kanbanworkflowstimelinescrumrubyroadmapproject-planningproject-managementopenprojectangularissue-trackerifcgantt-chartganttbug-trackerboardsbcf
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
145 lines
4.1 KiB
145 lines
4.1 KiB
#-- copyright
|
|
# OpenProject is a project management system.
|
|
#
|
|
# Copyright (C) 2010-2013 the OpenProject Foundation (OPF)
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License version 3.
|
|
#
|
|
# See doc/COPYRIGHT.rdoc for more details.
|
|
#++
|
|
|
|
require 'spec_helper'
|
|
|
|
describe User, 'allowed to' do
|
|
let(:user) { member.principal }
|
|
let(:anonymous) { FactoryBot.build(:anonymous) }
|
|
let(:project) { FactoryBot.build(:project, is_public: false) }
|
|
let(:project2) { FactoryBot.build(:project, is_public: false) }
|
|
let(:role) { FactoryBot.build(:role) }
|
|
let(:role2) { FactoryBot.build(:role) }
|
|
let(:anonymous_role) { FactoryBot.build(:anonymous_role) }
|
|
let(:member) { FactoryBot.build(:member, project: project,
|
|
roles: [role]) }
|
|
|
|
let(:action) { :the_one }
|
|
let(:other_action) { :another }
|
|
let(:public_action) { :view_project }
|
|
let(:global_permission) { OpenProject::AccessControl.permissions.find { |p| p.global? } }
|
|
let(:global_role) { FactoryBot.build(:global_role, :permissions => [global_permission.name]) }
|
|
let(:principal_role) { FactoryBot.build(:empty_principal_role, principal: user,
|
|
role: global_role) }
|
|
|
|
|
|
before do
|
|
user.save!
|
|
anonymous.save!
|
|
end
|
|
|
|
context "w/o the context being a project
|
|
w/o the user being member in a project
|
|
w/ the user having the global role
|
|
w/ the global role having the necessary permission" do
|
|
before do
|
|
global_role.save!
|
|
|
|
principal_role.save!
|
|
end
|
|
|
|
it 'is true' do
|
|
expect(user.allowed_to?(global_permission.name, nil, global: true)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context "w/o the context being a project
|
|
w/o the user being member in a project
|
|
w/ the user having the global role
|
|
w/o the global role having the necessary permission" do
|
|
|
|
before do
|
|
global_role.permissions = []
|
|
global_role.save!
|
|
|
|
principal_role.save!
|
|
end
|
|
|
|
it 'is false' do
|
|
expect(user.allowed_to?(global_permission.name, nil, global: true)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context "w/o the context being a project
|
|
w/o the user being member in a project
|
|
w/o the user having the global role
|
|
w/ the global role having the necessary permission" do
|
|
|
|
before do
|
|
global_role.permissions = []
|
|
global_role.save!
|
|
end
|
|
|
|
it 'is false' do
|
|
expect(user.allowed_to?(global_permission.name, nil, global: true)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context "w/o the context being a project
|
|
w/o the user being member in a project
|
|
w/o the user having the global role
|
|
w/ the user being admin" do
|
|
|
|
before do
|
|
user.update_attribute(:admin, true)
|
|
end
|
|
|
|
it 'is true' do
|
|
expect(user.allowed_to?(global_permission.name, nil, global: true)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context "w/ the context being a project
|
|
w/o the user being member in the project
|
|
w/ the user having the global role
|
|
w/o the global role having the necessary permission" do
|
|
before do
|
|
global_role.permissions = []
|
|
global_role.save!
|
|
|
|
principal_role.save!
|
|
end
|
|
|
|
it 'is false' do
|
|
expect(user.allowed_to?(global_permission.name, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context "w/ the context being a project
|
|
w/o the user being member in a project
|
|
w/o the user having the global role
|
|
w/ the global role having the necessary permission" do
|
|
|
|
before do
|
|
global_role.permissions = []
|
|
global_role.save!
|
|
end
|
|
|
|
it 'is false' do
|
|
expect(user.allowed_to?(global_permission.name, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context "w/ the context being a project
|
|
w/o the user being member in a project
|
|
w/o the user having the global role
|
|
w/ the user being admin" do
|
|
|
|
before do
|
|
user.update_attribute(:admin, true)
|
|
end
|
|
|
|
it 'is true' do
|
|
expect(user.allowed_to?(global_permission.name, project)).to be_truthy
|
|
end
|
|
end
|
|
end
|
|
|
|
|