Initial commit: Add logistics and order_detail message types
Some checks failed
Lock Threads / action (push) Has been cancelled
Mark stale issues and pull requests / stale (push) Has been cancelled
Publish Chatwoot EE docker images / build (linux/amd64, ubuntu-latest) (push) Has been cancelled
Publish Chatwoot EE docker images / build (linux/arm64, ubuntu-22.04-arm) (push) Has been cancelled
Publish Chatwoot EE docker images / merge (push) Has been cancelled
Publish Chatwoot CE docker images / build (linux/amd64, ubuntu-latest) (push) Has been cancelled
Publish Chatwoot CE docker images / build (linux/arm64, ubuntu-22.04-arm) (push) Has been cancelled
Publish Chatwoot CE docker images / merge (push) Has been cancelled
Run Chatwoot CE spec / lint-backend (push) Has been cancelled
Run Chatwoot CE spec / lint-frontend (push) Has been cancelled
Run Chatwoot CE spec / frontend-tests (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (0, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (1, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (10, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (11, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (12, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (13, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (14, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (15, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (2, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (3, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (4, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (5, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (6, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (7, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (8, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (9, 16) (push) Has been cancelled
Run Linux nightly installer / nightly (push) Has been cancelled
Some checks failed
Lock Threads / action (push) Has been cancelled
Mark stale issues and pull requests / stale (push) Has been cancelled
Publish Chatwoot EE docker images / build (linux/amd64, ubuntu-latest) (push) Has been cancelled
Publish Chatwoot EE docker images / build (linux/arm64, ubuntu-22.04-arm) (push) Has been cancelled
Publish Chatwoot EE docker images / merge (push) Has been cancelled
Publish Chatwoot CE docker images / build (linux/amd64, ubuntu-latest) (push) Has been cancelled
Publish Chatwoot CE docker images / build (linux/arm64, ubuntu-22.04-arm) (push) Has been cancelled
Publish Chatwoot CE docker images / merge (push) Has been cancelled
Run Chatwoot CE spec / lint-backend (push) Has been cancelled
Run Chatwoot CE spec / lint-frontend (push) Has been cancelled
Run Chatwoot CE spec / frontend-tests (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (0, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (1, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (10, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (11, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (12, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (13, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (14, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (15, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (2, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (3, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (4, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (5, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (6, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (7, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (8, 16) (push) Has been cancelled
Run Chatwoot CE spec / backend-tests (9, 16) (push) Has been cancelled
Run Linux nightly installer / nightly (push) Has been cancelled
- Add Logistics component with progress tracking - Add OrderDetail component for order information - Support data-driven steps and actions - Add blue color scale to widget SCSS - Fix node overflow and progress bar rendering issues - Add English translations for dashboard components Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
34
spec/policies/article_policy_spec.rb
Normal file
34
spec/policies/article_policy_spec.rb
Normal file
@@ -0,0 +1,34 @@
|
||||
require 'rails_helper'
|
||||
|
||||
RSpec.describe ArticlePolicy, type: :policy do
|
||||
subject(:article_policy) { described_class }
|
||||
|
||||
let(:account) { create(:account) }
|
||||
let(:administrator) { create(:user, :administrator, account: account) }
|
||||
let(:agent) { create(:user, account: account) }
|
||||
let(:portal) { create(:portal, account: account) }
|
||||
let(:article) { create(:article, account: account, portal: portal, author: administrator) }
|
||||
|
||||
let(:administrator_context) { { user: administrator, account: account, account_user: account.account_users.first } }
|
||||
let(:agent_context) { { user: agent, account: account, account_user: account.account_users.first } }
|
||||
|
||||
permissions :index? do
|
||||
context 'when administrator' do
|
||||
it { expect(article_policy).to permit(administrator_context, article) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(article_policy).to permit(agent_context, article) }
|
||||
end
|
||||
end
|
||||
|
||||
permissions :update?, :show?, :edit?, :create?, :destroy?, :reorder? do
|
||||
context 'when administrator' do
|
||||
it { expect(article_policy).to permit(administrator_context, article) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(article_policy).not_to permit(agent_context, article) }
|
||||
end
|
||||
end
|
||||
end
|
||||
34
spec/policies/category_policy_spec.rb
Normal file
34
spec/policies/category_policy_spec.rb
Normal file
@@ -0,0 +1,34 @@
|
||||
require 'rails_helper'
|
||||
|
||||
RSpec.describe CategoryPolicy, type: :policy do
|
||||
subject(:category_policy) { described_class }
|
||||
|
||||
let(:account) { create(:account) }
|
||||
let(:administrator) { create(:user, :administrator, account: account) }
|
||||
let(:agent) { create(:user, account: account) }
|
||||
let(:portal) { create(:portal, account: account) }
|
||||
let(:category) { create(:category, account: account, portal: portal, slug: 'test-category') }
|
||||
|
||||
let(:administrator_context) { { user: administrator, account: account, account_user: account.account_users.first } }
|
||||
let(:agent_context) { { user: agent, account: account, account_user: account.account_users.first } }
|
||||
|
||||
permissions :index? do
|
||||
context 'when administrator' do
|
||||
it { expect(category_policy).to permit(administrator_context, category) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(category_policy).to permit(agent_context, category) }
|
||||
end
|
||||
end
|
||||
|
||||
permissions :update?, :show?, :edit?, :create?, :destroy? do
|
||||
context 'when administrator' do
|
||||
it { expect(category_policy).to permit(administrator_context, category) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(category_policy).not_to permit(agent_context, category) }
|
||||
end
|
||||
end
|
||||
end
|
||||
36
spec/policies/contact_policy_spec.rb
Normal file
36
spec/policies/contact_policy_spec.rb
Normal file
@@ -0,0 +1,36 @@
|
||||
# frozen_string_literal: true
|
||||
|
||||
require 'rails_helper'
|
||||
|
||||
RSpec.describe ContactPolicy, type: :policy do
|
||||
subject(:contact_policy) { described_class }
|
||||
|
||||
let(:account) { create(:account) }
|
||||
|
||||
let(:administrator) { create(:user, :administrator, account: account) }
|
||||
let(:agent) { create(:user, account: account) }
|
||||
let(:contact) { create(:contact) }
|
||||
|
||||
let(:administrator_context) { { user: administrator, account: account, account_user: account.account_users.first } }
|
||||
let(:agent_context) { { user: agent, account: account, account_user: account.account_users.first } }
|
||||
|
||||
permissions :index?, :show?, :update? do
|
||||
context 'when administrator' do
|
||||
it { expect(contact_policy).to permit(administrator_context, contact) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(contact_policy).to permit(agent_context, contact) }
|
||||
end
|
||||
end
|
||||
|
||||
permissions :create? do
|
||||
context 'when administrator' do
|
||||
it { expect(contact_policy).to permit(administrator_context, contact) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(contact_policy).to permit(agent_context, contact) }
|
||||
end
|
||||
end
|
||||
end
|
||||
73
spec/policies/conversation_policy_spec.rb
Normal file
73
spec/policies/conversation_policy_spec.rb
Normal file
@@ -0,0 +1,73 @@
|
||||
require 'rails_helper'
|
||||
|
||||
RSpec.describe ConversationPolicy, type: :policy do
|
||||
subject { described_class }
|
||||
|
||||
let(:account) { create(:account) }
|
||||
let(:administrator) { create(:user, account: account, role: :administrator) }
|
||||
let(:agent) { create(:user, account: account, role: :agent) }
|
||||
let(:administrator_context) { { user: administrator, account: account, account_user: administrator.account_users.find_by(account: account) } }
|
||||
let(:agent_context) { { user: agent, account: account, account_user: agent.account_users.find_by(account: account) } }
|
||||
|
||||
let(:conversation) { create(:conversation, account: account) }
|
||||
|
||||
permissions :destroy? do
|
||||
context 'when user is an administrator' do
|
||||
it 'allows destroy' do
|
||||
expect(subject).to permit(administrator_context, conversation)
|
||||
end
|
||||
end
|
||||
|
||||
context 'when user is an agent' do
|
||||
it 'denies destroy' do
|
||||
expect(subject).not_to permit(agent_context, conversation)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
permissions :index? do
|
||||
context 'when user is authenticated' do
|
||||
it 'allows index' do
|
||||
expect(subject).to permit(agent_context, conversation)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
permissions :show? do
|
||||
context 'when user is an administrator' do
|
||||
it 'allows access' do
|
||||
expect(subject).to permit(administrator_context, conversation)
|
||||
end
|
||||
end
|
||||
|
||||
context 'when agent has inbox access' do
|
||||
let(:inbox) { create(:inbox, account: account) }
|
||||
let(:conversation) { create(:conversation, account: account, inbox: inbox) }
|
||||
|
||||
before { create(:inbox_member, user: agent, inbox: inbox) }
|
||||
|
||||
it 'allows access' do
|
||||
expect(subject).to permit(agent_context, conversation)
|
||||
end
|
||||
end
|
||||
|
||||
context 'when agent has team access' do
|
||||
let(:team) { create(:team, account: account) }
|
||||
let(:conversation) { create(:conversation, :with_team, account: account, team: team) }
|
||||
|
||||
before { create(:team_member, team: team, user: agent) }
|
||||
|
||||
it 'allows access' do
|
||||
expect(subject).to permit(agent_context, conversation)
|
||||
end
|
||||
end
|
||||
|
||||
context 'when agent lacks inbox and team access' do
|
||||
let(:conversation) { create(:conversation, account: account) }
|
||||
|
||||
it 'denies access' do
|
||||
expect(subject).not_to permit(agent_context, conversation)
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
25
spec/policies/csat_survey_response_policy_spec.rb
Normal file
25
spec/policies/csat_survey_response_policy_spec.rb
Normal file
@@ -0,0 +1,25 @@
|
||||
# frozen_string_literal: true
|
||||
|
||||
require 'rails_helper'
|
||||
|
||||
RSpec.describe CsatSurveyResponsePolicy, type: :policy do
|
||||
subject(:csat_policy) { described_class }
|
||||
|
||||
let(:account) { create(:account) }
|
||||
let(:administrator) { create(:user, :administrator, account: account) }
|
||||
let(:agent) { create(:user, account: account) }
|
||||
let(:csat_survey_response) { create(:csat_survey_response, account: account) }
|
||||
|
||||
let(:administrator_context) { { user: administrator, account: account, account_user: account.account_users.first } }
|
||||
let(:agent_context) { { user: agent, account: account, account_user: account.account_users.last } }
|
||||
|
||||
permissions :index?, :metrics?, :download? do
|
||||
context 'when administrator' do
|
||||
it { expect(csat_policy).to permit(administrator_context, csat_survey_response) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(csat_policy).not_to permit(agent_context, csat_survey_response) }
|
||||
end
|
||||
end
|
||||
end
|
||||
35
spec/policies/inbox_policy_spec.rb
Normal file
35
spec/policies/inbox_policy_spec.rb
Normal file
@@ -0,0 +1,35 @@
|
||||
# frozen_string_literal: true
|
||||
|
||||
require 'rails_helper'
|
||||
|
||||
RSpec.describe InboxPolicy, type: :policy do
|
||||
subject(:inbox_policy) { described_class }
|
||||
|
||||
let(:account) { create(:account) }
|
||||
|
||||
let(:administrator) { create(:user, :administrator, account: account) }
|
||||
let(:agent) { create(:user, account: account) }
|
||||
let(:inbox) { create(:inbox) }
|
||||
let(:administrator_context) { { user: administrator, account: account, account_user: account.account_users.first } }
|
||||
let(:agent_context) { { user: agent, account: account, account_user: account.account_users.first } }
|
||||
|
||||
permissions :create?, :destroy?, :update?, :set_agent_bot? do
|
||||
context 'when administrator' do
|
||||
it { expect(inbox_policy).to permit(administrator_context, inbox) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(inbox_policy).not_to permit(agent_context, inbox) }
|
||||
end
|
||||
end
|
||||
|
||||
permissions :index? do
|
||||
context 'when administrator' do
|
||||
it { expect(inbox_policy).to permit(administrator_context, inbox) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(inbox_policy).to permit(agent_context, inbox) }
|
||||
end
|
||||
end
|
||||
end
|
||||
35
spec/policies/portal_policy_spec.rb
Normal file
35
spec/policies/portal_policy_spec.rb
Normal file
@@ -0,0 +1,35 @@
|
||||
# frozen_string_literal: true
|
||||
|
||||
require 'rails_helper'
|
||||
|
||||
RSpec.describe PortalPolicy, type: :policy do
|
||||
subject(:portal_policy) { described_class }
|
||||
|
||||
let(:account) { create(:account) }
|
||||
let(:administrator) { create(:user, :administrator, account: account) }
|
||||
let(:agent) { create(:user, account: account) }
|
||||
let(:portal) { create(:portal, account: account) }
|
||||
|
||||
let(:administrator_context) { { user: administrator, account: account, account_user: account.account_users.first } }
|
||||
let(:agent_context) { { user: agent, account: account, account_user: account.account_users.first } }
|
||||
|
||||
permissions :index?, :show? do
|
||||
context 'when administrator' do
|
||||
it { expect(portal_policy).to permit(administrator_context, portal) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(portal_policy).to permit(agent_context, portal) }
|
||||
end
|
||||
end
|
||||
|
||||
permissions :update?, :edit?, :create?, :destroy?, :logo? do
|
||||
context 'when administrator' do
|
||||
it { expect(portal_policy).to permit(administrator_context, portal) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(portal_policy).not_to permit(agent_context, portal) }
|
||||
end
|
||||
end
|
||||
end
|
||||
25
spec/policies/report_policy_spec.rb
Normal file
25
spec/policies/report_policy_spec.rb
Normal file
@@ -0,0 +1,25 @@
|
||||
# frozen_string_literal: true
|
||||
|
||||
require 'rails_helper'
|
||||
|
||||
RSpec.describe ReportPolicy, type: :policy do
|
||||
subject(:report_policy) { described_class }
|
||||
|
||||
let(:account) { create(:account) }
|
||||
let(:administrator) { create(:user, :administrator, account: account) }
|
||||
let(:agent) { create(:user, account: account) }
|
||||
let(:report) { :report }
|
||||
|
||||
let(:administrator_context) { { user: administrator, account: account, account_user: account.account_users.first } }
|
||||
let(:agent_context) { { user: agent, account: account, account_user: account.account_users.first } }
|
||||
|
||||
permissions :view? do
|
||||
context 'when administrator' do
|
||||
it { expect(report_policy).to permit(administrator_context, report) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(report_policy).not_to permit(agent_context, report) }
|
||||
end
|
||||
end
|
||||
end
|
||||
35
spec/policies/user_policy_spec.rb
Normal file
35
spec/policies/user_policy_spec.rb
Normal file
@@ -0,0 +1,35 @@
|
||||
# frozen_string_literal: true
|
||||
|
||||
require 'rails_helper'
|
||||
|
||||
RSpec.describe UserPolicy, type: :policy do
|
||||
subject(:user_policy) { described_class }
|
||||
|
||||
let(:account) { create(:account) }
|
||||
|
||||
let(:administrator) { create(:user, :administrator, account: account) }
|
||||
let(:agent) { create(:user, account: account) }
|
||||
let(:user) { create(:user, account: account) }
|
||||
let(:administrator_context) { { user: administrator, account: account, account_user: account.account_users.first } }
|
||||
let(:agent_context) { { user: agent, account: account, account_user: account.account_users.first } }
|
||||
|
||||
permissions :create?, :update?, :destroy? do
|
||||
context 'when administrator' do
|
||||
it { expect(user_policy).to permit(administrator_context, user) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(user_policy).not_to permit(agent_context, user) }
|
||||
end
|
||||
end
|
||||
|
||||
permissions :index? do
|
||||
context 'when administrator' do
|
||||
it { expect(user_policy).to permit(administrator_context, user) }
|
||||
end
|
||||
|
||||
context 'when agent' do
|
||||
it { expect(user_policy).to permit(agent_context, user) }
|
||||
end
|
||||
end
|
||||
end
|
||||
Reference in New Issue
Block a user