OpenProject is the leading open source project management software.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
openproject/spec/support/shared/permissions.rb

145 lines
4.5 KiB

#-- copyright
# OpenProject is a project management system.
# Copyright (C) 2012-2014 the OpenProject Foundation (OPF)
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License version 3.
#
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
# Copyright (C) 2006-2013 Jean-Philippe Lang
# Copyright (C) 2010-2013 the ChiliProject Team
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
#
# See doc/COPYRIGHT.rdoc for more details.
#++
module PermissionSpecHelpers
def spec_permissions(test_denied = true)
describe 'w/ valid auth' do
before { allow(User).to receive(:current).and_return valid_user }
it 'grants access' do
fetch
if respond_to? :expect_redirect_to
expect(response).to be_redirect
case expect_redirect_to
when true
expect(response.redirect_url).not_to match(%r'/login')
when Regexp
expect(response.redirect_url).to match(expect_redirect_to)
else
expect(response).to redirect_to(expect_redirect_to)
end
elsif respond_to? :expect_no_content
expect(response.response_code).to eq(204)
else
expect(response.response_code).to eq(200)
end
end
end
describe 'w/o valid auth' do
before { allow(User).to receive(:current).and_return invalid_user }
it 'denies access' do
fetch
if invalid_user.logged?
expect(response.response_code).to eq(403)
else
if controller.send(:api_request?)
expect(response.response_code).to eq(401)
else
expect(response).to be_redirect
expect(response.redirect_url).to match(%r'/login')
end
end
end
end if test_denied
end
end
shared_examples_for "a controller action with unrestricted access" do
let(:valid_user) { FactoryGirl.create(:anonymous) }
extend PermissionSpecHelpers
spec_permissions(false)
end
shared_examples_for "a controller action with require_login" do
let(:valid_user) { FactoryGirl.create(:user) }
let(:invalid_user) { FactoryGirl.create(:anonymous) }
extend PermissionSpecHelpers
spec_permissions
end
shared_examples_for "a controller action with require_admin" do
let(:valid_user) { User.first(:conditions => {:admin => true}) || FactoryGirl.create(:admin) }
let(:invalid_user) { FactoryGirl.create(:user) }
extend PermissionSpecHelpers
spec_permissions
end
shared_examples_for "a controller action which needs project permissions" do
# Expecting the following environment
#
# let(:project) { FactoryGirl.create(:project) }
#
# def fetch
# get 'action', :project_id => project.identifier
# end
#
# Optionally also provide the following
#
# let(:permission) { :edit_project }
#
# def expect_redirect_to
# # Regexp - which should match the full redirect URL
# # true - action should redirect, but not to /login
# # other - passed to response.should redirect_to(other)
# true
# end
let(:valid_user) { FactoryGirl.create(:user) }
let(:invalid_user) { FactoryGirl.create(:user) }
def add_membership(user, permissions)
role = FactoryGirl.create(:role, :permissions => Array(permissions))
member = FactoryGirl.build(:member, :user => user, :project => project)
member.roles = [role]
member.save!
end
before do
if defined? permission
# special permission needed - make valid_user a member with proper role,
# invalid_user is member without special rights
add_membership(valid_user, permission)
add_membership(invalid_user, :view_project)
else
# no special permission needed - make valid_user a simple member,
# invalid_user is non-member
add_membership(valid_user, :view_project)
end
end
extend PermissionSpecHelpers
spec_permissions
end