debian-mirror-gitlab/spec/lib/gitlab/project_authorizations_spec.rb

68 lines
1.9 KiB
Ruby
Raw Normal View History

2019-12-04 20:38:33 +05:30
# frozen_string_literal: true
2017-09-10 17:25:29 +05:30
require 'spec_helper'
describe Gitlab::ProjectAuthorizations do
let(:group) { create(:group) }
let!(:owned_project) { create(:project) }
let!(:other_project) { create(:project) }
let!(:group_project) { create(:project, namespace: group) }
let(:user) { owned_project.namespace.owner }
def map_access_levels(rows)
rows.each_with_object({}) do |row, hash|
hash[row.project_id] = row.access_level
end
end
before do
2018-03-17 18:26:18 +05:30
other_project.add_reporter(user)
2017-09-10 17:25:29 +05:30
group.add_developer(user)
end
let(:authorizations) do
2019-10-12 21:52:04 +05:30
described_class.new(user).calculate
2017-09-10 17:25:29 +05:30
end
it 'returns the correct number of authorizations' do
expect(authorizations.length).to eq(3)
end
it 'includes the correct projects' do
expect(authorizations.pluck(:project_id))
.to include(owned_project.id, other_project.id, group_project.id)
end
it 'includes the correct access levels' do
mapping = map_access_levels(authorizations)
2018-11-18 11:00:15 +05:30
expect(mapping[owned_project.id]).to eq(Gitlab::Access::MAINTAINER)
2017-09-10 17:25:29 +05:30
expect(mapping[other_project.id]).to eq(Gitlab::Access::REPORTER)
expect(mapping[group_project.id]).to eq(Gitlab::Access::DEVELOPER)
end
2019-10-12 21:52:04 +05:30
context 'with nested groups' do
let!(:nested_group) { create(:group, parent: group) }
let!(:nested_project) { create(:project, namespace: nested_group) }
2017-09-10 17:25:29 +05:30
2019-10-12 21:52:04 +05:30
it 'includes nested groups' do
expect(authorizations.pluck(:project_id)).to include(nested_project.id)
end
2017-09-10 17:25:29 +05:30
2019-10-12 21:52:04 +05:30
it 'inherits access levels when the user is not a member of a nested group' do
mapping = map_access_levels(authorizations)
2017-09-10 17:25:29 +05:30
2019-10-12 21:52:04 +05:30
expect(mapping[nested_project.id]).to eq(Gitlab::Access::DEVELOPER)
end
2017-09-10 17:25:29 +05:30
2019-10-12 21:52:04 +05:30
it 'uses the greatest access level when a user is a member of a nested group' do
nested_group.add_maintainer(user)
2017-09-10 17:25:29 +05:30
2019-10-12 21:52:04 +05:30
mapping = map_access_levels(authorizations)
2017-09-10 17:25:29 +05:30
2019-10-12 21:52:04 +05:30
expect(mapping[nested_project.id]).to eq(Gitlab::Access::MAINTAINER)
2017-09-10 17:25:29 +05:30
end
end
end