Add a dedicated CheckMixedChannel endpoint that allows the frontend to pre-validate mixed channel risk before submitting create/update requests. This improves UX by showing warnings earlier in the flow instead of only after form submission. Backend changes: - Add CheckMixedChannelRequest struct and CheckMixedChannel handler - Register POST /check-mixed-channel route - Expose CheckMixedChannelRisk as public method on AdminService - Simplify Create/Update 409 responses (remove details/require_confirmation) - Add comprehensive handler tests and stub methods Frontend changes: - Add checkMixedChannelRisk API function and TypeScript types - Refactor CreateAccountModal to precheck before step transition and submission - Refactor EditAccountModal to precheck before update submission - Replace pendingPayload pattern with action-based dialog flow
148 lines
5.2 KiB
Go
148 lines
5.2 KiB
Go
package admin
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
|
|
"github.com/Wei-Shaw/sub2api/internal/service"
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func setupAccountMixedChannelRouter(adminSvc *stubAdminService) *gin.Engine {
|
|
gin.SetMode(gin.TestMode)
|
|
router := gin.New()
|
|
accountHandler := NewAccountHandler(adminSvc, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil)
|
|
router.POST("/api/v1/admin/accounts/check-mixed-channel", accountHandler.CheckMixedChannel)
|
|
router.POST("/api/v1/admin/accounts", accountHandler.Create)
|
|
router.PUT("/api/v1/admin/accounts/:id", accountHandler.Update)
|
|
return router
|
|
}
|
|
|
|
func TestAccountHandlerCheckMixedChannelNoRisk(t *testing.T) {
|
|
adminSvc := newStubAdminService()
|
|
router := setupAccountMixedChannelRouter(adminSvc)
|
|
|
|
body, _ := json.Marshal(map[string]any{
|
|
"platform": "antigravity",
|
|
"group_ids": []int64{27},
|
|
})
|
|
rec := httptest.NewRecorder()
|
|
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/accounts/check-mixed-channel", bytes.NewReader(body))
|
|
req.Header.Set("Content-Type", "application/json")
|
|
router.ServeHTTP(rec, req)
|
|
|
|
require.Equal(t, http.StatusOK, rec.Code)
|
|
var resp map[string]any
|
|
require.NoError(t, json.Unmarshal(rec.Body.Bytes(), &resp))
|
|
require.Equal(t, float64(0), resp["code"])
|
|
data, ok := resp["data"].(map[string]any)
|
|
require.True(t, ok)
|
|
require.Equal(t, false, data["has_risk"])
|
|
require.Equal(t, int64(0), adminSvc.lastMixedCheck.accountID)
|
|
require.Equal(t, "antigravity", adminSvc.lastMixedCheck.platform)
|
|
require.Equal(t, []int64{27}, adminSvc.lastMixedCheck.groupIDs)
|
|
}
|
|
|
|
func TestAccountHandlerCheckMixedChannelWithRisk(t *testing.T) {
|
|
adminSvc := newStubAdminService()
|
|
adminSvc.checkMixedErr = &service.MixedChannelError{
|
|
GroupID: 27,
|
|
GroupName: "claude-max",
|
|
CurrentPlatform: "Antigravity",
|
|
OtherPlatform: "Anthropic",
|
|
}
|
|
router := setupAccountMixedChannelRouter(adminSvc)
|
|
|
|
body, _ := json.Marshal(map[string]any{
|
|
"platform": "antigravity",
|
|
"group_ids": []int64{27},
|
|
"account_id": 99,
|
|
})
|
|
rec := httptest.NewRecorder()
|
|
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/accounts/check-mixed-channel", bytes.NewReader(body))
|
|
req.Header.Set("Content-Type", "application/json")
|
|
router.ServeHTTP(rec, req)
|
|
|
|
require.Equal(t, http.StatusOK, rec.Code)
|
|
var resp map[string]any
|
|
require.NoError(t, json.Unmarshal(rec.Body.Bytes(), &resp))
|
|
require.Equal(t, float64(0), resp["code"])
|
|
data, ok := resp["data"].(map[string]any)
|
|
require.True(t, ok)
|
|
require.Equal(t, true, data["has_risk"])
|
|
require.Equal(t, "mixed_channel_warning", data["error"])
|
|
details, ok := data["details"].(map[string]any)
|
|
require.True(t, ok)
|
|
require.Equal(t, float64(27), details["group_id"])
|
|
require.Equal(t, "claude-max", details["group_name"])
|
|
require.Equal(t, "Antigravity", details["current_platform"])
|
|
require.Equal(t, "Anthropic", details["other_platform"])
|
|
require.Equal(t, int64(99), adminSvc.lastMixedCheck.accountID)
|
|
}
|
|
|
|
func TestAccountHandlerCreateMixedChannelConflictSimplifiedResponse(t *testing.T) {
|
|
adminSvc := newStubAdminService()
|
|
adminSvc.createAccountErr = &service.MixedChannelError{
|
|
GroupID: 27,
|
|
GroupName: "claude-max",
|
|
CurrentPlatform: "Antigravity",
|
|
OtherPlatform: "Anthropic",
|
|
}
|
|
router := setupAccountMixedChannelRouter(adminSvc)
|
|
|
|
body, _ := json.Marshal(map[string]any{
|
|
"name": "ag-oauth-1",
|
|
"platform": "antigravity",
|
|
"type": "oauth",
|
|
"credentials": map[string]any{"refresh_token": "rt"},
|
|
"group_ids": []int64{27},
|
|
})
|
|
rec := httptest.NewRecorder()
|
|
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/accounts", bytes.NewReader(body))
|
|
req.Header.Set("Content-Type", "application/json")
|
|
router.ServeHTTP(rec, req)
|
|
|
|
require.Equal(t, http.StatusConflict, rec.Code)
|
|
var resp map[string]any
|
|
require.NoError(t, json.Unmarshal(rec.Body.Bytes(), &resp))
|
|
require.Equal(t, "mixed_channel_warning", resp["error"])
|
|
require.Contains(t, resp["message"], "mixed_channel_warning")
|
|
_, hasDetails := resp["details"]
|
|
_, hasRequireConfirmation := resp["require_confirmation"]
|
|
require.False(t, hasDetails)
|
|
require.False(t, hasRequireConfirmation)
|
|
}
|
|
|
|
func TestAccountHandlerUpdateMixedChannelConflictSimplifiedResponse(t *testing.T) {
|
|
adminSvc := newStubAdminService()
|
|
adminSvc.updateAccountErr = &service.MixedChannelError{
|
|
GroupID: 27,
|
|
GroupName: "claude-max",
|
|
CurrentPlatform: "Antigravity",
|
|
OtherPlatform: "Anthropic",
|
|
}
|
|
router := setupAccountMixedChannelRouter(adminSvc)
|
|
|
|
body, _ := json.Marshal(map[string]any{
|
|
"group_ids": []int64{27},
|
|
})
|
|
rec := httptest.NewRecorder()
|
|
req := httptest.NewRequest(http.MethodPut, "/api/v1/admin/accounts/3", bytes.NewReader(body))
|
|
req.Header.Set("Content-Type", "application/json")
|
|
router.ServeHTTP(rec, req)
|
|
|
|
require.Equal(t, http.StatusConflict, rec.Code)
|
|
var resp map[string]any
|
|
require.NoError(t, json.Unmarshal(rec.Body.Bytes(), &resp))
|
|
require.Equal(t, "mixed_channel_warning", resp["error"])
|
|
require.Contains(t, resp["message"], "mixed_channel_warning")
|
|
_, hasDetails := resp["details"]
|
|
_, hasRequireConfirmation := resp["require_confirmation"]
|
|
require.False(t, hasDetails)
|
|
require.False(t, hasRequireConfirmation)
|
|
}
|