summaryrefslogtreecommitdiff
path: root/spec/policies
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2020-01-30 21:08:47 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2020-01-30 21:08:47 +0000
commitc8f773a8593926f4f2dec6f446a3b3e59e9c9909 (patch)
tree4e5ea1d3b861ff99015f6112da567de7873868aa /spec/policies
parent929b887e5391dea7cb53b88b77b9a35351c87d99 (diff)
downloadgitlab-ce-c8f773a8593926f4f2dec6f446a3b3e59e9c9909.tar.gz
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'spec/policies')
-rw-r--r--spec/policies/global_policy_spec.rb56
1 files changed, 56 insertions, 0 deletions
diff --git a/spec/policies/global_policy_spec.rb b/spec/policies/global_policy_spec.rb
index 77727c6d13b..2d261241486 100644
--- a/spec/policies/global_policy_spec.rb
+++ b/spec/policies/global_policy_spec.rb
@@ -141,6 +141,34 @@ describe GlobalPolicy do
it { is_expected.to be_allowed(:access_api) }
end
end
+
+ context 'inactive user' do
+ before do
+ current_user.update!(confirmed_at: nil, confirmation_sent_at: 5.days.ago)
+ end
+
+ context 'when within the confirmation grace period' do
+ before do
+ allow(User).to receive(:allow_unconfirmed_access_for).and_return(10.days)
+ end
+
+ it { is_expected.to be_allowed(:access_api) }
+ end
+
+ context 'when confirmation grace period is expired' do
+ before do
+ allow(User).to receive(:allow_unconfirmed_access_for).and_return(2.days)
+ end
+
+ it { is_expected.not_to be_allowed(:access_api) }
+ end
+
+ it 'when `inactive_policy_condition` feature flag is turned off' do
+ stub_feature_flags(inactive_policy_condition: false)
+
+ is_expected.to be_allowed(:access_api)
+ end
+ end
end
describe 'receive notifications' do
@@ -202,6 +230,20 @@ describe GlobalPolicy do
it { is_expected.not_to be_allowed(:access_git) }
end
+ describe 'inactive user' do
+ before do
+ current_user.update!(confirmed_at: nil)
+ end
+
+ it { is_expected.not_to be_allowed(:access_git) }
+
+ it 'when `inactive_policy_condition` feature flag is turned off' do
+ stub_feature_flags(inactive_policy_condition: false)
+
+ is_expected.to be_allowed(:access_git)
+ end
+ end
+
context 'when terms are enforced' do
before do
enforce_terms
@@ -298,6 +340,20 @@ describe GlobalPolicy do
it { is_expected.not_to be_allowed(:use_slash_commands) }
end
+ describe 'inactive user' do
+ before do
+ current_user.update!(confirmed_at: nil)
+ end
+
+ it { is_expected.not_to be_allowed(:use_slash_commands) }
+
+ it 'when `inactive_policy_condition` feature flag is turned off' do
+ stub_feature_flags(inactive_policy_condition: false)
+
+ is_expected.to be_allowed(:use_slash_commands)
+ end
+ end
+
context 'when access locked' do
before do
current_user.lock_access!