Chris@128: # Redmine - project management software Chris@128: # Copyright (C) 2006-2011 Jean-Philippe Lang Chris@0: # Chris@0: # This program is free software; you can redistribute it and/or Chris@0: # modify it under the terms of the GNU General Public License Chris@0: # as published by the Free Software Foundation; either version 2 Chris@0: # of the License, or (at your option) any later version. Chris@909: # Chris@0: # This program is distributed in the hope that it will be useful, Chris@0: # but WITHOUT ANY WARRANTY; without even the implied warranty of Chris@0: # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Chris@0: # GNU General Public License for more details. Chris@909: # Chris@0: # You should have received a copy of the GNU General Public License Chris@0: # along with this program; if not, write to the Free Software Chris@0: # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. Chris@0: Chris@119: require File.expand_path('../../test_helper', __FILE__) Chris@0: Chris@0: class UserTest < ActiveSupport::TestCase Chris@909: fixtures :users, :members, :projects, :roles, :member_roles, :auth_sources, Chris@909: :trackers, :issue_statuses, Chris@909: :projects_trackers, Chris@909: :watchers, Chris@909: :issue_categories, :enumerations, :issues, Chris@909: :journals, :journal_details, Chris@909: :groups_users, Chris@909: :enabled_modules, Chris@909: :workflows Chris@0: Chris@0: def setup Chris@0: @admin = User.find(1) Chris@0: @jsmith = User.find(2) Chris@0: @dlopper = User.find(3) Chris@0: end Chris@0: Chris@0: test 'object_daddy creation' do Chris@0: User.generate_with_protected!(:firstname => 'Testing connection') Chris@0: User.generate_with_protected!(:firstname => 'Testing connection') Chris@0: assert_equal 2, User.count(:all, :conditions => {:firstname => 'Testing connection'}) Chris@0: end Chris@909: Chris@0: def test_truth Chris@0: assert_kind_of User, @jsmith Chris@0: end Chris@909: Chris@1: def test_mail_should_be_stripped Chris@1: u = User.new Chris@1: u.mail = " foo@bar.com " Chris@1: assert_equal "foo@bar.com", u.mail Chris@1: end Chris@0: Chris@909: def test_mail_validation Chris@909: u = User.new Chris@909: u.mail = '' Chris@909: assert !u.valid? Chris@909: assert_equal I18n.translate('activerecord.errors.messages.blank'), u.errors.on(:mail) Chris@909: end Chris@909: Chris@0: def test_create Chris@0: user = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo") Chris@909: Chris@0: user.login = "jsmith" Chris@0: user.password, user.password_confirmation = "password", "password" Chris@0: # login uniqueness Chris@0: assert !user.save Chris@0: assert_equal 1, user.errors.count Chris@909: Chris@0: user.login = "newuser" Chris@0: user.password, user.password_confirmation = "passwd", "password" Chris@0: # password confirmation Chris@0: assert !user.save Chris@0: assert_equal 1, user.errors.count Chris@0: Chris@0: user.password, user.password_confirmation = "password", "password" Chris@0: assert user.save Chris@0: end chris@37: chris@37: context "User#before_create" do chris@37: should "set the mail_notification to the default Setting" do chris@37: @user1 = User.generate_with_protected! chris@37: assert_equal 'only_my_events', @user1.mail_notification chris@37: chris@37: with_settings :default_notification_option => 'all' do chris@37: @user2 = User.generate_with_protected! chris@37: assert_equal 'all', @user2.mail_notification chris@37: end chris@37: end chris@37: end Chris@909: Chris@0: context "User.login" do Chris@0: should "be case-insensitive." do Chris@0: u = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo") Chris@0: u.login = 'newuser' Chris@0: u.password, u.password_confirmation = "password", "password" Chris@0: assert u.save Chris@909: Chris@0: u = User.new(:firstname => "Similar", :lastname => "User", :mail => "similaruser@somenet.foo") Chris@0: u.login = 'NewUser' Chris@0: u.password, u.password_confirmation = "password", "password" Chris@0: assert !u.save Chris@0: assert_equal I18n.translate('activerecord.errors.messages.taken'), u.errors.on(:login) Chris@0: end Chris@0: end Chris@0: Chris@0: def test_mail_uniqueness_should_not_be_case_sensitive Chris@0: u = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo") Chris@0: u.login = 'newuser1' Chris@0: u.password, u.password_confirmation = "password", "password" Chris@0: assert u.save Chris@909: Chris@0: u = User.new(:firstname => "new", :lastname => "user", :mail => "newUser@Somenet.foo") Chris@0: u.login = 'newuser2' Chris@0: u.password, u.password_confirmation = "password", "password" Chris@0: assert !u.save Chris@0: assert_equal I18n.translate('activerecord.errors.messages.taken'), u.errors.on(:mail) Chris@0: end Chris@0: Chris@0: def test_update Chris@0: assert_equal "admin", @admin.login Chris@0: @admin.login = "john" Chris@0: assert @admin.save, @admin.errors.full_messages.join("; ") Chris@0: @admin.reload Chris@0: assert_equal "john", @admin.login Chris@0: end Chris@909: Chris@128: def test_destroy_should_delete_members_and_roles Chris@128: members = Member.find_all_by_user_id(2) Chris@128: ms = members.size Chris@128: rs = members.collect(&:roles).flatten.size Chris@909: Chris@128: assert_difference 'Member.count', - ms do Chris@128: assert_difference 'MemberRole.count', - rs do Chris@128: User.find(2).destroy Chris@128: end Chris@128: end Chris@909: Chris@128: assert_nil User.find_by_id(2) Chris@128: assert Member.find_all_by_user_id(2).empty? Chris@128: end Chris@909: Chris@128: def test_destroy_should_update_attachments Chris@128: attachment = Attachment.create!(:container => Project.find(1), Chris@128: :file => uploaded_test_file("testfile.txt", "text/plain"), Chris@128: :author_id => 2) Chris@909: Chris@0: User.find(2).destroy Chris@0: assert_nil User.find_by_id(2) Chris@128: assert_equal User.anonymous, attachment.reload.author Chris@128: end Chris@909: Chris@128: def test_destroy_should_update_comments Chris@128: comment = Comment.create!( Chris@128: :commented => News.create!(:project_id => 1, :author_id => 1, :title => 'foo', :description => 'foo'), Chris@128: :author => User.find(2), Chris@128: :comments => 'foo' Chris@128: ) Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_equal User.anonymous, comment.reload.author Chris@128: end Chris@909: Chris@128: def test_destroy_should_update_issues Chris@128: issue = Issue.create!(:project_id => 1, :author_id => 2, :tracker_id => 1, :subject => 'foo') Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_equal User.anonymous, issue.reload.author Chris@128: end Chris@909: Chris@128: def test_destroy_should_unassign_issues Chris@128: issue = Issue.create!(:project_id => 1, :author_id => 1, :tracker_id => 1, :subject => 'foo', :assigned_to_id => 2) Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_nil issue.reload.assigned_to Chris@128: end Chris@909: Chris@128: def test_destroy_should_update_journals Chris@128: issue = Issue.create!(:project_id => 1, :author_id => 2, :tracker_id => 1, :subject => 'foo') Chris@128: issue.init_journal(User.find(2), "update") Chris@128: issue.save! Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_equal User.anonymous, issue.journals.first.reload.user Chris@128: end Chris@909: Chris@128: def test_destroy_should_update_journal_details_old_value Chris@128: issue = Issue.create!(:project_id => 1, :author_id => 1, :tracker_id => 1, :subject => 'foo', :assigned_to_id => 2) Chris@128: issue.init_journal(User.find(1), "update") Chris@128: issue.assigned_to_id = nil Chris@128: assert_difference 'JournalDetail.count' do Chris@128: issue.save! Chris@128: end Chris@128: journal_detail = JournalDetail.first(:order => 'id DESC') Chris@128: assert_equal '2', journal_detail.old_value Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_equal User.anonymous.id.to_s, journal_detail.reload.old_value Chris@128: end Chris@909: Chris@128: def test_destroy_should_update_journal_details_value Chris@128: issue = Issue.create!(:project_id => 1, :author_id => 1, :tracker_id => 1, :subject => 'foo') Chris@128: issue.init_journal(User.find(1), "update") Chris@128: issue.assigned_to_id = 2 Chris@128: assert_difference 'JournalDetail.count' do Chris@128: issue.save! Chris@128: end Chris@128: journal_detail = JournalDetail.first(:order => 'id DESC') Chris@128: assert_equal '2', journal_detail.value Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_equal User.anonymous.id.to_s, journal_detail.reload.value Chris@128: end Chris@909: Chris@128: def test_destroy_should_update_messages Chris@128: board = Board.create!(:project_id => 1, :name => 'Board', :description => 'Board') Chris@128: message = Message.create!(:board_id => board.id, :author_id => 2, :subject => 'foo', :content => 'foo') Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_equal User.anonymous, message.reload.author Chris@128: end Chris@909: Chris@128: def test_destroy_should_update_news Chris@128: news = News.create!(:project_id => 1, :author_id => 2, :title => 'foo', :description => 'foo') Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_equal User.anonymous, news.reload.author Chris@128: end Chris@909: Chris@128: def test_destroy_should_delete_private_queries Chris@128: query = Query.new(:name => 'foo', :is_public => false) Chris@128: query.project_id = 1 Chris@128: query.user_id = 2 Chris@128: query.save! Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_nil Query.find_by_id(query.id) Chris@128: end Chris@909: Chris@128: def test_destroy_should_update_public_queries Chris@128: query = Query.new(:name => 'foo', :is_public => true) Chris@128: query.project_id = 1 Chris@128: query.user_id = 2 Chris@128: query.save! Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_equal User.anonymous, query.reload.user Chris@128: end Chris@909: Chris@128: def test_destroy_should_update_time_entries Chris@128: entry = TimeEntry.new(:hours => '2', :spent_on => Date.today, :activity => TimeEntryActivity.create!(:name => 'foo')) Chris@128: entry.project_id = 1 Chris@128: entry.user_id = 2 Chris@128: entry.save! Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_equal User.anonymous, entry.reload.user Chris@128: end Chris@909: Chris@128: def test_destroy_should_delete_tokens Chris@128: token = Token.create!(:user_id => 2, :value => 'foo') Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_nil Token.find_by_id(token.id) Chris@128: end Chris@909: Chris@128: def test_destroy_should_delete_watchers Chris@128: issue = Issue.create!(:project_id => 1, :author_id => 1, :tracker_id => 1, :subject => 'foo') Chris@128: watcher = Watcher.create!(:user_id => 2, :watchable => issue) Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_nil Watcher.find_by_id(watcher.id) Chris@128: end Chris@909: Chris@128: def test_destroy_should_update_wiki_contents Chris@128: wiki_content = WikiContent.create!( Chris@128: :text => 'foo', Chris@128: :author_id => 2, Chris@128: :page => WikiPage.create!(:title => 'Foo', :wiki => Wiki.create!(:project_id => 1, :start_page => 'Start')) Chris@128: ) Chris@128: wiki_content.text = 'bar' Chris@128: assert_difference 'WikiContent::Version.count' do Chris@128: wiki_content.save! Chris@128: end Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_equal User.anonymous, wiki_content.reload.author Chris@128: wiki_content.versions.each do |version| Chris@128: assert_equal User.anonymous, version.reload.author Chris@128: end Chris@128: end Chris@909: Chris@128: def test_destroy_should_nullify_issue_categories Chris@128: category = IssueCategory.create!(:project_id => 1, :assigned_to_id => 2, :name => 'foo') Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_nil category.reload.assigned_to_id Chris@128: end Chris@909: Chris@128: def test_destroy_should_nullify_changesets Chris@128: changeset = Changeset.create!( Chris@128: :repository => Repository::Subversion.create!( Chris@128: :project_id => 1, Chris@128: :url => 'file:///var/svn' Chris@128: ), Chris@128: :revision => '12', Chris@128: :committed_on => Time.now, Chris@128: :committer => 'jsmith' Chris@128: ) Chris@128: assert_equal 2, changeset.user_id Chris@909: Chris@128: User.find(2).destroy Chris@128: assert_nil User.find_by_id(2) Chris@128: assert_nil changeset.reload.user_id Chris@128: end Chris@909: Chris@128: def test_anonymous_user_should_not_be_destroyable Chris@128: assert_no_difference 'User.count' do Chris@128: assert_equal false, User.anonymous.destroy Chris@128: end Chris@0: end Chris@909: Chris@119: def test_validate_login_presence Chris@0: @admin.login = "" Chris@0: assert !@admin.save Chris@0: assert_equal 1, @admin.errors.count Chris@0: end Chris@909: Chris@119: def test_validate_mail_notification_inclusion Chris@119: u = User.new Chris@119: u.mail_notification = 'foo' Chris@119: u.save Chris@909: assert_not_nil u.errors[:mail_notification] Chris@119: end Chris@909: Chris@0: context "User#try_to_login" do Chris@0: should "fall-back to case-insensitive if user login is not found as-typed." do Chris@0: user = User.try_to_login("AdMin", "admin") Chris@0: assert_kind_of User, user Chris@0: assert_equal "admin", user.login Chris@0: end Chris@0: Chris@0: should "select the exact matching user first" do Chris@909: case_sensitive_user = User.generate_with_protected!( Chris@909: :login => 'changed', :password => 'admin', Chris@909: :password_confirmation => 'admin') Chris@0: # bypass validations to make it appear like existing data Chris@0: case_sensitive_user.update_attribute(:login, 'ADMIN') Chris@0: Chris@0: user = User.try_to_login("ADMIN", "admin") Chris@0: assert_kind_of User, user Chris@0: assert_equal "ADMIN", user.login Chris@0: Chris@0: end Chris@0: end Chris@0: Chris@0: def test_password Chris@0: user = User.try_to_login("admin", "admin") Chris@0: assert_kind_of User, user Chris@0: assert_equal "admin", user.login Chris@0: user.password = "hello" Chris@0: assert user.save Chris@909: Chris@0: user = User.try_to_login("admin", "hello") Chris@0: assert_kind_of User, user Chris@0: assert_equal "admin", user.login Chris@0: end Chris@909: Chris@909: def test_validate_password_length Chris@909: with_settings :password_min_length => '100' do Chris@909: user = User.new(:firstname => "new100", :lastname => "user100", :mail => "newuser100@somenet.foo") Chris@909: user.login = "newuser100" Chris@909: user.password, user.password_confirmation = "password100", "password100" Chris@909: assert !user.save Chris@909: assert_equal 1, user.errors.count Chris@909: end Chris@909: end Chris@909: Chris@0: def test_name_format Chris@0: assert_equal 'Smith, John', @jsmith.name(:lastname_coma_firstname) Chris@0: Setting.user_format = :firstname_lastname Chris@0: assert_equal 'John Smith', @jsmith.reload.name Chris@0: Setting.user_format = :username Chris@0: assert_equal 'jsmith', @jsmith.reload.name Chris@0: end Chris@0: Chris@909: def test_fields_for_order_statement_should_return_fields_according_user_format_setting Chris@909: with_settings :user_format => 'lastname_coma_firstname' do Chris@909: assert_equal ['users.lastname', 'users.firstname', 'users.id'], User.fields_for_order_statement Chris@909: end Chris@909: end Chris@909: Chris@909: def test_fields_for_order_statement_width_table_name_should_prepend_table_name Chris@909: with_settings :user_format => 'lastname_firstname' do Chris@909: assert_equal ['authors.lastname', 'authors.firstname', 'authors.id'], User.fields_for_order_statement('authors') Chris@909: end Chris@909: end Chris@909: Chris@909: def test_fields_for_order_statement_with_blank_format_should_return_default Chris@909: with_settings :user_format => '' do Chris@909: assert_equal ['users.firstname', 'users.lastname', 'users.id'], User.fields_for_order_statement Chris@909: end Chris@909: end Chris@909: Chris@909: def test_fields_for_order_statement_with_invalid_format_should_return_default Chris@909: with_settings :user_format => 'foo' do Chris@909: assert_equal ['users.firstname', 'users.lastname', 'users.id'], User.fields_for_order_statement Chris@909: end Chris@909: end Chris@909: Chris@0: def test_lock Chris@0: user = User.try_to_login("jsmith", "jsmith") Chris@0: assert_equal @jsmith, user Chris@909: Chris@0: @jsmith.status = User::STATUS_LOCKED Chris@0: assert @jsmith.save Chris@909: Chris@0: user = User.try_to_login("jsmith", "jsmith") Chris@909: assert_equal nil, user Chris@0: end Chris@909: Chris@245: context ".try_to_login" do Chris@245: context "with good credentials" do Chris@245: should "return the user" do Chris@245: user = User.try_to_login("admin", "admin") Chris@245: assert_kind_of User, user Chris@245: assert_equal "admin", user.login Chris@245: end Chris@245: end Chris@909: Chris@245: context "with wrong credentials" do Chris@245: should "return nil" do Chris@245: assert_nil User.try_to_login("admin", "foo") Chris@245: end Chris@245: end Chris@245: end Chris@909: Chris@0: if ldap_configured? Chris@0: context "#try_to_login using LDAP" do Chris@0: context "with failed connection to the LDAP server" do Chris@0: should "return nil" do Chris@0: @auth_source = AuthSourceLdap.find(1) Chris@0: AuthSource.any_instance.stubs(:initialize_ldap_con).raises(Net::LDAP::LdapError, 'Cannot connect') Chris@909: Chris@0: assert_equal nil, User.try_to_login('edavis', 'wrong') Chris@0: end Chris@0: end Chris@0: Chris@0: context "with an unsuccessful authentication" do Chris@0: should "return nil" do Chris@0: assert_equal nil, User.try_to_login('edavis', 'wrong') Chris@0: end Chris@0: end Chris@909: Chris@0: context "on the fly registration" do Chris@0: setup do Chris@0: @auth_source = AuthSourceLdap.find(1) Chris@0: end Chris@0: Chris@0: context "with a successful authentication" do Chris@0: should "create a new user account if it doesn't exist" do Chris@0: assert_difference('User.count') do Chris@0: user = User.try_to_login('edavis', '123456') Chris@0: assert !user.admin? Chris@0: end Chris@0: end Chris@909: Chris@0: should "retrieve existing user" do Chris@0: user = User.try_to_login('edavis', '123456') Chris@0: user.admin = true Chris@0: user.save! Chris@909: Chris@0: assert_no_difference('User.count') do Chris@0: user = User.try_to_login('edavis', '123456') Chris@0: assert user.admin? Chris@0: end Chris@0: end Chris@0: end Chris@0: end Chris@0: end Chris@0: Chris@0: else Chris@0: puts "Skipping LDAP tests." Chris@0: end Chris@909: Chris@0: def test_create_anonymous Chris@0: AnonymousUser.delete_all Chris@0: anon = User.anonymous Chris@0: assert !anon.new_record? Chris@0: assert_kind_of AnonymousUser, anon Chris@0: end Chris@0: Chris@909: def test_ensure_single_anonymous_user Chris@909: AnonymousUser.delete_all Chris@909: anon1 = User.anonymous Chris@909: assert !anon1.new_record? Chris@909: assert_kind_of AnonymousUser, anon1 Chris@909: anon2 = AnonymousUser.create( Chris@909: :lastname => 'Anonymous', :firstname => '', Chris@909: :mail => '', :login => '', :status => 0) Chris@909: assert_equal 1, anon2.errors.count Chris@909: end Chris@909: Chris@0: should_have_one :rss_token Chris@0: Chris@0: def test_rss_key Chris@0: assert_nil @jsmith.rss_token Chris@0: key = @jsmith.rss_key Chris@0: assert_equal 40, key.length Chris@909: Chris@0: @jsmith.reload Chris@0: assert_equal key, @jsmith.rss_key Chris@0: end Chris@0: Chris@909: Chris@0: should_have_one :api_token Chris@0: Chris@0: context "User#api_key" do Chris@0: should "generate a new one if the user doesn't have one" do Chris@0: user = User.generate_with_protected!(:api_token => nil) Chris@0: assert_nil user.api_token Chris@0: Chris@0: key = user.api_key Chris@0: assert_equal 40, key.length Chris@0: user.reload Chris@0: assert_equal key, user.api_key Chris@0: end Chris@0: Chris@0: should "return the existing api token value" do Chris@0: user = User.generate_with_protected! Chris@0: token = Token.generate!(:action => 'api') Chris@0: user.api_token = token Chris@0: assert user.save Chris@909: Chris@0: assert_equal token.value, user.api_key Chris@0: end Chris@0: end Chris@0: Chris@0: context "User#find_by_api_key" do Chris@0: should "return nil if no matching key is found" do Chris@0: assert_nil User.find_by_api_key('zzzzzzzzz') Chris@0: end Chris@0: Chris@0: should "return nil if the key is found for an inactive user" do Chris@0: user = User.generate_with_protected!(:status => User::STATUS_LOCKED) Chris@0: token = Token.generate!(:action => 'api') Chris@0: user.api_token = token Chris@0: user.save Chris@0: Chris@0: assert_nil User.find_by_api_key(token.value) Chris@0: end Chris@0: Chris@0: should "return the user if the key is found for an active user" do Chris@0: user = User.generate_with_protected!(:status => User::STATUS_ACTIVE) Chris@0: token = Token.generate!(:action => 'api') Chris@0: user.api_token = token Chris@0: user.save Chris@909: Chris@0: assert_equal user, User.find_by_api_key(token.value) Chris@0: end Chris@0: end Chris@0: Chris@929: def test_default_admin_account_changed_should_return_false_if_account_was_not_changed Chris@929: user = User.find_by_login("admin") Chris@929: user.password = "admin" Chris@929: user.save! Chris@929: Chris@929: assert_equal false, User.default_admin_account_changed? Chris@929: end Chris@929: Chris@929: def test_default_admin_account_changed_should_return_true_if_password_was_changed Chris@929: user = User.find_by_login("admin") Chris@929: user.password = "newpassword" Chris@929: user.save! Chris@929: Chris@929: assert_equal true, User.default_admin_account_changed? Chris@929: end Chris@929: Chris@929: def test_default_admin_account_changed_should_return_true_if_account_is_disabled Chris@929: user = User.find_by_login("admin") Chris@929: user.password = "admin" Chris@929: user.status = User::STATUS_LOCKED Chris@929: user.save! Chris@929: Chris@929: assert_equal true, User.default_admin_account_changed? Chris@929: end Chris@929: Chris@929: def test_default_admin_account_changed_should_return_true_if_account_does_not_exist Chris@929: user = User.find_by_login("admin") Chris@929: user.destroy Chris@929: Chris@929: assert_equal true, User.default_admin_account_changed? Chris@929: end Chris@929: Chris@0: def test_roles_for_project Chris@0: # user with a role Chris@0: roles = @jsmith.roles_for_project(Project.find(1)) Chris@0: assert_kind_of Role, roles.first Chris@0: assert_equal "Manager", roles.first.name Chris@909: Chris@0: # user with no role Chris@0: assert_nil @dlopper.roles_for_project(Project.find(2)).detect {|role| role.member?} Chris@0: end Chris@909: Chris@441: def test_projects_by_role_for_user_with_role Chris@441: user = User.find(2) Chris@441: assert_kind_of Hash, user.projects_by_role Chris@441: assert_equal 2, user.projects_by_role.size Chris@441: assert_equal [1,5], user.projects_by_role[Role.find(1)].collect(&:id).sort Chris@441: assert_equal [2], user.projects_by_role[Role.find(2)].collect(&:id).sort Chris@441: end Chris@909: Chris@441: def test_projects_by_role_for_user_with_no_role Chris@441: user = User.generate! Chris@441: assert_equal({}, user.projects_by_role) Chris@441: end Chris@909: Chris@441: def test_projects_by_role_for_anonymous Chris@441: assert_equal({}, User.anonymous.projects_by_role) Chris@441: end Chris@441: Chris@128: def test_valid_notification_options Chris@128: # without memberships Chris@128: assert_equal 5, User.find(7).valid_notification_options.size Chris@128: # with memberships Chris@128: assert_equal 6, User.find(2).valid_notification_options.size Chris@128: end Chris@909: Chris@128: def test_valid_notification_options_class_method Chris@128: assert_equal 5, User.valid_notification_options.size Chris@128: assert_equal 5, User.valid_notification_options(User.find(7)).size Chris@128: assert_equal 6, User.valid_notification_options(User.find(2)).size Chris@128: end Chris@909: Chris@0: def test_mail_notification_all chris@37: @jsmith.mail_notification = 'all' Chris@0: @jsmith.notified_project_ids = [] Chris@0: @jsmith.save Chris@0: @jsmith.reload Chris@0: assert @jsmith.projects.first.recipients.include?(@jsmith.mail) Chris@0: end Chris@909: Chris@0: def test_mail_notification_selected chris@37: @jsmith.mail_notification = 'selected' Chris@0: @jsmith.notified_project_ids = [1] Chris@0: @jsmith.save Chris@0: @jsmith.reload Chris@0: assert Project.find(1).recipients.include?(@jsmith.mail) Chris@0: end Chris@909: chris@37: def test_mail_notification_only_my_events chris@37: @jsmith.mail_notification = 'only_my_events' Chris@0: @jsmith.notified_project_ids = [] Chris@0: @jsmith.save Chris@0: @jsmith.reload Chris@0: assert !@jsmith.projects.first.recipients.include?(@jsmith.mail) Chris@0: end Chris@909: Chris@0: def test_comments_sorting_preference Chris@0: assert !@jsmith.wants_comments_in_reverse_order? Chris@0: @jsmith.pref.comments_sorting = 'asc' Chris@0: assert !@jsmith.wants_comments_in_reverse_order? Chris@0: @jsmith.pref.comments_sorting = 'desc' Chris@0: assert @jsmith.wants_comments_in_reverse_order? Chris@0: end Chris@909: Chris@0: def test_find_by_mail_should_be_case_insensitive Chris@0: u = User.find_by_mail('JSmith@somenet.foo') Chris@0: assert_not_nil u Chris@0: assert_equal 'jsmith@somenet.foo', u.mail Chris@0: end Chris@909: Chris@0: def test_random_password Chris@0: u = User.new Chris@0: u.random_password Chris@0: assert !u.password.blank? Chris@0: assert !u.password_confirmation.blank? Chris@0: end Chris@0: Chris@0: context "#change_password_allowed?" do Chris@0: should "be allowed if no auth source is set" do Chris@0: user = User.generate_with_protected! Chris@0: assert user.change_password_allowed? Chris@0: end Chris@0: Chris@0: should "delegate to the auth source" do Chris@0: user = User.generate_with_protected! Chris@909: Chris@0: allowed_auth_source = AuthSource.generate! Chris@0: def allowed_auth_source.allow_password_changes?; true; end Chris@0: Chris@0: denied_auth_source = AuthSource.generate! Chris@0: def denied_auth_source.allow_password_changes?; false; end Chris@0: Chris@0: assert user.change_password_allowed? Chris@0: Chris@0: user.auth_source = allowed_auth_source Chris@0: assert user.change_password_allowed?, "User not allowed to change password, though auth source does" Chris@0: Chris@0: user.auth_source = denied_auth_source Chris@0: assert !user.change_password_allowed?, "User allowed to change password, though auth source does not" Chris@0: end Chris@0: Chris@0: end Chris@909: chris@22: context "#allowed_to?" do chris@22: context "with a unique project" do chris@22: should "return false if project is archived" do chris@22: project = Project.find(1) chris@22: Project.any_instance.stubs(:status).returns(Project::STATUS_ARCHIVED) chris@22: assert ! @admin.allowed_to?(:view_issues, Project.find(1)) chris@22: end Chris@909: chris@22: should "return false if related module is disabled" do chris@22: project = Project.find(1) chris@22: project.enabled_module_names = ["issue_tracking"] chris@22: assert @admin.allowed_to?(:add_issues, project) chris@22: assert ! @admin.allowed_to?(:view_wiki_pages, project) chris@22: end Chris@909: chris@22: should "authorize nearly everything for admin users" do chris@22: project = Project.find(1) chris@22: assert ! @admin.member_of?(project) chris@22: %w(edit_issues delete_issues manage_news manage_documents manage_wiki).each do |p| chris@22: assert @admin.allowed_to?(p.to_sym, project) chris@22: end chris@22: end Chris@909: chris@22: should "authorize normal users depending on their roles" do chris@22: project = Project.find(1) chris@22: assert @jsmith.allowed_to?(:delete_messages, project) #Manager chris@22: assert ! @dlopper.allowed_to?(:delete_messages, project) #Developper chris@22: end chris@22: end chris@37: chris@37: context "with multiple projects" do chris@37: should "return false if array is empty" do chris@37: assert ! @admin.allowed_to?(:view_project, []) chris@37: end Chris@909: chris@37: should "return true only if user has permission on all these projects" do chris@37: assert @admin.allowed_to?(:view_project, Project.all) chris@37: assert ! @dlopper.allowed_to?(:view_project, Project.all) #cannot see Project(2) chris@37: assert @jsmith.allowed_to?(:edit_issues, @jsmith.projects) #Manager or Developer everywhere chris@37: assert ! @jsmith.allowed_to?(:delete_issue_watchers, @jsmith.projects) #Dev cannot delete_issue_watchers chris@37: end Chris@909: chris@37: should "behave correctly with arrays of 1 project" do chris@37: assert ! User.anonymous.allowed_to?(:delete_issues, [Project.first]) chris@37: end chris@37: end Chris@909: chris@22: context "with options[:global]" do chris@22: should "authorize if user has at least one role that has this permission" do chris@22: @dlopper2 = User.find(5) #only Developper on a project, not Manager anywhere chris@22: @anonymous = User.find(6) chris@22: assert @jsmith.allowed_to?(:delete_issue_watchers, nil, :global => true) chris@22: assert ! @dlopper2.allowed_to?(:delete_issue_watchers, nil, :global => true) chris@22: assert @dlopper2.allowed_to?(:add_issues, nil, :global => true) chris@22: assert ! @anonymous.allowed_to?(:add_issues, nil, :global => true) chris@22: assert @anonymous.allowed_to?(:view_issues, nil, :global => true) chris@22: end chris@22: end chris@22: end Chris@909: chris@37: context "User#notify_about?" do chris@37: context "Issues" do chris@37: setup do chris@37: @project = Project.find(1) chris@37: @author = User.generate_with_protected! chris@37: @assignee = User.generate_with_protected! chris@37: @issue = Issue.generate_for_project!(@project, :assigned_to => @assignee, :author => @author) chris@37: end chris@37: chris@37: should "be true for a user with :all" do Chris@119: @author.update_attribute(:mail_notification, 'all') chris@37: assert @author.notify_about?(@issue) chris@37: end Chris@909: chris@37: should "be false for a user with :none" do Chris@119: @author.update_attribute(:mail_notification, 'none') chris@37: assert ! @author.notify_about?(@issue) chris@37: end Chris@909: chris@37: should "be false for a user with :only_my_events and isn't an author, creator, or assignee" do Chris@119: @user = User.generate_with_protected!(:mail_notification => 'only_my_events') Chris@210: Member.create!(:user => @user, :project => @project, :role_ids => [1]) chris@37: assert ! @user.notify_about?(@issue) chris@37: end Chris@909: chris@37: should "be true for a user with :only_my_events and is the author" do Chris@119: @author.update_attribute(:mail_notification, 'only_my_events') chris@37: assert @author.notify_about?(@issue) chris@37: end Chris@909: chris@37: should "be true for a user with :only_my_events and is the assignee" do Chris@119: @assignee.update_attribute(:mail_notification, 'only_my_events') chris@37: assert @assignee.notify_about?(@issue) chris@37: end Chris@909: chris@37: should "be true for a user with :only_assigned and is the assignee" do Chris@119: @assignee.update_attribute(:mail_notification, 'only_assigned') chris@37: assert @assignee.notify_about?(@issue) chris@37: end Chris@909: chris@37: should "be false for a user with :only_assigned and is not the assignee" do Chris@119: @author.update_attribute(:mail_notification, 'only_assigned') chris@37: assert ! @author.notify_about?(@issue) chris@37: end Chris@909: chris@37: should "be true for a user with :only_owner and is the author" do Chris@119: @author.update_attribute(:mail_notification, 'only_owner') chris@37: assert @author.notify_about?(@issue) chris@37: end Chris@909: chris@37: should "be false for a user with :only_owner and is not the author" do Chris@119: @assignee.update_attribute(:mail_notification, 'only_owner') chris@37: assert ! @assignee.notify_about?(@issue) chris@37: end Chris@909: Chris@210: should "be true for a user with :selected and is the author" do Chris@210: @author.update_attribute(:mail_notification, 'selected') Chris@210: assert @author.notify_about?(@issue) Chris@210: end Chris@909: Chris@210: should "be true for a user with :selected and is the assignee" do Chris@210: @assignee.update_attribute(:mail_notification, 'selected') Chris@210: assert @assignee.notify_about?(@issue) Chris@210: end Chris@909: Chris@210: should "be false for a user with :selected and is not the author or assignee" do Chris@210: @user = User.generate_with_protected!(:mail_notification => 'selected') Chris@210: Member.create!(:user => @user, :project => @project, :role_ids => [1]) Chris@210: assert ! @user.notify_about?(@issue) Chris@210: end chris@37: end chris@37: chris@37: context "other events" do chris@37: should 'be added and tested' chris@37: end chris@37: end Chris@245: Chris@245: def test_salt_unsalted_passwords Chris@245: # Restore a user with an unsalted password Chris@245: user = User.find(1) Chris@245: user.salt = nil Chris@245: user.hashed_password = User.hash_password("unsalted") Chris@245: user.save! Chris@909: Chris@245: User.salt_unsalted_passwords! Chris@909: Chris@245: user.reload Chris@245: # Salt added Chris@245: assert !user.salt.blank? Chris@245: # Password still valid Chris@245: assert user.check_password?("unsalted") Chris@245: assert_equal user, User.try_to_login(user.login, "unsalted") Chris@245: end Chris@909: Chris@0: if Object.const_defined?(:OpenID) Chris@909: Chris@0: def test_setting_identity_url Chris@0: normalized_open_id_url = 'http://example.com/' Chris@0: u = User.new( :identity_url => 'http://example.com/' ) Chris@0: assert_equal normalized_open_id_url, u.identity_url Chris@0: end Chris@0: Chris@0: def test_setting_identity_url_without_trailing_slash Chris@0: normalized_open_id_url = 'http://example.com/' Chris@0: u = User.new( :identity_url => 'http://example.com' ) Chris@0: assert_equal normalized_open_id_url, u.identity_url Chris@0: end Chris@0: Chris@0: def test_setting_identity_url_without_protocol Chris@0: normalized_open_id_url = 'http://example.com/' Chris@0: u = User.new( :identity_url => 'example.com' ) Chris@0: assert_equal normalized_open_id_url, u.identity_url Chris@0: end Chris@909: Chris@0: def test_setting_blank_identity_url Chris@0: u = User.new( :identity_url => 'example.com' ) Chris@0: u.identity_url = '' Chris@0: assert u.identity_url.blank? Chris@0: end Chris@909: Chris@0: def test_setting_invalid_identity_url Chris@0: u = User.new( :identity_url => 'this is not an openid url' ) Chris@0: assert u.identity_url.blank? Chris@0: end Chris@909: Chris@0: else Chris@0: puts "Skipping openid tests." Chris@0: end Chris@0: Chris@0: end