debian-mirror-gitlab/spec/controllers/concerns/confirm_email_warning_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

121 lines
3.6 KiB
Ruby
Raw Normal View History

2019-10-12 21:52:04 +05:30
# frozen_string_literal: true
require 'spec_helper'
2023-05-08 21:46:49 +05:30
RSpec.describe ConfirmEmailWarning, feature_category: :system_access do
2019-10-12 21:52:04 +05:30
before do
2023-05-27 22:25:52 +05:30
stub_application_setting_enum('email_confirmation_setting', 'soft')
2019-10-12 21:52:04 +05:30
end
controller(ApplicationController) do
# `described_class` is not available in this context
2020-03-13 15:44:24 +05:30
include ConfirmEmailWarning
2019-10-12 21:52:04 +05:30
def index
head :ok
end
end
RSpec::Matchers.define :set_confirm_warning_for do |email|
match do |response|
2021-06-08 01:23:25 +05:30
expect(controller).to set_flash.now[:warning].to include("Please check your email (#{email}) to verify that you own this address and unlock the power of CI/CD.")
2019-10-12 21:52:04 +05:30
end
end
describe 'confirm email flash warning' do
context 'when not signed in' do
let(:user) { create(:user, confirmed_at: nil) }
before do
get :index
end
it { is_expected.not_to set_confirm_warning_for(user.email) }
end
context 'when signed in' do
before do
sign_in(user)
end
context 'with a confirmed user' do
let(:user) { create(:user) }
before do
get :index
end
it { is_expected.not_to set_confirm_warning_for(user.email) }
end
context 'with an unconfirmed user' do
let(:user) { create(:user, confirmed_at: nil) }
context 'when executing a json request' do
before do
get :index, format: :json
end
it { is_expected.not_to set_confirm_warning_for(user.email) }
end
context 'when executing a post request' do
before do
post :index
end
it { is_expected.not_to set_confirm_warning_for(user.email) }
end
context 'when executing a get request' do
before do
get :index
end
context 'with an unconfirmed email address present' do
let(:user) { create(:user, confirmed_at: nil, unconfirmed_email: 'unconfirmed@gitlab.com') }
it { is_expected.to set_confirm_warning_for(user.unconfirmed_email) }
end
context 'without an unconfirmed email address present' do
it { is_expected.to set_confirm_warning_for(user.email) }
end
end
2023-05-08 21:46:49 +05:30
context 'when user is being impersonated' do
let(:impersonator) { create(:admin) }
before do
allow(controller).to receive(:session).and_return({ impersonator_id: impersonator.id })
get :index
end
it { is_expected.to set_confirm_warning_for(user.email) }
context 'when impersonated user email has html in their email' do
let(:user) { create(:user, confirmed_at: nil, unconfirmed_email: "malicious@test.com<form><input/title='<script>alert(document.domain)</script>'>") }
it { is_expected.to set_confirm_warning_for("malicious@test.com&lt;form&gt;&lt;input/title=&#39;&lt;script&gt;alert(document.domain)&lt;/script&gt;&#39;&gt;") }
end
end
context 'when user is not being impersonated' do
before do
get :index
end
it { is_expected.to set_confirm_warning_for(user.email) }
context 'when user email has html in their email' do
let(:user) { create(:user, confirmed_at: nil, unconfirmed_email: "malicious@test.com<form><input/title='<script>alert(document.domain)</script>'>") }
it { is_expected.to set_confirm_warning_for("malicious@test.com&lt;form&gt;&lt;input/title=&#39;&lt;script&gt;alert(document.domain)&lt;/script&gt;&#39;&gt;") }
end
end
2019-10-12 21:52:04 +05:30
end
end
end
end