about summary refs log tree commit diff
path: root/spec/policies/account_moderation_note_policy_spec.rb
diff options
context:
space:
mode:
authorThibG <thib@sitedethib.com>2018-12-19 16:19:00 +0100
committerGitHub <noreply@github.com>2018-12-19 16:19:00 +0100
commitaae088aaf0d5de542d917d11b7b2e86047645dd7 (patch)
treea4a58bba9c294d0c3ed0ea5c6c54e3bfa0507263 /spec/policies/account_moderation_note_policy_spec.rb
parent655da1be2029cecedcaf86479938d7805e72107d (diff)
parent222865584842de9c2bd3f47737e9ccf6aa8eac93 (diff)
Merge pull request #865 from ThibG/glitch-soc/merge-upstream
Merge upstream changes
Diffstat (limited to 'spec/policies/account_moderation_note_policy_spec.rb')
-rw-r--r--spec/policies/account_moderation_note_policy_spec.rb52
1 files changed, 52 insertions, 0 deletions
diff --git a/spec/policies/account_moderation_note_policy_spec.rb b/spec/policies/account_moderation_note_policy_spec.rb
new file mode 100644
index 000000000..bb7af94e4
--- /dev/null
+++ b/spec/policies/account_moderation_note_policy_spec.rb
@@ -0,0 +1,52 @@
+# frozen_string_literal: true
+
+require 'rails_helper'
+require 'pundit/rspec'
+
+RSpec.describe AccountModerationNotePolicy do
+  let(:subject) { described_class }
+  let(:admin)   { Fabricate(:user, admin: true).account }
+  let(:john)    { Fabricate(:user).account }
+
+  permissions :create? do
+    context 'staff' do
+      it 'grants to create' do
+        expect(subject).to permit(admin, AccountModerationNotePolicy)
+      end
+    end
+
+    context 'not staff' do
+      it 'denies to create' do
+        expect(subject).to_not permit(john, AccountModerationNotePolicy)
+      end
+    end
+  end
+
+  permissions :destroy? do
+    let(:account_moderation_note) do
+      Fabricate(:account_moderation_note,
+                account: john,
+                target_account: Fabricate(:account))
+    end
+
+    context 'admin' do
+      it 'grants to destroy' do
+        expect(subject).to permit(admin, AccountModerationNotePolicy)
+      end
+    end
+
+    context 'owner' do
+      it 'grants to destroy' do
+        expect(subject).to permit(john, account_moderation_note)
+      end
+    end
+
+    context 'neither admin nor owner' do
+      let(:kevin) { Fabricate(:user).account }
+
+      it 'denies to destroy' do
+        expect(subject).to_not permit(kevin, account_moderation_note)
+      end
+    end
+  end
+end