Merge tests to support Multiple LDAP groups
This commit is contained in:
parent
01b791237c
commit
5e1c39cb78
5 changed files with 31 additions and 24 deletions
|
@ -24,6 +24,11 @@ FactoryGirl.define do
|
|||
admin true
|
||||
end
|
||||
|
||||
trait :ldap do
|
||||
provider 'ldapmain'
|
||||
extern_uid 'my-ldap-id'
|
||||
end
|
||||
|
||||
factory :admin, traits: [:admin]
|
||||
end
|
||||
|
||||
|
|
|
@ -28,17 +28,16 @@ describe Gitlab::Auth do
|
|||
end
|
||||
|
||||
context "with ldap enabled" do
|
||||
before { Gitlab.config.ldap['enabled'] = true }
|
||||
after { Gitlab.config.ldap['enabled'] = false }
|
||||
before { Gitlab::LDAP::Config.stub(enabled?: true) }
|
||||
|
||||
it "tries to autheticate with db before ldap" do
|
||||
expect(Gitlab::LDAP::User).not_to receive(:authenticate)
|
||||
expect(Gitlab::LDAP::Authentication).not_to receive(:login)
|
||||
|
||||
gl_auth.find(username, password)
|
||||
end
|
||||
|
||||
it "uses ldap as fallback to for authentication" do
|
||||
expect(Gitlab::LDAP::User).to receive(:authenticate)
|
||||
expect(Gitlab::LDAP::Authentication).to receive(:login)
|
||||
|
||||
gl_auth.find('ldap_user', 'password')
|
||||
end
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
require 'spec_helper'
|
||||
|
||||
describe Gitlab::LDAP::Adapter do
|
||||
let(:adapter) { Gitlab::LDAP::Adapter.new }
|
||||
let(:adapter) { Gitlab::LDAP::Adapter.new 'ldapmain' }
|
||||
|
||||
describe :dn_matches_filter? do
|
||||
let(:ldap) { double(:ldap) }
|
||||
|
|
|
@ -10,12 +10,12 @@ describe Gitlab::LDAP::User do
|
|||
}
|
||||
end
|
||||
let(:auth_hash) do
|
||||
double(uid: 'my-uid', provider: 'ldap', info: double(info))
|
||||
double(uid: 'my-uid', provider: 'ldapmain', info: double(info))
|
||||
end
|
||||
|
||||
describe :find_or_create do
|
||||
it "finds the user if already existing" do
|
||||
existing_user = create(:user, extern_uid: 'my-uid', provider: 'ldap')
|
||||
existing_user = create(:user, extern_uid: 'my-uid', provider: 'ldapmain')
|
||||
|
||||
expect{ gl_user.save }.to_not change{ User.count }
|
||||
end
|
||||
|
@ -26,27 +26,11 @@ describe Gitlab::LDAP::User do
|
|||
|
||||
existing_user.reload
|
||||
expect(existing_user.extern_uid).to eql 'my-uid'
|
||||
expect(existing_user.provider).to eql 'ldap'
|
||||
expect(existing_user.provider).to eql 'ldapmain'
|
||||
end
|
||||
|
||||
it "creates a new user if not found" do
|
||||
expect{ gl_user.save }.to change{ User.count }.by(1)
|
||||
end
|
||||
end
|
||||
|
||||
describe "authenticate" do
|
||||
let(:login) { 'john' }
|
||||
let(:password) { 'my-secret' }
|
||||
|
||||
before {
|
||||
Gitlab.config.ldap['enabled'] = true
|
||||
Gitlab.config.ldap['user_filter'] = 'employeeType=developer'
|
||||
}
|
||||
after { Gitlab.config.ldap['enabled'] = false }
|
||||
|
||||
it "send an authentication request to ldap" do
|
||||
expect( Gitlab::LDAP::User.adapter ).to receive(:bind_as)
|
||||
Gitlab::LDAP::User.authenticate(login, password)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
|
@ -346,6 +346,25 @@ describe User do
|
|||
end
|
||||
end
|
||||
|
||||
describe :ldap_user? do
|
||||
let(:user) { build(:user, :ldap) }
|
||||
|
||||
it "is true if provider name starts with ldap" do
|
||||
user.provider = 'ldapmain'
|
||||
expect( user.ldap_user? ).to be_true
|
||||
end
|
||||
|
||||
it "is false for other providers" do
|
||||
user.provider = 'other-provider'
|
||||
expect( user.ldap_user? ).to be_false
|
||||
end
|
||||
|
||||
it "is false if no extern_uid is provided" do
|
||||
user.extern_uid = nil
|
||||
expect( user.ldap_user? ).to be_false
|
||||
end
|
||||
end
|
||||
|
||||
describe '#full_website_url' do
|
||||
let(:user) { create(:user) }
|
||||
|
||||
|
|
Loading…
Reference in a new issue