mirror of
https://github.com/varvet/pundit.git
synced 2022-11-09 12:30:11 -05:00
363 lines
13 KiB
Ruby
363 lines
13 KiB
Ruby
require "spec_helper"
|
|
|
|
describe Pundit do
|
|
let(:user) { double("user") }
|
|
let(:post) { Post.new(user: user) }
|
|
let(:comment) { Comment.new }
|
|
let(:article) { Article.new }
|
|
let(:controller) { Controller.new(user, { :action => 'update' }) }
|
|
let(:artificial_blog) { ArtificialBlog.new }
|
|
let(:article_tag) { ArticleTag.new }
|
|
let(:comments_relation) { CommentsRelation.new }
|
|
let(:empty_comments_relation) { CommentsRelation.new(true) }
|
|
|
|
describe ".authorize" do
|
|
it "infers the policy and authorizes based on it" do
|
|
expect(Pundit.authorize(user, post, :update?)).to be_truthy
|
|
end
|
|
|
|
it "works with anonymous class policies" do
|
|
expect(Pundit.authorize(user, article_tag, :show?)).to be_truthy
|
|
expect { Pundit.authorize(user, article_tag, :destroy?) }.to raise_error(Pundit::NotAuthorizedError)
|
|
end
|
|
|
|
it "raises an error with a query and action" do
|
|
expect { Pundit.authorize(user, post, :destroy?) }.to raise_error(Pundit::NotAuthorizedError, "not allowed to destroy? this #<Post>") do |error|
|
|
expect(error.query).to eq :destroy?
|
|
expect(error.record).to eq post
|
|
expect(error.policy).to eq Pundit.policy(user, post)
|
|
end
|
|
end
|
|
end
|
|
|
|
describe ".policy_scope" do
|
|
it "returns an instantiated policy scope given a plain model class" do
|
|
expect(Pundit.policy_scope(user, Post)).to eq :published
|
|
end
|
|
|
|
it "returns an instantiated policy scope given an active model class" do
|
|
expect(Pundit.policy_scope(user, Comment)).to eq Comment
|
|
end
|
|
|
|
it "returns an instantiated policy scope given an active record relation" do
|
|
expect(Pundit.policy_scope(user, comments_relation)).to eq comments_relation
|
|
end
|
|
|
|
it "returns an instantiated policy scope given an empty active record relation" do
|
|
expect(Pundit.policy_scope(user, empty_comments_relation)).to eq empty_comments_relation
|
|
end
|
|
|
|
it "returns nil if the given policy scope can't be found" do
|
|
expect(Pundit.policy_scope(user, Article)).to be_nil
|
|
end
|
|
|
|
it "returns nil if blank object given" do
|
|
expect(Pundit.policy_scope(user, nil)).to be_nil
|
|
end
|
|
end
|
|
|
|
describe ".policy_scope!" do
|
|
it "returns an instantiated policy scope given a plain model class" do
|
|
expect(Pundit.policy_scope!(user, Post)).to eq :published
|
|
end
|
|
|
|
it "returns an instantiated policy scope given an active model class" do
|
|
expect(Pundit.policy_scope!(user, Comment)).to eq Comment
|
|
end
|
|
|
|
it "throws an exception if the given policy scope can't be found" do
|
|
expect { Pundit.policy_scope!(user, Article) }.to raise_error(Pundit::NotDefinedError)
|
|
end
|
|
|
|
it "throws an exception if the given policy scope can't be found" do
|
|
expect { Pundit.policy_scope!(user, ArticleTag) }.to raise_error(Pundit::NotDefinedError)
|
|
end
|
|
|
|
it "throws an exception if the given policy scope is nil" do
|
|
expect { Pundit.policy_scope!(user, nil) }.to raise_error(Pundit::NotDefinedError, "unable to find policy scope of nil")
|
|
end
|
|
end
|
|
|
|
describe ".policy" do
|
|
it "returns an instantiated policy given a plain model instance" do
|
|
policy = Pundit.policy(user, post)
|
|
expect(policy.user).to eq user
|
|
expect(policy.post).to eq post
|
|
end
|
|
|
|
it "returns an instantiated policy given an active model instance" do
|
|
policy = Pundit.policy(user, comment)
|
|
expect(policy.user).to eq user
|
|
expect(policy.comment).to eq comment
|
|
end
|
|
|
|
it "returns an instantiated policy given a plain model class" do
|
|
policy = Pundit.policy(user, Post)
|
|
expect(policy.user).to eq user
|
|
expect(policy.post).to eq Post
|
|
end
|
|
|
|
it "returns an instantiated policy given an active model class" do
|
|
policy = Pundit.policy(user, Comment)
|
|
expect(policy.user).to eq user
|
|
expect(policy.comment).to eq Comment
|
|
end
|
|
|
|
it "returns nil if the given policy can't be found" do
|
|
expect(Pundit.policy(user, article)).to be_nil
|
|
expect(Pundit.policy(user, Article)).to be_nil
|
|
end
|
|
|
|
it "returns nil if the given policy is nil" do
|
|
expect(Pundit.policy(user, nil)).to be_nil
|
|
end
|
|
|
|
describe "with .policy_class set on the model" do
|
|
it "returns an instantiated policy given a plain model instance" do
|
|
policy = Pundit.policy(user, artificial_blog)
|
|
expect(policy.user).to eq user
|
|
expect(policy.blog).to eq artificial_blog
|
|
end
|
|
|
|
it "returns an instantiated policy given a plain model class" do
|
|
policy = Pundit.policy(user, ArtificialBlog)
|
|
expect(policy.user).to eq user
|
|
expect(policy.blog).to eq ArtificialBlog
|
|
end
|
|
|
|
it "returns an instantiated policy given a plain model instance providing an anonymous class" do
|
|
policy = Pundit.policy(user, article_tag)
|
|
expect(policy.user).to eq user
|
|
expect(policy.tag).to eq article_tag
|
|
end
|
|
|
|
it "returns an instantiated policy given a plain model class providing an anonymous class" do
|
|
policy = Pundit.policy(user, ArticleTag)
|
|
expect(policy.user).to eq user
|
|
expect(policy.tag).to eq ArticleTag
|
|
end
|
|
|
|
it "returns an instantiated policy given a symbol" do
|
|
policy = Pundit.policy(user, :dashboard)
|
|
expect(policy.class).to eq DashboardPolicy
|
|
expect(policy.user).to eq user
|
|
expect(policy.dashboard).to eq :dashboard
|
|
end
|
|
|
|
it "returns an instantiated policy given an array" do
|
|
policy = Pundit.policy(user, [:project, :dashboard])
|
|
expect(policy.class).to eq Project::DashboardPolicy
|
|
expect(policy.user).to eq user
|
|
expect(policy.dashboard).to eq [:project, :dashboard]
|
|
end
|
|
end
|
|
end
|
|
|
|
describe ".policy!" do
|
|
it "returns an instantiated policy given a plain model instance" do
|
|
policy = Pundit.policy!(user, post)
|
|
expect(policy.user).to eq user
|
|
expect(policy.post).to eq post
|
|
end
|
|
|
|
it "returns an instantiated policy given an active model instance" do
|
|
policy = Pundit.policy!(user, comment)
|
|
expect(policy.user).to eq user
|
|
expect(policy.comment).to eq comment
|
|
end
|
|
|
|
it "returns an instantiated policy given a plain model class" do
|
|
policy = Pundit.policy!(user, Post)
|
|
expect(policy.user).to eq user
|
|
expect(policy.post).to eq Post
|
|
end
|
|
|
|
it "returns an instantiated policy given an active model class" do
|
|
policy = Pundit.policy!(user, Comment)
|
|
expect(policy.user).to eq user
|
|
expect(policy.comment).to eq Comment
|
|
end
|
|
|
|
it "returns an instantiated policy given a symbol" do
|
|
policy = Pundit.policy!(user, :dashboard)
|
|
expect(policy.class).to eq DashboardPolicy
|
|
expect(policy.user).to eq user
|
|
expect(policy.dashboard).to eq :dashboard
|
|
end
|
|
|
|
it "returns an instantiated policy given an array" do
|
|
policy = Pundit.policy!(user, [:project, :dashboard])
|
|
expect(policy.class).to eq Project::DashboardPolicy
|
|
expect(policy.user).to eq user
|
|
expect(policy.dashboard).to eq [:project, :dashboard]
|
|
end
|
|
|
|
it "throws an exception if the given policy can't be found" do
|
|
expect { Pundit.policy!(user, article) }.to raise_error(Pundit::NotDefinedError)
|
|
expect { Pundit.policy!(user, Article) }.to raise_error(Pundit::NotDefinedError)
|
|
end
|
|
|
|
it "throws an exception if the given policy is nil" do
|
|
expect { Pundit.policy!(user, nil) }.to raise_error(Pundit::NotDefinedError, "unable to find policy of nil")
|
|
end
|
|
end
|
|
|
|
describe "#verify_authorized" do
|
|
it "does nothing when authorized" do
|
|
controller.authorize(post)
|
|
controller.verify_authorized
|
|
end
|
|
|
|
it "raises an exception when not authorized" do
|
|
expect { controller.verify_authorized }.to raise_error(Pundit::AuthorizationNotPerformedError)
|
|
end
|
|
end
|
|
|
|
describe "#verify_policy_scoped" do
|
|
it "does nothing when policy_scope is used" do
|
|
controller.policy_scope(Post)
|
|
controller.verify_policy_scoped
|
|
end
|
|
|
|
it "raises an exception when policy_scope is not used" do
|
|
expect { controller.verify_policy_scoped }.to raise_error(Pundit::PolicyScopingNotPerformedError)
|
|
end
|
|
end
|
|
|
|
describe "#authorize" do
|
|
it "infers the policy name and authorizes based on it" do
|
|
expect(controller.authorize(post)).to be_truthy
|
|
end
|
|
|
|
it "can be given a different permission to check" do
|
|
expect(controller.authorize(post, :show?)).to be_truthy
|
|
expect { controller.authorize(post, :destroy?) }.to raise_error(Pundit::NotAuthorizedError)
|
|
end
|
|
|
|
it "works with anonymous class policies" do
|
|
expect(controller.authorize(article_tag, :show?)).to be_truthy
|
|
expect { controller.authorize(article_tag, :destroy?) }.to raise_error(Pundit::NotAuthorizedError)
|
|
end
|
|
|
|
it "throws an exception when the permission check fails" do
|
|
expect { controller.authorize(Post.new) }.to raise_error(Pundit::NotAuthorizedError)
|
|
end
|
|
|
|
it "throws an exception when a policy cannot be found" do
|
|
expect { controller.authorize(Article) }.to raise_error(Pundit::NotDefinedError)
|
|
end
|
|
|
|
it "caches the policy" do
|
|
expect(controller.policies[post]).to be_nil
|
|
controller.authorize(post)
|
|
expect(controller.policies[post]).not_to be_nil
|
|
end
|
|
|
|
it "raises an error when the given record is nil" do
|
|
expect { controller.authorize(nil, :destroy?) }.to raise_error(Pundit::NotDefinedError)
|
|
end
|
|
end
|
|
|
|
describe "#skip_authorization" do
|
|
it "disables authorization verification" do
|
|
controller.skip_authorization
|
|
expect { controller.verify_authorized }.not_to raise_error
|
|
end
|
|
end
|
|
|
|
describe "#pundit_user" do
|
|
it 'returns the same thing as current_user' do
|
|
expect(controller.pundit_user).to eq controller.current_user
|
|
end
|
|
end
|
|
|
|
describe "#policy" do
|
|
it "returns an instantiated policy" do
|
|
policy = controller.policy(post)
|
|
expect(policy.user).to eq user
|
|
expect(policy.post).to eq post
|
|
end
|
|
|
|
it "throws an exception if the given policy can't be found" do
|
|
expect { controller.policy(article) }.to raise_error(Pundit::NotDefinedError)
|
|
end
|
|
|
|
it "allows policy to be injected" do
|
|
new_policy = OpenStruct.new
|
|
controller.policies[post] = new_policy
|
|
|
|
expect(controller.policy(post)).to eq new_policy
|
|
end
|
|
end
|
|
|
|
describe "#policy_scope" do
|
|
it "returns an instantiated policy scope" do
|
|
expect(controller.policy_scope(Post)).to eq :published
|
|
end
|
|
|
|
it "throws an exception if the given policy can't be found" do
|
|
expect { controller.policy_scope(Article) }.to raise_error(Pundit::NotDefinedError)
|
|
end
|
|
|
|
it "allows policy_scope to be injected" do
|
|
new_scope = OpenStruct.new
|
|
controller.policy_scopes[Post] = new_scope
|
|
|
|
expect(controller.policy_scope(Post)).to eq new_scope
|
|
end
|
|
end
|
|
|
|
describe "#permitted_attributes" do
|
|
it "checks policy for permitted attributes" do
|
|
params = ActionController::Parameters.new({ action: 'update', post: { title: 'Hello', votes: 5, admin: true } })
|
|
|
|
expect(Controller.new(user, params).permitted_attributes(post)).to eq({ 'title' => 'Hello', 'votes' => 5 })
|
|
expect(Controller.new(double, params).permitted_attributes(post)).to eq({ 'votes' => 5 })
|
|
end
|
|
end
|
|
|
|
describe "#build" do
|
|
let(:params) { ActionController::Parameters.new({ action: 'update', post: { title: 'Hello', votes: 5, admin: true } }) }
|
|
let(:controller) { Controller.new(user, params) }
|
|
|
|
it "builds a record of the given type with permitted attributes" do
|
|
post = controller.build(Post, user: user)
|
|
expect(post).to be_an_instance_of(Post)
|
|
expect(post.user).to eq(user)
|
|
expect(post.attributes["title"]).to eq('Hello')
|
|
expect(post.attributes.has_key?("admin")).to eq(false)
|
|
end
|
|
|
|
it "denies authorization if the given record is not authorized to perform the action" do
|
|
expect { controller.build(Post, user: double("other")) }.to raise_error(Pundit::NotAuthorizedError)
|
|
end
|
|
end
|
|
|
|
describe "#update" do
|
|
let(:params) { ActionController::Parameters.new({ action: 'update', post: { title: 'Hello', votes: 5, admin: true } }) }
|
|
let(:controller) { Controller.new(user, params) }
|
|
|
|
it "builds a record of the given type with permitted attributes" do
|
|
post = Post.new(title: 'Monkey', user: user)
|
|
expect(post).to receive(:save).and_return(:done)
|
|
|
|
expect(controller.update(post, "body" => "test")).to eq(:done)
|
|
|
|
expect(post.user).to eq(user)
|
|
expect(post.attributes['title']).to eq('Hello')
|
|
expect(post.attributes['body']).to eq('test')
|
|
end
|
|
|
|
it "denies authorization if the given record is not authorized to perform the action" do
|
|
post = Post.new(title: 'Monkey', user: double("other"))
|
|
expect(post).not_to receive(:save)
|
|
expect { controller.update(post, user: user) }.to raise_error(Pundit::NotAuthorizedError)
|
|
end
|
|
|
|
it "denies authorization if the given record is not authorized after attributes are assigned" do
|
|
post = Post.new(title: 'Monkey', user: user)
|
|
expect(post).not_to receive(:save)
|
|
expect { controller.update(post, user: double("other")) }.to raise_error(Pundit::NotAuthorizedError)
|
|
end
|
|
end
|
|
end
|