summaryrefslogtreecommitdiff
path: root/spec/policies
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2021-02-10 23:24:31 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2021-02-10 23:24:31 +0000
commit83380b5e7f6489d6429af539ebd2fd1bb973d90f (patch)
tree60df92052073f1619b2b3515b5aa3d928fc60f9c /spec/policies
parent21585f82e753689cc46f59c02d8e207756d794bf (diff)
downloadgitlab-ce-83380b5e7f6489d6429af539ebd2fd1bb973d90f.tar.gz
Add latest changes from gitlab-org/security/gitlab@13-8-stable-ee
Diffstat (limited to 'spec/policies')
-rw-r--r--spec/policies/project_policy_spec.rb72
1 files changed, 72 insertions, 0 deletions
diff --git a/spec/policies/project_policy_spec.rb b/spec/policies/project_policy_spec.rb
index e6650549f7f..8bd4a463f87 100644
--- a/spec/policies/project_policy_spec.rb
+++ b/spec/policies/project_policy_spec.rb
@@ -992,6 +992,78 @@ RSpec.describe ProjectPolicy do
it { is_expected.to be_allowed(:read_analytics) }
end
+ context 'with various analytics features' do
+ let_it_be(:project_with_analytics_disabled) { create(:project, :analytics_disabled) }
+ let_it_be(:project_with_analytics_private) { create(:project, :analytics_private) }
+ let_it_be(:project_with_analytics_enabled) { create(:project, :analytics_enabled) }
+
+ before do
+ project_with_analytics_disabled.add_developer(developer)
+ project_with_analytics_private.add_developer(developer)
+ project_with_analytics_enabled.add_developer(developer)
+ end
+
+ context 'when analytics is enabled for the project' do
+ let(:project) { project_with_analytics_disabled }
+
+ context 'for guest user' do
+ let(:current_user) { guest }
+
+ it { is_expected.to be_disallowed(:read_cycle_analytics) }
+ it { is_expected.to be_disallowed(:read_insights) }
+ it { is_expected.to be_disallowed(:read_repository_graphs) }
+ end
+
+ context 'for developer' do
+ let(:current_user) { developer }
+
+ it { is_expected.to be_disallowed(:read_cycle_analytics) }
+ it { is_expected.to be_disallowed(:read_insights) }
+ it { is_expected.to be_disallowed(:read_repository_graphs) }
+ end
+ end
+
+ context 'when analytics is private for the project' do
+ let(:project) { project_with_analytics_private }
+
+ context 'for guest user' do
+ let(:current_user) { guest }
+
+ it { is_expected.to be_disallowed(:read_cycle_analytics) }
+ it { is_expected.to be_disallowed(:read_insights) }
+ it { is_expected.to be_disallowed(:read_repository_graphs) }
+ end
+
+ context 'for developer' do
+ let(:current_user) { developer }
+
+ it { is_expected.to be_allowed(:read_cycle_analytics) }
+ it { is_expected.to be_allowed(:read_insights) }
+ it { is_expected.to be_allowed(:read_repository_graphs) }
+ end
+ end
+
+ context 'when analytics is enabled for the project' do
+ let(:project) { project_with_analytics_private }
+
+ context 'for guest user' do
+ let(:current_user) { guest }
+
+ it { is_expected.to be_disallowed(:read_cycle_analytics) }
+ it { is_expected.to be_disallowed(:read_insights) }
+ it { is_expected.to be_disallowed(:read_repository_graphs) }
+ end
+
+ context 'for developer' do
+ let(:current_user) { developer }
+
+ it { is_expected.to be_allowed(:read_cycle_analytics) }
+ it { is_expected.to be_allowed(:read_insights) }
+ it { is_expected.to be_allowed(:read_repository_graphs) }
+ end
+ end
+ end
+
context 'project member' do
let(:project) { private_project }