debian-mirror-gitlab/spec/uploaders/avatar_uploader_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

76 lines
2.3 KiB
Ruby
Raw Normal View History

2019-12-21 20:55:43 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe AvatarUploader do
2018-05-09 12:01:36 +05:30
let(:model) { build_stubbed(:user) }
2018-03-17 18:26:18 +05:30
let(:uploader) { described_class.new(model, :avatar) }
let(:upload) { create(:upload, model: model) }
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
subject { uploader }
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
it_behaves_like 'builds correct paths',
store_dir: %r[uploads/-/system/user/avatar/],
upload_path: %r[uploads/-/system/user/avatar/],
absolute_path: %r[#{CarrierWave.root}/uploads/-/system/user/avatar/]
2017-08-17 22:00:37 +05:30
2018-05-09 12:01:36 +05:30
context "object_store is REMOTE" do
before do
stub_uploads_object_storage
2017-08-17 22:00:37 +05:30
end
2018-05-09 12:01:36 +05:30
include_context 'with storage', described_class::Store::REMOTE
it_behaves_like 'builds correct paths',
store_dir: %r[user/avatar/],
upload_path: %r[user/avatar/]
2017-08-17 22:00:37 +05:30
end
2018-05-09 12:01:36 +05:30
context "with a file" do
let(:project) { create(:project, :with_avatar) }
let(:uploader) { project.avatar }
let(:upload) { uploader.upload }
before do
stub_uploads_object_storage
2017-08-17 22:00:37 +05:30
end
2018-05-09 12:01:36 +05:30
it_behaves_like "migrates", to_store: described_class::Store::REMOTE
it_behaves_like "migrates", from_store: described_class::Store::REMOTE, to_store: described_class::Store::LOCAL
2018-11-20 20:47:30 +05:30
it 'sets the right absolute path' do
storage_path = Gitlab.config.uploads.storage_path
absolute_path = File.join(storage_path, upload.path)
expect(uploader.absolute_path.scan(storage_path).size).to eq(1)
expect(uploader.absolute_path).to eq(absolute_path)
end
2017-08-17 22:00:37 +05:30
end
2020-03-13 15:44:24 +05:30
2020-04-08 14:13:33 +05:30
context 'accept whitelist file content type' do
# We need to feed through a valid path, but we force the parsed mime type
# in a stub below so we can set any path.
let_it_be(:path) { File.join('spec', 'fixtures', 'video_sample.mp4') }
2022-08-27 11:52:29 +05:30
where(:mime_type) { described_class::MIME_ALLOWLIST }
2020-04-08 14:13:33 +05:30
with_them do
include_context 'force content type detection to mime_type'
2020-03-13 15:44:24 +05:30
2020-04-08 14:13:33 +05:30
it_behaves_like 'accepted carrierwave upload'
2020-03-13 15:44:24 +05:30
end
end
2020-04-08 14:13:33 +05:30
context 'upload non-whitelisted file content type' do
let_it_be(:path) { File.join('spec', 'fixtures', 'sanitized.svg') }
it_behaves_like 'denied carrierwave upload'
end
context 'upload misnamed non-whitelisted file content type' do
let_it_be(:path) { File.join('spec', 'fixtures', 'not_a_png.png') }
it_behaves_like 'denied carrierwave upload'
end
2017-08-17 22:00:37 +05:30
end