109 lines
2.9 KiB
Ruby
109 lines
2.9 KiB
Ruby
require 'spec_helper'
|
|
|
|
describe Gitlab::LDAP::Access, lib: true do
|
|
let(:access) { Gitlab::LDAP::Access.new user }
|
|
let(:user) { create(:omniauth_user) }
|
|
|
|
describe '#allowed?' do
|
|
subject { access.allowed? }
|
|
|
|
context 'when the user cannot be found' do
|
|
before do
|
|
allow(Gitlab::LDAP::Person).to receive(:find_by_dn).and_return(nil)
|
|
end
|
|
|
|
it { is_expected.to be_falsey }
|
|
|
|
it 'should block user in GitLab' do
|
|
access.allowed?
|
|
expect(user).to be_blocked
|
|
expect(user).to be_ldap_blocked
|
|
end
|
|
end
|
|
|
|
context 'when the user is found' do
|
|
before do
|
|
allow(Gitlab::LDAP::Person).to receive(:find_by_dn).and_return(:ldap_user)
|
|
end
|
|
|
|
context 'and the user is disabled via active directory' do
|
|
before do
|
|
allow(Gitlab::LDAP::Person).to receive(:disabled_via_active_directory?).and_return(true)
|
|
end
|
|
|
|
it { is_expected.to be_falsey }
|
|
|
|
it 'blocks user in GitLab' do
|
|
access.allowed?
|
|
expect(user).to be_blocked
|
|
expect(user).to be_ldap_blocked
|
|
end
|
|
end
|
|
|
|
context 'and has no disabled flag in active diretory' do
|
|
before do
|
|
allow(Gitlab::LDAP::Person).to receive(:disabled_via_active_directory?).and_return(false)
|
|
end
|
|
|
|
it { is_expected.to be_truthy }
|
|
|
|
context 'when auto-created users are blocked' do
|
|
before do
|
|
user.block
|
|
end
|
|
|
|
it 'does not unblock user in GitLab' do
|
|
access.allowed?
|
|
expect(user).to be_blocked
|
|
expect(user).not_to be_ldap_blocked # this block is handled by omniauth not by our internal logic
|
|
end
|
|
end
|
|
|
|
context 'when auto-created users are not blocked' do
|
|
before do
|
|
user.ldap_block
|
|
end
|
|
|
|
it 'should unblock user in GitLab' do
|
|
access.allowed?
|
|
expect(user).not_to be_blocked
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'without ActiveDirectory enabled' do
|
|
before do
|
|
allow(Gitlab::LDAP::Config).to receive(:enabled?).and_return(true)
|
|
allow_any_instance_of(Gitlab::LDAP::Config).to receive(:active_directory).and_return(false)
|
|
end
|
|
|
|
it { is_expected.to be_truthy }
|
|
|
|
context 'when user cannot be found' do
|
|
before do
|
|
allow(Gitlab::LDAP::Person).to receive(:find_by_dn).and_return(nil)
|
|
end
|
|
|
|
it { is_expected.to be_falsey }
|
|
|
|
it 'blocks user in GitLab' do
|
|
access.allowed?
|
|
expect(user).to be_blocked
|
|
expect(user).to be_ldap_blocked
|
|
end
|
|
end
|
|
|
|
context 'when user was previously ldap_blocked' do
|
|
before do
|
|
user.ldap_block
|
|
end
|
|
|
|
it 'unblocks the user if it exists' do
|
|
access.allowed?
|
|
expect(user).not_to be_blocked
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|