diff options
Diffstat (limited to 'spec/lib/gitlab/user_access_spec.rb')
-rw-r--r-- | spec/lib/gitlab/user_access_spec.rb | 34 |
1 files changed, 17 insertions, 17 deletions
diff --git a/spec/lib/gitlab/user_access_spec.rb b/spec/lib/gitlab/user_access_spec.rb index b1de3e21b77..1ae45d41f2d 100644 --- a/spec/lib/gitlab/user_access_spec.rb +++ b/spec/lib/gitlab/user_access_spec.rb @@ -219,19 +219,19 @@ RSpec.describe Gitlab::UserAccess do describe '#can_create_tag?' do describe 'push to none protected tag' do it 'returns true if user is a maintainer' do - project.add_user(user, :maintainer) + project.add_member(user, :maintainer) expect(access.can_create_tag?('random_tag')).to be_truthy end it 'returns true if user is a developer' do - project.add_user(user, :developer) + project.add_member(user, :developer) expect(access.can_create_tag?('random_tag')).to be_truthy end it 'returns false if user is a reporter' do - project.add_user(user, :reporter) + project.add_member(user, :reporter) expect(access.can_create_tag?('random_tag')).to be_falsey end @@ -242,19 +242,19 @@ RSpec.describe Gitlab::UserAccess do let(:not_existing_tag) { create :protected_tag, project: project } it 'returns true if user is a maintainer' do - project.add_user(user, :maintainer) + project.add_member(user, :maintainer) expect(access.can_create_tag?(tag.name)).to be_truthy end it 'returns false if user is a developer' do - project.add_user(user, :developer) + project.add_member(user, :developer) expect(access.can_create_tag?(tag.name)).to be_falsey end it 'returns false if user is a reporter' do - project.add_user(user, :reporter) + project.add_member(user, :reporter) expect(access.can_create_tag?(tag.name)).to be_falsey end @@ -266,19 +266,19 @@ RSpec.describe Gitlab::UserAccess do end it 'returns true if user is a maintainer' do - project.add_user(user, :maintainer) + project.add_member(user, :maintainer) expect(access.can_create_tag?(@tag.name)).to be_truthy end it 'returns true if user is a developer' do - project.add_user(user, :developer) + project.add_member(user, :developer) expect(access.can_create_tag?(@tag.name)).to be_truthy end it 'returns false if user is a reporter' do - project.add_user(user, :reporter) + project.add_member(user, :reporter) expect(access.can_create_tag?(@tag.name)).to be_falsey end @@ -288,19 +288,19 @@ RSpec.describe Gitlab::UserAccess do describe '#can_delete_branch?' do describe 'delete unprotected branch' do it 'returns true if user is a maintainer' do - project.add_user(user, :maintainer) + project.add_member(user, :maintainer) expect(access.can_delete_branch?('random_branch')).to be_truthy end it 'returns true if user is a developer' do - project.add_user(user, :developer) + project.add_member(user, :developer) expect(access.can_delete_branch?('random_branch')).to be_truthy end it 'returns false if user is a reporter' do - project.add_user(user, :reporter) + project.add_member(user, :reporter) expect(access.can_delete_branch?('random_branch')).to be_falsey end @@ -310,19 +310,19 @@ RSpec.describe Gitlab::UserAccess do let(:branch) { create(:protected_branch, project: project, name: "test") } it 'returns true if user is a maintainer' do - project.add_user(user, :maintainer) + project.add_member(user, :maintainer) expect(access.can_delete_branch?(branch.name)).to be_truthy end it 'returns false if user is a developer' do - project.add_user(user, :developer) + project.add_member(user, :developer) expect(access.can_delete_branch?(branch.name)).to be_falsey end it 'returns false if user is a reporter' do - project.add_user(user, :reporter) + project.add_member(user, :reporter) expect(access.can_delete_branch?(branch.name)).to be_falsey end @@ -334,7 +334,7 @@ RSpec.describe Gitlab::UserAccess do context 'when user cannot push_code to a project repository (eg. as a guest)' do it 'is false' do - project.add_user(user, :guest) + project.add_member(user, :guest) expect(access.can_push_for_ref?(ref)).to be_falsey end @@ -342,7 +342,7 @@ RSpec.describe Gitlab::UserAccess do context 'when user can push_code to a project repository (eg. as a developer)' do it 'is true' do - project.add_user(user, :developer) + project.add_member(user, :developer) expect(access.can_push_for_ref?(ref)).to be_truthy end |