#-- encoding: UTF-8 #-- copyright # ChiliProject is a project management system. # # Copyright (C) 2010-2011 the ChiliProject Team # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # # See doc/COPYRIGHT.rdoc for more details. #++ require File.expand_path('../../test_helper', __FILE__) class UserTest < ActiveSupport::TestCase fixtures :users, :members, :projects, :projects_trackers, :trackers, :roles, :member_roles, :auth_sources def setup @admin = User.find(1) @jsmith = User.find(2) @dlopper = User.find(3) end test 'object_daddy creation' do User.generate_with_protected!(:firstname => 'Testing connection') User.generate_with_protected!(:firstname => 'Testing connection') assert_equal 2, User.count(:all, :conditions => {:firstname => 'Testing connection'}) end def test_truth assert_kind_of User, @jsmith end def test_mail_should_be_stripped u = User.new u.mail = " foo@bar.com " assert_equal "foo@bar.com", u.mail end def test_create user = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo") user.login = "jsmith" user.password, user.password_confirmation = "password", "password" # login uniqueness assert !user.save assert_equal 1, user.errors.count user.login = "newuser" user.password, user.password_confirmation = "passwd", "password" # password confirmation assert !user.save assert_equal 1, user.errors.count user.password, user.password_confirmation = "password", "password" assert user.save end context "User#before_create" do should "set the mail_notification to the default Setting" do @user1 = User.generate_with_protected! assert_equal 'only_my_events', @user1.mail_notification with_settings :default_notification_option => 'all' do @user2 = User.generate_with_protected! assert_equal 'all', @user2.mail_notification end end end context "User.login" do should "be case-insensitive." do u = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo") u.login = 'newuser' u.password, u.password_confirmation = "password", "password" assert u.save u = User.new(:firstname => "Similar", :lastname => "User", :mail => "similaruser@somenet.foo") u.login = 'NewUser' u.password, u.password_confirmation = "password", "password" assert !u.save assert_equal I18n.translate('activerecord.errors.messages.taken'), u.errors.on(:login) end end def test_mail_uniqueness_should_not_be_case_sensitive u = User.new(:firstname => "new", :lastname => "user", :mail => "newuser@somenet.foo") u.login = 'newuser1' u.password, u.password_confirmation = "password", "password" assert u.save u = User.new(:firstname => "new", :lastname => "user", :mail => "newUser@Somenet.foo") u.login = 'newuser2' u.password, u.password_confirmation = "password", "password" assert !u.save assert_equal I18n.translate('activerecord.errors.messages.taken'), u.errors.on(:mail) end def test_update assert_equal "admin", @admin.login @admin.login = "john" assert @admin.save, @admin.errors.full_messages.join("; ") @admin.reload assert_equal "john", @admin.login end def test_destroy User.find(2).destroy assert_nil User.find_by_id(2) assert Member.find_all_by_user_id(2).empty? end def test_validate_login_presence @admin.login = "" assert !@admin.save assert_equal 1, @admin.errors.count end def test_validate_mail_notification_inclusion u = User.new u.mail_notification = 'foo' u.save assert_not_nil u.errors.on(:mail_notification) end context "User#try_to_login" do should "fall-back to case-insensitive if user login is not found as-typed." do user = User.try_to_login("AdMin", "admin") assert_kind_of User, user assert_equal "admin", user.login end should "select the exact matching user first" do case_sensitive_user = User.generate_with_protected!(:login => 'changed', :password => 'admin', :password_confirmation => 'admin') # bypass validations to make it appear like existing data case_sensitive_user.update_attribute(:login, 'ADMIN') user = User.try_to_login("ADMIN", "admin") assert_kind_of User, user assert_equal "ADMIN", user.login end end def test_password user = User.try_to_login("admin", "admin") assert_kind_of User, user assert_equal "admin", user.login user.password = "hello" assert user.save user = User.try_to_login("admin", "hello") assert_kind_of User, user assert_equal "admin", user.login end def test_name_format assert_equal 'Smith, John', @jsmith.name(:lastname_coma_firstname) Setting.user_format = :firstname_lastname assert_equal 'John Smith', @jsmith.reload.name Setting.user_format = :username assert_equal 'jsmith', @jsmith.reload.name end def test_lock user = User.try_to_login("jsmith", "jsmith") assert_equal @jsmith, user @jsmith.status = User::STATUS_LOCKED assert @jsmith.save user = User.try_to_login("jsmith", "jsmith") assert_equal nil, user end context ".try_to_login" do context "with good credentials" do should "return the user" do user = User.try_to_login("admin", "admin") assert_kind_of User, user assert_equal "admin", user.login end end context "with wrong credentials" do should "return nil" do assert_nil User.try_to_login("admin", "foo") end end end if ldap_configured? context "#try_to_login using LDAP" do context "with failed connection to the LDAP server" do should "return nil" do @auth_source = AuthSourceLdap.find(1) AuthSource.any_instance.stubs(:initialize_ldap_con).raises(Net::LDAP::LdapError, 'Cannot connect') assert_equal nil, User.try_to_login('edavis', 'wrong') end end context "with an unsuccessful authentication" do should "return nil" do assert_equal nil, User.try_to_login('edavis', 'wrong') end end context "on the fly registration" do setup do @auth_source = AuthSourceLdap.find(1) end context "with a successful authentication" do should "create a new user account if it doesn't exist" do assert_difference('User.count') do user = User.try_to_login('edavis', '123456') assert !user.admin? end end should "retrieve existing user" do user = User.try_to_login('edavis', '123456') user.admin = true user.save! assert_no_difference('User.count') do user = User.try_to_login('edavis', '123456') assert user.admin? end end end end end else puts "Skipping LDAP tests." end def test_create_anonymous AnonymousUser.delete_all anon = User.anonymous assert !anon.new_record? assert_kind_of AnonymousUser, anon end should_have_one :rss_token def test_rss_key assert_nil @jsmith.rss_token key = @jsmith.rss_key assert_equal 40, key.length @jsmith.reload assert_equal key, @jsmith.rss_key end should_have_one :api_token context "User#api_key" do should "generate a new one if the user doesn't have one" do user = User.generate_with_protected!(:api_token => nil) assert_nil user.api_token key = user.api_key assert_equal 40, key.length user.reload assert_equal key, user.api_key end should "return the existing api token value" do user = User.generate_with_protected! token = Token.generate!(:action => 'api') user.api_token = token assert user.save assert_equal token.value, user.api_key end end context "User#find_by_api_key" do should "return nil if no matching key is found" do assert_nil User.find_by_api_key('zzzzzzzzz') end should "return nil if the key is found for an inactive user" do user = User.generate_with_protected!(:status => User::STATUS_LOCKED) token = Token.generate!(:action => 'api') user.api_token = token user.save assert_nil User.find_by_api_key(token.value) end should "return the user if the key is found for an active user" do user = User.generate_with_protected!(:status => User::STATUS_ACTIVE) token = Token.generate!(:action => 'api') user.api_token = token user.save assert_equal user, User.find_by_api_key(token.value) end end def test_roles_for_project # user with a role roles = @jsmith.roles_for_project(Project.find(1)) assert_kind_of Role, roles.first assert_equal "Manager", roles.first.name # user with no role assert_nil @dlopper.roles_for_project(Project.find(2)).detect {|role| role.member?} end def test_projects_by_role_for_user_with_role user = User.find(2) assert_kind_of Hash, user.projects_by_role assert_equal 2, user.projects_by_role.size assert_equal [1,5], user.projects_by_role[Role.find(1)].collect(&:id).sort assert_equal [2], user.projects_by_role[Role.find(2)].collect(&:id).sort end def test_projects_by_role_for_user_with_no_role user = User.generate! assert_equal({}, user.projects_by_role) end def test_projects_by_role_for_anonymous assert_equal({}, User.anonymous.projects_by_role) end def test_valid_notification_options # without memberships assert_equal 5, User.find(7).valid_notification_options.size # with memberships assert_equal 6, User.find(2).valid_notification_options.size end def test_valid_notification_options_class_method assert_equal 5, User.valid_notification_options.size assert_equal 5, User.valid_notification_options(User.find(7)).size assert_equal 6, User.valid_notification_options(User.find(2)).size end def test_mail_notification_all @jsmith.mail_notification = 'all' @jsmith.notified_project_ids = [] @jsmith.save @jsmith.reload assert @jsmith.projects.first.recipients.include?(@jsmith.mail) end def test_mail_notification_selected @jsmith.mail_notification = 'selected' @jsmith.notified_project_ids = [1] @jsmith.save @jsmith.reload assert Project.find(1).recipients.include?(@jsmith.mail) end def test_mail_notification_only_my_events @jsmith.mail_notification = 'only_my_events' @jsmith.notified_project_ids = [] @jsmith.save @jsmith.reload assert !@jsmith.projects.first.recipients.include?(@jsmith.mail) end def test_comments_sorting_preference assert !@jsmith.wants_comments_in_reverse_order? @jsmith.pref.comments_sorting = 'asc' assert !@jsmith.wants_comments_in_reverse_order? @jsmith.pref.comments_sorting = 'desc' assert @jsmith.wants_comments_in_reverse_order? end def test_find_by_mail_should_be_case_insensitive u = User.find_by_mail('JSmith@somenet.foo') assert_not_nil u assert_equal 'jsmith@somenet.foo', u.mail end def test_random_password u = User.new u.random_password assert !u.password.blank? assert !u.password_confirmation.blank? end context "#change_password_allowed?" do should "be allowed if no auth source is set" do user = User.generate_with_protected! assert user.change_password_allowed? end should "delegate to the auth source" do user = User.generate_with_protected! allowed_auth_source = AuthSource.generate! def allowed_auth_source.allow_password_changes?; true; end denied_auth_source = AuthSource.generate! def denied_auth_source.allow_password_changes?; false; end assert user.change_password_allowed? user.auth_source = allowed_auth_source assert user.change_password_allowed?, "User not allowed to change password, though auth source does" user.auth_source = denied_auth_source assert !user.change_password_allowed?, "User allowed to change password, though auth source does not" end end context "#allowed_to?" do context "with a unique project" do should "return false if project is archived" do project = Project.find(1) Project.any_instance.stubs(:status).returns(Project::STATUS_ARCHIVED) assert ! @admin.allowed_to?(:view_issues, Project.find(1)) end should "return false if related module is disabled" do project = Project.find(1) project.enabled_module_names = ["issue_tracking"] assert @admin.allowed_to?(:add_issues, project) assert ! @admin.allowed_to?(:view_wiki_pages, project) end should "authorize nearly everything for admin users" do project = Project.find(1) project.enabled_module_names = ["issue_tracking", "news", "wiki", "repository"] assert ! @admin.member_of?(project) %w(edit_issues delete_issues manage_news manage_repository manage_wiki).each do |p| assert @admin.allowed_to?(p.to_sym, project) end end should "authorize normal users depending on their roles" do project = Project.find(1) project.enabled_module_names = ["boards"] assert @jsmith.allowed_to?(:delete_messages, project) #Manager assert ! @dlopper.allowed_to?(:delete_messages, project) #Developper end should "only managers are allowed to export tickets" do project = Project.find(1) project.enabled_module_names = ["issue_tracking"] assert @jsmith.allowed_to?(:export_issues, project) #Manager assert ! @dlopper.allowed_to?(:export_issues, project) #Developper end end context "with multiple projects" do should "return false if array is empty" do assert ! @admin.allowed_to?(:view_project, []) end should "return true only if user has permission on all these projects" do Project.all.each do |project| project.enabled_module_names = ["issue_tracking"] project.save! end assert @admin.allowed_to?(:view_project, Project.all) assert ! @dlopper.allowed_to?(:view_project, Project.all) #cannot see Project(2) assert @jsmith.allowed_to?(:edit_issues, @jsmith.projects) #Manager or Developer everywhere assert ! @jsmith.allowed_to?(:delete_issue_watchers, @jsmith.projects) #Dev cannot delete_issue_watchers end should "behave correctly with arrays of 1 project" do assert ! User.anonymous.allowed_to?(:delete_issues, [Project.first]) end end context "with options[:global]" do should "authorize if user has at least one role that has this permission" do @dlopper2 = User.find(5) #only Developper on a project, not Manager anywhere @anonymous = User.find(6) assert @jsmith.allowed_to?(:delete_issue_watchers, nil, :global => true) assert ! @dlopper2.allowed_to?(:delete_issue_watchers, nil, :global => true) assert @dlopper2.allowed_to?(:add_issues, nil, :global => true) assert ! @anonymous.allowed_to?(:add_issues, nil, :global => true) assert @anonymous.allowed_to?(:view_issues, nil, :global => true) end end end context "User#notify_about?" do context "Issues" do setup do @project = Project.find(1) @author = User.generate_with_protected! @assignee = User.generate_with_protected! @issue = Issue.generate_for_project!(@project, :assigned_to => @assignee, :author => @author) end should "be true for a user with :all" do @author.update_attribute(:mail_notification, 'all') assert @author.notify_about?(@issue) end should "be false for a user with :none" do @author.update_attribute(:mail_notification, 'none') assert ! @author.notify_about?(@issue) end should "be false for a user with :only_my_events and isn't an author, creator, or assignee" do @user = User.generate_with_protected!(:mail_notification => 'only_my_events') (Member.new.tap do |m| m.force_attributes = { :user => @user, :project => @project, :role_ids => [1] } end).save! assert ! @user.notify_about?(@issue) end should "be true for a user with :only_my_events and is the author" do @author.update_attribute(:mail_notification, 'only_my_events') assert @author.notify_about?(@issue) end should "be true for a user with :only_my_events and is the assignee" do @assignee.update_attribute(:mail_notification, 'only_my_events') assert @assignee.notify_about?(@issue) end should "be true for a user with :only_assigned and is the assignee" do @assignee.update_attribute(:mail_notification, 'only_assigned') assert @assignee.notify_about?(@issue) end should "be false for a user with :only_assigned and is not the assignee" do @author.update_attribute(:mail_notification, 'only_assigned') assert ! @author.notify_about?(@issue) end should "be true for a user with :only_owner and is the author" do @author.update_attribute(:mail_notification, 'only_owner') assert @author.notify_about?(@issue) end should "be false for a user with :only_owner and is not the author" do @assignee.update_attribute(:mail_notification, 'only_owner') assert ! @assignee.notify_about?(@issue) end should "be true for a user with :selected and is the author" do @author.update_attribute(:mail_notification, 'selected') assert @author.notify_about?(@issue) end should "be true for a user with :selected and is the assignee" do @assignee.update_attribute(:mail_notification, 'selected') assert @assignee.notify_about?(@issue) end should "be false for a user with :selected and is not the author or assignee" do @user = User.generate_with_protected!(:mail_notification => 'selected') (Member.new.tap do |m| m.force_attributes = { :user => @user, :project => @project, :role_ids => [1] } end).save! assert ! @user.notify_about?(@issue) end end context "other events" do should 'be added and tested' end end def test_salt_unsalted_passwords # Restore a user with an unsalted password user = User.find(1) user.salt = nil user.hashed_password = User.hash_password("unsalted") user.save! User.salt_unsalted_passwords! user.reload # Salt added assert !user.salt.blank? # Password still valid assert user.check_password?("unsalted") assert_equal user, User.try_to_login(user.login, "unsalted") end if Object.const_defined?(:OpenID) def test_setting_identity_url normalized_open_id_url = 'http://example.com/' u = User.new( :identity_url => 'http://example.com/' ) assert_equal normalized_open_id_url, u.identity_url end def test_setting_identity_url_without_trailing_slash normalized_open_id_url = 'http://example.com/' u = User.new( :identity_url => 'http://example.com' ) assert_equal normalized_open_id_url, u.identity_url end def test_setting_identity_url_without_protocol normalized_open_id_url = 'http://example.com/' u = User.new( :identity_url => 'example.com' ) assert_equal normalized_open_id_url, u.identity_url end def test_setting_blank_identity_url u = User.new( :identity_url => 'example.com' ) u.identity_url = '' assert u.identity_url.blank? end def test_setting_invalid_identity_url u = User.new( :identity_url => 'this is not an openid url' ) assert u.identity_url.blank? end else puts "Skipping openid tests." end end