OpenProject is the leading open source project management software.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
openproject/spec/models/users/allowed_to_spec.rb

592 lines
15 KiB

#-- copyright
# OpenProject is a project management system.
# Copyright (C) 2012-2017 the OpenProject Foundation (OPF)
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License version 3.
#
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
# Copyright (C) 2006-2017 Jean-Philippe Lang
# Copyright (C) 2010-2013 the ChiliProject Team
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
#
# See doc/COPYRIGHT.rdoc for more details.
#++
require 'spec_helper'
describe User, 'allowed_to?' do
let(:user) { FactoryGirl.build(:user) }
let(:anonymous) { FactoryGirl.build(:anonymous) }
let(:project) { FactoryGirl.build(:project, is_public: false) }
let(:project2) { FactoryGirl.build(:project, is_public: false) }
let(:role) { FactoryGirl.build(:role) }
let(:role2) { FactoryGirl.build(:role) }
let(:anonymous_role) { FactoryGirl.build(:anonymous_role) }
let(:member) {
FactoryGirl.build(:member, project: project,
roles: [role],
principal: user)
}
let(:member2) {
FactoryGirl.build(:member, project: project2,
roles: [role2],
principal: user)
}
before do
anonymous_role.save!
Role.non_member
user.save!
end
shared_examples_for 'w/ inquiring for project' do
let(:permission) { :add_work_packages }
let(:final_setup_step) {}
context 'w/ the user being admin' do
before do
user.update_attribute(:admin, true)
project.save
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?(permission, project)).to be_truthy
end
end
context 'w/ the user being admin
w/ the project being archived' do
before do
user.update_attribute(:admin, true)
project.update_attribute(:status, Project::STATUS_ARCHIVED)
final_setup_step
end
it 'should be false' do
expect(user.allowed_to?(permission, project)).to be_falsey
end
end
context 'w/ the user being admin
w/ the project module the permission belongs to being inactive' do
before do
user.update_attribute(:admin, true)
project.enabled_module_names = []
final_setup_step
end
it 'should be false' do
expect(user.allowed_to?(permission, project)).to be_falsey
end
end
context 'w/ the user being a member in the project
w/o the role having the necessary permission' do
before do
member.save!
final_setup_step
end
it 'should be false' do
expect(user.allowed_to?(permission, project)).to be_falsey
end
end
context 'w/ the user being a member in the project
w/ the role having the necessary permission' do
before do
role.add_permission! permission
member.save!
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?(permission, project)).to be_truthy
end
end
context 'w/ the user being a member in the project
w/ the role having the necessary permission
w/o the module being active' do
let(:permission) { :view_news }
before do
role.add_permission! permission
project.enabled_module_names = []
member.save!
final_setup_step
end
it 'should be false' do
expect(user.allowed_to?(permission, project)).to be_falsey
end
end
context 'w/ the user being a member in the project
w/ the role having the necessary permission
w/ asking for a controller/action hash
w/o the module being active' do
let(:permission) { { controller: 'news', action: 'show' } }
before do
role.add_permission! permission
project.enabled_module_names = []
member.save!
final_setup_step
end
it 'should be false' do
expect(user.allowed_to?(permission, project)).to be_falsey
end
end
context 'w/ the user being a member in the project
w/o the role having the necessary permission
w/ non members having the necessary permission' do
before do
project.is_public = false
non_member = Role.non_member
non_member.add_permission! permission
member.save!
final_setup_step
end
it 'should be false' do
expect(user.allowed_to?(permission, project)).to be_falsey
end
end
context 'w/ the user being a member in the project
w/o the role having the necessary permission
w/ inquiring for a permission that is public' do
let(:permission) { :view_project }
before do
project.is_public = false
member.save!
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?(permission, project)).to be_truthy
end
end
context 'w/o the user being member in the project
w/ non member being allowed the action
w/ the project being private' do
before do
project.is_public = false
project.save!
non_member = Role.non_member
non_member.add_permission! permission
final_setup_step
end
it 'should be false' do
expect(user.allowed_to?(permission, project)).to be_falsey
end
end
context 'w/o the user being member in the project
w/ the project being public
w/ non members being allowed the action' do
before do
project.is_public = true
project.save!
non_member = Role.non_member
non_member.add_permission! permission
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?(permission, project)).to be_truthy
end
end
context 'w/ the user being member in the project
w/ the project being public
w/ non members being allowed the action
w/o the role being allowed the action' do
before do
project.is_public = true
project.save!
non_member = Role.non_member
non_member.add_permission! permission
member.save!
final_setup_step
end
it 'should be false' do
expect(user.allowed_to?(permission, project)).to be_falsey
end
end
context 'w/ the user being anonymous
w/ the project being public
w/ anonymous being allowed the action' do
before do
project.is_public = true
project.save!
anonymous_role.add_permission! permission
final_setup_step
end
it 'should be true' do
expect(anonymous.allowed_to?(permission, project)).to be_truthy
end
end
context 'w/ the user being anonymous
w/ the project being public
w/ querying for a public permission' do
let(:permission) { :view_project }
before do
project.is_public = true
project.save!
anonymous_role.save!
final_setup_step
end
it 'should be true' do
expect(anonymous.allowed_to?(permission, project)).to be_truthy
end
end
context 'w/ the user being anonymous
w/ requesting a controller and action allowed by multiple permissions
w/ the project being public
w/ anonymous being allowed the action' do
let(:permission) { { controller: 'projects', action: 'settings' } }
before do
project.is_public = true
project.save!
anonymous_role.add_permission! :manage_categories
final_setup_step
end
it 'should be true' do
expect(anonymous.allowed_to?(permission, project))
.to be_truthy
end
end
context 'w/ the user being anonymous
w/ the project being public
w/ anonymous being not allowed the action' do
before do
project.is_public = true
project.save!
final_setup_step
end
it 'should be false' do
expect(anonymous.allowed_to?(permission, project)).to be_falsey
end
end
context 'w/ the user being a member in two projects
w/ the user being allowed the action in both projects' do
before do
role.add_permission! permission
role2.add_permission! permission
member.save!
member2.save!
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?(permission, [project, project2])).to be_truthy
end
end
context 'w/ the user being a member in two projects
w/ the user being allowed in only one project' do
before do
role.add_permission! permission
member.save!
member2.save!
final_setup_step
end
it 'should be false' do
expect(user.allowed_to?(permission, [project, project2])).to be_falsey
end
end
context 'w/o the user being a member in the two projects
w/ both projects being public
w/ non member being allowed the action' do
before do
non_member = Role.non_member
non_member.add_permission! permission
project.update_attribute(:is_public, true)
project2.update_attribute(:is_public, true)
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?(permission, [project, project2])).to be_truthy
end
end
context 'w/o the user being a member in the two projects
w/ only one project being public
w/ non member being allowed the action' do
before do
non_member = Role.non_member
non_member.add_permission! permission
project.update_attribute(:is_public, true)
project2.update_attribute(:is_public, false)
final_setup_step
end
it 'should be false' do
expect(user.allowed_to?(permission, [project, project2])).to be_falsey
end
end
context 'w/ requesting a controller and action
w/ the user being allowed the action' do
before do
role.add_permission! permission
member.save!
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?({ controller: 'work_packages', action: 'new' }, project))
.to be_truthy
end
end
context 'w/ requesting a controller and action allowed by multiple permissions
w/ the user being allowed the action' do
let(:permission) { :manage_categories }
before do
role.add_permission! permission
member.save!
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?({ controller: 'projects', action: 'settings' }, project))
.to be_truthy
end
end
end
shared_examples_for 'w/ inquiring globally' do
let(:permission) { :add_work_packages }
let(:final_setup_step) {}
context 'w/ the user being admin' do
before do
user.admin = true
user.save!
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?(permission, nil, global: true)).to be_truthy
end
end
context 'w/ the user being a member in a project
w/o the role having the necessary permission' do
before do
member.save!
final_setup_step
end
it 'should be false' do
expect(user.allowed_to?(permission, nil, global: true)).to be_falsey
end
end
context 'w/ the user being a member in the project
w/ the role having the necessary permission' do
before do
role.add_permission! permission
member.save!
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?(permission, nil, global: true)).to be_truthy
end
end
context 'w/ the user being a member in the project
w/ inquiring for controller and action
w/ the role having the necessary permission' do
before do
role.add_permission! permission
member.save!
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?({ controller: 'work_packages', action: 'new' }, nil, global: true))
.to be_truthy
end
end
context 'w/ the user being a member in the project
w/o the role having the necessary permission
w/ non members having the necessary permission' do
before do
non_member = Role.non_member
non_member.add_permission! permission
member.save!
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?(permission, nil, global: true)).to be_truthy
end
end
context 'w/o the user being a member in the project
w/ non members being allowed the action' do
before do
non_member = Role.non_member
non_member.add_permission! permission
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?(permission, nil, global: true)).to be_truthy
end
end
context 'w/ the user being anonymous
w/ anonymous being allowed the action' do
before do
anonymous_role.add_permission! permission
final_setup_step
end
it 'should be true' do
expect(anonymous.allowed_to?(permission, nil, global: true)).to be_truthy
end
end
context 'w/ requesting a controller and action allowed by multiple permissions
w/ the user being a member in the project
w/o the role having the necessary permission
w/ non members having the necessary permission' do
let(:permission) { :manage_categories }
before do
non_member = Role.non_member
non_member.add_permission! permission
member.save!
final_setup_step
end
it 'should be true' do
expect(user.allowed_to?({ controller: 'projects', action: 'settings' }, nil, global: true))
.to be_truthy
end
end
context 'w/ the user being anonymous
w/ anonymous being not allowed the action' do
before do
final_setup_step
end
it 'should be false' do
expect(anonymous.allowed_to?(permission, nil, global: true)).to be_falsey
end
end
end
context 'w/o preloaded permissions' do
it_behaves_like 'w/ inquiring for project'
it_behaves_like 'w/ inquiring globally'
end
context 'w/ preloaded permissions' do
it_behaves_like 'w/ inquiring for project' do
let(:final_setup_step) {
user.preload_projects_allowed_to(permission)
}
end
end
end