forked from External/greenlight
265 lines
8.5 KiB
Ruby
265 lines
8.5 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
# BigBlueButton open source conferencing system - http://www.bigbluebutton.org/.
|
|
#
|
|
# Copyright (c) 2018 BigBlueButton Inc. and by respective authors (see below).
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify it under the
|
|
# terms of the GNU Lesser General Public License as published by the Free Software
|
|
# Foundation; either version 3.0 of the License, or (at your option) any later
|
|
# version.
|
|
#
|
|
# BigBlueButton is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
|
|
# PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU Lesser General Public License along
|
|
# with BigBlueButton; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
require "rails_helper"
|
|
require 'bigbluebutton_api'
|
|
|
|
describe User, type: :model do
|
|
before do
|
|
@user = create(:user)
|
|
end
|
|
|
|
context 'validations' do
|
|
it { should validate_presence_of(:name) }
|
|
it { should validate_length_of(:name).is_at_most(256) }
|
|
|
|
it { should validate_presence_of(:provider) }
|
|
|
|
it { should validate_uniqueness_of(:email).scoped_to(:provider).case_insensitive }
|
|
it { should validate_length_of(:email).is_at_most(256) }
|
|
it { should allow_value("valid@email.com").for(:email) }
|
|
it { should_not allow_value("invalid_email").for(:email) }
|
|
it { should allow_value(true).for(:accepted_terms) }
|
|
it { should allow_value(false).for(:accepted_terms) }
|
|
|
|
it { should allow_value("valid.jpg").for(:image) }
|
|
it { should allow_value("valid.png").for(:image) }
|
|
it { should allow_value("random_file.txt").for(:image) }
|
|
it { should allow_value("", nil).for(:image) }
|
|
|
|
it "should convert email to downcase on save" do
|
|
user = create(:user, email: "DOWNCASE@DOWNCASE.COM")
|
|
expect(user.email).to eq("downcase@downcase.com")
|
|
end
|
|
|
|
context 'is greenlight account' do
|
|
before { allow(subject).to receive(:greenlight_account?).and_return(true) }
|
|
it { should validate_length_of(:password).is_at_least(6) }
|
|
end
|
|
|
|
context 'is not greenlight account' do
|
|
before { allow(subject).to receive(:greenlight_account?).and_return(false) }
|
|
it { should_not validate_presence_of(:password) }
|
|
end
|
|
end
|
|
|
|
context 'associations' do
|
|
it { should belong_to(:main_room).class_name("Room").with_foreign_key("room_id") }
|
|
it { should have_many(:rooms) }
|
|
end
|
|
|
|
context '#initialize_main_room' do
|
|
it 'creates random uid and main_room' do
|
|
expect(@user.uid).to_not be_nil
|
|
expect(@user.main_room).to be_a(Room)
|
|
end
|
|
end
|
|
|
|
context "#to_param" do
|
|
it "uses uid as the default identifier for routes" do
|
|
expect(@user.to_param).to eq(@user.uid)
|
|
end
|
|
end
|
|
|
|
unless Rails.configuration.omniauth_bn_launcher
|
|
context '#from_omniauth' do
|
|
let(:auth) do
|
|
{
|
|
"uid" => "123456789",
|
|
"provider" => "twitter",
|
|
"info" => {
|
|
"name" => "Test Name",
|
|
"nickname" => "username",
|
|
"email" => "test@example.com",
|
|
"image" => "example.png",
|
|
},
|
|
}
|
|
end
|
|
|
|
it "should create user from omniauth" do
|
|
expect do
|
|
user = User.from_omniauth(auth)
|
|
|
|
expect(user.name).to eq("Test Name")
|
|
expect(user.email).to eq("test@example.com")
|
|
expect(user.image).to eq("example.png")
|
|
expect(user.provider).to eq("twitter")
|
|
expect(user.social_uid).to eq("123456789")
|
|
end.to change { User.count }.by(1)
|
|
end
|
|
end
|
|
end
|
|
|
|
context '#name_chunk' do
|
|
it 'properly finds the first three characters of the users name' do
|
|
user = create(:user, name: "Example User")
|
|
expect(user.name_chunk).to eq("exa")
|
|
end
|
|
end
|
|
|
|
context '#ordered_rooms' do
|
|
it 'correctly orders the users rooms' do
|
|
user = create(:user)
|
|
room1 = create(:room, owner: user)
|
|
room2 = create(:room, owner: user)
|
|
room3 = create(:room, owner: user)
|
|
room4 = create(:room, owner: user)
|
|
|
|
room4.update_attributes(sessions: 1, last_session: "2020-02-24 19:52:57")
|
|
room3.update_attributes(sessions: 1, last_session: "2020-01-25 19:52:57")
|
|
room2.update_attributes(sessions: 1, last_session: "2019-09-05 19:52:57")
|
|
room1.update_attributes(sessions: 1, last_session: "2015-02-24 19:52:57")
|
|
|
|
rooms = user.ordered_rooms
|
|
expect(rooms[0]).to eq(user.main_room)
|
|
expect(rooms[1]).to eq(room4)
|
|
expect(rooms[2]).to eq(room3)
|
|
expect(rooms[3]).to eq(room2)
|
|
expect(rooms[4]).to eq(room1)
|
|
end
|
|
end
|
|
|
|
context 'password reset' do
|
|
it 'creates token and respective reset digest' do
|
|
user = create(:user)
|
|
|
|
reset_digest_success = user.create_reset_digest
|
|
expect(reset_digest_success).to eq(true)
|
|
end
|
|
|
|
it 'verifies if password reset link expired' do
|
|
user = create(:user)
|
|
user.create_reset_digest
|
|
|
|
expired = user.password_reset_expired?
|
|
expect(expired).to be_in([true, false])
|
|
end
|
|
end
|
|
|
|
context '#roles' do
|
|
it "defaults the user to a user role" do
|
|
expect(@user.has_role?(:user)).to be true
|
|
end
|
|
|
|
it "does not give the user an admin role" do
|
|
expect(@user.has_role?(:admin)).to be false
|
|
end
|
|
|
|
it "returns true if the user is an admin of another" do
|
|
allow(Rails.configuration).to receive(:loadbalanced_configuration).and_return(true)
|
|
allow_any_instance_of(User).to receive(:greenlight_account?).and_return(true)
|
|
|
|
@admin = create(:user, provider: @user.provider)
|
|
@admin.add_role :admin
|
|
|
|
expect(@admin.admin_of?(@user, "can_manage_users")).to be true
|
|
|
|
@super_admin = create(:user, provider: "test")
|
|
@super_admin.add_role :super_admin
|
|
|
|
expect(@super_admin.admin_of?(@user, "can_manage_users")).to be true
|
|
end
|
|
|
|
it "returns false if the user is NOT an admin of another" do
|
|
@admin = create(:user)
|
|
|
|
expect(@admin.admin_of?(@user, "can_manage_users")).to be false
|
|
end
|
|
|
|
it "should get the highest priority role" do
|
|
@admin = create(:user, provider: @user.provider)
|
|
@admin.add_role :admin
|
|
|
|
expect(@admin.highest_priority_role.name).to eq("admin")
|
|
end
|
|
|
|
it "should skip adding the role if the user already has the role" do
|
|
@admin = create(:user, provider: @user.provider)
|
|
@admin.add_role :admin
|
|
@admin.add_role :admin
|
|
|
|
expect(@admin.roles.count).to eq(2)
|
|
end
|
|
|
|
it "should add the role if the user doesn't already have the role" do
|
|
@admin = create(:user, provider: @user.provider)
|
|
@admin.add_role :admin
|
|
|
|
expect(@admin.roles.count).to eq(2)
|
|
end
|
|
|
|
it "should remove the role if the user has the role assigned to them" do
|
|
@admin = create(:user, provider: @user.provider)
|
|
@admin.add_role :admin
|
|
@admin.remove_role :admin
|
|
|
|
expect(@admin.roles.count).to eq(1)
|
|
end
|
|
|
|
it "has_role? should return false if the user doesn't have the role" do
|
|
expect(@user.has_role?(:admin)).to eq(false)
|
|
end
|
|
|
|
it "has_role? should return true if the user has the role" do
|
|
@admin = create(:user, provider: @user.provider)
|
|
@admin.add_role :admin
|
|
|
|
expect(@admin.has_role?(:admin)).to eq(true)
|
|
end
|
|
|
|
it "with_role should return all users with the role" do
|
|
@admin1 = create(:user, provider: @user.provider)
|
|
@admin2 = create(:user, provider: @user.provider)
|
|
@admin1.add_role :admin
|
|
@admin2.add_role :admin
|
|
|
|
expect(User.with_role(:admin).count).to eq(2)
|
|
end
|
|
|
|
it "without_role should return all users without the role" do
|
|
@admin1 = create(:user, provider: @user.provider)
|
|
@admin2 = create(:user, provider: @user.provider)
|
|
@admin1.add_role :admin
|
|
@admin2.add_role :admin
|
|
|
|
expect(User.without_role(:admin).count).to eq(1)
|
|
end
|
|
|
|
it "all_users_with_roles should return all users with at least one role" do
|
|
@admin1 = create(:user, provider: @user.provider)
|
|
@admin2 = create(:user, provider: @user.provider)
|
|
|
|
expect(User.all_users_with_roles.count).to eq(3)
|
|
end
|
|
end
|
|
|
|
context 'blank email' do
|
|
it "allows a blank email if the provider is not greenlight" do
|
|
allow_any_instance_of(User).to receive(:greenlight_account?).and_return(false)
|
|
|
|
user = create(:user, email: "", provider: "ldap")
|
|
expect(user.valid?).to be true
|
|
end
|
|
|
|
it "does not allow a blank email if the provider is greenlight" do
|
|
expect { create(:user, email: "", provider: "greenlight") }
|
|
.to raise_exception(ActiveRecord::RecordInvalid, "Validation failed: Email can't be blank")
|
|
end
|
|
end
|
|
end
|