summaryrefslogtreecommitdiff
path: root/test
diff options
context:
space:
mode:
authorIlja <ilja@ilja.space>2022-06-19 11:05:09 +0200
committerIlja <ilja@ilja.space>2022-06-21 12:10:27 +0200
commit34adea8d28cec91f03047989cbbaaf0b402c3a55 (patch)
tree0a916d7c199fadf66bc23b7f00a46a772a85da94 /test
parenta1c8aa4721de8f5edd7d69dcd745586df23f5a31 (diff)
downloadpleroma-34adea8d28cec91f03047989cbbaaf0b402c3a55.tar.gz
pleroma-34adea8d28cec91f03047989cbbaaf0b402c3a55.zip
Add Pleroma.User.all_users_with_privilege/1
This should eventually replace the Pleroma.User.all_superusers/0 function * I added a new param `is_privileged` in User.query * Now we can fetch all users with a specified privilege
Diffstat (limited to 'test')
-rw-r--r--test/pleroma/user/query_test.exs92
-rw-r--r--test/pleroma/user_test.exs90
2 files changed, 181 insertions, 1 deletions
diff --git a/test/pleroma/user/query_test.exs b/test/pleroma/user/query_test.exs
index bd45d1bca..7e443536b 100644
--- a/test/pleroma/user/query_test.exs
+++ b/test/pleroma/user/query_test.exs
@@ -3,7 +3,7 @@
# SPDX-License-Identifier: AGPL-3.0-only
defmodule Pleroma.User.QueryTest do
- use Pleroma.DataCase, async: true
+ use Pleroma.DataCase, async: false
alias Pleroma.Repo
alias Pleroma.User
@@ -44,4 +44,94 @@ defmodule Pleroma.User.QueryTest do
|> User.Query.build()
|> Repo.all()
end
+
+ describe "is_privileged param" do
+ setup do
+ %{
+ user: insert(:user, local: true, is_admin: false, is_moderator: false),
+ moderator_user: insert(:user, local: true, is_admin: false, is_moderator: true),
+ admin_user: insert(:user, local: true, is_admin: true, is_moderator: false),
+ admin_moderator_user: insert(:user, local: true, is_admin: true, is_moderator: true),
+ remote_user: insert(:user, local: false, is_admin: true, is_moderator: true),
+ non_active_user:
+ insert(:user, local: true, is_admin: true, is_moderator: true, is_active: false)
+ }
+ end
+
+ test "doesn't return any users when there are no privileged roles", %{
+ user: user,
+ moderator_user: moderator_user,
+ admin_user: admin_user,
+ admin_moderator_user: admin_moderator_user,
+ remote_user: remote_user,
+ non_active_user: non_active_user
+ } do
+ clear_config([:instance, :admin_privileges], [])
+ clear_config([:instance, :moderator_privileges], [])
+
+ refute user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute remote_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute non_active_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ end
+
+ test "returns moderator users if they are privileged", %{
+ user: user,
+ moderator_user: moderator_user,
+ admin_user: admin_user,
+ admin_moderator_user: admin_moderator_user,
+ remote_user: remote_user,
+ non_active_user: non_active_user
+ } do
+ clear_config([:instance, :admin_privileges], [])
+ clear_config([:instance, :moderator_privileges], [:cofe])
+
+ refute user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ assert moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute remote_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute non_active_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ end
+
+ test "returns admin users if they are privileged", %{
+ user: user,
+ moderator_user: moderator_user,
+ admin_user: admin_user,
+ admin_moderator_user: admin_moderator_user,
+ remote_user: remote_user,
+ non_active_user: non_active_user
+ } do
+ clear_config([:instance, :admin_privileges], [:cofe])
+ clear_config([:instance, :moderator_privileges], [])
+
+ refute user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ assert admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute remote_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute non_active_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ end
+
+ test "returns admin and moderator users if they are both privileged", %{
+ user: user,
+ moderator_user: moderator_user,
+ admin_user: admin_user,
+ admin_moderator_user: admin_moderator_user,
+ remote_user: remote_user,
+ non_active_user: non_active_user
+ } do
+ clear_config([:instance, :admin_privileges], [:cofe])
+ clear_config([:instance, :moderator_privileges], [:cofe])
+
+ refute user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ assert admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ assert moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute remote_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ refute non_active_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
+ end
+ end
end
diff --git a/test/pleroma/user_test.exs b/test/pleroma/user_test.exs
index 9f8be7fa2..0262470b2 100644
--- a/test/pleroma/user_test.exs
+++ b/test/pleroma/user_test.exs
@@ -1972,6 +1972,96 @@ defmodule Pleroma.UserTest do
end
end
+ describe "all_users_with_privilege/1" do
+ setup do
+ %{
+ user: insert(:user, local: true, is_admin: false, is_moderator: false),
+ moderator_user: insert(:user, local: true, is_admin: false, is_moderator: true),
+ admin_user: insert(:user, local: true, is_admin: true, is_moderator: false),
+ admin_moderator_user: insert(:user, local: true, is_admin: true, is_moderator: true),
+ remote_user: insert(:user, local: false, is_admin: true, is_moderator: true),
+ non_active_user:
+ insert(:user, local: true, is_admin: true, is_moderator: true, is_active: false)
+ }
+ end
+
+ test "doesn't return any users when there are no privileged roles", %{
+ user: user,
+ moderator_user: moderator_user,
+ admin_user: admin_user,
+ admin_moderator_user: admin_moderator_user,
+ remote_user: remote_user,
+ non_active_user: non_active_user
+ } do
+ clear_config([:instance, :admin_privileges], [])
+ clear_config([:instance, :moderator_privileges], [])
+
+ refute user in User.all_users_with_privilege(:cofe)
+ refute admin_user in User.all_users_with_privilege(:cofe)
+ refute moderator_user in User.all_users_with_privilege(:cofe)
+ refute admin_moderator_user in User.all_users_with_privilege(:cofe)
+ refute remote_user in User.all_users_with_privilege(:cofe)
+ refute non_active_user in User.all_users_with_privilege(:cofe)
+ end
+
+ test "returns moderator users if they are privileged", %{
+ user: user,
+ moderator_user: moderator_user,
+ admin_user: admin_user,
+ admin_moderator_user: admin_moderator_user,
+ remote_user: remote_user,
+ non_active_user: non_active_user
+ } do
+ clear_config([:instance, :admin_privileges], [])
+ clear_config([:instance, :moderator_privileges], [:cofe])
+
+ refute user in User.all_users_with_privilege(:cofe)
+ refute admin_user in User.all_users_with_privilege(:cofe)
+ assert moderator_user in User.all_users_with_privilege(:cofe)
+ assert admin_moderator_user in User.all_users_with_privilege(:cofe)
+ refute remote_user in User.all_users_with_privilege(:cofe)
+ refute non_active_user in User.all_users_with_privilege(:cofe)
+ end
+
+ test "returns admin users if they are privileged", %{
+ user: user,
+ moderator_user: moderator_user,
+ admin_user: admin_user,
+ admin_moderator_user: admin_moderator_user,
+ remote_user: remote_user,
+ non_active_user: non_active_user
+ } do
+ clear_config([:instance, :admin_privileges], [:cofe])
+ clear_config([:instance, :moderator_privileges], [])
+
+ refute user in User.all_users_with_privilege(:cofe)
+ assert admin_user in User.all_users_with_privilege(:cofe)
+ refute moderator_user in User.all_users_with_privilege(:cofe)
+ assert admin_moderator_user in User.all_users_with_privilege(:cofe)
+ refute remote_user in User.all_users_with_privilege(:cofe)
+ refute non_active_user in User.all_users_with_privilege(:cofe)
+ end
+
+ test "returns admin and moderator users if they are both privileged", %{
+ user: user,
+ moderator_user: moderator_user,
+ admin_user: admin_user,
+ admin_moderator_user: admin_moderator_user,
+ remote_user: remote_user,
+ non_active_user: non_active_user
+ } do
+ clear_config([:instance, :admin_privileges], [:cofe])
+ clear_config([:instance, :moderator_privileges], [:cofe])
+
+ refute user in User.all_users_with_privilege(:cofe)
+ assert admin_user in User.all_users_with_privilege(:cofe)
+ assert moderator_user in User.all_users_with_privilege(:cofe)
+ assert admin_moderator_user in User.all_users_with_privilege(:cofe)
+ refute remote_user in User.all_users_with_privilege(:cofe)
+ refute non_active_user in User.all_users_with_privilege(:cofe)
+ end
+ end
+
describe "parse_bio/2" do
test "preserves hosts in user links text" do
remote_user = insert(:user, local: false, nickname: "nick@domain.com")