summaryrefslogtreecommitdiffstats
path: root/spec/policies
diff options
context:
space:
mode:
authorysksn <bluewhale1982@gmail.com>2018-12-21 01:51:55 +0900
committerEugen Rochko <eugen@zeonfederated.com>2018-12-20 17:51:55 +0100
commitbe9640bfc2be49961fef163510f630f481e02566 (patch)
tree4f43efb213759c4f94fc28bae937481b4deffe08 /spec/policies
parentd649d8459419e8dbdc075c416f1315267a184636 (diff)
Add specs for UserPolicy (#9593)
Diffstat (limited to 'spec/policies')
-rw-r--r--spec/policies/user_policy_spec.rb167
1 files changed, 167 insertions, 0 deletions
diff --git a/spec/policies/user_policy_spec.rb b/spec/policies/user_policy_spec.rb
new file mode 100644
index 00000000000..e37904f048e
--- /dev/null
+++ b/spec/policies/user_policy_spec.rb
@@ -0,0 +1,167 @@
+# frozen_string_literal: true
+
+require 'rails_helper'
+require 'pundit/rspec'
+
+RSpec.describe UserPolicy do
+ let(:subject) { described_class }
+ let(:admin) { Fabricate(:user, admin: true).account }
+ let(:john) { Fabricate(:user).account }
+
+ permissions :reset_password?, :change_email? do
+ context 'staff?' do
+ context '!record.staff?' do
+ it 'permits' do
+ expect(subject).to permit(admin, john.user)
+ end
+ end
+
+ context 'record.staff?' do
+ it 'denies' do
+ expect(subject).to_not permit(admin, admin.user)
+ end
+ end
+ end
+
+ context '!staff?' do
+ it 'denies' do
+ expect(subject).to_not permit(john, User)
+ end
+ end
+ end
+
+ permissions :disable_2fa? do
+ context 'admin?' do
+ context '!record.staff?' do
+ it 'permits' do
+ expect(subject).to permit(admin, john.user)
+ end
+ end
+
+ context 'record.staff?' do
+ it 'denies' do
+ expect(subject).to_not permit(admin, admin.user)
+ end
+ end
+ end
+
+ context '!admin?' do
+ it 'denies' do
+ expect(subject).to_not permit(john, User)
+ end
+ end
+ end
+
+ permissions :confirm? do
+ context 'staff?' do
+ context '!record.confirmed?' do
+ it 'permits' do
+ john.user.update(confirmed_at: nil)
+ expect(subject).to permit(admin, john.user)
+ end
+ end
+
+ context 'record.confirmed?' do
+ it 'denies' do
+ john.user.confirm!
+ expect(subject).to_not permit(admin, john.user)
+ end
+ end
+ end
+
+ context '!staff?' do
+ it 'denies' do
+ expect(subject).to_not permit(john, User)
+ end
+ end
+ end
+
+ permissions :enable? do
+ context 'staff?' do
+ it 'permits' do
+ expect(subject).to permit(admin, User)
+ end
+ end
+
+ context '!staff?' do
+ it 'denies' do
+ expect(subject).to_not permit(john, User)
+ end
+ end
+ end
+
+ permissions :disable? do
+ context 'staff?' do
+ context '!record.admin?' do
+ it 'permits' do
+ expect(subject).to permit(admin, john.user)
+ end
+ end
+
+ context 'record.admin?' do
+ it 'denies' do
+ expect(subject).to_not permit(admin, admin.user)
+ end
+ end
+ end
+
+ context '!staff?' do
+ it 'denies' do
+ expect(subject).to_not permit(john, User)
+ end
+ end
+ end
+
+ permissions :promote? do
+ context 'admin?' do
+ context 'promoteable?' do
+ it 'permits' do
+ expect(subject).to permit(admin, john.user)
+ end
+ end
+
+ context '!promoteable?' do
+ it 'denies' do
+ expect(subject).to_not permit(admin, admin.user)
+ end
+ end
+ end
+
+ context '!admin?' do
+ it 'denies' do
+ expect(subject).to_not permit(john, User)
+ end
+ end
+ end
+
+ permissions :demote? do
+ context 'admin?' do
+ context '!record.admin?' do
+ context 'demoteable?' do
+ it 'permits' do
+ john.user.update(moderator: true)
+ expect(subject).to permit(admin, john.user)
+ end
+ end
+
+ context '!demoteable?' do
+ it 'denies' do
+ expect(subject).to_not permit(admin, john.user)
+ end
+ end
+ end
+
+ context 'record.admin?' do
+ it 'denies' do
+ expect(subject).to_not permit(admin, admin.user)
+ end
+ end
+ end
+
+ context '!admin?' do
+ it 'denies' do
+ expect(subject).to_not permit(john, User)
+ end
+ end
+ end
+end