summaryrefslogtreecommitdiff
path: root/spec/lib/gitlab/user_access_spec.rb
diff options
context:
space:
mode:
authorRobert Speicher <rspeicher@gmail.com>2016-07-13 13:57:30 -0500
committerRobert Speicher <rspeicher@gmail.com>2016-07-13 13:57:30 -0500
commit530f5158e297f3cde27f3566cfe13bad74ba3b50 (patch)
tree270507d396bacdae8a4aa3489edfff0f47b718ca /spec/lib/gitlab/user_access_spec.rb
parent9b0ef1559f78e58b398e428763ff97dfdc53e186 (diff)
downloadgitlab-ce-530f5158e297f3cde27f3566cfe13bad74ba3b50.tar.gz
Revert "Merge branch '18193-developers-can-merge' into 'master' "
This reverts commit 9ca633eb4c62231e4ddff5466c723cf8e2bdb25d, reversing changes made to fb229bbf7970ba908962b837b270adf56f14098f.
Diffstat (limited to 'spec/lib/gitlab/user_access_spec.rb')
-rw-r--r--spec/lib/gitlab/user_access_spec.rb88
1 files changed, 0 insertions, 88 deletions
diff --git a/spec/lib/gitlab/user_access_spec.rb b/spec/lib/gitlab/user_access_spec.rb
deleted file mode 100644
index aa9ec243498..00000000000
--- a/spec/lib/gitlab/user_access_spec.rb
+++ /dev/null
@@ -1,88 +0,0 @@
-require 'spec_helper'
-
-describe Gitlab::UserAccess, lib: true do
- let(:access) { Gitlab::UserAccess.new(user, project: project) }
- let(:project) { create(:project) }
- let(:user) { create(:user) }
-
- describe 'can_push_to_branch?' do
- describe 'push to none protected branch' do
- it 'returns true if user is a master' do
- project.team << [user, :master]
- expect(access.can_push_to_branch?('random_branch')).to be_truthy
- end
-
- it 'returns true if user is a developer' do
- project.team << [user, :developer]
- expect(access.can_push_to_branch?('random_branch')).to be_truthy
- end
-
- it 'returns false if user is a reporter' do
- project.team << [user, :reporter]
- expect(access.can_push_to_branch?('random_branch')).to be_falsey
- end
- end
-
- describe 'push to protected branch' do
- let(:branch) { create :protected_branch, project: project }
-
- it 'returns true if user is a master' do
- project.team << [user, :master]
- expect(access.can_push_to_branch?(branch.name)).to be_truthy
- end
-
- it 'returns false if user is a developer' do
- project.team << [user, :developer]
- expect(access.can_push_to_branch?(branch.name)).to be_falsey
- end
-
- it 'returns false if user is a reporter' do
- project.team << [user, :reporter]
- expect(access.can_push_to_branch?(branch.name)).to be_falsey
- end
- end
-
- describe 'push to protected branch if allowed for developers' do
- before do
- @branch = create :protected_branch, project: project, developers_can_push: true
- end
-
- it 'returns true if user is a master' do
- project.team << [user, :master]
- expect(access.can_push_to_branch?(@branch.name)).to be_truthy
- end
-
- it 'returns true if user is a developer' do
- project.team << [user, :developer]
- expect(access.can_push_to_branch?(@branch.name)).to be_truthy
- end
-
- it 'returns false if user is a reporter' do
- project.team << [user, :reporter]
- expect(access.can_push_to_branch?(@branch.name)).to be_falsey
- end
- end
-
- describe 'merge to protected branch if allowed for developers' do
- before do
- @branch = create :protected_branch, project: project, developers_can_merge: true
- end
-
- it 'returns true if user is a master' do
- project.team << [user, :master]
- expect(access.can_merge_to_branch?(@branch.name)).to be_truthy
- end
-
- it 'returns true if user is a developer' do
- project.team << [user, :developer]
- expect(access.can_merge_to_branch?(@branch.name)).to be_truthy
- end
-
- it 'returns false if user is a reporter' do
- project.team << [user, :reporter]
- expect(access.can_merge_to_branch?(@branch.name)).to be_falsey
- end
- end
-
- end
-end