2020-05-01 09:23:43 +00:00
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
RSpec.describe 'Notifications API', type: :request do
|
|
|
|
let(:account) { create(:account) }
|
|
|
|
|
|
|
|
describe 'GET /api/v1/accounts/{account.id}/notifications' do
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/notifications"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
2020-06-15 08:06:56 +00:00
|
|
|
let!(:notification1) { create(:notification, account: account, user: admin) }
|
|
|
|
let!(:notification2) { create(:notification, account: account, user: admin) }
|
2020-05-01 09:23:43 +00:00
|
|
|
|
|
|
|
it 'returns all notifications' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/notifications",
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
2020-06-09 12:12:18 +00:00
|
|
|
response_json = JSON.parse(response.body)
|
2020-05-01 09:23:43 +00:00
|
|
|
expect(response).to have_http_status(:success)
|
2020-06-15 08:06:56 +00:00
|
|
|
expect(response.body).to include(notification1.notification_type)
|
|
|
|
expect(response_json['data']['meta']['unread_count']).to eq 2
|
2021-01-13 11:34:27 +00:00
|
|
|
expect(response_json['data']['meta']['count']).to eq 2
|
2020-06-15 08:06:56 +00:00
|
|
|
# notification appear in descending order
|
|
|
|
expect(response_json['data']['payload'].first['id']).to eq notification2.id
|
2020-06-09 12:12:18 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'POST /api/v1/accounts/{account.id}/notifications/read_all' do
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
let!(:notification1) { create(:notification, account: account, user: admin) }
|
|
|
|
let!(:notification2) { create(:notification, account: account, user: admin) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/notifications/read_all"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
|
|
|
|
it 'updates all the notifications read at' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/notifications/read_all",
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(notification1.reload.read_at).not_to eq('')
|
|
|
|
expect(notification2.reload.read_at).not_to eq('')
|
2020-05-01 09:23:43 +00:00
|
|
|
end
|
2020-06-15 08:06:56 +00:00
|
|
|
|
|
|
|
it 'updates only the notifications read at for primary actor when param is passed' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/notifications/read_all",
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
params: {
|
|
|
|
primary_actor_id: notification1.primary_actor_id,
|
|
|
|
primary_actor_type: notification1.primary_actor_type
|
|
|
|
},
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(notification1.reload.read_at).not_to eq('')
|
2022-07-15 02:51:59 +00:00
|
|
|
expect(notification2.reload.read_at).to be_nil
|
2020-06-15 08:06:56 +00:00
|
|
|
end
|
2020-05-01 09:23:43 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'PATCH /api/v1/accounts/{account.id}/notifications/:id' do
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
let!(:notification) { create(:notification, account: account, user: admin) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
put "/api/v1/accounts/#{account.id}/notifications/#{notification.id}",
|
|
|
|
params: { read_at: true }
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
|
|
|
|
it 'updates the notification read at' do
|
|
|
|
patch "/api/v1/accounts/#{account.id}/notifications/#{notification.id}",
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
params: { read_at: true },
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(notification.reload.read_at).not_to eq('')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2021-01-17 17:15:31 +00:00
|
|
|
|
|
|
|
describe 'GET /api/v1/accounts/{account.id}/notifications/unread_count' do
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/notifications/unread_count"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
|
|
|
|
it 'returns notifications unread count' do
|
|
|
|
2.times.each { create(:notification, account: account, user: admin) }
|
|
|
|
get "/api/v1/accounts/#{account.id}/notifications/unread_count",
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
response_json = JSON.parse(response.body)
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(response_json).to eq 2
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-05-01 09:23:43 +00:00
|
|
|
end
|