2020-02-17 10:27:57 +00:00
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
RSpec.describe 'Conversations API', type: :request do
|
|
|
|
let(:account) { create(:account) }
|
|
|
|
|
2020-03-09 17:57:10 +00:00
|
|
|
describe 'GET /api/v1/accounts/{account.id}/conversations' do
|
2020-02-17 10:27:57 +00:00
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
2020-03-09 17:57:10 +00:00
|
|
|
get "/api/v1/accounts/#{account.id}/conversations"
|
2020-02-17 10:27:57 +00:00
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
2021-01-31 07:35:07 +00:00
|
|
|
let(:conversation) { create(:conversation, account: account) }
|
2020-02-17 10:27:57 +00:00
|
|
|
|
|
|
|
before do
|
|
|
|
create(:inbox_member, user: agent, inbox: conversation.inbox)
|
|
|
|
end
|
|
|
|
|
2021-01-31 07:35:07 +00:00
|
|
|
it 'returns all conversations with messages' do
|
|
|
|
message = create(:message, conversation: conversation, account: account)
|
|
|
|
get "/api/v1/accounts/#{account.id}/conversations",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
body = JSON.parse(response.body, symbolize_names: true)
|
|
|
|
expect(body[:data][:meta][:all_count]).to eq(1)
|
|
|
|
expect(body[:data][:payload].first[:messages].first[:id]).to eq(message.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns conversations with empty messages array for conversations with out messages ' do
|
2020-03-09 17:57:10 +00:00
|
|
|
get "/api/v1/accounts/#{account.id}/conversations",
|
2020-02-17 10:27:57 +00:00
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
2021-01-31 07:35:07 +00:00
|
|
|
body = JSON.parse(response.body, symbolize_names: true)
|
|
|
|
expect(body[:data][:meta][:all_count]).to eq(1)
|
|
|
|
expect(body[:data][:payload].first[:messages]).to eq([])
|
2020-02-17 10:27:57 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-05-03 06:45:10 +00:00
|
|
|
describe 'GET /api/v1/accounts/{account.id}/conversations/meta' do
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/conversations/meta"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
conversation = create(:conversation, account: account)
|
|
|
|
create(:inbox_member, user: agent, inbox: conversation.inbox)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns all conversations counts' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/conversations/meta",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
2020-06-09 10:56:33 +00:00
|
|
|
expect(JSON.parse(response.body, symbolize_names: true)[:meta][:all_count]).to eq(1)
|
2020-05-03 06:45:10 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-23 09:57:41 +00:00
|
|
|
describe 'GET /api/v1/accounts/{account.id}/conversations/search' do
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/conversations/search", params: { q: 'test' }
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
conversation = create(:conversation, account: account)
|
|
|
|
create(:message, conversation: conversation, account: account, content: 'test1')
|
|
|
|
create(:message, conversation: conversation, account: account, content: 'test2')
|
|
|
|
create(:inbox_member, user: agent, inbox: conversation.inbox)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns all conversations with messages containing the search query' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/conversations/search",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
params: { q: 'test1' },
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
2020-11-07 20:16:45 +00:00
|
|
|
response_data = JSON.parse(response.body, symbolize_names: true)
|
2020-09-23 09:57:41 +00:00
|
|
|
expect(response_data[:meta][:all_count]).to eq(1)
|
|
|
|
expect(response_data[:payload].first[:messages].first[:content]).to eq 'test1'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-03-09 17:57:10 +00:00
|
|
|
describe 'GET /api/v1/accounts/{account.id}/conversations/:id' do
|
2020-02-17 10:27:57 +00:00
|
|
|
let(:conversation) { create(:conversation, account: account) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
2020-03-09 17:57:10 +00:00
|
|
|
get "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}"
|
2020-02-17 10:27:57 +00:00
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
|
|
|
|
it 'shows the conversation' do
|
2020-03-09 17:57:10 +00:00
|
|
|
get "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}",
|
2020-02-17 10:27:57 +00:00
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
2020-03-08 16:38:25 +00:00
|
|
|
expect(JSON.parse(response.body, symbolize_names: true)[:id]).to eq(conversation.display_id)
|
2020-02-17 10:27:57 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-01-07 08:17:38 +00:00
|
|
|
describe 'POST /api/v1/accounts/{account.id}/conversations' do
|
|
|
|
let(:contact) { create(:contact, account: account) }
|
|
|
|
let(:inbox) { create(:inbox, account: account) }
|
|
|
|
let(:contact_inbox) { create(:contact_inbox, contact: contact, inbox: inbox) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations",
|
|
|
|
params: { source_id: contact_inbox.source_id },
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
|
|
|
|
it 'creates a new conversation' do
|
|
|
|
allow(Rails.configuration.dispatcher).to receive(:dispatch)
|
2021-04-15 09:43:01 +00:00
|
|
|
additional_attributes = { test: 'test' }
|
2021-01-07 08:17:38 +00:00
|
|
|
post "/api/v1/accounts/#{account.id}/conversations",
|
|
|
|
headers: agent.create_new_auth_token,
|
2021-04-15 09:43:01 +00:00
|
|
|
params: { source_id: contact_inbox.source_id, additional_attributes: additional_attributes },
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
response_data = JSON.parse(response.body, symbolize_names: true)
|
|
|
|
expect(response_data[:additional_attributes]).to eq(additional_attributes)
|
|
|
|
end
|
|
|
|
|
2021-06-07 14:34:31 +00:00
|
|
|
it 'creates a conversation in specificed status' do
|
|
|
|
allow(Rails.configuration.dispatcher).to receive(:dispatch)
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
params: { source_id: contact_inbox.source_id, status: 'bot' },
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
response_data = JSON.parse(response.body, symbolize_names: true)
|
|
|
|
expect(response_data[:status]).to eq('bot')
|
|
|
|
end
|
|
|
|
|
2021-04-15 09:43:01 +00:00
|
|
|
it 'creates a new conversation with message when message is passed' do
|
|
|
|
allow(Rails.configuration.dispatcher).to receive(:dispatch)
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
params: { source_id: contact_inbox.source_id, message: { content: 'hi' } },
|
2021-01-07 08:17:38 +00:00
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
response_data = JSON.parse(response.body, symbolize_names: true)
|
|
|
|
expect(response_data[:additional_attributes]).to eq({})
|
2021-04-15 09:43:01 +00:00
|
|
|
expect(account.conversations.find_by(display_id: response_data[:id]).messages.first.content).to eq 'hi'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'calls contact inbox builder if contact_id and inbox_id is present' do
|
|
|
|
builder = double
|
|
|
|
contact = create(:contact, account: account)
|
|
|
|
inbox = create(:inbox, account: account)
|
|
|
|
allow(Rails.configuration.dispatcher).to receive(:dispatch)
|
|
|
|
allow(ContactInboxBuilder).to receive(:new).and_return(builder)
|
|
|
|
allow(builder).to receive(:perform)
|
|
|
|
expect(builder).to receive(:perform)
|
|
|
|
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
params: { contact_id: contact.id, inbox_id: inbox.id },
|
|
|
|
as: :json
|
2021-01-07 08:17:38 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-03-09 17:57:10 +00:00
|
|
|
describe 'POST /api/v1/accounts/{account.id}/conversations/:id/toggle_status' do
|
2020-02-17 10:27:57 +00:00
|
|
|
let(:conversation) { create(:conversation, account: account) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
2020-03-09 17:57:10 +00:00
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/toggle_status"
|
2020-02-17 10:27:57 +00:00
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
|
|
|
|
it 'toggles the conversation status' do
|
|
|
|
expect(conversation.status).to eq('open')
|
|
|
|
|
2020-03-09 17:57:10 +00:00
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/toggle_status",
|
2020-02-17 10:27:57 +00:00
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(conversation.reload.status).to eq('resolved')
|
|
|
|
end
|
2020-03-10 18:32:15 +00:00
|
|
|
|
|
|
|
it 'toggles the conversation status to open from bot' do
|
|
|
|
conversation.update!(status: 'bot')
|
|
|
|
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/toggle_status",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(conversation.reload.status).to eq('open')
|
|
|
|
end
|
2020-06-02 18:20:39 +00:00
|
|
|
|
|
|
|
it 'toggles the conversation status to specific status when parameter is passed' do
|
|
|
|
expect(conversation.status).to eq('open')
|
|
|
|
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/toggle_status",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
params: { status: 'bot' },
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(conversation.reload.status).to eq('bot')
|
|
|
|
end
|
2020-02-17 10:27:57 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-05-03 06:47:27 +00:00
|
|
|
describe 'POST /api/v1/accounts/{account.id}/conversations/:id/toggle_typing_status' do
|
|
|
|
let(:conversation) { create(:conversation, account: account) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/toggle_typing_status"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
|
|
|
|
it 'toggles the conversation status' do
|
|
|
|
allow(Rails.configuration.dispatcher).to receive(:dispatch)
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/toggle_typing_status",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
params: { typing_status: 'on' },
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(Rails.configuration.dispatcher).to have_received(:dispatch)
|
|
|
|
.with(Conversation::CONVERSATION_TYPING_ON, kind_of(Time), { conversation: conversation, user: agent })
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-03-09 17:57:10 +00:00
|
|
|
describe 'POST /api/v1/accounts/{account.id}/conversations/:id/update_last_seen' do
|
2020-02-17 10:27:57 +00:00
|
|
|
let(:conversation) { create(:conversation, account: account) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
2020-03-09 17:57:10 +00:00
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/update_last_seen"
|
2020-02-17 10:27:57 +00:00
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
|
|
|
|
it 'updates last seen' do
|
2020-03-09 17:57:10 +00:00
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/update_last_seen",
|
2020-02-17 10:27:57 +00:00
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
2020-08-03 08:10:20 +00:00
|
|
|
expect(conversation.reload.agent_last_seen_at).not_to eq nil
|
2020-02-17 10:27:57 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-05-26 12:13:59 +00:00
|
|
|
|
|
|
|
describe 'POST /api/v1/accounts/{account.id}/conversations/:id/mute' do
|
|
|
|
let(:conversation) { create(:conversation, account: account) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/mute"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
|
|
|
|
it 'mutes conversation' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/mute",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(conversation.reload.resolved?).to eq(true)
|
|
|
|
expect(conversation.reload.muted?).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-08-17 05:55:13 +00:00
|
|
|
|
2020-10-08 06:32:08 +00:00
|
|
|
describe 'POST /api/v1/accounts/{account.id}/conversations/:id/unmute' do
|
|
|
|
let(:conversation) { create(:conversation, account: account).tap(&:mute!) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/unmute"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
|
|
|
|
it 'unmutes conversation' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/unmute",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(conversation.reload.muted?).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-08-17 05:55:13 +00:00
|
|
|
describe 'POST /api/v1/accounts/{account.id}/conversations/:id/transcript' do
|
|
|
|
let(:conversation) { create(:conversation, account: account) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/transcript"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
let(:params) { { email: 'test@test.com' } }
|
|
|
|
|
|
|
|
it 'mutes conversation' do
|
2021-06-08 17:15:01 +00:00
|
|
|
mailer = double
|
|
|
|
allow(ConversationReplyMailer).to receive(:with).and_return(mailer)
|
|
|
|
allow(mailer).to receive(:conversation_transcript)
|
2020-08-17 05:55:13 +00:00
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/transcript",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
params: params,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
2021-06-08 17:15:01 +00:00
|
|
|
expect(mailer).to have_received(:conversation_transcript).with(conversation, 'test@test.com')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'renders error when parameter missing' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/conversations/#{conversation.display_id}/transcript",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
params: {},
|
|
|
|
as: :json
|
|
|
|
expect(response).to have_http_status(:unprocessable_entity)
|
2020-08-17 05:55:13 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-02-17 10:27:57 +00:00
|
|
|
end
|