Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'spec/lib/constraints/admin_constrainer_spec.rb')
-rw-r--r--spec/lib/constraints/admin_constrainer_spec.rb69
1 files changed, 69 insertions, 0 deletions
diff --git a/spec/lib/constraints/admin_constrainer_spec.rb b/spec/lib/constraints/admin_constrainer_spec.rb
new file mode 100644
index 00000000000..da178f9e71a
--- /dev/null
+++ b/spec/lib/constraints/admin_constrainer_spec.rb
@@ -0,0 +1,69 @@
+# frozen_string_literal: true
+#
+require 'spec_helper'
+
+describe Constraints::AdminConstrainer, :do_not_mock_admin_mode do
+ let(:user) { create(:user) }
+
+ let(:session) { {} }
+ let(:env) { { 'warden' => double(:warden, authenticate?: true, user: user) } }
+ let(:request) { double(:request, session: session, env: env) }
+
+ around do |example|
+ Gitlab::Session.with_session(session) do
+ example.run
+ end
+ end
+
+ describe '#matches' do
+ context 'feature flag :user_mode_in_session is enabled' do
+ context 'when user is a regular user' do
+ it 'forbids access' do
+ expect(subject.matches?(request)).to be(false)
+ end
+ end
+
+ context 'when user is an admin' do
+ let(:user) { create(:admin) }
+
+ context 'admin mode is disabled' do
+ it 'forbids access' do
+ expect(subject.matches?(request)).to be(false)
+ end
+ end
+
+ context 'admin mode is enabled' do
+ before do
+ current_user_mode = Gitlab::Auth::CurrentUserMode.new(user)
+ current_user_mode.request_admin_mode!
+ current_user_mode.enable_admin_mode!(password: user.password)
+ end
+
+ it 'allows access' do
+ expect(subject.matches?(request)).to be(true)
+ end
+ end
+ end
+ end
+
+ context 'feature flag :user_mode_in_session is disabled' do
+ before do
+ stub_feature_flags(user_mode_in_session: false)
+ end
+
+ context 'when user is a regular user' do
+ it 'forbids access' do
+ expect(subject.matches?(request)).to be(false)
+ end
+ end
+
+ context 'when user is an admin' do
+ let(:user) { create(:admin) }
+
+ it 'allows access' do
+ expect(subject.matches?(request)).to be(true)
+ end
+ end
+ end
+ end
+end