blob: 8b8c0dbdd3e797fb58c503d5c3f4e818ed3916da (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
|
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe Users::ActivateService, feature_category: :user_management do
let_it_be(:current_user) { build(:admin) }
subject(:service) { described_class.new(current_user) }
describe '#execute' do
let!(:user) { create(:user, :deactivated) }
subject(:operation) { service.execute(user) }
context 'when successful', :enable_admin_mode do
it 'returns success status' do
expect(operation[:status]).to eq(:success)
end
it "changes the user's state" do
expect { operation }.to change { user.state }.to('active')
end
it 'creates a log entry' do
expect(Gitlab::AppLogger).to receive(:info).with(message: "User activated", user: user.username,
email: user.email, activated_by: current_user.username, ip_address: current_user.current_sign_in_ip.to_s)
operation
end
end
context 'when the user is already active', :enable_admin_mode do
let(:user) { create(:user) }
it 'returns success result' do
aggregate_failures 'success result' do
expect(operation[:status]).to eq(:success)
expect(operation[:message]).to eq('Successfully activated')
end
end
it "does not change the user's state" do
expect { operation }.not_to change { user.state }
end
end
context 'when user activation fails', :enable_admin_mode do
before do
allow(user).to receive(:activate).and_return(false)
end
it 'returns an unprocessable entity error' do
result = service.execute(user)
expect(result[:status]).to eq(:error)
expect(result[:reason]).to eq(:unprocessable_entity)
end
end
context 'when user is not an admin' do
let(:non_admin_user) { build(:user) }
let(:service) { described_class.new(non_admin_user) }
it 'returns permissions error message' do
expect(operation[:status]).to eq(:error)
expect(operation[:message]).to eq("You are not authorized to perform this action")
expect(operation.reason).to eq :forbidden
end
end
end
end
|