2019-04-29 20:27:42 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2015-10-11 05:41:23 -04:00
|
|
|
require 'rails_helper'
|
2013-03-19 23:18:00 -04:00
|
|
|
|
|
|
|
describe AdminDashboardData do
|
2021-12-19 18:59:11 -05:00
|
|
|
after do
|
|
|
|
AdminDashboardData.reset_problem_checks
|
|
|
|
Discourse.redis.flushdb
|
|
|
|
end
|
2013-03-19 23:18:00 -04:00
|
|
|
|
2021-12-19 18:59:11 -05:00
|
|
|
describe "#fetch_problems" do
|
|
|
|
describe "adding problem messages" do
|
|
|
|
it "adds the message and returns it when the problems are fetched" do
|
|
|
|
AdminDashboardData.add_problem_message("dashboard.bad_favicon_url")
|
|
|
|
problems = AdminDashboardData.fetch_problems.map(&:to_s)
|
|
|
|
expect(problems).to include(I18n.t("dashboard.bad_favicon_url", { base_path: Discourse.base_path }))
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not allow adding of arbitrary problem messages, they must exist in AdminDashboardData.problem_messages" do
|
|
|
|
AdminDashboardData.add_problem_message("errors.messages.invalid")
|
|
|
|
problems = AdminDashboardData.fetch_problems.map(&:to_s)
|
|
|
|
expect(problems).not_to include(I18n.t("errors.messages.invalid"))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "adding new checks" do
|
|
|
|
it 'calls the passed block' do
|
|
|
|
AdminDashboardData.add_problem_check do
|
|
|
|
"a problem was found"
|
|
|
|
end
|
|
|
|
|
|
|
|
problems = AdminDashboardData.fetch_problems
|
|
|
|
expect(problems.map(&:to_s)).to include("a problem was found")
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'calls the passed method' do
|
|
|
|
klass = Class.new(AdminDashboardData) do
|
|
|
|
def my_test_method
|
|
|
|
"a problem was found"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
klass.add_problem_check :my_test_method
|
|
|
|
|
|
|
|
problems = klass.fetch_problems
|
|
|
|
expect(problems.map(&:to_s)).to include("a problem was found")
|
|
|
|
end
|
2015-09-01 16:32:35 -04:00
|
|
|
end
|
2021-12-19 18:59:11 -05:00
|
|
|
end
|
2015-09-01 16:32:35 -04:00
|
|
|
|
2021-12-19 18:59:11 -05:00
|
|
|
describe "adding scheduled checks" do
|
|
|
|
it "adds the passed block to the scheduled checks" do
|
2015-08-25 20:07:40 -04:00
|
|
|
called = false
|
2021-12-19 18:59:11 -05:00
|
|
|
AdminDashboardData.add_scheduled_problem_check(:test_identifier) do
|
2015-08-25 20:07:40 -04:00
|
|
|
called = true
|
|
|
|
end
|
|
|
|
|
2021-12-19 18:59:11 -05:00
|
|
|
AdminDashboardData.execute_scheduled_checks
|
2018-01-11 01:46:10 -05:00
|
|
|
expect(called).to eq(true)
|
2015-08-25 20:07:40 -04:00
|
|
|
end
|
|
|
|
|
2021-12-19 18:59:11 -05:00
|
|
|
it "adds a found problem from a scheduled check" do
|
|
|
|
AdminDashboardData.add_scheduled_problem_check(:test_identifier) do
|
|
|
|
AdminDashboardData::Problem.new("test problem")
|
2015-08-25 20:07:40 -04:00
|
|
|
end
|
|
|
|
|
2021-12-19 18:59:11 -05:00
|
|
|
AdminDashboardData.execute_scheduled_checks
|
|
|
|
problems = AdminDashboardData.load_found_scheduled_check_problems
|
|
|
|
expect(problems.first).to be_a(AdminDashboardData::Problem)
|
|
|
|
expect(problems.first.message).to eq("test problem")
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not add duplicate problems with the same identifier" do
|
|
|
|
prob1 = AdminDashboardData::Problem.new("test problem", identifier: "test")
|
|
|
|
prob2 = AdminDashboardData::Problem.new("test problem 2", identifier: "test")
|
|
|
|
AdminDashboardData.add_found_scheduled_check_problem(prob1)
|
|
|
|
AdminDashboardData.add_found_scheduled_check_problem(prob2)
|
|
|
|
expect(AdminDashboardData.load_found_scheduled_check_problems.map(&:to_s)).to eq(["test problem"])
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not error when loading malformed problems saved in redis" do
|
|
|
|
Discourse.redis.set(AdminDashboardData::SCHEDULED_PROBLEM_STORAGE_KEY, "{ 'badjson")
|
|
|
|
expect(AdminDashboardData.load_found_scheduled_check_problems).to eq([])
|
|
|
|
end
|
|
|
|
|
|
|
|
it "clears a specific problem by identifier" do
|
|
|
|
prob1 = AdminDashboardData::Problem.new("test problem 1", identifier: "test")
|
|
|
|
AdminDashboardData.add_found_scheduled_check_problem(prob1)
|
|
|
|
AdminDashboardData.clear_found_problem("test")
|
|
|
|
expect(AdminDashboardData.load_found_scheduled_check_problems).to eq([])
|
|
|
|
end
|
|
|
|
|
|
|
|
it "defaults to low priority, and uses low priority if an invalid priority is passed" do
|
|
|
|
prob1 = AdminDashboardData::Problem.new("test problem 1")
|
|
|
|
prob2 = AdminDashboardData::Problem.new("test problem 2", priority: "superbad")
|
|
|
|
expect(prob1.priority).to eq("low")
|
|
|
|
expect(prob2.priority).to eq("low")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'stats cache' do
|
|
|
|
include_examples 'stats cacheable'
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#problem_message_check' do
|
|
|
|
let(:key) { AdminDashboardData.problem_messages.first }
|
|
|
|
|
|
|
|
after do
|
|
|
|
described_class.clear_problem_message(key)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns nil if message has not been added' do
|
|
|
|
expect(described_class.problem_message_check(key)).to be_nil
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a message if it was added' do
|
|
|
|
described_class.add_problem_message(key)
|
|
|
|
expect(described_class.problem_message_check(key)).to eq(I18n.t(key, base_path: Discourse.base_path))
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a message if it was added with an expiry' do
|
|
|
|
described_class.add_problem_message(key, 300)
|
|
|
|
expect(described_class.problem_message_check(key)).to eq(I18n.t(key, base_path: Discourse.base_path))
|
2015-08-25 20:07:40 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-03-19 23:18:00 -04:00
|
|
|
describe "rails_env_check" do
|
2013-11-18 13:44:55 -05:00
|
|
|
subject { described_class.new.rails_env_check }
|
2013-03-19 23:18:00 -04:00
|
|
|
|
|
|
|
it 'returns nil when running in production mode' do
|
2014-08-18 06:08:25 -04:00
|
|
|
Rails.stubs(env: ActiveSupport::StringInquirer.new('production'))
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to be_nil
|
2013-03-19 23:18:00 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a string when running in development mode' do
|
2014-08-18 06:08:25 -04:00
|
|
|
Rails.stubs(env: ActiveSupport::StringInquirer.new('development'))
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to_not be_nil
|
2013-03-19 23:18:00 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a string when running in test mode' do
|
2014-08-18 06:08:25 -04:00
|
|
|
Rails.stubs(env: ActiveSupport::StringInquirer.new('test'))
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to_not be_nil
|
2013-03-19 23:18:00 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-03-20 15:38:28 -04:00
|
|
|
describe 'host_names_check' do
|
2013-11-18 13:44:55 -05:00
|
|
|
subject { described_class.new.host_names_check }
|
2013-03-20 15:38:28 -04:00
|
|
|
|
|
|
|
it 'returns nil when host_names is set' do
|
|
|
|
Discourse.stubs(:current_hostname).returns('something.com')
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to be_nil
|
2013-03-20 15:38:28 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a string when host_name is localhost' do
|
|
|
|
Discourse.stubs(:current_hostname).returns('localhost')
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to_not be_nil
|
2013-03-20 15:38:28 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a string when host_name is production.localhost' do
|
|
|
|
Discourse.stubs(:current_hostname).returns('production.localhost')
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to_not be_nil
|
2013-03-20 15:38:28 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-03-22 11:35:32 -04:00
|
|
|
describe 'sidekiq_check' do
|
2013-11-18 13:44:55 -05:00
|
|
|
subject { described_class.new.sidekiq_check }
|
2013-03-22 11:35:32 -04:00
|
|
|
|
|
|
|
it 'returns nil when sidekiq processed a job recently' do
|
|
|
|
Jobs.stubs(:last_job_performed_at).returns(1.minute.ago)
|
|
|
|
Jobs.stubs(:queued).returns(0)
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to be_nil
|
2013-03-22 11:35:32 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns nil when last job processed was a long time ago, but no jobs are queued' do
|
|
|
|
Jobs.stubs(:last_job_performed_at).returns(7.days.ago)
|
|
|
|
Jobs.stubs(:queued).returns(0)
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to be_nil
|
2013-03-22 11:35:32 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns nil when no jobs have ever been processed, but no jobs are queued' do
|
|
|
|
Jobs.stubs(:last_job_performed_at).returns(nil)
|
|
|
|
Jobs.stubs(:queued).returns(0)
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to be_nil
|
2013-03-22 11:35:32 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a string when no jobs were processed recently and some jobs are queued' do
|
|
|
|
Jobs.stubs(:last_job_performed_at).returns(20.minutes.ago)
|
|
|
|
Jobs.stubs(:queued).returns(1)
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to_not be_nil
|
2013-03-22 11:35:32 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a string when no jobs have ever been processed, and some jobs are queued' do
|
|
|
|
Jobs.stubs(:last_job_performed_at).returns(nil)
|
|
|
|
Jobs.stubs(:queued).returns(1)
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to_not be_nil
|
2013-03-22 11:35:32 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-03-22 15:47:25 -04:00
|
|
|
describe 'ram_check' do
|
2013-11-18 13:44:55 -05:00
|
|
|
subject { described_class.new.ram_check }
|
2013-03-22 15:47:25 -04:00
|
|
|
|
|
|
|
it 'returns nil when total ram is 1 GB' do
|
|
|
|
MemInfo.any_instance.stubs(:mem_total).returns(1025272)
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to be_nil
|
2013-03-22 15:47:25 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns nil when total ram cannot be determined' do
|
|
|
|
MemInfo.any_instance.stubs(:mem_total).returns(nil)
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to be_nil
|
2013-03-22 15:47:25 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a string when total ram is less than 1 GB' do
|
|
|
|
MemInfo.any_instance.stubs(:mem_total).returns(512636)
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to_not be_nil
|
2013-03-22 15:47:25 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-03-29 13:31:00 -04:00
|
|
|
describe 'auth_config_checks' do
|
|
|
|
|
2013-05-29 13:54:49 -04:00
|
|
|
shared_examples 'problem detection for login providers' do
|
2013-03-29 13:31:00 -04:00
|
|
|
context 'when disabled' do
|
|
|
|
it 'returns nil' do
|
2019-05-06 21:00:09 -04:00
|
|
|
SiteSetting.set(enable_setting, false)
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to be_nil
|
2013-03-29 13:31:00 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when enabled' do
|
|
|
|
before do
|
2019-05-06 21:00:09 -04:00
|
|
|
SiteSetting.set(enable_setting, true)
|
2013-03-29 13:31:00 -04:00
|
|
|
end
|
|
|
|
|
2017-02-15 03:04:10 -05:00
|
|
|
it 'returns nil when key and secret are set' do
|
2019-05-06 21:00:09 -04:00
|
|
|
SiteSetting.set(key, '12313213')
|
|
|
|
SiteSetting.set(secret, '12312313123')
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to be_nil
|
2013-03-29 13:31:00 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a string when key is not set' do
|
2019-05-06 21:00:09 -04:00
|
|
|
SiteSetting.set(key, '')
|
|
|
|
SiteSetting.set(secret, '12312313123')
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to_not be_nil
|
2013-03-29 13:31:00 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a string when secret is not set' do
|
2019-05-06 21:00:09 -04:00
|
|
|
SiteSetting.set(key, '123123')
|
|
|
|
SiteSetting.set(secret, '')
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to_not be_nil
|
2013-03-29 13:31:00 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a string when key and secret are not set' do
|
2019-05-06 21:00:09 -04:00
|
|
|
SiteSetting.set(key, '')
|
|
|
|
SiteSetting.set(secret, '')
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(subject).to_not be_nil
|
2013-03-29 13:31:00 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'facebook' do
|
2013-11-18 13:44:55 -05:00
|
|
|
subject { described_class.new.facebook_config_check }
|
2013-03-29 13:31:00 -04:00
|
|
|
let(:enable_setting) { :enable_facebook_logins }
|
|
|
|
let(:key) { :facebook_app_id }
|
|
|
|
let(:secret) { :facebook_app_secret }
|
2013-05-29 13:54:49 -04:00
|
|
|
include_examples 'problem detection for login providers'
|
2013-03-29 13:31:00 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'twitter' do
|
2013-11-18 13:44:55 -05:00
|
|
|
subject { described_class.new.twitter_config_check }
|
2013-03-29 13:31:00 -04:00
|
|
|
let(:enable_setting) { :enable_twitter_logins }
|
|
|
|
let(:key) { :twitter_consumer_key }
|
|
|
|
let(:secret) { :twitter_consumer_secret }
|
2013-05-29 13:54:49 -04:00
|
|
|
include_examples 'problem detection for login providers'
|
2013-03-29 13:31:00 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'github' do
|
2013-11-18 13:44:55 -05:00
|
|
|
subject { described_class.new.github_config_check }
|
2013-03-29 13:31:00 -04:00
|
|
|
let(:enable_setting) { :enable_github_logins }
|
|
|
|
let(:key) { :github_client_id }
|
|
|
|
let(:secret) { :github_client_secret }
|
2013-05-29 13:54:49 -04:00
|
|
|
include_examples 'problem detection for login providers'
|
2013-03-29 13:31:00 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-01-11 01:46:10 -05:00
|
|
|
describe 'force_https_check' do
|
|
|
|
subject { described_class.new(check_force_https: true).force_https_check }
|
|
|
|
|
|
|
|
it 'returns nil if force_https site setting enabled' do
|
|
|
|
SiteSetting.force_https = true
|
|
|
|
expect(subject).to be_nil
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns nil if force_https site setting not enabled' do
|
|
|
|
SiteSetting.force_https = false
|
2018-11-07 11:59:42 -05:00
|
|
|
expect(subject).to eq(I18n.t('dashboard.force_https_warning', base_path: Discourse.base_path))
|
2018-01-11 01:46:10 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'ignore force_https_check' do
|
|
|
|
subject { described_class.new(check_force_https: false).force_https_check }
|
|
|
|
|
|
|
|
it 'returns nil' do
|
|
|
|
SiteSetting.force_https = true
|
|
|
|
expect(subject).to be_nil
|
|
|
|
|
|
|
|
SiteSetting.force_https = false
|
|
|
|
expect(subject).to be_nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-08-02 19:53:48 -04:00
|
|
|
describe '#out_of_date_themes' do
|
|
|
|
let(:remote) { RemoteTheme.create!(remote_url: "https://github.com/org/testtheme") }
|
2018-08-08 00:46:34 -04:00
|
|
|
let!(:theme) { Fabricate(:theme, remote_theme: remote, name: "Test< Theme") }
|
2018-08-02 19:53:48 -04:00
|
|
|
|
|
|
|
it "outputs correctly formatted html" do
|
|
|
|
remote.update!(local_version: "old version", remote_version: "new version", commits_behind: 2)
|
|
|
|
dashboard_data = described_class.new
|
|
|
|
expect(dashboard_data.out_of_date_themes).to eq(
|
|
|
|
I18n.t("dashboard.out_of_date_themes") + "<ul><li><a href=\"/admin/customize/themes/#{theme.id}\">Test< Theme</a></li></ul>"
|
|
|
|
)
|
|
|
|
|
|
|
|
remote.update!(local_version: "new version", commits_behind: 0)
|
|
|
|
expect(dashboard_data.out_of_date_themes).to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
2018-09-08 09:24:11 -04:00
|
|
|
|
|
|
|
describe '#unreachable_themes' do
|
|
|
|
let(:remote) { RemoteTheme.create!(remote_url: "https://github.com/org/testtheme", last_error_text: "can't reach repo :'(") }
|
|
|
|
let!(:theme) { Fabricate(:theme, remote_theme: remote, name: "Test< Theme") }
|
|
|
|
|
|
|
|
it "outputs correctly formatted html" do
|
|
|
|
dashboard_data = described_class.new
|
|
|
|
expect(dashboard_data.unreachable_themes).to eq(
|
|
|
|
I18n.t("dashboard.unreachable_themes") + "<ul><li><a href=\"/admin/customize/themes/#{theme.id}\">Test< Theme</a></li></ul>"
|
|
|
|
)
|
|
|
|
|
|
|
|
remote.update!(last_error_text: nil)
|
|
|
|
expect(dashboard_data.out_of_date_themes).to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
2013-04-29 22:43:21 -04:00
|
|
|
end
|