summaryrefslogtreecommitdiff
path: root/spec/models/project_team_spec.rb
diff options
context:
space:
mode:
authorDmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>2014-06-20 12:54:03 +0300
committerDmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>2014-06-20 12:54:03 +0300
commit0771109bb8f7d8a1b8132439806675110b1c9fd3 (patch)
tree1ad7957edd28a94e1a3e2c0edf9e518c7b73e34a /spec/models/project_team_spec.rb
parent995d193d32c96a608435f232f67efcaf48cba67c (diff)
downloadgitlab-ce-0771109bb8f7d8a1b8132439806675110b1c9fd3.tar.gz
Fix permission issue with highest access level for group
If user was a member of both group and project and group access level was higher it was not respected and user got lowest project access level. Now it is fixed and user get highest access level Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
Diffstat (limited to 'spec/models/project_team_spec.rb')
-rw-r--r--spec/models/project_team_spec.rb72
1 files changed, 51 insertions, 21 deletions
diff --git a/spec/models/project_team_spec.rb b/spec/models/project_team_spec.rb
index 1cc37719e7a..34c1a686c96 100644
--- a/spec/models/project_team_spec.rb
+++ b/spec/models/project_team_spec.rb
@@ -1,36 +1,66 @@
require "spec_helper"
describe ProjectTeam do
- let(:group) { create(:group) }
- let(:project) { create(:empty_project, group: group) }
-
let(:master) { create(:user) }
let(:reporter) { create(:user) }
let(:guest) { create(:user) }
let(:nonmember) { create(:user) }
- before do
- group.add_user(master, Gitlab::Access::MASTER)
- group.add_user(reporter, Gitlab::Access::REPORTER)
- group.add_user(guest, Gitlab::Access::GUEST)
+ context 'personal project' do
+ let(:project) { create(:empty_project) }
- # Add group guest as master to this project
- # to test project access priority over group members
- project.team << [guest, :master]
- end
+ before do
+ project.team << [master, :master]
+ project.team << [reporter, :reporter]
+ project.team << [guest, :guest]
+ end
- describe 'members collection' do
- it { project.team.masters.should include(master) }
- it { project.team.masters.should include(guest) }
- it { project.team.masters.should_not include(reporter) }
- it { project.team.masters.should_not include(nonmember) }
+ describe 'members collection' do
+ it { project.team.masters.should include(master) }
+ it { project.team.masters.should_not include(guest) }
+ it { project.team.masters.should_not include(reporter) }
+ it { project.team.masters.should_not include(nonmember) }
+ end
+
+ describe 'access methods' do
+ it { project.team.master?(master).should be_true }
+ it { project.team.master?(guest).should be_false }
+ it { project.team.master?(reporter).should be_false }
+ it { project.team.master?(nonmember).should be_false }
+ end
end
- describe 'access methods' do
- it { project.team.master?(master).should be_true }
- it { project.team.master?(guest).should be_true }
- it { project.team.master?(reporter).should be_false }
- it { project.team.master?(nonmember).should be_false }
+ context 'group project' do
+ let(:group) { create(:group) }
+ let(:project) { create(:empty_project, group: group) }
+
+ before do
+ group.add_user(master, Gitlab::Access::MASTER)
+ group.add_user(reporter, Gitlab::Access::REPORTER)
+ group.add_user(guest, Gitlab::Access::GUEST)
+
+ # If user is a group and a project member - GitLab uses highest permission
+ # So we add group guest as master and add group master as guest
+ # to this project to test highest access
+ project.team << [guest, :master]
+ project.team << [master, :guest]
+ end
+
+ describe 'members collection' do
+ it { project.team.reporters.should include(reporter) }
+ it { project.team.masters.should include(master) }
+ it { project.team.masters.should include(guest) }
+ it { project.team.masters.should_not include(reporter) }
+ it { project.team.masters.should_not include(nonmember) }
+ end
+
+ describe 'access methods' do
+ it { project.team.reporter?(reporter).should be_true }
+ it { project.team.master?(master).should be_true }
+ it { project.team.master?(guest).should be_true }
+ it { project.team.master?(reporter).should be_false }
+ it { project.team.master?(nonmember).should be_false }
+ end
end
end