fluxer/tests/integration/user_account_and_settings_endpoints_test.go
2026-01-01 21:05:54 +00:00

177 lines
5.7 KiB
Go

/*
* Copyright (C) 2026 Fluxer Contributors
*
* This file is part of Fluxer.
*
* Fluxer is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Fluxer is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with Fluxer. If not, see <https://www.gnu.org/licenses/>.
*/
package integration
import (
"fmt"
"net/http"
"net/url"
"testing"
"time"
)
func TestUserAccountAndSettingsEndpoints(t *testing.T) {
client := newTestClient(t)
account := createTestAccount(t, client)
newGlobal := fmt.Sprintf("Integration %d", time.Now().UnixNano())
newBio := "Integration tests ensure user endpoints behave"
resp, err := client.patchJSONWithAuth("/users/@me", map[string]any{
"global_name": newGlobal,
"bio": newBio,
}, account.Token)
if err != nil {
t.Fatalf("failed to update profile: %v", err)
}
assertStatus(t, resp, http.StatusOK)
var updated userPrivateResponse
decodeJSONResponse(t, resp, &updated)
if updated.GlobalName != newGlobal {
t.Fatalf("expected global name %q, got %q", newGlobal, updated.GlobalName)
}
if updated.Bio != newBio {
t.Fatalf("expected bio to update")
}
tagPath := fmt.Sprintf("/users/check-tag?username=%s&discriminator=%s",
url.QueryEscape(updated.Username),
url.QueryEscape(updated.Discriminator),
)
resp, err = client.getWithAuth(tagPath, account.Token)
if err != nil {
t.Fatalf("failed to call check-tag: %v", err)
}
assertStatus(t, resp, http.StatusOK)
var tagResp tagCheckResponse
decodeJSONResponse(t, resp, &tagResp)
if tagResp.Taken {
t.Fatalf("expected own username/discriminator to be available (not taken)")
}
resp, err = client.getWithAuth(fmt.Sprintf("/users/%s", account.UserID), account.Token)
if err != nil {
t.Fatalf("failed to fetch user by id: %v", err)
}
assertStatus(t, resp, http.StatusOK)
var partial userPartial
decodeJSONResponse(t, resp, &partial)
if partial.ID != account.UserID {
t.Fatalf("expected user id %s, got %s", account.UserID, partial.ID)
}
resp, err = client.getWithAuth(fmt.Sprintf("/users/%s/profile", account.UserID), account.Token)
if err != nil {
t.Fatalf("failed to fetch profile: %v", err)
}
assertStatus(t, resp, http.StatusOK)
var profile userProfileEnvelope
decodeJSONResponse(t, resp, &profile)
if profile.User.ID != account.UserID {
t.Fatalf("expected profile user id %s, got %s", account.UserID, profile.User.ID)
}
resp, err = client.patchJSONWithAuth("/users/@me/guilds/@me/settings", map[string]any{
"suppress_everyone": true,
}, account.Token)
if err != nil {
t.Fatalf("failed to update default guild settings: %v", err)
}
assertStatus(t, resp, http.StatusOK)
var guildSettings userGuildSettingsResponse
decodeJSONResponse(t, resp, &guildSettings)
if !guildSettings.SuppressEveryone {
t.Fatalf("expected suppress_everyone to be true")
}
target := createTestAccount(t, client)
resp, err = client.putJSONWithAuth(fmt.Sprintf("/users/@me/notes/%s", target.UserID), map[string]string{"note": "Great tester"}, account.Token)
if err != nil {
t.Fatalf("failed to set user note: %v", err)
}
assertStatus(t, resp, http.StatusNoContent)
resp.Body.Close()
resp, err = client.postJSONWithAuth(preloadMessagesEndpoint, map[string]any{"channels": []int{}}, account.Token)
if err != nil {
t.Fatalf("failed to preload messages: %v", err)
}
assertStatus(t, resp, http.StatusOK)
var preload map[string]any
decodeJSONResponse(t, resp, &preload)
if len(preload) != 0 {
t.Fatalf("expected empty preload response, got %d entries", len(preload))
}
deletePayload := map[string]string{
"password": account.Password,
}
resp, err = client.postJSONWithAuth(messagesDeleteEndpoint, deletePayload, account.Token)
if err != nil {
t.Fatalf("failed to request message deletion: %v", err)
}
assertStatus(t, resp, http.StatusNoContent)
resp.Body.Close()
t.Run("reject getting nonexistent user", func(t *testing.T) {
resp, err := client.getWithAuth("/users/999999999999999999", account.Token)
if err != nil {
t.Fatalf("failed to make request: %v", err)
}
assertStatus(t, resp, http.StatusNotFound)
resp.Body.Close()
})
t.Run("reject getting nonexistent user profile", func(t *testing.T) {
resp, err := client.getWithAuth("/users/999999999999999999/profile", account.Token)
if err != nil {
t.Fatalf("failed to make request: %v", err)
}
assertStatus(t, resp, http.StatusNotFound)
resp.Body.Close()
})
t.Run("check-tag with missing username returns 400", func(t *testing.T) {
resp, err := client.getWithAuth("/users/check-tag?discriminator=1234", account.Token)
if err != nil {
t.Fatalf("failed to make request: %v", err)
}
assertStatus(t, resp, http.StatusBadRequest)
resp.Body.Close()
})
t.Run("check-tag with missing discriminator returns 400", func(t *testing.T) {
resp, err := client.getWithAuth("/users/check-tag?username=testuser", account.Token)
if err != nil {
t.Fatalf("failed to make request: %v", err)
}
assertStatus(t, resp, http.StatusBadRequest)
resp.Body.Close()
})
t.Run("check-tag with invalid discriminator returns 400", func(t *testing.T) {
resp, err := client.getWithAuth("/users/check-tag?username=test&discriminator=invalid", account.Token)
if err != nil {
t.Fatalf("failed to make request: %v", err)
}
assertStatus(t, resp, http.StatusBadRequest)
resp.Body.Close()
})
}