debian-mirror-gitlab/spec/policies/group_policy_spec.rb

429 lines
12 KiB
Ruby
Raw Normal View History

2017-08-17 22:00:37 +05:30
require 'spec_helper'
2017-09-10 17:25:29 +05:30
describe GroupPolicy do
2019-05-30 16:15:17 +05:30
let(:guest) { create(:user) }
let(:reporter) { create(:user) }
let(:developer) { create(:user) }
let(:maintainer) { create(:user) }
let(:owner) { create(:user) }
let(:admin) { create(:admin) }
let(:group) { create(:group, :private) }
let(:guest_permissions) do
[:read_label, :read_group, :upload_file, :read_namespace, :read_group_activity,
:read_group_issues, :read_group_boards, :read_group_labels, :read_group_milestones,
:read_group_merge_requests]
end
let(:reporter_permissions) { [:admin_label] }
let(:developer_permissions) { [:admin_milestone] }
let(:maintainer_permissions) do
[
:create_projects,
:read_cluster,
:create_cluster,
:update_cluster,
:admin_cluster,
:add_cluster
]
end
let(:owner_permissions) do
[
:admin_group,
:admin_namespace,
:admin_group_member,
:change_visibility_level,
:set_note_created_at,
(Gitlab::Database.postgresql? ? :create_subgroup : nil)
].compact
end
before do
group.add_guest(guest)
group.add_reporter(reporter)
group.add_developer(developer)
group.add_maintainer(maintainer)
group.add_owner(owner)
end
subject { described_class.new(current_user, group) }
def expect_allowed(*permissions)
permissions.each { |p| is_expected.to be_allowed(p) }
end
def expect_disallowed(*permissions)
permissions.each { |p| is_expected.not_to be_allowed(p) }
end
2017-08-17 22:00:37 +05:30
context 'with no user' do
2018-05-09 12:01:36 +05:30
let(:group) { create(:group, :public) }
2017-08-17 22:00:37 +05:30
let(:current_user) { nil }
it do
2017-09-10 17:25:29 +05:30
expect_allowed(:read_group)
2018-03-17 18:26:18 +05:30
expect_disallowed(:upload_file)
2017-09-10 17:25:29 +05:30
expect_disallowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_disallowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_disallowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*owner_permissions)
2018-03-17 18:26:18 +05:30
expect_disallowed(:read_namespace)
2017-08-17 22:00:37 +05:30
end
end
2019-03-13 22:55:13 +05:30
context 'with no user and public project' do
let(:project) { create(:project, :public) }
2019-05-30 16:15:17 +05:30
let(:user) { create(:user) }
2019-03-13 22:55:13 +05:30
let(:current_user) { nil }
before do
2019-05-30 16:15:17 +05:30
Projects::GroupLinks::CreateService.new(
project,
user,
link_group_access: ProjectGroupLink::DEVELOPER
).execute(group)
2019-03-13 22:55:13 +05:30
end
it { expect_disallowed(:read_group) }
end
context 'with foreign user and public project' do
let(:project) { create(:project, :public) }
let(:user) { create(:user) }
let(:current_user) { create(:user) }
before do
2019-05-30 16:15:17 +05:30
Projects::GroupLinks::CreateService.new(
project,
user,
link_group_access: ProjectGroupLink::DEVELOPER
).execute(group)
2019-03-13 22:55:13 +05:30
end
it { expect_disallowed(:read_group) }
end
2018-05-09 12:01:36 +05:30
context 'has projects' do
let(:current_user) { create(:user) }
let(:project) { create(:project, namespace: group) }
before do
project.add_developer(current_user)
end
2019-05-30 16:15:17 +05:30
it do
expect_allowed(:read_list, :read_label)
end
2018-05-09 12:01:36 +05:30
context 'in subgroups', :nested_groups do
let(:subgroup) { create(:group, :private, parent: group) }
let(:project) { create(:project, namespace: subgroup) }
2019-05-30 16:15:17 +05:30
it do
expect_allowed(:read_list, :read_label)
end
2018-05-09 12:01:36 +05:30
end
end
2017-08-17 22:00:37 +05:30
context 'guests' do
let(:current_user) { guest }
it do
2018-03-17 18:26:18 +05:30
expect_allowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_disallowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_disallowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
context 'reporter' do
let(:current_user) { reporter }
it do
2018-03-17 18:26:18 +05:30
expect_allowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_disallowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_disallowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
context 'developer' do
let(:current_user) { developer }
it do
2018-03-17 18:26:18 +05:30
expect_allowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_allowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_disallowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
2018-11-18 11:00:15 +05:30
context 'maintainer' do
let(:current_user) { maintainer }
2017-08-17 22:00:37 +05:30
it do
2018-03-17 18:26:18 +05:30
expect_allowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_allowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_allowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
context 'owner' do
let(:current_user) { owner }
it do
2019-02-15 15:39:39 +05:30
allow(Group).to receive(:supports_nested_objects?).and_return(true)
2018-03-17 18:26:18 +05:30
expect_allowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_allowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_allowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
context 'admin' do
let(:current_user) { admin }
it do
2019-02-15 15:39:39 +05:30
allow(Group).to receive(:supports_nested_objects?).and_return(true)
2018-03-17 18:26:18 +05:30
expect_allowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_allowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_allowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
2018-03-17 18:26:18 +05:30
describe 'when nested group support feature is disabled' do
before do
2019-02-15 15:39:39 +05:30
allow(Group).to receive(:supports_nested_objects?).and_return(false)
2018-03-17 18:26:18 +05:30
end
context 'admin' do
let(:current_user) { admin }
it 'allows every owner permission except creating subgroups' do
create_subgroup_permission = [:create_subgroup]
updated_owner_permissions = owner_permissions - create_subgroup_permission
expect_disallowed(*create_subgroup_permission)
expect_allowed(*updated_owner_permissions)
end
end
context 'owner' do
let(:current_user) { owner }
it 'allows every owner permission except creating subgroups' do
create_subgroup_permission = [:create_subgroup]
updated_owner_permissions = owner_permissions - create_subgroup_permission
expect_disallowed(*create_subgroup_permission)
expect_allowed(*updated_owner_permissions)
end
end
end
2017-09-10 17:25:29 +05:30
describe 'private nested group use the highest access level from the group and inherited permissions', :nested_groups do
2017-08-17 22:00:37 +05:30
let(:nested_group) { create(:group, :private, parent: group) }
2017-09-10 17:25:29 +05:30
before do
nested_group.add_guest(guest)
nested_group.add_guest(reporter)
nested_group.add_guest(developer)
2018-11-18 11:00:15 +05:30
nested_group.add_guest(maintainer)
2017-09-10 17:25:29 +05:30
2018-11-20 20:47:30 +05:30
group.owners.destroy_all # rubocop: disable DestroyAll
2017-09-10 17:25:29 +05:30
group.add_guest(owner)
nested_group.add_owner(owner)
end
subject { described_class.new(current_user, nested_group) }
2017-08-17 22:00:37 +05:30
context 'with no user' do
let(:current_user) { nil }
it do
2018-03-17 18:26:18 +05:30
expect_disallowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_disallowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_disallowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
context 'guests' do
let(:current_user) { guest }
it do
2018-03-17 18:26:18 +05:30
expect_allowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_disallowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_disallowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
context 'reporter' do
let(:current_user) { reporter }
it do
2018-03-17 18:26:18 +05:30
expect_allowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_disallowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_disallowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
context 'developer' do
let(:current_user) { developer }
it do
2018-03-17 18:26:18 +05:30
expect_allowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_allowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_disallowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
2018-11-18 11:00:15 +05:30
context 'maintainer' do
let(:current_user) { maintainer }
2017-08-17 22:00:37 +05:30
it do
2018-03-17 18:26:18 +05:30
expect_allowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_allowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_allowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_disallowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
context 'owner' do
let(:current_user) { owner }
it do
2019-02-15 15:39:39 +05:30
allow(Group).to receive(:supports_nested_objects?).and_return(true)
2018-03-17 18:26:18 +05:30
expect_allowed(*guest_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*reporter_permissions)
2018-03-17 18:26:18 +05:30
expect_allowed(*developer_permissions)
2018-11-18 11:00:15 +05:30
expect_allowed(*maintainer_permissions)
2017-09-10 17:25:29 +05:30
expect_allowed(*owner_permissions)
2017-08-17 22:00:37 +05:30
end
end
end
2018-03-17 18:26:18 +05:30
describe 'change_share_with_group_lock' do
context 'when the current_user owns the group' do
let(:current_user) { owner }
context 'when the group share_with_group_lock is enabled' do
let(:group) { create(:group, share_with_group_lock: true, parent: parent) }
context 'when the parent group share_with_group_lock is enabled' do
context 'when the group has a grandparent' do
let(:parent) { create(:group, share_with_group_lock: true, parent: grandparent) }
context 'when the grandparent share_with_group_lock is enabled' do
let(:grandparent) { create(:group, share_with_group_lock: true) }
context 'when the current_user owns the parent' do
before do
parent.add_owner(current_user)
end
context 'when the current_user owns the grandparent' do
before do
grandparent.add_owner(current_user)
end
it { expect_allowed(:change_share_with_group_lock) }
end
context 'when the current_user does not own the grandparent' do
it { expect_disallowed(:change_share_with_group_lock) }
end
end
context 'when the current_user does not own the parent' do
it { expect_disallowed(:change_share_with_group_lock) }
end
end
context 'when the grandparent share_with_group_lock is disabled' do
let(:grandparent) { create(:group) }
context 'when the current_user owns the parent' do
before do
parent.add_owner(current_user)
end
it { expect_allowed(:change_share_with_group_lock) }
end
context 'when the current_user does not own the parent' do
it { expect_disallowed(:change_share_with_group_lock) }
end
end
end
context 'when the group does not have a grandparent' do
let(:parent) { create(:group, share_with_group_lock: true) }
context 'when the current_user owns the parent' do
before do
parent.add_owner(current_user)
end
it { expect_allowed(:change_share_with_group_lock) }
end
context 'when the current_user does not own the parent' do
it { expect_disallowed(:change_share_with_group_lock) }
end
end
end
context 'when the parent group share_with_group_lock is disabled' do
let(:parent) { create(:group) }
it { expect_allowed(:change_share_with_group_lock) }
end
end
context 'when the group share_with_group_lock is disabled' do
it { expect_allowed(:change_share_with_group_lock) }
end
end
context 'when the current_user does not own the group' do
let(:current_user) { create(:user) }
it { expect_disallowed(:change_share_with_group_lock) }
end
end
2019-02-15 15:39:39 +05:30
it_behaves_like 'clusterable policies' do
let(:clusterable) { create(:group) }
let(:cluster) do
create(:cluster,
:provided_by_gcp,
:group,
groups: [clusterable])
end
end
2017-08-17 22:00:37 +05:30
end