2015-04-26 12:48:37 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe ApplicationSetting, models: true do
|
2015-11-26 14:37:03 +05:30
|
|
|
let(:setting) { ApplicationSetting.create_from_defaults }
|
2015-09-11 14:41:01 +05:30
|
|
|
|
2015-11-26 14:37:03 +05:30
|
|
|
it { expect(setting).to be_valid }
|
2015-09-11 14:41:01 +05:30
|
|
|
|
2015-12-23 02:04:40 +05:30
|
|
|
describe 'validations' do
|
|
|
|
let(:http) { 'http://example.com' }
|
|
|
|
let(:https) { 'https://example.com' }
|
|
|
|
let(:ftp) { 'ftp://example.com' }
|
|
|
|
|
|
|
|
it { is_expected.to allow_value(nil).for(:home_page_url) }
|
|
|
|
it { is_expected.to allow_value(http).for(:home_page_url) }
|
|
|
|
it { is_expected.to allow_value(https).for(:home_page_url) }
|
|
|
|
it { is_expected.not_to allow_value(ftp).for(:home_page_url) }
|
|
|
|
|
|
|
|
it { is_expected.to allow_value(nil).for(:after_sign_out_path) }
|
|
|
|
it { is_expected.to allow_value(http).for(:after_sign_out_path) }
|
|
|
|
it { is_expected.to allow_value(https).for(:after_sign_out_path) }
|
|
|
|
it { is_expected.not_to allow_value(ftp).for(:after_sign_out_path) }
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2016-06-02 11:05:42 +05:30
|
|
|
describe 'disabled_oauth_sign_in_sources validations' do
|
|
|
|
before do
|
|
|
|
allow(Devise).to receive(:omniauth_providers).and_return([:github])
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to allow_value(['github']).for(:disabled_oauth_sign_in_sources) }
|
|
|
|
it { is_expected.not_to allow_value(['test']).for(:disabled_oauth_sign_in_sources) }
|
|
|
|
end
|
|
|
|
|
2016-04-02 18:10:28 +05:30
|
|
|
it { is_expected.to validate_presence_of(:max_attachment_size) }
|
|
|
|
|
|
|
|
it do
|
|
|
|
is_expected.to validate_numericality_of(:max_attachment_size)
|
|
|
|
.only_integer
|
|
|
|
.is_greater_than(0)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'an object with email-formated attributes', :admin_notification_email do
|
|
|
|
subject { setting }
|
|
|
|
end
|
2016-08-24 12:49:21 +05:30
|
|
|
|
2016-11-24 13:41:30 +05:30
|
|
|
# Upgraded databases will have this sort of content
|
|
|
|
context 'repository_storages is a String, not an Array' do
|
|
|
|
before { setting.__send__(:raw_write_attribute, :repository_storages, 'default') }
|
|
|
|
|
|
|
|
it { expect(setting.repository_storages_before_type_cast).to eq('default') }
|
|
|
|
it { expect(setting.repository_storages).to eq(['default']) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'repository storages' do
|
2016-08-24 12:49:21 +05:30
|
|
|
before do
|
2016-11-24 13:41:30 +05:30
|
|
|
storages = {
|
|
|
|
'custom1' => 'tmp/tests/custom_repositories_1',
|
|
|
|
'custom2' => 'tmp/tests/custom_repositories_2',
|
|
|
|
'custom3' => 'tmp/tests/custom_repositories_3',
|
|
|
|
|
|
|
|
}
|
2016-08-24 12:49:21 +05:30
|
|
|
allow(Gitlab.config.repositories).to receive(:storages).and_return(storages)
|
|
|
|
end
|
|
|
|
|
2016-11-24 13:41:30 +05:30
|
|
|
describe 'inclusion' do
|
|
|
|
it { is_expected.to allow_value('custom1').for(:repository_storages) }
|
|
|
|
it { is_expected.to allow_value(['custom2', 'custom3']).for(:repository_storages) }
|
|
|
|
it { is_expected.not_to allow_value('alternative').for(:repository_storages) }
|
|
|
|
it { is_expected.not_to allow_value(['alternative', 'custom1']).for(:repository_storages) }
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'presence' do
|
|
|
|
it { is_expected.not_to allow_value([]).for(:repository_storages) }
|
|
|
|
it { is_expected.not_to allow_value("").for(:repository_storages) }
|
|
|
|
it { is_expected.not_to allow_value(nil).for(:repository_storages) }
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '.pick_repository_storage' do
|
|
|
|
it 'uses Array#sample to pick a random storage' do
|
|
|
|
array = double('array', sample: 'random')
|
|
|
|
expect(setting).to receive(:repository_storages).and_return(array)
|
|
|
|
|
|
|
|
expect(setting.pick_repository_storage).to eq('random')
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#repository_storage' do
|
|
|
|
it 'returns the first storage' do
|
|
|
|
setting.repository_storages = ['good', 'bad']
|
|
|
|
|
|
|
|
expect(setting.repository_storage).to eq('good')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#repository_storage=' do
|
|
|
|
it 'overwrites repository_storages' do
|
|
|
|
setting.repository_storage = 'overwritten'
|
|
|
|
|
|
|
|
expect(setting.repository_storages).to eq(['overwritten'])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-08-24 12:49:21 +05:30
|
|
|
end
|
2015-12-23 02:04:40 +05:30
|
|
|
end
|
|
|
|
|
2015-11-26 14:37:03 +05:30
|
|
|
context 'restricted signup domains' do
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'sets single domain' do
|
2016-08-24 12:49:21 +05:30
|
|
|
setting.domain_whitelist_raw = 'example.com'
|
|
|
|
expect(setting.domain_whitelist).to eq(['example.com'])
|
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'sets multiple domains with spaces' do
|
2016-08-24 12:49:21 +05:30
|
|
|
setting.domain_whitelist_raw = 'example.com *.example.com'
|
|
|
|
expect(setting.domain_whitelist).to eq(['example.com', '*.example.com'])
|
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'sets multiple domains with newlines and a space' do
|
2016-08-24 12:49:21 +05:30
|
|
|
setting.domain_whitelist_raw = "example.com\n *.example.com"
|
|
|
|
expect(setting.domain_whitelist).to eq(['example.com', '*.example.com'])
|
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'sets multiple domains with commas' do
|
2016-08-24 12:49:21 +05:30
|
|
|
setting.domain_whitelist_raw = "example.com, *.example.com"
|
|
|
|
expect(setting.domain_whitelist).to eq(['example.com', '*.example.com'])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'blacklisted signup domains' do
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'sets single domain' do
|
2016-08-24 12:49:21 +05:30
|
|
|
setting.domain_blacklist_raw = 'example.com'
|
|
|
|
expect(setting.domain_blacklist).to contain_exactly('example.com')
|
2015-09-11 14:41:01 +05:30
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'sets multiple domains with spaces' do
|
2016-08-24 12:49:21 +05:30
|
|
|
setting.domain_blacklist_raw = 'example.com *.example.com'
|
|
|
|
expect(setting.domain_blacklist).to contain_exactly('example.com', '*.example.com')
|
2015-09-11 14:41:01 +05:30
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'sets multiple domains with newlines and a space' do
|
2016-08-24 12:49:21 +05:30
|
|
|
setting.domain_blacklist_raw = "example.com\n *.example.com"
|
|
|
|
expect(setting.domain_blacklist).to contain_exactly('example.com', '*.example.com')
|
2015-09-11 14:41:01 +05:30
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'sets multiple domains with commas' do
|
2016-08-24 12:49:21 +05:30
|
|
|
setting.domain_blacklist_raw = "example.com, *.example.com"
|
|
|
|
expect(setting.domain_blacklist).to contain_exactly('example.com', '*.example.com')
|
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'sets multiple domains with semicolon' do
|
2016-08-24 12:49:21 +05:30
|
|
|
setting.domain_blacklist_raw = "example.com; *.example.com"
|
|
|
|
expect(setting.domain_blacklist).to contain_exactly('example.com', '*.example.com')
|
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'sets multiple domains with mixture of everything' do
|
2016-08-24 12:49:21 +05:30
|
|
|
setting.domain_blacklist_raw = "example.com; *.example.com\n test.com\sblock.com yes.com"
|
|
|
|
expect(setting.domain_blacklist).to contain_exactly('example.com', '*.example.com', 'test.com', 'block.com', 'yes.com')
|
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'sets multiple domain with file' do
|
2016-08-24 12:49:21 +05:30
|
|
|
setting.domain_blacklist_file = File.open(Rails.root.join('spec/fixtures/', 'domain_blacklist.txt'))
|
|
|
|
expect(setting.domain_blacklist).to contain_exactly('example.com', 'test.com', 'foo.bar')
|
2015-09-11 14:41:01 +05:30
|
|
|
end
|
|
|
|
end
|
2015-04-26 12:48:37 +05:30
|
|
|
end
|