2012-10-09 04:14:17 -04:00
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: users
|
|
|
|
#
|
2015-03-04 17:14:00 -05:00
|
|
|
# id :integer not null, primary key
|
|
|
|
# email :string(255) default(""), not null
|
|
|
|
# encrypted_password :string(255) default(""), not null
|
|
|
|
# reset_password_token :string(255)
|
|
|
|
# reset_password_sent_at :datetime
|
|
|
|
# remember_created_at :datetime
|
|
|
|
# sign_in_count :integer default(0)
|
|
|
|
# current_sign_in_at :datetime
|
|
|
|
# last_sign_in_at :datetime
|
|
|
|
# current_sign_in_ip :string(255)
|
|
|
|
# last_sign_in_ip :string(255)
|
|
|
|
# created_at :datetime
|
|
|
|
# updated_at :datetime
|
|
|
|
# name :string(255)
|
|
|
|
# admin :boolean default(FALSE), not null
|
|
|
|
# projects_limit :integer default(10)
|
|
|
|
# skype :string(255) default(""), not null
|
|
|
|
# linkedin :string(255) default(""), not null
|
|
|
|
# twitter :string(255) default(""), not null
|
|
|
|
# authentication_token :string(255)
|
|
|
|
# theme_id :integer default(1), not null
|
|
|
|
# bio :string(255)
|
|
|
|
# failed_attempts :integer default(0)
|
|
|
|
# locked_at :datetime
|
|
|
|
# username :string(255)
|
|
|
|
# can_create_group :boolean default(TRUE), not null
|
|
|
|
# can_create_team :boolean default(TRUE), not null
|
|
|
|
# state :string(255)
|
|
|
|
# color_scheme_id :integer default(1), not null
|
|
|
|
# notification_level :integer default(1), not null
|
|
|
|
# password_expires_at :datetime
|
|
|
|
# created_by_id :integer
|
|
|
|
# last_credential_check_at :datetime
|
|
|
|
# avatar :string(255)
|
|
|
|
# confirmation_token :string(255)
|
|
|
|
# confirmed_at :datetime
|
|
|
|
# confirmation_sent_at :datetime
|
|
|
|
# unconfirmed_email :string(255)
|
|
|
|
# hide_no_ssh_key :boolean default(FALSE)
|
|
|
|
# website_url :string(255) default(""), not null
|
|
|
|
# github_access_token :string(255)
|
|
|
|
# gitlab_access_token :string(255)
|
|
|
|
# notification_email :string(255)
|
|
|
|
# hide_no_password :boolean default(FALSE)
|
|
|
|
# password_automatically_set :boolean default(FALSE)
|
|
|
|
# bitbucket_access_token :string(255)
|
|
|
|
# bitbucket_access_token_secret :string(255)
|
2012-10-09 04:14:17 -04:00
|
|
|
#
|
|
|
|
|
2011-10-08 17:36:38 -04:00
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe User do
|
|
|
|
describe "Associations" do
|
2015-02-12 13:17:35 -05:00
|
|
|
it { is_expected.to have_one(:namespace) }
|
|
|
|
it { is_expected.to have_many(:snippets).class_name('Snippet').dependent(:destroy) }
|
|
|
|
it { is_expected.to have_many(:project_members).dependent(:destroy) }
|
|
|
|
it { is_expected.to have_many(:groups) }
|
|
|
|
it { is_expected.to have_many(:keys).dependent(:destroy) }
|
|
|
|
it { is_expected.to have_many(:events).class_name('Event').dependent(:destroy) }
|
|
|
|
it { is_expected.to have_many(:recent_events).class_name('Event') }
|
|
|
|
it { is_expected.to have_many(:issues).dependent(:destroy) }
|
|
|
|
it { is_expected.to have_many(:notes).dependent(:destroy) }
|
|
|
|
it { is_expected.to have_many(:assigned_issues).dependent(:destroy) }
|
|
|
|
it { is_expected.to have_many(:merge_requests).dependent(:destroy) }
|
|
|
|
it { is_expected.to have_many(:assigned_merge_requests).dependent(:destroy) }
|
|
|
|
it { is_expected.to have_many(:identities).dependent(:destroy) }
|
2012-08-29 11:36:02 -04:00
|
|
|
end
|
|
|
|
|
2012-09-26 14:17:17 -04:00
|
|
|
describe "Mass assignment" do
|
|
|
|
end
|
|
|
|
|
2012-08-29 11:36:02 -04:00
|
|
|
describe 'validations' do
|
2015-02-12 13:17:35 -05:00
|
|
|
it { is_expected.to validate_presence_of(:username) }
|
|
|
|
it { is_expected.to validate_presence_of(:projects_limit) }
|
|
|
|
it { is_expected.to validate_numericality_of(:projects_limit) }
|
|
|
|
it { is_expected.to allow_value(0).for(:projects_limit) }
|
|
|
|
it { is_expected.not_to allow_value(-1).for(:projects_limit) }
|
2012-08-29 11:36:02 -04:00
|
|
|
|
2015-02-12 13:17:35 -05:00
|
|
|
it { is_expected.to ensure_length_of(:bio).is_within(0..255) }
|
2014-01-16 06:14:47 -05:00
|
|
|
|
|
|
|
describe 'email' do
|
|
|
|
it 'accepts info@example.com' do
|
|
|
|
user = build(:user, email: 'info@example.com')
|
|
|
|
expect(user).to be_valid
|
|
|
|
end
|
2014-06-11 07:22:56 -04:00
|
|
|
|
2014-01-16 06:14:47 -05:00
|
|
|
it 'accepts info+test@example.com' do
|
|
|
|
user = build(:user, email: 'info+test@example.com')
|
|
|
|
expect(user).to be_valid
|
|
|
|
end
|
|
|
|
|
2014-06-11 07:22:56 -04:00
|
|
|
it "accepts o'reilly@example.com" do
|
|
|
|
user = build(:user, email: "o'reilly@example.com")
|
|
|
|
expect(user).to be_valid
|
|
|
|
end
|
|
|
|
|
2014-01-16 06:14:47 -05:00
|
|
|
it 'rejects test@test@example.com' do
|
|
|
|
user = build(:user, email: 'test@test@example.com')
|
|
|
|
expect(user).to be_invalid
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'rejects mailto:test@example.com' do
|
|
|
|
user = build(:user, email: 'mailto:test@example.com')
|
|
|
|
expect(user).to be_invalid
|
|
|
|
end
|
2014-06-11 07:22:56 -04:00
|
|
|
|
|
|
|
it "rejects lol!'+=?><#$%^&*()@gmail.com" do
|
|
|
|
user = build(:user, email: "lol!'+=?><#$%^&*()@gmail.com")
|
|
|
|
expect(user).to be_invalid
|
|
|
|
end
|
2014-01-16 06:14:47 -05:00
|
|
|
end
|
2011-10-08 17:36:38 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "Respond to" do
|
2015-02-12 13:17:35 -05:00
|
|
|
it { is_expected.to respond_to(:is_admin?) }
|
|
|
|
it { is_expected.to respond_to(:name) }
|
|
|
|
it { is_expected.to respond_to(:private_token) }
|
2011-10-08 17:36:38 -04:00
|
|
|
end
|
|
|
|
|
2012-09-04 00:04:36 -04:00
|
|
|
describe '#generate_password' do
|
|
|
|
it "should execute callback when force_random_password specified" do
|
|
|
|
user = build(:user, force_random_password: true)
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user).to receive(:generate_password)
|
2012-09-04 00:04:36 -04:00
|
|
|
user.save
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should not generate password by default" do
|
2013-11-25 13:07:55 -05:00
|
|
|
user = create(:user, password: 'abcdefghe')
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.password).to eq('abcdefghe')
|
2012-09-04 00:04:36 -04:00
|
|
|
end
|
2012-06-26 17:59:08 -04:00
|
|
|
|
2012-09-04 00:04:36 -04:00
|
|
|
it "should generate password when forcing random password" do
|
2015-02-12 13:17:35 -05:00
|
|
|
allow(Devise).to receive(:friendly_token).and_return('123456789')
|
2012-09-04 00:04:36 -04:00
|
|
|
user = create(:user, password: 'abcdefg', force_random_password: true)
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.password).to eq('12345678')
|
2012-09-04 00:04:36 -04:00
|
|
|
end
|
2012-06-24 16:51:58 -04:00
|
|
|
end
|
|
|
|
|
2012-09-04 00:04:36 -04:00
|
|
|
describe 'authentication token' do
|
|
|
|
it "should have authentication token" do
|
2012-11-05 22:31:55 -05:00
|
|
|
user = create(:user)
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.authentication_token).not_to be_blank
|
2012-09-04 00:04:36 -04:00
|
|
|
end
|
2011-11-15 02:08:05 -05:00
|
|
|
end
|
2013-01-02 12:00:00 -05:00
|
|
|
|
|
|
|
describe 'projects' do
|
|
|
|
before do
|
|
|
|
@user = create :user
|
|
|
|
@project = create :project, namespace: @user.namespace
|
2013-06-22 09:46:57 -04:00
|
|
|
@project_2 = create :project, group: create(:group) # Grant MASTER access to the user
|
|
|
|
@project_3 = create :project, group: create(:group) # Grant DEVELOPER access to the user
|
2013-06-04 10:50:51 -04:00
|
|
|
|
2013-06-22 06:41:08 -04:00
|
|
|
@project_2.team << [@user, :master]
|
|
|
|
@project_3.team << [@user, :developer]
|
2013-01-02 12:00:00 -05:00
|
|
|
end
|
|
|
|
|
2015-02-12 13:17:35 -05:00
|
|
|
it { expect(@user.authorized_projects).to include(@project) }
|
|
|
|
it { expect(@user.authorized_projects).to include(@project_2) }
|
|
|
|
it { expect(@user.authorized_projects).to include(@project_3) }
|
|
|
|
it { expect(@user.owned_projects).to include(@project) }
|
|
|
|
it { expect(@user.owned_projects).not_to include(@project_2) }
|
|
|
|
it { expect(@user.owned_projects).not_to include(@project_3) }
|
|
|
|
it { expect(@user.personal_projects).to include(@project) }
|
|
|
|
it { expect(@user.personal_projects).not_to include(@project_2) }
|
|
|
|
it { expect(@user.personal_projects).not_to include(@project_3) }
|
2013-01-02 12:00:00 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'groups' do
|
|
|
|
before do
|
|
|
|
@user = create :user
|
2013-09-26 07:52:17 -04:00
|
|
|
@group = create :group
|
|
|
|
@group.add_owner(@user)
|
2013-01-02 12:00:00 -05:00
|
|
|
end
|
|
|
|
|
2015-02-12 13:17:35 -05:00
|
|
|
it { expect(@user.several_namespaces?).to be_truthy }
|
|
|
|
it { expect(@user.authorized_groups).to eq([@group]) }
|
|
|
|
it { expect(@user.owned_groups).to eq([@group]) }
|
2013-01-02 12:00:00 -05:00
|
|
|
end
|
|
|
|
|
2013-09-11 08:10:45 -04:00
|
|
|
describe 'group multiple owners' do
|
|
|
|
before do
|
|
|
|
@user = create :user
|
|
|
|
@user2 = create :user
|
2013-09-26 07:52:17 -04:00
|
|
|
@group = create :group
|
|
|
|
@group.add_owner(@user)
|
2013-09-11 08:10:45 -04:00
|
|
|
|
2014-09-14 12:32:51 -04:00
|
|
|
@group.add_user(@user2, GroupMember::OWNER)
|
2013-09-11 08:10:45 -04:00
|
|
|
end
|
|
|
|
|
2015-02-12 13:17:35 -05:00
|
|
|
it { expect(@user2.several_namespaces?).to be_truthy }
|
2013-09-11 08:10:45 -04:00
|
|
|
end
|
|
|
|
|
2013-01-02 12:00:00 -05:00
|
|
|
describe 'namespaced' do
|
|
|
|
before do
|
|
|
|
@user = create :user
|
|
|
|
@project = create :project, namespace: @user.namespace
|
|
|
|
end
|
|
|
|
|
2015-02-12 13:17:35 -05:00
|
|
|
it { expect(@user.several_namespaces?).to be_falsey }
|
2013-01-02 12:00:00 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'blocking user' do
|
|
|
|
let(:user) { create(:user, name: 'John Smith') }
|
|
|
|
|
|
|
|
it "should block user" do
|
|
|
|
user.block
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.blocked?).to be_truthy
|
2013-01-02 12:00:00 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'filter' do
|
|
|
|
before do
|
2013-01-03 02:37:13 -05:00
|
|
|
User.delete_all
|
2013-01-02 12:00:00 -05:00
|
|
|
@user = create :user
|
|
|
|
@admin = create :user, admin: true
|
2013-03-04 09:52:30 -05:00
|
|
|
@blocked = create :user, state: :blocked
|
2013-01-02 12:00:00 -05:00
|
|
|
end
|
|
|
|
|
2015-02-12 13:17:35 -05:00
|
|
|
it { expect(User.filter("admins")).to eq([@admin]) }
|
|
|
|
it { expect(User.filter("blocked")).to eq([@blocked]) }
|
|
|
|
it { expect(User.filter("wop")).to include(@user, @admin, @blocked) }
|
|
|
|
it { expect(User.filter(nil)).to include(@user, @admin) }
|
2013-01-02 12:00:00 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
describe :not_in_project do
|
|
|
|
before do
|
2013-01-03 02:37:13 -05:00
|
|
|
User.delete_all
|
2013-01-02 12:00:00 -05:00
|
|
|
@user = create :user
|
|
|
|
@project = create :project
|
|
|
|
end
|
|
|
|
|
2015-02-12 13:17:35 -05:00
|
|
|
it { expect(User.not_in_project(@project)).to include(@user, @project.owner) }
|
2013-01-02 12:00:00 -05:00
|
|
|
end
|
2013-01-02 16:35:11 -05:00
|
|
|
|
2013-08-15 17:43:46 -04:00
|
|
|
describe 'user creation' do
|
|
|
|
describe 'normal user' do
|
|
|
|
let(:user) { create(:user, name: 'John Smith') }
|
2013-01-02 16:35:11 -05:00
|
|
|
|
2015-02-12 13:17:35 -05:00
|
|
|
it { expect(user.is_admin?).to be_falsey }
|
|
|
|
it { expect(user.require_ssh_key?).to be_truthy }
|
|
|
|
it { expect(user.can_create_group?).to be_truthy }
|
|
|
|
it { expect(user.can_create_project?).to be_truthy }
|
|
|
|
it { expect(user.first_name).to eq('John') }
|
2013-08-15 17:43:46 -04:00
|
|
|
end
|
2013-03-11 02:44:45 -04:00
|
|
|
|
2014-06-30 07:22:09 -04:00
|
|
|
describe 'with defaults' do
|
2013-08-15 17:43:46 -04:00
|
|
|
let(:user) { User.new }
|
2013-09-14 15:01:31 -04:00
|
|
|
|
2014-06-30 07:22:09 -04:00
|
|
|
it "should apply defaults to user" do
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.projects_limit).to eq(Gitlab.config.gitlab.default_projects_limit)
|
|
|
|
expect(user.can_create_group).to eq(Gitlab.config.gitlab.default_can_create_group)
|
|
|
|
expect(user.theme_id).to eq(Gitlab.config.gitlab.default_theme)
|
2013-08-15 17:43:46 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-06-30 07:22:09 -04:00
|
|
|
describe 'with default overrides' do
|
|
|
|
let(:user) { User.new(projects_limit: 123, can_create_group: false, can_create_team: true, theme_id: Gitlab::Theme::BASIC) }
|
2013-09-14 15:01:31 -04:00
|
|
|
|
2014-06-30 07:22:09 -04:00
|
|
|
it "should apply defaults to user" do
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.projects_limit).to eq(123)
|
|
|
|
expect(user.can_create_group).to be_falsey
|
|
|
|
expect(user.theme_id).to eq(Gitlab::Theme::BASIC)
|
2013-08-15 17:43:46 -04:00
|
|
|
end
|
2013-03-11 02:44:45 -04:00
|
|
|
end
|
|
|
|
end
|
2013-06-28 08:59:05 -04:00
|
|
|
|
2014-03-26 07:44:00 -04:00
|
|
|
describe 'search' do
|
|
|
|
let(:user1) { create(:user, username: 'James', email: 'james@testing.com') }
|
|
|
|
let(:user2) { create(:user, username: 'jameson', email: 'jameson@example.com') }
|
|
|
|
|
|
|
|
it "should be case insensitive" do
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(User.search(user1.username.upcase).to_a).to eq([user1])
|
|
|
|
expect(User.search(user1.username.downcase).to_a).to eq([user1])
|
|
|
|
expect(User.search(user2.username.upcase).to_a).to eq([user2])
|
|
|
|
expect(User.search(user2.username.downcase).to_a).to eq([user2])
|
|
|
|
expect(User.search(user1.username.downcase).to_a.count).to eq(2)
|
|
|
|
expect(User.search(user2.username.downcase).to_a.count).to eq(1)
|
2014-03-26 07:44:00 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-06-28 08:59:05 -04:00
|
|
|
describe 'by_username_or_id' do
|
2013-09-14 15:01:31 -04:00
|
|
|
let(:user1) { create(:user, username: 'foo') }
|
|
|
|
|
2013-06-28 08:59:05 -04:00
|
|
|
it "should get the correct user" do
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(User.by_username_or_id(user1.id)).to eq(user1)
|
|
|
|
expect(User.by_username_or_id('foo')).to eq(user1)
|
|
|
|
expect(User.by_username_or_id(-1)).to be_nil
|
|
|
|
expect(User.by_username_or_id('bar')).to be_nil
|
2013-06-28 08:59:05 -04:00
|
|
|
end
|
|
|
|
end
|
2014-02-06 04:12:59 -05:00
|
|
|
|
2014-10-22 11:29:26 -04:00
|
|
|
describe '.by_login' do
|
|
|
|
let(:username) { 'John' }
|
|
|
|
let!(:user) { create(:user, username: username) }
|
|
|
|
|
|
|
|
it 'should get the correct user' do
|
|
|
|
expect(User.by_login(user.email.upcase)).to eq user
|
|
|
|
expect(User.by_login(user.email)).to eq user
|
|
|
|
expect(User.by_login(username.downcase)).to eq user
|
|
|
|
expect(User.by_login(username)).to eq user
|
|
|
|
expect(User.by_login(nil)).to be_nil
|
|
|
|
expect(User.by_login('')).to be_nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-02-11 08:12:43 -05:00
|
|
|
describe ".clean_username" do
|
|
|
|
|
2015-02-13 06:39:11 -05:00
|
|
|
let!(:user) { create(:user, username: "johngitlab-etc") }
|
|
|
|
let!(:namespace) { create(:namespace, path: "JohnGitLab-etc1") }
|
2015-02-11 08:12:43 -05:00
|
|
|
|
|
|
|
it "cleans a username and makes sure it's available" do
|
|
|
|
expect(User.clean_username("-john+gitlab-ETC%.git@gmail.com")).to eq("johngitlab-ETC2")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-02-06 04:12:59 -05:00
|
|
|
describe 'all_ssh_keys' do
|
2015-02-12 13:17:35 -05:00
|
|
|
it { is_expected.to have_many(:keys).dependent(:destroy) }
|
2014-02-06 04:12:59 -05:00
|
|
|
|
|
|
|
it "should have all ssh keys" do
|
|
|
|
user = create :user
|
|
|
|
key = create :key, key: "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD33bWLBxu48Sev9Fert1yzEO4WGcWglWF7K/AwblIUFselOt/QdOL9DSjpQGxLagO1s9wl53STIO8qGS4Ms0EJZyIXOEFMjFJ5xmjSy+S37By4sG7SsltQEHMxtbtFOaW5LV2wCrX+rUsRNqLMamZjgjcPO0/EgGCXIGMAYW4O7cwGZdXWYIhQ1Vwy+CsVMDdPkPgBXqK7nR/ey8KMs8ho5fMNgB5hBw/AL9fNGhRw3QTD6Q12Nkhl4VZES2EsZqlpNnJttnPdp847DUsT6yuLRlfiQfz5Cn9ysHFdXObMN5VYIiPFwHeYCZp1X2S4fDZooRE8uOLTfxWHPXwrhqSH", user_id: user.id
|
|
|
|
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.all_ssh_keys).to include(key.key)
|
2014-02-06 04:12:59 -05:00
|
|
|
end
|
2014-02-06 09:17:21 -05:00
|
|
|
end
|
2014-06-17 15:51:43 -04:00
|
|
|
|
2013-12-24 03:55:45 -05:00
|
|
|
describe :avatar_type do
|
|
|
|
let(:user) { create(:user) }
|
|
|
|
|
|
|
|
it "should be true if avatar is image" do
|
|
|
|
user.update_attribute(:avatar, 'uploads/avatar.png')
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.avatar_type).to be_truthy
|
2013-12-24 03:55:45 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "should be false if avatar is html page" do
|
|
|
|
user.update_attribute(:avatar, 'uploads/avatar.html')
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.avatar_type).to eq(["only images allowed"])
|
2013-12-24 03:55:45 -05:00
|
|
|
end
|
|
|
|
end
|
2014-01-18 14:07:00 -05:00
|
|
|
|
2014-08-06 09:16:45 -04:00
|
|
|
describe :requires_ldap_check? do
|
|
|
|
let(:user) { User.new }
|
|
|
|
|
2014-08-06 09:17:12 -04:00
|
|
|
it 'is false when LDAP is disabled' do
|
|
|
|
# Create a condition which would otherwise cause 'true' to be returned
|
|
|
|
user.stub(ldap_user?: true)
|
|
|
|
user.last_credential_check_at = nil
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.requires_ldap_check?).to be_falsey
|
2014-08-06 09:16:45 -04:00
|
|
|
end
|
|
|
|
|
2014-08-06 09:17:12 -04:00
|
|
|
context 'when LDAP is enabled' do
|
|
|
|
before { Gitlab.config.ldap.stub(enabled: true) }
|
2014-08-06 09:16:45 -04:00
|
|
|
|
2014-08-06 09:17:12 -04:00
|
|
|
it 'is false for non-LDAP users' do
|
|
|
|
user.stub(ldap_user?: false)
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.requires_ldap_check?).to be_falsey
|
2014-08-06 09:16:45 -04:00
|
|
|
end
|
|
|
|
|
2014-08-06 09:17:12 -04:00
|
|
|
context 'and when the user is an LDAP user' do
|
|
|
|
before { user.stub(ldap_user?: true) }
|
|
|
|
|
|
|
|
it 'is true when the user has never had an LDAP check before' do
|
|
|
|
user.last_credential_check_at = nil
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.requires_ldap_check?).to be_truthy
|
2014-08-06 09:17:12 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true when the last LDAP check happened over 1 hour ago' do
|
|
|
|
user.last_credential_check_at = 2.hours.ago
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.requires_ldap_check?).to be_truthy
|
2014-08-06 09:17:12 -04:00
|
|
|
end
|
2014-08-06 09:16:45 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-10-13 11:33:44 -04:00
|
|
|
describe :ldap_user? do
|
|
|
|
it "is true if provider name starts with ldap" do
|
2014-11-27 06:34:39 -05:00
|
|
|
user = create(:omniauth_user, provider: 'ldapmain')
|
2015-02-12 13:17:35 -05:00
|
|
|
expect( user.ldap_user? ).to be_truthy
|
2014-10-13 11:33:44 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for other providers" do
|
2014-11-27 06:34:39 -05:00
|
|
|
user = create(:omniauth_user, provider: 'other-provider')
|
2015-02-12 13:17:35 -05:00
|
|
|
expect( user.ldap_user? ).to be_falsey
|
2014-10-13 11:33:44 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false if no extern_uid is provided" do
|
2014-11-27 06:34:39 -05:00
|
|
|
user = create(:omniauth_user, extern_uid: nil)
|
2015-02-12 13:17:35 -05:00
|
|
|
expect( user.ldap_user? ).to be_falsey
|
2014-10-13 11:33:44 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-11-27 06:34:39 -05:00
|
|
|
describe :ldap_identity do
|
|
|
|
it "returns ldap identity" do
|
|
|
|
user = create :omniauth_user
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.ldap_identity.provider).not_to be_empty
|
2014-11-27 06:34:39 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-01-18 14:07:00 -05:00
|
|
|
describe '#full_website_url' do
|
|
|
|
let(:user) { create(:user) }
|
|
|
|
|
|
|
|
it 'begins with http if website url omits it' do
|
|
|
|
user.website_url = 'test.com'
|
|
|
|
|
|
|
|
expect(user.full_website_url).to eq 'http://test.com'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'begins with http if website url begins with http' do
|
|
|
|
user.website_url = 'http://test.com'
|
|
|
|
|
|
|
|
expect(user.full_website_url).to eq 'http://test.com'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'begins with https if website url begins with https' do
|
|
|
|
user.website_url = 'https://test.com'
|
|
|
|
|
|
|
|
expect(user.full_website_url).to eq 'https://test.com'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#short_website_url' do
|
|
|
|
let(:user) { create(:user) }
|
|
|
|
|
|
|
|
it 'does not begin with http if website url omits it' do
|
|
|
|
user.website_url = 'test.com'
|
|
|
|
|
|
|
|
expect(user.short_website_url).to eq 'test.com'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not begin with http if website url begins with http' do
|
|
|
|
user.website_url = 'http://test.com'
|
|
|
|
|
|
|
|
expect(user.short_website_url).to eq 'test.com'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not begin with https if website url begins with https' do
|
|
|
|
user.website_url = 'https://test.com'
|
2014-02-11 10:42:27 -05:00
|
|
|
|
2014-01-18 14:07:00 -05:00
|
|
|
expect(user.short_website_url).to eq 'test.com'
|
|
|
|
end
|
2014-02-06 04:12:59 -05:00
|
|
|
end
|
2014-06-26 03:49:14 -04:00
|
|
|
|
2014-07-14 09:17:59 -04:00
|
|
|
describe "#starred?" do
|
|
|
|
it "determines if user starred a project" do
|
|
|
|
user = create :user
|
|
|
|
project1 = create :project, :public
|
|
|
|
project2 = create :project, :public
|
|
|
|
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.starred?(project1)).to be_falsey
|
|
|
|
expect(user.starred?(project2)).to be_falsey
|
2014-07-14 09:17:59 -04:00
|
|
|
|
|
|
|
star1 = UsersStarProject.create!(project: project1, user: user)
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.starred?(project1)).to be_truthy
|
|
|
|
expect(user.starred?(project2)).to be_falsey
|
2014-07-14 09:17:59 -04:00
|
|
|
|
|
|
|
star2 = UsersStarProject.create!(project: project2, user: user)
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.starred?(project1)).to be_truthy
|
|
|
|
expect(user.starred?(project2)).to be_truthy
|
2014-07-14 09:17:59 -04:00
|
|
|
|
|
|
|
star1.destroy
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.starred?(project1)).to be_falsey
|
|
|
|
expect(user.starred?(project2)).to be_truthy
|
2014-07-14 09:17:59 -04:00
|
|
|
|
|
|
|
star2.destroy
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.starred?(project1)).to be_falsey
|
|
|
|
expect(user.starred?(project2)).to be_falsey
|
2014-07-14 09:17:59 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-06-26 03:49:14 -04:00
|
|
|
describe "#toggle_star" do
|
|
|
|
it "toggles stars" do
|
|
|
|
user = create :user
|
|
|
|
project = create :project, :public
|
|
|
|
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.starred?(project)).to be_falsey
|
2014-06-26 03:49:14 -04:00
|
|
|
user.toggle_star(project)
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.starred?(project)).to be_truthy
|
2014-06-26 03:49:14 -04:00
|
|
|
user.toggle_star(project)
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(user.starred?(project)).to be_falsey
|
2014-06-26 03:49:14 -04:00
|
|
|
end
|
|
|
|
end
|
2014-10-10 08:15:34 -04:00
|
|
|
|
|
|
|
describe "#sort" do
|
|
|
|
before do
|
|
|
|
User.delete_all
|
|
|
|
@user = create :user, created_at: Date.today, last_sign_in_at: Date.today, name: 'Alpha'
|
|
|
|
@user1 = create :user, created_at: Date.today - 1, last_sign_in_at: Date.today - 1, name: 'Omega'
|
|
|
|
end
|
2015-02-05 23:21:21 -05:00
|
|
|
|
2014-10-10 08:15:34 -04:00
|
|
|
it "sorts users as recently_signed_in" do
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(User.sort('recent_sign_in').first).to eq(@user)
|
2014-10-10 08:15:34 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "sorts users as late_signed_in" do
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(User.sort('oldest_sign_in').first).to eq(@user1)
|
2014-10-10 08:15:34 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "sorts users as recently_created" do
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(User.sort('created_desc').first).to eq(@user)
|
2014-10-10 08:15:34 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "sorts users as late_created" do
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(User.sort('created_asc').first).to eq(@user1)
|
2014-10-10 08:15:34 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "sorts users by name when nil is passed" do
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(User.sort(nil).first).to eq(@user)
|
2014-10-10 08:15:34 -04:00
|
|
|
end
|
|
|
|
end
|
2015-02-27 04:47:37 -05:00
|
|
|
|
|
|
|
describe "#contributed_projects_ids" do
|
|
|
|
|
|
|
|
subject { create(:user) }
|
|
|
|
let!(:project1) { create(:project) }
|
|
|
|
let!(:project2) { create(:project, forked_from_project: project3) }
|
|
|
|
let!(:project3) { create(:project) }
|
|
|
|
let!(:merge_request) { create(:merge_request, source_project: project2, target_project: project3, author: subject) }
|
|
|
|
let!(:push_event) { create(:event, action: Event::PUSHED, project: project1, target: project1, author: subject) }
|
|
|
|
let!(:merge_event) { create(:event, action: Event::CREATED, project: project3, target: merge_request, author: subject) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
project1.team << [subject, :master]
|
|
|
|
project2.team << [subject, :master]
|
|
|
|
end
|
|
|
|
|
|
|
|
it "includes IDs for projects the user has pushed to" do
|
|
|
|
expect(subject.contributed_projects_ids).to include(project1.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "includes IDs for projects the user has had merge requests merged into" do
|
|
|
|
expect(subject.contributed_projects_ids).to include(project3.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't include IDs for unrelated projects" do
|
|
|
|
expect(subject.contributed_projects_ids).not_to include(project2.id)
|
|
|
|
end
|
|
|
|
end
|
2011-10-08 17:36:38 -04:00
|
|
|
end
|