mirror of
https://github.com/mastodon/mastodon.git
synced 2024-11-23 13:05:12 +01:00
160 lines
3.4 KiB
Ruby
160 lines
3.4 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'rails_helper'
|
|
require 'pundit/rspec'
|
|
|
|
RSpec.describe AccountPolicy do
|
|
let(:subject) { described_class }
|
|
let(:admin) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
|
|
let(:john) { Fabricate(:account) }
|
|
let(:alice) { Fabricate(:account) }
|
|
|
|
permissions :index? do
|
|
context 'staff' do
|
|
it 'permits' do
|
|
expect(subject).to permit(admin)
|
|
end
|
|
end
|
|
|
|
context 'not staff' do
|
|
it 'denies' do
|
|
expect(subject).to_not permit(john)
|
|
end
|
|
end
|
|
end
|
|
|
|
permissions :show?, :unsilence?, :unsensitive?, :remove_avatar?, :remove_header? do
|
|
context 'staff' do
|
|
it 'permits' do
|
|
expect(subject).to permit(admin, alice)
|
|
end
|
|
end
|
|
|
|
context 'not staff' do
|
|
it 'denies' do
|
|
expect(subject).to_not permit(john, alice)
|
|
end
|
|
end
|
|
end
|
|
|
|
permissions :unsuspend?, :unblock_email? do
|
|
before do
|
|
alice.suspend!
|
|
end
|
|
|
|
context 'staff' do
|
|
it 'permits' do
|
|
expect(subject).to permit(admin, alice)
|
|
end
|
|
end
|
|
|
|
context 'not staff' do
|
|
it 'denies' do
|
|
expect(subject).to_not permit(john, alice)
|
|
end
|
|
end
|
|
end
|
|
|
|
permissions :redownload? do
|
|
context 'admin' do
|
|
it 'permits' do
|
|
expect(subject).to permit(admin)
|
|
end
|
|
end
|
|
|
|
context 'not admin' do
|
|
it 'denies' do
|
|
expect(subject).to_not permit(john)
|
|
end
|
|
end
|
|
end
|
|
|
|
permissions :suspend?, :silence? do
|
|
let(:staff) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
|
|
|
|
context 'staff' do
|
|
context 'record is staff' do
|
|
it 'denies' do
|
|
expect(subject).to_not permit(admin, staff)
|
|
end
|
|
end
|
|
|
|
context 'record is not staff' do
|
|
it 'permits' do
|
|
expect(subject).to permit(admin, john)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'not staff' do
|
|
it 'denies' do
|
|
expect(subject).to_not permit(john, Account)
|
|
end
|
|
end
|
|
end
|
|
|
|
permissions :memorialize? do
|
|
let(:other_admin) { Fabricate(:user, role: UserRole.find_by(name: 'Admin')).account }
|
|
|
|
context 'admin' do
|
|
context 'record is admin' do
|
|
it 'denies' do
|
|
expect(subject).to_not permit(admin, other_admin)
|
|
end
|
|
end
|
|
|
|
context 'record is not admin' do
|
|
it 'permits' do
|
|
expect(subject).to permit(admin, john)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'not admin' do
|
|
it 'denies' do
|
|
expect(subject).to_not permit(john, Account)
|
|
end
|
|
end
|
|
end
|
|
|
|
permissions :review? do
|
|
context 'admin' do
|
|
it 'permits' do
|
|
expect(subject).to permit(admin)
|
|
end
|
|
end
|
|
|
|
context 'not admin' do
|
|
it 'denies' do
|
|
expect(subject).to_not permit(john)
|
|
end
|
|
end
|
|
end
|
|
|
|
permissions :destroy? do
|
|
context 'admin' do
|
|
context 'with a temporarily suspended account' do
|
|
before { allow(alice).to receive(:suspended_temporarily?).and_return(true) }
|
|
|
|
it 'permits' do
|
|
expect(subject).to permit(admin, alice)
|
|
end
|
|
end
|
|
|
|
context 'with a not temporarily suspended account' do
|
|
before { allow(alice).to receive(:suspended_temporarily?).and_return(false) }
|
|
|
|
it 'denies' do
|
|
expect(subject).to_not permit(admin, alice)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'not admin' do
|
|
it 'denies' do
|
|
expect(subject).to_not permit(john, alice)
|
|
end
|
|
end
|
|
end
|
|
end
|