
|
|
|
|
title:
|
|
|
|
I18n.t(
|
|
|
|
"system_messages.user_added_to_group_as_owner.subject_template",
|
|
|
|
group_name: group.name,
|
|
|
|
),
|
|
|
|
archetype: "private_message",
|
|
|
|
)
|
|
|
|
expect(topic.nil?).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "notifies users when the param is present" do
|
|
|
|
put "/groups/#{group.id}/owners.json",
|
|
|
|
params: {
|
|
|
|
usernames: user.username,
|
|
|
|
notify_users: true,
|
|
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
|
|
|
topic =
|
|
|
|
Topic.find_by(
|
|
|
|
title:
|
|
|
|
I18n.t(
|
|
|
|
"system_messages.user_added_to_group_as_owner.subject_template",
|
|
|
|
group_name: group.name,
|
|
|
|
),
|
|
|
|
archetype: "private_message",
|
|
|
|
)
|
|
|
|
expect(topic.nil?).to eq(false)
|
|
|
|
expect(topic.topic_users.map(&:user_id)).to include(-1, user.id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when logged in as a moderator" do
|
|
|
|
before { sign_in(moderator) }
|
|
|
|
|
|
|
|
context "with moderators_manage_categories_and_groups enabled" do
|
|
|
|
before { SiteSetting.moderators_manage_categories_and_groups = true }
|
|
|
|
|
|
|
|
it "adds owners" do
|
|
|
|
put "/groups/#{group.id}/owners.json",
|
|
|
|
params: {
|
|
|
|
usernames: [user.username, admin.username, moderator.username].join(","),
|
|
|
|
}
|
|
|
|
|
|
|
|
response_body = response.parsed_body
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response_body["usernames"]).to contain_exactly(
|
|
|
|
user.username,
|
|
|
|
admin.username,
|
|
|
|
moderator.username,
|
|
|
|
)
|
|
|
|
expect(group.group_users.where(owner: true).map(&:user)).to contain_exactly(
|
|
|
|
user,
|
|
|
|
admin,
|
|
|
|
moderator,
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "with moderators_manage_categories_and_groups disabled" do
|
|
|
|
before { SiteSetting.moderators_manage_categories_and_groups = false }
|
|
|
|
|
|
|
|
it "prevents adding of owners with a 403 response" do
|
|
|
|
put "/groups/#{group.id}/owners.json",
|
|
|
|
params: {
|
|
|
|
usernames: [user.username, admin.username, moderator.username].join(","),
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
expect(response.parsed_body["errors"]).to include(I18n.t("invalid_access"))
|
|
|
|
expect(group.group_users.where(owner: true).map(&:user)).to be_empty
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when logged in as a non-owner" do
|
|
|
|
before { sign_in(user) }
|
|
|
|
|
|
|
|
it "prevents adding of owners with a 403 response" do
|
|
|
|
put "/groups/#{group.id}/owners.json",
|
|
|
|
params: {
|
|
|
|
usernames: [user.username, admin.username].join(","),
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
expect(response.parsed_body["errors"]).to include(I18n.t("invalid_access"))
|
|
|
|
expect(group.group_users.where(owner: true).map(&:user)).to be_empty
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when logged in as an owner" do
|
|
|
|
before { sign_in(user) }
|
|
|
|
|
|
|
|
it "allows adding new owners" do
|
|
|
|
group.add_owner(user)
|
|
|
|
|
|
|
|
put "/groups/#{group.id}/owners.json",
|
|
|
|
params: {
|
|
|
|
usernames: [user.username, admin.username].join(","),
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body["usernames"]).to contain_exactly(
|
|
|
|
user.username,
|
|
|
|
admin.username,
|
|
|
|
)
|
|
|
|
expect(group.group_users.where(owner: true).map(&:user)).to contain_exactly(user, admin)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-27 18:21:10 +08:00
|
|
|
describe "#join" do
|
2021-07-22 15:11:23 +08:00
|
|
|
let(:public_group) { Fabricate(:public_group) }
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2021-07-22 15:11:23 +08:00
|
|
|
it "should allow a user to join a public group" do
|
|
|
|
sign_in(user)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2021-07-22 15:11:23 +08:00
|
|
|
expect do put "/groups/#{public_group.id}/join.json" end.to change {
|
|
|
|
public_group.users.count
|
|
|
|
}.by(1)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2021-07-22 15:11:23 +08:00
|
|
|
expect(response.status).to eq(204)
|
|
|
|
end
|
2016-12-13 16:39:44 +08:00
|
|
|
|
2021-07-22 15:11:23 +08:00
|
|
|
it "should not allow a user to join a nonpublic group" do
|
|
|
|
sign_in(user)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2021-07-22 15:11:23 +08:00
|
|
|
expect do put "/groups/#{group.id}/join.json" end.not_to change { group.users.count }
|
|
|
|
|
|
|
|
expect(response).to be_forbidden
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should not allow an anonymous user to call the join method" do
|
|
|
|
expect do put "/groups/#{group.id}/join.json" end.not_to change { group.users.count }
|
|
|
|
|
|
|
|
expect(response).to be_forbidden
|
|
|
|
end
|
|
|
|
|
|
|
|
it "the join method is idempotent" do
|
|
|
|
sign_in(user)
|
|
|
|
|
|
|
|
expect do put "/groups/#{public_group.id}/join.json" end.to change {
|
|
|
|
public_group.users.count
|
|
|
|
}.by(1)
|
|
|
|
expect(response.status).to eq(204)
|
|
|
|
|
|
|
|
expect do put "/groups/#{public_group.id}/join.json" end.not_to change {
|
|
|
|
public_group.users.count
|
|
|
|
}
|
|
|
|
expect(response.status).to eq(204)
|
|
|
|
|
|
|
|
expect do put "/groups/#{public_group.id}/join.json" end.not_to change {
|
|
|
|
public_group.users.count
|
|
|
|
}
|
|
|
|
expect(response.status).to eq(204)
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-27 18:21:10 +08:00
|
|
|
describe "#remove_member" do
|
2021-07-23 00:14:18 +08:00
|
|
|
before { sign_in(admin) }
|
|
|
|
|
2016-12-07 12:06:56 +08:00
|
|
|
it "cannot remove members from automatic groups" do
|
|
|
|
group.update!(automatic: true)
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
delete "/groups/#{group.id}/members.json", params: { user_id: 42 }
|
2016-12-07 12:06:56 +08:00
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "raises an error if user to be removed is not found" do
|
2017-08-31 12:06:56 +08:00
|
|
|
delete "/groups/#{group.id}/members.json", params: { user_id: -10 }
|
2018-10-12 05:27:41 +08:00
|
|
|
expect(response.status).to eq(400)
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
|
|
|
|
2020-07-23 04:27:43 +08:00
|
|
|
it "returns skipped_usernames response body when removing a valid user but is not a member of that group" do
|
2023-12-07 07:04:45 +08:00
|
|
|
delete "/groups/#{group.id}/members.json", params: { user_id: Discourse::SYSTEM_USER_ID }
|
2020-07-23 04:27:43 +08:00
|
|
|
|
|
|
|
response_body = response.parsed_body
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response_body["usernames"]).to eq([])
|
|
|
|
expect(response_body["skipped_usernames"].first).to eq("system")
|
2020-03-11 05:25:00 +08:00
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when is able to remove a member" do
|
2016-12-07 12:06:56 +08:00
|
|
|
it "removes by id" do
|
2017-08-31 12:06:56 +08:00
|
|
|
expect do
|
|
|
|
delete "/groups/#{group.id}/members.json", params: { user_id: user.id }
|
|
|
|
end.to change { group.users.count }.by(-1)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
|
|
|
|
2019-01-25 08:28:48 +08:00
|
|
|
it "removes by id with integer in json" do
|
|
|
|
expect do
|
|
|
|
headers = { CONTENT_TYPE: "application/json" }
|
|
|
|
delete "/groups/#{group.id}/members.json",
|
|
|
|
params: "{\"user_id\":#{user.id}}",
|
|
|
|
headers: headers
|
|
|
|
end.to change { group.users.count }.by(-1)
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
2016-12-07 12:06:56 +08:00
|
|
|
it "removes by username" do
|
2017-08-31 12:06:56 +08:00
|
|
|
expect do
|
|
|
|
delete "/groups/#{group.id}/members.json", params: { username: user.username }
|
|
|
|
end.to change { group.users.count }.by(-1)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "removes user.primary_group_id when user is removed from group" do
|
|
|
|
user.update!(primary_group_id: group.id)
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
delete "/groups/#{group.id}/members.json", params: { user_id: user.id }
|
2016-12-07 12:06:56 +08:00
|
|
|
|
|
|
|
expect(user.reload.primary_group_id).to eq(nil)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "removes by user_email" do
|
2017-08-31 12:06:56 +08:00
|
|
|
expect do
|
|
|
|
delete "/groups/#{group.id}/members.json", params: { user_email: user.email }
|
|
|
|
end.to change { group.users.count }.by(-1)
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "with public group" do
|
2017-07-28 10:37:10 +08:00
|
|
|
let(:group) { Fabricate(:public_group, users: [other_user]) }
|
2016-12-07 12:06:56 +08:00
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when admin" do
|
2016-12-13 16:39:44 +08:00
|
|
|
it "removes by username" do
|
2017-08-31 12:06:56 +08:00
|
|
|
expect do
|
|
|
|
delete "/groups/#{group.id}/members.json", params: { username: other_user.username }
|
|
|
|
end.to change { group.users.count }.by(-1)
|
2016-12-13 16:39:44 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-13 16:39:44 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-05-21 09:43:47 +08:00
|
|
|
it "should not allow a underprivileged user to leave a group for another user" do
|
2016-12-13 16:39:44 +08:00
|
|
|
sign_in(user)
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
delete "/groups/#{group.id}/members.json", params: { username: other_user.username }
|
2016-12-07 12:06:56 +08:00
|
|
|
|
|
|
|
expect(response).to be_forbidden
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2018-10-12 05:27:41 +08:00
|
|
|
|
2022-07-27 18:21:10 +08:00
|
|
|
describe "#remove_members" do
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when is able to remove several members from a group" do
|
2019-05-07 11:12:20 +08:00
|
|
|
fab!(:user1) { Fabricate(:user) }
|
|
|
|
fab!(:user2) { Fabricate(:user, username: "UsEr2") }
|
2018-10-12 05:27:41 +08:00
|
|
|
let(:group1) { Fabricate(:group, users: [user1, user2]) }
|
|
|
|
|
|
|
|
it "removes by username" do
|
|
|
|
expect do
|
|
|
|
delete "/groups/#{group1.id}/members.json",
|
2018-10-19 03:32:36 +08:00
|
|
|
params: {
|
|
|
|
usernames: [user1.username, user2.username.upcase].join(","),
|
|
|
|
}
|
2018-10-12 05:27:41 +08:00
|
|
|
end.to change { group1.users.count }.by(-2)
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "removes by id" do
|
|
|
|
expect do
|
|
|
|
delete "/groups/#{group1.id}/members.json",
|
|
|
|
params: {
|
|
|
|
user_ids: [user1.id, user2.id].join(","),
|
|
|
|
}
|
|
|
|
end.to change { group1.users.count }.by(-2)
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
2019-01-25 08:28:48 +08:00
|
|
|
it "removes by id with integer in json" do
|
|
|
|
expect do
|
|
|
|
headers = { CONTENT_TYPE: "application/json" }
|
|
|
|
delete "/groups/#{group1.id}/members.json",
|
|
|
|
params: "{\"user_ids\":#{user1.id}}",
|
|
|
|
headers: headers
|
|
|
|
end.to change { group1.users.count }.by(-1)
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
2018-10-12 05:27:41 +08:00
|
|
|
it "removes by email" do
|
|
|
|
expect do
|
|
|
|
delete "/groups/#{group1.id}/members.json",
|
|
|
|
params: {
|
|
|
|
user_emails: [user1.email, user2.email].join(","),
|
|
|
|
}
|
|
|
|
end.to change { group1.users.count }.by(-2)
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "only removes users in that group" do
|
2020-03-11 05:25:00 +08:00
|
|
|
delete "/groups/#{group1.id}/members.json",
|
|
|
|
params: {
|
|
|
|
usernames: [user.username, user2.username].join(","),
|
|
|
|
}
|
2018-10-12 05:27:41 +08:00
|
|
|
|
2020-07-23 04:27:43 +08:00
|
|
|
response_body = response.parsed_body
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response_body["usernames"].first).to eq(user2.username)
|
|
|
|
expect(response_body["skipped_usernames"].first).to eq(user.username)
|
2018-10-12 05:27:41 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
2021-07-23 00:14:18 +08:00
|
|
|
|
2022-07-27 18:21:10 +08:00
|
|
|
describe "#leave" do
|
2021-07-23 00:14:18 +08:00
|
|
|
let(:group_with_public_exit) { Fabricate(:group, public_exit: true, users: [user]) }
|
|
|
|
|
|
|
|
it "should allow a user to leave a group with public exit" do
|
|
|
|
sign_in(user)
|
|
|
|
|
|
|
|
expect do delete "/groups/#{group_with_public_exit.id}/leave.json" end.to change {
|
|
|
|
group_with_public_exit.users.count
|
|
|
|
}.by(-1)
|
|
|
|
|
|
|
|
expect(response.status).to eq(204)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should not allow a user to leave a group without public exit" do
|
|
|
|
sign_in(user)
|
|
|
|
|
|
|
|
expect do delete "/groups/#{group.id}/leave.json" end.not_to change { group.users.count }
|
|
|
|
|
|
|
|
expect(response).to be_forbidden
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should not allow an anonymous user to call the leave method" do
|
|
|
|
expect do delete "/groups/#{group_with_public_exit.id}/leave.json" end.not_to change {
|
|
|
|
group_with_public_exit.users.count
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response).to be_forbidden
|
|
|
|
end
|
|
|
|
|
|
|
|
it "the leave method is idempotent" do
|
|
|
|
sign_in(user)
|
|
|
|
|
|
|
|
expect do delete "/groups/#{group_with_public_exit.id}/leave.json" end.to change {
|
|
|
|
group_with_public_exit.users.count
|
|
|
|
}.by(-1)
|
|
|
|
expect(response.status).to eq(204)
|
|
|
|
|
|
|
|
expect do delete "/groups/#{group_with_public_exit.id}/leave.json" end.not_to change {
|
|
|
|
group_with_public_exit.users.count
|
|
|
|
}
|
|
|
|
expect(response.status).to eq(204)
|
|
|
|
|
|
|
|
expect do delete "/groups/#{group_with_public_exit.id}/leave.json" end.not_to change {
|
|
|
|
group_with_public_exit.users.count
|
|
|
|
}
|
|
|
|
expect(response.status).to eq(204)
|
|
|
|
end
|
|
|
|
end
|
2016-12-07 12:06:56 +08:00
|
|
|
end
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2020-05-26 21:28:03 +08:00
|
|
|
describe "#handle_membership_request" do
|
|
|
|
before do
|
|
|
|
group.add_owner(user)
|
|
|
|
sign_in(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "sends a private message when accepted" do
|
2021-05-20 13:28:36 +08:00
|
|
|
GroupRequest.create!(group: group, user: other_user)
|
2020-05-26 21:28:03 +08:00
|
|
|
expect {
|
|
|
|
put "/groups/#{group.id}/handle_membership_request.json",
|
|
|
|
params: {
|
|
|
|
user_id: other_user.id,
|
|
|
|
accept: true,
|
|
|
|
}
|
|
|
|
}.to change { Topic.count }.by(1).and change { Post.count }.by(1)
|
|
|
|
|
|
|
|
topic = Topic.last
|
|
|
|
expect(topic.archetype).to eq(Archetype.private_message)
|
|
|
|
expect(topic.title).to eq(I18n.t("groups.request_accepted_pm.title", group_name: group.name))
|
|
|
|
expect(topic.first_post.raw).to eq(
|
|
|
|
I18n.t("groups.request_accepted_pm.body", group_name: group.name).strip,
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
describe "#histories" do
|
2016-12-11 23:36:15 +08:00
|
|
|
context "when user is not signed in" do
|
|
|
|
it "should raise the right error" do
|
2018-01-12 11:15:10 +08:00
|
|
|
get "/groups/#{group.name}/logs.json"
|
|
|
|
expect(response.status).to eq(403)
|
2016-12-11 23:36:15 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when user is not a group owner" do
|
|
|
|
before { sign_in(user) }
|
|
|
|
|
|
|
|
it "should be forbidden" do
|
2017-08-31 12:06:56 +08:00
|
|
|
get "/groups/#{group.name}/logs.json"
|
2016-12-11 23:36:15 +08:00
|
|
|
|
|
|
|
expect(response).to be_forbidden
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
describe "when user is a group owner" do
|
|
|
|
before do
|
|
|
|
group.add_owner(user)
|
|
|
|
sign_in(user)
|
|
|
|
end
|
2017-07-28 10:37:10 +08:00
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
describe "when viewing a public group" do
|
|
|
|
before do
|
2017-07-28 10:37:10 +08:00
|
|
|
group.update!(public_admission: true, public_exit: true)
|
|
|
|
|
2016-12-11 23:36:15 +08:00
|
|
|
GroupActionLogger.new(user, group).log_change_group_settings
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should allow group owner to view history" do
|
2017-08-31 12:06:56 +08:00
|
|
|
get "/groups/#{group.name}/logs.json"
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
result = response.parsed_body["logs"].find { |entry| entry["subject"] == "public_exit" }
|
2016-12-11 23:36:15 +08:00
|
|
|
|
|
|
|
expect(result["action"]).to eq(GroupHistory.actions[1].to_s)
|
2017-07-28 10:37:10 +08:00
|
|
|
expect(result["subject"]).to eq("public_exit")
|
2016-12-11 23:36:15 +08:00
|
|
|
expect(result["prev_value"]).to eq("f")
|
|
|
|
expect(result["new_value"]).to eq("t")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
it "should not be allowed to view history of an automatic group" do
|
|
|
|
group = Group.find_by(id: Group::AUTO_GROUPS[:admins])
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
get "/groups/#{group.name}/logs.json"
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
end
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
context "when user is an admin" do
|
|
|
|
before { sign_in(admin) }
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
it "should be able to view history" do
|
|
|
|
GroupActionLogger.new(admin, group).log_remove_user_from_group(user)
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
get "/groups/#{group.name}/logs.json"
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
result = response.parsed_body["logs"].first
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
expect(result["action"]).to eq(GroupHistory.actions[3].to_s)
|
|
|
|
end
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
it "should be able to view history of automatic groups" do
|
|
|
|
group = Group.find_by(id: Group::AUTO_GROUPS[:admins])
|
2016-12-11 23:36:15 +08:00
|
|
|
|
2018-04-05 16:31:09 +08:00
|
|
|
get "/groups/#{group.name}/logs.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should be able to filter through the history" do
|
|
|
|
GroupActionLogger.new(admin, group).log_add_user_to_group(user)
|
|
|
|
GroupActionLogger.new(admin, group).log_remove_user_from_group(user)
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/logs.json",
|
|
|
|
params: {
|
|
|
|
filters: {
|
|
|
|
"action" => "add_user_to_group",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2018-04-05 16:31:09 +08:00
|
|
|
|
2020-05-07 23:04:12 +08:00
|
|
|
logs = response.parsed_body["logs"]
|
2018-04-05 16:31:09 +08:00
|
|
|
|
|
|
|
expect(logs.count).to eq(1)
|
|
|
|
expect(logs.first["action"]).to eq(GroupHistory.actions[2].to_s)
|
2016-12-11 23:36:15 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2017-06-13 16:10:14 +08:00
|
|
|
|
2017-08-24 11:01:11 +08:00
|
|
|
describe "#request_membership" do
|
2019-05-07 11:12:20 +08:00
|
|
|
fab!(:new_user) { Fabricate(:user) }
|
2017-06-13 16:10:14 +08:00
|
|
|
|
|
|
|
it "requires the user to log in" do
|
2018-01-12 11:15:10 +08:00
|
|
|
post "/groups/#{group.name}/request_membership.json"
|
|
|
|
expect(response.status).to eq(403)
|
2017-06-13 16:10:14 +08:00
|
|
|
end
|
|
|
|
|
2017-08-08 17:53:02 +08:00
|
|
|
it "requires a reason" do
|
|
|
|
sign_in(user)
|
|
|
|
|
2018-01-12 11:15:10 +08:00
|
|
|
post "/groups/#{group.name}/request_membership.json"
|
|
|
|
expect(response.status).to eq(400)
|
2017-08-08 17:53:02 +08:00
|
|
|
end
|
|
|
|
|
2019-04-23 10:51:30 +08:00
|
|
|
it "checks for duplicates" do
|
|
|
|
sign_in(user)
|
|
|
|
|
|
|
|
post "/groups/#{group.name}/request_membership.json", params: { reason: "Please add me in" }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
|
|
|
post "/groups/#{group.name}/request_membership.json", params: { reason: "Please add me in" }
|
|
|
|
|
|
|
|
expect(response.status).to eq(409)
|
|
|
|
end
|
|
|
|
|
2023-01-25 19:50:33 +08:00
|
|
|
it "limits the character count of the reason" do
|
|
|
|
sign_in(user)
|
|
|
|
|
|
|
|
post "/groups/#{group.name}/request_membership.json",
|
|
|
|
params: {
|
|
|
|
reason: "x" * (GroupRequest::REASON_CHARACTER_LIMIT + 1),
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(422)
|
|
|
|
expect(response.parsed_body["errors"]).to contain_exactly(
|
2023-05-16 22:07:56 +08:00
|
|
|
"Reason is too long (maximum is 5000 characters)",
|
2023-01-25 19:50:33 +08:00
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2017-06-13 16:10:14 +08:00
|
|
|
it "should create the right PM" do
|
2017-06-15 11:36:09 +08:00
|
|
|
owner1 = Fabricate(:user, last_seen_at: Time.zone.now)
|
|
|
|
owner2 = Fabricate(:user, last_seen_at: Time.zone.now - 1.day)
|
|
|
|
[owner1, owner2].each { |owner| group.add_owner(owner) }
|
|
|
|
|
2017-06-13 16:10:14 +08:00
|
|
|
sign_in(user)
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
post "/groups/#{group.name}/request_membership.json", params: { reason: "Please add me in" }
|
2017-06-13 16:10:14 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2017-06-13 16:10:14 +08:00
|
|
|
|
|
|
|
post = Post.last
|
|
|
|
topic = post.topic
|
2020-05-07 23:04:12 +08:00
|
|
|
body = response.parsed_body
|
2017-06-13 16:10:14 +08:00
|
|
|
|
|
|
|
expect(body["relative_url"]).to eq(topic.relative_url)
|
2020-03-24 17:12:52 +08:00
|
|
|
expect(post.topic.custom_fields["requested_group_id"].to_i).to eq(group.id)
|
2017-06-13 16:10:14 +08:00
|
|
|
expect(post.user).to eq(user)
|
|
|
|
|
|
|
|
expect(topic.title).to eq(
|
|
|
|
I18n.t("groups.request_membership_pm.title", group_name: group.name),
|
|
|
|
)
|
|
|
|
|
2019-03-27 19:30:59 +08:00
|
|
|
expect(post.raw).to start_with("Please add me in")
|
2017-06-13 16:10:14 +08:00
|
|
|
expect(topic.archetype).to eq(Archetype.private_message)
|
2017-06-15 11:36:09 +08:00
|
|
|
expect(topic.allowed_users).to contain_exactly(user, owner1, owner2)
|
|
|
|
expect(topic.allowed_groups).to eq([])
|
2017-06-13 16:10:14 +08:00
|
|
|
end
|
|
|
|
end
|
2017-07-21 14:12:24 +08:00
|
|
|
|
2017-08-24 11:01:11 +08:00
|
|
|
describe "#search " do
|
2019-05-07 11:12:20 +08:00
|
|
|
fab!(:hidden_group) do
|
2017-07-21 14:12:24 +08:00
|
|
|
Fabricate(:group, visibility_level: Group.visibility_levels[:owners], name: "KingOfTheNorth")
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
group.update!(
|
|
|
|
name: "GOT",
|
2019-07-09 03:09:50 +08:00
|
|
|
full_name: "Daenerys Targaryen",
|
|
|
|
visibility_level: Group.visibility_levels[:logged_on_users],
|
2017-07-21 14:12:24 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
hidden_group
|
|
|
|
end
|
|
|
|
|
|
|
|
context "as an anon user" do
|
|
|
|
it "returns the right response" do
|
2018-01-12 11:15:10 +08:00
|
|
|
get "/groups/search.json"
|
|
|
|
expect(response.status).to eq(403)
|
2017-07-21 14:12:24 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "as a normal user" do
|
|
|
|
it "returns the right response" do
|
|
|
|
sign_in(user)
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
get "/groups/search.json"
|
2017-07-21 14:12:24 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
groups = response.parsed_body
|
2017-07-21 14:12:24 +08:00
|
|
|
|
|
|
|
expected_ids = Group::AUTO_GROUPS.map { |name, id| id }
|
|
|
|
expected_ids.delete(Group::AUTO_GROUPS[:everyone])
|
|
|
|
expected_ids << group.id
|
|
|
|
|
|
|
|
expect(groups.map { |group| group["id"] }).to contain_exactly(*expected_ids)
|
|
|
|
|
|
|
|
%w[GO nerys].each do |term|
|
2017-08-31 12:06:56 +08:00
|
|
|
get "/groups/search.json?term=#{term}"
|
2017-07-21 14:12:24 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
groups = response.parsed_body
|
2017-07-21 14:12:24 +08:00
|
|
|
|
|
|
|
expect(groups.length).to eq(1)
|
|
|
|
expect(groups.first["id"]).to eq(group.id)
|
|
|
|
end
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
get "/groups/search.json?term=KingOfTheNorth"
|
2017-07-21 14:12:24 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
groups = response.parsed_body
|
2017-07-21 14:12:24 +08:00
|
|
|
|
|
|
|
expect(groups).to eq([])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "as a group owner" do
|
|
|
|
before { hidden_group.add_owner(user) }
|
|
|
|
|
|
|
|
it "returns the right response" do
|
|
|
|
sign_in(user)
|
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
get "/groups/search.json?term=north"
|
2017-07-21 14:12:24 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
groups = response.parsed_body
|
2017-07-21 14:12:24 +08:00
|
|
|
|
|
|
|
expect(groups.length).to eq(1)
|
|
|
|
expect(groups.first["id"]).to eq(hidden_group.id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "as an admin" do
|
|
|
|
it "returns the right response" do
|
2021-12-04 04:54:07 +08:00
|
|
|
sign_in(admin)
|
2017-07-21 14:12:24 +08:00
|
|
|
|
2017-08-31 12:06:56 +08:00
|
|
|
get "/groups/search.json?ignore_automatic=true"
|
2017-07-21 14:12:24 +08:00
|
|
|
|
2018-06-07 16:11:09 +08:00
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
groups = response.parsed_body
|
2017-07-21 14:12:24 +08:00
|
|
|
|
|
|
|
expect(groups.length).to eq(2)
|
|
|
|
|
|
|
|
expect(groups.map { |group| group["id"] }).to contain_exactly(group.id, hidden_group.id)
|
|
|
|
end
|
|
|
|
end
|
2023-05-31 05:41:50 +08:00
|
|
|
|
|
|
|
describe "groups_search_query modifier" do
|
2023-11-10 06:47:59 +08:00
|
|
|
fab!(:user)
|
2023-05-31 05:41:50 +08:00
|
|
|
fab!(:cool_group) { Fabricate(:group, name: "cool-group") }
|
|
|
|
fab!(:boring_group) { Fabricate(:group, name: "boring-group") }
|
|
|
|
|
|
|
|
before { sign_in(user) }
|
|
|
|
|
|
|
|
it "allows changing the query" do
|
|
|
|
get "/groups/search.json", params: { term: "cool" }
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body.map { |g| g["id"] }).to include(cool_group.id)
|
|
|
|
expect(response.parsed_body.map { |g| g["id"] }).not_to include(boring_group.id)
|
|
|
|
|
|
|
|
Plugin::Instance
|
|
|
|
.new
|
|
|
|
.register_modifier(:groups_search_query) do |query|
|
|
|
|
query.where("groups.name LIKE 'boring%'")
|
|
|
|
end
|
|
|
|
|
|
|
|
get "/groups/search.json", params: { term: "cool" }
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.parsed_body.map { |g| g["id"] }).not_to include(
|
|
|
|
cool_group.id,
|
|
|
|
boring_group.id,
|
|
|
|
)
|
|
|
|
ensure
|
|
|
|
DiscoursePluginRegistry.clear_modifiers!
|
|
|
|
end
|
|
|
|
end
|
2017-07-21 14:12:24 +08:00
|
|
|
end
|
2018-03-27 16:45:21 +08:00
|
|
|
|
|
|
|
describe "#new" do
|
|
|
|
describe "for an anon user" do
|
|
|
|
it "should return 404" do
|
|
|
|
get "/groups/custom/new"
|
|
|
|
|
|
|
|
expect(response.status).to eq(404)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "for a normal user" do
|
|
|
|
before { sign_in(user) }
|
|
|
|
|
|
|
|
it "should return 404" do
|
|
|
|
get "/groups/custom/new"
|
|
|
|
|
|
|
|
expect(response.status).to eq(404)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "for an admin user" do
|
2021-12-04 04:54:07 +08:00
|
|
|
before { sign_in(admin) }
|
2018-03-27 16:45:21 +08:00
|
|
|
|
2020-07-24 10:54:26 +08:00
|
|
|
it "should return 200" do
|
2018-03-27 16:45:21 +08:00
|
|
|
get "/groups/custom/new"
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2018-08-01 11:08:45 +08:00
|
|
|
|
|
|
|
describe "#check_name" do
|
|
|
|
describe "for an anon user" do
|
|
|
|
it "should return the right response" do
|
|
|
|
get "/groups/check-name.json", params: { group_name: "test" }
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should return the right response" do
|
|
|
|
sign_in(Fabricate(:user))
|
|
|
|
SiteSetting.reserved_usernames = "test|donkey"
|
|
|
|
get "/groups/check-name.json", params: { group_name: "test" }
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2020-05-07 23:04:12 +08:00
|
|
|
expect(response.parsed_body["available"]).to eq(true)
|
2018-08-01 11:08:45 +08:00
|
|
|
end
|
|
|
|
end
|
2020-08-10 22:49:05 +08:00
|
|
|
|
|
|
|
describe "#permissions" do
|
|
|
|
before { sign_in(other_user) }
|
|
|
|
|
|
|
|
it "ensures the group can be seen" do
|
|
|
|
group.update!(visibility_level: Group.visibility_levels[:owners])
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/permissions.json"
|
|
|
|
|
2020-09-08 10:52:29 +08:00
|
|
|
expect(response.status).to eq(404)
|
2020-08-10 22:49:05 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "with varying category permissions" do
|
2023-11-10 06:47:59 +08:00
|
|
|
fab!(:category)
|
2020-08-10 22:49:05 +08:00
|
|
|
|
|
|
|
before do
|
|
|
|
category.set_permissions("#{group.name}": :full)
|
|
|
|
category.save!
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not return categories the user cannot see" do
|
|
|
|
get "/groups/#{group.name}/permissions.json"
|
2020-08-11 13:53:11 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2020-08-10 22:49:05 +08:00
|
|
|
expect(response.parsed_body).to eq([])
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns categories the user can see" do
|
|
|
|
group.add(other_user)
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/permissions.json"
|
2020-08-11 13:53:11 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
2020-08-10 22:49:05 +08:00
|
|
|
expect(response.parsed_body.count).to eq(1)
|
|
|
|
expect(response.parsed_body.first["category"]["id"]).to eq(category.id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns categories alphabetically" do
|
|
|
|
sign_in(user)
|
|
|
|
|
|
|
|
["Three", "New Cat", "Abc", "Hello"].each do |name|
|
|
|
|
category = Fabricate(:category, name: name)
|
|
|
|
category.set_permissions("#{group.name}": :full)
|
|
|
|
category.save!
|
|
|
|
end
|
|
|
|
|
|
|
|
get "/groups/#{group.name}/permissions.json"
|
2020-08-11 13:53:11 +08:00
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2020-08-10 22:49:05 +08:00
|
|
|
expect(response.parsed_body.map { |permission| permission["category"]["name"] }).to eq(
|
|
|
|
["Abc", "Hello", "New Cat", "Three"],
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
FEATURE: Improve group email settings UI (#13083)
This overhauls the user interface for the group email settings management, aiming to make it a lot easier to test the settings entered and confirm they are correct before proceeding. We do this by forcing the user to test the settings before they can be saved to the database. It also includes some quality of life improvements around setting up IMAP and SMTP for our first supported provider, GMail. This PR does not remove the old group email config, that will come in a subsequent PR. This is related to https://meta.discourse.org/t/imap-support-for-group-inboxes/160588 so read that if you would like more backstory.
### UI
Both site settings of `enable_imap` and `enable_smtp` must be true to test this. You must enable SMTP first to enable IMAP.
You can prefill the SMTP settings with GMail configuration. To proceed with saving these settings you must test them, which is handled by the EmailSettingsValidator.
If there is an issue with the configuration or credentials a meaningful error message should be shown.
IMAP settings must also be validated when IMAP is enabled, before saving.
When saving IMAP, we fetch the mailboxes for that account and populate them. This mailbox must be selected and saved for IMAP to work (the feature acts as though it is disabled until the mailbox is selected and saved):
### Database & Backend
This adds several columns to the Groups table. The purpose of this change is to make it much more explicit that SMTP/IMAP is enabled for a group, rather than relying on settings not being null. Also included is an UPDATE query to backfill these columns. These columns are automatically filled when updating the group.
For GMail, we now filter the mailboxes returned. This is so users cannot use a mailbox like Sent or Trash for syncing, which would generally be disastrous.
There is a new group endpoint for testing email settings. This may be useful in the future for other places in our UI, at which point it can be extracted to a more generic endpoint or module to be included.
2021-05-28 07:28:18 +08:00
|
|
|
|
|
|
|
describe "#test_email_settings" do
|
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
protocol: protocol,
|
|
|
|
ssl: ssl,
|
|
|
|
port: port,
|
|
|
|
host: host,
|
|
|
|
username: username,
|
|
|
|
password: password,
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
sign_in(user)
|
|
|
|
group.group_users.where(user: user).last.update(owner: user)
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when validating smtp" do
|
FEATURE: Improve group email settings UI (#13083)
This overhauls the user interface for the group email settings management, aiming to make it a lot easier to test the settings entered and confirm they are correct before proceeding. We do this by forcing the user to test the settings before they can be saved to the database. It also includes some quality of life improvements around setting up IMAP and SMTP for our first supported provider, GMail. This PR does not remove the old group email config, that will come in a subsequent PR. This is related to https://meta.discourse.org/t/imap-support-for-group-inboxes/160588 so read that if you would like more backstory.
### UI
Both site settings of `enable_imap` and `enable_smtp` must be true to test this. You must enable SMTP first to enable IMAP.
You can prefill the SMTP settings with GMail configuration. To proceed with saving these settings you must test them, which is handled by the EmailSettingsValidator.
If there is an issue with the configuration or credentials a meaningful error message should be shown.
IMAP settings must also be validated when IMAP is enabled, before saving.
When saving IMAP, we fetch the mailboxes for that account and populate them. This mailbox must be selected and saved for IMAP to work (the feature acts as though it is disabled until the mailbox is selected and saved):
### Database & Backend
This adds several columns to the Groups table. The purpose of this change is to make it much more explicit that SMTP/IMAP is enabled for a group, rather than relying on settings not being null. Also included is an UPDATE query to backfill these columns. These columns are automatically filled when updating the group.
For GMail, we now filter the mailboxes returned. This is so users cannot use a mailbox like Sent or Trash for syncing, which would generally be disastrous.
There is a new group endpoint for testing email settings. This may be useful in the future for other places in our UI, at which point it can be extracted to a more generic endpoint or module to be included.
2021-05-28 07:28:18 +08:00
|
|
|
let(:protocol) { "smtp" }
|
|
|
|
let(:username) { "test@gmail.com" }
|
|
|
|
let(:password) { "password" }
|
|
|
|
let(:domain) { nil }
|
|
|
|
let(:ssl) { true }
|
|
|
|
let(:host) { "smtp.somemailsite.com" }
|
|
|
|
let(:port) { 587 }
|
|
|
|
|
|
|
|
context "when an error is raised" do
|
|
|
|
before do
|
|
|
|
EmailSettingsValidator.expects(:validate_smtp).raises(
|
|
|
|
Net::SMTPAuthenticationError,
|
|
|
|
"Invalid credentials",
|
|
|
|
)
|
|
|
|
end
|
|
|
|
it "uses the friendly error message functionality to return the message to the user" do
|
|
|
|
post "/groups/#{group.id}/test_email_settings.json", params: params
|
|
|
|
expect(response.status).to eq(422)
|
|
|
|
expect(response.parsed_body["errors"]).to include(
|
|
|
|
I18n.t("email_settings.smtp_authentication_error"),
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when validating imap" do
|
FEATURE: Improve group email settings UI (#13083)
This overhauls the user interface for the group email settings management, aiming to make it a lot easier to test the settings entered and confirm they are correct before proceeding. We do this by forcing the user to test the settings before they can be saved to the database. It also includes some quality of life improvements around setting up IMAP and SMTP for our first supported provider, GMail. This PR does not remove the old group email config, that will come in a subsequent PR. This is related to https://meta.discourse.org/t/imap-support-for-group-inboxes/160588 so read that if you would like more backstory.
### UI
Both site settings of `enable_imap` and `enable_smtp` must be true to test this. You must enable SMTP first to enable IMAP.
You can prefill the SMTP settings with GMail configuration. To proceed with saving these settings you must test them, which is handled by the EmailSettingsValidator.
If there is an issue with the configuration or credentials a meaningful error message should be shown.
IMAP settings must also be validated when IMAP is enabled, before saving.
When saving IMAP, we fetch the mailboxes for that account and populate them. This mailbox must be selected and saved for IMAP to work (the feature acts as though it is disabled until the mailbox is selected and saved):
### Database & Backend
This adds several columns to the Groups table. The purpose of this change is to make it much more explicit that SMTP/IMAP is enabled for a group, rather than relying on settings not being null. Also included is an UPDATE query to backfill these columns. These columns are automatically filled when updating the group.
For GMail, we now filter the mailboxes returned. This is so users cannot use a mailbox like Sent or Trash for syncing, which would generally be disastrous.
There is a new group endpoint for testing email settings. This may be useful in the future for other places in our UI, at which point it can be extracted to a more generic endpoint or module to be included.
2021-05-28 07:28:18 +08:00
|
|
|
let(:protocol) { "imap" }
|
|
|
|
let(:username) { "test@gmail.com" }
|
|
|
|
let(:password) { "password" }
|
|
|
|
let(:domain) { nil }
|
|
|
|
let(:ssl) { true }
|
|
|
|
let(:host) { "imap.somemailsite.com" }
|
|
|
|
let(:port) { 993 }
|
|
|
|
|
|
|
|
it "validates with the correct TLS settings" do
|
|
|
|
EmailSettingsValidator.expects(:validate_imap).with(has_entry(ssl: true))
|
|
|
|
post "/groups/#{group.id}/test_email_settings.json", params: params
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when an error is raised" do
|
|
|
|
before do
|
|
|
|
EmailSettingsValidator.expects(:validate_imap).raises(
|
|
|
|
Net::IMAP::NoResponseError,
|
|
|
|
stub(data: stub(text: "Invalid credentials")),
|
|
|
|
)
|
|
|
|
end
|
|
|
|
it "uses the friendly error message functionality to return the message to the user" do
|
|
|
|
post "/groups/#{group.id}/test_email_settings.json", params: params
|
|
|
|
expect(response.status).to eq(422)
|
|
|
|
expect(response.parsed_body["errors"]).to include(
|
|
|
|
I18n.t("email_settings.imap_authentication_error"),
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "global param validation and rate limit" do
|
|
|
|
let(:protocol) { "smtp" }
|
|
|
|
let(:host) { "smtp.gmail.com" }
|
|
|
|
let(:port) { 587 }
|
|
|
|
let(:username) { "test@gmail.com" }
|
|
|
|
let(:password) { "password" }
|
|
|
|
let(:ssl) { true }
|
|
|
|
|
|
|
|
context "when the protocol is not accepted" do
|
|
|
|
let(:protocol) { "sigma" }
|
|
|
|
it "raises an invalid params error" do
|
|
|
|
post "/groups/#{group.id}/test_email_settings.json", params: params
|
|
|
|
expect(response.status).to eq(400)
|
|
|
|
expect(response.parsed_body["errors"].first).to match(
|
|
|
|
/Valid protocols to test are smtp and imap/,
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when user does not have access to the group" do
|
FEATURE: Improve group email settings UI (#13083)
This overhauls the user interface for the group email settings management, aiming to make it a lot easier to test the settings entered and confirm they are correct before proceeding. We do this by forcing the user to test the settings before they can be saved to the database. It also includes some quality of life improvements around setting up IMAP and SMTP for our first supported provider, GMail. This PR does not remove the old group email config, that will come in a subsequent PR. This is related to https://meta.discourse.org/t/imap-support-for-group-inboxes/160588 so read that if you would like more backstory.
### UI
Both site settings of `enable_imap` and `enable_smtp` must be true to test this. You must enable SMTP first to enable IMAP.
You can prefill the SMTP settings with GMail configuration. To proceed with saving these settings you must test them, which is handled by the EmailSettingsValidator.
If there is an issue with the configuration or credentials a meaningful error message should be shown.
IMAP settings must also be validated when IMAP is enabled, before saving.
When saving IMAP, we fetch the mailboxes for that account and populate them. This mailbox must be selected and saved for IMAP to work (the feature acts as though it is disabled until the mailbox is selected and saved):
### Database & Backend
This adds several columns to the Groups table. The purpose of this change is to make it much more explicit that SMTP/IMAP is enabled for a group, rather than relying on settings not being null. Also included is an UPDATE query to backfill these columns. These columns are automatically filled when updating the group.
For GMail, we now filter the mailboxes returned. This is so users cannot use a mailbox like Sent or Trash for syncing, which would generally be disastrous.
There is a new group endpoint for testing email settings. This may be useful in the future for other places in our UI, at which point it can be extracted to a more generic endpoint or module to be included.
2021-05-28 07:28:18 +08:00
|
|
|
before { group.group_users.destroy_all }
|
|
|
|
it "errors if the user does not have access to the group" do
|
|
|
|
post "/groups/#{group.id}/test_email_settings.json", params: params
|
|
|
|
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when rate limited" do
|
2023-06-16 10:44:35 +08:00
|
|
|
use_redis_snapshotting
|
|
|
|
|
FEATURE: Improve group email settings UI (#13083)
This overhauls the user interface for the group email settings management, aiming to make it a lot easier to test the settings entered and confirm they are correct before proceeding. We do this by forcing the user to test the settings before they can be saved to the database. It also includes some quality of life improvements around setting up IMAP and SMTP for our first supported provider, GMail. This PR does not remove the old group email config, that will come in a subsequent PR. This is related to https://meta.discourse.org/t/imap-support-for-group-inboxes/160588 so read that if you would like more backstory.
### UI
Both site settings of `enable_imap` and `enable_smtp` must be true to test this. You must enable SMTP first to enable IMAP.
You can prefill the SMTP settings with GMail configuration. To proceed with saving these settings you must test them, which is handled by the EmailSettingsValidator.
If there is an issue with the configuration or credentials a meaningful error message should be shown.
IMAP settings must also be validated when IMAP is enabled, before saving.
When saving IMAP, we fetch the mailboxes for that account and populate them. This mailbox must be selected and saved for IMAP to work (the feature acts as though it is disabled until the mailbox is selected and saved):
### Database & Backend
This adds several columns to the Groups table. The purpose of this change is to make it much more explicit that SMTP/IMAP is enabled for a group, rather than relying on settings not being null. Also included is an UPDATE query to backfill these columns. These columns are automatically filled when updating the group.
For GMail, we now filter the mailboxes returned. This is so users cannot use a mailbox like Sent or Trash for syncing, which would generally be disastrous.
There is a new group endpoint for testing email settings. This may be useful in the future for other places in our UI, at which point it can be extracted to a more generic endpoint or module to be included.
2021-05-28 07:28:18 +08:00
|
|
|
it "rate limits anon searches per user" do
|
|
|
|
RateLimiter.enable
|
|
|
|
|
|
|
|
5.times { post "/groups/#{group.id}/test_email_settings.json", params: params }
|
|
|
|
post "/groups/#{group.id}/test_email_settings.json", params: params
|
|
|
|
expect(response.status).to eq(429)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-11-25 16:45:15 +08:00
|
|
|
end
|