base_editing_bootstrap 1.3.0 → 1.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 83d2f87db81cd1d75dc4da9b979b5ff497c90f098b9081536e066d3aa86836e1
4
- data.tar.gz: b84fd68fe596b603d0a0f356e1e532e8b2f24c7a0b9f78712fd412e449c75663
3
+ metadata.gz: 5a6226c6077cf2467b75341e9a1a8cdd8829e06faac291de10cf2e6f3686a4bc
4
+ data.tar.gz: 82eaf0b64cf498b708aea0eadd96c674a6c06b2ecf3b2d38d4450dfd249e6e3d
5
5
  SHA512:
6
- metadata.gz: 9592453e9d94965266b86a5704dc658e00236393d734d8c31eb10ec620fda2cc35de1f283268bed03a8937f7a842298d02a4da0442730e1c750df27e6b135b8a
7
- data.tar.gz: 9e3677d9c11a2b5bcf60e173a864325ee6fdce0c746261c1aeab05a0ecfaacfbbd54150ccb2d24d763e24b32d3d2944724dce2566e1c2a058e97e8e9baf12ace
6
+ metadata.gz: 442b7a0c1a90eefcb4fe707fb10559dfbce75a1595a6eaed04d35529e324d57635c2b9d07d991f7ed7820404d483d5bf82dedf1883b6e048ac878e5ecb1e0590
7
+ data.tar.gz: 528f5e47faeaba5312d6aa8620de661c1503cd86fe7b52a7cb6b30bbca944078df7e7d50c65ef2d64754f1561e488aa808a05104731097c0f84a84ead9d94db2
data/CHANGELOG.md CHANGED
@@ -2,6 +2,12 @@
2
2
  All notable changes to this project will be documented in this file. See [conventional commits](https://www.conventionalcommits.org/) for commit guidelines.
3
3
 
4
4
  - - -
5
+ ## 1.3.1 - 2025-01-10
6
+ #### Bug Fixes
7
+ - Better spec helpers - (0d16364) - Marino Bonetti
8
+
9
+ - - -
10
+
5
11
  ## 1.3.0 - 2025-01-09
6
12
  #### Documentation
7
13
  - Aggiunta documentazione per override search field - (ba97155) - Marino Bonetti
@@ -1 +1 @@
1
- 1.3.0
1
+ 1.3.1
@@ -1,6 +1,15 @@
1
1
  require 'rails_helper'
2
2
  RSpec.describe <%= class_name %>, type: :model do
3
3
  it_behaves_like "a base model",
4
- ransack_permitted_attributes: %w[<%= attributes_names.join(" ") %>],
5
- ransack_permitted_associations: []
4
+ ransack_permitted_attributes: %w[<%= attributes_names.join(" ") %>]
5
+
6
+ # it_behaves_like "a base model",
7
+ # ransack_permitted_attributes: %w[<%= attributes_names.join(" ") %>],
8
+ # ransack_permitted_associations: [] do
9
+ # let(:auth_object) { :auth_object } <- default
10
+ # let(:auth_object) { create(:user, :as_admin) } <- in caso di necessità di override
11
+ # let(:new_user_ransack_permitted_attributes) { ransack_permitted_attributes }
12
+ # let(:new_user_ransack_permitted_associations) { ransack_permitted_associations }
13
+ # end
14
+
6
15
  end
@@ -6,48 +6,39 @@ RSpec.shared_examples "a base model" do |ransack_permitted_attributes: [], ransa
6
6
  expect(described_class).to respond_to(:human_action_message)
7
7
  end
8
8
 
9
+ ##
10
+ # Oggetto solitamente di classe User che identifichi l'utente a cui eseguire il check dei permessi
11
+ let(:auth_object) { :auth_object }
12
+ let(:new_user_ransack_permitted_attributes) { ransack_permitted_attributes }
13
+ let(:new_user_ransack_permitted_associations) { ransack_permitted_associations }
14
+
9
15
  describe "with ransackables" do
10
- where(:base_model_method, :policy_method, :policy_output, :result) do
16
+ where(:base_model_method, :result, :new_user_result) do
11
17
  [
12
18
  [
13
- :ransackable_attributes, :permitted_attributes_for_ransack, ransack_permitted_attributes.map(&:to_s), ransack_permitted_attributes.map(&:to_s)
14
- ],
15
- [
16
- :ransackable_attributes, :permitted_attributes_for_ransack, ransack_permitted_attributes.map(&:to_sym), ransack_permitted_attributes.map(&:to_s)
19
+ :ransackable_attributes, ransack_permitted_attributes.map(&:to_s), lazy { new_user_ransack_permitted_attributes.map(&:to_s) }
17
20
  ],
18
21
  [
19
- :ransackable_associations, :permitted_associations_for_ransack,ransack_permitted_associations.map(&:to_s), ransack_permitted_associations.map(&:to_s)
22
+ :ransackable_associations, ransack_permitted_associations.map(&:to_s), lazy { new_user_ransack_permitted_associations.map(&:to_s) }
20
23
  ],
21
- [
22
- :ransackable_associations, :permitted_associations_for_ransack, ransack_permitted_associations.map(&:to_sym), ransack_permitted_associations.map(&:to_s)
23
- ]
24
24
  ]
25
25
  end
26
26
 
27
27
  with_them do
28
- subject { described_class.send(base_model_method, auth_object) }
28
+ subject { described_class.send(base_model_method, inner_auth_object) }
29
29
 
30
- let(:simulated_user_instance) { instance_double("User") }
31
- # before do
32
- # allow(User).to receive(:new).and_return(simulated_user_instance)
33
- # end
34
- let(:auth_object) { nil }
35
- let(:policy) {
36
- instance_double("BaseModelPolicy", policy_method => policy_output)
37
- }
30
+ let(:inner_auth_object) { nil }
38
31
  it "new user" do
39
32
  expect(Pundit).to receive(:policy).with(an_instance_of(User),
40
33
  an_instance_of(described_class)).and_call_original
41
- #.and_return(policy)
42
34
 
43
- is_expected.to match_array(result)
35
+ is_expected.to match_array(new_user_result)
44
36
  end
45
37
 
46
38
  context "with auth_object" do
47
- let(:auth_object) { :auth_object }
39
+ let(:inner_auth_object) { auth_object }
48
40
  it do
49
- expect(Pundit).to receive(:policy).with(auth_object, an_instance_of(described_class)).and_call_original
50
- # .and_return(policy)
41
+ expect(Pundit).to receive(:policy).with(inner_auth_object, an_instance_of(described_class)).and_call_original
51
42
 
52
43
  is_expected.to match_array(result)
53
44
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: base_editing_bootstrap
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.3.0
4
+ version: 1.3.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Marino Bonetti
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2025-01-09 00:00:00.000000000 Z
11
+ date: 2025-01-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: rails