From 48aff82709769b098321c738f3444b9bdaa694c6 Mon Sep 17 00:00:00 2001 From: GitLab Bot Date: Wed, 21 Oct 2020 07:08:36 +0000 Subject: Add latest changes from gitlab-org/gitlab@13-5-stable-ee --- spec/channels/application_cable/connection_spec.rb | 52 +++++++++++++++------- 1 file changed, 36 insertions(+), 16 deletions(-) (limited to 'spec/channels') diff --git a/spec/channels/application_cable/connection_spec.rb b/spec/channels/application_cable/connection_spec.rb index e5f7ea1103c..7d60548f780 100644 --- a/spec/channels/application_cable/connection_spec.rb +++ b/spec/channels/application_cable/connection_spec.rb @@ -5,27 +5,39 @@ require 'spec_helper' RSpec.describe ApplicationCable::Connection, :clean_gitlab_redis_shared_state do let(:session_id) { Rack::Session::SessionId.new('6919a6f1bb119dd7396fadc38fd18d0d') } - before do - Gitlab::Redis::SharedState.with do |redis| - redis.set("session:gitlab:#{session_id.private_id}", Marshal.dump(session_hash)) + context 'when session cookie is set' do + before do + Gitlab::Redis::SharedState.with do |redis| + redis.set("session:gitlab:#{session_id.private_id}", Marshal.dump(session_hash)) + end + + cookies[Gitlab::Application.config.session_options[:key]] = session_id.public_id end - cookies[Gitlab::Application.config.session_options[:key]] = session_id.public_id - end + context 'when user is logged in' do + let(:user) { create(:user) } + let(:session_hash) { { 'warden.user.user.key' => [[user.id], user.encrypted_password[0, 29]] } } + + it 'sets current_user' do + connect + + expect(connection.current_user).to eq(user) + end - context 'when user is logged in' do - let(:user) { create(:user) } - let(:session_hash) { { 'warden.user.user.key' => [[user.id], user.encrypted_password[0, 29]] } } + context 'with a stale password' do + let(:partial_password_hash) { build(:user, password: 'some_old_password').encrypted_password[0, 29] } + let(:session_hash) { { 'warden.user.user.key' => [[user.id], partial_password_hash] } } - it 'sets current_user' do - connect + it 'sets current_user to nil' do + connect - expect(connection.current_user).to eq(user) + expect(connection.current_user).to be_nil + end + end end - context 'with a stale password' do - let(:partial_password_hash) { build(:user, password: 'some_old_password').encrypted_password[0, 29] } - let(:session_hash) { { 'warden.user.user.key' => [[user.id], partial_password_hash] } } + context 'when user is not logged in' do + let(:session_hash) { {} } it 'sets current_user to nil' do connect @@ -35,10 +47,18 @@ RSpec.describe ApplicationCable::Connection, :clean_gitlab_redis_shared_state do end end - context 'when user is not logged in' do - let(:session_hash) { {} } + context 'when session cookie is not set' do + it 'sets current_user to nil' do + connect + + expect(connection.current_user).to be_nil + end + end + context 'when session cookie is an empty string' do it 'sets current_user to nil' do + cookies[Gitlab::Application.config.session_options[:key]] = '' + connect expect(connection.current_user).to be_nil -- cgit v1.2.3