mirror of
https://github.com/Freika/dawarich.git
synced 2026-01-10 17:21:38 -05:00
* Implement OmniAuth GitHub authentication * Fix omniauth GitHub scope to include user email access * Remove margin-bottom * Implement Google OAuth2 authentication * Implement OIDC authentication for Dawarich using omniauth_openid_connect gem. * Add patreon account linking and patron checking service * Update docker-compose.yml to use boolean values instead of strings * Add support for KML files * Add tests * Update changelog * Remove patreon OAuth integration * Move omniauthable to a concern * Update an icon in integrations * Update changelog * Update app version * Fix family location sharing toggle * Move family location sharing to its own controller * Update changelog * Implement basic tagging functionality for places, allowing users to categorize and label places with custom tags. * Add places management API and tags feature * Add some changes related to places management feature * Fix some tests * Fix sometests * Add places layer * Update places layer to use Leaflet.Control.Layers.Tree for hierarchical layer control * Rework tag form * Add hashtag * Add privacy zones to tags * Add notes to places and manage place tags * Update changelog * Update e2e tests * Extract tag serializer to its own file * Fix some tests * Fix tags request specs * Fix some tests * Fix rest of the tests * Revert some changes * Add missing specs * Revert changes in place export/import code * Fix some specs * Fix PlaceFinder to only consider global places when finding existing places * Fix few more specs * Fix visits creator spec * Fix last tests * Update place creating modal * Add home location based on "Home" tagged place * Save enabled tag layers * Some fixes * Fix bug where enabling place tag layers would trigger saving enabled layers, overwriting with incomplete data * Update migration to use disable_ddl_transaction! and add up/down methods * Fix tag layers restoration and filtering logic * Update OIDC auto-registration and email/password registration settings * Fix potential xss
275 lines
7.8 KiB
Ruby
275 lines
7.8 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'rails_helper'
|
|
|
|
RSpec.describe 'Imports', type: :request do
|
|
describe 'GET /imports' do
|
|
context 'when user is logged in' do
|
|
let(:user) { create(:user) }
|
|
|
|
before do
|
|
sign_in user
|
|
end
|
|
|
|
it 'returns http success' do
|
|
get imports_path
|
|
|
|
expect(response).to have_http_status(200)
|
|
end
|
|
|
|
context 'when user has imports' do
|
|
let!(:import) { create(:import, user:) }
|
|
|
|
it 'displays imports' do
|
|
get imports_path
|
|
|
|
expect(response.body).to include(import.name)
|
|
end
|
|
end
|
|
|
|
context 'when other users have imports' do
|
|
let!(:other_user) { create(:user) }
|
|
let!(:other_import) { create(:import, user: other_user) }
|
|
let!(:user_import) { create(:import, user: user) }
|
|
|
|
it 'only displays current users imports' do
|
|
get imports_path
|
|
|
|
expect(response.body).to include(user_import.name)
|
|
expect(response.body).not_to include(other_import.name)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'GET /imports/:id' do
|
|
let(:user) { create(:user) }
|
|
let(:other_user) { create(:user) }
|
|
let(:import) { create(:import, user: user) }
|
|
let(:other_import) { create(:import, user: other_user) }
|
|
|
|
context 'when user is logged in' do
|
|
before { sign_in user }
|
|
|
|
it 'allows viewing own import' do
|
|
get import_path(import)
|
|
expect(response).to have_http_status(200)
|
|
end
|
|
|
|
it 'prevents viewing other users import' do
|
|
get import_path(other_import)
|
|
|
|
expect(response).to redirect_to(root_path)
|
|
expect(flash[:alert]).to eq('You are not authorized to perform this action.')
|
|
end
|
|
end
|
|
|
|
context 'when user is not logged in' do
|
|
it 'redirects to login' do
|
|
get import_path(import)
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'GET /imports/new' do
|
|
let(:user) { create(:user) }
|
|
|
|
context 'when user is active' do
|
|
before do
|
|
allow(user).to receive(:active?).and_return(true)
|
|
sign_in user
|
|
end
|
|
|
|
it 'allows access to new import form' do
|
|
get new_import_path
|
|
expect(response).to have_http_status(200)
|
|
end
|
|
end
|
|
|
|
context 'when user is inactive' do
|
|
before do
|
|
allow(user).to receive(:active?).and_return(false)
|
|
sign_in user
|
|
end
|
|
|
|
it 'prevents access to new import form' do
|
|
get new_import_path
|
|
|
|
expect(response).to redirect_to(root_path)
|
|
expect(flash[:alert]).to eq('You are not authorized to perform this action.')
|
|
end
|
|
end
|
|
|
|
context 'when user is not logged in' do
|
|
it 'redirects to login' do
|
|
get new_import_path
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'POST /imports' do
|
|
context 'when user is logged in' do
|
|
let(:user) { create(:user) }
|
|
|
|
before { sign_in user }
|
|
|
|
context 'when importing owntracks data' do
|
|
let(:file) { fixture_file_upload('owntracks/2024-03.rec', 'text/plain') }
|
|
let(:blob) { create_blob_for_file(file) }
|
|
let(:signed_id) { generate_signed_id_for_blob(blob) }
|
|
|
|
it 'queues import job' do
|
|
allow(ActiveStorage::Blob).to receive(:find_signed).with(signed_id).and_return(blob)
|
|
|
|
expect do
|
|
post imports_path, params: { import: { source: 'owntracks', files: [signed_id] } }
|
|
end.to have_enqueued_job(Import::ProcessJob).on_queue('imports').at_least(1).times
|
|
end
|
|
|
|
it 'creates a new import' do
|
|
allow(ActiveStorage::Blob).to receive(:find_signed).with(signed_id).and_return(blob)
|
|
|
|
expect do
|
|
post imports_path, params: { import: { source: 'owntracks', files: [signed_id] } }
|
|
end.to change(user.imports, :count).by(1)
|
|
|
|
expect(response).to redirect_to(imports_path)
|
|
end
|
|
end
|
|
|
|
context 'when importing gpx data' do
|
|
let(:file) { fixture_file_upload('gpx/gpx_track_single_segment.gpx', 'application/gpx+xml') }
|
|
let(:blob) { create_blob_for_file(file) }
|
|
let(:signed_id) { generate_signed_id_for_blob(blob) }
|
|
|
|
it 'queues import job' do
|
|
allow(ActiveStorage::Blob).to receive(:find_signed).with(signed_id).and_return(blob)
|
|
|
|
expect do
|
|
post imports_path, params: { import: { source: 'gpx', files: [signed_id] } }
|
|
end.to have_enqueued_job(Import::ProcessJob).on_queue('imports').at_least(1).times
|
|
end
|
|
|
|
it 'creates a new import' do
|
|
allow(ActiveStorage::Blob).to receive(:find_signed).with(signed_id).and_return(blob)
|
|
|
|
expect do
|
|
post imports_path, params: { import: { source: 'gpx', files: [signed_id] } }
|
|
end.to change(user.imports, :count).by(1)
|
|
|
|
expect(response).to redirect_to(imports_path)
|
|
end
|
|
end
|
|
|
|
context 'when an error occurs during import creation' do
|
|
let(:file1) { fixture_file_upload('owntracks/2024-03.rec', 'text/plain') }
|
|
let(:file2) { fixture_file_upload('gpx/gpx_track_single_segment.gpx', 'application/gpx+xml') }
|
|
let(:blob1) { create_blob_for_file(file1) }
|
|
let(:blob2) { create_blob_for_file(file2) }
|
|
let(:signed_id1) { generate_signed_id_for_blob(blob1) }
|
|
let(:signed_id2) { generate_signed_id_for_blob(blob2) }
|
|
|
|
it 'deletes any created imports' do
|
|
allow(ActiveStorage::Blob).to receive(:find_signed).with(signed_id1).and_return(blob1)
|
|
|
|
allow(ActiveStorage::Blob).to receive(:find_signed).with(signed_id2).and_raise(StandardError, 'Test error')
|
|
|
|
allow(ExceptionReporter).to receive(:call)
|
|
|
|
expect do
|
|
post imports_path, params: { import: { source: 'owntracks', files: [signed_id1, signed_id2] } }
|
|
end.not_to change(Import, :count)
|
|
|
|
expect(response).to have_http_status(422)
|
|
expect(flash[:alert]).not_to be_nil
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'GET /imports/new' do
|
|
context 'when user is logged in' do
|
|
let(:user) { create(:user) }
|
|
|
|
before { sign_in user }
|
|
|
|
it 'returns http success' do
|
|
get new_import_path
|
|
|
|
expect(response).to have_http_status(200)
|
|
end
|
|
|
|
context 'when user is a trial user' do
|
|
let(:user) { create(:user, status: :trial) }
|
|
|
|
it 'returns http success' do
|
|
get new_import_path
|
|
|
|
expect(response).to have_http_status(200)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'DELETE /imports/:id' do
|
|
context 'when user is logged in' do
|
|
let(:user) { create(:user) }
|
|
let!(:import) { create(:import, user:) }
|
|
|
|
before { sign_in user }
|
|
|
|
it 'deletes the import' do
|
|
expect do
|
|
delete import_path(import)
|
|
end.to change(user.imports, :count).by(-1)
|
|
|
|
expect(response).to redirect_to(imports_path)
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'GET /imports/:id/edit' do
|
|
context 'when user is logged in' do
|
|
let(:user) { create(:user) }
|
|
let(:import) { create(:import, user:) }
|
|
|
|
before { sign_in user }
|
|
|
|
it 'returns http success' do
|
|
get edit_import_path(import)
|
|
|
|
expect(response).to have_http_status(200)
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'PATCH /imports/:id' do
|
|
context 'when user is logged in' do
|
|
let(:user) { create(:user) }
|
|
let(:import) { create(:import, user:) }
|
|
|
|
before { sign_in user }
|
|
|
|
it 'updates the import' do
|
|
patch import_path(import), params: { import: { name: 'New Name' } }
|
|
|
|
expect(import.reload.name).to eq('New Name')
|
|
expect(response).to redirect_to(imports_path)
|
|
end
|
|
end
|
|
end
|
|
|
|
def create_blob_for_file(file)
|
|
ActiveStorage::Blob.create_and_upload!(
|
|
io: file.open,
|
|
filename: file.original_filename,
|
|
content_type: file.content_type
|
|
)
|
|
end
|
|
|
|
def generate_signed_id_for_blob(blob)
|
|
blob.signed_id
|
|
end
|
|
end
|