919 lines
34 KiB
Ruby
919 lines
34 KiB
Ruby
require 'spec_helper_min'
|
|
require 'factories/carto_visualizations'
|
|
require 'helpers/rate_limits_helper'
|
|
require 'helpers/account_types_helper'
|
|
|
|
describe Carto::UserMetadataExportService do
|
|
include NamedMapsHelper
|
|
include RateLimitsHelper
|
|
include AccountTypesHelper
|
|
include Carto::Factories::Visualizations
|
|
|
|
before(:all) do
|
|
bypass_named_maps
|
|
@feature_flag = create(:feature_flag)
|
|
@connector_provider = FactoryGirl.create(:connector_provider)
|
|
user = FactoryGirl.create(:carto_user)
|
|
@oauth_app = FactoryGirl.create(:oauth_app, user: user)
|
|
end
|
|
|
|
after(:all) do
|
|
@feature_flag.destroy
|
|
@connector_provider.destroy
|
|
end
|
|
|
|
before(:each) do
|
|
Cartodb::Central.any_instance.stubs(:update_user).returns(true)
|
|
end
|
|
|
|
def create_user_with_basemaps_assets_visualizations
|
|
create_account_type_fg('FREE')
|
|
@user = FactoryGirl.create(:carto_user)
|
|
@user.static_notifications = Carto::UserNotification.new(notifications: full_export[:user][:notifications])
|
|
@map, @table, @table_visualization, @visualization = create_full_visualization(@user)
|
|
|
|
@tiled_layer = FactoryGirl.create(:carto_tiled_layer)
|
|
@user.layers << @tiled_layer
|
|
|
|
@asset = FactoryGirl.create(:carto_asset, user: @user)
|
|
|
|
@user.activate_feature_flag!(@feature_flag)
|
|
|
|
CartoDB::GeocoderUsageMetrics.new(@user.username).incr(:geocoder_here, :success_responses)
|
|
|
|
@user.synchronization_oauths.create!(service: 'gdrive', token: 'wadus')
|
|
FactoryGirl.create(:connector_configuration, connector_provider: @connector_provider, user: @user)
|
|
|
|
# Convert @table_visualization into a common data imported table
|
|
sync = FactoryGirl.create(:carto_synchronization, user: @user)
|
|
@table_visualization.update_attributes!(synchronization: sync)
|
|
@table.data_import = FactoryGirl.create(:data_import, user: @user, synchronization_id: sync.id, table_id: @table.id)
|
|
@table.save!
|
|
edi = FactoryGirl.create(:external_data_import_with_external_source,
|
|
data_import: @table.data_import, synchronization: sync)
|
|
@remote_visualization = edi.external_source.visualization
|
|
@remote_visualization.update_attributes!(user: @user)
|
|
|
|
# Create SearchTweets: one associated to an existing table, and one with invalid table
|
|
@map2, @table2, @table_visualization2, @visualization2 = create_full_visualization(
|
|
@user, visualization_attributes: { name: 'waduswadus22' }
|
|
)
|
|
@table2.data_import = FactoryGirl.create(:data_import, user: @user, table_id: @table2.id)
|
|
@table2.save!
|
|
@st1 = FactoryGirl.create(:search_tweet, user_id: @user.id, data_import_id: @table2.data_import.id)
|
|
@st2 = FactoryGirl.create(
|
|
:search_tweet, user_id: @user.id, data_import_id: FactoryGirl.create(:data_import).id
|
|
)
|
|
|
|
# Rate limits
|
|
sequel_user = ::User[@user.id]
|
|
sequel_user.rate_limit_id = FactoryGirl.create(:rate_limits).id
|
|
sequel_user.save
|
|
@user.reload
|
|
|
|
# Client Application tokens
|
|
sequel_user.client_application.access_tokens << Carto::AccessToken.new(
|
|
token: "access_token",
|
|
secret: "access_secret",
|
|
callback_url: "http://callback2",
|
|
verifier: "v2",
|
|
scope: nil,
|
|
client_application_id: sequel_user.client_application.id
|
|
).save
|
|
sequel_user.client_application.oauth_tokens << Carto::OauthToken.create!(
|
|
token: "oauth_token",
|
|
secret: "oauth_secret",
|
|
callback_url: "http//callback.com",
|
|
verifier: "v1",
|
|
scope: nil,
|
|
client_application_id: sequel_user.client_application.id
|
|
)
|
|
|
|
Carto::UserMultifactorAuth.create!(user_id: @user.id, type: 'totp', last_login: Time.zone.now)
|
|
|
|
oauth_app_user = FactoryGirl.create(:oauth_app_users, oauth_app: @oauth_app, user: @user)
|
|
FactoryGirl.create(:oauth_authorization_codes, oauth_app_user: oauth_app_user)
|
|
api_key = FactoryGirl.create(:oauth_api_key, user: @user)
|
|
FactoryGirl.create(:oauth_access_tokens, oauth_app_user: oauth_app_user, api_key: api_key)
|
|
FactoryGirl.create(:oauth_refresh_tokens, oauth_app_user: oauth_app_user, scopes: ['offline'])
|
|
|
|
@user.reload
|
|
end
|
|
|
|
def destroy_user(user = @user)
|
|
# This is necessary because UserMetadataExportService loses user_id information during import.
|
|
# In part it's because we used custom code for building the corresponding ActiveRecord objects,
|
|
# instead of using ActiveRecord::Associations::CollectionProxy#build
|
|
# Since Carto::OauthTokens are not linked to the user, the delete cascade does not work
|
|
Carto::OauthToken.destroy_all
|
|
|
|
if user
|
|
user.update_attributes!(viewer: false) unless user && user.destroyed?
|
|
|
|
gum = CartoDB::GeocoderUsageMetrics.new(user.username)
|
|
$users_metadata.DEL(gum.send(:user_key_prefix, :geocoder_here, :success_responses, Time.zone.now))
|
|
|
|
user.oauth_app_users.each do |oau|
|
|
oau.skip_role_setup = true
|
|
oau.oauth_access_tokens.each { |oat| oat.api_key.skip_role_setup = true }
|
|
end
|
|
end
|
|
|
|
destroy_full_visualization(@map, @table, @table_visualization, @visualization)
|
|
destroy_full_visualization(@map2, @table2, @table_visualization2, @visualization2)
|
|
@remote_visualization.destroy
|
|
@table.data_import.destroy
|
|
@tiled_layer.destroy
|
|
@asset.destroy
|
|
[@st1, @st2].each do |st|
|
|
st.data_import.destroy
|
|
st.destroy
|
|
end
|
|
|
|
if user
|
|
user.destroy
|
|
::User[user.id].before_destroy(skip_table_drop: true)
|
|
end
|
|
end
|
|
|
|
let(:service) { Carto::UserMetadataExportService.new }
|
|
|
|
describe '#export' do
|
|
before(:all) do
|
|
Cartodb::Central.any_instance.stubs(:update_user).returns(true)
|
|
create_user_with_basemaps_assets_visualizations
|
|
end
|
|
|
|
after(:all) do
|
|
destroy_user
|
|
end
|
|
|
|
it 'exports' do
|
|
export = service.export_user_json_hash(@user)
|
|
|
|
expect_export_matches_user(export[:user], @user)
|
|
end
|
|
|
|
it 'includes all user model attributes' do
|
|
# session_salt temporarily excluded until added to the model
|
|
expected_attrs = @user.attributes.symbolize_keys.keys - [:rate_limit_id, :session_salt] + [:rate_limit]
|
|
|
|
export = service.export_user_json_hash(@user)
|
|
|
|
expect(export[:user].keys).to include(*expected_attrs)
|
|
end
|
|
end
|
|
|
|
describe '#user import' do
|
|
after :each do
|
|
if @search_tweets
|
|
@search_tweets.each do |st|
|
|
st.data_import.try(:destroy)
|
|
st.destroy
|
|
end
|
|
end
|
|
ClientApplication.where(user_id: @user.id).each(&:destroy)
|
|
|
|
@user.oauth_app_users.each do |oau|
|
|
unless oau.oauth_access_tokens.blank?
|
|
oau.oauth_access_tokens.each do |oat|
|
|
oat.api_key.skip_role_setup = true
|
|
oat.api_key.skip_cdb_conf_info = true
|
|
end
|
|
end
|
|
end
|
|
|
|
@user.destroy if @user
|
|
end
|
|
|
|
def test_import_user_from_export(export)
|
|
@user = service.build_user_from_hash_export(export)
|
|
create_account_type_fg('FREE')
|
|
service.save_imported_user(@user)
|
|
@search_tweets = service.build_search_tweets_from_hash_export(export)
|
|
@search_tweets.each { |st| service.save_imported_search_tweet(st, @user) }
|
|
|
|
expect_export_matches_user(export[:user], @user)
|
|
@user
|
|
end
|
|
|
|
it 'imports latest' do
|
|
user = test_import_user_from_export(full_export)
|
|
end
|
|
|
|
it 'imports 1.0.16 (without email_verification)' do
|
|
user = test_import_user_from_export(full_export_one_zero_sixteen)
|
|
|
|
expect(user.email_verification_token).to be_nil
|
|
expect(user.email_verification_sent_at).to be_nil
|
|
end
|
|
|
|
it 'imports 1.0.15 (without public_dataset_quota)' do
|
|
user = test_import_user_from_export(full_export_one_zero_fifteen)
|
|
|
|
expect(user.public_dataset_quota).to be_nil
|
|
end
|
|
|
|
it 'imports 1.0.14 (without session_salt)' do
|
|
user = test_import_user_from_export(full_export_one_zero_fourteen)
|
|
|
|
expect(user.session_salt).to_not eq '123456789f'
|
|
end
|
|
|
|
it 'imports 1.0.13 (without private_map_quota)' do
|
|
user = test_import_user_from_export(full_export_one_zero_thirteen)
|
|
|
|
expect(user.private_map_quota).to be_nil
|
|
end
|
|
|
|
it 'imports 1.0.12 (without company_employees and use_case)' do
|
|
user = test_import_user_from_export(full_export_one_zero_twelve)
|
|
|
|
expect(user.company_employees).to be_nil
|
|
expect(user.use_case).to be_nil
|
|
end
|
|
|
|
it 'imports 1.0.11 (without maintenance_mode)' do
|
|
user = test_import_user_from_export(full_export_one_zero_eleven)
|
|
|
|
expect(user.maintenance_mode).to eq false
|
|
end
|
|
|
|
it 'imports 1.0.10 (without regular_api_key_quota)' do
|
|
user = test_import_user_from_export(full_export_one_zero_ten)
|
|
|
|
expect(user.regular_api_key_quota).to be_nil
|
|
end
|
|
|
|
it 'imports 1.0.9 (without public_map_quota)' do
|
|
user = test_import_user_from_export(full_export_one_zero_nine)
|
|
|
|
expect(user.public_map_quota).to be_nil
|
|
end
|
|
|
|
it 'imports 1.0.8 (without oauth_apps and oauth_app_users)' do
|
|
user = test_import_user_from_export(full_export_one_zero_eight)
|
|
|
|
expect(user.oauth_apps).to be_empty
|
|
expect(user.oauth_app_users).to be_empty
|
|
end
|
|
|
|
it 'imports 1.0.7 (without user_multifactor_auths)' do
|
|
user = test_import_user_from_export(full_export_one_zero_seven)
|
|
|
|
expect(user.user_multifactor_auths).to be_empty
|
|
end
|
|
|
|
it 'imports 1.0.6 (without password_reset_token and password_reset_sent_at)' do
|
|
user = test_import_user_from_export(full_export_one_zero_six)
|
|
|
|
expect(user.password_reset_token).to be_nil
|
|
expect(user.password_reset_sent_at).to be_nil
|
|
end
|
|
|
|
it 'imports 1.0.5 (without client_application)' do
|
|
user = test_import_user_from_export(full_export_one_zero_five)
|
|
|
|
expect(user.client_applications).to be_empty
|
|
end
|
|
|
|
it 'imports 1.0.4 (without synchornization oauths nor connector configurations)' do
|
|
user = test_import_user_from_export(full_export_one_zero_four)
|
|
|
|
expect(user.synchronization_oauths).to be_empty
|
|
expect(user.connector_configurations).to be_empty
|
|
end
|
|
|
|
it 'imports 1.0.3 (without company nor phone)' do
|
|
user = test_import_user_from_export(full_export_one_zero_three)
|
|
|
|
expect(user.company).to be_nil
|
|
expect(user.phone).to be_nil
|
|
end
|
|
|
|
it 'imports 1.0.2 (without rate limits)' do
|
|
user = test_import_user_from_export(full_export_one_zero_two)
|
|
|
|
expect(user.rate_limit).to be_nil
|
|
end
|
|
|
|
it 'imports 1.0.1 (without static notifications)' do
|
|
user = test_import_user_from_export(full_export_one_zero_one)
|
|
|
|
expect(user.static_notifications.notifications).to be_empty
|
|
end
|
|
|
|
it 'imports 1.0.0 (without search tweets)' do
|
|
user = test_import_user_from_export(full_export_one_zero_zero)
|
|
|
|
expect(user.search_tweets).to be_empty
|
|
end
|
|
end
|
|
|
|
describe '#user export + import' do
|
|
after :each do
|
|
destroy_user
|
|
end
|
|
|
|
it 'export + import latest' do
|
|
create_user_with_basemaps_assets_visualizations
|
|
export_import(@user)
|
|
end
|
|
end
|
|
|
|
describe '#full export + import (user and visualizations)' do
|
|
after :each do
|
|
destroy_user(@imported_user)
|
|
end
|
|
|
|
it 'export + import user with rate limit and visualizations' do
|
|
Dir.mktmpdir do |path|
|
|
create_user_with_basemaps_assets_visualizations
|
|
full_export_import(path)
|
|
|
|
expect_rate_limits_saved_to_redis(@user.username)
|
|
end
|
|
end
|
|
|
|
it 'export + import user and visualizations for a viewer user' do
|
|
Dir.mktmpdir do |path|
|
|
create_user_with_basemaps_assets_visualizations
|
|
full_export_import_viewer(path)
|
|
|
|
expect_rate_limits_saved_to_redis(@user.username)
|
|
end
|
|
end
|
|
|
|
it 'skips a canonical visualization without a user table' do
|
|
Dir.mktmpdir do |path|
|
|
create_user_with_basemaps_assets_visualizations
|
|
# Set up fake visualizations
|
|
source_visualizations = @user.visualizations.order(:id).map(&:attributes)
|
|
canonical_without_table = source_visualizations.find { |v| v['type'] == 'table' }
|
|
UserTable.where(name: canonical_without_table['name']).delete
|
|
@user.in_database.execute("DROP TABLE #{canonical_without_table['name']}")
|
|
|
|
# Export and destroy user before import
|
|
service.export_to_directory(@user, path)
|
|
|
|
destroy_user
|
|
|
|
# At this point, the user database is still there, but the tables got destroyed.
|
|
# We recreate a dummy one for the visualization we did export
|
|
canonical_with_table = source_visualizations.find do |v|
|
|
v['type'] == 'table' && v['name'] != canonical_without_table['name']
|
|
end
|
|
@user.in_database.execute("CREATE TABLE #{canonical_with_table['name']} (cartodb_id int)")
|
|
|
|
# We import the visualizations
|
|
@imported_user = service.import_from_directory(path)
|
|
service.import_metadata_from_directory(@imported_user, path)
|
|
|
|
expect(@imported_user.visualizations.count).to eq source_visualizations.count - 1
|
|
end
|
|
end
|
|
|
|
it 'skips not remote visualizations without a map' do
|
|
Dir.mktmpdir do |path|
|
|
create_user_with_basemaps_assets_visualizations
|
|
@user.visualizations.find { |v| !v.remote? }.map.delete
|
|
|
|
full_export_import(path)
|
|
|
|
end
|
|
end
|
|
|
|
it 'keeps visualization password' do
|
|
Dir.mktmpdir do |path|
|
|
create_user_with_basemaps_assets_visualizations
|
|
|
|
@user.update_attributes(private_maps_enabled: true, private_tables_enabled: true)
|
|
v = @user.visualizations.where(type: 'derived').first
|
|
v.password = 'dont_tell_anyone'
|
|
v.privacy = 'password'
|
|
v.save!
|
|
|
|
full_export_import(path)
|
|
|
|
v.reload
|
|
expect(v.password_protected?).to be_true
|
|
expect(v.password_valid?('dont_tell_anyone')).to be_true
|
|
end
|
|
end
|
|
end
|
|
|
|
EXCLUDED_USER_META_DATE_FIELDS = ['created_at', 'updated_at', 'period_end_date', 'auth_token'].freeze
|
|
EXCLUDED_USER_META_ID_FIELDS = ['map_id', 'permission_id', 'active_layer_id', 'tags'].freeze
|
|
|
|
def compare_excluding_dates_and_ids(v1, v2)
|
|
filtered1 = v1.reject { |k, _| EXCLUDED_USER_META_ID_FIELDS.include?(k) }
|
|
filtered2 = v2.reject { |k, _| EXCLUDED_USER_META_ID_FIELDS.include?(k) }
|
|
compare_excluding_dates(filtered1, filtered2)
|
|
end
|
|
|
|
def compare_excluding_dates(u1, u2)
|
|
filtered1 = u1.reject { |k, _| EXCLUDED_USER_META_DATE_FIELDS.include?(k) }
|
|
filtered2 = u2.reject { |k, _| EXCLUDED_USER_META_DATE_FIELDS.include?(k) }
|
|
expect(filtered1).to eq filtered2
|
|
expect(u1['period_end_date'].try(:round)).to eq(u2['period_end_date'].try(:round)) # Ignore microseconds
|
|
end
|
|
|
|
def expect_export_matches_user(export, user)
|
|
# session_salt is generated on user creation, it's ok if it's different on exports < 1.0.15
|
|
attributes_to_check = Carto::UserMetadataExportService::EXPORTED_USER_ATTRIBUTES - [:session_salt]
|
|
attributes_to_check.each do |att|
|
|
error = "attribute #{att.inspect} expected: #{user.attributes[att.to_s].inspect} got: #{export[att].inspect}"
|
|
expect(export[att]).to eq(user.attributes[att.to_s]), error
|
|
end
|
|
|
|
expect(export[:layers].count).to eq user.layers.size
|
|
export[:layers].zip(user.layers).each { |exported_layer, layer| expect_export_matches_layer(exported_layer, layer) }
|
|
|
|
expect(export[:assets].count).to eq user.assets.size
|
|
export[:assets].zip(user.assets).each { |exported_asset, asset| expect_export_matches_asset(exported_asset, asset) }
|
|
|
|
expect(export[:feature_flags]).to eq user.feature_flags_names
|
|
|
|
if export[:search_tweets]
|
|
expect(export[:search_tweets].count).to eq user.search_tweets.size
|
|
export[:search_tweets].zip(user.search_tweets).each do |exported_search_tweet, search_tweet|
|
|
expect_export_matches_search_tweet(exported_search_tweet, search_tweet)
|
|
end
|
|
else
|
|
expect(user.search_tweets).to be_empty
|
|
end
|
|
|
|
if export[:synchronization_oauths]
|
|
expect(export[:synchronization_oauths].count).to eq user.synchronization_oauths.size
|
|
export[:synchronization_oauths].zip(user.synchronization_oauths).each do |exported_so, so|
|
|
expect_export_matches_synchronization_oauth(exported_so, so)
|
|
end
|
|
else
|
|
expect(user.synchronization_oauths).to be_empty
|
|
end
|
|
|
|
if export[:connector_configurations]
|
|
expect(export[:connector_configurations].count).to eq user.connector_configurations.size
|
|
export[:connector_configurations].zip(user.connector_configurations).each do |exported_cc, cc|
|
|
expect_export_matches_connector_configuration(exported_cc, cc)
|
|
end
|
|
else
|
|
expect(user.connector_configurations).to be_empty
|
|
end
|
|
|
|
expect_export_matches_rate_limit(export[:rate_limit], user.rate_limit)
|
|
expect_export_matches_client_application(export[:client_application], ::User.find(id: user.id).client_application)
|
|
|
|
if export[:user_multifactor_auths]
|
|
expect(export[:user_multifactor_auths].count).to eq user.user_multifactor_auths.size
|
|
export[:user_multifactor_auths].zip(user.user_multifactor_auths).each do |exported_uma, uma|
|
|
expect_export_matches_user_multifactor_auth(exported_uma, uma)
|
|
end
|
|
else
|
|
expect(user.user_multifactor_auths).to be_empty
|
|
end
|
|
|
|
if export[:oauth_app_users]
|
|
expect_export_matches_oauth_app_users(export[:oauth_app_users].first, user.oauth_app_users.first)
|
|
else
|
|
expect(user.oauth_app_users).to be_empty
|
|
end
|
|
end
|
|
|
|
def expect_export_matches_layer(exported_layer, layer)
|
|
expect(exported_layer[:options]).to eq layer.options
|
|
expect(exported_layer[:kind]).to eq layer.kind
|
|
end
|
|
|
|
def expect_export_matches_asset(exported_asset, asset)
|
|
expect(exported_asset[:public_url]).to eq asset.public_url
|
|
expect(exported_asset[:kind]).to eq asset.kind
|
|
expect(exported_asset[:storage_info]).to eq asset.storage_info
|
|
end
|
|
|
|
def expect_redis_restored(user)
|
|
expect(CartoDB::GeocoderUsageMetrics.new(user.username).get(:geocoder_here, :success_responses)).to eq(1)
|
|
end
|
|
|
|
def expect_export_matches_search_tweet(exported_search_tweet, search_tweet)
|
|
if exported_search_tweet[:data_import]
|
|
expect(exported_search_tweet[:data_import][:id]).to eq search_tweet.data_import.id
|
|
else
|
|
expect(search_tweet.data_import).to be_nil
|
|
end
|
|
expect(exported_search_tweet[:service_item_id]).to eq search_tweet.service_item_id
|
|
expect(exported_search_tweet[:retrieved_items]).to eq search_tweet.retrieved_items
|
|
expect(exported_search_tweet[:state]).to eq search_tweet.state
|
|
expect(exported_search_tweet[:created_at].to_s).to eq search_tweet.created_at.to_s
|
|
expect(exported_search_tweet[:updated_at].to_s).to eq search_tweet.updated_at.to_s
|
|
end
|
|
|
|
def expect_export_matches_synchronization_oauth(exported_so, so)
|
|
expect(exported_so[:service]).to eq so.service
|
|
expect(exported_so[:token]).to eq so.token
|
|
expect(exported_so[:created_at].to_s).to eq so.created_at.to_s
|
|
expect(exported_so[:updated_at].to_s).to eq so.updated_at.to_s
|
|
end
|
|
|
|
def expect_export_matches_connector_configuration(exported_cc, cc)
|
|
expect(exported_cc[:enabled]).to eq cc.enabled
|
|
expect(exported_cc[:max_rows]).to eq cc.max_rows
|
|
expect(exported_cc[:created_at].to_s).to eq cc.created_at.to_s
|
|
expect(exported_cc[:updated_at].to_s).to eq cc.updated_at.to_s
|
|
expect(exported_cc[:provider_name]).to eq cc.connector_provider.name
|
|
end
|
|
|
|
def expect_export_matches_rate_limit(exported_rate_limit, rate_limit)
|
|
expect(exported_rate_limit).to be_nil && return unless rate_limit
|
|
expect(exported_rate_limit[:id]).to eq rate_limit.id
|
|
rate_limit.api_attributes.each do |k, v|
|
|
# versions older than 1.0.6 don't include sql_copy rate limits so avoid checking them
|
|
next if [:sql_copy_from, :sql_copy_to].include?(k) && !exported_rate_limit[:limits].key?(k)
|
|
expect(exported_rate_limit[:limits][k]).to eq v
|
|
end
|
|
end
|
|
|
|
def expect_export_matches_client_application(exported_app, app)
|
|
expect(exported_app).to be_nil && return unless app
|
|
|
|
expect(exported_app[:name]).to eq app.name
|
|
expect(exported_app[:url]).to eq app.url
|
|
expect(exported_app[:support_url]).to eq app.support_url
|
|
expect(exported_app[:callback_url]).to eq app.callback_url
|
|
expect(exported_app[:key]).to eq app.key
|
|
expect(exported_app[:secret]).to eq app.secret
|
|
|
|
# Compare dates using AR conversions
|
|
fake_app = Carto::ClientApplication.new(
|
|
created_at: exported_app[:created_at],
|
|
updated_at: exported_app[:updated_at]
|
|
)
|
|
expect(fake_app.created_at).to eq app.created_at
|
|
expect(fake_app.updated_at).to eq app.updated_at
|
|
|
|
expect(exported_app[:oauth_tokens].size + exported_app[:access_tokens].size).to eq app.oauth_tokens.size
|
|
exported_app[:oauth_tokens].each do |ex_t|
|
|
expect_exported_token_matches_token(ex_t, app.oauth_tokens.find { |t| t.token == ex_t[:token] })
|
|
end
|
|
expect(exported_app[:access_tokens].size).to eq app.access_tokens.size
|
|
exported_app[:access_tokens].each do |ex_t|
|
|
expect_exported_token_matches_token(ex_t, app.access_tokens.find { |t| t.token == ex_t[:token] })
|
|
end
|
|
end
|
|
|
|
def expect_export_matches_user_multifactor_auth(exported_uma, uma)
|
|
expect(exported_uma).to be_nil && return unless uma
|
|
expect(exported_uma[:user_id]).to eq uma.user_id
|
|
expect(exported_uma[:type]).to eq uma.type
|
|
expect(exported_uma[:shared_secret]).to eq uma.shared_secret
|
|
expect(exported_uma[:enabled]).to eq uma.enabled
|
|
|
|
fake_uma = Carto::UserMultifactorAuth.new(
|
|
last_login: exported_uma[:last_login],
|
|
created_at: exported_uma[:created_at],
|
|
updated_at: exported_uma[:updated_at]
|
|
)
|
|
|
|
expect(fake_uma.last_login).to eq uma.last_login
|
|
expect(fake_uma.created_at).to eq uma.created_at
|
|
expect(fake_uma.updated_at).to eq uma.updated_at
|
|
end
|
|
|
|
def expect_exported_token_matches_token(exported_t, token)
|
|
expect(exported_t[:token]).to eq token.token
|
|
expect(exported_t[:secret]).to eq token.secret
|
|
expect(exported_t[:callback_url]).to eq token.callback_url
|
|
expect(exported_t[:verifier]).to eq token.verifier
|
|
expect(exported_t[:scope]).to eq token.scope
|
|
|
|
# Compare dates using AR conversions
|
|
fake_app = Carto::OauthToken.new(
|
|
authorized_at: exported_t[:authorized_at],
|
|
invalidated_at: exported_t[:invalidated_at],
|
|
valid_to: exported_t[:valid_to],
|
|
created_at: exported_t[:created_at],
|
|
updated_at: exported_t[:updated_at]
|
|
)
|
|
|
|
expect(fake_app.authorized_at).to eq token.authorized_at
|
|
expect(fake_app.invalidated_at).to eq token.invalidated_at
|
|
expect(fake_app.valid_to).to eq token.valid_to
|
|
expect(fake_app.created_at).to eq token.created_at
|
|
expect(fake_app.updated_at).to be <= token.updated_at
|
|
end
|
|
|
|
def expect_export_matches_oauth_app_users(exported_oauth_app_user, oauth_app_user)
|
|
expect(exported_oauth_app_user).to be_nil && return unless oauth_app_user
|
|
|
|
expect(exported_oauth_app_user[:id]).to eq oauth_app_user.id
|
|
expect(exported_oauth_app_user[:oauth_app_id]).to eq oauth_app_user.oauth_app_id
|
|
expect(exported_oauth_app_user[:scopes]).to eq oauth_app_user.scopes
|
|
|
|
expect_export_matches_oauth_app_users_dates(exported_oauth_app_user, oauth_app_user)
|
|
expect_export_matches_oauth_app_users_friends(exported_oauth_app_user, oauth_app_user, oauth_app_user.id)
|
|
end
|
|
|
|
def expect_export_matches_oauth_app_users_friends(exported_oauth_app_user, oauth_app_user, oauth_app_user_id)
|
|
if exported_oauth_app_user[:oauth_authorization_codes]
|
|
expect_export_matches_oauth_authorization_codes(
|
|
exported_oauth_app_user[:oauth_authorization_codes].first,
|
|
oauth_app_user.oauth_authorization_codes.first,
|
|
oauth_app_user_id
|
|
)
|
|
end
|
|
|
|
if exported_oauth_app_user[:oauth_access_tokens]
|
|
expect_export_matches_oauth_access_tokens(
|
|
exported_oauth_app_user[:oauth_access_tokens].first,
|
|
oauth_app_user.oauth_access_tokens.first,
|
|
oauth_app_user_id
|
|
)
|
|
end
|
|
|
|
if exported_oauth_app_user[:oauth_refresh_tokens]
|
|
expect_export_matches_oauth_refresh_tokens(
|
|
exported_oauth_app_user[:oauth_refresh_tokens].first,
|
|
oauth_app_user.oauth_refresh_tokens.first,
|
|
oauth_app_user_id
|
|
)
|
|
end
|
|
end
|
|
|
|
def expect_export_matches_oauth_app_users_dates(exported_oauth_app_user, oauth_app_user)
|
|
fake_oauth_app_user = Carto::OauthAppUser.new(
|
|
created_at: exported_oauth_app_user[:created_at],
|
|
updated_at: exported_oauth_app_user[:updated_at]
|
|
)
|
|
|
|
expect(fake_oauth_app_user.created_at).to eq oauth_app_user.created_at
|
|
expect(fake_oauth_app_user.updated_at).to eq oauth_app_user.updated_at
|
|
end
|
|
|
|
def expect_export_matches_oauth_authorization_codes(exported_oac, oac, oauth_app_user_id)
|
|
expect(exported_oac).to be_nil && return unless oac
|
|
|
|
expect(oauth_app_user_id).to eq oac.oauth_app_user_id
|
|
expect(exported_oac[:scopes]).to eq oac.scopes
|
|
expect(exported_oac[:code]).to eq oac.code
|
|
expect(exported_oac[:redirect_uri]).to eq oac.redirect_uri
|
|
|
|
expect_export_matches_oauth_authorization_codes_dates(exported_oac, oac)
|
|
end
|
|
|
|
def expect_export_matches_oauth_authorization_codes_dates(exported_oac, oac)
|
|
fake_oauth_authorization_code = Carto::OauthAuthorizationCode.new(
|
|
created_at: exported_oac[:created_at]
|
|
)
|
|
|
|
expect(fake_oauth_authorization_code.created_at).to eq oac.created_at
|
|
end
|
|
|
|
def expect_export_matches_oauth_access_tokens(exported_oauth_access_token, oauth_access_token, oauth_app_user_id)
|
|
expect(exported_oauth_access_token).to be_nil && return unless oauth_access_token
|
|
|
|
expect(oauth_app_user_id).to eq oauth_access_token.oauth_app_user_id
|
|
expect(exported_oauth_access_token[:api_key_id]).to eq oauth_access_token.api_key_id
|
|
expect(exported_oauth_access_token[:scopes]).to eq oauth_access_token.scopes
|
|
|
|
fake_oauth_access_token = Carto::OauthAccessToken.new(
|
|
created_at: oauth_access_token[:created_at]
|
|
)
|
|
|
|
expect(fake_oauth_access_token.created_at).to eq oauth_access_token.created_at
|
|
end
|
|
|
|
def expect_export_matches_oauth_refresh_tokens(exported_oauth_refresh_token, oauth_refresh_token, oauth_app_user_id)
|
|
expect(exported_oauth_refresh_token).to be_nil && return unless oauth_refresh_token
|
|
|
|
expect(oauth_app_user_id).to eq oauth_refresh_token.oauth_app_user_id
|
|
expect(exported_oauth_refresh_token[:token]).to eq oauth_refresh_token.token
|
|
expect(exported_oauth_refresh_token[:scopes]).to eq oauth_refresh_token.scopes
|
|
|
|
fake_oauth_refresh_token = Carto::OauthRefreshToken.new(
|
|
created_at: oauth_refresh_token[:created_at],
|
|
updated_at: oauth_refresh_token[:updated_at]
|
|
)
|
|
|
|
expect(fake_oauth_refresh_token.created_at).to eq oauth_refresh_token.created_at
|
|
expect(fake_oauth_refresh_token.updated_at).to eq oauth_refresh_token.updated_at
|
|
end
|
|
|
|
def export_import(user)
|
|
export = service.export_user_json_hash(user)
|
|
expect_export_matches_user(export[:user], user)
|
|
source_user = user.attributes
|
|
destroy_user
|
|
|
|
imported_user = service.build_user_from_hash_export(export)
|
|
service.save_imported_user(imported_user)
|
|
imported_user.reload
|
|
|
|
search_tweets = service.build_search_tweets_from_hash_export(export)
|
|
search_tweets.each { |st| service.save_imported_search_tweet(st, imported_user) }
|
|
|
|
expect_export_matches_user(export[:user], imported_user)
|
|
compare_excluding_dates(imported_user.attributes, source_user)
|
|
end
|
|
|
|
def full_export_import(path)
|
|
@visualization.mark_as_vizjson2
|
|
service.export_to_directory(@user, path)
|
|
source_user = @user.attributes
|
|
|
|
source_visualizations = @user.visualizations.order(:id).reject { |v| !v.remote? && !v.map }.map(&:attributes)
|
|
source_tweets = @user.search_tweets.map(&:attributes)
|
|
synchronization_oauths = @user.synchronization_oauths.map(&:attributes)
|
|
destroy_user
|
|
|
|
# At this point, the user database is still there, but the tables got destroyed. We recreate some dummy ones
|
|
source_visualizations.select { |v| v['type'] == 'table' }.each do |v|
|
|
@user.in_database.execute("CREATE TABLE #{v['name']} (cartodb_id int)")
|
|
end
|
|
|
|
# Clean redis for vizjson2 marking
|
|
$tables_metadata.del(Carto::Visualization::V2_VISUALIZATIONS_REDIS_KEY)
|
|
expect(@visualization.uses_vizjson2?).to be_false
|
|
|
|
@imported_user = service.import_from_directory(path)
|
|
service.import_metadata_from_directory(@imported_user, path)
|
|
|
|
compare_excluding_dates(@imported_user.attributes, source_user)
|
|
expect_redis_restored(@imported_user)
|
|
expect(@imported_user.visualizations.count).to eq source_visualizations.count
|
|
@imported_user.visualizations.order(:id).zip(source_visualizations).each do |v1, v2|
|
|
compare_excluding_dates_and_ids(v1.attributes, v2)
|
|
end
|
|
|
|
expect(@visualization.uses_vizjson2?).to be_true
|
|
@imported_user.search_tweets.zip(source_tweets).each do |st1, st2|
|
|
expect(st1.user_id).to eq @imported_user.id
|
|
expect(st1.service_item_id).to eq st2['service_item_id']
|
|
expect(st1.retrieved_items).to eq st2['retrieved_items']
|
|
expect(st1.state).to eq st2['state']
|
|
end
|
|
@imported_user.static_notifications.notifications.should eq full_export[:user][:notifications]
|
|
|
|
@imported_user.synchronization_oauths.zip(synchronization_oauths).each do |so1, so2|
|
|
expect(so1.user_id).to eq @imported_user.id
|
|
expect(so1.service).to eq so2['service']
|
|
expect(so1.token).to eq so2['token']
|
|
end
|
|
end
|
|
|
|
def full_export_import_viewer(path)
|
|
@user.update_attributes(viewer: true)
|
|
::User[@user.id].reload # Refresh Sequel cache
|
|
service.export_to_directory(@user, path)
|
|
source_user = @user.attributes
|
|
|
|
source_visualizations = @user.visualizations.order(:id).map(&:attributes)
|
|
source_tweets = @user.search_tweets.map(&:attributes)
|
|
@user.update_attributes(viewer: false) # For destruction purposes
|
|
destroy_user
|
|
|
|
# At this point, the user database is still there, but the tables got destroyed. We recreate some dummy ones
|
|
source_visualizations.select { |v| v['type'] == 'table' }.each do |v|
|
|
@user.in_database.execute("CREATE TABLE #{v['name']} (cartodb_id int)")
|
|
end
|
|
|
|
@imported_user = service.import_from_directory(path)
|
|
service.import_metadata_from_directory(@imported_user, path)
|
|
|
|
compare_excluding_dates(@imported_user.attributes, source_user)
|
|
expect_redis_restored(@imported_user)
|
|
expect(@imported_user.visualizations.count).to eq source_visualizations.count
|
|
@imported_user.visualizations.order(:id).zip(source_visualizations).each do |v1, v2|
|
|
compare_excluding_dates_and_ids(v1.attributes, v2)
|
|
end
|
|
@imported_user.search_tweets.zip(source_tweets).each do |st1, st2|
|
|
expect(st1.user_id).to eq @imported_user.id
|
|
expect(st1.service_item_id).to eq st2['service_item_id']
|
|
expect(st1.retrieved_items).to eq st2['retrieved_items']
|
|
expect(st1.state).to eq st2['state']
|
|
end
|
|
end
|
|
|
|
let(:service_item_id) do
|
|
'{\"dates\":{\"fromDate\":\"2014-07-29\",\"fromHour\":0,\"fromMin\":0,\"toDate\":'\
|
|
'\"2014-08-27\",\"toHour\":23,\"toMin\":59,\"user_timezone\":0,\"max_days\":30},\"categories\":'\
|
|
'[{\"terms\":[\"cartodb\"],\"category\":\"1\",\"counter\":1007}]}'
|
|
end
|
|
|
|
let(:full_export) do
|
|
UserMetadataExportFactory.full_export(connector_provider: @connector_provider, oauth_app: @oauth_app, service_item_id: service_item_id)
|
|
end
|
|
|
|
let(:full_export_one_zero_sixteen) do
|
|
user_hash = full_export[:user].except!(:email_verification_token, :email_veritification_sent_at)
|
|
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_fifteen) do
|
|
user_hash = full_export[:user].except!(:public_dataset_quota)
|
|
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_fourteen) do
|
|
user_hash = full_export_one_zero_fifteen[:user].except!(:session_salt)
|
|
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_thirteen) do
|
|
user_hash = full_export_one_zero_fourteen[:user].except!(:private_map_quota)
|
|
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_twelve) do
|
|
user_hash = full_export_one_zero_thirteen[:user].except!(:use_case, :company_employees)
|
|
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_eleven) do
|
|
full_export_one_zero_twelve[:user][:maintenance_mode] = false
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_ten) do
|
|
user_hash = full_export_one_zero_eleven[:user].except!(:regular_api_key_quota)
|
|
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_nine) do
|
|
user_hash = full_export_one_zero_ten[:user].except!(:public_map_quota)
|
|
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_eight) do
|
|
user_hash = full_export_one_zero_nine[:user].except!(:oauth_app_users)
|
|
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_seven) do
|
|
user_hash = full_export_one_zero_eight[:user].except!(:user_multifactor_auths)
|
|
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_six) do
|
|
user_hash = full_export_one_zero_seven[:user].except!(:password_reset_token, :password_reset_sent_at)
|
|
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_five) do
|
|
user_hash = full_export_one_zero_six[:user].except!(:client_application)
|
|
limits_hash = full_export[:user][:rate_limit][:limits]
|
|
full_export[:user] = user_hash
|
|
full_export[:user][:rate_limit][:limits] = limits_hash.except!(:sql_copy_from).except!(:sql_copy_to)
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_four) do
|
|
user_hash = full_export_one_zero_five[:user].except!(:synchronization_oauths, :connector_configurations)
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_three) do
|
|
user_hash = full_export_one_zero_four[:user].except!(:company).except!(:phone)
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_two) do
|
|
user_hash = full_export_one_zero_three[:user].except!(:rate_limit)
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_one) do
|
|
user_hash = full_export_one_zero_two[:user].except!(:notifications)
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
|
|
let(:full_export_one_zero_zero) do
|
|
user_hash = full_export_one_zero_one[:user].except!(:search_tweets)
|
|
full_export[:user] = user_hash
|
|
full_export
|
|
end
|
|
end
|