ff8811c40b
The user being created was no different than what `be_allowed_for` was doing behind the scenes so we were essentially testing all user-level accesses twice.
53 lines
1.4 KiB
Ruby
53 lines
1.4 KiB
Ruby
require 'spec_helper'
|
|
|
|
describe "Profile access", feature: true do
|
|
include AccessMatchers
|
|
|
|
describe "GET /profile/keys" do
|
|
subject { profile_keys_path }
|
|
|
|
it { is_expected.to be_allowed_for :admin }
|
|
it { is_expected.to be_allowed_for :user }
|
|
it { is_expected.to be_denied_for :visitor }
|
|
end
|
|
|
|
describe "GET /profile" do
|
|
subject { profile_path }
|
|
|
|
it { is_expected.to be_allowed_for :admin }
|
|
it { is_expected.to be_allowed_for :user }
|
|
it { is_expected.to be_denied_for :visitor }
|
|
end
|
|
|
|
describe "GET /profile/account" do
|
|
subject { profile_account_path }
|
|
|
|
it { is_expected.to be_allowed_for :admin }
|
|
it { is_expected.to be_allowed_for :user }
|
|
it { is_expected.to be_denied_for :visitor }
|
|
end
|
|
|
|
describe "GET /profile/preferences" do
|
|
subject { profile_preferences_path }
|
|
|
|
it { is_expected.to be_allowed_for :admin }
|
|
it { is_expected.to be_allowed_for :user }
|
|
it { is_expected.to be_denied_for :visitor }
|
|
end
|
|
|
|
describe "GET /profile/audit_log" do
|
|
subject { audit_log_profile_path }
|
|
|
|
it { is_expected.to be_allowed_for :admin }
|
|
it { is_expected.to be_allowed_for :user }
|
|
it { is_expected.to be_denied_for :visitor }
|
|
end
|
|
|
|
describe "GET /profile/notifications" do
|
|
subject { profile_notifications_path }
|
|
|
|
it { is_expected.to be_allowed_for :admin }
|
|
it { is_expected.to be_allowed_for :user }
|
|
it { is_expected.to be_denied_for :visitor }
|
|
end
|
|
end
|