2020-02-17 10:09:24 +00:00
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
RSpec.describe 'Inboxes API', type: :request do
|
|
|
|
let(:account) { create(:account) }
|
|
|
|
|
2020-03-09 17:57:10 +00:00
|
|
|
describe 'GET /api/v1/accounts/{account.id}/inboxes' do
|
2020-02-17 10:09:24 +00:00
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
2020-03-09 17:57:10 +00:00
|
|
|
get "/api/v1/accounts/#{account.id}/inboxes"
|
2020-02-17 10:09:24 +00:00
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
create(:inbox, account: account)
|
|
|
|
second_inbox = create(:inbox, account: account)
|
|
|
|
create(:inbox_member, user: agent, inbox: second_inbox)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns all inboxes of current_account as administrator' do
|
2020-03-09 17:57:10 +00:00
|
|
|
get "/api/v1/accounts/#{account.id}/inboxes",
|
2020-02-17 10:09:24 +00:00
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(JSON.parse(response.body, symbolize_names: true)[:payload].size).to eq(2)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns only assigned inboxes of current_account as agent' do
|
2020-03-09 17:57:10 +00:00
|
|
|
get "/api/v1/accounts/#{account.id}/inboxes",
|
2020-02-17 10:09:24 +00:00
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(JSON.parse(response.body, symbolize_names: true)[:payload].size).to eq(1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-04-20 08:16:20 +00:00
|
|
|
describe 'GET /api/v1/accounts/{account.id}/inboxes/{inbox.id}/assignable_agents' do
|
|
|
|
let(:inbox) { create(:inbox, account: account) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}/assignable_agents"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
create(:inbox_member, user: agent, inbox: inbox)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns all assignable inbox members along with administrators' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}/assignable_agents",
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
response_data = JSON.parse(response.body, symbolize_names: true)[:payload]
|
|
|
|
expect(response_data.size).to eq(2)
|
|
|
|
expect(response_data.pluck(:role)).to include('agent', 'administrator')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-04-29 16:53:32 +00:00
|
|
|
describe 'GET /api/v1/accounts/{account.id}/inboxes/{inbox.id}/campaigns' do
|
|
|
|
let(:inbox) { create(:inbox, account: account) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}/campaigns"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:agent) { create(:user, account: account, role: :agent) }
|
|
|
|
let(:administrator) { create(:user, account: account, role: :administrator) }
|
|
|
|
|
|
|
|
let!(:campaign) { create(:campaign, account: account, inbox: inbox) }
|
|
|
|
|
|
|
|
it 'returns unauthorized for agents' do
|
|
|
|
get "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}/campaigns"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns all campaigns belonging to the inbox to administrators' do
|
|
|
|
# create a random campaign
|
|
|
|
create(:campaign, account: account)
|
|
|
|
get "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}/campaigns",
|
|
|
|
headers: administrator.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
body = JSON.parse(response.body, symbolize_names: true)
|
|
|
|
expect(body.first[:id]).to eq(campaign.display_id)
|
|
|
|
expect(body.length).to eq(1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-03-09 17:57:10 +00:00
|
|
|
describe 'DELETE /api/v1/accounts/{account.id}/inboxes/:id' do
|
2020-02-17 10:09:24 +00:00
|
|
|
let(:inbox) { create(:inbox, account: account) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
2020-03-09 17:57:10 +00:00
|
|
|
delete "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}"
|
2020-02-17 10:09:24 +00:00
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
|
|
|
|
it 'deletes inbox' do
|
2020-03-09 17:57:10 +00:00
|
|
|
delete "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}",
|
2020-02-17 10:09:24 +00:00
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
2020-02-19 09:10:03 +00:00
|
|
|
expect { inbox.reload }.to raise_exception(ActiveRecord::RecordNotFound)
|
2020-02-17 10:09:24 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is unable to delete inbox of another account' do
|
|
|
|
other_account = create(:account)
|
|
|
|
other_inbox = create(:inbox, account: other_account)
|
|
|
|
|
2020-03-09 17:57:10 +00:00
|
|
|
delete "/api/v1/accounts/#{account.id}/inboxes/#{other_inbox.id}",
|
2020-02-17 10:09:24 +00:00
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:not_found)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'is unable to delete inbox as agent' do
|
|
|
|
agent = create(:user, account: account, role: :agent)
|
|
|
|
|
2020-03-09 17:57:10 +00:00
|
|
|
delete "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}",
|
2020-02-17 10:09:24 +00:00
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-02-19 09:10:03 +00:00
|
|
|
|
2020-04-19 18:10:28 +00:00
|
|
|
describe 'POST /api/v1/accounts/{account.id}/inboxes' do
|
|
|
|
let(:inbox) { create(:inbox, account: account) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/inboxes"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
let(:valid_params) { { name: 'test', channel: { type: 'web_widget', website_url: 'test.com' } } }
|
|
|
|
|
|
|
|
it 'creates inbox' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/inboxes",
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
params: valid_params,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(response.body).to include('test.com')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'will not create inbox for agent' do
|
|
|
|
agent = create(:user, account: account, role: :agent)
|
|
|
|
|
|
|
|
post "/api/v1/accounts/#{account.id}/inboxes",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
params: valid_params,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-03-09 17:57:10 +00:00
|
|
|
describe 'PATCH /api/v1/accounts/{account.id}/inboxes/:id' do
|
2020-02-19 09:10:03 +00:00
|
|
|
let(:inbox) { create(:inbox, account: account) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
2020-03-09 17:57:10 +00:00
|
|
|
patch "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}"
|
2020-02-19 09:10:03 +00:00
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
2020-04-19 18:10:28 +00:00
|
|
|
let(:valid_params) { { enable_auto_assignment: false, channel: { website_url: 'test.com' } } }
|
2020-02-19 09:10:03 +00:00
|
|
|
|
2021-02-23 06:41:15 +00:00
|
|
|
it 'will not update inbox for agent' do
|
|
|
|
agent = create(:user, account: account, role: :agent)
|
|
|
|
|
|
|
|
patch "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
params: valid_params,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'updates inbox when administrator' do
|
2020-03-09 17:57:10 +00:00
|
|
|
patch "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}",
|
2020-02-19 09:10:03 +00:00
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
params: valid_params,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(inbox.reload.enable_auto_assignment).to be_falsey
|
|
|
|
end
|
|
|
|
|
2021-02-23 06:41:15 +00:00
|
|
|
it 'updates avatar when administrator' do
|
2020-04-07 04:49:19 +00:00
|
|
|
# no avatar before upload
|
|
|
|
expect(inbox.avatar.attached?).to eq(false)
|
|
|
|
file = fixture_file_upload(Rails.root.join('spec/assets/avatar.png'), 'image/png')
|
|
|
|
patch "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}",
|
2020-04-19 18:10:28 +00:00
|
|
|
params: valid_params.merge(avatar: file),
|
2020-04-07 04:49:19 +00:00
|
|
|
headers: admin.create_new_auth_token
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
2020-04-19 18:10:28 +00:00
|
|
|
expect(response.body).to include('test.com')
|
2020-04-07 04:49:19 +00:00
|
|
|
inbox.reload
|
|
|
|
expect(inbox.avatar.attached?).to eq(true)
|
|
|
|
end
|
|
|
|
|
2021-02-23 06:41:15 +00:00
|
|
|
it 'updates working hours when administrator' do
|
|
|
|
params = {
|
|
|
|
working_hours: [{ 'day_of_week' => 0, 'open_hour' => 9, 'open_minutes' => 0, 'close_hour' => 17, 'close_minutes' => 0 }],
|
|
|
|
working_hours_enabled: true,
|
|
|
|
out_of_office_message: 'hello'
|
|
|
|
}
|
2020-03-09 17:57:10 +00:00
|
|
|
patch "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}",
|
2021-02-23 06:41:15 +00:00
|
|
|
params: valid_params.merge(params),
|
|
|
|
headers: admin.create_new_auth_token
|
2020-02-19 09:10:03 +00:00
|
|
|
|
2021-02-23 06:41:15 +00:00
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
inbox.reload
|
|
|
|
expect(inbox.reload.weekly_schedule.find { |schedule| schedule['day_of_week'] == 0 }['open_hour']).to eq 9
|
2020-02-19 09:10:03 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-04-07 05:11:18 +00:00
|
|
|
|
|
|
|
describe 'POST /api/v1/accounts/{account.id}/inboxes/:id/set_agent_bot' do
|
|
|
|
let(:inbox) { create(:inbox, account: account) }
|
|
|
|
let(:agent_bot) { create(:agent_bot) }
|
|
|
|
|
|
|
|
context 'when it is an unauthenticated user' do
|
|
|
|
it 'returns unauthorized' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}/set_agent_bot"
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when it is an authenticated user' do
|
|
|
|
let(:admin) { create(:user, account: account, role: :administrator) }
|
|
|
|
let(:valid_params) { { agent_bot: agent_bot.id } }
|
|
|
|
|
|
|
|
it 'sets the agent bot' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}/set_agent_bot",
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
params: valid_params,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(inbox.reload.agent_bot.id).to eq agent_bot.id
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'throw error when invalid agent bot id' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}/set_agent_bot",
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
params: { agent_bot: 0 },
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:not_found)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'disconnects the agent bot' do
|
|
|
|
post "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}/set_agent_bot",
|
|
|
|
headers: admin.create_new_auth_token,
|
|
|
|
params: { agent_bot: nil },
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:success)
|
|
|
|
expect(inbox.reload.agent_bot).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'will not update agent bot when its an agent' do
|
|
|
|
agent = create(:user, account: account, role: :agent)
|
|
|
|
|
|
|
|
post "/api/v1/accounts/#{account.id}/inboxes/#{inbox.id}/set_agent_bot",
|
|
|
|
headers: agent.create_new_auth_token,
|
|
|
|
params: valid_params,
|
|
|
|
as: :json
|
|
|
|
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-02-17 10:09:24 +00:00
|
|
|
end
|