331 lines
10 KiB
Ruby
331 lines
10 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'spec_helper'
|
|
|
|
RSpec.describe InvitesController do
|
|
let_it_be(:user) { create(:user) }
|
|
let_it_be(:member, reload: true) { create(:project_member, :invited, invite_email: user.email) }
|
|
|
|
let(:raw_invite_token) { member.raw_invite_token }
|
|
let(:project_members) { member.source.users }
|
|
let(:md5_member_global_id) { Digest::MD5.hexdigest(member.to_global_id.to_s) }
|
|
let(:extra_params) { {} }
|
|
let(:params) { { id: raw_invite_token }.merge(extra_params) }
|
|
|
|
shared_examples 'invalid token' do
|
|
context 'when invite token is not valid' do
|
|
let(:raw_invite_token) { '_bogus_token_' }
|
|
|
|
it 'redirects to root' do
|
|
request
|
|
|
|
expect(response).to redirect_to(root_path)
|
|
expect(controller).to set_flash[:alert].to('The invitation can not be found with the provided invite token.')
|
|
end
|
|
end
|
|
end
|
|
|
|
shared_examples 'invite email match enforcement' do |error_status:, flash_alert: nil|
|
|
it 'accepts user if invite email matches signed in user' do
|
|
expect do
|
|
request
|
|
end.to change { project_members.include?(user) }.from(false).to(true)
|
|
|
|
expect(response).to have_gitlab_http_status(:found)
|
|
expect(flash[:notice]).to include 'You have been granted'
|
|
end
|
|
|
|
it 'accepts invite if invite email matches confirmed secondary email' do
|
|
secondary_email = create(:email, :confirmed, user: user)
|
|
member.update!(invite_email: secondary_email.email)
|
|
|
|
expect do
|
|
request
|
|
end.to change { project_members.include?(user) }.from(false).to(true)
|
|
|
|
expect(response).to have_gitlab_http_status(:found)
|
|
expect(flash[:notice]).to include 'You have been granted'
|
|
end
|
|
|
|
it 'does not accept if invite email matches unconfirmed secondary email' do
|
|
secondary_email = create(:email, user: user)
|
|
member.update!(invite_email: secondary_email.email)
|
|
|
|
expect do
|
|
request
|
|
end.not_to change { project_members.include?(user) }
|
|
|
|
expect(response).to have_gitlab_http_status(error_status)
|
|
expect(flash[:alert]).to eq(flash_alert)
|
|
end
|
|
|
|
it 'does not accept if invite email does not match signed in user' do
|
|
member.update!(invite_email: 'bogus@email.com')
|
|
|
|
expect do
|
|
request
|
|
end.not_to change { project_members.include?(user) }
|
|
|
|
expect(response).to have_gitlab_http_status(error_status)
|
|
expect(flash[:alert]).to eq(flash_alert)
|
|
end
|
|
end
|
|
|
|
describe 'GET #show', :snowplow do
|
|
subject(:request) { get :show, params: params }
|
|
|
|
context 'when logged in' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it_behaves_like 'invite email match enforcement', error_status: :ok
|
|
it_behaves_like 'invalid token'
|
|
end
|
|
|
|
context 'when it is an initial invite email' do
|
|
let(:extra_params) { { invite_type: 'initial_email' } }
|
|
|
|
it 'tracks the initial join click from email' do
|
|
request
|
|
|
|
expect_snowplow_event(
|
|
category: described_class.name,
|
|
action: 'join_clicked',
|
|
label: 'invite_email',
|
|
property: member.id.to_s
|
|
)
|
|
end
|
|
|
|
context 'when it is part of the invite_email_preview_text experiment' do
|
|
let(:extra_params) { { invite_type: 'initial_email', experiment_name: 'invite_email_preview_text' } }
|
|
|
|
it 'tracks the initial join click from email' do
|
|
experiment = double(track: true)
|
|
allow(controller).to receive(:experiment).with(:invite_email_preview_text, actor: member).and_return(experiment)
|
|
|
|
request
|
|
|
|
expect(experiment).to have_received(:track).with(:join_clicked)
|
|
end
|
|
|
|
context 'when member does not exist' do
|
|
let(:raw_invite_token) { '_bogus_token_' }
|
|
|
|
it 'does not track the experiment' do
|
|
expect(controller).not_to receive(:experiment).with(:invite_email_preview_text, actor: member)
|
|
|
|
request
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when it is part of the invite_email_from experiment' do
|
|
let(:extra_params) { { invite_type: 'initial_email', experiment_name: 'invite_email_from' } }
|
|
|
|
it 'tracks the initial join click from email' do
|
|
experiment = double(track: true)
|
|
allow(controller).to receive(:experiment).with(:invite_email_from, actor: member).and_return(experiment)
|
|
|
|
request
|
|
|
|
expect(experiment).to have_received(:track).with(:join_clicked)
|
|
end
|
|
|
|
context 'when member does not exist' do
|
|
let(:raw_invite_token) { '_bogus_token_' }
|
|
|
|
it 'does not track the experiment' do
|
|
expect(controller).not_to receive(:experiment).with(:invite_email_from, actor: member)
|
|
|
|
request
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when member does not exist' do
|
|
let(:raw_invite_token) { '_bogus_token_' }
|
|
|
|
it 'does not track join click' do
|
|
request
|
|
|
|
expect_no_snowplow_event(
|
|
category: described_class.name,
|
|
action: 'join_clicked',
|
|
label: 'invite_email'
|
|
)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when it is not an initial email' do
|
|
it 'does not track the join click' do
|
|
request
|
|
|
|
expect_no_snowplow_event(
|
|
category: described_class.name,
|
|
action: 'join_clicked',
|
|
label: 'invite_email'
|
|
)
|
|
end
|
|
|
|
context 'when it is not part of our invite email experiment' do
|
|
it 'does not track via experiment', :aggregate_failures do
|
|
expect(controller).not_to receive(:experiment).with(:invite_email_preview_text, actor: member)
|
|
expect(controller).not_to receive(:experiment).with(:invite_email_from, actor: member)
|
|
|
|
request
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when not logged in' do
|
|
context 'when invite token belongs to a valid member' do
|
|
context 'when instance allows sign up' do
|
|
it 'indicates an account can be created in notice' do
|
|
request
|
|
|
|
expect(flash[:notice]).to include('or create an account')
|
|
end
|
|
|
|
context 'when user exists with the invited email' do
|
|
it 'is redirected to a new session with invite email param' do
|
|
request
|
|
|
|
expect(response).to redirect_to(new_user_session_path(invite_email: member.invite_email))
|
|
end
|
|
end
|
|
|
|
context 'when user exists with the invited email as secondary email' do
|
|
before do
|
|
secondary_email = create(:email, user: user, email: 'foo@example.com')
|
|
member.update!(invite_email: secondary_email.email)
|
|
end
|
|
|
|
it 'is redirected to a new session with invite email param' do
|
|
request
|
|
|
|
expect(response).to redirect_to(new_user_session_path(invite_email: member.invite_email))
|
|
end
|
|
end
|
|
|
|
context 'when user does not exist with the invited email' do
|
|
before do
|
|
member.update!(invite_email: 'bogus_email@example.com')
|
|
end
|
|
|
|
it 'indicates an account can be created in notice' do
|
|
request
|
|
|
|
expect(flash[:notice]).to include('create an account or sign in')
|
|
end
|
|
|
|
it 'is redirected to a new registration with invite email param and flash message', :aggregate_failures do
|
|
request
|
|
|
|
expect(response).to redirect_to(new_user_registration_path(invite_email: member.invite_email))
|
|
expect(flash[:notice]).to eq 'To accept this invitation, create an account or sign in.'
|
|
end
|
|
|
|
it 'sets session keys for auto email confirmation on sign up' do
|
|
request
|
|
|
|
expect(session[:invite_email]).to eq(member.invite_email)
|
|
end
|
|
|
|
context 'when it is part of our invite email experiment' do
|
|
let(:extra_params) { { invite_type: 'initial_email' } }
|
|
|
|
it 'sets session key for invite acceptance tracking on sign-up' do
|
|
request
|
|
|
|
expect(session[:originating_member_id]).to eq(member.id)
|
|
end
|
|
end
|
|
|
|
context 'when it is not part of our invite email experiment' do
|
|
it 'does not set the session key for invite acceptance tracking on sign-up' do
|
|
request
|
|
|
|
expect(session[:originating_member_id]).to be_nil
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when instance does not allow sign up' do
|
|
before do
|
|
stub_application_setting(allow_signup?: false)
|
|
end
|
|
|
|
it 'does not indicate an account can be created in notice' do
|
|
request
|
|
|
|
expect(flash[:notice]).not_to include('or create an account')
|
|
end
|
|
|
|
context 'when user exists with the invited email' do
|
|
it 'is redirected to a new session with invite email param' do
|
|
request
|
|
|
|
expect(response).to redirect_to(new_user_session_path(invite_email: member.invite_email))
|
|
end
|
|
end
|
|
|
|
context 'when user does not exist with the invited email' do
|
|
before do
|
|
member.update!(invite_email: 'bogus_email@example.com')
|
|
end
|
|
|
|
it 'is redirected to a new session with invite email param' do
|
|
request
|
|
|
|
expect(response).to redirect_to(new_user_session_path(invite_email: member.invite_email))
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when invite token does not belong to a valid member' do
|
|
let(:params) { { id: '_bogus_token_' } }
|
|
|
|
it 'is redirected to a new session' do
|
|
request
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'POST #accept' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
subject(:request) { post :accept, params: params }
|
|
|
|
it_behaves_like 'invite email match enforcement', error_status: :redirect, flash_alert: 'The invitation could not be accepted.'
|
|
it_behaves_like 'invalid token'
|
|
end
|
|
|
|
describe 'POST #decline for link in UI' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
subject(:request) { post :decline, params: params }
|
|
|
|
it_behaves_like 'invalid token'
|
|
end
|
|
|
|
describe 'GET #decline for link in email' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
subject(:request) { get :decline, params: params }
|
|
|
|
it_behaves_like 'invalid token'
|
|
end
|
|
end
|