2016-04-22 17:19:55 -04:00
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe Admin::ImpersonationsController do
|
|
|
|
let(:impersonator) { create(:admin) }
|
|
|
|
let(:user) { create(:user) }
|
|
|
|
|
|
|
|
describe "DELETE destroy" do
|
|
|
|
context "when not signed in" do
|
|
|
|
it "redirects to the sign in page" do
|
|
|
|
delete :destroy
|
|
|
|
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when signed in" do
|
|
|
|
before do
|
|
|
|
sign_in(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when not impersonating" do
|
|
|
|
it "responds with status 404" do
|
|
|
|
delete :destroy
|
|
|
|
|
2016-06-27 14:10:42 -04:00
|
|
|
expect(response).to have_http_status(404)
|
2016-04-22 17:19:55 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't sign us in" do
|
|
|
|
delete :destroy
|
|
|
|
|
|
|
|
expect(warden.user).to eq(user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when impersonating" do
|
|
|
|
before do
|
|
|
|
session[:impersonator_id] = impersonator.id
|
|
|
|
end
|
|
|
|
|
2016-04-22 17:46:47 -04:00
|
|
|
context "when the impersonator is not admin (anymore)" do
|
2016-04-22 17:19:55 -04:00
|
|
|
before do
|
|
|
|
impersonator.admin = false
|
|
|
|
impersonator.save
|
|
|
|
end
|
|
|
|
|
|
|
|
it "responds with status 404" do
|
|
|
|
delete :destroy
|
|
|
|
|
2016-06-27 14:10:42 -04:00
|
|
|
expect(response).to have_http_status(404)
|
2016-04-22 17:19:55 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't sign us in as the impersonator" do
|
|
|
|
delete :destroy
|
|
|
|
|
|
|
|
expect(warden.user).to eq(user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when the impersonator is admin" do
|
|
|
|
context "when the impersonator is blocked" do
|
|
|
|
before do
|
|
|
|
impersonator.block!
|
|
|
|
end
|
|
|
|
|
|
|
|
it "responds with status 404" do
|
|
|
|
delete :destroy
|
|
|
|
|
2016-06-27 14:10:42 -04:00
|
|
|
expect(response).to have_http_status(404)
|
2016-04-22 17:19:55 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't sign us in as the impersonator" do
|
|
|
|
delete :destroy
|
|
|
|
|
|
|
|
expect(warden.user).to eq(user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when the impersonator is not blocked" do
|
2016-11-17 23:21:02 -05:00
|
|
|
shared_examples_for "successfully stops impersonating" do
|
|
|
|
it "redirects to the impersonated user's page" do
|
|
|
|
expect(Gitlab::AppLogger).to receive(:info).with("User #{impersonator.username} has stopped impersonating #{user.username}").and_call_original
|
2016-08-23 04:06:54 -04:00
|
|
|
|
2016-11-17 23:21:02 -05:00
|
|
|
delete :destroy
|
|
|
|
|
|
|
|
expect(response).to redirect_to(admin_user_path(user))
|
|
|
|
end
|
|
|
|
|
|
|
|
it "signs us in as the impersonator" do
|
|
|
|
delete :destroy
|
2016-04-22 17:19:55 -04:00
|
|
|
|
2016-11-17 23:21:02 -05:00
|
|
|
expect(warden.user).to eq(impersonator)
|
|
|
|
end
|
2016-04-22 17:19:55 -04:00
|
|
|
end
|
|
|
|
|
2016-11-17 23:21:02 -05:00
|
|
|
# base case
|
|
|
|
it_behaves_like "successfully stops impersonating"
|
|
|
|
|
|
|
|
context "and the user has a temporary oauth e-mail address" do
|
|
|
|
before do
|
|
|
|
allow(user).to receive(:temp_oauth_email?).and_return(true)
|
|
|
|
allow(controller).to receive(:current_user).and_return(user)
|
|
|
|
end
|
2016-04-22 17:19:55 -04:00
|
|
|
|
2016-11-17 23:21:02 -05:00
|
|
|
it_behaves_like "successfully stops impersonating"
|
2016-04-22 17:19:55 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|