1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.User.QueryTest do
6 use Pleroma.DataCase, async: false
10 alias Pleroma.User.Query
11 alias Pleroma.Web.ActivityPub.InternalFetchActor
13 import Pleroma.Factory
15 describe "internal users" do
16 test "it filters out internal users by default" do
17 %User{nickname: "internal.fetch"} = InternalFetchActor.get_actor()
19 assert [_user] = User |> Repo.all()
20 assert [] == %{} |> Query.build() |> Repo.all()
23 test "it filters out users without nickname by default" do
24 insert(:user, %{nickname: nil})
26 assert [_user] = User |> Repo.all()
27 assert [] == %{} |> Query.build() |> Repo.all()
30 test "it returns internal users when enabled" do
31 %User{nickname: "internal.fetch"} = InternalFetchActor.get_actor()
32 insert(:user, %{nickname: nil})
34 assert %{internal: true} |> Query.build() |> Repo.aggregate(:count) == 2
38 test "is_suggested param" do
39 _user1 = insert(:user, is_suggested: false)
40 user2 = insert(:user, is_suggested: true)
48 describe "is_privileged param" do
51 user: insert(:user, local: true, is_admin: false, is_moderator: false),
52 moderator_user: insert(:user, local: true, is_admin: false, is_moderator: true),
53 admin_user: insert(:user, local: true, is_admin: true, is_moderator: false),
54 admin_moderator_user: insert(:user, local: true, is_admin: true, is_moderator: true),
55 remote_user: insert(:user, local: false, is_admin: true, is_moderator: true),
57 insert(:user, local: true, is_admin: true, is_moderator: true, is_active: false)
61 test "doesn't return any users when there are no privileged roles" do
62 clear_config([:instance, :admin_privileges], [])
63 clear_config([:instance, :moderator_privileges], [])
65 assert [] = User.Query.build(%{is_privileged: :cofe}) |> Repo.all()
68 test "returns moderator users if they are privileged", %{
69 moderator_user: moderator_user,
70 admin_moderator_user: admin_moderator_user
72 clear_config([:instance, :admin_privileges], [])
73 clear_config([:instance, :moderator_privileges], [:cofe])
75 assert [_, _] = User.Query.build(%{is_privileged: :cofe}) |> Repo.all()
76 assert moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
77 assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
80 test "returns admin users if they are privileged", %{
81 admin_user: admin_user,
82 admin_moderator_user: admin_moderator_user
84 clear_config([:instance, :admin_privileges], [:cofe])
85 clear_config([:instance, :moderator_privileges], [])
87 assert [_, _] = User.Query.build(%{is_privileged: :cofe}) |> Repo.all()
88 assert admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
89 assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
92 test "returns admin and moderator users if they are both privileged", %{
93 moderator_user: moderator_user,
94 admin_user: admin_user,
95 admin_moderator_user: admin_moderator_user
97 clear_config([:instance, :admin_privileges], [:cofe])
98 clear_config([:instance, :moderator_privileges], [:cofe])
100 assert [_, _, _] = User.Query.build(%{is_privileged: :cofe}) |> Repo.all()
101 assert admin_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
102 assert moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())
103 assert admin_moderator_user in (User.Query.build(%{is_privileged: :cofe}) |> Repo.all())