summaryrefslogtreecommitdiff
path: root/spec/models/project_security_spec.rb
blob: 3643ad1b0523e7b5d4d63b77a0922ec4551ae9a5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
require 'spec_helper'

describe Project, models: true do
  describe :authorization do
    before do
      @p1 = create(:project)

      @u1 = create(:user)
      @u2 = create(:user)
      @u3 = create(:user)
      @u4 = @p1.owner

      @abilities = Six.new
      @abilities << Ability
    end

    let(:guest_actions) { Ability.project_guest_rules }
    let(:report_actions) { Ability.project_report_rules }
    let(:dev_actions) { Ability.project_dev_rules }
    let(:master_actions) { Ability.project_master_rules }
    let(:admin_actions) { Ability.project_admin_rules }

    describe "Non member rules" do
      it "should deny for non-project users any actions" do
        admin_actions.each do |action|
          expect(@abilities.allowed?(@u1, action, @p1)).to be_falsey
        end
      end
    end

    describe "Guest Rules" do
      before do
        @p1.project_members.create(project: @p1, user: @u2, access_level: ProjectMember::GUEST)
      end

      it "should allow for project user any guest actions" do
        guest_actions.each do |action|
          expect(@abilities.allowed?(@u2, action, @p1)).to be_truthy
        end
      end
    end

    describe "Report Rules" do
      before do
        @p1.project_members.create(project: @p1, user: @u2, access_level: ProjectMember::REPORTER)
      end

      it "should allow for project user any report actions" do
        report_actions.each do |action|
          expect(@abilities.allowed?(@u2, action, @p1)).to be_truthy
        end
      end
    end

    describe "Developer Rules" do
      before do
        @p1.project_members.create(project: @p1, user: @u2, access_level: ProjectMember::REPORTER)
        @p1.project_members.create(project: @p1, user: @u3, access_level: ProjectMember::DEVELOPER)
      end

      it "should deny for developer master-specific actions" do
        [dev_actions - report_actions].each do |action|
          expect(@abilities.allowed?(@u2, action, @p1)).to be_falsey
        end
      end

      it "should allow for project user any dev actions" do
        dev_actions.each do |action|
          expect(@abilities.allowed?(@u3, action, @p1)).to be_truthy
        end
      end
    end

    describe "Master Rules" do
      before do
        @p1.project_members.create(project: @p1, user: @u2, access_level: ProjectMember::DEVELOPER)
        @p1.project_members.create(project: @p1, user: @u3, access_level: ProjectMember::MASTER)
      end

      it "should deny for developer master-specific actions" do
        [master_actions - dev_actions].each do |action|
          expect(@abilities.allowed?(@u2, action, @p1)).to be_falsey
        end
      end

      it "should allow for project user any master actions" do
        master_actions.each do |action|
          expect(@abilities.allowed?(@u3, action, @p1)).to be_truthy
        end
      end
    end

    describe "Admin Rules" do
      before do
        @p1.project_members.create(project: @p1, user: @u2, access_level: ProjectMember::DEVELOPER)
        @p1.project_members.create(project: @p1, user: @u3, access_level: ProjectMember::MASTER)
      end

      it "should deny for masters admin-specific actions" do
        [admin_actions - master_actions].each do |action|
          expect(@abilities.allowed?(@u2, action, @p1)).to be_falsey
        end
      end

      it "should allow for project owner any admin actions" do
        admin_actions.each do |action|
          expect(@abilities.allowed?(@u4, action, @p1)).to be_truthy
        end
      end
    end
  end
end