2018-12-20 17:51:55 +01:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
RSpec.describe UserPolicy do
|
2023-07-12 09:49:33 +02:00
|
|
|
subject { described_class }
|
|
|
|
|
2022-07-05 02:41:40 +02:00
|
|
|
let(:admin) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
|
2022-01-28 00:46:42 +01:00
|
|
|
let(:john) { Fabricate(:account) }
|
2018-12-20 17:51:55 +01:00
|
|
|
|
|
|
|
permissions :reset_password?, :change_email? do
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'when staff?' do
|
|
|
|
context 'with !record.staff?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'permits' do
|
|
|
|
expect(subject).to permit(admin, john.user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'when record.staff?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'denies' do
|
|
|
|
expect(subject).to_not permit(admin, admin.user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'with !staff?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'denies' do
|
|
|
|
expect(subject).to_not permit(john, User)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
permissions :disable_2fa? do
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'when admin?' do
|
|
|
|
context 'with !record.staff?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'permits' do
|
|
|
|
expect(subject).to permit(admin, john.user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'when record.staff?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'denies' do
|
|
|
|
expect(subject).to_not permit(admin, admin.user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'with !admin?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'denies' do
|
|
|
|
expect(subject).to_not permit(john, User)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
permissions :confirm? do
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'when staff?' do
|
|
|
|
context 'with !record.confirmed?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'permits' do
|
|
|
|
john.user.update(confirmed_at: nil)
|
|
|
|
expect(subject).to permit(admin, john.user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'when record.confirmed?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'denies' do
|
2024-01-15 19:04:58 +01:00
|
|
|
john.user.mark_email_as_confirmed!
|
2018-12-20 17:51:55 +01:00
|
|
|
expect(subject).to_not permit(admin, john.user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'with !staff?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'denies' do
|
|
|
|
expect(subject).to_not permit(john, User)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
permissions :enable? do
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'when staff?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'permits' do
|
|
|
|
expect(subject).to permit(admin, User)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'with !staff?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'denies' do
|
|
|
|
expect(subject).to_not permit(john, User)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
permissions :disable? do
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'when staff?' do
|
|
|
|
context 'with !record.admin?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'permits' do
|
|
|
|
expect(subject).to permit(admin, john.user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'when record.admin?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'denies' do
|
|
|
|
expect(subject).to_not permit(admin, admin.user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-04 05:49:08 +02:00
|
|
|
context 'with !staff?' do
|
2018-12-20 17:51:55 +01:00
|
|
|
it 'denies' do
|
|
|
|
expect(subject).to_not permit(john, User)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2024-10-15 16:24:12 +02:00
|
|
|
|
|
|
|
permissions :approve?, :reject? do
|
|
|
|
context 'when admin' do
|
|
|
|
context 'when user is approved' do
|
|
|
|
it { is_expected.to_not permit(admin, User.new(approved: true)) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when user is not approved' do
|
|
|
|
it { is_expected.to permit(admin, User.new(approved: false)) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when not admin' do
|
|
|
|
it { is_expected.to_not permit(john, User.new) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
permissions :change_role? do
|
|
|
|
context 'when not admin' do
|
|
|
|
it { is_expected.to_not permit(john, User.new) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin' do
|
|
|
|
let(:user) { User.new(role: role) }
|
|
|
|
|
|
|
|
context 'when role of admin overrides user role' do
|
|
|
|
let(:role) { UserRole.new(position: admin.user.role.position - 10, id: 123) }
|
|
|
|
|
|
|
|
it { is_expected.to permit(admin, user) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when role of admin does not override user role' do
|
|
|
|
let(:role) { UserRole.new(position: admin.user.role.position + 10, id: 123) }
|
|
|
|
|
|
|
|
it { is_expected.to_not permit(admin, user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2018-12-20 17:51:55 +01:00
|
|
|
end
|