diff --git a/spec/lib/docker_client_spec.rb b/spec/lib/docker_client_spec.rb index d21b4010..ff36f5ff 100644 --- a/spec/lib/docker_client_spec.rb +++ b/spec/lib/docker_client_spec.rb @@ -26,6 +26,10 @@ describe DockerClient, docker: true do end describe '.container_creation_options' do + it "is TODO" do + pending("heavy load on the docker daemon") + end + let(:container_creation_options) { described_class.container_creation_options(execution_environment) } it 'specifies the Docker image' do @@ -159,6 +163,9 @@ describe DockerClient, docker: true do end describe '.destroy_container' do + it "is TODO" do + pending("heavy load on the docker daemon") + end let(:container) { described_class.create_container(execution_environment) } after(:each) { described_class.destroy_container(container) } diff --git a/spec/policies/execution_environment_policy_spec.rb b/spec/policies/execution_environment_policy_spec.rb index 799881b5..8bede9e1 100644 --- a/spec/policies/execution_environment_policy_spec.rb +++ b/spec/policies/execution_environment_policy_spec.rb @@ -21,7 +21,8 @@ describe ExecutionEnvironmentPolicy do end end - [:destroy?, :edit?, :execute_command?, :shell?, :show?, :update?].each do |action| + + [:execute_command?, :shell?, :statistics?].each do |action| permissions(action) do it 'grants access to admins' do expect(subject).to permit(FactoryGirl.build(:admin), execution_environment) @@ -38,4 +39,22 @@ describe ExecutionEnvironmentPolicy do end end end + + [:destroy?, :edit?, :show?, :update?].each do |action| + permissions(action) do + it 'grants access to admins' do + expect(subject).to permit(FactoryGirl.build(:admin), execution_environment) + end + + it 'does not grant access to authors' do + expect(subject).not_to permit(execution_environment.author, execution_environment) + end + + it 'does not grant access to all other users' do + [:external_user, :teacher].each do |factory_name| + expect(subject).not_to permit(FactoryGirl.build(factory_name), execution_environment) + end + end + end + end end