Chris@0
|
1 # redMine - project management software
|
Chris@0
|
2 # Copyright (C) 2006 Jean-Philippe Lang
|
Chris@0
|
3 #
|
Chris@0
|
4 # This program is free software; you can redistribute it and/or
|
Chris@0
|
5 # modify it under the terms of the GNU General Public License
|
Chris@0
|
6 # as published by the Free Software Foundation; either version 2
|
Chris@0
|
7 # of the License, or (at your option) any later version.
|
Chris@0
|
8 #
|
Chris@0
|
9 # This program is distributed in the hope that it will be useful,
|
Chris@0
|
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
|
Chris@0
|
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
Chris@0
|
12 # GNU General Public License for more details.
|
Chris@0
|
13 #
|
Chris@0
|
14 # You should have received a copy of the GNU General Public License
|
Chris@0
|
15 # along with this program; if not, write to the Free Software
|
Chris@0
|
16 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
Chris@0
|
17
|
Chris@117
|
18 require File.expand_path('../../test_helper', __FILE__)
|
Chris@0
|
19
|
Chris@0
|
20 class UserTest < ActiveSupport::TestCase
|
Chris@0
|
21 fixtures :users, :members, :projects, :roles, :member_roles, :auth_sources
|
Chris@0
|
22
|
Chris@0
|
23 def setup
|
Chris@0
|
24 @admin = User.find(1)
|
Chris@0
|
25 @jsmith = User.find(2)
|
Chris@0
|
26 @dlopper = User.find(3)
|
Chris@0
|
27 end
|
Chris@0
|
28
|
Chris@0
|
29 test 'object_daddy creation' do
|
Chris@0
|
30 User.generate_with_protected!(:firstname => 'Testing connection')
|
Chris@0
|
31 User.generate_with_protected!(:firstname => 'Testing connection')
|
Chris@0
|
32 assert_equal 2, User.count(:all, :conditions => {:firstname => 'Testing connection'})
|
Chris@0
|
33 end
|
Chris@0
|
34
|
Chris@0
|
35 def test_truth
|
Chris@0
|
36 assert_kind_of User, @jsmith
|
Chris@0
|
37 end
|
Chris@1
|
38
|
Chris@1
|
39 def test_mail_should_be_stripped
|
Chris@1
|
40 u = User.new
|
Chris@1
|
41 u.mail = " foo@bar.com "
|
Chris@1
|
42 assert_equal "foo@bar.com", u.mail
|
Chris@1
|
43 end
|
Chris@0
|
44
|
Chris@0
|
45 def test_create
|
Chris@0
|
46 user = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo")
|
Chris@0
|
47
|
Chris@0
|
48 user.login = "jsmith"
|
Chris@0
|
49 user.password, user.password_confirmation = "password", "password"
|
Chris@0
|
50 # login uniqueness
|
Chris@0
|
51 assert !user.save
|
Chris@0
|
52 assert_equal 1, user.errors.count
|
Chris@0
|
53
|
Chris@0
|
54 user.login = "newuser"
|
Chris@0
|
55 user.password, user.password_confirmation = "passwd", "password"
|
Chris@0
|
56 # password confirmation
|
Chris@0
|
57 assert !user.save
|
Chris@0
|
58 assert_equal 1, user.errors.count
|
Chris@0
|
59
|
Chris@0
|
60 user.password, user.password_confirmation = "password", "password"
|
Chris@0
|
61 assert user.save
|
Chris@0
|
62 end
|
chris@37
|
63
|
chris@37
|
64 context "User#before_create" do
|
chris@37
|
65 should "set the mail_notification to the default Setting" do
|
chris@37
|
66 @user1 = User.generate_with_protected!
|
chris@37
|
67 assert_equal 'only_my_events', @user1.mail_notification
|
chris@37
|
68
|
chris@37
|
69 with_settings :default_notification_option => 'all' do
|
chris@37
|
70 @user2 = User.generate_with_protected!
|
chris@37
|
71 assert_equal 'all', @user2.mail_notification
|
chris@37
|
72 end
|
chris@37
|
73 end
|
chris@37
|
74 end
|
Chris@0
|
75
|
Chris@0
|
76 context "User.login" do
|
Chris@0
|
77 should "be case-insensitive." do
|
Chris@0
|
78 u = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo")
|
Chris@0
|
79 u.login = 'newuser'
|
Chris@0
|
80 u.password, u.password_confirmation = "password", "password"
|
Chris@0
|
81 assert u.save
|
Chris@0
|
82
|
Chris@0
|
83 u = User.new(:firstname => "Similar", :lastname => "User", :mail => "similaruser@somenet.foo")
|
Chris@0
|
84 u.login = 'NewUser'
|
Chris@0
|
85 u.password, u.password_confirmation = "password", "password"
|
Chris@0
|
86 assert !u.save
|
Chris@0
|
87 assert_equal I18n.translate('activerecord.errors.messages.taken'), u.errors.on(:login)
|
Chris@0
|
88 end
|
Chris@0
|
89 end
|
Chris@0
|
90
|
Chris@0
|
91 def test_mail_uniqueness_should_not_be_case_sensitive
|
Chris@0
|
92 u = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo")
|
Chris@0
|
93 u.login = 'newuser1'
|
Chris@0
|
94 u.password, u.password_confirmation = "password", "password"
|
Chris@0
|
95 assert u.save
|
Chris@0
|
96
|
Chris@0
|
97 u = User.new(:firstname => "new", :lastname => "user", :mail => "newUser@Somenet.foo")
|
Chris@0
|
98 u.login = 'newuser2'
|
Chris@0
|
99 u.password, u.password_confirmation = "password", "password"
|
Chris@0
|
100 assert !u.save
|
Chris@0
|
101 assert_equal I18n.translate('activerecord.errors.messages.taken'), u.errors.on(:mail)
|
Chris@0
|
102 end
|
Chris@0
|
103
|
Chris@0
|
104 def test_update
|
Chris@0
|
105 assert_equal "admin", @admin.login
|
Chris@0
|
106 @admin.login = "john"
|
Chris@0
|
107 assert @admin.save, @admin.errors.full_messages.join("; ")
|
Chris@0
|
108 @admin.reload
|
Chris@0
|
109 assert_equal "john", @admin.login
|
Chris@0
|
110 end
|
Chris@0
|
111
|
Chris@0
|
112 def test_destroy
|
Chris@0
|
113 User.find(2).destroy
|
Chris@0
|
114 assert_nil User.find_by_id(2)
|
Chris@0
|
115 assert Member.find_all_by_user_id(2).empty?
|
Chris@0
|
116 end
|
Chris@0
|
117
|
Chris@117
|
118 def test_validate_login_presence
|
Chris@0
|
119 @admin.login = ""
|
Chris@0
|
120 assert !@admin.save
|
Chris@0
|
121 assert_equal 1, @admin.errors.count
|
Chris@0
|
122 end
|
Chris@0
|
123
|
Chris@117
|
124 def test_validate_mail_notification_inclusion
|
Chris@117
|
125 u = User.new
|
Chris@117
|
126 u.mail_notification = 'foo'
|
Chris@117
|
127 u.save
|
Chris@117
|
128 assert_not_nil u.errors.on(:mail_notification)
|
Chris@117
|
129 end
|
Chris@117
|
130
|
Chris@0
|
131 context "User#try_to_login" do
|
Chris@0
|
132 should "fall-back to case-insensitive if user login is not found as-typed." do
|
Chris@0
|
133 user = User.try_to_login("AdMin", "admin")
|
Chris@0
|
134 assert_kind_of User, user
|
Chris@0
|
135 assert_equal "admin", user.login
|
Chris@0
|
136 end
|
Chris@0
|
137
|
Chris@0
|
138 should "select the exact matching user first" do
|
Chris@0
|
139 case_sensitive_user = User.generate_with_protected!(:login => 'changed', :password => 'admin', :password_confirmation => 'admin')
|
Chris@0
|
140 # bypass validations to make it appear like existing data
|
Chris@0
|
141 case_sensitive_user.update_attribute(:login, 'ADMIN')
|
Chris@0
|
142
|
Chris@0
|
143 user = User.try_to_login("ADMIN", "admin")
|
Chris@0
|
144 assert_kind_of User, user
|
Chris@0
|
145 assert_equal "ADMIN", user.login
|
Chris@0
|
146
|
Chris@0
|
147 end
|
Chris@0
|
148 end
|
Chris@0
|
149
|
Chris@0
|
150 def test_password
|
Chris@0
|
151 user = User.try_to_login("admin", "admin")
|
Chris@0
|
152 assert_kind_of User, user
|
Chris@0
|
153 assert_equal "admin", user.login
|
Chris@0
|
154 user.password = "hello"
|
Chris@0
|
155 assert user.save
|
Chris@0
|
156
|
Chris@0
|
157 user = User.try_to_login("admin", "hello")
|
Chris@0
|
158 assert_kind_of User, user
|
Chris@0
|
159 assert_equal "admin", user.login
|
Chris@0
|
160 assert_equal User.hash_password("hello"), user.hashed_password
|
Chris@0
|
161 end
|
Chris@0
|
162
|
Chris@0
|
163 def test_name_format
|
Chris@0
|
164 assert_equal 'Smith, John', @jsmith.name(:lastname_coma_firstname)
|
Chris@0
|
165 Setting.user_format = :firstname_lastname
|
Chris@0
|
166 assert_equal 'John Smith', @jsmith.reload.name
|
Chris@0
|
167 Setting.user_format = :username
|
Chris@0
|
168 assert_equal 'jsmith', @jsmith.reload.name
|
Chris@0
|
169 end
|
Chris@0
|
170
|
Chris@0
|
171 def test_lock
|
Chris@0
|
172 user = User.try_to_login("jsmith", "jsmith")
|
Chris@0
|
173 assert_equal @jsmith, user
|
Chris@0
|
174
|
Chris@0
|
175 @jsmith.status = User::STATUS_LOCKED
|
Chris@0
|
176 assert @jsmith.save
|
Chris@0
|
177
|
Chris@0
|
178 user = User.try_to_login("jsmith", "jsmith")
|
Chris@0
|
179 assert_equal nil, user
|
Chris@0
|
180 end
|
Chris@0
|
181
|
Chris@0
|
182 if ldap_configured?
|
Chris@0
|
183 context "#try_to_login using LDAP" do
|
Chris@0
|
184 context "with failed connection to the LDAP server" do
|
Chris@0
|
185 should "return nil" do
|
Chris@0
|
186 @auth_source = AuthSourceLdap.find(1)
|
Chris@0
|
187 AuthSource.any_instance.stubs(:initialize_ldap_con).raises(Net::LDAP::LdapError, 'Cannot connect')
|
Chris@0
|
188
|
Chris@0
|
189 assert_equal nil, User.try_to_login('edavis', 'wrong')
|
Chris@0
|
190 end
|
Chris@0
|
191 end
|
Chris@0
|
192
|
Chris@0
|
193 context "with an unsuccessful authentication" do
|
Chris@0
|
194 should "return nil" do
|
Chris@0
|
195 assert_equal nil, User.try_to_login('edavis', 'wrong')
|
Chris@0
|
196 end
|
Chris@0
|
197 end
|
Chris@0
|
198
|
Chris@0
|
199 context "on the fly registration" do
|
Chris@0
|
200 setup do
|
Chris@0
|
201 @auth_source = AuthSourceLdap.find(1)
|
Chris@0
|
202 end
|
Chris@0
|
203
|
Chris@0
|
204 context "with a successful authentication" do
|
Chris@0
|
205 should "create a new user account if it doesn't exist" do
|
Chris@0
|
206 assert_difference('User.count') do
|
Chris@0
|
207 user = User.try_to_login('edavis', '123456')
|
Chris@0
|
208 assert !user.admin?
|
Chris@0
|
209 end
|
Chris@0
|
210 end
|
Chris@0
|
211
|
Chris@0
|
212 should "retrieve existing user" do
|
Chris@0
|
213 user = User.try_to_login('edavis', '123456')
|
Chris@0
|
214 user.admin = true
|
Chris@0
|
215 user.save!
|
Chris@0
|
216
|
Chris@0
|
217 assert_no_difference('User.count') do
|
Chris@0
|
218 user = User.try_to_login('edavis', '123456')
|
Chris@0
|
219 assert user.admin?
|
Chris@0
|
220 end
|
Chris@0
|
221 end
|
Chris@0
|
222 end
|
Chris@0
|
223 end
|
Chris@0
|
224 end
|
Chris@0
|
225
|
Chris@0
|
226 else
|
Chris@0
|
227 puts "Skipping LDAP tests."
|
Chris@0
|
228 end
|
Chris@0
|
229
|
Chris@0
|
230 def test_create_anonymous
|
Chris@0
|
231 AnonymousUser.delete_all
|
Chris@0
|
232 anon = User.anonymous
|
Chris@0
|
233 assert !anon.new_record?
|
Chris@0
|
234 assert_kind_of AnonymousUser, anon
|
Chris@0
|
235 end
|
Chris@0
|
236
|
Chris@0
|
237 should_have_one :rss_token
|
Chris@0
|
238
|
Chris@0
|
239 def test_rss_key
|
Chris@0
|
240 assert_nil @jsmith.rss_token
|
Chris@0
|
241 key = @jsmith.rss_key
|
Chris@0
|
242 assert_equal 40, key.length
|
Chris@0
|
243
|
Chris@0
|
244 @jsmith.reload
|
Chris@0
|
245 assert_equal key, @jsmith.rss_key
|
Chris@0
|
246 end
|
Chris@0
|
247
|
Chris@0
|
248
|
Chris@0
|
249 should_have_one :api_token
|
Chris@0
|
250
|
Chris@0
|
251 context "User#api_key" do
|
Chris@0
|
252 should "generate a new one if the user doesn't have one" do
|
Chris@0
|
253 user = User.generate_with_protected!(:api_token => nil)
|
Chris@0
|
254 assert_nil user.api_token
|
Chris@0
|
255
|
Chris@0
|
256 key = user.api_key
|
Chris@0
|
257 assert_equal 40, key.length
|
Chris@0
|
258 user.reload
|
Chris@0
|
259 assert_equal key, user.api_key
|
Chris@0
|
260 end
|
Chris@0
|
261
|
Chris@0
|
262 should "return the existing api token value" do
|
Chris@0
|
263 user = User.generate_with_protected!
|
Chris@0
|
264 token = Token.generate!(:action => 'api')
|
Chris@0
|
265 user.api_token = token
|
Chris@0
|
266 assert user.save
|
Chris@0
|
267
|
Chris@0
|
268 assert_equal token.value, user.api_key
|
Chris@0
|
269 end
|
Chris@0
|
270 end
|
Chris@0
|
271
|
Chris@0
|
272 context "User#find_by_api_key" do
|
Chris@0
|
273 should "return nil if no matching key is found" do
|
Chris@0
|
274 assert_nil User.find_by_api_key('zzzzzzzzz')
|
Chris@0
|
275 end
|
Chris@0
|
276
|
Chris@0
|
277 should "return nil if the key is found for an inactive user" do
|
Chris@0
|
278 user = User.generate_with_protected!(:status => User::STATUS_LOCKED)
|
Chris@0
|
279 token = Token.generate!(:action => 'api')
|
Chris@0
|
280 user.api_token = token
|
Chris@0
|
281 user.save
|
Chris@0
|
282
|
Chris@0
|
283 assert_nil User.find_by_api_key(token.value)
|
Chris@0
|
284 end
|
Chris@0
|
285
|
Chris@0
|
286 should "return the user if the key is found for an active user" do
|
Chris@0
|
287 user = User.generate_with_protected!(:status => User::STATUS_ACTIVE)
|
Chris@0
|
288 token = Token.generate!(:action => 'api')
|
Chris@0
|
289 user.api_token = token
|
Chris@0
|
290 user.save
|
Chris@0
|
291
|
Chris@0
|
292 assert_equal user, User.find_by_api_key(token.value)
|
Chris@0
|
293 end
|
Chris@0
|
294 end
|
Chris@0
|
295
|
Chris@0
|
296 def test_roles_for_project
|
Chris@0
|
297 # user with a role
|
Chris@0
|
298 roles = @jsmith.roles_for_project(Project.find(1))
|
Chris@0
|
299 assert_kind_of Role, roles.first
|
Chris@0
|
300 assert_equal "Manager", roles.first.name
|
Chris@0
|
301
|
Chris@0
|
302 # user with no role
|
Chris@0
|
303 assert_nil @dlopper.roles_for_project(Project.find(2)).detect {|role| role.member?}
|
Chris@0
|
304 end
|
Chris@0
|
305
|
Chris@0
|
306 def test_mail_notification_all
|
chris@37
|
307 @jsmith.mail_notification = 'all'
|
Chris@0
|
308 @jsmith.notified_project_ids = []
|
Chris@0
|
309 @jsmith.save
|
Chris@0
|
310 @jsmith.reload
|
Chris@0
|
311 assert @jsmith.projects.first.recipients.include?(@jsmith.mail)
|
Chris@0
|
312 end
|
Chris@0
|
313
|
Chris@0
|
314 def test_mail_notification_selected
|
chris@37
|
315 @jsmith.mail_notification = 'selected'
|
Chris@0
|
316 @jsmith.notified_project_ids = [1]
|
Chris@0
|
317 @jsmith.save
|
Chris@0
|
318 @jsmith.reload
|
Chris@0
|
319 assert Project.find(1).recipients.include?(@jsmith.mail)
|
Chris@0
|
320 end
|
Chris@0
|
321
|
chris@37
|
322 def test_mail_notification_only_my_events
|
chris@37
|
323 @jsmith.mail_notification = 'only_my_events'
|
Chris@0
|
324 @jsmith.notified_project_ids = []
|
Chris@0
|
325 @jsmith.save
|
Chris@0
|
326 @jsmith.reload
|
Chris@0
|
327 assert !@jsmith.projects.first.recipients.include?(@jsmith.mail)
|
Chris@0
|
328 end
|
Chris@0
|
329
|
Chris@0
|
330 def test_comments_sorting_preference
|
Chris@0
|
331 assert !@jsmith.wants_comments_in_reverse_order?
|
Chris@0
|
332 @jsmith.pref.comments_sorting = 'asc'
|
Chris@0
|
333 assert !@jsmith.wants_comments_in_reverse_order?
|
Chris@0
|
334 @jsmith.pref.comments_sorting = 'desc'
|
Chris@0
|
335 assert @jsmith.wants_comments_in_reverse_order?
|
Chris@0
|
336 end
|
Chris@0
|
337
|
Chris@0
|
338 def test_find_by_mail_should_be_case_insensitive
|
Chris@0
|
339 u = User.find_by_mail('JSmith@somenet.foo')
|
Chris@0
|
340 assert_not_nil u
|
Chris@0
|
341 assert_equal 'jsmith@somenet.foo', u.mail
|
Chris@0
|
342 end
|
Chris@0
|
343
|
Chris@0
|
344 def test_random_password
|
Chris@0
|
345 u = User.new
|
Chris@0
|
346 u.random_password
|
Chris@0
|
347 assert !u.password.blank?
|
Chris@0
|
348 assert !u.password_confirmation.blank?
|
Chris@0
|
349 end
|
Chris@0
|
350
|
Chris@0
|
351 context "#change_password_allowed?" do
|
Chris@0
|
352 should "be allowed if no auth source is set" do
|
Chris@0
|
353 user = User.generate_with_protected!
|
Chris@0
|
354 assert user.change_password_allowed?
|
Chris@0
|
355 end
|
Chris@0
|
356
|
Chris@0
|
357 should "delegate to the auth source" do
|
Chris@0
|
358 user = User.generate_with_protected!
|
Chris@0
|
359
|
Chris@0
|
360 allowed_auth_source = AuthSource.generate!
|
Chris@0
|
361 def allowed_auth_source.allow_password_changes?; true; end
|
Chris@0
|
362
|
Chris@0
|
363 denied_auth_source = AuthSource.generate!
|
Chris@0
|
364 def denied_auth_source.allow_password_changes?; false; end
|
Chris@0
|
365
|
Chris@0
|
366 assert user.change_password_allowed?
|
Chris@0
|
367
|
Chris@0
|
368 user.auth_source = allowed_auth_source
|
Chris@0
|
369 assert user.change_password_allowed?, "User not allowed to change password, though auth source does"
|
Chris@0
|
370
|
Chris@0
|
371 user.auth_source = denied_auth_source
|
Chris@0
|
372 assert !user.change_password_allowed?, "User allowed to change password, though auth source does not"
|
Chris@0
|
373 end
|
Chris@0
|
374
|
Chris@0
|
375 end
|
Chris@0
|
376
|
chris@22
|
377 context "#allowed_to?" do
|
chris@22
|
378 context "with a unique project" do
|
chris@22
|
379 should "return false if project is archived" do
|
chris@22
|
380 project = Project.find(1)
|
chris@22
|
381 Project.any_instance.stubs(:status).returns(Project::STATUS_ARCHIVED)
|
chris@22
|
382 assert ! @admin.allowed_to?(:view_issues, Project.find(1))
|
chris@22
|
383 end
|
chris@22
|
384
|
chris@22
|
385 should "return false if related module is disabled" do
|
chris@22
|
386 project = Project.find(1)
|
chris@22
|
387 project.enabled_module_names = ["issue_tracking"]
|
chris@22
|
388 assert @admin.allowed_to?(:add_issues, project)
|
chris@22
|
389 assert ! @admin.allowed_to?(:view_wiki_pages, project)
|
chris@22
|
390 end
|
chris@22
|
391
|
chris@22
|
392 should "authorize nearly everything for admin users" do
|
chris@22
|
393 project = Project.find(1)
|
chris@22
|
394 assert ! @admin.member_of?(project)
|
chris@22
|
395 %w(edit_issues delete_issues manage_news manage_documents manage_wiki).each do |p|
|
chris@22
|
396 assert @admin.allowed_to?(p.to_sym, project)
|
chris@22
|
397 end
|
chris@22
|
398 end
|
chris@22
|
399
|
chris@22
|
400 should "authorize normal users depending on their roles" do
|
chris@22
|
401 project = Project.find(1)
|
chris@22
|
402 assert @jsmith.allowed_to?(:delete_messages, project) #Manager
|
chris@22
|
403 assert ! @dlopper.allowed_to?(:delete_messages, project) #Developper
|
chris@22
|
404 end
|
chris@22
|
405 end
|
chris@37
|
406
|
chris@37
|
407 context "with multiple projects" do
|
chris@37
|
408 should "return false if array is empty" do
|
chris@37
|
409 assert ! @admin.allowed_to?(:view_project, [])
|
chris@37
|
410 end
|
chris@37
|
411
|
chris@37
|
412 should "return true only if user has permission on all these projects" do
|
chris@37
|
413 assert @admin.allowed_to?(:view_project, Project.all)
|
chris@37
|
414 assert ! @dlopper.allowed_to?(:view_project, Project.all) #cannot see Project(2)
|
chris@37
|
415 assert @jsmith.allowed_to?(:edit_issues, @jsmith.projects) #Manager or Developer everywhere
|
chris@37
|
416 assert ! @jsmith.allowed_to?(:delete_issue_watchers, @jsmith.projects) #Dev cannot delete_issue_watchers
|
chris@37
|
417 end
|
chris@37
|
418
|
chris@37
|
419 should "behave correctly with arrays of 1 project" do
|
chris@37
|
420 assert ! User.anonymous.allowed_to?(:delete_issues, [Project.first])
|
chris@37
|
421 end
|
chris@37
|
422 end
|
chris@22
|
423
|
chris@22
|
424 context "with options[:global]" do
|
chris@22
|
425 should "authorize if user has at least one role that has this permission" do
|
chris@22
|
426 @dlopper2 = User.find(5) #only Developper on a project, not Manager anywhere
|
chris@22
|
427 @anonymous = User.find(6)
|
chris@22
|
428 assert @jsmith.allowed_to?(:delete_issue_watchers, nil, :global => true)
|
chris@22
|
429 assert ! @dlopper2.allowed_to?(:delete_issue_watchers, nil, :global => true)
|
chris@22
|
430 assert @dlopper2.allowed_to?(:add_issues, nil, :global => true)
|
chris@22
|
431 assert ! @anonymous.allowed_to?(:add_issues, nil, :global => true)
|
chris@22
|
432 assert @anonymous.allowed_to?(:view_issues, nil, :global => true)
|
chris@22
|
433 end
|
chris@22
|
434 end
|
chris@22
|
435 end
|
chris@22
|
436
|
chris@37
|
437 context "User#notify_about?" do
|
chris@37
|
438 context "Issues" do
|
chris@37
|
439 setup do
|
chris@37
|
440 @project = Project.find(1)
|
chris@37
|
441 @author = User.generate_with_protected!
|
chris@37
|
442 @assignee = User.generate_with_protected!
|
chris@37
|
443 @issue = Issue.generate_for_project!(@project, :assigned_to => @assignee, :author => @author)
|
chris@37
|
444 end
|
chris@37
|
445
|
chris@37
|
446 should "be true for a user with :all" do
|
Chris@117
|
447 @author.update_attribute(:mail_notification, 'all')
|
chris@37
|
448 assert @author.notify_about?(@issue)
|
chris@37
|
449 end
|
chris@37
|
450
|
chris@37
|
451 should "be false for a user with :none" do
|
Chris@117
|
452 @author.update_attribute(:mail_notification, 'none')
|
chris@37
|
453 assert ! @author.notify_about?(@issue)
|
chris@37
|
454 end
|
chris@37
|
455
|
chris@37
|
456 should "be false for a user with :only_my_events and isn't an author, creator, or assignee" do
|
Chris@117
|
457 @user = User.generate_with_protected!(:mail_notification => 'only_my_events')
|
chris@37
|
458 assert ! @user.notify_about?(@issue)
|
chris@37
|
459 end
|
chris@37
|
460
|
chris@37
|
461 should "be true for a user with :only_my_events and is the author" do
|
Chris@117
|
462 @author.update_attribute(:mail_notification, 'only_my_events')
|
chris@37
|
463 assert @author.notify_about?(@issue)
|
chris@37
|
464 end
|
chris@37
|
465
|
chris@37
|
466 should "be true for a user with :only_my_events and is the assignee" do
|
Chris@117
|
467 @assignee.update_attribute(:mail_notification, 'only_my_events')
|
chris@37
|
468 assert @assignee.notify_about?(@issue)
|
chris@37
|
469 end
|
chris@37
|
470
|
chris@37
|
471 should "be true for a user with :only_assigned and is the assignee" do
|
Chris@117
|
472 @assignee.update_attribute(:mail_notification, 'only_assigned')
|
chris@37
|
473 assert @assignee.notify_about?(@issue)
|
chris@37
|
474 end
|
chris@37
|
475
|
chris@37
|
476 should "be false for a user with :only_assigned and is not the assignee" do
|
Chris@117
|
477 @author.update_attribute(:mail_notification, 'only_assigned')
|
chris@37
|
478 assert ! @author.notify_about?(@issue)
|
chris@37
|
479 end
|
chris@37
|
480
|
chris@37
|
481 should "be true for a user with :only_owner and is the author" do
|
Chris@117
|
482 @author.update_attribute(:mail_notification, 'only_owner')
|
chris@37
|
483 assert @author.notify_about?(@issue)
|
chris@37
|
484 end
|
chris@37
|
485
|
chris@37
|
486 should "be false for a user with :only_owner and is not the author" do
|
Chris@117
|
487 @assignee.update_attribute(:mail_notification, 'only_owner')
|
chris@37
|
488 assert ! @assignee.notify_about?(@issue)
|
chris@37
|
489 end
|
chris@37
|
490 end
|
chris@37
|
491
|
chris@37
|
492 context "other events" do
|
chris@37
|
493 should 'be added and tested'
|
chris@37
|
494 end
|
chris@37
|
495 end
|
chris@37
|
496
|
Chris@0
|
497 if Object.const_defined?(:OpenID)
|
Chris@0
|
498
|
Chris@0
|
499 def test_setting_identity_url
|
Chris@0
|
500 normalized_open_id_url = 'http://example.com/'
|
Chris@0
|
501 u = User.new( :identity_url => 'http://example.com/' )
|
Chris@0
|
502 assert_equal normalized_open_id_url, u.identity_url
|
Chris@0
|
503 end
|
Chris@0
|
504
|
Chris@0
|
505 def test_setting_identity_url_without_trailing_slash
|
Chris@0
|
506 normalized_open_id_url = 'http://example.com/'
|
Chris@0
|
507 u = User.new( :identity_url => 'http://example.com' )
|
Chris@0
|
508 assert_equal normalized_open_id_url, u.identity_url
|
Chris@0
|
509 end
|
Chris@0
|
510
|
Chris@0
|
511 def test_setting_identity_url_without_protocol
|
Chris@0
|
512 normalized_open_id_url = 'http://example.com/'
|
Chris@0
|
513 u = User.new( :identity_url => 'example.com' )
|
Chris@0
|
514 assert_equal normalized_open_id_url, u.identity_url
|
Chris@0
|
515 end
|
Chris@0
|
516
|
Chris@0
|
517 def test_setting_blank_identity_url
|
Chris@0
|
518 u = User.new( :identity_url => 'example.com' )
|
Chris@0
|
519 u.identity_url = ''
|
Chris@0
|
520 assert u.identity_url.blank?
|
Chris@0
|
521 end
|
Chris@0
|
522
|
Chris@0
|
523 def test_setting_invalid_identity_url
|
Chris@0
|
524 u = User.new( :identity_url => 'this is not an openid url' )
|
Chris@0
|
525 assert u.identity_url.blank?
|
Chris@0
|
526 end
|
Chris@0
|
527
|
Chris@0
|
528 else
|
Chris@0
|
529 puts "Skipping openid tests."
|
Chris@0
|
530 end
|
Chris@0
|
531
|
Chris@0
|
532 end
|