require 'rails_helper' RSpec.describe UsersController do let(:user) { Fabricate(:user) } def honeypot_magic(params) get '/u/hp.json' json = JSON.parse(response.body) params[:password_confirmation] = json["value"] params[:challenge] = json["challenge"].reverse params end describe '#create' do context "when taking over a staged account" do let!(:staged) { Fabricate(:staged, email: "staged@account.com", active: true) } it "succeeds" do post '/u.json', params: honeypot_magic( email: staged.email, username: "zogstrip", password: "P4ssw0rd$$" ) expect(response.status).to eq(200) result = ::JSON.parse(response.body) expect(result["success"]).to eq(true) created_user = User.find_by_email(staged.email) expect(created_user.staged).to eq(false) expect(created_user.active).to eq(false) expect(created_user.registration_ip_address).to be_present expect(!!created_user.custom_fields["from_staged"]).to eq(true) # do not allow emails changes please put "/u/update-activation-email.json", params: { email: 'bob@bob.com' } created_user.reload expect(created_user.email).to eq("staged@account.com") expect(response.status).not_to eq(200) end end end describe '#show' do it "should be able to view a user" do get "/u/#{user.username}" expect(response).to be_success expect(response.body).to include(user.username) end describe 'when username contains a period' do before do user.update!(username: 'test.test') end it "should be able to view a user" do get "/u/#{user.username}" expect(response).to be_success expect(response.body).to include(user.username) end end end describe "#badges" do it "renders fine by default" do get "/u/#{user.username}/badges" expect(response).to be_success end it "fails if badges are disabled" do SiteSetting.enable_badges = false get "/u/#{user.username}/badges" expect(response.status).to eq(404) end end describe "updating a user" do before do sign_in(user) end it "should be able to update a user" do put "/u/#{user.username}.json", params: { name: 'test.test' } expect(response).to be_success expect(user.reload.name).to eq('test.test') end describe 'when username contains a period' do before do user.update!(username: 'test.test') end it "should be able to update a user" do put "/u/#{user.username}.json", params: { name: 'testing123' } expect(response).to be_success expect(user.reload.name).to eq('testing123') end end end describe "#account_created" do it "returns a message when no session is present" do get "/u/account-created" expect(response).to be_success body = response.body expect(body).to match(I18n.t('activation.missing_session')) end it "redirects when the user is logged in" do sign_in(Fabricate(:user)) get "/u/account-created" expect(response).to redirect_to("/") end context "when the user account is created" do include ApplicationHelper it "returns the message when set in the session" do user = create_user get "/u/account-created" expect(response).to be_success expect(response.body).to include( "{\"message\":\"#{I18n.t("login.activate_email", email: user.email).gsub!(" :readonly) category.save private_topic = Fabricate(:topic, category: category) get "/u/search/users.json", params: { term: user.name.split(" ").last, topic_id: private_topic.id, topic_allowed_users: "true" } expect(response).to be_success json = JSON.parse(response.body) expect(json["users"].map { |u| u["username"] }).to_not include(user.username) expect(json["users"].map { |u| u["username"] }).to include(privileged_user.username) end context "when `enable_names` is true" do before do SiteSetting.enable_names = true end it "returns names" do get "/u/search/users.json", params: { term: user.name } json = JSON.parse(response.body) expect(json["users"].map { |u| u["name"] }).to include(user.name) end end context "when `enable_names` is false" do before do SiteSetting.enable_names = false end it "returns names" do get "/u/search/users.json", params: { term: user.name } json = JSON.parse(response.body) expect(json["users"].map { |u| u["name"] }).not_to include(user.name) end end context 'groups' do let!(:mentionable_group) do Fabricate(:group, mentionable_level: 99, messageable_level: 0, visibility_level: 0 ) end let!(:mentionable_group_2) do Fabricate(:group, mentionable_level: 99, messageable_level: 0, visibility_level: 1 ) end let!(:messageable_group) do Fabricate(:group, mentionable_level: 0, messageable_level: 99 ) end describe 'when signed in' do before do sign_in(user) end it "only returns visible groups" do get "/u/search/users.json", params: { include_groups: "true" } expect(response).to be_success groups = JSON.parse(response.body)["groups"] expect(groups.map { |group| group['name'] }) .to_not include(mentionable_group_2.name) end it "doesn't search for groups" do get "/u/search/users.json", params: { include_mentionable_groups: 'false', include_messageable_groups: 'false' } expect(response).to be_success expect(JSON.parse(response.body)).not_to have_key(:groups) end it "searches for messageable groups" do get "/u/search/users.json", params: { include_mentionable_groups: 'false', include_messageable_groups: 'true' } expect(response).to be_success expect(JSON.parse(response.body)["groups"].map { |group| group['name'] }) .to contain_exactly(messageable_group.name, Group.find(Group::AUTO_GROUPS[:moderators]).name) end it 'searches for mentionable groups' do get "/u/search/users.json", params: { include_messageable_groups: 'false', include_mentionable_groups: 'true' } expect(response).to be_success groups = JSON.parse(response.body)["groups"] expect(groups.map { |group| group['name'] }) .to contain_exactly(mentionable_group.name, mentionable_group_2.name) end end describe 'when not signed in' do it 'should not include mentionable/messageable groups' do get "/u/search/users.json", params: { include_mentionable_groups: 'false', include_messageable_groups: 'false' } expect(response).to be_success expect(JSON.parse(response.body)).not_to have_key(:groups) get "/u/search/users.json", params: { include_mentionable_groups: 'false', include_messageable_groups: 'true' } expect(response).to be_success expect(JSON.parse(response.body)).not_to have_key(:groups) get "/u/search/users.json", params: { include_messageable_groups: 'false', include_mentionable_groups: 'true' } expect(response).to be_success expect(JSON.parse(response.body)).not_to have_key(:groups) end end end end describe '.user_preferences_redirect' do it 'requires the user to be logged in' do get '/user_preferences' expect(response.status).to eq(404) end it "redirects to their profile when logged in" do sign_in(user) get '/user_preferences' expect(response).to redirect_to("/u/#{user.username_lower}/preferences") end end describe '#email_login' do before do SiteSetting.queue_jobs = true SiteSetting.enable_local_logins_via_email = true end it "enqueues the right email" do post "/u/email-login.json", params: { login: user.email } expect(response).to be_success expect(JSON.parse(response.body)['user_found']).to eq(true) job_args = Jobs::CriticalUserEmail.jobs.last["args"].first expect(job_args["user_id"]).to eq(user.id) expect(job_args["type"]).to eq("email_login") expect(job_args["email_token"]).to eq(user.email_tokens.last.token) end describe 'when enable_local_logins_via_email is disabled' do before do SiteSetting.enable_local_logins_via_email = false end it 'should return the right response' do post "/u/email-login.json", params: { login: user.email } expect(response.status).to eq(404) end end describe 'when username or email is not valid' do it 'should not enqueue the email to login' do post "/u/email-login.json", params: { login: '@random' } expect(response).to be_success expect(JSON.parse(response.body)['user_found']).to eq(false) expect(Jobs::CriticalUserEmail.jobs).to eq([]) end end describe 'when hide_email_address_taken is true' do it 'should return the right response' do SiteSetting.hide_email_address_taken = true post "/u/email-login.json", params: { login: user.email } expect(response).to be_success expect(JSON.parse(response.body).has_key?('user_found')).to eq(false) end end describe "when user is already logged in" do it 'should redirect to the root path' do sign_in(user) post "/u/email-login.json", params: { login: user.email } expect(response).to redirect_to("/") end end end describe '#create_second_factor' do context 'when not logged in' do it 'should return the right response' do post "/users/second_factors.json", params: { password: 'wrongpassword' } expect(response.status).to eq(403) end end context 'when logged in' do before do sign_in(user) end describe 'create 2fa request' do it 'fails on incorrect password' do post "/users/second_factors.json", params: { password: 'wrongpassword' } expect(response.status).to eq(200) expect(JSON.parse(response.body)['error']).to eq(I18n.t( "login.incorrect_password") ) end describe 'when local logins are disabled' do it 'should return the right response' do SiteSetting.enable_local_logins = false post "/users/second_factors.json", params: { password: 'somecomplicatedpassword' } expect(response.status).to eq(404) end end describe 'when SSO is enabled' do it 'should return the right response' do SiteSetting.sso_url = 'http://someurl.com' SiteSetting.enable_sso = true post "/users/second_factors.json", params: { password: 'somecomplicatedpassword' } expect(response.status).to eq(404) end end it 'succeeds on correct password' do post "/users/second_factors.json", params: { password: 'somecomplicatedpassword' } expect(response.status).to eq(200) response_body = JSON.parse(response.body) expect(response_body['key']).to eq(user.user_second_factor.data) expect(response_body['qr']).to be_present end end end end describe '#update_second_factor' do let(:user_second_factor) { Fabricate(:user_second_factor, user: user) } context 'when not logged in' do it 'should return the right response' do put "/users/second_factor.json", params: { second_factor_token: ROTP::TOTP.new(user_second_factor.data).now } expect(response.status).to eq(403) end end context 'when logged in' do before do sign_in(user) user_second_factor end context 'when user has totp setup' do context 'when token is missing' do it 'returns the right response' do put "/users/second_factor.json", params: { enable: 'true', } expect(response.status).to eq(400) end end context 'when token is invalid' do it 'returns the right response' do put "/users/second_factor.json", params: { second_factor_token: '000000', enable: 'true', } expect(response.status).to eq(200) expect(JSON.parse(response.body)['error']).to eq(I18n.t( "login.invalid_second_factor_code" )) end end context 'when token is valid' do it 'should allow second factor for the user to be enabled' do put "/users/second_factor.json", params: { second_factor_token: ROTP::TOTP.new(user_second_factor.data).now, enable: 'true', } expect(response.status).to eq(200) expect(user.reload.user_second_factor.enabled).to be true end it 'should allow second factor for the user to be disabled' do put "/users/second_factor.json", params: { second_factor_token: ROTP::TOTP.new(user_second_factor.data).now, } expect(response.status).to eq(200) expect(user.reload.user_second_factor).to eq(nil) end end end end end end