Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
gitlab-ce
Commits
15ba6ea1
Commit
15ba6ea1
authored
Sep 24, 2014
by
Dmitriy Zaporozhets
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Refactor Gitlab::GitAccess tests
parent
3aa7132a
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
66 additions
and
119 deletions
+66
-119
spec/lib/gitlab/git_access_spec.rb
spec/lib/gitlab/git_access_spec.rb
+66
-119
No files found.
spec/lib/gitlab/git_access_spec.rb
View file @
15ba6ea1
...
@@ -49,132 +49,79 @@ describe Gitlab::GitAccess do
...
@@ -49,132 +49,79 @@ describe Gitlab::GitAccess do
end
end
describe
'push_allowed?'
do
describe
'push_allowed?'
do
describe
'master permissions'
do
def
protect_feature_branch
before
{
project
.
team
<<
[
user
,
:master
]
}
create
(
:protected_branch
,
name:
'feature'
,
project:
project
)
end
context
'push to new branch'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
new_branch_changes
)
}
def
changes
{
it
{
should
be_true
}
push_new_branch:
'000000000 570e7b2ab refs/heads/wow'
,
push_master:
'6f6d7e7ed 570e7b2ab refs/heads/master'
,
push_protected_branch:
'6f6d7e7ed 570e7b2ab refs/heads/feature'
,
push_remove_protected_branch:
'570e7b2ab 000000000 refs/heads/feature'
,
push_tag:
'6f6d7e7ed 570e7b2ab refs/tags/v1.0.0'
,
push_new_tag:
'000000000 570e7b2ab refs/tags/v7.8.9'
,
push_all:
[
'6f6d7e7ed 570e7b2ab refs/heads/master'
,
'6f6d7e7ed 570e7b2ab refs/heads/feature'
]
}
end
def
self
.
permissions_matrix
{
master:
{
push_new_branch:
true
,
push_master:
true
,
push_protected_branch:
true
,
push_remove_protected_branch:
false
,
push_tag:
true
,
push_new_tag:
true
,
push_all:
true
,
},
developer:
{
push_new_branch:
true
,
push_master:
true
,
push_protected_branch:
false
,
push_remove_protected_branch:
false
,
push_tag:
false
,
push_new_tag:
true
,
push_all:
false
,
},
reporter:
{
push_new_branch:
false
,
push_master:
false
,
push_protected_branch:
false
,
push_remove_protected_branch:
false
,
push_tag:
false
,
push_new_tag:
false
,
push_all:
false
,
},
guest:
{
push_new_branch:
false
,
push_master:
false
,
push_protected_branch:
false
,
push_remove_protected_branch:
false
,
push_tag:
false
,
push_new_tag:
false
,
push_all:
false
,
}
}
end
permissions_matrix
.
keys
.
each
do
|
role
|
describe
"
#{
role
}
access"
do
before
{
protect_feature_branch
}
before
{
project
.
team
<<
[
user
,
role
]
}
permissions_matrix
[
role
].
each
do
|
action
,
allowed
|
context
action
do
subject
{
access
.
push_allowed?
(
user
,
project
,
changes
[
action
])
}
it
{
should
allowed
?
be_true
:
be_false
}
end
end
context
'push to master branch'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
master_changes
)
}
it
{
should
be_true
}
end
end
context
'push to protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
master_changes
)
}
it
{
should
be_true
}
end
end
context
'remove protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
remove_master_changes
)
}
it
{
should
be_false
}
end
end
context
'push to existing tag'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
tag_changes
)
}
it
{
should
be_true
}
end
context
'push new tag'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
new_tag_changes
)
}
it
{
should
be_true
}
end
context
'push new tag and protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
[
new_tag_changes
,
master_changes
])
}
it
{
should
be_true
}
end
end
describe
'developer permissions'
do
before
{
project
.
team
<<
[
user
,
:developer
]
}
context
'push to new branch'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
new_branch_changes
)
}
it
{
should
be_true
}
end
context
'push to master branch'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
master_changes
)
}
it
{
should
be_true
}
end
context
'push to protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
master_changes
)
}
it
{
should
be_false
}
end
context
'remove protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
remove_master_changes
)
}
it
{
should
be_false
}
end
context
'push to existing tag'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
tag_changes
)
}
it
{
should
be_false
}
end
context
'push new tag'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
new_tag_changes
)
}
it
{
should
be_true
}
end
context
'push new tag and protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
[
new_tag_changes
,
master_changes
])
}
it
{
should
be_false
}
end
end
end
describe
'forced_push?'
do
subject
{
access
.
forced_push?
(
project
,
'111111'
,
'222222'
)
}
it
{
should
be_false
}
end
def
new_branch_changes
'000000000 570e7b2ab refs/heads/wow'
end
def
master_changes
'6f6d7e7ed 570e7b2ab refs/heads/master'
end
def
remove_master_changes
'570e7b2ab 000000000 refs/heads/master'
end
def
tag_changes
'6f6d7e7ed 570e7b2ab refs/tags/v1.0.0'
end
def
new_tag_changes
'000000000 570e7b2ab refs/tags/v7.8.9'
end
def
protect_master
create
(
:protected_branch
,
name:
'master'
,
project:
project
)
end
end
end
end
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment