|
54 | 54 |
|
55 | 55 | %i[export_external_check? export_external_confirm?].each do |action| |
56 | 56 | permissions(action) do |
57 | | - context 'when user is author' do |
58 | | - let(:user) { exercise.author } |
59 | | - |
60 | | - it 'does not grant access' do |
61 | | - expect(policy).not_to permit(user, exercise) |
| 57 | + context 'when CodeHarbor is disabled' do |
| 58 | + before do |
| 59 | + stub_const('CodeharborLinkPolicy::CODEHARBOR_CONFIG', {enabled: false}) |
62 | 60 | end |
63 | 61 |
|
64 | | - context 'when user has codeharbor_link' do |
65 | | - before { user.codeharbor_link = build(:codeharbor_link) } |
| 62 | + %i[external_user teacher admin].each do |factory_name| |
| 63 | + context "when user is #{factory_name}" do |
| 64 | + let(:user) { create(factory_name) } |
66 | 65 |
|
67 | | - it 'grants access' do |
68 | | - expect(policy).to permit(user, exercise) |
| 66 | + it 'does not grant access' do |
| 67 | + expect(policy).not_to permit(user, exercise) |
| 68 | + end |
| 69 | + |
| 70 | + context 'when user has codeharbor_link' do |
| 71 | + before { user.codeharbor_link = build(:codeharbor_link) } |
| 72 | + |
| 73 | + it 'does not grant access' do |
| 74 | + expect(policy).not_to permit(user, exercise) |
| 75 | + end |
| 76 | + end |
69 | 77 | end |
70 | 78 | end |
71 | 79 | end |
72 | 80 |
|
73 | | - context 'when user is admin' do |
74 | | - let(:user) { build(:admin) } |
75 | | - |
76 | | - it 'does not grant access' do |
77 | | - expect(policy).not_to permit(user, exercise) |
| 81 | + context 'when CodeHarbor is enabled' do |
| 82 | + before do |
| 83 | + stub_const('CodeharborLinkPolicy::CODEHARBOR_CONFIG', {enabled: true}) |
78 | 84 | end |
79 | 85 |
|
80 | | - context 'when user has codeharbor_link' do |
81 | | - before { user.codeharbor_link = build(:codeharbor_link) } |
| 86 | + context 'when user is author' do |
| 87 | + let(:user) { exercise.author } |
| 88 | + |
| 89 | + it 'does not grant access' do |
| 90 | + expect(policy).not_to permit(user, exercise) |
| 91 | + end |
| 92 | + |
| 93 | + context 'when user has codeharbor_link' do |
| 94 | + before { user.codeharbor_link = build(:codeharbor_link) } |
82 | 95 |
|
83 | | - it 'grants access' do |
84 | | - expect(policy).to permit(user, exercise) |
| 96 | + it 'grants access' do |
| 97 | + expect(policy).to permit(user, exercise) |
| 98 | + end |
85 | 99 | end |
86 | 100 | end |
87 | | - end |
88 | 101 |
|
89 | | - %i[external_user teacher].each do |factory_name| |
90 | | - context "when user is #{factory_name}" do |
91 | | - let(:user) { create(factory_name) } |
| 102 | + context 'when user is admin' do |
| 103 | + let(:user) { build(:admin) } |
92 | 104 |
|
93 | 105 | it 'does not grant access' do |
94 | 106 | expect(policy).not_to permit(user, exercise) |
|
97 | 109 | context 'when user has codeharbor_link' do |
98 | 110 | before { user.codeharbor_link = build(:codeharbor_link) } |
99 | 111 |
|
| 112 | + it 'grants access' do |
| 113 | + expect(policy).to permit(user, exercise) |
| 114 | + end |
| 115 | + end |
| 116 | + end |
| 117 | + |
| 118 | + %i[external_user teacher].each do |factory_name| |
| 119 | + context "when user is #{factory_name}" do |
| 120 | + let(:user) { create(factory_name) } |
| 121 | + |
100 | 122 | it 'does not grant access' do |
101 | 123 | expect(policy).not_to permit(user, exercise) |
102 | 124 | end |
| 125 | + |
| 126 | + context 'when user has codeharbor_link' do |
| 127 | + before { user.codeharbor_link = build(:codeharbor_link) } |
| 128 | + |
| 129 | + it 'does not grant access' do |
| 130 | + expect(policy).not_to permit(user, exercise) |
| 131 | + end |
| 132 | + end |
103 | 133 | end |
104 | 134 | end |
105 | 135 | end |
|
0 commit comments