Welcome to mirror list, hosted at ThFree Co, Russian Federation.

deploy_key_policy_spec.rb « policies « spec - gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
blob: 754f36ce3b00d4a8575668143f0e841dcd27ed5e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
# frozen_string_literal: true

require 'spec_helper'

RSpec.describe DeployKeyPolicy, feature_category: :groups_and_projects do
  subject { described_class.new(current_user, deploy_key) }

  let_it_be(:current_user, refind: true) { create(:user) }
  let_it_be(:admin) { create(:user, :admin) }

  context 'when deploy key is public' do
    let_it_be(:deploy_key) { create(:deploy_key, public: true) }

    context 'and current_user is nil' do
      let(:current_user) { nil }

      it { is_expected.to be_disallowed(:read_deploy_key) }

      it { is_expected.to be_disallowed(:update_deploy_key) }
    end

    context 'and current_user is present' do
      it { is_expected.to be_allowed(:read_deploy_key) }

      it { is_expected.to be_disallowed(:update_deploy_key) }
    end

    context 'when current_user is admin' do
      let(:current_user) { admin }

      context 'when admin mode enabled', :enable_admin_mode do
        it { is_expected.to be_allowed(:read_deploy_key) }

        it { is_expected.to be_allowed(:update_deploy_key) }
      end

      context 'when admin mode disabled' do
        it { is_expected.to be_allowed(:read_deploy_key) }

        it { is_expected.to be_disallowed(:update_deploy_key) }
      end
    end
  end

  context 'when deploy key is private' do
    let_it_be(:deploy_key) { create(:deploy_key, :private) }

    context 'and current_user is nil' do
      let(:current_user) { nil }

      it { is_expected.to be_disallowed(:read_deploy_key) }

      it { is_expected.to be_disallowed(:update_deploy_key) }
    end

    context 'when current_user is admin' do
      let(:current_user) { admin }

      context 'when admin mode enabled', :enable_admin_mode do
        it { is_expected.to be_allowed(:read_deploy_key) }

        it { is_expected.to be_allowed(:update_deploy_key) }
      end

      context 'when admin mode disabled' do
        it { is_expected.to be_disallowed(:read_deploy_key) }

        it { is_expected.to be_disallowed(:update_deploy_key) }
      end
    end

    context 'when assigned to the project' do
      let_it_be(:deploy_keys_project) { create(:deploy_keys_project, deploy_key: deploy_key) }

      before_all do
        deploy_keys_project.project.add_maintainer(current_user)
      end

      it { is_expected.to be_allowed(:read_deploy_key) }

      it { is_expected.to be_allowed(:update_deploy_key) }
    end

    context 'when assigned to another project' do
      it { is_expected.to be_disallowed(:read_deploy_key) }

      it { is_expected.to be_disallowed(:update_deploy_key) }
    end
  end
end