debian-mirror-gitlab/spec/policies/release_policy_spec.rb
2021-09-30 23:02:18 +05:30

62 lines
2 KiB
Ruby

# frozen_string_literal: true
require 'spec_helper'
RSpec.describe ReleasePolicy, :request_store do
let_it_be(:developer) { create(:user) }
let_it_be(:maintainer) { create(:user) }
let_it_be(:project) { create(:project, :repository) }
let_it_be(:release, reload: true) { create(:release, project: project) }
let(:user) { developer }
before_all do
project.add_developer(developer)
project.add_maintainer(maintainer)
end
subject { described_class.new(user, release) }
context 'when the evalute_protected_tag_for_release_permissions feature flag is disabled' do
before do
stub_feature_flags(evalute_protected_tag_for_release_permissions: false)
end
it 'allows the user to create and update a release' do
is_expected.to be_allowed(:create_release)
is_expected.to be_allowed(:update_release)
end
it 'prevents the user from destroying a release' do
is_expected.to be_disallowed(:destroy_release)
end
context 'when the user is maintainer' do
let(:user) { maintainer }
it 'allows the user to destroy a release' do
is_expected.to be_allowed(:destroy_release)
end
end
end
context 'when the user has access to the protected tag' do
let_it_be(:protected_tag) { create(:protected_tag, :developers_can_create, name: release.tag, project: project) }
it 'allows the user to create, update and destroy a release' do
is_expected.to be_allowed(:create_release)
is_expected.to be_allowed(:update_release)
is_expected.to be_allowed(:destroy_release)
end
end
context 'when the user does not have access to the protected tag' do
let_it_be(:protected_tag) { create(:protected_tag, :maintainers_can_create, name: release.tag, project: project) }
it 'prevents the user from creating, updating and destroying a release' do
is_expected.to be_disallowed(:create_release)
is_expected.to be_disallowed(:update_release)
is_expected.to be_disallowed(:destroy_release)
end
end
end