51e6095dd1
GITLAB-1262 Change-Id: I690cb8ea294df53ebe8405a519c23c501af2c21a Conflicts: app/models/user.rb config/initializers/1_settings.rb spec/models/user_spec.rb
277 lines
9.7 KiB
Ruby
277 lines
9.7 KiB
Ruby
# == Schema Information
|
|
#
|
|
# Table name: users
|
|
#
|
|
# id :integer not null, primary key
|
|
# email :string(255) default(""), not null
|
|
# encrypted_password :string(255) default(""), not null
|
|
# reset_password_token :string(255)
|
|
# reset_password_sent_at :datetime
|
|
# remember_created_at :datetime
|
|
# sign_in_count :integer default(0)
|
|
# current_sign_in_at :datetime
|
|
# last_sign_in_at :datetime
|
|
# current_sign_in_ip :string(255)
|
|
# last_sign_in_ip :string(255)
|
|
# created_at :datetime not null
|
|
# updated_at :datetime not null
|
|
# name :string(255)
|
|
# admin :boolean default(FALSE), not null
|
|
# projects_limit :integer default(10)
|
|
# skype :string(255) default(""), not null
|
|
# linkedin :string(255) default(""), not null
|
|
# twitter :string(255) default(""), not null
|
|
# authentication_token :string(255)
|
|
# theme_id :integer default(1), not null
|
|
# bio :string(255)
|
|
# failed_attempts :integer default(0)
|
|
# locked_at :datetime
|
|
# extern_uid :string(255)
|
|
# provider :string(255)
|
|
# username :string(255)
|
|
# can_create_group :boolean default(TRUE), not null
|
|
# can_create_team :boolean default(TRUE), not null
|
|
# state :string(255)
|
|
# color_scheme_id :integer default(1), not null
|
|
# notification_level :integer default(1), not null
|
|
# password_expires_at :datetime
|
|
# created_by_id :integer
|
|
#
|
|
|
|
require 'spec_helper'
|
|
|
|
describe User do
|
|
describe "Associations" do
|
|
it { should have_one(:namespace) }
|
|
it { should have_many(:snippets).class_name('Snippet').dependent(:destroy) }
|
|
it { should have_many(:users_projects).dependent(:destroy) }
|
|
it { should have_many(:groups) }
|
|
it { should have_many(:keys).dependent(:destroy) }
|
|
it { should have_many(:events).class_name('Event').dependent(:destroy) }
|
|
it { should have_many(:recent_events).class_name('Event') }
|
|
it { should have_many(:issues).dependent(:destroy) }
|
|
it { should have_many(:notes).dependent(:destroy) }
|
|
it { should have_many(:assigned_issues).dependent(:destroy) }
|
|
it { should have_many(:merge_requests).dependent(:destroy) }
|
|
it { should have_many(:assigned_merge_requests).dependent(:destroy) }
|
|
end
|
|
|
|
describe "Mass assignment" do
|
|
it { should_not allow_mass_assignment_of(:projects_limit) }
|
|
it { should allow_mass_assignment_of(:projects_limit).as(:admin) }
|
|
end
|
|
|
|
describe 'validations' do
|
|
it { should validate_presence_of(:username) }
|
|
it { should validate_presence_of(:projects_limit) }
|
|
it { should validate_numericality_of(:projects_limit) }
|
|
it { should allow_value(0).for(:projects_limit) }
|
|
it { should_not allow_value(-1).for(:projects_limit) }
|
|
|
|
it { should ensure_length_of(:bio).is_within(0..255) }
|
|
end
|
|
|
|
describe "Respond to" do
|
|
it { should respond_to(:is_admin?) }
|
|
it { should respond_to(:name) }
|
|
it { should respond_to(:private_token) }
|
|
end
|
|
|
|
describe '#generate_password' do
|
|
it "should execute callback when force_random_password specified" do
|
|
user = build(:user, force_random_password: true)
|
|
user.should_receive(:generate_password)
|
|
user.save
|
|
end
|
|
|
|
it "should not generate password by default" do
|
|
user = create(:user, password: 'abcdefg')
|
|
user.password.should == 'abcdefg'
|
|
end
|
|
|
|
it "should generate password when forcing random password" do
|
|
Devise.stub(:friendly_token).and_return('123456789')
|
|
user = create(:user, password: 'abcdefg', force_random_password: true)
|
|
user.password.should == '12345678'
|
|
end
|
|
end
|
|
|
|
describe 'authentication token' do
|
|
it "should have authentication token" do
|
|
user = create(:user)
|
|
user.authentication_token.should_not be_blank
|
|
end
|
|
end
|
|
|
|
describe 'projects' do
|
|
before do
|
|
ActiveRecord::Base.observers.enable(:user_observer)
|
|
@user = create :user
|
|
@project = create :project, namespace: @user.namespace
|
|
@project_2 = create :project, group: create(:group) # Grant MASTER access to the user
|
|
@project_3 = create :project, group: create(:group) # Grant DEVELOPER access to the user
|
|
|
|
@project_2.team << [@user, :master]
|
|
@project_3.team << [@user, :developer]
|
|
end
|
|
|
|
it { @user.authorized_projects.should include(@project) }
|
|
it { @user.authorized_projects.should include(@project_2) }
|
|
it { @user.authorized_projects.should include(@project_3) }
|
|
it { @user.owned_projects.should include(@project) }
|
|
it { @user.owned_projects.should_not include(@project_2) }
|
|
it { @user.owned_projects.should_not include(@project_3) }
|
|
it { @user.personal_projects.should include(@project) }
|
|
it { @user.personal_projects.should_not include(@project_2) }
|
|
it { @user.personal_projects.should_not include(@project_3) }
|
|
end
|
|
|
|
describe 'groups' do
|
|
before do
|
|
ActiveRecord::Base.observers.enable(:user_observer)
|
|
@user = create :user
|
|
@group = create :group, owner: @user
|
|
end
|
|
|
|
it { @user.several_namespaces?.should be_true }
|
|
it { @user.namespaces.should include(@user.namespace, @group) }
|
|
it { @user.authorized_groups.should == [@group] }
|
|
it { @user.owned_groups.should == [@group] }
|
|
end
|
|
|
|
describe 'group multiple owners' do
|
|
before do
|
|
ActiveRecord::Base.observers.enable(:user_observer)
|
|
@user = create :user
|
|
@user2 = create :user
|
|
@group = create :group, owner: @user
|
|
|
|
@group.add_users([@user2.id], UsersGroup::OWNER)
|
|
end
|
|
|
|
it { @user2.several_namespaces?.should be_true }
|
|
end
|
|
|
|
describe 'namespaced' do
|
|
before do
|
|
ActiveRecord::Base.observers.enable(:user_observer)
|
|
@user = create :user
|
|
@project = create :project, namespace: @user.namespace
|
|
end
|
|
|
|
it { @user.several_namespaces?.should be_false }
|
|
it { @user.namespaces.should == [@user.namespace] }
|
|
end
|
|
|
|
describe 'blocking user' do
|
|
let(:user) { create(:user, name: 'John Smith') }
|
|
|
|
it "should block user" do
|
|
user.block
|
|
user.blocked?.should be_true
|
|
end
|
|
end
|
|
|
|
describe 'filter' do
|
|
before do
|
|
User.delete_all
|
|
@user = create :user
|
|
@admin = create :user, admin: true
|
|
@blocked = create :user, state: :blocked
|
|
end
|
|
|
|
it { User.filter("admins").should == [@admin] }
|
|
it { User.filter("blocked").should == [@blocked] }
|
|
it { User.filter("wop").should include(@user, @admin, @blocked) }
|
|
it { User.filter(nil).should include(@user, @admin) }
|
|
end
|
|
|
|
describe :not_in_project do
|
|
before do
|
|
User.delete_all
|
|
@user = create :user
|
|
@project = create :project
|
|
end
|
|
|
|
it { User.not_in_project(@project).should include(@user, @project.owner) }
|
|
end
|
|
|
|
describe 'user creation' do
|
|
describe 'normal user' do
|
|
let(:user) { create(:user, name: 'John Smith') }
|
|
|
|
it { user.is_admin?.should be_false }
|
|
it { user.require_ssh_key?.should be_true }
|
|
it { user.can_create_group?.should be_true }
|
|
it { user.can_create_project?.should be_true }
|
|
it { user.first_name.should == 'John' }
|
|
end
|
|
|
|
describe 'without defaults' do
|
|
let(:user) { User.new }
|
|
|
|
it "should not apply defaults to user" do
|
|
user.projects_limit.should == 10
|
|
user.can_create_group.should be_true
|
|
user.theme_id.should == Gitlab::Theme::BASIC
|
|
end
|
|
end
|
|
context 'as admin' do
|
|
describe 'with defaults' do
|
|
let(:user) { User.build_user({}, as: :admin) }
|
|
|
|
it "should apply defaults to user" do
|
|
user.projects_limit.should == Gitlab.config.gitlab.default_projects_limit
|
|
user.can_create_group.should == Gitlab.config.gitlab.default_can_create_group
|
|
user.theme_id.should == Gitlab.config.gitlab.default_theme
|
|
end
|
|
end
|
|
|
|
describe 'with default overrides' do
|
|
let(:user) { User.build_user({projects_limit: 123, can_create_group: true, can_create_team: true, theme_id: Gitlab::Theme::BASIC}, as: :admin) }
|
|
|
|
it "should apply defaults to user" do
|
|
Gitlab.config.gitlab.default_projects_limit.should_not == 123
|
|
Gitlab.config.gitlab.default_can_create_group.should_not be_true
|
|
Gitlab.config.gitlab.default_theme.should_not == Gitlab::Theme::MARS
|
|
user.projects_limit.should == 123
|
|
user.can_create_group.should be_true
|
|
user.theme_id.should == Gitlab::Theme::BASIC
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'as user' do
|
|
describe 'with defaults' do
|
|
let(:user) { User.build_user }
|
|
|
|
it "should apply defaults to user" do
|
|
user.projects_limit.should == Gitlab.config.gitlab.default_projects_limit
|
|
user.can_create_group.should == Gitlab.config.gitlab.default_can_create_group
|
|
user.theme_id.should == Gitlab.config.gitlab.default_theme
|
|
end
|
|
end
|
|
|
|
describe 'with default overrides' do
|
|
let(:user) { User.build_user(projects_limit: 123, can_create_group: true, theme_id: Gitlab::Theme::BASIC) }
|
|
|
|
it "should apply defaults to user" do
|
|
user.projects_limit.should == Gitlab.config.gitlab.default_projects_limit
|
|
user.can_create_group.should == Gitlab.config.gitlab.default_can_create_group
|
|
user.theme_id.should == Gitlab.config.gitlab.default_theme
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'by_username_or_id' do
|
|
let(:user1) { create(:user, username: 'foo') }
|
|
|
|
it "should get the correct user" do
|
|
User.by_username_or_id(user1.id).should == user1
|
|
User.by_username_or_id('foo').should == user1
|
|
User.by_username_or_id(-1).should be_nil
|
|
User.by_username_or_id('bar').should be_nil
|
|
end
|
|
end
|
|
end
|