2020-09-22 12:55:40 +00:00
|
|
|
# Pleroma: A lightweight social networking server
|
2022-02-26 06:11:42 +00:00
|
|
|
# Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
|
2020-09-22 12:55:40 +00:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
|
|
|
defmodule Pleroma.User.QueryTest do
|
2022-06-19 09:05:09 +00:00
|
|
|
use Pleroma.DataCase, async: false
|
2020-09-22 12:55:40 +00:00
|
|
|
|
|
|
|
alias Pleroma.Repo
|
|
|
|
alias Pleroma.User
|
|
|
|
alias Pleroma.User.Query
|
|
|
|
alias Pleroma.Web.ActivityPub.InternalFetchActor
|
|
|
|
|
|
|
|
import Pleroma.Factory
|
|
|
|
|
|
|
|
describe "internal users" do
|
|
|
|
test "it filters out internal users by default" do
|
|
|
|
%User{nickname: "internal.fetch"} = InternalFetchActor.get_actor()
|
|
|
|
|
|
|
|
assert [_user] = User |> Repo.all()
|
|
|
|
assert [] == %{} |> Query.build() |> Repo.all()
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it filters out users without nickname by default" do
|
|
|
|
insert(:user, %{nickname: nil})
|
|
|
|
|
|
|
|
assert [_user] = User |> Repo.all()
|
|
|
|
assert [] == %{} |> Query.build() |> Repo.all()
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it returns internal users when enabled" do
|
|
|
|
%User{nickname: "internal.fetch"} = InternalFetchActor.get_actor()
|
|
|
|
insert(:user, %{nickname: nil})
|
|
|
|
|
|
|
|
assert %{internal: true} |> Query.build() |> Repo.aggregate(:count) == 2
|
|
|
|
end
|
|
|
|
end
|
2021-11-26 20:33:27 +00:00
|
|
|
|
|
|
|
test "is_suggested param" do
|
|
|
|
_user1 = insert(:user, is_suggested: false)
|
|
|
|
user2 = insert(:user, is_suggested: true)
|
|
|
|
|
|
|
|
assert [^user2] =
|
|
|
|
%{is_suggested: true}
|
|
|
|
|> User.Query.build()
|
|
|
|
|> Repo.all()
|
|
|
|
end
|
2022-06-19 09:05:09 +00:00
|
|
|
|
|
|
|
describe "is_privileged param" do
|
|
|
|
setup do
|
|
|
|
%{
|
|
|
|
user: insert(:user, local: true, is_admin: false, is_moderator: false),
|
|
|
|
moderator_user: insert(:user, local: true, is_admin: false, is_moderator: true),
|
|
|
|
admin_user: insert(:user, local: true, is_admin: true, is_moderator: false),
|
|
|
|
admin_moderator_user: insert(:user, local: true, is_admin: true, is_moderator: true),
|
|
|
|
remote_user: insert(:user, local: false, is_admin: true, is_moderator: true),
|
|
|
|
non_active_user:
|
|
|
|
insert(:user, local: true, is_admin: true, is_moderator: true, is_active: false)
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
test "doesn't return any users when there are no privileged roles", %{
|
|
|
|
user: user,
|
|
|
|
moderator_user: moderator_user,
|
|
|
|
admin_user: admin_user,
|
|
|
|
admin_moderator_user: admin_moderator_user,
|
|
|
|
remote_user: remote_user,
|
|
|
|
non_active_user: non_active_user
|
|
|
|
} do
|
|
|
|
clear_config([:instance, :admin_privileges], [])
|
|
|
|
clear_config([:instance, :moderator_privileges], [])
|
|
|
|
|
|
|
|
refute user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute remote_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute non_active_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns moderator users if they are privileged", %{
|
|
|
|
user: user,
|
|
|
|
moderator_user: moderator_user,
|
|
|
|
admin_user: admin_user,
|
|
|
|
admin_moderator_user: admin_moderator_user,
|
|
|
|
remote_user: remote_user,
|
|
|
|
non_active_user: non_active_user
|
|
|
|
} do
|
|
|
|
clear_config([:instance, :admin_privileges], [])
|
|
|
|
clear_config([:instance, :moderator_privileges], [:cofe])
|
|
|
|
|
|
|
|
refute user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
assert moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute remote_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute non_active_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns admin users if they are privileged", %{
|
|
|
|
user: user,
|
|
|
|
moderator_user: moderator_user,
|
|
|
|
admin_user: admin_user,
|
|
|
|
admin_moderator_user: admin_moderator_user,
|
|
|
|
remote_user: remote_user,
|
|
|
|
non_active_user: non_active_user
|
|
|
|
} do
|
|
|
|
clear_config([:instance, :admin_privileges], [:cofe])
|
|
|
|
clear_config([:instance, :moderator_privileges], [])
|
|
|
|
|
|
|
|
refute user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
assert admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute remote_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute non_active_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns admin and moderator users if they are both privileged", %{
|
|
|
|
user: user,
|
|
|
|
moderator_user: moderator_user,
|
|
|
|
admin_user: admin_user,
|
|
|
|
admin_moderator_user: admin_moderator_user,
|
|
|
|
remote_user: remote_user,
|
|
|
|
non_active_user: non_active_user
|
|
|
|
} do
|
|
|
|
clear_config([:instance, :admin_privileges], [:cofe])
|
|
|
|
clear_config([:instance, :moderator_privileges], [:cofe])
|
|
|
|
|
|
|
|
refute user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
assert admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
assert moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute remote_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
refute non_active_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
|
|
|
|
end
|
|
|
|
end
|
2020-09-22 12:55:40 +00:00
|
|
|
end
|