Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
c9333445
Commit
c9333445
authored
Jan 31, 2022
by
Markus Koller
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch 'issue_220040_12' into 'master'
Fix Rails/SaveBang offenses See merge request gitlab-org/gitlab!75974
parents
18642340
06f13583
Changes
6
Show whitespace changes
Inline
Side-by-side
Showing
6 changed files
with
84 additions
and
90 deletions
+84
-90
.rubocop_todo/rails/save_bang.yml
.rubocop_todo/rails/save_bang.yml
+0
-6
spec/lib/backup/manager_spec.rb
spec/lib/backup/manager_spec.rb
+3
-3
spec/lib/gitlab/analytics/cycle_analytics/records_fetcher_spec.rb
.../gitlab/analytics/cycle_analytics/records_fetcher_spec.rb
+7
-7
spec/lib/gitlab/auth/ldap/user_spec.rb
spec/lib/gitlab/auth/ldap/user_spec.rb
+14
-14
spec/lib/gitlab/auth/o_auth/user_spec.rb
spec/lib/gitlab/auth/o_auth/user_spec.rb
+37
-37
spec/lib/gitlab/auth/saml/user_spec.rb
spec/lib/gitlab/auth/saml/user_spec.rb
+23
-23
No files found.
.rubocop_todo/rails/save_bang.yml
View file @
c9333445
...
...
@@ -2,9 +2,3 @@
Rails/SaveBang
:
Exclude
:
-
ee/spec/lib/analytics/merge_request_metrics_calculator_spec.rb
-
spec/lib/backup/manager_spec.rb
-
spec/lib/gitlab/alerting/alert_spec.rb
-
spec/lib/gitlab/analytics/cycle_analytics/records_fetcher_spec.rb
-
spec/lib/gitlab/auth/ldap/user_spec.rb
-
spec/lib/gitlab/auth/o_auth/user_spec.rb
-
spec/lib/gitlab/auth/saml/user_spec.rb
spec/lib/backup/manager_spec.rb
View file @
c9333445
...
...
@@ -409,7 +409,7 @@ RSpec.describe Backup::Manager do
# the Fog mock only knows about directories we create explicitly
connection
=
::
Fog
::
Storage
.
new
(
Gitlab
.
config
.
backup
.
upload
.
connection
.
symbolize_keys
)
connection
.
directories
.
create
(
key:
Gitlab
.
config
.
backup
.
upload
.
remote_directory
)
connection
.
directories
.
create
(
key:
Gitlab
.
config
.
backup
.
upload
.
remote_directory
)
# rubocop:disable Rails/SaveBang
end
context
'target path'
do
...
...
@@ -455,7 +455,7 @@ RSpec.describe Backup::Manager do
}
)
connection
.
directories
.
create
(
key:
Gitlab
.
config
.
backup
.
upload
.
remote_directory
)
connection
.
directories
.
create
(
key:
Gitlab
.
config
.
backup
.
upload
.
remote_directory
)
# rubocop:disable Rails/SaveBang
end
context
'with SSE-S3 without using storage_options'
do
...
...
@@ -521,7 +521,7 @@ RSpec.describe Backup::Manager do
)
connection
=
::
Fog
::
Storage
.
new
(
Gitlab
.
config
.
backup
.
upload
.
connection
.
symbolize_keys
)
connection
.
directories
.
create
(
key:
Gitlab
.
config
.
backup
.
upload
.
remote_directory
)
connection
.
directories
.
create
(
key:
Gitlab
.
config
.
backup
.
upload
.
remote_directory
)
# rubocop:disable Rails/SaveBang
end
it
'does not attempt to set ACL'
do
...
...
spec/lib/gitlab/analytics/cycle_analytics/records_fetcher_spec.rb
View file @
c9333445
...
...
@@ -43,8 +43,8 @@ RSpec.describe Gitlab::Analytics::CycleAnalytics::RecordsFetcher do
end
before
do
issue1
.
metrics
.
update
(
first_added_to_board_at:
3
.
days
.
ago
,
first_mentioned_in_commit_at:
2
.
days
.
ago
)
issue2
.
metrics
.
update
(
first_added_to_board_at:
3
.
days
.
ago
,
first_mentioned_in_commit_at:
2
.
days
.
ago
)
issue1
.
metrics
.
update
!
(
first_added_to_board_at:
3
.
days
.
ago
,
first_mentioned_in_commit_at:
2
.
days
.
ago
)
issue2
.
metrics
.
update
!
(
first_added_to_board_at:
3
.
days
.
ago
,
first_mentioned_in_commit_at:
2
.
days
.
ago
)
end
context
'when records are loaded by guest'
do
...
...
@@ -73,8 +73,8 @@ RSpec.describe Gitlab::Analytics::CycleAnalytics::RecordsFetcher do
end
before
do
mr1
.
metrics
.
update
(
merged_at:
3
.
days
.
ago
)
mr2
.
metrics
.
update
(
merged_at:
3
.
days
.
ago
)
mr1
.
metrics
.
update
!
(
merged_at:
3
.
days
.
ago
)
mr2
.
metrics
.
update
!
(
merged_at:
3
.
days
.
ago
)
end
include_context
'when records are loaded by maintainer'
...
...
@@ -95,9 +95,9 @@ RSpec.describe Gitlab::Analytics::CycleAnalytics::RecordsFetcher do
end
before
(
:all
)
do
issue1
.
metrics
.
update
(
first_added_to_board_at:
3
.
days
.
ago
,
first_mentioned_in_commit_at:
2
.
days
.
ago
)
issue2
.
metrics
.
update
(
first_added_to_board_at:
3
.
days
.
ago
,
first_mentioned_in_commit_at:
2
.
days
.
ago
)
issue3
.
metrics
.
update
(
first_added_to_board_at:
3
.
days
.
ago
,
first_mentioned_in_commit_at:
2
.
days
.
ago
)
issue1
.
metrics
.
update
!
(
first_added_to_board_at:
3
.
days
.
ago
,
first_mentioned_in_commit_at:
2
.
days
.
ago
)
issue2
.
metrics
.
update
!
(
first_added_to_board_at:
3
.
days
.
ago
,
first_mentioned_in_commit_at:
2
.
days
.
ago
)
issue3
.
metrics
.
update
!
(
first_added_to_board_at:
3
.
days
.
ago
,
first_mentioned_in_commit_at:
2
.
days
.
ago
)
end
before
do
...
...
spec/lib/gitlab/auth/ldap/user_spec.rb
View file @
c9333445
...
...
@@ -53,12 +53,12 @@ RSpec.describe Gitlab::Auth::Ldap::User do
it
"finds the user if already existing"
do
create
(
:omniauth_user
,
extern_uid:
'uid=john smith,ou=people,dc=example,dc=com'
,
provider:
'ldapmain'
)
expect
{
ldap_user
.
save
}.
not_to
change
{
User
.
count
}
expect
{
ldap_user
.
save
}.
not_to
change
{
User
.
count
}
# rubocop:disable Rails/SaveBang
end
it
"connects to existing non-ldap user if the email matches"
do
existing_user
=
create
(
:omniauth_user
,
email:
'john@example.com'
,
provider:
"twitter"
)
expect
{
ldap_user
.
save
}.
not_to
change
{
User
.
count
}
expect
{
ldap_user
.
save
}.
not_to
change
{
User
.
count
}
# rubocop:disable Rails/SaveBang
existing_user
.
reload
expect
(
existing_user
.
ldap_identity
.
extern_uid
).
to
eql
'uid=john smith,ou=people,dc=example,dc=com'
...
...
@@ -67,7 +67,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
it
'connects to existing ldap user if the extern_uid changes'
do
existing_user
=
create
(
:omniauth_user
,
email:
'john@example.com'
,
extern_uid:
'old-uid'
,
provider:
'ldapmain'
)
expect
{
ldap_user
.
save
}.
not_to
change
{
User
.
count
}
expect
{
ldap_user
.
save
}.
not_to
change
{
User
.
count
}
# rubocop:disable Rails/SaveBang
existing_user
.
reload
expect
(
existing_user
.
ldap_identity
.
extern_uid
).
to
eql
'uid=john smith,ou=people,dc=example,dc=com'
...
...
@@ -77,7 +77,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
it
'connects to existing ldap user if the extern_uid changes and email address has upper case characters'
do
existing_user
=
create
(
:omniauth_user
,
email:
'john@example.com'
,
extern_uid:
'old-uid'
,
provider:
'ldapmain'
)
expect
{
ldap_user_upper_case
.
save
}.
not_to
change
{
User
.
count
}
expect
{
ldap_user_upper_case
.
save
}.
not_to
change
{
User
.
count
}
# rubocop:disable Rails/SaveBang
existing_user
.
reload
expect
(
existing_user
.
ldap_identity
.
extern_uid
).
to
eql
'uid=john smith,ou=people,dc=example,dc=com'
...
...
@@ -89,7 +89,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
existing_user
=
create
(
:omniauth_user
,
email:
'john@example.com'
,
provider:
'twitter'
)
expect
(
existing_user
.
identities
.
count
).
to
be
(
1
)
ldap_user
.
save
ldap_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
ldap_user
.
gl_user
.
identities
.
count
).
to
be
(
2
)
# Expect that find_by provider only returns a single instance of an identity and not an Enumerable
...
...
@@ -98,7 +98,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
end
it
"creates a new user if not found"
do
expect
{
ldap_user
.
save
}.
to
change
{
User
.
count
}.
by
(
1
)
expect
{
ldap_user
.
save
}.
to
change
{
User
.
count
}.
by
(
1
)
# rubocop:disable Rails/SaveBang
end
context
'when signup is disabled'
do
...
...
@@ -107,7 +107,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
end
it
'creates the user'
do
ldap_user
.
save
ldap_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_persisted
end
...
...
@@ -119,7 +119,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
end
it
'creates and confirms the user anyway'
do
ldap_user
.
save
ldap_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_persisted
expect
(
gl_user
).
to
be_confirmed
...
...
@@ -132,7 +132,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
end
it
'creates the user'
do
ldap_user
.
save
ldap_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_persisted
end
...
...
@@ -189,7 +189,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
end
it
do
ldap_user
.
save
ldap_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -201,7 +201,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
end
it
do
ldap_user
.
save
ldap_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
to
be_blocked
end
...
...
@@ -210,7 +210,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
context
'sign-in'
do
before
do
ldap_user
.
save
ldap_user
.
save
# rubocop:disable Rails/SaveBang
ldap_user
.
gl_user
.
activate
end
...
...
@@ -220,7 +220,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
end
it
do
ldap_user
.
save
ldap_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -232,7 +232,7 @@ RSpec.describe Gitlab::Auth::Ldap::User do
end
it
do
ldap_user
.
save
ldap_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
spec/lib/gitlab/auth/o_auth/user_spec.rb
View file @
c9333445
...
...
@@ -67,7 +67,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
create
(
:omniauth_user
,
extern_uid:
'my-uid'
,
provider:
provider
)
stub_omniauth_config
(
allow_single_sign_on:
[
provider
],
external_providers:
[
provider
])
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
external
).
to
be_falsey
...
...
@@ -83,7 +83,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
it
'creates the user'
do
stub_omniauth_config
(
allow_single_sign_on:
[
provider
])
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_persisted
end
...
...
@@ -97,7 +97,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
it
'creates and confirms the user anyway'
do
stub_omniauth_config
(
allow_single_sign_on:
[
provider
])
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_persisted
expect
(
gl_user
).
to
be_confirmed
...
...
@@ -112,7 +112,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
it
'creates the user'
do
stub_omniauth_config
(
allow_single_sign_on:
[
provider
])
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_persisted
end
...
...
@@ -121,7 +121,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
it
'marks user as having password_automatically_set'
do
stub_omniauth_config
(
allow_single_sign_on:
[
provider
],
external_providers:
[
provider
])
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_persisted
expect
(
gl_user
).
to
be_password_automatically_set
...
...
@@ -131,7 +131,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
context
'provider is marked as external'
do
it
'marks user as external'
do
stub_omniauth_config
(
allow_single_sign_on:
[
provider
],
external_providers:
[
provider
])
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
external
).
to
be_truthy
end
...
...
@@ -141,7 +141,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
it
'does not mark external user as internal'
do
create
(
:omniauth_user
,
extern_uid:
'my-uid'
,
provider:
provider
,
external:
true
)
stub_omniauth_config
(
allow_single_sign_on:
[
provider
],
external_providers:
[
'facebook'
])
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
external
).
to
be_truthy
end
...
...
@@ -151,9 +151,9 @@ RSpec.describe Gitlab::Auth::OAuth::User do
context
'when adding a new OAuth identity'
do
it
'does not promote an external user to internal'
do
user
=
create
(
:user
,
email:
'john@mail.com'
,
external:
true
)
user
.
identities
.
create
(
provider:
provider
,
extern_uid:
uid
)
user
.
identities
.
create
!
(
provider:
provider
,
extern_uid:
uid
)
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
external
).
to
be_truthy
end
...
...
@@ -166,7 +166,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
"creates a user from Omniauth"
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
identity
=
gl_user
.
identities
.
first
...
...
@@ -181,7 +181,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
"creates a user from Omniauth"
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
identity
=
gl_user
.
identities
.
first
...
...
@@ -196,7 +196,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
'throws an error'
do
expect
{
oauth_user
.
save
}.
to
raise_error
StandardError
expect
{
oauth_user
.
save
}.
to
raise_error
StandardError
# rubocop:disable Rails/SaveBang
end
end
...
...
@@ -206,7 +206,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
'throws an error'
do
expect
{
oauth_user
.
save
}.
to
raise_error
StandardError
expect
{
oauth_user
.
save
}.
to
raise_error
StandardError
# rubocop:disable Rails/SaveBang
end
end
end
...
...
@@ -228,7 +228,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
let!
(
:existing_user
)
{
create
(
:user
,
email:
'john@mail.com'
,
username:
'john'
)
}
it
"adds the OmniAuth identity to the GitLab user account"
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
not_to
be_valid
end
...
...
@@ -248,7 +248,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
let!
(
:existing_user
)
{
create
(
:user
,
email:
'john@mail.com'
,
username:
'john'
)
}
it
"adds the OmniAuth identity to the GitLab user account"
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
username
).
to
eql
'john'
...
...
@@ -277,7 +277,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
let!
(
:existing_user
)
{
create
(
:user
,
email:
'john@mail.com'
,
username:
'john'
)
}
it
"adds the OmniAuth identity to the GitLab user account"
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
username
).
to
eql
'john'
...
...
@@ -337,7 +337,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
before
do
allow
(
Gitlab
::
Auth
::
Ldap
::
Person
).
to
receive
(
:find_by_uid
).
and_return
(
ldap_user
)
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
end
it
"creates a user with dual LDAP and omniauth identities"
do
...
...
@@ -376,7 +376,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
allow
(
Gitlab
::
Auth
::
Ldap
::
Person
).
to
receive
(
:find_by_email
).
with
(
uid
,
any_args
).
and_return
(
nil
)
allow
(
Gitlab
::
Auth
::
Ldap
::
Person
).
to
receive
(
:find_by_email
).
with
(
info_hash
[
:email
],
any_args
).
and_return
(
ldap_user
)
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
end
it
'creates the LDAP identity'
do
...
...
@@ -392,7 +392,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
it
"adds the omniauth identity to the LDAP account"
do
allow
(
Gitlab
::
Auth
::
Ldap
::
Person
).
to
receive
(
:find_by_uid
).
and_return
(
ldap_user
)
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
username
).
to
eql
'john'
...
...
@@ -414,7 +414,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
allow
(
Gitlab
::
Auth
::
Ldap
::
Person
).
to
receive
(
:find_by_uid
).
and_return
(
nil
)
allow
(
Gitlab
::
Auth
::
Ldap
::
Person
).
to
receive
(
:find_by_email
).
and_return
(
ldap_user
)
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
identities_as_hash
=
gl_user
.
identities
.
map
{
|
id
|
{
provider:
id
.
provider
,
extern_uid:
id
.
extern_uid
}
}
expect
(
identities_as_hash
).
to
match_array
(
result_identities
(
dn
,
uid
))
...
...
@@ -426,7 +426,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
allow
(
Gitlab
::
Auth
::
Ldap
::
Person
).
to
receive
(
:find_by_email
).
and_return
(
nil
)
allow
(
Gitlab
::
Auth
::
Ldap
::
Person
).
to
receive
(
:find_by_dn
).
and_return
(
ldap_user
)
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
identities_as_hash
=
gl_user
.
identities
.
map
{
|
id
|
{
provider:
id
.
provider
,
extern_uid:
id
.
extern_uid
}
}
expect
(
identities_as_hash
).
to
match_array
(
result_identities
(
dn
,
uid
))
...
...
@@ -447,7 +447,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
'does not save the identity'
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
identities_as_hash
=
gl_user
.
identities
.
map
{
|
id
|
{
provider:
id
.
provider
,
extern_uid:
id
.
extern_uid
}
}
expect
(
identities_as_hash
).
to
match_array
([{
provider:
'twitter'
,
extern_uid:
uid
}])
...
...
@@ -467,7 +467,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
it
'creates a user favoring the LDAP username and strips email domain'
do
allow
(
Gitlab
::
Auth
::
Ldap
::
Person
).
to
receive
(
:find_by_uid
).
and_return
(
ldap_user
)
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
username
).
to
eql
'johndoe'
...
...
@@ -510,7 +510,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
before
do
allow
(
Gitlab
::
Auth
::
Ldap
::
Person
).
to
receive
(
:find_by_uid
).
and_return
(
ldap_user
)
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
end
it
"creates a user with dual LDAP and omniauth identities"
do
...
...
@@ -549,7 +549,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
it
"adds the omniauth identity to the LDAP account"
do
allow
(
Gitlab
::
Auth
::
Ldap
::
Person
).
to
receive
(
:find_by_uid
).
and_return
(
ldap_user
)
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
username
).
to
eql
'john'
...
...
@@ -584,7 +584,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -596,7 +596,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
to
be_blocked
end
...
...
@@ -622,7 +622,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -636,7 +636,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
to
be_blocked
end
...
...
@@ -654,7 +654,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -668,7 +668,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -678,7 +678,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
context
'sign-in'
do
before
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
oauth_user
.
gl_user
.
activate
end
...
...
@@ -688,7 +688,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -700,7 +700,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -714,7 +714,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -728,7 +728,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
end
it
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -791,7 +791,7 @@ RSpec.describe Gitlab::Auth::OAuth::User do
context
'when collision with existing user'
do
it
'generates the username with a counter'
do
oauth_user
.
save
oauth_user
.
save
# rubocop:disable Rails/SaveBang
oauth_user2
=
described_class
.
new
(
OmniAuth
::
AuthHash
.
new
(
uid:
'my-uid2'
,
provider:
provider
,
info:
{
nickname:
'johngitlab-ETC@othermail.com'
,
email:
'john@othermail.com'
}))
expect
(
oauth_user2
.
gl_user
.
username
).
to
eq
(
'johngitlab-ETC1'
)
...
...
spec/lib/gitlab/auth/saml/user_spec.rb
View file @
c9333445
...
...
@@ -36,7 +36,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
context
'and should bind with SAML'
do
it
'adds the SAML identity to the existing user'
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
to
eq
existing_user
identity
=
gl_user
.
identities
.
first
...
...
@@ -49,7 +49,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
context
'are defined'
do
it
'marks the user as external'
do
stub_saml_group_config
(
%w(Freelancers)
)
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
external
).
to
be_truthy
end
...
...
@@ -61,7 +61,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
context
'are defined but the user does not belong there'
do
it
'does not mark the user as external'
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
external
).
to
be_falsey
end
...
...
@@ -70,7 +70,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
context
'user was external, now should not be'
do
it
'makes user internal'
do
existing_user
.
update_attribute
(
'external'
,
true
)
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
external
).
to
be_falsey
end
...
...
@@ -86,7 +86,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
'creates a user from SAML'
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
identity
=
gl_user
.
identities
.
first
...
...
@@ -101,7 +101,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
'does not throw an error'
do
expect
{
saml_user
.
save
}.
not_to
raise_error
expect
{
saml_user
.
save
}.
not_to
raise_error
# rubocop:disable Rails/SaveBang
end
end
...
...
@@ -111,7 +111,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
'throws an error'
do
expect
{
saml_user
.
save
}.
to
raise_error
StandardError
expect
{
saml_user
.
save
}.
to
raise_error
StandardError
# rubocop:disable Rails/SaveBang
end
end
end
...
...
@@ -120,7 +120,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
context
'are defined'
do
it
'marks the user as external'
do
stub_saml_group_config
(
%w(Freelancers)
)
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
external
).
to
be_truthy
end
...
...
@@ -129,7 +129,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
context
'are defined but the user does not belong there'
do
it
'does not mark the user as external'
do
stub_saml_group_config
(
%w(Interns)
)
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
external
).
to
be_falsey
end
...
...
@@ -170,7 +170,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
context
'and no account for the LDAP user'
do
it
'creates a user with dual LDAP and SAML identities'
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
username
).
to
eql
uid
...
...
@@ -230,7 +230,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
{
provider:
id
.
provider
,
extern_uid:
id
.
extern_uid
}
end
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
username
).
to
eql
'john'
...
...
@@ -259,7 +259,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
'adds the omniauth identity to the LDAP account'
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
.
username
).
to
eql
'john'
...
...
@@ -271,9 +271,9 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
'saves successfully on subsequent tries, when both identities are present'
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
local_saml_user
=
described_class
.
new
(
auth_hash
)
local_saml_user
.
save
local_saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
local_saml_user
.
gl_user
).
to
be_valid
expect
(
local_saml_user
.
gl_user
).
to
be_persisted
...
...
@@ -289,7 +289,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
local_hash
=
OmniAuth
::
AuthHash
.
new
(
uid:
dn
,
provider:
provider
,
info:
info_hash
)
local_saml_user
=
described_class
.
new
(
local_hash
)
local_saml_user
.
save
local_saml_user
.
save
# rubocop:disable Rails/SaveBang
local_gl_user
=
local_saml_user
.
gl_user
expect
(
local_gl_user
).
to
be_valid
...
...
@@ -309,7 +309,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
'creates the user'
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_persisted
end
...
...
@@ -321,7 +321,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
'creates and confirms the user anyway'
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_persisted
expect
(
gl_user
).
to
be_confirmed
...
...
@@ -334,7 +334,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
'creates the user'
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_persisted
end
...
...
@@ -353,7 +353,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
'does not block the user'
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -365,7 +365,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
'blocks user'
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
to
be_blocked
end
...
...
@@ -374,7 +374,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
context
'sign-in'
do
before
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
saml_user
.
gl_user
.
activate
end
...
...
@@ -384,7 +384,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
@@ -396,7 +396,7 @@ RSpec.describe Gitlab::Auth::Saml::User do
end
it
do
saml_user
.
save
saml_user
.
save
# rubocop:disable Rails/SaveBang
expect
(
gl_user
).
to
be_valid
expect
(
gl_user
).
not_to
be_blocked
end
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment