1
0
mirror of https://github.com/funamitech/mastodon synced 2024-12-21 10:08:26 +09:00
YuruToot/spec/policies/account_policy_spec.rb

161 lines
3.5 KiB
Ruby
Raw Normal View History

2018-12-19 16:56:59 +09:00
# frozen_string_literal: true
require 'rails_helper'
require 'pundit/rspec'
RSpec.describe AccountPolicy do
subject { described_class }
let(:admin) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
let(:john) { Fabricate(:account) }
let(:alice) { Fabricate(:account) }
2018-12-19 16:56:59 +09:00
permissions :index? do
2023-05-04 12:49:08 +09:00
context 'when staff' do
2018-12-19 16:56:59 +09:00
it 'permits' do
expect(subject).to permit(admin)
end
end
2023-05-04 12:49:08 +09:00
context 'when not staff' do
2018-12-19 16:56:59 +09:00
it 'denies' do
expect(subject).to_not permit(john)
end
end
end
permissions :show?, :unsilence?, :unsensitive?, :remove_avatar?, :remove_header? do
2023-05-04 12:49:08 +09:00
context 'when staff' do
it 'permits' do
expect(subject).to permit(admin, alice)
end
end
2023-05-04 12:49:08 +09:00
context 'when not staff' do
it 'denies' do
expect(subject).to_not permit(john, alice)
end
end
end
permissions :unsuspend?, :unblock_email? do
before do
alice.suspend!
end
2023-05-04 12:49:08 +09:00
context 'when staff' do
it 'permits' do
expect(subject).to permit(admin, alice)
end
end
2023-05-04 12:49:08 +09:00
context 'when not staff' do
it 'denies' do
expect(subject).to_not permit(john, alice)
end
end
end
permissions :redownload? do
2023-05-04 12:49:08 +09:00
context 'when admin' do
2018-12-19 16:56:59 +09:00
it 'permits' do
expect(subject).to permit(admin)
end
end
2023-05-04 12:49:08 +09:00
context 'when not admin' do
2018-12-19 16:56:59 +09:00
it 'denies' do
expect(subject).to_not permit(john)
end
end
end
permissions :suspend?, :silence? do
let(:staff) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
2018-12-19 16:56:59 +09:00
2023-05-04 12:49:08 +09:00
context 'when staff' do
context 'when record is staff' do
2018-12-19 16:56:59 +09:00
it 'denies' do
expect(subject).to_not permit(admin, staff)
end
end
2023-05-04 12:49:08 +09:00
context 'when record is not staff' do
2018-12-19 16:56:59 +09:00
it 'permits' do
expect(subject).to permit(admin, john)
end
end
end
2023-05-04 12:49:08 +09:00
context 'when not staff' do
2018-12-19 16:56:59 +09:00
it 'denies' do
expect(subject).to_not permit(john, Account)
end
end
end
permissions :memorialize? do
let(:other_admin) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
2018-12-19 16:56:59 +09:00
2023-05-04 12:49:08 +09:00
context 'when admin' do
context 'when record is admin' do
2018-12-19 16:56:59 +09:00
it 'denies' do
expect(subject).to_not permit(admin, other_admin)
end
end
2023-05-04 12:49:08 +09:00
context 'when record is not admin' do
2018-12-19 16:56:59 +09:00
it 'permits' do
expect(subject).to permit(admin, john)
end
end
end
2023-05-04 12:49:08 +09:00
context 'when not admin' do
2018-12-19 16:56:59 +09:00
it 'denies' do
expect(subject).to_not permit(john, Account)
end
end
end
2023-03-05 00:57:22 +09:00
permissions :review? do
2023-05-04 12:49:08 +09:00
context 'when admin' do
2023-03-05 00:57:22 +09:00
it 'permits' do
expect(subject).to permit(admin)
end
end
2023-05-04 12:49:08 +09:00
context 'when not admin' do
2023-03-05 00:57:22 +09:00
it 'denies' do
expect(subject).to_not permit(john)
end
end
end
permissions :destroy? do
2023-05-04 12:49:08 +09:00
context 'when admin' do
2023-03-05 00:57:22 +09:00
context 'with a temporarily suspended account' do
before { allow(alice).to receive(:suspended_temporarily?).and_return(true) }
it 'permits' do
expect(subject).to permit(admin, alice)
end
end
context 'with a not temporarily suspended account' do
before { allow(alice).to receive(:suspended_temporarily?).and_return(false) }
it 'denies' do
expect(subject).to_not permit(admin, alice)
end
end
end
2023-05-04 12:49:08 +09:00
context 'when not admin' do
2023-03-05 00:57:22 +09:00
it 'denies' do
expect(subject).to_not permit(john, alice)
end
end
end
2018-12-19 16:56:59 +09:00
end