2021-01-03 14:25:43 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
RSpec.describe Terraform::StatePolicy do
|
|
|
|
let_it_be(:project) { create(:project) }
|
2022-10-11 01:57:18 +05:30
|
|
|
let_it_be(:terraform_state) { create(:terraform_state, project: project) }
|
2021-01-03 14:25:43 +05:30
|
|
|
|
|
|
|
subject { described_class.new(user, terraform_state) }
|
|
|
|
|
|
|
|
describe 'rules' do
|
|
|
|
context 'no access' do
|
|
|
|
let(:user) { create(:user) }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:read_terraform_state) }
|
|
|
|
it { is_expected.to be_disallowed(:admin_terraform_state) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:user) { create(:user, developer_projects: [project]) }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:read_terraform_state) }
|
|
|
|
it { is_expected.to be_disallowed(:admin_terraform_state) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'maintainer' do
|
|
|
|
let(:user) { create(:user, maintainer_projects: [project]) }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:read_terraform_state) }
|
|
|
|
it { is_expected.to be_allowed(:admin_terraform_state) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|