cartodb-4.42/spec/services/carto/user_metadata_export_service_spec.rb
2024-04-06 05:25:13 +00:00

919 lines
34 KiB
Ruby

require 'spec_helper_min'
require 'factories/carto_visualizations'
require 'helpers/rate_limits_helper'
require 'helpers/account_types_helper'
describe Carto::UserMetadataExportService do
include NamedMapsHelper
include RateLimitsHelper
include AccountTypesHelper
include Carto::Factories::Visualizations
before(:all) do
bypass_named_maps
@feature_flag = create(:feature_flag)
@connector_provider = FactoryGirl.create(:connector_provider)
user = FactoryGirl.create(:carto_user)
@oauth_app = FactoryGirl.create(:oauth_app, user: user)
end
after(:all) do
@feature_flag.destroy
@connector_provider.destroy
end
before(:each) do
Cartodb::Central.any_instance.stubs(:update_user).returns(true)
end
def create_user_with_basemaps_assets_visualizations
create_account_type_fg('FREE')
@user = FactoryGirl.create(:carto_user)
@user.static_notifications = Carto::UserNotification.new(notifications: full_export[:user][:notifications])
@map, @table, @table_visualization, @visualization = create_full_visualization(@user)
@tiled_layer = FactoryGirl.create(:carto_tiled_layer)
@user.layers << @tiled_layer
@asset = FactoryGirl.create(:carto_asset, user: @user)
@user.activate_feature_flag!(@feature_flag)
CartoDB::GeocoderUsageMetrics.new(@user.username).incr(:geocoder_here, :success_responses)
@user.synchronization_oauths.create!(service: 'gdrive', token: 'wadus')
FactoryGirl.create(:connector_configuration, connector_provider: @connector_provider, user: @user)
# Convert @table_visualization into a common data imported table
sync = FactoryGirl.create(:carto_synchronization, user: @user)
@table_visualization.update_attributes!(synchronization: sync)
@table.data_import = FactoryGirl.create(:data_import, user: @user, synchronization_id: sync.id, table_id: @table.id)
@table.save!
edi = FactoryGirl.create(:external_data_import_with_external_source,
data_import: @table.data_import, synchronization: sync)
@remote_visualization = edi.external_source.visualization
@remote_visualization.update_attributes!(user: @user)
# Create SearchTweets: one associated to an existing table, and one with invalid table
@map2, @table2, @table_visualization2, @visualization2 = create_full_visualization(
@user, visualization_attributes: { name: 'waduswadus22' }
)
@table2.data_import = FactoryGirl.create(:data_import, user: @user, table_id: @table2.id)
@table2.save!
@st1 = FactoryGirl.create(:search_tweet, user_id: @user.id, data_import_id: @table2.data_import.id)
@st2 = FactoryGirl.create(
:search_tweet, user_id: @user.id, data_import_id: FactoryGirl.create(:data_import).id
)
# Rate limits
sequel_user = ::User[@user.id]
sequel_user.rate_limit_id = FactoryGirl.create(:rate_limits).id
sequel_user.save
@user.reload
# Client Application tokens
sequel_user.client_application.access_tokens << Carto::AccessToken.new(
token: "access_token",
secret: "access_secret",
callback_url: "http://callback2",
verifier: "v2",
scope: nil,
client_application_id: sequel_user.client_application.id
).save
sequel_user.client_application.oauth_tokens << Carto::OauthToken.create!(
token: "oauth_token",
secret: "oauth_secret",
callback_url: "http//callback.com",
verifier: "v1",
scope: nil,
client_application_id: sequel_user.client_application.id
)
Carto::UserMultifactorAuth.create!(user_id: @user.id, type: 'totp', last_login: Time.zone.now)
oauth_app_user = FactoryGirl.create(:oauth_app_users, oauth_app: @oauth_app, user: @user)
FactoryGirl.create(:oauth_authorization_codes, oauth_app_user: oauth_app_user)
api_key = FactoryGirl.create(:oauth_api_key, user: @user)
FactoryGirl.create(:oauth_access_tokens, oauth_app_user: oauth_app_user, api_key: api_key)
FactoryGirl.create(:oauth_refresh_tokens, oauth_app_user: oauth_app_user, scopes: ['offline'])
@user.reload
end
def destroy_user(user = @user)
# This is necessary because UserMetadataExportService loses user_id information during import.
# In part it's because we used custom code for building the corresponding ActiveRecord objects,
# instead of using ActiveRecord::Associations::CollectionProxy#build
# Since Carto::OauthTokens are not linked to the user, the delete cascade does not work
Carto::OauthToken.destroy_all
if user
user.update_attributes!(viewer: false) unless user && user.destroyed?
gum = CartoDB::GeocoderUsageMetrics.new(user.username)
$users_metadata.DEL(gum.send(:user_key_prefix, :geocoder_here, :success_responses, Time.zone.now))
user.oauth_app_users.each do |oau|
oau.skip_role_setup = true
oau.oauth_access_tokens.each { |oat| oat.api_key.skip_role_setup = true }
end
end
destroy_full_visualization(@map, @table, @table_visualization, @visualization)
destroy_full_visualization(@map2, @table2, @table_visualization2, @visualization2)
@remote_visualization.destroy
@table.data_import.destroy
@tiled_layer.destroy
@asset.destroy
[@st1, @st2].each do |st|
st.data_import.destroy
st.destroy
end
if user
user.destroy
::User[user.id].before_destroy(skip_table_drop: true)
end
end
let(:service) { Carto::UserMetadataExportService.new }
describe '#export' do
before(:all) do
Cartodb::Central.any_instance.stubs(:update_user).returns(true)
create_user_with_basemaps_assets_visualizations
end
after(:all) do
destroy_user
end
it 'exports' do
export = service.export_user_json_hash(@user)
expect_export_matches_user(export[:user], @user)
end
it 'includes all user model attributes' do
# session_salt temporarily excluded until added to the model
expected_attrs = @user.attributes.symbolize_keys.keys - [:rate_limit_id, :session_salt] + [:rate_limit]
export = service.export_user_json_hash(@user)
expect(export[:user].keys).to include(*expected_attrs)
end
end
describe '#user import' do
after :each do
if @search_tweets
@search_tweets.each do |st|
st.data_import.try(:destroy)
st.destroy
end
end
ClientApplication.where(user_id: @user.id).each(&:destroy)
@user.oauth_app_users.each do |oau|
unless oau.oauth_access_tokens.blank?
oau.oauth_access_tokens.each do |oat|
oat.api_key.skip_role_setup = true
oat.api_key.skip_cdb_conf_info = true
end
end
end
@user.destroy if @user
end
def test_import_user_from_export(export)
@user = service.build_user_from_hash_export(export)
create_account_type_fg('FREE')
service.save_imported_user(@user)
@search_tweets = service.build_search_tweets_from_hash_export(export)
@search_tweets.each { |st| service.save_imported_search_tweet(st, @user) }
expect_export_matches_user(export[:user], @user)
@user
end
it 'imports latest' do
user = test_import_user_from_export(full_export)
end
it 'imports 1.0.16 (without email_verification)' do
user = test_import_user_from_export(full_export_one_zero_sixteen)
expect(user.email_verification_token).to be_nil
expect(user.email_verification_sent_at).to be_nil
end
it 'imports 1.0.15 (without public_dataset_quota)' do
user = test_import_user_from_export(full_export_one_zero_fifteen)
expect(user.public_dataset_quota).to be_nil
end
it 'imports 1.0.14 (without session_salt)' do
user = test_import_user_from_export(full_export_one_zero_fourteen)
expect(user.session_salt).to_not eq '123456789f'
end
it 'imports 1.0.13 (without private_map_quota)' do
user = test_import_user_from_export(full_export_one_zero_thirteen)
expect(user.private_map_quota).to be_nil
end
it 'imports 1.0.12 (without company_employees and use_case)' do
user = test_import_user_from_export(full_export_one_zero_twelve)
expect(user.company_employees).to be_nil
expect(user.use_case).to be_nil
end
it 'imports 1.0.11 (without maintenance_mode)' do
user = test_import_user_from_export(full_export_one_zero_eleven)
expect(user.maintenance_mode).to eq false
end
it 'imports 1.0.10 (without regular_api_key_quota)' do
user = test_import_user_from_export(full_export_one_zero_ten)
expect(user.regular_api_key_quota).to be_nil
end
it 'imports 1.0.9 (without public_map_quota)' do
user = test_import_user_from_export(full_export_one_zero_nine)
expect(user.public_map_quota).to be_nil
end
it 'imports 1.0.8 (without oauth_apps and oauth_app_users)' do
user = test_import_user_from_export(full_export_one_zero_eight)
expect(user.oauth_apps).to be_empty
expect(user.oauth_app_users).to be_empty
end
it 'imports 1.0.7 (without user_multifactor_auths)' do
user = test_import_user_from_export(full_export_one_zero_seven)
expect(user.user_multifactor_auths).to be_empty
end
it 'imports 1.0.6 (without password_reset_token and password_reset_sent_at)' do
user = test_import_user_from_export(full_export_one_zero_six)
expect(user.password_reset_token).to be_nil
expect(user.password_reset_sent_at).to be_nil
end
it 'imports 1.0.5 (without client_application)' do
user = test_import_user_from_export(full_export_one_zero_five)
expect(user.client_applications).to be_empty
end
it 'imports 1.0.4 (without synchornization oauths nor connector configurations)' do
user = test_import_user_from_export(full_export_one_zero_four)
expect(user.synchronization_oauths).to be_empty
expect(user.connector_configurations).to be_empty
end
it 'imports 1.0.3 (without company nor phone)' do
user = test_import_user_from_export(full_export_one_zero_three)
expect(user.company).to be_nil
expect(user.phone).to be_nil
end
it 'imports 1.0.2 (without rate limits)' do
user = test_import_user_from_export(full_export_one_zero_two)
expect(user.rate_limit).to be_nil
end
it 'imports 1.0.1 (without static notifications)' do
user = test_import_user_from_export(full_export_one_zero_one)
expect(user.static_notifications.notifications).to be_empty
end
it 'imports 1.0.0 (without search tweets)' do
user = test_import_user_from_export(full_export_one_zero_zero)
expect(user.search_tweets).to be_empty
end
end
describe '#user export + import' do
after :each do
destroy_user
end
it 'export + import latest' do
create_user_with_basemaps_assets_visualizations
export_import(@user)
end
end
describe '#full export + import (user and visualizations)' do
after :each do
destroy_user(@imported_user)
end
it 'export + import user with rate limit and visualizations' do
Dir.mktmpdir do |path|
create_user_with_basemaps_assets_visualizations
full_export_import(path)
expect_rate_limits_saved_to_redis(@user.username)
end
end
it 'export + import user and visualizations for a viewer user' do
Dir.mktmpdir do |path|
create_user_with_basemaps_assets_visualizations
full_export_import_viewer(path)
expect_rate_limits_saved_to_redis(@user.username)
end
end
it 'skips a canonical visualization without a user table' do
Dir.mktmpdir do |path|
create_user_with_basemaps_assets_visualizations
# Set up fake visualizations
source_visualizations = @user.visualizations.order(:id).map(&:attributes)
canonical_without_table = source_visualizations.find { |v| v['type'] == 'table' }
UserTable.where(name: canonical_without_table['name']).delete
@user.in_database.execute("DROP TABLE #{canonical_without_table['name']}")
# Export and destroy user before import
service.export_to_directory(@user, path)
destroy_user
# At this point, the user database is still there, but the tables got destroyed.
# We recreate a dummy one for the visualization we did export
canonical_with_table = source_visualizations.find do |v|
v['type'] == 'table' && v['name'] != canonical_without_table['name']
end
@user.in_database.execute("CREATE TABLE #{canonical_with_table['name']} (cartodb_id int)")
# We import the visualizations
@imported_user = service.import_from_directory(path)
service.import_metadata_from_directory(@imported_user, path)
expect(@imported_user.visualizations.count).to eq source_visualizations.count - 1
end
end
it 'skips not remote visualizations without a map' do
Dir.mktmpdir do |path|
create_user_with_basemaps_assets_visualizations
@user.visualizations.find { |v| !v.remote? }.map.delete
full_export_import(path)
end
end
it 'keeps visualization password' do
Dir.mktmpdir do |path|
create_user_with_basemaps_assets_visualizations
@user.update_attributes(private_maps_enabled: true, private_tables_enabled: true)
v = @user.visualizations.where(type: 'derived').first
v.password = 'dont_tell_anyone'
v.privacy = 'password'
v.save!
full_export_import(path)
v.reload
expect(v.password_protected?).to be_true
expect(v.password_valid?('dont_tell_anyone')).to be_true
end
end
end
EXCLUDED_USER_META_DATE_FIELDS = ['created_at', 'updated_at', 'period_end_date', 'auth_token'].freeze
EXCLUDED_USER_META_ID_FIELDS = ['map_id', 'permission_id', 'active_layer_id', 'tags'].freeze
def compare_excluding_dates_and_ids(v1, v2)
filtered1 = v1.reject { |k, _| EXCLUDED_USER_META_ID_FIELDS.include?(k) }
filtered2 = v2.reject { |k, _| EXCLUDED_USER_META_ID_FIELDS.include?(k) }
compare_excluding_dates(filtered1, filtered2)
end
def compare_excluding_dates(u1, u2)
filtered1 = u1.reject { |k, _| EXCLUDED_USER_META_DATE_FIELDS.include?(k) }
filtered2 = u2.reject { |k, _| EXCLUDED_USER_META_DATE_FIELDS.include?(k) }
expect(filtered1).to eq filtered2
expect(u1['period_end_date'].try(:round)).to eq(u2['period_end_date'].try(:round)) # Ignore microseconds
end
def expect_export_matches_user(export, user)
# session_salt is generated on user creation, it's ok if it's different on exports < 1.0.15
attributes_to_check = Carto::UserMetadataExportService::EXPORTED_USER_ATTRIBUTES - [:session_salt]
attributes_to_check.each do |att|
error = "attribute #{att.inspect} expected: #{user.attributes[att.to_s].inspect} got: #{export[att].inspect}"
expect(export[att]).to eq(user.attributes[att.to_s]), error
end
expect(export[:layers].count).to eq user.layers.size
export[:layers].zip(user.layers).each { |exported_layer, layer| expect_export_matches_layer(exported_layer, layer) }
expect(export[:assets].count).to eq user.assets.size
export[:assets].zip(user.assets).each { |exported_asset, asset| expect_export_matches_asset(exported_asset, asset) }
expect(export[:feature_flags]).to eq user.feature_flags_names
if export[:search_tweets]
expect(export[:search_tweets].count).to eq user.search_tweets.size
export[:search_tweets].zip(user.search_tweets).each do |exported_search_tweet, search_tweet|
expect_export_matches_search_tweet(exported_search_tweet, search_tweet)
end
else
expect(user.search_tweets).to be_empty
end
if export[:synchronization_oauths]
expect(export[:synchronization_oauths].count).to eq user.synchronization_oauths.size
export[:synchronization_oauths].zip(user.synchronization_oauths).each do |exported_so, so|
expect_export_matches_synchronization_oauth(exported_so, so)
end
else
expect(user.synchronization_oauths).to be_empty
end
if export[:connector_configurations]
expect(export[:connector_configurations].count).to eq user.connector_configurations.size
export[:connector_configurations].zip(user.connector_configurations).each do |exported_cc, cc|
expect_export_matches_connector_configuration(exported_cc, cc)
end
else
expect(user.connector_configurations).to be_empty
end
expect_export_matches_rate_limit(export[:rate_limit], user.rate_limit)
expect_export_matches_client_application(export[:client_application], ::User.find(id: user.id).client_application)
if export[:user_multifactor_auths]
expect(export[:user_multifactor_auths].count).to eq user.user_multifactor_auths.size
export[:user_multifactor_auths].zip(user.user_multifactor_auths).each do |exported_uma, uma|
expect_export_matches_user_multifactor_auth(exported_uma, uma)
end
else
expect(user.user_multifactor_auths).to be_empty
end
if export[:oauth_app_users]
expect_export_matches_oauth_app_users(export[:oauth_app_users].first, user.oauth_app_users.first)
else
expect(user.oauth_app_users).to be_empty
end
end
def expect_export_matches_layer(exported_layer, layer)
expect(exported_layer[:options]).to eq layer.options
expect(exported_layer[:kind]).to eq layer.kind
end
def expect_export_matches_asset(exported_asset, asset)
expect(exported_asset[:public_url]).to eq asset.public_url
expect(exported_asset[:kind]).to eq asset.kind
expect(exported_asset[:storage_info]).to eq asset.storage_info
end
def expect_redis_restored(user)
expect(CartoDB::GeocoderUsageMetrics.new(user.username).get(:geocoder_here, :success_responses)).to eq(1)
end
def expect_export_matches_search_tweet(exported_search_tweet, search_tweet)
if exported_search_tweet[:data_import]
expect(exported_search_tweet[:data_import][:id]).to eq search_tweet.data_import.id
else
expect(search_tweet.data_import).to be_nil
end
expect(exported_search_tweet[:service_item_id]).to eq search_tweet.service_item_id
expect(exported_search_tweet[:retrieved_items]).to eq search_tweet.retrieved_items
expect(exported_search_tweet[:state]).to eq search_tweet.state
expect(exported_search_tweet[:created_at].to_s).to eq search_tweet.created_at.to_s
expect(exported_search_tweet[:updated_at].to_s).to eq search_tweet.updated_at.to_s
end
def expect_export_matches_synchronization_oauth(exported_so, so)
expect(exported_so[:service]).to eq so.service
expect(exported_so[:token]).to eq so.token
expect(exported_so[:created_at].to_s).to eq so.created_at.to_s
expect(exported_so[:updated_at].to_s).to eq so.updated_at.to_s
end
def expect_export_matches_connector_configuration(exported_cc, cc)
expect(exported_cc[:enabled]).to eq cc.enabled
expect(exported_cc[:max_rows]).to eq cc.max_rows
expect(exported_cc[:created_at].to_s).to eq cc.created_at.to_s
expect(exported_cc[:updated_at].to_s).to eq cc.updated_at.to_s
expect(exported_cc[:provider_name]).to eq cc.connector_provider.name
end
def expect_export_matches_rate_limit(exported_rate_limit, rate_limit)
expect(exported_rate_limit).to be_nil && return unless rate_limit
expect(exported_rate_limit[:id]).to eq rate_limit.id
rate_limit.api_attributes.each do |k, v|
# versions older than 1.0.6 don't include sql_copy rate limits so avoid checking them
next if [:sql_copy_from, :sql_copy_to].include?(k) && !exported_rate_limit[:limits].key?(k)
expect(exported_rate_limit[:limits][k]).to eq v
end
end
def expect_export_matches_client_application(exported_app, app)
expect(exported_app).to be_nil && return unless app
expect(exported_app[:name]).to eq app.name
expect(exported_app[:url]).to eq app.url
expect(exported_app[:support_url]).to eq app.support_url
expect(exported_app[:callback_url]).to eq app.callback_url
expect(exported_app[:key]).to eq app.key
expect(exported_app[:secret]).to eq app.secret
# Compare dates using AR conversions
fake_app = Carto::ClientApplication.new(
created_at: exported_app[:created_at],
updated_at: exported_app[:updated_at]
)
expect(fake_app.created_at).to eq app.created_at
expect(fake_app.updated_at).to eq app.updated_at
expect(exported_app[:oauth_tokens].size + exported_app[:access_tokens].size).to eq app.oauth_tokens.size
exported_app[:oauth_tokens].each do |ex_t|
expect_exported_token_matches_token(ex_t, app.oauth_tokens.find { |t| t.token == ex_t[:token] })
end
expect(exported_app[:access_tokens].size).to eq app.access_tokens.size
exported_app[:access_tokens].each do |ex_t|
expect_exported_token_matches_token(ex_t, app.access_tokens.find { |t| t.token == ex_t[:token] })
end
end
def expect_export_matches_user_multifactor_auth(exported_uma, uma)
expect(exported_uma).to be_nil && return unless uma
expect(exported_uma[:user_id]).to eq uma.user_id
expect(exported_uma[:type]).to eq uma.type
expect(exported_uma[:shared_secret]).to eq uma.shared_secret
expect(exported_uma[:enabled]).to eq uma.enabled
fake_uma = Carto::UserMultifactorAuth.new(
last_login: exported_uma[:last_login],
created_at: exported_uma[:created_at],
updated_at: exported_uma[:updated_at]
)
expect(fake_uma.last_login).to eq uma.last_login
expect(fake_uma.created_at).to eq uma.created_at
expect(fake_uma.updated_at).to eq uma.updated_at
end
def expect_exported_token_matches_token(exported_t, token)
expect(exported_t[:token]).to eq token.token
expect(exported_t[:secret]).to eq token.secret
expect(exported_t[:callback_url]).to eq token.callback_url
expect(exported_t[:verifier]).to eq token.verifier
expect(exported_t[:scope]).to eq token.scope
# Compare dates using AR conversions
fake_app = Carto::OauthToken.new(
authorized_at: exported_t[:authorized_at],
invalidated_at: exported_t[:invalidated_at],
valid_to: exported_t[:valid_to],
created_at: exported_t[:created_at],
updated_at: exported_t[:updated_at]
)
expect(fake_app.authorized_at).to eq token.authorized_at
expect(fake_app.invalidated_at).to eq token.invalidated_at
expect(fake_app.valid_to).to eq token.valid_to
expect(fake_app.created_at).to eq token.created_at
expect(fake_app.updated_at).to be <= token.updated_at
end
def expect_export_matches_oauth_app_users(exported_oauth_app_user, oauth_app_user)
expect(exported_oauth_app_user).to be_nil && return unless oauth_app_user
expect(exported_oauth_app_user[:id]).to eq oauth_app_user.id
expect(exported_oauth_app_user[:oauth_app_id]).to eq oauth_app_user.oauth_app_id
expect(exported_oauth_app_user[:scopes]).to eq oauth_app_user.scopes
expect_export_matches_oauth_app_users_dates(exported_oauth_app_user, oauth_app_user)
expect_export_matches_oauth_app_users_friends(exported_oauth_app_user, oauth_app_user, oauth_app_user.id)
end
def expect_export_matches_oauth_app_users_friends(exported_oauth_app_user, oauth_app_user, oauth_app_user_id)
if exported_oauth_app_user[:oauth_authorization_codes]
expect_export_matches_oauth_authorization_codes(
exported_oauth_app_user[:oauth_authorization_codes].first,
oauth_app_user.oauth_authorization_codes.first,
oauth_app_user_id
)
end
if exported_oauth_app_user[:oauth_access_tokens]
expect_export_matches_oauth_access_tokens(
exported_oauth_app_user[:oauth_access_tokens].first,
oauth_app_user.oauth_access_tokens.first,
oauth_app_user_id
)
end
if exported_oauth_app_user[:oauth_refresh_tokens]
expect_export_matches_oauth_refresh_tokens(
exported_oauth_app_user[:oauth_refresh_tokens].first,
oauth_app_user.oauth_refresh_tokens.first,
oauth_app_user_id
)
end
end
def expect_export_matches_oauth_app_users_dates(exported_oauth_app_user, oauth_app_user)
fake_oauth_app_user = Carto::OauthAppUser.new(
created_at: exported_oauth_app_user[:created_at],
updated_at: exported_oauth_app_user[:updated_at]
)
expect(fake_oauth_app_user.created_at).to eq oauth_app_user.created_at
expect(fake_oauth_app_user.updated_at).to eq oauth_app_user.updated_at
end
def expect_export_matches_oauth_authorization_codes(exported_oac, oac, oauth_app_user_id)
expect(exported_oac).to be_nil && return unless oac
expect(oauth_app_user_id).to eq oac.oauth_app_user_id
expect(exported_oac[:scopes]).to eq oac.scopes
expect(exported_oac[:code]).to eq oac.code
expect(exported_oac[:redirect_uri]).to eq oac.redirect_uri
expect_export_matches_oauth_authorization_codes_dates(exported_oac, oac)
end
def expect_export_matches_oauth_authorization_codes_dates(exported_oac, oac)
fake_oauth_authorization_code = Carto::OauthAuthorizationCode.new(
created_at: exported_oac[:created_at]
)
expect(fake_oauth_authorization_code.created_at).to eq oac.created_at
end
def expect_export_matches_oauth_access_tokens(exported_oauth_access_token, oauth_access_token, oauth_app_user_id)
expect(exported_oauth_access_token).to be_nil && return unless oauth_access_token
expect(oauth_app_user_id).to eq oauth_access_token.oauth_app_user_id
expect(exported_oauth_access_token[:api_key_id]).to eq oauth_access_token.api_key_id
expect(exported_oauth_access_token[:scopes]).to eq oauth_access_token.scopes
fake_oauth_access_token = Carto::OauthAccessToken.new(
created_at: oauth_access_token[:created_at]
)
expect(fake_oauth_access_token.created_at).to eq oauth_access_token.created_at
end
def expect_export_matches_oauth_refresh_tokens(exported_oauth_refresh_token, oauth_refresh_token, oauth_app_user_id)
expect(exported_oauth_refresh_token).to be_nil && return unless oauth_refresh_token
expect(oauth_app_user_id).to eq oauth_refresh_token.oauth_app_user_id
expect(exported_oauth_refresh_token[:token]).to eq oauth_refresh_token.token
expect(exported_oauth_refresh_token[:scopes]).to eq oauth_refresh_token.scopes
fake_oauth_refresh_token = Carto::OauthRefreshToken.new(
created_at: oauth_refresh_token[:created_at],
updated_at: oauth_refresh_token[:updated_at]
)
expect(fake_oauth_refresh_token.created_at).to eq oauth_refresh_token.created_at
expect(fake_oauth_refresh_token.updated_at).to eq oauth_refresh_token.updated_at
end
def export_import(user)
export = service.export_user_json_hash(user)
expect_export_matches_user(export[:user], user)
source_user = user.attributes
destroy_user
imported_user = service.build_user_from_hash_export(export)
service.save_imported_user(imported_user)
imported_user.reload
search_tweets = service.build_search_tweets_from_hash_export(export)
search_tweets.each { |st| service.save_imported_search_tweet(st, imported_user) }
expect_export_matches_user(export[:user], imported_user)
compare_excluding_dates(imported_user.attributes, source_user)
end
def full_export_import(path)
@visualization.mark_as_vizjson2
service.export_to_directory(@user, path)
source_user = @user.attributes
source_visualizations = @user.visualizations.order(:id).reject { |v| !v.remote? && !v.map }.map(&:attributes)
source_tweets = @user.search_tweets.map(&:attributes)
synchronization_oauths = @user.synchronization_oauths.map(&:attributes)
destroy_user
# At this point, the user database is still there, but the tables got destroyed. We recreate some dummy ones
source_visualizations.select { |v| v['type'] == 'table' }.each do |v|
@user.in_database.execute("CREATE TABLE #{v['name']} (cartodb_id int)")
end
# Clean redis for vizjson2 marking
$tables_metadata.del(Carto::Visualization::V2_VISUALIZATIONS_REDIS_KEY)
expect(@visualization.uses_vizjson2?).to be_false
@imported_user = service.import_from_directory(path)
service.import_metadata_from_directory(@imported_user, path)
compare_excluding_dates(@imported_user.attributes, source_user)
expect_redis_restored(@imported_user)
expect(@imported_user.visualizations.count).to eq source_visualizations.count
@imported_user.visualizations.order(:id).zip(source_visualizations).each do |v1, v2|
compare_excluding_dates_and_ids(v1.attributes, v2)
end
expect(@visualization.uses_vizjson2?).to be_true
@imported_user.search_tweets.zip(source_tweets).each do |st1, st2|
expect(st1.user_id).to eq @imported_user.id
expect(st1.service_item_id).to eq st2['service_item_id']
expect(st1.retrieved_items).to eq st2['retrieved_items']
expect(st1.state).to eq st2['state']
end
@imported_user.static_notifications.notifications.should eq full_export[:user][:notifications]
@imported_user.synchronization_oauths.zip(synchronization_oauths).each do |so1, so2|
expect(so1.user_id).to eq @imported_user.id
expect(so1.service).to eq so2['service']
expect(so1.token).to eq so2['token']
end
end
def full_export_import_viewer(path)
@user.update_attributes(viewer: true)
::User[@user.id].reload # Refresh Sequel cache
service.export_to_directory(@user, path)
source_user = @user.attributes
source_visualizations = @user.visualizations.order(:id).map(&:attributes)
source_tweets = @user.search_tweets.map(&:attributes)
@user.update_attributes(viewer: false) # For destruction purposes
destroy_user
# At this point, the user database is still there, but the tables got destroyed. We recreate some dummy ones
source_visualizations.select { |v| v['type'] == 'table' }.each do |v|
@user.in_database.execute("CREATE TABLE #{v['name']} (cartodb_id int)")
end
@imported_user = service.import_from_directory(path)
service.import_metadata_from_directory(@imported_user, path)
compare_excluding_dates(@imported_user.attributes, source_user)
expect_redis_restored(@imported_user)
expect(@imported_user.visualizations.count).to eq source_visualizations.count
@imported_user.visualizations.order(:id).zip(source_visualizations).each do |v1, v2|
compare_excluding_dates_and_ids(v1.attributes, v2)
end
@imported_user.search_tweets.zip(source_tweets).each do |st1, st2|
expect(st1.user_id).to eq @imported_user.id
expect(st1.service_item_id).to eq st2['service_item_id']
expect(st1.retrieved_items).to eq st2['retrieved_items']
expect(st1.state).to eq st2['state']
end
end
let(:service_item_id) do
'{\"dates\":{\"fromDate\":\"2014-07-29\",\"fromHour\":0,\"fromMin\":0,\"toDate\":'\
'\"2014-08-27\",\"toHour\":23,\"toMin\":59,\"user_timezone\":0,\"max_days\":30},\"categories\":'\
'[{\"terms\":[\"cartodb\"],\"category\":\"1\",\"counter\":1007}]}'
end
let(:full_export) do
UserMetadataExportFactory.full_export(connector_provider: @connector_provider, oauth_app: @oauth_app, service_item_id: service_item_id)
end
let(:full_export_one_zero_sixteen) do
user_hash = full_export[:user].except!(:email_verification_token, :email_veritification_sent_at)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_fifteen) do
user_hash = full_export[:user].except!(:public_dataset_quota)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_fourteen) do
user_hash = full_export_one_zero_fifteen[:user].except!(:session_salt)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_thirteen) do
user_hash = full_export_one_zero_fourteen[:user].except!(:private_map_quota)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_twelve) do
user_hash = full_export_one_zero_thirteen[:user].except!(:use_case, :company_employees)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_eleven) do
full_export_one_zero_twelve[:user][:maintenance_mode] = false
full_export
end
let(:full_export_one_zero_ten) do
user_hash = full_export_one_zero_eleven[:user].except!(:regular_api_key_quota)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_nine) do
user_hash = full_export_one_zero_ten[:user].except!(:public_map_quota)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_eight) do
user_hash = full_export_one_zero_nine[:user].except!(:oauth_app_users)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_seven) do
user_hash = full_export_one_zero_eight[:user].except!(:user_multifactor_auths)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_six) do
user_hash = full_export_one_zero_seven[:user].except!(:password_reset_token, :password_reset_sent_at)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_five) do
user_hash = full_export_one_zero_six[:user].except!(:client_application)
limits_hash = full_export[:user][:rate_limit][:limits]
full_export[:user] = user_hash
full_export[:user][:rate_limit][:limits] = limits_hash.except!(:sql_copy_from).except!(:sql_copy_to)
full_export
end
let(:full_export_one_zero_four) do
user_hash = full_export_one_zero_five[:user].except!(:synchronization_oauths, :connector_configurations)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_three) do
user_hash = full_export_one_zero_four[:user].except!(:company).except!(:phone)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_two) do
user_hash = full_export_one_zero_three[:user].except!(:rate_limit)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_one) do
user_hash = full_export_one_zero_two[:user].except!(:notifications)
full_export[:user] = user_hash
full_export
end
let(:full_export_one_zero_zero) do
user_hash = full_export_one_zero_one[:user].except!(:search_tweets)
full_export[:user] = user_hash
full_export
end
end