2019-07-07 11:18:12 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
require 'spec_helper'
|
2015-09-11 14:41:01 +05:30
|
|
|
|
2023-03-17 16:20:25 +05:30
|
|
|
RSpec.describe AbuseReport, feature_category: :insider_threat do
|
2020-03-13 15:44:24 +05:30
|
|
|
let_it_be(:report, reload: true) { create(:abuse_report) }
|
|
|
|
let_it_be(:user, reload: true) { create(:admin) }
|
2021-09-30 23:02:18 +05:30
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
subject { report }
|
2015-09-11 14:41:01 +05:30
|
|
|
|
|
|
|
it { expect(subject).to be_valid }
|
2015-10-24 18:46:33 +05:30
|
|
|
|
|
|
|
describe 'associations' do
|
|
|
|
it { is_expected.to belong_to(:reporter).class_name('User') }
|
|
|
|
it { is_expected.to belong_to(:user) }
|
2016-11-03 12:29:30 +05:30
|
|
|
|
|
|
|
it "aliases reporter to author" do
|
|
|
|
expect(subject.author).to be(subject.reporter)
|
|
|
|
end
|
2015-10-24 18:46:33 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
describe 'validations' do
|
2023-03-17 16:20:25 +05:30
|
|
|
let(:http) { 'http://gitlab.com' }
|
|
|
|
let(:https) { 'https://gitlab.com' }
|
|
|
|
let(:ftp) { 'ftp://example.com' }
|
|
|
|
let(:javascript) { 'javascript:alert(window.opener.document.location)' }
|
|
|
|
|
2015-10-24 18:46:33 +05:30
|
|
|
it { is_expected.to validate_presence_of(:reporter) }
|
|
|
|
it { is_expected.to validate_presence_of(:user) }
|
|
|
|
it { is_expected.to validate_presence_of(:message) }
|
2023-03-17 16:20:25 +05:30
|
|
|
it { is_expected.to validate_presence_of(:category) }
|
|
|
|
|
|
|
|
it do
|
|
|
|
is_expected.to validate_uniqueness_of(:user_id)
|
|
|
|
.scoped_to([:reporter_id, :category])
|
|
|
|
.with_message('You have already reported this user')
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to validate_length_of(:reported_from_url).is_at_most(512).allow_blank }
|
|
|
|
it { is_expected.to allow_value(http).for(:reported_from_url) }
|
|
|
|
it { is_expected.to allow_value(https).for(:reported_from_url) }
|
|
|
|
it { is_expected.not_to allow_value(ftp).for(:reported_from_url) }
|
|
|
|
it { is_expected.not_to allow_value(javascript).for(:reported_from_url) }
|
|
|
|
it { is_expected.to allow_value('http://localhost:9000').for(:reported_from_url) }
|
|
|
|
it { is_expected.to allow_value('https://gitlab.com').for(:reported_from_url) }
|
2023-04-23 21:23:45 +05:30
|
|
|
|
|
|
|
it { is_expected.to allow_value([]).for(:links_to_spam) }
|
|
|
|
it { is_expected.to allow_value(nil).for(:links_to_spam) }
|
|
|
|
it { is_expected.to allow_value('').for(:links_to_spam) }
|
|
|
|
|
|
|
|
it { is_expected.to allow_value(['https://gitlab.com']).for(:links_to_spam) }
|
|
|
|
it { is_expected.to allow_value(['http://localhost:9000']).for(:links_to_spam) }
|
|
|
|
|
|
|
|
it { is_expected.not_to allow_value(['spam']).for(:links_to_spam) }
|
|
|
|
it { is_expected.not_to allow_value(['http://localhost:9000', 'spam']).for(:links_to_spam) }
|
|
|
|
|
|
|
|
it { is_expected.to allow_value(['https://gitlab.com'] * 20).for(:links_to_spam) }
|
|
|
|
it { is_expected.not_to allow_value(['https://gitlab.com'] * 21).for(:links_to_spam) }
|
|
|
|
|
|
|
|
it {
|
|
|
|
is_expected.to allow_value([
|
|
|
|
"https://gitlab.com/#{SecureRandom.alphanumeric(493)}"
|
|
|
|
]).for(:links_to_spam)
|
|
|
|
}
|
|
|
|
|
|
|
|
it {
|
|
|
|
is_expected.not_to allow_value([
|
|
|
|
"https://gitlab.com/#{SecureRandom.alphanumeric(494)}"
|
|
|
|
]).for(:links_to_spam)
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'before_validation' do
|
|
|
|
context 'when links to spam contains empty strings' do
|
|
|
|
let(:report) { create(:abuse_report, links_to_spam: ['', 'https://gitlab.com']) }
|
|
|
|
|
|
|
|
it 'removes empty strings' do
|
|
|
|
expect(report.links_to_spam).to match_array(['https://gitlab.com'])
|
|
|
|
end
|
|
|
|
end
|
2015-10-24 18:46:33 +05:30
|
|
|
end
|
2016-01-14 18:37:52 +05:30
|
|
|
|
|
|
|
describe '#remove_user' do
|
|
|
|
it 'blocks the user' do
|
2016-06-02 11:05:42 +05:30
|
|
|
expect { subject.remove_user(deleted_by: user) }.to change { subject.user.blocked? }.to(true)
|
2016-01-14 18:37:52 +05:30
|
|
|
end
|
|
|
|
|
2016-06-02 11:05:42 +05:30
|
|
|
it 'lets a worker delete the user' do
|
2022-07-16 23:28:13 +05:30
|
|
|
expect(DeleteUserWorker).to receive(:perform_async).with(user.id, subject.user.id, { hard_delete: true })
|
2016-01-14 18:37:52 +05:30
|
|
|
|
2016-06-02 11:05:42 +05:30
|
|
|
subject.remove_user(deleted_by: user)
|
2016-01-14 18:37:52 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#notify' do
|
|
|
|
it 'delivers' do
|
2017-09-10 17:25:29 +05:30
|
|
|
expect(AbuseReportMailer).to receive(:notify).with(subject.id)
|
|
|
|
.and_return(spy)
|
2016-01-14 18:37:52 +05:30
|
|
|
|
|
|
|
subject.notify
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns early when not persisted' do
|
|
|
|
report = build(:abuse_report)
|
|
|
|
|
|
|
|
expect(AbuseReportMailer).not_to receive(:notify)
|
|
|
|
|
|
|
|
report.notify
|
|
|
|
end
|
|
|
|
end
|
2023-03-17 16:20:25 +05:30
|
|
|
|
|
|
|
describe 'enums' do
|
|
|
|
let(:categories) do
|
|
|
|
{
|
|
|
|
spam: 1,
|
|
|
|
offensive: 2,
|
|
|
|
phishing: 3,
|
|
|
|
crypto: 4,
|
|
|
|
credentials: 5,
|
|
|
|
copyright: 6,
|
|
|
|
malware: 7,
|
|
|
|
other: 8
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to define_enum_for(:category).with_values(**categories) }
|
|
|
|
end
|
2015-09-11 14:41:01 +05:30
|
|
|
end
|