mirror of
https://github.com/mastodon/mastodon.git
synced 2025-09-05 17:31:12 +00:00

Some checks failed
Bundler Audit / security (push) Waiting to run
Check i18n / check-i18n (push) Waiting to run
CodeQL / Analyze (javascript) (push) Waiting to run
CodeQL / Analyze (ruby) (push) Waiting to run
Check formatting / lint (push) Waiting to run
Haml Linting / lint (push) Waiting to run
Ruby Linting / lint (push) Waiting to run
Historical data migration test / test (14-alpine) (push) Waiting to run
Historical data migration test / test (15-alpine) (push) Waiting to run
Historical data migration test / test (16-alpine) (push) Waiting to run
Historical data migration test / test (17-alpine) (push) Waiting to run
Ruby Testing / build (production) (push) Waiting to run
Ruby Testing / build (test) (push) Waiting to run
Ruby Testing / test (.ruby-version) (push) Blocked by required conditions
Ruby Testing / test (3.2) (push) Blocked by required conditions
Ruby Testing / test (3.3) (push) Blocked by required conditions
Ruby Testing / ImageMagick tests (.ruby-version) (push) Blocked by required conditions
Ruby Testing / ImageMagick tests (3.2) (push) Blocked by required conditions
Ruby Testing / ImageMagick tests (3.3) (push) Blocked by required conditions
Ruby Testing / End to End testing (.ruby-version) (push) Blocked by required conditions
Ruby Testing / End to End testing (3.2) (push) Blocked by required conditions
Ruby Testing / End to End testing (3.3) (push) Blocked by required conditions
Ruby Testing / Elastic Search integration testing (.ruby-version, docker.elastic.co/elasticsearch/elasticsearch:7.17.13) (push) Blocked by required conditions
Ruby Testing / Elastic Search integration testing (.ruby-version, docker.elastic.co/elasticsearch/elasticsearch:8.10.2) (push) Blocked by required conditions
Ruby Testing / Elastic Search integration testing (.ruby-version, opensearchproject/opensearch:2) (push) Blocked by required conditions
Ruby Testing / Elastic Search integration testing (3.2, docker.elastic.co/elasticsearch/elasticsearch:7.17.13) (push) Blocked by required conditions
Ruby Testing / Elastic Search integration testing (3.3, docker.elastic.co/elasticsearch/elasticsearch:7.17.13) (push) Blocked by required conditions
Crowdin / Upload translations / upload-translations (push) Has been cancelled
235 lines
7.2 KiB
Ruby
235 lines
7.2 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'rails_helper'
|
|
|
|
RSpec.describe StatusPolicy, type: :model do
|
|
subject { described_class }
|
|
|
|
let(:admin) { Fabricate(:admin_user) }
|
|
let(:alice) { Fabricate(:account, username: 'alice') }
|
|
let(:bob) { Fabricate(:account, username: 'bob') }
|
|
let(:status) { Fabricate(:status, account: alice) }
|
|
|
|
context 'with the permissions of show? and reblog?' do
|
|
permissions :show?, :reblog? do
|
|
it 'grants access when no viewer' do
|
|
expect(subject).to permit(nil, status)
|
|
end
|
|
|
|
it 'denies access when viewer is blocked' do
|
|
block = Fabricate(:block)
|
|
status.visibility = :private
|
|
status.account = block.target_account
|
|
|
|
expect(subject).to_not permit(block.account, status)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'with the permission of show?' do
|
|
permissions :show? do
|
|
it 'grants access when direct and account is viewer' do
|
|
status.visibility = :direct
|
|
|
|
expect(subject).to permit(status.account, status)
|
|
end
|
|
|
|
it 'grants access when direct and viewer is mentioned' do
|
|
status.visibility = :direct
|
|
status.mentions = [Fabricate(:mention, account: alice)]
|
|
|
|
expect(subject).to permit(alice, status)
|
|
end
|
|
|
|
it 'grants access when direct and non-owner viewer is mentioned and mentions are loaded' do
|
|
status.visibility = :direct
|
|
status.mentions = [Fabricate(:mention, account: bob)]
|
|
status.mentions.load
|
|
|
|
expect(subject).to permit(bob, status)
|
|
end
|
|
|
|
it 'denies access when direct and viewer is not mentioned' do
|
|
viewer = Fabricate(:account)
|
|
status.visibility = :direct
|
|
|
|
expect(subject).to_not permit(viewer, status)
|
|
end
|
|
|
|
it 'grants access when private and account is viewer' do
|
|
status.visibility = :private
|
|
|
|
expect(subject).to permit(status.account, status)
|
|
end
|
|
|
|
it 'grants access when private and account is following viewer' do
|
|
follow = Fabricate(:follow)
|
|
status.visibility = :private
|
|
status.account = follow.target_account
|
|
|
|
expect(subject).to permit(follow.account, status)
|
|
end
|
|
|
|
it 'grants access when private and viewer is mentioned' do
|
|
status.visibility = :private
|
|
status.mentions = [Fabricate(:mention, account: alice)]
|
|
|
|
expect(subject).to permit(alice, status)
|
|
end
|
|
|
|
it 'denies access when private and viewer is not mentioned or followed' do
|
|
viewer = Fabricate(:account)
|
|
status.visibility = :private
|
|
|
|
expect(subject).to_not permit(viewer, status)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'with the permission of quote?' do
|
|
permissions :quote? do
|
|
it 'grants access when direct and account is viewer' do
|
|
status.visibility = :direct
|
|
|
|
expect(subject).to permit(status.account, status)
|
|
end
|
|
|
|
it 'does not grant access access when direct and viewer is mentioned but not explicitly allowed' do
|
|
status.visibility = :direct
|
|
status.mentions = [Fabricate(:mention, account: bob)]
|
|
|
|
expect(subject).to_not permit(bob, status)
|
|
end
|
|
|
|
it 'does not grant access access when direct and viewer is mentioned but not explicitly allowed and mentions are loaded' do
|
|
status.visibility = :direct
|
|
status.mentions = [Fabricate(:mention, account: bob)]
|
|
status.active_mentions.load
|
|
|
|
expect(subject).to_not permit(bob, status)
|
|
end
|
|
|
|
it 'denies access when direct and viewer is not mentioned' do
|
|
viewer = Fabricate(:account)
|
|
status.visibility = :direct
|
|
|
|
expect(subject).to_not permit(viewer, status)
|
|
end
|
|
|
|
it 'denies access when private and viewer is not mentioned' do
|
|
viewer = Fabricate(:account)
|
|
status.visibility = :private
|
|
|
|
expect(subject).to_not permit(viewer, status)
|
|
end
|
|
|
|
it 'grants access when private and viewer is mentioned but not otherwise allowed' do
|
|
status.visibility = :private
|
|
status.mentions = [Fabricate(:mention, account: bob)]
|
|
|
|
expect(subject).to_not permit(bob, status)
|
|
end
|
|
|
|
it 'denies access when private and non-viewer is mentioned' do
|
|
viewer = Fabricate(:account)
|
|
status.visibility = :private
|
|
status.mentions = [Fabricate(:mention, account: bob)]
|
|
|
|
expect(subject).to_not permit(viewer, status)
|
|
end
|
|
|
|
it 'denies access when private and account is following viewer' do
|
|
follow = Fabricate(:follow)
|
|
status.visibility = :private
|
|
status.account = follow.target_account
|
|
|
|
expect(subject).to_not permit(follow.account, status)
|
|
end
|
|
|
|
it 'denies access when public but policy does not allow anyone' do
|
|
viewer = Fabricate(:account)
|
|
expect(subject).to_not permit(viewer, status)
|
|
end
|
|
|
|
it 'grants access when public and policy allows everyone' do
|
|
status.quote_approval_policy = Status::QUOTE_APPROVAL_POLICY_FLAGS[:public]
|
|
viewer = Fabricate(:account)
|
|
expect(subject).to permit(viewer, status)
|
|
end
|
|
|
|
it 'denies access when public and policy allows followers but viewer is not one' do
|
|
status.quote_approval_policy = Status::QUOTE_APPROVAL_POLICY_FLAGS[:followers]
|
|
viewer = Fabricate(:account)
|
|
expect(subject).to_not permit(viewer, status)
|
|
end
|
|
|
|
it 'grants access when public and policy allows followers and viewer is one' do
|
|
status.quote_approval_policy = Status::QUOTE_APPROVAL_POLICY_FLAGS[:followers]
|
|
viewer = Fabricate(:account)
|
|
viewer.follow!(status.account)
|
|
expect(subject).to permit(viewer, status)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'with the permission of reblog?' do
|
|
permissions :reblog? do
|
|
it 'denies access when private' do
|
|
viewer = Fabricate(:account)
|
|
status.visibility = :private
|
|
|
|
expect(subject).to_not permit(viewer, status)
|
|
end
|
|
|
|
it 'denies access when direct' do
|
|
viewer = Fabricate(:account)
|
|
status.visibility = :direct
|
|
|
|
expect(subject).to_not permit(viewer, status)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'with the permissions of destroy? and unreblog?' do
|
|
permissions :destroy?, :unreblog? do
|
|
it 'grants access when account is deleter' do
|
|
expect(subject).to permit(status.account, status)
|
|
end
|
|
|
|
it 'denies access when account is not deleter' do
|
|
expect(subject).to_not permit(bob, status)
|
|
end
|
|
|
|
it 'denies access when no deleter' do
|
|
expect(subject).to_not permit(nil, status)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'with the permission of favourite?' do
|
|
permissions :favourite? do
|
|
it 'grants access when viewer is not blocked' do
|
|
follow = Fabricate(:follow)
|
|
status.account = follow.target_account
|
|
|
|
expect(subject).to permit(follow.account, status)
|
|
end
|
|
|
|
it 'denies when viewer is blocked' do
|
|
block = Fabricate(:block)
|
|
status.account = block.target_account
|
|
|
|
expect(subject).to_not permit(block.account, status)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'with the permission of update?' do
|
|
permissions :update? do
|
|
it 'grants access if owner' do
|
|
expect(subject).to permit(status.account, status)
|
|
end
|
|
end
|
|
end
|
|
end
|