2019-12-24 12:02:27 +00:00
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
RSpec.describe 'Accounts API', type: :request do
|
|
|
|
describe 'POST /api/v1/accounts' do
|
2020-05-11 17:37:22 +00:00
|
|
|
let(:email) { Faker::Internet.email }
|
|
|
|
|
2019-12-24 12:02:27 +00:00
|
|
|
context 'when posting to accounts with correct parameters' do
|
|
|
|
let(:account_builder) { double }
|
2020-03-09 17:57:10 +00:00
|
|
|
let(:account) { create(:account) }
|
|
|
|
let(:user) { create(:user, email: email, account: account) }
|
2019-12-24 12:02:27 +00:00
|
|
|
|
|
|
|
before do
|
|
|
|
allow(AccountBuilder).to receive(:new).and_return(account_builder)
|
2020-02-29 05:50:33 +00:00
|
|
|
ENV['ENABLE_ACCOUNT_SIGNUP'] = nil
|
2019-12-24 12:02:27 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'calls account builder' do
|
2020-07-26 07:24:50 +00:00
|
|
|
allow(account_builder).to receive(:perform).and_return([user, account])
|
2020-02-07 11:11:49 +00:00
|
|
|
|
2020-07-26 07:24:50 +00:00
|
|
|
params = { account_name: 'test', email: email, user: nil }
|
2019-12-24 12:02:27 +00:00
|
|
|
|
|
|
|
post api_v1_accounts_url,
|
|
|
|
params: params,
|
|
|
|
as: :json
|
|
|
|
|
2020-05-11 17:37:22 +00:00
|
|
|
expect(AccountBuilder).to have_received(:new).with(params.merge(confirmed: false))
|
2019-12-24 12:02:27 +00:00
|
|
|
expect(account_builder).to have_received(:perform)
|
|
|
|
expect(response.headers.keys).to include('access-token', 'token-type', 'client', 'expiry', 'uid')
|
|
|
|
end
|
2020-02-07 11:11:49 +00:00
|
|
|
|
|
|
|
it 'renders error response on invalid params' do
|
|
|
|
allow(account_builder).to receive(:perform).and_return(nil)
|
|
|
|
|
2020-07-26 07:24:50 +00:00
|
|
|
params = { account_name: nil, email: nil, user: nil }
|
2020-02-07 11:11:49 +00:00
|
|
|
|
|
|
|
post api_v1_accounts_url,
|
|
|
|
params: params,
|
|
|
|
as: :json
|
|
|
|
|
2020-05-11 17:37:22 +00:00
|
|
|
expect(AccountBuilder).to have_received(:new).with(params.merge(confirmed: false))
|
|
|
|
expect(account_builder).to have_received(:perform)
|
|
|
|
expect(response).to have_http_status(:forbidden)
|
|
|
|
expect(response.body).to eq({ message: I18n.t('errors.signup.failed') }.to_json)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'ignores confirmed param when called with out super admin token' do
|
|
|
|
allow(account_builder).to receive(:perform).and_return(nil)
|
|
|
|
|
2020-07-26 07:24:50 +00:00
|
|
|
params = { account_name: 'test', email: email, confirmed: true, user: nil }
|
2020-05-11 17:37:22 +00:00
|
|
|
|
|
|
|
post api_v1_accounts_url,
|
|
|
|
params: params,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(AccountBuilder).to have_received(:new).with(params.merge(confirmed: false))
|
2020-02-07 11:11:49 +00:00
|
|
|
expect(account_builder).to have_received(:perform)
|
|
|
|
expect(response).to have_http_status(:forbidden)
|
|
|
|
expect(response.body).to eq({ message: I18n.t('errors.signup.failed') }.to_json)
|
|
|
|
end
|
2019-12-24 12:02:27 +00:00
|
|
|
end
|
2020-02-29 05:50:33 +00:00
|
|
|
|
2020-05-11 17:37:22 +00:00
|
|
|
context 'when called with super admin token' do
|
|
|
|
let(:super_admin) { create(:super_admin) }
|
|
|
|
|
|
|
|
it 'calls account builder with confirmed true when confirmed param is passed' do
|
|
|
|
params = { account_name: 'test', email: email, confirmed: true }
|
|
|
|
|
|
|
|
post api_v1_accounts_url,
|
|
|
|
params: params,
|
|
|
|
headers: { api_access_token: super_admin.access_token.token },
|
|
|
|
as: :json
|
2020-02-29 05:50:33 +00:00
|
|
|
|
2020-05-31 17:40:20 +00:00
|
|
|
created_user = User.find_by(email: email)
|
|
|
|
expect(created_user.confirmed?).to eq(true)
|
2020-05-11 17:37:22 +00:00
|
|
|
expect(response.headers.keys).to include('access-token', 'token-type', 'client', 'expiry', 'uid')
|
2020-05-31 17:40:20 +00:00
|
|
|
expect(response.body).to include(created_user.access_token.token)
|
2020-05-11 17:37:22 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when ENABLE_ACCOUNT_SIGNUP env variable is set to false' do
|
2020-02-29 05:50:33 +00:00
|
|
|
it 'responds 404 on requests' do
|
|
|
|
params = { account_name: 'test', email: email }
|
|
|
|
ENV['ENABLE_ACCOUNT_SIGNUP'] = 'false'
|
|
|
|
|
|
|
|
post api_v1_accounts_url,
|
|
|
|
params: params,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:not_found)
|
|
|
|
ENV['ENABLE_ACCOUNT_SIGNUP'] = nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when ENABLE_ACCOUNT_SIGNUP env variable is set to api_only' do
|
|
|
|
it 'does not respond 404 on requests' do
|
|
|
|
params = { account_name: 'test', email: email }
|
|
|
|
ENV['ENABLE_ACCOUNT_SIGNUP'] = 'api_only'
|
|
|
|
|
|
|
|
post api_v1_accounts_url,
|
|
|
|
params: params,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).not_to have_http_status(:not_found)
|
|
|
|
ENV['ENABLE_ACCOUNT_SIGNUP'] = nil
|
|
|
|
end
|
|
|
|
end
|
2019-12-24 12:02:27 +00:00
|
|
|
end
|
2020-03-29 06:46:31 +00:00
|
|
|
|
|
|
|
describe 'GET /api/v1/accounts/{account.id}' do
|
|
|
|
let(:account) { create(:account) }
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
2020-05-26 17:08:48 +00:00
|
|
|
let(:user_without_access) { create(:user) }
|
2020-03-29 06:46:31 +00:00
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
get "/api/v1/accounts/#{account.id}"
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an unauthorized user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
get "/api/v1/accounts/#{account.id}",
|
2020-05-26 17:08:48 +00:00
|
|
|
headers: user_without_access.create_new_auth_token
|
2020-03-29 06:46:31 +00:00
|
|
|
|
2020-05-26 17:08:48 +00:00
|
|
|
expect(response).to have_http_status(:not_found)
|
2020-03-29 06:46:31 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
it 'shows an account' do
|
2020-11-01 07:23:25 +00:00
|
|
|
account.update(auto_resolve_duration: 30)
|
|
|
|
|
2020-03-29 06:46:31 +00:00
|
|
|
get "/api/v1/accounts/#{account.id}",
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(response.body).to include(account.name)
|
|
|
|
expect(response.body).to include(account.locale)
|
2020-04-30 14:50:26 +00:00
|
|
|
expect(response.body).to include(account.domain)
|
|
|
|
expect(response.body).to include(account.support_email)
|
2020-11-01 07:23:25 +00:00
|
|
|
expect(response.body).to include(account.auto_resolve_duration.to_s)
|
2020-03-29 06:46:31 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'PUT /api/v1/accounts/{account.id}' do
|
|
|
|
let(:account) { create(:account) }
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
put "/api/v1/accounts/#{account.id}"
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an unauthorized user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
put "/api/v1/accounts/#{account.id}",
|
|
|
|
headers: agent.create_new_auth_token
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
2020-04-30 14:50:26 +00:00
|
|
|
params = {
|
|
|
|
name: 'New Name',
|
2020-05-06 08:08:36 +00:00
|
|
|
locale: 'en',
|
2020-04-30 14:50:26 +00:00
|
|
|
domain: 'example.com',
|
2020-11-01 07:23:25 +00:00
|
|
|
support_email: 'care@example.com',
|
|
|
|
auto_resolve_duration: 40
|
2020-04-30 14:50:26 +00:00
|
|
|
}
|
2020-03-29 06:46:31 +00:00
|
|
|
|
|
|
|
it 'modifies an account' do
|
|
|
|
put "/api/v1/accounts/#{account.id}",
|
|
|
|
params: params,
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(account.reload.name).to eq(params[:name])
|
|
|
|
expect(account.reload.locale).to eq(params[:locale])
|
2020-04-30 14:50:26 +00:00
|
|
|
expect(account.reload.domain).to eq(params[:domain])
|
|
|
|
expect(account.reload.support_email).to eq(params[:support_email])
|
2020-11-01 07:23:25 +00:00
|
|
|
expect(account.reload.auto_resolve_duration).to eq(params[:auto_resolve_duration])
|
2020-03-29 06:46:31 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-05-26 17:08:48 +00:00
|
|
|
|
|
|
|
describe 'POST /api/v1/accounts/{account.id}/update_active_at' do
|
|
|
|
let(:account) { create(:account) }
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/update_active_at"
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
it 'modifies an account' do
|
|
|
|
expect(agent.account_users.first.active_at).to eq(nil)
|
|
|
|
post "/api/v1/accounts/#{account.id}/update_active_at",
|
|
|
|
params: {},
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(agent.account_users.first.active_at).not_to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2019-12-24 12:02:27 +00:00
|
|
|
end
|