annotate test/unit/user_test.rb @ 1452:d6b9fd02bb89 feature_36_js_refactoring

Deprecated develoment branch.
author luisf <luis.figueira@eecs.qmul.ac.uk>
date Fri, 11 Oct 2013 17:01:24 +0100
parents cbce1fd3b1b7
children cbb26bc654de
rev   line source
Chris@128 1 # Redmine - project management software
Chris@128 2 # Copyright (C) 2006-2011 Jean-Philippe Lang
Chris@0 3 #
Chris@0 4 # This program is free software; you can redistribute it and/or
Chris@0 5 # modify it under the terms of the GNU General Public License
Chris@0 6 # as published by the Free Software Foundation; either version 2
Chris@0 7 # of the License, or (at your option) any later version.
Chris@0 8 #
Chris@0 9 # This program is distributed in the hope that it will be useful,
Chris@0 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
Chris@0 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
Chris@0 12 # GNU General Public License for more details.
Chris@0 13 #
Chris@0 14 # You should have received a copy of the GNU General Public License
Chris@0 15 # along with this program; if not, write to the Free Software
Chris@0 16 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
Chris@0 17
Chris@119 18 require File.expand_path('../../test_helper', __FILE__)
Chris@0 19
Chris@0 20 class UserTest < ActiveSupport::TestCase
Chris@0 21 fixtures :users, :members, :projects, :roles, :member_roles, :auth_sources
Chris@0 22
Chris@0 23 def setup
Chris@0 24 @admin = User.find(1)
Chris@0 25 @jsmith = User.find(2)
Chris@0 26 @dlopper = User.find(3)
Chris@0 27 end
Chris@0 28
Chris@0 29 test 'object_daddy creation' do
Chris@0 30 User.generate_with_protected!(:firstname => 'Testing connection')
Chris@0 31 User.generate_with_protected!(:firstname => 'Testing connection')
Chris@0 32 assert_equal 2, User.count(:all, :conditions => {:firstname => 'Testing connection'})
Chris@0 33 end
Chris@0 34
Chris@0 35 def test_truth
Chris@0 36 assert_kind_of User, @jsmith
Chris@0 37 end
Chris@1 38
Chris@1 39 def test_mail_should_be_stripped
Chris@1 40 u = User.new
Chris@1 41 u.mail = " foo@bar.com "
Chris@1 42 assert_equal "foo@bar.com", u.mail
Chris@1 43 end
Chris@0 44
Chris@0 45 def test_create
Chris@0 46 user = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo")
Chris@0 47
Chris@0 48 user.login = "jsmith"
Chris@0 49 user.password, user.password_confirmation = "password", "password"
Chris@0 50 # login uniqueness
Chris@0 51 assert !user.save
Chris@0 52 assert_equal 1, user.errors.count
Chris@0 53
Chris@0 54 user.login = "newuser"
Chris@0 55 user.password, user.password_confirmation = "passwd", "password"
Chris@0 56 # password confirmation
Chris@0 57 assert !user.save
Chris@0 58 assert_equal 1, user.errors.count
Chris@0 59
Chris@0 60 user.password, user.password_confirmation = "password", "password"
Chris@0 61 assert user.save
Chris@0 62 end
chris@37 63
chris@37 64 context "User#before_create" do
chris@37 65 should "set the mail_notification to the default Setting" do
chris@37 66 @user1 = User.generate_with_protected!
chris@37 67 assert_equal 'only_my_events', @user1.mail_notification
chris@37 68
chris@37 69 with_settings :default_notification_option => 'all' do
chris@37 70 @user2 = User.generate_with_protected!
chris@37 71 assert_equal 'all', @user2.mail_notification
chris@37 72 end
chris@37 73 end
chris@37 74 end
Chris@0 75
Chris@0 76 context "User.login" do
Chris@0 77 should "be case-insensitive." do
Chris@0 78 u = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo")
Chris@0 79 u.login = 'newuser'
Chris@0 80 u.password, u.password_confirmation = "password", "password"
Chris@0 81 assert u.save
Chris@0 82
Chris@0 83 u = User.new(:firstname => "Similar", :lastname => "User", :mail => "similaruser@somenet.foo")
Chris@0 84 u.login = 'NewUser'
Chris@0 85 u.password, u.password_confirmation = "password", "password"
Chris@0 86 assert !u.save
Chris@0 87 assert_equal I18n.translate('activerecord.errors.messages.taken'), u.errors.on(:login)
Chris@0 88 end
Chris@0 89 end
Chris@0 90
Chris@0 91 def test_mail_uniqueness_should_not_be_case_sensitive
Chris@0 92 u = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo")
Chris@0 93 u.login = 'newuser1'
Chris@0 94 u.password, u.password_confirmation = "password", "password"
Chris@0 95 assert u.save
Chris@0 96
Chris@0 97 u = User.new(:firstname => "new", :lastname => "user", :mail => "newUser@Somenet.foo")
Chris@0 98 u.login = 'newuser2'
Chris@0 99 u.password, u.password_confirmation = "password", "password"
Chris@0 100 assert !u.save
Chris@0 101 assert_equal I18n.translate('activerecord.errors.messages.taken'), u.errors.on(:mail)
Chris@0 102 end
Chris@0 103
Chris@0 104 def test_update
Chris@0 105 assert_equal "admin", @admin.login
Chris@0 106 @admin.login = "john"
Chris@0 107 assert @admin.save, @admin.errors.full_messages.join("; ")
Chris@0 108 @admin.reload
Chris@0 109 assert_equal "john", @admin.login
Chris@0 110 end
Chris@0 111
Chris@128 112 def test_destroy_should_delete_members_and_roles
Chris@128 113 members = Member.find_all_by_user_id(2)
Chris@128 114 ms = members.size
Chris@128 115 rs = members.collect(&:roles).flatten.size
Chris@128 116
Chris@128 117 assert_difference 'Member.count', - ms do
Chris@128 118 assert_difference 'MemberRole.count', - rs do
Chris@128 119 User.find(2).destroy
Chris@128 120 end
Chris@128 121 end
Chris@128 122
Chris@128 123 assert_nil User.find_by_id(2)
Chris@128 124 assert Member.find_all_by_user_id(2).empty?
Chris@128 125 end
Chris@128 126
Chris@128 127 def test_destroy_should_update_attachments
Chris@128 128 attachment = Attachment.create!(:container => Project.find(1),
Chris@128 129 :file => uploaded_test_file("testfile.txt", "text/plain"),
Chris@128 130 :author_id => 2)
Chris@128 131
Chris@0 132 User.find(2).destroy
Chris@0 133 assert_nil User.find_by_id(2)
Chris@128 134 assert_equal User.anonymous, attachment.reload.author
Chris@128 135 end
Chris@128 136
Chris@128 137 def test_destroy_should_update_comments
Chris@128 138 comment = Comment.create!(
Chris@128 139 :commented => News.create!(:project_id => 1, :author_id => 1, :title => 'foo', :description => 'foo'),
Chris@128 140 :author => User.find(2),
Chris@128 141 :comments => 'foo'
Chris@128 142 )
Chris@128 143
Chris@128 144 User.find(2).destroy
Chris@128 145 assert_nil User.find_by_id(2)
Chris@128 146 assert_equal User.anonymous, comment.reload.author
Chris@128 147 end
Chris@128 148
Chris@128 149 def test_destroy_should_update_issues
Chris@128 150 issue = Issue.create!(:project_id => 1, :author_id => 2, :tracker_id => 1, :subject => 'foo')
Chris@128 151
Chris@128 152 User.find(2).destroy
Chris@128 153 assert_nil User.find_by_id(2)
Chris@128 154 assert_equal User.anonymous, issue.reload.author
Chris@128 155 end
Chris@128 156
Chris@128 157 def test_destroy_should_unassign_issues
Chris@128 158 issue = Issue.create!(:project_id => 1, :author_id => 1, :tracker_id => 1, :subject => 'foo', :assigned_to_id => 2)
Chris@128 159
Chris@128 160 User.find(2).destroy
Chris@128 161 assert_nil User.find_by_id(2)
Chris@128 162 assert_nil issue.reload.assigned_to
Chris@128 163 end
Chris@128 164
Chris@128 165 def test_destroy_should_update_journals
Chris@128 166 issue = Issue.create!(:project_id => 1, :author_id => 2, :tracker_id => 1, :subject => 'foo')
Chris@128 167 issue.init_journal(User.find(2), "update")
Chris@128 168 issue.save!
Chris@128 169
Chris@128 170 User.find(2).destroy
Chris@128 171 assert_nil User.find_by_id(2)
Chris@128 172 assert_equal User.anonymous, issue.journals.first.reload.user
Chris@128 173 end
Chris@128 174
Chris@128 175 def test_destroy_should_update_journal_details_old_value
Chris@128 176 issue = Issue.create!(:project_id => 1, :author_id => 1, :tracker_id => 1, :subject => 'foo', :assigned_to_id => 2)
Chris@128 177 issue.init_journal(User.find(1), "update")
Chris@128 178 issue.assigned_to_id = nil
Chris@128 179 assert_difference 'JournalDetail.count' do
Chris@128 180 issue.save!
Chris@128 181 end
Chris@128 182 journal_detail = JournalDetail.first(:order => 'id DESC')
Chris@128 183 assert_equal '2', journal_detail.old_value
Chris@128 184
Chris@128 185 User.find(2).destroy
Chris@128 186 assert_nil User.find_by_id(2)
Chris@128 187 assert_equal User.anonymous.id.to_s, journal_detail.reload.old_value
Chris@128 188 end
Chris@128 189
Chris@128 190 def test_destroy_should_update_journal_details_value
Chris@128 191 issue = Issue.create!(:project_id => 1, :author_id => 1, :tracker_id => 1, :subject => 'foo')
Chris@128 192 issue.init_journal(User.find(1), "update")
Chris@128 193 issue.assigned_to_id = 2
Chris@128 194 assert_difference 'JournalDetail.count' do
Chris@128 195 issue.save!
Chris@128 196 end
Chris@128 197 journal_detail = JournalDetail.first(:order => 'id DESC')
Chris@128 198 assert_equal '2', journal_detail.value
Chris@128 199
Chris@128 200 User.find(2).destroy
Chris@128 201 assert_nil User.find_by_id(2)
Chris@128 202 assert_equal User.anonymous.id.to_s, journal_detail.reload.value
Chris@128 203 end
Chris@128 204
Chris@128 205 def test_destroy_should_update_messages
Chris@128 206 board = Board.create!(:project_id => 1, :name => 'Board', :description => 'Board')
Chris@128 207 message = Message.create!(:board_id => board.id, :author_id => 2, :subject => 'foo', :content => 'foo')
Chris@128 208
Chris@128 209 User.find(2).destroy
Chris@128 210 assert_nil User.find_by_id(2)
Chris@128 211 assert_equal User.anonymous, message.reload.author
Chris@128 212 end
Chris@128 213
Chris@128 214 def test_destroy_should_update_news
Chris@128 215 news = News.create!(:project_id => 1, :author_id => 2, :title => 'foo', :description => 'foo')
Chris@128 216
Chris@128 217 User.find(2).destroy
Chris@128 218 assert_nil User.find_by_id(2)
Chris@128 219 assert_equal User.anonymous, news.reload.author
Chris@128 220 end
Chris@128 221
Chris@128 222 def test_destroy_should_delete_private_queries
Chris@128 223 query = Query.new(:name => 'foo', :is_public => false)
Chris@128 224 query.project_id = 1
Chris@128 225 query.user_id = 2
Chris@128 226 query.save!
Chris@128 227
Chris@128 228 User.find(2).destroy
Chris@128 229 assert_nil User.find_by_id(2)
Chris@128 230 assert_nil Query.find_by_id(query.id)
Chris@128 231 end
Chris@128 232
Chris@128 233 def test_destroy_should_update_public_queries
Chris@128 234 query = Query.new(:name => 'foo', :is_public => true)
Chris@128 235 query.project_id = 1
Chris@128 236 query.user_id = 2
Chris@128 237 query.save!
Chris@128 238
Chris@128 239 User.find(2).destroy
Chris@128 240 assert_nil User.find_by_id(2)
Chris@128 241 assert_equal User.anonymous, query.reload.user
Chris@128 242 end
Chris@128 243
Chris@128 244 def test_destroy_should_update_time_entries
Chris@128 245 entry = TimeEntry.new(:hours => '2', :spent_on => Date.today, :activity => TimeEntryActivity.create!(:name => 'foo'))
Chris@128 246 entry.project_id = 1
Chris@128 247 entry.user_id = 2
Chris@128 248 entry.save!
Chris@128 249
Chris@128 250 User.find(2).destroy
Chris@128 251 assert_nil User.find_by_id(2)
Chris@128 252 assert_equal User.anonymous, entry.reload.user
Chris@128 253 end
Chris@128 254
Chris@128 255 def test_destroy_should_delete_tokens
Chris@128 256 token = Token.create!(:user_id => 2, :value => 'foo')
Chris@128 257
Chris@128 258 User.find(2).destroy
Chris@128 259 assert_nil User.find_by_id(2)
Chris@128 260 assert_nil Token.find_by_id(token.id)
Chris@128 261 end
Chris@128 262
Chris@128 263 def test_destroy_should_delete_watchers
Chris@128 264 issue = Issue.create!(:project_id => 1, :author_id => 1, :tracker_id => 1, :subject => 'foo')
Chris@128 265 watcher = Watcher.create!(:user_id => 2, :watchable => issue)
Chris@128 266
Chris@128 267 User.find(2).destroy
Chris@128 268 assert_nil User.find_by_id(2)
Chris@128 269 assert_nil Watcher.find_by_id(watcher.id)
Chris@128 270 end
Chris@128 271
Chris@128 272 def test_destroy_should_update_wiki_contents
Chris@128 273 wiki_content = WikiContent.create!(
Chris@128 274 :text => 'foo',
Chris@128 275 :author_id => 2,
Chris@128 276 :page => WikiPage.create!(:title => 'Foo', :wiki => Wiki.create!(:project_id => 1, :start_page => 'Start'))
Chris@128 277 )
Chris@128 278 wiki_content.text = 'bar'
Chris@128 279 assert_difference 'WikiContent::Version.count' do
Chris@128 280 wiki_content.save!
Chris@128 281 end
Chris@128 282
Chris@128 283 User.find(2).destroy
Chris@128 284 assert_nil User.find_by_id(2)
Chris@128 285 assert_equal User.anonymous, wiki_content.reload.author
Chris@128 286 wiki_content.versions.each do |version|
Chris@128 287 assert_equal User.anonymous, version.reload.author
Chris@128 288 end
Chris@128 289 end
Chris@128 290
Chris@128 291 def test_destroy_should_nullify_issue_categories
Chris@128 292 category = IssueCategory.create!(:project_id => 1, :assigned_to_id => 2, :name => 'foo')
Chris@128 293
Chris@128 294 User.find(2).destroy
Chris@128 295 assert_nil User.find_by_id(2)
Chris@128 296 assert_nil category.reload.assigned_to_id
Chris@128 297 end
Chris@128 298
Chris@128 299 def test_destroy_should_nullify_changesets
Chris@128 300 changeset = Changeset.create!(
Chris@128 301 :repository => Repository::Subversion.create!(
Chris@128 302 :project_id => 1,
Chris@128 303 :url => 'file:///var/svn'
Chris@128 304 ),
Chris@128 305 :revision => '12',
Chris@128 306 :committed_on => Time.now,
Chris@128 307 :committer => 'jsmith'
Chris@128 308 )
Chris@128 309 assert_equal 2, changeset.user_id
Chris@128 310
Chris@128 311 User.find(2).destroy
Chris@128 312 assert_nil User.find_by_id(2)
Chris@128 313 assert_nil changeset.reload.user_id
Chris@128 314 end
Chris@128 315
Chris@128 316 def test_anonymous_user_should_not_be_destroyable
Chris@128 317 assert_no_difference 'User.count' do
Chris@128 318 assert_equal false, User.anonymous.destroy
Chris@128 319 end
Chris@0 320 end
Chris@0 321
Chris@119 322 def test_validate_login_presence
Chris@0 323 @admin.login = ""
Chris@0 324 assert !@admin.save
Chris@0 325 assert_equal 1, @admin.errors.count
Chris@0 326 end
Chris@0 327
Chris@119 328 def test_validate_mail_notification_inclusion
Chris@119 329 u = User.new
Chris@119 330 u.mail_notification = 'foo'
Chris@119 331 u.save
Chris@119 332 assert_not_nil u.errors.on(:mail_notification)
Chris@119 333 end
Chris@119 334
Chris@0 335 context "User#try_to_login" do
Chris@0 336 should "fall-back to case-insensitive if user login is not found as-typed." do
Chris@0 337 user = User.try_to_login("AdMin", "admin")
Chris@0 338 assert_kind_of User, user
Chris@0 339 assert_equal "admin", user.login
Chris@0 340 end
Chris@0 341
Chris@0 342 should "select the exact matching user first" do
Chris@0 343 case_sensitive_user = User.generate_with_protected!(:login => 'changed', :password => 'admin', :password_confirmation => 'admin')
Chris@0 344 # bypass validations to make it appear like existing data
Chris@0 345 case_sensitive_user.update_attribute(:login, 'ADMIN')
Chris@0 346
Chris@0 347 user = User.try_to_login("ADMIN", "admin")
Chris@0 348 assert_kind_of User, user
Chris@0 349 assert_equal "ADMIN", user.login
Chris@0 350
Chris@0 351 end
Chris@0 352 end
Chris@0 353
Chris@0 354 def test_password
Chris@0 355 user = User.try_to_login("admin", "admin")
Chris@0 356 assert_kind_of User, user
Chris@0 357 assert_equal "admin", user.login
Chris@0 358 user.password = "hello"
Chris@0 359 assert user.save
Chris@0 360
Chris@0 361 user = User.try_to_login("admin", "hello")
Chris@0 362 assert_kind_of User, user
Chris@0 363 assert_equal "admin", user.login
Chris@0 364 end
Chris@0 365
Chris@0 366 def test_name_format
Chris@0 367 assert_equal 'Smith, John', @jsmith.name(:lastname_coma_firstname)
Chris@0 368 Setting.user_format = :firstname_lastname
Chris@0 369 assert_equal 'John Smith', @jsmith.reload.name
Chris@0 370 Setting.user_format = :username
Chris@0 371 assert_equal 'jsmith', @jsmith.reload.name
Chris@0 372 end
Chris@0 373
Chris@0 374 def test_lock
Chris@0 375 user = User.try_to_login("jsmith", "jsmith")
Chris@0 376 assert_equal @jsmith, user
Chris@0 377
Chris@0 378 @jsmith.status = User::STATUS_LOCKED
Chris@0 379 assert @jsmith.save
Chris@0 380
Chris@0 381 user = User.try_to_login("jsmith", "jsmith")
Chris@0 382 assert_equal nil, user
Chris@0 383 end
Chris@0 384
Chris@245 385 context ".try_to_login" do
Chris@245 386 context "with good credentials" do
Chris@245 387 should "return the user" do
Chris@245 388 user = User.try_to_login("admin", "admin")
Chris@245 389 assert_kind_of User, user
Chris@245 390 assert_equal "admin", user.login
Chris@245 391 end
Chris@245 392 end
Chris@245 393
Chris@245 394 context "with wrong credentials" do
Chris@245 395 should "return nil" do
Chris@245 396 assert_nil User.try_to_login("admin", "foo")
Chris@245 397 end
Chris@245 398 end
Chris@245 399 end
Chris@245 400
Chris@0 401 if ldap_configured?
Chris@0 402 context "#try_to_login using LDAP" do
Chris@0 403 context "with failed connection to the LDAP server" do
Chris@0 404 should "return nil" do
Chris@0 405 @auth_source = AuthSourceLdap.find(1)
Chris@0 406 AuthSource.any_instance.stubs(:initialize_ldap_con).raises(Net::LDAP::LdapError, 'Cannot connect')
Chris@0 407
Chris@0 408 assert_equal nil, User.try_to_login('edavis', 'wrong')
Chris@0 409 end
Chris@0 410 end
Chris@0 411
Chris@0 412 context "with an unsuccessful authentication" do
Chris@0 413 should "return nil" do
Chris@0 414 assert_equal nil, User.try_to_login('edavis', 'wrong')
Chris@0 415 end
Chris@0 416 end
Chris@0 417
Chris@0 418 context "on the fly registration" do
Chris@0 419 setup do
Chris@0 420 @auth_source = AuthSourceLdap.find(1)
Chris@0 421 end
Chris@0 422
Chris@0 423 context "with a successful authentication" do
Chris@0 424 should "create a new user account if it doesn't exist" do
Chris@0 425 assert_difference('User.count') do
Chris@0 426 user = User.try_to_login('edavis', '123456')
Chris@0 427 assert !user.admin?
Chris@0 428 end
Chris@0 429 end
Chris@0 430
Chris@0 431 should "retrieve existing user" do
Chris@0 432 user = User.try_to_login('edavis', '123456')
Chris@0 433 user.admin = true
Chris@0 434 user.save!
Chris@0 435
Chris@0 436 assert_no_difference('User.count') do
Chris@0 437 user = User.try_to_login('edavis', '123456')
Chris@0 438 assert user.admin?
Chris@0 439 end
Chris@0 440 end
Chris@0 441 end
Chris@0 442 end
Chris@0 443 end
Chris@0 444
Chris@0 445 else
Chris@0 446 puts "Skipping LDAP tests."
Chris@0 447 end
Chris@0 448
Chris@0 449 def test_create_anonymous
Chris@0 450 AnonymousUser.delete_all
Chris@0 451 anon = User.anonymous
Chris@0 452 assert !anon.new_record?
Chris@0 453 assert_kind_of AnonymousUser, anon
Chris@0 454 end
Chris@0 455
Chris@0 456 should_have_one :rss_token
Chris@0 457
Chris@0 458 def test_rss_key
Chris@0 459 assert_nil @jsmith.rss_token
Chris@0 460 key = @jsmith.rss_key
Chris@0 461 assert_equal 40, key.length
Chris@0 462
Chris@0 463 @jsmith.reload
Chris@0 464 assert_equal key, @jsmith.rss_key
Chris@0 465 end
Chris@0 466
Chris@0 467
Chris@0 468 should_have_one :api_token
Chris@0 469
Chris@0 470 context "User#api_key" do
Chris@0 471 should "generate a new one if the user doesn't have one" do
Chris@0 472 user = User.generate_with_protected!(:api_token => nil)
Chris@0 473 assert_nil user.api_token
Chris@0 474
Chris@0 475 key = user.api_key
Chris@0 476 assert_equal 40, key.length
Chris@0 477 user.reload
Chris@0 478 assert_equal key, user.api_key
Chris@0 479 end
Chris@0 480
Chris@0 481 should "return the existing api token value" do
Chris@0 482 user = User.generate_with_protected!
Chris@0 483 token = Token.generate!(:action => 'api')
Chris@0 484 user.api_token = token
Chris@0 485 assert user.save
Chris@0 486
Chris@0 487 assert_equal token.value, user.api_key
Chris@0 488 end
Chris@0 489 end
Chris@0 490
Chris@0 491 context "User#find_by_api_key" do
Chris@0 492 should "return nil if no matching key is found" do
Chris@0 493 assert_nil User.find_by_api_key('zzzzzzzzz')
Chris@0 494 end
Chris@0 495
Chris@0 496 should "return nil if the key is found for an inactive user" do
Chris@0 497 user = User.generate_with_protected!(:status => User::STATUS_LOCKED)
Chris@0 498 token = Token.generate!(:action => 'api')
Chris@0 499 user.api_token = token
Chris@0 500 user.save
Chris@0 501
Chris@0 502 assert_nil User.find_by_api_key(token.value)
Chris@0 503 end
Chris@0 504
Chris@0 505 should "return the user if the key is found for an active user" do
Chris@0 506 user = User.generate_with_protected!(:status => User::STATUS_ACTIVE)
Chris@0 507 token = Token.generate!(:action => 'api')
Chris@0 508 user.api_token = token
Chris@0 509 user.save
Chris@0 510
Chris@0 511 assert_equal user, User.find_by_api_key(token.value)
Chris@0 512 end
Chris@0 513 end
Chris@0 514
Chris@0 515 def test_roles_for_project
Chris@0 516 # user with a role
Chris@0 517 roles = @jsmith.roles_for_project(Project.find(1))
Chris@0 518 assert_kind_of Role, roles.first
Chris@0 519 assert_equal "Manager", roles.first.name
Chris@0 520
Chris@0 521 # user with no role
Chris@0 522 assert_nil @dlopper.roles_for_project(Project.find(2)).detect {|role| role.member?}
Chris@0 523 end
Chris@0 524
Chris@441 525 def test_projects_by_role_for_user_with_role
Chris@441 526 user = User.find(2)
Chris@441 527 assert_kind_of Hash, user.projects_by_role
Chris@441 528 assert_equal 2, user.projects_by_role.size
Chris@441 529 assert_equal [1,5], user.projects_by_role[Role.find(1)].collect(&:id).sort
Chris@441 530 assert_equal [2], user.projects_by_role[Role.find(2)].collect(&:id).sort
Chris@441 531 end
Chris@441 532
Chris@441 533 def test_projects_by_role_for_user_with_no_role
Chris@441 534 user = User.generate!
Chris@441 535 assert_equal({}, user.projects_by_role)
Chris@441 536 end
Chris@441 537
Chris@441 538 def test_projects_by_role_for_anonymous
Chris@441 539 assert_equal({}, User.anonymous.projects_by_role)
Chris@441 540 end
Chris@441 541
Chris@128 542 def test_valid_notification_options
Chris@128 543 # without memberships
Chris@128 544 assert_equal 5, User.find(7).valid_notification_options.size
Chris@128 545 # with memberships
Chris@128 546 assert_equal 6, User.find(2).valid_notification_options.size
Chris@128 547 end
Chris@128 548
Chris@128 549 def test_valid_notification_options_class_method
Chris@128 550 assert_equal 5, User.valid_notification_options.size
Chris@128 551 assert_equal 5, User.valid_notification_options(User.find(7)).size
Chris@128 552 assert_equal 6, User.valid_notification_options(User.find(2)).size
Chris@128 553 end
Chris@128 554
Chris@0 555 def test_mail_notification_all
chris@37 556 @jsmith.mail_notification = 'all'
Chris@0 557 @jsmith.notified_project_ids = []
Chris@0 558 @jsmith.save
Chris@0 559 @jsmith.reload
Chris@0 560 assert @jsmith.projects.first.recipients.include?(@jsmith.mail)
Chris@0 561 end
Chris@0 562
Chris@0 563 def test_mail_notification_selected
chris@37 564 @jsmith.mail_notification = 'selected'
Chris@0 565 @jsmith.notified_project_ids = [1]
Chris@0 566 @jsmith.save
Chris@0 567 @jsmith.reload
Chris@0 568 assert Project.find(1).recipients.include?(@jsmith.mail)
Chris@0 569 end
Chris@0 570
chris@37 571 def test_mail_notification_only_my_events
chris@37 572 @jsmith.mail_notification = 'only_my_events'
Chris@0 573 @jsmith.notified_project_ids = []
Chris@0 574 @jsmith.save
Chris@0 575 @jsmith.reload
Chris@0 576 assert !@jsmith.projects.first.recipients.include?(@jsmith.mail)
Chris@0 577 end
Chris@0 578
Chris@0 579 def test_comments_sorting_preference
Chris@0 580 assert !@jsmith.wants_comments_in_reverse_order?
Chris@0 581 @jsmith.pref.comments_sorting = 'asc'
Chris@0 582 assert !@jsmith.wants_comments_in_reverse_order?
Chris@0 583 @jsmith.pref.comments_sorting = 'desc'
Chris@0 584 assert @jsmith.wants_comments_in_reverse_order?
Chris@0 585 end
Chris@0 586
Chris@0 587 def test_find_by_mail_should_be_case_insensitive
Chris@0 588 u = User.find_by_mail('JSmith@somenet.foo')
Chris@0 589 assert_not_nil u
Chris@0 590 assert_equal 'jsmith@somenet.foo', u.mail
Chris@0 591 end
Chris@0 592
Chris@0 593 def test_random_password
Chris@0 594 u = User.new
Chris@0 595 u.random_password
Chris@0 596 assert !u.password.blank?
Chris@0 597 assert !u.password_confirmation.blank?
Chris@0 598 end
Chris@0 599
Chris@0 600 context "#change_password_allowed?" do
Chris@0 601 should "be allowed if no auth source is set" do
Chris@0 602 user = User.generate_with_protected!
Chris@0 603 assert user.change_password_allowed?
Chris@0 604 end
Chris@0 605
Chris@0 606 should "delegate to the auth source" do
Chris@0 607 user = User.generate_with_protected!
Chris@0 608
Chris@0 609 allowed_auth_source = AuthSource.generate!
Chris@0 610 def allowed_auth_source.allow_password_changes?; true; end
Chris@0 611
Chris@0 612 denied_auth_source = AuthSource.generate!
Chris@0 613 def denied_auth_source.allow_password_changes?; false; end
Chris@0 614
Chris@0 615 assert user.change_password_allowed?
Chris@0 616
Chris@0 617 user.auth_source = allowed_auth_source
Chris@0 618 assert user.change_password_allowed?, "User not allowed to change password, though auth source does"
Chris@0 619
Chris@0 620 user.auth_source = denied_auth_source
Chris@0 621 assert !user.change_password_allowed?, "User allowed to change password, though auth source does not"
Chris@0 622 end
Chris@0 623
Chris@0 624 end
Chris@0 625
chris@22 626 context "#allowed_to?" do
chris@22 627 context "with a unique project" do
chris@22 628 should "return false if project is archived" do
chris@22 629 project = Project.find(1)
chris@22 630 Project.any_instance.stubs(:status).returns(Project::STATUS_ARCHIVED)
chris@22 631 assert ! @admin.allowed_to?(:view_issues, Project.find(1))
chris@22 632 end
chris@22 633
chris@22 634 should "return false if related module is disabled" do
chris@22 635 project = Project.find(1)
chris@22 636 project.enabled_module_names = ["issue_tracking"]
chris@22 637 assert @admin.allowed_to?(:add_issues, project)
chris@22 638 assert ! @admin.allowed_to?(:view_wiki_pages, project)
chris@22 639 end
chris@22 640
chris@22 641 should "authorize nearly everything for admin users" do
chris@22 642 project = Project.find(1)
chris@22 643 assert ! @admin.member_of?(project)
chris@22 644 %w(edit_issues delete_issues manage_news manage_documents manage_wiki).each do |p|
chris@22 645 assert @admin.allowed_to?(p.to_sym, project)
chris@22 646 end
chris@22 647 end
chris@22 648
chris@22 649 should "authorize normal users depending on their roles" do
chris@22 650 project = Project.find(1)
chris@22 651 assert @jsmith.allowed_to?(:delete_messages, project) #Manager
chris@22 652 assert ! @dlopper.allowed_to?(:delete_messages, project) #Developper
chris@22 653 end
chris@22 654 end
chris@37 655
chris@37 656 context "with multiple projects" do
chris@37 657 should "return false if array is empty" do
chris@37 658 assert ! @admin.allowed_to?(:view_project, [])
chris@37 659 end
chris@37 660
chris@37 661 should "return true only if user has permission on all these projects" do
chris@37 662 assert @admin.allowed_to?(:view_project, Project.all)
chris@37 663 assert ! @dlopper.allowed_to?(:view_project, Project.all) #cannot see Project(2)
chris@37 664 assert @jsmith.allowed_to?(:edit_issues, @jsmith.projects) #Manager or Developer everywhere
chris@37 665 assert ! @jsmith.allowed_to?(:delete_issue_watchers, @jsmith.projects) #Dev cannot delete_issue_watchers
chris@37 666 end
chris@37 667
chris@37 668 should "behave correctly with arrays of 1 project" do
chris@37 669 assert ! User.anonymous.allowed_to?(:delete_issues, [Project.first])
chris@37 670 end
chris@37 671 end
chris@22 672
chris@22 673 context "with options[:global]" do
chris@22 674 should "authorize if user has at least one role that has this permission" do
chris@22 675 @dlopper2 = User.find(5) #only Developper on a project, not Manager anywhere
chris@22 676 @anonymous = User.find(6)
chris@22 677 assert @jsmith.allowed_to?(:delete_issue_watchers, nil, :global => true)
chris@22 678 assert ! @dlopper2.allowed_to?(:delete_issue_watchers, nil, :global => true)
chris@22 679 assert @dlopper2.allowed_to?(:add_issues, nil, :global => true)
chris@22 680 assert ! @anonymous.allowed_to?(:add_issues, nil, :global => true)
chris@22 681 assert @anonymous.allowed_to?(:view_issues, nil, :global => true)
chris@22 682 end
chris@22 683 end
chris@22 684 end
chris@22 685
chris@37 686 context "User#notify_about?" do
chris@37 687 context "Issues" do
chris@37 688 setup do
chris@37 689 @project = Project.find(1)
chris@37 690 @author = User.generate_with_protected!
chris@37 691 @assignee = User.generate_with_protected!
chris@37 692 @issue = Issue.generate_for_project!(@project, :assigned_to => @assignee, :author => @author)
chris@37 693 end
chris@37 694
chris@37 695 should "be true for a user with :all" do
Chris@119 696 @author.update_attribute(:mail_notification, 'all')
chris@37 697 assert @author.notify_about?(@issue)
chris@37 698 end
chris@37 699
chris@37 700 should "be false for a user with :none" do
Chris@119 701 @author.update_attribute(:mail_notification, 'none')
chris@37 702 assert ! @author.notify_about?(@issue)
chris@37 703 end
chris@37 704
chris@37 705 should "be false for a user with :only_my_events and isn't an author, creator, or assignee" do
Chris@119 706 @user = User.generate_with_protected!(:mail_notification => 'only_my_events')
Chris@210 707 Member.create!(:user => @user, :project => @project, :role_ids => [1])
chris@37 708 assert ! @user.notify_about?(@issue)
chris@37 709 end
chris@37 710
chris@37 711 should "be true for a user with :only_my_events and is the author" do
Chris@119 712 @author.update_attribute(:mail_notification, 'only_my_events')
chris@37 713 assert @author.notify_about?(@issue)
chris@37 714 end
chris@37 715
chris@37 716 should "be true for a user with :only_my_events and is the assignee" do
Chris@119 717 @assignee.update_attribute(:mail_notification, 'only_my_events')
chris@37 718 assert @assignee.notify_about?(@issue)
chris@37 719 end
chris@37 720
chris@37 721 should "be true for a user with :only_assigned and is the assignee" do
Chris@119 722 @assignee.update_attribute(:mail_notification, 'only_assigned')
chris@37 723 assert @assignee.notify_about?(@issue)
chris@37 724 end
chris@37 725
chris@37 726 should "be false for a user with :only_assigned and is not the assignee" do
Chris@119 727 @author.update_attribute(:mail_notification, 'only_assigned')
chris@37 728 assert ! @author.notify_about?(@issue)
chris@37 729 end
chris@37 730
chris@37 731 should "be true for a user with :only_owner and is the author" do
Chris@119 732 @author.update_attribute(:mail_notification, 'only_owner')
chris@37 733 assert @author.notify_about?(@issue)
chris@37 734 end
chris@37 735
chris@37 736 should "be false for a user with :only_owner and is not the author" do
Chris@119 737 @assignee.update_attribute(:mail_notification, 'only_owner')
chris@37 738 assert ! @assignee.notify_about?(@issue)
chris@37 739 end
Chris@210 740
Chris@210 741 should "be true for a user with :selected and is the author" do
Chris@210 742 @author.update_attribute(:mail_notification, 'selected')
Chris@210 743 assert @author.notify_about?(@issue)
Chris@210 744 end
Chris@210 745
Chris@210 746 should "be true for a user with :selected and is the assignee" do
Chris@210 747 @assignee.update_attribute(:mail_notification, 'selected')
Chris@210 748 assert @assignee.notify_about?(@issue)
Chris@210 749 end
Chris@210 750
Chris@210 751 should "be false for a user with :selected and is not the author or assignee" do
Chris@210 752 @user = User.generate_with_protected!(:mail_notification => 'selected')
Chris@210 753 Member.create!(:user => @user, :project => @project, :role_ids => [1])
Chris@210 754 assert ! @user.notify_about?(@issue)
Chris@210 755 end
chris@37 756 end
chris@37 757
chris@37 758 context "other events" do
chris@37 759 should 'be added and tested'
chris@37 760 end
chris@37 761 end
Chris@245 762
Chris@245 763 def test_salt_unsalted_passwords
Chris@245 764 # Restore a user with an unsalted password
Chris@245 765 user = User.find(1)
Chris@245 766 user.salt = nil
Chris@245 767 user.hashed_password = User.hash_password("unsalted")
Chris@245 768 user.save!
Chris@245 769
Chris@245 770 User.salt_unsalted_passwords!
Chris@245 771
Chris@245 772 user.reload
Chris@245 773 # Salt added
Chris@245 774 assert !user.salt.blank?
Chris@245 775 # Password still valid
Chris@245 776 assert user.check_password?("unsalted")
Chris@245 777 assert_equal user, User.try_to_login(user.login, "unsalted")
Chris@245 778 end
chris@37 779
Chris@0 780 if Object.const_defined?(:OpenID)
Chris@0 781
Chris@0 782 def test_setting_identity_url
Chris@0 783 normalized_open_id_url = 'http://example.com/'
Chris@0 784 u = User.new( :identity_url => 'http://example.com/' )
Chris@0 785 assert_equal normalized_open_id_url, u.identity_url
Chris@0 786 end
Chris@0 787
Chris@0 788 def test_setting_identity_url_without_trailing_slash
Chris@0 789 normalized_open_id_url = 'http://example.com/'
Chris@0 790 u = User.new( :identity_url => 'http://example.com' )
Chris@0 791 assert_equal normalized_open_id_url, u.identity_url
Chris@0 792 end
Chris@0 793
Chris@0 794 def test_setting_identity_url_without_protocol
Chris@0 795 normalized_open_id_url = 'http://example.com/'
Chris@0 796 u = User.new( :identity_url => 'example.com' )
Chris@0 797 assert_equal normalized_open_id_url, u.identity_url
Chris@0 798 end
Chris@0 799
Chris@0 800 def test_setting_blank_identity_url
Chris@0 801 u = User.new( :identity_url => 'example.com' )
Chris@0 802 u.identity_url = ''
Chris@0 803 assert u.identity_url.blank?
Chris@0 804 end
Chris@0 805
Chris@0 806 def test_setting_invalid_identity_url
Chris@0 807 u = User.new( :identity_url => 'this is not an openid url' )
Chris@0 808 assert u.identity_url.blank?
Chris@0 809 end
Chris@0 810
Chris@0 811 else
Chris@0 812 puts "Skipping openid tests."
Chris@0 813 end
Chris@0 814
Chris@0 815 end