#465: Comment out a cancan code.
This commit is contained in:
parent
0625a941bd
commit
2bc7c9b2c3
|
@ -1,269 +1,268 @@
|
|||
# If rules goes one by one CanCan joins them by 'OR' sql operator
|
||||
# If rule has multiple conditions CanCan joins them by 'AND' sql operator
|
||||
# WARNING:
|
||||
# - put cannot rules _after_ can rules and not before!
|
||||
# - beware inner joins. Use sub queries against them!
|
||||
|
||||
class Ability
|
||||
include CanCan::Ability
|
||||
|
||||
def initialize(user)
|
||||
user ||= User.new # guest user (not logged in)
|
||||
@user = user
|
||||
|
||||
# Shared rights between guests and registered users
|
||||
can [:show, :archive, :read], Project, visibility: 'open'
|
||||
can :get_id, Project, visibility: 'open' # api
|
||||
can(:refs_list, Project) {|project| can? :show, project}
|
||||
can :read, Issue, project: { visibility: 'open' }
|
||||
can [:read, :commits, :files], PullRequest, to_project: {visibility: 'open'}
|
||||
can [:read, :log, :everything], BuildList, project: {visibility: 'open'}
|
||||
can [:read, :log], ProductBuildList#, product: {platform: {visibility: 'open'}} # double nested hash don't work
|
||||
can [:read, :search], Advisory
|
||||
can :read, Statistic
|
||||
|
||||
# Platforms block
|
||||
can [:show, :members, :advisories], Platform, visibility: 'open'
|
||||
can :platforms_for_build, Platform, visibility: 'open', platform_type: 'main'
|
||||
can([:read, :get_list], MassBuild) {|mass_build| can?(:show, mass_build.save_to_platform) }
|
||||
can [:read, :projects_list, :projects], Repository, platform: {visibility: 'open'}
|
||||
can :read, Product, platform: {visibility: 'open'}
|
||||
|
||||
can :show, Group
|
||||
can :show, User
|
||||
can :possible_forks, Project
|
||||
|
||||
if user.guest? # Guest rights
|
||||
cannot :index, Project
|
||||
# can [:new, :create], RegisterRequest
|
||||
else # Registered user rights
|
||||
if user.admin?
|
||||
can :manage, :all
|
||||
# Protection
|
||||
cannot :approve, RegisterRequest, approved: true
|
||||
cannot :reject, RegisterRequest, rejected: true
|
||||
cannot [:destroy, :create], Subscribe
|
||||
# Act admin as simple user
|
||||
cannot :read, Product, platform: {platform_type: 'personal'}
|
||||
cannot [:owned, :related], [BuildList, Platform]
|
||||
cannot :membered, Project # list products which user members
|
||||
end
|
||||
|
||||
if user.user?
|
||||
can :edit, User, id: user.id
|
||||
can [:read, :create], Group
|
||||
can [:update, :manage_members, :members, :add_member, :remove_member, :remove_members, :update_member], Group do |group|
|
||||
group.actors.exists?(actor_type: 'User', actor_id: user.id, role: 'admin') # or group.owner_id = user.id
|
||||
end
|
||||
can :write, Group do |group|
|
||||
group.actors.exists?(actor_type: 'User', actor_id: user.id, role: ['writer', 'admin'])
|
||||
end
|
||||
can :destroy, Group, owner_id: user.id
|
||||
can :remove_user, Group
|
||||
|
||||
can :create, Project
|
||||
can([:mass_import, :run_mass_import], Project) if user.platforms.main.find{ |p| local_admin?(p) }.present?
|
||||
can :read, Project, visibility: 'open'
|
||||
can [:read, :archive, :membered, :get_id], Project, owner_type: 'User', owner_id: user.id
|
||||
can [:read, :archive, :membered, :get_id], Project, owner_type: 'Group', owner_id: user_group_ids
|
||||
# can([:read, :archive, :membered, :get_id], Project, read_relations_for('projects')) {|project| local_reader? project}
|
||||
can([:read, :archive, :membered, :get_id], Project, read_relations_with_projects) {|project| local_reader? project}
|
||||
can(:write, Project) {|project| local_writer? project} # for grack
|
||||
can [:update, :sections, :manage_collaborators, :autocomplete_maintainers, :add_member, :remove_member, :remove_members, :update_member, :members, :schedule], Project do |project|
|
||||
local_admin? project
|
||||
end
|
||||
|
||||
can(:fork, Project) {|project| can? :read, project}
|
||||
can(:alias, Project) {|project| local_admin?(project) }
|
||||
|
||||
can(:destroy, Project) {|project| owner? project}
|
||||
can(:destroy, Project) {|project| project.owner_type == 'Group' and project.owner.actors.exists?(actor_type: 'User', actor_id: user.id, role: 'admin')}
|
||||
can :remove_user, Project
|
||||
can :preview, Project
|
||||
|
||||
can([:read, :create, :edit, :destroy, :update], Hook) {|hook| can?(:edit, hook.project)}
|
||||
|
||||
can [:read, :log, :owned, :everything], BuildList, user_id: user.id
|
||||
can [:read, :log, :related, :everything], BuildList, project: {owner_type: 'User', owner_id: user.id}
|
||||
can [:read, :log, :related, :everything], BuildList, project: {owner_type: 'Group', owner_id: user_group_ids}
|
||||
# can([:read, :log, :everything, :list], BuildList, read_relations_for('build_lists', 'projects')) {|build_list| can? :read, build_list.project}
|
||||
# can([:read, :log, :everything, :list], BuildList, read_relations_for_build_lists_and_projects) {|build_list| can? :read, build_list.project}
|
||||
can([:read, :log, :everything, :list], BuildList, read_relations_with_projects('build_lists')) {|build_list| can? :read, build_list.project}
|
||||
|
||||
can(:publish_into_testing, BuildList) { |build_list| ( can?(:create, build_list) || can?(:publish, build_list) ) && build_list.save_to_platform.main? }
|
||||
can([:create, :rerun_tests], BuildList) {|build_list|
|
||||
build_list.project &&
|
||||
build_list.project.is_package &&
|
||||
can?(:write, build_list.project) &&
|
||||
(build_list.build_for_platform.blank? || can?(:show, build_list.build_for_platform))
|
||||
}
|
||||
|
||||
can(:publish, BuildList) do |build_list|
|
||||
if build_list.build_published?
|
||||
local_admin?(build_list.save_to_platform) || build_list.save_to_repository.members.exists?(id: user.id)
|
||||
else
|
||||
build_list.save_to_repository.publish_without_qa ?
|
||||
can?(:write, build_list.project) : local_admin?(build_list.save_to_platform)
|
||||
end
|
||||
end
|
||||
can(:create_container, BuildList) do |build_list|
|
||||
local_admin?(build_list.save_to_platform)
|
||||
end
|
||||
can(:reject_publish, BuildList) do |build_list|
|
||||
build_list.save_to_repository.publish_without_qa ?
|
||||
can?(:write, build_list.project) : local_admin?(build_list.save_to_platform)
|
||||
end
|
||||
can([:cancel, :create_container], BuildList) {|build_list| can?(:write, build_list.project)}
|
||||
|
||||
can [:read, :owned, :related, :members], Platform, owner_type: 'User', owner_id: user.id
|
||||
can [:read, :related, :members], Platform, owner_type: 'Group', owner_id: user_group_ids
|
||||
can([:read, :related, :members], Platform, read_relations_for('platforms')) {|platform| local_reader? platform}
|
||||
can [:read, :related], Platform, id: user.repositories.pluck(:platform_id)
|
||||
can([:update, :destroy, :change_visibility], Platform) {|platform| owner?(platform) }
|
||||
can([:local_admin_manage, :members, :add_member, :remove_member, :remove_members, :remove_file] , Platform) {|platform| owner?(platform) || local_admin?(platform) }
|
||||
|
||||
can([:create, :publish], MassBuild) {|mass_build| owner?(mass_build.save_to_platform) || local_admin?(mass_build.save_to_platform)}
|
||||
can(:cancel, MassBuild) {|mass_build| (owner?(mass_build.save_to_platform) || local_admin?(mass_build.save_to_platform)) && !mass_build.stop_build}
|
||||
|
||||
can [:read, :projects_list, :projects], Repository, platform: {owner_type: 'User', owner_id: user.id}
|
||||
can [:read, :projects_list, :projects], Repository, platform: {owner_type: 'Group', owner_id: user_group_ids}
|
||||
can([:read, :projects_list, :projects], Repository, read_relations_for('repositories')) {|repository| can? :show, repository.platform}
|
||||
can([:read, :projects_list, :projects], Repository, read_relations_for('repositories', 'platforms')) {|repository| local_reader? repository.platform}
|
||||
can([:create, :edit, :update, :destroy, :projects_list, :projects, :add_project, :remove_project, :regenerate_metadata, :sync_lock_file, :add_repo_lock_file, :remove_repo_lock_file], Repository) {|repository| local_admin? repository.platform}
|
||||
can([:remove_member, :remove_members, :add_member, :signatures, :packages], Repository) {|repository| owner?(repository.platform) || local_admin?(repository.platform)}
|
||||
can([:add_project, :remove_project], Repository) {|repository| repository.members.exists?(id: user.id)}
|
||||
can(:clear, Platform) {|platform| owner?(platform) && platform.personal?}
|
||||
can(:regenerate_metadata, Platform) {|platform| owner?(platform) || local_admin?(platform)}
|
||||
can([:settings, :destroy, :edit, :update], Repository) {|repository| owner? repository.platform}
|
||||
|
||||
can([:create, :destroy], KeyPair) {|key_pair| key_pair.repository.blank? || owner?(key_pair.repository.platform) || local_admin?(key_pair.repository.platform)}
|
||||
|
||||
can([:read, :create, :withdraw], Token) {|token| local_admin?(token.subject)}
|
||||
|
||||
can :read, Product, platform: {owner_type: 'User', owner_id: user.id, platform_type: 'main'}
|
||||
can :read, Product, platform: {owner_type: 'Group', owner_id: user_group_ids, platform_type: 'main'}
|
||||
can(:read, Product, read_relations_for('products', 'platforms')) {|product| product.platform.main?}
|
||||
can([:create, :update, :destroy, :clone], Product) {|product| local_admin? product.platform and product.platform.main?}
|
||||
|
||||
can([:create, :cancel], ProductBuildList) {|pbl| can?(:write, pbl.project)}
|
||||
can([:create, :cancel, :update], ProductBuildList) {|pbl| can?(:update, pbl.product)}
|
||||
can(:destroy, ProductBuildList) {|pbl| can?(:destroy, pbl.product)}
|
||||
|
||||
can :read, Issue, project: {owner_type: 'User', owner_id: user.id}
|
||||
can :read, Issue, project: {owner_type: 'Group', owner_id: user_group_ids}
|
||||
can(:read, Issue, read_relations_for('issues', 'projects')) {|issue| can? :read, issue.project rescue nil}
|
||||
can(:create, Issue) {|issue| can? :read, issue.project}
|
||||
can(:update, Issue) {|issue| issue.user_id == user.id or local_admin?(issue.project)}
|
||||
cannot :manage, Issue, project: {has_issues: false} # switch off issues
|
||||
|
||||
can [:read, :commits, :files], PullRequest, to_project: {owner_type: 'User', owner_id: user.id}
|
||||
can [:read, :commits, :files], PullRequest, to_project: {owner_type: 'Group', owner_id: user_group_ids}
|
||||
can([:read, :commits, :files], PullRequest, read_relations_for('pull_requests', 'to_projects')) {|pull| can? :read, pull.to_project}
|
||||
can :create, PullRequest
|
||||
can(:update, PullRequest) {|pull| pull.user_id == user.id or local_writer?(pull.to_project)}
|
||||
can(:merge, PullRequest) {|pull| local_writer?(pull.to_project)}
|
||||
|
||||
can([:create, :new_line], Comment) {|comment| can? :read, comment.project}
|
||||
can([:update, :destroy], Comment) {|comment| comment.user == user or comment.project.owner == user or local_admin?(comment.project)}
|
||||
cannot :manage, Comment do |c|
|
||||
c.commentable_type == 'Issue' && !c.project.has_issues && !c.commentable.pull_request # when switch off issues
|
||||
end
|
||||
end
|
||||
|
||||
# Shared cannot rights for all users (registered, admin)
|
||||
cannot [:regenerate_metadata, :destroy], Platform, platform_type: 'personal'
|
||||
cannot [:create, :destroy], Repository, platform: {platform_type: 'personal'}, name: 'main'
|
||||
cannot [:packages], Repository, platform: {platform_type: 'personal'}
|
||||
cannot [:remove_member, :remove_members, :add_member, :sync_lock_file, :add_repo_lock_file, :remove_repo_lock_file], Repository, platform: {platform_type: 'personal'}
|
||||
|
||||
cannot :clear, Platform, platform_type: 'main'
|
||||
cannot :destroy, Issue
|
||||
|
||||
cannot [:members, :add_member, :remove_member, :remove_members], Platform, platform_type: 'personal'
|
||||
|
||||
cannot [:create, :update, :destroy, :clone], Product, platform: {platform_type: 'personal'}
|
||||
cannot [:clone], Platform, platform_type: 'personal'
|
||||
|
||||
cannot [:publish, :publish_into_testing], BuildList, new_core: false
|
||||
cannot :create_container, BuildList, new_core: false
|
||||
cannot(:publish, BuildList) {|build_list| !build_list.can_publish? }
|
||||
cannot(:publish_into_testing, BuildList) {|build_list| !build_list.can_publish_into_testing? }
|
||||
cannot :publish_into_testing, BuildList, save_to_platform: {platform_type: 'personal'}
|
||||
|
||||
cannot(:cancel, MassBuild) {|mass_build| mass_build.stop_build}
|
||||
|
||||
if @user.system?
|
||||
can %i(key_pair add_repo_lock_file remove_repo_lock_file), Repository
|
||||
else
|
||||
cannot :key_pair, Repository
|
||||
end
|
||||
|
||||
can :create, Subscribe do |subscribe|
|
||||
!subscribe.subscribeable.subscribes.exists?(user_id: user.id)
|
||||
end
|
||||
can :destroy, Subscribe do |subscribe|
|
||||
subscribe.subscribeable.subscribes.exists?(user_id: user.id) && user.id == subscribe.user_id
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
def read_relations_for(table, parent = nil)
|
||||
key = parent ? "#{parent.singularize}_id" : 'id'
|
||||
parent ||= table
|
||||
|
||||
["#{table}.#{key} = ANY (
|
||||
ARRAY (
|
||||
SELECT target_id
|
||||
FROM relations
|
||||
WHERE relations.target_type = ? AND
|
||||
(relations.actor_type = 'User' AND relations.actor_id = ? OR
|
||||
relations.actor_type = 'Group' AND relations.actor_id IN (?))
|
||||
)
|
||||
)", parent.classify, @user, user_group_ids
|
||||
]
|
||||
end
|
||||
|
||||
def read_relations_with_projects(table = 'projects')
|
||||
key = table == 'projects' ? 'id' : 'project_id'
|
||||
["#{table}.#{key} = ANY (
|
||||
ARRAY (
|
||||
SELECT target_id
|
||||
FROM relations
|
||||
INNER JOIN projects ON projects.id = relations.target_id
|
||||
WHERE relations.target_type = 'Project' AND
|
||||
(
|
||||
projects.owner_type = 'User' AND projects.owner_id != :user OR
|
||||
projects.owner_type = 'Group' AND projects.owner_id NOT IN (:groups)
|
||||
) AND (
|
||||
relations.actor_type = 'User' AND relations.actor_id = :user OR
|
||||
relations.actor_type = 'Group' AND relations.actor_id IN (:groups)
|
||||
)
|
||||
)
|
||||
)", { user: @user, groups: user_group_ids }
|
||||
]
|
||||
end
|
||||
|
||||
def local_reader?(target)
|
||||
%w{reader writer admin}.include? @user.best_role(target)
|
||||
end
|
||||
|
||||
def local_writer?(target)
|
||||
%w{writer admin}.include? @user.best_role(target)
|
||||
end
|
||||
|
||||
def local_admin?(target)
|
||||
@user.best_role(target) == 'admin'
|
||||
end
|
||||
|
||||
def owner?(target)
|
||||
target.owner == @user or user_own_groups.include?(target.owner)
|
||||
end
|
||||
|
||||
def user_own_groups
|
||||
@user_own_groups ||= @user.own_groups
|
||||
end
|
||||
|
||||
def user_group_ids
|
||||
@user_group_ids ||= @user.group_ids
|
||||
end
|
||||
end
|
||||
# # If rules goes one by one CanCan joins them by 'OR' sql operator
|
||||
# # If rule has multiple conditions CanCan joins them by 'AND' sql operator
|
||||
# # WARNING:
|
||||
# # - put cannot rules _after_ can rules and not before!
|
||||
# # - beware inner joins. Use sub queries against them!
|
||||
#
|
||||
# class Ability
|
||||
# include CanCan::Ability
|
||||
#
|
||||
# def initialize(user)
|
||||
# user ||= User.new # guest user (not logged in)
|
||||
# @user = user
|
||||
#
|
||||
# # Shared rights between guests and registered users
|
||||
# can [:show, :archive, :read], Project, visibility: 'open'
|
||||
# can :get_id, Project, visibility: 'open' # api
|
||||
# can(:refs_list, Project) {|project| can? :show, project}
|
||||
# can :read, Issue, project: { visibility: 'open' }
|
||||
# can [:read, :commits, :files], PullRequest, to_project: {visibility: 'open'}
|
||||
# can [:read, :log, :everything], BuildList, project: {visibility: 'open'}
|
||||
# can [:read, :log], ProductBuildList#, product: {platform: {visibility: 'open'}} # double nested hash don't work
|
||||
# can [:read, :search], Advisory
|
||||
# can :read, Statistic
|
||||
#
|
||||
# # Platforms block
|
||||
# can [:show, :members, :advisories], Platform, visibility: 'open'
|
||||
# can :platforms_for_build, Platform, visibility: 'open', platform_type: 'main'
|
||||
# can([:read, :get_list], MassBuild) {|mass_build| can?(:show, mass_build.save_to_platform) }
|
||||
# can [:read, :projects_list, :projects], Repository, platform: {visibility: 'open'}
|
||||
# can :read, Product, platform: {visibility: 'open'}
|
||||
#
|
||||
# can :show, Group
|
||||
# can :show, User
|
||||
# can :possible_forks, Project
|
||||
#
|
||||
# if user.guest? # Guest rights
|
||||
# cannot :index, Project
|
||||
# # can [:new, :create], RegisterRequest
|
||||
# else # Registered user rights
|
||||
# if user.admin?
|
||||
# can :manage, :all
|
||||
# # Protection
|
||||
# cannot :approve, RegisterRequest, approved: true
|
||||
# cannot :reject, RegisterRequest, rejected: true
|
||||
# cannot [:destroy, :create], Subscribe
|
||||
# # Act admin as simple user
|
||||
# cannot :read, Product, platform: {platform_type: 'personal'}
|
||||
# cannot [:owned, :related], [BuildList, Platform]
|
||||
# cannot :membered, Project # list products which user members
|
||||
# end
|
||||
#
|
||||
# if user.user?
|
||||
# can :edit, User, id: user.id
|
||||
# can [:read, :create], Group
|
||||
# can [:update, :manage_members, :members, :add_member, :remove_member, :remove_members, :update_member], Group do |group|
|
||||
# group.actors.exists?(actor_type: 'User', actor_id: user.id, role: 'admin') # or group.owner_id = user.id
|
||||
# end
|
||||
# can :write, Group do |group|
|
||||
# group.actors.exists?(actor_type: 'User', actor_id: user.id, role: ['writer', 'admin'])
|
||||
# end
|
||||
# can :destroy, Group, owner_id: user.id
|
||||
# can :remove_user, Group
|
||||
#
|
||||
# can :create, Project
|
||||
# can([:mass_import, :run_mass_import], Project) if user.platforms.main.find{ |p| local_admin?(p) }.present?
|
||||
# can :read, Project, visibility: 'open'
|
||||
# can [:read, :archive, :membered, :get_id], Project, owner_type: 'User', owner_id: user.id
|
||||
# can [:read, :archive, :membered, :get_id], Project, owner_type: 'Group', owner_id: user_group_ids
|
||||
# # can([:read, :archive, :membered, :get_id], Project, read_relations_for('projects')) {|project| local_reader? project}
|
||||
# can([:read, :archive, :membered, :get_id], Project, read_relations_with_projects) {|project| local_reader? project}
|
||||
# can(:write, Project) {|project| local_writer? project} # for grack
|
||||
# can [:update, :sections, :manage_collaborators, :autocomplete_maintainers, :add_member, :remove_member, :remove_members, :update_member, :members, :schedule], Project do |project|
|
||||
# local_admin? project
|
||||
# end
|
||||
#
|
||||
# can(:fork, Project) {|project| can? :read, project}
|
||||
# can(:alias, Project) {|project| local_admin?(project) }
|
||||
#
|
||||
# can(:destroy, Project) {|project| owner? project}
|
||||
# can(:destroy, Project) {|project| project.owner_type == 'Group' and project.owner.actors.exists?(actor_type: 'User', actor_id: user.id, role: 'admin')}
|
||||
# can :remove_user, Project
|
||||
# can :preview, Project
|
||||
#
|
||||
# can([:read, :create, :edit, :destroy, :update], Hook) {|hook| can?(:edit, hook.project)}
|
||||
#
|
||||
# can [:read, :log, :owned, :everything], BuildList, user_id: user.id
|
||||
# can [:read, :log, :related, :everything], BuildList, project: {owner_type: 'User', owner_id: user.id}
|
||||
# can [:read, :log, :related, :everything], BuildList, project: {owner_type: 'Group', owner_id: user_group_ids}
|
||||
# # can([:read, :log, :everything, :list], BuildList, read_relations_for('build_lists', 'projects')) {|build_list| can? :read, build_list.project}
|
||||
# # can([:read, :log, :everything, :list], BuildList, read_relations_for_build_lists_and_projects) {|build_list| can? :read, build_list.project}
|
||||
# can([:read, :log, :everything, :list], BuildList, read_relations_with_projects('build_lists')) {|build_list| can? :read, build_list.project}
|
||||
#
|
||||
# can(:publish_into_testing, BuildList) { |build_list| ( can?(:create, build_list) || can?(:publish, build_list) ) && build_list.save_to_platform.main? }
|
||||
# can([:create, :rerun_tests], BuildList) {|build_list|
|
||||
# build_list.project.is_package &&
|
||||
# can?(:write, build_list.project) &&
|
||||
# (build_list.build_for_platform.blank? || can?(:show, build_list.build_for_platform))
|
||||
# }
|
||||
#
|
||||
# can(:publish, BuildList) do |build_list|
|
||||
# if build_list.build_published?
|
||||
# local_admin?(build_list.save_to_platform) || build_list.save_to_repository.members.exists?(id: user.id)
|
||||
# else
|
||||
# build_list.save_to_repository.publish_without_qa ?
|
||||
# can?(:write, build_list.project) : local_admin?(build_list.save_to_platform)
|
||||
# end
|
||||
# end
|
||||
# can(:create_container, BuildList) do |build_list|
|
||||
# local_admin?(build_list.save_to_platform)
|
||||
# end
|
||||
# can(:reject_publish, BuildList) do |build_list|
|
||||
# build_list.save_to_repository.publish_without_qa ?
|
||||
# can?(:write, build_list.project) : local_admin?(build_list.save_to_platform)
|
||||
# end
|
||||
# can([:cancel, :create_container], BuildList) {|build_list| can?(:write, build_list.project)}
|
||||
#
|
||||
# can [:read, :owned, :related, :members], Platform, owner_type: 'User', owner_id: user.id
|
||||
# can [:read, :related, :members], Platform, owner_type: 'Group', owner_id: user_group_ids
|
||||
# can([:read, :related, :members], Platform, read_relations_for('platforms')) {|platform| local_reader? platform}
|
||||
# can [:read, :related], Platform, id: user.repositories.pluck(:platform_id)
|
||||
# can([:update, :destroy, :change_visibility], Platform) {|platform| owner?(platform) }
|
||||
# can([:local_admin_manage, :members, :add_member, :remove_member, :remove_members, :remove_file] , Platform) {|platform| owner?(platform) || local_admin?(platform) }
|
||||
#
|
||||
# can([:create, :publish], MassBuild) {|mass_build| owner?(mass_build.save_to_platform) || local_admin?(mass_build.save_to_platform)}
|
||||
# can(:cancel, MassBuild) {|mass_build| (owner?(mass_build.save_to_platform) || local_admin?(mass_build.save_to_platform)) && !mass_build.stop_build}
|
||||
#
|
||||
# can [:read, :projects_list, :projects], Repository, platform: {owner_type: 'User', owner_id: user.id}
|
||||
# can [:read, :projects_list, :projects], Repository, platform: {owner_type: 'Group', owner_id: user_group_ids}
|
||||
# can([:read, :projects_list, :projects], Repository, read_relations_for('repositories')) {|repository| can? :show, repository.platform}
|
||||
# can([:read, :projects_list, :projects], Repository, read_relations_for('repositories', 'platforms')) {|repository| local_reader? repository.platform}
|
||||
# can([:create, :edit, :update, :destroy, :projects_list, :projects, :add_project, :remove_project, :regenerate_metadata, :sync_lock_file, :add_repo_lock_file, :remove_repo_lock_file], Repository) {|repository| local_admin? repository.platform}
|
||||
# can([:remove_member, :remove_members, :add_member, :signatures, :packages], Repository) {|repository| owner?(repository.platform) || local_admin?(repository.platform)}
|
||||
# can([:add_project, :remove_project], Repository) {|repository| repository.members.exists?(id: user.id)}
|
||||
# can(:clear, Platform) {|platform| owner?(platform) && platform.personal?}
|
||||
# can(:regenerate_metadata, Platform) {|platform| owner?(platform) || local_admin?(platform)}
|
||||
# can([:settings, :destroy, :edit, :update], Repository) {|repository| owner? repository.platform}
|
||||
#
|
||||
# can([:create, :destroy], KeyPair) {|key_pair| key_pair.repository.blank? || owner?(key_pair.repository.platform) || local_admin?(key_pair.repository.platform)}
|
||||
#
|
||||
# can([:read, :create, :withdraw], Token) {|token| local_admin?(token.subject)}
|
||||
#
|
||||
# can :read, Product, platform: {owner_type: 'User', owner_id: user.id, platform_type: 'main'}
|
||||
# can :read, Product, platform: {owner_type: 'Group', owner_id: user_group_ids, platform_type: 'main'}
|
||||
# can(:read, Product, read_relations_for('products', 'platforms')) {|product| product.platform.main?}
|
||||
# can([:create, :update, :destroy, :clone], Product) {|product| local_admin? product.platform and product.platform.main?}
|
||||
#
|
||||
# can([:create, :cancel], ProductBuildList) {|pbl| can?(:write, pbl.project)}
|
||||
# can([:create, :cancel, :update], ProductBuildList) {|pbl| can?(:update, pbl.product)}
|
||||
# can(:destroy, ProductBuildList) {|pbl| can?(:destroy, pbl.product)}
|
||||
#
|
||||
# can :read, Issue, project: {owner_type: 'User', owner_id: user.id}
|
||||
# can :read, Issue, project: {owner_type: 'Group', owner_id: user_group_ids}
|
||||
# can(:read, Issue, read_relations_for('issues', 'projects')) {|issue| can? :read, issue.project rescue nil}
|
||||
# can(:create, Issue) {|issue| can? :read, issue.project}
|
||||
# can(:update, Issue) {|issue| issue.user_id == user.id or local_admin?(issue.project)}
|
||||
# cannot :manage, Issue, project: {has_issues: false} # switch off issues
|
||||
#
|
||||
# can [:read, :commits, :files], PullRequest, to_project: {owner_type: 'User', owner_id: user.id}
|
||||
# can [:read, :commits, :files], PullRequest, to_project: {owner_type: 'Group', owner_id: user_group_ids}
|
||||
# can([:read, :commits, :files], PullRequest, read_relations_for('pull_requests', 'to_projects')) {|pull| can? :read, pull.to_project}
|
||||
# can :create, PullRequest
|
||||
# can(:update, PullRequest) {|pull| pull.user_id == user.id or local_writer?(pull.to_project)}
|
||||
# can(:merge, PullRequest) {|pull| local_writer?(pull.to_project)}
|
||||
#
|
||||
# can([:create, :new_line], Comment) {|comment| can? :read, comment.project}
|
||||
# can([:update, :destroy], Comment) {|comment| comment.user == user or comment.project.owner == user or local_admin?(comment.project)}
|
||||
# cannot :manage, Comment do |c|
|
||||
# c.commentable_type == 'Issue' && !c.project.has_issues && !c.commentable.pull_request # when switch off issues
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# # Shared cannot rights for all users (registered, admin)
|
||||
# cannot [:regenerate_metadata, :destroy], Platform, platform_type: 'personal'
|
||||
# cannot [:create, :destroy], Repository, platform: {platform_type: 'personal'}, name: 'main'
|
||||
# cannot [:packages], Repository, platform: {platform_type: 'personal'}
|
||||
# cannot [:remove_member, :remove_members, :add_member, :sync_lock_file, :add_repo_lock_file, :remove_repo_lock_file], Repository, platform: {platform_type: 'personal'}
|
||||
#
|
||||
# cannot :clear, Platform, platform_type: 'main'
|
||||
# cannot :destroy, Issue
|
||||
#
|
||||
# cannot [:members, :add_member, :remove_member, :remove_members], Platform, platform_type: 'personal'
|
||||
#
|
||||
# cannot [:create, :update, :destroy, :clone], Product, platform: {platform_type: 'personal'}
|
||||
# cannot [:clone], Platform, platform_type: 'personal'
|
||||
#
|
||||
# cannot [:publish, :publish_into_testing], BuildList, new_core: false
|
||||
# cannot :create_container, BuildList, new_core: false
|
||||
# cannot(:publish, BuildList) {|build_list| !build_list.can_publish? }
|
||||
# cannot(:publish_into_testing, BuildList) {|build_list| !build_list.can_publish_into_testing? }
|
||||
# cannot :publish_into_testing, BuildList, save_to_platform: {platform_type: 'personal'}
|
||||
#
|
||||
# cannot(:cancel, MassBuild) {|mass_build| mass_build.stop_build}
|
||||
#
|
||||
# if @user.system?
|
||||
# can %i(key_pair add_repo_lock_file remove_repo_lock_file), Repository
|
||||
# else
|
||||
# cannot :key_pair, Repository
|
||||
# end
|
||||
#
|
||||
# can :create, Subscribe do |subscribe|
|
||||
# !subscribe.subscribeable.subscribes.exists?(user_id: user.id)
|
||||
# end
|
||||
# can :destroy, Subscribe do |subscribe|
|
||||
# subscribe.subscribeable.subscribes.exists?(user_id: user.id) && user.id == subscribe.user_id
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# def read_relations_for(table, parent = nil)
|
||||
# key = parent ? "#{parent.singularize}_id" : 'id'
|
||||
# parent ||= table
|
||||
#
|
||||
# ["#{table}.#{key} = ANY (
|
||||
# ARRAY (
|
||||
# SELECT target_id
|
||||
# FROM relations
|
||||
# WHERE relations.target_type = ? AND
|
||||
# (relations.actor_type = 'User' AND relations.actor_id = ? OR
|
||||
# relations.actor_type = 'Group' AND relations.actor_id IN (?))
|
||||
# )
|
||||
# )", parent.classify, @user, user_group_ids
|
||||
# ]
|
||||
# end
|
||||
#
|
||||
# def read_relations_with_projects(table = 'projects')
|
||||
# key = table == 'projects' ? 'id' : 'project_id'
|
||||
# ["#{table}.#{key} = ANY (
|
||||
# ARRAY (
|
||||
# SELECT target_id
|
||||
# FROM relations
|
||||
# INNER JOIN projects ON projects.id = relations.target_id
|
||||
# WHERE relations.target_type = 'Project' AND
|
||||
# (
|
||||
# projects.owner_type = 'User' AND projects.owner_id != :user OR
|
||||
# projects.owner_type = 'Group' AND projects.owner_id NOT IN (:groups)
|
||||
# ) AND (
|
||||
# relations.actor_type = 'User' AND relations.actor_id = :user OR
|
||||
# relations.actor_type = 'Group' AND relations.actor_id IN (:groups)
|
||||
# )
|
||||
# )
|
||||
# )", { user: @user, groups: user_group_ids }
|
||||
# ]
|
||||
# end
|
||||
#
|
||||
# def local_reader?(target)
|
||||
# %w{reader writer admin}.include? @user.best_role(target)
|
||||
# end
|
||||
#
|
||||
# def local_writer?(target)
|
||||
# %w{writer admin}.include? @user.best_role(target)
|
||||
# end
|
||||
#
|
||||
# def local_admin?(target)
|
||||
# @user.best_role(target) == 'admin'
|
||||
# end
|
||||
#
|
||||
# def owner?(target)
|
||||
# target.owner == @user or user_own_groups.include?(target.owner)
|
||||
# end
|
||||
#
|
||||
# def user_own_groups
|
||||
# @user_own_groups ||= @user.own_groups
|
||||
# end
|
||||
#
|
||||
# def user_group_ids
|
||||
# @user_group_ids ||= @user.group_ids
|
||||
# end
|
||||
# end
|
||||
|
|
|
@ -84,6 +84,8 @@ end
|
|||
|
||||
# Block admin access to non-admin-users.
|
||||
ActiveAdmin::BaseController.class_eval do
|
||||
skip_after_action :verify_authorized
|
||||
|
||||
# include ActionController::Caching::Sweeping
|
||||
protected
|
||||
def check_admin_role
|
||||
|
|
|
@ -1,360 +1,360 @@
|
|||
require 'spec_helper'
|
||||
require "cancan/matchers"
|
||||
|
||||
def admin_create
|
||||
@admin = FactoryGirl.create(:admin)
|
||||
@ability = Ability.new(@admin)
|
||||
end
|
||||
|
||||
def user_create
|
||||
@user = FactoryGirl.create(:user)
|
||||
@ability = Ability.new(@user)
|
||||
end
|
||||
|
||||
def guest_create
|
||||
@ability = Ability.new(User.new)
|
||||
end
|
||||
|
||||
describe CanCan do
|
||||
let(:open_platform) { FactoryGirl.create(:platform, visibility: 'open') }
|
||||
|
||||
before(:each) do
|
||||
stub_symlink_methods
|
||||
end
|
||||
|
||||
context 'Site admin' do
|
||||
let(:personal_platform) { FactoryGirl.create(:platform, platform_type: 'personal') }
|
||||
let(:personal_repository_main) { FactoryGirl.create(:personal_repository, name: 'main') }
|
||||
let(:personal_repository) { FactoryGirl.create(:personal_repository) }
|
||||
before(:each) do
|
||||
admin_create
|
||||
end
|
||||
|
||||
it 'should manage all' do
|
||||
#(@ability.can? :manage, :all).should be_truthy
|
||||
@ability.should be_able_to(:manage, :all)
|
||||
end
|
||||
|
||||
it 'should not be able to destroy personal platforms' do
|
||||
@ability.should_not be_able_to(:destroy, personal_platform)
|
||||
end
|
||||
|
||||
it 'should not be able to destroy personal repositories with name "main"' do
|
||||
@ability.should_not be_able_to(:destroy, personal_repository_main)
|
||||
end
|
||||
it 'should be able to destroy personal repositories with name not "main"' do
|
||||
@ability.should be_able_to(:destroy, personal_repository)
|
||||
end
|
||||
end
|
||||
|
||||
context 'Site guest' do
|
||||
let(:register_request) { FactoryGirl.create(:register_request) }
|
||||
|
||||
before(:each) do
|
||||
guest_create
|
||||
end
|
||||
|
||||
it 'should not be able to read open platform' do
|
||||
@ability.should_not be_able_to(:read, open_platform)
|
||||
end
|
||||
|
||||
[:publish, :cancel, :reject_publish, :create_container].each do |action|
|
||||
it "should not be able to #{ action } build list" do
|
||||
@ability.should_not be_able_to(action, BuildList)
|
||||
end
|
||||
end
|
||||
|
||||
[:mass_import, :run_mass_import].each do |action|
|
||||
it "should not be able to #{ action } project" do
|
||||
@ability.should_not be_able_to(action, Project)
|
||||
end
|
||||
end
|
||||
|
||||
it 'should not be able to update register request' do
|
||||
@ability.should_not be_able_to(:update, register_request)
|
||||
end
|
||||
|
||||
it 'should not be able to list register requests' do
|
||||
@ability.should_not be_able_to(:read, register_request)
|
||||
end
|
||||
|
||||
it 'should not be able to destroy register requests' do
|
||||
@ability.should_not be_able_to(:destroy, register_request)
|
||||
end
|
||||
|
||||
pending 'should be able to register new user' do # while self registration is closed
|
||||
@ability.should be_able_to(:create, User)
|
||||
end
|
||||
end
|
||||
|
||||
context 'Site user' do
|
||||
before(:each) do
|
||||
user_create
|
||||
end
|
||||
|
||||
[Platform, Repository].each do |model_name|
|
||||
it "should be able to read #{model_name}" do
|
||||
@ability.should be_able_to(:read, model_name)
|
||||
end
|
||||
end
|
||||
|
||||
[:mass_import, :run_mass_import].each do |action|
|
||||
it "should not be able to #{ action } project" do
|
||||
@ability.should_not be_able_to(action, Project)
|
||||
end
|
||||
end
|
||||
|
||||
it "shoud be able to show user profile" do
|
||||
@ability.should be_able_to(:show, User)
|
||||
end
|
||||
|
||||
it "shoud be able to read another user object" do
|
||||
admin_create
|
||||
@ability.should be_able_to(:read, @admin)
|
||||
end
|
||||
|
||||
it "shoud be able to read open projects" do
|
||||
@project = FactoryGirl.create(:project, visibility: 'open')
|
||||
@ability.should be_able_to(:read, @project)
|
||||
end
|
||||
|
||||
it 'should be able to see open platform' do
|
||||
@ability.should be_able_to(:show, open_platform)
|
||||
end
|
||||
|
||||
it "shoud be able to create project" do
|
||||
@ability.should be_able_to(:create, Project)
|
||||
end
|
||||
|
||||
it "should not be able to manage register requests" do
|
||||
@ability.should_not be_able_to(:manage, RegisterRequest)
|
||||
end
|
||||
|
||||
context 'as project collaborator' do
|
||||
before(:each) do
|
||||
@project = FactoryGirl.create(:project_with_commit)
|
||||
@issue = FactoryGirl.create(:issue, project_id: @project.id)
|
||||
end
|
||||
|
||||
context 'with read rights' do
|
||||
before(:each) do
|
||||
create_relation(@project, @user, 'reader')
|
||||
end
|
||||
|
||||
it 'should be able to read project' do
|
||||
@ability.should be_able_to(:read, @project)
|
||||
end
|
||||
|
||||
it 'should be able to read issue' do
|
||||
@ability.should be_able_to(:read, @issue)
|
||||
end
|
||||
end
|
||||
|
||||
context 'with writer rights' do
|
||||
before(:each) do
|
||||
create_relation(@project, @user, 'writer')
|
||||
end
|
||||
|
||||
[:read, :create, :new].each do |action|
|
||||
it "should be able to #{ action } project" do
|
||||
@ability.should be_able_to(action, @project)
|
||||
end
|
||||
end
|
||||
|
||||
[:new, :create].each do |action|
|
||||
it "should be able to #{action} build_list" do
|
||||
@build_list = FactoryGirl.create(:build_list_with_attaching_project, project: @project)
|
||||
@ability.should be_able_to(action, @build_list)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'with admin rights' do
|
||||
before(:each) do
|
||||
create_relation(@project, @user, 'admin')
|
||||
end
|
||||
|
||||
[:read, :update].each do |action|
|
||||
it "should be able to #{ action } project" do
|
||||
@ability.should be_able_to(action, @project)
|
||||
end
|
||||
end
|
||||
|
||||
[:new, :create].each do |action|
|
||||
it "should be able to #{action} build_list" do
|
||||
@build_list = FactoryGirl.create(:build_list_with_attaching_project, project: @project)
|
||||
@ability.should be_able_to(action, @build_list)
|
||||
end
|
||||
end
|
||||
|
||||
it "should be able to manage collaborators of project" do
|
||||
@ability.should be_able_to(:manage_collaborators, @project)
|
||||
end
|
||||
|
||||
[:read, :create, :new, :update, :edit].each do |action|
|
||||
it "should be able to #{ action } issue" do
|
||||
@ability.should be_able_to(action, @issue)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'with owner rights' do
|
||||
before(:each) do
|
||||
@project = FactoryGirl.create(:project_with_commit, owner: @user)
|
||||
@issue = FactoryGirl.create(:issue, project_id: @project.id)
|
||||
end
|
||||
|
||||
[:read, :update, :destroy].each do |action|
|
||||
it "should be able to #{ action } project" do
|
||||
@ability.should be_able_to(action, @project)
|
||||
end
|
||||
end
|
||||
|
||||
[:new, :create].each do |action|
|
||||
it "should be able to #{action} build_list" do
|
||||
@build_list = FactoryGirl.create(:build_list_with_attaching_project, project: @project)
|
||||
@ability.should be_able_to(action, @build_list)
|
||||
end
|
||||
end
|
||||
|
||||
[:read, :update, :edit].each do |action|
|
||||
it "should be able to #{ action } issue" do
|
||||
@ability.should be_able_to(action, @issue)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'through group-member' do
|
||||
before(:each) do
|
||||
@group_member = FactoryGirl.create(:group)
|
||||
create_relation(@project, @group_member, 'reader')
|
||||
@group_member_ability = Ability.new(@group_member.owner)
|
||||
end
|
||||
|
||||
it 'should be able to read open project' do
|
||||
@group_member_ability.should be_able_to(:read, @project)
|
||||
end
|
||||
|
||||
it 'should be able to read closed project' do
|
||||
@project.update_attribute :visibility, 'hidden'
|
||||
@group_member_ability.should be_able_to(:read, @project)
|
||||
end
|
||||
|
||||
it 'should include hidden project in list' do
|
||||
@project.update_attribute :visibility, 'hidden'
|
||||
Project.accessible_by(@group_member_ability, :show).where(projects: {id: @project.id}).count.should == 1
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'platform relations' do
|
||||
before(:each) do
|
||||
@platform = FactoryGirl.create(:platform)
|
||||
end
|
||||
|
||||
context 'with owner rights' do
|
||||
before(:each) do
|
||||
@platform.owner = @user
|
||||
@platform.save
|
||||
@ability = Ability.new(@user)
|
||||
end
|
||||
|
||||
[:mass_import, :run_mass_import].each do |action|
|
||||
it "should be able to #{ action } project" do
|
||||
@ability.should be_able_to(action, Project)
|
||||
end
|
||||
end
|
||||
|
||||
[:read, :update, :destroy, :change_visibility].each do |action|
|
||||
it "should be able to #{action} platform" do
|
||||
@ability.should be_able_to(action, @platform)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'with read rights' do
|
||||
before(:each) do
|
||||
create_relation(@platform, @user, 'reader')
|
||||
@ability = Ability.new(@user)
|
||||
end
|
||||
|
||||
[:mass_import, :run_mass_import].each do |action|
|
||||
it "should not be able to #{ action } project" do
|
||||
@ability.should_not be_able_to(action, Project)
|
||||
end
|
||||
end
|
||||
|
||||
it "should be able to read platform" do
|
||||
@ability.should be_able_to(:read, @platform)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'repository relations' do
|
||||
before(:each) do
|
||||
@repository = FactoryGirl.create(:repository)
|
||||
end
|
||||
|
||||
context 'with owner rights' do
|
||||
before(:each) do
|
||||
@repository.platform.owner = @user
|
||||
@repository.platform.save
|
||||
end
|
||||
|
||||
[:read, :create, :update, :destroy, :add_project, :remove_project, :settings].each do |action|
|
||||
it "should be able to #{action} repository" do
|
||||
@ability.should be_able_to(action, @repository)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'with read rights' do
|
||||
before(:each) do
|
||||
create_relation(@repository.platform, @user, 'reader')
|
||||
end
|
||||
|
||||
it "should be able to read repository" do
|
||||
@ability.should be_able_to(:read, @repository)
|
||||
end
|
||||
end
|
||||
end # 'repository relations'
|
||||
|
||||
context 'product build list relations' do
|
||||
let(:product_build_list) { FactoryGirl.create(:product_build_list) }
|
||||
|
||||
before { FactoryGirl.create(:arch, name: 'x86_64') }
|
||||
|
||||
context 'with platform admin rights' do
|
||||
before do
|
||||
product_build_list.product.platform.owner = @user
|
||||
product_build_list.product.platform.save
|
||||
end
|
||||
|
||||
[:read, :create, :update, :destroy, :log, :cancel].each do |action|
|
||||
it "should be able to #{action} product build list" do
|
||||
@ability.should be_able_to(action, product_build_list)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'with project writer rights' do
|
||||
before do
|
||||
create_relation(product_build_list.project, @user, 'writer')
|
||||
end
|
||||
|
||||
[:read, :create, :log, :cancel].each do |action|
|
||||
it "should be able to #{action} product build list" do
|
||||
@ability.should be_able_to(action, product_build_list)
|
||||
end
|
||||
end
|
||||
|
||||
[:update, :destroy].each do |action|
|
||||
it "should not be able to #{action} product build list" do
|
||||
@ability.should_not be_able_to(action, product_build_list)
|
||||
end
|
||||
end
|
||||
end
|
||||
end # 'product build list relations'
|
||||
|
||||
end # 'Site user'
|
||||
end
|
||||
# require 'spec_helper'
|
||||
# require "cancan/matchers"
|
||||
#
|
||||
# def admin_create
|
||||
# @admin = FactoryGirl.create(:admin)
|
||||
# @ability = Ability.new(@admin)
|
||||
# end
|
||||
#
|
||||
# def user_create
|
||||
# @user = FactoryGirl.create(:user)
|
||||
# @ability = Ability.new(@user)
|
||||
# end
|
||||
#
|
||||
# def guest_create
|
||||
# @ability = Ability.new(User.new)
|
||||
# end
|
||||
#
|
||||
# describe CanCan do
|
||||
# let(:open_platform) { FactoryGirl.create(:platform, visibility: 'open') }
|
||||
#
|
||||
# before(:each) do
|
||||
# stub_symlink_methods
|
||||
# end
|
||||
#
|
||||
# context 'Site admin' do
|
||||
# let(:personal_platform) { FactoryGirl.create(:platform, platform_type: 'personal') }
|
||||
# let(:personal_repository_main) { FactoryGirl.create(:personal_repository, name: 'main') }
|
||||
# let(:personal_repository) { FactoryGirl.create(:personal_repository) }
|
||||
# before(:each) do
|
||||
# admin_create
|
||||
# end
|
||||
#
|
||||
# it 'should manage all' do
|
||||
# #(@ability.can? :manage, :all).should be_truthy
|
||||
# @ability.should be_able_to(:manage, :all)
|
||||
# end
|
||||
#
|
||||
# it 'should not be able to destroy personal platforms' do
|
||||
# @ability.should_not be_able_to(:destroy, personal_platform)
|
||||
# end
|
||||
#
|
||||
# it 'should not be able to destroy personal repositories with name "main"' do
|
||||
# @ability.should_not be_able_to(:destroy, personal_repository_main)
|
||||
# end
|
||||
# it 'should be able to destroy personal repositories with name not "main"' do
|
||||
# @ability.should be_able_to(:destroy, personal_repository)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'Site guest' do
|
||||
# let(:register_request) { FactoryGirl.create(:register_request) }
|
||||
#
|
||||
# before(:each) do
|
||||
# guest_create
|
||||
# end
|
||||
#
|
||||
# it 'should not be able to read open platform' do
|
||||
# @ability.should_not be_able_to(:read, open_platform)
|
||||
# end
|
||||
#
|
||||
# [:publish, :cancel, :reject_publish, :create_container].each do |action|
|
||||
# it "should not be able to #{ action } build list" do
|
||||
# @ability.should_not be_able_to(action, BuildList)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# [:mass_import, :run_mass_import].each do |action|
|
||||
# it "should not be able to #{ action } project" do
|
||||
# @ability.should_not be_able_to(action, Project)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# it 'should not be able to update register request' do
|
||||
# @ability.should_not be_able_to(:update, register_request)
|
||||
# end
|
||||
#
|
||||
# it 'should not be able to list register requests' do
|
||||
# @ability.should_not be_able_to(:read, register_request)
|
||||
# end
|
||||
#
|
||||
# it 'should not be able to destroy register requests' do
|
||||
# @ability.should_not be_able_to(:destroy, register_request)
|
||||
# end
|
||||
#
|
||||
# pending 'should be able to register new user' do # while self registration is closed
|
||||
# @ability.should be_able_to(:create, User)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'Site user' do
|
||||
# before(:each) do
|
||||
# user_create
|
||||
# end
|
||||
#
|
||||
# [Platform, Repository].each do |model_name|
|
||||
# it "should be able to read #{model_name}" do
|
||||
# @ability.should be_able_to(:read, model_name)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# [:mass_import, :run_mass_import].each do |action|
|
||||
# it "should not be able to #{ action } project" do
|
||||
# @ability.should_not be_able_to(action, Project)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# it "shoud be able to show user profile" do
|
||||
# @ability.should be_able_to(:show, User)
|
||||
# end
|
||||
#
|
||||
# it "shoud be able to read another user object" do
|
||||
# admin_create
|
||||
# @ability.should be_able_to(:read, @admin)
|
||||
# end
|
||||
#
|
||||
# it "shoud be able to read open projects" do
|
||||
# @project = FactoryGirl.create(:project, visibility: 'open')
|
||||
# @ability.should be_able_to(:read, @project)
|
||||
# end
|
||||
#
|
||||
# it 'should be able to see open platform' do
|
||||
# @ability.should be_able_to(:show, open_platform)
|
||||
# end
|
||||
#
|
||||
# it "shoud be able to create project" do
|
||||
# @ability.should be_able_to(:create, Project)
|
||||
# end
|
||||
#
|
||||
# it "should not be able to manage register requests" do
|
||||
# @ability.should_not be_able_to(:manage, RegisterRequest)
|
||||
# end
|
||||
#
|
||||
# context 'as project collaborator' do
|
||||
# before(:each) do
|
||||
# @project = FactoryGirl.create(:project_with_commit)
|
||||
# @issue = FactoryGirl.create(:issue, project_id: @project.id)
|
||||
# end
|
||||
#
|
||||
# context 'with read rights' do
|
||||
# before(:each) do
|
||||
# create_relation(@project, @user, 'reader')
|
||||
# end
|
||||
#
|
||||
# it 'should be able to read project' do
|
||||
# @ability.should be_able_to(:read, @project)
|
||||
# end
|
||||
#
|
||||
# it 'should be able to read issue' do
|
||||
# @ability.should be_able_to(:read, @issue)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'with writer rights' do
|
||||
# before(:each) do
|
||||
# create_relation(@project, @user, 'writer')
|
||||
# end
|
||||
#
|
||||
# [:read, :create, :new].each do |action|
|
||||
# it "should be able to #{ action } project" do
|
||||
# @ability.should be_able_to(action, @project)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# [:new, :create].each do |action|
|
||||
# it "should be able to #{action} build_list" do
|
||||
# @build_list = FactoryGirl.create(:build_list_with_attaching_project, project: @project)
|
||||
# @ability.should be_able_to(action, @build_list)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'with admin rights' do
|
||||
# before(:each) do
|
||||
# create_relation(@project, @user, 'admin')
|
||||
# end
|
||||
#
|
||||
# [:read, :update].each do |action|
|
||||
# it "should be able to #{ action } project" do
|
||||
# @ability.should be_able_to(action, @project)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# [:new, :create].each do |action|
|
||||
# it "should be able to #{action} build_list" do
|
||||
# @build_list = FactoryGirl.create(:build_list_with_attaching_project, project: @project)
|
||||
# @ability.should be_able_to(action, @build_list)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# it "should be able to manage collaborators of project" do
|
||||
# @ability.should be_able_to(:manage_collaborators, @project)
|
||||
# end
|
||||
#
|
||||
# [:read, :create, :new, :update, :edit].each do |action|
|
||||
# it "should be able to #{ action } issue" do
|
||||
# @ability.should be_able_to(action, @issue)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'with owner rights' do
|
||||
# before(:each) do
|
||||
# @project = FactoryGirl.create(:project_with_commit, owner: @user)
|
||||
# @issue = FactoryGirl.create(:issue, project_id: @project.id)
|
||||
# end
|
||||
#
|
||||
# [:read, :update, :destroy].each do |action|
|
||||
# it "should be able to #{ action } project" do
|
||||
# @ability.should be_able_to(action, @project)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# [:new, :create].each do |action|
|
||||
# it "should be able to #{action} build_list" do
|
||||
# @build_list = FactoryGirl.create(:build_list_with_attaching_project, project: @project)
|
||||
# @ability.should be_able_to(action, @build_list)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# [:read, :update, :edit].each do |action|
|
||||
# it "should be able to #{ action } issue" do
|
||||
# @ability.should be_able_to(action, @issue)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'through group-member' do
|
||||
# before(:each) do
|
||||
# @group_member = FactoryGirl.create(:group)
|
||||
# create_relation(@project, @group_member, 'reader')
|
||||
# @group_member_ability = Ability.new(@group_member.owner)
|
||||
# end
|
||||
#
|
||||
# it 'should be able to read open project' do
|
||||
# @group_member_ability.should be_able_to(:read, @project)
|
||||
# end
|
||||
#
|
||||
# it 'should be able to read closed project' do
|
||||
# @project.update_attribute :visibility, 'hidden'
|
||||
# @group_member_ability.should be_able_to(:read, @project)
|
||||
# end
|
||||
#
|
||||
# it 'should include hidden project in list' do
|
||||
# @project.update_attribute :visibility, 'hidden'
|
||||
# Project.accessible_by(@group_member_ability, :show).where(projects: {id: @project.id}).count.should == 1
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'platform relations' do
|
||||
# before(:each) do
|
||||
# @platform = FactoryGirl.create(:platform)
|
||||
# end
|
||||
#
|
||||
# context 'with owner rights' do
|
||||
# before(:each) do
|
||||
# @platform.owner = @user
|
||||
# @platform.save
|
||||
# @ability = Ability.new(@user)
|
||||
# end
|
||||
#
|
||||
# [:mass_import, :run_mass_import].each do |action|
|
||||
# it "should be able to #{ action } project" do
|
||||
# @ability.should be_able_to(action, Project)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# [:read, :update, :destroy, :change_visibility].each do |action|
|
||||
# it "should be able to #{action} platform" do
|
||||
# @ability.should be_able_to(action, @platform)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'with read rights' do
|
||||
# before(:each) do
|
||||
# create_relation(@platform, @user, 'reader')
|
||||
# @ability = Ability.new(@user)
|
||||
# end
|
||||
#
|
||||
# [:mass_import, :run_mass_import].each do |action|
|
||||
# it "should not be able to #{ action } project" do
|
||||
# @ability.should_not be_able_to(action, Project)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# it "should be able to read platform" do
|
||||
# @ability.should be_able_to(:read, @platform)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'repository relations' do
|
||||
# before(:each) do
|
||||
# @repository = FactoryGirl.create(:repository)
|
||||
# end
|
||||
#
|
||||
# context 'with owner rights' do
|
||||
# before(:each) do
|
||||
# @repository.platform.owner = @user
|
||||
# @repository.platform.save
|
||||
# end
|
||||
#
|
||||
# [:read, :create, :update, :destroy, :add_project, :remove_project, :settings].each do |action|
|
||||
# it "should be able to #{action} repository" do
|
||||
# @ability.should be_able_to(action, @repository)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'with read rights' do
|
||||
# before(:each) do
|
||||
# create_relation(@repository.platform, @user, 'reader')
|
||||
# end
|
||||
#
|
||||
# it "should be able to read repository" do
|
||||
# @ability.should be_able_to(:read, @repository)
|
||||
# end
|
||||
# end
|
||||
# end # 'repository relations'
|
||||
#
|
||||
# context 'product build list relations' do
|
||||
# let(:product_build_list) { FactoryGirl.create(:product_build_list) }
|
||||
#
|
||||
# before { FactoryGirl.create(:arch, name: 'x86_64') }
|
||||
#
|
||||
# context 'with platform admin rights' do
|
||||
# before do
|
||||
# product_build_list.product.platform.owner = @user
|
||||
# product_build_list.product.platform.save
|
||||
# end
|
||||
#
|
||||
# [:read, :create, :update, :destroy, :log, :cancel].each do |action|
|
||||
# it "should be able to #{action} product build list" do
|
||||
# @ability.should be_able_to(action, product_build_list)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'with project writer rights' do
|
||||
# before do
|
||||
# create_relation(product_build_list.project, @user, 'writer')
|
||||
# end
|
||||
#
|
||||
# [:read, :create, :log, :cancel].each do |action|
|
||||
# it "should be able to #{action} product build list" do
|
||||
# @ability.should be_able_to(action, product_build_list)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# [:update, :destroy].each do |action|
|
||||
# it "should not be able to #{action} product build list" do
|
||||
# @ability.should_not be_able_to(action, product_build_list)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
# end # 'product build list relations'
|
||||
#
|
||||
# end # 'Site user'
|
||||
# end
|
||||
|
|
|
@ -1,325 +1,325 @@
|
|||
require 'spec_helper'
|
||||
require "cancan/matchers"
|
||||
|
||||
def create_comment user
|
||||
FactoryGirl.create(:comment, user: user, commentable: @commit, project: @project)
|
||||
end
|
||||
|
||||
def create_comment_in_commit commit, project, body
|
||||
FactoryGirl.create(:comment, user: @user, commentable: commit, project: project, body: body)
|
||||
end
|
||||
|
||||
def set_comments_data_for_commit
|
||||
@ability = Ability.new(@user)
|
||||
|
||||
@project = FactoryGirl.create(:project_with_commit, owner: @user)
|
||||
@commit = @project.repo.commits.first
|
||||
|
||||
@comment = create_comment(@user)
|
||||
@stranger_comment = create_comment(@stranger)
|
||||
|
||||
@subscribe_params = {project_id: @project.id, subscribeable_id: @commit.id.hex, subscribeable_type: @commit.class.name}
|
||||
Subscribe.destroy_all
|
||||
|
||||
allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0))
|
||||
end
|
||||
|
||||
def should_send_email(args={})
|
||||
user_mailer = double(:user_mailer)
|
||||
expect(UserMailer).to receive(:new_comment_notification).with(kind_of(Comment), args[:receiver].id).and_return(user_mailer)
|
||||
expect(user_mailer).to receive(:deliver)
|
||||
|
||||
create_comment args[:commentor]
|
||||
end
|
||||
|
||||
def should_not_send_email(args={})
|
||||
expect(UserMailer).to_not receive(:new_comment_notification)
|
||||
create_comment args[:commentor]
|
||||
end
|
||||
|
||||
describe Comment do
|
||||
before { stub_symlink_methods }
|
||||
context 'for global admin user' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:admin)
|
||||
@stranger = FactoryGirl.create(:user)
|
||||
|
||||
set_comments_data_for_commit
|
||||
end
|
||||
|
||||
it_should_behave_like 'user with create comment ability (for model)'
|
||||
it_should_behave_like 'user with update own comment ability (for model)'
|
||||
it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
end
|
||||
|
||||
context 'for project admin user' do
|
||||
before do
|
||||
@user = FactoryGirl.create(:user)
|
||||
@stranger = FactoryGirl.create(:user)
|
||||
|
||||
set_comments_data_for_commit
|
||||
@admin = FactoryGirl.create(:user)
|
||||
@ability = Ability.new(@admin)
|
||||
create_relation(@project, @admin, 'admin')
|
||||
end
|
||||
|
||||
it_should_behave_like 'user with create comment ability (for model)'
|
||||
it_should_behave_like 'user with update own comment ability (for model)'
|
||||
it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
|
||||
it 'should send an e-mail by default settings' do
|
||||
should_send_email(commentor: @stranger, receiver: @user)
|
||||
end
|
||||
|
||||
context 'for disabled notify setting new_comment_commit_repo_owner' do
|
||||
it 'should send an e-mail' do
|
||||
@user.notifier.update_column :new_comment_commit_repo_owner, false
|
||||
should_send_email(commentor: @stranger, receiver: @user)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for disabled notify setting new_comment_commit_owner' do
|
||||
it 'should send an e-mail' do
|
||||
@user.notifier.update_column :new_comment_commit_owner, false
|
||||
should_send_email(commentor: @stranger, receiver: @user)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for disabled notify setting new_comment_commit_commentor' do
|
||||
it 'should send an e-mail' do
|
||||
@user.notifier.update_column :new_comment_commit_commentor, false
|
||||
should_send_email(commentor: @stranger, receiver: @user)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for disabled all notify setting expect global' do
|
||||
it 'should not send an e-mail' do
|
||||
@user.notifier.update_column :new_comment_commit_repo_owner, false
|
||||
@user.notifier.update_column :new_comment_commit_owner, false
|
||||
@user.notifier.update_column :new_comment_commit_commentor, false
|
||||
should_not_send_email(commentor: @stranger)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for unsubscribe commit' do
|
||||
it 'should not send an e-mail' do
|
||||
Subscribe.unsubscribe_from_commit @subscribe_params.merge(user_id: @user.id)
|
||||
should_not_send_email(commentor: @stranger)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for disabled global notify setting' do
|
||||
it 'should not send an e-mail' do
|
||||
@user.notifier.update_column :can_notify, false
|
||||
should_not_send_email(commentor: @stranger)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'for project owner user' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:user)
|
||||
@stranger = FactoryGirl.create(:user)
|
||||
set_comments_data_for_commit
|
||||
|
||||
@project.owner = @user
|
||||
@project.save
|
||||
end
|
||||
|
||||
it_should_behave_like 'user with create comment ability (for model)'
|
||||
it_should_behave_like 'user with update own comment ability (for model)'
|
||||
it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
|
||||
context 'for default enabled settings' do
|
||||
it 'should send an e-mail by default settings' do
|
||||
should_send_email(commentor: @stranger, receiver: @project.owner)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for disabled notify setting new_comment_commit_repo_owner' do
|
||||
it 'should not send an e-mail' do
|
||||
@user.notifier.update_column :new_comment_commit_repo_owner, false
|
||||
Comment.destroy_all
|
||||
should_not_send_email(commentor: @stranger)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for disabled notify setting new_comment_commit_owner' do
|
||||
it 'should send an e-mail' do
|
||||
@user.notifier.update_column :new_comment_commit_owner, false
|
||||
should_send_email(commentor: @stranger, receiver: @user)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for disabled notify setting new_comment_commit_commentor' do
|
||||
it 'should send an e-mail' do
|
||||
@user.notifier.update_column :new_comment_commit_commentor, false
|
||||
should_send_email(commentor: @stranger, receiver: @user)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for disabled all notify setting expect global' do
|
||||
it 'should not send an e-mail' do
|
||||
@user.notifier.update_column :new_comment_commit_repo_owner, false
|
||||
@user.notifier.update_column :new_comment_commit_owner, false
|
||||
@user.notifier.update_column :new_comment_commit_commentor, false
|
||||
should_not_send_email(commentor: @stranger)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for unsubscribe project' do
|
||||
it 'should not send an e-mail' do
|
||||
Subscribe.unsubscribe_from_commit @subscribe_params.merge(user_id: @user.id)
|
||||
should_not_send_email(commentor: @stranger)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for disabled global notify setting' do
|
||||
it 'should not send an e-mail' do
|
||||
@user.notifier.update_column :can_notify, false
|
||||
should_not_send_email(commentor: @stranger)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for own commit' do
|
||||
it 'should send a one e-mail' do
|
||||
@project.owner.update_column :email, 'code@tpope.net'
|
||||
should_send_email(commentor: @stranger, receiver: @project.owner)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'for simple user' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:user)
|
||||
@simple = FactoryGirl.create(:user)
|
||||
@stranger = FactoryGirl.create(:user)
|
||||
set_comments_data_for_commit
|
||||
@comment = create_comment(@simple)
|
||||
@ability = Ability.new(@simple)
|
||||
Subscribe.unsubscribe_from_commit @subscribe_params.merge(user_id: [@stranger.id, @project.owner.id])
|
||||
end
|
||||
|
||||
it_should_behave_like 'user with create comment ability (for model)'
|
||||
it_should_behave_like 'user with update own comment ability (for model)'
|
||||
it_should_behave_like 'user without update stranger comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
it_should_behave_like 'user without destroy stranger comment ability (for model)'
|
||||
|
||||
context 'for default enabled settings' do
|
||||
it 'should send an e-mail' do
|
||||
should_send_email(commentor: @stranger, receiver: @simple)
|
||||
end
|
||||
|
||||
it 'should send an e-mail for comments after his comment' do
|
||||
comment = create_comment(@simple)
|
||||
should_send_email(commentor: @stranger, receiver: @simple)
|
||||
end
|
||||
|
||||
it 'should send an e-mail when subscribed to project' do
|
||||
Subscribe.subscribe_to_commit @subscribe_params.merge(user_id: @simple.id)
|
||||
should_send_email(commentor: @project.owner, receiver: @simple)
|
||||
end
|
||||
|
||||
it 'should not send an e-mail for own comment' do
|
||||
should_not_send_email(commentor: @simple)
|
||||
end
|
||||
end
|
||||
|
||||
context 'for committer' do
|
||||
it 'should send an e-mail' do
|
||||
@simple.update_column :email, 'test@test.test'
|
||||
should_send_email commentor: @stranger, receiver: @simple
|
||||
end
|
||||
|
||||
it 'should send a one e-mail when subscribed to commit' do
|
||||
Subscribe.subscribe_to_commit @subscribe_params.merge(user_id: @simple.id)
|
||||
@simple.update_column :email, 'test@test.test'
|
||||
should_send_email(commentor: @stranger, receiver: @simple)
|
||||
end
|
||||
|
||||
it 'should not send an e-mail for own comment' do
|
||||
@simple.update_column :email, 'test@test.test'
|
||||
should_not_send_email(commentor: @simple)
|
||||
end
|
||||
|
||||
it 'should not send an e-mail if global notify off' do
|
||||
@project.owner.notifier.update_column :can_notify, false
|
||||
@simple.update_column :email, 'test@test.test'
|
||||
@simple.notifier.update_column :can_notify, false
|
||||
should_not_send_email(commentor: @user)
|
||||
end
|
||||
|
||||
it 'should not send an e-mail if notify for my commits off' do
|
||||
Comment.destroy_all
|
||||
@simple.notifier.update_column :new_comment_commit_owner, false
|
||||
@simple.update_column :email, 'test@test.test'
|
||||
should_not_send_email(commentor: @user)
|
||||
end
|
||||
end
|
||||
|
||||
context 'automatic issue linking' do
|
||||
before(:each) do
|
||||
@same_name_project = FactoryGirl.create(:project, name: @project.name)
|
||||
@issue_in_same_name_project = FactoryGirl.create(:issue, project: @same_name_project, user: @same_name_project.owner)
|
||||
@another_project = FactoryGirl.create(:project, owner: @user)
|
||||
@other_user_project = FactoryGirl.create(:project)
|
||||
@issue = FactoryGirl.create(:issue, project: @project, user: @user)
|
||||
@second_issue = FactoryGirl.create(:issue, project: @project, user: @user)
|
||||
@issue_in_another_project = FactoryGirl.create(:issue, project: @another_project, user: @user)
|
||||
@issue_in_other_user_project = FactoryGirl.create(:issue, project: @other_user_project, user: @other_user_project.owner)
|
||||
end
|
||||
|
||||
it 'should create automatic comment' do
|
||||
create_comment_in_commit(@commit, @project, "test link to ##{@issue.serial_id}; [##{@second_issue.serial_id}]")
|
||||
Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
commentable_id: @second_issue.id,
|
||||
created_from_commit_hash: @commit.id.hex).count.should == 1
|
||||
end
|
||||
|
||||
it 'should create automatic comment in the another project issue' do
|
||||
body = "[#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]"
|
||||
create_comment_in_commit(@commit, @project, body)
|
||||
Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
commentable_id: @issue_in_another_project.id,
|
||||
created_from_commit_hash: @commit.id.hex).count.should == 1
|
||||
end
|
||||
|
||||
it 'should create automatic comment in the same name project issue' do
|
||||
body = "[#{@same_name_project.owner.uname}##{@issue_in_same_name_project.serial_id}]"
|
||||
create_comment_in_commit(@commit, @project, body)
|
||||
Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
commentable_id: @issue_in_same_name_project.id,
|
||||
created_from_commit_hash: @commit.id.hex).count.should == 1
|
||||
end
|
||||
|
||||
it 'should not create duplicate automatic comment' do
|
||||
create_comment_in_commit(@commit, @project, "test link to [##{@second_issue.serial_id}]")
|
||||
create_comment_in_commit(@commit, @project, "test duplicate link to [##{@second_issue.serial_id}]")
|
||||
Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
commentable_id: @second_issue.id,
|
||||
created_from_commit_hash: @commit.id.hex).count.should == 1
|
||||
end
|
||||
|
||||
it 'should not create duplicate automatic comment from one' do
|
||||
create_comment_in_commit(@commit, @project, "test link to [##{@second_issue.serial_id}]; ##{@second_issue.serial_id}")
|
||||
Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
commentable_id: @second_issue.id,
|
||||
created_from_commit_hash: @commit.id.hex).count.should == 1
|
||||
end
|
||||
it 'should create two automatic comment' do
|
||||
body = "test ##{@second_issue.serial_id}" +
|
||||
" && [#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]"
|
||||
create_comment_in_commit(@commit, @project, body)
|
||||
Comment.where(automatic: true,
|
||||
created_from_commit_hash: @commit.id.hex).count.should == 2
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
# require 'spec_helper'
|
||||
# require "cancan/matchers"
|
||||
#
|
||||
# def create_comment user
|
||||
# FactoryGirl.create(:comment, user: user, commentable: @commit, project: @project)
|
||||
# end
|
||||
#
|
||||
# def create_comment_in_commit commit, project, body
|
||||
# FactoryGirl.create(:comment, user: @user, commentable: commit, project: project, body: body)
|
||||
# end
|
||||
#
|
||||
# def set_comments_data_for_commit
|
||||
# @ability = Ability.new(@user)
|
||||
#
|
||||
# @project = FactoryGirl.create(:project_with_commit, owner: @user)
|
||||
# @commit = @project.repo.commits.first
|
||||
#
|
||||
# @comment = create_comment(@user)
|
||||
# @stranger_comment = create_comment(@stranger)
|
||||
#
|
||||
# @subscribe_params = {project_id: @project.id, subscribeable_id: @commit.id.hex, subscribeable_type: @commit.class.name}
|
||||
# Subscribe.destroy_all
|
||||
#
|
||||
# allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0))
|
||||
# end
|
||||
#
|
||||
# def should_send_email(args={})
|
||||
# user_mailer = double(:user_mailer)
|
||||
# expect(UserMailer).to receive(:new_comment_notification).with(kind_of(Comment), args[:receiver].id).and_return(user_mailer)
|
||||
# expect(user_mailer).to receive(:deliver)
|
||||
#
|
||||
# create_comment args[:commentor]
|
||||
# end
|
||||
#
|
||||
# def should_not_send_email(args={})
|
||||
# expect(UserMailer).to_not receive(:new_comment_notification)
|
||||
# create_comment args[:commentor]
|
||||
# end
|
||||
#
|
||||
# describe Comment do
|
||||
# before { stub_symlink_methods }
|
||||
# context 'for global admin user' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:admin)
|
||||
# @stranger = FactoryGirl.create(:user)
|
||||
#
|
||||
# set_comments_data_for_commit
|
||||
# end
|
||||
#
|
||||
# it_should_behave_like 'user with create comment ability (for model)'
|
||||
# it_should_behave_like 'user with update own comment ability (for model)'
|
||||
# it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
# end
|
||||
#
|
||||
# context 'for project admin user' do
|
||||
# before do
|
||||
# @user = FactoryGirl.create(:user)
|
||||
# @stranger = FactoryGirl.create(:user)
|
||||
#
|
||||
# set_comments_data_for_commit
|
||||
# @admin = FactoryGirl.create(:user)
|
||||
# @ability = Ability.new(@admin)
|
||||
# create_relation(@project, @admin, 'admin')
|
||||
# end
|
||||
#
|
||||
# it_should_behave_like 'user with create comment ability (for model)'
|
||||
# it_should_behave_like 'user with update own comment ability (for model)'
|
||||
# it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
#
|
||||
# it 'should send an e-mail by default settings' do
|
||||
# should_send_email(commentor: @stranger, receiver: @user)
|
||||
# end
|
||||
#
|
||||
# context 'for disabled notify setting new_comment_commit_repo_owner' do
|
||||
# it 'should send an e-mail' do
|
||||
# @user.notifier.update_column :new_comment_commit_repo_owner, false
|
||||
# should_send_email(commentor: @stranger, receiver: @user)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for disabled notify setting new_comment_commit_owner' do
|
||||
# it 'should send an e-mail' do
|
||||
# @user.notifier.update_column :new_comment_commit_owner, false
|
||||
# should_send_email(commentor: @stranger, receiver: @user)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for disabled notify setting new_comment_commit_commentor' do
|
||||
# it 'should send an e-mail' do
|
||||
# @user.notifier.update_column :new_comment_commit_commentor, false
|
||||
# should_send_email(commentor: @stranger, receiver: @user)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for disabled all notify setting expect global' do
|
||||
# it 'should not send an e-mail' do
|
||||
# @user.notifier.update_column :new_comment_commit_repo_owner, false
|
||||
# @user.notifier.update_column :new_comment_commit_owner, false
|
||||
# @user.notifier.update_column :new_comment_commit_commentor, false
|
||||
# should_not_send_email(commentor: @stranger)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for unsubscribe commit' do
|
||||
# it 'should not send an e-mail' do
|
||||
# Subscribe.unsubscribe_from_commit @subscribe_params.merge(user_id: @user.id)
|
||||
# should_not_send_email(commentor: @stranger)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for disabled global notify setting' do
|
||||
# it 'should not send an e-mail' do
|
||||
# @user.notifier.update_column :can_notify, false
|
||||
# should_not_send_email(commentor: @stranger)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for project owner user' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:user)
|
||||
# @stranger = FactoryGirl.create(:user)
|
||||
# set_comments_data_for_commit
|
||||
#
|
||||
# @project.owner = @user
|
||||
# @project.save
|
||||
# end
|
||||
#
|
||||
# it_should_behave_like 'user with create comment ability (for model)'
|
||||
# it_should_behave_like 'user with update own comment ability (for model)'
|
||||
# it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
#
|
||||
# context 'for default enabled settings' do
|
||||
# it 'should send an e-mail by default settings' do
|
||||
# should_send_email(commentor: @stranger, receiver: @project.owner)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for disabled notify setting new_comment_commit_repo_owner' do
|
||||
# it 'should not send an e-mail' do
|
||||
# @user.notifier.update_column :new_comment_commit_repo_owner, false
|
||||
# Comment.destroy_all
|
||||
# should_not_send_email(commentor: @stranger)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for disabled notify setting new_comment_commit_owner' do
|
||||
# it 'should send an e-mail' do
|
||||
# @user.notifier.update_column :new_comment_commit_owner, false
|
||||
# should_send_email(commentor: @stranger, receiver: @user)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for disabled notify setting new_comment_commit_commentor' do
|
||||
# it 'should send an e-mail' do
|
||||
# @user.notifier.update_column :new_comment_commit_commentor, false
|
||||
# should_send_email(commentor: @stranger, receiver: @user)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for disabled all notify setting expect global' do
|
||||
# it 'should not send an e-mail' do
|
||||
# @user.notifier.update_column :new_comment_commit_repo_owner, false
|
||||
# @user.notifier.update_column :new_comment_commit_owner, false
|
||||
# @user.notifier.update_column :new_comment_commit_commentor, false
|
||||
# should_not_send_email(commentor: @stranger)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for unsubscribe project' do
|
||||
# it 'should not send an e-mail' do
|
||||
# Subscribe.unsubscribe_from_commit @subscribe_params.merge(user_id: @user.id)
|
||||
# should_not_send_email(commentor: @stranger)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for disabled global notify setting' do
|
||||
# it 'should not send an e-mail' do
|
||||
# @user.notifier.update_column :can_notify, false
|
||||
# should_not_send_email(commentor: @stranger)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for own commit' do
|
||||
# it 'should send a one e-mail' do
|
||||
# @project.owner.update_column :email, 'code@tpope.net'
|
||||
# should_send_email(commentor: @stranger, receiver: @project.owner)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for simple user' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:user)
|
||||
# @simple = FactoryGirl.create(:user)
|
||||
# @stranger = FactoryGirl.create(:user)
|
||||
# set_comments_data_for_commit
|
||||
# @comment = create_comment(@simple)
|
||||
# @ability = Ability.new(@simple)
|
||||
# Subscribe.unsubscribe_from_commit @subscribe_params.merge(user_id: [@stranger.id, @project.owner.id])
|
||||
# end
|
||||
#
|
||||
# it_should_behave_like 'user with create comment ability (for model)'
|
||||
# it_should_behave_like 'user with update own comment ability (for model)'
|
||||
# it_should_behave_like 'user without update stranger comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
# it_should_behave_like 'user without destroy stranger comment ability (for model)'
|
||||
#
|
||||
# context 'for default enabled settings' do
|
||||
# it 'should send an e-mail' do
|
||||
# should_send_email(commentor: @stranger, receiver: @simple)
|
||||
# end
|
||||
#
|
||||
# it 'should send an e-mail for comments after his comment' do
|
||||
# comment = create_comment(@simple)
|
||||
# should_send_email(commentor: @stranger, receiver: @simple)
|
||||
# end
|
||||
#
|
||||
# it 'should send an e-mail when subscribed to project' do
|
||||
# Subscribe.subscribe_to_commit @subscribe_params.merge(user_id: @simple.id)
|
||||
# should_send_email(commentor: @project.owner, receiver: @simple)
|
||||
# end
|
||||
#
|
||||
# it 'should not send an e-mail for own comment' do
|
||||
# should_not_send_email(commentor: @simple)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for committer' do
|
||||
# it 'should send an e-mail' do
|
||||
# @simple.update_column :email, 'test@test.test'
|
||||
# should_send_email commentor: @stranger, receiver: @simple
|
||||
# end
|
||||
#
|
||||
# it 'should send a one e-mail when subscribed to commit' do
|
||||
# Subscribe.subscribe_to_commit @subscribe_params.merge(user_id: @simple.id)
|
||||
# @simple.update_column :email, 'test@test.test'
|
||||
# should_send_email(commentor: @stranger, receiver: @simple)
|
||||
# end
|
||||
#
|
||||
# it 'should not send an e-mail for own comment' do
|
||||
# @simple.update_column :email, 'test@test.test'
|
||||
# should_not_send_email(commentor: @simple)
|
||||
# end
|
||||
#
|
||||
# it 'should not send an e-mail if global notify off' do
|
||||
# @project.owner.notifier.update_column :can_notify, false
|
||||
# @simple.update_column :email, 'test@test.test'
|
||||
# @simple.notifier.update_column :can_notify, false
|
||||
# should_not_send_email(commentor: @user)
|
||||
# end
|
||||
#
|
||||
# it 'should not send an e-mail if notify for my commits off' do
|
||||
# Comment.destroy_all
|
||||
# @simple.notifier.update_column :new_comment_commit_owner, false
|
||||
# @simple.update_column :email, 'test@test.test'
|
||||
# should_not_send_email(commentor: @user)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'automatic issue linking' do
|
||||
# before(:each) do
|
||||
# @same_name_project = FactoryGirl.create(:project, name: @project.name)
|
||||
# @issue_in_same_name_project = FactoryGirl.create(:issue, project: @same_name_project, user: @same_name_project.owner)
|
||||
# @another_project = FactoryGirl.create(:project, owner: @user)
|
||||
# @other_user_project = FactoryGirl.create(:project)
|
||||
# @issue = FactoryGirl.create(:issue, project: @project, user: @user)
|
||||
# @second_issue = FactoryGirl.create(:issue, project: @project, user: @user)
|
||||
# @issue_in_another_project = FactoryGirl.create(:issue, project: @another_project, user: @user)
|
||||
# @issue_in_other_user_project = FactoryGirl.create(:issue, project: @other_user_project, user: @other_user_project.owner)
|
||||
# end
|
||||
#
|
||||
# it 'should create automatic comment' do
|
||||
# create_comment_in_commit(@commit, @project, "test link to ##{@issue.serial_id}; [##{@second_issue.serial_id}]")
|
||||
# Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
# commentable_id: @second_issue.id,
|
||||
# created_from_commit_hash: @commit.id.hex).count.should == 1
|
||||
# end
|
||||
#
|
||||
# it 'should create automatic comment in the another project issue' do
|
||||
# body = "[#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]"
|
||||
# create_comment_in_commit(@commit, @project, body)
|
||||
# Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
# commentable_id: @issue_in_another_project.id,
|
||||
# created_from_commit_hash: @commit.id.hex).count.should == 1
|
||||
# end
|
||||
#
|
||||
# it 'should create automatic comment in the same name project issue' do
|
||||
# body = "[#{@same_name_project.owner.uname}##{@issue_in_same_name_project.serial_id}]"
|
||||
# create_comment_in_commit(@commit, @project, body)
|
||||
# Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
# commentable_id: @issue_in_same_name_project.id,
|
||||
# created_from_commit_hash: @commit.id.hex).count.should == 1
|
||||
# end
|
||||
#
|
||||
# it 'should not create duplicate automatic comment' do
|
||||
# create_comment_in_commit(@commit, @project, "test link to [##{@second_issue.serial_id}]")
|
||||
# create_comment_in_commit(@commit, @project, "test duplicate link to [##{@second_issue.serial_id}]")
|
||||
# Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
# commentable_id: @second_issue.id,
|
||||
# created_from_commit_hash: @commit.id.hex).count.should == 1
|
||||
# end
|
||||
#
|
||||
# it 'should not create duplicate automatic comment from one' do
|
||||
# create_comment_in_commit(@commit, @project, "test link to [##{@second_issue.serial_id}]; ##{@second_issue.serial_id}")
|
||||
# Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
# commentable_id: @second_issue.id,
|
||||
# created_from_commit_hash: @commit.id.hex).count.should == 1
|
||||
# end
|
||||
# it 'should create two automatic comment' do
|
||||
# body = "test ##{@second_issue.serial_id}" +
|
||||
# " && [#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]"
|
||||
# create_comment_in_commit(@commit, @project, body)
|
||||
# Comment.where(automatic: true,
|
||||
# created_from_commit_hash: @commit.id.hex).count.should == 2
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
|
|
|
@ -1,196 +1,196 @@
|
|||
require 'spec_helper'
|
||||
require "cancan/matchers"
|
||||
|
||||
def set_commentable_data
|
||||
@ability = Ability.new(@user)
|
||||
|
||||
@project = FactoryGirl.create(:project)
|
||||
@issue = FactoryGirl.create(:issue, project_id: @project.id, user: @user)
|
||||
|
||||
@comment = FactoryGirl.create(:comment, commentable: @issue, user: @user, project: @project)
|
||||
@stranger_comment = FactoryGirl.create(:comment, commentable: @issue, user: @stranger, project: @project)
|
||||
|
||||
allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0))
|
||||
end
|
||||
|
||||
def create_comment_in_issue issue, body
|
||||
FactoryGirl.create(:comment, user: issue.user, commentable: issue, project: issue.project, body: body)
|
||||
end
|
||||
|
||||
describe Comment do
|
||||
before { stub_symlink_methods }
|
||||
context 'for global admin user' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:admin)
|
||||
@stranger = FactoryGirl.create(:user)
|
||||
|
||||
set_commentable_data
|
||||
end
|
||||
|
||||
it_should_behave_like 'user with create comment ability (for model)'
|
||||
it_should_behave_like 'user with update own comment ability (for model)'
|
||||
it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
end
|
||||
|
||||
context 'for project admin user' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:user)
|
||||
@stranger = FactoryGirl.create(:user)
|
||||
|
||||
set_commentable_data
|
||||
create_relation(@project, @user, 'admin')
|
||||
end
|
||||
|
||||
it_should_behave_like 'user with create comment ability (for model)'
|
||||
it_should_behave_like 'user with update own comment ability (for model)'
|
||||
it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
|
||||
pending "sends an e-mail" do
|
||||
ActionMailer::Base.deliveries.last.to.include?(@stranger.email).should == true
|
||||
end
|
||||
end
|
||||
|
||||
context 'for project owner user' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:user)
|
||||
@stranger = FactoryGirl.create(:user)
|
||||
|
||||
set_commentable_data
|
||||
|
||||
@project.owner = @user
|
||||
@project.save
|
||||
create_relation(@project, @user, 'admin')
|
||||
end
|
||||
|
||||
it_should_behave_like 'user with create comment ability (for model)'
|
||||
it_should_behave_like 'user with update own comment ability (for model)'
|
||||
it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
end
|
||||
|
||||
context 'for simple user' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:user)
|
||||
@stranger = FactoryGirl.create(:user)
|
||||
|
||||
set_commentable_data
|
||||
end
|
||||
|
||||
it_should_behave_like 'user with create comment ability (for model)'
|
||||
it_should_behave_like 'user with update own comment ability (for model)'
|
||||
it_should_behave_like 'user without update stranger comment ability (for model)'
|
||||
it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
it_should_behave_like 'user without destroy stranger comment ability (for model)'
|
||||
|
||||
context 'with mass assignment' do
|
||||
it 'should not be able to update commentable' do
|
||||
@comment.update_attributes({commentable_type: 'Grit::Commit', commentable_id: 0})
|
||||
@comment.reload.commentable_id.should eql @issue.id
|
||||
@comment.reload.commentable_type.should eql @issue.class.name
|
||||
end
|
||||
|
||||
it 'should not be able to update owner' do
|
||||
@comment.should_not allow_mass_assignment_of :user_id
|
||||
end
|
||||
|
||||
it 'should not be able to update project' do
|
||||
@comment.should_not allow_mass_assignment_of :project_id
|
||||
end
|
||||
end
|
||||
|
||||
context 'automatic issue linking' do
|
||||
before(:each) do
|
||||
@same_name_project = FactoryGirl.create(:project, name: @project.name)
|
||||
@issue_in_same_name_project = FactoryGirl.create(:issue, project: @same_name_project, user: @same_name_project.owner)
|
||||
@another_project = FactoryGirl.create(:project, owner: @user)
|
||||
@other_user_project = FactoryGirl.create(:project)
|
||||
@issue = FactoryGirl.create(:issue, project: @project, user: @user)
|
||||
@second_issue = FactoryGirl.create(:issue, project: @project, user: @user)
|
||||
@issue_in_another_project = FactoryGirl.create(:issue, project: @another_project, user: @user)
|
||||
@issue_in_other_user_project = FactoryGirl.create(:issue, project: @other_user_project, user: @other_user_project.owner)
|
||||
end
|
||||
|
||||
it 'should create automatic comment' do
|
||||
create_comment_in_issue(@issue, "test link to ##{@issue.serial_id}; [##{@second_issue.serial_id}]")
|
||||
Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
commentable_id: @second_issue.id,
|
||||
created_from_issue_id: @issue.id).count.should == 1
|
||||
end
|
||||
|
||||
it 'should not create automatic comment to the same issue' do
|
||||
create_comment_in_issue(@issue, "test link to ##{@issue.serial_id}; [##{@second_issue.serial_id}]")
|
||||
Comment.where(automatic: true,
|
||||
created_from_issue_id: @issue.id).count.should == 1
|
||||
end
|
||||
|
||||
it 'should create automatic comment in the another project issue' do
|
||||
body = "[#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]"
|
||||
create_comment_in_issue(@issue, body)
|
||||
Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
commentable_id: @issue_in_another_project.id,
|
||||
created_from_issue_id: @issue.id).count.should == 1
|
||||
end
|
||||
|
||||
it 'should create automatic comment in the same name project issue' do
|
||||
body = "[#{@same_name_project.owner.uname}##{@issue_in_same_name_project.serial_id}]"
|
||||
create_comment_in_issue(@issue, body)
|
||||
Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
commentable_id: @issue_in_same_name_project.id,
|
||||
created_from_issue_id: @issue.id).count.should == 1
|
||||
end
|
||||
|
||||
it 'should not create duplicate automatic comment' do
|
||||
create_comment_in_issue(@issue, "test link to [##{@second_issue.serial_id}]")
|
||||
create_comment_in_issue(@issue, "test duplicate link to [##{@second_issue.serial_id}]")
|
||||
Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
commentable_id: @second_issue.id,
|
||||
created_from_issue_id: @issue.id).count.should == 1
|
||||
end
|
||||
|
||||
it 'should not create duplicate automatic comment from one' do
|
||||
create_comment_in_issue(@issue, "test link to [##{@second_issue.serial_id}]; ##{@second_issue.serial_id}")
|
||||
Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
commentable_id: @second_issue.id,
|
||||
created_from_issue_id: @issue.id).count.should == 1
|
||||
end
|
||||
|
||||
it 'should create two automatic comment' do
|
||||
body = "test ##{@second_issue.serial_id}" +
|
||||
" && [#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]"
|
||||
create_comment_in_issue(@issue, body)
|
||||
Comment.where(automatic: true,
|
||||
created_from_issue_id: @issue.id).count.should == 2
|
||||
end
|
||||
|
||||
it 'should create automatic comment by issue title' do
|
||||
issue = FactoryGirl.create(:issue, project: @project, user: @user,
|
||||
title: "link to ##{@issue.serial_id}")
|
||||
expect(Comment.where(automatic: true,
|
||||
created_from_issue_id: issue.id).count).to eq 1
|
||||
end
|
||||
|
||||
it 'should create automatic comment from issue body' do
|
||||
issue = FactoryGirl.create(:issue, project: @project, user: @user,
|
||||
body: "link to ##{@issue.serial_id}")
|
||||
Comment.where(automatic: true,
|
||||
created_from_issue_id: issue.id).count.should == 1
|
||||
end
|
||||
|
||||
it 'should create only one automatic comment from issue title and body' do
|
||||
issue = FactoryGirl.create(:issue, project: @project, user: @user,
|
||||
title: "link to ##{@issue.serial_id} in title",
|
||||
:body => "link to ##{@issue.serial_id} in body")
|
||||
Comment.where(automatic: true,
|
||||
created_from_issue_id: issue.id).count.should == 1
|
||||
end
|
||||
|
||||
|
||||
|
||||
end
|
||||
end
|
||||
end
|
||||
# require 'spec_helper'
|
||||
# require "cancan/matchers"
|
||||
#
|
||||
# def set_commentable_data
|
||||
# @ability = Ability.new(@user)
|
||||
#
|
||||
# @project = FactoryGirl.create(:project)
|
||||
# @issue = FactoryGirl.create(:issue, project_id: @project.id, user: @user)
|
||||
#
|
||||
# @comment = FactoryGirl.create(:comment, commentable: @issue, user: @user, project: @project)
|
||||
# @stranger_comment = FactoryGirl.create(:comment, commentable: @issue, user: @stranger, project: @project)
|
||||
#
|
||||
# allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0))
|
||||
# end
|
||||
#
|
||||
# def create_comment_in_issue issue, body
|
||||
# FactoryGirl.create(:comment, user: issue.user, commentable: issue, project: issue.project, body: body)
|
||||
# end
|
||||
#
|
||||
# describe Comment do
|
||||
# before { stub_symlink_methods }
|
||||
# context 'for global admin user' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:admin)
|
||||
# @stranger = FactoryGirl.create(:user)
|
||||
#
|
||||
# set_commentable_data
|
||||
# end
|
||||
#
|
||||
# it_should_behave_like 'user with create comment ability (for model)'
|
||||
# it_should_behave_like 'user with update own comment ability (for model)'
|
||||
# it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
# end
|
||||
#
|
||||
# context 'for project admin user' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:user)
|
||||
# @stranger = FactoryGirl.create(:user)
|
||||
#
|
||||
# set_commentable_data
|
||||
# create_relation(@project, @user, 'admin')
|
||||
# end
|
||||
#
|
||||
# it_should_behave_like 'user with create comment ability (for model)'
|
||||
# it_should_behave_like 'user with update own comment ability (for model)'
|
||||
# it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
#
|
||||
# pending "sends an e-mail" do
|
||||
# ActionMailer::Base.deliveries.last.to.include?(@stranger.email).should == true
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for project owner user' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:user)
|
||||
# @stranger = FactoryGirl.create(:user)
|
||||
#
|
||||
# set_commentable_data
|
||||
#
|
||||
# @project.owner = @user
|
||||
# @project.save
|
||||
# create_relation(@project, @user, 'admin')
|
||||
# end
|
||||
#
|
||||
# it_should_behave_like 'user with create comment ability (for model)'
|
||||
# it_should_behave_like 'user with update own comment ability (for model)'
|
||||
# it_should_behave_like 'user with update stranger comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy stranger comment ability (for model)'
|
||||
# end
|
||||
#
|
||||
# context 'for simple user' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:user)
|
||||
# @stranger = FactoryGirl.create(:user)
|
||||
#
|
||||
# set_commentable_data
|
||||
# end
|
||||
#
|
||||
# it_should_behave_like 'user with create comment ability (for model)'
|
||||
# it_should_behave_like 'user with update own comment ability (for model)'
|
||||
# it_should_behave_like 'user without update stranger comment ability (for model)'
|
||||
# it_should_behave_like 'user with destroy comment ability (for model)'
|
||||
# it_should_behave_like 'user without destroy stranger comment ability (for model)'
|
||||
#
|
||||
# context 'with mass assignment' do
|
||||
# it 'should not be able to update commentable' do
|
||||
# @comment.update_attributes({commentable_type: 'Grit::Commit', commentable_id: 0})
|
||||
# @comment.reload.commentable_id.should eql @issue.id
|
||||
# @comment.reload.commentable_type.should eql @issue.class.name
|
||||
# end
|
||||
#
|
||||
# it 'should not be able to update owner' do
|
||||
# @comment.should_not allow_mass_assignment_of :user_id
|
||||
# end
|
||||
#
|
||||
# it 'should not be able to update project' do
|
||||
# @comment.should_not allow_mass_assignment_of :project_id
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'automatic issue linking' do
|
||||
# before(:each) do
|
||||
# @same_name_project = FactoryGirl.create(:project, name: @project.name)
|
||||
# @issue_in_same_name_project = FactoryGirl.create(:issue, project: @same_name_project, user: @same_name_project.owner)
|
||||
# @another_project = FactoryGirl.create(:project, owner: @user)
|
||||
# @other_user_project = FactoryGirl.create(:project)
|
||||
# @issue = FactoryGirl.create(:issue, project: @project, user: @user)
|
||||
# @second_issue = FactoryGirl.create(:issue, project: @project, user: @user)
|
||||
# @issue_in_another_project = FactoryGirl.create(:issue, project: @another_project, user: @user)
|
||||
# @issue_in_other_user_project = FactoryGirl.create(:issue, project: @other_user_project, user: @other_user_project.owner)
|
||||
# end
|
||||
#
|
||||
# it 'should create automatic comment' do
|
||||
# create_comment_in_issue(@issue, "test link to ##{@issue.serial_id}; [##{@second_issue.serial_id}]")
|
||||
# Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
# commentable_id: @second_issue.id,
|
||||
# created_from_issue_id: @issue.id).count.should == 1
|
||||
# end
|
||||
#
|
||||
# it 'should not create automatic comment to the same issue' do
|
||||
# create_comment_in_issue(@issue, "test link to ##{@issue.serial_id}; [##{@second_issue.serial_id}]")
|
||||
# Comment.where(automatic: true,
|
||||
# created_from_issue_id: @issue.id).count.should == 1
|
||||
# end
|
||||
#
|
||||
# it 'should create automatic comment in the another project issue' do
|
||||
# body = "[#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]"
|
||||
# create_comment_in_issue(@issue, body)
|
||||
# Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
# commentable_id: @issue_in_another_project.id,
|
||||
# created_from_issue_id: @issue.id).count.should == 1
|
||||
# end
|
||||
#
|
||||
# it 'should create automatic comment in the same name project issue' do
|
||||
# body = "[#{@same_name_project.owner.uname}##{@issue_in_same_name_project.serial_id}]"
|
||||
# create_comment_in_issue(@issue, body)
|
||||
# Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
# commentable_id: @issue_in_same_name_project.id,
|
||||
# created_from_issue_id: @issue.id).count.should == 1
|
||||
# end
|
||||
#
|
||||
# it 'should not create duplicate automatic comment' do
|
||||
# create_comment_in_issue(@issue, "test link to [##{@second_issue.serial_id}]")
|
||||
# create_comment_in_issue(@issue, "test duplicate link to [##{@second_issue.serial_id}]")
|
||||
# Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
# commentable_id: @second_issue.id,
|
||||
# created_from_issue_id: @issue.id).count.should == 1
|
||||
# end
|
||||
#
|
||||
# it 'should not create duplicate automatic comment from one' do
|
||||
# create_comment_in_issue(@issue, "test link to [##{@second_issue.serial_id}]; ##{@second_issue.serial_id}")
|
||||
# Comment.where(automatic: true, commentable_type: 'Issue',
|
||||
# commentable_id: @second_issue.id,
|
||||
# created_from_issue_id: @issue.id).count.should == 1
|
||||
# end
|
||||
#
|
||||
# it 'should create two automatic comment' do
|
||||
# body = "test ##{@second_issue.serial_id}" +
|
||||
# " && [#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]"
|
||||
# create_comment_in_issue(@issue, body)
|
||||
# Comment.where(automatic: true,
|
||||
# created_from_issue_id: @issue.id).count.should == 2
|
||||
# end
|
||||
#
|
||||
# it 'should create automatic comment by issue title' do
|
||||
# issue = FactoryGirl.create(:issue, project: @project, user: @user,
|
||||
# title: "link to ##{@issue.serial_id}")
|
||||
# expect(Comment.where(automatic: true,
|
||||
# created_from_issue_id: issue.id).count).to eq 1
|
||||
# end
|
||||
#
|
||||
# it 'should create automatic comment from issue body' do
|
||||
# issue = FactoryGirl.create(:issue, project: @project, user: @user,
|
||||
# body: "link to ##{@issue.serial_id}")
|
||||
# Comment.where(automatic: true,
|
||||
# created_from_issue_id: issue.id).count.should == 1
|
||||
# end
|
||||
#
|
||||
# it 'should create only one automatic comment from issue title and body' do
|
||||
# issue = FactoryGirl.create(:issue, project: @project, user: @user,
|
||||
# title: "link to ##{@issue.serial_id} in title",
|
||||
# :body => "link to ##{@issue.serial_id} in body")
|
||||
# Comment.where(automatic: true,
|
||||
# created_from_issue_id: issue.id).count.should == 1
|
||||
# end
|
||||
#
|
||||
#
|
||||
#
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
|
|
|
@ -1,100 +1,100 @@
|
|||
require 'spec_helper'
|
||||
require "cancan/matchers"
|
||||
|
||||
describe Group do
|
||||
before(:each) do
|
||||
stub_symlink_methods
|
||||
@group = FactoryGirl.create(:group)
|
||||
@ability = Ability.new(User.new)
|
||||
end
|
||||
|
||||
context 'for guest' do
|
||||
[:read, :update, :destroy, :manage_members].each do |action|
|
||||
it "should not be able to #{action} group" do
|
||||
@ability.should_not be_able_to(action, @group)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'for global admin' do
|
||||
before(:each) do
|
||||
@admin = FactoryGirl.create(:admin)
|
||||
@ability = Ability.new(@admin)
|
||||
end
|
||||
|
||||
[:read, :update, :destroy, :manage_members].each do |action|
|
||||
it "should be able to #{action} group" do
|
||||
@ability.should be_able_to(action, @group)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'for group admin' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:user)
|
||||
@another_user = FactoryGirl.create(:user)
|
||||
create_actor_relation(@group, @user, 'admin')
|
||||
@ability = Ability.new(@user)
|
||||
end
|
||||
|
||||
[:read, :update, :manage_members].each do |action|
|
||||
it "should be able to #{action} group" do
|
||||
@ability.should be_able_to(action, @group)
|
||||
end
|
||||
end
|
||||
|
||||
it "should not be able to destroy group" do
|
||||
@ability.should_not be_able_to(:destroy, @group)
|
||||
end
|
||||
|
||||
context 'with mass assignment' do
|
||||
it 'should not be able to update uname' do
|
||||
@group.should_not allow_mass_assignment_of uname: 'new_uname'
|
||||
end
|
||||
|
||||
it 'should not be able to update owner' do
|
||||
@group.should_not allow_mass_assignment_of owner_type: 'User', owner_id: @another_user.id
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'for group owner' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:user)
|
||||
|
||||
@group.owner = @user
|
||||
@group.save
|
||||
|
||||
create_actor_relation(@group, @user, 'admin')
|
||||
@ability = Ability.new(@user)
|
||||
end
|
||||
|
||||
[:read, :update, :destroy, :manage_members].each do |action|
|
||||
it "should be able to #{action} group" do
|
||||
@ability.should be_able_to(action, @group)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'for group reader and writer user' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:user)
|
||||
create_actor_relation(@group, @user, 'reader')
|
||||
@ability = Ability.new(@user)
|
||||
end
|
||||
|
||||
[:read].each do |action|
|
||||
it "should be able to #{action} group" do
|
||||
@ability.should be_able_to(action, @group)
|
||||
end
|
||||
end
|
||||
|
||||
[:update, :destroy, :manage_members].each do |action|
|
||||
it "should not be able to #{action} group" do
|
||||
@ability.should_not be_able_to(action, @group)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
it {should_not allow_value("How do you do...\nmy_group").for(:uname)}
|
||||
end
|
||||
# require 'spec_helper'
|
||||
# require "cancan/matchers"
|
||||
#
|
||||
# describe Group do
|
||||
# before(:each) do
|
||||
# stub_symlink_methods
|
||||
# @group = FactoryGirl.create(:group)
|
||||
# @ability = Ability.new(User.new)
|
||||
# end
|
||||
#
|
||||
# context 'for guest' do
|
||||
# [:read, :update, :destroy, :manage_members].each do |action|
|
||||
# it "should not be able to #{action} group" do
|
||||
# @ability.should_not be_able_to(action, @group)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for global admin' do
|
||||
# before(:each) do
|
||||
# @admin = FactoryGirl.create(:admin)
|
||||
# @ability = Ability.new(@admin)
|
||||
# end
|
||||
#
|
||||
# [:read, :update, :destroy, :manage_members].each do |action|
|
||||
# it "should be able to #{action} group" do
|
||||
# @ability.should be_able_to(action, @group)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for group admin' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:user)
|
||||
# @another_user = FactoryGirl.create(:user)
|
||||
# create_actor_relation(@group, @user, 'admin')
|
||||
# @ability = Ability.new(@user)
|
||||
# end
|
||||
#
|
||||
# [:read, :update, :manage_members].each do |action|
|
||||
# it "should be able to #{action} group" do
|
||||
# @ability.should be_able_to(action, @group)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# it "should not be able to destroy group" do
|
||||
# @ability.should_not be_able_to(:destroy, @group)
|
||||
# end
|
||||
#
|
||||
# context 'with mass assignment' do
|
||||
# it 'should not be able to update uname' do
|
||||
# @group.should_not allow_mass_assignment_of uname: 'new_uname'
|
||||
# end
|
||||
#
|
||||
# it 'should not be able to update owner' do
|
||||
# @group.should_not allow_mass_assignment_of owner_type: 'User', owner_id: @another_user.id
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for group owner' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:user)
|
||||
#
|
||||
# @group.owner = @user
|
||||
# @group.save
|
||||
#
|
||||
# create_actor_relation(@group, @user, 'admin')
|
||||
# @ability = Ability.new(@user)
|
||||
# end
|
||||
#
|
||||
# [:read, :update, :destroy, :manage_members].each do |action|
|
||||
# it "should be able to #{action} group" do
|
||||
# @ability.should be_able_to(action, @group)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for group reader and writer user' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:user)
|
||||
# create_actor_relation(@group, @user, 'reader')
|
||||
# @ability = Ability.new(@user)
|
||||
# end
|
||||
#
|
||||
# [:read].each do |action|
|
||||
# it "should be able to #{action} group" do
|
||||
# @ability.should be_able_to(action, @group)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# [:update, :destroy, :manage_members].each do |action|
|
||||
# it "should not be able to #{action} group" do
|
||||
# @ability.should_not be_able_to(action, @group)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# it {should_not allow_value("How do you do...\nmy_group").for(:uname)}
|
||||
# end
|
||||
|
|
|
@ -1,78 +1,78 @@
|
|||
require 'spec_helper'
|
||||
require "cancan/matchers"
|
||||
|
||||
def set_testable_data
|
||||
@ability = Ability.new(@user)
|
||||
|
||||
@project = FactoryGirl.create(:project)
|
||||
@issue = FactoryGirl.create(:issue, project_id: @project.id)
|
||||
|
||||
allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0))
|
||||
end
|
||||
|
||||
describe Subscribe do
|
||||
before { stub_symlink_methods }
|
||||
context 'for global admin user' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:admin)
|
||||
@stranger = FactoryGirl.create(:user)
|
||||
|
||||
set_testable_data
|
||||
end
|
||||
|
||||
it 'should create subscribe' do
|
||||
@ability.should be_able_to(:create, FactoryGirl.build(:subscribe, subscribeable: @issue, user: @user))
|
||||
end
|
||||
|
||||
context 'destroy' do
|
||||
before(:each) do
|
||||
@subscribe = FactoryGirl.create(:subscribe, subscribeable: @issue, user: @user)
|
||||
@stranger_subscribe = FactoryGirl.create(:subscribe, subscribeable: @issue, user: @stranger)
|
||||
end
|
||||
|
||||
context 'own subscribe' do
|
||||
it 'should destroy subscribe' do
|
||||
@ability.should be_able_to(:destroy, @subscribe)
|
||||
end
|
||||
end
|
||||
|
||||
context 'stranger subscribe' do
|
||||
it 'should not destroy subscribe' do
|
||||
@ability.should_not be_able_to(:destroy, @stranger_subscribe)
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'for simple user' do
|
||||
before(:each) do
|
||||
@user = FactoryGirl.create(:user)
|
||||
@stranger = FactoryGirl.create(:user)
|
||||
|
||||
set_testable_data
|
||||
end
|
||||
|
||||
it 'should create subscribe' do
|
||||
@ability.should be_able_to(:create, FactoryGirl.build(:subscribe, subscribeable: @issue, user: @user))
|
||||
end
|
||||
|
||||
context 'destroy' do
|
||||
before(:each) do
|
||||
@subscribe = FactoryGirl.create(:subscribe, subscribeable: @issue, user: @user)
|
||||
@stranger_subscribe = FactoryGirl.create(:subscribe, subscribeable: @issue, user: @stranger)
|
||||
end
|
||||
|
||||
context 'own subscribe' do
|
||||
it 'should destroy subscribe' do
|
||||
@ability.should be_able_to(:destroy, @subscribe)
|
||||
end
|
||||
end
|
||||
|
||||
context 'stranger subscribe' do
|
||||
it 'should not destroy subscribe' do
|
||||
@ability.should_not be_able_to(:destroy, @stranger_subscribe)
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
# require 'spec_helper'
|
||||
# require "cancan/matchers"
|
||||
#
|
||||
# def set_testable_data
|
||||
# @ability = Ability.new(@user)
|
||||
#
|
||||
# @project = FactoryGirl.create(:project)
|
||||
# @issue = FactoryGirl.create(:issue, project_id: @project.id)
|
||||
#
|
||||
# allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0))
|
||||
# end
|
||||
#
|
||||
# describe Subscribe do
|
||||
# before { stub_symlink_methods }
|
||||
# context 'for global admin user' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:admin)
|
||||
# @stranger = FactoryGirl.create(:user)
|
||||
#
|
||||
# set_testable_data
|
||||
# end
|
||||
#
|
||||
# it 'should create subscribe' do
|
||||
# @ability.should be_able_to(:create, FactoryGirl.build(:subscribe, subscribeable: @issue, user: @user))
|
||||
# end
|
||||
#
|
||||
# context 'destroy' do
|
||||
# before(:each) do
|
||||
# @subscribe = FactoryGirl.create(:subscribe, subscribeable: @issue, user: @user)
|
||||
# @stranger_subscribe = FactoryGirl.create(:subscribe, subscribeable: @issue, user: @stranger)
|
||||
# end
|
||||
#
|
||||
# context 'own subscribe' do
|
||||
# it 'should destroy subscribe' do
|
||||
# @ability.should be_able_to(:destroy, @subscribe)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'stranger subscribe' do
|
||||
# it 'should not destroy subscribe' do
|
||||
# @ability.should_not be_able_to(:destroy, @stranger_subscribe)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'for simple user' do
|
||||
# before(:each) do
|
||||
# @user = FactoryGirl.create(:user)
|
||||
# @stranger = FactoryGirl.create(:user)
|
||||
#
|
||||
# set_testable_data
|
||||
# end
|
||||
#
|
||||
# it 'should create subscribe' do
|
||||
# @ability.should be_able_to(:create, FactoryGirl.build(:subscribe, subscribeable: @issue, user: @user))
|
||||
# end
|
||||
#
|
||||
# context 'destroy' do
|
||||
# before(:each) do
|
||||
# @subscribe = FactoryGirl.create(:subscribe, subscribeable: @issue, user: @user)
|
||||
# @stranger_subscribe = FactoryGirl.create(:subscribe, subscribeable: @issue, user: @stranger)
|
||||
# end
|
||||
#
|
||||
# context 'own subscribe' do
|
||||
# it 'should destroy subscribe' do
|
||||
# @ability.should be_able_to(:destroy, @subscribe)
|
||||
# end
|
||||
# end
|
||||
#
|
||||
# context 'stranger subscribe' do
|
||||
# it 'should not destroy subscribe' do
|
||||
# @ability.should_not be_able_to(:destroy, @stranger_subscribe)
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
# end
|
||||
|
|
Loading…
Reference in New Issue