1
0
Fork 1
forked from fedi/mastodon
mastodon/spec/policies/invite_policy_spec.rb

77 lines
1.6 KiB
Ruby
Raw Normal View History

2018-12-20 03:23:09 +00:00
# frozen_string_literal: true
require 'rails_helper'
require 'pundit/rspec'
RSpec.describe InvitePolicy do
let(:subject) { described_class }
let(:admin) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
let(:john) { Fabricate(:user).account }
2018-12-20 03:23:09 +00:00
permissions :index? do
context 'staff?' do
it 'permits' do
expect(subject).to permit(admin, Invite)
end
end
end
permissions :create? do
context 'has privilege' do
before do
UserRole.everyone.update(permissions: UserRole::FLAGS[:invite_users])
end
2018-12-20 03:23:09 +00:00
it 'permits' do
expect(subject).to permit(john, Invite)
end
end
context 'does not have privilege' do
before do
UserRole.everyone.update(permissions: UserRole::Flags::NONE)
end
2018-12-20 03:23:09 +00:00
it 'denies' do
expect(subject).to_not permit(john, Invite)
end
end
end
permissions :deactivate_all? do
context 'admin?' do
it 'permits' do
expect(subject).to permit(admin, Invite)
end
end
context 'not admin?' do
it 'denies' do
expect(subject).to_not permit(john, Invite)
end
end
end
permissions :destroy? do
context 'owner?' do
it 'permits' do
expect(subject).to permit(john, Fabricate(:invite, user: john.user))
end
end
context 'not owner?' do
context 'admin?' do
it 'permits' do
expect(subject).to permit(admin, Fabricate(:invite))
2018-12-20 03:23:09 +00:00
end
end
context 'not admin?' do
it 'denies' do
expect(subject).to_not permit(john, Fabricate(:invite))
2018-12-20 03:23:09 +00:00
end
end
end
end
end