2020-07-29 15:09:39 +00:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
RSpec.describe PersonalAccessTokenPolicy do
|
|
|
|
include AdminModeHelper
|
|
|
|
|
|
|
|
using RSpec::Parameterized::TableSyntax
|
|
|
|
|
|
|
|
where(:user_type, :owned_by_same_user, :expected_permitted?) do
|
|
|
|
:user | true | true
|
|
|
|
:user | false | false
|
|
|
|
:admin | false | true
|
|
|
|
end
|
|
|
|
|
|
|
|
with_them do
|
2020-08-07 15:10:17 +00:00
|
|
|
context 'determine if a token is readable or revocable by a user' do
|
2020-07-29 15:09:39 +00:00
|
|
|
let(:user) { build_stubbed(user_type) }
|
|
|
|
let(:token_owner) { owned_by_same_user ? user : build(:user) }
|
|
|
|
let(:token) { build(:personal_access_token, user: token_owner) }
|
|
|
|
|
|
|
|
subject { described_class.new(user, token) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
enable_admin_mode!(user) if user.admin?
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to(expected_permitted? ? be_allowed(:read_token) : be_disallowed(:read_token)) }
|
2020-08-07 15:10:17 +00:00
|
|
|
it { is_expected.to(expected_permitted? ? be_allowed(:revoke_token) : be_disallowed(:revoke_token)) }
|
2020-07-29 15:09:39 +00:00
|
|
|
end
|
|
|
|
end
|
2020-08-07 15:10:17 +00:00
|
|
|
|
|
|
|
context 'current_user is a blocked administrator', :enable_admin_mode do
|
|
|
|
subject { described_class.new(current_user, token) }
|
|
|
|
|
|
|
|
let(:current_user) { create(:user, :admin, :blocked) }
|
|
|
|
let(:token) { create(:personal_access_token) }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:revoke_token) }
|
|
|
|
it { is_expected.to be_disallowed(:read_token) }
|
|
|
|
end
|
2020-07-29 15:09:39 +00:00
|
|
|
end
|