diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2019-10-17 00:07:27 +0000 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2019-10-17 00:07:27 +0000 |
commit | b7e6df1abde1112ae1fa0778f45d6053eec3f052 (patch) | |
tree | a879d991b78433cbf419e4968c410982802dece3 /spec/policies/deploy_keys_project_policy_spec.rb | |
parent | e924e9e7cb9df21b3bc3d51d5f955da28ba3a225 (diff) | |
download | gitlab-ce-b7e6df1abde1112ae1fa0778f45d6053eec3f052.tar.gz |
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'spec/policies/deploy_keys_project_policy_spec.rb')
-rw-r--r-- | spec/policies/deploy_keys_project_policy_spec.rb | 73 |
1 files changed, 73 insertions, 0 deletions
diff --git a/spec/policies/deploy_keys_project_policy_spec.rb b/spec/policies/deploy_keys_project_policy_spec.rb new file mode 100644 index 00000000000..952da86b7a7 --- /dev/null +++ b/spec/policies/deploy_keys_project_policy_spec.rb @@ -0,0 +1,73 @@ +# frozen_string_literal: true + +require 'spec_helper' + +describe DeployKeysProjectPolicy do + subject { described_class.new(current_user, deploy_key.deploy_keys_project_for(project)) } + + describe 'updating a deploy_keys_project' do + context 'when a project maintainer' do + let(:current_user) { create(:user) } + + context 'tries to update private deploy key attached to project' do + let(:deploy_key) { create(:deploy_key, public: false) } + let(:project) { create(:project_empty_repo) } + + before do + project.add_maintainer(current_user) + project.deploy_keys << deploy_key + end + + it { is_expected.to be_disallowed(:update_deploy_keys_project) } + end + + context 'tries to update public deploy key attached to project' do + let(:deploy_key) { create(:deploy_key, public: true) } + let(:project) { create(:project_empty_repo) } + + before do + project.add_maintainer(current_user) + project.deploy_keys << deploy_key + end + + it { is_expected.to be_allowed(:update_deploy_keys_project) } + end + end + + context 'when a non-maintainer project member' do + let(:current_user) { create(:user) } + let(:project) { create(:project_empty_repo) } + + before do + project.add_developer(current_user) + project.deploy_keys << deploy_key + end + + context 'tries to update private deploy key attached to project' do + let(:deploy_key) { create(:deploy_key, public: false) } + + it { is_expected.to be_disallowed(:update_deploy_keys_project) } + end + + context 'tries to update public deploy key attached to project' do + let(:deploy_key) { create(:deploy_key, public: true) } + + it { is_expected.to be_disallowed(:update_deploy_keys_project) } + end + end + + context 'when a user is not a project member' do + let(:current_user) { create(:user) } + let(:project) { create(:project_empty_repo) } + let(:deploy_key) { create(:deploy_key, public: true) } + + before do + project.deploy_keys << deploy_key + end + + context 'tries to update public deploy key attached to project' do + it { is_expected.to be_disallowed(:update_deploy_keys_project) } + end + end + end +end |