2019-12-21 20:55:43 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
RSpec.describe AvatarUploader do
|
2018-05-09 12:01:36 +05:30
|
|
|
let(:model) { build_stubbed(:user) }
|
2018-03-17 18:26:18 +05:30
|
|
|
let(:uploader) { described_class.new(model, :avatar) }
|
|
|
|
let(:upload) { create(:upload, model: model) }
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
subject { uploader }
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
it_behaves_like 'builds correct paths',
|
|
|
|
store_dir: %r[uploads/-/system/user/avatar/],
|
|
|
|
upload_path: %r[uploads/-/system/user/avatar/],
|
|
|
|
absolute_path: %r[#{CarrierWave.root}/uploads/-/system/user/avatar/]
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2018-05-09 12:01:36 +05:30
|
|
|
context "object_store is REMOTE" do
|
|
|
|
before do
|
|
|
|
stub_uploads_object_storage
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2018-05-09 12:01:36 +05:30
|
|
|
|
|
|
|
include_context 'with storage', described_class::Store::REMOTE
|
|
|
|
|
|
|
|
it_behaves_like 'builds correct paths',
|
|
|
|
store_dir: %r[user/avatar/],
|
|
|
|
upload_path: %r[user/avatar/]
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
2018-05-09 12:01:36 +05:30
|
|
|
context "with a file" do
|
|
|
|
let(:project) { create(:project, :with_avatar) }
|
|
|
|
let(:uploader) { project.avatar }
|
|
|
|
let(:upload) { uploader.upload }
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_uploads_object_storage
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2018-05-09 12:01:36 +05:30
|
|
|
|
|
|
|
it_behaves_like "migrates", to_store: described_class::Store::REMOTE
|
|
|
|
it_behaves_like "migrates", from_store: described_class::Store::REMOTE, to_store: described_class::Store::LOCAL
|
2018-11-20 20:47:30 +05:30
|
|
|
|
|
|
|
it 'sets the right absolute path' do
|
|
|
|
storage_path = Gitlab.config.uploads.storage_path
|
|
|
|
absolute_path = File.join(storage_path, upload.path)
|
|
|
|
|
|
|
|
expect(uploader.absolute_path.scan(storage_path).size).to eq(1)
|
|
|
|
expect(uploader.absolute_path).to eq(absolute_path)
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2020-03-13 15:44:24 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
context 'accept whitelist file content type' do
|
|
|
|
# We need to feed through a valid path, but we force the parsed mime type
|
|
|
|
# in a stub below so we can set any path.
|
|
|
|
let_it_be(:path) { File.join('spec', 'fixtures', 'video_sample.mp4') }
|
|
|
|
|
|
|
|
where(:mime_type) { described_class::MIME_WHITELIST }
|
|
|
|
|
|
|
|
with_them do
|
|
|
|
include_context 'force content type detection to mime_type'
|
2020-03-13 15:44:24 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
it_behaves_like 'accepted carrierwave upload'
|
2020-03-13 15:44:24 +05:30
|
|
|
end
|
|
|
|
end
|
2020-04-08 14:13:33 +05:30
|
|
|
|
|
|
|
context 'upload non-whitelisted file content type' do
|
|
|
|
let_it_be(:path) { File.join('spec', 'fixtures', 'sanitized.svg') }
|
|
|
|
|
|
|
|
it_behaves_like 'denied carrierwave upload'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'upload misnamed non-whitelisted file content type' do
|
|
|
|
let_it_be(:path) { File.join('spec', 'fixtures', 'not_a_png.png') }
|
|
|
|
|
|
|
|
it_behaves_like 'denied carrierwave upload'
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|