debian-mirror-gitlab/spec/helpers/profiles_helper_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

138 lines
4.9 KiB
Ruby
Raw Normal View History

2019-12-21 20:55:43 +05:30
# frozen_string_literal: true
2019-12-04 20:38:33 +05:30
require 'spec_helper'
2017-09-10 17:25:29 +05:30
2020-07-28 23:09:34 +05:30
RSpec.describe ProfilesHelper do
2018-12-13 13:39:08 +05:30
describe '#commit_email_select_options' do
it 'returns an array with private commit email along with all the verified emails' do
user = create(:user)
create(:email, user: user)
confirmed_email1 = create(:email, :confirmed, user: user)
confirmed_email2 = create(:email, :confirmed, user: user)
private_email = user.private_commit_email
emails = [
2021-11-11 11:23:49 +05:30
[s_('Use primary email (%{email})') % { email: user.email }, ''],
[s_("Profiles|Use a private email - %{email}").html_safe % { email: private_email }, Gitlab::PrivateCommitEmail::TOKEN],
2018-12-13 13:39:08 +05:30
user.email,
confirmed_email1.email,
confirmed_email2.email
]
expect(helper.commit_email_select_options(user)).to match_array(emails)
end
end
2017-09-10 17:25:29 +05:30
describe '#email_provider_label' do
it "returns nil for users without external email" do
user = create(:user)
allow(helper).to receive(:current_user).and_return(user)
2018-03-17 18:26:18 +05:30
expect(helper.attribute_provider_label(:email)).to be_nil
2017-09-10 17:25:29 +05:30
end
2018-03-17 18:26:18 +05:30
it "returns omniauth provider label for users with external attributes" do
2023-07-09 08:55:56 +05:30
stub_omniauth_setting(sync_profile_from_provider: [example_omniauth_provider])
2018-03-17 18:26:18 +05:30
stub_omniauth_setting(sync_profile_attributes: true)
2023-07-09 08:55:56 +05:30
stub_auth0_omniauth_provider
auth0_user = create(:omniauth_user, provider: example_omniauth_provider)
auth0_user.create_user_synced_attributes_metadata(provider: example_omniauth_provider, name_synced: true, email_synced: true, location_synced: true)
allow(helper).to receive(:current_user).and_return(auth0_user)
expect(helper.attribute_provider_label(:email)).to eq(example_omniauth_provider_label)
expect(helper.attribute_provider_label(:name)).to eq(example_omniauth_provider_label)
expect(helper.attribute_provider_label(:location)).to eq(example_omniauth_provider_label)
2018-03-17 18:26:18 +05:30
end
it "returns the correct omniauth provider label for users with some external attributes" do
2023-07-09 08:55:56 +05:30
stub_omniauth_setting(sync_profile_from_provider: [example_omniauth_provider])
2018-03-17 18:26:18 +05:30
stub_omniauth_setting(sync_profile_attributes: true)
2023-07-09 08:55:56 +05:30
stub_auth0_omniauth_provider
auth0_user = create(:omniauth_user, provider: example_omniauth_provider)
auth0_user.create_user_synced_attributes_metadata(provider: example_omniauth_provider, name_synced: false, email_synced: true, location_synced: false)
allow(helper).to receive(:current_user).and_return(auth0_user)
2018-03-17 18:26:18 +05:30
expect(helper.attribute_provider_label(:name)).to be_nil
2023-07-09 08:55:56 +05:30
expect(helper.attribute_provider_label(:email)).to eq(example_omniauth_provider_label)
2018-03-17 18:26:18 +05:30
expect(helper.attribute_provider_label(:location)).to be_nil
2017-09-10 17:25:29 +05:30
end
it "returns 'LDAP' for users with external email but no email provider" do
2018-03-17 18:26:18 +05:30
ldap_user = create(:omniauth_user)
ldap_user.create_user_synced_attributes_metadata(email_synced: true)
2017-09-10 17:25:29 +05:30
allow(helper).to receive(:current_user).and_return(ldap_user)
2018-03-17 18:26:18 +05:30
expect(helper.attribute_provider_label(:email)).to eq('LDAP')
2017-09-10 17:25:29 +05:30
end
end
2021-04-29 21:17:54 +05:30
describe "#ssh_key_expiration_tooltip" do
using RSpec::Parameterized::TableSyntax
before do
allow(Key).to receive(:enforce_ssh_key_expiration_feature_available?).and_return(false)
end
error_message = 'Key type is forbidden. Must be DSA, ECDSA, or ED25519'
where(:error, :expired, :result) do
false | false | nil
true | false | error_message
true | true | error_message
end
with_them do
let_it_be(:key) do
build(:personal_key)
end
it do
key.expires_at = expired ? 2.days.ago : 2.days.from_now
key.errors.add(:base, error_message) if error
expect(helper.ssh_key_expiration_tooltip(key)).to eq(result)
end
end
end
describe "#ssh_key_expires_field_description" do
2022-07-16 23:28:13 +05:30
subject { helper.ssh_key_expires_field_description }
2021-04-29 21:17:54 +05:30
2022-10-11 01:57:18 +05:30
it { is_expected.to eq(s_('Profiles|Optional but recommended. If set, key becomes invalid on the specified date.')) }
2021-04-29 21:17:54 +05:30
end
2021-11-11 11:23:49 +05:30
describe '#middle_dot_divider_classes' do
using RSpec::Parameterized::TableSyntax
where(:stacking, :breakpoint, :expected) do
nil | nil | %w(gl-mb-3 gl-display-inline-block middle-dot-divider)
true | nil | %w(gl-mb-3 middle-dot-divider-sm gl-display-block gl-sm-display-inline-block)
nil | :sm | %w(gl-mb-3 gl-display-inline-block middle-dot-divider-sm)
end
with_them do
it 'returns CSS classes needed to render the middle dot divider' do
expect(helper.middle_dot_divider_classes(stacking, breakpoint)).to eq expected
end
end
end
2023-07-09 08:55:56 +05:30
def stub_auth0_omniauth_provider
2017-09-10 17:25:29 +05:30
provider = OpenStruct.new(
2023-07-09 08:55:56 +05:30
'name' => example_omniauth_provider,
'label' => example_omniauth_provider_label
2017-09-10 17:25:29 +05:30
)
stub_omniauth_setting(providers: [provider])
end
2023-07-09 08:55:56 +05:30
def example_omniauth_provider
"auth0"
end
def example_omniauth_provider_label
"Auth0"
end
2017-09-10 17:25:29 +05:30
end