summaryrefslogtreecommitdiff
path: root/spec/services/groups/group_links/create_service_spec.rb
blob: 36faa69577eb5b36ba27c1bcc7fec30e68d001da (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
# frozen_string_literal: true

require 'spec_helper'

describe Groups::GroupLinks::CreateService, '#execute' do
  let(:parent_group_user) { create(:user) }
  let(:group_user) { create(:user) }
  let(:child_group_user) { create(:user) }

  let_it_be(:group_parent) { create(:group, :private) }
  let_it_be(:group) { create(:group, :private, parent: group_parent) }
  let_it_be(:group_child) { create(:group, :private, parent: group) }

  let_it_be(:shared_group_parent) { create(:group, :private) }
  let_it_be(:shared_group) { create(:group, :private, parent: shared_group_parent) }
  let_it_be(:shared_group_child) { create(:group, :private, parent: shared_group) }

  let_it_be(:project_parent) { create(:project, group: shared_group_parent) }
  let_it_be(:project) { create(:project, group: shared_group) }
  let_it_be(:project_child) { create(:project, group: shared_group_child) }

  let(:opts) do
    {
      shared_group_access: Gitlab::Access::DEVELOPER,
      expires_at: nil
    }
  end
  let(:user) { group_user }

  subject { described_class.new(group, user, opts) }

  before do
    group.add_guest(group_user)
    shared_group.add_owner(group_user)
  end

  it 'adds group to another group' do
    expect { subject.execute(shared_group) }.to change { group.shared_group_links.count }.from(0).to(1)
  end

  it 'returns false if shared group is blank' do
    expect { subject.execute(nil) }.not_to change { group.shared_group_links.count }
  end

  context 'user does not have access to group' do
    let(:user) { create(:user) }

    before do
      shared_group.add_owner(user)
    end

    it 'returns error' do
      result = subject.execute(shared_group)

      expect(result[:status]).to eq(:error)
      expect(result[:http_status]).to eq(404)
    end
  end

  context 'user does not have admin access to shared group' do
    let(:user) { create(:user) }

    before do
      group.add_guest(user)
      shared_group.add_developer(user)
    end

    it 'returns error' do
      result = subject.execute(shared_group)

      expect(result[:status]).to eq(:error)
      expect(result[:http_status]).to eq(404)
    end
  end

  context 'group hierarchies' do
    before do
      group_parent.add_owner(parent_group_user)
      group.add_owner(group_user)
      group_child.add_owner(child_group_user)
    end

    context 'group user' do
      let(:user) { group_user }

      it 'create proper authorizations' do
        subject.execute(shared_group)

        expect(Ability.allowed?(user, :read_project, project_parent)).to be_falsey
        expect(Ability.allowed?(user, :read_project, project)).to be_truthy
        expect(Ability.allowed?(user, :read_project, project_child)).to be_truthy
      end
    end

    context 'parent group user' do
      let(:user) { parent_group_user }

      it 'create proper authorizations' do
        subject.execute(shared_group)

        expect(Ability.allowed?(user, :read_project, project_parent)).to be_falsey
        expect(Ability.allowed?(user, :read_project, project)).to be_falsey
        expect(Ability.allowed?(user, :read_project, project_child)).to be_falsey
      end
    end

    context 'child group user' do
      let(:user) { child_group_user }

      it 'create proper authorizations' do
        subject.execute(shared_group)

        expect(Ability.allowed?(user, :read_project, project_parent)).to be_falsey
        expect(Ability.allowed?(user, :read_project, project)).to be_falsey
        expect(Ability.allowed?(user, :read_project, project_child)).to be_falsey
      end
    end
  end
end