branchAccess.test.js 1.3 KB

12345678910111213141516171819202122232425262728293031323334
  1. /* @vitest-environment node */
  2. import { describe, it, expect } from "vitest";
  3. import { getBranchAccess, BRANCH_ACCESS } from "./branchAccess.js";
  4. describe("lib/frontend/rbac/branchAccess", () => {
  5. it("allows branch users only for their own branch", () => {
  6. const user = { userId: "u1", role: "branch", branchId: "NL01" };
  7. expect(getBranchAccess(user, "NL01")).toBe(BRANCH_ACCESS.ALLOWED);
  8. expect(getBranchAccess(user, "NL02")).toBe(BRANCH_ACCESS.FORBIDDEN);
  9. });
  10. it("allows admin/dev users for any branch", () => {
  11. const admin = { userId: "u2", role: "admin", branchId: null };
  12. const dev = { userId: "u3", role: "dev", branchId: null };
  13. expect(getBranchAccess(admin, "NL01")).toBe(BRANCH_ACCESS.ALLOWED);
  14. expect(getBranchAccess(admin, "NL99")).toBe(BRANCH_ACCESS.ALLOWED);
  15. expect(getBranchAccess(dev, "NL01")).toBe(BRANCH_ACCESS.ALLOWED);
  16. expect(getBranchAccess(dev, "NL99")).toBe(BRANCH_ACCESS.ALLOWED);
  17. });
  18. it("denies unknown roles and missing data", () => {
  19. expect(getBranchAccess(null, "NL01")).toBe(BRANCH_ACCESS.FORBIDDEN);
  20. const weird = { userId: "u9", role: "user", branchId: "NL01" };
  21. expect(getBranchAccess(weird, "NL01")).toBe(BRANCH_ACCESS.FORBIDDEN);
  22. const branchNoId = { userId: "u1", role: "branch", branchId: null };
  23. expect(getBranchAccess(branchNoId, "NL01")).toBe(BRANCH_ACCESS.FORBIDDEN);
  24. });
  25. });