2019-10-14 08:54:58 +00:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'rails_helper'
|
2021-01-14 15:05:22 +00:00
|
|
|
require Rails.root.join 'spec/models/concerns/access_tokenable_spec.rb'
|
2019-10-14 08:54:58 +00:00
|
|
|
|
|
|
|
RSpec.describe User do
|
2019-12-01 10:12:15 +00:00
|
|
|
let!(:user) { create(:user) }
|
|
|
|
|
2019-10-14 08:54:58 +00:00
|
|
|
context 'validations' do
|
|
|
|
it { is_expected.to validate_presence_of(:email) }
|
|
|
|
it { is_expected.to validate_presence_of(:name) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'associations' do
|
2020-03-07 06:48:16 +00:00
|
|
|
it { is_expected.to have_many(:accounts).through(:account_users) }
|
|
|
|
it { is_expected.to have_many(:account_users) }
|
2019-12-01 10:12:15 +00:00
|
|
|
it { is_expected.to have_many(:assigned_conversations).class_name('Conversation').dependent(:nullify) }
|
2019-10-14 08:54:58 +00:00
|
|
|
it { is_expected.to have_many(:inbox_members).dependent(:destroy) }
|
2020-02-29 15:11:09 +00:00
|
|
|
it { is_expected.to have_many(:notification_settings).dependent(:destroy) }
|
2019-10-14 08:54:58 +00:00
|
|
|
it { is_expected.to have_many(:messages) }
|
2020-03-18 11:23:35 +00:00
|
|
|
it { is_expected.to have_many(:events) }
|
2019-10-14 08:54:58 +00:00
|
|
|
end
|
2019-10-16 21:48:07 +00:00
|
|
|
|
2021-01-14 15:05:22 +00:00
|
|
|
describe 'concerns' do
|
|
|
|
it_behaves_like 'access_tokenable'
|
|
|
|
end
|
|
|
|
|
2019-10-16 21:48:07 +00:00
|
|
|
describe 'pubsub_token' do
|
2019-12-01 10:12:15 +00:00
|
|
|
before { user.update(name: Faker::Name.name) }
|
2019-10-16 21:48:07 +00:00
|
|
|
|
2019-12-01 10:12:15 +00:00
|
|
|
it { expect(user.pubsub_token).not_to eq(nil) }
|
|
|
|
it { expect(user.saved_changes.keys).not_to eq('pubsub_token') }
|
2019-10-16 21:48:07 +00:00
|
|
|
end
|
2020-11-25 08:29:38 +00:00
|
|
|
|
|
|
|
context 'sso_auth_token' do
|
|
|
|
it 'can generate multiple sso tokens which can be validated' do
|
|
|
|
sso_auth_token1 = user.generate_sso_auth_token
|
|
|
|
sso_auth_token2 = user.generate_sso_auth_token
|
|
|
|
expect(sso_auth_token1).present?
|
|
|
|
expect(sso_auth_token2).present?
|
|
|
|
expect(user.valid_sso_auth_token?(sso_auth_token1)).to eq true
|
|
|
|
expect(user.valid_sso_auth_token?(sso_auth_token2)).to eq true
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'wont validate an invalid token' do
|
|
|
|
expect(user.valid_sso_auth_token?(SecureRandom.hex(32))).to eq false
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'wont validate an invalidated token' do
|
|
|
|
sso_auth_token = user.generate_sso_auth_token
|
|
|
|
user.invalidate_sso_auth_token(sso_auth_token)
|
|
|
|
expect(user.valid_sso_auth_token?(sso_auth_token)).to eq false
|
|
|
|
end
|
|
|
|
end
|
2019-10-14 08:54:58 +00:00
|
|
|
end
|