debian-mirror-gitlab/spec/models/authentication_event_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

90 lines
2.7 KiB
Ruby
Raw Normal View History

2020-11-24 15:15:51 +05:30
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe AuthenticationEvent do
describe 'associations' do
it { is_expected.to belong_to(:user).optional }
end
describe 'validations' do
it { is_expected.to validate_presence_of(:provider) }
it { is_expected.to validate_presence_of(:user_name) }
it { is_expected.to validate_presence_of(:result) }
2021-01-03 14:25:43 +05:30
include_examples 'validates IP address' do
let(:attribute) { :ip_address }
let(:object) { create(:authentication_event) }
end
end
describe 'scopes' do
let_it_be(:ldap_event) { create(:authentication_event, provider: :ldapmain, result: :failed) }
let_it_be(:google_oauth2) { create(:authentication_event, provider: :google_oauth2, result: :success) }
describe '.for_provider' do
it 'returns events only for the specified provider' do
expect(described_class.for_provider(:ldapmain)).to match_array ldap_event
end
end
describe '.ldap' do
it 'returns all events for an LDAP provider' do
expect(described_class.ldap).to match_array ldap_event
end
end
end
describe '.providers' do
before do
2021-01-29 00:20:46 +05:30
allow(Devise).to receive(:omniauth_providers).and_return(%w(ldapmain google_oauth2))
2021-01-03 14:25:43 +05:30
end
it 'returns an array of distinct providers' do
2021-01-29 00:20:46 +05:30
expect(described_class.providers).to match_array %w(ldapmain google_oauth2 standard two-factor two-factor-via-u2f-device two-factor-via-webauthn-device)
2021-01-03 14:25:43 +05:30
end
2020-11-24 15:15:51 +05:30
end
2022-08-13 15:12:31 +05:30
describe '.initial_login_or_known_ip_address?' do
let_it_be(:user) { create(:user) }
let_it_be(:ip_address) { '127.0.0.1' }
subject { described_class.initial_login_or_known_ip_address?(user, ip_address) }
context 'on first login, when no record exists yet' do
it { is_expected.to eq(true) }
end
context 'on second login from the same ip address' do
before do
create(:authentication_event, :successful, user: user, ip_address: ip_address)
end
it { is_expected.to eq(true) }
end
context 'on second login from another ip address' do
before do
create(:authentication_event, :successful, user: user, ip_address: '1.2.3.4')
end
it { is_expected.to eq(false) }
end
end
2023-07-09 08:55:56 +05:30
describe '.most_used_ip_address_for_user' do
let_it_be(:user) { create(:user) }
let_it_be(:most_used_ip_address) { '::1' }
let_it_be(:another_ip_address) { '127.0.0.1' }
subject { described_class.most_used_ip_address_for_user(user) }
before do
create_list(:authentication_event, 2, user: user, ip_address: most_used_ip_address)
create(:authentication_event, user: user, ip_address: another_ip_address)
end
it { is_expected.to eq(most_used_ip_address) }
end
2020-11-24 15:15:51 +05:30
end