You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
asciinema.org/spec/policies/asciicast_policy_spec.rb

135 lines
3.8 KiB
Ruby

require 'rails_helper'
describe AsciicastPolicy do
describe AsciicastPolicy::Scope do
let(:policy_scope) { AsciicastPolicy::Scope.new(user, Asciicast.all) }
subject { policy_scope.resolve }
let!(:asciicast_1) { create(:asciicast, private: false) }
let!(:asciicast_2) { create(:asciicast, private: true) }
context "when user is not admin" do
let(:user) { double(:user, admin?: false) }
it { should eq([asciicast_1]) }
end
context "when user is admin" do
let(:user) { double(:user, admin?: true) }
it { should eq([asciicast_1, asciicast_2]) }
end
end
subject { described_class }
describe '#permitted_attributes' do
subject { Pundit.policy(user, asciicast).permitted_attributes }
let(:asciicast) { Asciicast.new }
context "when user is admin" do
let(:user) { stub_model(User, admin?: true) }
it "includes form fields + featured" do
expect(subject).to eq([:title, :description, :theme_name, :snapshot_at, :featured, :private])
end
end
context "when user isn't admin" do
let(:user) { stub_model(User, admin?: false) }
it "is empty" do
expect(subject).to eq([])
end
context "and is creator of the asciicast" do
let(:asciicast) { Asciicast.new(user: user) }
it "doesn't include featured but includes private" do
expect(subject).to eq([:title, :description, :theme_name, :snapshot_at, :private])
end
end
end
end
permissions :update? do
it "denies access if user is nil" do
expect(subject).not_to permit(nil, Asciicast.new)
end
it "grants access if user is admin" do
user = stub_model(User, admin?: true)
expect(subject).to permit(user, Asciicast.new)
end
it "grants access if user is creator of the asciicast" do
user = stub_model(User, admin?: false)
expect(subject).to permit(user, Asciicast.new(user: user))
end
it "denies access if user isn't the creator of the asciicast" do
expect(subject).not_to permit(User.new, Asciicast.new(user: User.new))
end
end
permissions :destroy? do
it "denies access if user is nil" do
expect(subject).not_to permit(nil, Asciicast.new)
end
it "grants access if user is admin" do
user = stub_model(User, admin?: true)
expect(subject).to permit(user, Asciicast.new)
end
it "grants access if user is creator of the asciicast" do
user = stub_model(User, admin?: false)
expect(subject).to permit(user, Asciicast.new(user: user))
end
it "denies access if user isn't the creator of the asciicast" do
expect(subject).not_to permit(User.new, Asciicast.new(user: User.new))
end
end
permissions :change_featured? do
it "denies access if user is nil" do
expect(subject).not_to permit(nil, Asciicast.new)
end
it "grants access if user is admin" do
user = stub_model(User, admin?: true)
expect(subject).to permit(user, Asciicast.new)
end
it "denies access if user isn't admin" do
user = stub_model(User, admin?: false)
expect(subject).not_to permit(user, Asciicast.new)
end
end
permissions :change_visibility? do
it "denies access if user is nil" do
expect(subject).not_to permit(nil, Asciicast.new)
end
it "grants access if user is admin" do
user = stub_model(User, admin?: true)
expect(subject).to permit(user, Asciicast.new)
end
it "grants access if user is creator of the asciicast" do
user = stub_model(User, admin?: false)
expect(subject).to permit(user, Asciicast.new(user: user))
end
it "denies access if user isn't the creator of the asciicast" do
expect(subject).not_to permit(User.new, Asciicast.new(user: User.new))
end
end
end