debian-mirror-gitlab/spec/models/abuse_report_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

94 lines
2.7 KiB
Ruby
Raw Normal View History

2019-07-07 11:18:12 +05:30
# frozen_string_literal: true
2019-12-04 20:38:33 +05:30
require 'spec_helper'
2015-09-11 14:41:01 +05:30
2023-03-17 16:20:25 +05:30
RSpec.describe AbuseReport, feature_category: :insider_threat do
2020-03-13 15:44:24 +05:30
let_it_be(:report, reload: true) { create(:abuse_report) }
let_it_be(:user, reload: true) { create(:admin) }
2021-09-30 23:02:18 +05:30
2018-03-17 18:26:18 +05:30
subject { report }
2015-09-11 14:41:01 +05:30
it { expect(subject).to be_valid }
2015-10-24 18:46:33 +05:30
describe 'associations' do
it { is_expected.to belong_to(:reporter).class_name('User') }
it { is_expected.to belong_to(:user) }
2016-11-03 12:29:30 +05:30
it "aliases reporter to author" do
expect(subject.author).to be(subject.reporter)
end
2015-10-24 18:46:33 +05:30
end
describe 'validations' do
2023-03-17 16:20:25 +05:30
let(:http) { 'http://gitlab.com' }
let(:https) { 'https://gitlab.com' }
let(:ftp) { 'ftp://example.com' }
let(:javascript) { 'javascript:alert(window.opener.document.location)' }
2015-10-24 18:46:33 +05:30
it { is_expected.to validate_presence_of(:reporter) }
it { is_expected.to validate_presence_of(:user) }
it { is_expected.to validate_presence_of(:message) }
2023-03-17 16:20:25 +05:30
it { is_expected.to validate_presence_of(:category) }
it do
is_expected.to validate_uniqueness_of(:user_id)
.scoped_to([:reporter_id, :category])
.with_message('You have already reported this user')
end
it { is_expected.to validate_length_of(:reported_from_url).is_at_most(512).allow_blank }
it { is_expected.to allow_value(http).for(:reported_from_url) }
it { is_expected.to allow_value(https).for(:reported_from_url) }
it { is_expected.not_to allow_value(ftp).for(:reported_from_url) }
it { is_expected.not_to allow_value(javascript).for(:reported_from_url) }
it { is_expected.to allow_value('http://localhost:9000').for(:reported_from_url) }
it { is_expected.to allow_value('https://gitlab.com').for(:reported_from_url) }
2015-10-24 18:46:33 +05:30
end
describe '#remove_user' do
it 'blocks the user' do
2016-06-02 11:05:42 +05:30
expect { subject.remove_user(deleted_by: user) }.to change { subject.user.blocked? }.to(true)
end
2016-06-02 11:05:42 +05:30
it 'lets a worker delete the user' do
2022-07-16 23:28:13 +05:30
expect(DeleteUserWorker).to receive(:perform_async).with(user.id, subject.user.id, { hard_delete: true })
2016-06-02 11:05:42 +05:30
subject.remove_user(deleted_by: user)
end
end
describe '#notify' do
it 'delivers' do
2017-09-10 17:25:29 +05:30
expect(AbuseReportMailer).to receive(:notify).with(subject.id)
.and_return(spy)
subject.notify
end
it 'returns early when not persisted' do
report = build(:abuse_report)
expect(AbuseReportMailer).not_to receive(:notify)
report.notify
end
end
2023-03-17 16:20:25 +05:30
describe 'enums' do
let(:categories) do
{
spam: 1,
offensive: 2,
phishing: 3,
crypto: 4,
credentials: 5,
copyright: 6,
malware: 7,
other: 8
}
end
it { is_expected.to define_enum_for(:category).with_values(**categories) }
end
2015-09-11 14:41:01 +05:30
end