2017-05-22 06:00:07 +02:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'rails_helper'
|
|
|
|
|
2024-09-04 07:12:25 +02:00
|
|
|
RSpec.describe ApplicationController do
|
2017-05-22 17:58:57 +02:00
|
|
|
controller do
|
|
|
|
def success
|
|
|
|
head 200
|
|
|
|
end
|
|
|
|
|
|
|
|
def routing_error
|
|
|
|
raise ActionController::RoutingError, ''
|
|
|
|
end
|
|
|
|
|
|
|
|
def record_not_found
|
|
|
|
raise ActiveRecord::RecordNotFound, ''
|
|
|
|
end
|
|
|
|
|
|
|
|
def invalid_authenticity_token
|
|
|
|
raise ActionController::InvalidAuthenticityToken, ''
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
shared_examples 'respond_with_error' do |code|
|
2024-01-26 17:23:12 +01:00
|
|
|
it "returns http #{code} for http and renders template" do
|
2023-02-20 05:00:48 +01:00
|
|
|
expect(subject).to render_template("errors/#{code}", layout: 'error')
|
2024-01-26 17:23:12 +01:00
|
|
|
|
|
|
|
expect(response).to have_http_status(code)
|
2017-05-22 17:58:57 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'with a forgery' do
|
2017-06-01 20:56:55 +02:00
|
|
|
subject do
|
|
|
|
ActionController::Base.allow_forgery_protection = true
|
|
|
|
routes.draw { post 'success' => 'anonymous#success' }
|
|
|
|
post 'success'
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'respond_with_error', 422
|
|
|
|
end
|
|
|
|
|
2017-05-22 17:58:57 +02:00
|
|
|
describe 'helper_method :current_account' do
|
|
|
|
it 'returns nil if not signed in' do
|
|
|
|
expect(controller.view_context.current_account).to be_nil
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns account if signed in' do
|
|
|
|
account = Fabricate(:account)
|
2022-01-28 00:46:42 +01:00
|
|
|
sign_in(account.user)
|
2017-05-22 17:58:57 +02:00
|
|
|
expect(controller.view_context.current_account).to eq account
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-05-22 06:00:07 +02:00
|
|
|
describe 'helper_method :single_user_mode?' do
|
|
|
|
it 'returns false if it is in single_user_mode but there is no account' do
|
|
|
|
allow(Rails.configuration.x).to receive(:single_user_mode).and_return(true)
|
2023-02-20 06:14:50 +01:00
|
|
|
expect(controller.view_context.single_user_mode?).to be false
|
2017-05-22 06:00:07 +02:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false if there is an account but it is not in single_user_mode' do
|
|
|
|
allow(Rails.configuration.x).to receive(:single_user_mode).and_return(false)
|
|
|
|
Fabricate(:account)
|
2023-02-20 06:14:50 +01:00
|
|
|
expect(controller.view_context.single_user_mode?).to be false
|
2017-05-22 06:00:07 +02:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true if it is in single_user_mode and there is an account' do
|
|
|
|
allow(Rails.configuration.x).to receive(:single_user_mode).and_return(true)
|
|
|
|
Fabricate(:account)
|
2023-02-20 06:14:50 +01:00
|
|
|
expect(controller.view_context.single_user_mode?).to be true
|
2017-05-22 06:00:07 +02:00
|
|
|
end
|
|
|
|
end
|
2017-05-22 17:58:57 +02:00
|
|
|
|
2018-08-23 14:17:35 +02:00
|
|
|
describe 'helper_method :current_theme' do
|
|
|
|
it 'returns "default" when theme wasn\'t changed in admin settings' do
|
2018-10-04 12:36:53 +02:00
|
|
|
allow(Setting).to receive(:default_settings).and_return({ 'theme' => 'default' })
|
2018-08-23 14:17:35 +02:00
|
|
|
|
|
|
|
expect(controller.view_context.current_theme).to eq 'default'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns instances\'s theme when user is not signed in' do
|
|
|
|
allow(Setting).to receive(:[]).with('theme').and_return 'contrast'
|
|
|
|
|
|
|
|
expect(controller.view_context.current_theme).to eq 'contrast'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns instances\'s default theme when user didn\'t set theme' do
|
|
|
|
current_user = Fabricate(:user)
|
2023-03-30 14:44:00 +02:00
|
|
|
current_user.settings.update(theme: 'contrast', noindex: false)
|
|
|
|
current_user.save
|
2018-08-23 14:17:35 +02:00
|
|
|
sign_in current_user
|
|
|
|
|
|
|
|
expect(controller.view_context.current_theme).to eq 'contrast'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns user\'s theme when it is set' do
|
|
|
|
current_user = Fabricate(:user)
|
2023-03-30 14:44:00 +02:00
|
|
|
current_user.settings.update(theme: 'mastodon-light')
|
|
|
|
current_user.save
|
2018-08-23 14:17:35 +02:00
|
|
|
sign_in current_user
|
|
|
|
|
|
|
|
expect(controller.view_context.current_theme).to eq 'mastodon-light'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'with ActionController::RoutingError' do
|
2017-05-22 17:58:57 +02:00
|
|
|
subject do
|
|
|
|
routes.draw { get 'routing_error' => 'anonymous#routing_error' }
|
|
|
|
get 'routing_error'
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'respond_with_error', 404
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'with ActiveRecord::RecordNotFound' do
|
2017-05-22 17:58:57 +02:00
|
|
|
subject do
|
|
|
|
routes.draw { get 'record_not_found' => 'anonymous#record_not_found' }
|
|
|
|
get 'record_not_found'
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'respond_with_error', 404
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'with ActionController::InvalidAuthenticityToken' do
|
2017-05-22 17:58:57 +02:00
|
|
|
subject do
|
|
|
|
routes.draw { get 'invalid_authenticity_token' => 'anonymous#invalid_authenticity_token' }
|
|
|
|
get 'invalid_authenticity_token'
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'respond_with_error', 422
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'before_action :check_suspension' do
|
|
|
|
before do
|
|
|
|
routes.draw { get 'success' => 'anonymous#success' }
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does nothing if not signed in' do
|
|
|
|
get 'success'
|
2018-04-21 21:35:07 +02:00
|
|
|
expect(response).to have_http_status(200)
|
2017-05-22 17:58:57 +02:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'does nothing if user who signed in is not suspended' do
|
2022-01-28 00:46:42 +01:00
|
|
|
sign_in(Fabricate(:account, suspended: false).user)
|
2017-05-22 17:58:57 +02:00
|
|
|
get 'success'
|
2018-04-21 21:35:07 +02:00
|
|
|
expect(response).to have_http_status(200)
|
2017-05-22 17:58:57 +02:00
|
|
|
end
|
|
|
|
|
Change unconfirmed user login behaviour (#11375)
Allow access to account settings, 2FA, authorized applications, and
account deletions to unconfirmed and pending users, as well as
users who had their accounts disabled. Suspended users cannot update
their e-mail or password or delete their account.
Display account status on account settings page, for example, when
an account is frozen, limited, unconfirmed or pending review.
After sign up, login users straight away and show a simple page that
tells them the status of their account with links to account settings
and logout, to reduce onboarding friction and allow users to correct
wrongly typed e-mail addresses.
Move the final sign-up step of SSO integrations to be the same
as above to reduce code duplication.
2019-07-22 10:48:50 +02:00
|
|
|
it 'redirects to account status page' do
|
2022-01-28 00:46:42 +01:00
|
|
|
sign_in(Fabricate(:account, suspended: true).user)
|
2017-05-22 17:58:57 +02:00
|
|
|
get 'success'
|
Change unconfirmed user login behaviour (#11375)
Allow access to account settings, 2FA, authorized applications, and
account deletions to unconfirmed and pending users, as well as
users who had their accounts disabled. Suspended users cannot update
their e-mail or password or delete their account.
Display account status on account settings page, for example, when
an account is frozen, limited, unconfirmed or pending review.
After sign up, login users straight away and show a simple page that
tells them the status of their account with links to account settings
and logout, to reduce onboarding friction and allow users to correct
wrongly typed e-mail addresses.
Move the final sign-up step of SSO integrations to be the same
as above to reduce code duplication.
2019-07-22 10:48:50 +02:00
|
|
|
expect(response).to redirect_to(edit_user_registration_path)
|
2017-05-22 17:58:57 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'raise_not_found' do
|
|
|
|
it 'raises error' do
|
|
|
|
controller.params[:unmatched_route] = 'unmatched'
|
2018-10-04 12:36:53 +02:00
|
|
|
expect { controller.raise_not_found }.to raise_error(ActionController::RoutingError, 'No route matches unmatched')
|
2017-05-22 17:58:57 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'forbidden' do
|
|
|
|
controller do
|
|
|
|
def route_forbidden
|
|
|
|
forbidden
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
subject do
|
|
|
|
routes.draw { get 'route_forbidden' => 'anonymous#route_forbidden' }
|
|
|
|
get 'route_forbidden'
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'respond_with_error', 403
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'not_found' do
|
|
|
|
controller do
|
|
|
|
def route_not_found
|
|
|
|
not_found
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
subject do
|
|
|
|
routes.draw { get 'route_not_found' => 'anonymous#route_not_found' }
|
|
|
|
get 'route_not_found'
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'respond_with_error', 404
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'gone' do
|
|
|
|
controller do
|
|
|
|
def route_gone
|
|
|
|
gone
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
subject do
|
|
|
|
routes.draw { get 'route_gone' => 'anonymous#route_gone' }
|
|
|
|
get 'route_gone'
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'respond_with_error', 410
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'unprocessable_entity' do
|
|
|
|
controller do
|
|
|
|
def route_unprocessable_entity
|
|
|
|
unprocessable_entity
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
subject do
|
|
|
|
routes.draw { get 'route_unprocessable_entity' => 'anonymous#route_unprocessable_entity' }
|
|
|
|
get 'route_unprocessable_entity'
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'respond_with_error', 422
|
|
|
|
end
|
2017-05-22 06:00:07 +02:00
|
|
|
end
|