summaryrefslogtreecommitdiffstats
path: root/spec/policies
diff options
context:
space:
mode:
authorysksn <bluewhale1982@gmail.com>2018-12-19 16:56:59 +0900
committerEugen Rochko <eugen@zeonfederated.com>2018-12-19 08:56:59 +0100
commitaf56efdec56230eddab711edd33a7e33694f2b34 (patch)
tree1ce3ca7500dfbaf161d0265aac8b024a9ffda730 /spec/policies
parentff472d2cfb361b287e2d09e441ed3cf63b00cc56 (diff)
Add specs for AccountPolicy (#9575)
Diffstat (limited to 'spec/policies')
-rw-r--r--spec/policies/account_policy_spec.rb86
1 files changed, 86 insertions, 0 deletions
diff --git a/spec/policies/account_policy_spec.rb b/spec/policies/account_policy_spec.rb
new file mode 100644
index 00000000000..6648b0888bf
--- /dev/null
+++ b/spec/policies/account_policy_spec.rb
@@ -0,0 +1,86 @@
+# frozen_string_literal: true
+
+require 'rails_helper'
+require 'pundit/rspec'
+
+RSpec.describe AccountPolicy do
+ let(:subject) { described_class }
+ let(:admin) { Fabricate(:user, admin: true).account }
+ let(:john) { Fabricate(:user).account }
+
+ permissions :index?, :show?, :unsuspend?, :unsilence?, :remove_avatar?, :remove_header? do
+ context 'staff' do
+ it 'permits' do
+ expect(subject).to permit(admin)
+ end
+ end
+
+ context 'not staff' do
+ it 'denies' do
+ expect(subject).to_not permit(john)
+ end
+ end
+ end
+
+ permissions :redownload?, :subscribe?, :unsubscribe? do
+ context 'admin' do
+ it 'permits' do
+ expect(subject).to permit(admin)
+ end
+ end
+
+ context 'not admin' do
+ it 'denies' do
+ expect(subject).to_not permit(john)
+ end
+ end
+ end
+
+ permissions :suspend?, :silence? do
+ let(:staff) { Fabricate(:user, admin: true).account }
+
+ context 'staff' do
+ context 'record is staff' do
+ it 'denies' do
+ expect(subject).to_not permit(admin, staff)
+ end
+ end
+
+ context 'record is not staff' do
+ it 'permits' do
+ expect(subject).to permit(admin, john)
+ end
+ end
+ end
+
+ context 'not staff' do
+ it 'denies' do
+ expect(subject).to_not permit(john, Account)
+ end
+ end
+ end
+
+ permissions :memorialize? do
+ let(:other_admin) { Fabricate(:user, admin: true).account }
+
+ context 'admin' do
+ context 'record is admin' do
+ it 'denies' do
+ expect(subject).to_not permit(admin, other_admin)
+ end
+ end
+
+ context 'record is not admin' do
+ it 'permits' do
+ expect(subject).to permit(admin, john)
+ end
+ end
+ end
+
+ context 'not admin' do
+ it 'denies' do
+ expect(subject).to_not permit(john, Account)
+ end
+ end
+ end
+end