summaryrefslogtreecommitdiff
path: root/spec/policies/project_policy_spec.rb
diff options
context:
space:
mode:
Diffstat (limited to 'spec/policies/project_policy_spec.rb')
-rw-r--r--spec/policies/project_policy_spec.rb88
1 files changed, 69 insertions, 19 deletions
diff --git a/spec/policies/project_policy_spec.rb b/spec/policies/project_policy_spec.rb
index bde83d647db..ca4ca2eb7a0 100644
--- a/spec/policies/project_policy_spec.rb
+++ b/spec/policies/project_policy_spec.rb
@@ -103,39 +103,89 @@ RSpec.describe ProjectPolicy do
end
context 'creating_merge_request_in' do
- context 'when project is public' do
- let(:project) { public_project }
+ context 'when the current_user can download_code' do
+ before do
+ expect(subject).to receive(:allowed?).with(:download_code).and_return(true)
+ allow(subject).to receive(:allowed?).with(any_args).and_call_original
+ end
- context 'when the current_user is guest' do
- let(:current_user) { guest }
+ context 'when project is public' do
+ let(:project) { public_project }
+
+ context 'when the current_user is guest' do
+ let(:current_user) { guest }
- it { is_expected.to be_allowed(:create_merge_request_in) }
+ it { is_expected.to be_allowed(:create_merge_request_in) }
+ end
end
- end
- context 'when project is internal' do
- let(:project) { internal_project }
+ context 'when project is internal' do
+ let(:project) { internal_project }
- context 'when the current_user is guest' do
- let(:current_user) { guest }
+ context 'when the current_user is guest' do
+ let(:current_user) { guest }
- it { is_expected.to be_allowed(:create_merge_request_in) }
+ it { is_expected.to be_allowed(:create_merge_request_in) }
+ end
+ end
+
+ context 'when project is private' do
+ let(:project) { private_project }
+
+ context 'when the current_user is guest' do
+ let(:current_user) { guest }
+
+ it { is_expected.not_to be_allowed(:create_merge_request_in) }
+ end
+
+ context 'when the current_user is reporter or above' do
+ let(:current_user) { reporter }
+
+ it { is_expected.to be_allowed(:create_merge_request_in) }
+ end
end
end
- context 'when project is private' do
- let(:project) { private_project }
+ context 'when the current_user can not download code' do
+ before do
+ expect(subject).to receive(:allowed?).with(:download_code).and_return(false)
+ allow(subject).to receive(:allowed?).with(any_args).and_call_original
+ end
- context 'when the current_user is guest' do
- let(:current_user) { guest }
+ context 'when project is public' do
+ let(:project) { public_project }
+
+ context 'when the current_user is guest' do
+ let(:current_user) { guest }
- it { is_expected.not_to be_allowed(:create_merge_request_in) }
+ it { is_expected.not_to be_allowed(:create_merge_request_in) }
+ end
end
- context 'when the current_user is reporter or above' do
- let(:current_user) { reporter }
+ context 'when project is internal' do
+ let(:project) { internal_project }
- it { is_expected.to be_allowed(:create_merge_request_in) }
+ context 'when the current_user is guest' do
+ let(:current_user) { guest }
+
+ it { is_expected.not_to be_allowed(:create_merge_request_in) }
+ end
+ end
+
+ context 'when project is private' do
+ let(:project) { private_project }
+
+ context 'when the current_user is guest' do
+ let(:current_user) { guest }
+
+ it { is_expected.not_to be_allowed(:create_merge_request_in) }
+ end
+
+ context 'when the current_user is reporter or above' do
+ let(:current_user) { reporter }
+
+ it { is_expected.not_to be_allowed(:create_merge_request_in) }
+ end
end
end
end