Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'spec/policies/release_policy_spec.rb')
-rw-r--r--spec/policies/release_policy_spec.rb62
1 files changed, 62 insertions, 0 deletions
diff --git a/spec/policies/release_policy_spec.rb b/spec/policies/release_policy_spec.rb
new file mode 100644
index 00000000000..25468ae2ea2
--- /dev/null
+++ b/spec/policies/release_policy_spec.rb
@@ -0,0 +1,62 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+RSpec.describe ReleasePolicy, :request_store do
+ let_it_be(:developer) { create(:user) }
+ let_it_be(:maintainer) { create(:user) }
+ let_it_be(:project) { create(:project, :repository) }
+ let_it_be(:release, reload: true) { create(:release, project: project) }
+
+ let(:user) { developer }
+
+ before_all do
+ project.add_developer(developer)
+ project.add_maintainer(maintainer)
+ end
+
+ subject { described_class.new(user, release) }
+
+ context 'when the evalute_protected_tag_for_release_permissions feature flag is disabled' do
+ before do
+ stub_feature_flags(evalute_protected_tag_for_release_permissions: false)
+ end
+
+ it 'allows the user to create and update a release' do
+ is_expected.to be_allowed(:create_release)
+ is_expected.to be_allowed(:update_release)
+ end
+
+ it 'prevents the user from destroying a release' do
+ is_expected.to be_disallowed(:destroy_release)
+ end
+
+ context 'when the user is maintainer' do
+ let(:user) { maintainer }
+
+ it 'allows the user to destroy a release' do
+ is_expected.to be_allowed(:destroy_release)
+ end
+ end
+ end
+
+ context 'when the user has access to the protected tag' do
+ let_it_be(:protected_tag) { create(:protected_tag, :developers_can_create, name: release.tag, project: project) }
+
+ it 'allows the user to create, update and destroy a release' do
+ is_expected.to be_allowed(:create_release)
+ is_expected.to be_allowed(:update_release)
+ is_expected.to be_allowed(:destroy_release)
+ end
+ end
+
+ context 'when the user does not have access to the protected tag' do
+ let_it_be(:protected_tag) { create(:protected_tag, :maintainers_can_create, name: release.tag, project: project) }
+
+ it 'prevents the user from creating, updating and destroying a release' do
+ is_expected.to be_disallowed(:create_release)
+ is_expected.to be_disallowed(:update_release)
+ is_expected.to be_disallowed(:destroy_release)
+ end
+ end
+end