2019-04-29 20:27:42 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-03-07 22:54:31 -05:00
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
RSpec.describe CurrentUserSerializer do
|
|
|
|
context "when SSO is not enabled" do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:user) { Fabricate(:user) }
|
2018-03-07 22:54:31 -05:00
|
|
|
let :serializer do
|
|
|
|
CurrentUserSerializer.new(user, scope: Guardian.new, root: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should not include the external_id field" do
|
|
|
|
payload = serializer.as_json
|
|
|
|
expect(payload).not_to have_key(:external_id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when SSO is enabled" do
|
|
|
|
let :user do
|
|
|
|
user = Fabricate(:user)
|
|
|
|
SingleSignOnRecord.create!(user_id: user.id, external_id: '12345', last_payload: '')
|
|
|
|
user
|
|
|
|
end
|
|
|
|
|
|
|
|
let :serializer do
|
|
|
|
CurrentUserSerializer.new(user, scope: Guardian.new, root: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should include the external_id" do
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.discourse_connect_url = "http://example.com/discourse_sso"
|
|
|
|
SiteSetting.discourse_connect_secret = "12345678910"
|
|
|
|
SiteSetting.enable_discourse_connect = true
|
2018-03-07 22:54:31 -05:00
|
|
|
payload = serializer.as_json
|
|
|
|
expect(payload[:external_id]).to eq("12345")
|
|
|
|
end
|
|
|
|
end
|
2018-07-27 02:41:07 -04:00
|
|
|
|
|
|
|
context "#top_category_ids" do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:user) { Fabricate(:user) }
|
|
|
|
fab!(:category1) { Fabricate(:category) }
|
|
|
|
fab!(:category2) { Fabricate(:category) }
|
|
|
|
fab!(:category3) { Fabricate(:category) }
|
2018-07-27 02:41:07 -04:00
|
|
|
let :serializer do
|
|
|
|
CurrentUserSerializer.new(user, scope: Guardian.new, root: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should include empty top_category_ids array" do
|
|
|
|
payload = serializer.as_json
|
|
|
|
expect(payload[:top_category_ids]).to eq([])
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should include correct id in top_category_ids array" do
|
2019-04-30 02:58:18 -04:00
|
|
|
_category = Category.first
|
2018-07-27 02:41:07 -04:00
|
|
|
CategoryUser.create!(user_id: user.id,
|
|
|
|
category_id: category1.id,
|
|
|
|
notification_level: CategoryUser.notification_levels[:tracking])
|
|
|
|
|
|
|
|
CategoryUser.create!(user_id: user.id,
|
|
|
|
category_id: category2.id,
|
|
|
|
notification_level: CategoryUser.notification_levels[:watching])
|
2018-07-30 06:36:36 -04:00
|
|
|
|
|
|
|
CategoryUser.create!(user_id: user.id,
|
|
|
|
category_id: category3.id,
|
|
|
|
notification_level: CategoryUser.notification_levels[:regular])
|
|
|
|
|
2018-07-27 02:41:07 -04:00
|
|
|
payload = serializer.as_json
|
|
|
|
expect(payload[:top_category_ids]).to eq([category2.id, category1.id])
|
|
|
|
end
|
|
|
|
end
|
2018-12-18 02:41:42 -05:00
|
|
|
|
2019-12-09 17:50:05 -05:00
|
|
|
context "#muted_tag_ids" do
|
|
|
|
fab!(:user) { Fabricate(:user) }
|
|
|
|
fab!(:tag) { Fabricate(:tag) }
|
|
|
|
let!(:tag_user) do
|
|
|
|
TagUser.create!(user_id: user.id,
|
|
|
|
notification_level: TagUser.notification_levels[:muted],
|
|
|
|
tag_id: tag.id
|
|
|
|
)
|
|
|
|
end
|
|
|
|
let :serializer do
|
|
|
|
CurrentUserSerializer.new(user, scope: Guardian.new, root: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'include muted tag ids' do
|
|
|
|
payload = serializer.as_json
|
|
|
|
expect(payload[:muted_tag_ids]).to eq([tag.id])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-11-08 00:11:53 -05:00
|
|
|
context "#second_factor_enabled" do
|
|
|
|
fab!(:user) { Fabricate(:user) }
|
|
|
|
let :serializer do
|
|
|
|
CurrentUserSerializer.new(user, scope: Guardian.new(user), root: false)
|
|
|
|
end
|
|
|
|
let(:json) { serializer.as_json }
|
|
|
|
|
|
|
|
it "is false by default" do
|
|
|
|
expect(json[:second_factor_enabled]).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when totp enabled" do
|
|
|
|
before do
|
|
|
|
User.any_instance.stubs(:totp_enabled?).returns(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is true" do
|
|
|
|
expect(json[:second_factor_enabled]).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when security_keys enabled" do
|
|
|
|
before do
|
|
|
|
User.any_instance.stubs(:security_keys_enabled?).returns(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is true" do
|
|
|
|
expect(json[:second_factor_enabled]).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-12-18 02:41:42 -05:00
|
|
|
context "#groups" do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:member) { Fabricate(:user) }
|
2018-12-18 02:41:42 -05:00
|
|
|
let :serializer do
|
|
|
|
CurrentUserSerializer.new(member, scope: Guardian.new, root: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should only show visible groups" do
|
|
|
|
Fabricate.build(:group, visibility_level: Group.visibility_levels[:public])
|
|
|
|
hidden_group = Fabricate.build(:group, visibility_level: Group.visibility_levels[:owners])
|
2020-09-17 13:03:42 -04:00
|
|
|
public_group = Fabricate.build(:group, visibility_level: Group.visibility_levels[:public], name: "UppercaseGroupName")
|
2018-12-18 02:41:42 -05:00
|
|
|
hidden_group.add(member)
|
|
|
|
hidden_group.save!
|
|
|
|
public_group.add(member)
|
|
|
|
public_group.save!
|
|
|
|
payload = serializer.as_json
|
|
|
|
|
|
|
|
expect(payload[:groups]).to eq([{ id: public_group.id, name: public_group.name }])
|
|
|
|
end
|
|
|
|
end
|
2018-03-07 22:54:31 -05:00
|
|
|
end
|