Update bundle (with newest rubocop version) and fix offenses
This commit is contained in:
@ -7,15 +7,15 @@ describe Admin::DashboardPolicy do
|
||||
|
||||
permissions :show? do
|
||||
it 'grants access to admins' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), :dashboard)
|
||||
expect(policy).to permit(build(:admin), :dashboard)
|
||||
end
|
||||
|
||||
it 'does not grant access to teachers' do
|
||||
expect(policy).not_to permit(FactoryBot.build(:teacher), :dashboard)
|
||||
expect(policy).not_to permit(build(:teacher), :dashboard)
|
||||
end
|
||||
|
||||
it 'does not grant access to external users' do
|
||||
expect(policy).not_to permit(FactoryBot.build(:external_user), :dashboard)
|
||||
expect(policy).not_to permit(build(:external_user), :dashboard)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -5,15 +5,15 @@ require 'rails_helper'
|
||||
describe CodeOcean::FilePolicy do
|
||||
subject(:policy) { described_class }
|
||||
|
||||
let(:exercise) { FactoryBot.create(:fibonacci) }
|
||||
let(:submission) { FactoryBot.create(:submission) }
|
||||
let(:exercise) { create(:fibonacci) }
|
||||
let(:submission) { create(:submission) }
|
||||
|
||||
permissions :create? do
|
||||
context 'when being part of an exercise' do
|
||||
let(:file) { exercise.files.first }
|
||||
|
||||
it 'grants access to admins' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), file)
|
||||
expect(policy).to permit(build(:admin), file)
|
||||
end
|
||||
|
||||
it 'grants access to authors' do
|
||||
@ -22,7 +22,7 @@ describe CodeOcean::FilePolicy do
|
||||
|
||||
it 'does not grant access to all other users' do
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), file)
|
||||
expect(policy).not_to permit(build(factory_name), file)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -52,7 +52,7 @@ describe CodeOcean::FilePolicy do
|
||||
|
||||
it 'does not grant access to all other users' do
|
||||
%i[admin external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), file)
|
||||
expect(policy).not_to permit(build(factory_name), file)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -63,7 +63,7 @@ describe CodeOcean::FilePolicy do
|
||||
let(:file) { exercise.files.first }
|
||||
|
||||
it 'grants access to admins' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), file)
|
||||
expect(policy).to permit(build(:admin), file)
|
||||
end
|
||||
|
||||
it 'grants access to authors' do
|
||||
@ -72,7 +72,7 @@ describe CodeOcean::FilePolicy do
|
||||
|
||||
it 'does not grant access to all other users' do
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), file)
|
||||
expect(policy).not_to permit(build(factory_name), file)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -82,7 +82,7 @@ describe CodeOcean::FilePolicy do
|
||||
|
||||
it 'does not grant access to anyone' do
|
||||
%i[admin external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), file)
|
||||
expect(policy).not_to permit(build(factory_name), file)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -5,7 +5,7 @@ require 'rails_helper'
|
||||
describe CodeharborLinkPolicy do
|
||||
subject(:policy) { described_class }
|
||||
|
||||
let(:codeharbor_link) { FactoryBot.create(:codeharbor_link) }
|
||||
let(:codeharbor_link) { create(:codeharbor_link) }
|
||||
|
||||
context 'when CodeHarbor link is enabled' do
|
||||
let(:codeocean_config) { instance_double(CodeOcean::Config) }
|
||||
@ -20,7 +20,7 @@ describe CodeharborLinkPolicy do
|
||||
permissions(action) do
|
||||
it 'does not grant access any user' do
|
||||
%i[external_user teacher admin].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.create(factory_name), codeharbor_link)
|
||||
expect(policy).not_to permit(create(factory_name), codeharbor_link)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -30,12 +30,12 @@ describe CodeharborLinkPolicy do
|
||||
permissions(action) do
|
||||
it 'grants access to teachers' do
|
||||
%i[teacher admin].each do |factory_name|
|
||||
expect(policy).to permit(FactoryBot.create(factory_name), codeharbor_link)
|
||||
expect(policy).to permit(create(factory_name), codeharbor_link)
|
||||
end
|
||||
end
|
||||
|
||||
it 'does not grant access to all other users' do
|
||||
expect(policy).not_to permit(FactoryBot.create(:external_user), codeharbor_link)
|
||||
expect(policy).not_to permit(create(:external_user), codeharbor_link)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -48,7 +48,7 @@ describe CodeharborLinkPolicy do
|
||||
|
||||
it 'does not grant access to arbitrary users' do
|
||||
%i[external_user admin teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.create(factory_name), codeharbor_link)
|
||||
expect(policy).not_to permit(create(factory_name), codeharbor_link)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -57,7 +57,7 @@ describe CodeharborLinkPolicy do
|
||||
permissions(:enabled?) do
|
||||
it 'reflects the config option' do
|
||||
%i[external_user admin teacher].each do |factory_name|
|
||||
expect(policy).to permit(FactoryBot.create(factory_name), codeharbor_link)
|
||||
expect(policy).to permit(create(factory_name), codeharbor_link)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -75,7 +75,7 @@ describe CodeharborLinkPolicy do
|
||||
permissions(:enabled?) do
|
||||
it 'reflects the config option' do
|
||||
%i[external_user admin teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.create(factory_name), codeharbor_link)
|
||||
expect(policy).not_to permit(create(factory_name), codeharbor_link)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -8,9 +8,9 @@ describe ConsumerPolicy do
|
||||
%i[create? destroy? edit? index? new? show? update?].each do |action|
|
||||
permissions(action) do
|
||||
it 'grants access to admins only' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), Consumer.new)
|
||||
expect(policy).to permit(build(:admin), Consumer.new)
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), Consumer.new)
|
||||
expect(policy).not_to permit(build(factory_name), Consumer.new)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -5,20 +5,20 @@ require 'rails_helper'
|
||||
describe ExecutionEnvironmentPolicy do
|
||||
subject(:policy) { described_class }
|
||||
|
||||
let(:execution_environment) { FactoryBot.build(:ruby) }
|
||||
let(:execution_environment) { build(:ruby) }
|
||||
|
||||
[:index?].each do |action|
|
||||
permissions(action) do
|
||||
it 'grants access to admins' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), execution_environment)
|
||||
expect(policy).to permit(build(:admin), execution_environment)
|
||||
end
|
||||
|
||||
it 'grants access to teachers' do
|
||||
expect(policy).to permit(FactoryBot.build(:teacher), execution_environment)
|
||||
expect(policy).to permit(build(:teacher), execution_environment)
|
||||
end
|
||||
|
||||
it 'does not grant access to external users' do
|
||||
expect(policy).not_to permit(FactoryBot.build(:external_user), execution_environment)
|
||||
expect(policy).not_to permit(build(:external_user), execution_environment)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -26,7 +26,7 @@ describe ExecutionEnvironmentPolicy do
|
||||
%i[execute_command? shell? statistics? show?].each do |action|
|
||||
permissions(action) do
|
||||
it 'grants access to admins' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), execution_environment)
|
||||
expect(policy).to permit(build(:admin), execution_environment)
|
||||
end
|
||||
|
||||
it 'grants access to authors' do
|
||||
@ -35,7 +35,7 @@ describe ExecutionEnvironmentPolicy do
|
||||
|
||||
it 'does not grant access to all other users' do
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), execution_environment)
|
||||
expect(policy).not_to permit(build(factory_name), execution_environment)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -44,7 +44,7 @@ describe ExecutionEnvironmentPolicy do
|
||||
%i[destroy? edit? update? new? create?].each do |action|
|
||||
permissions(action) do
|
||||
it 'grants access to admins' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), execution_environment)
|
||||
expect(policy).to permit(build(:admin), execution_environment)
|
||||
end
|
||||
|
||||
it 'does not grant access to authors' do
|
||||
@ -53,7 +53,7 @@ describe ExecutionEnvironmentPolicy do
|
||||
|
||||
it 'does not grant access to all other users' do
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), execution_environment)
|
||||
expect(policy).not_to permit(build(factory_name), execution_environment)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -61,7 +61,7 @@ describe ExecutionEnvironmentPolicy do
|
||||
|
||||
permissions(:sync_all_to_runner_management?) do
|
||||
it 'grants access to the admin' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin))
|
||||
expect(policy).to permit(build(:admin))
|
||||
end
|
||||
|
||||
shared_examples 'it does not grant access' do |user|
|
||||
@ -71,7 +71,7 @@ describe ExecutionEnvironmentPolicy do
|
||||
end
|
||||
|
||||
%i[teacher external_user].each do |user|
|
||||
include_examples 'it does not grant access', FactoryBot.build(user)
|
||||
include_examples 'it does not grant access', FactoryBot.build(user) # rubocop:disable RSpec/FactoryBot/SyntaxMethods
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -5,13 +5,13 @@ require 'rails_helper'
|
||||
describe ExercisePolicy do
|
||||
subject(:policy) { described_class }
|
||||
|
||||
let(:exercise) { FactoryBot.build(:dummy, public: true) }
|
||||
let(:exercise) { build(:dummy, public: true) }
|
||||
|
||||
permissions :batch_update? do
|
||||
it 'grants access to admins only' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), exercise)
|
||||
expect(policy).to permit(build(:admin), exercise)
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), exercise)
|
||||
expect(policy).not_to permit(build(factory_name), exercise)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -19,15 +19,15 @@ describe ExercisePolicy do
|
||||
%i[create? index? new? statistics? feedback? rfcs_for_exercise?].each do |action|
|
||||
permissions(action) do
|
||||
it 'grants access to admins' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), exercise)
|
||||
expect(policy).to permit(build(:admin), exercise)
|
||||
end
|
||||
|
||||
it 'grants access to teachers' do
|
||||
expect(policy).to permit(FactoryBot.build(:teacher), exercise)
|
||||
expect(policy).to permit(build(:teacher), exercise)
|
||||
end
|
||||
|
||||
it 'does not grant access to external users' do
|
||||
expect(policy).not_to permit(FactoryBot.build(:external_user), exercise)
|
||||
expect(policy).not_to permit(build(:external_user), exercise)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -35,7 +35,7 @@ describe ExercisePolicy do
|
||||
%i[clone? destroy? edit? update?].each do |action|
|
||||
permissions(action) do
|
||||
it 'grants access to admins' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), exercise)
|
||||
expect(policy).to permit(build(:admin), exercise)
|
||||
end
|
||||
|
||||
it 'grants access to authors' do
|
||||
@ -44,7 +44,7 @@ describe ExercisePolicy do
|
||||
|
||||
it 'does not grant access to all other users' do
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), exercise)
|
||||
expect(policy).not_to permit(build(factory_name), exercise)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -60,7 +60,7 @@ describe ExercisePolicy do
|
||||
end
|
||||
|
||||
context 'when user has codeharbor_link' do
|
||||
before { user.codeharbor_link = FactoryBot.build(:codeharbor_link) }
|
||||
before { user.codeharbor_link = build(:codeharbor_link) }
|
||||
|
||||
it 'grants access' do
|
||||
expect(policy).to permit(user, exercise)
|
||||
@ -69,14 +69,14 @@ describe ExercisePolicy do
|
||||
end
|
||||
|
||||
context 'when user is admin' do
|
||||
let(:user) { FactoryBot.build(:admin) }
|
||||
let(:user) { build(:admin) }
|
||||
|
||||
it 'does not grant access' do
|
||||
expect(policy).not_to permit(user, exercise)
|
||||
end
|
||||
|
||||
context 'when user has codeharbor_link' do
|
||||
before { user.codeharbor_link = FactoryBot.build(:codeharbor_link) }
|
||||
before { user.codeharbor_link = build(:codeharbor_link) }
|
||||
|
||||
it 'grants access' do
|
||||
expect(policy).to permit(user, exercise)
|
||||
@ -86,14 +86,14 @@ describe ExercisePolicy do
|
||||
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
context "when user is #{factory_name}" do
|
||||
let(:user) { FactoryBot.build(factory_name) }
|
||||
let(:user) { build(factory_name) }
|
||||
|
||||
it 'does not grant access' do
|
||||
expect(policy).not_to permit(user, exercise)
|
||||
end
|
||||
|
||||
context 'when user has codeharbor_link' do
|
||||
before { user.codeharbor_link = FactoryBot.build(:codeharbor_link) }
|
||||
before { user.codeharbor_link = build(:codeharbor_link) }
|
||||
|
||||
it 'does not grant access' do
|
||||
expect(policy).not_to permit(user, exercise)
|
||||
@ -107,7 +107,7 @@ describe ExercisePolicy do
|
||||
[:show?].each do |action|
|
||||
permissions(action) do
|
||||
it 'not grants access to external users' do
|
||||
expect(policy).not_to permit(FactoryBot.build(:external_user), exercise)
|
||||
expect(policy).not_to permit(build(:external_user), exercise)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -116,7 +116,7 @@ describe ExercisePolicy do
|
||||
permissions(action) do
|
||||
it 'grants access to anyone' do
|
||||
%i[admin external_user teacher].each do |factory_name|
|
||||
expect(policy).to permit(FactoryBot.build(factory_name), Exercise.new)
|
||||
expect(policy).to permit(build(factory_name), Exercise.new)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -124,14 +124,14 @@ describe ExercisePolicy do
|
||||
|
||||
describe ExercisePolicy::Scope do
|
||||
describe '#resolve' do
|
||||
let(:admin) { FactoryBot.create(:admin) }
|
||||
let(:external_user) { FactoryBot.create(:external_user) }
|
||||
let(:teacher) { FactoryBot.create(:teacher) }
|
||||
let(:admin) { create(:admin) }
|
||||
let(:external_user) { create(:external_user) }
|
||||
let(:teacher) { create(:teacher) }
|
||||
|
||||
before do
|
||||
[admin, teacher].each do |user|
|
||||
[true, false].each do |public|
|
||||
FactoryBot.create(:dummy, public: public, user_id: user.id, user_type: InternalUser.name)
|
||||
create(:dummy, public: public, user_id: user.id, user_type: InternalUser.name)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -8,9 +8,9 @@ describe ExternalUserPolicy do
|
||||
%i[create? destroy? edit? new? show? update?].each do |action|
|
||||
permissions(action) do
|
||||
it 'grants access to admins only' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), ExternalUser.new)
|
||||
expect(policy).to permit(build(:admin), ExternalUser.new)
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), ExternalUser.new)
|
||||
expect(policy).not_to permit(build(factory_name), ExternalUser.new)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -19,10 +19,10 @@ describe ExternalUserPolicy do
|
||||
[:index?].each do |action|
|
||||
permissions(action) do
|
||||
it 'grants access to admins and teachers only' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), ExternalUser.new)
|
||||
expect(policy).to permit(FactoryBot.build(:teacher), ExternalUser.new)
|
||||
expect(policy).to permit(build(:admin), ExternalUser.new)
|
||||
expect(policy).to permit(build(:teacher), ExternalUser.new)
|
||||
[:external_user].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), ExternalUser.new)
|
||||
expect(policy).not_to permit(build(factory_name), ExternalUser.new)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -5,12 +5,12 @@ require 'rails_helper'
|
||||
describe FileTypePolicy do
|
||||
subject(:policy) { described_class }
|
||||
|
||||
let(:file_type) { FactoryBot.build(:dot_rb) }
|
||||
let(:file_type) { build(:dot_rb) }
|
||||
|
||||
%i[destroy? edit? update? new? create? index? show?].each do |action|
|
||||
permissions(action) do
|
||||
it 'grants access to admins' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), file_type)
|
||||
expect(policy).to permit(build(:admin), file_type)
|
||||
end
|
||||
|
||||
it 'grants access to authors' do
|
||||
@ -19,7 +19,7 @@ describe FileTypePolicy do
|
||||
|
||||
it 'does not grant access to all other users' do
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), file_type)
|
||||
expect(policy).not_to permit(build(factory_name), file_type)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -8,9 +8,9 @@ describe InternalUserPolicy do
|
||||
%i[create? edit? index? new? show? update?].each do |action|
|
||||
permissions(action) do
|
||||
it 'grants access to admins only' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), InternalUser.new)
|
||||
expect(policy).to permit(build(:admin), InternalUser.new)
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), InternalUser.new)
|
||||
expect(policy).not_to permit(build(factory_name), InternalUser.new)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -20,16 +20,16 @@ describe InternalUserPolicy do
|
||||
context 'with an admin user' do
|
||||
it 'grants access to no one' do
|
||||
%i[admin external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), FactoryBot.build(:admin))
|
||||
expect(policy).not_to permit(build(factory_name), build(:admin))
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
context 'with a non-admin user' do
|
||||
it 'grants access to admins only' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), InternalUser.new)
|
||||
expect(policy).to permit(build(:admin), InternalUser.new)
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), FactoryBot.build(:teacher))
|
||||
expect(policy).not_to permit(build(factory_name), build(:teacher))
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -8,7 +8,7 @@ describe SubmissionPolicy do
|
||||
permissions :create? do
|
||||
it 'grants access to anyone' do
|
||||
%i[admin external_user teacher].each do |factory_name|
|
||||
expect(policy).to permit(FactoryBot.build(factory_name), Submission.new)
|
||||
expect(policy).to permit(build(factory_name), Submission.new)
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -16,21 +16,21 @@ describe SubmissionPolicy do
|
||||
%i[download_file? render_file? run? score? show? statistics? stop? test?].each do |action|
|
||||
permissions(action) do
|
||||
it 'grants access to admins' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), Submission.new)
|
||||
expect(policy).to permit(build(:admin), Submission.new)
|
||||
end
|
||||
|
||||
it 'grants access to authors' do
|
||||
user = FactoryBot.create(:external_user)
|
||||
expect(policy).to permit(user, FactoryBot.build(:submission, exercise: Exercise.new, user_id: user.id, user_type: user.class.name))
|
||||
user = create(:external_user)
|
||||
expect(policy).to permit(user, build(:submission, exercise: Exercise.new, user_id: user.id, user_type: user.class.name))
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
permissions :index? do
|
||||
it 'grants access to admins only' do
|
||||
expect(policy).to permit(FactoryBot.build(:admin), Submission.new)
|
||||
expect(policy).to permit(build(:admin), Submission.new)
|
||||
%i[external_user teacher].each do |factory_name|
|
||||
expect(policy).not_to permit(FactoryBot.build(factory_name), Submission.new)
|
||||
expect(policy).not_to permit(build(factory_name), Submission.new)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
Reference in New Issue
Block a user