123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159 |
- # frozen_string_literal: true
- require 'rails_helper'
- RSpec.describe AccountPolicy do
- subject { described_class }
- let(:admin) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
- let(:john) { Fabricate(:account) }
- let(:alice) { Fabricate(:account) }
- permissions :index? do
- context 'when staff' do
- it 'permits' do
- expect(subject).to permit(admin)
- end
- end
- context 'when not staff' do
- it 'denies' do
- expect(subject).to_not permit(john)
- end
- end
- end
- permissions :show?, :unsilence?, :unsensitive?, :remove_avatar?, :remove_header?, :sensitive?, :warn? do
- context 'when staff' do
- it 'permits' do
- expect(subject).to permit(admin, alice)
- end
- end
- context 'when not staff' do
- it 'denies' do
- expect(subject).to_not permit(john, alice)
- end
- end
- end
- permissions :unsuspend?, :unblock_email? do
- before do
- alice.suspend!
- end
- context 'when staff' do
- it 'permits' do
- expect(subject).to permit(admin, alice)
- end
- end
- context 'when not staff' do
- it 'denies' do
- expect(subject).to_not permit(john, alice)
- end
- end
- end
- permissions :redownload? do
- context 'when admin' do
- it 'permits' do
- expect(subject).to permit(admin)
- end
- end
- context 'when not admin' do
- it 'denies' do
- expect(subject).to_not permit(john)
- end
- end
- end
- permissions :suspend?, :silence? do
- let(:staff) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
- context 'when staff' do
- context 'when record is staff' do
- it 'denies' do
- expect(subject).to_not permit(admin, staff)
- end
- end
- context 'when record is not staff' do
- it 'permits' do
- expect(subject).to permit(admin, john)
- end
- end
- end
- context 'when not staff' do
- it 'denies' do
- expect(subject).to_not permit(john, Account)
- end
- end
- end
- permissions :memorialize? do
- let(:other_admin) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
- context 'when admin' do
- context 'when record is admin' do
- it 'denies' do
- expect(subject).to_not permit(admin, other_admin)
- end
- end
- context 'when record is not admin' do
- it 'permits' do
- expect(subject).to permit(admin, john)
- end
- end
- end
- context 'when not admin' do
- it 'denies' do
- expect(subject).to_not permit(john, Account)
- end
- end
- end
- permissions :review? do
- context 'when admin' do
- it 'permits' do
- expect(subject).to permit(admin)
- end
- end
- context 'when not admin' do
- it 'denies' do
- expect(subject).to_not permit(john)
- end
- end
- end
- permissions :destroy? do
- context 'when admin' do
- context 'with a temporarily suspended account' do
- before { allow(alice).to receive(:suspended_temporarily?).and_return(true) }
- it 'permits' do
- expect(subject).to permit(admin, alice)
- end
- end
- context 'with a not temporarily suspended account' do
- before { allow(alice).to receive(:suspended_temporarily?).and_return(false) }
- it 'denies' do
- expect(subject).to_not permit(admin, alice)
- end
- end
- end
- context 'when not admin' do
- it 'denies' do
- expect(subject).to_not permit(john, alice)
- end
- end
- end
- end
|