debian-mirror-gitlab/spec/policies/user_policy_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

206 lines
6.1 KiB
Ruby
Raw Normal View History

2019-12-26 22:10:19 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe UserPolicy do
2021-11-11 11:23:49 +05:30
let_it_be(:admin) { create(:user, :admin) }
let_it_be(:regular_user) { create(:user) }
let_it_be(:subject_user) { create(:user) }
let(:current_user) { regular_user }
let(:user) { subject_user }
2017-08-17 22:00:37 +05:30
2017-09-10 17:25:29 +05:30
subject { described_class.new(current_user, user) }
2017-08-17 22:00:37 +05:30
describe "reading a user's information" do
2017-09-10 17:25:29 +05:30
it { is_expected.to be_allowed(:read_user) }
2017-08-17 22:00:37 +05:30
end
2020-10-24 23:57:45 +05:30
describe "reading a different user's Personal Access Tokens" do
let(:token) { create(:personal_access_token, user: user) }
context 'when user is admin' do
2021-11-11 11:23:49 +05:30
let(:current_user) { admin }
2020-10-24 23:57:45 +05:30
context 'when admin mode is enabled', :enable_admin_mode do
it { is_expected.to be_allowed(:read_user_personal_access_tokens) }
end
context 'when admin mode is disabled' do
it { is_expected.not_to be_allowed(:read_user_personal_access_tokens) }
end
end
context 'when user is not an admin' do
context 'requesting their own personal access tokens' do
subject { described_class.new(current_user, current_user) }
it { is_expected.to be_allowed(:read_user_personal_access_tokens) }
end
context "requesting a different user's personal access tokens" do
it { is_expected.not_to be_allowed(:read_user_personal_access_tokens) }
end
end
end
2021-01-29 00:20:46 +05:30
describe "creating a different user's Personal Access Tokens" do
context 'when current_user is admin' do
2021-11-11 11:23:49 +05:30
let(:current_user) { admin }
2021-01-29 00:20:46 +05:30
context 'when admin mode is enabled and current_user is not blocked', :enable_admin_mode do
it { is_expected.to be_allowed(:create_user_personal_access_token) }
end
context 'when admin mode is enabled and current_user is blocked', :enable_admin_mode do
let(:current_user) { create(:admin, :blocked) }
it { is_expected.not_to be_allowed(:create_user_personal_access_token) }
end
context 'when admin mode is disabled' do
it { is_expected.not_to be_allowed(:create_user_personal_access_token) }
end
end
context 'when current_user is not an admin' do
context 'creating their own personal access tokens' do
subject { described_class.new(current_user, current_user) }
context 'when current_user is not blocked' do
it { is_expected.to be_allowed(:create_user_personal_access_token) }
end
context 'when current_user is blocked' do
let(:current_user) { create(:user, :blocked) }
it { is_expected.not_to be_allowed(:create_user_personal_access_token) }
end
end
context "creating a different user's personal access tokens" do
it { is_expected.not_to be_allowed(:create_user_personal_access_token) }
end
end
end
2018-10-15 14:42:47 +05:30
shared_examples 'changing a user' do |ability|
2017-08-17 22:00:37 +05:30
context "when a regular user tries to destroy another regular user" do
2018-10-15 14:42:47 +05:30
it { is_expected.not_to be_allowed(ability) }
2017-08-17 22:00:37 +05:30
end
context "when a regular user tries to destroy themselves" do
let(:current_user) { user }
2018-10-15 14:42:47 +05:30
it { is_expected.to be_allowed(ability) }
2017-08-17 22:00:37 +05:30
end
context "when an admin user tries to destroy a regular user" do
2021-11-11 11:23:49 +05:30
let(:current_user) { admin }
2017-08-17 22:00:37 +05:30
2020-05-24 23:13:21 +05:30
context 'when admin mode is enabled', :enable_admin_mode do
it { is_expected.to be_allowed(ability) }
end
context 'when admin mode is disabled' do
it { is_expected.to be_disallowed(ability) }
end
2017-08-17 22:00:37 +05:30
end
context "when an admin user tries to destroy a ghost user" do
2021-11-11 11:23:49 +05:30
let(:current_user) { admin }
2017-08-17 22:00:37 +05:30
let(:user) { create(:user, :ghost) }
2018-10-15 14:42:47 +05:30
it { is_expected.not_to be_allowed(ability) }
2017-08-17 22:00:37 +05:30
end
end
2018-10-15 14:42:47 +05:30
2018-11-18 11:00:15 +05:30
describe "updating a user's status" do
it_behaves_like 'changing a user', :update_user_status
end
2018-10-15 14:42:47 +05:30
describe "destroying a user" do
it_behaves_like 'changing a user', :destroy_user
end
describe "updating a user" do
it_behaves_like 'changing a user', :update_user
end
2020-11-24 15:15:51 +05:30
describe 'disabling two-factor authentication' do
context 'disabling their own two-factor authentication' do
let(:user) { current_user }
it { is_expected.to be_allowed(:disable_two_factor) }
end
context 'disabling the two-factor authentication of another user' do
context 'when the executor is an admin', :enable_admin_mode do
2021-11-11 11:23:49 +05:30
let(:current_user) { admin }
2020-11-24 15:15:51 +05:30
it { is_expected.to be_allowed(:disable_two_factor) }
end
context 'when the executor is not an admin' do
it { is_expected.not_to be_allowed(:disable_two_factor) }
end
end
end
2021-01-29 00:20:46 +05:30
describe "reading a user's group count" do
context "when current_user is an admin", :enable_admin_mode do
2021-11-11 11:23:49 +05:30
let(:current_user) { admin }
2021-01-29 00:20:46 +05:30
it { is_expected.to be_allowed(:read_group_count) }
end
context "for self users" do
let(:user) { current_user }
it { is_expected.to be_allowed(:read_group_count) }
end
context "when accessing a different user's group count" do
it { is_expected.not_to be_allowed(:read_group_count) }
end
end
2021-02-22 17:27:13 +05:30
describe ':read_user_profile' do
context 'when the user is unconfirmed' do
let(:user) { create(:user, :unconfirmed) }
it { is_expected.not_to be_allowed(:read_user_profile) }
end
context 'when the user is confirmed' do
it { is_expected.to be_allowed(:read_user_profile) }
end
end
2021-11-11 11:23:49 +05:30
describe ':read_user_groups' do
context 'when user is admin' do
let(:current_user) { admin }
context 'when admin mode is enabled', :enable_admin_mode do
it { is_expected.to be_allowed(:read_user_groups) }
end
context 'when admin mode is disabled' do
it { is_expected.not_to be_allowed(:read_user_groups) }
end
end
context 'when user is not an admin' do
context 'requesting their own manageable groups' do
subject { described_class.new(current_user, current_user) }
it { is_expected.to be_allowed(:read_user_groups) }
end
context "requesting a different user's manageable groups" do
it { is_expected.not_to be_allowed(:read_user_groups) }
end
end
end
2017-08-17 22:00:37 +05:30
end