2019-12-26 22:10:19 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2016-04-02 18:10:28 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
require 'email_spec'
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
describe Emails::Profile do
|
2016-04-02 18:10:28 +05:30
|
|
|
include EmailSpec::Matchers
|
|
|
|
include_context 'gitlab email notification'
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
shared_examples 'a new user email' do
|
|
|
|
it 'is sent to the new user with the correct subject and body' do
|
|
|
|
aggregate_failures do
|
|
|
|
is_expected.to deliver_to new_user_address
|
|
|
|
is_expected.to have_subject(/^Account was created for you$/i)
|
|
|
|
is_expected.to have_body_text(new_user_address)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-06-02 11:05:42 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
describe 'for new users, the email' do
|
|
|
|
let(:example_site_path) { root_path }
|
|
|
|
let(:new_user) { create(:user, email: new_user_address, created_by_id: 1) }
|
|
|
|
let(:token) { 'kETLwRaayvigPq_x3SNM' }
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
subject { Notify.new_user_email(new_user.id, token) }
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it_behaves_like 'an email sent from GitLab'
|
|
|
|
it_behaves_like 'a new user email'
|
|
|
|
it_behaves_like 'it should not have Gmail Actions links'
|
|
|
|
it_behaves_like 'a user cannot unsubscribe through footer link'
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it 'contains the password text' do
|
|
|
|
is_expected.to have_body_text /Click here to set your password/
|
|
|
|
end
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it 'includes a link for user to set password' do
|
|
|
|
params = "reset_password_token=#{token}"
|
|
|
|
is_expected.to have_body_text(
|
|
|
|
%r{http://#{Gitlab.config.gitlab.host}(:\d+)?/users/password/edit\?#{params}}
|
|
|
|
)
|
2016-04-02 18:10:28 +05:30
|
|
|
end
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it 'explains the reset link expiration' do
|
|
|
|
is_expected.to have_body_text(/This link is valid for \d+ (hours?|days?)/)
|
|
|
|
is_expected.to have_body_text(new_user_password_url)
|
|
|
|
is_expected.to have_body_text(/\?user_email=.*%40.*/)
|
|
|
|
end
|
|
|
|
end
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
describe 'for users that signed up, the email' do
|
|
|
|
let(:example_site_path) { root_path }
|
|
|
|
let(:new_user) { create(:user, email: new_user_address, password: "securePassword") }
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
subject { Notify.new_user_email(new_user.id) }
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it_behaves_like 'an email sent from GitLab'
|
|
|
|
it_behaves_like 'a new user email'
|
|
|
|
it_behaves_like 'it should not have Gmail Actions links'
|
|
|
|
it_behaves_like 'a user cannot unsubscribe through footer link'
|
|
|
|
|
|
|
|
it 'does not contain the new user\'s password' do
|
|
|
|
is_expected.not_to have_body_text /password/
|
2016-04-02 18:10:28 +05:30
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
describe 'user added ssh key' do
|
|
|
|
let(:key) { create(:personal_key) }
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
subject { Notify.new_ssh_key_email(key.id) }
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it_behaves_like 'an email sent from GitLab'
|
|
|
|
it_behaves_like 'it should not have Gmail Actions links'
|
|
|
|
it_behaves_like 'a user cannot unsubscribe through footer link'
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it 'is sent to the new user' do
|
|
|
|
is_expected.to deliver_to key.user.email
|
|
|
|
end
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it 'has the correct subject' do
|
|
|
|
is_expected.to have_subject /^SSH key was added to your account$/i
|
|
|
|
end
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it 'contains the new ssh key title' do
|
|
|
|
is_expected.to have_body_text /#{key.title}/
|
|
|
|
end
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it 'includes a link to ssh keys page' do
|
|
|
|
is_expected.to have_body_text /#{profile_keys_path}/
|
|
|
|
end
|
2016-06-02 11:05:42 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
context 'with SSH key that does not exist' do
|
|
|
|
it { expect { Notify.new_ssh_key_email('foo') }.not_to raise_error }
|
2016-04-02 18:10:28 +05:30
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2016-04-02 18:10:28 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
describe 'user added gpg key' do
|
|
|
|
let(:gpg_key) { create(:gpg_key) }
|
|
|
|
|
|
|
|
subject { Notify.new_gpg_key_email(gpg_key.id) }
|
|
|
|
|
|
|
|
it_behaves_like 'an email sent from GitLab'
|
|
|
|
it_behaves_like 'it should not have Gmail Actions links'
|
|
|
|
it_behaves_like 'a user cannot unsubscribe through footer link'
|
|
|
|
|
|
|
|
it 'is sent to the new user' do
|
|
|
|
is_expected.to deliver_to gpg_key.user.email
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'has the correct subject' do
|
|
|
|
is_expected.to have_subject /^GPG key was added to your account$/i
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'contains the new gpg key title' do
|
|
|
|
is_expected.to have_body_text /#{gpg_key.fingerprint}/
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'includes a link to gpg keys page' do
|
|
|
|
is_expected.to have_body_text /#{profile_gpg_keys_path}/
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with GPG key that does not exist' do
|
|
|
|
it { expect { Notify.new_gpg_key_email('foo') }.not_to raise_error }
|
|
|
|
end
|
|
|
|
end
|
2020-01-01 13:55:28 +05:30
|
|
|
|
|
|
|
describe 'user personal access token is about to expire' do
|
|
|
|
let_it_be(:user) { create(:user) }
|
|
|
|
|
|
|
|
subject { Notify.access_token_about_to_expire_email(user) }
|
|
|
|
|
|
|
|
it_behaves_like 'an email sent from GitLab'
|
|
|
|
it_behaves_like 'it should not have Gmail Actions links'
|
|
|
|
it_behaves_like 'a user cannot unsubscribe through footer link'
|
|
|
|
|
|
|
|
it 'is sent to the user' do
|
|
|
|
is_expected.to deliver_to user.email
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'has the correct subject' do
|
|
|
|
is_expected.to have_subject /^Your Personal Access Tokens will expire in 7 days or less$/i
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'mentions the access tokens will expire' do
|
|
|
|
is_expected.to have_body_text /One or more of your personal access tokens will expire in 7 days or less/
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'includes a link to personal access tokens page' do
|
|
|
|
is_expected.to have_body_text /#{profile_personal_access_tokens_path}/
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'includes the email reason' do
|
|
|
|
is_expected.to have_body_text /You're receiving this email because of your account on localhost/
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with User does not exist' do
|
|
|
|
it { expect { Notify.access_token_about_to_expire_email('foo') }.not_to raise_error }
|
|
|
|
end
|
|
|
|
end
|
2020-05-24 23:13:21 +05:30
|
|
|
|
|
|
|
describe 'user unknown sign in email' do
|
|
|
|
let_it_be(:user) { create(:user) }
|
|
|
|
let_it_be(:ip) { '169.0.0.1' }
|
|
|
|
|
|
|
|
subject { Notify.unknown_sign_in_email(user, ip) }
|
|
|
|
|
|
|
|
it_behaves_like 'an email sent from GitLab'
|
|
|
|
it_behaves_like 'it should not have Gmail Actions links'
|
|
|
|
it_behaves_like 'a user cannot unsubscribe through footer link'
|
|
|
|
|
|
|
|
it 'is sent to the user' do
|
|
|
|
expect(subject).to deliver_to user.email
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'has the correct subject' do
|
|
|
|
expect(subject).to have_subject /^Unknown sign-in from new location$/
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'mentions the unknown sign-in IP' do
|
|
|
|
expect(subject).to have_body_text /A sign-in to your account has been made from the following IP address: #{ip}./
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'includes a link to the change password page' do
|
|
|
|
expect(subject).to have_body_text /#{edit_profile_password_path}/
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'mentions two factor authentication when two factor is not enabled' do
|
|
|
|
expect(subject).to have_body_text /two-factor authentication/
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when two factor authentication is enabled' do
|
|
|
|
it 'does not mention two factor authentication' do
|
|
|
|
two_factor_user = create(:user, :two_factor)
|
|
|
|
|
|
|
|
expect( Notify.unknown_sign_in_email(two_factor_user, ip) )
|
|
|
|
.not_to have_body_text /two-factor authentication/
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-04-02 18:10:28 +05:30
|
|
|
end
|