119 lines
3.4 KiB
Ruby
119 lines
3.4 KiB
Ruby
require 'spec_helper'
|
|
|
|
describe IssuePolicy, models: true do
|
|
let(:user) { create(:user) }
|
|
|
|
describe '#rules' do
|
|
context 'using a regular issue' do
|
|
let(:project) { create(:project, :public) }
|
|
let(:issue) { create(:issue, project: project) }
|
|
let(:policies) { described_class.abilities(user, issue).to_set }
|
|
|
|
context 'with a regular user' do
|
|
it 'includes the read_issue permission' do
|
|
expect(policies).to include(:read_issue)
|
|
end
|
|
|
|
it 'does not include the admin_issue permission' do
|
|
expect(policies).not_to include(:admin_issue)
|
|
end
|
|
|
|
it 'does not include the update_issue permission' do
|
|
expect(policies).not_to include(:update_issue)
|
|
end
|
|
end
|
|
|
|
context 'with a user that is a project reporter' do
|
|
before do
|
|
project.team << [user, :reporter]
|
|
end
|
|
|
|
it 'includes the read_issue permission' do
|
|
expect(policies).to include(:read_issue)
|
|
end
|
|
|
|
it 'includes the admin_issue permission' do
|
|
expect(policies).to include(:admin_issue)
|
|
end
|
|
|
|
it 'includes the update_issue permission' do
|
|
expect(policies).to include(:update_issue)
|
|
end
|
|
end
|
|
|
|
context 'with a user that is a project guest' do
|
|
before do
|
|
project.team << [user, :guest]
|
|
end
|
|
|
|
it 'includes the read_issue permission' do
|
|
expect(policies).to include(:read_issue)
|
|
end
|
|
|
|
it 'does not include the admin_issue permission' do
|
|
expect(policies).not_to include(:admin_issue)
|
|
end
|
|
|
|
it 'does not include the update_issue permission' do
|
|
expect(policies).not_to include(:update_issue)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'using a confidential issue' do
|
|
let(:issue) { create(:issue, :confidential) }
|
|
|
|
context 'with a regular user' do
|
|
let(:policies) { described_class.abilities(user, issue).to_set }
|
|
|
|
it 'does not include the read_issue permission' do
|
|
expect(policies).not_to include(:read_issue)
|
|
end
|
|
|
|
it 'does not include the admin_issue permission' do
|
|
expect(policies).not_to include(:admin_issue)
|
|
end
|
|
|
|
it 'does not include the update_issue permission' do
|
|
expect(policies).not_to include(:update_issue)
|
|
end
|
|
end
|
|
|
|
context 'with a user that is a project member' do
|
|
let(:policies) { described_class.abilities(user, issue).to_set }
|
|
|
|
before do
|
|
issue.project.team << [user, :reporter]
|
|
end
|
|
|
|
it 'includes the read_issue permission' do
|
|
expect(policies).to include(:read_issue)
|
|
end
|
|
|
|
it 'includes the admin_issue permission' do
|
|
expect(policies).to include(:admin_issue)
|
|
end
|
|
|
|
it 'includes the update_issue permission' do
|
|
expect(policies).to include(:update_issue)
|
|
end
|
|
end
|
|
|
|
context 'without a user' do
|
|
let(:policies) { described_class.abilities(nil, issue).to_set }
|
|
|
|
it 'does not include the read_issue permission' do
|
|
expect(policies).not_to include(:read_issue)
|
|
end
|
|
|
|
it 'does not include the admin_issue permission' do
|
|
expect(policies).not_to include(:admin_issue)
|
|
end
|
|
|
|
it 'does not include the update_issue permission' do
|
|
expect(policies).not_to include(:update_issue)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|