2017-08-17 22:00:37 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
describe GroupPolicy do
|
2017-08-17 22:00:37 +05:30
|
|
|
let(:guest) { create(:user) }
|
|
|
|
let(:reporter) { create(:user) }
|
|
|
|
let(:developer) { create(:user) }
|
|
|
|
let(:master) { create(:user) }
|
|
|
|
let(:owner) { create(:user) }
|
|
|
|
let(:admin) { create(:admin) }
|
|
|
|
let(:group) { create(:group) }
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
let(:guest_permissions) { [:read_group, :upload_file, :read_namespace] }
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:reporter_permissions) { [:admin_label] }
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
let(:developer_permissions) { [:admin_milestones] }
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
let(:master_permissions) do
|
|
|
|
[
|
2018-03-17 18:26:18 +05:30
|
|
|
:create_projects
|
2017-08-17 22:00:37 +05:30
|
|
|
]
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:owner_permissions) do
|
|
|
|
[
|
|
|
|
:admin_group,
|
|
|
|
:admin_namespace,
|
|
|
|
:admin_group_member,
|
|
|
|
:change_visibility_level,
|
2018-03-17 18:26:18 +05:30
|
|
|
(Gitlab::Database.postgresql? ? :create_subgroup : nil)
|
|
|
|
].compact
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
group.add_guest(guest)
|
|
|
|
group.add_reporter(reporter)
|
|
|
|
group.add_developer(developer)
|
|
|
|
group.add_master(master)
|
|
|
|
group.add_owner(owner)
|
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
subject { described_class.new(current_user, group) }
|
|
|
|
|
|
|
|
def expect_allowed(*permissions)
|
|
|
|
permissions.each { |p| is_expected.to be_allowed(p) }
|
|
|
|
end
|
|
|
|
|
|
|
|
def expect_disallowed(*permissions)
|
|
|
|
permissions.each { |p| is_expected.not_to be_allowed(p) }
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
|
|
|
|
context 'with no user' do
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
it do
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(:read_group)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_disallowed(:upload_file)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_disallowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*master_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_disallowed(:read_namespace)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'guests' do
|
|
|
|
let(:current_user) { guest }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_disallowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*master_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_disallowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*master_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*master_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'master' do
|
|
|
|
let(:current_user) { master }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*master_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
allow(Group).to receive(:supports_nested_groups?).and_return(true)
|
|
|
|
|
|
|
|
expect_allowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*master_permissions)
|
|
|
|
expect_allowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'admin' do
|
|
|
|
let(:current_user) { admin }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
allow(Group).to receive(:supports_nested_groups?).and_return(true)
|
|
|
|
|
|
|
|
expect_allowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*master_permissions)
|
|
|
|
expect_allowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
describe 'when nested group support feature is disabled' do
|
|
|
|
before do
|
|
|
|
allow(Group).to receive(:supports_nested_groups?).and_return(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'admin' do
|
|
|
|
let(:current_user) { admin }
|
|
|
|
|
|
|
|
it 'allows every owner permission except creating subgroups' do
|
|
|
|
create_subgroup_permission = [:create_subgroup]
|
|
|
|
updated_owner_permissions = owner_permissions - create_subgroup_permission
|
|
|
|
|
|
|
|
expect_disallowed(*create_subgroup_permission)
|
|
|
|
expect_allowed(*updated_owner_permissions)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it 'allows every owner permission except creating subgroups' do
|
|
|
|
create_subgroup_permission = [:create_subgroup]
|
|
|
|
updated_owner_permissions = owner_permissions - create_subgroup_permission
|
|
|
|
|
|
|
|
expect_disallowed(*create_subgroup_permission)
|
|
|
|
expect_allowed(*updated_owner_permissions)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
describe 'private nested group use the highest access level from the group and inherited permissions', :nested_groups do
|
2017-08-17 22:00:37 +05:30
|
|
|
let(:nested_group) { create(:group, :private, parent: group) }
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
before do
|
|
|
|
nested_group.add_guest(guest)
|
|
|
|
nested_group.add_guest(reporter)
|
|
|
|
nested_group.add_guest(developer)
|
|
|
|
nested_group.add_guest(master)
|
|
|
|
|
|
|
|
group.owners.destroy_all
|
|
|
|
|
|
|
|
group.add_guest(owner)
|
|
|
|
nested_group.add_owner(owner)
|
|
|
|
end
|
|
|
|
|
|
|
|
subject { described_class.new(current_user, nested_group) }
|
2017-08-17 22:00:37 +05:30
|
|
|
|
|
|
|
context 'with no user' do
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_disallowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_disallowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*master_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'guests' do
|
|
|
|
let(:current_user) { guest }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_disallowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*master_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_disallowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*master_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_disallowed(*master_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'master' do
|
|
|
|
let(:current_user) { master }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*master_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it do
|
2018-03-17 18:26:18 +05:30
|
|
|
allow(Group).to receive(:supports_nested_groups?).and_return(true)
|
|
|
|
|
|
|
|
expect_allowed(*guest_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*reporter_permissions)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect_allowed(*developer_permissions)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect_allowed(*master_permissions)
|
|
|
|
expect_allowed(*owner_permissions)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
|
|
|
describe 'change_share_with_group_lock' do
|
|
|
|
context 'when the current_user owns the group' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
context 'when the group share_with_group_lock is enabled' do
|
|
|
|
let(:group) { create(:group, share_with_group_lock: true, parent: parent) }
|
|
|
|
|
|
|
|
context 'when the parent group share_with_group_lock is enabled' do
|
|
|
|
context 'when the group has a grandparent' do
|
|
|
|
let(:parent) { create(:group, share_with_group_lock: true, parent: grandparent) }
|
|
|
|
|
|
|
|
context 'when the grandparent share_with_group_lock is enabled' do
|
|
|
|
let(:grandparent) { create(:group, share_with_group_lock: true) }
|
|
|
|
|
|
|
|
context 'when the current_user owns the parent' do
|
|
|
|
before do
|
|
|
|
parent.add_owner(current_user)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the current_user owns the grandparent' do
|
|
|
|
before do
|
|
|
|
grandparent.add_owner(current_user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { expect_allowed(:change_share_with_group_lock) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the current_user does not own the grandparent' do
|
|
|
|
it { expect_disallowed(:change_share_with_group_lock) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the current_user does not own the parent' do
|
|
|
|
it { expect_disallowed(:change_share_with_group_lock) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the grandparent share_with_group_lock is disabled' do
|
|
|
|
let(:grandparent) { create(:group) }
|
|
|
|
|
|
|
|
context 'when the current_user owns the parent' do
|
|
|
|
before do
|
|
|
|
parent.add_owner(current_user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { expect_allowed(:change_share_with_group_lock) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the current_user does not own the parent' do
|
|
|
|
it { expect_disallowed(:change_share_with_group_lock) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the group does not have a grandparent' do
|
|
|
|
let(:parent) { create(:group, share_with_group_lock: true) }
|
|
|
|
|
|
|
|
context 'when the current_user owns the parent' do
|
|
|
|
before do
|
|
|
|
parent.add_owner(current_user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { expect_allowed(:change_share_with_group_lock) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the current_user does not own the parent' do
|
|
|
|
it { expect_disallowed(:change_share_with_group_lock) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the parent group share_with_group_lock is disabled' do
|
|
|
|
let(:parent) { create(:group) }
|
|
|
|
|
|
|
|
it { expect_allowed(:change_share_with_group_lock) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the group share_with_group_lock is disabled' do
|
|
|
|
it { expect_allowed(:change_share_with_group_lock) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the current_user does not own the group' do
|
|
|
|
let(:current_user) { create(:user) }
|
|
|
|
|
|
|
|
it { expect_disallowed(:change_share_with_group_lock) }
|
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|