Skip to content
Snippets Groups Projects
Commit 47e4613f authored by Gabriel Mazetto's avatar Gabriel Mazetto :spy_tone1:
Browse files

Code style fixes and some code simplified

parent ec67e9be
No related branches found
No related tags found
No related merge requests found
Loading
@@ -26,7 +26,7 @@ class Admin::IdentitiesController < Admin::ApplicationController
Loading
@@ -26,7 +26,7 @@ class Admin::IdentitiesController < Admin::ApplicationController
   
def update def update
if @identity.update_attributes(identity_params) if @identity.update_attributes(identity_params)
RepairLdapBlockedUserService.new(@user, @identity).execute RepairLdapBlockedUserService.new(@user).execute
redirect_to admin_user_identities_path(@user), notice: 'User identity was successfully updated.' redirect_to admin_user_identities_path(@user), notice: 'User identity was successfully updated.'
else else
render :edit render :edit
Loading
@@ -35,7 +35,7 @@ class Admin::IdentitiesController < Admin::ApplicationController
Loading
@@ -35,7 +35,7 @@ class Admin::IdentitiesController < Admin::ApplicationController
   
def destroy def destroy
if @identity.destroy if @identity.destroy
RepairLdapBlockedUserService.new(@user, @identity).execute RepairLdapBlockedUserService.new(@user).execute
redirect_to admin_user_identities_path(@user), notice: 'User identity was successfully removed.' redirect_to admin_user_identities_path(@user), notice: 'User identity was successfully removed.'
else else
redirect_to admin_user_identities_path(@user), alert: 'Failed to remove user identity.' redirect_to admin_user_identities_path(@user), alert: 'Failed to remove user identity.'
Loading
Loading
class RepairLdapBlockedUserService class RepairLdapBlockedUserService
attr_accessor :user, :identity attr_accessor :user
   
def initialize(user, identity) def initialize(user)
@user, @identity = user, identity @user = user
end end
   
def execute def execute
if identity.destroyed? user.block if ldap_hard_blocked?
user.block if identity.is_ldap? && user.ldap_blocked? && !user.ldap_user? end
else
user.block if !identity.is_ldap? && user.ldap_blocked? && !user.ldap_user? private
end
def ldap_hard_blocked?
user.ldap_blocked? && !user.ldap_user?
end end
end end
Loading
@@ -40,7 +40,9 @@ module Gitlab
Loading
@@ -40,7 +40,9 @@ module Gitlab
user.ldap_block user.ldap_block
false false
else else
user.activate if (user.blocked? && !ldap_config.block_auto_created_users) || user.ldap_blocked? if (user.blocked? && !ldap_config.block_auto_created_users) || user.ldap_blocked?
user.activate
end
true true
end end
else else
Loading
Loading
Loading
@@ -3,7 +3,7 @@ require 'spec_helper'
Loading
@@ -3,7 +3,7 @@ require 'spec_helper'
describe RepairLdapBlockedUserService, services: true do describe RepairLdapBlockedUserService, services: true do
let(:user) { create(:omniauth_user, provider: 'ldapmain', state: 'ldap_blocked') } let(:user) { create(:omniauth_user, provider: 'ldapmain', state: 'ldap_blocked') }
let(:identity) { user.ldap_identity } let(:identity) { user.ldap_identity }
subject(:service) { RepairLdapBlockedUserService.new(user, identity) } subject(:service) { RepairLdapBlockedUserService.new(user) }
   
describe '#execute' do describe '#execute' do
it 'change to normal block after destroying last ldap identity' do it 'change to normal block after destroying last ldap identity' do
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment