2019-04-10 02:13:43 +00:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe Clusters::InstancePolicy do
|
|
|
|
let(:user) { create(:user) }
|
2019-05-02 01:07:38 +00:00
|
|
|
let(:policy) { described_class.new(user, Clusters::Instance.new) }
|
2019-04-10 02:13:43 +00:00
|
|
|
|
|
|
|
describe 'rules' do
|
|
|
|
context 'when user' do
|
2019-04-18 02:45:31 +00:00
|
|
|
it { expect(policy).to be_disallowed :read_cluster }
|
2019-08-12 00:04:55 +00:00
|
|
|
it { expect(policy).to be_disallowed :add_cluster }
|
|
|
|
it { expect(policy).to be_disallowed :create_cluster }
|
2019-04-10 02:13:43 +00:00
|
|
|
it { expect(policy).to be_disallowed :update_cluster }
|
|
|
|
it { expect(policy).to be_disallowed :admin_cluster }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin' do
|
|
|
|
let(:user) { create(:admin) }
|
|
|
|
|
2020-05-15 15:08:04 +00:00
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
|
|
it { expect(policy).to be_allowed :read_cluster }
|
|
|
|
it { expect(policy).to be_allowed :add_cluster }
|
|
|
|
it { expect(policy).to be_allowed :create_cluster }
|
|
|
|
it { expect(policy).to be_allowed :update_cluster }
|
|
|
|
it { expect(policy).to be_allowed :admin_cluster }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin mode is disabled' do
|
|
|
|
it { expect(policy).to be_disallowed :read_cluster }
|
|
|
|
it { expect(policy).to be_disallowed :add_cluster }
|
|
|
|
it { expect(policy).to be_disallowed :create_cluster }
|
|
|
|
it { expect(policy).to be_disallowed :update_cluster }
|
|
|
|
it { expect(policy).to be_disallowed :admin_cluster }
|
|
|
|
end
|
2019-04-10 02:13:43 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|