kanbanworkflowstimelinescrumrubyroadmapproject-planningproject-managementopenprojectangularissue-trackerifcgantt-chartganttbug-trackerboardsbcf
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
291 lines
8.8 KiB
291 lines
8.8 KiB
#-- copyright
|
|
# OpenProject is an open source project management software.
|
|
# Copyright (C) 2012-2022 the OpenProject GmbH
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License version 3.
|
|
#
|
|
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
|
|
# Copyright (C) 2006-2013 Jean-Philippe Lang
|
|
# Copyright (C) 2010-2013 the ChiliProject Team
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
#
|
|
# See COPYRIGHT and LICENSE files for more details.
|
|
#++
|
|
|
|
require 'spec_helper'
|
|
|
|
describe OpenProject::AccessControl do
|
|
def stash_access_control_permissions
|
|
@stashed_permissions = OpenProject::AccessControl.permissions.dup
|
|
OpenProject::AccessControl.clear_caches
|
|
OpenProject::AccessControl.instance_variable_get(:@permissions).clear
|
|
end
|
|
|
|
def restore_access_control_permissions
|
|
OpenProject::AccessControl.instance_variable_set(:@permissions, @stashed_permissions)
|
|
OpenProject::AccessControl.clear_caches
|
|
end
|
|
|
|
def setup_global_permissions
|
|
OpenProject::AccessControl.map do |map|
|
|
map.permission :proj0, { dont: :care }, require: :member, contract_actions: { foo: :create }
|
|
map.permission :global0, { dont: :care }, global: true
|
|
map.permission :proj1, { dont: :care }
|
|
|
|
map.project_module :global_module do |mod|
|
|
mod.permission :global1, { dont: :care }, global: true
|
|
end
|
|
|
|
map.project_module :project_module do |mod|
|
|
mod.permission :proj2, { dont: :care }, contract_actions: { bar: %i[create read] }
|
|
end
|
|
|
|
map.project_module :mixed_module do |mod|
|
|
mod.permission :proj3, { dont: :care }, grant_to_admin: true
|
|
mod.permission :global2, { dont: :care }, global: true, contract_actions: { baz: %i[destroy] }
|
|
end
|
|
|
|
map.project_module :dependent_module, dependencies: :project_module do |mod|
|
|
mod.permission :proj4, { dont: :care }, grant_to_admin: false
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '.remove_modules_permissions' do
|
|
let!(:all_former_permissions) { OpenProject::AccessControl.permissions }
|
|
let!(:former_repository_permissions) do
|
|
module_permissions = OpenProject::AccessControl.modules_permissions(['repository'])
|
|
|
|
module_permissions.select do |permission|
|
|
permission.project_module == :repository
|
|
end
|
|
end
|
|
|
|
subject { OpenProject::AccessControl }
|
|
|
|
before do
|
|
OpenProject::AccessControl.remove_modules_permissions(:repository)
|
|
end
|
|
|
|
after do
|
|
raise 'Test outdated' unless OpenProject::AccessControl.instance_variable_defined?(:@permissions)
|
|
|
|
OpenProject::AccessControl.instance_variable_set(:@permissions, all_former_permissions)
|
|
OpenProject::AccessControl.clear_caches
|
|
end
|
|
|
|
it 'removes from global permissions' do
|
|
expect(subject.permissions).not_to include(former_repository_permissions)
|
|
end
|
|
|
|
it 'removes from public permissions' do
|
|
expect(subject.public_permissions).not_to include(former_repository_permissions)
|
|
end
|
|
|
|
it 'removes from members only permissions' do
|
|
expect(subject.members_only_permissions).not_to include(former_repository_permissions)
|
|
end
|
|
|
|
it 'removes from loggedin only permissions' do
|
|
expect(subject.loggedin_only_permissions).not_to include(former_repository_permissions)
|
|
end
|
|
|
|
it 'should disable repository module' do
|
|
expect(subject.available_project_modules).not_to include(:repository)
|
|
end
|
|
end
|
|
|
|
describe '#permissions' do
|
|
it 'is an array of permissions' do
|
|
expect(described_class.permissions)
|
|
.to(be_all{ |p| p.is_a?(OpenProject::AccessControl::Permission) })
|
|
end
|
|
end
|
|
|
|
describe '#permission' do
|
|
context 'for a project module permission' do
|
|
subject { described_class.permission(:view_work_packages) }
|
|
|
|
it 'is a permission' do
|
|
is_expected
|
|
.to be_a(OpenProject::AccessControl::Permission)
|
|
end
|
|
|
|
it 'is the permission with the queried for name' do
|
|
expect(subject.name)
|
|
.to eql(:view_work_packages)
|
|
end
|
|
|
|
it 'belongs to a project module' do
|
|
expect(subject.project_module)
|
|
.to eql(:work_package_tracking)
|
|
end
|
|
end
|
|
|
|
context 'for a non module permission' do
|
|
subject { described_class.permission(:edit_project) }
|
|
|
|
it 'is a permission' do
|
|
is_expected
|
|
.to be_a(OpenProject::AccessControl::Permission)
|
|
end
|
|
|
|
it 'is the permission with the queried for name' do
|
|
expect(subject.name)
|
|
.to eql(:edit_project)
|
|
end
|
|
|
|
it 'belongs to a project module' do
|
|
expect(subject.project_module)
|
|
.to be_nil
|
|
end
|
|
|
|
it 'includes actions' do
|
|
expect(subject.controller_actions)
|
|
.to include('projects/settings/general/show')
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '#dependencies' do
|
|
context 'for a permission with a prerequisite' do
|
|
subject { described_class.permission(:edit_work_packages) }
|
|
|
|
it 'denotes the prerequiresites' do
|
|
expect(subject.dependencies)
|
|
.to match_array([:view_work_packages])
|
|
end
|
|
end
|
|
|
|
context 'for a permission without a prerequisite' do
|
|
subject { described_class.permission(:view_work_packages) }
|
|
|
|
it 'denotes the prerequiresites' do
|
|
expect(subject.dependencies)
|
|
.to be_empty
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '.modules' do
|
|
before do
|
|
stash_access_control_permissions
|
|
|
|
setup_global_permissions
|
|
end
|
|
|
|
after do
|
|
restore_access_control_permissions
|
|
end
|
|
|
|
it 'can store dependencies' do
|
|
expect(OpenProject::AccessControl.modules.detect { |m| m[:name] == :dependent_module }[:dependencies])
|
|
.to match_array(%i[project_module])
|
|
end
|
|
end
|
|
|
|
describe '#global_permissions' do
|
|
before do
|
|
stash_access_control_permissions
|
|
|
|
setup_global_permissions
|
|
end
|
|
|
|
after do
|
|
restore_access_control_permissions
|
|
end
|
|
|
|
it { expect(OpenProject::AccessControl.global_permissions.size).to eq(3) }
|
|
it { expect(OpenProject::AccessControl.global_permissions.collect(&:name)).to include(:global0) }
|
|
it { expect(OpenProject::AccessControl.global_permissions.collect(&:name)).to include(:global1) }
|
|
it { expect(OpenProject::AccessControl.global_permissions.collect(&:name)).to include(:global2) }
|
|
end
|
|
|
|
describe '.available_project_modules' do
|
|
before do
|
|
stash_access_control_permissions
|
|
|
|
setup_global_permissions
|
|
end
|
|
|
|
after do
|
|
restore_access_control_permissions
|
|
end
|
|
|
|
it { expect(OpenProject::AccessControl.available_project_modules).not_to include(:global_module) }
|
|
it { expect(OpenProject::AccessControl.available_project_modules).to include(:mixed_module) }
|
|
end
|
|
|
|
describe '#contract_actions_map' do
|
|
before do
|
|
stash_access_control_permissions
|
|
|
|
setup_global_permissions
|
|
end
|
|
|
|
after do
|
|
restore_access_control_permissions
|
|
end
|
|
|
|
it 'contains all contract actions grouped by the permission' do
|
|
expect(subject.contract_actions_map)
|
|
.to eql(global2: { actions: { baz: [:destroy] }, global: true, module_name: :mixed_module, grant_to_admin: true },
|
|
proj0: { actions: { foo: :create }, global: false, module_name: nil, grant_to_admin: true },
|
|
proj2: { actions: { bar: %i[create read] }, global: false, module_name: :project_module, grant_to_admin: true })
|
|
end
|
|
end
|
|
|
|
describe '.grant_to_admin?' do
|
|
before do
|
|
stash_access_control_permissions
|
|
|
|
setup_global_permissions
|
|
end
|
|
|
|
after do
|
|
restore_access_control_permissions
|
|
end
|
|
|
|
context 'for a granted permission (default)' do
|
|
it 'is granted' do
|
|
expect(described_class)
|
|
.to be_grant_to_admin(:proj0)
|
|
end
|
|
end
|
|
|
|
context 'for a non granted permission' do
|
|
it 'is granted' do
|
|
expect(described_class)
|
|
.not_to be_grant_to_admin(:proj4)
|
|
end
|
|
end
|
|
|
|
context 'for an explicitly granted permission' do
|
|
it 'is granted' do
|
|
expect(described_class)
|
|
.to be_grant_to_admin(:proj3)
|
|
end
|
|
end
|
|
|
|
context 'for a non existing permission' do
|
|
it 'is granted' do
|
|
expect(described_class)
|
|
.to be_grant_to_admin(:not_existing)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|