summaryrefslogtreecommitdiff
path: root/spec/lib/gitlab/git_access_wiki_spec.rb
blob: 27175dc8c443b4c7019514a475c4059f193561fa (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
# frozen_string_literal: true

require 'spec_helper'

RSpec.describe Gitlab::GitAccessWiki do
  let_it_be(:user) { create(:user) }
  let_it_be(:project) { create(:project, :wiki_repo) }
  let_it_be(:wiki) { create(:project_wiki, project: project) }

  let(:changes) { ['6f6d7e7ed 570e7b2ab refs/heads/master'] }
  let(:authentication_abilities) { %i[read_project download_code push_code] }
  let(:redirected_path) { nil }

  let(:access) do
    described_class.new(user, wiki, 'web',
                        authentication_abilities: authentication_abilities,
                        redirected_path: redirected_path)
  end

  describe '#push_access_check' do
    subject { access.check('git-receive-pack', changes) }

    context 'when user can :create_wiki' do
      before do
        project.add_developer(user)
      end

      it { expect { subject }.not_to raise_error }

      context 'when in a read-only GitLab instance' do
        let(:message) { "You can't push code to a read-only GitLab instance." }

        before do
          allow(Gitlab::Database).to receive(:read_only?) { true }
        end

        it_behaves_like 'forbidden git access'
      end
    end

    context 'the user cannot :create_wiki' do
      it_behaves_like 'not-found git access' do
        let(:message) { 'The wiki you were looking for could not be found.' }
      end
    end
  end

  describe '#check_download_access!' do
    subject { access.check('git-upload-pack', Gitlab::GitAccess::ANY) }

    context 'the user can :download_wiki_code' do
      before do
        project.add_developer(user)
      end

      context 'when wiki feature is disabled' do
        before do
          project.project_feature.update_attribute(:wiki_access_level, ProjectFeature::DISABLED)
        end

        it_behaves_like 'forbidden git access' do
          let(:message) { include('wiki') }
        end
      end

      context 'when the repository does not exist' do
        before do
          allow(wiki.repository).to receive(:exists?).and_return(false)
        end

        it_behaves_like 'not-found git access' do
          let(:message) { include('for this wiki') }
        end
      end
    end

    context 'the user cannot :download_wiki_code' do
      it_behaves_like 'not-found git access' do
        let(:message) { include('wiki') }
      end
    end

    context 'when the actor is a deploy token' do
      let_it_be(:actor) { create(:deploy_token, projects: [project]) }
      let_it_be(:user) { actor }

      before do
        project.project_feature.update_attribute(:wiki_access_level, wiki_access_level)
      end

      subject { access.check('git-upload-pack', changes) }

      context 'when the wiki is enabled' do
        let(:wiki_access_level) { ProjectFeature::ENABLED }

        it { expect { subject }.not_to raise_error }
      end

      context 'when the wiki is disabled' do
        let(:wiki_access_level) { ProjectFeature::DISABLED }

        it_behaves_like 'forbidden git access' do
          let(:message) { 'You are not allowed to download files from this wiki.' }
        end
      end
    end
  end
end