Browse Source

Add specs for AccountPolicy (#9575)

master
ysksn 5 years ago
committed by Eugen Rochko
parent
commit
af56efdec5
1 changed files with 86 additions and 0 deletions
  1. +86
    -0
      spec/policies/account_policy_spec.rb

+ 86
- 0
spec/policies/account_policy_spec.rb View File

@@ -0,0 +1,86 @@
# frozen_string_literal: true

require 'rails_helper'
require 'pundit/rspec'

RSpec.describe AccountPolicy do
let(:subject) { described_class }
let(:admin) { Fabricate(:user, admin: true).account }
let(:john) { Fabricate(:user).account }

permissions :index?, :show?, :unsuspend?, :unsilence?, :remove_avatar?, :remove_header? do
context 'staff' do
it 'permits' do
expect(subject).to permit(admin)
end
end

context 'not staff' do
it 'denies' do
expect(subject).to_not permit(john)
end
end
end

permissions :redownload?, :subscribe?, :unsubscribe? do
context 'admin' do
it 'permits' do
expect(subject).to permit(admin)
end
end

context 'not admin' do
it 'denies' do
expect(subject).to_not permit(john)
end
end
end

permissions :suspend?, :silence? do
let(:staff) { Fabricate(:user, admin: true).account }

context 'staff' do
context 'record is staff' do
it 'denies' do
expect(subject).to_not permit(admin, staff)
end
end

context 'record is not staff' do
it 'permits' do
expect(subject).to permit(admin, john)
end
end
end

context 'not staff' do
it 'denies' do
expect(subject).to_not permit(john, Account)
end
end
end

permissions :memorialize? do
let(:other_admin) { Fabricate(:user, admin: true).account }

context 'admin' do
context 'record is admin' do
it 'denies' do
expect(subject).to_not permit(admin, other_admin)
end
end

context 'record is not admin' do
it 'permits' do
expect(subject).to permit(admin, john)
end
end
end

context 'not admin' do
it 'denies' do
expect(subject).to_not permit(john, Account)
end
end
end
end

Loading…
Cancel
Save