mirror of
https://github.com/discourse/discourse.git
synced 2026-03-04 01:15:08 +08:00
Currently in several endpoints, we return an array of strings for tags.
Our goal with this PR is to expand array tag name strings to an array of
tag objects.
#### before: Tags were returned as string arrays
```
{ "tags": ["support", "bug-report"] }
```
#### after: Tags are returned as object arrays
```
{ "tags": [{"id": 12, "name": "support", "slug": "support"}, {"id": 13, "name": "bug-report", "slug": "bug-report"}] }
```
This allows us to start referencing tags by their ids, and return more
information for a tag for future features.
This commit involves updating several areas:
- topic lists (/latest.json, /top.json, /c/:category/:id.json, etc, for
`top_tags`)
- tag chooser components (`MiniTagChooser`, `TagDrop`, etc)
- topic view (/t/:id.json)
- tag groups (/tag_groups.json, tags, parent_tag)
- category settings
- staff action logs
- synonyms
- ...
APIs that reference tags based on their names will still be supported
with a deprecation warning. Moving on, we will reference them using
their tag ids.
680 lines
20 KiB
Ruby
680 lines
20 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
RSpec.describe DraftsController do
|
|
fab!(:user)
|
|
|
|
describe "#index" do
|
|
it "requires you to be logged in" do
|
|
get "/drafts.json"
|
|
expect(response.status).to eq(403)
|
|
end
|
|
|
|
describe "when limit params is invalid" do
|
|
before { sign_in(user) }
|
|
|
|
include_examples "invalid limit params", "/drafts.json", described_class::INDEX_LIMIT
|
|
end
|
|
|
|
it "returns correct stream length after adding a draft" do
|
|
sign_in(user)
|
|
Draft.set(user, "xxx", 0, "{}")
|
|
get "/drafts.json"
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["drafts"].length).to eq(1)
|
|
end
|
|
|
|
it "has empty stream after deleting last draft" do
|
|
sign_in(user)
|
|
Draft.set(user, "xxx", 0, "{}")
|
|
Draft.clear(user, "xxx", 0)
|
|
get "/drafts.json"
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["drafts"].length).to eq(0)
|
|
end
|
|
|
|
it "does not include topic details when user cannot see topic" do
|
|
topic = Fabricate(:private_message_topic)
|
|
topic_user = topic.user
|
|
other_user = Fabricate(:user)
|
|
Draft.set(topic_user, "topic_#{topic.id}", 0, "{}")
|
|
Draft.set(other_user, "topic_#{topic.id}", 0, "{}")
|
|
|
|
sign_in(topic_user)
|
|
get "/drafts.json"
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["drafts"].first["title"]).to eq(topic.title)
|
|
|
|
sign_in(other_user)
|
|
get "/drafts.json"
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["drafts"].first["title"]).to eq(nil)
|
|
end
|
|
|
|
it "returns categories when lazy load categories is enabled" do
|
|
SiteSetting.lazy_load_categories_groups = "#{Group::AUTO_GROUPS[:everyone]}"
|
|
category = Fabricate(:category)
|
|
topic = Fabricate(:topic, category: category)
|
|
Draft.set(topic.user, "topic_#{topic.id}", 0, "{}")
|
|
sign_in(topic.user)
|
|
|
|
get "/drafts.json"
|
|
expect(response.status).to eq(200)
|
|
draft_keys = response.parsed_body["drafts"].map { |draft| draft["draft_key"] }
|
|
expect(draft_keys).to contain_exactly("topic_#{topic.id}")
|
|
category_ids = response.parsed_body["categories"].map { |cat| cat["id"] }
|
|
expect(category_ids).to contain_exactly(category.id)
|
|
end
|
|
end
|
|
|
|
describe "#show" do
|
|
it "returns a draft if requested" do
|
|
sign_in(user)
|
|
Draft.set(user, "hello", 0, "test")
|
|
|
|
get "/drafts/hello.json"
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["draft"]).to eq("test")
|
|
end
|
|
end
|
|
|
|
describe "#create" do
|
|
it "requires you to be logged in" do
|
|
post "/drafts.json"
|
|
expect(response.status).to eq(403)
|
|
end
|
|
|
|
it "saves a draft" do
|
|
sign_in(user)
|
|
|
|
post "/drafts.json", params: { draft_key: "xyz", data: { my: "data" }.to_json, sequence: 0 }
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(Draft.get(user, "xyz", 0)).to eq(%q({"my":"data"}))
|
|
end
|
|
|
|
it "returns 404 when the key is missing" do
|
|
sign_in(Fabricate(:user))
|
|
post "/drafts.json", params: { data: { my: "data" }.to_json, sequence: 0 }
|
|
expect(response.status).to eq(404)
|
|
end
|
|
|
|
it "checks for a raw conflict on update" do
|
|
sign_in(user)
|
|
post = Fabricate(:post, user:)
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "topic",
|
|
sequence: 0,
|
|
data: { postId: post.id, original_text: post.raw, action: "edit" }.to_json,
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["conflict_user"]).to eq(nil)
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "topic",
|
|
sequence: 0,
|
|
data: { postId: post.id, original_text: "something else", action: "edit" }.to_json,
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["conflict_user"]["id"]).to eq(post.last_editor.id)
|
|
expect(response.parsed_body["conflict_user"]).to include("avatar_template")
|
|
end
|
|
|
|
it "checks for a title conflict on update" do
|
|
sign_in(user)
|
|
post = Fabricate(:post, user:)
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "topic",
|
|
sequence: 0,
|
|
data: {
|
|
postId: post.id,
|
|
original_text: post.raw,
|
|
original_title: "something else",
|
|
action: "edit",
|
|
}.to_json,
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["conflict_user"]["id"]).to eq(post.last_editor.id)
|
|
end
|
|
|
|
it "checks for a tag conflict on update" do
|
|
sign_in(user)
|
|
tag1 = Fabricate(:tag, name: "tag1")
|
|
tag2 = Fabricate(:tag, name: "tag2")
|
|
post = Fabricate(:post, user:)
|
|
# topic has different tags than original_tags in draft
|
|
post.topic.tags = [tag1]
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "topic",
|
|
sequence: 0,
|
|
data: {
|
|
postId: post.id,
|
|
original_text: post.raw,
|
|
original_tags: %w[tag1 tag2],
|
|
action: "edit",
|
|
}.to_json,
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["conflict_user"]["id"]).to eq(post.last_editor.id)
|
|
end
|
|
|
|
it "handles hidden tags when checking for tag conflict" do
|
|
sign_in(user)
|
|
|
|
regular_tag = Fabricate(:tag)
|
|
admin_only_tag_one = Fabricate(:tag)
|
|
admin_only_tag_two = Fabricate(:tag)
|
|
|
|
admin_only_tag_group = Fabricate(:tag_group)
|
|
admin_only_tag_group.tags = [admin_only_tag_one, admin_only_tag_two]
|
|
admin_only_tag_group.permissions = [
|
|
[Group::AUTO_GROUPS[:admins], TagGroupPermission.permission_types[:full]],
|
|
]
|
|
admin_only_tag_group.save!
|
|
|
|
post = Fabricate(:post, user:)
|
|
post.topic.tags = [regular_tag, admin_only_tag_one]
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "topic",
|
|
sequence: 0,
|
|
data: {
|
|
postId: post.id,
|
|
original_text: post.raw,
|
|
original_tags: [regular_tag.name],
|
|
action: "edit",
|
|
}.to_json,
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["conflict_user"]).to eq(nil)
|
|
end
|
|
|
|
it "handles tag objects format when checking for tag conflict" do
|
|
sign_in(user)
|
|
tag1 = Fabricate(:tag)
|
|
tag2 = Fabricate(:tag)
|
|
post = Fabricate(:post, user:)
|
|
post.topic.tags = [tag1, tag2]
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "topic",
|
|
sequence: 0,
|
|
data: {
|
|
postId: post.id,
|
|
original_text: post.raw,
|
|
original_tags: [
|
|
{ "id" => tag1.id, "name" => tag1.name, "slug" => tag1.name },
|
|
{ "id" => tag2.id, "name" => tag2.name, "slug" => tag2.name },
|
|
],
|
|
action: "edit",
|
|
}.to_json,
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["conflict_user"]).to eq(nil)
|
|
end
|
|
|
|
it "cant trivially resolve conflicts without interaction" do
|
|
sign_in(user)
|
|
|
|
DraftSequence.next!(user, "abc")
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "abc",
|
|
sequence: 0,
|
|
data: { a: "test" }.to_json,
|
|
owner: "abcdefg",
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["draft_sequence"]).to eq(1)
|
|
end
|
|
|
|
it "has a clean protocol for ownership handover" do
|
|
sign_in(user)
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "abc",
|
|
sequence: 0,
|
|
data: { a: "test" }.to_json,
|
|
owner: "abcdefg",
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["draft_sequence"]).to eq(0)
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "abc",
|
|
sequence: 0,
|
|
data: { b: "test" }.to_json,
|
|
owner: "hijklmnop",
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["draft_sequence"]).to eq(1)
|
|
|
|
expect(DraftSequence.current(user, "abc")).to eq(1)
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "abc",
|
|
sequence: 1,
|
|
data: { c: "test" }.to_json,
|
|
owner: "hijklmnop",
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["draft_sequence"]).to eq(2)
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "abc",
|
|
sequence: 2,
|
|
data: { c: "test" }.to_json,
|
|
owner: "abc",
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["draft_sequence"]).to eq(3)
|
|
end
|
|
|
|
it "raises an error for out-of-sequence draft setting" do
|
|
sign_in(user)
|
|
seq = DraftSequence.next!(user, "abc")
|
|
Draft.set(user, "abc", seq, { b: "test" }.to_json)
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "abc",
|
|
sequence: seq - 1,
|
|
data: { a: "test" }.to_json,
|
|
}
|
|
|
|
expect(response.status).to eq(409)
|
|
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "abc",
|
|
sequence: seq + 1,
|
|
data: { a: "test" }.to_json,
|
|
}
|
|
|
|
expect(response.status).to eq(409)
|
|
end
|
|
|
|
context "when data is too big" do
|
|
let(:user) { Fabricate(:user) }
|
|
let(:data) { "a" * (SiteSetting.max_draft_length + 1) }
|
|
|
|
before do
|
|
SiteSetting.max_draft_length = 500
|
|
sign_in(user)
|
|
end
|
|
|
|
it "returns an error" do
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "xyz",
|
|
data: { reply: data }.to_json,
|
|
sequence: 0,
|
|
}
|
|
expect(response).to have_http_status :bad_request
|
|
end
|
|
end
|
|
|
|
context "when data is not too big" do
|
|
context "when data is not proper JSON" do
|
|
let(:user) { Fabricate(:user) }
|
|
let(:data) { "not-proper-json" }
|
|
|
|
before { sign_in(user) }
|
|
|
|
it "returns an error" do
|
|
post "/drafts.json", params: { draft_key: "xyz", data: data, sequence: 0 }
|
|
expect(response).to have_http_status :bad_request
|
|
end
|
|
end
|
|
|
|
context "when data is not a string" do
|
|
before { sign_in(user) }
|
|
|
|
it "returns an error" do
|
|
post "/drafts.json", params: { draft_key: "xyz", data: { cat: "tomtom" }, sequence: 0 }
|
|
expect(response).to have_http_status :bad_request
|
|
end
|
|
end
|
|
end
|
|
|
|
it "returns 403 when the maximum amount of drafts per users is reached" do
|
|
SiteSetting.max_drafts_per_user = 2
|
|
|
|
user1 = Fabricate(:user)
|
|
sign_in(user1)
|
|
|
|
data = { my: "data" }.to_json
|
|
|
|
# creating the first draft should work
|
|
post "/drafts.json", params: { draft_key: "TOPIC_1", data: data }
|
|
expect(response.status).to eq(200)
|
|
|
|
# same draft key, so shouldn't count against the limit
|
|
post "/drafts.json", params: { draft_key: "TOPIC_1", data: data, sequence: 0 }
|
|
expect(response.status).to eq(200)
|
|
|
|
# different draft key, so should count against the limit
|
|
post "/drafts.json", params: { draft_key: "TOPIC_2", data: data }
|
|
expect(response.status).to eq(200)
|
|
|
|
# limit should be reached now
|
|
post "/drafts.json", params: { draft_key: "TOPIC_3", data: data }
|
|
expect(response.status).to eq(403)
|
|
|
|
# updating existing draft should still work
|
|
post "/drafts.json", params: { draft_key: "TOPIC_1", data: data, sequence: 1 }
|
|
expect(response.status).to eq(200)
|
|
|
|
# creating a new draft as a different user should still work
|
|
user2 = Fabricate(:user)
|
|
sign_in(user2)
|
|
post "/drafts.json", params: { draft_key: "TOPIC_3", data: data }
|
|
expect(response.status).to eq(200)
|
|
|
|
# check the draft counts just to be safe
|
|
expect(Draft.where(user_id: user1.id).count).to eq(2)
|
|
expect(Draft.where(user_id: user2.id).count).to eq(1)
|
|
end
|
|
|
|
it "does not leak conflict info for posts user cannot see" do
|
|
private_post = Fabricate(:private_message_post)
|
|
|
|
sign_in(user)
|
|
post "/drafts.json",
|
|
params: {
|
|
draft_key: "topic_#{private_post.topic_id}",
|
|
sequence: 0,
|
|
data: {
|
|
postId: private_post.id,
|
|
action: "edit",
|
|
original_text: "wrong text to trigger conflict",
|
|
}.to_json,
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body).not_to have_key("conflict_user")
|
|
end
|
|
end
|
|
|
|
describe "#destroy" do
|
|
it "destroys drafts when required" do
|
|
sign_in(user)
|
|
Draft.set(user, "xxx", 0, "hi")
|
|
delete "/drafts/xxx.json", params: { sequence: 0 }
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(Draft.get(user, "xxx", 0)).to eq(nil)
|
|
end
|
|
|
|
it "denies attempts to destroy unowned draft" do
|
|
sign_in(Fabricate(:admin))
|
|
user = Fabricate(:user)
|
|
Draft.set(user, "xxx", 0, "hi")
|
|
delete "/drafts/xxx.json", params: { sequence: 0, username: user.username }
|
|
|
|
# Draft is not deleted because request is not via API
|
|
expect(Draft.get(user, "xxx", 0)).to be_present
|
|
end
|
|
|
|
shared_examples "for a passed user" do
|
|
it "deletes draft" do
|
|
api_key = Fabricate(:api_key).key
|
|
Draft.set(recipient, "xxx", 0, "hi")
|
|
|
|
delete "/drafts/xxx.json",
|
|
params: {
|
|
sequence: 0,
|
|
username: recipient.username,
|
|
},
|
|
headers: {
|
|
HTTP_API_USERNAME: caller.username,
|
|
HTTP_API_KEY: api_key,
|
|
}
|
|
|
|
expect(response.status).to eq(response_code)
|
|
|
|
if draft_deleted
|
|
expect(Draft.get(recipient, "xxx", 0)).to eq(nil)
|
|
else
|
|
expect(Draft.get(recipient, "xxx", 0)).to be_present
|
|
end
|
|
end
|
|
end
|
|
|
|
describe "api called by admin" do
|
|
include_examples "for a passed user" do
|
|
let(:caller) { Fabricate(:admin) }
|
|
let(:recipient) { Fabricate(:user) }
|
|
let(:response_code) { 200 }
|
|
let(:draft_deleted) { true }
|
|
end
|
|
end
|
|
|
|
describe "api called by tl4 user" do
|
|
include_examples "for a passed user" do
|
|
let(:caller) { Fabricate(:trust_level_4) }
|
|
let(:recipient) { Fabricate(:user) }
|
|
let(:response_code) { 403 }
|
|
let(:draft_deleted) { false }
|
|
end
|
|
end
|
|
|
|
describe "api called by regular user" do
|
|
include_examples "for a passed user" do
|
|
let(:caller) { Fabricate(:user) }
|
|
let(:recipient) { Fabricate(:user) }
|
|
let(:response_code) { 403 }
|
|
let(:draft_deleted) { false }
|
|
end
|
|
end
|
|
|
|
describe "api called by admin for another admin" do
|
|
include_examples "for a passed user" do
|
|
let(:caller) { Fabricate(:admin) }
|
|
let(:recipient) { Fabricate(:admin) }
|
|
let(:response_code) { 200 }
|
|
let(:draft_deleted) { true }
|
|
end
|
|
end
|
|
end
|
|
|
|
describe "#bulk_destroy" do
|
|
it "requires you to be logged in" do
|
|
delete "/drafts/bulk_destroy.json"
|
|
expect(response.status).to eq(403)
|
|
end
|
|
|
|
it "destroys multiple drafts when required" do
|
|
sign_in(user)
|
|
|
|
# Create multiple drafts
|
|
Draft.set(user, "draft1", 0, '{"reply": "draft 1 content"}')
|
|
Draft.set(user, "draft2", 0, '{"reply": "draft 2 content"}')
|
|
Draft.set(user, "draft3", 0, '{"reply": "draft 3 content"}')
|
|
|
|
expect(Draft.where(user: user).count).to eq(3)
|
|
|
|
delete "/drafts/bulk_destroy.json",
|
|
params: {
|
|
draft_keys: %w[draft1 draft2],
|
|
sequences: {
|
|
"draft1" => 0,
|
|
"draft2" => 0,
|
|
},
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["success"]).to eq("OK")
|
|
expect(response.parsed_body["deleted_count"]).to eq(2)
|
|
|
|
# Verify drafts were deleted
|
|
expect(Draft.get(user, "draft1", 0)).to eq(nil)
|
|
expect(Draft.get(user, "draft2", 0)).to eq(nil)
|
|
expect(Draft.get(user, "draft3", 0)).to be_present
|
|
expect(Draft.where(user: user).count).to eq(1)
|
|
end
|
|
|
|
it "handles empty draft_keys array" do
|
|
sign_in(user)
|
|
|
|
delete "/drafts/bulk_destroy.json", params: { draft_keys: [] }
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["deleted_count"]).to eq(0)
|
|
end
|
|
|
|
it "validates sequences and returns error for conflicts" do
|
|
sign_in(user)
|
|
|
|
Draft.set(user, "draft1", 0, '{"reply": "draft 1 content"}')
|
|
Draft.set(user, "draft2", 0, '{"reply": "draft 2 content"}')
|
|
|
|
delete "/drafts/bulk_destroy.json",
|
|
params: {
|
|
draft_keys: %w[draft1 draft2],
|
|
sequences: {
|
|
"draft1" => 0,
|
|
"draft2" => 99,
|
|
}, # Wrong sequence for draft2
|
|
}
|
|
|
|
expect(response.status).to eq(409)
|
|
expect(response.parsed_body["failed"]).to eq("FAILED")
|
|
expect(response.parsed_body["errors"]).to include("draft2")
|
|
|
|
# Verify no drafts were deleted due to sequence conflict
|
|
expect(Draft.get(user, "draft1", 0)).to be_present
|
|
expect(Draft.get(user, "draft2", 0)).to be_present
|
|
end
|
|
|
|
it "handles missing sequences parameter gracefully" do
|
|
sign_in(user)
|
|
|
|
Draft.set(user, "draft1", 0, '{"reply": "draft 1 content"}')
|
|
|
|
delete "/drafts/bulk_destroy.json", params: { draft_keys: ["draft1"] }
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(response.parsed_body["deleted_count"]).to eq(1)
|
|
expect(Draft.get(user, "draft1", 0)).to eq(nil)
|
|
end
|
|
|
|
it "requires draft_keys parameter" do
|
|
sign_in(user)
|
|
|
|
delete "/drafts/bulk_destroy.json", params: {}
|
|
|
|
expect(response.status).to eq(400)
|
|
end
|
|
|
|
it "rejects too many draft_keys" do
|
|
sign_in(user)
|
|
|
|
keys = (1..31).map { |i| "key_#{i}" }
|
|
delete "/drafts/bulk_destroy.json", params: { draft_keys: keys }
|
|
|
|
expect(response.status).to eq(400)
|
|
expect(response.parsed_body["errors"].first).to include(
|
|
I18n.t("draft.bulk_destroy_limit", limit: DraftsController::BULK_DESTROY_LIMIT),
|
|
)
|
|
end
|
|
|
|
it "updates user draft count after bulk deletion" do
|
|
sign_in(user)
|
|
|
|
# Create multiple drafts
|
|
3.times { |i| Draft.set(user, "draft#{i}", 0, '{"reply": "content"}') }
|
|
|
|
initial_draft_count = user.user_stat.draft_count
|
|
expect(initial_draft_count).to be >= 3
|
|
|
|
delete "/drafts/bulk_destroy.json",
|
|
params: {
|
|
draft_keys: %w[draft0 draft1 draft2],
|
|
sequences: {
|
|
"draft0" => 0,
|
|
"draft1" => 0,
|
|
"draft2" => 0,
|
|
},
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
# Verify user draft count was updated
|
|
user.user_stat.reload
|
|
expect(user.user_stat.draft_count).to eq(initial_draft_count - 3)
|
|
end
|
|
|
|
context "when using API access" do
|
|
it "allows admin to delete other user's drafts via API" do
|
|
admin = Fabricate(:admin)
|
|
api_key = Fabricate(:api_key, user: admin)
|
|
|
|
Draft.set(user, "draft1", 0, '{"reply": "draft content"}')
|
|
|
|
delete "/drafts/bulk_destroy.json",
|
|
params: {
|
|
draft_keys: ["draft1"],
|
|
sequences: {
|
|
"draft1" => 0,
|
|
},
|
|
username: user.username,
|
|
},
|
|
headers: {
|
|
"Api-Key" => api_key.key,
|
|
"Api-Username" => admin.username,
|
|
}
|
|
|
|
expect(response.status).to eq(200)
|
|
expect(Draft.get(user, "draft1", 0)).to eq(nil)
|
|
end
|
|
|
|
it "denies non-admin API access to other user's drafts" do
|
|
non_admin = Fabricate(:user)
|
|
api_key = Fabricate(:api_key, user: non_admin)
|
|
|
|
Draft.set(user, "draft1", 0, '{"reply": "draft content"}')
|
|
|
|
delete "/drafts/bulk_destroy.json",
|
|
params: {
|
|
draft_keys: ["draft1"],
|
|
sequences: {
|
|
"draft1" => 0,
|
|
},
|
|
username: user.username,
|
|
},
|
|
headers: {
|
|
"Api-Key" => api_key.key,
|
|
"Api-Username" => non_admin.username,
|
|
}
|
|
|
|
expect(response.status).to eq(403)
|
|
expect(Draft.get(user, "draft1", 0)).to be_present
|
|
end
|
|
end
|
|
end
|
|
end
|