OpenProject is the leading open source project management software.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
openproject/spec/models/users/allowed_scope_spec.rb

397 lines
11 KiB

#-- copyright
# OpenProject is an open source project management software.
# Copyright (C) 2012-2021 the OpenProject GmbH
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License version 3.
#
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
# Copyright (C) 2006-2013 Jean-Philippe Lang
# Copyright (C) 2010-2013 the ChiliProject Team
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
#
# See docs/COPYRIGHT.rdoc for more details.
#++
require 'spec_helper'
describe User, 'allowed scope' do
let(:user) { member.principal }
let(:anonymous) { FactoryBot.build(:anonymous) }
let(:project) { FactoryBot.build(:project, public: false) }
let(:project2) { FactoryBot.build(:project, public: false) }
let(:role) { FactoryBot.build(:role) }
let(:role2) { FactoryBot.build(:role) }
let(:anonymous_role) { FactoryBot.build(:anonymous_role) }
let(:member) do
FactoryBot.build(:member, project: project,
roles: [role])
end
let(:action) { :view_work_packages }
let(:other_action) { :another }
let(:public_action) { :view_project }
before do
user.save!
anonymous.save!
Role.anonymous
Role.non_member
end
context 'w/ the context being a project
w/o the project being public
w/ the user being member in the project
w/ the role having the necessary permission' do
before do
role.add_permission! action
member.save!
end
it 'should return the user' do
expect(User.allowed(action, project).where(id: user.id)).to match_array [user]
end
end
context 'w/ the context being a project
w/o the project being public
w/o the user being member in the project
w/ the user being admin' do
before do
user.update_attribute(:admin, true)
end
it 'should return the user' do
expect(User.allowed(action, project).where(id: user.id)).to match_array [user]
end
end
context 'w/ the context being a project
w/o the project being public
w/ the user being member in the project
w/o the role having the necessary permission' do
before do
role.save!
member.save!
end
it 'should be empty' do
expect(User.allowed(action, project).where(id: user.id)).to be_empty
end
end
context 'w/ the context being a project
w/o the project being public
w/o the user being member in the project
w/ the role having the necessary permission' do
before do
role.add_permission! action
end
it 'should return the user' do
expect(User.allowed(action, project).where(id: user.id)).to be_empty
end
end
context 'w/ the context being a project
w/o the project being public
w/o the user being member in the project
w/ the user being member in a different project
w/ the role having the permission' do
before do
role.add_permission! action
member.project = project2
member.save!
end
it 'should be empty' do
expect(User.allowed(action, project).where(id: user.id)).to be_empty
end
end
context 'w/ the context being a project
w/ the project being public
w/o the user being member in the project
w/ the user being member in a different project
w/ the role having the permission' do
before do
role.add_permission! action
project.update(public: true)
member.project = project2
member.save!
end
it 'should be empty' do
expect(User.allowed(action, project).where(id: user.id)).to be_empty
end
end
context 'w/ the context being a project
w/ the project being public
w/o the user being member in the project
w/ the non member role having the necessary permission' do
before do
project.public = true
non_member = Role.non_member
non_member.add_permission! action
project.save!
end
it 'should return the user' do
expect(User.allowed(action, project).where(id: user.id)).to match_array [user]
end
end
context 'w/ the context being a project
w/ the project being public
w/o the user being member in the project
w/ the anonymous role having the necessary permission' do
before do
project.public = true
anonymous_role = Role.anonymous
anonymous_role.add_permission! action
project.save!
end
it 'should return the anonymous user' do
expect(User.allowed(action, project).where(id: [user.id, anonymous.id])).to match_array([anonymous])
end
end
context 'w/ the context being a project
w/ the project being public
w/o the user being member in the project
w/ the non member role having another permission' do
before do
project.public = true
non_member = Role.non_member
non_member.add_permission! other_action
project.save!
end
it 'should be empty' do
expect(User.allowed(action, project).where(id: user.id)).to be_empty
end
end
context 'w/ the context being a project
w/ the project being private
w/o the user being member in the project
w/ the non member role having the permission' do
before do
non_member = Role.non_member
non_member.add_permission! action
project.save!
end
it 'should be empty' do
expect(User.allowed(action, project).where(id: user.id)).to be_empty
end
end
context 'w/ the context being a project
w/ the project being public
w/ the user being member in the project
w/o the role having the necessary permission
w/ the non member role having the permission' do
before do
project.public = true
project.save
role.add_permission! other_action
member.save!
non_member = Role.non_member
non_member.add_permission! action
end
it 'should be empty' do
expect(User.allowed(action, project).where(id: user.id)).to be_empty
end
end
context 'w/ the context being a project
w/o the project being public
w/ the user being member in the project
w/o the role having the permission
w/ the permission being public' do
before do
member.save!
end
it 'should return the user' do
expect(User.allowed(public_action, project).where(id: user.id)).to match_array [user]
end
end
context 'w/ the context being a project
w/ the project being public
w/o the user being member in the project
w/o the role having the permission
w/ the permission being public' do
before do
project.public = true
project.save
end
it 'should return the user and anonymous' do
expect(User.allowed(public_action, project).where(id: [user.id, anonymous.id])).to match_array [user, anonymous]
end
end
context 'w/ the context being a project
w/ the user being member in the project
w/ asking for a certain permission
w/ the permission belonging to a module
w/o the module being active' do
let(:permission) do
OpenProject::AccessControl.permissions.find { |p| p.project_module.present? }
end
before do
project.enabled_module_names = []
role.add_permission! permission.name
member.save!
end
it 'should be empty' do
expect(User.allowed(permission.name, project).where(id: user.id)).to eq []
end
end
context 'w/ the context being a project
w/ the user being member in the project
w/ asking for a certain permission
w/ the permission belonging to a module
w/ the module being active' do
let(:permission) do
OpenProject::AccessControl.permissions.find { |p| p.project_module.present? }
end
before do
project.enabled_module_names = [permission.project_module]
role.add_permission! permission.name
member.save!
end
it 'should return the user' do
expect(User.allowed(permission.name, project).where(id: user.id)).to eq [user]
end
end
context 'w/ the context being a project
w/ the user being member in the project
w/ asking for a certain permission
w/ the user having the permission in the project
w/o the project being active' do
before do
role.add_permission! action
member.save!
project.update(active: false)
end
it 'should be empty' do
expect(User.allowed(action, project)).to eq []
end
end
context 'w/ only asking for members
w/o the project being public
w/o the user being member in the project
w/ the user being admin' do
before do
user.update_attribute(:admin, true)
end
it 'should return the user' do
expect(User.allowed_members(action, project).where(id: user.id)).to be_empty
end
end
context 'w/ only asking for members
w/o the project being public
w/ the user being member in the project
w/ the role having the necessary permission' do
before do
role.add_permission! action
member.save!
end
it 'should return the user' do
expect(User.allowed_members(action, project).where(id: user.id)).to match_array [user]
end
end
context 'w/ only asking for members
w/o the project being public
w/o the user being member in the project
w/ the user being admin' do
before do
user.update_attribute(:admin, true)
end
it 'should return the user' do
expect(User.allowed_members(action, project).where(id: user.id)).to be_empty
end
end
context 'w/ only asking for members
w/ the project being public
w/ the user being member in the project
w/ the role having the necessary permission' do
before do
project.update_attribute(:public, true)
role.add_permission! action
member.save!
end
it 'should return the user' do
expect(User.allowed_members(action, project).where(id: user.id)).to match_array [user]
end
end
context 'w/ only asking for members
w/ the project being public
w/o the user being member in the project
w/ the role having the necessary permission' do
before do
project.update_attribute(:public, true)
role.add_permission! action
end
it 'should return the user' do
expect(User.allowed_members(action, project).where(id: user.id)).to be_empty
end
end
end