kanbanworkflowstimelinescrumrubyroadmapproject-planningproject-managementopenprojectangularissue-trackerifcgantt-chartganttbug-trackerboardsbcf
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
325 lines
9.3 KiB
325 lines
9.3 KiB
#-- copyright
|
|
# OpenProject is a project management system.
|
|
# Copyright (C) 2012-2018 the OpenProject Foundation (OPF)
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License version 3.
|
|
#
|
|
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
|
|
# Copyright (C) 2006-2017 Jean-Philippe Lang
|
|
# Copyright (C) 2010-2013 the ChiliProject Team
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
#
|
|
# See docs/COPYRIGHT.rdoc for more details.
|
|
#++
|
|
|
|
require 'spec_helper'
|
|
|
|
describe Authorization::UserAllowedQuery do
|
|
describe '.query' do
|
|
let(:user) { member.principal }
|
|
let(:anonymous) { FactoryBot.build(:anonymous) }
|
|
let(:project) { FactoryBot.build(:project, public: false) }
|
|
let(:project2) { FactoryBot.build(:project, public: false) }
|
|
let(:role) { FactoryBot.build(:role) }
|
|
let(:role2) { FactoryBot.build(:role) }
|
|
let(:anonymous_role) { FactoryBot.build(:anonymous_role) }
|
|
let(:non_member_role) { FactoryBot.build(:non_member) }
|
|
let(:member) do
|
|
FactoryBot.build(:member, project: project,
|
|
roles: [role])
|
|
end
|
|
|
|
let(:action) { :view_work_packages }
|
|
let(:other_action) { :another }
|
|
let(:public_action) { :view_project }
|
|
|
|
before do
|
|
user.save!
|
|
anonymous.save!
|
|
anonymous_role.save!
|
|
non_member_role.save!
|
|
end
|
|
|
|
it 'is an AR relation' do
|
|
expect(described_class.query(action, project)).to be_a ActiveRecord::Relation
|
|
end
|
|
|
|
context 'w/o the project being public
|
|
w/ the user being member in the project
|
|
w/ the role having the necessary permission' do
|
|
before do
|
|
role.add_permission! action
|
|
role.save!
|
|
|
|
member.save!
|
|
end
|
|
|
|
it 'should return the user' do
|
|
expect(described_class.query(action, project)).to match_array [user]
|
|
end
|
|
end
|
|
|
|
context 'w/o the project being public
|
|
w/o the user being member in the project
|
|
w/ the user being admin' do
|
|
before do
|
|
user.update_attribute(:admin, true)
|
|
end
|
|
|
|
it 'should return the user' do
|
|
expect(described_class.query(action, project)).to match_array [user]
|
|
end
|
|
end
|
|
|
|
context 'w/o the project being public
|
|
w/ the user being member in the project
|
|
w/o the role having the necessary permission' do
|
|
before do
|
|
role.save!
|
|
member.save!
|
|
end
|
|
|
|
it 'should be empty' do
|
|
expect(described_class.query(action, project)).to be_empty
|
|
end
|
|
end
|
|
|
|
context 'w/o the project being public
|
|
w/o the user being member in the project
|
|
w/ the role having the necessary permission' do
|
|
before do
|
|
role.add_permission! action
|
|
role.save!
|
|
end
|
|
|
|
it 'should return the user' do
|
|
expect(described_class.query(action, project)).to be_empty
|
|
end
|
|
end
|
|
|
|
context 'w/o the project being public
|
|
w/o the user being member in the project
|
|
w/ the user being member in a different project
|
|
w/ the role having the permission' do
|
|
before do
|
|
role.add_permission! action
|
|
role.save!
|
|
|
|
member.project = project2
|
|
member.save!
|
|
end
|
|
|
|
it 'should be empty' do
|
|
expect(described_class.query(action, project)).to be_empty
|
|
end
|
|
end
|
|
|
|
context 'w/ the project being public
|
|
w/o the user being member in the project
|
|
w/ the user being member in a different project
|
|
w/ the role having the permission' do
|
|
before do
|
|
role.add_permission! action
|
|
role.save!
|
|
|
|
project.public = true
|
|
project.save!
|
|
|
|
member.project = project2
|
|
member.save!
|
|
end
|
|
|
|
it 'should be empty' do
|
|
expect(described_class.query(action, project)).to be_empty
|
|
end
|
|
end
|
|
|
|
context 'w/ the project being public
|
|
w/o the user being member in the project
|
|
w/ the non member role having the necessary permission' do
|
|
before do
|
|
project.public = true
|
|
|
|
non_member = Role.non_member
|
|
non_member.add_permission! action
|
|
non_member.save
|
|
|
|
project.save!
|
|
end
|
|
|
|
it 'should return the user' do
|
|
expect(described_class.query(action, project)).to match_array [user]
|
|
end
|
|
end
|
|
|
|
context 'w/ the project being public
|
|
w/o the user being member in the project
|
|
w/ the anonymous role having the necessary permission' do
|
|
before do
|
|
project.public = true
|
|
|
|
anonymous_role = Role.anonymous
|
|
anonymous_role.add_permission! action
|
|
anonymous_role.save
|
|
|
|
project.save!
|
|
end
|
|
|
|
it 'should return the anonymous user' do
|
|
expect(described_class.query(action, project)).to match_array([anonymous])
|
|
end
|
|
end
|
|
|
|
context 'w/ the project being public
|
|
w/o the user being member in the project
|
|
w/ the non member role having another permission' do
|
|
before do
|
|
project.public = true
|
|
|
|
non_member = Role.non_member
|
|
non_member.add_permission! other_action
|
|
non_member.save
|
|
|
|
project.save!
|
|
end
|
|
|
|
it 'should be empty' do
|
|
expect(described_class.query(action, project)).to be_empty
|
|
end
|
|
end
|
|
|
|
context 'w/ the project being private
|
|
w/o the user being member in the project
|
|
w/ the non member role having the permission' do
|
|
before do
|
|
non_member = Role.non_member
|
|
non_member.add_permission! action
|
|
non_member.save
|
|
|
|
project.save!
|
|
end
|
|
|
|
it 'should be empty' do
|
|
expect(described_class.query(action, project)).to be_empty
|
|
end
|
|
end
|
|
|
|
context 'w/ the project being public
|
|
w/ the user being member in the project
|
|
w/o the role having the necessary permission
|
|
w/ the non member role having the permission' do
|
|
before do
|
|
project.public = true
|
|
project.save
|
|
|
|
role.add_permission! other_action
|
|
member.save!
|
|
|
|
non_member = Role.non_member
|
|
non_member.add_permission! action
|
|
non_member.save
|
|
end
|
|
|
|
it 'should be empty' do
|
|
expect(described_class.query(action, project)).to be_empty
|
|
end
|
|
end
|
|
|
|
context 'w/o the project being public
|
|
w/ the user being member in the project
|
|
w/o the role having the permission
|
|
w/ the permission being public' do
|
|
before do
|
|
member.save!
|
|
end
|
|
|
|
it 'should return the user' do
|
|
expect(described_class.query(public_action, project)).to match_array [user]
|
|
end
|
|
end
|
|
|
|
context 'w/ the project being public
|
|
w/o the user being member in the project
|
|
w/o the role having the permission
|
|
w/ the permission being public' do
|
|
before do
|
|
project.public = true
|
|
project.save
|
|
end
|
|
|
|
it 'should return the user and anonymous' do
|
|
expect(described_class.query(public_action, project)).to match_array [user, anonymous]
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being member in the project
|
|
w/ asking for a certain permission
|
|
w/ the permission belonging to a module
|
|
w/o the module being active' do
|
|
let(:permission) do
|
|
OpenProject::AccessControl.permissions.find { |p| p.project_module.present? }
|
|
end
|
|
|
|
before do
|
|
project.enabled_module_names = []
|
|
|
|
role.add_permission! permission.name
|
|
member.save!
|
|
end
|
|
|
|
it 'should be empty' do
|
|
expect(described_class.query(permission.name, project)).to eq []
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being member in the project
|
|
w/ asking for a certain permission
|
|
w/ the permission belonging to a module
|
|
w/ the module being active' do
|
|
let(:permission) do
|
|
OpenProject::AccessControl.permissions.find { |p| p.project_module.present? }
|
|
end
|
|
|
|
before do
|
|
project.enabled_module_names = [permission.project_module]
|
|
|
|
role.add_permission! permission.name
|
|
member.save!
|
|
end
|
|
|
|
it 'should return the user' do
|
|
expect(described_class.query(permission.name, project)).to eq [user]
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being member in the project
|
|
w/ asking for a certain permission
|
|
w/ the user having the permission in the project
|
|
w/o the project being active' do
|
|
before do
|
|
role.add_permission! action
|
|
member.save!
|
|
|
|
project.update(active: false)
|
|
end
|
|
|
|
it 'should be empty' do
|
|
expect(described_class.query(action, project)).to eq []
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|