debian-mirror-gitlab/spec/lib/gitlab/ldap/user_spec.rb

111 lines
2.8 KiB
Ruby
Raw Normal View History

2015-04-26 12:48:37 +05:30
require 'spec_helper'
describe Gitlab::LDAP::User do
let(:ldap_user) { Gitlab::LDAP::User.new(auth_hash) }
let(:gl_user) { ldap_user.gl_user }
let(:info) do
{
name: 'John',
email: 'john@example.com',
nickname: 'john'
}
end
let(:auth_hash) do
double(uid: 'my-uid', provider: 'ldapmain', info: double(info))
end
describe :changed? do
it "marks existing ldap user as changed" do
2015-09-11 14:41:01 +05:30
create(:omniauth_user, extern_uid: 'my-uid', provider: 'ldapmain')
2015-04-26 12:48:37 +05:30
expect(ldap_user.changed?).to be_truthy
end
it "marks existing non-ldap user if the email matches as changed" do
2015-09-11 14:41:01 +05:30
create(:user, email: 'john@example.com')
2015-04-26 12:48:37 +05:30
expect(ldap_user.changed?).to be_truthy
end
it "dont marks existing ldap user as changed" do
2015-09-11 14:41:01 +05:30
create(:omniauth_user, email: 'john@example.com', extern_uid: 'my-uid', provider: 'ldapmain')
2015-04-26 12:48:37 +05:30
expect(ldap_user.changed?).to be_falsey
end
end
describe :find_or_create do
it "finds the user if already existing" do
2015-09-11 14:41:01 +05:30
create(:omniauth_user, extern_uid: 'my-uid', provider: 'ldapmain')
2015-04-26 12:48:37 +05:30
2015-09-11 14:41:01 +05:30
expect{ ldap_user.save }.not_to change{ User.count }
2015-04-26 12:48:37 +05:30
end
it "connects to existing non-ldap user if the email matches" do
existing_user = create(:omniauth_user, email: 'john@example.com', provider: "twitter")
2015-09-11 14:41:01 +05:30
expect{ ldap_user.save }.not_to change{ User.count }
2015-04-26 12:48:37 +05:30
existing_user.reload
expect(existing_user.ldap_identity.extern_uid).to eql 'my-uid'
expect(existing_user.ldap_identity.provider).to eql 'ldapmain'
end
it "creates a new user if not found" do
expect{ ldap_user.save }.to change{ User.count }.by(1)
end
end
describe 'blocking' do
2015-09-11 14:41:01 +05:30
def configure_block(value)
allow_any_instance_of(Gitlab::LDAP::Config).
to receive(:block_auto_created_users).and_return(value)
end
2015-04-26 12:48:37 +05:30
context 'signup' do
context 'dont block on create' do
2015-09-11 14:41:01 +05:30
before { configure_block(false) }
2015-04-26 12:48:37 +05:30
it do
ldap_user.save
expect(gl_user).to be_valid
expect(gl_user).not_to be_blocked
end
end
context 'block on create' do
2015-09-11 14:41:01 +05:30
before { configure_block(true) }
2015-04-26 12:48:37 +05:30
it do
ldap_user.save
expect(gl_user).to be_valid
expect(gl_user).to be_blocked
end
end
end
context 'sign-in' do
before do
ldap_user.save
ldap_user.gl_user.activate
end
context 'dont block on create' do
2015-09-11 14:41:01 +05:30
before { configure_block(false) }
2015-04-26 12:48:37 +05:30
it do
ldap_user.save
expect(gl_user).to be_valid
expect(gl_user).not_to be_blocked
end
end
context 'block on create' do
2015-09-11 14:41:01 +05:30
before { configure_block(true) }
2015-04-26 12:48:37 +05:30
it do
ldap_user.save
expect(gl_user).to be_valid
expect(gl_user).not_to be_blocked
end
end
end
end
end