rename factory_girl_(rails) to factory_bot_(rails)

This commit is contained in:
Ralf Teusner
2017-11-15 15:18:07 +01:00
parent 951b71780c
commit 0e26ab98c8
68 changed files with 253 additions and 253 deletions

View File

@ -3,20 +3,20 @@ require 'rails_helper'
describe ExecutionEnvironmentPolicy do
subject { described_class }
let(:execution_environment) { FactoryGirl.build(:ruby) }
let(:execution_environment) { FactoryBot.build(:ruby) }
[:create?, :index?, :new?].each do |action|
permissions(action) do
it 'grants access to admins' do
expect(subject).to permit(FactoryGirl.build(:admin), execution_environment)
expect(subject).to permit(FactoryBot.build(:admin), execution_environment)
end
it 'grants access to teachers' do
expect(subject).to permit(FactoryGirl.build(:teacher), execution_environment)
expect(subject).to permit(FactoryBot.build(:teacher), execution_environment)
end
it 'does not grant access to external users' do
expect(subject).not_to permit(FactoryGirl.build(:external_user), execution_environment)
expect(subject).not_to permit(FactoryBot.build(:external_user), execution_environment)
end
end
end
@ -24,7 +24,7 @@ describe ExecutionEnvironmentPolicy do
[:execute_command?, :shell?, :statistics?].each do |action|
permissions(action) do
it 'grants access to admins' do
expect(subject).to permit(FactoryGirl.build(:admin), execution_environment)
expect(subject).to permit(FactoryBot.build(:admin), execution_environment)
end
it 'grants access to authors' do
@ -33,7 +33,7 @@ describe ExecutionEnvironmentPolicy do
it 'does not grant access to all other users' do
[:external_user, :teacher].each do |factory_name|
expect(subject).not_to permit(FactoryGirl.build(factory_name), execution_environment)
expect(subject).not_to permit(FactoryBot.build(factory_name), execution_environment)
end
end
end
@ -42,7 +42,7 @@ describe ExecutionEnvironmentPolicy do
[:destroy?, :edit?, :show?, :update?].each do |action|
permissions(action) do
it 'grants access to admins' do
expect(subject).to permit(FactoryGirl.build(:admin), execution_environment)
expect(subject).to permit(FactoryBot.build(:admin), execution_environment)
end
it 'does not grant access to authors' do
@ -51,7 +51,7 @@ describe ExecutionEnvironmentPolicy do
it 'does not grant access to all other users' do
[:external_user, :teacher].each do |factory_name|
expect(subject).not_to permit(FactoryGirl.build(factory_name), execution_environment)
expect(subject).not_to permit(FactoryBot.build(factory_name), execution_environment)
end
end
end