# frozen_string_literal: true require 'spec_helper' RSpec.describe BasePolicy do include ExternalAuthorizationServiceHelpers include AdminModeHelper describe '.class_for' do it 'detects policy class based on the subject ancestors' do expect(DeclarativePolicy.class_for(GenericCommitStatus.new)).to eq(CommitStatusPolicy) end it 'detects policy class for a presented subject' do presentee = Ci::BuildPresenter.new(Ci::Build.new) expect(DeclarativePolicy.class_for(presentee)).to eq(Ci::BuildPolicy) end it 'uses GlobalPolicy when :global is given' do expect(DeclarativePolicy.class_for(:global)).to eq(GlobalPolicy) end end shared_examples 'admin only access' do |policy| let(:current_user) { build_stubbed(:user) } subject { described_class.new(current_user, nil) } it { is_expected.not_to be_allowed(policy) } context 'for admins' do let(:current_user) { build_stubbed(:admin) } it 'allowed when in admin mode' do enable_admin_mode!(current_user) is_expected.to be_allowed(policy) end it 'prevented when not in admin mode' do is_expected.not_to be_allowed(policy) end end context 'for anonymous' do let(:current_user) { nil } it { is_expected.not_to be_allowed(policy) } end end describe 'read cross project' do let(:current_user) { build_stubbed(:user) } let(:user) { build_stubbed(:user) } subject { described_class.new(current_user, [user]) } it { is_expected.to be_allowed(:read_cross_project) } context 'for anonymous' do let(:current_user) { nil } it { is_expected.to be_allowed(:read_cross_project) } end context 'when an external authorization service is enabled' do before do enable_external_authorization_service_check end it_behaves_like 'admin only access', :read_cross_project end end describe 'full private access' do it_behaves_like 'admin only access', :read_all_resources end describe 'change_repository_storage' do it_behaves_like 'admin only access', :change_repository_storage end end