debian-mirror-gitlab/spec/lib/api/entities/user_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

187 lines
5 KiB
Ruby
Raw Normal View History

2020-04-22 19:07:51 +05:30
# frozen_string_literal: true
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe API::Entities::User do
2021-11-18 22:05:49 +05:30
let_it_be(:timezone) { 'America/Los_Angeles' }
let(:user) { create(:user, timezone: timezone) }
2020-04-22 19:07:51 +05:30
let(:current_user) { create(:user) }
2021-11-18 22:05:49 +05:30
let(:entity) { described_class.new(user, current_user: current_user) }
2020-04-22 19:07:51 +05:30
2021-11-18 22:05:49 +05:30
subject { entity.as_json }
2020-04-22 19:07:51 +05:30
it 'exposes correct attributes' do
2022-07-16 23:28:13 +05:30
expect(subject.keys).to contain_exactly(
# UserSafe
:id, :username, :name,
# UserBasic
:state, :avatar_url, :web_url,
# User
:created_at, :bio, :location, :public_email, :skype, :linkedin, :twitter,
:website_url, :organization, :job_title, :pronouns, :bot, :work_information,
:followers, :following, :is_followed, :local_time
)
end
context 'exposing follow relationships' do
before do
allow(Ability).to receive(:allowed?).with(current_user, :read_user_profile, user).and_return(can_read_user_profile)
end
%i(followers following is_followed).each do |relationship|
context 'when current user cannot read user profile' do
let(:can_read_user_profile) { false }
it "does not expose #{relationship}" do
expect(subject).not_to include(relationship)
end
end
context 'when current user can read user profile' do
let(:can_read_user_profile) { true }
it "exposes #{relationship}" do
expect(subject).to include(relationship)
end
end
end
2020-04-22 19:07:51 +05:30
end
it 'exposes created_at if the current user can read the user profile' do
allow(Ability).to receive(:allowed?).with(current_user, :read_user_profile, user).and_return(true)
expect(subject).to include(:created_at)
end
it 'does not expose created_at if the current user cannot read the user profile' do
allow(Ability).to receive(:allowed?).with(current_user, :read_user_profile, user).and_return(false)
expect(subject).not_to include(:created_at)
end
2021-03-11 19:13:27 +05:30
it 'exposes user as not a bot' do
expect(subject[:bot]).to be_falsey
end
2021-12-07 22:27:20 +05:30
context 'with project bot user' do
let(:project) { create(:project) }
let(:user) { create(:user, :project_bot, name: 'secret') }
before do
project.add_maintainer(user)
end
2021-03-11 19:13:27 +05:30
it 'exposes user as a bot' do
expect(subject[:bot]).to eq(true)
end
2021-12-07 22:27:20 +05:30
context 'when the requester is not an admin' do
it 'does not expose project bot user name' do
expect(subject[:name]).to eq('****')
end
end
context 'when the requester is nil' do
let(:current_user) { nil }
it 'does not expose project bot user name' do
expect(subject[:name]).to eq('****')
end
end
context 'when the requester is a project maintainer' do
let(:current_user) { create(:user) }
before do
project.add_maintainer(current_user)
end
it 'exposes project bot user name' do
expect(subject[:name]).to eq('secret')
end
end
context 'when the requester is an admin' do
let(:current_user) { create(:user, :admin) }
it 'exposes project bot user name', :enable_admin_mode do
expect(subject[:name]).to eq('secret')
end
end
2021-03-11 19:13:27 +05:30
end
2021-11-18 22:05:49 +05:30
2022-05-07 20:08:51 +05:30
context 'with group bot user' do
let(:group) { create(:group) }
let(:user) { create(:user, :project_bot, name: 'group bot') }
before do
group.add_maintainer(user)
end
it 'exposes user as a bot' do
expect(subject[:bot]).to eq(true)
end
context 'when the requester is not a group member' do
context 'with a public group' do
it 'exposes group bot user name' do
expect(subject[:name]).to eq('group bot')
end
end
context 'with a private group' do
let(:group) { create(:group, :private) }
it 'does not expose group bot user name' do
expect(subject[:name]).to eq('****')
end
end
end
context 'when the requester is nil' do
let(:current_user) { nil }
it 'does not expose group bot user name' do
expect(subject[:name]).to eq('****')
end
end
context 'when the requester is a group maintainer' do
let(:current_user) { create(:user) }
before do
group.add_maintainer(current_user)
end
it 'exposes group bot user name' do
expect(subject[:name]).to eq('group bot')
end
end
context 'when the requester is an admin' do
let(:current_user) { create(:user, :admin) }
it 'exposes group bot user name', :enable_admin_mode do
expect(subject[:name]).to eq('group bot')
end
end
end
2022-07-16 23:28:13 +05:30
context 'with logged-out user' do
let(:current_user) { nil }
it 'exposes is_followed as nil' do
allow(Ability).to receive(:allowed?).with(current_user, :read_user_profile, user).and_return(true)
expect(subject.keys).not_to include(:is_followed)
end
end
2021-11-18 22:05:49 +05:30
it 'exposes local_time' do
local_time = '2:30 PM'
expect(entity).to receive(:local_time).with(timezone).and_return(local_time)
expect(subject[:local_time]).to eq(local_time)
end
2020-04-22 19:07:51 +05:30
end