trabajo-afectivo/test/unit/user_test.rb

916 lines
26 KiB
Ruby
Raw Normal View History

# encoding: utf-8
require 'test_helper'
2014-07-27 11:40:42 +00:00
class UserTest < ActiveSupport::TestCase
test 'user' do
tests = [
{
name: '#1 - simple create',
create: {
firstname: 'Firstname',
lastname: 'Lastname',
email: 'some@example.com',
login: 'some@example.com',
updated_by_id: 1,
created_by_id: 1,
},
create_verify: {
firstname: 'Firstname',
lastname: 'Lastname',
image: nil,
fullname: 'Firstname Lastname',
email: 'some@example.com',
login: 'some@example.com',
},
},
{
name: '#2 - simple create - no lastname',
create: {
firstname: 'Firstname Lastname',
lastname: '',
email: 'some@example.com',
login: 'some@example.com',
updated_by_id: 1,
created_by_id: 1,
},
create_verify: {
firstname: 'Firstname',
lastname: 'Lastname',
image: nil,
email: 'some@example.com',
login: 'some@example.com',
},
},
2012-11-02 07:14:59 +00:00
{
name: '#3 - simple create - nil as lastname',
create: {
firstname: 'Firstname Lastname',
lastname: '',
email: 'some@example.com',
login: 'some@example.com',
updated_by_id: 1,
created_by_id: 1,
2012-11-02 07:14:59 +00:00
},
create_verify: {
firstname: 'Firstname',
lastname: 'Lastname',
image: nil,
email: 'some@example.com',
login: 'some@example.com',
2012-11-02 07:14:59 +00:00
},
},
{
name: '#4 - simple create - no lastname, firstname with ","',
create: {
firstname: 'Lastname, Firstname',
lastname: '',
email: 'some@example.com',
login: 'some@example.com',
updated_by_id: 1,
created_by_id: 1,
},
create_verify: {
firstname: 'Firstname',
lastname: 'Lastname',
email: 'some@example.com',
login: 'some@example.com',
},
},
{
name: '#5 - simple create - no lastname/firstname',
create: {
firstname: '',
lastname: '',
email: 'firstname.lastname@example.com',
login: 'login-1',
updated_by_id: 1,
created_by_id: 1,
},
create_verify: {
firstname: 'Firstname',
lastname: 'Lastname',
fullname: 'Firstname Lastname',
email: 'firstname.lastname@example.com',
login: 'login-1',
},
},
{
name: '#6 - simple create - no lastname/firstnam',
create: {
firstname: '',
lastname: '',
email: 'FIRSTNAME.lastname@example.com',
login: 'login-2',
updated_by_id: 1,
created_by_id: 1,
},
create_verify: {
firstname: 'Firstname',
lastname: 'Lastname',
email: 'firstname.lastname@example.com',
login: 'login-2',
},
},
2012-11-02 07:14:59 +00:00
{
name: '#7 - simple create - nill as fristname and lastname',
create: {
firstname: '',
lastname: '',
email: 'FIRSTNAME.lastname@example.com',
login: 'login-3',
updated_by_id: 1,
created_by_id: 1,
2012-11-02 07:14:59 +00:00
},
create_verify: {
firstname: 'Firstname',
lastname: 'Lastname',
email: 'firstname.lastname@example.com',
login: 'login-3',
2014-07-27 11:40:42 +00:00
},
},
{
name: '#8 - update with avatar check',
create: {
firstname: 'Bob',
lastname: 'Smith',
email: 'bob.smith@example.com',
login: 'login-4',
updated_by_id: 1,
created_by_id: 1,
2014-07-27 11:40:42 +00:00
},
create_verify: {
firstname: 'Bob',
lastname: 'Smith',
image: nil,
email: 'bob.smith@example.com',
login: 'login-4',
2014-07-27 11:40:42 +00:00
},
update: {
email: 'unit-test1@znuny.com',
2014-07-27 11:40:42 +00:00
},
update_verify: {
firstname: 'Bob',
lastname: 'Smith',
image: 'a6f7f7f9dac25b2c023d403ef998801c',
image_md5: 'a6f7f7f9dac25b2c023d403ef998801c',
email: 'unit-test1@znuny.com',
login: 'login-4',
2014-07-27 11:40:42 +00:00
}
},
{
name: '#9 - update create with avatar check',
create: {
firstname: 'Bob',
lastname: 'Smith',
email: 'unit-test2@znuny.com',
login: 'login-5',
updated_by_id: 1,
created_by_id: 1,
2012-11-02 07:14:59 +00:00
},
create_verify: {
firstname: 'Bob',
lastname: 'Smith',
image: '8765a1ac93f54405d8dfdd856c48c31f',
image_md5: '8765a1ac93f54405d8dfdd856c48c31f',
email: 'unit-test2@znuny.com',
login: 'login-5',
2014-07-27 11:40:42 +00:00
},
update: {
email: 'unit-test1@znuny.com',
2014-07-27 11:40:42 +00:00
},
update_verify: {
firstname: 'Bob',
lastname: 'Smith',
image: 'a6f7f7f9dac25b2c023d403ef998801c',
image_md5: 'a6f7f7f9dac25b2c023d403ef998801c',
email: 'unit-test1@znuny.com',
login: 'login-5',
2014-07-27 11:40:42 +00:00
}
2012-11-02 07:14:59 +00:00
},
2015-01-07 20:42:12 +00:00
{
name: '#10 - update create with login/email check',
create: {
firstname: '',
lastname: '',
email: 'caoyaoewfzfw@21222cn.com',
updated_by_id: 1,
created_by_id: 1,
2015-01-07 20:42:12 +00:00
},
create_verify: {
firstname: '',
lastname: '',
fullname: 'caoyaoewfzfw@21222cn.com',
email: 'caoyaoewfzfw@21222cn.com',
login: 'caoyaoewfzfw@21222cn.com',
2015-01-07 20:42:12 +00:00
},
update: {
email: 'caoyaoewfzfw@212224cn.com',
2015-01-07 20:42:12 +00:00
},
update_verify: {
firstname: '',
lastname: '',
email: 'caoyaoewfzfw@212224cn.com',
fullname: 'caoyaoewfzfw@212224cn.com',
login: 'caoyaoewfzfw@212224cn.com',
2015-01-07 20:42:12 +00:00
}
},
{
name: '#11 - update create with login/email check',
create: {
firstname: 'Firstname',
lastname: 'Lastname',
email: 'some_tEst11@example.com',
updated_by_id: 1,
created_by_id: 1,
2015-01-07 20:42:12 +00:00
},
create_verify: {
firstname: 'Firstname',
lastname: 'Lastname',
fullname: 'Firstname Lastname',
email: 'some_test11@example.com',
2015-01-07 20:42:12 +00:00
},
update: {
email: 'some_Test11-1@example.com',
2015-01-07 20:42:12 +00:00
},
update_verify: {
firstname: 'Firstname',
lastname: 'Lastname',
email: 'some_test11-1@example.com',
fullname: 'Firstname Lastname',
login: 'some_test11-1@example.com',
2015-01-07 20:42:12 +00:00
}
},
]
tests.each do |test|
2014-07-27 11:40:42 +00:00
# check if user exists
user = User.where(login: test[:create][:login]).first
2014-07-27 11:40:42 +00:00
if user
user.destroy!
2014-07-27 11:40:42 +00:00
end
user = User.create( test[:create] )
test[:create_verify].each do |key, value|
2014-07-27 11:40:42 +00:00
next if key == :image_md5
if user.respond_to?(key)
result = user.send(key)
if value.nil?
assert_nil(result, "create check #{key} in (#{test[:name]})")
else
assert_equal(value, result, "create check #{key} in (#{test[:name]})")
end
2015-01-07 20:42:12 +00:00
else
assert_equal(value, user[key], "create check #{key} in (#{test[:name]})")
2015-01-07 20:42:12 +00:00
end
end
2014-07-27 11:40:42 +00:00
if test[:create_verify][:image_md5]
file = Avatar.get_by_hash(user.image)
file_md5 = Digest::MD5.hexdigest(file.content)
assert_equal(test[:create_verify][:image_md5], file_md5, "create avatar md5 check in (#{test[:name]})")
2014-07-27 11:40:42 +00:00
end
if test[:update]
user.update!( test[:update] )
2014-07-27 11:40:42 +00:00
test[:update_verify].each do |key, value|
2014-07-27 11:40:42 +00:00
next if key == :image_md5
if user.respond_to?(key)
assert_equal(value, user.send(key), "update check #{key} in (#{test[:name]})")
2015-01-07 20:42:12 +00:00
else
assert_equal(value, user[key], "update check #{key} in (#{test[:name]})")
2015-01-07 20:42:12 +00:00
end
end
2014-07-27 11:40:42 +00:00
if test[:update_verify][:image_md5]
2014-12-01 07:32:35 +00:00
file = Avatar.get_by_hash( user.image )
file_md5 = Digest::MD5.hexdigest( file.content )
assert_equal( test[:update_verify][:image_md5], file_md5, "update avatar md5 check in (#{test[:name]})")
2014-07-27 11:40:42 +00:00
end
end
user.destroy!
end
end
test 'without email - but login eq email' do
name = rand(999_999_999)
login = "admin-role_without_email#{name}@example.com"
email = "admin-role_without_email#{name}@example.com"
admin = User.create_or_update(
login: login,
firstname: 'Role',
lastname: "Admin#{name}",
#email: "",
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
assert(admin.id)
assert_equal(admin.login, login)
assert_equal(admin.email, '')
admin.email = email
admin.save!
assert_equal(admin.login, login)
assert_equal(admin.email, email)
admin.email = ''
admin.save!
assert(admin.id)
assert(admin.login)
assert_not_equal(admin.login, login)
assert_equal(admin.email, '')
admin.destroy!
end
test 'without email - but login ne email' do
name = rand(999_999_999)
login = "admin-role_without_email#{name}"
email = "admin-role_without_email#{name}@example.com"
admin = User.create_or_update(
login: login,
firstname: 'Role',
lastname: "Admin#{name}",
#email: "",
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
assert(admin.id)
assert_equal(admin.login, login)
assert_equal(admin.email, '')
admin.email = email
admin.save!
assert_equal(admin.login, login)
assert_equal(admin.email, email)
admin.email = ''
admin.save!
assert(admin.id)
assert_equal(admin.login, login)
assert_equal(admin.email, '')
admin.destroy!
end
test 'uniq email' do
name = rand(999_999_999)
email1 = "admin1-role_without_email#{name}@example.com"
admin1 = User.create!(
login: email1,
firstname: 'Role',
lastname: "Admin1#{name}",
email: email1,
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
assert(admin1.id)
assert_equal(admin1.email, email1)
assert_raises(Exceptions::UnprocessableEntity) do
User.create!(
login: "#{email1}-1",
firstname: 'Role',
lastname: "Admin1#{name}",
email: email1,
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
end
email2 = "admin2-role_without_email#{name}@example.com"
admin2 = User.create!(
firstname: 'Role',
lastname: "Admin2#{name}",
email: email2,
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
assert_raises(Exceptions::UnprocessableEntity) do
admin2.email = email1
admin2.save!
end
admin1.email = admin1.email
admin1.save!
admin2.destroy!
admin1.destroy!
end
test 'uniq email - multiple use' do
Setting.set('user_email_multiple_use', true)
name = rand(999_999_999)
email1 = "admin1-role_without_email#{name}@example.com"
admin1 = User.create!(
login: email1,
firstname: 'Role',
lastname: "Admin1#{name}",
email: email1,
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
assert(admin1.id)
assert_equal(admin1.email, email1)
admin2 = User.create!(
login: "#{email1}-1",
firstname: 'Role',
lastname: "Admin1#{name}",
email: email1,
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
assert_equal(admin2.email, email1)
admin2.destroy!
admin1.destroy!
Setting.set('user_email_multiple_use', false)
end
test 'ensure roles' do
name = rand(999_999_999)
admin = User.create_or_update(
login: "admin-role#{name}@example.com",
firstname: 'Role',
lastname: "Admin#{name}",
email: "admin-role#{name}@example.com",
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
customer1 = User.create_or_update(
login: "user-ensure-role1-#{name}@example.com",
firstname: 'Role',
lastname: "Customer#{name}",
email: "user-ensure-role1-#{name}@example.com",
password: 'customerpw',
active: true,
updated_by_id: 1,
created_by_id: 1,
)
assert_equal(customer1.role_ids.sort, Role.signup_role_ids)
roles = Role.where(name: 'Agent')
customer1.roles = roles
customer1.save!
assert_equal(customer1.role_ids.count, 1)
assert_equal(customer1.role_ids.first, roles.first.id)
assert_equal(customer1.roles.first.id, roles.first.id)
customer1.roles = []
customer1.save!
assert_equal(customer1.role_ids.sort, Role.signup_role_ids)
customer1.destroy!
customer2 = User.create_or_update(
login: "user-ensure-role2-#{name}@example.com",
firstname: 'Role',
lastname: "Customer#{name}",
email: "user-ensure-role2-#{name}@example.com",
password: 'customerpw',
roles: roles,
active: true,
updated_by_id: 1,
created_by_id: 1,
)
assert_equal(customer2.role_ids.count, 1)
assert_equal(customer2.role_ids.first, roles.first.id)
assert_equal(customer2.roles.first.id, roles.first.id)
roles = Role.where(name: 'Admin')
customer2.role_ids = [roles.first.id]
customer2.save!
assert_equal(customer2.role_ids.count, 1)
assert_equal(customer2.role_ids.first, roles.first.id)
assert_equal(customer2.roles.first.id, roles.first.id)
customer2.roles = []
customer2.save!
assert_equal(customer2.role_ids.sort, Role.signup_role_ids)
customer2.destroy!
admin.destroy!
end
test 'user default preferences' do
name = rand(999_999_999)
groups = Group.where(name: 'Users')
roles = Role.where(name: 'Agent')
agent1 = User.create_or_update(
login: "agent-default-preferences#{name}@example.com",
firstname: 'Preferences',
lastname: "Agent#{name}",
email: "agent-default-preferences#{name}@example.com",
password: 'agentpw',
active: true,
roles: roles,
groups: groups,
preferences: {
locale: 'de-de',
},
updated_by_id: 1,
created_by_id: 1,
)
agent1 = User.find(agent1.id)
assert(agent1.preferences)
assert(agent1.preferences['locale'])
assert_equal(agent1.preferences['locale'], 'de-de')
assert(agent1.preferences['notification_config'])
assert(agent1.preferences['notification_config']['matrix'])
assert(agent1.preferences['notification_config']['matrix']['create'])
assert(agent1.preferences['notification_config']['matrix']['update'])
roles = Role.where(name: 'Customer')
customer1 = User.create_or_update(
login: "customer-default-preferences#{name}@example.com",
firstname: 'Preferences',
lastname: "Customer#{name}",
email: "customer-default-preferences#{name}@example.com",
password: 'customerpw',
active: true,
roles: roles,
preferences: {
locale: 'de-de',
},
updated_by_id: 1,
created_by_id: 1,
)
customer1 = User.find(customer1.id)
assert(customer1.preferences)
assert(customer1.preferences['locale'])
assert_equal(customer1.preferences['locale'], 'de-de')
assert_not(customer1.preferences['notification_config'])
customer1 = User.find(customer1.id)
customer1.roles = Role.where(name: 'Agent')
customer1 = User.find(customer1.id)
assert(customer1.preferences)
assert(customer1.preferences['locale'])
assert_equal(customer1.preferences['locale'], 'de-de')
assert(customer1.preferences['notification_config'])
assert(customer1.preferences['notification_config']['matrix']['create'])
assert(customer1.preferences['notification_config']['matrix']['update'])
end
test 'permission' do
test_role_1 = Role.create_or_update(
name: 'Test1',
note: 'To configure your system.',
preferences: {
not: ['Test3'],
},
updated_by_id: 1,
created_by_id: 1
)
test_role_2 = Role.create_or_update(
name: 'Test2',
note: 'To work on Tickets.',
preferences: {
not: ['Test3'],
},
updated_by_id: 1,
created_by_id: 1
)
test_role_3 = Role.create_or_update(
name: 'Test3',
note: 'People who create Tickets ask for help.',
preferences: {
not: %w(Test1 Test2),
},
updated_by_id: 1,
created_by_id: 1
)
test_role_4 = Role.create_or_update(
name: 'Test4',
note: 'Access the report area.',
preferences: {},
created_by_id: 1,
updated_by_id: 1,
)
name = rand(999_999_999)
assert_raises(RuntimeError) do
User.create_or_update(
login: "customer-role#{name}@example.com",
firstname: 'Role',
lastname: "Customer#{name}",
email: "customer-role#{name}@example.com",
password: 'customerpw',
active: true,
roles: [test_role_1, test_role_3],
updated_by_id: 1,
created_by_id: 1,
)
end
assert_raises(RuntimeError) do
User.create_or_update(
login: "customer-role#{name}@example.com",
firstname: 'Role',
lastname: "Customer#{name}",
email: "customer-role#{name}@example.com",
password: 'customerpw',
active: true,
roles: [test_role_2, test_role_3],
updated_by_id: 1,
created_by_id: 1,
)
end
user1 = User.create_or_update(
login: "customer-role#{name}@example.com",
firstname: 'Role',
lastname: "Customer#{name}",
email: "customer-role#{name}@example.com",
password: 'customerpw',
active: true,
roles: [test_role_1, test_role_2],
updated_by_id: 1,
created_by_id: 1,
)
assert(user1.role_ids.include?(test_role_1.id))
assert(user1.role_ids.include?(test_role_2.id))
assert_not(user1.role_ids.include?(test_role_3.id))
assert_not(user1.role_ids.include?(test_role_4.id))
user1 = User.create_or_update(
login: "customer-role#{name}@example.com",
firstname: 'Role',
lastname: "Customer#{name}",
email: "customer-role#{name}@example.com",
password: 'customerpw',
active: true,
roles: [test_role_1, test_role_4],
updated_by_id: 1,
created_by_id: 1,
)
assert(user1.role_ids.include?(test_role_1.id))
assert_not(user1.role_ids.include?(test_role_2.id))
assert_not(user1.role_ids.include?(test_role_3.id))
assert(user1.role_ids.include?(test_role_4.id))
assert_raises(RuntimeError) do
User.create_or_update(
login: "customer-role#{name}@example.com",
firstname: 'Role',
lastname: "Customer#{name}",
email: "customer-role#{name}@example.com",
password: 'customerpw',
active: true,
roles: [test_role_1, test_role_3],
updated_by_id: 1,
created_by_id: 1,
)
end
assert_raises(RuntimeError) do
User.create_or_update(
login: "customer-role#{name}@example.com",
firstname: 'Role',
lastname: "Customer#{name}",
email: "customer-role#{name}@example.com",
password: 'customerpw',
active: true,
roles: [test_role_2, test_role_3],
updated_by_id: 1,
created_by_id: 1,
)
end
assert(user1.role_ids.include?(test_role_1.id))
assert_not(user1.role_ids.include?(test_role_2.id))
assert_not(user1.role_ids.include?(test_role_3.id))
assert(user1.role_ids.include?(test_role_4.id))
end
test 'permission default' do
name = rand(999_999_999)
admin_count = User.with_permissions('admin').count
admin = User.create_or_update(
login: "admin-role#{name}@example.com",
firstname: 'Role',
lastname: "Admin#{name}",
email: "admin-role#{name}@example.com",
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
agent_count = User.with_permissions('ticket.agent').count
agent = User.create_or_update(
login: "agent-role#{name}@example.com",
firstname: 'Role',
lastname: "Agent#{name}",
email: "agent-role#{name}@example.com",
password: 'agentpw',
active: true,
roles: Role.where(name: 'Agent'),
updated_by_id: 1,
created_by_id: 1,
)
customer_count = User.with_permissions('ticket.customer').count
customer = User.create_or_update(
login: "customer-role#{name}@example.com",
firstname: 'Role',
lastname: "Customer#{name}",
email: "customer-role#{name}@example.com",
password: 'customerpw',
active: true,
roles: Role.where(name: 'Customer'),
updated_by_id: 1,
created_by_id: 1,
)
users = User.with_permissions('not_existing')
assert(users.empty?)
users = User.with_permissions('admin')
assert_equal(admin_count + 1, users.count)
assert_equal(admin.login, users.last.login)
users = User.with_permissions('admin.session')
assert_equal(admin_count + 1, users.count)
assert_equal(admin.login, users.last.login)
users = User.with_permissions(['admin.session', 'not_existing'])
assert_equal(admin_count + 1, users.count)
assert_equal(admin.login, users.last.login)
users = User.with_permissions('ticket.agent')
assert_equal(agent_count + 1, users.count)
assert_equal(agent.login, users.last.login)
users = User.with_permissions(['ticket.agent', 'not_existing'])
assert_equal(agent_count + 1, users.count)
assert_equal(agent.login, users.last.login)
users = User.with_permissions('ticket.customer')
assert_equal(customer_count + 1, users.count)
assert_equal(customer.login, users.last.login)
users = User.with_permissions(['ticket.customer', 'not_existing'])
assert_equal(customer_count + 1, users.count)
assert_equal(customer.login, users.last.login)
end
test 'min admin permission check' do
# workaround:
# - We need to get rid of all admin users but can't delete them
# because we have foreign keys pointing at them since the tests are not isolated yet :(
# - We can't just remove the roles since then our check would take place
# So we need to merge them with the User Nr 1 and destroy them afterwards
User.with_permissions('admin').each do |user|
Models.merge('User', 1, user.id)
user.destroy!
end
# store current admin count
admin_count_inital = User.with_permissions('admin').count
assert_equal(0, admin_count_inital)
# create two admin users
random = rand(999_999_999)
admin1 = User.create_or_update(
login: "1admin-role#{random}@example.com",
firstname: 'Role',
lastname: "Admin#{random}",
email: "admin-role#{random}@example.com",
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
random = rand(999_999_999)
admin2 = User.create_or_update(
login: "2admin-role#{random}@example.com",
firstname: 'Role',
lastname: "Admin#{random}",
email: "admin-role#{random}@example.com",
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
random = rand(999_999_999)
admin3 = User.create_or_update(
login: "2admin-role#{random}@example.com",
firstname: 'Role',
lastname: "Admin#{random}",
email: "admin-role#{random}@example.com",
password: 'adminpw',
active: true,
roles: Role.where(name: %w(Admin Agent)),
updated_by_id: 1,
created_by_id: 1,
)
admin_count_inital = User.with_permissions('admin').count
assert_equal(3, admin_count_inital)
admin1.update!(roles: Role.where(name: %w(Agent)))
admin_count_inital = User.with_permissions('admin').count
assert_equal(2, admin_count_inital)
admin2.update!(roles: Role.where(name: %w(Agent)))
admin_count_inital = User.with_permissions('admin').count
assert_equal(1, admin_count_inital)
assert_raises(Exceptions::UnprocessableEntity) do
admin3.update!(roles: Role.where(name: %w(Agent)))
end
admin_count_inital = User.with_permissions('admin').count
assert_equal(1, admin_count_inital)
end
test 'only valid agent in group permission check' do
name = rand(999_999_999)
group = Group.create!(
name: "ValidAgentGroupPermission-#{name}",
active: true,
updated_by_id: 1,
created_by_id: 1,
)
roles = Role.where(name: 'Agent')
agent1 = User.create_or_update(
login: "agent-default-vaild_agent_group_permission-1#{name}@example.com",
firstname: 'vaild_agent_group_permission-1',
lastname: "Agent#{name}",
email: "agent-default-vaild_agent_group_permission-1#{name}@example.com",
password: 'agentpw',
active: true,
roles: roles,
groups: [group],
updated_by_id: 1,
created_by_id: 1,
)
agent2 = User.create_or_update(
login: "agent-default-vaild_agent_group_permission-2#{name}@example.com",
firstname: 'vaild_agent_group_permission-2',
lastname: "Agent#{name}",
email: "agent-default-vaild_agent_group_permission-2#{name}@example.com",
password: 'agentpw',
active: true,
roles: roles,
groups: [group],
updated_by_id: 1,
created_by_id: 1,
)
assert_equal(2, User.group_access(group.id, 'full').count)
agent2.active = false
agent2.save!
assert_equal(1, User.group_access(group.id, 'full').count)
agent2.active = true
agent2.save!
assert_equal(2, User.group_access(group.id, 'full').count)
roles = Role.where(name: 'Customer')
agent2.roles = roles
agent2.save!
assert_equal(1, User.group_access(group.id, 'full').count)
end
end