Skip to content
GitLab
Next
Menu
Why GitLab
Pricing
Contact Sales
Explore
Why GitLab
Pricing
Contact Sales
Explore
Sign in
Get free trial
Primary navigation
Search or go to…
Project
GitLab
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Iterations
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Releases
Package registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Privacy statement
Keyboard shortcuts
?
What's new
4
Snippets
Groups
Projects
Show more breadcrumbs
GitLab.org
GitLab
Commits
87485e7c
Commit
87485e7c
authored
5 years ago
by
Lin Jen-Shin
Browse files
Options
Downloads
Plain Diff
Merge branch '33408-upgrade-devise' into 'master'
Upgrade devise and dependencies Closes
#20175
See merge request
!18225
parents
af24ba11
48d7d967
No related branches found
No related tags found
1 merge request
!18225
Upgrade devise and dependencies
Pipeline
#88665506
failed
5 years ago
Stage: prepare
Stage: test
Stage: post-test
Stage: pages
Changes
2
Pipelines
1
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
Gemfile.lock
+11
-11
11 additions, 11 deletions
Gemfile.lock
spec/requests/openid_connect_spec.rb
+8
-17
8 additions, 17 deletions
spec/requests/openid_connect_spec.rb
with
19 additions
and
28 deletions
Gemfile.lock
+
11
−
11
View file @
87485e7c
...
...
@@ -95,7 +95,7 @@ GEM
babosa (1.0.2)
base32 (0.3.2)
batch-loader (1.4.0)
bcrypt (3.1.1
2
)
bcrypt (3.1.1
3
)
bcrypt_pbkdf (1.0.0)
benchmark-ips (2.3.0)
benchmark-memory (0.1.2)
...
...
@@ -209,10 +209,10 @@ GEM
descendants_tracker (0.0.4)
thread_safe (~> 0.3, >= 0.3.1)
device_detector (1.0.0)
devise (4.
6.2
)
devise (4.
7.1
)
bcrypt (~> 3.0)
orm_adapter (~> 0.1)
railties (>= 4.1.0
, < 6.0
)
railties (>= 4.1.0)
responders
warden (~> 1.2.3)
devise-two-factor (3.0.0)
...
...
@@ -488,7 +488,7 @@ GEM
mime-types (~> 3.0)
multi_xml (>= 0.5.2)
httpclient (2.8.3)
i18n (1.
6
.0)
i18n (1.
7
.0)
concurrent-ruby (~> 1.0)
i18n_data (0.8.0)
icalendar (2.4.1)
...
...
@@ -770,8 +770,8 @@ GEM
rails-dom-testing (2.0.3)
activesupport (>= 4.2.0)
nokogiri (>= 1.6)
rails-html-sanitizer (1.
2
.0)
loofah (~> 2.
2, >= 2.2.2
)
rails-html-sanitizer (1.
3
.0)
loofah (~> 2.
3
)
rails-i18n (5.1.1)
i18n (>= 0.7, < 2)
railties (>= 5.0, < 6)
...
...
@@ -824,9 +824,9 @@ GEM
declarative-option (< 0.2.0)
uber (< 0.2.0)
request_store (1.3.1)
responders (2.4.
0
)
actionpack (>= 4.2.0, <
5.3
)
railties (>= 4.2.0, <
5.3
)
responders (2.4.
1
)
actionpack (>= 4.2.0, <
6.0
)
railties (>= 4.2.0, <
6.0
)
rest-client (2.0.2)
http-cookie (>= 1.0.2, < 2.0)
mime-types (>= 1.16, < 4.0)
...
...
@@ -1058,8 +1058,8 @@ GEM
descendants_tracker (~> 0.0, >= 0.0.3)
equalizer (~> 0.0, >= 0.0.9)
vmstat (2.3.0)
warden (1.2.
7
)
rack (>=
1
.0)
warden (1.2.
8
)
rack (>=
2
.0
.6
)
webfinger (1.1.0)
activesupport
httpclient (>= 2.4)
...
...
This diff is collapsed.
Click to expand it.
spec/requests/openid_connect_spec.rb
+
8
−
17
View file @
87485e7c
...
...
@@ -148,34 +148,25 @@ def request_user_info!
end
end
# These 2 calls shouldn't actually throw, they should be handled as an
# unauthorized request, so we should be able to check the response.
#
# This was not possible due to an issue with Warden:
# https://github.com/hassox/warden/pull/162
#
# When the patch gets merged and we update Warden, these specs will need to
# updated to check the response instead of a raised exception.
# https://gitlab.com/gitlab-org/gitlab-foss/issues/40218
context
'when user is blocked'
do
it
're
turns authentication error
'
do
it
're
directs to login page
'
do
access_grant
user
.
block!
expect
do
request_access_token!
e
nd
.
to
raise_error
UncaughtThrowError
request_access_token!
e
xpect
(
response
).
to
redirect_to
(
'/users/sign_in'
)
end
end
context
'when user is ldap_blocked'
do
it
're
turns authentication error
'
do
it
're
directs to login page
'
do
access_grant
user
.
ldap_block!
expect
do
request_access_token!
e
nd
.
to
raise_error
UncaughtThrowError
request_access_token!
e
xpect
(
response
).
to
redirect_to
(
'/users/sign_in'
)
end
end
end
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment