debian-mirror-gitlab/spec/policies/base_policy_spec.rb

102 lines
2.7 KiB
Ruby
Raw Normal View History

2019-12-26 22:10:19 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe BasePolicy do
2019-07-07 11:18:12 +05:30
include ExternalAuthorizationServiceHelpers
2019-12-26 22:10:19 +05:30
include AdminModeHelper
2019-07-07 11:18:12 +05:30
2017-08-17 22:00:37 +05:30
describe '.class_for' do
it 'detects policy class based on the subject ancestors' do
2017-09-10 17:25:29 +05:30
expect(DeclarativePolicy.class_for(GenericCommitStatus.new)).to eq(CommitStatusPolicy)
2017-08-17 22:00:37 +05:30
end
it 'detects policy class for a presented subject' do
presentee = Ci::BuildPresenter.new(Ci::Build.new)
2017-09-10 17:25:29 +05:30
expect(DeclarativePolicy.class_for(presentee)).to eq(Ci::BuildPolicy)
2017-08-17 22:00:37 +05:30
end
it 'uses GlobalPolicy when :global is given' do
2017-09-10 17:25:29 +05:30
expect(DeclarativePolicy.class_for(:global)).to eq(GlobalPolicy)
2017-08-17 22:00:37 +05:30
end
end
2019-07-07 11:18:12 +05:30
2021-09-04 01:27:46 +05:30
shared_examples 'admin only access' do |ability|
def policy
# method, because we want a fresh cache each time.
described_class.new(current_user, nil)
end
2021-01-29 00:20:46 +05:30
let(:current_user) { build_stubbed(:user) }
2021-09-04 01:27:46 +05:30
subject { policy }
2021-01-29 00:20:46 +05:30
2021-09-04 01:27:46 +05:30
it { is_expected.not_to be_allowed(ability) }
2021-01-29 00:20:46 +05:30
2021-09-04 01:27:46 +05:30
context 'with an admin' do
2021-01-29 00:20:46 +05:30
let(:current_user) { build_stubbed(:admin) }
it 'allowed when in admin mode' do
enable_admin_mode!(current_user)
2021-09-04 01:27:46 +05:30
is_expected.to be_allowed(ability)
2021-01-29 00:20:46 +05:30
end
it 'prevented when not in admin mode' do
2021-09-04 01:27:46 +05:30
is_expected.not_to be_allowed(ability)
2021-01-29 00:20:46 +05:30
end
end
2021-09-04 01:27:46 +05:30
context 'with anonymous' do
2021-01-29 00:20:46 +05:30
let(:current_user) { nil }
2021-09-04 01:27:46 +05:30
it { is_expected.not_to be_allowed(ability) }
end
describe 'bypassing the session for sessionless login', :request_store do
let(:current_user) { build_stubbed(:admin) }
it 'changes from prevented to allowed' do
expect { Gitlab::Auth::CurrentUserMode.bypass_session!(current_user.id) }
.to change { policy.allowed?(ability) }.from(false).to(true)
end
2021-01-29 00:20:46 +05:30
end
end
2019-07-07 11:18:12 +05:30
describe 'read cross project' do
2020-03-13 15:44:24 +05:30
let(:current_user) { build_stubbed(:user) }
let(:user) { build_stubbed(:user) }
2019-07-07 11:18:12 +05:30
subject { described_class.new(current_user, [user]) }
it { is_expected.to be_allowed(:read_cross_project) }
2020-04-22 19:07:51 +05:30
context 'for anonymous' do
let(:current_user) { nil }
it { is_expected.to be_allowed(:read_cross_project) }
end
2019-07-07 11:18:12 +05:30
context 'when an external authorization service is enabled' do
before do
enable_external_authorization_service_check
end
2021-01-29 00:20:46 +05:30
it_behaves_like 'admin only access', :read_cross_project
2019-12-26 22:10:19 +05:30
end
end
2021-04-17 20:07:23 +05:30
describe 'full private access: read_all_resources' do
2021-01-29 00:20:46 +05:30
it_behaves_like 'admin only access', :read_all_resources
end
2019-12-26 22:10:19 +05:30
2021-04-17 20:07:23 +05:30
describe 'full private access: admin_all_resources' do
it_behaves_like 'admin only access', :admin_all_resources
end
2021-01-29 00:20:46 +05:30
describe 'change_repository_storage' do
it_behaves_like 'admin only access', :change_repository_storage
2019-07-07 11:18:12 +05:30
end
2017-08-17 22:00:37 +05:30
end