Skip to content
Snippets Groups Projects
Unverified Commit ce4b70ce authored by Rémy Coutable's avatar Rémy Coutable
Browse files

Factorize policy helpers into PolicyHelpers


Signed-off-by: default avatarRémy Coutable <remy@rymai.me>
parent 1983d05c
No related branches found
No related tags found
No related merge requests found
Loading
Loading
@@ -17,14 +17,6 @@ describe BoardPolicy do
]
end
 
def expect_allowed(*permissions)
permissions.each { |p| is_expected.to be_allowed(p) }
end
def expect_disallowed(*permissions)
permissions.each { |p| is_expected.not_to be_allowed(p) }
end
context 'group board' do
subject { described_class.new(user, group_board) }
 
Loading
Loading
Loading
Loading
@@ -51,14 +51,6 @@ describe GroupPolicy do
 
subject { described_class.new(current_user, group) }
 
def expect_allowed(*permissions)
permissions.each { |p| is_expected.to be_allowed(p) }
end
def expect_disallowed(*permissions)
permissions.each { |p| is_expected.not_to be_allowed(p) }
end
context 'with no user' do
let(:group) { create(:group, :public) }
let(:current_user) { nil }
Loading
Loading
Loading
Loading
@@ -15,14 +15,6 @@ describe ProjectSnippetPolicy do
 
subject { described_class.new(current_user, snippet) }
 
def expect_allowed(*permissions)
permissions.each { |p| is_expected.to be_allowed(p) }
end
def expect_disallowed(*permissions)
permissions.each { |p| is_expected.not_to be_allowed(p) }
end
context 'public snippet' do
let(:snippet_visibility) { :public }
 
Loading
Loading
Loading
Loading
@@ -96,6 +96,7 @@ RSpec.configure do |config|
config.include MigrationsHelpers, :migration
config.include RedisHelpers
config.include Rails.application.routes.url_helpers, type: :routing
config.include PolicyHelpers, type: :policy
 
if ENV['CI']
# This includes the first try, i.e. tests will be run 4 times before failing.
Loading
Loading
# frozen_string_literal: true
module PolicyHelpers
def expect_allowed(*permissions)
permissions.each { |p| is_expected.to be_allowed(p) }
end
def expect_disallowed(*permissions)
permissions.each { |p| is_expected.not_to be_allowed(p) }
end
end
Loading
Loading
@@ -85,12 +85,4 @@ RSpec.shared_context 'ProjectPolicy context' do
project.add_developer(developer)
project.add_reporter(reporter)
end
def expect_allowed(*permissions)
permissions.each { |p| is_expected.to be_allowed(p) }
end
def expect_disallowed(*permissions)
permissions.each { |p| is_expected.not_to be_allowed(p) }
end
end
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment