kanbanworkflowstimelinescrumrubyroadmapproject-planningproject-managementopenprojectangularissue-trackerifcgantt-chartganttbug-trackerboardsbcf
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
398 lines
16 KiB
398 lines
16 KiB
#-- copyright
|
|
# OpenProject is an open source project management software.
|
|
# Copyright (C) 2012-2021 the OpenProject GmbH
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License version 3.
|
|
#
|
|
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
|
|
# Copyright (C) 2006-2013 Jean-Philippe Lang
|
|
# Copyright (C) 2010-2013 the ChiliProject Team
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
#
|
|
# See docs/COPYRIGHT.rdoc for more details.
|
|
#++
|
|
|
|
require 'spec_helper'
|
|
|
|
describe QueryPolicy, type: :controller do
|
|
let(:user) { FactoryBot.build_stubbed(:user) }
|
|
let(:project) { FactoryBot.build_stubbed(:project) }
|
|
let(:query) { FactoryBot.build_stubbed(:query, project: project, user: user) }
|
|
|
|
describe '#allowed?' do
|
|
let(:subject) { described_class.new(user) }
|
|
|
|
before do
|
|
# Allow everything by default so that it is spotted
|
|
# if any other permission influences the outcome.
|
|
allow(user).to receive(:allowed_to?).and_return true
|
|
end
|
|
|
|
shared_examples 'viewing queries' do |global|
|
|
context "#{ global ? 'in global context' : 'in project context' }" do
|
|
let(:other_user) { FactoryBot.build_stubbed(:user) }
|
|
if global
|
|
let(:project) { nil }
|
|
end
|
|
|
|
it 'is true if the query is public and another user views it' do
|
|
query.is_public = true
|
|
query.user = other_user
|
|
expect(subject.allowed?(query, :show)).to be_truthy
|
|
end
|
|
|
|
context 'query belongs to a different user' do
|
|
let(:query) do
|
|
FactoryBot.build_stubbed(:query,
|
|
project: project,
|
|
user: user,
|
|
is_public: false)
|
|
end
|
|
|
|
it 'is true if the query is private and the owner views it' do
|
|
expect(subject.allowed?(query, :show)).to be_truthy
|
|
end
|
|
|
|
it 'is false if the query is private and another user views it' do
|
|
query.user = other_user
|
|
expect(subject.allowed?(query, :show)).to be_falsy
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
shared_examples 'action on persisted' do |action, global|
|
|
context "for #{action} #{ global ? 'in global context' : 'in project context' }" do
|
|
if global
|
|
let(:project) { nil }
|
|
end
|
|
|
|
before do
|
|
allow(query).to receive(:new_record?).and_return false
|
|
allow(query).to receive(:persisted?).and_return true
|
|
end
|
|
|
|
it 'is false if the user has no permission in the project' do
|
|
allow(user).to receive(:allowed_to?).and_return false
|
|
|
|
expect(subject.allowed?(query, action)).to be_falsy
|
|
end
|
|
|
|
it 'is false if the user has the save_query permission in the project ' +
|
|
'AND the query is not persisted' do
|
|
allow(user).to receive(:allowed_to?).with(:save_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
allow(query).to receive(:persisted?).and_return false
|
|
|
|
expect(subject.allowed?(query, action)).to be_falsy
|
|
end
|
|
|
|
it 'is true if the user has the save_query permission in the project ' +
|
|
'AND it is his query' do
|
|
allow(user).to receive(:allowed_to?).with(:save_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
query.user = user
|
|
|
|
expect(subject.allowed?(query, action)).to be_truthy
|
|
end
|
|
|
|
it 'is false if the user has the save_query permission in the project ' +
|
|
'AND it is not his query' do
|
|
allow(user).to receive(:allowed_to?).with(:save_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
|
|
query.user = FactoryBot.build_stubbed(:user)
|
|
|
|
expect(subject.allowed?(query, action)).to be_falsy
|
|
end
|
|
|
|
it 'is false if the user lacks the save_query permission in the project ' +
|
|
'AND it is his query' do
|
|
allow(user).to receive(:allowed_to?).with(:save_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return false
|
|
|
|
query.user = user
|
|
|
|
expect(subject.allowed?(query, action)).to be_falsy
|
|
end
|
|
|
|
it 'is true if the user has the manage_public_query permission in the project ' +
|
|
'AND it is anothers query ' +
|
|
'AND the query is public' do
|
|
allow(user).to receive(:allowed_to?).with(:manage_public_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
query.user = FactoryBot.build_stubbed(:user)
|
|
query.is_public = true
|
|
|
|
expect(subject.allowed?(query, action)).to be_truthy
|
|
end
|
|
|
|
it 'is false if the user lacks the manage_public_query permission in the project ' +
|
|
'AND it is anothers query ' +
|
|
'AND the query is public' do
|
|
allow(user).to receive(:allowed_to?).with(:manage_public_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return false
|
|
query.user = FactoryBot.build_stubbed(:user)
|
|
query.is_public = true
|
|
|
|
expect(subject.allowed?(query, action)).to be_falsy
|
|
end
|
|
|
|
it 'is false if the user has the manage_public_query permission in the project ' +
|
|
'AND it is anothers query ' +
|
|
'AND the query is not public' do
|
|
allow(user).to receive(:allowed_to?).with(:manage_public_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
query.user = FactoryBot.build_stubbed(:user)
|
|
query.is_public = false
|
|
|
|
expect(subject.allowed?(query, action)).to be_falsy
|
|
end
|
|
end
|
|
end
|
|
|
|
shared_examples 'action on unpersisted' do |action, global|
|
|
context "for #{action} #{ global ? 'in global context' : 'in project context' }" do
|
|
if global
|
|
let(:project) { nil }
|
|
end
|
|
|
|
before do
|
|
allow(query).to receive(:new_record?).and_return true
|
|
allow(query).to receive(:persisted?).and_return false
|
|
end
|
|
|
|
it 'is false if the user has no permission in the project' do
|
|
allow(user).to receive(:allowed_to?).and_return false
|
|
|
|
expect(subject.allowed?(query, action)).to be_falsy
|
|
end
|
|
|
|
it 'is true if the user has the save_query permission in the project' do
|
|
allow(user).to receive(:allowed_to?).with(:save_queries,
|
|
project,
|
|
global: global)
|
|
.and_return true
|
|
|
|
expect(subject.allowed?(query, action)).to be_truthy
|
|
end
|
|
|
|
it 'is false if the user has the save_query permission in the project ' +
|
|
'AND the query is persisted' do
|
|
allow(user).to receive(:allowed_to?).with(:save_queries,
|
|
project,
|
|
global: global)
|
|
.and_return true
|
|
|
|
allow(query).to receive(:new_record?).and_return false
|
|
|
|
expect(subject.allowed?(query, action)).to be_falsy
|
|
end
|
|
end
|
|
end
|
|
|
|
shared_examples 'publicize' do |global|
|
|
context "#{ global ? 'in global context' : 'in project context' }" do
|
|
if global
|
|
let(:project) { nil }
|
|
end
|
|
|
|
it 'is false if the user has no permission in the project' do
|
|
allow(user).to receive(:allowed_to?).and_return false
|
|
|
|
expect(subject.allowed?(query, :publicize)).to be_falsy
|
|
end
|
|
|
|
it 'is true if the user has the manage_public_query permission in the project ' +
|
|
'AND it is his query' do
|
|
allow(user).to receive(:allowed_to?).with(:manage_public_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
|
|
expect(subject.allowed?(query, :publicize)).to be_truthy
|
|
end
|
|
|
|
it 'is false if the user has the manage_public_query permission in the project ' +
|
|
'AND the query is not public ' +
|
|
'AND it is not his query' do
|
|
allow(user).to receive(:allowed_to?).with(:manage_public_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
query.user = FactoryBot.build_stubbed(:user)
|
|
query.is_public = false
|
|
|
|
expect(subject.allowed?(query, :publicize)).to be_falsy
|
|
end
|
|
end
|
|
end
|
|
|
|
shared_examples 'depublicize' do |global|
|
|
context "#{ global ? 'in global context' : 'in project context' }" do
|
|
if global
|
|
let(:project) { nil }
|
|
end
|
|
|
|
it 'is false if the user has no permission in the project' do
|
|
allow(user).to receive(:allowed_to?).and_return false
|
|
|
|
expect(subject.allowed?(query, :depublicize)).to be_falsy
|
|
end
|
|
|
|
it 'is true if the user has the manage_public_query permission in the project ' +
|
|
'AND the query belongs to another user' +
|
|
'AND the query is public' do
|
|
allow(user).to receive(:allowed_to?).with(:manage_public_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
|
|
query.user = FactoryBot.build_stubbed(:user)
|
|
query.is_public = true
|
|
|
|
expect(subject.allowed?(query, :depublicize)).to be_truthy
|
|
end
|
|
|
|
it 'is false if the user has the manage_public_query permission in the project ' +
|
|
'AND the query is not public' do
|
|
allow(user).to receive(:allowed_to?).with(:manage_public_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
query.is_public = false
|
|
|
|
expect(subject.allowed?(query, :depublicize)).to be_falsy
|
|
end
|
|
end
|
|
end
|
|
|
|
shared_examples 'star' do |global|
|
|
context "#{ global ? 'in global context' : 'in project context' }" do
|
|
if global
|
|
let(:project) { nil }
|
|
end
|
|
|
|
it 'is false if the user has no permission in the project' do
|
|
allow(user).to receive(:allowed_to?).and_return false
|
|
|
|
expect(subject.allowed?(query, :star)).to be_falsy
|
|
end
|
|
end
|
|
end
|
|
|
|
shared_examples 'update ordered_work_packages' do |global|
|
|
context "#{ global ? 'in global context' : 'in project context' }" do
|
|
if global
|
|
let(:project) { nil }
|
|
end
|
|
|
|
it 'is false if the user has no permission in the project' do
|
|
allow(user).to receive(:allowed_to?).and_return false
|
|
|
|
expect(subject.allowed?(query, :reorder_work_packages)).to be_falsy
|
|
end
|
|
|
|
it 'is true if the user has the edit_work_packages permission in the project AND it public' do
|
|
allow(user).to receive(:allowed_to?).with(:edit_work_packages,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
|
|
query.is_public = true
|
|
expect(subject.allowed?(query, :reorder_work_packages)).to be_truthy
|
|
end
|
|
|
|
it 'is false if the user has the edit_work_packages permission in the project AND it is not his' do
|
|
allow(user).to receive(:allowed_to?).with(:edit_work_packages,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
|
|
query.user = FactoryBot.build_stubbed(:user)
|
|
query.is_public = false
|
|
expect(subject.allowed?(query, :reorder_work_packages)).to be_falsey
|
|
end
|
|
|
|
it 'is true if the user has the save_queries permission in the project AND it is his query' do
|
|
allow(user).to receive(:allowed_to?).with(:save_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
|
|
expect(subject.allowed?(query, :reorder_work_packages)).to be_truthy
|
|
end
|
|
|
|
|
|
it 'is true if the user has the manage_public_query permission in the project ' +
|
|
'AND it is a public query' do
|
|
allow(user).to receive(:allowed_to?).with(:manage_public_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
|
|
query.is_public = true
|
|
expect(subject.allowed?(query, :reorder_work_packages)).to be_truthy
|
|
end
|
|
|
|
it 'is false if the user has the manage_public_query permission in the project ' +
|
|
'AND the query is not public ' +
|
|
'AND it is not his query' do
|
|
allow(user).to receive(:allowed_to?).with(:manage_public_queries,
|
|
project,
|
|
global: project.nil?)
|
|
.and_return true
|
|
query.user = FactoryBot.build_stubbed(:user)
|
|
query.is_public = false
|
|
|
|
expect(subject.allowed?(query, :reorder_work_packages)).to be_falsey
|
|
end
|
|
end
|
|
end
|
|
|
|
it_should_behave_like 'action on persisted', :update, global: true
|
|
it_should_behave_like 'action on persisted', :update, global: false
|
|
it_should_behave_like 'action on persisted', :destroy, global: true
|
|
it_should_behave_like 'action on persisted', :destroy, global: false
|
|
it_should_behave_like 'action on unpersisted', :create, global: true
|
|
it_should_behave_like 'action on unpersisted', :create, global: false
|
|
it_should_behave_like 'publicize', global: false
|
|
it_should_behave_like 'publicize', global: true
|
|
it_should_behave_like 'depublicize', global: false
|
|
it_should_behave_like 'depublicize', global: true
|
|
it_should_behave_like 'action on persisted', :star, global: false
|
|
it_should_behave_like 'action on persisted', :star, global: true
|
|
it_should_behave_like 'action on persisted', :unstar, global: false
|
|
it_should_behave_like 'action on persisted', :unstar, global: true
|
|
it_should_behave_like 'viewing queries', global: true
|
|
it_should_behave_like 'viewing queries', global: false
|
|
end
|
|
end
|
|
|