108 lines
3.5 KiB
Ruby
108 lines
3.5 KiB
Ruby
require 'test_helper'
|
|
|
|
class IpBansControllerTest < ActionDispatch::IntegrationTest
|
|
context "The ip bans controller" do
|
|
setup do
|
|
@admin = create(:admin_user, name: "yukari")
|
|
@ip_ban = create(:ip_ban, ip_addr: "6.7.8.9")
|
|
end
|
|
|
|
context "new action" do
|
|
should "render" do
|
|
get_auth new_ip_ban_path, @admin
|
|
assert_response :success
|
|
end
|
|
end
|
|
|
|
context "create action" do
|
|
should "create a new ip ban" do
|
|
assert_difference("IpBan.count", 1) do
|
|
post_auth ip_bans_path, @admin, params: {:ip_ban => {:ip_addr => "1.2.3.4", :reason => "xyz"}}
|
|
|
|
assert_response :redirect
|
|
end
|
|
end
|
|
|
|
should "log a mod action" do
|
|
post_auth ip_bans_path, @admin, params: { ip_ban: { ip_addr: "1.2.3.4", reason: "xyz" }}
|
|
|
|
assert_equal("ip_ban_create", ModAction.last&.category)
|
|
assert_match(/created ip ban for 1\.2\.3\.4/, ModAction.last.description)
|
|
assert_equal(IpBan.last, ModAction.last.subject)
|
|
assert_equal(@admin, ModAction.last.creator)
|
|
end
|
|
end
|
|
|
|
context "index action" do
|
|
setup do
|
|
CurrentUser.user = @admin
|
|
@subnet_ban = create(:ip_ban, ip_addr: "2.0.0.0/24", creator: @admin)
|
|
@other_ban = create(:ip_ban, ip_addr: "1.2.3.4", reason: "malware")
|
|
end
|
|
|
|
should "render access denied for anonymous users" do
|
|
get ip_bans_path
|
|
assert_response 403
|
|
end
|
|
|
|
should "render" do
|
|
get_auth ip_bans_path, @admin
|
|
assert_response :success
|
|
end
|
|
|
|
should respond_to_search({}).with { [@other_ban, @subnet_ban, @ip_ban] }
|
|
should respond_to_search(ip_addr: "6.7.8.9").with { @ip_ban }
|
|
should respond_to_search(reason_matches: "malware").with { @other_ban }
|
|
|
|
context "using includes" do
|
|
should respond_to_search(creator_name: "yukari").with { @subnet_ban }
|
|
should respond_to_search(creator: {level: User::Levels::ADMIN}).with { @subnet_ban }
|
|
end
|
|
end
|
|
|
|
context "show action" do
|
|
should "redirect for html" do
|
|
get_auth ip_ban_path(@ip_ban), @admin
|
|
|
|
assert_redirected_to ip_bans_path(search: { id: @ip_ban.id })
|
|
end
|
|
|
|
should "render for json" do
|
|
get_auth ip_ban_path(@ip_ban), @admin, as: :json
|
|
|
|
assert_response :success
|
|
end
|
|
|
|
should "render 403 for an unauthorized user" do
|
|
get ip_ban_path(@ip_ban)
|
|
|
|
assert_response 403
|
|
end
|
|
end
|
|
|
|
context "update action" do
|
|
should "mark an ip ban as deleted" do
|
|
put_auth ip_ban_path(@ip_ban), @admin, params: { ip_ban: { is_deleted: true }, format: "js" }
|
|
assert_response :success
|
|
assert_equal(true, @ip_ban.reload.is_deleted)
|
|
assert_equal("ip_ban_delete", ModAction.last.category)
|
|
assert_match(/deleted ip ban for #{@ip_ban.ip_addr}/, ModAction.last.description)
|
|
assert_equal(@ip_ban, ModAction.last.subject)
|
|
assert_equal(@admin, ModAction.last.creator)
|
|
end
|
|
|
|
should "mark an ip ban as undeleted" do
|
|
@ip_ban = create(:ip_ban, ip_addr: "5.6.7.8", is_deleted: true)
|
|
put_auth ip_ban_path(@ip_ban), @admin, params: { ip_ban: { is_deleted: false }, format: "js" }
|
|
|
|
assert_response :success
|
|
assert_equal(false, @ip_ban.reload.is_deleted?)
|
|
assert_equal("ip_ban_undelete", ModAction.last.category)
|
|
assert_match(/undeleted ip ban for #{@ip_ban.ip_addr}/, ModAction.last.description)
|
|
assert_equal(@ip_ban, ModAction.last.subject)
|
|
assert_equal(@admin, ModAction.last.creator)
|
|
end
|
|
end
|
|
end
|
|
end
|