Update tests for the current_application_settings request store changes
This commit is contained in:
parent
14b0fb516c
commit
7d57b11093
5 changed files with 12 additions and 12 deletions
|
@ -11,7 +11,7 @@ describe RegistrationsController do
|
|||
let(:user_params) { { user: { name: "new_user", username: "new_username", email: "new@user.com", password: "Any_password" } } }
|
||||
|
||||
context 'when sending email confirmation' do
|
||||
before { allow(current_application_settings).to receive(:send_user_confirmation_email).and_return(false) }
|
||||
before { allow_any_instance_of(ApplicationSetting).to receive(:send_user_confirmation_email).and_return(false) }
|
||||
|
||||
it 'logs user in directly' do
|
||||
post(:create, user_params)
|
||||
|
@ -21,7 +21,7 @@ describe RegistrationsController do
|
|||
end
|
||||
|
||||
context 'when not sending email confirmation' do
|
||||
before { allow(current_application_settings).to receive(:send_user_confirmation_email).and_return(true) }
|
||||
before { allow_any_instance_of(ApplicationSetting).to receive(:send_user_confirmation_email).and_return(true) }
|
||||
|
||||
it 'does not authenticate user and sends confirmation email' do
|
||||
post(:create, user_params)
|
||||
|
|
|
@ -6,8 +6,8 @@ describe Gitlab::AkismetHelper, type: :helper do
|
|||
|
||||
before do
|
||||
allow(Gitlab.config.gitlab).to receive(:url).and_return(Settings.send(:build_gitlab_url))
|
||||
current_application_settings.akismet_enabled = true
|
||||
current_application_settings.akismet_api_key = '12345'
|
||||
allow_any_instance_of(ApplicationSetting).to receive(:akismet_enabled).and_return(true)
|
||||
allow_any_instance_of(ApplicationSetting).to receive(:akismet_api_key).and_return('12345')
|
||||
end
|
||||
|
||||
describe '#check_for_spam?' do
|
||||
|
|
|
@ -51,7 +51,7 @@ describe Notify do
|
|||
|
||||
context 'when enabled email_author_in_body' do
|
||||
before do
|
||||
allow(current_application_settings).to receive(:email_author_in_body).and_return(true)
|
||||
allow_any_instance_of(ApplicationSetting).to receive(:email_author_in_body).and_return(true)
|
||||
end
|
||||
|
||||
it 'contains a link to note author' do
|
||||
|
@ -230,7 +230,7 @@ describe Notify do
|
|||
|
||||
context 'when enabled email_author_in_body' do
|
||||
before do
|
||||
allow(current_application_settings).to receive(:email_author_in_body).and_return(true)
|
||||
allow_any_instance_of(ApplicationSetting).to receive(:email_author_in_body).and_return(true)
|
||||
end
|
||||
|
||||
it 'contains a link to note author' do
|
||||
|
@ -454,7 +454,7 @@ describe Notify do
|
|||
|
||||
context 'when enabled email_author_in_body' do
|
||||
before do
|
||||
allow(current_application_settings).to receive(:email_author_in_body).and_return(true)
|
||||
allow_any_instance_of(ApplicationSetting).to receive(:email_author_in_body).and_return(true)
|
||||
end
|
||||
|
||||
it 'contains a link to note author' do
|
||||
|
|
|
@ -67,7 +67,7 @@ describe User, models: true do
|
|||
|
||||
describe 'email' do
|
||||
context 'when no signup domains listed' do
|
||||
before { allow(current_application_settings).to receive(:restricted_signup_domains).and_return([]) }
|
||||
before { allow_any_instance_of(ApplicationSetting).to receive(:restricted_signup_domains).and_return([]) }
|
||||
it 'accepts any email' do
|
||||
user = build(:user, email: "info@example.com")
|
||||
expect(user).to be_valid
|
||||
|
@ -75,7 +75,7 @@ describe User, models: true do
|
|||
end
|
||||
|
||||
context 'when a signup domain is listed and subdomains are allowed' do
|
||||
before { allow(current_application_settings).to receive(:restricted_signup_domains).and_return(['example.com', '*.example.com']) }
|
||||
before { allow_any_instance_of(ApplicationSetting).to receive(:restricted_signup_domains).and_return(['example.com', '*.example.com']) }
|
||||
it 'accepts info@example.com' do
|
||||
user = build(:user, email: "info@example.com")
|
||||
expect(user).to be_valid
|
||||
|
@ -93,7 +93,7 @@ describe User, models: true do
|
|||
end
|
||||
|
||||
context 'when a signup domain is listed and subdomains are not allowed' do
|
||||
before { allow(current_application_settings).to receive(:restricted_signup_domains).and_return(['example.com']) }
|
||||
before { allow_any_instance_of(ApplicationSetting).to receive(:restricted_signup_domains).and_return(['example.com']) }
|
||||
|
||||
it 'accepts info@example.com' do
|
||||
user = build(:user, email: "info@example.com")
|
||||
|
@ -141,7 +141,7 @@ describe User, models: true do
|
|||
end
|
||||
|
||||
describe '#confirm' do
|
||||
before { allow(current_application_settings).to receive(:send_user_confirmation_email).and_return(true) }
|
||||
before { allow_any_instance_of(ApplicationSetting).to receive(:send_user_confirmation_email).and_return(true) }
|
||||
let(:user) { create(:user, confirmed_at: nil, unconfirmed_email: 'test@gitlab.com') }
|
||||
|
||||
it 'returns unconfirmed' do
|
||||
|
|
|
@ -13,7 +13,7 @@ describe Groups::CreateService, services: true do
|
|||
end
|
||||
|
||||
context "cannot create group with restricted visibility level" do
|
||||
before { allow(current_application_settings).to receive(:restricted_visibility_levels).and_return([Gitlab::VisibilityLevel::PUBLIC]) }
|
||||
before { allow_any_instance_of(ApplicationSetting).to receive(:restricted_visibility_levels).and_return([Gitlab::VisibilityLevel::PUBLIC]) }
|
||||
it { is_expected.not_to be_persisted }
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in a new issue