diff options
| author | Alex Gleason <alex@alexgleason.me> | 2020-07-14 00:22:12 -0500 | 
|---|---|---|
| committer | Alex Gleason <alex@alexgleason.me> | 2020-07-14 00:22:12 -0500 | 
| commit | 5ddf0415c4fd6021422eb38b4625c01ad27582c5 (patch) | |
| tree | eba4c311a0d4f64ff36cb20e32d4fec5a4aeade3 /test/web/mastodon_api/controllers | |
| parent | bcfd38c8f3ecd2620bae7fc756ffc3f4bbe2b89e (diff) | |
| download | pleroma-5ddf0415c4fd6021422eb38b4625c01ad27582c5.tar.gz pleroma-5ddf0415c4fd6021422eb38b4625c01ad27582c5.zip  | |
Accept `reason` in POST /api/v1/accounts and store in DB
Diffstat (limited to 'test/web/mastodon_api/controllers')
| -rw-r--r-- | test/web/mastodon_api/controllers/account_controller_test.exs | 70 | 
1 files changed, 70 insertions, 0 deletions
diff --git a/test/web/mastodon_api/controllers/account_controller_test.exs b/test/web/mastodon_api/controllers/account_controller_test.exs index 9c7b5e9b2..28d21371a 100644 --- a/test/web/mastodon_api/controllers/account_controller_test.exs +++ b/test/web/mastodon_api/controllers/account_controller_test.exs @@ -885,6 +885,7 @@ defmodule Pleroma.Web.MastodonAPI.AccountControllerTest do      end      setup do: clear_config([:instance, :account_activation_required]) +    setup do: clear_config([:instance, :account_approval_required])      test "Account registration via Application", %{conn: conn} do        conn = @@ -949,6 +950,75 @@ defmodule Pleroma.Web.MastodonAPI.AccountControllerTest do        assert token_from_db.user.confirmation_pending      end +    test "Account registration via app with account_approval_required", %{conn: conn} do +      Pleroma.Config.put([:instance, :account_approval_required], true) + +      conn = +        conn +        |> put_req_header("content-type", "application/json") +        |> post("/api/v1/apps", %{ +          client_name: "client_name", +          redirect_uris: "urn:ietf:wg:oauth:2.0:oob", +          scopes: "read, write, follow" +        }) + +      assert %{ +               "client_id" => client_id, +               "client_secret" => client_secret, +               "id" => _, +               "name" => "client_name", +               "redirect_uri" => "urn:ietf:wg:oauth:2.0:oob", +               "vapid_key" => _, +               "website" => nil +             } = json_response_and_validate_schema(conn, 200) + +      conn = +        post(conn, "/oauth/token", %{ +          grant_type: "client_credentials", +          client_id: client_id, +          client_secret: client_secret +        }) + +      assert %{"access_token" => token, "refresh_token" => refresh, "scope" => scope} = +               json_response(conn, 200) + +      assert token +      token_from_db = Repo.get_by(Token, token: token) +      assert token_from_db +      assert refresh +      assert scope == "read write follow" + +      conn = +        build_conn() +        |> put_req_header("content-type", "multipart/form-data") +        |> put_req_header("authorization", "Bearer " <> token) +        |> post("/api/v1/accounts", %{ +          username: "lain", +          email: "lain@example.org", +          password: "PlzDontHackLain", +          bio: "Test Bio", +          agreement: true, +          reason: "I'm a cool dude, bro" +        }) + +      %{ +        "access_token" => token, +        "created_at" => _created_at, +        "scope" => ^scope, +        "token_type" => "Bearer" +      } = json_response_and_validate_schema(conn, 200) + +      token_from_db = Repo.get_by(Token, token: token) +      assert token_from_db +      token_from_db = Repo.preload(token_from_db, :user) +      assert token_from_db.user + +      assert token_from_db.user.confirmation_pending +      assert token_from_db.user.approval_pending + +      assert token_from_db.user.registration_reason == "I'm a cool dude, bro" +    end +      test "returns error when user already registred", %{conn: conn, valid_params: valid_params} do        _user = insert(:user, email: "lain@example.org")        app_token = insert(:oauth_token, user: nil)  | 
