2019-07-31 22:56:46 +05:30
# frozen_string_literal: true
2015-09-11 14:41:01 +05:30
require 'spec_helper'
2020-06-23 00:09:42 +05:30
RSpec . describe Admin :: UsersController do
2016-06-02 11:05:42 +05:30
let ( :user ) { create ( :user ) }
2020-03-13 15:44:24 +05:30
2019-12-21 20:55:43 +05:30
let_it_be ( :admin ) { create ( :admin ) }
2015-09-11 14:41:01 +05:30
before do
sign_in ( admin )
end
2019-07-07 11:18:12 +05:30
describe 'GET #index' do
it 'retrieves all users' do
get :index
expect ( assigns ( :users ) ) . to match_array ( [ user , admin ] )
end
it 'filters by admins' do
get :index , params : { filter : 'admins' }
expect ( assigns ( :users ) ) . to eq ( [ admin ] )
end
2021-01-03 14:25:43 +05:30
it 'eager loads authorized projects association' do
get :index
expect ( assigns ( :users ) . first . association ( :authorized_projects ) ) . to be_loaded
end
2021-03-11 19:13:27 +05:30
2021-06-08 01:23:25 +05:30
context 'pagination' do
context 'when number of users is over the pagination limit' do
before do
stub_const ( 'Admin::UsersController::PAGINATION_WITH_COUNT_LIMIT' , 5 )
allow ( Gitlab :: Database :: Count ) . to receive ( :approximate_counts ) . with ( [ User ] ) . and_return ( { User = > 6 } )
end
it 'marks the relation for pagination without counts' do
get :index
expect ( assigns ( :users ) ) . to be_a ( Kaminari :: PaginatableWithoutCount )
end
end
context 'when number of users is below the pagination limit' do
it 'marks the relation for pagination with counts' do
get :index
expect ( assigns ( :users ) ) . not_to be_a ( Kaminari :: PaginatableWithoutCount )
end
end
end
end
2019-07-07 11:18:12 +05:30
describe 'GET :id' do
it 'finds a user case-insensitively' do
user = create ( :user , username : 'CaseSensitive' )
get :show , params : { id : user . username . downcase }
expect ( response ) . to be_redirect
expect ( response . location ) . to end_with ( user . username )
end
end
2020-10-04 03:57:07 +05:30
describe 'DELETE #destroy' , :sidekiq_might_not_need_inline do
2017-09-10 17:25:29 +05:30
let ( :project ) { create ( :project , namespace : user . namespace ) }
let! ( :issue ) { create ( :issue , author : user ) }
2015-09-11 14:41:01 +05:30
before do
2018-03-17 18:26:18 +05:30
project . add_developer ( user )
2015-09-11 14:41:01 +05:30
end
2017-09-10 17:25:29 +05:30
it 'deletes user and ghosts their contributions' do
2019-02-15 15:39:39 +05:30
delete :destroy , params : { id : user . username } , format : :json
2017-09-10 17:25:29 +05:30
2020-03-13 15:44:24 +05:30
expect ( response ) . to have_gitlab_http_status ( :ok )
2017-09-10 17:25:29 +05:30
expect ( User . exists? ( user . id ) ) . to be_falsy
expect ( issue . reload . author ) . to be_ghost
end
it 'deletes the user and their contributions when hard delete is specified' do
2019-02-15 15:39:39 +05:30
delete :destroy , params : { id : user . username , hard_delete : true } , format : :json
2017-09-10 17:25:29 +05:30
2020-03-13 15:44:24 +05:30
expect ( response ) . to have_gitlab_http_status ( :ok )
2017-09-10 17:25:29 +05:30
expect ( User . exists? ( user . id ) ) . to be_falsy
expect ( Issue . exists? ( issue . id ) ) . to be_falsy
2015-09-11 14:41:01 +05:30
end
2020-10-04 03:57:07 +05:30
context 'prerequisites for account deletion' do
context 'solo-owned groups' do
let ( :group ) { create ( :group ) }
context 'if the user is the sole owner of at least one group' do
before do
create ( :group_member , :owner , group : group , user : user )
end
context 'soft-delete' do
it 'fails' do
delete :destroy , params : { id : user . username }
message = s_ ( 'AdminUsers|You must transfer ownership or delete the groups owned by this user before you can delete their account' )
expect ( flash [ :alert ] ) . to eq ( message )
expect ( response ) . to have_gitlab_http_status ( :see_other )
expect ( response ) . to redirect_to admin_user_path ( user )
expect ( User . exists? ( user . id ) ) . to be_truthy
end
end
context 'hard-delete' do
it 'succeeds' do
delete :destroy , params : { id : user . username , hard_delete : true }
expect ( response ) . to redirect_to ( admin_users_path )
expect ( flash [ :notice ] ) . to eq ( _ ( 'The user is being deleted.' ) )
expect ( User . exists? ( user . id ) ) . to be_falsy
end
end
end
end
end
2015-09-11 14:41:01 +05:30
end
2021-02-22 17:27:13 +05:30
describe 'DELETE #reject' do
subject { put :reject , params : { id : user . username } }
context 'when rejecting a pending user' do
let ( :user ) { create ( :user , :blocked_pending_approval ) }
it 'hard deletes the user' , :sidekiq_inline do
subject
expect ( User . exists? ( user . id ) ) . to be_falsy
end
it 'displays the rejection message' do
subject
expect ( response ) . to redirect_to ( admin_users_path )
expect ( flash [ :notice ] ) . to eq ( " You've rejected #{ user . name } " )
end
it 'sends the user a rejection email' do
expect_next_instance_of ( NotificationService ) do | notification |
allow ( notification ) . to receive ( :user_admin_rejection ) . with ( user . name , user . notification_email )
end
subject
end
end
context 'when user is not pending' do
let ( :user ) { create ( :user , state : 'active' ) }
it 'does not reject and delete the user' do
subject
expect ( User . exists? ( user . id ) ) . to be_truthy
end
it 'displays the error' do
subject
expect ( flash [ :alert ] ) . to eq ( 'This user does not have a pending request' )
end
it 'does not email the user' do
expect ( NotificationService ) . not_to receive ( :new )
subject
end
end
end
2021-01-03 14:25:43 +05:30
describe 'PUT #approve' do
let ( :user ) { create ( :user , :blocked_pending_approval ) }
subject { put :approve , params : { id : user . username } }
2021-01-29 00:20:46 +05:30
context 'when successful' do
it 'activates the user' do
2021-01-03 14:25:43 +05:30
subject
2021-01-29 00:20:46 +05:30
user . reload
expect ( user ) . to be_active
expect ( flash [ :notice ] ) . to eq ( 'Successfully approved' )
2021-01-03 14:25:43 +05:30
end
2021-01-29 00:20:46 +05:30
it 'emails the user on approval' do
expect ( DeviseMailer ) . to receive ( :user_admin_approval ) . with ( user ) . and_call_original
expect { subject } . to have_enqueued_mail ( DeviseMailer , :user_admin_approval )
2021-01-03 14:25:43 +05:30
end
2021-01-29 00:20:46 +05:30
end
2021-01-03 14:25:43 +05:30
2021-01-29 00:20:46 +05:30
context 'when unsuccessful' do
let ( :user ) { create ( :user , :blocked ) }
2021-01-03 14:25:43 +05:30
2021-01-29 00:20:46 +05:30
it 'displays the error' do
subject
2021-01-03 14:25:43 +05:30
2021-03-11 19:13:27 +05:30
expect ( flash [ :alert ] ) . to eq ( 'The user you are trying to approve is not pending approval' )
2021-01-03 14:25:43 +05:30
end
2021-01-29 00:20:46 +05:30
it 'does not activate the user' do
subject
2021-01-03 14:25:43 +05:30
2021-01-29 00:20:46 +05:30
user . reload
expect ( user ) . not_to be_active
end
2021-01-03 14:25:43 +05:30
2021-01-29 00:20:46 +05:30
it 'does not email the pending user' do
expect { subject } . not_to have_enqueued_mail ( DeviseMailer , :user_admin_approval )
2021-01-03 14:25:43 +05:30
end
end
end
2019-12-21 20:55:43 +05:30
describe 'PUT #activate' do
shared_examples 'a request that activates the user' do
it 'activates the user' do
put :activate , params : { id : user . username }
user . reload
expect ( user . active? ) . to be_truthy
expect ( flash [ :notice ] ) . to eq ( 'Successfully activated' )
end
end
context 'for a deactivated user' do
before do
user . deactivate
end
it_behaves_like 'a request that activates the user'
end
context 'for an active user' do
it_behaves_like 'a request that activates the user'
end
context 'for a blocked user' do
before do
user . block
end
it 'does not activate the user' do
put :activate , params : { id : user . username }
user . reload
expect ( user . active? ) . to be_falsey
expect ( flash [ :notice ] ) . to eq ( 'Error occurred. A blocked user must be unblocked to be activated' )
end
end
end
describe 'PUT #deactivate' do
shared_examples 'a request that deactivates the user' do
it 'deactivates the user' do
put :deactivate , params : { id : user . username }
user . reload
expect ( user . deactivated? ) . to be_truthy
expect ( flash [ :notice ] ) . to eq ( 'Successfully deactivated' )
end
end
context 'for an active user' do
let ( :activity ) { { } }
let ( :user ) { create ( :user , ** activity ) }
context 'with no recent activity' do
let ( :activity ) { { last_activity_on : :: User :: MINIMUM_INACTIVE_DAYS . next . days . ago } }
it_behaves_like 'a request that deactivates the user'
end
context 'with recent activity' do
let ( :activity ) { { last_activity_on : :: User :: MINIMUM_INACTIVE_DAYS . pred . days . ago } }
it 'does not deactivate the user' do
put :deactivate , params : { id : user . username }
user . reload
expect ( user . deactivated? ) . to be_falsey
expect ( flash [ :notice ] ) . to eq ( " The user you are trying to deactivate has been active in the past #{ :: User :: MINIMUM_INACTIVE_DAYS } days and cannot be deactivated " )
end
end
end
context 'for a deactivated user' do
before do
user . deactivate
end
it_behaves_like 'a request that deactivates the user'
end
context 'for a blocked user' do
before do
user . block
end
it 'does not deactivate the user' do
put :deactivate , params : { id : user . username }
user . reload
expect ( user . deactivated? ) . to be_falsey
expect ( flash [ :notice ] ) . to eq ( 'Error occurred. A blocked user cannot be deactivated' )
end
end
2021-01-03 14:25:43 +05:30
context 'for an internal user' do
it 'does not deactivate the user' do
internal_user = User . alert_bot
put :deactivate , params : { id : internal_user . username }
expect ( internal_user . reload . deactivated? ) . to be_falsey
expect ( flash [ :notice ] ) . to eq ( 'Internal users cannot be deactivated' )
end
end
2019-12-21 20:55:43 +05:30
end
2015-10-24 18:46:33 +05:30
describe 'PUT block/:id' do
it 'blocks user' do
2019-02-15 15:39:39 +05:30
put :block , params : { id : user . username }
2015-10-24 18:46:33 +05:30
user . reload
expect ( user . blocked? ) . to be_truthy
2020-01-01 13:55:28 +05:30
expect ( flash [ :notice ] ) . to eq _ ( 'Successfully blocked' )
2015-10-24 18:46:33 +05:30
end
end
describe 'PUT unblock/:id' do
2016-01-19 16:12:03 +05:30
context 'ldap blocked users' do
let ( :user ) { create ( :omniauth_user , provider : 'ldapmain' ) }
2015-10-24 18:46:33 +05:30
2016-01-19 16:12:03 +05:30
before do
user . ldap_block
end
2016-09-13 17:45:13 +05:30
it 'does not unblock user' do
2019-02-15 15:39:39 +05:30
put :unblock , params : { id : user . username }
2016-01-19 16:12:03 +05:30
user . reload
expect ( user . blocked? ) . to be_truthy
2020-01-01 13:55:28 +05:30
expect ( flash [ :alert ] ) . to eq _ ( 'This user cannot be unlocked manually from GitLab' )
2016-01-19 16:12:03 +05:30
end
2015-10-24 18:46:33 +05:30
end
2016-01-19 16:12:03 +05:30
context 'manually blocked users' do
before do
user . block
end
it 'unblocks user' do
2019-02-15 15:39:39 +05:30
put :unblock , params : { id : user . username }
2016-01-19 16:12:03 +05:30
user . reload
expect ( user . blocked? ) . to be_falsey
2020-01-01 13:55:28 +05:30
expect ( flash [ :notice ] ) . to eq _ ( 'Successfully unblocked' )
2016-01-19 16:12:03 +05:30
end
2015-10-24 18:46:33 +05:30
end
end
2021-10-27 15:23:28 +05:30
describe 'PUT ban/:id' , :aggregate_failures do
2021-06-08 01:23:25 +05:30
context 'when ban_user_feature_flag is enabled' do
it 'bans user' do
put :ban , params : { id : user . username }
2021-10-27 15:23:28 +05:30
expect ( user . reload . banned? ) . to be_truthy
2021-06-08 01:23:25 +05:30
expect ( flash [ :notice ] ) . to eq _ ( 'Successfully banned' )
end
context 'when unsuccessful' do
let ( :user ) { create ( :user , :blocked ) }
it 'does not ban user' do
put :ban , params : { id : user . username }
user . reload
expect ( user . banned? ) . to be_falsey
expect ( flash [ :alert ] ) . to eq _ ( 'Error occurred. User was not banned' )
end
end
end
context 'when ban_user_feature_flag is not enabled' do
before do
stub_feature_flags ( ban_user_feature_flag : false )
end
it 'does not ban user, renders 404' do
put :ban , params : { id : user . username }
2021-10-27 15:23:28 +05:30
expect ( user . reload . banned? ) . to be_falsey
2021-06-08 01:23:25 +05:30
expect ( response ) . to have_gitlab_http_status ( :not_found )
end
end
end
2021-10-27 15:23:28 +05:30
describe 'PUT unban/:id' , :aggregate_failures do
2021-06-08 01:23:25 +05:30
let ( :banned_user ) { create ( :user , :banned ) }
it 'unbans user' do
put :unban , params : { id : banned_user . username }
2021-10-27 15:23:28 +05:30
expect ( banned_user . reload . banned? ) . to be_falsey
2021-06-08 01:23:25 +05:30
expect ( flash [ :notice ] ) . to eq _ ( 'Successfully unbanned' )
end
end
2015-09-11 14:41:01 +05:30
describe 'PUT unlock/:id' do
before do
request . env [ " HTTP_REFERER " ] = " / "
user . lock_access!
end
it 'unlocks user' do
2019-02-15 15:39:39 +05:30
put :unlock , params : { id : user . username }
2015-09-11 14:41:01 +05:30
user . reload
expect ( user . access_locked? ) . to be_falsey
2021-10-27 15:23:28 +05:30
expect ( flash [ :notice ] ) . to eq _ ( 'Successfully unlocked' )
2015-09-11 14:41:01 +05:30
end
end
describe 'PUT confirm/:id' do
let ( :user ) { create ( :user , confirmed_at : nil ) }
before do
request . env [ " HTTP_REFERER " ] = " / "
end
it 'confirms user' do
2019-02-15 15:39:39 +05:30
put :confirm , params : { id : user . username }
2015-09-11 14:41:01 +05:30
user . reload
expect ( user . confirmed? ) . to be_truthy
end
end
describe 'PATCH disable_two_factor' do
2020-11-24 15:15:51 +05:30
subject { patch :disable_two_factor , params : { id : user . to_param } }
2015-09-11 14:41:01 +05:30
2020-11-24 15:15:51 +05:30
context 'for a user that has 2FA enabled' do
let ( :user ) { create ( :user , :two_factor ) }
2015-09-11 14:41:01 +05:30
2020-11-24 15:15:51 +05:30
it 'disables 2FA for the user' do
subject
2015-09-11 14:41:01 +05:30
2020-11-24 15:15:51 +05:30
expect ( user . reload . two_factor_enabled? ) . to eq ( false )
end
it 'redirects back' do
subject
2015-09-11 14:41:01 +05:30
2020-11-24 15:15:51 +05:30
expect ( response ) . to redirect_to ( admin_user_path ( user ) )
end
it 'displays a notice on success' do
subject
2015-09-11 14:41:01 +05:30
2020-11-24 15:15:51 +05:30
expect ( flash [ :notice ] )
. to eq _ ( 'Two-factor authentication has been disabled for this user' )
end
2015-09-11 14:41:01 +05:30
end
2020-11-24 15:15:51 +05:30
context 'for a user that does not have 2FA enabled' do
it 'redirects back' do
subject
expect ( response ) . to redirect_to ( admin_user_path ( user ) )
end
it 'displays an alert on failure' do
subject
expect ( flash [ :alert ] )
. to eq _ ( 'Two-factor authentication is not enabled for this user' )
end
2015-09-11 14:41:01 +05:30
end
end
2016-06-02 11:05:42 +05:30
2017-08-17 22:00:37 +05:30
describe 'POST create' do
it 'creates the user' do
2019-02-15 15:39:39 +05:30
expect { post :create , params : { user : attributes_for ( :user ) } } . to change { User . count } . by ( 1 )
2017-08-17 22:00:37 +05:30
end
it 'shows only one error message for an invalid email' do
2019-02-15 15:39:39 +05:30
post :create , params : { user : attributes_for ( :user , email : 'bogus' ) }
2020-01-01 13:55:28 +05:30
errors = assigns [ :user ] . errors
expect ( errors ) . to contain_exactly ( errors . full_message ( :email , I18n . t ( 'errors.messages.invalid' ) ) )
2017-08-17 22:00:37 +05:30
end
2020-06-23 00:09:42 +05:30
context 'admin notes' do
it 'creates the user with note' do
note = '2020-05-12 | Note | DCMA | Link'
user_params = attributes_for ( :user , note : note )
expect { post :create , params : { user : user_params } } . to change { User . count } . by ( 1 )
new_user = User . last
expect ( new_user . note ) . to eq ( note )
end
end
2017-08-17 22:00:37 +05:30
end
2016-06-02 11:05:42 +05:30
describe 'POST update' do
context 'when the password has changed' do
2021-01-03 14:25:43 +05:30
def update_password ( user , password = User . random_password , password_confirmation = password , format = :html )
2016-06-02 11:05:42 +05:30
params = {
id : user . to_param ,
user : {
password : password ,
2020-11-24 15:15:51 +05:30
password_confirmation : password_confirmation
2016-06-02 11:05:42 +05:30
}
}
2021-01-03 14:25:43 +05:30
post :update , params : params , format : format
2016-06-02 11:05:42 +05:30
end
2020-11-24 15:15:51 +05:30
context 'when admin changes their own password' do
context 'when password is valid' do
it 'updates the password' do
expect { update_password ( admin ) }
. to change { admin . reload . encrypted_password }
end
it 'does not set the new password to expire immediately' do
expect { update_password ( admin ) }
. not_to change { admin . reload . password_expired? }
end
it 'does not enqueue the `admin changed your password` email' do
expect { update_password ( admin ) }
. not_to have_enqueued_mail ( DeviseMailer , :password_change_by_admin )
end
2018-03-17 18:26:18 +05:30
2020-11-24 15:15:51 +05:30
it 'enqueues the `password changed` email' do
expect { update_password ( admin ) }
. to have_enqueued_mail ( DeviseMailer , :password_change )
end
2018-03-17 18:26:18 +05:30
end
end
2020-11-24 15:15:51 +05:30
context 'when admin changes the password of another user' do
context 'when the new password is valid' do
it 'redirects to the user' do
update_password ( user )
2016-06-02 11:05:42 +05:30
2020-11-24 15:15:51 +05:30
expect ( response ) . to redirect_to ( admin_user_path ( user ) )
end
2016-06-02 11:05:42 +05:30
2020-11-24 15:15:51 +05:30
it 'updates the password' do
expect { update_password ( user ) }
. to change { user . reload . encrypted_password }
end
2016-06-02 11:05:42 +05:30
2020-11-24 15:15:51 +05:30
it 'sets the new password to expire immediately' do
expect { update_password ( user ) }
. to change { user . reload . password_expired? } . from ( false ) . to ( true )
end
it 'enqueues the `admin changed your password` email' do
expect { update_password ( user ) }
. to have_enqueued_mail ( DeviseMailer , :password_change_by_admin )
end
it 'does not enqueue the `password changed` email' do
expect { update_password ( user ) }
. not_to have_enqueued_mail ( DeviseMailer , :password_change )
end
2016-06-02 11:05:42 +05:30
end
end
context 'when the new password is invalid' do
2020-11-24 15:15:51 +05:30
let ( :password ) { 'invalid' }
2016-06-02 11:05:42 +05:30
it 'shows the edit page again' do
2020-11-24 15:15:51 +05:30
update_password ( user , password )
2016-06-02 11:05:42 +05:30
expect ( response ) . to render_template ( :edit )
end
it 'returns the error message' do
2020-11-24 15:15:51 +05:30
update_password ( user , password )
2016-06-02 11:05:42 +05:30
expect ( assigns [ :user ] . errors ) . to contain_exactly ( a_string_matching ( / too short / ) )
end
it 'does not update the password' do
2020-11-24 15:15:51 +05:30
expect { update_password ( user , password ) }
2018-03-17 18:26:18 +05:30
. not_to change { user . reload . encrypted_password }
2016-06-02 11:05:42 +05:30
end
end
context 'when the new password does not match the password confirmation' do
2020-11-24 15:15:51 +05:30
let ( :password ) { 'some_password' }
let ( :password_confirmation ) { 'not_same_as_password' }
2016-06-02 11:05:42 +05:30
it 'shows the edit page again' do
2020-11-24 15:15:51 +05:30
update_password ( user , password , password_confirmation )
2016-06-02 11:05:42 +05:30
expect ( response ) . to render_template ( :edit )
end
it 'returns the error message' do
2020-11-24 15:15:51 +05:30
update_password ( user , password , password_confirmation )
2016-06-02 11:05:42 +05:30
expect ( assigns [ :user ] . errors ) . to contain_exactly ( a_string_matching ( / doesn't match / ) )
end
it 'does not update the password' do
2020-11-24 15:15:51 +05:30
expect { update_password ( user , password , password_confirmation ) }
2018-03-17 18:26:18 +05:30
. not_to change { user . reload . encrypted_password }
2016-06-02 11:05:42 +05:30
end
end
2021-01-03 14:25:43 +05:30
context 'when the update fails' do
let ( :password ) { User . random_password }
before do
expect_next_instance_of ( Users :: UpdateService ) do | service |
allow ( service ) . to receive ( :execute ) . and_return ( { message : 'failed' , status : :error } )
end
end
it 'returns a 500 error' do
expect { update_password ( admin , password , password , :json ) }
. not_to change { admin . reload . password_expired? }
expect ( response ) . to have_gitlab_http_status ( :error )
end
end
2016-06-02 11:05:42 +05:30
end
2020-06-23 00:09:42 +05:30
context 'admin notes' do
it 'updates the note for the user' do
note = '2020-05-12 | Note | DCMA | Link'
params = {
id : user . to_param ,
user : {
note : note
}
}
expect { post :update , params : params } . to change { user . reload . note } . to ( note )
end
end
2021-09-04 01:27:46 +05:30
context 'when updating credit card validation for user account' do
let ( :params ) do
{
id : user . to_param ,
user : user_params
}
end
shared_examples 'no credit card validation param' do
let ( :user_params ) { { name : 'foo' } }
it 'does not change credit card validation' do
expect { post :update , params : params } . not_to change ( Users :: CreditCardValidation , :count )
end
end
context 'when user has a credit card validation' do
before do
user . create_credit_card_validation! ( credit_card_validated_at : Time . zone . now )
end
context 'with unchecked credit card validation' do
let ( :user_params ) do
{ credit_card_validation_attributes : { credit_card_validated_at : '0' } }
end
it 'deletes credit_card_validation' do
expect { post :update , params : params } . to change { Users :: CreditCardValidation . count } . by ( - 1 )
end
end
context 'with checked credit card validation' do
let ( :user_params ) do
{ credit_card_validation_attributes : { credit_card_validated_at : '1' } }
end
it 'does not change credit_card_validated_at' do
expect { post :update , params : params } . not_to change { user . credit_card_validated_at }
end
end
it_behaves_like 'no credit card validation param'
end
context 'when user does not have a credit card validation' do
context 'with checked credit card validation' do
let ( :user_params ) do
{ credit_card_validation_attributes : { credit_card_validated_at : '1' } }
end
it 'creates new credit card validation' do
expect { post :update , params : params } . to change { Users :: CreditCardValidation . count } . by 1
end
end
context 'with unchecked credit card validation' do
let ( :user_params ) do
{ credit_card_validation_attributes : { credit_card_validated_at : '0' } }
end
it 'does not blow up' do
expect { post :update , params : params } . not_to change ( Users :: CreditCardValidation , :count )
end
end
it_behaves_like 'no credit card validation param'
end
context 'invalid parameters' do
let ( :user_params ) do
{ credit_card_validation_attributes : { credit_card_validated_at : Time . current . iso8601 } }
end
it_behaves_like 'no credit card validation param'
end
context 'with non permitted params' do
let ( :user_params ) do
{ credit_card_validation_attributes : { _destroy : true } }
end
before do
user . create_credit_card_validation! ( credit_card_validated_at : Time . zone . now )
end
it_behaves_like 'no credit card validation param'
end
end
2016-06-02 11:05:42 +05:30
end
2020-04-22 19:07:51 +05:30
describe " DELETE # remove_email " do
it 'deletes the email' do
email = create ( :email , user : user )
delete :remove_email , params : { id : user . username , email_id : email . id }
expect ( user . reload . emails ) . not_to include ( email )
expect ( flash [ :notice ] ) . to eq ( 'Successfully removed email.' )
end
end
2016-06-02 11:05:42 +05:30
describe " POST impersonate " do
context " when the user is blocked " do
before do
user . block!
end
it " shows a notice " do
2019-02-15 15:39:39 +05:30
post :impersonate , params : { id : user . username }
2016-06-02 11:05:42 +05:30
2020-01-01 13:55:28 +05:30
expect ( flash [ :alert ] ) . to eq ( _ ( 'You cannot impersonate a blocked user' ) )
2016-06-02 11:05:42 +05:30
end
it " doesn't sign us in as the user " do
2019-02-15 15:39:39 +05:30
post :impersonate , params : { id : user . username }
2016-06-02 11:05:42 +05:30
expect ( warden . user ) . to eq ( admin )
end
end
context " when the user is not blocked " do
it " stores the impersonator in the session " do
2019-02-15 15:39:39 +05:30
post :impersonate , params : { id : user . username }
2016-06-02 11:05:42 +05:30
expect ( session [ :impersonator_id ] ) . to eq ( admin . id )
end
it " signs us in as the user " do
2019-02-15 15:39:39 +05:30
post :impersonate , params : { id : user . username }
2016-06-02 11:05:42 +05:30
expect ( warden . user ) . to eq ( user )
end
2019-10-12 21:52:04 +05:30
it 'logs the beginning of the impersonation event' do
expect ( Gitlab :: AppLogger ) . to receive ( :info ) . with ( " User #{ admin . username } has started impersonating #{ user . username } " ) . and_call_original
post :impersonate , params : { id : user . username }
end
2016-06-02 11:05:42 +05:30
it " redirects to root " do
2019-02-15 15:39:39 +05:30
post :impersonate , params : { id : user . username }
2016-06-02 11:05:42 +05:30
expect ( response ) . to redirect_to ( root_path )
end
it " shows a notice " do
2019-02-15 15:39:39 +05:30
post :impersonate , params : { id : user . username }
2016-06-02 11:05:42 +05:30
expect ( flash [ :alert ] ) . to eq ( " You are now impersonating #{ user . username } " )
end
2021-09-30 23:02:18 +05:30
it 'clears token session keys' do
session [ :github_access_token ] = SecureRandom . hex ( 8 )
post :impersonate , params : { id : user . username }
expect ( session [ :github_access_token ] ) . to be_nil
end
2016-06-02 11:05:42 +05:30
end
2019-02-15 15:39:39 +05:30
context " when impersonation is disabled " do
before do
stub_config_setting ( impersonation_enabled : false )
end
it " shows error page " do
post :impersonate , params : { id : user . username }
2020-03-13 15:44:24 +05:30
expect ( response ) . to have_gitlab_http_status ( :not_found )
2019-02-15 15:39:39 +05:30
end
end
2021-09-30 23:02:18 +05:30
context 'when impersonating an admin and attempting to impersonate again' do
let ( :admin2 ) { create ( :admin ) }
before do
post :impersonate , params : { id : admin2 . username }
end
it 'does not allow double impersonation' , :aggregate_failures do
post :impersonate , params : { id : user . username }
expect ( flash [ :alert ] ) . to eq ( _ ( 'You are already impersonating another user' ) )
expect ( warden . user ) . to eq ( admin2 )
end
end
2016-06-02 11:05:42 +05:30
end
2015-09-11 14:41:01 +05:30
end