debian-mirror-gitlab/spec/policies/project_snippet_policy_spec.rb
2017-09-10 17:25:29 +05:30

165 lines
3.8 KiB
Ruby

require 'spec_helper'
describe ProjectSnippetPolicy do
let(:regular_user) { create(:user) }
let(:external_user) { create(:user, :external) }
let(:project) { create(:project, :public) }
let(:author_permissions) do
[
:update_project_snippet,
:admin_project_snippet
]
end
def abilities(user, snippet_visibility)
snippet = create(:project_snippet, snippet_visibility, project: project)
described_class.new(user, snippet)
end
def expect_allowed(*permissions)
permissions.each { |p| is_expected.to be_allowed(p) }
end
def expect_disallowed(*permissions)
permissions.each { |p| is_expected.not_to be_allowed(p) }
end
context 'public snippet' do
context 'no user' do
subject { abilities(nil, :public) }
it do
expect_allowed(:read_project_snippet)
expect_disallowed(*author_permissions)
end
end
context 'regular user' do
subject { abilities(regular_user, :public) }
it do
expect_allowed(:read_project_snippet)
expect_disallowed(*author_permissions)
end
end
context 'external user' do
subject { abilities(external_user, :public) }
it do
expect_allowed(:read_project_snippet)
expect_disallowed(*author_permissions)
end
end
end
context 'internal snippet' do
context 'no user' do
subject { abilities(nil, :internal) }
it do
expect_disallowed(:read_project_snippet)
expect_disallowed(*author_permissions)
end
end
context 'regular user' do
subject { abilities(regular_user, :internal) }
it do
expect_allowed(:read_project_snippet)
expect_disallowed(*author_permissions)
end
end
context 'external user' do
subject { abilities(external_user, :internal) }
it do
expect_disallowed(:read_project_snippet)
expect_disallowed(*author_permissions)
end
end
context 'project team member external user' do
subject { abilities(external_user, :internal) }
before do
project.team << [external_user, :developer]
end
it do
expect_allowed(:read_project_snippet)
expect_disallowed(*author_permissions)
end
end
end
context 'private snippet' do
context 'no user' do
subject { abilities(nil, :private) }
it do
expect_disallowed(:read_project_snippet)
expect_disallowed(*author_permissions)
end
end
context 'regular user' do
subject { abilities(regular_user, :private) }
it do
expect_disallowed(:read_project_snippet)
expect_disallowed(*author_permissions)
end
end
context 'snippet author' do
let(:snippet) { create(:project_snippet, :private, author: regular_user, project: project) }
subject { described_class.new(regular_user, snippet) }
it do
expect_allowed(:read_project_snippet)
expect_allowed(*author_permissions)
end
end
context 'project team member normal user' do
subject { abilities(regular_user, :private) }
before do
project.team << [regular_user, :developer]
end
it do
expect_allowed(:read_project_snippet)
expect_disallowed(*author_permissions)
end
end
context 'project team member external user' do
subject { abilities(external_user, :private) }
before do
project.team << [external_user, :developer]
end
it do
expect_allowed(:read_project_snippet)
expect_disallowed(*author_permissions)
end
end
context 'admin user' do
subject { abilities(create(:admin), :private) }
it do
expect_allowed(:read_project_snippet)
expect_allowed(*author_permissions)
end
end
end
end