kanbanworkflowstimelinescrumrubyroadmapproject-planningproject-managementopenprojectangularissue-trackerifcgantt-chartganttbug-trackerboardsbcf
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
663 lines
17 KiB
663 lines
17 KiB
#-- copyright
|
|
# OpenProject is an open source project management software.
|
|
# Copyright (C) 2012-2021 the OpenProject GmbH
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License version 3.
|
|
#
|
|
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
|
|
# Copyright (C) 2006-2013 Jean-Philippe Lang
|
|
# Copyright (C) 2010-2013 the ChiliProject Team
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
#
|
|
# See docs/COPYRIGHT.rdoc for more details.
|
|
#++
|
|
|
|
require 'spec_helper'
|
|
|
|
describe User, 'allowed_to?' do
|
|
let(:user) { FactoryBot.build(:user) }
|
|
let(:anonymous) { FactoryBot.build(:anonymous) }
|
|
let(:project) { FactoryBot.build(:project, public: false) }
|
|
let(:project2) { FactoryBot.build(:project, public: false) }
|
|
let(:role) { FactoryBot.build(:role) }
|
|
let(:role2) { FactoryBot.build(:role) }
|
|
let(:anonymous_role) { FactoryBot.build(:anonymous_role) }
|
|
let(:member) {
|
|
FactoryBot.build(:member, project: project,
|
|
roles: [role],
|
|
principal: user)
|
|
}
|
|
let(:member2) {
|
|
FactoryBot.build(:member, project: project2,
|
|
roles: [role2],
|
|
principal: user)
|
|
}
|
|
let(:global_permission) { OpenProject::AccessControl.permissions.find { |p| p.global? } }
|
|
let(:global_role) { FactoryBot.build(:global_role, permissions: [global_permission.name]) }
|
|
let(:global_member) do
|
|
FactoryBot.build(:global_member,
|
|
principal: user,
|
|
roles: [global_role])
|
|
end
|
|
|
|
before do
|
|
anonymous_role.save!
|
|
Role.non_member
|
|
user.save!
|
|
end
|
|
|
|
shared_examples_for 'w/ inquiring for project' do
|
|
let(:permission) { :add_work_packages }
|
|
let(:final_setup_step) {}
|
|
|
|
context 'w/ the user being admin' do
|
|
before do
|
|
user.update(admin: true)
|
|
|
|
project.save
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?(permission, project)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being admin
|
|
w/ the project being archived' do
|
|
before do
|
|
user.update(admin: true)
|
|
project.update(active: false)
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(user.allowed_to?(permission, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being admin
|
|
w/ the project module the permission belongs to being inactive' do
|
|
before do
|
|
user.update(admin: true)
|
|
project.enabled_module_names = []
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(user.allowed_to?(permission, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in the project
|
|
w/o the role having the necessary permission' do
|
|
before do
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(user.allowed_to?(permission, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in the project
|
|
w/ the role having the necessary permission' do
|
|
before do
|
|
role.add_permission! permission
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?(permission, project)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in the project
|
|
w/ the role having the necessary permission
|
|
w/o the module being active' do
|
|
let(:permission) { :view_news }
|
|
|
|
before do
|
|
role.add_permission! permission
|
|
project.enabled_module_names = []
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(user.allowed_to?(permission, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in the project
|
|
w/ the role having the necessary permission
|
|
w/ asking for a controller/action hash
|
|
w/o the module being active' do
|
|
let(:permission) { { controller: 'news', action: 'show' } }
|
|
|
|
before do
|
|
role.add_permission! permission
|
|
project.enabled_module_names = []
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(user.allowed_to?(permission, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in the project
|
|
w/o the role having the necessary permission
|
|
w/ non members having the necessary permission' do
|
|
before do
|
|
project.public = false
|
|
|
|
non_member = Role.non_member
|
|
non_member.add_permission! permission
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(user.allowed_to?(permission, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in the project
|
|
w/o the role having the necessary permission
|
|
w/ inquiring for a permission that is public' do
|
|
let(:permission) { :view_project }
|
|
|
|
before do
|
|
project.public = false
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?(permission, project)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/o the user being member in the project
|
|
w/ non member being allowed the action
|
|
w/ the project being private' do
|
|
before do
|
|
project.public = false
|
|
project.save!
|
|
|
|
non_member = Role.non_member
|
|
|
|
non_member.add_permission! permission
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(user.allowed_to?(permission, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/o the user being member in the project
|
|
w/ the project being public
|
|
w/ non members being allowed the action' do
|
|
before do
|
|
project.public = true
|
|
project.save!
|
|
|
|
non_member = Role.non_member
|
|
|
|
non_member.add_permission! permission
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?(permission, project)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being member in the project
|
|
w/ the project being public
|
|
w/ non members being allowed the action
|
|
w/o the role being allowed the action' do
|
|
before do
|
|
project.public = true
|
|
project.save!
|
|
|
|
non_member = Role.non_member
|
|
non_member.add_permission! permission
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(user.allowed_to?(permission, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being anonymous
|
|
w/ the project being public
|
|
w/ anonymous being allowed the action' do
|
|
before do
|
|
project.public = true
|
|
project.save!
|
|
|
|
anonymous_role.add_permission! permission
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(anonymous.allowed_to?(permission, project)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being anonymous
|
|
w/ the project being public
|
|
w/ querying for a public permission' do
|
|
let(:permission) { :view_project }
|
|
|
|
before do
|
|
project.public = true
|
|
project.save!
|
|
|
|
anonymous_role.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(anonymous.allowed_to?(permission, project)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being anonymous
|
|
w/ requesting a controller and action allowed by multiple permissions
|
|
w/ the project being public
|
|
w/ anonymous being allowed the action' do
|
|
let(:permission) { { controller: '/project_settings/categories', action: 'show' } }
|
|
|
|
before do
|
|
project.public = true
|
|
project.save!
|
|
|
|
anonymous_role.add_permission! :manage_categories
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(anonymous.allowed_to?(permission, project))
|
|
.to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being anonymous
|
|
w/ the project being public
|
|
w/ anonymous being not allowed the action' do
|
|
before do
|
|
project.public = true
|
|
project.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(anonymous.allowed_to?(permission, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in two projects
|
|
w/ the user being allowed the action in both projects' do
|
|
before do
|
|
role.add_permission! permission
|
|
role2.add_permission! permission
|
|
|
|
member.save!
|
|
member2.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?(permission, [project, project2])).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in two projects
|
|
w/ the user being allowed in only one project' do
|
|
before do
|
|
role.add_permission! permission
|
|
|
|
member.save!
|
|
member2.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(user.allowed_to?(permission, [project, project2])).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/o the user being a member in the two projects
|
|
w/ both projects being public
|
|
w/ non member being allowed the action' do
|
|
before do
|
|
non_member = Role.non_member
|
|
non_member.add_permission! permission
|
|
|
|
project.update(public: true)
|
|
project2.update(public: true)
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?(permission, [project, project2])).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/o the user being a member in the two projects
|
|
w/ only one project being public
|
|
w/ non member being allowed the action' do
|
|
before do
|
|
non_member = Role.non_member
|
|
non_member.add_permission! permission
|
|
|
|
project.update(public: true)
|
|
project2.update(public: false)
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(user.allowed_to?(permission, [project, project2])).to be_falsey
|
|
end
|
|
end
|
|
|
|
context "w/o the user being member in a project
|
|
w/ the user having the global role
|
|
w/ the global role having the necessary permission" do
|
|
|
|
before do
|
|
project.save!
|
|
|
|
global_role.save!
|
|
|
|
global_member.save!
|
|
end
|
|
|
|
it 'is false' do
|
|
expect(user.allowed_to?(global_permission.name, project)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/ requesting a controller and action
|
|
w/ the user being allowed the action' do
|
|
let(:permission) { :view_wiki_pages }
|
|
|
|
before do
|
|
role.add_permission! permission
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?({ controller: 'wiki', action: 'show' }, project))
|
|
.to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ requesting a controller and action allowed by multiple permissions
|
|
w/ the user being allowed the action' do
|
|
let(:permission) { :manage_categories }
|
|
|
|
before do
|
|
role.add_permission! permission
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?({ controller: 'projects', action: 'show' }, project))
|
|
.to be_truthy
|
|
end
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'w/ inquiring globally' do
|
|
let(:permission) { :add_work_packages }
|
|
let(:final_setup_step) {}
|
|
|
|
context 'w/ the user being admin' do
|
|
before do
|
|
user.admin = true
|
|
user.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?(permission, nil, global: true)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in a project
|
|
w/o the role having the necessary permission' do
|
|
before do
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(user.allowed_to?(permission, nil, global: true)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in the project
|
|
w/ the role having the necessary permission' do
|
|
before do
|
|
role.add_permission! permission
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?(permission, nil, global: true)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in the project
|
|
w/ inquiring for controller and action
|
|
w/ the role having the necessary permission' do
|
|
let(:permission) { :view_wiki_pages }
|
|
|
|
before do
|
|
role.add_permission! permission
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?({ controller: 'wiki', action: 'show' }, nil, global: true))
|
|
.to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being a member in the project
|
|
w/o the role having the necessary permission
|
|
w/ non members having the necessary permission' do
|
|
before do
|
|
non_member = Role.non_member
|
|
non_member.add_permission! permission
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?(permission, nil, global: true)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/o the user being a member in the project
|
|
w/ non members being allowed the action' do
|
|
before do
|
|
non_member = Role.non_member
|
|
non_member.add_permission! permission
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?(permission, nil, global: true)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context "w/o the user being member in a project
|
|
w/ the user having a global role
|
|
w/ the global role having the necessary permission" do
|
|
before do
|
|
global_role.save!
|
|
|
|
global_member.save!
|
|
end
|
|
|
|
it 'is true' do
|
|
expect(user.allowed_to?(global_permission.name, nil, global: true)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context "w/o the user being member in a project
|
|
w/ the user having a global role
|
|
w/o the global role having the necessary permission" do
|
|
|
|
before do
|
|
global_role.permissions = []
|
|
global_role.save!
|
|
|
|
global_member.save!
|
|
end
|
|
|
|
it 'is false' do
|
|
expect(user.allowed_to?(global_permission.name, nil, global: true)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context "w/o the user being member in a project
|
|
w/o the user having the global role
|
|
w/ the global role having the necessary permission" do
|
|
|
|
before do
|
|
global_role.save!
|
|
end
|
|
|
|
it 'is false' do
|
|
expect(user.allowed_to?(global_permission.name, nil, global: true)).to be_falsey
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being anonymous
|
|
w/ anonymous being allowed the action' do
|
|
before do
|
|
anonymous_role.add_permission! permission
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(anonymous.allowed_to?(permission, nil, global: true)).to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ requesting a controller and action allowed by multiple permissions
|
|
w/ the user being a member in the project
|
|
w/o the role having the necessary permission
|
|
w/ non members having the necessary permission' do
|
|
let(:permission) { :manage_categories }
|
|
|
|
before do
|
|
non_member = Role.non_member
|
|
non_member.add_permission! permission
|
|
|
|
member.save!
|
|
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be true' do
|
|
expect(user.allowed_to?({ controller: '/project_settings/categories', action: 'show' }, nil, global: true))
|
|
.to be_truthy
|
|
end
|
|
end
|
|
|
|
context 'w/ the user being anonymous
|
|
w/ anonymous being not allowed the action' do
|
|
before do
|
|
final_setup_step
|
|
end
|
|
|
|
it 'should be false' do
|
|
expect(anonymous.allowed_to?(permission, nil, global: true)).to be_falsey
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'w/o preloaded permissions' do
|
|
it_behaves_like 'w/ inquiring for project'
|
|
it_behaves_like 'w/ inquiring globally'
|
|
end
|
|
|
|
context 'w/ preloaded permissions' do
|
|
it_behaves_like 'w/ inquiring for project' do
|
|
let(:final_setup_step) {
|
|
user.preload_projects_allowed_to(permission)
|
|
}
|
|
end
|
|
end
|
|
end
|
|
|