2019-04-30 08:27:42 +08:00
|
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
2022-04-28 17:00:02 +08:00
|
|
|
|
RSpec.describe User do
|
2023-06-05 23:38:50 +08:00
|
|
|
|
subject(:user) { Fabricate(:user, last_seen_at: 1.day.ago) }
|
|
|
|
|
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:group)
|
2021-12-16 01:41:14 +08:00
|
|
|
|
|
2023-06-05 23:38:50 +08:00
|
|
|
|
it_behaves_like "it has custom fields"
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
2019-05-14 04:43:19 +08:00
|
|
|
|
def user_error_message(*keys)
|
|
|
|
|
I18n.t(:"activerecord.errors.models.user.attributes.#{keys.join(".")}")
|
|
|
|
|
end
|
|
|
|
|
|
2021-08-27 00:16:00 +08:00
|
|
|
|
it do
|
|
|
|
|
is_expected.to have_many(:pending_posts).class_name("ReviewableQueuedPost").with_foreign_key(
|
2023-07-18 19:50:31 +08:00
|
|
|
|
:target_created_by_id,
|
2021-08-27 00:16:00 +08:00
|
|
|
|
)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2021-08-27 00:16:00 +08:00
|
|
|
|
|
2024-01-22 12:40:29 +08:00
|
|
|
|
describe ".in_any_groups?" do
|
|
|
|
|
fab!(:group)
|
|
|
|
|
|
|
|
|
|
it "returns true if any of the group IDs are the 'everyone' auto group" do
|
|
|
|
|
expect(user.in_any_groups?([group.id, Group::AUTO_GROUPS[:everyone]])).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns true if the user is in the group" do
|
|
|
|
|
expect(user.in_any_groups?([group.id])).to eq(false)
|
|
|
|
|
group.add(user)
|
|
|
|
|
user.reload
|
|
|
|
|
expect(user.in_any_groups?([group.id])).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "always returns true for system user for automated groups" do
|
|
|
|
|
GroupUser.where(user_id: Discourse::SYSTEM_USER_ID).delete_all
|
|
|
|
|
Discourse.system_user.reload
|
|
|
|
|
expect(Discourse.system_user.in_any_groups?([group.id])).to eq(false)
|
|
|
|
|
expect(Discourse.system_user.in_any_groups?([Group::AUTO_GROUPS[:trust_level_4]])).to eq(true)
|
|
|
|
|
expect(Discourse.system_user.in_any_groups?([Group::AUTO_GROUPS[:admins]])).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
|
describe "Associations" do
|
2022-06-30 14:54:20 +08:00
|
|
|
|
it "should delete sidebar_section_links when a user is destroyed" do
|
|
|
|
|
Fabricate(:category_sidebar_section_link, user: user)
|
|
|
|
|
Fabricate(:tag_sidebar_section_link, user: user)
|
|
|
|
|
|
|
|
|
|
expect { user.destroy! }.to change { SidebarSectionLink.where(user: user).count }.from(2).to(
|
2023-01-09 19:18:21 +08:00
|
|
|
|
0,
|
2022-06-30 14:54:20 +08:00
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-10-27 06:38:50 +08:00
|
|
|
|
describe "Callbacks" do
|
|
|
|
|
describe "default sidebar section links" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:category)
|
2022-10-27 06:38:50 +08:00
|
|
|
|
|
2023-12-06 20:16:10 +08:00
|
|
|
|
fab!(:secured_category) do
|
2022-10-27 06:38:50 +08:00
|
|
|
|
category = Fabricate(:category)
|
|
|
|
|
category.permissions = { "staff" => :full }
|
|
|
|
|
category.save!
|
|
|
|
|
category
|
|
|
|
|
end
|
|
|
|
|
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:tag)
|
2022-10-27 06:38:50 +08:00
|
|
|
|
fab!(:hidden_tag) { Fabricate(:tag) }
|
|
|
|
|
fab!(:staff_tag_group) do
|
|
|
|
|
Fabricate(:tag_group, permissions: { "staff" => 1 }, tag_names: [hidden_tag.name])
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2022-10-27 06:38:50 +08:00
|
|
|
|
|
|
|
|
|
before do
|
2022-12-08 09:44:29 +08:00
|
|
|
|
SiteSetting.navigation_menu = "sidebar"
|
2022-10-27 06:38:50 +08:00
|
|
|
|
SiteSetting.tagging_enabled = true
|
2023-06-15 07:31:28 +08:00
|
|
|
|
SiteSetting.default_navigation_menu_categories = "#{category.id}|#{secured_category.id}"
|
|
|
|
|
SiteSetting.default_navigation_menu_tags = "#{tag.name}|#{hidden_tag.name}"
|
2022-10-27 06:38:50 +08:00
|
|
|
|
end
|
|
|
|
|
|
2023-07-27 10:52:33 +08:00
|
|
|
|
it "creates sidebar section link records for categories and tags that have been configured as defaults" do
|
2022-10-27 06:38:50 +08:00
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
|
|
|
|
|
expect(
|
|
|
|
|
SidebarSectionLink.where(linkable_type: "Category", user_id: user.id).pluck(:linkable_id),
|
2022-11-08 07:39:24 +08:00
|
|
|
|
).to contain_exactly(category.id, secured_category.id)
|
|
|
|
|
|
2022-12-06 02:39:10 +08:00
|
|
|
|
expect(
|
|
|
|
|
SidebarSectionLink.where(linkable_type: "Tag", user_id: user.id).pluck(:linkable_id),
|
2023-07-27 10:52:33 +08:00
|
|
|
|
).to contain_exactly(tag.id, hidden_tag.id)
|
2022-10-27 06:38:50 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should not create any sidebar section link records for staged users" do
|
|
|
|
|
user = Fabricate(:user, staged: true)
|
|
|
|
|
|
2023-05-04 10:14:09 +08:00
|
|
|
|
expect(SidebarSectionLink.exists?(user: user)).to eq(false)
|
2022-10-27 06:38:50 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should create sidebar section link records when user has been unstaged" do
|
|
|
|
|
user = Fabricate(:user, staged: true)
|
|
|
|
|
user.unstage!
|
|
|
|
|
|
|
|
|
|
expect(SidebarSectionLink.exists?(user: user)).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should not create any sidebar section link records for non human users" do
|
2023-06-01 08:00:01 +08:00
|
|
|
|
id = -Time.now.to_i
|
|
|
|
|
user = Fabricate(:user, id: id)
|
2022-10-27 06:38:50 +08:00
|
|
|
|
|
2023-05-04 10:14:09 +08:00
|
|
|
|
expect(SidebarSectionLink.exists?(user: user)).to eq(false)
|
2022-10-27 06:38:50 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should not create any tag sidebar section link records when tagging is disabled" do
|
|
|
|
|
SiteSetting.tagging_enabled = false
|
|
|
|
|
|
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
|
|
|
|
|
expect(SidebarSectionLink.exists?(linkable_type: "Category", user_id: user.id)).to eq(true)
|
|
|
|
|
expect(SidebarSectionLink.exists?(linkable_type: "Tag", user_id: user.id)).to eq(false)
|
|
|
|
|
end
|
|
|
|
|
end
|
2023-06-26 11:01:59 +08:00
|
|
|
|
|
|
|
|
|
describe "#change_display_name" do
|
|
|
|
|
it "enqueues a job to retroactively update display name in quotes, etc." do
|
|
|
|
|
expect_enqueued_with(
|
|
|
|
|
job: :change_display_name,
|
|
|
|
|
args: {
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
old_name: "Bruce Wayne",
|
|
|
|
|
new_name: "Batman",
|
|
|
|
|
},
|
|
|
|
|
) { user.update(name: "Batman") }
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-10-27 06:38:50 +08:00
|
|
|
|
end
|
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
|
describe "Validations" do
|
2018-04-02 18:17:06 +08:00
|
|
|
|
describe "#username" do
|
|
|
|
|
it { is_expected.to validate_presence_of :username }
|
|
|
|
|
|
|
|
|
|
describe "when username already exists" do
|
|
|
|
|
it "should not be valid" do
|
|
|
|
|
new_user = Fabricate.build(:user, username: user.username.upcase)
|
|
|
|
|
|
|
|
|
|
expect(new_user).to_not be_valid
|
|
|
|
|
|
|
|
|
|
expect(new_user.errors.full_messages.first).to include(I18n.t(:"user.username.unique"))
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "when group with a same name already exists" do
|
|
|
|
|
it "should not be valid" do
|
|
|
|
|
new_user = Fabricate.build(:user, username: group.name.upcase)
|
|
|
|
|
|
|
|
|
|
expect(new_user).to_not be_valid
|
|
|
|
|
|
|
|
|
|
expect(new_user.errors.full_messages.first).to include(I18n.t(:"user.username.unique"))
|
|
|
|
|
end
|
|
|
|
|
end
|
2019-05-14 04:43:19 +08:00
|
|
|
|
|
|
|
|
|
it "is not valid if username changes to be same as password" do
|
|
|
|
|
user.username = "myawesomepassword"
|
|
|
|
|
expect(user).to_not be_valid
|
|
|
|
|
expect(user.errors.full_messages.first).to include(
|
|
|
|
|
user_error_message(:username, :same_as_password),
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is not valid if username lowercase changes to be same as password" do
|
|
|
|
|
user.username = "MyAwesomePassword"
|
|
|
|
|
expect(user).to_not be_valid
|
|
|
|
|
expect(user.errors.full_messages.first).to include(
|
|
|
|
|
user_error_message(:username, :same_as_password),
|
|
|
|
|
)
|
|
|
|
|
end
|
2022-04-05 05:15:32 +08:00
|
|
|
|
|
|
|
|
|
describe "when a username is an integer" do
|
|
|
|
|
it "is converted to a string on normalization" do
|
|
|
|
|
expect(User.normalize_username(123)).to eq("123") # This is possible via the API
|
|
|
|
|
end
|
|
|
|
|
end
|
2019-05-14 04:43:19 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "name" do
|
|
|
|
|
it "is not valid if it changes to be the same as the password" do
|
|
|
|
|
user.name = "myawesomepassword"
|
|
|
|
|
expect(user).to_not be_valid
|
|
|
|
|
expect(user.errors.full_messages.first).to include(
|
|
|
|
|
user_error_message(:name, :same_as_password),
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is not valid if name lowercase changes to be the same as the password" do
|
|
|
|
|
user.name = "MyAwesomePassword"
|
|
|
|
|
expect(user).to_not be_valid
|
|
|
|
|
expect(user.errors.full_messages.first).to include(
|
|
|
|
|
user_error_message(:name, :same_as_password),
|
|
|
|
|
)
|
|
|
|
|
end
|
2020-02-04 03:12:45 +08:00
|
|
|
|
|
|
|
|
|
it "doesn't raise an error if the name is longer than the max password length" do
|
2020-02-04 04:15:02 +08:00
|
|
|
|
user.name = "x" * (User.max_password_length + 1)
|
2020-02-04 03:12:45 +08:00
|
|
|
|
expect(user).to be_valid
|
|
|
|
|
end
|
2018-04-02 18:17:06 +08:00
|
|
|
|
end
|
2016-12-21 17:00:45 +08:00
|
|
|
|
|
|
|
|
|
describe "emails" do
|
2018-04-02 18:17:06 +08:00
|
|
|
|
it { is_expected.to validate_presence_of :primary_email }
|
|
|
|
|
|
2016-12-21 17:00:45 +08:00
|
|
|
|
let(:user) { Fabricate.build(:user) }
|
|
|
|
|
|
|
|
|
|
describe "when record has a valid email" do
|
|
|
|
|
it "should be valid" do
|
|
|
|
|
user.email = "test@gmail.com"
|
2017-04-27 02:47:36 +08:00
|
|
|
|
|
2016-12-21 17:00:45 +08:00
|
|
|
|
expect(user).to be_valid
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "when record has an invalid email" do
|
|
|
|
|
it "should not be valid" do
|
|
|
|
|
user.email = "test@gmailcom"
|
2017-04-27 02:47:36 +08:00
|
|
|
|
|
2016-12-21 17:00:45 +08:00
|
|
|
|
expect(user).to_not be_valid
|
2021-03-10 20:49:13 +08:00
|
|
|
|
expect(user.errors.messages.keys).to contain_exactly(:primary_email)
|
2017-07-31 11:16:08 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2018-03-20 10:22:06 +08:00
|
|
|
|
describe "when record has an email that as already been taken" do
|
|
|
|
|
it "should not be valid" do
|
|
|
|
|
user2 = Fabricate(:user)
|
|
|
|
|
user.email = user2.email.upcase
|
|
|
|
|
|
|
|
|
|
expect(user).to_not be_valid
|
|
|
|
|
|
|
|
|
|
expect(user.errors.messages[:primary_email]).to include(
|
|
|
|
|
I18n.t("activerecord.errors.messages.taken"),
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2017-07-31 11:16:08 +08:00
|
|
|
|
describe "when user is staged" do
|
2017-08-09 10:56:08 +08:00
|
|
|
|
it "should still validate presence of primary_email" do
|
2017-07-31 11:16:08 +08:00
|
|
|
|
user.staged = true
|
2017-08-09 10:56:08 +08:00
|
|
|
|
user.email = nil
|
2017-07-31 11:16:08 +08:00
|
|
|
|
|
|
|
|
|
expect(user).to_not be_valid
|
2017-04-27 02:47:36 +08:00
|
|
|
|
expect(user.errors.messages).to include(:primary_email)
|
2016-12-21 17:00:45 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2018-01-04 15:37:26 +08:00
|
|
|
|
|
|
|
|
|
describe "when primary_email is being reassigned to another user" do
|
|
|
|
|
it "should not be valid" do
|
|
|
|
|
user2 = Fabricate.build(:user, email: nil)
|
|
|
|
|
user.save!
|
|
|
|
|
user2.primary_email = user.primary_email
|
|
|
|
|
|
|
|
|
|
expect(user2).to_not be_valid
|
|
|
|
|
expect(user2.errors.messages).to include(:primary_email)
|
|
|
|
|
expect(user2.primary_email.errors.messages).to include(:user_id)
|
|
|
|
|
end
|
|
|
|
|
end
|
2016-12-21 17:00:45 +08:00
|
|
|
|
end
|
2022-04-28 17:00:02 +08:00
|
|
|
|
|
|
|
|
|
describe "#user_fields" do
|
2022-05-16 21:21:33 +08:00
|
|
|
|
fab!(:user_field) { Fabricate(:user_field, show_on_profile: true) }
|
2022-08-09 03:34:51 +08:00
|
|
|
|
let(:user_field_value) { user.reload.user_fields[user_field.id.to_s] }
|
2022-04-28 17:00:02 +08:00
|
|
|
|
fab!(:watched_word) { Fabricate(:watched_word, word: "bad") }
|
|
|
|
|
|
|
|
|
|
before { user.set_user_field(user_field.id, value) }
|
|
|
|
|
|
|
|
|
|
context "when user fields contain watched words" do
|
2022-06-15 00:27:01 +08:00
|
|
|
|
context "when watched words are of type 'Block'" do
|
|
|
|
|
let(:value) { "bad user field value" }
|
|
|
|
|
|
|
|
|
|
context "when user field is public" do
|
|
|
|
|
it "is not valid" do
|
|
|
|
|
user.valid?
|
|
|
|
|
expect(user.errors[:base].size).to eq(1)
|
|
|
|
|
expect(user.errors.messages[:base]).to include(/you can't post the word/)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when user field is private" do
|
|
|
|
|
before { user_field.update(show_on_profile: false) }
|
|
|
|
|
|
2024-01-30 01:44:32 +08:00
|
|
|
|
it { is_expected.to be_valid }
|
|
|
|
|
end
|
|
|
|
|
context "when SiteSetting.disable_watched_word_checking_in_user_fields is true" do
|
|
|
|
|
before { SiteSetting.disable_watched_word_checking_in_user_fields = true }
|
|
|
|
|
|
2022-06-15 00:27:01 +08:00
|
|
|
|
it { is_expected.to be_valid }
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when watched words are of type 'Censor'" do
|
|
|
|
|
let!(:censored_word) do
|
|
|
|
|
Fabricate(:watched_word, word: "censored", action: WatchedWord.actions[:censor])
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2022-06-15 00:27:01 +08:00
|
|
|
|
let(:value) { "censored word" }
|
|
|
|
|
|
|
|
|
|
context "when user field is public" do
|
|
|
|
|
it "censors the words upon saving" do
|
|
|
|
|
user.save!
|
|
|
|
|
expect(user_field_value).to eq "■■■■■■■■ word"
|
|
|
|
|
end
|
2024-01-30 01:44:32 +08:00
|
|
|
|
|
|
|
|
|
context "when SiteSetting.disable_watched_word_checking_in_user_fields is true" do
|
|
|
|
|
before { SiteSetting.disable_watched_word_checking_in_user_fields = true }
|
|
|
|
|
|
|
|
|
|
it "does not censor the words upon saving" do
|
|
|
|
|
user.save!
|
|
|
|
|
expect(user_field_value).to eq "censored word"
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-06-15 00:27:01 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when user field is private" do
|
|
|
|
|
before { user_field.update(show_on_profile: false) }
|
|
|
|
|
|
|
|
|
|
it "does not censor anything" do
|
|
|
|
|
user.save!
|
|
|
|
|
expect(user_field_value).to eq "censored word"
|
|
|
|
|
end
|
2022-05-16 21:21:33 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-06-15 00:27:01 +08:00
|
|
|
|
context "when watched words are of type 'Replace'" do
|
|
|
|
|
let(:value) { "word to replace" }
|
|
|
|
|
let!(:replace_word) do
|
|
|
|
|
Fabricate(
|
|
|
|
|
:watched_word,
|
|
|
|
|
word: "to replace",
|
|
|
|
|
replacement: "replaced",
|
|
|
|
|
action: WatchedWord.actions[:replace],
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when user field is public" do
|
|
|
|
|
it "replaces the words upon saving" do
|
|
|
|
|
user.save!
|
|
|
|
|
expect(user_field_value).to eq "word replaced"
|
|
|
|
|
end
|
2024-01-30 01:44:32 +08:00
|
|
|
|
context "when SiteSetting.disable_watched_word_checking_in_user_fields is true" do
|
|
|
|
|
before { SiteSetting.disable_watched_word_checking_in_user_fields = true }
|
|
|
|
|
|
|
|
|
|
it "does not replace anything" do
|
|
|
|
|
user.save!
|
|
|
|
|
expect(user_field_value).to eq "word to replace"
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-06-15 00:27:01 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when user field is private" do
|
|
|
|
|
before { user_field.update(show_on_profile: false) }
|
2022-05-16 21:21:33 +08:00
|
|
|
|
|
2022-06-15 00:27:01 +08:00
|
|
|
|
it "does not replace anything" do
|
|
|
|
|
user.save!
|
|
|
|
|
expect(user_field_value).to eq "word to replace"
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-04-28 17:00:02 +08:00
|
|
|
|
end
|
2023-03-01 10:43:34 +08:00
|
|
|
|
|
|
|
|
|
context "when watched words are of type 'link'" do
|
|
|
|
|
let(:value) { "don't replace me" }
|
|
|
|
|
let!(:replace_word) do
|
|
|
|
|
Fabricate(
|
|
|
|
|
:watched_word,
|
|
|
|
|
word: "replace",
|
|
|
|
|
replacement: "touch",
|
|
|
|
|
action: WatchedWord.actions[:link],
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "does not replace anything" do
|
|
|
|
|
user.save!
|
|
|
|
|
expect(user_field_value).to eq value
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-04-28 17:00:02 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when user fields do not contain watched words" do
|
|
|
|
|
let(:value) { "good user field value" }
|
|
|
|
|
|
|
|
|
|
it { is_expected.to be_valid }
|
|
|
|
|
end
|
2022-07-15 06:36:54 +08:00
|
|
|
|
|
2022-07-26 23:15:42 +08:00
|
|
|
|
context "when user fields contain URL" do
|
|
|
|
|
let(:value) { "https://discourse.org" }
|
|
|
|
|
|
|
|
|
|
it "is not cooked" do
|
|
|
|
|
user.save!
|
|
|
|
|
expect(user_field_value).to eq "https://discourse.org"
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-07-15 06:36:54 +08:00
|
|
|
|
context "with a multiselect user field" do
|
|
|
|
|
fab!(:user_field) do
|
|
|
|
|
Fabricate(:user_field, field_type: "multiselect", show_on_profile: true) do
|
|
|
|
|
user_field_options do
|
|
|
|
|
[
|
|
|
|
|
Fabricate(:user_field_option, value: "Axe"),
|
|
|
|
|
Fabricate(:user_field_option, value: "Sword"),
|
|
|
|
|
]
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
let(:user_field_value) { user.reload.user_fields[user_field.id.to_s] }
|
|
|
|
|
|
|
|
|
|
context "with a blocked word" do
|
|
|
|
|
let(:value) { %w[Axe bad Sword] }
|
|
|
|
|
|
|
|
|
|
it "does not block the word since it is not user generated-content" do
|
|
|
|
|
user.save!
|
|
|
|
|
expect(user_field_value).to eq %w[Axe bad Sword]
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "with a censored word" do
|
|
|
|
|
let(:value) { %w[Axe bad Sword] }
|
|
|
|
|
before { watched_word.action = WatchedWord.actions[:censor] }
|
|
|
|
|
|
|
|
|
|
it "does not censor the word since it is not user generated-content" do
|
|
|
|
|
user.save!
|
|
|
|
|
expect(user_field_value).to eq %w[Axe bad Sword]
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-08-09 03:34:51 +08:00
|
|
|
|
|
|
|
|
|
context "when reseting user fields" do
|
|
|
|
|
let!(:censored_word) do
|
|
|
|
|
Fabricate(:watched_word, word: "censored", action: WatchedWord.actions[:censor])
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2022-08-09 03:34:51 +08:00
|
|
|
|
let(:value) { nil }
|
|
|
|
|
|
|
|
|
|
it "works" do
|
|
|
|
|
user.save!
|
|
|
|
|
expect(user_field_value).to eq nil
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-04-28 17:00:02 +08:00
|
|
|
|
end
|
2016-12-21 17:00:45 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
2014-12-30 22:06:15 +08:00
|
|
|
|
describe "#count_by_signup_date" do
|
|
|
|
|
before(:each) do
|
|
|
|
|
User.destroy_all
|
2018-05-11 11:30:21 +08:00
|
|
|
|
freeze_time DateTime.parse("2017-02-01 12:00")
|
2014-12-30 22:06:15 +08:00
|
|
|
|
Fabricate(:user)
|
|
|
|
|
Fabricate(:user, created_at: 1.day.ago)
|
|
|
|
|
Fabricate(:user, created_at: 1.day.ago)
|
|
|
|
|
Fabricate(:user, created_at: 2.days.ago)
|
|
|
|
|
Fabricate(:user, created_at: 4.days.ago)
|
|
|
|
|
end
|
|
|
|
|
let(:signups_by_day) do
|
|
|
|
|
{ 1.day.ago.to_date => 2, 2.days.ago.to_date => 1, Time.now.utc.to_date => 1 }
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2014-12-30 22:06:15 +08:00
|
|
|
|
|
|
|
|
|
it "collect closed interval signups" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(User.count_by_signup_date(2.days.ago, Time.now)).to include(signups_by_day)
|
|
|
|
|
expect(User.count_by_signup_date(2.days.ago, Time.now)).not_to include(
|
|
|
|
|
4.days.ago.to_date => 1,
|
|
|
|
|
)
|
2014-12-30 22:06:15 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-07-27 18:21:10 +08:00
|
|
|
|
describe ".enqueue_welcome_message" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
|
|
|
|
it "enqueues the system message" do
|
2021-06-01 20:38:55 +08:00
|
|
|
|
SiteSetting.send_welcome_message = true
|
|
|
|
|
|
2020-07-24 17:16:52 +08:00
|
|
|
|
expect_enqueued_with(
|
|
|
|
|
job: :send_system_message,
|
|
|
|
|
args: {
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
message_type: "welcome_user",
|
|
|
|
|
},
|
|
|
|
|
) { user.enqueue_welcome_message("welcome_user") }
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "doesn't enqueue the system message when the site settings disable it" do
|
2017-10-25 13:02:18 +08:00
|
|
|
|
SiteSetting.send_welcome_message = false
|
2020-07-24 17:16:52 +08:00
|
|
|
|
|
|
|
|
|
expect_not_enqueued_with(
|
|
|
|
|
job: :send_system_message,
|
|
|
|
|
args: {
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
message_type: "welcome_user",
|
|
|
|
|
},
|
|
|
|
|
) { user.enqueue_welcome_message("welcome_user") }
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
|
describe "enqueue_staff_welcome_message" do
|
2021-12-16 01:41:14 +08:00
|
|
|
|
fab!(:first_admin) { Fabricate(:admin) }
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2020-06-17 19:12:55 +08:00
|
|
|
|
|
|
|
|
|
it "enqueues message for admin" do
|
|
|
|
|
expect { user.grant_admin! }.to change { Jobs::SendSystemMessage.jobs.count }.by 1
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "enqueues message for moderator" do
|
|
|
|
|
expect { user.grant_moderation! }.to change { Jobs::SendSystemMessage.jobs.count }.by 1
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "skips the message if already an admin" do
|
|
|
|
|
user.update(admin: true)
|
2022-07-19 22:03:03 +08:00
|
|
|
|
expect { user.grant_admin! }.not_to change { Jobs::SendSystemMessage.jobs.count }
|
2020-06-17 19:12:55 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-07-27 18:21:10 +08:00
|
|
|
|
describe ".set_default_tags_preferences" do
|
2019-11-01 15:10:13 +08:00
|
|
|
|
let(:tag) { Fabricate(:tag) }
|
|
|
|
|
|
|
|
|
|
it "should set default tag preferences when new user created" do
|
|
|
|
|
SiteSetting.default_tags_watching = tag.name
|
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
expect(
|
|
|
|
|
TagUser.exists?(
|
|
|
|
|
tag_id: tag.id,
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
notification_level: TagUser.notification_levels[:watching],
|
2023-01-09 19:18:21 +08:00
|
|
|
|
),
|
2019-11-01 15:10:13 +08:00
|
|
|
|
).to be_truthy
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2019-01-04 01:03:01 +08:00
|
|
|
|
describe "reviewable" do
|
2019-04-04 00:04:05 +08:00
|
|
|
|
let(:user) { Fabricate(:user, active: false) }
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:admin)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
2019-04-04 00:04:05 +08:00
|
|
|
|
before { Jobs.run_immediately! }
|
|
|
|
|
|
|
|
|
|
it "creates a reviewable for the user if must_approve_users is true and activate is called" do
|
2017-07-07 14:09:14 +08:00
|
|
|
|
SiteSetting.must_approve_users = true
|
2019-01-04 01:03:01 +08:00
|
|
|
|
user
|
2017-06-01 15:19:43 +08:00
|
|
|
|
|
2019-04-04 00:04:05 +08:00
|
|
|
|
# Inactive users don't have reviewables
|
|
|
|
|
reviewable = ReviewableUser.find_by(target: user)
|
|
|
|
|
expect(reviewable).to be_blank
|
|
|
|
|
|
|
|
|
|
user.activate
|
2019-01-04 01:03:01 +08:00
|
|
|
|
reviewable = ReviewableUser.find_by(target: user)
|
|
|
|
|
expect(reviewable).to be_present
|
|
|
|
|
expect(reviewable.score > 0).to eq(true)
|
|
|
|
|
expect(reviewable.reviewable_scores).to be_present
|
2016-09-13 16:03:17 +08:00
|
|
|
|
end
|
|
|
|
|
|
2019-04-04 00:04:05 +08:00
|
|
|
|
it "creates a reviewable for the user if must_approve_users is true and their token is confirmed" do
|
|
|
|
|
SiteSetting.must_approve_users = true
|
|
|
|
|
user
|
|
|
|
|
|
|
|
|
|
# Inactive users don't have reviewables
|
|
|
|
|
reviewable = ReviewableUser.find_by(target: user)
|
|
|
|
|
expect(reviewable).to be_blank
|
|
|
|
|
|
2021-11-25 15:34:39 +08:00
|
|
|
|
EmailToken.confirm(Fabricate(:email_token, user: user).token)
|
2019-04-04 00:04:05 +08:00
|
|
|
|
expect(user.reload.active).to eq(true)
|
|
|
|
|
reviewable = ReviewableUser.find_by(target: user)
|
|
|
|
|
expect(reviewable).to be_present
|
|
|
|
|
end
|
|
|
|
|
|
2019-01-04 01:03:01 +08:00
|
|
|
|
it "doesn't create a reviewable if must_approve_users is false" do
|
|
|
|
|
user
|
|
|
|
|
expect(ReviewableUser.find_by(target: user)).to be_blank
|
2013-02-06 10:44:49 +08:00
|
|
|
|
end
|
2019-04-04 00:04:05 +08:00
|
|
|
|
|
|
|
|
|
it "will reject a reviewable if the user is deactivated" do
|
|
|
|
|
SiteSetting.must_approve_users = true
|
|
|
|
|
user
|
|
|
|
|
|
|
|
|
|
user.activate
|
|
|
|
|
reviewable = ReviewableUser.find_by(target: user)
|
|
|
|
|
expect(reviewable.pending?).to eq(true)
|
|
|
|
|
|
|
|
|
|
user.deactivate(admin)
|
|
|
|
|
expect(reviewable.reload.rejected?).to eq(true)
|
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
2018-12-14 18:04:18 +08:00
|
|
|
|
describe "delete posts in batches" do
|
2022-02-07 11:23:34 +08:00
|
|
|
|
fab!(:post1) { Fabricate(:post) }
|
|
|
|
|
fab!(:user) { post1.user }
|
|
|
|
|
fab!(:post2) { Fabricate(:post, topic: post1.topic, user: user) }
|
|
|
|
|
fab!(:post3) { Fabricate(:post, user: user) }
|
|
|
|
|
fab!(:posts) { [post1, post2, post3] }
|
|
|
|
|
fab!(:post_ids) { [post1.id, post2.id, post3.id] }
|
2022-08-04 08:17:40 +08:00
|
|
|
|
let(:guardian) { Guardian.new(Fabricate(:admin)) }
|
2023-07-29 00:16:23 +08:00
|
|
|
|
fab!(:reviewable_queued_post) { Fabricate(:reviewable_queued_post, target_created_by: user) }
|
2013-02-07 15:11:56 +08:00
|
|
|
|
|
2018-12-14 18:04:18 +08:00
|
|
|
|
it "deletes only one batch of posts" do
|
2022-02-07 11:23:34 +08:00
|
|
|
|
post2
|
|
|
|
|
deleted_posts = user.delete_posts_in_batches(guardian, 1)
|
|
|
|
|
expect(Post.where(id: post_ids).count).to eq(2)
|
2018-12-14 18:04:18 +08:00
|
|
|
|
expect(deleted_posts.length).to eq(1)
|
2022-02-07 11:23:34 +08:00
|
|
|
|
expect(deleted_posts[0]).to eq(post2)
|
2018-12-14 18:04:18 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "correctly deletes posts and topics" do
|
2022-02-07 11:23:34 +08:00
|
|
|
|
posts
|
|
|
|
|
user.delete_posts_in_batches(guardian, 20)
|
|
|
|
|
|
|
|
|
|
expect(Post.where(id: post_ids)).to be_empty
|
|
|
|
|
expect(Reviewable.where(created_by: user).count).to eq(0)
|
|
|
|
|
|
2014-11-01 01:44:26 +08:00
|
|
|
|
posts.each { |p| expect(Topic.find_by(id: p.topic_id)).to be_nil if p.is_first_post? }
|
2013-02-07 15:11:56 +08:00
|
|
|
|
end
|
2013-03-29 07:24:35 +08:00
|
|
|
|
|
|
|
|
|
it "does not allow non moderators to delete all posts" do
|
|
|
|
|
invalid_guardian = Guardian.new(Fabricate(:user))
|
|
|
|
|
|
|
|
|
|
expect do
|
2022-02-07 11:23:34 +08:00
|
|
|
|
user.delete_posts_in_batches(invalid_guardian)
|
2013-03-29 07:24:35 +08:00
|
|
|
|
end.to raise_error Discourse::InvalidAccess
|
|
|
|
|
|
2022-02-07 11:23:34 +08:00
|
|
|
|
posts.each do |p|
|
2013-03-29 07:24:35 +08:00
|
|
|
|
p.reload
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(p).to be_present
|
|
|
|
|
expect(p.topic).to be_present
|
2013-03-29 07:24:35 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2013-02-07 15:11:56 +08:00
|
|
|
|
end
|
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
|
describe "new" do
|
2023-06-21 22:00:19 +08:00
|
|
|
|
subject(:user) { Fabricate.build(:user) }
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
2014-12-31 22:55:03 +08:00
|
|
|
|
it { is_expected.to be_valid }
|
|
|
|
|
it { is_expected.not_to be_admin }
|
|
|
|
|
it { is_expected.not_to be_approved }
|
2014-10-29 23:06:50 +08:00
|
|
|
|
|
|
|
|
|
it "is properly initialized" do
|
2023-06-21 22:00:19 +08:00
|
|
|
|
expect(user.approved_at).to be_blank
|
|
|
|
|
expect(user.approved_by_id).to be_blank
|
2014-10-29 23:06:50 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
2016-09-13 16:03:17 +08:00
|
|
|
|
it "triggers an extensibility event" do
|
2023-06-21 22:00:19 +08:00
|
|
|
|
event = DiscourseEvent.track_events { user.save! }.first
|
2017-06-01 15:19:43 +08:00
|
|
|
|
|
|
|
|
|
expect(event[:event_name]).to eq(:user_created)
|
2023-06-21 22:00:19 +08:00
|
|
|
|
expect(event[:params].first).to eq(user)
|
2016-09-13 16:03:17 +08:00
|
|
|
|
end
|
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
|
context "with after_save" do
|
2023-06-21 22:00:19 +08:00
|
|
|
|
before { user.save! }
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
2016-02-17 12:46:19 +08:00
|
|
|
|
it "has correct settings" do
|
2023-06-21 22:00:19 +08:00
|
|
|
|
expect(user.email_tokens).to be_present
|
|
|
|
|
expect(user.user_stat).to be_present
|
|
|
|
|
expect(user.user_profile).to be_present
|
|
|
|
|
expect(user.user_option.email_messages_level).to eq(UserOption.email_level_types[:always])
|
|
|
|
|
expect(user.user_option.email_level).to eq(UserOption.email_level_types[:only_when_away])
|
2014-10-29 23:06:50 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
2014-07-14 22:16:24 +08:00
|
|
|
|
|
|
|
|
|
it "downcases email addresses" do
|
|
|
|
|
user = Fabricate.build(:user, email: "Fancy.Caps.4.U@gmail.com")
|
2015-01-30 03:41:41 +08:00
|
|
|
|
user.valid?
|
|
|
|
|
expect(user.email).to eq("fancy.caps.4.u@gmail.com")
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "strips whitespace from email addresses" do
|
|
|
|
|
user = Fabricate.build(:user, email: " example@gmail.com ")
|
|
|
|
|
user.valid?
|
|
|
|
|
expect(user.email).to eq("example@gmail.com")
|
2014-07-14 22:16:24 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
2013-10-22 02:49:51 +08:00
|
|
|
|
describe "ip address validation" do
|
|
|
|
|
it "validates ip_address for new users" do
|
|
|
|
|
u = Fabricate.build(:user)
|
|
|
|
|
AllowedIpAddressValidator
|
|
|
|
|
.any_instance
|
|
|
|
|
.expects(:validate_each)
|
|
|
|
|
.with(u, :ip_address, u.ip_address)
|
|
|
|
|
u.valid?
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "does not validate ip_address when updating an existing user" do
|
|
|
|
|
u = Fabricate(:user)
|
|
|
|
|
u.ip_address = "87.123.23.11"
|
|
|
|
|
AllowedIpAddressValidator.any_instance.expects(:validate_each).never
|
|
|
|
|
u.valid?
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
|
describe "trust levels" do
|
2013-05-11 04:58:23 +08:00
|
|
|
|
# NOTE be sure to use build to avoid db calls
|
2014-09-05 13:20:39 +08:00
|
|
|
|
let(:user) { Fabricate.build(:user, trust_level: TrustLevel[0]) }
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
|
|
|
|
it "sets to the default trust level setting" do
|
2014-09-05 13:20:39 +08:00
|
|
|
|
SiteSetting.default_trust_level = TrustLevel[4]
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(User.new.trust_level).to eq(TrustLevel[4])
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
2013-02-28 21:08:56 +08:00
|
|
|
|
describe "has_trust_level?" do
|
2013-02-06 03:16:51 +08:00
|
|
|
|
it "raises an error with an invalid level" do
|
2016-05-30 11:38:04 +08:00
|
|
|
|
expect { user.has_trust_level?(:wat) }.to raise_error(InvalidTrustLevel)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is true for your basic level" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.has_trust_level?(TrustLevel[0])).to eq(true)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is false for a higher level" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.has_trust_level?(TrustLevel[2])).to eq(false)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is true if you exceed the level" do
|
2014-09-05 13:20:39 +08:00
|
|
|
|
user.trust_level = TrustLevel[4]
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.has_trust_level?(TrustLevel[1])).to eq(true)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is true for an admin even with a low trust level" do
|
2014-09-05 13:20:39 +08:00
|
|
|
|
user.trust_level = TrustLevel[0]
|
2013-02-06 03:16:51 +08:00
|
|
|
|
user.admin = true
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.has_trust_level?(TrustLevel[1])).to eq(true)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "moderator" do
|
|
|
|
|
it "isn't a moderator by default" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.moderator?).to eq(false)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is a moderator if the user level is moderator" do
|
2013-03-20 12:05:19 +08:00
|
|
|
|
user.moderator = true
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.has_trust_level?(TrustLevel[4])).to eq(true)
|
2013-02-06 10:44:49 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
2013-05-02 15:22:27 +08:00
|
|
|
|
it "is staff if the user is an admin" do
|
2013-02-06 03:16:51 +08:00
|
|
|
|
user.admin = true
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.staff?).to eq(true)
|
2013-02-06 10:44:49 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2013-05-18 16:07:07 +08:00
|
|
|
|
describe "staff and regular users" do
|
2023-06-21 22:00:19 +08:00
|
|
|
|
subject(:user) { Fabricate.build(:user) }
|
2013-05-18 16:07:07 +08:00
|
|
|
|
|
|
|
|
|
describe "#staff?" do
|
2023-06-21 22:00:19 +08:00
|
|
|
|
it { is_expected.not_to be_staff }
|
2013-05-18 16:07:07 +08:00
|
|
|
|
|
|
|
|
|
context "for a moderator user" do
|
|
|
|
|
before { user.moderator = true }
|
|
|
|
|
|
2023-06-21 22:00:19 +08:00
|
|
|
|
it { is_expected.to be_staff }
|
2013-05-18 16:07:07 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "for an admin user" do
|
|
|
|
|
before { user.admin = true }
|
|
|
|
|
|
2023-06-21 22:00:19 +08:00
|
|
|
|
it { is_expected.to be_staff }
|
2013-05-18 16:07:07 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "#regular?" do
|
2023-06-21 22:00:19 +08:00
|
|
|
|
it { is_expected.to be_regular }
|
2013-05-18 16:07:07 +08:00
|
|
|
|
|
|
|
|
|
context "for a moderator user" do
|
|
|
|
|
before { user.moderator = true }
|
|
|
|
|
|
2023-06-21 22:00:19 +08:00
|
|
|
|
it { is_expected.not_to be_regular }
|
2013-05-18 16:07:07 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "for an admin user" do
|
|
|
|
|
before { user.admin = true }
|
|
|
|
|
|
2023-06-21 22:00:19 +08:00
|
|
|
|
it { is_expected.not_to be_regular }
|
2013-05-18 16:07:07 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2013-02-06 10:44:49 +08:00
|
|
|
|
describe "email_hash" do
|
2013-02-06 03:16:51 +08:00
|
|
|
|
before_all { @user = Fabricate(:user) }
|
|
|
|
|
|
2013-02-06 10:44:49 +08:00
|
|
|
|
it "should have a sane email hash" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(@user.email_hash).to match(/^[0-9a-f]{32}$/)
|
2013-02-06 10:44:49 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should use downcase email" do
|
|
|
|
|
@user.email = "example@example.com"
|
|
|
|
|
@user2 = Fabricate(:user)
|
|
|
|
|
@user2.email = "ExAmPlE@eXaMpLe.com"
|
|
|
|
|
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(@user.email_hash).to eq(@user2.email_hash)
|
2013-02-06 10:44:49 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should trim whitespace before hashing" do
|
|
|
|
|
@user.email = "example@example.com"
|
|
|
|
|
@user2 = Fabricate(:user)
|
|
|
|
|
@user2.email = " example@example.com "
|
|
|
|
|
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(@user.email_hash).to eq(@user2.email_hash)
|
2013-02-06 10:44:49 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
2014-09-25 13:50:54 +08:00
|
|
|
|
describe "associated_accounts" do
|
|
|
|
|
it "should correctly find social associations" do
|
|
|
|
|
user = Fabricate(:user)
|
2018-07-23 23:51:57 +08:00
|
|
|
|
expect(user.associated_accounts).to eq([])
|
2014-09-25 13:50:54 +08:00
|
|
|
|
|
2018-12-07 23:39:06 +08:00
|
|
|
|
UserAssociatedAccount.create(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
provider_name: "twitter",
|
|
|
|
|
provider_uid: "1",
|
|
|
|
|
info: {
|
|
|
|
|
nickname: "sam",
|
2018-11-28 23:49:24 +08:00
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
UserAssociatedAccount.create(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
provider_name: "facebook",
|
|
|
|
|
provider_uid: "1234",
|
|
|
|
|
info: {
|
|
|
|
|
email: "test@example.com",
|
2020-10-30 11:39:56 +08:00
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
UserAssociatedAccount.create(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
provider_name: "discord",
|
|
|
|
|
provider_uid: "examplel123123",
|
|
|
|
|
info: {
|
|
|
|
|
nickname: "sam",
|
2019-03-07 19:31:04 +08:00
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
UserAssociatedAccount.create(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
provider_name: "google_oauth2",
|
|
|
|
|
provider_uid: "1",
|
|
|
|
|
info: {
|
|
|
|
|
email: "sam@sam.com",
|
2020-11-10 18:09:15 +08:00
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
UserAssociatedAccount.create(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
provider_name: "github",
|
|
|
|
|
provider_uid: "1",
|
|
|
|
|
info: {
|
|
|
|
|
nickname: "sam",
|
2023-01-09 19:18:21 +08:00
|
|
|
|
},
|
|
|
|
|
)
|
2014-09-25 13:50:54 +08:00
|
|
|
|
|
|
|
|
|
user.reload
|
2020-10-30 11:39:56 +08:00
|
|
|
|
expect(user.associated_accounts.map { |a| a[:name] }).to contain_exactly(
|
|
|
|
|
"twitter",
|
|
|
|
|
"facebook",
|
|
|
|
|
"google_oauth2",
|
|
|
|
|
"github",
|
|
|
|
|
"discord",
|
|
|
|
|
)
|
2014-09-25 13:50:54 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2016-04-27 01:08:19 +08:00
|
|
|
|
describe ".is_singular_admin?" do
|
|
|
|
|
it "returns true if user is singular admin" do
|
|
|
|
|
admin = Fabricate(:admin)
|
|
|
|
|
expect(admin.is_singular_admin?).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns false if user is not the only admin" do
|
|
|
|
|
admin = Fabricate(:admin)
|
2016-07-29 01:54:17 +08:00
|
|
|
|
Fabricate(:admin)
|
2016-04-27 01:08:19 +08:00
|
|
|
|
|
|
|
|
|
expect(admin.is_singular_admin?).to eq(false)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2013-02-06 10:44:49 +08:00
|
|
|
|
describe "name heuristics" do
|
|
|
|
|
it "is able to guess a decent name from an email" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(User.suggest_name("sam.saffron@gmail.com")).to eq("Sam Saffron")
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
2018-05-17 13:04:46 +08:00
|
|
|
|
|
|
|
|
|
it "is able to guess a decent name from username" do
|
|
|
|
|
expect(User.suggest_name("@sam.saffron")).to eq("Sam Saffron")
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is able to guess a decent name from name" do
|
|
|
|
|
expect(User.suggest_name("sam saffron")).to eq("Sam Saffron")
|
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
2013-02-06 10:44:49 +08:00
|
|
|
|
describe "username format" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2021-12-21 02:59:10 +08:00
|
|
|
|
|
2015-09-02 10:13:44 +08:00
|
|
|
|
def assert_bad(username)
|
|
|
|
|
user.username = username
|
|
|
|
|
expect(user.valid?).to eq(false)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
2015-09-02 10:13:44 +08:00
|
|
|
|
def assert_good(username)
|
|
|
|
|
user.username = username
|
|
|
|
|
expect(user.valid?).to eq(true)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
2015-09-02 10:13:44 +08:00
|
|
|
|
it "should be SiteSetting.min_username_length chars or longer" do
|
|
|
|
|
SiteSetting.min_username_length = 5
|
|
|
|
|
assert_bad("abcd")
|
|
|
|
|
assert_good("abcde")
|
|
|
|
|
end
|
|
|
|
|
|
2019-04-23 18:22:47 +08:00
|
|
|
|
context "when Unicode usernames are disabled" do
|
|
|
|
|
before { SiteSetting.unicode_usernames = false }
|
|
|
|
|
|
|
|
|
|
%w[
|
|
|
|
|
first.last
|
|
|
|
|
first
|
|
|
|
|
first-last
|
|
|
|
|
_name
|
|
|
|
|
first_last
|
2015-09-02 10:13:44 +08:00
|
|
|
|
mc.hammer_nose
|
|
|
|
|
UPPERCASE
|
|
|
|
|
sgif
|
2019-04-23 18:22:47 +08:00
|
|
|
|
].each do |username|
|
|
|
|
|
it "allows #{username}" do
|
|
|
|
|
assert_good(username)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
%w[
|
|
|
|
|
traildot.
|
|
|
|
|
has\ space
|
|
|
|
|
double__underscore
|
|
|
|
|
with%symbol
|
|
|
|
|
Exclamation!
|
|
|
|
|
@twitter
|
|
|
|
|
my@email.com
|
|
|
|
|
.tester
|
|
|
|
|
sa$sy
|
|
|
|
|
sam.json
|
|
|
|
|
sam.xml
|
|
|
|
|
sam.html
|
|
|
|
|
sam.htm
|
|
|
|
|
sam.js
|
|
|
|
|
sam.woff
|
|
|
|
|
sam.Png
|
|
|
|
|
sam.gif
|
|
|
|
|
].each do |username|
|
|
|
|
|
it "disallows #{username}" do
|
|
|
|
|
assert_bad(username)
|
|
|
|
|
end
|
2015-09-02 10:13:44 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
2019-04-23 18:22:47 +08:00
|
|
|
|
context "when Unicode usernames are enabled" do
|
|
|
|
|
before { SiteSetting.unicode_usernames = true }
|
|
|
|
|
|
|
|
|
|
%w[Джофрэй Джо.фрэй Джофр-эй Д.жофрэй 乔夫雷 乔夫_雷 _乔夫雷].each do |username|
|
|
|
|
|
it "allows #{username}" do
|
|
|
|
|
assert_good(username)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
%w[.Джофрэй Джофрэй. Джо\ фрэй Джоф__рэй 乔夫雷.js 乔夫雷. 乔夫%雷].each do |username|
|
|
|
|
|
it "disallows #{username}" do
|
|
|
|
|
assert_bad(username)
|
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "username uniqueness" do
|
2021-12-16 01:41:14 +08:00
|
|
|
|
before_all do
|
2013-02-06 03:16:51 +08:00
|
|
|
|
@user = Fabricate.build(:user)
|
|
|
|
|
@user.save!
|
|
|
|
|
@codinghorror = Fabricate.build(:coding_horror)
|
|
|
|
|
end
|
2013-02-06 10:44:49 +08:00
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
|
it "should not allow saving if username is reused" do
|
|
|
|
|
@codinghorror.username = @user.username
|
2019-04-23 18:22:47 +08:00
|
|
|
|
expect(@codinghorror.save).to eq(false)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
2013-02-06 10:44:49 +08:00
|
|
|
|
it "should not allow saving if username is reused in different casing" do
|
2013-02-06 03:16:51 +08:00
|
|
|
|
@codinghorror.username = @user.username.upcase
|
2019-04-23 18:22:47 +08:00
|
|
|
|
expect(@codinghorror.save).to eq(false)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2017-04-13 10:44:26 +08:00
|
|
|
|
describe ".username_available?" do
|
2013-02-06 03:16:51 +08:00
|
|
|
|
it "returns true for a username that is available" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(User.username_available?("BruceWayne")).to eq(true)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns false when a username is taken" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(User.username_available?(Fabricate(:user).username)).to eq(false)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
2016-08-31 21:49:45 +08:00
|
|
|
|
|
|
|
|
|
it "returns false when a username is reserved" do
|
|
|
|
|
SiteSetting.reserved_usernames = "test|donkey"
|
2017-04-13 10:44:26 +08:00
|
|
|
|
expect(User.username_available?("tESt")).to eq(false)
|
|
|
|
|
end
|
2017-12-12 18:26:00 +08:00
|
|
|
|
|
2021-05-21 09:43:47 +08:00
|
|
|
|
it "returns true when reserved username is explicitly allowed" do
|
2018-08-01 11:08:45 +08:00
|
|
|
|
SiteSetting.reserved_usernames = "test|donkey"
|
|
|
|
|
|
|
|
|
|
expect(User.username_available?("tESt", nil, allow_reserved_username: true)).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
|
2017-12-12 18:26:00 +08:00
|
|
|
|
it "returns true when username is associated to a staged user of the same email" do
|
|
|
|
|
staged = Fabricate(:user, staged: true, email: "foo@bar.com")
|
|
|
|
|
expect(User.username_available?(staged.username, staged.primary_email.email)).to eq(true)
|
|
|
|
|
|
|
|
|
|
user = Fabricate(:user, email: "bar@foo.com")
|
|
|
|
|
expect(User.username_available?(user.username, user.primary_email.email)).to eq(false)
|
|
|
|
|
end
|
2018-05-23 03:25:52 +08:00
|
|
|
|
|
|
|
|
|
it "returns false when a username equals an existing group name" do
|
|
|
|
|
Fabricate(:group, name: "foo")
|
|
|
|
|
expect(User.username_available?("Foo")).to eq(false)
|
|
|
|
|
end
|
2019-04-23 18:22:47 +08:00
|
|
|
|
|
|
|
|
|
context "with Unicode usernames enabled" do
|
|
|
|
|
before { SiteSetting.unicode_usernames = true }
|
|
|
|
|
|
|
|
|
|
it "returns false when the username is taken, but the Unicode normalization form is different" do
|
|
|
|
|
Fabricate(:user, username: "L\u00F6we") # NFC
|
|
|
|
|
requested_username = "Lo\u0308we" # NFD
|
|
|
|
|
expect(User.username_available?(requested_username)).to eq(false)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns false when the username is taken and the case differs" do
|
|
|
|
|
Fabricate(:user, username: "LÖWE")
|
|
|
|
|
expect(User.username_available?("löwe")).to eq(false)
|
|
|
|
|
end
|
|
|
|
|
end
|
2017-04-13 10:44:26 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe ".reserved_username?" do
|
|
|
|
|
it "returns true when a username is reserved" do
|
|
|
|
|
SiteSetting.reserved_usernames = "test|donkey"
|
|
|
|
|
|
|
|
|
|
expect(User.reserved_username?("donkey")).to eq(true)
|
|
|
|
|
expect(User.reserved_username?("DonKey")).to eq(true)
|
|
|
|
|
expect(User.reserved_username?("test")).to eq(true)
|
2016-08-31 21:49:45 +08:00
|
|
|
|
end
|
2017-02-28 04:28:56 +08:00
|
|
|
|
|
2021-05-21 09:43:47 +08:00
|
|
|
|
it "should not allow usernames matched against an expression" do
|
2019-04-23 18:22:47 +08:00
|
|
|
|
SiteSetting.reserved_usernames = "test)|*admin*|foo*|*bar|abc.def|löwe|ka\u0308fer"
|
2017-02-28 04:28:56 +08:00
|
|
|
|
|
2017-04-13 10:44:26 +08:00
|
|
|
|
expect(User.reserved_username?("test")).to eq(false)
|
|
|
|
|
expect(User.reserved_username?("abc9def")).to eq(false)
|
2017-02-28 04:28:56 +08:00
|
|
|
|
|
2017-04-13 10:44:26 +08:00
|
|
|
|
expect(User.reserved_username?("admin")).to eq(true)
|
|
|
|
|
expect(User.reserved_username?("foo")).to eq(true)
|
|
|
|
|
expect(User.reserved_username?("bar")).to eq(true)
|
2017-02-28 04:28:56 +08:00
|
|
|
|
|
2017-04-13 10:44:26 +08:00
|
|
|
|
expect(User.reserved_username?("admi")).to eq(false)
|
|
|
|
|
expect(User.reserved_username?("bar.foo")).to eq(false)
|
|
|
|
|
expect(User.reserved_username?("foo.bar")).to eq(true)
|
|
|
|
|
expect(User.reserved_username?("baz.bar")).to eq(true)
|
2019-04-23 18:22:47 +08:00
|
|
|
|
|
|
|
|
|
expect(User.reserved_username?("LÖwe")).to eq(true)
|
|
|
|
|
expect(User.reserved_username?("Lo\u0308we")).to eq(true) # NFD
|
|
|
|
|
expect(User.reserved_username?("löwe")).to eq(true) # NFC
|
|
|
|
|
expect(User.reserved_username?("käfer")).to eq(true) # NFC
|
2017-02-28 04:28:56 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
2013-02-14 01:28:23 +08:00
|
|
|
|
describe "email_validator" do
|
|
|
|
|
it "should allow good emails" do
|
|
|
|
|
user = Fabricate.build(:user, email: "good@gmail.com")
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user).to be_valid
|
2013-02-14 01:28:23 +08:00
|
|
|
|
end
|
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "should reject some emails based on the blocked_email_domains site setting" do
|
|
|
|
|
SiteSetting.blocked_email_domains = "mailinator.com"
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(Fabricate.build(:user, email: "notgood@mailinator.com")).not_to be_valid
|
|
|
|
|
expect(Fabricate.build(:user, email: "mailinator@gmail.com")).to be_valid
|
2013-02-14 01:28:23 +08:00
|
|
|
|
end
|
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "should reject some emails based on the blocked_email_domains site setting" do
|
|
|
|
|
SiteSetting.blocked_email_domains = "mailinator.com|trashmail.net"
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(Fabricate.build(:user, email: "notgood@mailinator.com")).not_to be_valid
|
|
|
|
|
expect(Fabricate.build(:user, email: "notgood@trashmail.net")).not_to be_valid
|
|
|
|
|
expect(Fabricate.build(:user, email: "mailinator.com@gmail.com")).to be_valid
|
2013-02-14 01:28:23 +08:00
|
|
|
|
end
|
2013-04-01 00:51:13 +08:00
|
|
|
|
|
2013-03-19 03:48:56 +08:00
|
|
|
|
it "should not reject partial matches" do
|
2020-07-27 08:23:54 +08:00
|
|
|
|
SiteSetting.blocked_email_domains = "mail.com"
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(Fabricate.build(:user, email: "mailinator@gmail.com")).to be_valid
|
2013-03-19 03:48:56 +08:00
|
|
|
|
end
|
2013-04-01 00:51:13 +08:00
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "should reject some emails based on the blocked_email_domains site setting ignoring case" do
|
|
|
|
|
SiteSetting.blocked_email_domains = "trashmail.net"
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(Fabricate.build(:user, email: "notgood@TRASHMAIL.NET")).not_to be_valid
|
2013-02-14 11:24:32 +08:00
|
|
|
|
end
|
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "should reject emails based on the blocked_email_domains site setting matching subdomain" do
|
|
|
|
|
SiteSetting.blocked_email_domains = "domain.com"
|
2015-05-13 20:08:10 +08:00
|
|
|
|
expect(Fabricate.build(:user, email: "notgood@sub.domain.com")).not_to be_valid
|
|
|
|
|
end
|
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "skips the blocklist if skip_email_validation is set" do
|
|
|
|
|
SiteSetting.blocked_email_domains = "domain.com"
|
2016-09-08 02:05:46 +08:00
|
|
|
|
user = Fabricate.build(:user, email: "notgood@sub.domain.com")
|
|
|
|
|
user.skip_email_validation = true
|
|
|
|
|
expect(user).to be_valid
|
|
|
|
|
end
|
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "blocklist should not reject developer emails" do
|
2015-01-30 01:52:59 +08:00
|
|
|
|
Rails.configuration.stubs(:developer_emails).returns("developer@discourse.org")
|
2020-07-27 08:23:54 +08:00
|
|
|
|
SiteSetting.blocked_email_domains = "discourse.org"
|
2015-01-30 01:52:59 +08:00
|
|
|
|
expect(Fabricate.build(:user, email: "developer@discourse.org")).to be_valid
|
|
|
|
|
end
|
|
|
|
|
|
2013-02-14 11:24:32 +08:00
|
|
|
|
it "should not interpret a period as a wildcard" do
|
2020-07-27 08:23:54 +08:00
|
|
|
|
SiteSetting.blocked_email_domains = "trashmail.net"
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(Fabricate.build(:user, email: "good@trashmailinet.com")).to be_valid
|
2013-02-14 01:28:23 +08:00
|
|
|
|
end
|
2013-02-21 01:16:01 +08:00
|
|
|
|
|
|
|
|
|
it "should not be used to validate existing records" do
|
2020-07-27 08:23:54 +08:00
|
|
|
|
u = Fabricate(:user, email: "in_before_blocklisted@fakemail.com")
|
|
|
|
|
SiteSetting.blocked_email_domains = "fakemail.com"
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(u).to be_valid
|
2013-02-21 01:16:01 +08:00
|
|
|
|
end
|
2013-02-21 05:24:52 +08:00
|
|
|
|
|
|
|
|
|
it "should be used when email is being changed" do
|
2020-07-27 08:23:54 +08:00
|
|
|
|
SiteSetting.blocked_email_domains = "mailinator.com"
|
2013-02-21 05:24:52 +08:00
|
|
|
|
u = Fabricate(:user, email: "good@gmail.com")
|
|
|
|
|
u.email = "nope@mailinator.com"
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(u).not_to be_valid
|
2013-03-19 03:48:56 +08:00
|
|
|
|
end
|
2013-04-01 00:51:13 +08:00
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "allowlist should reject some emails based on the allowed_email_domains site setting" do
|
|
|
|
|
SiteSetting.allowed_email_domains = "vaynermedia.com"
|
2017-09-12 01:22:04 +08:00
|
|
|
|
user = Fabricate.build(:user, email: "notgood@mailinator.com")
|
|
|
|
|
expect(user).not_to be_valid
|
|
|
|
|
expect(user.errors.messages[:primary_email]).to include(I18n.t("user.email.not_allowed"))
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(Fabricate.build(:user, email: "sbauch@vaynermedia.com")).to be_valid
|
2013-03-19 03:48:56 +08:00
|
|
|
|
end
|
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "should reject some emails based on the allowed_email_domains site setting when allowlisting multiple domains" do
|
|
|
|
|
SiteSetting.allowed_email_domains = "vaynermedia.com|gmail.com"
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(Fabricate.build(:user, email: "notgood@mailinator.com")).not_to be_valid
|
|
|
|
|
expect(Fabricate.build(:user, email: "notgood@trashmail.net")).not_to be_valid
|
|
|
|
|
expect(Fabricate.build(:user, email: "mailinator.com@gmail.com")).to be_valid
|
|
|
|
|
expect(Fabricate.build(:user, email: "mailinator.com@vaynermedia.com")).to be_valid
|
2013-03-19 03:48:56 +08:00
|
|
|
|
end
|
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "should accept some emails based on the allowed_email_domains site setting ignoring case" do
|
|
|
|
|
SiteSetting.allowed_email_domains = "vaynermedia.com"
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(Fabricate.build(:user, email: "good@VAYNERMEDIA.COM")).to be_valid
|
2013-03-19 03:48:56 +08:00
|
|
|
|
end
|
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "allowlist should accept developer emails" do
|
2015-01-30 01:52:59 +08:00
|
|
|
|
Rails.configuration.stubs(:developer_emails).returns("developer@discourse.org")
|
2020-07-27 08:23:54 +08:00
|
|
|
|
SiteSetting.allowed_email_domains = "awesome.org"
|
2015-01-30 01:52:59 +08:00
|
|
|
|
expect(Fabricate.build(:user, email: "developer@discourse.org")).to be_valid
|
|
|
|
|
end
|
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "email allowlist should not be used to validate existing records" do
|
|
|
|
|
u = Fabricate(:user, email: "in_before_allowlisted@fakemail.com")
|
|
|
|
|
SiteSetting.blocked_email_domains = "vaynermedia.com"
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(u).to be_valid
|
2013-03-19 03:48:56 +08:00
|
|
|
|
end
|
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
|
it "email allowlist should be used when email is being changed" do
|
|
|
|
|
SiteSetting.allowed_email_domains = "vaynermedia.com"
|
2019-04-23 17:49:05 +08:00
|
|
|
|
u = Fabricate(:user, email: "good@vaynermedia.com")
|
2013-03-19 03:48:56 +08:00
|
|
|
|
u.email = "nope@mailinator.com"
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(u).not_to be_valid
|
2013-02-21 05:24:52 +08:00
|
|
|
|
end
|
2016-07-04 22:05:01 +08:00
|
|
|
|
|
|
|
|
|
it "doesn't validate email address for staged users" do
|
2020-07-27 08:23:54 +08:00
|
|
|
|
SiteSetting.allowed_email_domains = "foo.com"
|
|
|
|
|
SiteSetting.blocked_email_domains = "bar.com"
|
2017-08-09 10:56:08 +08:00
|
|
|
|
|
|
|
|
|
user = Fabricate.build(:user, staged: true, email: "foo@bar.com")
|
|
|
|
|
|
|
|
|
|
expect(user.save).to eq(true)
|
2016-07-04 22:05:01 +08:00
|
|
|
|
end
|
2013-02-14 01:28:23 +08:00
|
|
|
|
end
|
|
|
|
|
|
2013-02-06 10:44:49 +08:00
|
|
|
|
describe "passwords" do
|
2015-06-06 01:09:02 +08:00
|
|
|
|
it "should not have an active account with a good password" do
|
2013-07-12 06:47:06 +08:00
|
|
|
|
@user = Fabricate.build(:user, active: false)
|
2013-02-06 10:44:49 +08:00
|
|
|
|
@user.password = "ilovepasta"
|
2013-02-06 03:16:51 +08:00
|
|
|
|
@user.save!
|
|
|
|
|
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(@user.active).to eq(false)
|
2015-06-06 01:09:02 +08:00
|
|
|
|
expect(@user.confirm_password?("ilovepasta")).to eq(true)
|
|
|
|
|
|
2021-11-25 15:34:39 +08:00
|
|
|
|
email_token = Fabricate(:email_token, user: @user, email: "pasta@delicious.com")
|
2015-06-06 01:50:06 +08:00
|
|
|
|
|
2017-02-01 06:21:37 +08:00
|
|
|
|
UserAuthToken.generate!(user_id: @user.id)
|
|
|
|
|
|
2017-12-01 12:19:24 +08:00
|
|
|
|
@user.password = "passwordT0"
|
2015-06-06 01:09:02 +08:00
|
|
|
|
@user.save!
|
|
|
|
|
|
|
|
|
|
# must expire old token on password change
|
2017-02-01 06:21:37 +08:00
|
|
|
|
expect(@user.user_auth_tokens.count).to eq(0)
|
2015-06-06 01:50:06 +08:00
|
|
|
|
|
|
|
|
|
email_token.reload
|
|
|
|
|
expect(email_token.expired).to eq(true)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "previous_visit_at" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2013-06-28 13:38:47 +08:00
|
|
|
|
let!(:first_visit_date) { Time.zone.now }
|
|
|
|
|
let!(:second_visit_date) { 2.hours.from_now }
|
|
|
|
|
let!(:third_visit_date) { 5.hours.from_now }
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
|
|
|
|
before do
|
2017-07-07 14:09:14 +08:00
|
|
|
|
SiteSetting.active_user_rate_limit_secs = 0
|
|
|
|
|
SiteSetting.previous_visit_timeout_hours = 1
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
2020-05-18 07:13:37 +08:00
|
|
|
|
after { reset_last_seen_cache!(user) }
|
2020-05-15 07:24:07 +08:00
|
|
|
|
|
2013-06-28 13:38:47 +08:00
|
|
|
|
it "should act correctly" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.previous_visit_at).to eq(nil)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
2013-06-28 13:38:47 +08:00
|
|
|
|
# first visit
|
|
|
|
|
user.update_last_seen!(first_visit_date)
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.previous_visit_at).to eq(nil)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
2013-06-28 14:07:36 +08:00
|
|
|
|
# updated same time
|
|
|
|
|
user.update_last_seen!(first_visit_date)
|
|
|
|
|
user.reload
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.previous_visit_at).to eq(nil)
|
2013-06-28 14:07:36 +08:00
|
|
|
|
|
2013-06-28 13:38:47 +08:00
|
|
|
|
# second visit
|
|
|
|
|
user.update_last_seen!(second_visit_date)
|
|
|
|
|
user.reload
|
2020-03-11 05:13:17 +08:00
|
|
|
|
expect(user.previous_visit_at).to eq_time(first_visit_date)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
2013-06-28 13:38:47 +08:00
|
|
|
|
# third visit
|
|
|
|
|
user.update_last_seen!(third_visit_date)
|
|
|
|
|
user.reload
|
2020-03-11 05:13:17 +08:00
|
|
|
|
expect(user.previous_visit_at).to eq_time(second_visit_date)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2016-05-21 21:17:54 +08:00
|
|
|
|
describe "update_last_seen!" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2016-05-21 21:17:54 +08:00
|
|
|
|
let!(:first_visit_date) { Time.zone.now }
|
|
|
|
|
let!(:second_visit_date) { 2.hours.from_now }
|
|
|
|
|
|
2020-05-18 07:13:37 +08:00
|
|
|
|
after { reset_last_seen_cache!(user) }
|
2020-05-15 07:24:07 +08:00
|
|
|
|
|
2016-05-21 21:17:54 +08:00
|
|
|
|
it "should update the last seen value" do
|
|
|
|
|
expect(user.last_seen_at).to eq nil
|
|
|
|
|
user.update_last_seen!(first_visit_date)
|
2020-03-11 05:13:17 +08:00
|
|
|
|
expect(user.reload.last_seen_at).to eq_time(first_visit_date)
|
2016-05-21 21:17:54 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should update the first seen value if it doesn't exist" do
|
|
|
|
|
user.update_last_seen!(first_visit_date)
|
2020-03-11 05:13:17 +08:00
|
|
|
|
expect(user.reload.first_seen_at).to eq_time(first_visit_date)
|
2016-05-21 21:17:54 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should not update the first seen value if it doesn't exist" do
|
|
|
|
|
user.update_last_seen!(first_visit_date)
|
|
|
|
|
user.update_last_seen!(second_visit_date)
|
2020-03-11 05:13:17 +08:00
|
|
|
|
expect(user.reload.first_seen_at).to eq_time(first_visit_date)
|
2016-05-21 21:17:54 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2019-11-25 08:49:27 +08:00
|
|
|
|
describe "update_timezone_if_missing" do
|
|
|
|
|
let(:timezone) { nil }
|
|
|
|
|
|
|
|
|
|
it "does nothing if timezone is nil" do
|
|
|
|
|
user.update_timezone_if_missing(timezone)
|
|
|
|
|
expect(user.reload.user_option.timezone).to eq(nil)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "if timezone is provided" do
|
|
|
|
|
context "if the timezone is valid" do
|
|
|
|
|
let(:timezone) { "Australia/Melbourne" }
|
|
|
|
|
context "if no timezone exists on user option" do
|
|
|
|
|
it "sets the timezone for the user" do
|
|
|
|
|
user.update_timezone_if_missing(timezone)
|
|
|
|
|
expect(user.reload.user_option.timezone).to eq(timezone)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "if the timezone is not valid" do
|
|
|
|
|
let(:timezone) { "Jupiter" }
|
|
|
|
|
context "if no timezone exists on user option" do
|
|
|
|
|
it "does not set the timezone for the user" do
|
|
|
|
|
user.update_timezone_if_missing(timezone)
|
|
|
|
|
expect(user.reload.user_option.timezone).to eq(nil)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "if a timezone already exists on user option" do
|
|
|
|
|
before { user.user_option.update_attribute(:timezone, "America/Denver") }
|
|
|
|
|
|
|
|
|
|
it "does not update the timezone" do
|
|
|
|
|
user.update_timezone_if_missing(timezone)
|
|
|
|
|
expect(user.reload.user_option.timezone).to eq("America/Denver")
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2013-02-06 10:44:49 +08:00
|
|
|
|
describe "last_seen_at" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2013-02-06 10:44:49 +08:00
|
|
|
|
|
|
|
|
|
it "should have a blank last seen on creation" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.last_seen_at).to eq(nil)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should have 0 for days_visited" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.user_stat.days_visited).to eq(0)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "with no previous values" do
|
2017-08-31 12:06:56 +08:00
|
|
|
|
after do
|
2020-05-18 07:13:37 +08:00
|
|
|
|
reset_last_seen_cache!(user)
|
2020-05-15 07:24:07 +08:00
|
|
|
|
unfreeze_time
|
2020-05-18 07:13:37 +08:00
|
|
|
|
reset_last_seen_cache!(user)
|
2017-08-31 12:06:56 +08:00
|
|
|
|
end
|
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
|
it "updates last_seen_at" do
|
2020-03-11 05:13:17 +08:00
|
|
|
|
date = freeze_time
|
|
|
|
|
user.update_last_seen!
|
|
|
|
|
|
|
|
|
|
expect(user.last_seen_at).to eq_time(date)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should have 0 for days_visited" do
|
2020-03-11 05:13:17 +08:00
|
|
|
|
user.update_last_seen!
|
2013-02-06 03:16:51 +08:00
|
|
|
|
user.reload
|
2020-03-11 05:13:17 +08:00
|
|
|
|
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.user_stat.days_visited).to eq(1)
|
2013-02-06 10:44:49 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
|
|
|
|
it "should log a user_visit with the date" do
|
2020-03-11 05:13:17 +08:00
|
|
|
|
date = freeze_time
|
|
|
|
|
user.update_last_seen!
|
|
|
|
|
|
|
|
|
|
expect(user.user_visits.first.visited_at).to eq_time(date.to_date)
|
2013-02-06 10:44:49 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
|
context "when called twice" do
|
2020-03-11 05:13:17 +08:00
|
|
|
|
it "doesn't increase days_visited twice" do
|
|
|
|
|
freeze_time
|
2013-02-06 03:16:51 +08:00
|
|
|
|
user.update_last_seen!
|
|
|
|
|
user.update_last_seen!
|
|
|
|
|
user.reload
|
|
|
|
|
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.user_stat.days_visited).to eq(1)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "after 3 days" do
|
2020-03-11 05:13:17 +08:00
|
|
|
|
it "should log a second visited_at record when we log an update later" do
|
|
|
|
|
user.update_last_seen!
|
2023-06-01 08:00:01 +08:00
|
|
|
|
freeze_time(3.days.from_now)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
user.update_last_seen!
|
|
|
|
|
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.user_visits.count).to eq(2)
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2013-02-12 00:18:26 +08:00
|
|
|
|
describe "email_confirmed?" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2013-02-12 00:18:26 +08:00
|
|
|
|
|
|
|
|
|
context "when email has not been confirmed yet" do
|
|
|
|
|
it "should return false" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.email_confirmed?).to eq(false)
|
2013-02-12 00:18:26 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when email has been confirmed" do
|
|
|
|
|
it "should return true" do
|
2021-11-25 15:34:39 +08:00
|
|
|
|
token = Fabricate(:email_token, user: user)
|
2013-02-12 00:18:26 +08:00
|
|
|
|
EmailToken.confirm(token.token)
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.email_confirmed?).to eq(true)
|
2013-02-12 00:18:26 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when user has no email tokens for some reason" do
|
|
|
|
|
it "should return false" do
|
|
|
|
|
user.email_tokens.each { |t| t.destroy }
|
|
|
|
|
user.reload
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.email_confirmed?).to eq(true)
|
2013-02-12 00:18:26 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2013-05-11 04:58:23 +08:00
|
|
|
|
describe "flag_linked_posts_as_spam" do
|
2023-12-13 11:50:13 +08:00
|
|
|
|
fab!(:user) { Fabricate(:user, refresh_auto_groups: true) }
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:admin)
|
2021-12-16 01:41:14 +08:00
|
|
|
|
fab!(:post) do
|
|
|
|
|
PostCreator.new(
|
|
|
|
|
user,
|
|
|
|
|
title: "this topic contains spam",
|
|
|
|
|
raw: "this post has a link: http://discourse.org",
|
|
|
|
|
).create
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2021-12-16 01:41:14 +08:00
|
|
|
|
fab!(:another_post) do
|
|
|
|
|
PostCreator.new(
|
|
|
|
|
user,
|
|
|
|
|
title: "this topic also contains spam",
|
|
|
|
|
raw: "this post has a link: http://discourse.org/asdfa",
|
|
|
|
|
).create
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2021-12-16 01:41:14 +08:00
|
|
|
|
fab!(:post_without_link) do
|
|
|
|
|
PostCreator.new(
|
|
|
|
|
user,
|
|
|
|
|
title: "this topic shouldn't be spam",
|
|
|
|
|
raw: "this post has no links in it.",
|
|
|
|
|
).create
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2013-05-11 04:58:23 +08:00
|
|
|
|
|
|
|
|
|
it "has flagged all the user's posts as spam" do
|
|
|
|
|
user.flag_linked_posts_as_spam
|
|
|
|
|
|
|
|
|
|
post.reload
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(post.spam_count).to eq(1)
|
2013-05-11 04:58:23 +08:00
|
|
|
|
|
|
|
|
|
another_post.reload
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(another_post.spam_count).to eq(1)
|
2013-05-11 04:58:23 +08:00
|
|
|
|
|
|
|
|
|
post_without_link.reload
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(post_without_link.spam_count).to eq(0)
|
2013-05-11 04:58:23 +08:00
|
|
|
|
|
|
|
|
|
# It doesn't raise an exception if called again
|
|
|
|
|
user.flag_linked_posts_as_spam
|
2015-10-17 03:16:44 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "does not flags post as spam if the previous flag for that post was disagreed" do
|
2019-01-04 01:03:01 +08:00
|
|
|
|
results = user.flag_linked_posts_as_spam
|
2013-05-11 04:58:23 +08:00
|
|
|
|
|
2019-01-04 01:03:01 +08:00
|
|
|
|
expect(post.reload.spam_count).to eq(1)
|
|
|
|
|
|
|
|
|
|
results.each { |result| result.reviewable.perform(admin, :disagree) }
|
2015-10-17 03:16:44 +08:00
|
|
|
|
|
|
|
|
|
user.flag_linked_posts_as_spam
|
|
|
|
|
|
2019-01-04 01:03:01 +08:00
|
|
|
|
expect(post.reload.spam_count).to eq(0)
|
2013-05-11 04:58:23 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2013-02-25 15:42:42 +08:00
|
|
|
|
|
2013-02-22 02:20:00 +08:00
|
|
|
|
describe "#readable_name" do
|
|
|
|
|
context "when name is missing" do
|
|
|
|
|
it "returns just the username" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(Fabricate(:user, username: "foo", name: nil).readable_name).to eq("foo")
|
2013-02-22 02:20:00 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
context "when name and username are identical" do
|
|
|
|
|
it "returns just the username" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(Fabricate(:user, username: "foo", name: "foo").readable_name).to eq("foo")
|
2013-02-22 02:20:00 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
context "when name and username are not identical" do
|
|
|
|
|
it "returns the name and username" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(Fabricate(:user, username: "foo", name: "Bar Baz").readable_name).to eq(
|
|
|
|
|
"Bar Baz (foo)",
|
|
|
|
|
)
|
2013-02-22 02:20:00 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2013-08-17 02:40:30 +08:00
|
|
|
|
describe ".find_by_username_or_email" do
|
2013-10-28 13:29:07 +08:00
|
|
|
|
it "finds users" do
|
|
|
|
|
bob = Fabricate(:user, username: "bob", email: "bob@example.com")
|
|
|
|
|
found_user = User.find_by_username_or_email("Bob")
|
2013-08-17 02:40:30 +08:00
|
|
|
|
expect(found_user).to eq bob
|
|
|
|
|
|
2013-10-28 13:29:07 +08:00
|
|
|
|
found_user = User.find_by_username_or_email("bob@Example.com")
|
2013-08-17 02:40:30 +08:00
|
|
|
|
expect(found_user).to eq bob
|
|
|
|
|
|
2013-10-28 13:29:07 +08:00
|
|
|
|
found_user = User.find_by_username_or_email("Bob@Example.com")
|
2014-07-14 22:16:24 +08:00
|
|
|
|
expect(found_user).to eq bob
|
2013-08-17 02:40:30 +08:00
|
|
|
|
|
2013-10-28 13:29:07 +08:00
|
|
|
|
found_user = User.find_by_username_or_email("bob1")
|
2014-11-01 01:44:26 +08:00
|
|
|
|
expect(found_user).to be_nil
|
2013-06-19 08:31:19 +08:00
|
|
|
|
|
2013-10-28 13:29:07 +08:00
|
|
|
|
found_user = User.find_by_email("bob@Example.com")
|
|
|
|
|
expect(found_user).to eq bob
|
2014-07-14 22:16:24 +08:00
|
|
|
|
|
|
|
|
|
found_user = User.find_by_email("BOB@Example.com")
|
|
|
|
|
expect(found_user).to eq bob
|
2013-08-17 02:40:30 +08:00
|
|
|
|
|
2013-10-28 13:29:07 +08:00
|
|
|
|
found_user = User.find_by_email("bob")
|
2014-11-01 01:44:26 +08:00
|
|
|
|
expect(found_user).to be_nil
|
2013-08-17 02:40:30 +08:00
|
|
|
|
|
2013-10-28 13:29:07 +08:00
|
|
|
|
found_user = User.find_by_username("bOb")
|
|
|
|
|
expect(found_user).to eq bob
|
2013-08-17 02:40:30 +08:00
|
|
|
|
end
|
|
|
|
|
|
2019-04-23 18:22:47 +08:00
|
|
|
|
it "finds users with Unicode username" do
|
|
|
|
|
SiteSetting.unicode_usernames = true
|
|
|
|
|
user = Fabricate(:user, username: "löwe")
|
|
|
|
|
|
|
|
|
|
expect(User.find_by_username("LÖWE")).to eq(user) # NFC
|
|
|
|
|
expect(User.find_by_username("LO\u0308WE")).to eq(user) # NFD
|
|
|
|
|
expect(User.find_by_username("lo\u0308we")).to eq(user) # NFD
|
|
|
|
|
end
|
2013-06-19 08:31:19 +08:00
|
|
|
|
end
|
2013-10-16 17:28:18 +08:00
|
|
|
|
|
2016-06-21 04:38:15 +08:00
|
|
|
|
describe "#new_user_posting_on_first_day?" do
|
2015-03-26 13:48:36 +08:00
|
|
|
|
def test_user?(opts = {})
|
2016-06-21 04:38:15 +08:00
|
|
|
|
Fabricate.build(
|
|
|
|
|
:user,
|
|
|
|
|
{ created_at: Time.zone.now }.merge(opts),
|
|
|
|
|
).new_user_posting_on_first_day?
|
2013-10-16 17:28:18 +08:00
|
|
|
|
end
|
|
|
|
|
|
2016-06-21 04:38:15 +08:00
|
|
|
|
it "handles when user has never posted" do
|
2015-03-26 13:48:36 +08:00
|
|
|
|
expect(test_user?).to eq(true)
|
|
|
|
|
expect(test_user?(moderator: true)).to eq(false)
|
|
|
|
|
expect(test_user?(trust_level: TrustLevel[2])).to eq(false)
|
2016-06-21 04:38:15 +08:00
|
|
|
|
expect(test_user?(created_at: 2.days.ago)).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is true for a user who posted less than 24 hours ago but was created over 1 day ago" do
|
|
|
|
|
u = Fabricate(:user, created_at: 28.hours.ago)
|
|
|
|
|
u.user_stat.first_post_created_at = 1.hour.ago
|
|
|
|
|
expect(u.new_user_posting_on_first_day?).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is false if first post was more than 24 hours ago" do
|
|
|
|
|
u = Fabricate(:user, created_at: 28.hours.ago)
|
|
|
|
|
u.user_stat.first_post_created_at = 25.hours.ago
|
|
|
|
|
expect(u.new_user_posting_on_first_day?).to eq(false)
|
2013-10-16 17:28:18 +08:00
|
|
|
|
end
|
2018-06-21 08:25:03 +08:00
|
|
|
|
|
|
|
|
|
it "considers trust level 0 users as new users unconditionally" do
|
|
|
|
|
u = Fabricate(:user, created_at: 28.hours.ago, trust_level: TrustLevel[0])
|
|
|
|
|
u.user_stat.first_post_created_at = 25.hours.ago
|
|
|
|
|
expect(u.new_user_posting_on_first_day?).to eq(true)
|
|
|
|
|
end
|
2013-10-19 17:48:11 +08:00
|
|
|
|
end
|
|
|
|
|
|
2014-01-03 01:57:40 +08:00
|
|
|
|
describe "posted too much in topic" do
|
2014-09-05 13:20:39 +08:00
|
|
|
|
let!(:user) { Fabricate(:user, trust_level: TrustLevel[0]) }
|
2014-01-03 01:57:40 +08:00
|
|
|
|
let!(:topic) { Fabricate(:post).topic }
|
|
|
|
|
|
|
|
|
|
before do
|
|
|
|
|
# To make testing easier, say 1 reply is too much
|
2017-07-07 14:09:14 +08:00
|
|
|
|
SiteSetting.newuser_max_replies_per_topic = 1
|
2019-01-04 01:03:01 +08:00
|
|
|
|
UserActionManager.enable
|
2014-01-03 01:57:40 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "for a user who didn't create the topic" do
|
|
|
|
|
let!(:post) { Fabricate(:post, topic: topic, user: user) }
|
|
|
|
|
|
|
|
|
|
it "does not return true for staff" do
|
|
|
|
|
user.stubs(:staff?).returns(true)
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.posted_too_much_in_topic?(topic.id)).to eq(false)
|
2014-01-03 01:57:40 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns true when the user has posted too much" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.posted_too_much_in_topic?(topic.id)).to eq(true)
|
2014-01-03 01:57:40 +08:00
|
|
|
|
end
|
2014-04-30 00:59:14 +08:00
|
|
|
|
|
|
|
|
|
context "with a reply" do
|
|
|
|
|
before do
|
2019-03-14 22:47:38 +08:00
|
|
|
|
Jobs.run_immediately!
|
2016-12-22 12:03:40 +08:00
|
|
|
|
PostCreator.new(
|
|
|
|
|
Fabricate(:user),
|
2019-04-23 18:22:47 +08:00
|
|
|
|
raw: "whatever this is a raw post",
|
|
|
|
|
topic_id: topic.id,
|
|
|
|
|
reply_to_post_number: post.post_number,
|
|
|
|
|
).create
|
2014-04-30 00:59:14 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "resets the `posted_too_much` threshold" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.posted_too_much_in_topic?(topic.id)).to eq(false)
|
2014-04-30 00:59:14 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2014-01-03 01:57:40 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns false for a user who created the topic" do
|
|
|
|
|
topic_user = topic.user
|
2014-09-05 13:20:39 +08:00
|
|
|
|
topic_user.trust_level = TrustLevel[0]
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(topic.user.posted_too_much_in_topic?(topic.id)).to eq(false)
|
2014-01-03 01:57:40 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2013-11-15 23:27:43 +08:00
|
|
|
|
describe "#find_email" do
|
2019-05-07 11:12:20 +08:00
|
|
|
|
fab!(:user) { Fabricate(:user, email: "bob@example.com") }
|
2013-11-15 23:27:43 +08:00
|
|
|
|
|
|
|
|
|
context "when email is exists in the email logs" do
|
|
|
|
|
before { user.stubs(:last_sent_email_address).returns("bob@lastemail.com") }
|
|
|
|
|
|
|
|
|
|
it "returns email from the logs" do
|
|
|
|
|
expect(user.find_email).to eq("bob@lastemail.com")
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when email does not exist in the email logs" do
|
|
|
|
|
before { user.stubs(:last_sent_email_address).returns(nil) }
|
|
|
|
|
|
|
|
|
|
it "fetches the user's email" do
|
|
|
|
|
expect(user.find_email).to eq(user.email)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2013-11-23 02:18:45 +08:00
|
|
|
|
describe "#gravatar_template" do
|
|
|
|
|
it "returns a gravatar based template" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(User.gravatar_template("em@il.com")).to eq(
|
|
|
|
|
"//www.gravatar.com/avatar/6dc2fde946483a1d8a84b89345a1b638.png?s={size}&r=pg&d=identicon",
|
|
|
|
|
)
|
2013-11-23 02:18:45 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2020-03-12 23:23:55 +08:00
|
|
|
|
describe "#custom_gravatar" do
|
|
|
|
|
before { SiteSetting.gravatar_base_url = "seccdn.libravatar.org" }
|
|
|
|
|
|
|
|
|
|
it "returns a gravatar url as set in the settings" do
|
|
|
|
|
expect(User.gravatar_template("em@il.com")).to eq(
|
|
|
|
|
"//seccdn.libravatar.org/avatar/6dc2fde946483a1d8a84b89345a1b638.png?s={size}&r=pg&d=identicon",
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2019-03-18 23:24:21 +08:00
|
|
|
|
describe "#letter_avatar_color" do
|
|
|
|
|
before { SiteSetting.restrict_letter_avatar_colors = "2F70AC|ED207B|AAAAAA|77FF33" }
|
|
|
|
|
|
|
|
|
|
it "returns custom color if restrict_letter_avatar_colors site setting is set" do
|
|
|
|
|
expect(User.letter_avatar_color("username_one")).to eq("2F70AC")
|
|
|
|
|
expect(User.letter_avatar_color("username_two")).to eq("ED207B")
|
|
|
|
|
expect(User.letter_avatar_color("username_three")).to eq("AAAAAA")
|
|
|
|
|
expect(User.letter_avatar_color("username_four")).to eq("77FF33")
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2013-11-23 02:18:45 +08:00
|
|
|
|
describe ".small_avatar_url" do
|
2014-05-22 15:37:02 +08:00
|
|
|
|
let(:user) { build(:user, username: "Sam") }
|
2013-11-23 02:18:45 +08:00
|
|
|
|
|
|
|
|
|
it "returns a 45-pixel-wide avatar" do
|
2015-09-15 11:25:15 +08:00
|
|
|
|
SiteSetting.external_system_avatars_enabled = false
|
2015-04-20 11:07:12 +08:00
|
|
|
|
expect(user.small_avatar_url).to eq(
|
|
|
|
|
"//test.localhost/letter_avatar/sam/45/#{LetterAvatar.version}.png",
|
|
|
|
|
)
|
2015-09-15 11:25:15 +08:00
|
|
|
|
|
|
|
|
|
SiteSetting.external_system_avatars_enabled = true
|
2019-04-23 18:22:47 +08:00
|
|
|
|
expect(user.small_avatar_url).to eq(
|
|
|
|
|
"//test.localhost/letter_avatar_proxy/v4/letter/s/5f9b8f/45.png",
|
|
|
|
|
)
|
2013-11-23 02:18:45 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2014-05-22 15:37:02 +08:00
|
|
|
|
describe ".avatar_template_url" do
|
|
|
|
|
let(:user) { build(:user, uploaded_avatar_id: 99, username: "Sam") }
|
2013-11-23 02:18:45 +08:00
|
|
|
|
|
2014-05-22 15:37:02 +08:00
|
|
|
|
it "returns a schemaless avatar template with correct id" do
|
2015-05-30 00:51:17 +08:00
|
|
|
|
expect(user.avatar_template_url).to eq(
|
|
|
|
|
"//test.localhost/user_avatar/test.localhost/sam/{size}/99_#{OptimizedImage::VERSION}.png",
|
|
|
|
|
)
|
2013-11-23 02:18:45 +08:00
|
|
|
|
end
|
|
|
|
|
|
2014-01-08 00:45:06 +08:00
|
|
|
|
it "returns a schemaless cdn-based avatar template" do
|
|
|
|
|
Rails.configuration.action_controller.stubs(:asset_host).returns("http://my.cdn.com")
|
2015-05-30 00:51:17 +08:00
|
|
|
|
expect(user.avatar_template_url).to eq(
|
|
|
|
|
"//my.cdn.com/user_avatar/test.localhost/sam/{size}/99_#{OptimizedImage::VERSION}.png",
|
|
|
|
|
)
|
2013-11-23 02:18:45 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2021-01-08 21:40:00 +08:00
|
|
|
|
describe "#avatar_template" do
|
|
|
|
|
it "uses the small logo if the user is the system user" do
|
2021-02-01 09:35:41 +08:00
|
|
|
|
logo_small_url = Discourse.store.cdn_url(SiteSetting.logo_small.url)
|
2021-01-08 21:40:00 +08:00
|
|
|
|
|
|
|
|
|
expect(Discourse.system_user.avatar_template).to eq(logo_small_url)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "uses the system user avatar if the logo is nil" do
|
|
|
|
|
SiteSetting.logo_small = nil
|
|
|
|
|
system_user = Discourse.system_user
|
|
|
|
|
expected = User.avatar_template(system_user.username, system_user.uploaded_avatar_id)
|
|
|
|
|
|
|
|
|
|
expect(Discourse.system_user.avatar_template).to eq(expected)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "uses the regular avatar for other users" do
|
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
expected = User.avatar_template(user.username, user.uploaded_avatar_id)
|
|
|
|
|
|
|
|
|
|
expect(user.avatar_template).to eq(expected)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2014-01-25 04:19:20 +08:00
|
|
|
|
describe "update_posts_read!" do
|
|
|
|
|
context "with a UserVisit record" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2019-04-23 18:22:47 +08:00
|
|
|
|
let!(:now) { Time.zone.now }
|
2014-01-25 04:19:20 +08:00
|
|
|
|
before { user.update_last_seen!(now) }
|
2020-05-18 07:13:37 +08:00
|
|
|
|
after { reset_last_seen_cache!(user) }
|
2014-01-25 04:19:20 +08:00
|
|
|
|
|
|
|
|
|
it "with existing UserVisit record, increments the posts_read value" do
|
|
|
|
|
expect {
|
|
|
|
|
user_visit = user.update_posts_read!(2)
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user_visit.posts_read).to eq(2)
|
2014-01-25 04:19:20 +08:00
|
|
|
|
}.to_not change { UserVisit.count }
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "with no existing UserVisit record, creates a new UserVisit record and increments the posts_read count" do
|
|
|
|
|
expect {
|
2015-07-08 00:31:07 +08:00
|
|
|
|
user_visit = user.update_posts_read!(3, at: 5.days.ago)
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user_visit.posts_read).to eq(3)
|
2014-01-25 04:19:20 +08:00
|
|
|
|
}.to change { UserVisit.count }.by(1)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2014-02-11 05:59:36 +08:00
|
|
|
|
describe "primary_group_id" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2014-02-11 05:59:36 +08:00
|
|
|
|
|
|
|
|
|
it "has no primary_group_id by default" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.primary_group_id).to eq(nil)
|
2014-02-11 05:59:36 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when the user has a group" do
|
|
|
|
|
before do
|
|
|
|
|
group.usernames = user.username
|
|
|
|
|
group.save
|
|
|
|
|
user.primary_group_id = group.id
|
|
|
|
|
user.save
|
|
|
|
|
user.reload
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should allow us to use it as a primary group" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.primary_group_id).to eq(group.id)
|
2014-02-11 05:59:36 +08:00
|
|
|
|
|
|
|
|
|
# If we remove the user from the group
|
|
|
|
|
group.usernames = ""
|
|
|
|
|
group.save
|
|
|
|
|
|
|
|
|
|
# It should unset it from the primary_group_id
|
|
|
|
|
user.reload
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.primary_group_id).to eq(nil)
|
2014-02-11 05:59:36 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
2014-03-08 01:58:53 +08:00
|
|
|
|
|
2014-05-26 17:46:43 +08:00
|
|
|
|
describe "automatic avatar creation" do
|
|
|
|
|
it "sets a system avatar for new users" do
|
2015-09-15 11:25:15 +08:00
|
|
|
|
SiteSetting.external_system_avatars_enabled = false
|
|
|
|
|
|
2014-05-26 17:46:43 +08:00
|
|
|
|
u = User.create!(username: "bob", email: "bob@bob.com")
|
|
|
|
|
u.reload
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(u.uploaded_avatar_id).to eq(nil)
|
2015-04-20 11:07:12 +08:00
|
|
|
|
expect(u.avatar_template).to eq("/letter_avatar/bob/{size}/#{LetterAvatar.version}.png")
|
2014-05-26 17:46:43 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2014-04-22 11:52:13 +08:00
|
|
|
|
describe "custom fields" do
|
|
|
|
|
it "allows modification of custom fields" do
|
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.custom_fields["a"]).to eq(nil)
|
2014-04-22 11:52:13 +08:00
|
|
|
|
|
|
|
|
|
user.custom_fields["bob"] = "marley"
|
|
|
|
|
user.custom_fields["jack"] = "black"
|
|
|
|
|
user.save
|
|
|
|
|
|
|
|
|
|
user = User.find(user.id)
|
|
|
|
|
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.custom_fields["bob"]).to eq("marley")
|
|
|
|
|
expect(user.custom_fields["jack"]).to eq("black")
|
2014-04-22 11:52:13 +08:00
|
|
|
|
|
|
|
|
|
user.custom_fields.delete("bob")
|
|
|
|
|
user.custom_fields["jack"] = "jill"
|
|
|
|
|
|
|
|
|
|
user.save
|
|
|
|
|
user = User.find(user.id)
|
|
|
|
|
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(user.custom_fields).to eq("jack" => "jill")
|
2014-04-22 11:52:13 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2014-05-28 14:54:21 +08:00
|
|
|
|
describe "refresh_avatar" do
|
2014-12-16 05:10:27 +08:00
|
|
|
|
it "enqueues the update_gravatar job when automatically downloading gravatars" do
|
2014-05-28 14:54:21 +08:00
|
|
|
|
SiteSetting.automatically_download_gravatars = true
|
|
|
|
|
|
2014-12-16 05:10:27 +08:00
|
|
|
|
user = Fabricate(:user)
|
2014-05-28 14:54:21 +08:00
|
|
|
|
|
2020-07-24 17:16:52 +08:00
|
|
|
|
expect_enqueued_with(job: :update_gravatar, args: { user_id: user.id }) do
|
|
|
|
|
user.refresh_avatar
|
|
|
|
|
end
|
2014-05-28 14:54:21 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2014-12-03 13:36:25 +08:00
|
|
|
|
describe "#purge_unactivated" do
|
2024-01-25 14:28:26 +08:00
|
|
|
|
fab!(:user) { Fabricate(:user, refresh_auto_groups: true) }
|
2021-12-16 01:41:14 +08:00
|
|
|
|
fab!(:unactivated) { Fabricate(:user, active: false) }
|
|
|
|
|
fab!(:unactivated_old) { Fabricate(:user, active: false, created_at: 1.month.ago) }
|
|
|
|
|
fab!(:unactivated_old_with_system_pm) do
|
|
|
|
|
Fabricate(:user, active: false, created_at: 2.months.ago)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2021-12-16 01:41:14 +08:00
|
|
|
|
fab!(:unactivated_old_with_human_pm) do
|
|
|
|
|
Fabricate(:user, active: false, created_at: 2.months.ago)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2024-01-25 14:28:26 +08:00
|
|
|
|
fab!(:unactivated_old_with_post) do
|
|
|
|
|
Fabricate(:user, active: false, created_at: 1.month.ago, refresh_auto_groups: true)
|
|
|
|
|
end
|
2018-05-17 00:24:11 +08:00
|
|
|
|
|
|
|
|
|
before do
|
|
|
|
|
PostCreator.new(
|
|
|
|
|
Discourse.system_user,
|
2019-04-23 18:22:47 +08:00
|
|
|
|
title: "Welcome to our Discourse",
|
|
|
|
|
raw: "This is a welcome message",
|
|
|
|
|
archetype: Archetype.private_message,
|
|
|
|
|
target_usernames: [unactivated_old_with_system_pm.username],
|
2018-06-29 11:33:54 +08:00
|
|
|
|
).create
|
|
|
|
|
|
|
|
|
|
PostCreator.new(
|
|
|
|
|
user,
|
2019-04-23 18:22:47 +08:00
|
|
|
|
title: "Welcome to our Discourse",
|
|
|
|
|
raw: "This is a welcome message",
|
|
|
|
|
archetype: Archetype.private_message,
|
|
|
|
|
target_usernames: [unactivated_old_with_human_pm.username],
|
2018-05-17 00:24:11 +08:00
|
|
|
|
).create
|
2021-03-01 13:46:28 +08:00
|
|
|
|
|
|
|
|
|
PostCreator.new(
|
|
|
|
|
unactivated_old_with_post,
|
|
|
|
|
title: "Test topic from a user",
|
|
|
|
|
raw: "This is a sample message",
|
|
|
|
|
).create
|
2018-05-17 00:24:11 +08:00
|
|
|
|
end
|
2014-08-14 02:13:41 +08:00
|
|
|
|
|
2014-12-03 13:36:25 +08:00
|
|
|
|
it "should only remove old, unactivated users" do
|
|
|
|
|
User.purge_unactivated
|
2021-03-01 13:46:28 +08:00
|
|
|
|
expect(User.real.all).to match_array(
|
|
|
|
|
[user, unactivated, unactivated_old_with_human_pm, unactivated_old_with_post],
|
|
|
|
|
)
|
2014-08-14 02:13:41 +08:00
|
|
|
|
end
|
2017-08-26 03:20:06 +08:00
|
|
|
|
|
|
|
|
|
it "does nothing if purge_unactivated_users_grace_period_days is 0" do
|
|
|
|
|
SiteSetting.purge_unactivated_users_grace_period_days = 0
|
|
|
|
|
User.purge_unactivated
|
2021-03-01 13:46:28 +08:00
|
|
|
|
expect(User.real.all).to match_array(
|
|
|
|
|
[
|
|
|
|
|
user,
|
|
|
|
|
unactivated,
|
|
|
|
|
unactivated_old,
|
|
|
|
|
unactivated_old_with_system_pm,
|
|
|
|
|
unactivated_old_with_human_pm,
|
|
|
|
|
unactivated_old_with_post,
|
|
|
|
|
],
|
|
|
|
|
)
|
2017-08-26 03:20:06 +08:00
|
|
|
|
end
|
2014-08-14 02:13:41 +08:00
|
|
|
|
end
|
|
|
|
|
|
2014-09-12 03:22:11 +08:00
|
|
|
|
describe "hash_passwords" do
|
|
|
|
|
let(:too_long) { "x" * (User.max_password_length + 1) }
|
|
|
|
|
|
2023-04-11 17:16:28 +08:00
|
|
|
|
def hash(password, salt, algorithm = User::TARGET_PASSWORD_ALGORITHM)
|
|
|
|
|
User.new.send(:hash_password, password, salt, algorithm)
|
2014-09-12 03:22:11 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns the same hash for the same password and salt" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(hash("poutine", "gravy")).to eq(hash("poutine", "gravy"))
|
2014-09-12 03:22:11 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns a different hash for the same salt and different password" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(hash("poutine", "gravy")).not_to eq(hash("fries", "gravy"))
|
2014-09-12 03:22:11 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns a different hash for the same password and different salt" do
|
2014-12-31 22:55:03 +08:00
|
|
|
|
expect(hash("poutine", "gravy")).not_to eq(hash("poutine", "cheese"))
|
2014-09-12 03:22:11 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "raises an error when passwords are too long" do
|
2016-05-30 11:38:04 +08:00
|
|
|
|
expect { hash(too_long, "gravy") }.to raise_error(StandardError)
|
2014-09-12 03:22:11 +08:00
|
|
|
|
end
|
2023-04-11 17:16:28 +08:00
|
|
|
|
|
|
|
|
|
it "uses the target algorithm for new users" do
|
|
|
|
|
expect(user.password_algorithm).to eq(User::TARGET_PASSWORD_ALGORITHM)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "can use an older algorithm to verify existing passwords, then upgrade" do
|
|
|
|
|
old_algorithm = "$pbkdf2-sha256$i=5,l=32$"
|
|
|
|
|
expect(old_algorithm).not_to eq(User::TARGET_PASSWORD_ALGORITHM)
|
|
|
|
|
|
|
|
|
|
password = "poutine"
|
|
|
|
|
old_hash = hash(password, user.salt, old_algorithm)
|
|
|
|
|
|
|
|
|
|
user.update!(password_algorithm: old_algorithm, password_hash: old_hash)
|
|
|
|
|
|
|
|
|
|
expect(user.password_algorithm).to eq(old_algorithm)
|
|
|
|
|
expect(user.password_hash).to eq(old_hash)
|
|
|
|
|
|
|
|
|
|
# With an incorrect attempt, should return false with no side effects
|
|
|
|
|
expect(user.confirm_password?("notthepassword")).to eq(false)
|
|
|
|
|
expect(user.password_algorithm).to eq(old_algorithm)
|
|
|
|
|
expect(user.password_hash).to eq(old_hash)
|
|
|
|
|
|
|
|
|
|
# Should correctly verify against old algorithm
|
|
|
|
|
expect(user.confirm_password?(password)).to eq(true)
|
|
|
|
|
|
|
|
|
|
# Auto-upgrades to new algorithm
|
|
|
|
|
expected_new_hash = hash(password, user.salt, User::TARGET_PASSWORD_ALGORITHM)
|
|
|
|
|
expect(user.password_algorithm).to eq(User::TARGET_PASSWORD_ALGORITHM)
|
|
|
|
|
expect(user.password_hash).to eq(expected_new_hash)
|
|
|
|
|
|
|
|
|
|
# And persists to the db
|
|
|
|
|
user.reload
|
|
|
|
|
expect(user.password_algorithm).to eq(User::TARGET_PASSWORD_ALGORITHM)
|
|
|
|
|
expect(user.password_hash).to eq(expected_new_hash)
|
|
|
|
|
|
|
|
|
|
# And can still log in
|
|
|
|
|
expect(user.confirm_password?(password)).to eq(true)
|
|
|
|
|
end
|
2014-09-12 03:22:11 +08:00
|
|
|
|
end
|
|
|
|
|
|
2015-01-24 01:25:43 +08:00
|
|
|
|
describe "automatic group membership" do
|
2021-12-16 01:41:14 +08:00
|
|
|
|
fab!(:group) do
|
2017-02-07 00:49:27 +08:00
|
|
|
|
Fabricate(
|
|
|
|
|
:group,
|
2019-04-23 18:22:47 +08:00
|
|
|
|
automatic_membership_email_domains: "bar.com|wat.com",
|
|
|
|
|
grant_trust_level: 1,
|
|
|
|
|
title: "bars and wats",
|
|
|
|
|
primary_group: true,
|
2017-02-07 00:49:27 +08:00
|
|
|
|
)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2017-02-07 00:49:27 +08:00
|
|
|
|
|
|
|
|
|
it "doesn't automatically add staged users" do
|
|
|
|
|
staged_user = Fabricate(:user, active: true, staged: true, email: "wat@wat.com")
|
2021-11-25 15:34:39 +08:00
|
|
|
|
EmailToken.confirm(Fabricate(:email_token, user: staged_user).token)
|
2017-02-07 00:49:27 +08:00
|
|
|
|
group.reload
|
|
|
|
|
expect(group.users.include?(staged_user)).to eq(false)
|
|
|
|
|
end
|
|
|
|
|
|
2015-01-24 01:25:43 +08:00
|
|
|
|
it "is automatically added to a group when the email matches" do
|
2017-02-07 00:49:27 +08:00
|
|
|
|
user = Fabricate(:user, active: true, email: "foo@bar.com")
|
2021-11-25 15:34:39 +08:00
|
|
|
|
EmailToken.confirm(Fabricate(:email_token, user: user).token)
|
2015-01-24 01:25:43 +08:00
|
|
|
|
group.reload
|
|
|
|
|
expect(group.users.include?(user)).to eq(true)
|
2016-12-11 23:36:15 +08:00
|
|
|
|
|
|
|
|
|
group_history = GroupHistory.last
|
|
|
|
|
|
|
|
|
|
expect(group_history.action).to eq(GroupHistory.actions[:add_user_to_group])
|
|
|
|
|
expect(group_history.acting_user).to eq(Discourse.system_user)
|
|
|
|
|
expect(group_history.target_user).to eq(user)
|
2015-01-24 01:25:43 +08:00
|
|
|
|
end
|
|
|
|
|
|
2018-05-15 07:48:30 +08:00
|
|
|
|
it "is automatically added to a group when the email matches the SSO record" do
|
|
|
|
|
user = Fabricate(:user, active: true, email: "sso@bar.com")
|
|
|
|
|
user.create_single_sign_on_record(
|
|
|
|
|
external_id: 123,
|
|
|
|
|
external_email: "sso@bar.com",
|
|
|
|
|
last_payload: "",
|
|
|
|
|
)
|
|
|
|
|
user.set_automatic_groups
|
|
|
|
|
group.reload
|
|
|
|
|
expect(group.users.include?(user)).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
|
2017-01-16 16:40:05 +08:00
|
|
|
|
it "get attributes from the group" do
|
|
|
|
|
user =
|
|
|
|
|
Fabricate.build(
|
|
|
|
|
:user,
|
2019-04-23 18:22:47 +08:00
|
|
|
|
active: true,
|
|
|
|
|
trust_level: 0,
|
|
|
|
|
email: "foo@bar.com",
|
|
|
|
|
password: "strongpassword4Uguys",
|
2017-01-16 16:40:05 +08:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
user.password_required!
|
|
|
|
|
user.save!
|
2021-11-25 15:34:39 +08:00
|
|
|
|
EmailToken.confirm(Fabricate(:email_token, user: user).token)
|
2017-01-16 16:40:05 +08:00
|
|
|
|
user.reload
|
|
|
|
|
|
|
|
|
|
expect(user.title).to eq("bars and wats")
|
|
|
|
|
expect(user.trust_level).to eq(1)
|
2017-11-24 04:55:44 +08:00
|
|
|
|
expect(user.manual_locked_trust_level).to be_nil
|
2018-08-25 06:41:03 +08:00
|
|
|
|
expect(user.group_granted_trust_level).to eq(1)
|
2017-01-16 16:40:05 +08:00
|
|
|
|
end
|
2015-01-24 01:25:43 +08:00
|
|
|
|
end
|
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
describe "staff info" do
|
2023-12-13 17:18:42 +08:00
|
|
|
|
fab!(:user) { Fabricate(:user, refresh_auto_groups: true) }
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:moderator)
|
2015-02-20 01:11:07 +08:00
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
describe "#number_of_flags_given" do
|
|
|
|
|
it "doesn't count disagreed flags" do
|
|
|
|
|
post_agreed = Fabricate(:post)
|
|
|
|
|
PostActionCreator
|
|
|
|
|
.inappropriate(user, post_agreed)
|
|
|
|
|
.reviewable
|
|
|
|
|
.perform(moderator, :agree_and_keep)
|
2015-02-20 01:11:07 +08:00
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
post_deferred = Fabricate(:post)
|
2023-03-02 23:40:53 +08:00
|
|
|
|
PostActionCreator
|
|
|
|
|
.inappropriate(user, post_deferred)
|
|
|
|
|
.reviewable
|
|
|
|
|
.perform(moderator, :ignore_and_do_nothing)
|
2015-02-20 01:11:07 +08:00
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
post_disagreed = Fabricate(:post)
|
|
|
|
|
PostActionCreator
|
|
|
|
|
.inappropriate(user, post_disagreed)
|
|
|
|
|
.reviewable
|
|
|
|
|
.perform(moderator, :disagree)
|
2015-02-20 01:11:07 +08:00
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
expect(user.number_of_flags_given).to eq(2)
|
|
|
|
|
end
|
2015-02-20 01:11:07 +08:00
|
|
|
|
end
|
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
describe "number_of_deleted_posts" do
|
|
|
|
|
it "counts all the posts" do
|
|
|
|
|
# at least 1 "unchanged" post
|
|
|
|
|
Fabricate(:post, user: user)
|
2015-03-12 01:07:47 +08:00
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
post_deleted_by_moderator = Fabricate(:post, user: user)
|
|
|
|
|
PostDestroyer.new(moderator, post_deleted_by_moderator).destroy
|
2015-03-12 01:07:47 +08:00
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
post_deleted_by_user = Fabricate(:post, user: user, post_number: 2)
|
|
|
|
|
PostDestroyer.new(user, post_deleted_by_user).destroy
|
2015-03-12 01:07:47 +08:00
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
# fake stub deletion
|
|
|
|
|
post_deleted_by_user.update_columns(updated_at: 2.days.ago)
|
|
|
|
|
PostDestroyer.destroy_stubs
|
2015-03-12 01:07:47 +08:00
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
expect(user.number_of_deleted_posts).to eq(2)
|
|
|
|
|
end
|
|
|
|
|
end
|
2015-03-12 01:07:47 +08:00
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
describe "#number_of_rejected_posts" do
|
|
|
|
|
it "counts rejected posts" do
|
2023-07-29 00:16:23 +08:00
|
|
|
|
Fabricate(
|
|
|
|
|
:reviewable_queued_post,
|
|
|
|
|
target_created_by: user,
|
|
|
|
|
status: Reviewable.statuses[:rejected],
|
|
|
|
|
)
|
2015-03-12 01:07:47 +08:00
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
|
expect(user.number_of_rejected_posts).to eq(1)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "ignore non-rejected posts" do
|
2023-07-29 00:16:23 +08:00
|
|
|
|
Fabricate(
|
|
|
|
|
:reviewable_queued_post,
|
|
|
|
|
target_created_by: user,
|
|
|
|
|
status: Reviewable.statuses[:approved],
|
|
|
|
|
)
|
2020-03-16 20:52:08 +08:00
|
|
|
|
|
|
|
|
|
expect(user.number_of_rejected_posts).to eq(0)
|
|
|
|
|
end
|
|
|
|
|
end
|
2021-08-13 01:20:46 +08:00
|
|
|
|
|
|
|
|
|
describe "#number_of_flagged_posts" do
|
2023-10-18 09:38:17 +08:00
|
|
|
|
it "counts flagged posts from the user" do
|
|
|
|
|
Fabricate(:reviewable_flagged_post, target_created_by: user)
|
2021-08-13 01:20:46 +08:00
|
|
|
|
|
2023-10-18 09:38:17 +08:00
|
|
|
|
expect(user.number_of_flagged_posts).to eq(1)
|
2021-08-13 01:20:46 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "ignores flagged posts from another user" do
|
2023-10-18 09:38:17 +08:00
|
|
|
|
Fabricate(:reviewable_flagged_post, target_created_by: Fabricate(:user))
|
2021-08-13 01:20:46 +08:00
|
|
|
|
|
2023-10-18 09:38:17 +08:00
|
|
|
|
expect(user.number_of_flagged_posts).to eq(0)
|
2021-08-13 01:20:46 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2015-03-12 01:07:47 +08:00
|
|
|
|
end
|
|
|
|
|
|
2015-03-26 13:04:32 +08:00
|
|
|
|
describe "new_user?" do
|
|
|
|
|
it "correctly detects new user" do
|
|
|
|
|
user = User.new(created_at: Time.now, trust_level: TrustLevel[0])
|
|
|
|
|
|
|
|
|
|
expect(user.new_user?).to eq(true)
|
|
|
|
|
|
|
|
|
|
user.trust_level = TrustLevel[1]
|
|
|
|
|
|
|
|
|
|
expect(user.new_user?).to eq(true)
|
|
|
|
|
|
|
|
|
|
user.trust_level = TrustLevel[2]
|
|
|
|
|
|
|
|
|
|
expect(user.new_user?).to eq(false)
|
|
|
|
|
|
|
|
|
|
user.trust_level = TrustLevel[0]
|
|
|
|
|
user.moderator = true
|
|
|
|
|
|
|
|
|
|
expect(user.new_user?).to eq(false)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-04-07 05:17:20 +08:00
|
|
|
|
context "when user preferences are overridden" do
|
2019-07-12 01:41:51 +08:00
|
|
|
|
fab!(:category0) { Fabricate(:category) }
|
|
|
|
|
fab!(:category1) { Fabricate(:category) }
|
|
|
|
|
fab!(:category2) { Fabricate(:category) }
|
|
|
|
|
fab!(:category3) { Fabricate(:category) }
|
2020-08-20 03:05:04 +08:00
|
|
|
|
fab!(:category4) { Fabricate(:category) }
|
2019-07-12 01:41:51 +08:00
|
|
|
|
|
2015-08-22 02:39:21 +08:00
|
|
|
|
before do
|
2016-03-03 04:26:27 +08:00
|
|
|
|
SiteSetting.default_email_digest_frequency = 1440 # daily
|
2019-03-15 22:55:11 +08:00
|
|
|
|
SiteSetting.default_email_level = UserOption.email_level_types[:never]
|
|
|
|
|
SiteSetting.default_email_messages_level = UserOption.email_level_types[:never]
|
2021-03-05 04:24:37 +08:00
|
|
|
|
SiteSetting.disable_mailing_list_mode = false
|
2016-02-17 12:46:19 +08:00
|
|
|
|
SiteSetting.default_email_mailing_list_mode = true
|
2015-08-22 02:39:21 +08:00
|
|
|
|
|
2016-02-17 12:46:19 +08:00
|
|
|
|
SiteSetting.default_other_new_topic_duration_minutes = -1 # not viewed
|
|
|
|
|
SiteSetting.default_other_auto_track_topics_after_msecs = 0 # immediately
|
2016-10-01 00:36:43 +08:00
|
|
|
|
SiteSetting.default_other_notification_level_when_replying = 3 # immediately
|
2016-02-17 12:46:19 +08:00
|
|
|
|
SiteSetting.default_other_external_links_in_new_tab = true
|
|
|
|
|
SiteSetting.default_other_enable_quoting = false
|
|
|
|
|
SiteSetting.default_other_dynamic_favicon = true
|
2020-08-14 21:40:56 +08:00
|
|
|
|
SiteSetting.default_other_skip_new_user_tips = true
|
2015-08-22 02:39:21 +08:00
|
|
|
|
|
2022-11-06 19:14:17 +08:00
|
|
|
|
SiteSetting.default_hide_profile_and_presence = true
|
2016-02-17 12:46:19 +08:00
|
|
|
|
SiteSetting.default_topics_automatic_unpin = false
|
2015-11-18 01:21:40 +08:00
|
|
|
|
|
2019-07-12 01:41:51 +08:00
|
|
|
|
SiteSetting.default_categories_watching = category0.id.to_s
|
|
|
|
|
SiteSetting.default_categories_tracking = category1.id.to_s
|
|
|
|
|
SiteSetting.default_categories_muted = category2.id.to_s
|
|
|
|
|
SiteSetting.default_categories_watching_first_post = category3.id.to_s
|
2022-06-20 11:49:33 +08:00
|
|
|
|
SiteSetting.default_categories_normal = category4.id.to_s
|
2015-08-22 02:39:21 +08:00
|
|
|
|
end
|
|
|
|
|
|
2022-04-07 05:17:20 +08:00
|
|
|
|
it "has overridden preferences" do
|
2015-08-22 02:39:21 +08:00
|
|
|
|
user = Fabricate(:user)
|
2016-02-17 12:46:19 +08:00
|
|
|
|
options = user.user_option
|
|
|
|
|
expect(options.mailing_list_mode).to eq(true)
|
2016-03-03 04:26:27 +08:00
|
|
|
|
expect(options.digest_after_minutes).to eq(1440)
|
2019-03-15 22:55:11 +08:00
|
|
|
|
expect(options.email_level).to eq(UserOption.email_level_types[:never])
|
|
|
|
|
expect(options.email_messages_level).to eq(UserOption.email_level_types[:never])
|
2016-02-17 12:46:19 +08:00
|
|
|
|
expect(options.external_links_in_new_tab).to eq(true)
|
|
|
|
|
expect(options.enable_quoting).to eq(false)
|
|
|
|
|
expect(options.dynamic_favicon).to eq(true)
|
2020-08-14 21:40:56 +08:00
|
|
|
|
expect(options.skip_new_user_tips).to eq(true)
|
2022-11-06 19:14:17 +08:00
|
|
|
|
expect(options.hide_profile_and_presence).to eq(true)
|
2016-02-17 12:46:19 +08:00
|
|
|
|
expect(options.automatically_unpin_topics).to eq(false)
|
2016-02-18 13:57:22 +08:00
|
|
|
|
expect(options.new_topic_duration_minutes).to eq(-1)
|
|
|
|
|
expect(options.auto_track_topics_after_msecs).to eq(0)
|
2016-10-01 00:36:43 +08:00
|
|
|
|
expect(options.notification_level_when_replying).to eq(3)
|
2015-11-18 01:21:40 +08:00
|
|
|
|
|
2019-07-12 01:41:51 +08:00
|
|
|
|
expect(CategoryUser.lookup(user, :watching).pluck(:category_id)).to eq([category0.id])
|
|
|
|
|
expect(CategoryUser.lookup(user, :tracking).pluck(:category_id)).to eq([category1.id])
|
|
|
|
|
expect(CategoryUser.lookup(user, :muted).pluck(:category_id)).to eq([category2.id])
|
|
|
|
|
expect(CategoryUser.lookup(user, :watching_first_post).pluck(:category_id)).to eq(
|
|
|
|
|
[category3.id],
|
|
|
|
|
)
|
2020-08-20 03:05:04 +08:00
|
|
|
|
expect(CategoryUser.lookup(user, :regular).pluck(:category_id)).to eq([category4.id])
|
2015-08-22 02:39:21 +08:00
|
|
|
|
end
|
2016-06-14 22:45:47 +08:00
|
|
|
|
|
2023-04-17 14:35:22 +08:00
|
|
|
|
it "does not error on duplicate categories for set_default_categories_preferences" do
|
|
|
|
|
SiteSetting.default_categories_normal = category4.id.to_s + "|" + category4.id.to_s
|
|
|
|
|
user = nil
|
|
|
|
|
expect { user = Fabricate(:user, trust_level: 1) }.not_to raise_error
|
|
|
|
|
expect(CategoryUser.lookup(user, :normal).pluck(:category_id)).to include(category4.id)
|
2023-03-28 22:13:01 +08:00
|
|
|
|
end
|
|
|
|
|
|
2016-06-14 22:45:47 +08:00
|
|
|
|
it "does not set category preferences for staged users" do
|
|
|
|
|
user = Fabricate(:user, staged: true)
|
|
|
|
|
expect(CategoryUser.lookup(user, :watching).pluck(:category_id)).to eq([])
|
|
|
|
|
expect(CategoryUser.lookup(user, :tracking).pluck(:category_id)).to eq([])
|
|
|
|
|
expect(CategoryUser.lookup(user, :muted).pluck(:category_id)).to eq([])
|
2016-11-10 02:37:54 +08:00
|
|
|
|
expect(CategoryUser.lookup(user, :watching_first_post).pluck(:category_id)).to eq([])
|
2020-08-20 03:05:04 +08:00
|
|
|
|
expect(CategoryUser.lookup(user, :regular).pluck(:category_id)).to eq([])
|
2016-06-14 22:45:47 +08:00
|
|
|
|
end
|
2016-02-17 12:46:19 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context UserOption do
|
|
|
|
|
it "Creates a UserOption row when a user record is created and destroys once done" do
|
|
|
|
|
user = Fabricate(:user)
|
2019-03-15 22:55:11 +08:00
|
|
|
|
expect(user.user_option.email_level).to eq(UserOption.email_level_types[:only_when_away])
|
2016-02-17 12:46:19 +08:00
|
|
|
|
|
|
|
|
|
user_id = user.id
|
|
|
|
|
user.destroy!
|
|
|
|
|
expect(UserOption.find_by(user_id: user_id)).to eq(nil)
|
|
|
|
|
end
|
2015-08-22 02:39:21 +08:00
|
|
|
|
end
|
|
|
|
|
|
2016-07-04 17:20:30 +08:00
|
|
|
|
describe "#logged_out" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2016-07-04 17:20:30 +08:00
|
|
|
|
|
|
|
|
|
it "should publish the right message" do
|
2023-01-05 03:55:52 +08:00
|
|
|
|
message = MessageBus.track_publish("/logout/#{user.id}") { user.logged_out }.first
|
2016-07-04 17:20:30 +08:00
|
|
|
|
|
|
|
|
|
expect(message.data).to eq(user.id)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2016-11-08 16:12:40 +08:00
|
|
|
|
describe "#read_first_notification?" do
|
2019-05-07 11:12:20 +08:00
|
|
|
|
fab!(:user) { Fabricate(:user, trust_level: TrustLevel[0]) }
|
|
|
|
|
fab!(:notification) { Fabricate(:private_message_notification) }
|
2016-11-16 16:20:38 +08:00
|
|
|
|
|
2016-11-17 09:44:00 +08:00
|
|
|
|
describe "when first notification has not been seen" do
|
2016-11-08 16:12:40 +08:00
|
|
|
|
it "should return the right value" do
|
|
|
|
|
expect(user.read_first_notification?).to eq(false)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2016-11-17 09:44:00 +08:00
|
|
|
|
describe "when first notification has been seen" do
|
2016-11-08 16:12:40 +08:00
|
|
|
|
it "should return the right value" do
|
2019-04-29 15:32:25 +08:00
|
|
|
|
user.update!(seen_notification_id: notification.id)
|
2016-11-16 14:17:47 +08:00
|
|
|
|
expect(user.reload.read_first_notification?).to eq(true)
|
2016-11-08 16:12:40 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2016-11-08 17:00:44 +08:00
|
|
|
|
|
2017-02-17 23:28:38 +08:00
|
|
|
|
describe "when user is trust level 1" do
|
2016-11-16 14:17:47 +08:00
|
|
|
|
it "should return the right value" do
|
2019-04-29 15:32:25 +08:00
|
|
|
|
user.update!(trust_level: TrustLevel[1])
|
2016-11-16 14:17:47 +08:00
|
|
|
|
|
2017-02-17 23:28:38 +08:00
|
|
|
|
expect(user.read_first_notification?).to eq(false)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2020-08-18 16:13:40 +08:00
|
|
|
|
describe "when user skipped new user tips" do
|
|
|
|
|
it "should return the right value" do
|
|
|
|
|
user.user_option.update!(skip_new_user_tips: true)
|
|
|
|
|
|
|
|
|
|
expect(user.read_first_notification?).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
end
|
2016-11-08 16:12:40 +08:00
|
|
|
|
end
|
2016-11-15 04:53:24 +08:00
|
|
|
|
|
|
|
|
|
describe "#featured_user_badges" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2020-01-14 22:26:49 +08:00
|
|
|
|
let!(:user_badge_tl1) do
|
|
|
|
|
UserBadge.create(
|
|
|
|
|
badge_id: Badge::BasicUser,
|
|
|
|
|
user: user,
|
|
|
|
|
granted_by: Discourse.system_user,
|
|
|
|
|
granted_at: Time.now,
|
|
|
|
|
)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2020-01-14 22:26:49 +08:00
|
|
|
|
let!(:user_badge_tl2) do
|
|
|
|
|
UserBadge.create(
|
|
|
|
|
badge_id: Badge::Member,
|
|
|
|
|
user: user,
|
|
|
|
|
granted_by: Discourse.system_user,
|
|
|
|
|
granted_at: Time.now,
|
|
|
|
|
)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2020-01-14 22:26:49 +08:00
|
|
|
|
let!(:user_badge_like) do
|
|
|
|
|
UserBadge.create(
|
|
|
|
|
badge_id: Badge::FirstLike,
|
|
|
|
|
user: user,
|
|
|
|
|
granted_by: Discourse.system_user,
|
|
|
|
|
granted_at: Time.now,
|
2023-01-09 19:18:21 +08:00
|
|
|
|
)
|
|
|
|
|
end
|
2016-11-15 04:53:24 +08:00
|
|
|
|
|
2020-01-14 22:26:49 +08:00
|
|
|
|
it "should display badges in the correct order" do
|
|
|
|
|
expect(user.featured_user_badges.map(&:badge_id)).to eq(
|
|
|
|
|
[Badge::Member, Badge::FirstLike, Badge::BasicUser],
|
|
|
|
|
)
|
2016-11-15 04:53:24 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2017-02-13 23:53:45 +08:00
|
|
|
|
|
|
|
|
|
describe ".clear_global_notice_if_needed" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
|
|
|
|
fab!(:admin)
|
2017-02-13 23:53:45 +08:00
|
|
|
|
|
|
|
|
|
before do
|
|
|
|
|
SiteSetting.has_login_hint = true
|
|
|
|
|
SiteSetting.global_notice = "some notice"
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "doesn't clear the login hint when a regular user is saved" do
|
|
|
|
|
user.save
|
|
|
|
|
expect(SiteSetting.has_login_hint).to eq(true)
|
|
|
|
|
expect(SiteSetting.global_notice).to eq("some notice")
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "doesn't clear the notice when a system user is saved" do
|
|
|
|
|
Discourse.system_user.save
|
|
|
|
|
expect(SiteSetting.has_login_hint).to eq(true)
|
|
|
|
|
expect(SiteSetting.global_notice).to eq("some notice")
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "clears the notice when the admin is saved" do
|
|
|
|
|
admin.save
|
|
|
|
|
expect(SiteSetting.has_login_hint).to eq(false)
|
|
|
|
|
expect(SiteSetting.global_notice).to eq("")
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2017-03-11 14:25:09 +08:00
|
|
|
|
describe ".human_users" do
|
|
|
|
|
it "should only return users with a positive primary key" do
|
2022-10-25 15:29:09 +08:00
|
|
|
|
Fabricate(:bot)
|
2017-03-11 14:25:09 +08:00
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
|
|
|
|
|
expect(User.human_users).to eq([user])
|
|
|
|
|
end
|
|
|
|
|
end
|
2017-09-15 16:18:30 +08:00
|
|
|
|
|
2022-06-09 00:43:21 +08:00
|
|
|
|
describe ".not_staged" do
|
|
|
|
|
let!(:user0) { Fabricate(:user, staged: true) }
|
|
|
|
|
let!(:user1) { Fabricate(:user) }
|
|
|
|
|
|
|
|
|
|
it "doesn't return staged users" do
|
|
|
|
|
expect(User.not_staged).to_not include(user0)
|
|
|
|
|
expect(User.not_staged).to include(user1)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2017-09-15 16:18:30 +08:00
|
|
|
|
describe "#publish_notifications_state" do
|
2020-04-01 07:09:20 +08:00
|
|
|
|
it "should publish the right message sorted by ID desc" do
|
|
|
|
|
notification = Fabricate(:notification, user: user)
|
|
|
|
|
notification2 = Fabricate(:notification, user: user, read: true)
|
|
|
|
|
|
|
|
|
|
message =
|
|
|
|
|
MessageBus
|
|
|
|
|
.track_publish("/notification/#{user.id}") { user.publish_notifications_state }
|
|
|
|
|
.first
|
|
|
|
|
|
|
|
|
|
expect(message.data[:recent]).to eq([[notification2.id, true], [notification.id, false]])
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "floats the unread high priority notifications to the top" do
|
2017-09-15 16:18:30 +08:00
|
|
|
|
notification = Fabricate(:notification, user: user)
|
|
|
|
|
notification2 = Fabricate(:notification, user: user, read: true)
|
2020-04-01 07:09:20 +08:00
|
|
|
|
notification3 =
|
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: user,
|
|
|
|
|
notification_type: Notification.types[:private_message],
|
|
|
|
|
)
|
|
|
|
|
notification4 =
|
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: user,
|
|
|
|
|
notification_type: Notification.types[:bookmark_reminder],
|
2017-10-02 11:34:57 +08:00
|
|
|
|
)
|
2017-09-15 16:18:30 +08:00
|
|
|
|
|
2022-08-03 13:57:59 +08:00
|
|
|
|
message =
|
|
|
|
|
MessageBus
|
2021-11-22 11:38:49 +08:00
|
|
|
|
.track_publish("/notification/#{user.id}") { user.publish_notifications_state }
|
2023-01-09 19:18:21 +08:00
|
|
|
|
.first
|
|
|
|
|
|
2017-09-15 16:18:30 +08:00
|
|
|
|
expect(message.data[:recent]).to eq(
|
2020-04-01 07:09:20 +08:00
|
|
|
|
[
|
|
|
|
|
[notification4.id, false],
|
|
|
|
|
[notification3.id, false],
|
|
|
|
|
[notification2.id, true],
|
|
|
|
|
[notification.id, false],
|
|
|
|
|
],
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "has the correct counts" do
|
2023-06-01 08:00:01 +08:00
|
|
|
|
_notification = Fabricate(:notification, user: user)
|
|
|
|
|
_notification2 = Fabricate(:notification, user: user, read: true)
|
|
|
|
|
_notification3 =
|
2020-04-01 07:09:20 +08:00
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: user,
|
|
|
|
|
notification_type: Notification.types[:private_message],
|
|
|
|
|
)
|
2023-06-01 08:00:01 +08:00
|
|
|
|
_notification4 =
|
2020-04-01 07:09:20 +08:00
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: user,
|
|
|
|
|
notification_type: Notification.types[:bookmark_reminder],
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
message =
|
|
|
|
|
MessageBus
|
|
|
|
|
.track_publish("/notification/#{user.id}") { user.publish_notifications_state }
|
|
|
|
|
.first
|
|
|
|
|
|
|
|
|
|
expect(message.data[:unread_notifications]).to eq(1)
|
|
|
|
|
expect(message.data[:unread_high_priority_notifications]).to eq(2)
|
2017-09-15 16:18:30 +08:00
|
|
|
|
end
|
2021-11-22 11:38:49 +08:00
|
|
|
|
|
|
|
|
|
it "does not publish to the /notification channel for users who have not been seen in > 30 days" do
|
2023-06-01 08:00:01 +08:00
|
|
|
|
_notification = Fabricate(:notification, user: user)
|
|
|
|
|
_notification2 = Fabricate(:notification, user: user, read: true)
|
2021-11-22 11:38:49 +08:00
|
|
|
|
user.update(last_seen_at: 31.days.ago)
|
|
|
|
|
|
|
|
|
|
message =
|
|
|
|
|
MessageBus
|
|
|
|
|
.track_publish("/notification/#{user.id}") { user.publish_notifications_state }
|
|
|
|
|
.first
|
|
|
|
|
|
|
|
|
|
expect(message).to eq(nil)
|
|
|
|
|
end
|
2022-08-03 13:57:59 +08:00
|
|
|
|
|
2022-12-08 09:44:29 +08:00
|
|
|
|
context "with sidebar based navigation menu" do
|
|
|
|
|
before { SiteSetting.navigation_menu = "sidebar" }
|
2022-09-01 02:15:01 +08:00
|
|
|
|
|
2022-08-31 09:16:28 +08:00
|
|
|
|
it "adds all_unread_notifications and grouped_unread_notifications to the payload" do
|
2022-08-03 13:57:59 +08:00
|
|
|
|
user.update!(admin: true)
|
2022-08-31 09:16:28 +08:00
|
|
|
|
Fabricate(:notification, user: user, notification_type: 1)
|
2022-08-03 13:57:59 +08:00
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
notification_type: 15,
|
|
|
|
|
high_priority: true,
|
|
|
|
|
read: false,
|
2022-12-01 07:05:32 +08:00
|
|
|
|
user: user,
|
|
|
|
|
)
|
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: user,
|
|
|
|
|
notification_type: Notification.types[:private_message],
|
|
|
|
|
read: false,
|
2023-01-09 19:18:21 +08:00
|
|
|
|
)
|
2022-09-01 02:15:01 +08:00
|
|
|
|
|
2022-08-03 13:57:59 +08:00
|
|
|
|
messages =
|
|
|
|
|
MessageBus.track_publish("/notification/#{user.id}") { user.publish_notifications_state }
|
2022-09-01 02:15:01 +08:00
|
|
|
|
|
2022-08-03 13:57:59 +08:00
|
|
|
|
expect(messages.size).to eq(1)
|
|
|
|
|
|
|
|
|
|
message = messages.first
|
2022-09-01 02:15:01 +08:00
|
|
|
|
|
2022-12-01 07:05:32 +08:00
|
|
|
|
expect(message.data[:all_unread_notifications_count]).to eq(3)
|
|
|
|
|
expect(message.data[:grouped_unread_notifications]).to eq(
|
|
|
|
|
{ 1 => 1, 15 => 1, Notification.types[:private_message] => 1 },
|
|
|
|
|
)
|
|
|
|
|
expect(message.data[:new_personal_messages_notifications_count]).to eq(1)
|
2022-08-03 13:57:59 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2017-09-15 16:18:30 +08:00
|
|
|
|
end
|
2017-11-14 02:41:36 +08:00
|
|
|
|
|
|
|
|
|
describe "silenced?" do
|
|
|
|
|
it "is not silenced by default" do
|
|
|
|
|
expect(Fabricate(:user)).not_to be_silenced
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is not silenced with a date in the past" do
|
|
|
|
|
expect(Fabricate(:user, silenced_till: 1.month.ago)).not_to be_silenced
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is is silenced with a date in the future" do
|
|
|
|
|
expect(Fabricate(:user, silenced_till: 1.month.from_now)).to be_silenced
|
|
|
|
|
end
|
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
|
context "with finders" do
|
2017-11-14 02:41:36 +08:00
|
|
|
|
let!(:user0) { Fabricate(:user, silenced_till: 1.month.ago) }
|
|
|
|
|
let!(:user1) { Fabricate(:user, silenced_till: 1.month.from_now) }
|
|
|
|
|
|
|
|
|
|
it "doesn't return old silenced records" do
|
|
|
|
|
expect(User.silenced).to_not include(user0)
|
|
|
|
|
expect(User.silenced).to include(user1)
|
|
|
|
|
expect(User.not_silenced).to include(user0)
|
|
|
|
|
expect(User.not_silenced).to_not include(user1)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2018-10-24 09:10:27 +08:00
|
|
|
|
describe "#unread_notifications" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2018-10-24 09:10:27 +08:00
|
|
|
|
before { User.max_unread_notifications = 3 }
|
|
|
|
|
|
|
|
|
|
after { User.max_unread_notifications = nil }
|
|
|
|
|
|
|
|
|
|
it "limits to MAX_UNREAD_NOTIFICATIONS" do
|
|
|
|
|
4.times do
|
|
|
|
|
Notification.create!(user_id: user.id, notification_type: 1, read: false, data: "{}")
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
expect(user.unread_notifications).to eq(3)
|
|
|
|
|
end
|
2020-04-01 07:09:20 +08:00
|
|
|
|
|
|
|
|
|
it "does not include high priority notifications" do
|
|
|
|
|
Notification.create!(user_id: user.id, notification_type: 1, read: false, data: "{}")
|
|
|
|
|
Notification.create!(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
notification_type: Notification.types[:private_message],
|
|
|
|
|
read: false,
|
|
|
|
|
data: "{}",
|
|
|
|
|
)
|
|
|
|
|
Notification.create!(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
notification_type: Notification.types[:bookmark_reminder],
|
|
|
|
|
read: false,
|
2023-01-09 19:18:21 +08:00
|
|
|
|
data: "{}",
|
|
|
|
|
)
|
2020-04-01 07:09:20 +08:00
|
|
|
|
|
|
|
|
|
expect(user.unread_notifications).to eq(1)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "#unread_high_priority_notifications" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2020-04-01 07:09:20 +08:00
|
|
|
|
|
|
|
|
|
it "only returns an unread count of PM and bookmark reminder notifications" do
|
|
|
|
|
Notification.create!(user_id: user.id, notification_type: 1, read: false, data: "{}")
|
|
|
|
|
Notification.create!(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
notification_type: Notification.types[:private_message],
|
|
|
|
|
read: false,
|
|
|
|
|
data: "{}",
|
|
|
|
|
)
|
|
|
|
|
Notification.create!(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
notification_type: Notification.types[:bookmark_reminder],
|
|
|
|
|
read: false,
|
2023-01-09 19:18:21 +08:00
|
|
|
|
data: "{}",
|
|
|
|
|
)
|
2020-04-01 07:09:20 +08:00
|
|
|
|
|
|
|
|
|
expect(user.unread_high_priority_notifications).to eq(2)
|
|
|
|
|
end
|
2018-10-24 09:10:27 +08:00
|
|
|
|
end
|
|
|
|
|
|
2020-03-17 23:48:24 +08:00
|
|
|
|
describe "#unstage!" do
|
|
|
|
|
let!(:user) do
|
|
|
|
|
Fabricate(
|
|
|
|
|
:staged,
|
|
|
|
|
email: "staged@account.com",
|
|
|
|
|
active: true,
|
|
|
|
|
username: "staged1",
|
|
|
|
|
name: "Stage Name",
|
|
|
|
|
)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2018-01-20 00:56:24 +08:00
|
|
|
|
|
2019-10-22 01:25:46 +08:00
|
|
|
|
it "correctly unstages a user" do
|
2020-03-17 23:48:24 +08:00
|
|
|
|
user.unstage!
|
2019-10-22 01:25:46 +08:00
|
|
|
|
expect(user.staged).to eq(false)
|
2018-01-19 22:29:15 +08:00
|
|
|
|
end
|
|
|
|
|
|
2018-01-23 01:04:30 +08:00
|
|
|
|
it "removes all previous notifications during unstaging" do
|
2020-03-17 23:48:24 +08:00
|
|
|
|
Fabricate(:notification, user: user)
|
|
|
|
|
Fabricate(:private_message_notification, user: user)
|
|
|
|
|
expect(user.total_unread_notifications).to eq(2)
|
2018-01-23 01:04:30 +08:00
|
|
|
|
|
2020-03-17 23:48:24 +08:00
|
|
|
|
user.unstage!
|
|
|
|
|
user.reload
|
2018-01-23 01:04:30 +08:00
|
|
|
|
expect(user.total_unread_notifications).to eq(0)
|
2019-10-22 01:25:46 +08:00
|
|
|
|
expect(user.staged).to eq(false)
|
2018-01-23 01:04:30 +08:00
|
|
|
|
end
|
|
|
|
|
|
2018-01-20 00:56:24 +08:00
|
|
|
|
it "triggers an event" do
|
2021-06-01 17:51:32 +08:00
|
|
|
|
event = DiscourseEvent.track(:user_unstaged) { user.unstage! }
|
|
|
|
|
expect(event).to be_present
|
2020-03-17 23:48:24 +08:00
|
|
|
|
expect(event[:params].first).to eq(user)
|
2018-01-20 00:56:24 +08:00
|
|
|
|
end
|
2018-01-19 22:29:15 +08:00
|
|
|
|
end
|
|
|
|
|
|
2018-02-15 20:06:41 +08:00
|
|
|
|
describe "#activate" do
|
2018-02-14 22:52:05 +08:00
|
|
|
|
let!(:inactive) { Fabricate(:user, active: false) }
|
|
|
|
|
|
|
|
|
|
it "confirms email token and activates user" do
|
|
|
|
|
inactive.activate
|
|
|
|
|
inactive.reload
|
|
|
|
|
expect(inactive.email_confirmed?).to eq(true)
|
|
|
|
|
expect(inactive.active).to eq(true)
|
2019-08-28 19:44:16 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "works without needing to reload the model" do
|
|
|
|
|
inactive.activate
|
|
|
|
|
expect(inactive.email_confirmed?).to eq(true)
|
|
|
|
|
expect(inactive.active).to eq(true)
|
2018-02-14 22:52:05 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "activates user even if email token is already confirmed" do
|
|
|
|
|
token = inactive.email_tokens.find_by(email: inactive.email)
|
|
|
|
|
token.update_column(:confirmed, true)
|
|
|
|
|
inactive.activate
|
|
|
|
|
expect(inactive.active).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
end
|
2018-03-22 13:42:46 +08:00
|
|
|
|
|
2018-03-26 14:30:37 +08:00
|
|
|
|
def filter_by(method)
|
|
|
|
|
username = "someuniqueusername"
|
|
|
|
|
user.update!(username: username)
|
2018-03-22 13:42:46 +08:00
|
|
|
|
|
2018-03-26 14:30:37 +08:00
|
|
|
|
username2 = "awesomeusername"
|
|
|
|
|
user2 = Fabricate(:user, username: username2)
|
2018-03-22 13:42:46 +08:00
|
|
|
|
|
2018-03-26 14:30:37 +08:00
|
|
|
|
expect(User.public_send(method, username)).to eq([user])
|
|
|
|
|
|
|
|
|
|
expect(User.public_send(method, "UNiQuE")).to eq([user])
|
|
|
|
|
|
|
|
|
|
expect(User.public_send(method, [username, username2])).to contain_exactly(user, user2)
|
|
|
|
|
|
|
|
|
|
expect(User.public_send(method, %w[UNiQuE sOME])).to contain_exactly(user, user2)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "#filter_by_username" do
|
|
|
|
|
it "should be able to filter by username" do
|
|
|
|
|
filter_by(:filter_by_username)
|
2018-03-22 13:42:46 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "#filter_by_username_or_email" do
|
|
|
|
|
it "should be able to filter by email" do
|
|
|
|
|
email = "veryspecialtest@discourse.org"
|
|
|
|
|
user.update!(email: email)
|
|
|
|
|
|
|
|
|
|
expect(User.filter_by_username_or_email(email)).to eq([user])
|
|
|
|
|
|
|
|
|
|
expect(User.filter_by_username_or_email("veryspeCiaLtest")).to eq([user])
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should be able to filter by username" do
|
2018-03-26 14:30:37 +08:00
|
|
|
|
filter_by(:filter_by_username_or_email)
|
2018-03-22 13:42:46 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2018-07-03 19:51:22 +08:00
|
|
|
|
|
|
|
|
|
describe "#secondary_emails" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2018-07-03 19:51:22 +08:00
|
|
|
|
|
|
|
|
|
it "only contains secondary emails" do
|
|
|
|
|
expect(user.user_emails.secondary).to eq([])
|
|
|
|
|
|
|
|
|
|
secondary_email = Fabricate(:secondary_email, user: user)
|
|
|
|
|
|
|
|
|
|
expect(user.user_emails.secondary).to contain_exactly(secondary_email)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2021-02-22 19:42:37 +08:00
|
|
|
|
describe "#email=" do
|
|
|
|
|
let(:new_email) { "newprimary@example.com" }
|
|
|
|
|
it "sets the primary email" do
|
|
|
|
|
user.update!(email: new_email)
|
|
|
|
|
expect(User.find(user.id).email).to eq(new_email)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "only saves when save called" do
|
|
|
|
|
old_email = user.email
|
|
|
|
|
user.email = new_email
|
|
|
|
|
expect(User.find(user.id).email).to eq(old_email)
|
|
|
|
|
user.save!
|
|
|
|
|
expect(User.find(user.id).email).to eq(new_email)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "will automatically remove matching secondary emails" do
|
|
|
|
|
secondary_email_record = Fabricate(:secondary_email, user: user)
|
|
|
|
|
user.reload
|
|
|
|
|
expect(user.secondary_emails.count).to eq(1)
|
|
|
|
|
user.email = secondary_email_record.email
|
|
|
|
|
user.save!
|
|
|
|
|
|
|
|
|
|
expect(User.find(user.id).email).to eq(secondary_email_record.email)
|
|
|
|
|
expect(user.secondary_emails.count).to eq(0)
|
|
|
|
|
end
|
2023-01-24 11:40:24 +08:00
|
|
|
|
|
|
|
|
|
it "returns error if email is nil" do
|
|
|
|
|
user.email = nil
|
|
|
|
|
expect { user.save! }.to raise_error(ActiveRecord::RecordInvalid)
|
|
|
|
|
end
|
2021-02-22 19:42:37 +08:00
|
|
|
|
end
|
|
|
|
|
|
2018-07-18 18:57:43 +08:00
|
|
|
|
describe "set_random_avatar" do
|
|
|
|
|
it "sets a random avatar when selectable avatars is enabled" do
|
|
|
|
|
avatar1 = Fabricate(:upload)
|
|
|
|
|
avatar2 = Fabricate(:upload)
|
2020-10-13 21:17:06 +08:00
|
|
|
|
SiteSetting.selectable_avatars = [avatar1, avatar2]
|
2022-02-25 04:57:39 +08:00
|
|
|
|
SiteSetting.selectable_avatars_mode = "no_one"
|
2018-07-18 18:57:43 +08:00
|
|
|
|
|
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
expect(user.uploaded_avatar_id).not_to be(nil)
|
|
|
|
|
expect([avatar1.id, avatar2.id]).to include(user.uploaded_avatar_id)
|
|
|
|
|
expect(user.user_avatar.custom_upload_id).to eq(user.uploaded_avatar_id)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2018-08-31 12:46:22 +08:00
|
|
|
|
describe "ensure_consistency!" do
|
|
|
|
|
it "will clean up dangling avatars" do
|
|
|
|
|
upload = Fabricate(:upload)
|
|
|
|
|
user = Fabricate(:user, uploaded_avatar_id: upload.id)
|
|
|
|
|
|
|
|
|
|
upload.destroy!
|
|
|
|
|
user.reload
|
|
|
|
|
expect(user.uploaded_avatar_id).to eq(nil)
|
|
|
|
|
|
|
|
|
|
user.update_columns(uploaded_avatar_id: upload.id)
|
|
|
|
|
|
|
|
|
|
User.ensure_consistency!
|
|
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
|
expect(user.uploaded_avatar_id).to eq(nil)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2021-07-08 15:46:21 +08:00
|
|
|
|
describe "#match_primary_group_changes" do
|
|
|
|
|
let(:group_a) { Fabricate(:group, title: "A", users: [user]) }
|
|
|
|
|
let(:group_b) { Fabricate(:group, title: "B", users: [user]) }
|
2018-09-17 13:08:39 +08:00
|
|
|
|
|
|
|
|
|
it "updates user's title only when it is blank or matches the previous primary group" do
|
2021-07-08 15:46:21 +08:00
|
|
|
|
expect { user.update(primary_group: group_a) }.to change { user.reload.title }.from(nil).to(
|
2023-01-09 19:18:21 +08:00
|
|
|
|
"A",
|
2021-07-08 15:46:21 +08:00
|
|
|
|
)
|
|
|
|
|
expect { user.update(primary_group: group_b) }.to change { user.reload.title }.from("A").to(
|
2023-01-09 19:18:21 +08:00
|
|
|
|
"B",
|
2021-07-08 15:46:21 +08:00
|
|
|
|
)
|
2018-09-17 13:08:39 +08:00
|
|
|
|
|
|
|
|
|
user.update(title: "Different")
|
2021-07-08 15:46:21 +08:00
|
|
|
|
expect { user.update(primary_group: group_a) }.to_not change { user.reload.title }
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "updates user's title only when it is blank or matches the previous primary group" do
|
|
|
|
|
expect { user.update(primary_group: group_a) }.to change { user.reload.flair_group }.from(
|
|
|
|
|
nil,
|
|
|
|
|
).to(group_a)
|
|
|
|
|
expect { user.update(primary_group: group_b) }.to change { user.reload.flair_group }.from(
|
|
|
|
|
group_a,
|
|
|
|
|
).to(group_b)
|
|
|
|
|
|
|
|
|
|
user.update(flair_group: group_a)
|
|
|
|
|
expect { user.update(primary_group: group_a) }.to_not change { user.reload.flair_group }
|
2018-09-17 13:08:39 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2018-09-21 10:06:08 +08:00
|
|
|
|
|
|
|
|
|
describe "#title=" do
|
2021-12-21 02:59:10 +08:00
|
|
|
|
fab!(:badge) { Fabricate(:badge, name: "Badge", allow_title: false) }
|
2018-09-21 10:06:08 +08:00
|
|
|
|
|
2023-03-08 20:37:20 +08:00
|
|
|
|
it "sets granted_title_badge_id correctly" do
|
2018-09-21 10:06:08 +08:00
|
|
|
|
BadgeGranter.grant(badge, user)
|
|
|
|
|
|
|
|
|
|
user.update!(title: badge.name)
|
2023-03-08 20:37:20 +08:00
|
|
|
|
expect(user.user_profile.reload.granted_title_badge_id).to be_nil
|
2018-09-21 10:06:08 +08:00
|
|
|
|
|
|
|
|
|
user.update!(title: "Custom")
|
2023-03-08 20:37:20 +08:00
|
|
|
|
expect(user.user_profile.reload.granted_title_badge_id).to be_nil
|
2018-09-21 10:06:08 +08:00
|
|
|
|
|
|
|
|
|
badge.update!(allow_title: true)
|
2019-11-08 13:34:24 +08:00
|
|
|
|
user.badges.reload
|
2018-09-21 10:06:08 +08:00
|
|
|
|
user.update!(title: badge.name)
|
2019-11-08 13:34:24 +08:00
|
|
|
|
expect(user.user_profile.reload.granted_title_badge_id).to eq(badge.id)
|
2018-09-21 10:06:08 +08:00
|
|
|
|
|
|
|
|
|
user.update!(title: nil)
|
2023-03-08 20:37:20 +08:00
|
|
|
|
expect(user.user_profile.granted_title_badge_id).to be_nil
|
2019-11-08 13:34:24 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when a custom badge name has been set and it matches the title" do
|
|
|
|
|
let(:customized_badge_name) { "Merit Badge" }
|
|
|
|
|
|
|
|
|
|
before do
|
|
|
|
|
TranslationOverride.upsert!(I18n.locale, Badge.i18n_key(badge.name), customized_badge_name)
|
|
|
|
|
end
|
|
|
|
|
|
2023-03-08 20:37:20 +08:00
|
|
|
|
it "sets granted_title_badge_id correctly" do
|
2019-11-08 13:34:24 +08:00
|
|
|
|
BadgeGranter.grant(badge, user)
|
|
|
|
|
|
|
|
|
|
badge.update!(allow_title: true)
|
|
|
|
|
user.update!(title: customized_badge_name)
|
|
|
|
|
expect(user.user_profile.reload.granted_title_badge_id).to eq(badge.id)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
after { TranslationOverride.revert!(I18n.locale, Badge.i18n_key(badge.name)) }
|
2018-09-21 10:06:08 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "#next_best_title" do
|
2021-12-21 02:59:10 +08:00
|
|
|
|
fab!(:group_a) { Fabricate(:group, title: "Group A") }
|
|
|
|
|
fab!(:group_b) { Fabricate(:group, title: "Group B") }
|
|
|
|
|
fab!(:group_c) { Fabricate(:group, title: "Group C") }
|
|
|
|
|
fab!(:badge) { Fabricate(:badge, name: "Badge", allow_title: true) }
|
2018-09-21 10:06:08 +08:00
|
|
|
|
|
|
|
|
|
it "only includes groups with title" do
|
|
|
|
|
group_a.add(user)
|
|
|
|
|
expect(user.next_best_title).to eq("Group A")
|
|
|
|
|
|
|
|
|
|
group_a.update!(title: nil)
|
|
|
|
|
expect(user.next_best_title).to eq(nil)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "only includes badges that allow to be set as title" do
|
|
|
|
|
BadgeGranter.grant(badge, user)
|
|
|
|
|
expect(user.next_best_title).to eq("Badge")
|
|
|
|
|
|
|
|
|
|
badge.update!(allow_title: false)
|
|
|
|
|
expect(user.next_best_title).to eq(nil)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "picks the next best title in the order: user's primary group, primary group, groups, and badges" do
|
|
|
|
|
group_a.add(user)
|
|
|
|
|
group_b.add(user)
|
|
|
|
|
group_c.add(user)
|
|
|
|
|
BadgeGranter.grant(badge, user)
|
|
|
|
|
|
|
|
|
|
group_a.update!(primary_group: true)
|
|
|
|
|
group_b.update!(primary_group: true)
|
|
|
|
|
user.update!(primary_group_id: group_a.id)
|
|
|
|
|
expect(user.next_best_title).to eq("Group A")
|
|
|
|
|
|
|
|
|
|
user.update!(primary_group_id: group_b.id)
|
|
|
|
|
expect(user.next_best_title).to eq("Group B")
|
|
|
|
|
|
|
|
|
|
group_b.remove(user)
|
|
|
|
|
expect(user.next_best_title).to eq("Group A")
|
|
|
|
|
|
|
|
|
|
group_a.remove(user)
|
|
|
|
|
expect(user.next_best_title).to eq("Group C")
|
|
|
|
|
|
|
|
|
|
group_c.remove(user)
|
|
|
|
|
expect(user.next_best_title).to eq("Badge")
|
|
|
|
|
|
|
|
|
|
BadgeGranter.revoke(UserBadge.find_by(user_id: user.id, badge_id: badge.id))
|
|
|
|
|
expect(user.next_best_title).to eq(nil)
|
|
|
|
|
end
|
|
|
|
|
end
|
2018-12-15 05:52:37 +08:00
|
|
|
|
|
|
|
|
|
describe "check_site_contact_username" do
|
|
|
|
|
before { SiteSetting.site_contact_username = contact_user.username }
|
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
|
context "when admin" do
|
2018-12-15 05:52:37 +08:00
|
|
|
|
let(:contact_user) { Fabricate(:admin) }
|
|
|
|
|
|
|
|
|
|
it "clears site_contact_username site setting when admin privilege is revoked" do
|
|
|
|
|
contact_user.revoke_admin!
|
|
|
|
|
expect(SiteSetting.site_contact_username).to eq(
|
|
|
|
|
SiteSetting.defaults[:site_contact_username],
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
|
context "when moderator" do
|
2018-12-15 05:52:37 +08:00
|
|
|
|
let(:contact_user) { Fabricate(:moderator) }
|
|
|
|
|
|
|
|
|
|
it "clears site_contact_username site setting when moderator privilege is revoked" do
|
|
|
|
|
contact_user.revoke_moderation!
|
|
|
|
|
expect(SiteSetting.site_contact_username).to eq(
|
|
|
|
|
SiteSetting.defaults[:site_contact_username],
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
|
context "when admin and moderator" do
|
2018-12-15 05:52:37 +08:00
|
|
|
|
let(:contact_user) { Fabricate(:moderator, admin: true) }
|
|
|
|
|
|
|
|
|
|
it "does not change site_contact_username site setting when admin privilege is revoked" do
|
|
|
|
|
contact_user.revoke_admin!
|
|
|
|
|
expect(SiteSetting.site_contact_username).to eq(contact_user.username)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "does not change site_contact_username site setting when moderator privilege is revoked" do
|
|
|
|
|
contact_user.revoke_moderation!
|
|
|
|
|
expect(SiteSetting.site_contact_username).to eq(contact_user.username)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "clears site_contact_username site setting when staff privileges are revoked" do
|
|
|
|
|
contact_user.revoke_admin!
|
|
|
|
|
contact_user.revoke_moderation!
|
|
|
|
|
expect(SiteSetting.site_contact_username).to eq(
|
|
|
|
|
SiteSetting.defaults[:site_contact_username],
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
2019-01-17 09:40:30 +08:00
|
|
|
|
|
2022-07-27 18:21:10 +08:00
|
|
|
|
describe "#destroy!" do
|
2019-01-17 09:40:30 +08:00
|
|
|
|
it "clears up associated data on destroy!" do
|
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
post = Fabricate(:post)
|
|
|
|
|
|
2019-01-04 01:03:01 +08:00
|
|
|
|
PostActionCreator.like(user, post)
|
|
|
|
|
PostActionDestroyer.destroy(user, post, :like)
|
2019-01-17 09:40:30 +08:00
|
|
|
|
|
|
|
|
|
UserAction.create!(user_id: user.id, action_type: UserAction::LIKE)
|
|
|
|
|
UserAction.create!(user_id: -1, action_type: UserAction::LIKE, target_user_id: user.id)
|
|
|
|
|
UserAction.create!(user_id: -1, action_type: UserAction::LIKE, acting_user_id: user.id)
|
2020-06-19 05:42:39 +08:00
|
|
|
|
Developer.create!(user_id: user.id)
|
2019-01-17 09:40:30 +08:00
|
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
|
|
|
|
|
|
user.destroy!
|
|
|
|
|
|
|
|
|
|
expect(UserAction.where(user_id: user.id).length).to eq(0)
|
|
|
|
|
expect(UserAction.where(target_user_id: user.id).length).to eq(0)
|
|
|
|
|
expect(UserAction.where(acting_user_id: user.id).length).to eq(0)
|
|
|
|
|
expect(PostAction.with_deleted.where(user_id: user.id).length).to eq(0)
|
2020-06-19 05:42:39 +08:00
|
|
|
|
expect(Developer.where(user_id: user.id).length).to eq(0)
|
2019-01-17 09:40:30 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2019-02-09 02:34:54 +08:00
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
|
describe "#human?" do
|
2019-02-09 02:34:54 +08:00
|
|
|
|
it "returns true for a regular user" do
|
|
|
|
|
expect(Fabricate(:user)).to be_human
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns false for the system user" do
|
|
|
|
|
expect(Discourse.system_user).not_to be_human
|
|
|
|
|
end
|
|
|
|
|
end
|
2019-04-23 18:22:47 +08:00
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
|
describe "Unicode username" do
|
2019-04-23 18:22:47 +08:00
|
|
|
|
before { SiteSetting.unicode_usernames = true }
|
|
|
|
|
|
|
|
|
|
let(:user) { Fabricate(:user, username: "Lo\u0308we") } # NFD
|
|
|
|
|
|
|
|
|
|
it "normalizes usernames" do
|
|
|
|
|
expect(user.username).to eq("L\u00F6we") # NFC
|
|
|
|
|
expect(user.username_lower).to eq("l\u00F6we") # NFC
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe ".username_exists?" do
|
|
|
|
|
it "normalizes username before executing query" do
|
|
|
|
|
expect(User.username_exists?(user.username)).to eq(true)
|
|
|
|
|
expect(User.username_exists?("Lo\u0308we")).to eq(true) # NFD
|
|
|
|
|
expect(User.username_exists?("L\u00F6we")).to eq(true) # NFC
|
|
|
|
|
expect(User.username_exists?("LO\u0308WE")).to eq(true) # NFD
|
|
|
|
|
expect(User.username_exists?("l\u00D6wE")).to eq(true) # NFC
|
|
|
|
|
expect(User.username_exists?("foo")).to eq(false)
|
|
|
|
|
end
|
|
|
|
|
end
|
2019-04-29 21:08:14 +08:00
|
|
|
|
|
|
|
|
|
describe ".system_avatar_template" do
|
|
|
|
|
context "with external system avatars enabled" do
|
|
|
|
|
before { SiteSetting.external_system_avatars_enabled = true }
|
|
|
|
|
|
|
|
|
|
it "uses the normalized username" do
|
|
|
|
|
expect(User.system_avatar_template("Lo\u0308we")).to match(
|
|
|
|
|
%r|/letter_avatar_proxy/v\d/letter/l/71e660/{size}.png|,
|
|
|
|
|
)
|
|
|
|
|
expect(User.system_avatar_template("L\u00F6wE")).to match(
|
|
|
|
|
%r|/letter_avatar_proxy/v\d/letter/l/71e660/{size}.png|,
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "uses the first grapheme cluster and URL encodes it" do
|
|
|
|
|
expect(User.system_avatar_template("बहुत")).to match(
|
|
|
|
|
%r|/letter_avatar_proxy/v\d/letter/%E0%A4%AC/ea5d25/{size}.png|,
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
|
2021-05-21 09:43:47 +08:00
|
|
|
|
it "substitutes {username} with the URL encoded username" do
|
2019-04-29 21:08:14 +08:00
|
|
|
|
SiteSetting.external_system_avatars_url = "https://{hostname}/{username}.png"
|
|
|
|
|
expect(User.system_avatar_template("बहुत")).to eq(
|
|
|
|
|
"https://#{Discourse.current_hostname}/%E0%A4%AC%E0%A4%B9%E0%A5%81%E0%A4%A4.png",
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
2019-04-23 18:22:47 +08:00
|
|
|
|
end
|
2019-10-02 10:08:41 +08:00
|
|
|
|
|
|
|
|
|
describe "Second-factor authenticators" do
|
|
|
|
|
describe "#totps" do
|
|
|
|
|
it "only includes enabled totp 2FA" do
|
|
|
|
|
enabled_totp_2fa =
|
|
|
|
|
Fabricate(:user_second_factor_totp, user: user, name: "Enabled TOTP", enabled: true)
|
2023-06-01 08:00:01 +08:00
|
|
|
|
_disabled_totp_2fa =
|
2019-10-02 10:08:41 +08:00
|
|
|
|
Fabricate(:user_second_factor_totp, user: user, name: "Disabled TOTP", enabled: false)
|
|
|
|
|
|
|
|
|
|
expect(user.totps.map(&:id)).to eq([enabled_totp_2fa.id])
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "#security_keys" do
|
|
|
|
|
it "only includes enabled security_key 2FA" do
|
|
|
|
|
enabled_security_key_2fa =
|
|
|
|
|
Fabricate(
|
|
|
|
|
:user_security_key_with_random_credential,
|
|
|
|
|
user: user,
|
|
|
|
|
name: "Enabled YubiKey",
|
|
|
|
|
enabled: true,
|
|
|
|
|
)
|
2023-06-01 08:00:01 +08:00
|
|
|
|
_disabled_security_key_2fa =
|
2019-10-02 10:08:41 +08:00
|
|
|
|
Fabricate(
|
|
|
|
|
:user_security_key_with_random_credential,
|
|
|
|
|
user: user,
|
|
|
|
|
name: "Disabled YubiKey",
|
|
|
|
|
enabled: false,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
expect(user.security_keys.map(&:id)).to eq([enabled_security_key_2fa.id])
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "Secure identifier for a user which is a string other than the ID used to identify the user in some cases e.g. security keys" do
|
|
|
|
|
describe "#create_or_fetch_secure_identifier" do
|
|
|
|
|
context "if the user already has a secure identifier" do
|
|
|
|
|
let(:sec_ident) { SecureRandom.hex(20) }
|
|
|
|
|
before { user.update(secure_identifier: sec_ident) }
|
|
|
|
|
|
|
|
|
|
it "returns the identifier" do
|
|
|
|
|
expect(user.create_or_fetch_secure_identifier).to eq(sec_ident)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "if the user already does not have a secure identifier" do
|
|
|
|
|
it "creates one" do
|
|
|
|
|
expect(user.secure_identifier).to eq(nil)
|
|
|
|
|
user.create_or_fetch_secure_identifier
|
|
|
|
|
expect(user.reload.secure_identifier).not_to eq(nil)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
2019-12-13 03:26:38 +08:00
|
|
|
|
|
|
|
|
|
describe "Granting admin or moderator status" do
|
2021-12-09 01:12:24 +08:00
|
|
|
|
context "when granting admin status" do
|
|
|
|
|
context "when there is a reviewable" do
|
|
|
|
|
fab!(:user) { Fabricate(:reviewable_user) }
|
2019-12-13 03:26:38 +08:00
|
|
|
|
|
2021-12-09 01:12:24 +08:00
|
|
|
|
context "when the user isn’t approved yet" do
|
|
|
|
|
it "approves the associated reviewable" do
|
|
|
|
|
expect { user.target.grant_admin! }.to change { user.reload.dup }.to be_approved
|
|
|
|
|
end
|
|
|
|
|
end
|
2019-12-13 03:26:38 +08:00
|
|
|
|
|
2021-12-09 01:12:24 +08:00
|
|
|
|
context "when the user is already approved" do
|
|
|
|
|
before { user.perform(Discourse.system_user, :approve_user) }
|
2019-12-13 03:26:38 +08:00
|
|
|
|
|
2021-12-09 01:12:24 +08:00
|
|
|
|
it "does nothing" do
|
|
|
|
|
expect { user.target.grant_admin! }.not_to change { user.reload.approved? }
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
2019-12-13 03:26:38 +08:00
|
|
|
|
|
2021-12-09 01:12:24 +08:00
|
|
|
|
context "when there is no reviewable" do
|
|
|
|
|
let(:user) { Fabricate(:user, approved: false) }
|
2019-12-13 03:26:38 +08:00
|
|
|
|
|
2021-12-09 01:12:24 +08:00
|
|
|
|
it "approves the user" do
|
|
|
|
|
expect { user.grant_admin! }.to change { user.reload.approved }.to true
|
|
|
|
|
end
|
|
|
|
|
end
|
2019-12-13 03:26:38 +08:00
|
|
|
|
end
|
|
|
|
|
|
2021-12-09 01:12:24 +08:00
|
|
|
|
context "when granting moderator status" do
|
|
|
|
|
context "when there is a reviewable" do
|
|
|
|
|
let(:user) { Fabricate(:reviewable_user) }
|
2019-12-13 03:26:38 +08:00
|
|
|
|
|
2021-12-09 01:12:24 +08:00
|
|
|
|
it "approves the associated reviewable" do
|
|
|
|
|
expect { user.target.grant_moderation! }.to change { user.reload.dup }.to be_approved
|
|
|
|
|
end
|
|
|
|
|
end
|
2019-12-13 03:26:38 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
2020-03-03 21:57:46 +08:00
|
|
|
|
|
|
|
|
|
describe "#recent_time_read" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
2020-03-03 21:57:46 +08:00
|
|
|
|
fab!(:user2) { Fabricate(:user) }
|
|
|
|
|
|
|
|
|
|
before_all do
|
|
|
|
|
UserVisit.create(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
visited_at: 1.minute.ago,
|
|
|
|
|
posts_read: 1,
|
|
|
|
|
mobile: false,
|
|
|
|
|
time_read: 10,
|
|
|
|
|
)
|
|
|
|
|
UserVisit.create(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
visited_at: 2.days.ago,
|
|
|
|
|
posts_read: 1,
|
|
|
|
|
mobile: false,
|
|
|
|
|
time_read: 20,
|
|
|
|
|
)
|
|
|
|
|
UserVisit.create(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
visited_at: 1.week.ago,
|
|
|
|
|
posts_read: 1,
|
|
|
|
|
mobile: false,
|
|
|
|
|
time_read: 30,
|
|
|
|
|
)
|
|
|
|
|
UserVisit.create(
|
|
|
|
|
user_id: user.id,
|
|
|
|
|
visited_at: 1.year.ago,
|
|
|
|
|
posts_read: 1,
|
|
|
|
|
mobile: false,
|
|
|
|
|
time_read: 40,
|
|
|
|
|
) # Old, should be ignored
|
|
|
|
|
UserVisit.create(
|
|
|
|
|
user_id: user2.id,
|
|
|
|
|
visited_at: 1.minute.ago,
|
|
|
|
|
posts_read: 1,
|
|
|
|
|
mobile: false,
|
|
|
|
|
time_read: 50,
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "calculates correctly" do
|
|
|
|
|
expect(user.recent_time_read).to eq(60)
|
|
|
|
|
expect(user2.recent_time_read).to eq(50)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "preloads correctly" do
|
|
|
|
|
User.preload_recent_time_read([user, user2])
|
|
|
|
|
|
|
|
|
|
expect(user.instance_variable_get(:@recent_time_read)).to eq(60)
|
|
|
|
|
expect(user2.instance_variable_get(:@recent_time_read)).to eq(50)
|
|
|
|
|
|
|
|
|
|
expect(user.recent_time_read).to eq(60)
|
|
|
|
|
expect(user2.recent_time_read).to eq(50)
|
|
|
|
|
end
|
|
|
|
|
end
|
2020-05-18 07:13:37 +08:00
|
|
|
|
|
|
|
|
|
def reset_last_seen_cache!(user)
|
|
|
|
|
Discourse.redis.del("user:#{user.id}:#{Time.zone.now.to_date}")
|
|
|
|
|
end
|
2020-06-06 00:31:58 +08:00
|
|
|
|
|
|
|
|
|
describe ".encoded_username" do
|
|
|
|
|
it "doesn't encoded ASCII usernames" do
|
|
|
|
|
user = Fabricate(:user, username: "John")
|
|
|
|
|
expect(user.encoded_username).to eq("John")
|
|
|
|
|
expect(user.encoded_username(lower: true)).to eq("john")
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "encodes Unicode characters" do
|
|
|
|
|
SiteSetting.unicode_usernames = true
|
|
|
|
|
user = Fabricate(:user, username: "Löwe")
|
|
|
|
|
expect(user.encoded_username).to eq("L%C3%B6we")
|
|
|
|
|
expect(user.encoded_username(lower: true)).to eq("l%C3%B6we")
|
|
|
|
|
end
|
|
|
|
|
end
|
2020-09-17 10:55:29 +08:00
|
|
|
|
|
|
|
|
|
describe "#update_ip_address!" do
|
|
|
|
|
it "updates ip_address correctly" do
|
|
|
|
|
expect do user.update_ip_address!("127.0.0.1") end.to change {
|
|
|
|
|
user.reload.ip_address.to_s
|
|
|
|
|
}.to("127.0.0.1")
|
|
|
|
|
|
|
|
|
|
expect do user.update_ip_address!("127.0.0.1") end.to_not change { user.reload.ip_address }
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "keeping old ip address" do
|
|
|
|
|
before { SiteSetting.keep_old_ip_address_count = 2 }
|
|
|
|
|
|
|
|
|
|
it "tracks old user record correctly" do
|
|
|
|
|
expect do user.update_ip_address!("127.0.0.1") end.to change {
|
2023-11-30 10:49:55 +08:00
|
|
|
|
UserIpAddressHistory.where(user_id: user.id).count
|
2020-09-17 10:55:29 +08:00
|
|
|
|
}.by(1)
|
|
|
|
|
|
|
|
|
|
freeze_time 10.minutes.from_now
|
|
|
|
|
|
|
|
|
|
expect do user.update_ip_address!("0.0.0.0") end.to change {
|
2023-11-30 10:49:55 +08:00
|
|
|
|
UserIpAddressHistory.where(user_id: user.id).count
|
2020-09-17 10:55:29 +08:00
|
|
|
|
}.by(1)
|
|
|
|
|
|
|
|
|
|
freeze_time 11.minutes.from_now
|
|
|
|
|
|
|
|
|
|
expect do user.update_ip_address!("127.0.0.1") end.to_not change {
|
2023-11-30 10:49:55 +08:00
|
|
|
|
UserIpAddressHistory.where(user_id: user.id).count
|
2020-09-17 10:55:29 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
expect(
|
|
|
|
|
UserIpAddressHistory.find_by(user_id: user.id, ip_address: "127.0.0.1").updated_at,
|
|
|
|
|
).to eq_time(Time.zone.now)
|
|
|
|
|
|
|
|
|
|
freeze_time 12.minutes.from_now
|
|
|
|
|
|
|
|
|
|
expect do user.update_ip_address!("0.0.0.1") end.not_to change {
|
2023-11-30 10:49:55 +08:00
|
|
|
|
UserIpAddressHistory.where(user_id: user.id).count
|
2022-07-19 22:03:03 +08:00
|
|
|
|
}
|
2020-09-17 10:55:29 +08:00
|
|
|
|
|
|
|
|
|
expect(UserIpAddressHistory.where(user_id: user.id).pluck(:ip_address).map(&:to_s)).to eq(
|
|
|
|
|
%w[127.0.0.1 0.0.0.1],
|
|
|
|
|
)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
2020-12-18 23:03:51 +08:00
|
|
|
|
|
|
|
|
|
describe "#do_not_disturb?" do
|
|
|
|
|
it "is true when a dnd timing is present for the current time" do
|
|
|
|
|
Fabricate(
|
|
|
|
|
:do_not_disturb_timing,
|
|
|
|
|
user: user,
|
|
|
|
|
starts_at: Time.zone.now,
|
|
|
|
|
ends_at: 1.day.from_now,
|
|
|
|
|
)
|
|
|
|
|
expect(user.do_not_disturb?).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "is false when no dnd timing is present for the current time" do
|
|
|
|
|
Fabricate(
|
|
|
|
|
:do_not_disturb_timing,
|
|
|
|
|
user: user,
|
|
|
|
|
starts_at: Time.zone.now - 2.day,
|
|
|
|
|
ends_at: 1.minute.ago,
|
|
|
|
|
)
|
|
|
|
|
expect(user.do_not_disturb?).to eq(false)
|
|
|
|
|
end
|
|
|
|
|
end
|
2021-03-06 19:29:35 +08:00
|
|
|
|
|
|
|
|
|
describe "#invited_by" do
|
|
|
|
|
it "returns even if invites was trashed" do
|
|
|
|
|
invite = Fabricate(:invite, invited_by: Fabricate(:user))
|
|
|
|
|
Fabricate(:invited_user, invite: invite, user: user)
|
|
|
|
|
invite.trash!
|
|
|
|
|
|
|
|
|
|
expect(user.invited_by).to eq(invite.invited_by)
|
|
|
|
|
end
|
|
|
|
|
end
|
2021-12-02 21:42:23 +08:00
|
|
|
|
|
|
|
|
|
describe "#username_equals_to?" do
|
|
|
|
|
[
|
|
|
|
|
["returns true for equal usernames", "john", "john", true],
|
|
|
|
|
["returns false for different usernames", "john", "bill", false],
|
|
|
|
|
["considers usernames that are different only in case as equal", "john", "JoHN", true],
|
|
|
|
|
].each do |testcase_name, current_username, another_username, is_equal|
|
|
|
|
|
it "#{testcase_name}" do
|
|
|
|
|
user = Fabricate(:user, username: current_username)
|
|
|
|
|
result = user.username_equals_to?(another_username)
|
|
|
|
|
|
|
|
|
|
expect(result).to be(is_equal)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "considers usernames that are equal after unicode normalization as equal" do
|
|
|
|
|
SiteSetting.unicode_usernames = true
|
|
|
|
|
|
|
|
|
|
raw = "Lo\u0308we" # Löwe, u0308 stands for ¨, so o\u0308 adds up to ö
|
|
|
|
|
normalized = "l\u00F6we" # Löwe normilized, \u00F6 stands for ö
|
|
|
|
|
user = Fabricate(:user, username: normalized)
|
|
|
|
|
result = user.username_equals_to?(raw)
|
|
|
|
|
|
|
|
|
|
expect(result).to be(true)
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-06-30 08:18:12 +08:00
|
|
|
|
|
|
|
|
|
describe "#whisperer?" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:group)
|
2022-06-30 08:18:12 +08:00
|
|
|
|
|
|
|
|
|
it "returns true for an admin user" do
|
2022-12-17 00:42:51 +08:00
|
|
|
|
SiteSetting.whispers_allowed_groups = "#{group.id}"
|
|
|
|
|
|
2022-06-30 08:18:12 +08:00
|
|
|
|
admin = Fabricate.create(:admin)
|
|
|
|
|
expect(admin.whisperer?).to eq(true)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns false for an admin user when whispers are not enabled" do
|
|
|
|
|
admin = Fabricate.create(:admin)
|
|
|
|
|
expect(admin.whisperer?).to eq(false)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "returns true for user belonging to whisperers groups" do
|
|
|
|
|
whisperer = Fabricate(:user)
|
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
SiteSetting.whispers_allowed_groups = "#{group.id}"
|
|
|
|
|
|
|
|
|
|
expect(whisperer.whisperer?).to eq(false)
|
|
|
|
|
expect(user.whisperer?).to eq(false)
|
|
|
|
|
|
|
|
|
|
group.add(whisperer)
|
|
|
|
|
|
|
|
|
|
expect(whisperer.whisperer?).to eq(true)
|
|
|
|
|
expect(user.whisperer?).to eq(false)
|
|
|
|
|
end
|
2022-12-17 00:42:51 +08:00
|
|
|
|
|
|
|
|
|
it "returns false if no whispers groups exist" do
|
2023-06-21 22:00:19 +08:00
|
|
|
|
expect(user.whisperer?).to eq(false)
|
2022-12-17 00:42:51 +08:00
|
|
|
|
end
|
2022-06-30 08:18:12 +08:00
|
|
|
|
end
|
2022-08-03 13:57:59 +08:00
|
|
|
|
|
2022-08-31 09:16:28 +08:00
|
|
|
|
describe "#grouped_unread_notifications" do
|
|
|
|
|
it "returns a map of types to their unread count" do
|
2022-08-08 22:24:04 +08:00
|
|
|
|
Fabricate(:notification, user: user, notification_type: 1, high_priority: true, read: true)
|
|
|
|
|
Fabricate(:notification, user: user, notification_type: 1, high_priority: true, read: false)
|
|
|
|
|
Fabricate(:notification, user: user, notification_type: 1, high_priority: false, read: true)
|
|
|
|
|
Fabricate(:notification, user: user, notification_type: 1, high_priority: false, read: false)
|
|
|
|
|
|
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: user,
|
|
|
|
|
notification_type: 2,
|
|
|
|
|
high_priority: true,
|
|
|
|
|
read: false,
|
|
|
|
|
topic: nil,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: user,
|
|
|
|
|
notification_type: 3,
|
|
|
|
|
high_priority: true,
|
|
|
|
|
read: false,
|
|
|
|
|
).tap { |n| n.topic.trash!(Fabricate(:admin)) }
|
|
|
|
|
|
|
|
|
|
Fabricate(:notification, user: user, notification_type: 3, high_priority: false, read: true)
|
|
|
|
|
|
|
|
|
|
# notification for another user. it shouldn't be included
|
|
|
|
|
Fabricate(:notification, notification_type: 4, high_priority: true, read: false)
|
|
|
|
|
|
2022-08-31 09:16:28 +08:00
|
|
|
|
expect(user.grouped_unread_notifications).to eq({ 1 => 2, 2 => 1 })
|
2022-08-08 22:24:04 +08:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-08-03 13:57:59 +08:00
|
|
|
|
describe "#all_unread_notifications_count" do
|
|
|
|
|
it "returns count of unseen and unread high priority and normal priority notifications" do
|
|
|
|
|
Fabricate(:notification, user: user, high_priority: true, read: false)
|
|
|
|
|
n2 = Fabricate(:notification, user: user, high_priority: false, read: false)
|
|
|
|
|
expect(user.all_unread_notifications_count).to eq(2)
|
|
|
|
|
|
|
|
|
|
n2.update!(read: true)
|
|
|
|
|
user.reload
|
|
|
|
|
|
|
|
|
|
expect(user.all_unread_notifications_count).to eq(1)
|
|
|
|
|
|
|
|
|
|
user.update!(seen_notification_id: n2.id)
|
|
|
|
|
user.reload
|
|
|
|
|
|
|
|
|
|
expect(user.all_unread_notifications_count).to eq(0)
|
|
|
|
|
|
|
|
|
|
n3 = Fabricate(:notification, user: user)
|
|
|
|
|
user.reload
|
|
|
|
|
|
|
|
|
|
expect(user.all_unread_notifications_count).to eq(1)
|
|
|
|
|
|
|
|
|
|
n3.topic.trash!(Fabricate(:admin))
|
|
|
|
|
user.reload
|
|
|
|
|
|
|
|
|
|
expect(user.all_unread_notifications_count).to eq(0)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "#bump_last_seen_reviewable!" do
|
|
|
|
|
it "doesn't error if there are no reviewables" do
|
|
|
|
|
Reviewable.destroy_all
|
|
|
|
|
user.bump_last_seen_reviewable!
|
|
|
|
|
expect(user.last_seen_reviewable_id).to eq(nil)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "picks the reviewable of the largest id" do
|
|
|
|
|
user.update!(admin: true)
|
|
|
|
|
Fabricate(:reviewable, created_at: 3.minutes.ago, updated_at: 3.minutes.ago, score: 100)
|
|
|
|
|
reviewable2 =
|
|
|
|
|
Fabricate(:reviewable, created_at: 30.minutes.ago, updated_at: 30.minutes.ago, score: 10)
|
|
|
|
|
user.bump_last_seen_reviewable!
|
|
|
|
|
expect(user.last_seen_reviewable_id).to eq(reviewable2.id)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "stays at the maximum reviewable if there are no new reviewables" do
|
|
|
|
|
user.update!(admin: true)
|
|
|
|
|
reviewable = Fabricate(:reviewable)
|
|
|
|
|
user.bump_last_seen_reviewable!
|
|
|
|
|
expect(user.last_seen_reviewable_id).to eq(reviewable.id)
|
|
|
|
|
user.bump_last_seen_reviewable!
|
|
|
|
|
expect(user.last_seen_reviewable_id).to eq(reviewable.id)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "respects reviewables security" do
|
|
|
|
|
admin = Fabricate(:admin)
|
|
|
|
|
moderator = Fabricate(:moderator)
|
|
|
|
|
group = Fabricate(:group)
|
|
|
|
|
user.update!(groups: [group])
|
|
|
|
|
SiteSetting.enable_category_group_moderation = true
|
|
|
|
|
|
|
|
|
|
group_reviewable =
|
|
|
|
|
Fabricate(:reviewable, reviewable_by_moderator: false, reviewable_by_group: group)
|
|
|
|
|
mod_reviewable = Fabricate(:reviewable, reviewable_by_moderator: true)
|
|
|
|
|
admin_reviewable = Fabricate(:reviewable, reviewable_by_moderator: false)
|
|
|
|
|
|
|
|
|
|
[admin, moderator, user].each(&:bump_last_seen_reviewable!)
|
|
|
|
|
|
|
|
|
|
expect(admin.last_seen_reviewable_id).to eq(admin_reviewable.id)
|
|
|
|
|
expect(moderator.last_seen_reviewable_id).to eq(mod_reviewable.id)
|
|
|
|
|
expect(user.last_seen_reviewable_id).to eq(group_reviewable.id)
|
|
|
|
|
end
|
2022-08-03 23:23:43 +08:00
|
|
|
|
|
|
|
|
|
it "publishes a message to the user's /reviewable_counts message bus channel" do
|
|
|
|
|
user.update!(admin: true)
|
|
|
|
|
Fabricate(:reviewable)
|
|
|
|
|
messages = MessageBus.track_publish { user.bump_last_seen_reviewable! }
|
|
|
|
|
expect(messages.size).to eq(1)
|
|
|
|
|
expect(messages.first).to have_attributes(
|
|
|
|
|
channel: "/reviewable_counts/#{user.id}",
|
|
|
|
|
user_ids: [user.id],
|
2022-12-01 07:09:57 +08:00
|
|
|
|
data: {
|
|
|
|
|
unseen_reviewable_count: 0,
|
|
|
|
|
reviewable_count: 1,
|
|
|
|
|
},
|
2022-08-03 23:23:43 +08:00
|
|
|
|
)
|
|
|
|
|
end
|
2022-08-03 13:57:59 +08:00
|
|
|
|
end
|
2022-09-13 02:19:25 +08:00
|
|
|
|
|
|
|
|
|
describe "#bump_last_seen_notification!" do
|
|
|
|
|
it "doesn't error if there are no notifications" do
|
|
|
|
|
Notification.destroy_all
|
|
|
|
|
expect(user.bump_last_seen_notification!).to eq(false)
|
|
|
|
|
expect(user.reload.seen_notification_id).to eq(0)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "updates seen_notification_id to the last notification that the user can see" do
|
|
|
|
|
last_notification = Fabricate(:notification, user: user)
|
|
|
|
|
deleted_notification = Fabricate(:notification, user: user)
|
|
|
|
|
deleted_notification.topic.trash!
|
2023-06-01 08:00:01 +08:00
|
|
|
|
_someone_else_notification = Fabricate(:notification, user: Fabricate(:user))
|
2022-09-13 02:19:25 +08:00
|
|
|
|
|
|
|
|
|
expect(user.bump_last_seen_notification!).to eq(true)
|
|
|
|
|
expect(user.reload.seen_notification_id).to eq(last_notification.id)
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-10-27 06:38:50 +08:00
|
|
|
|
|
2023-07-27 10:52:33 +08:00
|
|
|
|
describe "#secured_sidebar_category_ids" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
|
|
|
|
fab!(:category)
|
|
|
|
|
fab!(:group)
|
2023-07-27 10:52:33 +08:00
|
|
|
|
fab!(:secured_category) { Fabricate(:private_category, group: group) }
|
|
|
|
|
|
|
|
|
|
fab!(:category_sidebar_section_link) do
|
|
|
|
|
Fabricate(:category_sidebar_section_link, user: user, linkable: category)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
fab!(:secured_category_sidebar_section_link) do
|
|
|
|
|
Fabricate(:category_sidebar_section_link, user: user, linkable: secured_category)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it "should only return the category ids of category sidebar section link records that the user is allowed to see" do
|
|
|
|
|
expect(user.secured_sidebar_category_ids).to contain_exactly(category.id)
|
|
|
|
|
|
|
|
|
|
user.update!(admin: true)
|
|
|
|
|
|
|
|
|
|
expect(user.secured_sidebar_category_ids).to contain_exactly(category.id, secured_category.id)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2022-10-27 06:38:50 +08:00
|
|
|
|
describe "#visible_sidebar_tags" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:user)
|
|
|
|
|
fab!(:tag)
|
2022-10-27 06:38:50 +08:00
|
|
|
|
fab!(:hidden_tag) { Fabricate(:tag, name: "secret") }
|
|
|
|
|
fab!(:staff_tag_group) do
|
|
|
|
|
Fabricate(:tag_group, permissions: { "staff" => 1 }, tag_names: ["secret"])
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2022-10-27 06:38:50 +08:00
|
|
|
|
fab!(:tag_sidebar_section_link) do
|
|
|
|
|
Fabricate(:tag_sidebar_section_link, user: user, linkable: tag)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2022-10-27 06:38:50 +08:00
|
|
|
|
fab!(:tag_sidebar_section_link_2) do
|
|
|
|
|
Fabricate(:tag_sidebar_section_link, user: user, linkable: hidden_tag)
|
2023-01-09 19:18:21 +08:00
|
|
|
|
end
|
2022-10-27 06:38:50 +08:00
|
|
|
|
|
|
|
|
|
it "should only return tag sidebar section link records of tags that the user is allowed to see" do
|
|
|
|
|
expect(user.visible_sidebar_tags).to contain_exactly(tag)
|
|
|
|
|
|
|
|
|
|
user.update!(admin: true)
|
|
|
|
|
|
|
|
|
|
expect(user.visible_sidebar_tags).to contain_exactly(tag, hidden_tag)
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-11-18 11:37:36 +08:00
|
|
|
|
|
|
|
|
|
describe "#secure_category_ids" do
|
2023-11-10 06:47:59 +08:00
|
|
|
|
fab!(:admin)
|
|
|
|
|
fab!(:group)
|
2022-11-18 11:37:36 +08:00
|
|
|
|
fab!(:private_category) { Fabricate(:private_category, group: group) }
|
|
|
|
|
|
|
|
|
|
it "allows admin to see all secure categories" do
|
|
|
|
|
expect(admin.secure_category_ids).to include(private_category.id)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context "when SiteSetting.suppress_secured_categories_from_admin is true" do
|
|
|
|
|
it "hides secure categories from admins" do
|
|
|
|
|
SiteSetting.suppress_secured_categories_from_admin = true
|
|
|
|
|
expect(admin.secure_category_ids).not_to include(private_category.id)
|
|
|
|
|
end
|
|
|
|
|
end
|
2022-12-01 07:05:32 +08:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe "#new_personal_messages_notifications_count" do
|
|
|
|
|
it "returns count of new and unread private_message notifications of the user" do
|
|
|
|
|
another_user = Fabricate(:user)
|
|
|
|
|
|
|
|
|
|
Fabricate(:notification, user: user, read: false)
|
|
|
|
|
|
|
|
|
|
last_seen_id =
|
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: user,
|
|
|
|
|
read: false,
|
|
|
|
|
notification_type: Notification.types[:private_message],
|
|
|
|
|
).id
|
|
|
|
|
|
|
|
|
|
expect(user.new_personal_messages_notifications_count).to eq(1)
|
|
|
|
|
|
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: user,
|
|
|
|
|
read: false,
|
|
|
|
|
notification_type: Notification.types[:private_message],
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: another_user,
|
|
|
|
|
read: false,
|
|
|
|
|
notification_type: Notification.types[:private_message],
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: user,
|
|
|
|
|
read: true,
|
|
|
|
|
notification_type: Notification.types[:private_message],
|
|
|
|
|
)
|
2022-11-18 11:37:36 +08:00
|
|
|
|
|
2022-12-01 07:05:32 +08:00
|
|
|
|
Fabricate(
|
|
|
|
|
:notification,
|
|
|
|
|
user: user,
|
|
|
|
|
read: false,
|
|
|
|
|
notification_type: Notification.types[:replied],
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
user.update!(seen_notification_id: last_seen_id)
|
|
|
|
|
expect(user.new_personal_messages_notifications_count).to eq(1)
|
|
|
|
|
end
|
2022-11-18 11:37:36 +08:00
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
end
|