2019-04-29 20:27:42 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-12-03 22:48:13 -05:00
|
|
|
require 'rails_helper'
|
2017-07-07 02:09:14 -04:00
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
require 'guardian'
|
|
|
|
|
|
|
|
describe Guardian do
|
|
|
|
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:user) { Fabricate(:user) }
|
2019-05-06 06:16:39 -04:00
|
|
|
fab!(:another_user) { Fabricate(:user) }
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:moderator) { Fabricate(:moderator) }
|
|
|
|
fab!(:admin) { Fabricate(:admin) }
|
|
|
|
fab!(:anonymous_user) { Fabricate(:anonymous) }
|
2019-05-06 09:05:53 -04:00
|
|
|
fab!(:staff_post) { Fabricate(:post, user: moderator) }
|
2019-05-06 09:11:28 -04:00
|
|
|
fab!(:group) { Fabricate(:group) }
|
|
|
|
fab!(:another_group) { Fabricate(:group) }
|
2019-05-06 09:13:28 -04:00
|
|
|
fab!(:automatic_group) { Fabricate(:group, automatic: true) }
|
2019-05-07 04:37:42 -04:00
|
|
|
fab!(:plain_category) { Fabricate(:category) }
|
2019-05-06 09:05:53 -04:00
|
|
|
|
2019-09-18 15:23:13 -04:00
|
|
|
let(:trust_level_0) { build(:user, trust_level: 0) }
|
2019-03-27 05:41:50 -04:00
|
|
|
let(:trust_level_1) { build(:user, trust_level: 1) }
|
2016-01-11 10:26:00 -05:00
|
|
|
let(:trust_level_2) { build(:user, trust_level: 2) }
|
2014-09-05 02:52:40 -04:00
|
|
|
let(:trust_level_3) { build(:user, trust_level: 3) }
|
|
|
|
let(:trust_level_4) { build(:user, trust_level: 4) }
|
2013-05-31 11:41:40 -04:00
|
|
|
let(:another_admin) { build(:admin) }
|
2013-05-21 02:39:51 -04:00
|
|
|
let(:coding_horror) { build(:coding_horror) }
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2013-05-21 02:39:51 -04:00
|
|
|
let(:topic) { build(:topic, user: user) }
|
|
|
|
let(:post) { build(:post, topic: topic, user: topic.user) }
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
it 'can be created without a user (not logged in)' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect { Guardian.new }.not_to raise_error
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2015-02-12 11:52:59 -05:00
|
|
|
it 'can be instantiated with a user instance' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect { Guardian.new(user) }.not_to raise_error
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2018-06-13 14:57:32 -04:00
|
|
|
describe "link_posting_access" do
|
|
|
|
it "is none for anonymous users" do
|
|
|
|
expect(Guardian.new.link_posting_access).to eq('none')
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is full for regular users" do
|
|
|
|
expect(Guardian.new(user).link_posting_access).to eq('full')
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is none for a user of a low trust level" do
|
|
|
|
user.trust_level = 0
|
|
|
|
SiteSetting.min_trust_to_post_links = 1
|
|
|
|
expect(Guardian.new(user).link_posting_access).to eq('none')
|
|
|
|
end
|
|
|
|
|
2020-07-26 20:23:54 -04:00
|
|
|
it "is limited for a user of a low trust level with a allowlist" do
|
|
|
|
SiteSetting.allowed_link_domains = 'example.com'
|
2018-06-13 14:57:32 -04:00
|
|
|
user.trust_level = 0
|
|
|
|
SiteSetting.min_trust_to_post_links = 1
|
|
|
|
expect(Guardian.new(user).link_posting_access).to eq('limited')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-02-08 12:56:10 -05:00
|
|
|
describe "can_post_link?" do
|
2018-06-13 14:57:32 -04:00
|
|
|
let(:host) { "discourse.org" }
|
|
|
|
|
2018-02-08 12:56:10 -05:00
|
|
|
it "returns false for anonymous users" do
|
2018-06-13 14:57:32 -04:00
|
|
|
expect(Guardian.new.can_post_link?(host: host)).to eq(false)
|
2018-02-08 12:56:10 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true for a regular user" do
|
2018-06-13 14:57:32 -04:00
|
|
|
expect(Guardian.new(user).can_post_link?(host: host)).to eq(true)
|
2018-02-08 12:56:10 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "supports customization by site setting" do
|
|
|
|
user.trust_level = 0
|
|
|
|
SiteSetting.min_trust_to_post_links = 0
|
2018-06-13 14:57:32 -04:00
|
|
|
expect(Guardian.new(user).can_post_link?(host: host)).to eq(true)
|
2018-02-08 12:56:10 -05:00
|
|
|
SiteSetting.min_trust_to_post_links = 1
|
2018-06-13 14:57:32 -04:00
|
|
|
expect(Guardian.new(user).can_post_link?(host: host)).to eq(false)
|
|
|
|
end
|
|
|
|
|
2020-07-26 20:23:54 -04:00
|
|
|
describe "allowlisted host" do
|
2018-06-13 14:57:32 -04:00
|
|
|
before do
|
2020-07-26 20:23:54 -04:00
|
|
|
SiteSetting.allowed_link_domains = host
|
2018-06-13 14:57:32 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows a new user to post the link to the host" do
|
|
|
|
user.trust_level = 0
|
|
|
|
SiteSetting.min_trust_to_post_links = 1
|
|
|
|
expect(Guardian.new(user).can_post_link?(host: host)).to eq(true)
|
|
|
|
expect(Guardian.new(user).can_post_link?(host: 'another-host.com')).to eq(false)
|
|
|
|
end
|
2018-02-08 12:56:10 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-02-27 22:22:51 -05:00
|
|
|
describe '#post_can_act?' do
|
2013-05-21 02:39:51 -04:00
|
|
|
let(:post) { build(:post) }
|
|
|
|
let(:user) { build(:user) }
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
it "returns false when the user is nil" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).post_can_act?(post, :like)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false when the post is nil" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(nil, :like)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false when the topic is archived" do
|
|
|
|
post.topic.archived = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :like)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-08-07 13:12:35 -04:00
|
|
|
it "returns false when the post is deleted" do
|
|
|
|
post.deleted_at = Time.now
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :like)).to be_falsey
|
2020-08-19 19:31:40 -04:00
|
|
|
expect(Guardian.new(admin).post_can_act?(post, :spam)).to be_truthy
|
|
|
|
expect(Guardian.new(admin).post_can_act?(post, :notify_user)).to be_truthy
|
2014-08-07 13:12:35 -04:00
|
|
|
end
|
|
|
|
|
2018-08-17 11:06:01 -04:00
|
|
|
it "works as expected for silenced users" do
|
2018-08-14 11:43:39 -04:00
|
|
|
UserSilencer.silence(user, admin)
|
|
|
|
expect(Guardian.new(user).post_can_act?(post, :spam)).to be_falsey
|
2018-08-17 11:06:01 -04:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :like)).to be_truthy
|
|
|
|
expect(Guardian.new(user).post_can_act?(post, :bookmark)).to be_truthy
|
2018-08-14 11:43:39 -04:00
|
|
|
end
|
|
|
|
|
2018-02-12 14:56:21 -05:00
|
|
|
it "allows flagging archived posts" do
|
2013-05-20 02:04:53 -04:00
|
|
|
post.topic.archived = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :spam)).to be_truthy
|
2013-05-20 02:04:53 -04:00
|
|
|
end
|
|
|
|
|
2018-11-05 10:00:59 -05:00
|
|
|
it "does not allow flagging of hidden posts" do
|
|
|
|
post.hidden = true
|
|
|
|
expect(Guardian.new(user).post_can_act?(post, :spam)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2018-02-12 15:27:05 -05:00
|
|
|
it "allows flagging of staff posts when allow_flagging_staff is true" do
|
|
|
|
SiteSetting.allow_flagging_staff = true
|
2018-02-12 14:56:21 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(staff_post, :spam)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2018-08-17 03:10:07 -04:00
|
|
|
describe 'when allow_flagging_staff is false' do
|
|
|
|
before do
|
|
|
|
SiteSetting.allow_flagging_staff = false
|
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't allow flagging of staff posts" do
|
|
|
|
expect(Guardian.new(user).post_can_act?(staff_post, :spam)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "allows flagging of staff posts when staff has been deleted" do
|
|
|
|
staff_post.user.destroy!
|
|
|
|
staff_post.reload
|
|
|
|
expect(Guardian.new(user).post_can_act?(staff_post, :spam)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "allows liking of staff" do
|
|
|
|
expect(Guardian.new(user).post_can_act?(staff_post, :like)).to eq(true)
|
|
|
|
end
|
2018-02-14 15:46:04 -05:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
it "returns false when liking yourself" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(post.user).post_can_act?(post, :like)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false when you've already done it" do
|
2017-09-08 01:07:22 -04:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :like, opts: {
|
|
|
|
taken_actions: { PostActionType.types[:like] => 1 }
|
|
|
|
})).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-02-25 11:42:20 -05:00
|
|
|
it "returns false when you already flagged a post" do
|
2018-02-27 22:22:51 -05:00
|
|
|
PostActionType.notify_flag_types.each do |type, _id|
|
|
|
|
expect(Guardian.new(user).post_can_act?(post, :off_topic, opts: {
|
|
|
|
taken_actions: { PostActionType.types[type] => 1 }
|
|
|
|
})).to be_falsey
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-12-19 16:47:39 -05:00
|
|
|
it "returns false for notify_user if private messages are disabled" do
|
2018-01-31 01:03:12 -05:00
|
|
|
SiteSetting.enable_personal_messages = false
|
2014-12-19 16:47:39 -05:00
|
|
|
user.trust_level = TrustLevel[2]
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :notify_user)).to be_falsey
|
2014-12-19 16:47:39 -05:00
|
|
|
end
|
|
|
|
|
2019-01-24 06:26:59 -05:00
|
|
|
it "returns false for notify_user if private messages are enabled but threshold not met" do
|
2018-01-31 01:03:12 -05:00
|
|
|
SiteSetting.enable_personal_messages = true
|
2015-10-11 20:15:38 -04:00
|
|
|
SiteSetting.min_trust_to_send_messages = 2
|
|
|
|
user.trust_level = TrustLevel[1]
|
|
|
|
expect(Guardian.new(user).post_can_act?(post, :notify_user)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
describe "trust levels" do
|
|
|
|
it "returns true for a new user liking something" do
|
2014-09-05 01:20:39 -04:00
|
|
|
user.trust_level = TrustLevel[0]
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :like)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2018-02-06 17:12:27 -05:00
|
|
|
it "returns false for a new user flagging as spam" do
|
2014-09-05 01:20:39 -04:00
|
|
|
user.trust_level = TrustLevel[0]
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :spam)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2018-02-06 17:12:27 -05:00
|
|
|
it "returns true for a new user flagging as spam if enabled" do
|
|
|
|
SiteSetting.min_trust_to_flag_posts = 0
|
|
|
|
user.trust_level = TrustLevel[0]
|
|
|
|
expect(Guardian.new(user).post_can_act?(post, :spam)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2015-01-08 10:06:43 -05:00
|
|
|
it "returns true for a new user flagging a private message as spam" do
|
2019-05-06 06:14:35 -04:00
|
|
|
post = Fabricate(:private_message_post, user: admin)
|
2015-01-08 10:06:43 -05:00
|
|
|
user.trust_level = TrustLevel[0]
|
2016-12-20 23:01:26 -05:00
|
|
|
post.topic.allowed_users << user
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :spam)).to be_truthy
|
2015-01-08 10:06:43 -05:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
it "returns false for a new user flagging something as off topic" do
|
2014-09-05 01:20:39 -04:00
|
|
|
user.trust_level = TrustLevel[0]
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :off_topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2014-03-10 11:48:27 -04:00
|
|
|
|
|
|
|
it "returns false for a new user flagging with notify_user" do
|
2014-09-05 01:20:39 -04:00
|
|
|
user.trust_level = TrustLevel[0]
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :notify_user)).to be_falsey # because new users can't send private messages
|
2014-03-10 11:48:27 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-04-25 11:46:54 -04:00
|
|
|
describe "can_enable_safe_mode" do
|
|
|
|
let(:user) { Fabricate.build(:user) }
|
|
|
|
let(:moderator) { Fabricate.build(:moderator) }
|
|
|
|
|
|
|
|
context "when enabled" do
|
|
|
|
before do
|
|
|
|
SiteSetting.enable_safe_mode = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "can be performed" do
|
|
|
|
expect(Guardian.new.can_enable_safe_mode?).to eq(true)
|
|
|
|
expect(Guardian.new(user).can_enable_safe_mode?).to eq(true)
|
|
|
|
expect(Guardian.new(moderator).can_enable_safe_mode?).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when disabled" do
|
|
|
|
before do
|
|
|
|
SiteSetting.enable_safe_mode = false
|
|
|
|
end
|
|
|
|
|
|
|
|
it "can be performed" do
|
|
|
|
expect(Guardian.new.can_enable_safe_mode?).to eq(false)
|
|
|
|
expect(Guardian.new(user).can_enable_safe_mode?).to eq(false)
|
|
|
|
expect(Guardian.new(moderator).can_enable_safe_mode?).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
describe 'can_send_private_message' do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:suspended_user) { Fabricate(:user, suspended_till: 1.week.from_now, suspended_at: 1.day.ago) }
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
it "returns false when the user is nil" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_send_private_message?(user)).to be_falsey
|
2013-02-25 11:42:20 -05:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
it "returns false when the target user is nil" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_send_private_message?(nil)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2016-07-03 21:36:43 -04:00
|
|
|
it "returns true when the target is the same as the user" do
|
|
|
|
# this is now allowed so yay
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(user)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2017-10-23 17:19:30 -04:00
|
|
|
it "returns false when you are untrusted" do
|
|
|
|
user.trust_level = TrustLevel[0]
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(another_user)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true to another user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_send_private_message?(another_user)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2014-04-23 17:00:22 -04:00
|
|
|
|
2015-10-11 20:15:38 -04:00
|
|
|
it "disallows pms to other users if trust level is not met" do
|
|
|
|
SiteSetting.min_trust_to_send_messages = TrustLevel[2]
|
|
|
|
user.trust_level = TrustLevel[1]
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(another_user)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2018-01-31 01:03:12 -05:00
|
|
|
context "enable_personal_messages is false" do
|
|
|
|
before { SiteSetting.enable_personal_messages = false }
|
2014-04-23 17:00:22 -04:00
|
|
|
|
2017-02-22 01:02:09 -05:00
|
|
|
it "returns false if user is not staff member" do
|
|
|
|
expect(Guardian.new(trust_level_4).can_send_private_message?(another_user)).to be_falsey
|
2014-04-23 17:00:22 -04:00
|
|
|
end
|
|
|
|
|
2017-02-22 01:02:09 -05:00
|
|
|
it "returns true for staff member" do
|
|
|
|
expect(Guardian.new(moderator).can_send_private_message?(another_user)).to be_truthy
|
|
|
|
expect(Guardian.new(admin).can_send_private_message?(another_user)).to be_truthy
|
2014-04-23 17:00:22 -04:00
|
|
|
end
|
|
|
|
end
|
2014-05-06 15:01:19 -04:00
|
|
|
|
|
|
|
context "target user is suspended" do
|
|
|
|
it "returns true for staff" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_send_private_message?(suspended_user)).to be_truthy
|
|
|
|
expect(Guardian.new(moderator).can_send_private_message?(suspended_user)).to be_truthy
|
2014-05-06 15:01:19 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false for regular users" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_send_private_message?(suspended_user)).to be_falsey
|
2014-05-06 15:01:19 -04:00
|
|
|
end
|
|
|
|
end
|
2016-01-22 12:54:18 -05:00
|
|
|
|
2017-11-10 12:18:08 -05:00
|
|
|
context "author is silenced" do
|
2016-01-22 12:54:18 -05:00
|
|
|
before do
|
2017-11-13 13:41:36 -05:00
|
|
|
user.silenced_till = 1.year.from_now
|
2016-01-22 12:54:18 -05:00
|
|
|
user.save
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if target is staff" do
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(admin)).to be_truthy
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(moderator)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false if target is not staff" do
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(another_user)).to be_falsey
|
|
|
|
end
|
2016-03-23 16:20:24 -04:00
|
|
|
|
|
|
|
it "returns true if target is a staff group" do
|
|
|
|
Group::STAFF_GROUPS.each do |name|
|
|
|
|
g = Group[name]
|
2017-12-13 21:53:21 -05:00
|
|
|
g.update!(messageable_level: Group::ALIAS_LEVELS[:everyone])
|
2016-03-23 16:20:24 -04:00
|
|
|
expect(Guardian.new(user).can_send_private_message?(g)).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
2016-01-22 12:54:18 -05:00
|
|
|
end
|
2017-10-06 03:56:58 -04:00
|
|
|
|
2017-12-13 21:53:21 -05:00
|
|
|
it "respects the group's messageable_level" do
|
|
|
|
Group::ALIAS_LEVELS.each do |level, _|
|
|
|
|
group.update!(messageable_level: Group::ALIAS_LEVELS[level])
|
|
|
|
output = level == :everyone ? true : false
|
|
|
|
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(group)).to eq(output)
|
|
|
|
end
|
|
|
|
|
|
|
|
Group::ALIAS_LEVELS.each do |level, _|
|
|
|
|
group.update!(messageable_level: Group::ALIAS_LEVELS[level])
|
|
|
|
expect(Guardian.new(admin).can_send_private_message?(group)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-09-18 15:23:13 -04:00
|
|
|
it "allows TL0 to message group with messageable_level = everyone" do
|
|
|
|
group.update!(messageable_level: Group::ALIAS_LEVELS[:everyone])
|
|
|
|
expect(Guardian.new(trust_level_0).can_send_private_message?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(group)).to eq(true)
|
|
|
|
end
|
|
|
|
|
2019-07-08 17:12:09 -04:00
|
|
|
it "respects the group members messageable_level" do
|
|
|
|
group.update!(messageable_level: Group::ALIAS_LEVELS[:members_mods_and_admins])
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(group)).to eq(false)
|
|
|
|
|
|
|
|
group.add(user)
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(group)).to eq(true)
|
2019-09-18 15:23:13 -04:00
|
|
|
|
|
|
|
expect(Guardian.new(trust_level_0).can_send_private_message?(group)).to eq(false)
|
|
|
|
|
|
|
|
# group membership trumps min_trust_to_send_messages setting
|
|
|
|
group.add(trust_level_0)
|
|
|
|
expect(Guardian.new(trust_level_0).can_send_private_message?(group)).to eq(true)
|
2019-07-08 17:12:09 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "respects the group owners messageable_level" do
|
|
|
|
group.update!(messageable_level: Group::ALIAS_LEVELS[:owners_mods_and_admins])
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(group)).to eq(false)
|
|
|
|
|
|
|
|
group.add(user)
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(group)).to eq(false)
|
|
|
|
|
|
|
|
group.add_owner(user)
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(group)).to eq(true)
|
|
|
|
end
|
|
|
|
|
2017-10-06 03:56:58 -04:00
|
|
|
context 'target user has private message disabled' do
|
|
|
|
before do
|
|
|
|
another_user.user_option.update!(allow_private_messages: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'for a normal user' do
|
|
|
|
it 'should return false' do
|
|
|
|
expect(Guardian.new(user).can_send_private_message?(another_user)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'for a staff user' do
|
|
|
|
it 'should return true' do
|
|
|
|
[admin, moderator].each do |staff_user|
|
|
|
|
expect(Guardian.new(staff_user).can_send_private_message?(another_user))
|
|
|
|
.to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'can_reply_as_new_topic' do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:topic) { Fabricate(:topic) }
|
|
|
|
fab!(:private_message) { Fabricate(:private_message_topic) }
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
it "returns false for a non logged in user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_reply_as_new_topic?(topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false for a nil topic" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_reply_as_new_topic?(nil)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false for an untrusted user" do
|
2014-09-05 01:20:39 -04:00
|
|
|
user.trust_level = TrustLevel[0]
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_reply_as_new_topic?(topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true for a trusted user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_reply_as_new_topic?(topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2016-11-29 12:59:42 -05:00
|
|
|
|
|
|
|
it "returns true for a private message" do
|
|
|
|
expect(Guardian.new(user).can_reply_as_new_topic?(private_message)).to be_truthy
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'can_see_post_actors?' do
|
|
|
|
|
|
|
|
let(:topic) { Fabricate(:topic, user: coding_horror) }
|
|
|
|
|
2013-04-29 02:33:24 -04:00
|
|
|
it 'displays visibility correctly' do
|
|
|
|
guardian = Guardian.new(user)
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(guardian.can_see_post_actors?(nil, PostActionType.types[:like])).to be_falsey
|
|
|
|
expect(guardian.can_see_post_actors?(topic, PostActionType.types[:like])).to be_truthy
|
|
|
|
expect(guardian.can_see_post_actors?(topic, PostActionType.types[:bookmark])).to be_falsey
|
|
|
|
expect(guardian.can_see_post_actors?(topic, PostActionType.types[:off_topic])).to be_falsey
|
|
|
|
expect(guardian.can_see_post_actors?(topic, PostActionType.types[:spam])).to be_falsey
|
2016-10-19 02:36:35 -04:00
|
|
|
expect(guardian.can_see_post_actors?(topic, PostActionType.types[:notify_user])).to be_falsey
|
|
|
|
|
|
|
|
expect(Guardian.new(moderator).can_see_post_actors?(topic, PostActionType.types[:notify_user])).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'can_impersonate?' do
|
2013-04-29 02:33:24 -04:00
|
|
|
it 'allows impersonation correctly' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_impersonate?(nil)).to be_falsey
|
|
|
|
expect(Guardian.new.can_impersonate?(user)).to be_falsey
|
|
|
|
expect(Guardian.new(coding_horror).can_impersonate?(user)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_impersonate?(admin)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_impersonate?(another_admin)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_impersonate?(user)).to be_truthy
|
|
|
|
expect(Guardian.new(admin).can_impersonate?(moderator)).to be_truthy
|
2013-09-04 20:27:34 -04:00
|
|
|
|
|
|
|
Rails.configuration.stubs(:developer_emails).returns([admin.email])
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_impersonate?(another_admin)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-02-21 07:45:30 -05:00
|
|
|
describe "can_view_action_logs?" do
|
|
|
|
it 'is false for non-staff acting user' do
|
|
|
|
expect(Guardian.new(user).can_view_action_logs?(moderator)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false without a target user' do
|
|
|
|
expect(Guardian.new(moderator).can_view_action_logs?(nil)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2017-02-22 03:01:40 -05:00
|
|
|
it 'is true when target user is present' do
|
|
|
|
expect(Guardian.new(moderator).can_view_action_logs?(user)).to be_truthy
|
2017-02-21 07:45:30 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-11-06 12:56:26 -05:00
|
|
|
describe 'can_invite_to_forum?' do
|
|
|
|
let(:user) { Fabricate.build(:user) }
|
|
|
|
let(:moderator) { Fabricate.build(:moderator) }
|
|
|
|
|
2020-10-21 05:09:44 -04:00
|
|
|
it 'returns true if user has sufficient trust level' do
|
|
|
|
SiteSetting.min_trust_level_to_allow_invite = 2
|
|
|
|
expect(Guardian.new(trust_level_2).can_invite_to_forum?).to be_truthy
|
|
|
|
expect(Guardian.new(moderator).can_invite_to_forum?).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false if user trust level does not have sufficient trust level' do
|
|
|
|
SiteSetting.min_trust_level_to_allow_invite = 2
|
|
|
|
expect(Guardian.new(trust_level_1).can_invite_to_forum?).to be_falsey
|
|
|
|
end
|
|
|
|
|
2013-11-06 12:56:26 -05:00
|
|
|
it "doesn't allow anonymous users to invite" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_invite_to_forum?).to be_falsey
|
2013-11-06 12:56:26 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when the site requires approving users and is mod' do
|
2017-07-21 02:12:24 -04:00
|
|
|
SiteSetting.must_approve_users = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_invite_to_forum?).to be_truthy
|
2013-11-06 12:56:26 -05:00
|
|
|
end
|
|
|
|
|
2015-05-19 02:51:21 -04:00
|
|
|
it 'returns false when max_invites_per_day is 0' do
|
|
|
|
# let's also break it while here
|
|
|
|
SiteSetting.max_invites_per_day = "a"
|
2015-06-05 00:52:41 -04:00
|
|
|
|
|
|
|
expect(Guardian.new(user).can_invite_to_forum?).to be_falsey
|
|
|
|
# staff should be immune to max_invites_per_day setting
|
|
|
|
expect(Guardian.new(moderator).can_invite_to_forum?).to be_truthy
|
2015-05-19 02:51:21 -04:00
|
|
|
end
|
|
|
|
|
2017-07-21 02:12:24 -04:00
|
|
|
context 'with groups' do
|
|
|
|
let(:groups) { [group, another_group] }
|
|
|
|
|
|
|
|
before do
|
|
|
|
user.update!(trust_level: TrustLevel[2])
|
|
|
|
group.add_owner(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false when user is not allowed to edit a group' do
|
|
|
|
expect(Guardian.new(user).can_invite_to_forum?(groups)).to eq(false)
|
|
|
|
|
2019-05-06 06:14:35 -04:00
|
|
|
expect(Guardian.new(admin).can_invite_to_forum?(groups))
|
2017-07-21 02:12:24 -04:00
|
|
|
.to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when user is allowed to edit groups' do
|
|
|
|
another_group.add_owner(user)
|
|
|
|
|
|
|
|
expect(Guardian.new(user).can_invite_to_forum?(groups)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
2013-11-06 12:56:26 -05:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
describe 'can_invite_to?' do
|
|
|
|
|
2017-05-19 12:55:26 -04:00
|
|
|
describe "regular topics" do
|
2020-10-21 05:09:44 -04:00
|
|
|
before do
|
|
|
|
SiteSetting.min_trust_level_to_allow_invite = 2
|
|
|
|
user.update!(trust_level: SiteSetting.min_trust_level_to_allow_invite)
|
|
|
|
end
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:category) { Fabricate(:category, read_restricted: true) }
|
|
|
|
fab!(:topic) { Fabricate(:topic) }
|
|
|
|
fab!(:private_topic) { Fabricate(:topic, category: category) }
|
|
|
|
fab!(:user) { topic.user }
|
2017-05-19 12:55:26 -04:00
|
|
|
let(:private_category) { Fabricate(:private_category, group: group) }
|
|
|
|
let(:group_private_topic) { Fabricate(:topic, category: private_category) }
|
|
|
|
let(:group_owner) { group_private_topic.user.tap { |u| group.add_owner(u) } }
|
|
|
|
|
|
|
|
it 'handles invitation correctly' do
|
|
|
|
expect(Guardian.new(nil).can_invite_to?(topic)).to be_falsey
|
|
|
|
expect(Guardian.new(moderator).can_invite_to?(nil)).to be_falsey
|
|
|
|
expect(Guardian.new(moderator).can_invite_to?(topic)).to be_truthy
|
2020-10-21 05:09:44 -04:00
|
|
|
expect(Guardian.new(trust_level_1).can_invite_to?(topic)).to be_falsey
|
2017-05-19 12:55:26 -04:00
|
|
|
|
|
|
|
SiteSetting.max_invites_per_day = 0
|
|
|
|
|
|
|
|
expect(Guardian.new(user).can_invite_to?(topic)).to be_falsey
|
|
|
|
# staff should be immune to max_invites_per_day setting
|
|
|
|
expect(Guardian.new(moderator).can_invite_to?(topic)).to be_truthy
|
|
|
|
end
|
2015-05-19 02:51:21 -04:00
|
|
|
|
2017-05-19 12:55:26 -04:00
|
|
|
it 'returns false for normal user on private topic' do
|
|
|
|
expect(Guardian.new(user).can_invite_to?(private_topic)).to be_falsey
|
|
|
|
end
|
2015-06-05 00:52:41 -04:00
|
|
|
|
2018-12-05 10:43:07 -05:00
|
|
|
it 'returns false for admin on private topic' do
|
|
|
|
expect(Guardian.new(admin).can_invite_to?(private_topic)).to be(false)
|
2017-05-19 12:55:26 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2017-05-19 12:55:26 -04:00
|
|
|
it 'returns true for a group owner' do
|
|
|
|
expect(Guardian.new(group_owner).can_invite_to?(group_private_topic)).to be_truthy
|
|
|
|
end
|
2018-03-07 15:04:17 -05:00
|
|
|
|
|
|
|
it 'returns true for normal user when inviting to topic and PM disabled' do
|
|
|
|
SiteSetting.enable_personal_messages = false
|
|
|
|
expect(Guardian.new(trust_level_2).can_invite_to?(topic)).to be_truthy
|
|
|
|
end
|
2018-12-05 10:43:07 -05:00
|
|
|
|
2021-05-12 06:06:39 -04:00
|
|
|
it 'fails for normal users if must_approve_users' do
|
|
|
|
SiteSetting.must_approve_users = true
|
|
|
|
expect(Guardian.new(user).can_invite_to?(topic)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_invite_to?(topic)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2018-12-05 10:43:07 -05:00
|
|
|
describe 'for a private category for automatic and non-automatic group' do
|
|
|
|
let(:category) do
|
|
|
|
Fabricate(:category, read_restricted: true).tap do |category|
|
|
|
|
category.groups << automatic_group
|
|
|
|
category.groups << group
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:topic) { Fabricate(:topic, category: category) }
|
|
|
|
|
|
|
|
it 'should return true for an admin user' do
|
|
|
|
expect(Guardian.new(admin).can_invite_to?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should return true for a group owner' do
|
|
|
|
expect(Guardian.new(group_owner).can_invite_to?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should return false for a normal user' do
|
|
|
|
expect(Guardian.new(user).can_invite_to?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'for a private category for automatic groups' do
|
|
|
|
let(:category) do
|
2019-05-07 04:51:32 -04:00
|
|
|
Fabricate(:private_category, group: automatic_group, read_restricted: true)
|
2018-12-05 10:43:07 -05:00
|
|
|
end
|
|
|
|
|
2019-05-07 04:51:32 -04:00
|
|
|
let(:group_owner) { Fabricate(:user).tap { |user| automatic_group.add_owner(user) } }
|
2018-12-05 10:43:07 -05:00
|
|
|
let(:topic) { Fabricate(:topic, category: category) }
|
|
|
|
|
|
|
|
it 'should return false for all type of users' do
|
|
|
|
expect(Guardian.new(admin).can_invite_to?(topic)).to eq(false)
|
|
|
|
expect(Guardian.new(group_owner).can_invite_to?(topic)).to eq(false)
|
|
|
|
expect(Guardian.new(user).can_invite_to?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
2014-07-04 13:34:19 -04:00
|
|
|
end
|
|
|
|
|
2017-05-19 12:55:26 -04:00
|
|
|
describe "private messages" do
|
2020-10-22 09:36:56 -04:00
|
|
|
fab!(:user) { Fabricate(:user, trust_level: TrustLevel[2]) }
|
2020-10-21 05:09:44 -04:00
|
|
|
fab!(:user) { Fabricate(:user, trust_level: SiteSetting.min_trust_level_to_allow_invite) }
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:pm) { Fabricate(:private_message_topic, user: user) }
|
2014-07-04 13:34:19 -04:00
|
|
|
|
2017-05-19 12:55:26 -04:00
|
|
|
context "when private messages are disabled" do
|
|
|
|
it "allows an admin to invite to the pm" do
|
|
|
|
expect(Guardian.new(admin).can_invite_to?(pm)).to be_truthy
|
|
|
|
expect(Guardian.new(user).can_invite_to?(pm)).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when private messages are disabled" do
|
|
|
|
before do
|
2018-01-31 01:03:12 -05:00
|
|
|
SiteSetting.enable_personal_messages = false
|
2017-05-19 12:55:26 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't allow a regular user to invite" do
|
|
|
|
expect(Guardian.new(admin).can_invite_to?(pm)).to be_truthy
|
|
|
|
expect(Guardian.new(user).can_invite_to?(pm)).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
2020-10-21 05:09:44 -04:00
|
|
|
|
|
|
|
context "when private messages are enabled" do
|
|
|
|
before do
|
|
|
|
SiteSetting.enable_personal_messages = true
|
2020-10-22 09:36:56 -04:00
|
|
|
SiteSetting.min_trust_level_to_allow_invite = 2
|
2020-10-21 05:09:44 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if user has sufficient trust level" do
|
2020-10-22 09:36:56 -04:00
|
|
|
user.trust_level = 2
|
2020-10-21 05:09:44 -04:00
|
|
|
expect(Guardian.new(user).can_invite_to?(pm)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false if user has sufficient trust level" do
|
|
|
|
user.trust_level = 1
|
|
|
|
expect(Guardian.new(user).can_invite_to?(pm)).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
2018-08-23 00:36:49 -04:00
|
|
|
|
2021-05-20 21:43:47 -04:00
|
|
|
context "when PM has reached the maximum number of recipients" do
|
2018-08-23 00:36:49 -04:00
|
|
|
before do
|
|
|
|
SiteSetting.max_allowed_message_recipients = 2
|
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't allow a regular user to invite" do
|
|
|
|
expect(Guardian.new(user).can_invite_to?(pm)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "allows staff to invite" do
|
|
|
|
expect(Guardian.new(admin).can_invite_to?(pm)).to be_truthy
|
|
|
|
pm.grant_permission_to_user(moderator.email)
|
|
|
|
expect(Guardian.new(moderator).can_invite_to?(pm)).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
2015-03-02 14:25:25 -05:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2017-02-02 12:38:25 -05:00
|
|
|
describe 'can_invite_via_email?' do
|
|
|
|
it 'returns true for all (tl2 and above) users when sso is disabled, local logins are enabled, user approval is not required' do
|
|
|
|
expect(Guardian.new(trust_level_2).can_invite_via_email?(topic)).to be_truthy
|
|
|
|
expect(Guardian.new(moderator).can_invite_via_email?(topic)).to be_truthy
|
|
|
|
expect(Guardian.new(admin).can_invite_via_email?(topic)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2021-03-18 20:20:10 -04:00
|
|
|
it 'returns true for all users when sso is enabled' do
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.discourse_connect_url = "https://www.example.com/sso"
|
|
|
|
SiteSetting.enable_discourse_connect = true
|
2017-02-02 12:38:25 -05:00
|
|
|
|
2021-03-18 20:20:10 -04:00
|
|
|
expect(Guardian.new(trust_level_2).can_invite_via_email?(topic)).to be_truthy
|
|
|
|
expect(Guardian.new(moderator).can_invite_via_email?(topic)).to be_truthy
|
|
|
|
expect(Guardian.new(admin).can_invite_via_email?(topic)).to be_truthy
|
2017-02-02 12:38:25 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false for all users when local logins are disabled' do
|
|
|
|
SiteSetting.enable_local_logins = false
|
|
|
|
|
|
|
|
expect(Guardian.new(trust_level_2).can_invite_via_email?(topic)).to be_falsey
|
|
|
|
expect(Guardian.new(moderator).can_invite_via_email?(topic)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_invite_via_email?(topic)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2021-05-20 21:43:47 -04:00
|
|
|
it 'returns correct values when user approval is required' do
|
2017-02-02 12:38:25 -05:00
|
|
|
SiteSetting.must_approve_users = true
|
|
|
|
|
|
|
|
expect(Guardian.new(trust_level_2).can_invite_via_email?(topic)).to be_falsey
|
|
|
|
expect(Guardian.new(moderator).can_invite_via_email?(topic)).to be_truthy
|
|
|
|
expect(Guardian.new(admin).can_invite_via_email?(topic)).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
describe 'can_see?' do
|
|
|
|
|
|
|
|
it 'returns false with a nil object' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_see?(nil)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2016-02-24 05:30:17 -05:00
|
|
|
describe 'a Category' do
|
|
|
|
|
|
|
|
it 'allows public categories' do
|
|
|
|
public_category = build(:category, read_restricted: false)
|
|
|
|
expect(Guardian.new.can_see?(public_category)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'correctly handles secure categories' do
|
|
|
|
normal_user = build(:user)
|
|
|
|
staged_user = build(:user, staged: true)
|
|
|
|
admin_user = build(:user, admin: true)
|
|
|
|
|
|
|
|
secure_category = build(:category, read_restricted: true)
|
|
|
|
expect(Guardian.new(normal_user).can_see?(secure_category)).to be_falsey
|
|
|
|
expect(Guardian.new(staged_user).can_see?(secure_category)).to be_falsey
|
|
|
|
expect(Guardian.new(admin_user).can_see?(secure_category)).to be_truthy
|
|
|
|
|
|
|
|
secure_category = build(:category, read_restricted: true, email_in: "foo@bar.com")
|
|
|
|
expect(Guardian.new(normal_user).can_see?(secure_category)).to be_falsey
|
|
|
|
expect(Guardian.new(staged_user).can_see?(secure_category)).to be_falsey
|
|
|
|
expect(Guardian.new(admin_user).can_see?(secure_category)).to be_truthy
|
|
|
|
|
|
|
|
secure_category = build(:category, read_restricted: true, email_in_allow_strangers: true)
|
|
|
|
expect(Guardian.new(normal_user).can_see?(secure_category)).to be_falsey
|
|
|
|
expect(Guardian.new(staged_user).can_see?(secure_category)).to be_falsey
|
|
|
|
expect(Guardian.new(admin_user).can_see?(secure_category)).to be_truthy
|
|
|
|
|
|
|
|
secure_category = build(:category, read_restricted: true, email_in: "foo@bar.com", email_in_allow_strangers: true)
|
|
|
|
expect(Guardian.new(normal_user).can_see?(secure_category)).to be_falsey
|
|
|
|
expect(Guardian.new(staged_user).can_see?(secure_category)).to be_truthy
|
|
|
|
expect(Guardian.new(admin_user).can_see?(secure_category)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'allows members of an authorized group' do
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
2019-05-07 04:37:42 -04:00
|
|
|
secure_category = plain_category
|
2016-02-24 05:30:17 -05:00
|
|
|
secure_category.set_permissions(group => :readonly)
|
|
|
|
secure_category.save
|
|
|
|
|
|
|
|
expect(Guardian.new(user).can_see?(secure_category)).to be_falsey
|
|
|
|
|
|
|
|
group.add(user)
|
|
|
|
group.save
|
|
|
|
|
|
|
|
expect(Guardian.new(user).can_see?(secure_category)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
describe 'a Topic' do
|
|
|
|
it 'allows non logged in users to view topics' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_see?(topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2013-04-29 02:33:24 -04:00
|
|
|
|
|
|
|
it 'correctly handles groups' do
|
2013-07-13 21:24:16 -04:00
|
|
|
category = Fabricate(:category, read_restricted: true)
|
|
|
|
category.set_permissions(group => :full)
|
|
|
|
category.save
|
2013-04-29 02:33:24 -04:00
|
|
|
|
|
|
|
topic = Fabricate(:topic, category: category)
|
|
|
|
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_see?(topic)).to be_falsey
|
2013-04-29 02:33:24 -04:00
|
|
|
group.add(user)
|
|
|
|
group.save
|
|
|
|
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_see?(topic)).to be_truthy
|
2013-04-29 02:33:24 -04:00
|
|
|
end
|
2014-05-12 15:26:36 -04:00
|
|
|
|
2014-07-15 17:02:43 -04:00
|
|
|
it "restricts deleted topics" do
|
|
|
|
topic = Fabricate(:topic)
|
|
|
|
topic.trash!(moderator)
|
|
|
|
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(build(:user)).can_see?(topic)).to be_falsey
|
|
|
|
expect(Guardian.new(moderator).can_see?(topic)).to be_truthy
|
|
|
|
expect(Guardian.new(admin).can_see?(topic)).to be_truthy
|
2014-07-15 17:02:43 -04:00
|
|
|
end
|
|
|
|
|
2014-05-12 15:26:36 -04:00
|
|
|
it "restricts private topics" do
|
|
|
|
user.save!
|
|
|
|
private_topic = Fabricate(:private_message_topic, user: user)
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(private_topic.user).can_see?(private_topic)).to be_truthy
|
|
|
|
expect(Guardian.new(build(:user)).can_see?(private_topic)).to be_falsey
|
|
|
|
expect(Guardian.new(moderator).can_see?(private_topic)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_see?(private_topic)).to be_truthy
|
2014-05-12 15:26:36 -04:00
|
|
|
end
|
2014-07-15 17:02:43 -04:00
|
|
|
|
|
|
|
it "restricts private deleted topics" do
|
|
|
|
user.save!
|
|
|
|
private_topic = Fabricate(:private_message_topic, user: user)
|
|
|
|
private_topic.trash!(admin)
|
|
|
|
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(private_topic.user).can_see?(private_topic)).to be_falsey
|
|
|
|
expect(Guardian.new(build(:user)).can_see?(private_topic)).to be_falsey
|
|
|
|
expect(Guardian.new(moderator).can_see?(private_topic)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_see?(private_topic)).to be_truthy
|
2014-07-15 17:02:43 -04:00
|
|
|
end
|
2014-07-29 10:40:02 -04:00
|
|
|
|
|
|
|
it "restricts static doc topics" do
|
|
|
|
tos_topic = Fabricate(:topic, user: Discourse.system_user)
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.tos_topic_id = tos_topic.id
|
2014-07-29 10:40:02 -04:00
|
|
|
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(build(:user)).can_edit?(tos_topic)).to be_falsey
|
|
|
|
expect(Guardian.new(moderator).can_edit?(tos_topic)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_edit?(tos_topic)).to be_truthy
|
2014-07-29 10:40:02 -04:00
|
|
|
end
|
2015-02-16 07:03:04 -05:00
|
|
|
|
|
|
|
it "allows moderators to see a flagged private message" do
|
|
|
|
moderator.save!
|
|
|
|
user.save!
|
|
|
|
|
|
|
|
private_topic = Fabricate(:private_message_topic, user: user)
|
|
|
|
first_post = Fabricate(:post, topic: private_topic, user: user)
|
|
|
|
|
|
|
|
expect(Guardian.new(moderator).can_see?(private_topic)).to be_falsey
|
|
|
|
|
2019-01-03 12:03:01 -05:00
|
|
|
PostActionCreator.create(user, first_post, :off_topic)
|
2015-02-16 07:03:04 -05:00
|
|
|
expect(Guardian.new(moderator).can_see?(private_topic)).to be_truthy
|
|
|
|
end
|
2019-06-25 06:49:29 -04:00
|
|
|
|
|
|
|
it "allows staff to set banner topics" do
|
|
|
|
topic = Fabricate(:topic)
|
|
|
|
|
|
|
|
expect(Guardian.new(admin).can_banner_topic?(nil)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_banner_topic?(topic)).to be_truthy
|
|
|
|
end
|
2020-11-05 12:18:26 -05:00
|
|
|
|
|
|
|
it 'respects category group moderator settings' do
|
|
|
|
group_user = Fabricate(:group_user)
|
|
|
|
user_gm = group_user.user
|
|
|
|
group = group_user.group
|
|
|
|
SiteSetting.enable_category_group_moderation = true
|
|
|
|
|
|
|
|
topic = Fabricate(:topic)
|
|
|
|
|
|
|
|
expect(Guardian.new(user_gm).can_see?(topic)).to be_truthy
|
|
|
|
|
|
|
|
topic.trash!(admin)
|
|
|
|
topic.reload
|
|
|
|
|
|
|
|
expect(Guardian.new(user_gm).can_see?(topic)).to be_falsey
|
|
|
|
|
|
|
|
topic.category.update!(reviewable_by_group_id: group.id, topic_id: post.topic.id)
|
|
|
|
expect(Guardian.new(user_gm).can_see?(topic)).to be_truthy
|
|
|
|
end
|
2013-04-29 02:33:24 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'a Post' do
|
2020-11-05 12:18:26 -05:00
|
|
|
fab!(:post) { Fabricate(:post) }
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:another_admin) { Fabricate(:admin) }
|
2020-11-05 12:18:26 -05:00
|
|
|
|
2013-04-29 02:33:24 -04:00
|
|
|
it 'correctly handles post visibility' do
|
2013-05-21 02:39:51 -04:00
|
|
|
topic = post.topic
|
|
|
|
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_see?(post)).to be_truthy
|
2013-04-29 02:33:24 -04:00
|
|
|
|
2013-07-09 15:20:18 -04:00
|
|
|
post.trash!(another_admin)
|
2013-04-29 02:33:24 -04:00
|
|
|
post.reload
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_see?(post)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_see?(post)).to be_truthy
|
2013-04-29 02:33:24 -04:00
|
|
|
|
2013-05-07 00:39:01 -04:00
|
|
|
post.recover!
|
2013-04-29 02:33:24 -04:00
|
|
|
post.reload
|
2013-07-09 15:20:18 -04:00
|
|
|
topic.trash!(another_admin)
|
2013-04-29 02:33:24 -04:00
|
|
|
topic.reload
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_see?(post)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_see?(post)).to be_truthy
|
2013-04-29 02:33:24 -04:00
|
|
|
end
|
2015-09-10 16:01:23 -04:00
|
|
|
|
2020-11-05 12:18:26 -05:00
|
|
|
it 'respects category group moderator settings' do
|
|
|
|
group_user = Fabricate(:group_user)
|
|
|
|
user_gm = group_user.user
|
|
|
|
group = group_user.group
|
|
|
|
SiteSetting.enable_category_group_moderation = true
|
|
|
|
|
|
|
|
expect(Guardian.new(user_gm).can_see?(post)).to be_truthy
|
|
|
|
|
|
|
|
post.trash!(another_admin)
|
|
|
|
post.reload
|
|
|
|
|
|
|
|
expect(Guardian.new(user_gm).can_see?(post)).to be_falsey
|
|
|
|
|
|
|
|
post.topic.category.update!(reviewable_by_group_id: group.id, topic_id: post.topic.id)
|
|
|
|
expect(Guardian.new(user_gm).can_see?(post)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2021-06-21 12:10:02 -04:00
|
|
|
it 'TL4 users can see their deleted posts' do
|
|
|
|
user = Fabricate(:user, trust_level: 4)
|
|
|
|
user2 = Fabricate(:user, trust_level: 4)
|
|
|
|
post = Fabricate(:post, user: user, topic: Fabricate(:post).topic)
|
|
|
|
|
|
|
|
expect(Guardian.new(user).can_see?(post)).to eq(true)
|
|
|
|
PostDestroyer.new(user, post).destroy
|
|
|
|
expect(Guardian.new(user).can_see?(post)).to eq(true)
|
|
|
|
expect(Guardian.new(user2).can_see?(post)).to eq(false)
|
|
|
|
end
|
|
|
|
|
2015-09-10 16:01:23 -04:00
|
|
|
it 'respects whispers' do
|
2020-11-05 12:18:26 -05:00
|
|
|
regular_post = post
|
2015-09-10 16:01:23 -04:00
|
|
|
whisper_post = Fabricate.build(:post, post_type: Post.types[:whisper])
|
|
|
|
|
|
|
|
anon_guardian = Guardian.new
|
|
|
|
expect(anon_guardian.can_see?(regular_post)).to eq(true)
|
|
|
|
expect(anon_guardian.can_see?(whisper_post)).to eq(false)
|
|
|
|
|
|
|
|
regular_user = Fabricate.build(:user)
|
|
|
|
regular_guardian = Guardian.new(regular_user)
|
|
|
|
expect(regular_guardian.can_see?(regular_post)).to eq(true)
|
|
|
|
expect(regular_guardian.can_see?(whisper_post)).to eq(false)
|
|
|
|
|
|
|
|
# can see your own whispers
|
|
|
|
regular_whisper = Fabricate.build(:post, post_type: Post.types[:whisper], user: regular_user)
|
|
|
|
expect(regular_guardian.can_see?(regular_whisper)).to eq(true)
|
|
|
|
|
|
|
|
mod_guardian = Guardian.new(Fabricate.build(:moderator))
|
|
|
|
expect(mod_guardian.can_see?(regular_post)).to eq(true)
|
|
|
|
expect(mod_guardian.can_see?(whisper_post)).to eq(true)
|
|
|
|
|
|
|
|
admin_guardian = Guardian.new(Fabricate.build(:admin))
|
|
|
|
expect(admin_guardian.can_see?(regular_post)).to eq(true)
|
|
|
|
expect(admin_guardian.can_see?(whisper_post)).to eq(true)
|
|
|
|
end
|
2014-03-13 10:47:37 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'a PostRevision' do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:post_revision) { Fabricate(:post_revision) }
|
2014-03-13 10:47:37 -04:00
|
|
|
|
|
|
|
context 'edit_history_visible_to_public is true' do
|
2017-07-07 02:09:14 -04:00
|
|
|
before { SiteSetting.edit_history_visible_to_public = true }
|
2014-03-13 10:47:37 -04:00
|
|
|
|
|
|
|
it 'is false for nil' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_see?(nil)).to be_falsey
|
2014-03-13 10:47:37 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true if not logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_see?(post_revision)).to be_truthy
|
2014-03-13 10:47:37 -04:00
|
|
|
end
|
2013-04-29 02:33:24 -04:00
|
|
|
|
2014-03-13 10:47:37 -04:00
|
|
|
it 'is true when logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(Fabricate(:user)).can_see?(post_revision)).to be_truthy
|
2014-03-13 10:47:37 -04:00
|
|
|
end
|
|
|
|
end
|
2013-04-29 02:33:24 -04:00
|
|
|
|
2014-03-13 10:47:37 -04:00
|
|
|
context 'edit_history_visible_to_public is false' do
|
2017-07-07 02:09:14 -04:00
|
|
|
before { SiteSetting.edit_history_visible_to_public = false }
|
2014-03-13 10:47:37 -04:00
|
|
|
|
|
|
|
it 'is true for staff' do
|
2019-05-06 06:14:35 -04:00
|
|
|
expect(Guardian.new(admin).can_see?(post_revision)).to be_truthy
|
2019-05-06 06:13:39 -04:00
|
|
|
expect(Guardian.new(moderator).can_see?(post_revision)).to be_truthy
|
2014-03-13 10:47:37 -04:00
|
|
|
end
|
|
|
|
|
2020-06-18 06:27:51 -04:00
|
|
|
it 'is false for trust level equal or lower than 4' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(trust_level_3).can_see?(post_revision)).to be_falsey
|
2020-06-18 06:27:51 -04:00
|
|
|
expect(Guardian.new(trust_level_4).can_see?(post_revision)).to be_falsey
|
2014-03-13 10:47:37 -04:00
|
|
|
end
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'can_create?' do
|
|
|
|
|
|
|
|
describe 'a Category' do
|
|
|
|
|
|
|
|
it 'returns false when not logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_create?(Category)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false when a regular user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_create?(Category)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-02-06 22:11:52 -05:00
|
|
|
it 'returns false when a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_create?(Category)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when an admin' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_create?(Category)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-07-16 01:44:07 -04:00
|
|
|
describe 'a Topic' do
|
2016-04-13 01:59:38 -04:00
|
|
|
it 'does not allow moderators to create topics in readonly categories' do
|
2019-05-07 04:37:42 -04:00
|
|
|
category = plain_category
|
2016-04-13 01:59:38 -04:00
|
|
|
category.set_permissions(everyone: :read)
|
|
|
|
category.save
|
|
|
|
|
|
|
|
expect(Guardian.new(moderator).can_create?(Topic, category)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2013-07-16 01:44:07 -04:00
|
|
|
it 'should check for full permissions' do
|
2019-05-07 04:37:42 -04:00
|
|
|
category = plain_category
|
2013-07-16 01:44:07 -04:00
|
|
|
category.set_permissions(everyone: :create_post)
|
|
|
|
category.save
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_create?(Topic, category)).to be_falsey
|
2013-07-16 01:44:07 -04:00
|
|
|
end
|
2013-09-03 19:12:22 -04:00
|
|
|
|
|
|
|
it "is true for new users by default" do
|
2019-05-07 04:37:42 -04:00
|
|
|
expect(Guardian.new(user).can_create?(Topic, plain_category)).to be_truthy
|
2013-09-03 19:12:22 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false if user has not met minimum trust level" do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.min_trust_to_create_topic = 1
|
2019-05-07 04:37:42 -04:00
|
|
|
expect(Guardian.new(build(:user, trust_level: 0)).can_create?(Topic, plain_category)).to be_falsey
|
2013-09-03 19:12:22 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is true if user has met or exceeded the minimum trust level" do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.min_trust_to_create_topic = 1
|
2019-05-07 04:37:42 -04:00
|
|
|
expect(Guardian.new(build(:user, trust_level: 1)).can_create?(Topic, plain_category)).to be_truthy
|
|
|
|
expect(Guardian.new(build(:user, trust_level: 2)).can_create?(Topic, plain_category)).to be_truthy
|
|
|
|
expect(Guardian.new(build(:admin, trust_level: 0)).can_create?(Topic, plain_category)).to be_truthy
|
|
|
|
expect(Guardian.new(build(:moderator, trust_level: 0)).can_create?(Topic, plain_category)).to be_truthy
|
2013-09-03 19:12:22 -04:00
|
|
|
end
|
2013-07-16 01:44:07 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
describe 'a Post' do
|
|
|
|
|
2013-07-16 01:44:07 -04:00
|
|
|
it "is false on readonly categories" do
|
2019-05-07 04:37:42 -04:00
|
|
|
category = plain_category
|
2013-07-16 01:44:07 -04:00
|
|
|
topic.category = category
|
|
|
|
category.set_permissions(everyone: :readonly)
|
|
|
|
category.save
|
|
|
|
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(topic.user).can_create?(Post, topic)).to be_falsey
|
2016-04-13 01:59:38 -04:00
|
|
|
expect(Guardian.new(moderator).can_create?(Post, topic)).to be_falsey
|
2013-07-16 01:44:07 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
it "is false when not logged in" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_create?(Post, topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for a regular user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(topic.user).can_create?(Post, topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false when you can't see the topic" do
|
|
|
|
Guardian.any_instance.expects(:can_see?).with(topic).returns(false)
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(topic.user).can_create?(Post, topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'closed topic' do
|
|
|
|
before do
|
|
|
|
topic.closed = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't allow new posts from regular users" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(topic.user).can_create?(Post, topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'allows editing of posts' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(topic.user).can_edit?(post)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows new posts from moderators" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_create?(Post, topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows new posts from admins" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_create?(Post, topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2014-03-17 14:50:28 -04:00
|
|
|
|
2014-09-05 02:52:40 -04:00
|
|
|
it "allows new posts from trust_level_4s" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(trust_level_4).can_create?(Post, topic)).to be_truthy
|
2014-03-17 14:50:28 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'archived topic' do
|
|
|
|
before do
|
|
|
|
topic.archived = true
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'regular users' do
|
|
|
|
it "doesn't allow new posts from regular users" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_create?(Post, topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-08-15 12:44:58 -04:00
|
|
|
it 'does not allow editing of posts' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_edit?(post)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
2013-02-25 11:42:20 -05:00
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
it "allows new posts from moderators" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_create?(Post, topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows new posts from admins" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_create?(Post, topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-07-11 16:38:46 -04:00
|
|
|
context "trashed topic" do
|
|
|
|
before do
|
|
|
|
topic.deleted_at = Time.now
|
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't allow new posts from regular users" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_create?(Post, topic)).to be_falsey
|
2013-07-11 16:38:46 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't allow new posts from moderators users" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_create?(Post, topic)).to be_falsey
|
2013-07-11 16:38:46 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't allow new posts from admins" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_create?(Post, topic)).to be_falsey
|
2013-07-11 16:38:46 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-01-23 13:11:39 -05:00
|
|
|
context "system message" do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:private_message) {
|
2018-01-23 13:11:39 -05:00
|
|
|
Fabricate(
|
|
|
|
:topic,
|
|
|
|
archetype: Archetype.private_message,
|
|
|
|
subtype: 'system_message',
|
|
|
|
category_id: nil
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
before { user.save! }
|
|
|
|
it "allows the user to reply to system messages" do
|
|
|
|
expect(Guardian.new(user).can_create_post?(private_message)).to eq(true)
|
|
|
|
SiteSetting.enable_system_message_replies = false
|
|
|
|
expect(Guardian.new(user).can_create_post?(private_message)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
2016-01-22 12:54:18 -05:00
|
|
|
context "private message" do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:private_message) { Fabricate(:topic, archetype: Archetype.private_message, category_id: nil) }
|
2013-07-11 16:38:46 -04:00
|
|
|
|
2016-01-22 12:54:18 -05:00
|
|
|
before { user.save! }
|
|
|
|
|
|
|
|
it "allows new posts by people included in the pm" do
|
|
|
|
private_message.topic_allowed_users.create!(user_id: user.id)
|
|
|
|
expect(Guardian.new(user).can_create?(Post, private_message)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't allow new posts by people not invited to the pm" do
|
|
|
|
expect(Guardian.new(user).can_create?(Post, private_message)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2017-11-10 12:18:08 -05:00
|
|
|
it "allows new posts from silenced users included in the pm" do
|
2017-11-13 13:41:36 -05:00
|
|
|
user.update_attribute(:silenced_till, 1.year.from_now)
|
2016-01-22 12:54:18 -05:00
|
|
|
private_message.topic_allowed_users.create!(user_id: user.id)
|
|
|
|
expect(Guardian.new(user).can_create?(Post, private_message)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2017-11-10 12:18:08 -05:00
|
|
|
it "doesn't allow new posts from silenced users not invited to the pm" do
|
2017-11-13 13:41:36 -05:00
|
|
|
user.update_attribute(:silenced_till, 1.year.from_now)
|
2016-01-22 12:54:18 -05:00
|
|
|
expect(Guardian.new(user).can_create?(Post, private_message)).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end # can_create? a Post
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'post_can_act?' do
|
|
|
|
|
|
|
|
it "isn't allowed on nil" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(nil, nil)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'a Post' do
|
2013-02-25 11:42:20 -05:00
|
|
|
|
|
|
|
let (:guardian) do
|
2013-02-05 14:16:51 -05:00
|
|
|
Guardian.new(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "isn't allowed when not logged in" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).post_can_act?(post, :vote)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is allowed as a regular user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(guardian.post_can_act?(post, :vote)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "isn't allowed on archived topics" do
|
|
|
|
topic.archived = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).post_can_act?(post, :like)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-07-12 12:08:23 -04:00
|
|
|
describe "can_recover_topic?" do
|
|
|
|
|
|
|
|
it "returns false for a nil user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_recover_topic?(topic)).to be_falsey
|
2013-07-12 12:08:23 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false for a nil object" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_recover_topic?(nil)).to be_falsey
|
2013-07-12 12:08:23 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false for a regular user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_recover_topic?(topic)).to be_falsey
|
2013-07-12 12:08:23 -04:00
|
|
|
end
|
|
|
|
|
2017-03-06 00:17:57 -05:00
|
|
|
context 'as a moderator' do
|
|
|
|
before do
|
|
|
|
topic.save!
|
|
|
|
post.save!
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when post has been deleted' do
|
|
|
|
it "should return the right value" do
|
|
|
|
expect(Guardian.new(moderator).can_recover_topic?(topic)).to be_falsey
|
|
|
|
|
|
|
|
PostDestroyer.new(moderator, topic.first_post).destroy
|
|
|
|
|
|
|
|
expect(Guardian.new(moderator).can_recover_topic?(topic.reload)).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when post's user has been deleted" do
|
|
|
|
it 'should return the right value' do
|
|
|
|
PostDestroyer.new(moderator, topic.first_post).destroy
|
|
|
|
topic.first_post.user.destroy!
|
|
|
|
|
2020-02-06 03:19:04 -05:00
|
|
|
expect(Guardian.new(moderator).can_recover_topic?(topic.reload)).to be_truthy
|
2017-03-06 00:17:57 -05:00
|
|
|
end
|
|
|
|
end
|
2013-07-12 12:08:23 -04:00
|
|
|
end
|
2020-11-05 12:18:26 -05:00
|
|
|
|
|
|
|
context 'category group moderation is enabled' do
|
|
|
|
fab!(:group_user) { Fabricate(:group_user) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
topic.save!
|
|
|
|
post.save!
|
|
|
|
|
|
|
|
SiteSetting.enable_category_group_moderation = true
|
|
|
|
PostDestroyer.new(moderator, topic.first_post).destroy
|
|
|
|
topic.reload
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false if user is not a member of the appropriate group" do
|
|
|
|
expect(Guardian.new(group_user.user).can_recover_topic?(topic)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if user is a member of the appropriate group" do
|
|
|
|
topic.category.update!(reviewable_by_group_id: group_user.group.id)
|
|
|
|
|
|
|
|
expect(Guardian.new(group_user.user).can_recover_topic?(topic)).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
2013-07-12 12:08:23 -04:00
|
|
|
end
|
|
|
|
|
2013-02-07 15:12:55 -05:00
|
|
|
describe "can_recover_post?" do
|
|
|
|
|
|
|
|
it "returns false for a nil user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_recover_post?(post)).to be_falsey
|
2013-02-07 15:12:55 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false for a nil object" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_recover_post?(nil)).to be_falsey
|
2013-02-07 15:12:55 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false for a regular user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_recover_post?(post)).to be_falsey
|
2013-02-07 15:12:55 -05:00
|
|
|
end
|
|
|
|
|
2017-03-06 00:17:57 -05:00
|
|
|
context 'as a moderator' do
|
|
|
|
before do
|
|
|
|
topic.save!
|
|
|
|
post.save!
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when post has been deleted' do
|
|
|
|
it "should return the right value" do
|
|
|
|
expect(Guardian.new(moderator).can_recover_post?(post)).to be_falsey
|
|
|
|
|
|
|
|
PostDestroyer.new(moderator, post).destroy
|
|
|
|
|
|
|
|
expect(Guardian.new(moderator).can_recover_post?(post.reload)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when post's user has been deleted" do
|
|
|
|
it 'should return the right value' do
|
|
|
|
PostDestroyer.new(moderator, post).destroy
|
|
|
|
post.user.destroy!
|
|
|
|
|
2020-02-06 03:19:04 -05:00
|
|
|
expect(Guardian.new(moderator).can_recover_post?(post.reload)).to be_truthy
|
2017-03-06 00:17:57 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2013-02-07 15:12:55 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
2016-05-01 07:48:43 -04:00
|
|
|
context 'can_convert_topic?' do
|
|
|
|
it 'returns false with a nil object' do
|
|
|
|
expect(Guardian.new(user).can_convert_topic?(nil)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false when not logged in' do
|
|
|
|
expect(Guardian.new.can_convert_topic?(topic)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2016-05-04 12:29:56 -04:00
|
|
|
it 'returns false when not staff' do
|
|
|
|
expect(Guardian.new(trust_level_4).can_convert_topic?(topic)).to be_falsey
|
2017-10-02 04:04:58 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false for category definition topics' do
|
2019-05-07 04:37:42 -04:00
|
|
|
c = plain_category
|
2017-10-02 04:04:58 -04:00
|
|
|
topic = Topic.find_by(id: c.topic_id)
|
|
|
|
expect(Guardian.new(admin).can_convert_topic?(topic)).to be_falsey
|
2016-05-04 12:29:56 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when a moderator' do
|
|
|
|
expect(Guardian.new(moderator).can_convert_topic?(topic)).to be_truthy
|
2016-05-01 07:48:43 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when an admin' do
|
|
|
|
expect(Guardian.new(admin).can_convert_topic?(topic)).to be_truthy
|
|
|
|
end
|
2018-03-02 20:28:39 -05:00
|
|
|
|
|
|
|
it 'returns false when personal messages are disabled' do
|
|
|
|
SiteSetting.enable_personal_messages = false
|
|
|
|
expect(Guardian.new(admin).can_convert_topic?(topic)).to be_falsey
|
|
|
|
end
|
2016-05-01 07:48:43 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
describe 'can_edit?' do
|
|
|
|
|
|
|
|
it 'returns false with a nil object' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_edit?(nil)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'a Post' do
|
|
|
|
|
2018-08-15 00:29:36 -04:00
|
|
|
it 'returns false for silenced users' do
|
|
|
|
post.user.silenced_till = 1.day.from_now
|
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
it 'returns false when not logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_edit?(post)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-05-13 08:53:11 -04:00
|
|
|
it 'returns false when not logged in also for wiki post' do
|
|
|
|
post.wiki = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_edit?(post)).to be_falsey
|
2014-05-13 08:53:11 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
it 'returns true if you want to edit your own post' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2018-01-25 15:38:40 -05:00
|
|
|
it 'returns false if you try to edit a locked post' do
|
|
|
|
post.locked_by_id = moderator.id
|
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2014-06-20 15:38:03 -04:00
|
|
|
it "returns false if the post is hidden due to flagging and it's too soon" do
|
|
|
|
post.hidden = true
|
|
|
|
post.hidden_at = Time.now
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_falsey
|
2014-06-20 15:38:03 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if the post is hidden due to flagging and it been enough time" do
|
|
|
|
post.hidden = true
|
|
|
|
post.hidden_at = (SiteSetting.cooldown_minutes_after_hiding_posts + 1).minutes.ago
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_truthy
|
2014-09-16 11:20:31 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if the post is hidden, it's been enough time and the edit window has expired" do
|
|
|
|
post.hidden = true
|
|
|
|
post.hidden_at = (SiteSetting.cooldown_minutes_after_hiding_posts + 1).minutes.ago
|
|
|
|
post.created_at = (SiteSetting.post_edit_time_limit + 1).minutes.ago
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_truthy
|
2014-06-20 15:38:03 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if the post is hidden due to flagging and it's got a nil `hidden_at`" do
|
|
|
|
post.hidden = true
|
|
|
|
post.hidden_at = nil
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_truthy
|
2014-06-20 15:38:03 -04:00
|
|
|
end
|
|
|
|
|
2013-07-22 03:48:24 -04:00
|
|
|
it 'returns false if you are trying to edit a post you soft deleted' do
|
|
|
|
post.user_deleted = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_falsey
|
2013-07-22 03:48:24 -04:00
|
|
|
end
|
|
|
|
|
2014-05-13 08:53:11 -04:00
|
|
|
it 'returns false if another regular user tries to edit a soft deleted wiki post' do
|
|
|
|
post.wiki = true
|
|
|
|
post.user_deleted = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_edit?(post)).to be_falsey
|
2014-05-13 08:53:11 -04:00
|
|
|
end
|
|
|
|
|
2013-07-22 03:48:24 -04:00
|
|
|
it 'returns false if you are trying to edit a deleted post' do
|
|
|
|
post.deleted_at = 1.day.ago
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_falsey
|
2013-07-22 03:48:24 -04:00
|
|
|
end
|
|
|
|
|
2014-05-13 08:53:11 -04:00
|
|
|
it 'returns false if another regular user tries to edit a deleted wiki post' do
|
|
|
|
post.wiki = true
|
|
|
|
post.deleted_at = 1.day.ago
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_edit?(post)).to be_falsey
|
2014-05-13 08:53:11 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
it 'returns false if another regular user tries to edit your post' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_edit?(post)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-05-13 08:53:11 -04:00
|
|
|
it 'returns true if another regular user tries to edit wiki post' do
|
|
|
|
post.wiki = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_edit?(post)).to be_truthy
|
2014-05-13 08:53:11 -04:00
|
|
|
end
|
|
|
|
|
2017-05-08 16:23:11 -04:00
|
|
|
it "returns false if a wiki but the user can't create a post" do
|
2019-05-07 04:37:42 -04:00
|
|
|
c = plain_category
|
2017-05-08 16:23:11 -04:00
|
|
|
c.set_permissions(everyone: :readonly)
|
|
|
|
c.save
|
|
|
|
|
|
|
|
topic = Fabricate(:topic, category: c)
|
|
|
|
post = Fabricate(:post, topic: topic)
|
|
|
|
post.wiki = true
|
|
|
|
|
|
|
|
user = Fabricate(:user)
|
|
|
|
expect(Guardian.new(user).can_edit?(post)).to eq(false)
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
it 'returns true as a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit?(post)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2018-01-25 15:38:40 -05:00
|
|
|
it 'returns true as a moderator, even if locked' do
|
|
|
|
post.locked_by_id = admin.id
|
|
|
|
expect(Guardian.new(moderator).can_edit?(post)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
it 'returns true as an admin' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit?(post)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2014-01-07 10:32:09 -05:00
|
|
|
|
2014-03-13 10:47:37 -04:00
|
|
|
it 'returns true as a trust level 4 user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(trust_level_4).can_edit?(post)).to be_truthy
|
2014-03-13 10:47:37 -04:00
|
|
|
end
|
|
|
|
|
2020-10-23 12:37:44 -04:00
|
|
|
it 'returns false as a TL4 user if trusted_users_can_edit_others is false' do
|
2018-02-22 20:39:24 -05:00
|
|
|
SiteSetting.trusted_users_can_edit_others = false
|
|
|
|
expect(Guardian.new(trust_level_4).can_edit?(post)).to eq(false)
|
|
|
|
end
|
|
|
|
|
2020-02-04 18:28:35 -05:00
|
|
|
it 'returns false when trying to edit a topic with no trust' do
|
|
|
|
SiteSetting.min_trust_to_edit_post = 2
|
|
|
|
post.user.trust_level = 1
|
|
|
|
|
|
|
|
expect(Guardian.new(topic.user).can_edit?(topic)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2016-09-30 12:12:27 -04:00
|
|
|
it 'returns false when trying to edit a post with no trust' do
|
|
|
|
SiteSetting.min_trust_to_edit_post = 2
|
|
|
|
post.user.trust_level = 1
|
|
|
|
|
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when trying to edit a post with trust' do
|
|
|
|
SiteSetting.min_trust_to_edit_post = 1
|
|
|
|
post.user.trust_level = 1
|
|
|
|
|
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2015-02-25 14:53:21 -05:00
|
|
|
it 'returns false when another user has too low trust level to edit wiki post' do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.min_trust_to_edit_wiki_post = 2
|
2015-02-25 14:53:21 -05:00
|
|
|
post.wiki = true
|
|
|
|
coding_horror.trust_level = 1
|
|
|
|
|
|
|
|
expect(Guardian.new(coding_horror).can_edit?(post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when another user has adequate trust level to edit wiki post' do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.min_trust_to_edit_wiki_post = 2
|
2015-02-25 14:53:21 -05:00
|
|
|
post.wiki = true
|
|
|
|
coding_horror.trust_level = 2
|
|
|
|
|
|
|
|
expect(Guardian.new(coding_horror).can_edit?(post)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for post author even when he has too low trust level to edit wiki post' do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.min_trust_to_edit_wiki_post = 2
|
2015-02-25 14:53:21 -05:00
|
|
|
post.wiki = true
|
|
|
|
post.user.trust_level = 1
|
|
|
|
|
|
|
|
expect(Guardian.new(post.user).can_edit?(post)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2021-04-14 01:54:09 -04:00
|
|
|
context "shared drafts" do
|
|
|
|
fab!(:category) { Fabricate(:category) }
|
|
|
|
|
|
|
|
let(:topic) { Fabricate(:topic, category: category) }
|
|
|
|
let(:post_with_draft) { Fabricate(:post, topic: topic) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
SiteSetting.shared_drafts_category = category.id
|
|
|
|
SiteSetting.shared_drafts_min_trust_level = '2'
|
|
|
|
Fabricate(:shared_draft, topic: topic)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true if a shared draft exists' do
|
|
|
|
expect(Guardian.new(trust_level_2).can_edit_post?(post_with_draft)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false if the user has a lower trust level' do
|
|
|
|
expect(Guardian.new(trust_level_1).can_edit_post?(post_with_draft)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false if the draft is from a different category' do
|
|
|
|
topic.update!(category: Fabricate(:category))
|
|
|
|
|
|
|
|
expect(Guardian.new(trust_level_2).can_edit_post?(post_with_draft)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-10-23 12:37:44 -04:00
|
|
|
context 'category group moderation is enabled' do
|
|
|
|
fab!(:cat_mod_user) { Fabricate(:user) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
SiteSetting.enable_category_group_moderation = true
|
|
|
|
GroupUser.create!(group_id: group.id, user_id: cat_mod_user.id)
|
|
|
|
post.topic.category.update!(reviewable_by_group_id: group.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true as a category group moderator user' do
|
|
|
|
expect(Guardian.new(cat_mod_user).can_edit?(post)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false for a regular user' do
|
|
|
|
expect(Guardian.new(another_user).can_edit?(post)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-09-06 07:44:12 -04:00
|
|
|
describe 'post edit time limits' do
|
2021-04-14 01:54:09 -04:00
|
|
|
|
2019-09-06 07:44:12 -04:00
|
|
|
context 'post is older than post_edit_time_limit' do
|
2021-04-14 01:54:09 -04:00
|
|
|
let(:topic) { Fabricate(:topic) }
|
|
|
|
let(:old_post) { Fabricate(:post, topic: topic, user: topic.user, created_at: 6.minutes.ago) }
|
2017-07-07 02:09:14 -04:00
|
|
|
|
2019-09-06 07:44:12 -04:00
|
|
|
before do
|
|
|
|
topic.user.update_columns(trust_level: 1)
|
|
|
|
SiteSetting.post_edit_time_limit = 5
|
|
|
|
end
|
2014-01-07 10:32:09 -05:00
|
|
|
|
2019-09-06 07:44:12 -04:00
|
|
|
it 'returns false to the author of the post' do
|
|
|
|
expect(Guardian.new(old_post.user).can_edit?(old_post)).to be_falsey
|
|
|
|
end
|
2014-01-07 10:32:09 -05:00
|
|
|
|
2019-09-06 07:44:12 -04:00
|
|
|
it 'returns true as a moderator' do
|
|
|
|
expect(Guardian.new(moderator).can_edit?(old_post)).to eq(true)
|
|
|
|
end
|
2014-01-07 10:32:09 -05:00
|
|
|
|
2019-09-06 07:44:12 -04:00
|
|
|
it 'returns true as an admin' do
|
|
|
|
expect(Guardian.new(admin).can_edit?(old_post)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false for another regular user trying to edit your post' do
|
|
|
|
expect(Guardian.new(coding_horror).can_edit?(old_post)).to be_falsey
|
|
|
|
end
|
2014-01-07 10:32:09 -05:00
|
|
|
|
2019-09-06 07:44:12 -04:00
|
|
|
it 'returns true for another regular user trying to edit a wiki post' do
|
|
|
|
old_post.wiki = true
|
|
|
|
expect(Guardian.new(coding_horror).can_edit?(old_post)).to be_truthy
|
|
|
|
end
|
2021-04-14 01:54:09 -04:00
|
|
|
|
|
|
|
context "unlimited owner edits on first post" do
|
|
|
|
let(:owner) { old_post.user }
|
|
|
|
|
|
|
|
it "returns true when the post topic's category allow_unlimited_owner_edits_on_first_post" do
|
|
|
|
old_post.topic.category.update(allow_unlimited_owner_edits_on_first_post: true)
|
|
|
|
expect(Guardian.new(owner).can_edit?(old_post)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false when the post topic's category does not allow_unlimited_owner_edits_on_first_post" do
|
|
|
|
old_post.topic.category.update(allow_unlimited_owner_edits_on_first_post: false)
|
|
|
|
expect(Guardian.new(owner).can_edit?(old_post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false when the post topic's category allow_unlimited_owner_edits_on_first_post but the post is not the first in the topic" do
|
|
|
|
old_post.topic.category.update(allow_unlimited_owner_edits_on_first_post: true)
|
|
|
|
new_post = Fabricate(:post, user: owner, topic: old_post.topic, created_at: 6.minutes.ago)
|
|
|
|
expect(Guardian.new(owner).can_edit?(new_post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false when someone other than owner is editing and category allow_unlimited_owner_edits_on_first_post" do
|
|
|
|
old_post.topic.category.update(allow_unlimited_owner_edits_on_first_post: false)
|
|
|
|
expect(Guardian.new(coding_horror).can_edit?(old_post)).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
2014-01-07 10:32:09 -05:00
|
|
|
end
|
2014-05-13 08:53:11 -04:00
|
|
|
|
2019-09-06 07:44:12 -04:00
|
|
|
context 'post is older than tl2_post_edit_time_limit' do
|
|
|
|
let(:old_post) { build(:post, topic: topic, user: topic.user, created_at: 12.minutes.ago) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
topic.user.update_columns(trust_level: 2)
|
|
|
|
SiteSetting.tl2_post_edit_time_limit = 10
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false to the author of the post' do
|
|
|
|
expect(Guardian.new(old_post.user).can_edit?(old_post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true as a moderator' do
|
|
|
|
expect(Guardian.new(moderator).can_edit?(old_post)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true as an admin' do
|
|
|
|
expect(Guardian.new(admin).can_edit?(old_post)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false for another regular user trying to edit your post' do
|
|
|
|
expect(Guardian.new(coding_horror).can_edit?(old_post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for another regular user trying to edit a wiki post' do
|
|
|
|
old_post.wiki = true
|
|
|
|
expect(Guardian.new(coding_horror).can_edit?(old_post)).to be_truthy
|
|
|
|
end
|
2014-05-13 08:53:11 -04:00
|
|
|
end
|
2014-01-07 10:32:09 -05:00
|
|
|
end
|
2014-07-29 10:40:02 -04:00
|
|
|
|
|
|
|
context "first post of a static page doc" do
|
|
|
|
let!(:tos_topic) { Fabricate(:topic, user: Discourse.system_user) }
|
|
|
|
let!(:tos_first_post) { build(:post, topic: tos_topic, user: tos_topic.user) }
|
2017-07-07 02:09:14 -04:00
|
|
|
before { SiteSetting.tos_topic_id = tos_topic.id }
|
2014-07-29 10:40:02 -04:00
|
|
|
|
|
|
|
it "restricts static doc posts" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(build(:user)).can_edit?(tos_first_post)).to be_falsey
|
|
|
|
expect(Guardian.new(moderator).can_edit?(tos_first_post)).to be_falsey
|
|
|
|
expect(Guardian.new(admin).can_edit?(tos_first_post)).to be_truthy
|
2014-07-29 10:40:02 -04:00
|
|
|
end
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'a Topic' do
|
|
|
|
|
|
|
|
it 'returns false when not logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_edit?(topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for editing your own post' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(topic.user).can_edit?(topic)).to eq(true)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false as a regular user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_edit?(topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2019-06-18 14:22:38 -04:00
|
|
|
context "locked" do
|
|
|
|
let(:post) { Fabricate(:post, locked_by_id: admin.id) }
|
|
|
|
let(:topic) { post.topic }
|
|
|
|
|
|
|
|
it "doesn't allow users to edit locked topics" do
|
|
|
|
expect(Guardian.new(topic.user).can_edit?(topic)).to eq(false)
|
|
|
|
expect(Guardian.new(admin).can_edit?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-07-09 16:48:26 -04:00
|
|
|
context 'not archived' do
|
|
|
|
it 'returns true as a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit?(topic)).to eq(true)
|
2013-07-09 16:48:26 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true as an admin' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit?(topic)).to eq(true)
|
2014-01-16 11:59:26 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true at trust level 3' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(trust_level_3).can_edit?(topic)).to eq(true)
|
2013-07-09 16:48:26 -04:00
|
|
|
end
|
2015-04-30 17:03:51 -04:00
|
|
|
|
2018-02-22 20:39:24 -05:00
|
|
|
it 'is false at TL3, if `trusted_users_can_edit_others` is false' do
|
|
|
|
SiteSetting.trusted_users_can_edit_others = false
|
|
|
|
expect(Guardian.new(trust_level_3).can_edit?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
|
2015-04-30 17:03:51 -04:00
|
|
|
it "returns false when the category is read only" do
|
|
|
|
topic.category.set_permissions(everyone: :readonly)
|
|
|
|
topic.category.save
|
|
|
|
|
|
|
|
expect(Guardian.new(trust_level_3).can_edit?(topic)).to eq(false)
|
2016-04-13 01:59:38 -04:00
|
|
|
|
|
|
|
expect(Guardian.new(admin).can_edit?(topic)).to eq(true)
|
|
|
|
|
|
|
|
expect(Guardian.new(moderator).can_edit?(post)).to eq(false)
|
|
|
|
expect(Guardian.new(moderator).can_edit?(topic)).to eq(false)
|
2015-04-30 17:03:51 -04:00
|
|
|
end
|
2016-06-01 15:41:56 -04:00
|
|
|
|
|
|
|
it "returns false for trust level 3 if category is secured" do
|
|
|
|
topic.category.set_permissions(everyone: :create_post, staff: :full)
|
|
|
|
topic.category.save
|
|
|
|
|
|
|
|
expect(Guardian.new(trust_level_3).can_edit?(topic)).to eq(false)
|
|
|
|
expect(Guardian.new(admin).can_edit?(topic)).to eq(true)
|
|
|
|
expect(Guardian.new(moderator).can_edit?(topic)).to eq(true)
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-09-11 03:39:20 -04:00
|
|
|
context 'private message' do
|
|
|
|
it 'returns false at trust level 3' do
|
|
|
|
topic.archetype = 'private_message'
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(trust_level_3).can_edit?(topic)).to eq(false)
|
2014-09-11 03:39:20 -04:00
|
|
|
end
|
2016-01-28 14:05:56 -05:00
|
|
|
|
|
|
|
it 'returns false at trust level 4' do
|
|
|
|
topic.archetype = 'private_message'
|
|
|
|
expect(Guardian.new(trust_level_4).can_edit?(topic)).to eq(false)
|
|
|
|
end
|
2014-09-11 03:39:20 -04:00
|
|
|
end
|
|
|
|
|
2013-07-09 16:48:26 -04:00
|
|
|
context 'archived' do
|
2015-02-25 14:53:21 -05:00
|
|
|
let(:archived_topic) { build(:topic, user: user, archived: true) }
|
|
|
|
|
|
|
|
it 'returns true as a moderator' do
|
|
|
|
expect(Guardian.new(moderator).can_edit?(archived_topic)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true as an admin' do
|
|
|
|
expect(Guardian.new(admin).can_edit?(archived_topic)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2016-01-28 14:05:56 -05:00
|
|
|
it 'returns true at trust level 4' do
|
|
|
|
expect(Guardian.new(trust_level_4).can_edit?(archived_topic)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2018-02-22 20:39:24 -05:00
|
|
|
it 'is false at TL4, if `trusted_users_can_edit_others` is false' do
|
|
|
|
SiteSetting.trusted_users_can_edit_others = false
|
|
|
|
expect(Guardian.new(trust_level_4).can_edit?(archived_topic)).to eq(false)
|
|
|
|
end
|
|
|
|
|
2016-01-28 14:05:56 -05:00
|
|
|
it 'returns false at trust level 3' do
|
|
|
|
expect(Guardian.new(trust_level_3).can_edit?(archived_topic)).to be_falsey
|
2015-02-25 14:53:21 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false as a topic creator' do
|
|
|
|
expect(Guardian.new(user).can_edit?(archived_topic)).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'very old' do
|
|
|
|
let(:old_topic) { build(:topic, user: user, created_at: 6.minutes.ago) }
|
|
|
|
|
2017-07-07 02:09:14 -04:00
|
|
|
before { SiteSetting.post_edit_time_limit = 5 }
|
2015-02-25 14:53:21 -05:00
|
|
|
|
2014-08-15 12:44:58 -04:00
|
|
|
it 'returns true as a moderator' do
|
2015-02-25 14:53:21 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit?(old_topic)).to be_truthy
|
2013-07-09 16:48:26 -04:00
|
|
|
end
|
|
|
|
|
2014-08-15 12:44:58 -04:00
|
|
|
it 'returns true as an admin' do
|
2015-02-25 14:53:21 -05:00
|
|
|
expect(Guardian.new(admin).can_edit?(old_topic)).to be_truthy
|
2014-08-15 12:44:58 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true at trust level 3' do
|
2015-02-25 14:53:21 -05:00
|
|
|
expect(Guardian.new(trust_level_3).can_edit?(old_topic)).to be_truthy
|
2014-01-16 11:59:26 -05:00
|
|
|
end
|
|
|
|
|
2014-08-15 12:44:58 -04:00
|
|
|
it 'returns false as a topic creator' do
|
2015-02-25 14:53:21 -05:00
|
|
|
expect(Guardian.new(user).can_edit?(old_topic)).to be_falsey
|
2013-07-09 16:48:26 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'a Category' do
|
|
|
|
it 'returns false when not logged in' do
|
2019-05-07 04:40:54 -04:00
|
|
|
expect(Guardian.new.can_edit?(plain_category)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false as a regular user' do
|
2019-05-07 04:40:54 -04:00
|
|
|
expect(Guardian.new(plain_category.user).can_edit?(plain_category)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-02-06 22:11:52 -05:00
|
|
|
it 'returns false as a moderator' do
|
2019-05-07 04:40:54 -04:00
|
|
|
expect(Guardian.new(moderator).can_edit?(plain_category)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true as an admin' do
|
2019-05-07 04:40:54 -04:00
|
|
|
expect(Guardian.new(admin).can_edit?(plain_category)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'a User' do
|
|
|
|
|
|
|
|
it 'returns false when not logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_edit?(user)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false as a different user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_edit?(user)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when trying to edit yourself' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_edit?(user)).to be_truthy
|
2013-02-25 11:42:20 -05:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2013-05-02 01:15:17 -04:00
|
|
|
it 'returns true as a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit?(user)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true as an admin' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit?(user)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'can_moderate?' do
|
|
|
|
|
|
|
|
it 'returns false with a nil object' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_moderate?(nil)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2017-11-10 12:18:08 -05:00
|
|
|
context 'when user is silenced' do
|
2016-06-20 03:41:17 -04:00
|
|
|
it 'returns false' do
|
2017-11-13 13:41:36 -05:00
|
|
|
user.update_column(:silenced_till, 1.year.from_now)
|
2016-06-20 03:41:17 -04:00
|
|
|
expect(Guardian.new(user).can_moderate?(post)).to be(false)
|
|
|
|
expect(Guardian.new(user).can_moderate?(topic)).to be(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
context 'a Topic' do
|
|
|
|
|
|
|
|
it 'returns false when not logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_moderate?(topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false when not a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_moderate?(topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_moderate?(topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when an admin' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_moderate?(topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-03-17 14:50:28 -04:00
|
|
|
it 'returns true when trust level 4' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(trust_level_4).can_moderate?(topic)).to be_truthy
|
2014-03-17 14:50:28 -04:00
|
|
|
end
|
|
|
|
|
2013-02-25 11:42:20 -05:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'can_see_flags?' do
|
|
|
|
|
|
|
|
it "returns false when there is no post" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_see_flags?(nil)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false when there is no user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_see_flags?(post)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-08-13 16:08:29 -04:00
|
|
|
it "allow regular users to see flags" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_see_flags?(post)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows moderators to see flags" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_see_flags?(post)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows moderators to see flags" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_see_flags?(post)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-05-03 14:26:37 -04:00
|
|
|
context "can_review_topic?" do
|
|
|
|
it 'returns false with a nil object' do
|
|
|
|
expect(Guardian.new(user).can_review_topic?(nil)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for a staff user' do
|
|
|
|
expect(Guardian.new(moderator).can_review_topic?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false for a regular user' do
|
|
|
|
expect(Guardian.new(user).can_review_topic?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
|
2020-07-14 12:36:19 -04:00
|
|
|
it 'returns true for a group member with reviewable status' do
|
|
|
|
SiteSetting.enable_category_group_moderation = true
|
2019-05-03 14:26:37 -04:00
|
|
|
group = Fabricate(:group)
|
|
|
|
GroupUser.create!(group_id: group.id, user_id: user.id)
|
|
|
|
topic.category.update!(reviewable_by_group_id: group.id)
|
|
|
|
expect(Guardian.new(user).can_review_topic?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-07-14 12:36:19 -04:00
|
|
|
context "can_close_topic?" do
|
|
|
|
it 'returns false with a nil object' do
|
|
|
|
expect(Guardian.new(user).can_close_topic?(nil)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for a staff user' do
|
|
|
|
expect(Guardian.new(moderator).can_close_topic?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false for a regular user' do
|
|
|
|
expect(Guardian.new(user).can_close_topic?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for a group member with reviewable status' do
|
|
|
|
SiteSetting.enable_category_group_moderation = true
|
|
|
|
group = Fabricate(:group)
|
|
|
|
GroupUser.create!(group_id: group.id, user_id: user.id)
|
|
|
|
topic.category.update!(reviewable_by_group_id: group.id)
|
|
|
|
expect(Guardian.new(user).can_close_topic?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "can_archive_topic?" do
|
|
|
|
it 'returns false with a nil object' do
|
|
|
|
expect(Guardian.new(user).can_archive_topic?(nil)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for a staff user' do
|
|
|
|
expect(Guardian.new(moderator).can_archive_topic?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false for a regular user' do
|
|
|
|
expect(Guardian.new(user).can_archive_topic?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for a group member with reviewable status' do
|
|
|
|
SiteSetting.enable_category_group_moderation = true
|
|
|
|
group = Fabricate(:group)
|
|
|
|
GroupUser.create!(group_id: group.id, user_id: user.id)
|
|
|
|
topic.category.update!(reviewable_by_group_id: group.id)
|
|
|
|
expect(Guardian.new(user).can_archive_topic?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-07-20 15:53:47 -04:00
|
|
|
context "can_edit_staff_notes?" do
|
|
|
|
it 'returns false with a nil object' do
|
|
|
|
expect(Guardian.new(user).can_edit_staff_notes?(nil)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for a staff user' do
|
|
|
|
expect(Guardian.new(moderator).can_edit_staff_notes?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false for a regular user' do
|
|
|
|
expect(Guardian.new(user).can_edit_staff_notes?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for a group member with reviewable status' do
|
|
|
|
SiteSetting.enable_category_group_moderation = true
|
|
|
|
group = Fabricate(:group)
|
|
|
|
GroupUser.create!(group_id: group.id, user_id: user.id)
|
|
|
|
topic.category.update!(reviewable_by_group_id: group.id)
|
|
|
|
expect(Guardian.new(user).can_edit_staff_notes?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-06-26 07:02:53 -04:00
|
|
|
context "can_create_topic?" do
|
|
|
|
it 'returns true for staff user' do
|
|
|
|
expect(Guardian.new(moderator).can_create_topic?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false for user with insufficient trust level' do
|
|
|
|
SiteSetting.min_trust_to_create_topic = 3
|
|
|
|
expect(Guardian.new(user).can_create_topic?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for user with sufficient trust level' do
|
|
|
|
SiteSetting.min_trust_to_create_topic = 3
|
|
|
|
expect(Guardian.new(trust_level_4).can_create_topic?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false when posting in "uncategorized" is disabled and there is no other category available for posting' do
|
|
|
|
SiteSetting.allow_uncategorized_topics = false
|
|
|
|
|
|
|
|
plain_category.set_permissions(group => :readonly)
|
|
|
|
plain_category.save
|
|
|
|
expect(Guardian.new(user).can_create_topic?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when there is a category available for posting' do
|
|
|
|
SiteSetting.allow_uncategorized_topics = false
|
|
|
|
|
|
|
|
plain_category.set_permissions(group => :full)
|
|
|
|
plain_category.save
|
|
|
|
group.add(user)
|
|
|
|
group.save
|
|
|
|
expect(Guardian.new(user).can_create_topic?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
context 'can_move_posts?' do
|
|
|
|
|
|
|
|
it 'returns false with a nil object' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_move_posts?(nil)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'a Topic' do
|
|
|
|
|
|
|
|
it 'returns false when not logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_move_posts?(topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false when not a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_move_posts?(topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_move_posts?(topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when an admin' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_move_posts?(topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-02-25 11:42:20 -05:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
end
|
|
|
|
|
2019-01-03 12:03:01 -05:00
|
|
|
context "can_delete_post_action?" do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:post) { Fabricate(:post) }
|
2019-01-03 12:03:01 -05:00
|
|
|
|
|
|
|
it "allows us to remove a bookmark" do
|
|
|
|
pa = PostActionCreator.bookmark(user, post).post_action
|
|
|
|
expect(Guardian.new(user).can_delete_post_action?(pa)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "allows us to remove a very old bookmark" do
|
|
|
|
pa = PostActionCreator.bookmark(user, post).post_action
|
|
|
|
pa.update(created_at: 2.years.ago)
|
|
|
|
expect(Guardian.new(user).can_delete_post_action?(pa)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
context 'can_delete?' do
|
|
|
|
|
|
|
|
it 'returns false with a nil object' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_delete?(nil)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'a Topic' do
|
2013-10-23 19:05:51 -04:00
|
|
|
before do
|
|
|
|
# pretend we have a real topic
|
|
|
|
topic.id = 9999999
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
it 'returns false when not logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_delete?(topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false when not a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_delete?(topic)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_delete?(topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when an admin' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_delete?(topic)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2014-08-13 17:02:44 -04:00
|
|
|
|
|
|
|
it 'returns false for static doc topics' do
|
|
|
|
tos_topic = Fabricate(:topic, user: Discourse.system_user)
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.tos_topic_id = tos_topic.id
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_delete?(tos_topic)).to be_falsey
|
2014-08-13 17:02:44 -04:00
|
|
|
end
|
2019-03-29 15:59:19 -04:00
|
|
|
|
|
|
|
it "returns true for own topics" do
|
|
|
|
topic.update_attribute(:posts_count, 1)
|
|
|
|
topic.update_attribute(:created_at, Time.zone.now)
|
|
|
|
expect(Guardian.new(topic.user).can_delete?(topic)).to be_truthy
|
|
|
|
end
|
|
|
|
|
2019-04-21 04:40:29 -04:00
|
|
|
it "returns false if topic has replies" do
|
|
|
|
topic.update!(posts_count: 2, created_at: Time.zone.now)
|
2019-03-29 15:59:19 -04:00
|
|
|
expect(Guardian.new(topic.user).can_delete?(topic)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2019-04-21 04:40:29 -04:00
|
|
|
it "returns false if topic was created > 24h ago" do
|
|
|
|
topic.update!(posts_count: 1, created_at: 48.hours.ago)
|
2019-03-29 15:59:19 -04:00
|
|
|
expect(Guardian.new(topic.user).can_delete?(topic)).to be_falsey
|
|
|
|
end
|
2020-11-05 12:18:26 -05:00
|
|
|
|
|
|
|
context 'category group moderation is enabled' do
|
|
|
|
fab!(:group_user) { Fabricate(:group_user) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
SiteSetting.enable_category_group_moderation = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false if user is not a member of the appropriate group" do
|
|
|
|
expect(Guardian.new(group_user.user).can_delete?(topic)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if user is a member of the appropriate group" do
|
|
|
|
topic.category.update!(reviewable_by_group_id: group_user.group.id)
|
|
|
|
|
|
|
|
expect(Guardian.new(group_user.user).can_delete?(topic)).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'a Post' do
|
|
|
|
|
|
|
|
before do
|
|
|
|
post.post_number = 2
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false when not logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_delete?(post)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-02-07 15:12:55 -05:00
|
|
|
it "returns false when trying to delete your own post that has already been deleted" do
|
2013-05-21 02:39:51 -04:00
|
|
|
post = Fabricate(:post)
|
2013-03-18 17:52:29 -04:00
|
|
|
PostDestroyer.new(user, post).destroy
|
2013-02-07 15:12:55 -05:00
|
|
|
post.reload
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_delete?(post)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-02-07 15:12:55 -05:00
|
|
|
it 'returns true when trying to delete your own post' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_delete?(post)).to be_truthy
|
2021-06-30 08:51:35 -04:00
|
|
|
|
|
|
|
expect(Guardian.new(trust_level_0).can_delete?(post)).to be_falsey
|
|
|
|
expect(Guardian.new(trust_level_1).can_delete?(post)).to be_falsey
|
|
|
|
expect(Guardian.new(trust_level_2).can_delete?(post)).to be_falsey
|
|
|
|
expect(Guardian.new(trust_level_3).can_delete?(post)).to be_falsey
|
|
|
|
expect(Guardian.new(trust_level_4).can_delete?(post)).to be_falsey
|
2013-02-07 15:12:55 -05:00
|
|
|
end
|
|
|
|
|
2021-01-08 10:05:13 -05:00
|
|
|
it 'returns false when self deletions are disabled' do
|
|
|
|
SiteSetting.max_post_deletions_per_day = 0
|
|
|
|
expect(Guardian.new(user).can_delete?(post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2013-02-07 15:12:55 -05:00
|
|
|
it "returns false when trying to delete another user's own post" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(Fabricate(:user)).can_delete?(post)).to be_falsey
|
2013-02-07 15:12:55 -05:00
|
|
|
end
|
|
|
|
|
2019-03-29 12:10:05 -04:00
|
|
|
it "returns false when it's the OP, even as a moderator if there are at least two posts" do
|
2019-04-21 04:40:29 -04:00
|
|
|
post = Fabricate(:post)
|
2019-03-29 12:10:05 -04:00
|
|
|
Fabricate(:post, topic: post.topic)
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_delete?(post)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_delete?(post)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when an admin' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_delete?(post)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2014-01-07 10:32:09 -05:00
|
|
|
|
2021-06-30 08:51:35 -04:00
|
|
|
it "returns true for category moderators" do
|
|
|
|
SiteSetting.enable_category_group_moderation = true
|
|
|
|
group = Fabricate(:group)
|
|
|
|
GroupUser.create(group: group, user: user)
|
|
|
|
category = Fabricate(:category, reviewable_by_group_id: group.id)
|
|
|
|
post.topic.update!(category: category)
|
|
|
|
|
|
|
|
expect(Guardian.new(user).can_delete?(post)).to eq(true)
|
|
|
|
end
|
|
|
|
|
2014-08-13 17:02:44 -04:00
|
|
|
it 'returns false when post is first in a static doc topic' do
|
|
|
|
tos_topic = Fabricate(:topic, user: Discourse.system_user)
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.tos_topic_id = tos_topic.id
|
2014-08-13 17:02:44 -04:00
|
|
|
post.update_attribute :post_number, 1
|
|
|
|
post.update_attribute :topic_id, tos_topic.id
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_delete?(post)).to be_falsey
|
2014-08-13 17:02:44 -04:00
|
|
|
end
|
|
|
|
|
2014-01-17 17:42:12 -05:00
|
|
|
context 'the topic is archived' do
|
|
|
|
before do
|
|
|
|
post.topic.archived = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "allows a staff member to delete it" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_delete?(post)).to be_truthy
|
2014-01-17 17:42:12 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't allow a regular user to delete it" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(post.user).can_delete?(post)).to be_falsey
|
2014-01-17 17:42:12 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'a Category' do
|
|
|
|
|
2013-05-21 02:39:51 -04:00
|
|
|
let(:category) { build(:category, user: moderator) }
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
it 'returns false when not logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_delete?(category)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false when a regular user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_delete?(category)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-02-06 22:11:52 -05:00
|
|
|
it 'returns false when a moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_delete?(category)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when an admin' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_delete?(category)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "can't be deleted if it has a forum topic" do
|
|
|
|
category.topic_count = 10
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_delete?(category)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-02-12 15:24:44 -05:00
|
|
|
it "can't be deleted if it is the Uncategorized Category" do
|
2013-12-17 15:36:15 -05:00
|
|
|
uncategorized_cat_id = SiteSetting.uncategorized_category_id
|
|
|
|
uncategorized_category = Category.find(uncategorized_cat_id)
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_delete?(uncategorized_category)).to be_falsey
|
2013-12-17 15:36:15 -05:00
|
|
|
end
|
|
|
|
|
2014-02-12 17:24:25 -05:00
|
|
|
it "can't be deleted if it has children" do
|
|
|
|
category.expects(:has_children?).returns(true)
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_delete?(category)).to be_falsey
|
2014-02-12 17:24:25 -05:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-11-07 13:53:32 -05:00
|
|
|
context 'can_suspend?' do
|
|
|
|
it 'returns false when a user tries to suspend another user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_suspend?(coding_horror)).to be_falsey
|
2013-05-21 02:39:51 -04:00
|
|
|
end
|
|
|
|
|
2013-11-07 13:53:32 -05:00
|
|
|
it 'returns true when an admin tries to suspend another user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_suspend?(coding_horror)).to be_truthy
|
2013-05-21 02:39:51 -04:00
|
|
|
end
|
|
|
|
|
2013-11-07 13:53:32 -05:00
|
|
|
it 'returns true when a moderator tries to suspend another user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_suspend?(coding_horror)).to be_truthy
|
2013-05-21 02:39:51 -04:00
|
|
|
end
|
|
|
|
|
2013-11-07 13:53:32 -05:00
|
|
|
it 'returns false when staff tries to suspend staff' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_suspend?(moderator)).to be_falsey
|
2013-05-21 02:39:51 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
context 'a PostAction' do
|
2013-05-21 02:39:51 -04:00
|
|
|
let(:post_action) {
|
|
|
|
user.id = 1
|
|
|
|
post.id = 1
|
|
|
|
|
2019-01-03 12:03:01 -05:00
|
|
|
a = PostAction.new(user: user, post: post, post_action_type_id: 2)
|
2013-05-21 02:39:51 -04:00
|
|
|
a.created_at = 1.minute.ago
|
|
|
|
a
|
|
|
|
}
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
it 'returns false when not logged in' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_delete?(post_action)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false when not the user who created it' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_delete?(post_action)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false if the window has expired" do
|
|
|
|
post_action.created_at = 20.minutes.ago
|
2019-01-03 12:03:01 -05:00
|
|
|
SiteSetting.post_undo_action_window_mins = 10
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_delete?(post_action)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if it's yours" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_delete?(post_action)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'can_approve?' do
|
|
|
|
|
|
|
|
it "wont allow a non-logged in user to approve" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_approve?(user)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "wont allow a non-admin to approve a user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_approve?(user)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false when the user is already approved" do
|
|
|
|
user.approved = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_approve?(user)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2017-09-04 12:55:23 -04:00
|
|
|
it "returns false when the user is not active" do
|
|
|
|
user.active = false
|
|
|
|
expect(Guardian.new(admin).can_approve?(user)).to be_falsey
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
it "allows an admin to approve a user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_approve?(user)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows a moderator to approve a user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_approve?(user)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'can_grant_admin?' do
|
|
|
|
it "wont allow a non logged in user to grant an admin's access" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_grant_admin?(another_admin)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "wont allow a regular user to revoke an admin's access" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_grant_admin?(another_admin)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'wont allow an admin to grant their own access' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_grant_admin?(admin)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows an admin to grant a regular user access" do
|
2013-05-21 02:39:51 -04:00
|
|
|
admin.id = 1
|
|
|
|
user.id = 2
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_grant_admin?(user)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2016-12-28 22:11:33 -05:00
|
|
|
|
|
|
|
it 'should not allow an admin to grant admin access to a non real user' do
|
2017-01-06 02:25:49 -05:00
|
|
|
begin
|
|
|
|
Discourse.system_user.update!(admin: false)
|
|
|
|
expect(Guardian.new(admin).can_grant_admin?(Discourse.system_user)).to be(false)
|
|
|
|
ensure
|
|
|
|
Discourse.system_user.update!(admin: true)
|
|
|
|
end
|
2016-12-28 22:11:33 -05:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'can_revoke_admin?' do
|
|
|
|
it "wont allow a non logged in user to revoke an admin's access" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_revoke_admin?(another_admin)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "wont allow a regular user to revoke an admin's access" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_revoke_admin?(another_admin)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'wont allow an admin to revoke their own access' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_revoke_admin?(admin)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows an admin to revoke another admin's access" do
|
2013-05-21 02:39:51 -04:00
|
|
|
admin.id = 1
|
|
|
|
another_admin.id = 2
|
|
|
|
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_revoke_admin?(another_admin)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2016-12-28 22:11:33 -05:00
|
|
|
|
|
|
|
it "should not allow an admin to revoke a no real user's admin access" do
|
|
|
|
expect(Guardian.new(admin).can_revoke_admin?(Discourse.system_user)).to be(false)
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-02-12 17:58:08 -05:00
|
|
|
context 'can_grant_moderation?' do
|
2013-05-09 03:35:15 -04:00
|
|
|
|
2013-02-12 17:58:08 -05:00
|
|
|
it "wont allow a non logged in user to grant an moderator's access" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_grant_moderation?(user)).to be_falsey
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
|
|
|
|
2013-05-20 02:04:53 -04:00
|
|
|
it "wont allow a regular user to revoke an moderator's access" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_grant_moderation?(moderator)).to be_falsey
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
|
|
|
|
2013-05-09 03:35:15 -04:00
|
|
|
it 'will allow an admin to grant their own moderator access' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_grant_moderation?(admin)).to be_truthy
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'wont allow an admin to grant it to an already moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_grant_moderation?(moderator)).to be_falsey
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows an admin to grant a regular user access" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_grant_moderation?(user)).to be_truthy
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
2016-12-28 22:11:33 -05:00
|
|
|
|
|
|
|
it "should not allow an admin to grant moderation to a non real user" do
|
2017-01-06 02:25:49 -05:00
|
|
|
begin
|
|
|
|
Discourse.system_user.update!(moderator: false)
|
|
|
|
expect(Guardian.new(admin).can_grant_moderation?(Discourse.system_user)).to be(false)
|
|
|
|
ensure
|
|
|
|
Discourse.system_user.update!(moderator: true)
|
|
|
|
end
|
2016-12-28 22:11:33 -05:00
|
|
|
end
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'can_revoke_moderation?' do
|
|
|
|
it "wont allow a non logged in user to revoke an moderator's access" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new.can_revoke_moderation?(moderator)).to be_falsey
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "wont allow a regular user to revoke an moderator's access" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_revoke_moderation?(moderator)).to be_falsey
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
|
|
|
|
2013-05-09 03:35:15 -04:00
|
|
|
it 'wont allow a moderator to revoke their own moderator' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_revoke_moderation?(moderator)).to be_falsey
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows an admin to revoke a moderator's access" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_revoke_moderation?(moderator)).to be_truthy
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
2013-05-09 03:35:15 -04:00
|
|
|
|
|
|
|
it "allows an admin to revoke a moderator's access from self" do
|
|
|
|
admin.moderator = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_revoke_moderation?(admin)).to be_truthy
|
2013-05-09 03:35:15 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "does not allow revoke from non moderators" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_revoke_moderation?(admin)).to be_falsey
|
2013-05-09 03:35:15 -04:00
|
|
|
end
|
2016-12-28 22:11:33 -05:00
|
|
|
|
|
|
|
it "should not allow an admin to revoke moderation from a non real user" do
|
|
|
|
expect(Guardian.new(admin).can_revoke_moderation?(Discourse.system_user)).to be(false)
|
|
|
|
end
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
|
|
|
|
2014-03-21 14:13:04 -04:00
|
|
|
context "can_see_invite_details?" do
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
it 'is false without a logged in user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_see_invite_details?(user)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false without a user to look at' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_see_invite_details?(nil)).to be_falsey
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true when looking at your own invites' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_see_invite_details?(user)).to be_truthy
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2013-04-03 12:23:28 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context "can_access_forum?" do
|
|
|
|
|
|
|
|
let(:unapproved_user) { Fabricate.build(:user) }
|
|
|
|
|
|
|
|
context "when must_approve_users is false" do
|
|
|
|
before do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.must_approve_users = false
|
2013-04-03 12:23:28 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true for a nil user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_access_forum?).to be_truthy
|
2013-04-03 12:23:28 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true for an unapproved user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(unapproved_user).can_access_forum?).to be_truthy
|
2013-04-03 12:23:28 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when must_approve_users is true' do
|
|
|
|
before do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.must_approve_users = true
|
2013-04-03 12:23:28 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false for a nil user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_access_forum?).to be_falsey
|
2013-04-03 12:23:28 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false for an unapproved user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(unapproved_user).can_access_forum?).to be_falsey
|
2013-04-03 12:23:28 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true for an admin user" do
|
|
|
|
unapproved_user.admin = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(unapproved_user).can_access_forum?).to be_truthy
|
2013-04-03 12:23:28 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true for an approved user" do
|
|
|
|
unapproved_user.approved = true
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(unapproved_user).can_access_forum?).to be_truthy
|
2013-04-03 12:23:28 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
end
|
|
|
|
|
2013-07-26 15:40:08 -04:00
|
|
|
describe "can_delete_all_posts?" do
|
|
|
|
it "is false without a logged in user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_delete_all_posts?(user)).to be_falsey
|
2013-07-26 15:40:08 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false without a user to look at" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_delete_all_posts?(nil)).to be_falsey
|
2013-07-26 15:40:08 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for regular users" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_delete_all_posts?(coding_horror)).to be_falsey
|
2013-07-26 15:40:08 -04:00
|
|
|
end
|
|
|
|
|
2021-08-25 00:44:22 -04:00
|
|
|
context "for moderators" do
|
|
|
|
let(:actor) { moderator }
|
|
|
|
|
2014-02-20 12:29:40 -05:00
|
|
|
it "is true if user has no posts" do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.delete_user_max_post_age = 10
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(Fabricate(:user, created_at: 100.days.ago))).to be_truthy
|
2014-02-20 12:29:40 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is true if user's first post is newer than delete_user_max_post_age days old" do
|
2014-07-28 13:17:37 -04:00
|
|
|
user = Fabricate(:user, created_at: 100.days.ago)
|
2021-08-25 01:25:01 -04:00
|
|
|
user.user_stat.update!(first_post_created_at: 9.days.ago)
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.delete_user_max_post_age = 10
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(user)).to be_truthy
|
2013-07-26 15:40:08 -04:00
|
|
|
end
|
|
|
|
|
2014-02-20 12:29:40 -05:00
|
|
|
it "is false if user's first post is older than delete_user_max_post_age days old" do
|
2014-07-28 13:17:37 -04:00
|
|
|
user = Fabricate(:user, created_at: 100.days.ago)
|
2021-08-25 01:25:01 -04:00
|
|
|
user.user_stat.update!(first_post_created_at: 11.days.ago)
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.delete_user_max_post_age = 10
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(user)).to be_falsey
|
2013-07-26 15:40:08 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false if user is an admin" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(admin)).to be_falsey
|
2013-04-11 16:04:20 -04:00
|
|
|
end
|
|
|
|
|
2013-07-26 15:40:08 -04:00
|
|
|
it "is true if number of posts is small" do
|
2021-08-25 01:25:01 -04:00
|
|
|
user = Fabricate(:user, created_at: 1.day.ago)
|
|
|
|
user.user_stat.update!(post_count: 1)
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.delete_all_posts_max = 10
|
2021-08-25 01:25:01 -04:00
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(user)).to be_truthy
|
2013-04-11 16:04:20 -04:00
|
|
|
end
|
2013-07-26 15:40:08 -04:00
|
|
|
|
|
|
|
it "is false if number of posts is not small" do
|
2021-08-25 01:25:01 -04:00
|
|
|
user = Fabricate(:user, created_at: 1.day.ago)
|
|
|
|
user.user_stat.update!(post_count: 11)
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.delete_all_posts_max = 10
|
2021-08-25 01:25:01 -04:00
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(user)).to be_falsey
|
2013-07-26 15:40:08 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "for admins" do
|
|
|
|
let(:actor) { admin }
|
2021-08-25 00:44:22 -04:00
|
|
|
|
|
|
|
it "is true if user has no posts" do
|
|
|
|
SiteSetting.delete_user_max_post_age = 10
|
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(Fabricate(:user, created_at: 100.days.ago))).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is true if user's first post is newer than delete_user_max_post_age days old" do
|
|
|
|
user = Fabricate(:user, created_at: 100.days.ago)
|
|
|
|
user.stubs(:first_post_created_at).returns(9.days.ago)
|
|
|
|
SiteSetting.delete_user_max_post_age = 10
|
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(user)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is true if user's first post is older than delete_user_max_post_age days old" do
|
|
|
|
user = Fabricate(:user, created_at: 100.days.ago)
|
|
|
|
user.stubs(:first_post_created_at).returns(11.days.ago)
|
|
|
|
SiteSetting.delete_user_max_post_age = 10
|
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(user)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false if user is an admin" do
|
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(admin)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is true if number of posts is small" do
|
|
|
|
u = Fabricate(:user, created_at: 1.day.ago)
|
|
|
|
u.stubs(:post_count).returns(1)
|
|
|
|
SiteSetting.delete_all_posts_max = 10
|
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(u)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is true if number of posts is not small" do
|
|
|
|
u = Fabricate(:user, created_at: 1.day.ago)
|
|
|
|
u.stubs(:post_count).returns(11)
|
|
|
|
SiteSetting.delete_all_posts_max = 10
|
|
|
|
expect(Guardian.new(actor).can_delete_all_posts?(u)).to be_truthy
|
|
|
|
end
|
2013-04-11 16:04:20 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-03-06 16:44:54 -05:00
|
|
|
describe "can_anonymize_user?" do
|
|
|
|
it "is false without a logged in user" do
|
|
|
|
expect(Guardian.new(nil).can_anonymize_user?(user)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false without a user to look at" do
|
|
|
|
expect(Guardian.new(admin).can_anonymize_user?(nil)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for a regular user" do
|
|
|
|
expect(Guardian.new(user).can_anonymize_user?(coding_horror)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for myself" do
|
|
|
|
expect(Guardian.new(user).can_anonymize_user?(user)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is true for admin anonymizing a regular user" do
|
2015-04-25 11:18:35 -04:00
|
|
|
expect(Guardian.new(admin).can_anonymize_user?(user)).to eq(true)
|
2015-03-06 16:44:54 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is true for moderator anonymizing a regular user" do
|
2015-04-25 11:18:35 -04:00
|
|
|
expect(Guardian.new(moderator).can_anonymize_user?(user)).to eq(true)
|
2015-03-06 16:44:54 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for admin anonymizing an admin" do
|
|
|
|
expect(Guardian.new(admin).can_anonymize_user?(Fabricate(:admin))).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for admin anonymizing a moderator" do
|
2019-05-06 06:13:39 -04:00
|
|
|
expect(Guardian.new(admin).can_anonymize_user?(moderator)).to be_falsey
|
2015-03-06 16:44:54 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for moderator anonymizing an admin" do
|
|
|
|
expect(Guardian.new(moderator).can_anonymize_user?(admin)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for moderator anonymizing a moderator" do
|
2019-05-06 06:13:39 -04:00
|
|
|
expect(Guardian.new(moderator).can_anonymize_user?(moderator)).to be_falsey
|
2015-03-06 16:44:54 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-06-25 18:39:20 -04:00
|
|
|
describe 'can_grant_title?' do
|
|
|
|
it 'is false without a logged in user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_grant_title?(user)).to be_falsey
|
2013-06-25 18:39:20 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false for regular users' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_grant_title?(user)).to be_falsey
|
2013-06-25 18:39:20 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for moderators' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_grant_title?(user)).to be_truthy
|
2013-06-25 18:39:20 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for admins' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_grant_title?(user)).to be_truthy
|
2013-06-25 18:39:20 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false without a user to look at' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_grant_title?(nil)).to be_falsey
|
2013-06-25 18:39:20 -04:00
|
|
|
end
|
2018-04-06 14:29:27 -04:00
|
|
|
|
|
|
|
context 'with title argument' do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:title_badge) { Fabricate(:badge, name: 'Helper', allow_title: true) }
|
|
|
|
fab!(:no_title_badge) { Fabricate(:badge, name: 'Writer', allow_title: false) }
|
|
|
|
fab!(:group) { Fabricate(:group, title: 'Groupie') }
|
2018-04-06 14:29:27 -04:00
|
|
|
|
|
|
|
it 'returns true if title belongs to a badge that user has' do
|
|
|
|
BadgeGranter.grant(title_badge, user)
|
|
|
|
expect(Guardian.new(user).can_grant_title?(user, title_badge.name)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false if title belongs to a badge that user doesn't have" do
|
|
|
|
expect(Guardian.new(user).can_grant_title?(user, title_badge.name)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false if title belongs to a badge that user has but can't be used as a title" do
|
|
|
|
BadgeGranter.grant(no_title_badge, user)
|
|
|
|
expect(Guardian.new(user).can_grant_title?(user, no_title_badge.name)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true if title is from a group the user belongs to' do
|
|
|
|
group.add(user)
|
|
|
|
expect(Guardian.new(user).can_grant_title?(user, group.title)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false if title is from a group the user doesn't belong to" do
|
|
|
|
expect(Guardian.new(user).can_grant_title?(user, group.title)).to eq(false)
|
|
|
|
end
|
2018-05-31 19:10:52 -04:00
|
|
|
|
|
|
|
it "returns true if the title is set to an empty string" do
|
|
|
|
expect(Guardian.new(user).can_grant_title?(user, '')).to eq(true)
|
|
|
|
end
|
2018-04-06 14:29:27 -04:00
|
|
|
end
|
2013-06-25 18:39:20 -04:00
|
|
|
end
|
|
|
|
|
2019-10-28 13:46:27 -04:00
|
|
|
describe 'can_use_primary_group?' do
|
|
|
|
fab!(:group) { Fabricate(:group, title: 'Groupie') }
|
|
|
|
|
|
|
|
it 'is false without a logged in user' do
|
|
|
|
expect(Guardian.new(nil).can_use_primary_group?(user)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false with no group_id' do
|
|
|
|
user.update(groups: [group])
|
|
|
|
expect(Guardian.new(user).can_use_primary_group?(user, nil)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false if the group does not exist' do
|
|
|
|
user.update(groups: [group])
|
|
|
|
expect(Guardian.new(user).can_use_primary_group?(user, Group.last.id + 1)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false if the user is not a part of the group' do
|
|
|
|
user.update(groups: [])
|
|
|
|
expect(Guardian.new(user).can_use_primary_group?(user, group.id)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false if the group is automatic' do
|
|
|
|
user.update(groups: [Group.new(name: 'autooo', automatic: true)])
|
|
|
|
expect(Guardian.new(user).can_use_primary_group?(user, group.id)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true if the user is a part of the group, and the group is custom' do
|
|
|
|
user.update(groups: [group])
|
|
|
|
expect(Guardian.new(user).can_use_primary_group?(user, group.id)).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-07-21 07:41:04 -04:00
|
|
|
describe 'can_use_flair_group?' do
|
|
|
|
fab!(:group) { Fabricate(:group, title: 'Groupie', flair_icon: 'icon') }
|
|
|
|
|
|
|
|
it 'is false without a logged in user' do
|
|
|
|
expect(Guardian.new(nil).can_use_flair_group?(user)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false if the group does not exist' do
|
|
|
|
expect(Guardian.new(user).can_use_flair_group?(user, nil)).to eq(false)
|
|
|
|
expect(Guardian.new(user).can_use_flair_group?(user, Group.last.id + 1)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false if the user is not a part of the group' do
|
|
|
|
expect(Guardian.new(user).can_use_flair_group?(user, group.id)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false if the group does not have a flair' do
|
|
|
|
group.update(flair_icon: nil)
|
|
|
|
expect(Guardian.new(user).can_use_flair_group?(user, group.id)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true if the user is a part of the group and the group has a flair' do
|
|
|
|
user.update(groups: [group])
|
|
|
|
expect(Guardian.new(user).can_use_flair_group?(user, group.id)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-07-22 19:13:48 -04:00
|
|
|
describe 'can_change_trust_level?' do
|
|
|
|
|
|
|
|
it 'is false without a logged in user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_change_trust_level?(user)).to be_falsey
|
2013-07-22 19:13:48 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false for regular users' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_change_trust_level?(user)).to be_falsey
|
2013-07-22 19:13:48 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for moderators' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_change_trust_level?(user)).to be_truthy
|
2013-07-22 19:13:48 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for admins' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_change_trust_level?(user)).to be_truthy
|
2013-07-22 19:13:48 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-08-12 14:54:52 -04:00
|
|
|
describe "can_edit_username?" do
|
|
|
|
it "is false without a logged in user" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_edit_username?(build(:user, created_at: 1.minute.ago))).to be_falsey
|
2013-08-12 14:54:52 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for regular users to edit another user's username" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(build(:user)).can_edit_username?(build(:user, created_at: 1.minute.ago))).to be_falsey
|
2013-08-12 14:54:52 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
shared_examples "staff can always change usernames" do
|
|
|
|
it "is true for moderators" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit_username?(user)).to be_truthy
|
2013-08-12 14:54:52 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is true for admins" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit_username?(user)).to be_truthy
|
2013-08-12 14:54:52 -04:00
|
|
|
end
|
2019-04-17 04:05:02 -04:00
|
|
|
|
|
|
|
it "is true for admins when changing anonymous username" do
|
|
|
|
expect(Guardian.new(admin).can_edit_username?(anonymous_user)).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "for anonymous user" do
|
|
|
|
before do
|
|
|
|
SiteSetting.allow_anonymous_posting = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false" do
|
|
|
|
expect(Guardian.new(anonymous_user).can_edit_username?(anonymous_user)).to be_falsey
|
|
|
|
end
|
2013-08-12 14:54:52 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'for a new user' do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:target_user) { Fabricate(:user, created_at: 1.minute.ago) }
|
2013-08-12 14:54:52 -04:00
|
|
|
include_examples "staff can always change usernames"
|
|
|
|
|
2013-12-02 23:49:54 -05:00
|
|
|
it "is true for the user to change their own username" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(target_user).can_edit_username?(target_user)).to be_truthy
|
2013-08-12 14:54:52 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'for an old user' do
|
|
|
|
before do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.username_change_period = 3
|
2013-08-12 14:54:52 -04:00
|
|
|
end
|
|
|
|
|
2014-07-28 13:17:37 -04:00
|
|
|
let(:target_user) { Fabricate(:user, created_at: 4.days.ago) }
|
2013-08-12 14:54:52 -04:00
|
|
|
|
2013-08-23 11:23:00 -04:00
|
|
|
context 'with no posts' do
|
|
|
|
include_examples "staff can always change usernames"
|
2013-12-02 23:49:54 -05:00
|
|
|
it "is true for the user to change their own username" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(target_user).can_edit_username?(target_user)).to be_truthy
|
2013-08-23 11:23:00 -04:00
|
|
|
end
|
|
|
|
end
|
2013-08-12 14:54:52 -04:00
|
|
|
|
2013-08-23 11:23:00 -04:00
|
|
|
context 'with posts' do
|
|
|
|
before { target_user.stubs(:post_count).returns(1) }
|
|
|
|
include_examples "staff can always change usernames"
|
2013-12-02 23:49:54 -05:00
|
|
|
it "is false for the user to change their own username" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(target_user).can_edit_username?(target_user)).to be_falsey
|
2013-08-23 11:23:00 -04:00
|
|
|
end
|
2013-08-12 14:54:52 -04:00
|
|
|
end
|
|
|
|
end
|
2013-09-07 22:42:41 -04:00
|
|
|
|
|
|
|
context 'when editing is disabled in preferences' do
|
|
|
|
before do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.username_change_period = 0
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
include_examples "staff can always change usernames"
|
|
|
|
|
2013-12-02 23:49:54 -05:00
|
|
|
it "is false for the user to change their own username" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_edit_username?(user)).to be_falsey
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
end
|
2014-03-09 21:38:36 -04:00
|
|
|
|
|
|
|
context 'when SSO username override is active' do
|
|
|
|
before do
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.discourse_connect_url = "https://www.example.com/sso"
|
|
|
|
SiteSetting.enable_discourse_connect = true
|
|
|
|
SiteSetting.auth_overrides_username = true
|
2014-03-09 21:38:36 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for admins" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit_username?(admin)).to be_falsey
|
2014-03-09 21:38:36 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for moderators" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit_username?(moderator)).to be_falsey
|
2014-03-09 21:38:36 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for users" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_edit_username?(user)).to be_falsey
|
2014-03-09 21:38:36 -04:00
|
|
|
end
|
|
|
|
end
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "can_edit_email?" do
|
|
|
|
context 'when allowed in settings' do
|
|
|
|
before do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.email_editable = true
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
2019-04-17 04:05:02 -04:00
|
|
|
context "for anonymous user" do
|
|
|
|
before do
|
|
|
|
SiteSetting.allow_anonymous_posting = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false" do
|
|
|
|
expect(Guardian.new(anonymous_user).can_edit_email?(anonymous_user)).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-09-07 22:42:41 -04:00
|
|
|
it "is false when not logged in" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_edit_email?(build(:user, created_at: 1.minute.ago))).to be_falsey
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for regular users to edit another user's email" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(build(:user)).can_edit_email?(build(:user, created_at: 1.minute.ago))).to be_falsey
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
2013-12-02 23:49:54 -05:00
|
|
|
it "is true for a regular user to edit their own email" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_edit_email?(user)).to be_truthy
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is true for moderators" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit_email?(user)).to be_truthy
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is true for admins" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit_email?(user)).to be_truthy
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when not allowed in settings' do
|
|
|
|
before do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.email_editable = false
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false when not logged in" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_edit_email?(build(:user, created_at: 1.minute.ago))).to be_falsey
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for regular users to edit another user's email" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(build(:user)).can_edit_email?(build(:user, created_at: 1.minute.ago))).to be_falsey
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
2013-12-02 23:49:54 -05:00
|
|
|
it "is false for a regular user to edit their own email" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_edit_email?(user)).to be_falsey
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
2014-08-14 22:56:03 -04:00
|
|
|
it "is false for admins" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit_email?(user)).to be_falsey
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
|
2014-08-14 22:56:03 -04:00
|
|
|
it "is false for moderators" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit_email?(user)).to be_falsey
|
2013-09-07 22:42:41 -04:00
|
|
|
end
|
|
|
|
end
|
2013-08-12 14:54:52 -04:00
|
|
|
|
2014-03-09 21:38:36 -04:00
|
|
|
context 'when SSO email override is active' do
|
|
|
|
before do
|
2017-07-09 22:12:21 -04:00
|
|
|
SiteSetting.email_editable = false
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.discourse_connect_url = "https://www.example.com/sso"
|
|
|
|
SiteSetting.enable_discourse_connect = true
|
|
|
|
SiteSetting.auth_overrides_email = true
|
2014-03-09 21:38:36 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for admins" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit_email?(admin)).to be_falsey
|
2014-03-09 21:38:36 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for moderators" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit_email?(moderator)).to be_falsey
|
2014-03-09 21:38:36 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for users" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_edit_email?(user)).to be_falsey
|
2014-03-09 21:38:36 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2014-03-13 16:26:40 -04:00
|
|
|
|
|
|
|
describe 'can_edit_name?' do
|
|
|
|
it 'is false without a logged in user' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(nil).can_edit_name?(build(:user, created_at: 1.minute.ago))).to be_falsey
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for regular users to edit another user's name" do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(build(:user)).can_edit_name?(build(:user, created_at: 1.minute.ago))).to be_falsey
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
2019-04-17 04:05:02 -04:00
|
|
|
context "for anonymous user" do
|
|
|
|
before do
|
|
|
|
SiteSetting.allow_anonymous_posting = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false" do
|
|
|
|
expect(Guardian.new(anonymous_user).can_edit_name?(anonymous_user)).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-03-13 16:26:40 -04:00
|
|
|
context 'for a new user' do
|
|
|
|
let(:target_user) { build(:user, created_at: 1.minute.ago) }
|
|
|
|
|
|
|
|
it 'is true for the user to change their own name' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(target_user).can_edit_name?(target_user)).to be_truthy
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for moderators' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit_name?(user)).to be_truthy
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for admins' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit_name?(user)).to be_truthy
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when name is disabled in preferences' do
|
|
|
|
before do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.enable_names = false
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false for the user to change their own name' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_edit_name?(user)).to be_falsey
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false for moderators' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit_name?(user)).to be_falsey
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false for admins' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit_name?(user)).to be_falsey
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when name is enabled in preferences' do
|
|
|
|
before do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.enable_names = true
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when SSO is disabled' do
|
|
|
|
before do
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.enable_discourse_connect = false
|
|
|
|
SiteSetting.auth_overrides_name = false
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for admins' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit_name?(admin)).to be_truthy
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for moderators' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit_name?(moderator)).to be_truthy
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for users' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_edit_name?(user)).to be_truthy
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when SSO is enabled' do
|
|
|
|
before do
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.discourse_connect_url = "https://www.example.com/sso"
|
|
|
|
SiteSetting.enable_discourse_connect = true
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when SSO name override is active' do
|
|
|
|
before do
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.auth_overrides_name = true
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false for admins' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit_name?(admin)).to be_falsey
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false for moderators' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit_name?(moderator)).to be_falsey
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is false for users' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_edit_name?(user)).to be_falsey
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when SSO name override is not active' do
|
|
|
|
before do
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.auth_overrides_name = false
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for admins' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(admin).can_edit_name?(admin)).to be_truthy
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for moderators' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(moderator).can_edit_name?(moderator)).to be_truthy
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'is true for users' do
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Guardian.new(user).can_edit_name?(user)).to be_truthy
|
2014-03-13 16:26:40 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2014-05-13 08:53:11 -04:00
|
|
|
|
2018-09-20 21:07:13 -04:00
|
|
|
describe '#can_export_entity?' do
|
2020-04-05 19:56:47 -04:00
|
|
|
let(:anonymous_guardian) { Guardian.new }
|
2018-09-20 21:07:13 -04:00
|
|
|
let(:user_guardian) { Guardian.new(user) }
|
|
|
|
let(:moderator_guardian) { Guardian.new(moderator) }
|
|
|
|
let(:admin_guardian) { Guardian.new(admin) }
|
|
|
|
|
|
|
|
it 'only allows admins to export user_list' do
|
|
|
|
expect(user_guardian.can_export_entity?('user_list')).to be_falsey
|
|
|
|
expect(moderator_guardian.can_export_entity?('user_list')).to be_falsey
|
|
|
|
expect(admin_guardian.can_export_entity?('user_list')).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'allow moderators to export other admin entities' do
|
|
|
|
expect(user_guardian.can_export_entity?('staff_action')).to be_falsey
|
|
|
|
expect(moderator_guardian.can_export_entity?('staff_action')).to be_truthy
|
|
|
|
expect(admin_guardian.can_export_entity?('staff_action')).to be_truthy
|
|
|
|
end
|
2020-04-05 19:56:47 -04:00
|
|
|
|
|
|
|
it 'does not allow anonymous to export' do
|
|
|
|
expect(anonymous_guardian.can_export_entity?('user_archive')).to be_falsey
|
|
|
|
end
|
2018-09-20 21:07:13 -04:00
|
|
|
end
|
|
|
|
|
2019-03-20 06:18:46 -04:00
|
|
|
describe '#can_ignore_user?' do
|
2020-11-20 13:05:20 -05:00
|
|
|
before do
|
|
|
|
SiteSetting.min_trust_level_to_allow_ignore = 1
|
|
|
|
end
|
2019-03-20 15:55:46 -04:00
|
|
|
|
2019-03-20 10:02:34 -04:00
|
|
|
let(:guardian) { Guardian.new(trust_level_2) }
|
2019-03-20 06:18:46 -04:00
|
|
|
|
|
|
|
context "when ignored user is the same as guardian user" do
|
|
|
|
it 'does not allow ignoring user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_ignore_user?(trust_level_2)).to eq(false)
|
2019-03-20 06:18:46 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when ignored user is a staff user" do
|
|
|
|
let!(:admin) { Fabricate(:user, admin: true) }
|
|
|
|
|
|
|
|
it 'does not allow ignoring user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_ignore_user?(admin)).to eq(false)
|
2019-03-20 06:18:46 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when ignored user is a normal user" do
|
|
|
|
it 'allows ignoring user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_ignore_user?(another_user)).to eq(true)
|
2019-03-20 06:18:46 -04:00
|
|
|
end
|
|
|
|
end
|
2019-03-20 10:02:34 -04:00
|
|
|
|
2020-11-20 13:05:20 -05:00
|
|
|
context "when ignorer is staff" do
|
|
|
|
let(:guardian) { Guardian.new(admin) }
|
|
|
|
it 'allows ignoring user' do
|
|
|
|
expect(guardian.can_ignore_user?(another_user)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
2019-03-20 10:02:34 -04:00
|
|
|
|
2020-11-20 13:05:20 -05:00
|
|
|
context "when ignorer's trust level is below min_trust_level_to_allow_ignore" do
|
|
|
|
let(:guardian) { Guardian.new(trust_level_0) }
|
2019-03-20 10:02:34 -04:00
|
|
|
it 'does not allow ignoring user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_ignore_user?(another_user)).to eq(false)
|
2019-03-20 10:02:34 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-11-20 13:05:20 -05:00
|
|
|
context "when ignorer's trust level is equal to min_trust_level_to_allow_ignore site setting" do
|
|
|
|
let(:guardian) { Guardian.new(trust_level_1) }
|
2019-03-20 10:47:13 -04:00
|
|
|
it 'allows ignoring user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_ignore_user?(another_user)).to eq(true)
|
2019-03-20 10:47:13 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-11-20 13:05:20 -05:00
|
|
|
context "when ignorer's trust level is above min_trust_level_to_allow_ignore site setting" do
|
|
|
|
let(:guardian) { Guardian.new(trust_level_3) }
|
2019-03-20 10:02:34 -04:00
|
|
|
it 'allows ignoring user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_ignore_user?(another_user)).to eq(true)
|
2019-03-20 10:02:34 -04:00
|
|
|
end
|
|
|
|
end
|
2019-03-20 06:18:46 -04:00
|
|
|
end
|
|
|
|
|
2019-03-27 05:41:50 -04:00
|
|
|
describe '#can_mute_user?' do
|
|
|
|
|
|
|
|
let(:guardian) { Guardian.new(trust_level_1) }
|
|
|
|
|
|
|
|
context "when muted user is the same as guardian user" do
|
|
|
|
it 'does not allow muting user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_mute_user?(trust_level_1)).to eq(false)
|
2019-03-27 05:41:50 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when muted user is a staff user" do
|
|
|
|
let!(:admin) { Fabricate(:user, admin: true) }
|
|
|
|
|
|
|
|
it 'does not allow muting user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_mute_user?(admin)).to eq(false)
|
2019-03-27 05:41:50 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when muted user is a normal user" do
|
|
|
|
it 'allows muting user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_mute_user?(another_user)).to eq(true)
|
2019-03-27 05:41:50 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when muter's trust level is below tl1" do
|
|
|
|
let(:guardian) { Guardian.new(trust_level_0) }
|
|
|
|
let!(:trust_level_0) { build(:user, trust_level: 0) }
|
|
|
|
|
|
|
|
it 'does not allow muting user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_mute_user?(another_user)).to eq(false)
|
2019-03-27 05:41:50 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when muter is staff" do
|
|
|
|
let(:guardian) { Guardian.new(admin) }
|
|
|
|
|
|
|
|
it 'allows muting user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_mute_user?(another_user)).to eq(true)
|
2019-03-27 05:41:50 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when muters's trust level is tl1" do
|
|
|
|
let(:guardian) { Guardian.new(trust_level_1) }
|
|
|
|
|
|
|
|
it 'allows muting user' do
|
2020-01-02 08:04:08 -05:00
|
|
|
expect(guardian.can_mute_user?(another_user)).to eq(true)
|
2019-03-27 05:41:50 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-08-08 00:46:34 -04:00
|
|
|
describe "#allow_themes?" do
|
2019-05-06 23:12:20 -04:00
|
|
|
let!(:theme) { Fabricate(:theme) }
|
|
|
|
let!(:theme2) { Fabricate(:theme) }
|
2018-08-08 00:46:34 -04:00
|
|
|
|
2020-07-26 20:23:54 -04:00
|
|
|
context "allowlist mode" do
|
2020-06-02 23:19:42 -04:00
|
|
|
before do
|
2020-07-26 20:23:54 -04:00
|
|
|
GlobalSetting.reset_allowed_theme_ids!
|
|
|
|
global_setting :allowed_theme_repos, " https://magic.com/repo.git, https://x.com/git"
|
2020-06-02 23:19:42 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
2020-07-26 20:23:54 -04:00
|
|
|
GlobalSetting.reset_allowed_theme_ids!
|
2020-06-02 23:19:42 -04:00
|
|
|
end
|
|
|
|
|
2020-07-26 20:23:54 -04:00
|
|
|
it "should respect theme allowlisting" do
|
2020-06-02 23:19:42 -04:00
|
|
|
r = RemoteTheme.create!(remote_url: "https://magic.com/repo.git")
|
|
|
|
theme.update!(remote_theme_id: r.id)
|
|
|
|
|
|
|
|
guardian = Guardian.new(admin)
|
|
|
|
|
|
|
|
expect(guardian.allow_themes?([theme.id, theme2.id], include_preview: true)).to eq(false)
|
|
|
|
|
|
|
|
expect(guardian.allow_themes?([theme.id], include_preview: true)).to eq(true)
|
|
|
|
|
|
|
|
expect(guardian.allowed_theme_repo_import?('https://x.com/git')).to eq(true)
|
|
|
|
expect(guardian.allowed_theme_repo_import?('https:/evil.com/git')).to eq(false)
|
|
|
|
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-08-08 00:46:34 -04:00
|
|
|
it "allows staff to use any themes" do
|
2018-09-06 20:44:57 -04:00
|
|
|
expect(Guardian.new(moderator).allow_themes?([theme.id, theme2.id])).to eq(false)
|
|
|
|
expect(Guardian.new(admin).allow_themes?([theme.id, theme2.id])).to eq(false)
|
|
|
|
|
|
|
|
expect(Guardian.new(moderator).allow_themes?([theme.id, theme2.id], include_preview: true)).to eq(true)
|
|
|
|
expect(Guardian.new(admin).allow_themes?([theme.id, theme2.id], include_preview: true)).to eq(true)
|
2018-08-08 00:46:34 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "only allows normal users to use user-selectable themes or default theme" do
|
|
|
|
user_guardian = Guardian.new(user)
|
|
|
|
|
|
|
|
expect(user_guardian.allow_themes?([theme.id, theme2.id])).to eq(false)
|
|
|
|
expect(user_guardian.allow_themes?([theme.id])).to eq(false)
|
|
|
|
expect(user_guardian.allow_themes?([theme2.id])).to eq(false)
|
|
|
|
|
|
|
|
theme.set_default!
|
|
|
|
expect(user_guardian.allow_themes?([theme.id])).to eq(true)
|
|
|
|
expect(user_guardian.allow_themes?([theme2.id])).to eq(false)
|
|
|
|
expect(user_guardian.allow_themes?([theme.id, theme2.id])).to eq(false)
|
|
|
|
|
|
|
|
theme2.update!(user_selectable: true)
|
|
|
|
expect(user_guardian.allow_themes?([theme2.id])).to eq(true)
|
|
|
|
expect(user_guardian.allow_themes?([theme2.id, theme.id])).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "allows child themes to be only used with their parent" do
|
|
|
|
user_guardian = Guardian.new(user)
|
|
|
|
|
|
|
|
theme.update!(user_selectable: true)
|
|
|
|
theme2.update!(user_selectable: true)
|
|
|
|
expect(user_guardian.allow_themes?([theme.id, theme2.id])).to eq(false)
|
|
|
|
|
2018-08-23 21:30:00 -04:00
|
|
|
theme2.update!(user_selectable: false, component: true)
|
2019-11-28 00:19:01 -05:00
|
|
|
theme.add_relative_theme!(:child, theme2)
|
2018-08-08 00:46:34 -04:00
|
|
|
expect(user_guardian.allow_themes?([theme.id, theme2.id])).to eq(true)
|
|
|
|
expect(user_guardian.allow_themes?([theme2.id])).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-05-13 08:53:11 -04:00
|
|
|
describe 'can_wiki?' do
|
2016-03-15 05:13:52 -04:00
|
|
|
let(:post) { build(:post, created_at: 1.minute.ago) }
|
2016-01-11 10:26:00 -05:00
|
|
|
|
2014-05-13 08:53:11 -04:00
|
|
|
it 'returns false for regular user' do
|
2016-01-11 10:26:00 -05:00
|
|
|
expect(Guardian.new(coding_horror).can_wiki?(post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false when user does not satisfy trust level but owns the post" do
|
|
|
|
own_post = Fabricate(:post, user: trust_level_2)
|
|
|
|
expect(Guardian.new(trust_level_2).can_wiki?(own_post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false when user satisfies trust level but tries to wiki someone else's post" do
|
|
|
|
SiteSetting.min_trust_to_allow_self_wiki = 2
|
|
|
|
expect(Guardian.new(trust_level_2).can_wiki?(post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when user satisfies trust level and owns the post' do
|
|
|
|
SiteSetting.min_trust_to_allow_self_wiki = 2
|
|
|
|
own_post = Fabricate(:post, user: trust_level_2)
|
|
|
|
expect(Guardian.new(trust_level_2).can_wiki?(own_post)).to be_truthy
|
2014-05-13 08:53:11 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for admin user' do
|
2016-01-11 10:26:00 -05:00
|
|
|
expect(Guardian.new(admin).can_wiki?(post)).to be_truthy
|
2014-05-13 08:53:11 -04:00
|
|
|
end
|
|
|
|
|
2014-09-05 02:52:40 -04:00
|
|
|
it 'returns true for trust_level_4 user' do
|
2016-01-11 10:26:00 -05:00
|
|
|
expect(Guardian.new(trust_level_4).can_wiki?(post)).to be_truthy
|
2014-05-13 08:53:11 -04:00
|
|
|
end
|
2016-03-15 05:13:52 -04:00
|
|
|
|
|
|
|
context 'post is older than post_edit_time_limit' do
|
|
|
|
let(:old_post) { build(:post, user: trust_level_2, created_at: 6.minutes.ago) }
|
|
|
|
before do
|
|
|
|
SiteSetting.min_trust_to_allow_self_wiki = 2
|
2019-09-06 07:44:12 -04:00
|
|
|
SiteSetting.tl2_post_edit_time_limit = 5
|
2016-03-15 05:13:52 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false when user satisfies trust level and owns the post' do
|
|
|
|
expect(Guardian.new(trust_level_2).can_wiki?(old_post)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for admin user' do
|
|
|
|
expect(Guardian.new(admin).can_wiki?(old_post)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for trust_level_4 user' do
|
|
|
|
expect(Guardian.new(trust_level_4).can_wiki?(post)).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
2014-05-13 08:53:11 -04:00
|
|
|
end
|
2016-06-06 14:18:15 -04:00
|
|
|
|
|
|
|
describe "Tags" do
|
|
|
|
context "tagging disabled" do
|
|
|
|
before do
|
|
|
|
SiteSetting.tagging_enabled = false
|
|
|
|
end
|
|
|
|
|
|
|
|
it "can_create_tag returns false" do
|
|
|
|
expect(Guardian.new(admin).can_create_tag?).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "can_admin_tags returns false" do
|
|
|
|
expect(Guardian.new(admin).can_admin_tags?).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "can_admin_tag_groups returns false" do
|
|
|
|
expect(Guardian.new(admin).can_admin_tag_groups?).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "tagging is enabled" do
|
|
|
|
before do
|
|
|
|
SiteSetting.tagging_enabled = true
|
|
|
|
SiteSetting.min_trust_level_to_tag_topics = 1
|
|
|
|
end
|
|
|
|
|
2018-07-05 11:39:32 -04:00
|
|
|
context 'min_trust_to_create_tag is 3' do
|
|
|
|
before do
|
|
|
|
SiteSetting.min_trust_to_create_tag = 3
|
2016-06-06 14:18:15 -04:00
|
|
|
end
|
|
|
|
|
2018-07-05 11:39:32 -04:00
|
|
|
describe "can_create_tag" do
|
|
|
|
it "returns false if trust level is too low" do
|
|
|
|
expect(Guardian.new(trust_level_2).can_create_tag?).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if trust level is high enough" do
|
|
|
|
expect(Guardian.new(trust_level_3).can_create_tag?).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true for staff" do
|
|
|
|
expect(Guardian.new(admin).can_create_tag?).to be_truthy
|
|
|
|
expect(Guardian.new(moderator).can_create_tag?).to be_truthy
|
|
|
|
end
|
2016-06-06 14:18:15 -04:00
|
|
|
end
|
|
|
|
|
2018-07-05 11:39:32 -04:00
|
|
|
describe "can_tag_topics" do
|
|
|
|
it "returns false if trust level is too low" do
|
|
|
|
expect(Guardian.new(Fabricate(:user, trust_level: 0)).can_tag_topics?).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if trust level is high enough" do
|
|
|
|
expect(Guardian.new(Fabricate(:user, trust_level: 1)).can_tag_topics?).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true for staff" do
|
|
|
|
expect(Guardian.new(admin).can_tag_topics?).to be_truthy
|
|
|
|
expect(Guardian.new(moderator).can_tag_topics?).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'min_trust_to_create_tag is "staff"' do
|
|
|
|
before do
|
|
|
|
SiteSetting.min_trust_to_create_tag = 'staff'
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns false if not staff" do
|
|
|
|
expect(Guardian.new(trust_level_4).can_create_tag?).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if staff" do
|
2016-06-06 14:18:15 -04:00
|
|
|
expect(Guardian.new(admin).can_create_tag?).to be_truthy
|
|
|
|
expect(Guardian.new(moderator).can_create_tag?).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-07-05 11:39:32 -04:00
|
|
|
context 'min_trust_to_create_tag is "admin"' do
|
|
|
|
before do
|
|
|
|
SiteSetting.min_trust_to_create_tag = 'admin'
|
2016-06-06 14:18:15 -04:00
|
|
|
end
|
|
|
|
|
2018-07-05 11:39:32 -04:00
|
|
|
it "returns false if not admin" do
|
|
|
|
expect(Guardian.new(trust_level_4).can_create_tag?).to eq(false)
|
|
|
|
expect(Guardian.new(moderator).can_create_tag?).to eq(false)
|
2016-06-06 14:18:15 -04:00
|
|
|
end
|
|
|
|
|
2018-07-05 11:39:32 -04:00
|
|
|
it "returns true if admin" do
|
|
|
|
expect(Guardian.new(admin).can_create_tag?).to be_truthy
|
2016-06-06 14:18:15 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-12-05 07:31:43 -05:00
|
|
|
|
2017-07-03 15:26:46 -04:00
|
|
|
describe(:can_see_group) do
|
2019-07-08 15:09:50 -04:00
|
|
|
it 'Correctly handles owner visible groups' do
|
2017-07-03 15:26:46 -04:00
|
|
|
group = Group.new(name: 'group', visibility_level: Group.visibility_levels[:owners])
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
|
|
|
expect(Guardian.new(admin).can_see_group?(group)).to eq(true)
|
2019-07-08 15:09:50 -04:00
|
|
|
expect(Guardian.new(another_user).can_see_group?(group)).to eq(false)
|
2017-07-03 15:26:46 -04:00
|
|
|
expect(Guardian.new(moderator).can_see_group?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(member).can_see_group?(group)).to eq(false)
|
|
|
|
expect(Guardian.new.can_see_group?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(owner).can_see_group?(group)).to eq(true)
|
|
|
|
end
|
|
|
|
|
2019-07-08 15:09:50 -04:00
|
|
|
it 'Correctly handles staff visible groups' do
|
2017-07-03 15:26:46 -04:00
|
|
|
group = Group.new(name: 'group', visibility_level: Group.visibility_levels[:staff])
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
2019-07-08 15:09:50 -04:00
|
|
|
expect(Guardian.new(another_user).can_see_group?(group)).to eq(false)
|
2017-07-03 15:26:46 -04:00
|
|
|
expect(Guardian.new(member).can_see_group?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(admin).can_see_group?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(moderator).can_see_group?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(owner).can_see_group?(group)).to eq(true)
|
|
|
|
expect(Guardian.new.can_see_group?(group)).to eq(false)
|
|
|
|
end
|
|
|
|
|
2019-07-08 15:09:50 -04:00
|
|
|
it 'Correctly handles member visible groups' do
|
2017-07-03 15:26:46 -04:00
|
|
|
group = Group.new(name: 'group', visibility_level: Group.visibility_levels[:members])
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
2020-09-21 12:32:43 -04:00
|
|
|
expect(Guardian.new(moderator).can_see_group?(group)).to eq(true)
|
2017-07-03 15:26:46 -04:00
|
|
|
expect(Guardian.new.can_see_group?(group)).to eq(false)
|
2019-07-08 15:09:50 -04:00
|
|
|
expect(Guardian.new(another_user).can_see_group?(group)).to eq(false)
|
2017-07-03 15:26:46 -04:00
|
|
|
expect(Guardian.new(admin).can_see_group?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(member).can_see_group?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(owner).can_see_group?(group)).to eq(true)
|
|
|
|
end
|
|
|
|
|
2019-07-08 15:09:50 -04:00
|
|
|
it 'Correctly handles logged-on-user visible groups' do
|
|
|
|
group = Group.new(name: 'group', visibility_level: Group.visibility_levels[:logged_on_users])
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
|
|
|
expect(Guardian.new.can_see_group?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(moderator).can_see_group?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(admin).can_see_group?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(member).can_see_group?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(owner).can_see_group?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(another_user).can_see_group?(group)).to eq(true)
|
|
|
|
end
|
|
|
|
|
2017-07-03 15:26:46 -04:00
|
|
|
it 'Correctly handles public groups' do
|
|
|
|
group = Group.new(name: 'group', visibility_level: Group.visibility_levels[:public])
|
|
|
|
|
|
|
|
expect(Guardian.new.can_see_group?(group)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
2019-08-14 09:30:04 -04:00
|
|
|
describe(:can_see_group_members) do
|
|
|
|
it 'Correctly handles group members visibility for owner' do
|
|
|
|
group = Group.new(name: 'group', members_visibility_level: Group.visibility_levels[:owners])
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
|
|
|
expect(Guardian.new(admin).can_see_group_members?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(another_user).can_see_group_members?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(moderator).can_see_group_members?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(member).can_see_group_members?(group)).to eq(false)
|
|
|
|
expect(Guardian.new.can_see_group_members?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(owner).can_see_group_members?(group)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'Correctly handles group members visibility for staff' do
|
|
|
|
group = Group.new(name: 'group', members_visibility_level: Group.visibility_levels[:staff])
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
|
|
|
expect(Guardian.new(another_user).can_see_group_members?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(member).can_see_group_members?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(admin).can_see_group_members?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(moderator).can_see_group_members?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(owner).can_see_group_members?(group)).to eq(true)
|
|
|
|
expect(Guardian.new.can_see_group_members?(group)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'Correctly handles group members visibility for member' do
|
|
|
|
group = Group.new(name: 'group', members_visibility_level: Group.visibility_levels[:members])
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
2020-09-21 12:32:43 -04:00
|
|
|
expect(Guardian.new(moderator).can_see_group_members?(group)).to eq(true)
|
2019-08-14 09:30:04 -04:00
|
|
|
expect(Guardian.new.can_see_group_members?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(another_user).can_see_group_members?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(admin).can_see_group_members?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(member).can_see_group_members?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(owner).can_see_group_members?(group)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'Correctly handles group members visibility for logged-on-user' do
|
|
|
|
group = Group.new(name: 'group', members_visibility_level: Group.visibility_levels[:logged_on_users])
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
|
|
|
expect(Guardian.new.can_see_group_members?(group)).to eq(false)
|
|
|
|
expect(Guardian.new(moderator).can_see_group_members?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(admin).can_see_group_members?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(member).can_see_group_members?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(owner).can_see_group_members?(group)).to eq(true)
|
|
|
|
expect(Guardian.new(another_user).can_see_group_members?(group)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'Correctly handles group members visibility for public' do
|
|
|
|
group = Group.new(name: 'group', members_visibility_level: Group.visibility_levels[:public])
|
|
|
|
|
|
|
|
expect(Guardian.new.can_see_group_members?(group)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
2019-05-29 18:40:43 -04:00
|
|
|
describe '#can_see_groups?' do
|
2019-07-08 15:09:50 -04:00
|
|
|
it 'correctly handles owner visible groups' do
|
2019-05-29 18:40:43 -04:00
|
|
|
group = Group.new(name: 'group', visibility_level: Group.visibility_levels[:owners])
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
|
|
|
expect(Guardian.new(admin).can_see_groups?([group])).to eq(true)
|
2019-07-08 15:09:50 -04:00
|
|
|
expect(Guardian.new(another_user).can_see_groups?([group])).to eq(false)
|
2019-05-29 18:40:43 -04:00
|
|
|
expect(Guardian.new(moderator).can_see_groups?([group])).to eq(false)
|
|
|
|
expect(Guardian.new(member).can_see_groups?([group])).to eq(false)
|
|
|
|
expect(Guardian.new.can_see_groups?([group])).to eq(false)
|
|
|
|
expect(Guardian.new(owner).can_see_groups?([group])).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'correctly handles the case where the user does not own every group' do
|
|
|
|
group = Group.new(name: 'group', visibility_level: Group.visibility_levels[:owners])
|
|
|
|
group2 = Group.new(name: 'group2', visibility_level: Group.visibility_levels[:owners])
|
|
|
|
group2.save!
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
|
|
|
expect(Guardian.new(admin).can_see_groups?([group, group2])).to eq(true)
|
|
|
|
expect(Guardian.new(moderator).can_see_groups?([group, group2])).to eq(false)
|
|
|
|
expect(Guardian.new(member).can_see_groups?([group, group2])).to eq(false)
|
|
|
|
expect(Guardian.new.can_see_groups?([group, group2])).to eq(false)
|
|
|
|
expect(Guardian.new(owner).can_see_groups?([group, group2])).to eq(false)
|
2019-07-08 15:09:50 -04:00
|
|
|
expect(Guardian.new(another_user).can_see_groups?([group, group2])).to eq(false)
|
2019-05-29 18:40:43 -04:00
|
|
|
end
|
|
|
|
|
2019-07-08 15:09:50 -04:00
|
|
|
it 'correctly handles staff visible groups' do
|
2019-05-29 18:40:43 -04:00
|
|
|
group = Group.new(name: 'group', visibility_level: Group.visibility_levels[:staff])
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
|
|
|
expect(Guardian.new(member).can_see_groups?([group])).to eq(false)
|
|
|
|
expect(Guardian.new(admin).can_see_groups?([group])).to eq(true)
|
|
|
|
expect(Guardian.new(moderator).can_see_groups?([group])).to eq(true)
|
|
|
|
expect(Guardian.new(owner).can_see_groups?([group])).to eq(true)
|
|
|
|
expect(Guardian.new.can_see_groups?([group])).to eq(false)
|
2019-07-08 15:09:50 -04:00
|
|
|
expect(Guardian.new(another_user).can_see_groups?([group])).to eq(false)
|
2019-05-29 18:40:43 -04:00
|
|
|
end
|
|
|
|
|
2019-07-08 15:09:50 -04:00
|
|
|
it 'correctly handles member visible groups' do
|
2019-05-29 18:40:43 -04:00
|
|
|
group = Group.new(name: 'group', visibility_level: Group.visibility_levels[:members])
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
2019-07-08 15:09:50 -04:00
|
|
|
expect(Guardian.new(another_user).can_see_groups?([group])).to eq(false)
|
2020-09-21 12:32:43 -04:00
|
|
|
expect(Guardian.new(moderator).can_see_groups?([group])).to eq(true)
|
2019-05-29 18:40:43 -04:00
|
|
|
expect(Guardian.new.can_see_groups?([group])).to eq(false)
|
|
|
|
expect(Guardian.new(admin).can_see_groups?([group])).to eq(true)
|
|
|
|
expect(Guardian.new(member).can_see_groups?([group])).to eq(true)
|
|
|
|
expect(Guardian.new(owner).can_see_groups?([group])).to eq(true)
|
|
|
|
end
|
|
|
|
|
2019-07-08 15:09:50 -04:00
|
|
|
it 'correctly handles logged-on-user visible groups' do
|
|
|
|
group = Group.new(name: 'group', visibility_level: Group.visibility_levels[:logged_on_users])
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group.add(member)
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group.add_owner(owner)
|
|
|
|
group.reload
|
|
|
|
|
|
|
|
expect(Guardian.new(member).can_see_groups?([group])).to eq(true)
|
|
|
|
expect(Guardian.new(admin).can_see_groups?([group])).to eq(true)
|
|
|
|
expect(Guardian.new(moderator).can_see_groups?([group])).to eq(true)
|
|
|
|
expect(Guardian.new(owner).can_see_groups?([group])).to eq(true)
|
|
|
|
expect(Guardian.new.can_see_groups?([group])).to eq(false)
|
|
|
|
expect(Guardian.new(another_user).can_see_groups?([group])).to eq(true)
|
|
|
|
end
|
|
|
|
|
2019-05-29 18:40:43 -04:00
|
|
|
it 'correctly handles the case where the user is not a member of every group' do
|
|
|
|
group1 = Group.new(name: 'group', visibility_level: Group.visibility_levels[:members])
|
|
|
|
group2 = Group.new(name: 'group2', visibility_level: Group.visibility_levels[:members])
|
|
|
|
group2.save!
|
|
|
|
|
|
|
|
member = Fabricate(:user)
|
|
|
|
group1.add(member)
|
|
|
|
group1.save!
|
|
|
|
|
|
|
|
owner = Fabricate(:user)
|
|
|
|
group1.add_owner(owner)
|
|
|
|
group1.reload
|
|
|
|
|
2020-09-21 12:32:43 -04:00
|
|
|
expect(Guardian.new(moderator).can_see_groups?([group1, group2])).to eq(true)
|
2019-05-29 18:40:43 -04:00
|
|
|
expect(Guardian.new.can_see_groups?([group1, group2])).to eq(false)
|
|
|
|
expect(Guardian.new(admin).can_see_groups?([group1, group2])).to eq(true)
|
|
|
|
expect(Guardian.new(member).can_see_groups?([group1, group2])).to eq(false)
|
|
|
|
expect(Guardian.new(owner).can_see_groups?([group1, group2])).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'correctly handles public groups' do
|
|
|
|
group = Group.new(name: 'group', visibility_level: Group.visibility_levels[:public])
|
|
|
|
|
|
|
|
expect(Guardian.new.can_see_groups?([group])).to eq(true)
|
|
|
|
end
|
|
|
|
|
2019-07-08 15:09:50 -04:00
|
|
|
it 'correctly handles case where not every group is public' do
|
2019-05-29 18:40:43 -04:00
|
|
|
group1 = Group.new(name: 'group', visibility_level: Group.visibility_levels[:public])
|
|
|
|
group2 = Group.new(name: 'group', visibility_level: Group.visibility_levels[:private])
|
|
|
|
|
|
|
|
expect(Guardian.new.can_see_groups?([group1, group2])).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-12-05 07:31:43 -05:00
|
|
|
context 'topic featured link category restriction' do
|
|
|
|
before { SiteSetting.topic_featured_link_enabled = true }
|
2021-08-05 05:38:39 -04:00
|
|
|
let(:guardian) { Guardian.new(user) }
|
2016-12-20 15:55:30 -05:00
|
|
|
let(:uncategorized) { Category.find(SiteSetting.uncategorized_category_id) }
|
2016-12-05 07:31:43 -05:00
|
|
|
|
2016-12-15 17:46:43 -05:00
|
|
|
context "uncategorized" do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:link_category) { Fabricate(:link_category) }
|
2016-12-15 17:46:43 -05:00
|
|
|
|
2016-12-20 15:55:30 -05:00
|
|
|
it "allows featured links if uncategorized allows it" do
|
|
|
|
uncategorized.topic_featured_link_allowed = true
|
|
|
|
uncategorized.save!
|
2016-12-15 17:46:43 -05:00
|
|
|
expect(guardian.can_edit_featured_link?(nil)).to eq(true)
|
|
|
|
end
|
|
|
|
|
2016-12-20 15:55:30 -05:00
|
|
|
it "forbids featured links if uncategorized forbids it" do
|
|
|
|
uncategorized.topic_featured_link_allowed = false
|
|
|
|
uncategorized.save!
|
2016-12-15 17:46:43 -05:00
|
|
|
expect(guardian.can_edit_featured_link?(nil)).to eq(false)
|
|
|
|
end
|
2016-12-05 07:31:43 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when exist' do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:category) { Fabricate(:category, topic_featured_link_allowed: false) }
|
|
|
|
fab!(:link_category) { Fabricate(:link_category) }
|
2016-12-05 07:31:43 -05:00
|
|
|
|
|
|
|
it 'returns true if the category is listed' do
|
|
|
|
expect(guardian.can_edit_featured_link?(link_category.id)).to eq(true)
|
|
|
|
end
|
|
|
|
|
2016-12-15 17:46:43 -05:00
|
|
|
it 'returns false if the category does not allow it' do
|
2016-12-05 07:31:43 -05:00
|
|
|
expect(guardian.can_edit_featured_link?(category.id)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2017-09-12 16:06:01 -04:00
|
|
|
|
|
|
|
context "suspension reasons" do
|
|
|
|
it "will be shown by default" do
|
|
|
|
expect(Guardian.new.can_see_suspension_reason?(user)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
context "with hide suspension reason enabled" do
|
|
|
|
before do
|
|
|
|
SiteSetting.hide_suspension_reasons = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "will not be shown to anonymous users" do
|
|
|
|
expect(Guardian.new.can_see_suspension_reason?(user)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "users can see their own suspensions" do
|
|
|
|
expect(Guardian.new(user).can_see_suspension_reason?(user)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "staff can see suspensions" do
|
|
|
|
expect(Guardian.new(moderator).can_see_suspension_reason?(user)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2017-10-10 04:26:56 -04:00
|
|
|
|
|
|
|
describe '#can_remove_allowed_users?' do
|
|
|
|
context 'staff users' do
|
|
|
|
it 'should be true' do
|
|
|
|
expect(Guardian.new(moderator).can_remove_allowed_users?(topic))
|
|
|
|
.to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-06-12 06:54:28 -04:00
|
|
|
context 'trust_level >= 2 user' do
|
|
|
|
fab!(:topic_creator) { build(:user, trust_level: 2) }
|
|
|
|
fab!(:topic) { Fabricate(:topic, user: topic_creator) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
topic.allowed_users << topic_creator
|
|
|
|
topic.allowed_users << another_user
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should be true' do
|
|
|
|
expect(Guardian.new(topic_creator).can_remove_allowed_users?(topic))
|
|
|
|
.to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-10-10 04:26:56 -04:00
|
|
|
context 'normal user' do
|
2020-06-12 06:54:28 -04:00
|
|
|
fab!(:topic) { Fabricate(:topic, user: Fabricate(:user, trust_level: 1)) }
|
2017-10-10 04:26:56 -04:00
|
|
|
|
|
|
|
before do
|
|
|
|
topic.allowed_users << user
|
|
|
|
topic.allowed_users << another_user
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should be false' do
|
|
|
|
expect(Guardian.new(user).can_remove_allowed_users?(topic))
|
|
|
|
.to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'target_user is the user' do
|
|
|
|
describe 'when user is in a pm with another user' do
|
|
|
|
it 'should return true' do
|
|
|
|
expect(Guardian.new(user).can_remove_allowed_users?(topic, user))
|
|
|
|
.to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when user is the creator of the topic' do
|
|
|
|
it 'should return false' do
|
|
|
|
expect(Guardian.new(topic.user).can_remove_allowed_users?(topic, topic.user))
|
|
|
|
.to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when user is the only user in the topic' do
|
|
|
|
it 'should return false' do
|
|
|
|
topic.remove_allowed_user(Discourse.system_user, another_user.username)
|
|
|
|
|
|
|
|
expect(Guardian.new(user).can_remove_allowed_users?(topic, user))
|
|
|
|
.to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'target_user is not the user' do
|
|
|
|
it 'should return false' do
|
|
|
|
expect(Guardian.new(user).can_remove_allowed_users?(topic, moderator))
|
|
|
|
.to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-06-19 05:04:05 -04:00
|
|
|
|
|
|
|
context "anonymous users" do
|
|
|
|
fab!(:topic) { Fabricate(:topic) }
|
|
|
|
|
|
|
|
it 'should be false' do
|
|
|
|
expect(Guardian.new.can_remove_allowed_users?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should be false when the topic does not have a user (for example because the user was removed)' do
|
|
|
|
DB.exec("UPDATE topics SET user_id=NULL WHERE id=#{topic.id}")
|
|
|
|
topic.reload
|
|
|
|
|
|
|
|
expect(Guardian.new.can_remove_allowed_users?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
2017-10-10 04:26:56 -04:00
|
|
|
end
|
2018-10-11 19:40:48 -04:00
|
|
|
|
|
|
|
describe '#auth_token' do
|
|
|
|
it 'returns the correct auth token' do
|
|
|
|
token = UserAuthToken.generate!(user_id: user.id)
|
|
|
|
env = Rack::MockRequest.env_for("/", "HTTP_COOKIE" => "_t=#{token.unhashed_auth_token};")
|
|
|
|
|
|
|
|
guardian = Guardian.new(user, Rack::Request.new(env))
|
|
|
|
expect(guardian.auth_token).to eq(token.auth_token)
|
|
|
|
end
|
|
|
|
end
|
2020-04-08 12:52:36 -04:00
|
|
|
|
|
|
|
describe "can_publish_page?" do
|
|
|
|
context "when disabled" do
|
|
|
|
it "is false for staff" do
|
|
|
|
expect(Guardian.new(admin).can_publish_page?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when enabled" do
|
|
|
|
before do
|
|
|
|
SiteSetting.enable_page_publishing = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for anonymous users" do
|
|
|
|
expect(Guardian.new.can_publish_page?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for regular users" do
|
|
|
|
expect(Guardian.new(user).can_publish_page?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is true for staff" do
|
|
|
|
expect(Guardian.new(moderator).can_publish_page?(topic)).to eq(true)
|
|
|
|
expect(Guardian.new(admin).can_publish_page?(topic)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false if the topic is a private message" do
|
|
|
|
post = Fabricate(:private_message_post, user: admin)
|
|
|
|
expect(Guardian.new(admin).can_publish_page?(post.topic)).to eq(false)
|
|
|
|
end
|
2020-11-05 19:33:19 -05:00
|
|
|
|
|
|
|
context "when secure_media is also enabled" do
|
|
|
|
before do
|
|
|
|
setup_s3
|
|
|
|
SiteSetting.secure_media = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for everyone" do
|
|
|
|
expect(Guardian.new(moderator).can_publish_page?(topic)).to eq(false)
|
|
|
|
expect(Guardian.new(user).can_publish_page?(topic)).to eq(false)
|
|
|
|
expect(Guardian.new.can_publish_page?(topic)).to eq(false)
|
|
|
|
expect(Guardian.new(admin).can_publish_page?(topic)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
2020-04-08 12:52:36 -04:00
|
|
|
end
|
|
|
|
end
|
2021-05-19 02:15:24 -04:00
|
|
|
|
|
|
|
describe "can_see_site_contact_details" do
|
|
|
|
context "login_required is enabled" do
|
|
|
|
before do
|
|
|
|
SiteSetting.login_required = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is false for anonymous users" do
|
|
|
|
expect(Guardian.new.can_see_site_contact_details?).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is true for regular users" do
|
|
|
|
expect(Guardian.new(user).can_see_site_contact_details?).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "login_required is disabled" do
|
|
|
|
before do
|
|
|
|
SiteSetting.login_required = false
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is true for anonymous users" do
|
|
|
|
expect(Guardian.new.can_see_site_contact_details?).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "is true for regular users" do
|
|
|
|
expect(Guardian.new(user).can_see_site_contact_details?).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|