0
0
Fork 0

Fix RSpec/ContextWording cop (#24739)

This commit is contained in:
Matt Jankowski 2023-05-03 23:49:08 -04:00 committed by GitHub
parent cf18cc2891
commit 710745e16b
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
105 changed files with 559 additions and 668 deletions

View file

@ -10,13 +10,13 @@ RSpec.describe AccountPolicy do
let(:alice) { Fabricate(:account) }
permissions :index? do
context 'staff' do
context 'when staff' do
it 'permits' do
expect(subject).to permit(admin)
end
end
context 'not staff' do
context 'when not staff' do
it 'denies' do
expect(subject).to_not permit(john)
end
@ -24,13 +24,13 @@ RSpec.describe AccountPolicy do
end
permissions :show?, :unsilence?, :unsensitive?, :remove_avatar?, :remove_header? do
context 'staff' do
context 'when staff' do
it 'permits' do
expect(subject).to permit(admin, alice)
end
end
context 'not staff' do
context 'when not staff' do
it 'denies' do
expect(subject).to_not permit(john, alice)
end
@ -42,13 +42,13 @@ RSpec.describe AccountPolicy do
alice.suspend!
end
context 'staff' do
context 'when staff' do
it 'permits' do
expect(subject).to permit(admin, alice)
end
end
context 'not staff' do
context 'when not staff' do
it 'denies' do
expect(subject).to_not permit(john, alice)
end
@ -56,13 +56,13 @@ RSpec.describe AccountPolicy do
end
permissions :redownload? do
context 'admin' do
context 'when admin' do
it 'permits' do
expect(subject).to permit(admin)
end
end
context 'not admin' do
context 'when not admin' do
it 'denies' do
expect(subject).to_not permit(john)
end
@ -72,21 +72,21 @@ RSpec.describe AccountPolicy do
permissions :suspend?, :silence? do
let(:staff) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
context 'staff' do
context 'record is staff' do
context 'when staff' do
context 'when record is staff' do
it 'denies' do
expect(subject).to_not permit(admin, staff)
end
end
context 'record is not staff' do
context 'when record is not staff' do
it 'permits' do
expect(subject).to permit(admin, john)
end
end
end
context 'not staff' do
context 'when not staff' do
it 'denies' do
expect(subject).to_not permit(john, Account)
end
@ -96,21 +96,21 @@ RSpec.describe AccountPolicy do
permissions :memorialize? do
let(:other_admin) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
context 'admin' do
context 'record is admin' do
context 'when admin' do
context 'when record is admin' do
it 'denies' do
expect(subject).to_not permit(admin, other_admin)
end
end
context 'record is not admin' do
context 'when record is not admin' do
it 'permits' do
expect(subject).to permit(admin, john)
end
end
end
context 'not admin' do
context 'when not admin' do
it 'denies' do
expect(subject).to_not permit(john, Account)
end
@ -118,13 +118,13 @@ RSpec.describe AccountPolicy do
end
permissions :review? do
context 'admin' do
context 'when admin' do
it 'permits' do
expect(subject).to permit(admin)
end
end
context 'not admin' do
context 'when not admin' do
it 'denies' do
expect(subject).to_not permit(john)
end
@ -132,7 +132,7 @@ RSpec.describe AccountPolicy do
end
permissions :destroy? do
context 'admin' do
context 'when admin' do
context 'with a temporarily suspended account' do
before { allow(alice).to receive(:suspended_temporarily?).and_return(true) }
@ -150,7 +150,7 @@ RSpec.describe AccountPolicy do
end
end
context 'not admin' do
context 'when not admin' do
it 'denies' do
expect(subject).to_not permit(john, alice)
end