debian-mirror-gitlab/spec/policies/namespaces/user_namespace_policy_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

131 lines
3.6 KiB
Ruby
Raw Permalink Normal View History

2019-12-26 22:10:19 +05:30
# frozen_string_literal: true
2018-03-17 18:26:18 +05:30
require 'spec_helper'
2023-05-27 22:25:52 +05:30
RSpec.describe Namespaces::UserNamespacePolicy, feature_category: :subgroups do
2022-01-26 12:08:38 +05:30
let_it_be(:user) { create(:user) }
let_it_be(:owner) { create(:user) }
let_it_be(:admin) { create(:admin) }
let_it_be(:namespace) { create(:user_namespace, owner: owner) }
2018-03-17 18:26:18 +05:30
2023-05-27 22:25:52 +05:30
let(:owner_permissions) { [:owner_access, :create_projects, :admin_namespace, :read_namespace, :read_statistics, :transfer_projects, :admin_package, :read_billing, :edit_billing, :import_projects] }
2018-03-17 18:26:18 +05:30
subject { described_class.new(current_user, namespace) }
context 'with no user' do
let(:current_user) { nil }
it { is_expected.to be_banned }
end
context 'regular user' do
let(:current_user) { user }
it { is_expected.to be_disallowed(*owner_permissions) }
end
context 'owner' do
let(:current_user) { owner }
it { is_expected.to be_allowed(*owner_permissions) }
context 'user who has exceeded project limit' do
let(:owner) { create(:user, projects_limit: 0) }
2019-07-07 11:18:12 +05:30
it { is_expected.to be_disallowed(:create_projects) }
2019-10-31 01:37:42 +05:30
it { is_expected.to be_disallowed(:transfer_projects) }
2023-05-27 22:25:52 +05:30
it { is_expected.to be_disallowed(:import_projects) }
2018-03-17 18:26:18 +05:30
end
2023-03-04 22:38:38 +05:30
context 'bot user' do
let(:owner) { create(:user, :project_bot) }
it { is_expected.to be_disallowed(:create_projects) }
it { is_expected.to be_disallowed(:transfer_projects) }
2023-05-27 22:25:52 +05:30
it { is_expected.to be_disallowed(:import_projects) }
2023-03-04 22:38:38 +05:30
end
2018-03-17 18:26:18 +05:30
end
context 'admin' do
let(:current_user) { admin }
2020-05-24 23:13:21 +05:30
context 'when admin mode is enabled', :enable_admin_mode do
it { is_expected.to be_allowed(*owner_permissions) }
end
context 'when admin mode is disabled' do
it { is_expected.to be_disallowed(*owner_permissions) }
end
2018-03-17 18:26:18 +05:30
end
2020-11-24 15:15:51 +05:30
describe 'create_jira_connect_subscription' do
context 'admin' do
let(:current_user) { build_stubbed(:admin) }
context 'when admin mode enabled', :enable_admin_mode do
it { is_expected.to be_allowed(:create_jira_connect_subscription) }
end
context 'when admin mode disabled' do
it { is_expected.to be_disallowed(:create_jira_connect_subscription) }
end
end
context 'owner' do
let(:current_user) { owner }
it { is_expected.to be_allowed(:create_jira_connect_subscription) }
end
context 'other user' do
let(:current_user) { build_stubbed(:user) }
it { is_expected.to be_disallowed(:create_jira_connect_subscription) }
end
end
2022-01-26 12:08:38 +05:30
describe 'create projects' do
using RSpec::Parameterized::TableSyntax
let(:current_user) { owner }
context 'when user can create projects' do
before do
allow(current_user).to receive(:can_create_project?).and_return(true)
end
it { is_expected.to be_allowed(:create_projects) }
end
context 'when user cannot create projects' do
before do
allow(current_user).to receive(:can_create_project?).and_return(false)
end
it { is_expected.to be_disallowed(:create_projects) }
end
end
2023-05-27 22:25:52 +05:30
describe 'import projects' do
context 'when user can import projects' do
let(:current_user) { owner }
before do
allow(current_user).to receive(:can_import_project?).and_return(true)
end
it { is_expected.to be_allowed(:import_projects) }
end
context 'when user cannot create projects' do
let(:current_user) { user }
before do
allow(current_user).to receive(:can_import_project?).and_return(false)
end
it { is_expected.to be_disallowed(:import_projects) }
end
end
2018-03-17 18:26:18 +05:30
end