debian-mirror-gitlab/spec/controllers/admin/users_controller_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

1031 lines
30 KiB
Ruby
Raw Normal View History

2019-07-31 22:56:46 +05:30
# frozen_string_literal: true
2015-09-11 14:41:01 +05:30
require 'spec_helper'
2020-06-23 00:09:42 +05:30
RSpec.describe Admin::UsersController do
2016-06-02 11:05:42 +05:30
let(:user) { create(:user) }
2020-03-13 15:44:24 +05:30
2019-12-21 20:55:43 +05:30
let_it_be(:admin) { create(:admin) }
2015-09-11 14:41:01 +05:30
before do
sign_in(admin)
end
2019-07-07 11:18:12 +05:30
describe 'GET #index' do
it 'retrieves all users' do
get :index
expect(assigns(:users)).to match_array([user, admin])
end
it 'filters by admins' do
get :index, params: { filter: 'admins' }
expect(assigns(:users)).to eq([admin])
end
2021-01-03 14:25:43 +05:30
it 'eager loads authorized projects association' do
get :index
expect(assigns(:users).first.association(:authorized_projects)).to be_loaded
end
2021-03-11 19:13:27 +05:30
2021-06-08 01:23:25 +05:30
context 'pagination' do
context 'when number of users is over the pagination limit' do
before do
stub_const('Admin::UsersController::PAGINATION_WITH_COUNT_LIMIT', 5)
allow(Gitlab::Database::Count).to receive(:approximate_counts).with([User]).and_return({ User => 6 })
end
it 'marks the relation for pagination without counts' do
get :index
expect(assigns(:users)).to be_a(Kaminari::PaginatableWithoutCount)
end
end
context 'when number of users is below the pagination limit' do
it 'marks the relation for pagination with counts' do
get :index
expect(assigns(:users)).not_to be_a(Kaminari::PaginatableWithoutCount)
end
end
end
end
2019-07-07 11:18:12 +05:30
describe 'GET :id' do
it 'finds a user case-insensitively' do
user = create(:user, username: 'CaseSensitive')
get :show, params: { id: user.username.downcase }
expect(response).to be_redirect
expect(response.location).to end_with(user.username)
end
2023-01-13 00:05:48 +05:30
describe 'impersonation_error_text' do
context 'when user can be impersonated' do
it 'sets impersonation_error_text to nil' do
get :show, params: { id: user.username.downcase }
2015-09-11 14:41:01 +05:30
2023-01-13 00:05:48 +05:30
expect(assigns(:impersonation_error_text)).to eq(nil)
end
end
2015-09-11 14:41:01 +05:30
2023-01-13 00:05:48 +05:30
context 'when impersonation is already in progress' do
let(:admin2) { create(:admin) }
2022-10-11 01:57:18 +05:30
2023-01-13 00:05:48 +05:30
before do
post :impersonate, params: { id: admin2.username }
end
it 'sets impersonation_error_text' do
get :show, params: { id: user.username.downcase }
expect(assigns(:impersonation_error_text)).to eq(_("You are already impersonating another user"))
end
2022-10-11 01:57:18 +05:30
end
2017-09-10 17:25:29 +05:30
2023-01-13 00:05:48 +05:30
context 'when user is blocked' do
before do
user.block
end
2017-09-10 17:25:29 +05:30
2023-01-13 00:05:48 +05:30
it 'sets impersonation_error_text' do
get :show, params: { id: user.username.downcase }
expect(assigns(:impersonation_error_text)).to eq(_("You cannot impersonate a blocked user"))
end
2022-10-11 01:57:18 +05:30
end
2017-09-10 17:25:29 +05:30
2023-01-13 00:05:48 +05:30
context "when the user's password is expired" do
before do
user.update!(password_expires_at: 1.day.ago)
end
2020-10-04 03:57:07 +05:30
2023-01-13 00:05:48 +05:30
it 'sets impersonation_error_text' do
get :show, params: { id: user.username.downcase }
expect(assigns(:impersonation_error_text)).to eq(_("You cannot impersonate a user with an expired password"))
end
end
2020-10-04 03:57:07 +05:30
2023-01-13 00:05:48 +05:30
context "when the user is internal" do
before do
user.update!(user_type: :migration_bot)
end
2020-10-04 03:57:07 +05:30
2023-01-13 00:05:48 +05:30
it 'sets impersonation_error_text' do
get :show, params: { id: user.username.downcase }
2020-10-04 03:57:07 +05:30
2023-01-13 00:05:48 +05:30
expect(assigns(:impersonation_error_text)).to eq(_("You cannot impersonate an internal user"))
end
end
2020-10-04 03:57:07 +05:30
2023-01-13 00:05:48 +05:30
context "when the user is a project bot" do
before do
user.update!(user_type: :project_bot)
end
it 'sets impersonation_error_text' do
get :show, params: { id: user.username.downcase }
expect(assigns(:impersonation_error_text)).to eq(_("You cannot impersonate a user who cannot log in"))
2022-10-11 01:57:18 +05:30
end
end
end
2023-01-13 00:05:48 +05:30
describe 'can_impersonate' do
context 'when user can be impersonated' do
it 'sets can_impersonate to true' do
get :show, params: { id: user.username.downcase }
expect(assigns(:can_impersonate)).to eq(true)
end
2022-10-11 01:57:18 +05:30
end
2023-01-13 00:05:48 +05:30
context 'when impersonation is already in progress' do
let(:admin2) { create(:admin) }
2022-10-11 01:57:18 +05:30
2023-01-13 00:05:48 +05:30
before do
post :impersonate, params: { id: admin2.username }
end
it 'sets can_impersonate to false' do
get :show, params: { id: user.username.downcase }
expect(assigns(:can_impersonate)).to eq(false)
end
2022-10-11 01:57:18 +05:30
end
2023-01-13 00:05:48 +05:30
context 'when user cannot log in' do
before do
user.update!(user_type: :project_bot)
end
it 'sets can_impersonate to false' do
get :show, params: { id: user.username.downcase }
2022-10-11 01:57:18 +05:30
2023-01-13 00:05:48 +05:30
expect(assigns(:can_impersonate)).to eq(false)
end
2022-10-11 01:57:18 +05:30
end
2023-01-13 00:05:48 +05:30
end
end
2022-10-11 01:57:18 +05:30
2023-01-13 00:05:48 +05:30
describe 'DELETE #destroy', :sidekiq_might_not_need_inline do
let(:project) { create(:project, namespace: user.namespace) }
let!(:issue) { create(:issue, author: user) }
2022-10-11 01:57:18 +05:30
2023-01-13 00:05:48 +05:30
before do
project.add_developer(user)
end
2020-10-04 03:57:07 +05:30
2023-01-13 00:05:48 +05:30
it 'initiates user removal' do
delete :destroy, params: { id: user.username }, format: :json
2020-10-04 03:57:07 +05:30
2023-01-13 00:05:48 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(
Users::GhostUserMigration.where(user: user,
initiator_user: admin,
hard_delete: false)
).to be_exists
end
2022-10-11 01:57:18 +05:30
2023-01-13 00:05:48 +05:30
it 'initiates user removal and passes hard delete option' do
delete :destroy, params: { id: user.username, hard_delete: true }, format: :json
expect(response).to have_gitlab_http_status(:ok)
expect(
Users::GhostUserMigration.where(user: user,
initiator_user: admin,
hard_delete: true)
).to be_exists
end
2022-10-11 01:57:18 +05:30
2023-01-13 00:05:48 +05:30
context 'prerequisites for account deletion' do
context 'solo-owned groups' do
let(:group) { create(:group) }
context 'if the user is the sole owner of at least one group' do
before do
create(:group_member, :owner, group: group, user: user)
end
context 'soft-delete' do
it 'fails' do
delete :destroy, params: { id: user.username }
message = s_('AdminUsers|You must transfer ownership or delete the groups owned by this user before you can delete their account')
expect(flash[:alert]).to eq(message)
expect(response).to have_gitlab_http_status(:see_other)
expect(response).to redirect_to admin_user_path(user)
expect(Users::GhostUserMigration).not_to exist
end
end
2022-10-11 01:57:18 +05:30
2023-01-13 00:05:48 +05:30
context 'hard-delete' do
it 'succeeds' do
delete :destroy, params: { id: user.username, hard_delete: true }
expect(response).to redirect_to(admin_users_path)
expect(flash[:notice]).to eq(_('The user is being deleted.'))
expect(
Users::GhostUserMigration.where(user: user,
initiator_user: admin,
hard_delete: true)
).to be_exists
2020-10-04 03:57:07 +05:30
end
end
end
end
end
2015-09-11 14:41:01 +05:30
end
2021-02-22 17:27:13 +05:30
describe 'DELETE #reject' do
subject { put :reject, params: { id: user.username } }
context 'when rejecting a pending user' do
let(:user) { create(:user, :blocked_pending_approval) }
2023-01-13 00:05:48 +05:30
it 'initiates user removal', :sidekiq_inline do
subject
2022-10-11 01:57:18 +05:30
2023-01-13 00:05:48 +05:30
expect(
Users::GhostUserMigration.where(user: user,
initiator_user: admin)
).to be_exists
2021-02-22 17:27:13 +05:30
end
it 'displays the rejection message' do
subject
2022-08-27 11:52:29 +05:30
expect(response).to redirect_to(admin_user_path(user))
2021-02-22 17:27:13 +05:30
expect(flash[:notice]).to eq("You've rejected #{user.name}")
end
it 'sends the user a rejection email' do
expect_next_instance_of(NotificationService) do |notification|
2021-11-11 11:23:49 +05:30
allow(notification).to receive(:user_admin_rejection).with(user.name, user.notification_email_or_default)
2021-02-22 17:27:13 +05:30
end
subject
end
end
context 'when user is not pending' do
let(:user) { create(:user, state: 'active') }
it 'does not reject and delete the user' do
subject
expect(User.exists?(user.id)).to be_truthy
end
it 'displays the error' do
subject
2021-11-11 11:23:49 +05:30
expect(flash[:alert]).to eq('User does not have a pending request')
2021-02-22 17:27:13 +05:30
end
it 'does not email the user' do
expect(NotificationService).not_to receive(:new)
subject
end
end
end
2021-01-03 14:25:43 +05:30
describe 'PUT #approve' do
let(:user) { create(:user, :blocked_pending_approval) }
subject { put :approve, params: { id: user.username } }
2021-01-29 00:20:46 +05:30
context 'when successful' do
it 'activates the user' do
2021-01-03 14:25:43 +05:30
subject
2021-01-29 00:20:46 +05:30
user.reload
expect(user).to be_active
expect(flash[:notice]).to eq('Successfully approved')
2021-01-03 14:25:43 +05:30
end
2021-01-29 00:20:46 +05:30
it 'emails the user on approval' do
expect(DeviseMailer).to receive(:user_admin_approval).with(user).and_call_original
expect { subject }.to have_enqueued_mail(DeviseMailer, :user_admin_approval)
2021-01-03 14:25:43 +05:30
end
2021-01-29 00:20:46 +05:30
end
2021-01-03 14:25:43 +05:30
2021-01-29 00:20:46 +05:30
context 'when unsuccessful' do
let(:user) { create(:user, :blocked) }
2021-01-03 14:25:43 +05:30
2021-01-29 00:20:46 +05:30
it 'displays the error' do
subject
2021-01-03 14:25:43 +05:30
2021-03-11 19:13:27 +05:30
expect(flash[:alert]).to eq('The user you are trying to approve is not pending approval')
2021-01-03 14:25:43 +05:30
end
2021-01-29 00:20:46 +05:30
it 'does not activate the user' do
subject
2021-01-03 14:25:43 +05:30
2021-01-29 00:20:46 +05:30
user.reload
expect(user).not_to be_active
end
2021-01-03 14:25:43 +05:30
2021-01-29 00:20:46 +05:30
it 'does not email the pending user' do
expect { subject }.not_to have_enqueued_mail(DeviseMailer, :user_admin_approval)
2021-01-03 14:25:43 +05:30
end
end
end
2019-12-21 20:55:43 +05:30
describe 'PUT #activate' do
shared_examples 'a request that activates the user' do
it 'activates the user' do
put :activate, params: { id: user.username }
user.reload
expect(user.active?).to be_truthy
expect(flash[:notice]).to eq('Successfully activated')
end
end
context 'for a deactivated user' do
before do
user.deactivate
end
it_behaves_like 'a request that activates the user'
end
context 'for an active user' do
it_behaves_like 'a request that activates the user'
end
context 'for a blocked user' do
before do
user.block
end
it 'does not activate the user' do
put :activate, params: { id: user.username }
user.reload
expect(user.active?).to be_falsey
expect(flash[:notice]).to eq('Error occurred. A blocked user must be unblocked to be activated')
end
end
end
describe 'PUT #deactivate' do
shared_examples 'a request that deactivates the user' do
it 'deactivates the user' do
put :deactivate, params: { id: user.username }
user.reload
expect(user.deactivated?).to be_truthy
expect(flash[:notice]).to eq('Successfully deactivated')
end
end
context 'for an active user' do
let(:activity) { {} }
let(:user) { create(:user, **activity) }
context 'with no recent activity' do
2022-10-11 01:57:18 +05:30
let(:activity) { { last_activity_on: Gitlab::CurrentSettings.deactivate_dormant_users_period.next.days.ago } }
2019-12-21 20:55:43 +05:30
it_behaves_like 'a request that deactivates the user'
end
context 'with recent activity' do
2022-10-11 01:57:18 +05:30
let(:activity) { { last_activity_on: Gitlab::CurrentSettings.deactivate_dormant_users_period.pred.days.ago } }
2019-12-21 20:55:43 +05:30
it 'does not deactivate the user' do
put :deactivate, params: { id: user.username }
user.reload
expect(user.deactivated?).to be_falsey
2022-10-11 01:57:18 +05:30
expect(flash[:notice]).to eq("The user you are trying to deactivate has been active in the past #{Gitlab::CurrentSettings.deactivate_dormant_users_period} days and cannot be deactivated")
2019-12-21 20:55:43 +05:30
end
end
end
context 'for a deactivated user' do
before do
user.deactivate
end
it_behaves_like 'a request that deactivates the user'
end
context 'for a blocked user' do
before do
user.block
end
it 'does not deactivate the user' do
put :deactivate, params: { id: user.username }
user.reload
expect(user.deactivated?).to be_falsey
expect(flash[:notice]).to eq('Error occurred. A blocked user cannot be deactivated')
end
end
2021-01-03 14:25:43 +05:30
context 'for an internal user' do
it 'does not deactivate the user' do
internal_user = User.alert_bot
put :deactivate, params: { id: internal_user.username }
expect(internal_user.reload.deactivated?).to be_falsey
expect(flash[:notice]).to eq('Internal users cannot be deactivated')
end
end
2019-12-21 20:55:43 +05:30
end
2015-10-24 18:46:33 +05:30
describe 'PUT block/:id' do
it 'blocks user' do
2019-02-15 15:39:39 +05:30
put :block, params: { id: user.username }
2015-10-24 18:46:33 +05:30
user.reload
expect(user.blocked?).to be_truthy
2020-01-01 13:55:28 +05:30
expect(flash[:notice]).to eq _('Successfully blocked')
2015-10-24 18:46:33 +05:30
end
end
describe 'PUT unblock/:id' do
context 'ldap blocked users' do
let(:user) { create(:omniauth_user, provider: 'ldapmain') }
2015-10-24 18:46:33 +05:30
before do
user.ldap_block
end
2016-09-13 17:45:13 +05:30
it 'does not unblock user' do
2019-02-15 15:39:39 +05:30
put :unblock, params: { id: user.username }
user.reload
expect(user.blocked?).to be_truthy
2020-01-01 13:55:28 +05:30
expect(flash[:alert]).to eq _('This user cannot be unlocked manually from GitLab')
end
2015-10-24 18:46:33 +05:30
end
context 'manually blocked users' do
before do
user.block
end
it 'unblocks user' do
2019-02-15 15:39:39 +05:30
put :unblock, params: { id: user.username }
user.reload
expect(user.blocked?).to be_falsey
2020-01-01 13:55:28 +05:30
expect(flash[:notice]).to eq _('Successfully unblocked')
end
2015-10-24 18:46:33 +05:30
end
end
2021-10-27 15:23:28 +05:30
describe 'PUT ban/:id', :aggregate_failures do
2021-06-08 01:23:25 +05:30
context 'when ban_user_feature_flag is enabled' do
it 'bans user' do
put :ban, params: { id: user.username }
2021-10-27 15:23:28 +05:30
expect(user.reload.banned?).to be_truthy
2021-06-08 01:23:25 +05:30
expect(flash[:notice]).to eq _('Successfully banned')
end
context 'when unsuccessful' do
let(:user) { create(:user, :blocked) }
it 'does not ban user' do
put :ban, params: { id: user.username }
user.reload
expect(user.banned?).to be_falsey
expect(flash[:alert]).to eq _('Error occurred. User was not banned')
end
end
end
context 'when ban_user_feature_flag is not enabled' do
before do
stub_feature_flags(ban_user_feature_flag: false)
end
it 'does not ban user, renders 404' do
put :ban, params: { id: user.username }
2021-10-27 15:23:28 +05:30
expect(user.reload.banned?).to be_falsey
2021-06-08 01:23:25 +05:30
expect(response).to have_gitlab_http_status(:not_found)
end
end
end
2021-10-27 15:23:28 +05:30
describe 'PUT unban/:id', :aggregate_failures do
2021-06-08 01:23:25 +05:30
let(:banned_user) { create(:user, :banned) }
it 'unbans user' do
put :unban, params: { id: banned_user.username }
2021-10-27 15:23:28 +05:30
expect(banned_user.reload.banned?).to be_falsey
2021-06-08 01:23:25 +05:30
expect(flash[:notice]).to eq _('Successfully unbanned')
end
end
2015-09-11 14:41:01 +05:30
describe 'PUT unlock/:id' do
before do
request.env["HTTP_REFERER"] = "/"
user.lock_access!
end
it 'unlocks user' do
2019-02-15 15:39:39 +05:30
put :unlock, params: { id: user.username }
2015-09-11 14:41:01 +05:30
user.reload
expect(user.access_locked?).to be_falsey
2021-10-27 15:23:28 +05:30
expect(flash[:notice]).to eq _('Successfully unlocked')
2015-09-11 14:41:01 +05:30
end
end
describe 'PUT confirm/:id' do
2022-03-02 08:16:31 +05:30
shared_examples_for 'confirms the user' do
it 'confirms the user' do
put :confirm, params: { id: user.username }
user.reload
expect(user.confirmed?).to be_truthy
end
end
let(:expired_confirmation_sent_at) { Date.today - User.confirm_within - 7.days }
let(:extant_confirmation_sent_at) { Date.today }
let(:user) do
create(:user, :unconfirmed).tap do |user|
user.update!(confirmation_sent_at: confirmation_sent_at)
end
end
2015-09-11 14:41:01 +05:30
before do
request.env["HTTP_REFERER"] = "/"
end
2022-03-02 08:16:31 +05:30
context 'when the confirmation period has expired' do
let(:confirmation_sent_at) { expired_confirmation_sent_at }
it_behaves_like 'confirms the user'
end
context 'when the confirmation period has not expired' do
let(:confirmation_sent_at) { extant_confirmation_sent_at }
it_behaves_like 'confirms the user'
2015-09-11 14:41:01 +05:30
end
end
describe 'PATCH disable_two_factor' do
2020-11-24 15:15:51 +05:30
subject { patch :disable_two_factor, params: { id: user.to_param } }
2015-09-11 14:41:01 +05:30
2020-11-24 15:15:51 +05:30
context 'for a user that has 2FA enabled' do
let(:user) { create(:user, :two_factor) }
2015-09-11 14:41:01 +05:30
2020-11-24 15:15:51 +05:30
it 'disables 2FA for the user' do
subject
2015-09-11 14:41:01 +05:30
2020-11-24 15:15:51 +05:30
expect(user.reload.two_factor_enabled?).to eq(false)
end
it 'redirects back' do
subject
2015-09-11 14:41:01 +05:30
2020-11-24 15:15:51 +05:30
expect(response).to redirect_to(admin_user_path(user))
end
it 'displays a notice on success' do
subject
2015-09-11 14:41:01 +05:30
2020-11-24 15:15:51 +05:30
expect(flash[:notice])
.to eq _('Two-factor authentication has been disabled for this user')
end
2015-09-11 14:41:01 +05:30
end
2020-11-24 15:15:51 +05:30
context 'for a user that does not have 2FA enabled' do
it 'redirects back' do
subject
expect(response).to redirect_to(admin_user_path(user))
end
it 'displays an alert on failure' do
subject
expect(flash[:alert])
.to eq _('Two-factor authentication is not enabled for this user')
end
2015-09-11 14:41:01 +05:30
end
end
2016-06-02 11:05:42 +05:30
2017-08-17 22:00:37 +05:30
describe 'POST create' do
it 'creates the user' do
2019-02-15 15:39:39 +05:30
expect { post :create, params: { user: attributes_for(:user) } }.to change { User.count }.by(1)
2017-08-17 22:00:37 +05:30
end
it 'shows only one error message for an invalid email' do
2019-02-15 15:39:39 +05:30
post :create, params: { user: attributes_for(:user, email: 'bogus') }
2020-01-01 13:55:28 +05:30
errors = assigns[:user].errors
expect(errors).to contain_exactly(errors.full_message(:email, I18n.t('errors.messages.invalid')))
2017-08-17 22:00:37 +05:30
end
2020-06-23 00:09:42 +05:30
context 'admin notes' do
it 'creates the user with note' do
note = '2020-05-12 | Note | DCMA | Link'
user_params = attributes_for(:user, note: note)
expect { post :create, params: { user: user_params } }.to change { User.count }.by(1)
new_user = User.last
expect(new_user.note).to eq(note)
end
end
2017-08-17 22:00:37 +05:30
end
2016-06-02 11:05:42 +05:30
describe 'POST update' do
context 'when the password has changed' do
2021-01-03 14:25:43 +05:30
def update_password(user, password = User.random_password, password_confirmation = password, format = :html)
2016-06-02 11:05:42 +05:30
params = {
id: user.to_param,
user: {
password: password,
2020-11-24 15:15:51 +05:30
password_confirmation: password_confirmation
2016-06-02 11:05:42 +05:30
}
}
2021-01-03 14:25:43 +05:30
post :update, params: params, format: format
2016-06-02 11:05:42 +05:30
end
2020-11-24 15:15:51 +05:30
context 'when admin changes their own password' do
context 'when password is valid' do
it 'updates the password' do
expect { update_password(admin) }
.to change { admin.reload.encrypted_password }
end
it 'does not set the new password to expire immediately' do
expect { update_password(admin) }
.not_to change { admin.reload.password_expired? }
end
it 'does not enqueue the `admin changed your password` email' do
expect { update_password(admin) }
.not_to have_enqueued_mail(DeviseMailer, :password_change_by_admin)
end
2018-03-17 18:26:18 +05:30
2020-11-24 15:15:51 +05:30
it 'enqueues the `password changed` email' do
expect { update_password(admin) }
.to have_enqueued_mail(DeviseMailer, :password_change)
end
2018-03-17 18:26:18 +05:30
end
end
2020-11-24 15:15:51 +05:30
context 'when admin changes the password of another user' do
context 'when the new password is valid' do
it 'redirects to the user' do
update_password(user)
2016-06-02 11:05:42 +05:30
2020-11-24 15:15:51 +05:30
expect(response).to redirect_to(admin_user_path(user))
end
2016-06-02 11:05:42 +05:30
2020-11-24 15:15:51 +05:30
it 'updates the password' do
expect { update_password(user) }
.to change { user.reload.encrypted_password }
end
2016-06-02 11:05:42 +05:30
2020-11-24 15:15:51 +05:30
it 'sets the new password to expire immediately' do
expect { update_password(user) }
.to change { user.reload.password_expired? }.from(false).to(true)
end
it 'enqueues the `admin changed your password` email' do
expect { update_password(user) }
.to have_enqueued_mail(DeviseMailer, :password_change_by_admin)
end
it 'does not enqueue the `password changed` email' do
expect { update_password(user) }
.not_to have_enqueued_mail(DeviseMailer, :password_change)
end
2016-06-02 11:05:42 +05:30
end
end
context 'when the new password is invalid' do
2020-11-24 15:15:51 +05:30
let(:password) { 'invalid' }
2016-06-02 11:05:42 +05:30
it 'shows the edit page again' do
2020-11-24 15:15:51 +05:30
update_password(user, password)
2016-06-02 11:05:42 +05:30
expect(response).to render_template(:edit)
end
it 'returns the error message' do
2020-11-24 15:15:51 +05:30
update_password(user, password)
2016-06-02 11:05:42 +05:30
expect(assigns[:user].errors).to contain_exactly(a_string_matching(/too short/))
end
it 'does not update the password' do
2020-11-24 15:15:51 +05:30
expect { update_password(user, password) }
2018-03-17 18:26:18 +05:30
.not_to change { user.reload.encrypted_password }
2016-06-02 11:05:42 +05:30
end
end
context 'when the new password does not match the password confirmation' do
2022-08-27 11:52:29 +05:30
let(:password) { User.random_password }
let(:password_confirmation) { User.random_password }
2020-11-24 15:15:51 +05:30
2016-06-02 11:05:42 +05:30
it 'shows the edit page again' do
2020-11-24 15:15:51 +05:30
update_password(user, password, password_confirmation)
2016-06-02 11:05:42 +05:30
expect(response).to render_template(:edit)
end
it 'returns the error message' do
2020-11-24 15:15:51 +05:30
update_password(user, password, password_confirmation)
2016-06-02 11:05:42 +05:30
expect(assigns[:user].errors).to contain_exactly(a_string_matching(/doesn't match/))
end
it 'does not update the password' do
2020-11-24 15:15:51 +05:30
expect { update_password(user, password, password_confirmation) }
2018-03-17 18:26:18 +05:30
.not_to change { user.reload.encrypted_password }
2016-06-02 11:05:42 +05:30
end
end
2021-01-03 14:25:43 +05:30
context 'when the update fails' do
let(:password) { User.random_password }
before do
expect_next_instance_of(Users::UpdateService) do |service|
allow(service).to receive(:execute).and_return({ message: 'failed', status: :error })
end
end
it 'returns a 500 error' do
expect { update_password(admin, password, password, :json) }
.not_to change { admin.reload.password_expired? }
expect(response).to have_gitlab_http_status(:error)
end
end
2016-06-02 11:05:42 +05:30
end
2020-06-23 00:09:42 +05:30
context 'admin notes' do
it 'updates the note for the user' do
note = '2020-05-12 | Note | DCMA | Link'
params = {
id: user.to_param,
user: {
note: note
}
}
expect { post :update, params: params }.to change { user.reload.note }.to(note)
end
end
2021-09-04 01:27:46 +05:30
context 'when updating credit card validation for user account' do
let(:params) do
{
id: user.to_param,
user: user_params
}
end
shared_examples 'no credit card validation param' do
let(:user_params) { { name: 'foo' } }
it 'does not change credit card validation' do
expect { post :update, params: params }.not_to change(Users::CreditCardValidation, :count)
end
end
context 'when user has a credit card validation' do
before do
user.create_credit_card_validation!(credit_card_validated_at: Time.zone.now)
end
context 'with unchecked credit card validation' do
let(:user_params) do
{ credit_card_validation_attributes: { credit_card_validated_at: '0' } }
end
it 'deletes credit_card_validation' do
expect { post :update, params: params }.to change { Users::CreditCardValidation.count }.by(-1)
end
end
context 'with checked credit card validation' do
let(:user_params) do
{ credit_card_validation_attributes: { credit_card_validated_at: '1' } }
end
it 'does not change credit_card_validated_at' do
expect { post :update, params: params }.not_to change { user.credit_card_validated_at }
end
end
it_behaves_like 'no credit card validation param'
end
context 'when user does not have a credit card validation' do
context 'with checked credit card validation' do
let(:user_params) do
{ credit_card_validation_attributes: { credit_card_validated_at: '1' } }
end
it 'creates new credit card validation' do
expect { post :update, params: params }.to change { Users::CreditCardValidation.count }.by 1
end
end
context 'with unchecked credit card validation' do
let(:user_params) do
{ credit_card_validation_attributes: { credit_card_validated_at: '0' } }
end
it 'does not blow up' do
expect { post :update, params: params }.not_to change(Users::CreditCardValidation, :count)
end
end
it_behaves_like 'no credit card validation param'
end
context 'invalid parameters' do
let(:user_params) do
{ credit_card_validation_attributes: { credit_card_validated_at: Time.current.iso8601 } }
end
it_behaves_like 'no credit card validation param'
end
context 'with non permitted params' do
let(:user_params) do
{ credit_card_validation_attributes: { _destroy: true } }
end
before do
user.create_credit_card_validation!(credit_card_validated_at: Time.zone.now)
end
it_behaves_like 'no credit card validation param'
end
end
2016-06-02 11:05:42 +05:30
end
2020-04-22 19:07:51 +05:30
describe "DELETE #remove_email" do
it 'deletes the email' do
email = create(:email, user: user)
delete :remove_email, params: { id: user.username, email_id: email.id }
expect(user.reload.emails).not_to include(email)
expect(flash[:notice]).to eq('Successfully removed email.')
end
end
2016-06-02 11:05:42 +05:30
describe "POST impersonate" do
context "when the user is blocked" do
before do
user.block!
end
it "shows a notice" do
2019-02-15 15:39:39 +05:30
post :impersonate, params: { id: user.username }
2016-06-02 11:05:42 +05:30
2020-01-01 13:55:28 +05:30
expect(flash[:alert]).to eq(_('You cannot impersonate a blocked user'))
2016-06-02 11:05:42 +05:30
end
it "doesn't sign us in as the user" do
2019-02-15 15:39:39 +05:30
post :impersonate, params: { id: user.username }
2016-06-02 11:05:42 +05:30
expect(warden.user).to eq(admin)
end
end
context "when the user is not blocked" do
it "stores the impersonator in the session" do
2019-02-15 15:39:39 +05:30
post :impersonate, params: { id: user.username }
2016-06-02 11:05:42 +05:30
expect(session[:impersonator_id]).to eq(admin.id)
end
it "signs us in as the user" do
2019-02-15 15:39:39 +05:30
post :impersonate, params: { id: user.username }
2016-06-02 11:05:42 +05:30
expect(warden.user).to eq(user)
end
2019-10-12 21:52:04 +05:30
it 'logs the beginning of the impersonation event' do
expect(Gitlab::AppLogger).to receive(:info).with("User #{admin.username} has started impersonating #{user.username}").and_call_original
post :impersonate, params: { id: user.username }
end
2016-06-02 11:05:42 +05:30
it "redirects to root" do
2019-02-15 15:39:39 +05:30
post :impersonate, params: { id: user.username }
2016-06-02 11:05:42 +05:30
expect(response).to redirect_to(root_path)
end
it "shows a notice" do
2019-02-15 15:39:39 +05:30
post :impersonate, params: { id: user.username }
2016-06-02 11:05:42 +05:30
expect(flash[:alert]).to eq("You are now impersonating #{user.username}")
end
2021-09-30 23:02:18 +05:30
it 'clears token session keys' do
session[:github_access_token] = SecureRandom.hex(8)
post :impersonate, params: { id: user.username }
expect(session[:github_access_token]).to be_nil
end
2023-01-13 00:05:48 +05:30
context "when the user's password is expired" do
before do
user.update!(password_expires_at: 1.day.ago)
end
it "shows a notice" do
post :impersonate, params: { id: user.username }
expect(flash[:alert]).to eq(_('You cannot impersonate a user with an expired password'))
end
it "doesn't sign us in as the user" do
post :impersonate, params: { id: user.username }
expect(warden.user).to eq(admin)
end
end
context "when the user is internal" do
before do
user.update!(user_type: :migration_bot)
end
it "shows a notice" do
post :impersonate, params: { id: user.username }
expect(flash[:alert]).to eq(_("You cannot impersonate an internal user"))
end
it "doesn't sign us in as the user" do
post :impersonate, params: { id: user.username }
expect(warden.user).to eq(admin)
end
end
context "when the user is a project bot" do
before do
user.update!(user_type: :project_bot)
end
it "shows a notice" do
post :impersonate, params: { id: user.username }
expect(flash[:alert]).to eq(_("You cannot impersonate a user who cannot log in"))
end
it "doesn't sign us in as the user" do
post :impersonate, params: { id: user.username }
expect(warden.user).to eq(admin)
end
end
2016-06-02 11:05:42 +05:30
end
2019-02-15 15:39:39 +05:30
context "when impersonation is disabled" do
before do
stub_config_setting(impersonation_enabled: false)
end
it "shows error page" do
post :impersonate, params: { id: user.username }
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2019-02-15 15:39:39 +05:30
end
end
2021-09-30 23:02:18 +05:30
context 'when impersonating an admin and attempting to impersonate again' do
let(:admin2) { create(:admin) }
before do
post :impersonate, params: { id: admin2.username }
end
it 'does not allow double impersonation', :aggregate_failures do
post :impersonate, params: { id: user.username }
expect(flash[:alert]).to eq(_('You are already impersonating another user'))
expect(warden.user).to eq(admin2)
end
end
2016-06-02 11:05:42 +05:30
end
2015-09-11 14:41:01 +05:30
end