diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2021-07-02 03:07:53 +0300 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2021-07-02 03:07:53 +0300 |
commit | dc483c85ef1b3bcb8dee1fa269ced6e52f48c22c (patch) | |
tree | 8a1d7d84a460a2daf7ef17f1efc71cf27531ef71 /spec/policies | |
parent | f8975b16d11afde69e398a8c607a27e0c05b48f9 (diff) |
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'spec/policies')
-rw-r--r-- | spec/policies/release_policy_spec.rb | 62 |
1 files changed, 62 insertions, 0 deletions
diff --git a/spec/policies/release_policy_spec.rb b/spec/policies/release_policy_spec.rb new file mode 100644 index 00000000000..25468ae2ea2 --- /dev/null +++ b/spec/policies/release_policy_spec.rb @@ -0,0 +1,62 @@ +# frozen_string_literal: true + +require 'spec_helper' + +RSpec.describe ReleasePolicy, :request_store do + let_it_be(:developer) { create(:user) } + let_it_be(:maintainer) { create(:user) } + let_it_be(:project) { create(:project, :repository) } + let_it_be(:release, reload: true) { create(:release, project: project) } + + let(:user) { developer } + + before_all do + project.add_developer(developer) + project.add_maintainer(maintainer) + end + + subject { described_class.new(user, release) } + + context 'when the evalute_protected_tag_for_release_permissions feature flag is disabled' do + before do + stub_feature_flags(evalute_protected_tag_for_release_permissions: false) + end + + it 'allows the user to create and update a release' do + is_expected.to be_allowed(:create_release) + is_expected.to be_allowed(:update_release) + end + + it 'prevents the user from destroying a release' do + is_expected.to be_disallowed(:destroy_release) + end + + context 'when the user is maintainer' do + let(:user) { maintainer } + + it 'allows the user to destroy a release' do + is_expected.to be_allowed(:destroy_release) + end + end + end + + context 'when the user has access to the protected tag' do + let_it_be(:protected_tag) { create(:protected_tag, :developers_can_create, name: release.tag, project: project) } + + it 'allows the user to create, update and destroy a release' do + is_expected.to be_allowed(:create_release) + is_expected.to be_allowed(:update_release) + is_expected.to be_allowed(:destroy_release) + end + end + + context 'when the user does not have access to the protected tag' do + let_it_be(:protected_tag) { create(:protected_tag, :maintainers_can_create, name: release.tag, project: project) } + + it 'prevents the user from creating, updating and destroying a release' do + is_expected.to be_disallowed(:create_release) + is_expected.to be_disallowed(:update_release) + is_expected.to be_disallowed(:destroy_release) + end + end +end |