1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
|
# frozen_string_literal: true
FactoryBot.define do
factory :user, aliases: [:author, :assignee, :recipient, :owner, :resource_owner] do
email { generate(:email) }
name { generate(:name) }
username { generate(:username) }
password { "12345678" }
role { 'software_developer' }
confirmed_at { Time.now }
confirmation_token { nil }
can_create_group { true }
after(:stub) do |user|
user.notification_email = user.email
end
trait :admin do
admin { true }
end
trait :blocked do
after(:build) { |user, _| user.block! }
end
trait :blocked_pending_approval do
after(:build) { |user, _| user.block_pending_approval! }
end
trait :ldap_blocked do
after(:build) { |user, _| user.ldap_block! }
end
trait :bot do
user_type { :alert_bot }
end
trait :deactivated do
after(:build) { |user, _| user.deactivate! }
end
trait :project_bot do
user_type { :project_bot }
end
trait :migration_bot do
user_type { :migration_bot }
end
trait :security_bot do
user_type { :security_bot }
end
trait :external do
external { true }
end
trait :two_factor do
two_factor_via_otp
end
trait :ghost do
user_type { :ghost }
after(:build) { |user, _| user.block! }
end
trait :unconfirmed do
confirmed_at { nil }
end
trait :with_avatar do
avatar { fixture_file_upload('spec/fixtures/dk.png') }
end
trait :with_sign_ins do
sign_in_count { 3 }
current_sign_in_at { FFaker::Time.between(10.days.ago, 1.day.ago) }
last_sign_in_at { FFaker::Time.between(10.days.ago, 1.day.ago) }
current_sign_in_ip { '127.0.0.1' }
last_sign_in_ip { '127.0.0.1' }
end
trait :two_factor_via_otp do
before(:create) do |user|
user.otp_required_for_login = true
user.otp_secret = User.generate_otp_secret(32)
user.otp_grace_period_started_at = Time.now
user.generate_otp_backup_codes!
end
end
trait :two_factor_via_u2f do
transient { registrations_count { 5 } }
after(:create) do |user, evaluator|
create_list(:u2f_registration, evaluator.registrations_count, user: user)
end
end
trait :two_factor_via_webauthn do
transient { registrations_count { 5 } }
after(:create) do |user, evaluator|
create_list(:webauthn_registration, evaluator.registrations_count, user: user)
end
end
trait :readme do
project_view { :readme }
end
trait :commit_email do
after(:create) do |user, evaluator|
additional = create(:email, :confirmed, user: user, email: "commit-#{user.email}")
user.update!(commit_email: additional.email)
end
end
transient do
developer_projects { [] }
maintainer_projects { [] }
end
after(:create) do |user, evaluator|
evaluator.developer_projects.each do |project|
project.add_developer(user)
end
evaluator.maintainer_projects.each do |project|
project.add_maintainer(user)
end
end
factory :omniauth_user do
transient do
extern_uid { '123456' }
provider { 'ldapmain' }
end
after(:create) do |user, evaluator|
identity_attrs = {
provider: evaluator.provider,
extern_uid: evaluator.extern_uid
}
if evaluator.respond_to?(:saml_provider)
identity_attrs[:saml_provider] = evaluator.saml_provider
end
user.identities << create(:identity, identity_attrs)
end
end
factory :atlassian_user do
transient do
extern_uid { generate(:username) }
end
after(:create) do |user, evaluator|
create(:atlassian_identity, user: user, extern_uid: evaluator.extern_uid)
end
end
factory :admin, traits: [:admin]
end
end
|