require 'spec_helper' require_dependency 'user' describe User do it { should have_many :posts } it { should have_many :notifications } it { should have_many :topic_users } it { should have_many :post_actions } it { should have_many :user_actions } it { should have_many :topics } it { should have_many :user_open_ids } it { should have_many :post_timings } it { should have_many :email_tokens } it { should have_many :views } it { should have_many :user_visits } it { should belong_to :approved_by } it { should have_many :email_logs } it { should have_many :topic_allowed_users } it { should have_many :invites } it { should validate_presence_of :username } it { should validate_presence_of :email } context '.enqueue_welcome_message' do let(:user) { Fabricate(:user) } it 'enqueues the system message' do Jobs.expects(:enqueue).with(:send_system_message, user_id: user.id, message_type: 'welcome_user') user.enqueue_welcome_message('welcome_user') end it "doesn't enqueue the system message when the site settings disable it" do SiteSetting.expects(:send_welcome_message?).returns(false) Jobs.expects(:enqueue).with(:send_system_message, user_id: user.id, message_type: 'welcome_user').never user.enqueue_welcome_message('welcome_user') end end describe '.approve' do let(:user) { Fabricate(:user) } let(:admin) { Fabricate(:admin) } it "enqueues a 'signup after approval' email" do Jobs.expects(:enqueue).with( :user_email, has_entries(type: :signup_after_approval) ) user.approve(admin) end context 'after approval' do before do user.approve(admin) end it 'marks the user as approved' do user.should be_approved end it 'has the admin as the approved by' do user.approved_by.should == admin end it 'has a value for approved_at' do user.approved_at.should be_present end end end describe 'bookmark' do before do @post = Fabricate(:post) end it "creates a bookmark with the true parameter" do lambda { PostAction.act(@post.user, @post, PostActionType.types[:bookmark]) }.should change(PostAction, :count).by(1) end describe 'when removing a bookmark' do before do PostAction.act(@post.user, @post, PostActionType.types[:bookmark]) end it 'reduces the bookmark count of the post' do active = PostAction.where(deleted_at: nil) lambda { PostAction.remove_act(@post.user, @post, PostActionType.types[:bookmark]) }.should change(active, :count).by(-1) end end end describe 'change_username' do let(:user) { Fabricate(:user) } context 'success' do let(:new_username) { "#{user.username}1234" } before do @result = user.change_username(new_username) end it 'returns true' do @result.should be_true end it 'should change the username' do user.reload user.username.should == new_username end it 'should change the username_lower' do user.reload user.username_lower.should == new_username.downcase end end context 'failure' do let(:wrong_username) { "" } let(:username_before_change) { user.username } let(:username_lower_before_change) { user.username_lower } before do @result = user.change_username(wrong_username) end it 'returns false' do @result.should be_false end it 'should not change the username' do user.reload user.username.should == username_before_change end it 'should not change the username_lower' do user.reload user.username_lower.should == username_lower_before_change end end describe 'change the case of my username' do let!(:myself) { Fabricate(:user, username: 'hansolo') } it 'should return true' do myself.change_username('HanSolo').should be_true end it 'should change the username' do myself.change_username('HanSolo') myself.reload.username.should == 'HanSolo' end end end describe 'delete posts' do before do @post1 = Fabricate(:post) @user = @post1.user @post2 = Fabricate(:post, topic: @post1.topic, user: @user) @post3 = Fabricate(:post, user: @user) @posts = [@post1, @post2, @post3] @guardian = Guardian.new(Fabricate(:admin)) end it 'allows moderator to delete all posts' do @user.delete_all_posts!(@guardian) expect(Post.where(id: @posts.map(&:id))).to be_empty @posts.each do |p| if p.post_number == 1 expect(Topic.where(id: p.topic_id).first).to be_nil end end end it 'does not allow non moderators to delete all posts' do invalid_guardian = Guardian.new(Fabricate(:user)) expect do @user.delete_all_posts!(invalid_guardian) end.to raise_error Discourse::InvalidAccess @posts.each do |p| p.reload p.should be_present p.topic.should be_present end end end describe 'new' do subject { Fabricate.build(:user) } it { should be_valid } it { should_not be_admin } it { should_not be_active } it { should_not be_approved } its(:approved_at) { should be_blank } its(:approved_by_id) { should be_blank } its(:email_private_messages) { should be_true } its(:email_direct ) { should be_true } context 'digest emails' do it 'defaults to digests every week' do subject.email_digests.should be_true subject.digest_after_days.should == 7 end it 'uses default_digest_email_frequency' do SiteSetting.stubs(:default_digest_email_frequency).returns(1) subject.email_digests.should be_true subject.digest_after_days.should == 1 end it 'disables digests by default if site setting says so' do SiteSetting.stubs(:default_digest_email_frequency).returns('') subject.email_digests.should be_false end end context 'after_save' do before do subject.save end its(:email_tokens) { should be_present } its(:bio_cooked) { should be_present } its(:bio_summary) { should be_present } end end describe "trust levels" do # NOTE be sure to use build to avoid db calls let(:user) { Fabricate.build(:user, trust_level: TrustLevel.levels[:newuser]) } it "sets to the default trust level setting" do SiteSetting.expects(:default_trust_level).returns(TrustLevel.levels[:elder]) User.new.trust_level.should == TrustLevel.levels[:elder] end describe 'has_trust_level?' do it "raises an error with an invalid level" do lambda { user.has_trust_level?(:wat) }.should raise_error end it "is true for your basic level" do user.has_trust_level?(:newuser).should be_true end it "is false for a higher level" do user.has_trust_level?(:regular).should be_false end it "is true if you exceed the level" do user.trust_level = TrustLevel.levels[:elder] user.has_trust_level?(:newuser).should be_true end it "is true for an admin even with a low trust level" do user.trust_level = TrustLevel.levels[:new] user.admin = true user.has_trust_level?(:elder).should be_true end end describe 'moderator' do it "isn't a moderator by default" do user.moderator?.should be_false end it "is a moderator if the user level is moderator" do user.moderator = true user.has_trust_level?(:elder).should be_true end it "is staff if the user is an admin" do user.admin = true user.staff?.should be_true end end end describe 'staff and regular users' do let(:user) { Fabricate.build(:user) } describe '#staff?' do subject { user.staff? } it { should be_false } context 'for a moderator user' do before { user.moderator = true } it { should be_true } end context 'for an admin user' do before { user.admin = true } it { should be_true } end end describe '#regular?' do subject { user.regular? } it { should be_true } context 'for a moderator user' do before { user.moderator = true } it { should be_false } end context 'for an admin user' do before { user.admin = true } it { should be_false } end end end describe 'temporary_key' do let(:user) { Fabricate(:user) } let!(:temporary_key) { user.temporary_key} it 'has a temporary key' do temporary_key.should be_present end describe 'User#find_by_temporary_key' do it 'can be used to find the user' do User.find_by_temporary_key(temporary_key).should == user end it 'returns nil with an invalid key' do User.find_by_temporary_key('asdfasdf').should be_blank end end end describe 'email_hash' do before do @user = Fabricate(:user) end it 'should have a sane email hash' do @user.email_hash.should =~ /^[0-9a-f]{32}$/ end it 'should use downcase email' do @user.email = "example@example.com" @user2 = Fabricate(:user) @user2.email = "ExAmPlE@eXaMpLe.com" @user.email_hash.should == @user2.email_hash end it 'should trim whitespace before hashing' do @user.email = "example@example.com" @user2 = Fabricate(:user) @user2.email = " example@example.com " @user.email_hash.should == @user2.email_hash end end describe 'name heuristics' do it 'is able to guess a decent name from an email' do User.suggest_name('sam.saffron@gmail.com').should == 'Sam Saffron' end end describe 'username format' do it "should always be 3 chars or longer" do @user = Fabricate.build(:user) @user.username = 'ss' @user.save.should == false end it "should never end with a ." do @user = Fabricate.build(:user) @user.username = 'sam.' @user.save.should == false end it "should never contain spaces" do @user = Fabricate.build(:user) @user.username = 'sam s' @user.save.should == false end ['Bad One', 'Giraf%fe', 'Hello!', '@twitter', 'me@example.com', 'no.dots', 'purple.', '.bilbo', '_nope', 'sa$sy'].each do |bad_nickname| it "should not allow username '#{bad_nickname}'" do @user = Fabricate.build(:user) @user.username = bad_nickname @user.save.should == false end end end describe 'username uniqueness' do before do @user = Fabricate.build(:user) @user.save! @codinghorror = Fabricate.build(:coding_horror) end it "should not allow saving if username is reused" do @codinghorror.username = @user.username @codinghorror.save.should be_false end it "should not allow saving if username is reused in different casing" do @codinghorror.username = @user.username.upcase @codinghorror.save.should be_false end end context '.username_available?' do it "returns true for a username that is available" do User.username_available?('BruceWayne').should be_true end it 'returns false when a username is taken' do User.username_available?(Fabricate(:user).username).should be_false end end describe 'email_validator' do it 'should allow good emails' do user = Fabricate.build(:user, email: 'good@gmail.com') user.should be_valid end it 'should reject some emails based on the email_domains_blacklist site setting' do SiteSetting.stubs(:email_domains_blacklist).returns('mailinator.com') Fabricate.build(:user, email: 'notgood@mailinator.com').should_not be_valid Fabricate.build(:user, email: 'mailinator@gmail.com').should be_valid end it 'should reject some emails based on the email_domains_blacklist site setting' do SiteSetting.stubs(:email_domains_blacklist).returns('mailinator.com|trashmail.net') Fabricate.build(:user, email: 'notgood@mailinator.com').should_not be_valid Fabricate.build(:user, email: 'notgood@trashmail.net').should_not be_valid Fabricate.build(:user, email: 'mailinator.com@gmail.com').should be_valid end it 'should not reject partial matches' do SiteSetting.stubs(:email_domains_blacklist).returns('mail.com') Fabricate.build(:user, email: 'mailinator@gmail.com').should be_valid end it 'should reject some emails based on the email_domains_blacklist site setting ignoring case' do SiteSetting.stubs(:email_domains_blacklist).returns('trashmail.net') Fabricate.build(:user, email: 'notgood@TRASHMAIL.NET').should_not be_valid end it 'should not interpret a period as a wildcard' do SiteSetting.stubs(:email_domains_blacklist).returns('trashmail.net') Fabricate.build(:user, email: 'good@trashmailinet.com').should be_valid end it 'should not be used to validate existing records' do u = Fabricate(:user, email: 'in_before_blacklisted@fakemail.com') SiteSetting.stubs(:email_domains_blacklist).returns('fakemail.com') u.should be_valid end it 'should be used when email is being changed' do SiteSetting.stubs(:email_domains_blacklist).returns('mailinator.com') u = Fabricate(:user, email: 'good@gmail.com') u.email = 'nope@mailinator.com' u.should_not be_valid end it 'whitelist should reject some emails based on the email_domains_whitelist site setting' do SiteSetting.stubs(:email_domains_whitelist).returns('vaynermedia.com') Fabricate.build(:user, email: 'notgood@mailinator.com').should_not be_valid Fabricate.build(:user, email: 'sbauch@vaynermedia.com').should be_valid end it 'should reject some emails based on the email_domains_whitelist site setting when whitelisting multiple domains' do SiteSetting.stubs(:email_domains_whitelist).returns('vaynermedia.com|gmail.com') Fabricate.build(:user, email: 'notgood@mailinator.com').should_not be_valid Fabricate.build(:user, email: 'notgood@trashmail.net').should_not be_valid Fabricate.build(:user, email: 'mailinator.com@gmail.com').should be_valid Fabricate.build(:user, email: 'mailinator.com@vaynermedia.com').should be_valid end it 'should accept some emails based on the email_domains_whitelist site setting ignoring case' do SiteSetting.stubs(:email_domains_whitelist).returns('vaynermedia.com') Fabricate.build(:user, email: 'good@VAYNERMEDIA.COM').should be_valid end it 'email whitelist should not be used to validate existing records' do u = Fabricate(:user, email: 'in_before_whitelisted@fakemail.com') SiteSetting.stubs(:email_domains_blacklist).returns('vaynermedia.com') u.should be_valid end it 'email whitelist should be used when email is being changed' do SiteSetting.stubs(:email_domains_whitelist).returns('vaynermedia.com') u = Fabricate(:user, email: 'good@vaynermedia.com') u.email = 'nope@mailinator.com' u.should_not be_valid end end describe 'passwords' do before do @user = Fabricate.build(:user, active: false) @user.password = "ilovepasta" @user.save! end it "should have a valid password after the initial save" do @user.confirm_password?("ilovepasta").should be_true end it "should not have an active account after initial save" do @user.active.should be_false end end describe 'changing bio' do let(:user) { Fabricate(:user) } before do user.bio_raw = "**turtle power!**" user.save user.reload end it "should markdown the raw_bio and put it in cooked_bio" do user.bio_cooked.should == "
turtle power!
" end end describe "previous_visit_at" do let(:user) { Fabricate(:user) } let!(:first_visit_date) { Time.zone.now } let!(:second_visit_date) { 2.hours.from_now } let!(:third_visit_date) { 5.hours.from_now } before do SiteSetting.stubs(:active_user_rate_limit_secs).returns(0) SiteSetting.stubs(:previous_visit_timeout_hours).returns(1) end it "should act correctly" do user.previous_visit_at.should be_nil # first visit user.update_last_seen!(first_visit_date) user.previous_visit_at.should be_nil # updated same time user.update_last_seen!(first_visit_date) user.reload user.previous_visit_at.should be_nil # second visit user.update_last_seen!(second_visit_date) user.reload user.previous_visit_at.should be_within_one_second_of(first_visit_date) # third visit user.update_last_seen!(third_visit_date) user.reload user.previous_visit_at.should be_within_one_second_of(second_visit_date) end end describe "last_seen_at" do let(:user) { Fabricate(:user) } it "should have a blank last seen on creation" do user.last_seen_at.should be_nil end it "should have 0 for days_visited" do user.user_stat.days_visited.should == 0 end describe 'with no previous values' do let!(:date) { Time.zone.now } before do Timecop.freeze(date) user.update_last_seen! end after do Timecop.return end it "updates last_seen_at" do user.last_seen_at.should be_within_one_second_of(date) end it "should have 0 for days_visited" do user.reload user.user_stat.days_visited.should == 1 end it "should log a user_visit with the date" do user.user_visits.first.visited_at.should == date.to_date end context "called twice" do before do Timecop.freeze(date) user.update_last_seen! user.update_last_seen! user.reload end after do Timecop.return end it "doesn't increase days_visited twice" do user.user_stat.days_visited.should == 1 end end describe "after 3 days" do let!(:future_date) { 3.days.from_now } before do Timecop.freeze(future_date) user.update_last_seen! end after do Timecop.return end it "should log a second visited_at record when we log an update later" do user.user_visits.count.should == 2 end end end end describe 'email_confirmed?' do let(:user) { Fabricate(:user) } context 'when email has not been confirmed yet' do it 'should return false' do user.email_confirmed?.should be_false end end context 'when email has been confirmed' do it 'should return true' do token = user.email_tokens.where(email: user.email).first EmailToken.confirm(token.token) user.email_confirmed?.should be_true end end context 'when user has no email tokens for some reason' do it 'should return false' do user.email_tokens.each {|t| t.destroy} user.reload user.email_confirmed?.should be_true end end end describe "flag_linked_posts_as_spam" do let(:user) { Fabricate(:user) } let!(:admin) { Fabricate(:admin) } let!(:post) { PostCreator.new(user, title: "this topic contains spam", raw: "this post has a link: http://discourse.org").create } let!(:another_post) { PostCreator.new(user, title: "this topic also contains spam", raw: "this post has a link: http://discourse.org/asdfa").create } let!(:post_without_link) { PostCreator.new(user, title: "this topic shouldn't be spam", raw: "this post has no links in it.").create } it "has flagged all the user's posts as spam" do user.flag_linked_posts_as_spam post.reload post.spam_count.should == 1 another_post.reload another_post.spam_count.should == 1 post_without_link.reload post_without_link.spam_count.should == 0 # It doesn't raise an exception if called again user.flag_linked_posts_as_spam end end describe "bio link stripping" do it "returns an empty string with no bio" do expect(Fabricate.build(:user).bio_excerpt).to be_blank end context "with a user that has a link in their bio" do let(:user) { Fabricate.build(:user, bio_raw: "im sissy and i love http://ponycorns.com") } before do # Let's cook that bio up good user.send(:cook) end it "includes the link if the user is not new" do expect(user.bio_excerpt).to eq("im sissy and i love http://ponycorns.com") expect(user.bio_processed).to eq("im sissy and i love http://ponycorns.com
") end it "removes the link if the user is new" do user.trust_level = TrustLevel.levels[:newuser] expect(user.bio_excerpt).to eq("im sissy and i love http://ponycorns.com") expect(user.bio_processed).to eq("im sissy and i love http://ponycorns.com
") end end end describe '#readable_name' do context 'when name is missing' do it 'returns just the username' do Fabricate(:user, username: 'foo', name: nil).readable_name.should == 'foo' end end context 'when name and username are identical' do it 'returns just the username' do Fabricate(:user, username: 'foo', name: 'foo').readable_name.should == 'foo' end end context 'when name and username are not identical' do it 'returns the name and username' do Fabricate(:user, username: 'foo', name: 'Bar Baz').readable_name.should == 'Bar Baz (foo)' end end end describe '.find_by_username_or_email' do it 'finds user by username' do bob = Fabricate(:user, username: 'bob') found_user = User.find_by_username_or_email('bob') expect(found_user).to eq bob end it 'finds user by email' do bob = Fabricate(:user, email: 'bob@example.com') found_user = User.find_by_username_or_email('bob@example.com') expect(found_user).to eq bob end context 'when user does not exist' do it 'returns nil' do found_user = User.find_by_username_or_email('doesnotexist@example.com') || User.find_by_username_or_email('doesnotexist') expect(found_user).to be_nil end end context 'when username case does not match' do it 'finds user' do bob = Fabricate(:user, username: 'bob') found_user = User.find_by_username_or_email('Bob') expect(found_user).to eq bob end end context 'when email domain case does not match' do it 'finds user' do bob = Fabricate(:user, email: 'bob@example.com') found_user = User.find_by_username_or_email('bob@Example.com') expect(found_user).to eq bob end end context 'when multiple users are found' do it 'raises an exception' do user_query = stub(to_a: [stub, stub]) User.stubs(:where).with(username_lower: 'bob').returns(user_query) expect { User.find_by_username_or_email('bob') }.to raise_error(Discourse::TooManyMatches) end end end describe "#added_a_day_ago?" do context "when user is more than a day old" do subject(:user) { Fabricate(:user, created_at: Date.today - 2.days) } it "returns false" do expect(user).to_not be_added_a_day_ago end end context "is less than a day old" do subject(:user) { Fabricate(:user) } it "returns true" do expect(user).to be_added_a_day_ago end end end end