#-- copyright # OpenProject is a project management system. # Copyright (C) 2012-2017 the OpenProject Foundation (OPF) # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License version 3. # # OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows: # Copyright (C) 2006-2017 Jean-Philippe Lang # Copyright (C) 2010-2013 the ChiliProject Team # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. # # See doc/COPYRIGHT.rdoc for more details. #++ require 'spec_helper' describe User, 'allowed_to?' do let(:user) { FactoryGirl.build(:user) } let(:anonymous) { FactoryGirl.build(:anonymous) } let(:project) { FactoryGirl.build(:project, is_public: false) } let(:project2) { FactoryGirl.build(:project, is_public: false) } let(:role) { FactoryGirl.build(:role) } let(:role2) { FactoryGirl.build(:role) } let(:anonymous_role) { FactoryGirl.build(:anonymous_role) } let(:member) { FactoryGirl.build(:member, project: project, roles: [role], principal: user) } let(:member2) { FactoryGirl.build(:member, project: project2, roles: [role2], principal: user) } before do anonymous_role.save! Role.non_member user.save! end shared_examples_for 'w/ inquiring for project' do let(:permission) { :add_work_packages } let(:final_setup_step) {} context 'w/ the user being admin' do before do user.update_attribute(:admin, true) project.save final_setup_step end it 'should be true' do expect(user.allowed_to?(permission, project)).to be_truthy end end context 'w/ the user being admin w/ the project being archived' do before do user.update_attribute(:admin, true) project.update_attribute(:status, Project::STATUS_ARCHIVED) final_setup_step end it 'should be false' do expect(user.allowed_to?(permission, project)).to be_falsey end end context 'w/ the user being admin w/ the project module the permission belongs to being inactive' do before do user.update_attribute(:admin, true) project.enabled_module_names = [] final_setup_step end it 'should be false' do expect(user.allowed_to?(permission, project)).to be_falsey end end context 'w/ the user being a member in the project w/o the role having the necessary permission' do before do member.save! final_setup_step end it 'should be false' do expect(user.allowed_to?(permission, project)).to be_falsey end end context 'w/ the user being a member in the project w/ the role having the necessary permission' do before do role.add_permission! permission member.save! final_setup_step end it 'should be true' do expect(user.allowed_to?(permission, project)).to be_truthy end end context 'w/ the user being a member in the project w/ the role having the necessary permission w/o the module being active' do let(:permission) { :view_news } before do role.add_permission! permission project.enabled_module_names = [] member.save! final_setup_step end it 'should be false' do expect(user.allowed_to?(permission, project)).to be_falsey end end context 'w/ the user being a member in the project w/ the role having the necessary permission w/ asking for a controller/action hash w/o the module being active' do let(:permission) { { controller: 'news', action: 'show' } } before do role.add_permission! permission project.enabled_module_names = [] member.save! final_setup_step end it 'should be false' do expect(user.allowed_to?(permission, project)).to be_falsey end end context 'w/ the user being a member in the project w/o the role having the necessary permission w/ non members having the necessary permission' do before do project.is_public = false non_member = Role.non_member non_member.add_permission! permission member.save! final_setup_step end it 'should be false' do expect(user.allowed_to?(permission, project)).to be_falsey end end context 'w/ the user being a member in the project w/o the role having the necessary permission w/ inquiring for a permission that is public' do let(:permission) { :view_project } before do project.is_public = false member.save! final_setup_step end it 'should be true' do expect(user.allowed_to?(permission, project)).to be_truthy end end context 'w/o the user being member in the project w/ non member being allowed the action w/ the project being private' do before do project.is_public = false project.save! non_member = Role.non_member non_member.add_permission! permission final_setup_step end it 'should be false' do expect(user.allowed_to?(permission, project)).to be_falsey end end context 'w/o the user being member in the project w/ the project being public w/ non members being allowed the action' do before do project.is_public = true project.save! non_member = Role.non_member non_member.add_permission! permission final_setup_step end it 'should be true' do expect(user.allowed_to?(permission, project)).to be_truthy end end context 'w/ the user being member in the project w/ the project being public w/ non members being allowed the action w/o the role being allowed the action' do before do project.is_public = true project.save! non_member = Role.non_member non_member.add_permission! permission member.save! final_setup_step end it 'should be false' do expect(user.allowed_to?(permission, project)).to be_falsey end end context 'w/ the user being anonymous w/ the project being public w/ anonymous being allowed the action' do before do project.is_public = true project.save! anonymous_role.add_permission! permission final_setup_step end it 'should be true' do expect(anonymous.allowed_to?(permission, project)).to be_truthy end end context 'w/ the user being anonymous w/ the project being public w/ querying for a public permission' do let(:permission) { :view_project } before do project.is_public = true project.save! anonymous_role.save! final_setup_step end it 'should be true' do expect(anonymous.allowed_to?(permission, project)).to be_truthy end end context 'w/ the user being anonymous w/ requesting a controller and action allowed by multiple permissions w/ the project being public w/ anonymous being allowed the action' do let(:permission) { { controller: 'projects', action: 'settings' } } before do project.is_public = true project.save! anonymous_role.add_permission! :manage_categories final_setup_step end it 'should be true' do expect(anonymous.allowed_to?(permission, project)) .to be_truthy end end context 'w/ the user being anonymous w/ the project being public w/ anonymous being not allowed the action' do before do project.is_public = true project.save! final_setup_step end it 'should be false' do expect(anonymous.allowed_to?(permission, project)).to be_falsey end end context 'w/ the user being a member in two projects w/ the user being allowed the action in both projects' do before do role.add_permission! permission role2.add_permission! permission member.save! member2.save! final_setup_step end it 'should be true' do expect(user.allowed_to?(permission, [project, project2])).to be_truthy end end context 'w/ the user being a member in two projects w/ the user being allowed in only one project' do before do role.add_permission! permission member.save! member2.save! final_setup_step end it 'should be false' do expect(user.allowed_to?(permission, [project, project2])).to be_falsey end end context 'w/o the user being a member in the two projects w/ both projects being public w/ non member being allowed the action' do before do non_member = Role.non_member non_member.add_permission! permission project.update_attribute(:is_public, true) project2.update_attribute(:is_public, true) final_setup_step end it 'should be true' do expect(user.allowed_to?(permission, [project, project2])).to be_truthy end end context 'w/o the user being a member in the two projects w/ only one project being public w/ non member being allowed the action' do before do non_member = Role.non_member non_member.add_permission! permission project.update_attribute(:is_public, true) project2.update_attribute(:is_public, false) final_setup_step end it 'should be false' do expect(user.allowed_to?(permission, [project, project2])).to be_falsey end end context 'w/ requesting a controller and action w/ the user being allowed the action' do before do role.add_permission! permission member.save! final_setup_step end it 'should be true' do expect(user.allowed_to?({ controller: 'work_packages', action: 'new' }, project)) .to be_truthy end end context 'w/ requesting a controller and action allowed by multiple permissions w/ the user being allowed the action' do let(:permission) { :manage_categories } before do role.add_permission! permission member.save! final_setup_step end it 'should be true' do expect(user.allowed_to?({ controller: 'projects', action: 'settings' }, project)) .to be_truthy end end end shared_examples_for 'w/ inquiring globally' do let(:permission) { :add_work_packages } let(:final_setup_step) {} context 'w/ the user being admin' do before do user.admin = true user.save! final_setup_step end it 'should be true' do expect(user.allowed_to?(permission, nil, global: true)).to be_truthy end end context 'w/ the user being a member in a project w/o the role having the necessary permission' do before do member.save! final_setup_step end it 'should be false' do expect(user.allowed_to?(permission, nil, global: true)).to be_falsey end end context 'w/ the user being a member in the project w/ the role having the necessary permission' do before do role.add_permission! permission member.save! final_setup_step end it 'should be true' do expect(user.allowed_to?(permission, nil, global: true)).to be_truthy end end context 'w/ the user being a member in the project w/ inquiring for controller and action w/ the role having the necessary permission' do before do role.add_permission! permission member.save! final_setup_step end it 'should be true' do expect(user.allowed_to?({ controller: 'work_packages', action: 'new' }, nil, global: true)) .to be_truthy end end context 'w/ the user being a member in the project w/o the role having the necessary permission w/ non members having the necessary permission' do before do non_member = Role.non_member non_member.add_permission! permission member.save! final_setup_step end it 'should be true' do expect(user.allowed_to?(permission, nil, global: true)).to be_truthy end end context 'w/o the user being a member in the project w/ non members being allowed the action' do before do non_member = Role.non_member non_member.add_permission! permission final_setup_step end it 'should be true' do expect(user.allowed_to?(permission, nil, global: true)).to be_truthy end end context 'w/ the user being anonymous w/ anonymous being allowed the action' do before do anonymous_role.add_permission! permission final_setup_step end it 'should be true' do expect(anonymous.allowed_to?(permission, nil, global: true)).to be_truthy end end context 'w/ requesting a controller and action allowed by multiple permissions w/ the user being a member in the project w/o the role having the necessary permission w/ non members having the necessary permission' do let(:permission) { :manage_categories } before do non_member = Role.non_member non_member.add_permission! permission member.save! final_setup_step end it 'should be true' do expect(user.allowed_to?({ controller: 'projects', action: 'settings' }, nil, global: true)) .to be_truthy end end context 'w/ the user being anonymous w/ anonymous being not allowed the action' do before do final_setup_step end it 'should be false' do expect(anonymous.allowed_to?(permission, nil, global: true)).to be_falsey end end end context 'w/o preloaded permissions' do it_behaves_like 'w/ inquiring for project' it_behaves_like 'w/ inquiring globally' end context 'w/ preloaded permissions' do it_behaves_like 'w/ inquiring for project' do let(:final_setup_step) { user.preload_projects_allowed_to(permission) } end end end