2019-04-29 20:27:42 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2015-10-11 05:41:23 -04:00
|
|
|
require 'rails_helper'
|
2013-02-05 14:16:51 -05:00
|
|
|
require 'discourse'
|
|
|
|
|
|
|
|
describe Discourse do
|
|
|
|
|
|
|
|
before do
|
|
|
|
RailsMultisite::ConnectionManagement.stubs(:current_hostname).returns('foo.com')
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'current_hostname' do
|
|
|
|
it 'returns the hostname from the current db connection' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Discourse.current_hostname).to eq('foo.com')
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2019-08-27 11:03:20 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2019-08-27 11:03:20 -04:00
|
|
|
context 'avatar_sizes' do
|
|
|
|
it 'returns a list of integers' do
|
|
|
|
expect(Discourse.avatar_sizes).to contain_exactly(20, 25, 30, 32, 37, 40, 45, 48, 50, 60, 64, 67, 75, 90, 96, 120, 135, 180, 240, 360)
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2017-11-15 16:39:11 -05:00
|
|
|
context 'running_in_rack' do
|
|
|
|
after do
|
|
|
|
ENV.delete("DISCOURSE_RUNNING_IN_RACK")
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should not be running in rack' do
|
|
|
|
expect(Discourse.running_in_rack?).to eq(false)
|
|
|
|
ENV["DISCOURSE_RUNNING_IN_RACK"] = "1"
|
|
|
|
expect(Discourse.running_in_rack?).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
context 'base_url' do
|
2014-01-08 18:51:38 -05:00
|
|
|
context 'when https is off' do
|
2013-02-05 14:16:51 -05:00
|
|
|
before do
|
2016-07-28 13:54:17 -04:00
|
|
|
SiteSetting.force_https = false
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-01-08 18:51:38 -05:00
|
|
|
it 'has a non https base url' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Discourse.base_url).to eq("http://foo.com")
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-01-08 18:51:38 -05:00
|
|
|
context 'when https is on' do
|
2013-02-05 14:16:51 -05:00
|
|
|
before do
|
2016-07-28 13:54:17 -04:00
|
|
|
SiteSetting.force_https = true
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'has a non-ssl base url' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Discourse.base_url).to eq("https://foo.com")
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with a non standard port specified' do
|
|
|
|
before do
|
2016-07-28 13:54:17 -04:00
|
|
|
SiteSetting.port = 3000
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns the non standart port in the base url" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Discourse.base_url).to eq("http://foo.com:3000")
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2013-05-10 16:58:23 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-11-01 05:50:31 -04:00
|
|
|
context 'plugins' do
|
|
|
|
let(:plugin_class) do
|
|
|
|
Class.new(Plugin::Instance) do
|
|
|
|
attr_accessor :enabled
|
|
|
|
def enabled?
|
|
|
|
@enabled
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:plugin1) { plugin_class.new.tap { |p| p.enabled = true } }
|
|
|
|
let(:plugin2) { plugin_class.new.tap { |p| p.enabled = false } }
|
|
|
|
|
|
|
|
before { Discourse.plugins.append(plugin1, plugin2) }
|
|
|
|
after { Discourse.plugins.clear }
|
|
|
|
|
|
|
|
it 'can find plugins correctly' do
|
|
|
|
expect(Discourse.plugins).to contain_exactly(plugin1, plugin2)
|
|
|
|
|
|
|
|
# Exclude disabled plugins by default
|
|
|
|
expect(Discourse.find_plugins({})).to contain_exactly(plugin1)
|
|
|
|
|
|
|
|
# Include disabled plugins when requested
|
|
|
|
expect(Discourse.find_plugins(include_disabled: true)).to contain_exactly(plugin1, plugin2)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-07-23 11:51:57 -04:00
|
|
|
context 'authenticators' do
|
|
|
|
it 'returns inbuilt authenticators' do
|
2018-07-31 11:18:50 -04:00
|
|
|
expect(Discourse.authenticators).to match_array(Discourse::BUILTIN_AUTH.map(&:authenticator))
|
2018-07-23 11:51:57 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'with authentication plugin installed' do
|
|
|
|
let(:plugin_auth_provider) do
|
|
|
|
authenticator_class = Class.new(Auth::Authenticator) do
|
|
|
|
def name
|
|
|
|
'pluginauth'
|
|
|
|
end
|
|
|
|
|
|
|
|
def enabled
|
|
|
|
true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-07-31 11:18:50 -04:00
|
|
|
provider = Auth::AuthProvider.new
|
2018-07-23 11:51:57 -04:00
|
|
|
provider.authenticator = authenticator_class.new
|
|
|
|
provider
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
DiscoursePluginRegistry.register_auth_provider(plugin_auth_provider)
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
DiscoursePluginRegistry.reset!
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns inbuilt and plugin authenticators' do
|
|
|
|
expect(Discourse.authenticators).to match_array(
|
2018-07-31 11:18:50 -04:00
|
|
|
Discourse::BUILTIN_AUTH.map(&:authenticator) + [plugin_auth_provider.authenticator])
|
2018-07-23 11:51:57 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'enabled_authenticators' do
|
|
|
|
it 'only returns enabled authenticators' do
|
|
|
|
expect(Discourse.enabled_authenticators.length).to be(0)
|
|
|
|
expect { SiteSetting.enable_twitter_logins = true }
|
|
|
|
.to change { Discourse.enabled_authenticators.length }.by(1)
|
|
|
|
expect(Discourse.enabled_authenticators.length).to be(1)
|
|
|
|
expect(Discourse.enabled_authenticators.first).to be_instance_of(Auth::TwitterAuthenticator)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-09-06 03:28:37 -04:00
|
|
|
context '#site_contact_user' do
|
2013-05-10 16:58:23 -04:00
|
|
|
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:admin) { Fabricate(:admin) }
|
|
|
|
fab!(:another_admin) { Fabricate(:admin) }
|
2013-05-10 16:58:23 -04:00
|
|
|
|
2013-09-06 03:28:37 -04:00
|
|
|
it 'returns the user specified by the site setting site_contact_username' do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.site_contact_username = another_admin.username
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Discourse.site_contact_user).to eq(another_admin)
|
2014-01-23 05:26:31 -05:00
|
|
|
end
|
|
|
|
|
2015-11-24 14:37:33 -05:00
|
|
|
it 'returns the system user otherwise' do
|
2016-07-28 13:54:17 -04:00
|
|
|
SiteSetting.site_contact_username = nil
|
2015-11-24 14:37:33 -05:00
|
|
|
expect(Discourse.site_contact_user.username).to eq("system")
|
2013-05-10 16:58:23 -04:00
|
|
|
end
|
2013-02-25 11:42:20 -05:00
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2019-10-31 11:16:26 -04:00
|
|
|
context '#system_user' do
|
|
|
|
it 'returns the system user' do
|
|
|
|
expect(Discourse.system_user.id).to eq(-1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-07-31 17:26:34 -04:00
|
|
|
context "#store" do
|
|
|
|
|
|
|
|
it "returns LocalStore by default" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Discourse.store).to be_a(FileStore::LocalStore)
|
2013-07-31 17:26:34 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns S3Store when S3 is enabled" do
|
2016-07-28 13:54:17 -04:00
|
|
|
SiteSetting.enable_s3_uploads = true
|
|
|
|
SiteSetting.s3_upload_bucket = "s3bucket"
|
|
|
|
SiteSetting.s3_access_key_id = "s3_access_key_id"
|
|
|
|
SiteSetting.s3_secret_access_key = "s3_secret_access_key"
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Discourse.store).to be_a(FileStore::S3Store)
|
2013-07-31 17:26:34 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
2016-06-29 01:55:17 -04:00
|
|
|
context 'readonly mode' do
|
2016-06-29 02:19:18 -04:00
|
|
|
let(:readonly_mode_key) { Discourse::READONLY_MODE_KEY }
|
2016-06-29 01:55:17 -04:00
|
|
|
let(:readonly_mode_ttl) { Discourse::READONLY_MODE_KEY_TTL }
|
2016-06-29 02:19:18 -04:00
|
|
|
let(:user_readonly_mode_key) { Discourse::USER_READONLY_MODE_KEY }
|
2014-02-12 23:37:28 -05:00
|
|
|
|
2016-06-29 01:55:17 -04:00
|
|
|
after do
|
2019-12-03 04:05:53 -05:00
|
|
|
Discourse.redis.del(readonly_mode_key)
|
|
|
|
Discourse.redis.del(user_readonly_mode_key)
|
2014-02-12 23:37:28 -05:00
|
|
|
end
|
|
|
|
|
2016-06-29 02:19:18 -04:00
|
|
|
def assert_readonly_mode(message, key, ttl = -1)
|
|
|
|
expect(message.channel).to eq(Discourse.readonly_channel)
|
2016-06-29 01:55:17 -04:00
|
|
|
expect(message.data).to eq(true)
|
2019-12-03 04:05:53 -05:00
|
|
|
expect(Discourse.redis.get(key)).to eq("1")
|
|
|
|
expect(Discourse.redis.ttl(key)).to eq(ttl)
|
2016-06-29 01:55:17 -04:00
|
|
|
end
|
2014-02-12 23:37:28 -05:00
|
|
|
|
2016-06-29 02:19:18 -04:00
|
|
|
def assert_readonly_mode_disabled(message, key)
|
|
|
|
expect(message.channel).to eq(Discourse.readonly_channel)
|
2016-06-29 01:55:17 -04:00
|
|
|
expect(message.data).to eq(false)
|
2019-12-03 04:05:53 -05:00
|
|
|
expect(Discourse.redis.get(key)).to eq(nil)
|
2016-06-29 01:55:17 -04:00
|
|
|
end
|
2014-02-12 23:37:28 -05:00
|
|
|
|
2017-07-26 13:21:33 -04:00
|
|
|
def get_readonly_message
|
2018-12-17 22:56:25 -05:00
|
|
|
message = nil
|
|
|
|
|
2017-07-26 13:21:33 -04:00
|
|
|
messages = MessageBus.track_publish do
|
|
|
|
yield
|
|
|
|
end
|
|
|
|
|
2018-12-17 22:56:25 -05:00
|
|
|
expect(messages.any? { |m| m.channel == Site::SITE_JSON_CHANNEL })
|
|
|
|
.to eq(true)
|
|
|
|
|
2017-08-21 09:28:43 -04:00
|
|
|
messages.find { |m| m.channel == Discourse.readonly_channel }
|
2017-07-26 13:21:33 -04:00
|
|
|
end
|
|
|
|
|
2016-06-29 02:19:18 -04:00
|
|
|
describe ".enable_readonly_mode" do
|
2016-06-29 01:55:17 -04:00
|
|
|
it "adds a key in redis and publish a message through the message bus" do
|
2019-12-03 04:05:53 -05:00
|
|
|
expect(Discourse.redis.get(readonly_mode_key)).to eq(nil)
|
2017-07-26 13:21:33 -04:00
|
|
|
message = get_readonly_message { Discourse.enable_readonly_mode }
|
2016-06-29 02:19:18 -04:00
|
|
|
assert_readonly_mode(message, readonly_mode_key, readonly_mode_ttl)
|
|
|
|
end
|
2014-02-12 23:37:28 -05:00
|
|
|
|
2016-06-29 02:19:18 -04:00
|
|
|
context 'user enabled readonly mode' do
|
|
|
|
it "adds a key in redis and publish a message through the message bus" do
|
2019-12-03 04:05:53 -05:00
|
|
|
expect(Discourse.redis.get(user_readonly_mode_key)).to eq(nil)
|
2017-07-26 13:21:33 -04:00
|
|
|
message = get_readonly_message { Discourse.enable_readonly_mode(user_readonly_mode_key) }
|
2016-06-29 02:19:18 -04:00
|
|
|
assert_readonly_mode(message, user_readonly_mode_key)
|
|
|
|
end
|
2016-06-29 01:55:17 -04:00
|
|
|
end
|
2014-02-12 23:37:28 -05:00
|
|
|
end
|
|
|
|
|
2016-06-29 02:19:18 -04:00
|
|
|
describe ".disable_readonly_mode" do
|
2016-06-29 01:55:17 -04:00
|
|
|
it "removes a key from redis and publish a message through the message bus" do
|
2018-12-17 22:56:25 -05:00
|
|
|
message = get_readonly_message { Discourse.disable_readonly_mode }
|
2016-06-29 02:19:18 -04:00
|
|
|
assert_readonly_mode_disabled(message, readonly_mode_key)
|
|
|
|
end
|
2014-02-12 23:37:28 -05:00
|
|
|
|
2016-06-29 02:19:18 -04:00
|
|
|
context 'user disabled readonly mode' do
|
|
|
|
it "removes readonly key in redis and publish a message through the message bus" do
|
|
|
|
Discourse.enable_readonly_mode(user_enabled: true)
|
2017-07-26 13:21:33 -04:00
|
|
|
message = get_readonly_message { Discourse.disable_readonly_mode(user_enabled: true) }
|
2016-06-29 02:19:18 -04:00
|
|
|
assert_readonly_mode_disabled(message, user_readonly_mode_key)
|
|
|
|
end
|
2016-06-29 01:55:17 -04:00
|
|
|
end
|
2015-04-24 14:32:18 -04:00
|
|
|
end
|
|
|
|
|
2016-06-29 02:19:18 -04:00
|
|
|
describe ".readonly_mode?" do
|
2016-06-29 01:55:17 -04:00
|
|
|
it "is false by default" do
|
|
|
|
expect(Discourse.readonly_mode?).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true when the key is present in redis" do
|
2019-12-03 04:05:53 -05:00
|
|
|
Discourse.redis.set(readonly_mode_key, 1)
|
2016-02-29 05:58:42 -05:00
|
|
|
expect(Discourse.readonly_mode?).to eq(true)
|
|
|
|
end
|
2014-02-12 23:37:28 -05:00
|
|
|
|
2019-06-21 10:08:57 -04:00
|
|
|
it "returns true when postgres is recently read only" do
|
|
|
|
Discourse.received_postgres_readonly!
|
|
|
|
expect(Discourse.readonly_mode?).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true when redis is recently read only" do
|
|
|
|
Discourse.received_redis_readonly!
|
2016-06-29 01:55:17 -04:00
|
|
|
expect(Discourse.readonly_mode?).to eq(true)
|
|
|
|
end
|
2016-08-25 11:30:41 -04:00
|
|
|
|
|
|
|
it "returns true when user enabled readonly mode key is present in redis" do
|
2017-01-11 03:38:07 -05:00
|
|
|
Discourse.enable_readonly_mode(user_readonly_mode_key)
|
2016-08-25 11:30:41 -04:00
|
|
|
expect(Discourse.readonly_mode?).to eq(true)
|
2018-06-11 12:21:29 -04:00
|
|
|
expect(Discourse.readonly_mode?(readonly_mode_key)).to eq(false)
|
2016-08-25 11:30:41 -04:00
|
|
|
|
2017-01-11 03:38:07 -05:00
|
|
|
Discourse.disable_readonly_mode(user_readonly_mode_key)
|
2016-08-25 11:30:41 -04:00
|
|
|
expect(Discourse.readonly_mode?).to eq(false)
|
|
|
|
end
|
2014-02-12 23:37:28 -05:00
|
|
|
end
|
|
|
|
|
2019-06-21 10:08:57 -04:00
|
|
|
describe ".received_postgres_readonly!" do
|
|
|
|
it "sets the right time" do
|
|
|
|
time = Discourse.received_postgres_readonly!
|
|
|
|
expect(Discourse.postgres_last_read_only['default']).to eq(time)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe ".received_redis_readonly!" do
|
2016-06-29 01:55:17 -04:00
|
|
|
it "sets the right time" do
|
2019-06-21 10:08:57 -04:00
|
|
|
time = Discourse.received_redis_readonly!
|
|
|
|
expect(Discourse.redis_last_read_only['default']).to eq(time)
|
2016-06-29 01:55:17 -04:00
|
|
|
end
|
2016-02-29 05:58:42 -05:00
|
|
|
end
|
2019-01-21 20:51:45 -05:00
|
|
|
|
|
|
|
describe ".clear_readonly!" do
|
|
|
|
it "publishes the right message" do
|
2019-06-21 10:08:57 -04:00
|
|
|
Discourse.received_postgres_readonly!
|
2019-01-21 20:51:45 -05:00
|
|
|
messages = []
|
|
|
|
|
|
|
|
expect do
|
|
|
|
messages = MessageBus.track_publish { Discourse.clear_readonly! }
|
2019-06-21 10:08:57 -04:00
|
|
|
end.to change { Discourse.postgres_last_read_only['default'] }.to(nil)
|
2019-01-21 20:51:45 -05:00
|
|
|
|
|
|
|
expect(messages.any? { |m| m.channel == Site::SITE_JSON_CHANNEL })
|
|
|
|
.to eq(true)
|
|
|
|
end
|
|
|
|
end
|
2016-02-29 05:58:42 -05:00
|
|
|
end
|
|
|
|
|
2014-02-20 22:30:25 -05:00
|
|
|
context "#handle_exception" do
|
2014-07-17 16:22:46 -04:00
|
|
|
|
|
|
|
class TempSidekiqLogger < Sidekiq::ExceptionHandler::Logger
|
2014-02-20 22:30:25 -05:00
|
|
|
attr_accessor :exception, :context
|
2014-07-17 16:22:46 -04:00
|
|
|
def call(ex, ctx)
|
|
|
|
self.exception = ex
|
|
|
|
self.context = ctx
|
2014-02-20 22:30:25 -05:00
|
|
|
end
|
|
|
|
end
|
2014-07-17 16:22:46 -04:00
|
|
|
|
|
|
|
let!(:logger) { TempSidekiqLogger.new }
|
|
|
|
|
|
|
|
before do
|
|
|
|
Sidekiq.error_handlers.clear
|
|
|
|
Sidekiq.error_handlers << logger
|
|
|
|
end
|
2014-09-24 16:52:09 -04:00
|
|
|
|
2014-02-20 22:30:25 -05:00
|
|
|
it "should not fail when called" do
|
|
|
|
exception = StandardError.new
|
|
|
|
|
2019-04-08 10:57:47 -04:00
|
|
|
expect do
|
|
|
|
Discourse.handle_job_exception(exception, nil, nil)
|
|
|
|
end.to raise_error(StandardError) # Raises in test mode, catch it
|
|
|
|
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(logger.exception).to eq(exception)
|
|
|
|
expect(logger.context.keys).to eq([:current_db, :current_hostname])
|
2014-02-20 22:30:25 -05:00
|
|
|
end
|
2014-07-17 16:22:46 -04:00
|
|
|
|
|
|
|
it "correctly passes extra context" do
|
|
|
|
exception = StandardError.new
|
|
|
|
|
2019-04-08 10:57:47 -04:00
|
|
|
expect do
|
|
|
|
Discourse.handle_job_exception(exception, { message: "Doing a test", post_id: 31 }, nil)
|
|
|
|
end.to raise_error(StandardError) # Raises in test mode, catch it
|
|
|
|
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(logger.exception).to eq(exception)
|
|
|
|
expect(logger.context.keys.sort).to eq([:current_db, :current_hostname, :message, :post_id].sort)
|
2014-07-17 16:22:46 -04:00
|
|
|
end
|
2014-02-20 22:30:25 -05:00
|
|
|
end
|
|
|
|
|
2018-06-20 03:50:11 -04:00
|
|
|
context '#deprecate' do
|
|
|
|
def old_method(m)
|
|
|
|
Discourse.deprecate(m)
|
|
|
|
end
|
|
|
|
|
|
|
|
def old_method_caller(m)
|
|
|
|
old_method(m)
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
@orig_logger = Rails.logger
|
|
|
|
Rails.logger = @fake_logger = FakeLogger.new
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
Rails.logger = @orig_logger
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'can deprecate usage' do
|
|
|
|
k = SecureRandom.hex
|
|
|
|
expect(old_method_caller(k)).to include("old_method_caller")
|
|
|
|
expect(old_method_caller(k)).to include("discourse_spec")
|
|
|
|
expect(old_method_caller(k)).to include(k)
|
|
|
|
|
2018-10-09 21:34:50 -04:00
|
|
|
expect(Rails.logger.warnings).to eq([old_method_caller(k)])
|
2018-06-20 03:50:11 -04:00
|
|
|
end
|
2018-12-06 06:38:01 -05:00
|
|
|
|
|
|
|
it 'can report the deprecated version' do
|
|
|
|
Discourse.deprecate(SecureRandom.hex, since: "2.1.0.beta1")
|
|
|
|
|
|
|
|
expect(Rails.logger.warnings[0]).to include("(deprecated since Discourse 2.1.0.beta1)")
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'can report the drop version' do
|
|
|
|
Discourse.deprecate(SecureRandom.hex, drop_from: "2.3.0")
|
|
|
|
|
|
|
|
expect(Rails.logger.warnings[0]).to include("(removal in Discourse 2.3.0)")
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'can raise deprecation error' do
|
|
|
|
expect {
|
|
|
|
Discourse.deprecate(SecureRandom.hex, raise_error: true)
|
|
|
|
}.to raise_error(Discourse::Deprecation)
|
|
|
|
end
|
2018-06-20 03:50:11 -04:00
|
|
|
end
|
|
|
|
|
2019-11-07 10:47:16 -05:00
|
|
|
describe "Utils.execute_command" do
|
|
|
|
it "works for individual commands" do
|
|
|
|
expect(Discourse::Utils.execute_command("pwd").strip).to eq(Rails.root.to_s)
|
|
|
|
expect(Discourse::Utils.execute_command("pwd", chdir: "plugins").strip).to eq("#{Rails.root.to_s}/plugins")
|
|
|
|
end
|
|
|
|
|
|
|
|
it "works with a block" do
|
|
|
|
Discourse::Utils.execute_command do |runner|
|
|
|
|
expect(runner.exec("pwd").strip).to eq(Rails.root.to_s)
|
|
|
|
end
|
|
|
|
|
|
|
|
result = Discourse::Utils.execute_command(chdir: "plugins") do |runner|
|
|
|
|
expect(runner.exec("pwd").strip).to eq("#{Rails.root.to_s}/plugins")
|
|
|
|
runner.exec("pwd")
|
|
|
|
end
|
|
|
|
|
|
|
|
# Should return output of block
|
|
|
|
expect(result.strip).to eq("#{Rails.root.to_s}/plugins")
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not leak chdir between threads" do
|
|
|
|
has_done_chdir = false
|
|
|
|
has_checked_chdir = false
|
|
|
|
|
|
|
|
thread = Thread.new do
|
|
|
|
Discourse::Utils.execute_command(chdir: "plugins") do
|
|
|
|
has_done_chdir = true
|
|
|
|
sleep(0.01) until has_checked_chdir
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
sleep(0.01) until has_done_chdir
|
|
|
|
expect(Discourse::Utils.execute_command("pwd").strip).to eq(Rails.root.to_s)
|
|
|
|
has_checked_chdir = true
|
|
|
|
thread.join
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|