# frozen_string_literal: true require 'rails_helper' RSpec.describe UserPolicy do subject { described_class } let(:admin) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account } let(:john) { Fabricate(:account) } permissions :reset_password?, :change_email? do context 'when staff?' do context 'with !record.staff?' do it 'permits' do expect(subject).to permit(admin, john.user) end end context 'when record.staff?' do it 'denies' do expect(subject).to_not permit(admin, admin.user) end end end context 'with !staff?' do it 'denies' do expect(subject).to_not permit(john, User) end end end permissions :disable_2fa? do context 'when admin?' do context 'with !record.staff?' do it 'permits' do expect(subject).to permit(admin, john.user) end end context 'when record.staff?' do it 'denies' do expect(subject).to_not permit(admin, admin.user) end end end context 'with !admin?' do it 'denies' do expect(subject).to_not permit(john, User) end end end permissions :confirm? do context 'when staff?' do context 'with !record.confirmed?' do it 'permits' do john.user.update(confirmed_at: nil) expect(subject).to permit(admin, john.user) end end context 'when record.confirmed?' do it 'denies' do john.user.mark_email_as_confirmed! expect(subject).to_not permit(admin, john.user) end end end context 'with !staff?' do it 'denies' do expect(subject).to_not permit(john, User) end end end permissions :enable? do context 'when staff?' do it 'permits' do expect(subject).to permit(admin, User) end end context 'with !staff?' do it 'denies' do expect(subject).to_not permit(john, User) end end end permissions :disable? do context 'when staff?' do context 'with !record.admin?' do it 'permits' do expect(subject).to permit(admin, john.user) end end context 'when record.admin?' do it 'denies' do expect(subject).to_not permit(admin, admin.user) end end end context 'with !staff?' do it 'denies' do expect(subject).to_not permit(john, User) end end end permissions :approve?, :reject? do context 'when admin' do context 'when user is approved' do it { is_expected.to_not permit(admin, User.new(approved: true)) } end context 'when user is not approved' do it { is_expected.to permit(admin, User.new(approved: false)) } end end context 'when not admin' do it { is_expected.to_not permit(john, User.new) } end end permissions :change_role? do context 'when not admin' do it { is_expected.to_not permit(john, User.new) } end context 'when admin' do let(:user) { User.new(role: role) } context 'when role of admin overrides user role' do let(:role) { UserRole.new(position: admin.user.role.position - 10, id: 123) } it { is_expected.to permit(admin, user) } end context 'when role of admin does not override user role' do let(:role) { UserRole.new(position: admin.user.role.position + 10, id: 123) } it { is_expected.to_not permit(admin, user) } end end end end