1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2018 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.AdminAPI.AdminAPIControllerTest do
6 use Pleroma.Web.ConnCase
10 import Pleroma.Factory
12 describe "/api/pleroma/admin/user" do
14 admin = insert(:user, info: %{is_admin: true})
19 |> assign(:user, admin)
20 |> put_req_header("accept", "application/json")
21 |> delete("/api/pleroma/admin/user?nickname=#{user.nickname}")
23 assert json_response(conn, 200) == user.nickname
27 admin = insert(:user, info: %{is_admin: true})
31 |> assign(:user, admin)
32 |> put_req_header("accept", "application/json")
33 |> post("/api/pleroma/admin/user", %{
35 "email" => "lain@example.org",
39 assert json_response(conn, 200) == "lain"
43 describe "PUT /api/pleroma/admin/users/tag" do
45 admin = insert(:user, info: %{is_admin: true})
46 user1 = insert(:user, %{tags: ["x"]})
47 user2 = insert(:user, %{tags: ["y"]})
48 user3 = insert(:user, %{tags: ["unchanged"]})
52 |> assign(:user, admin)
53 |> put_req_header("accept", "application/json")
55 "/api/pleroma/admin/users/tag?nicknames[]=#{user1.nickname}&nicknames[]=#{
57 }&tags[]=foo&tags[]=bar"
60 %{conn: conn, user1: user1, user2: user2, user3: user3}
63 test "it appends specified tags to users with specified nicknames", %{
68 assert json_response(conn, :no_content)
69 assert Repo.get(User, user1.id).tags == ["x", "foo", "bar"]
70 assert Repo.get(User, user2.id).tags == ["y", "foo", "bar"]
73 test "it does not modify tags of not specified users", %{conn: conn, user3: user3} do
74 assert json_response(conn, :no_content)
75 assert Repo.get(User, user3.id).tags == ["unchanged"]
79 describe "DELETE /api/pleroma/admin/users/tag" do
81 admin = insert(:user, info: %{is_admin: true})
82 user1 = insert(:user, %{tags: ["x"]})
83 user2 = insert(:user, %{tags: ["y", "z"]})
84 user3 = insert(:user, %{tags: ["unchanged"]})
88 |> assign(:user, admin)
89 |> put_req_header("accept", "application/json")
91 "/api/pleroma/admin/users/tag?nicknames[]=#{user1.nickname}&nicknames[]=#{
96 %{conn: conn, user1: user1, user2: user2, user3: user3}
99 test "it removes specified tags from users with specified nicknames", %{
104 assert json_response(conn, :no_content)
105 assert Repo.get(User, user1.id).tags == []
106 assert Repo.get(User, user2.id).tags == ["y"]
109 test "it does not modify tags of not specified users", %{conn: conn, user3: user3} do
110 assert json_response(conn, :no_content)
111 assert Repo.get(User, user3.id).tags == ["unchanged"]
115 describe "/api/pleroma/admin/permission_group" do
116 test "GET is giving user_info" do
117 admin = insert(:user, info: %{is_admin: true})
121 |> assign(:user, admin)
122 |> put_req_header("accept", "application/json")
123 |> get("/api/pleroma/admin/permission_group/#{admin.nickname}")
125 assert json_response(conn, 200) == %{
127 "is_moderator" => false
131 test "/:right POST, can add to a permission group" do
132 admin = insert(:user, info: %{is_admin: true})
137 |> assign(:user, admin)
138 |> put_req_header("accept", "application/json")
139 |> post("/api/pleroma/admin/permission_group/#{user.nickname}/admin")
141 assert json_response(conn, 200) == %{
146 test "/:right DELETE, can remove from a permission group" do
147 admin = insert(:user, info: %{is_admin: true})
148 user = insert(:user, info: %{is_admin: true})
152 |> assign(:user, admin)
153 |> put_req_header("accept", "application/json")
154 |> delete("/api/pleroma/admin/permission_group/#{user.nickname}/admin")
156 assert json_response(conn, 200) == %{
162 describe "POST /api/pleroma/admin/email_invite, with valid config" do
164 registrations_open = Pleroma.Config.get([:instance, :registrations_open])
165 invites_enabled = Pleroma.Config.get([:instance, :invites_enabled])
166 Pleroma.Config.put([:instance, :registrations_open], false)
167 Pleroma.Config.put([:instance, :invites_enabled], true)
170 Pleroma.Config.put([:instance, :registrations_open], registrations_open)
171 Pleroma.Config.put([:instance, :invites_enabled], invites_enabled)
175 [user: insert(:user, info: %{is_admin: true})]
178 test "sends invitation and returns 204", %{conn: conn, user: user} do
179 recipient_email = "foo@bar.com"
180 recipient_name = "J. D."
184 |> assign(:user, user)
185 |> post("/api/pleroma/admin/email_invite?email=#{recipient_email}&name=#{recipient_name}")
187 assert json_response(conn, :no_content)
189 token_record = List.last(Pleroma.Repo.all(Pleroma.UserInviteToken))
191 refute token_record.used
193 Swoosh.TestAssertions.assert_email_sent(
194 Pleroma.UserEmail.user_invitation_email(
203 test "it returns 403 if requested by a non-admin", %{conn: conn} do
204 non_admin_user = insert(:user)
208 |> assign(:user, non_admin_user)
209 |> post("/api/pleroma/admin/email_invite?email=foo@bar.com&name=JD")
211 assert json_response(conn, :forbidden)
215 describe "POST /api/pleroma/admin/email_invite, with invalid config" do
217 [user: insert(:user, info: %{is_admin: true})]
220 test "it returns 500 if `invites_enabled` is not enabled", %{conn: conn, user: user} do
221 registrations_open = Pleroma.Config.get([:instance, :registrations_open])
222 invites_enabled = Pleroma.Config.get([:instance, :invites_enabled])
223 Pleroma.Config.put([:instance, :registrations_open], false)
224 Pleroma.Config.put([:instance, :invites_enabled], false)
227 Pleroma.Config.put([:instance, :registrations_open], registrations_open)
228 Pleroma.Config.put([:instance, :invites_enabled], invites_enabled)
234 |> assign(:user, user)
235 |> post("/api/pleroma/admin/email_invite?email=foo@bar.com&name=JD")
237 assert json_response(conn, :internal_server_error)
240 test "it returns 500 if `registrations_open` is enabled", %{conn: conn, user: user} do
241 registrations_open = Pleroma.Config.get([:instance, :registrations_open])
242 invites_enabled = Pleroma.Config.get([:instance, :invites_enabled])
243 Pleroma.Config.put([:instance, :registrations_open], true)
244 Pleroma.Config.put([:instance, :invites_enabled], true)
247 Pleroma.Config.put([:instance, :registrations_open], registrations_open)
248 Pleroma.Config.put([:instance, :invites_enabled], invites_enabled)
254 |> assign(:user, user)
255 |> post("/api/pleroma/admin/email_invite?email=foo@bar.com&name=JD")
257 assert json_response(conn, :internal_server_error)
261 test "/api/pleroma/admin/invite_token" do
262 admin = insert(:user, info: %{is_admin: true})
266 |> assign(:user, admin)
267 |> put_req_header("accept", "application/json")
268 |> get("/api/pleroma/admin/invite_token")
270 assert conn.status == 200
273 test "/api/pleroma/admin/password_reset" do
274 admin = insert(:user, info: %{is_admin: true})
279 |> assign(:user, admin)
280 |> put_req_header("accept", "application/json")
281 |> get("/api/pleroma/admin/password_reset?nickname=#{user.nickname}")
283 assert conn.status == 200