2022-07-19 12:07:00 +00:00
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
RSpec.describe 'Api::V1::Accounts::MacrosController', type: :request do
|
2022-07-26 07:11:22 +00:00
|
|
|
include ActiveJob::TestHelper
|
|
|
|
|
2022-07-19 12:07:00 +00:00
|
|
|
let(:account) { create(:account) }
|
|
|
|
let(:administrator) { create(:user, account: account, role: :administrator) }
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
let(:agent_1) { create(:user, account: account, role: :agent) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
create(:macro, account: account, created_by: administrator, updated_by: administrator, visibility: :global)
|
|
|
|
create(:macro, account: account, created_by: administrator, updated_by: administrator, visibility: :global)
|
|
|
|
create(:macro, account: account, created_by: administrator, updated_by: administrator, visibility: :personal)
|
|
|
|
create(:macro, account: account, created_by: agent, updated_by: agent, visibility: :personal)
|
|
|
|
create(:macro, account: account, created_by: agent, updated_by: agent, visibility: :personal)
|
|
|
|
create(:macro, account: account, created_by: agent_1, updated_by: agent_1, visibility: :personal)
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'GET /api/v1/accounts/{account.id}/macros' do
|
|
|
|
context 'when it is an authenticated administrator' do
|
|
|
|
it 'returns all records in the account' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/macros",
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
|
2022-11-08 01:46:00 +00:00
|
|
|
visible_macros = account.macros.global.or(account.macros.personal.where(created_by_id: administrator.id)).order(:id)
|
2022-07-19 12:07:00 +00:00
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
body = JSON.parse(response.body)
|
|
|
|
|
|
|
|
expect(body['payload'].length).to eq(visible_macros.count)
|
2022-11-08 01:46:00 +00:00
|
|
|
|
|
|
|
expect(body['payload'].first['id']).to eq(visible_macros.first.id)
|
|
|
|
expect(body['payload'].last['id']).to eq(visible_macros.last.id)
|
2022-07-19 12:07:00 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated agent' do
|
|
|
|
it 'returns all records in account and created_by the agent' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/macros",
|
|
|
|
headers: agent.create_new_auth_token
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
|
|
|
|
body = JSON.parse(response.body)
|
2022-11-08 01:46:00 +00:00
|
|
|
visible_macros = account.macros.global.or(account.macros.personal.where(created_by_id: agent.id)).order(:id)
|
2022-07-19 12:07:00 +00:00
|
|
|
|
|
|
|
expect(body['payload'].length).to eq(visible_macros.count)
|
|
|
|
expect(body['payload'].first['id']).to eq(visible_macros.first.id)
|
|
|
|
expect(body['payload'].last['id']).to eq(visible_macros.last.id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'POST /api/v1/accounts/{account.id}/macros' do
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:params) do
|
|
|
|
{
|
2022-11-17 07:00:47 +00:00
|
|
|
'name': 'Add label, send message and close the chat, remove label',
|
2022-07-19 12:07:00 +00:00
|
|
|
'actions': [
|
|
|
|
{
|
|
|
|
'action_name': :add_label,
|
|
|
|
'action_params': %w[support priority_customer]
|
|
|
|
},
|
2022-11-17 08:45:16 +00:00
|
|
|
{
|
|
|
|
'action_name': :remove_assigned_team
|
|
|
|
},
|
2022-07-19 12:07:00 +00:00
|
|
|
{
|
|
|
|
'action_name': :send_message,
|
|
|
|
'action_params': ['Welcome to the chatwoot platform.']
|
|
|
|
},
|
|
|
|
{
|
2022-07-26 07:11:22 +00:00
|
|
|
'action_name': :resolve_conversation
|
2022-11-17 07:00:47 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
'action_name': :remove_label,
|
|
|
|
'action_params': %w[support]
|
2022-07-19 12:07:00 +00:00
|
|
|
}
|
|
|
|
],
|
|
|
|
visibility: 'global',
|
|
|
|
created_by_id: administrator.id
|
|
|
|
}.with_indifferent_access
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates the macro' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros",
|
|
|
|
params: params,
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
|
|
|
|
json_response = JSON.parse(response.body)
|
|
|
|
|
|
|
|
expect(json_response['payload']['name']).to eql(params['name'])
|
|
|
|
expect(json_response['payload']['visibility']).to eql(params['visibility'])
|
|
|
|
expect(json_response['payload']['created_by']['id']).to eql(administrator.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'sets visibility default to personal for agent' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros",
|
|
|
|
params: params,
|
|
|
|
headers: agent.create_new_auth_token
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
|
|
|
|
json_response = JSON.parse(response.body)
|
|
|
|
|
|
|
|
expect(json_response['payload']['name']).to eql(params['name'])
|
|
|
|
expect(json_response['payload']['visibility']).to eql('personal')
|
|
|
|
expect(json_response['payload']['created_by']['id']).to eql(agent.id)
|
|
|
|
end
|
2022-10-21 02:41:48 +00:00
|
|
|
|
|
|
|
it 'Saves file in the macros actions to send an attachments' do
|
|
|
|
file = fixture_file_upload(Rails.root.join('spec/assets/avatar.png'), 'image/png')
|
|
|
|
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros/attach_file",
|
|
|
|
headers: administrator.create_new_auth_token,
|
|
|
|
params: { attachment: file }
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
|
|
|
|
blob = JSON.parse(response.body)
|
|
|
|
|
|
|
|
expect(blob['blob_key']).to be_present
|
|
|
|
expect(blob['blob_id']).to be_present
|
|
|
|
|
|
|
|
params[:actions] = [
|
|
|
|
{
|
|
|
|
'action_name': :send_message,
|
|
|
|
'action_params': ['Welcome to the chatwoot platform.']
|
|
|
|
},
|
|
|
|
{
|
|
|
|
'action_name': :send_attachment,
|
|
|
|
'action_params': [blob['blob_id']]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros",
|
|
|
|
headers: administrator.create_new_auth_token,
|
|
|
|
params: params
|
|
|
|
|
|
|
|
macro = account.macros.last
|
|
|
|
expect(macro.files.presence).to be_truthy
|
|
|
|
expect(macro.files.count).to eq(1)
|
|
|
|
end
|
2022-07-19 12:07:00 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'PUT /api/v1/accounts/{account.id}/macros/{macro.id}' do
|
|
|
|
let!(:macro) { create(:macro, account: account, created_by: administrator, updated_by: administrator) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
put "/api/v1/accounts/#{account.id}/macros/#{macro.id}"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
'name': 'Add label, send message and close the chat'
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'Updates the macro' do
|
|
|
|
put "/api/v1/accounts/#{account.id}/macros/#{macro.id}",
|
|
|
|
params: params,
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
json_response = JSON.parse(response.body)
|
|
|
|
expect(json_response['name']).to eql(params['name'])
|
|
|
|
end
|
2022-11-08 01:46:00 +00:00
|
|
|
|
|
|
|
it 'Unauthorize to update the macro' do
|
|
|
|
macro = create(:macro, account: account, created_by: agent, updated_by: agent)
|
|
|
|
|
|
|
|
put "/api/v1/accounts/#{account.id}/macros/#{macro.id}",
|
|
|
|
params: params,
|
|
|
|
headers: agent_1.create_new_auth_token
|
|
|
|
|
|
|
|
json_response = JSON.parse(response.body)
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(json_response['error']).to eq('You are not authorized to do this action')
|
|
|
|
end
|
2022-07-19 12:07:00 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'GET /api/v1/accounts/{account.id}/macros/{macro.id}' do
|
|
|
|
let!(:macro) { create(:macro, account: account, created_by: administrator, updated_by: administrator) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/macros/#{macro.id}"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
it 'fetch the macro' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/macros/#{macro.id}",
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
|
|
|
|
json_response = JSON.parse(response.body)
|
|
|
|
|
|
|
|
expect(json_response['payload']['name']).to eql(macro.name)
|
|
|
|
expect(json_response['payload']['created_by']['id']).to eql(administrator.id)
|
|
|
|
end
|
2022-09-21 08:40:35 +00:00
|
|
|
|
|
|
|
it 'return not_found status when macros not available' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/macros/15",
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:not_found)
|
|
|
|
end
|
2022-11-08 01:46:00 +00:00
|
|
|
|
|
|
|
it 'Unauthorize to fetch other agents private macro' do
|
|
|
|
macro = create(:macro, account: account, created_by: agent, updated_by: agent, visibility: :personal)
|
|
|
|
|
|
|
|
get "/api/v1/accounts/#{account.id}/macros/#{macro.id}",
|
|
|
|
headers: agent_1.create_new_auth_token
|
|
|
|
|
|
|
|
json_response = JSON.parse(response.body)
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(json_response['error']).to eq('You are not authorized to do this action')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'authorize to fetch other agents public macro' do
|
|
|
|
macro = create(:macro, account: account, created_by: agent, updated_by: agent, visibility: :global)
|
|
|
|
|
|
|
|
get "/api/v1/accounts/#{account.id}/macros/#{macro.id}",
|
|
|
|
headers: agent_1.create_new_auth_token
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
end
|
2022-07-19 12:07:00 +00:00
|
|
|
end
|
|
|
|
end
|
2022-07-26 07:11:22 +00:00
|
|
|
|
|
|
|
describe 'POST /api/v1/accounts/{account.id}/macros/{macro.id}/execute' do
|
|
|
|
let!(:macro) { create(:macro, account: account, created_by: administrator, updated_by: administrator) }
|
|
|
|
let(:inbox) { create(:inbox, account: account) }
|
|
|
|
let(:contact) { create(:contact, account: account, identifier: '123') }
|
|
|
|
let(:conversation) { create(:conversation, inbox: inbox, account: account, status: :open) }
|
|
|
|
let(:team) { create(:team, account: account) }
|
|
|
|
let(:user_1) { create(:user, role: 0) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
create(:team_member, user: user_1, team: team)
|
|
|
|
create(:account_user, user: user_1, account: account)
|
2022-11-15 07:45:27 +00:00
|
|
|
create(:inbox_member, user: user_1, inbox: inbox)
|
2022-07-26 07:11:22 +00:00
|
|
|
macro.update!(actions:
|
|
|
|
[
|
|
|
|
{ 'action_name' => 'assign_team', 'action_params' => [team.id] },
|
|
|
|
{ 'action_name' => 'add_label', 'action_params' => %w[support priority_customer] },
|
|
|
|
{ 'action_name' => 'snooze_conversation' },
|
2022-11-15 07:45:27 +00:00
|
|
|
{ 'action_name' => 'assign_agent', 'action_params' => [user_1.id] },
|
2022-11-07 16:42:10 +00:00
|
|
|
{ 'action_name' => 'send_message', 'action_params' => ['Send this message.'] },
|
|
|
|
{ 'action_name' => 'add_private_note', 'action_params': ['We are sending greeting message to customer.'] }
|
2022-07-26 07:11:22 +00:00
|
|
|
])
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros/#{macro.id}/execute"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
2022-10-31 14:03:12 +00:00
|
|
|
context 'when execute the macro' do
|
|
|
|
it 'send the message with sender' do
|
|
|
|
expect(conversation.messages).to be_empty
|
|
|
|
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros/#{macro.id}/execute",
|
|
|
|
params: { conversation_ids: [conversation.display_id] },
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(conversation.messages.chat.last.content).to eq('Send this message.')
|
|
|
|
expect(conversation.messages.chat.last.sender).to eq(administrator)
|
2022-07-26 07:11:22 +00:00
|
|
|
end
|
|
|
|
|
2022-11-15 07:45:27 +00:00
|
|
|
it 'Assign the agent when he is inbox member' do
|
2022-10-31 14:03:12 +00:00
|
|
|
expect(conversation.assignee).to be_nil
|
|
|
|
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros/#{macro.id}/execute",
|
|
|
|
params: { conversation_ids: [conversation.display_id] },
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(conversation.messages.activity.last.content).to eq("Assigned to #{user_1.name} by #{administrator.name}")
|
|
|
|
end
|
|
|
|
|
2022-11-15 07:45:27 +00:00
|
|
|
it 'Assign the agent when he is not inbox member' do
|
|
|
|
InboxMember.last.destroy
|
|
|
|
|
|
|
|
expect(conversation.assignee).to be_nil
|
|
|
|
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros/#{macro.id}/execute",
|
|
|
|
params: { conversation_ids: [conversation.display_id] },
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(conversation.messages.activity.last.content).not_to eq("Assigned to #{user_1.name} by #{administrator.name}")
|
|
|
|
end
|
|
|
|
|
2022-10-31 14:03:12 +00:00
|
|
|
it 'Assign the labels' do
|
|
|
|
expect(conversation.labels).to be_empty
|
|
|
|
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros/#{macro.id}/execute",
|
|
|
|
params: { conversation_ids: [conversation.display_id] },
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(conversation.reload.label_list).to match_array(%w[support priority_customer])
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'Update the status' do
|
|
|
|
expect(conversation.reload.status).to eql('open')
|
|
|
|
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros/#{macro.id}/execute",
|
|
|
|
params: { conversation_ids: [conversation.display_id] },
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(conversation.reload.status).to eql('snoozed')
|
|
|
|
end
|
2022-11-07 16:42:10 +00:00
|
|
|
|
2022-11-17 07:00:47 +00:00
|
|
|
it 'Remove selected label' do
|
|
|
|
macro.update!(actions: [{ 'action_name' => 'remove_label', 'action_params' => ['support'] }])
|
|
|
|
conversation.add_labels(%w[support priority_customer])
|
|
|
|
expect(conversation.label_list).to match_array(%w[support priority_customer])
|
|
|
|
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros/#{macro.id}/execute",
|
|
|
|
params: { conversation_ids: [conversation.display_id] },
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(conversation.reload.label_list).to match_array(%w[priority_customer])
|
|
|
|
end
|
|
|
|
|
2022-11-07 16:42:10 +00:00
|
|
|
it 'Adds the private note' do
|
|
|
|
expect(conversation.messages).to be_empty
|
|
|
|
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros/#{macro.id}/execute",
|
|
|
|
params: { conversation_ids: [conversation.display_id] },
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(conversation.messages.last.content).to eq('We are sending greeting message to customer.')
|
|
|
|
expect(conversation.messages.last.sender).to eq(administrator)
|
|
|
|
expect(conversation.messages.last.private).to be_truthy
|
|
|
|
end
|
2022-11-17 08:45:16 +00:00
|
|
|
|
|
|
|
it 'Assign the team if team_ids are present' do
|
|
|
|
expect(conversation.team).to be_nil
|
|
|
|
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros/#{macro.id}/execute",
|
|
|
|
params: { conversation_ids: [conversation.display_id] },
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(conversation.reload.team_id).to eq(team.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'Unassign the team' do
|
|
|
|
macro.update!(actions: [
|
|
|
|
{ 'action_name' => 'remove_assigned_team' }
|
|
|
|
])
|
|
|
|
conversation.update!(team_id: team.id)
|
|
|
|
expect(conversation.reload.team).not_to be_nil
|
|
|
|
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
post "/api/v1/accounts/#{account.id}/macros/#{macro.id}/execute",
|
|
|
|
params: { conversation_ids: [conversation.display_id] },
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(conversation.reload.team_id).to be_nil
|
|
|
|
end
|
2022-07-26 07:11:22 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2022-11-08 01:46:00 +00:00
|
|
|
|
|
|
|
describe 'DELETE /api/v1/accounts/{account.id}/macros/{macro.id}' do
|
|
|
|
let!(:macro) { create(:macro, account: account, created_by: administrator, updated_by: administrator) }
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
it 'Deletes the macro' do
|
|
|
|
delete "/api/v1/accounts/#{account.id}/macros/#{macro.id}",
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'deletes the orphan public record with admin credentials' do
|
|
|
|
macro = create(:macro, account: account, created_by: agent, updated_by: agent, visibility: :global)
|
|
|
|
|
|
|
|
expect(macro.created_by).to eq(agent)
|
|
|
|
|
|
|
|
agent.destroy!
|
|
|
|
|
|
|
|
expect(macro.reload.created_by).to be_nil
|
|
|
|
|
|
|
|
delete "/api/v1/accounts/#{account.id}/macros/#{macro.id}",
|
|
|
|
headers: administrator.create_new_auth_token
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'can not delete orphan public record with agent credentials' do
|
|
|
|
macro = create(:macro, account: account, created_by: agent, updated_by: agent, visibility: :global)
|
|
|
|
|
|
|
|
expect(macro.created_by).to eq(agent)
|
|
|
|
|
|
|
|
agent.destroy!
|
|
|
|
|
|
|
|
expect(macro.reload.created_by).to be_nil
|
|
|
|
|
|
|
|
delete "/api/v1/accounts/#{account.id}/macros/#{macro.id}",
|
|
|
|
headers: agent_1.create_new_auth_token
|
|
|
|
|
|
|
|
json_response = JSON.parse(response.body)
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(json_response['error']).to eq('You are not authorized to do this action')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'Unauthorize to delete the macro' do
|
|
|
|
macro = create(:macro, account: account, created_by: agent, updated_by: agent)
|
|
|
|
|
|
|
|
delete "/api/v1/accounts/#{account.id}/macros/#{macro.id}",
|
|
|
|
headers: agent_1.create_new_auth_token
|
|
|
|
|
|
|
|
json_response = JSON.parse(response.body)
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(json_response['error']).to eq('You are not authorized to do this action')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2022-07-19 12:07:00 +00:00
|
|
|
end
|