summaryrefslogtreecommitdiff
path: root/test/pleroma/user/query_test.exs
blob: 30a4637f2c020d5a34819a46092b72920ccac0f6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
# Pleroma: A lightweight social networking server
# Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only

defmodule Pleroma.User.QueryTest do
  use Pleroma.DataCase, async: false

  alias Pleroma.Repo
  alias Pleroma.User
  alias Pleroma.User.Query
  alias Pleroma.Web.ActivityPub.InternalFetchActor

  import Pleroma.Factory

  describe "internal users" do
    test "it filters out internal users by default" do
      %User{nickname: "internal.fetch"} = InternalFetchActor.get_actor()

      assert [_user] = User |> Repo.all()
      assert [] == %{} |> Query.build() |> Repo.all()
    end

    test "it filters out users without nickname by default" do
      insert(:user, %{nickname: nil})

      assert [_user] = User |> Repo.all()
      assert [] == %{} |> Query.build() |> Repo.all()
    end

    test "it returns internal users when enabled" do
      %User{nickname: "internal.fetch"} = InternalFetchActor.get_actor()
      insert(:user, %{nickname: nil})

      assert %{internal: true} |> Query.build() |> Repo.aggregate(:count) == 2
    end
  end

  test "is_suggested param" do
    _user1 = insert(:user, is_suggested: false)
    user2 = insert(:user, is_suggested: true)

    assert [^user2] =
             %{is_suggested: true}
             |> User.Query.build()
             |> Repo.all()
  end

  describe "is_privileged param" do
    setup do
      %{
        user: insert(:user, local: true, is_admin: false, is_moderator: false),
        moderator_user: insert(:user, local: true, is_admin: false, is_moderator: true),
        admin_user: insert(:user, local: true, is_admin: true, is_moderator: false),
        admin_moderator_user: insert(:user, local: true, is_admin: true, is_moderator: true),
        remote_user: insert(:user, local: false, is_admin: true, is_moderator: true),
        non_active_user:
          insert(:user, local: true, is_admin: true, is_moderator: true, is_active: false)
      }
    end

    test "doesn't return any users when there are no privileged roles" do
      clear_config([:instance, :admin_privileges], [])
      clear_config([:instance, :moderator_privileges], [])

      assert [] = User.Query.build(%{is_privileged: :cofe}) |> Repo.all()
    end

    test "returns moderator users if they are privileged", %{
      moderator_user: moderator_user,
      admin_moderator_user: admin_moderator_user
    } do
      clear_config([:instance, :admin_privileges], [])
      clear_config([:instance, :moderator_privileges], [:cofe])

      assert [_, _] = User.Query.build(%{is_privileged: :cofe}) |> Repo.all()
      assert moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
      assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
    end

    test "returns admin users if they are privileged", %{
      admin_user: admin_user,
      admin_moderator_user: admin_moderator_user
    } do
      clear_config([:instance, :admin_privileges], [:cofe])
      clear_config([:instance, :moderator_privileges], [])

      assert [_, _] = User.Query.build(%{is_privileged: :cofe}) |> Repo.all()
      assert admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
      assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
    end

    test "returns admin and moderator users if they are both privileged", %{
      moderator_user: moderator_user,
      admin_user: admin_user,
      admin_moderator_user: admin_moderator_user
    } do
      clear_config([:instance, :admin_privileges], [:cofe])
      clear_config([:instance, :moderator_privileges], [:cofe])

      assert [_, _, _] = User.Query.build(%{is_privileged: :cofe}) |> Repo.all()
      assert admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
      assert moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
      assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
    end
  end
end