2021-07-27 08:10:54 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
RSpec.describe Gitlab::Auth::Result do
|
2021-08-04 14:09:57 -04:00
|
|
|
let_it_be(:actor) { create(:user) }
|
|
|
|
|
2021-07-27 08:10:54 -04:00
|
|
|
subject { described_class.new(actor, nil, nil, []) }
|
|
|
|
|
|
|
|
context 'when actor is User' do
|
2021-08-04 14:09:57 -04:00
|
|
|
let_it_be(:actor) { create(:user) }
|
2021-07-27 08:10:54 -04:00
|
|
|
|
|
|
|
it 'returns auth_user' do
|
|
|
|
expect(subject.auth_user).to eq(actor)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not return deploy token' do
|
|
|
|
expect(subject.deploy_token).to be_nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when actor is Deploy token' do
|
2021-08-04 14:09:57 -04:00
|
|
|
let_it_be(:actor) { create(:deploy_token) }
|
2021-07-27 08:10:54 -04:00
|
|
|
|
|
|
|
it 'returns deploy token' do
|
|
|
|
expect(subject.deploy_token).to eq(actor)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not return auth_user' do
|
|
|
|
expect(subject.auth_user).to be_nil
|
|
|
|
end
|
|
|
|
end
|
2021-08-04 14:09:57 -04:00
|
|
|
|
|
|
|
describe '#authentication_abilities_include?' do
|
|
|
|
context 'when authentication abilities are empty' do
|
|
|
|
it 'returns false' do
|
|
|
|
expect(subject.authentication_abilities_include?(:read_code)).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authentication abilities are not empty' do
|
|
|
|
subject { described_class.new(actor, nil, nil, [:push_code]) }
|
|
|
|
|
|
|
|
it 'returns false when ability is not allowed' do
|
|
|
|
expect(subject.authentication_abilities_include?(:read_code)).to be_falsey
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true when ability is allowed' do
|
|
|
|
expect(subject.authentication_abilities_include?(:push_code)).to be_truthy
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#can_perform_action_on_project?' do
|
|
|
|
let(:project) { double }
|
|
|
|
|
|
|
|
it 'returns if actor can do perform given action on given project' do
|
|
|
|
expect(Ability).to receive(:allowed?).with(actor, :push_code, project).and_return(true)
|
|
|
|
expect(subject.can_perform_action_on_project?(:push_code, project)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns if actor cannot do perform given action on given project' do
|
|
|
|
expect(Ability).to receive(:allowed?).with(actor, :push_code, project).and_return(false)
|
|
|
|
expect(subject.can_perform_action_on_project?(:push_code, project)).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#can?' do
|
|
|
|
it 'returns if actor can do perform given action on given project' do
|
|
|
|
expect(actor).to receive(:can?).with(:push_code).and_return(true)
|
|
|
|
expect(subject.can?(:push_code)).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns if actor cannot do perform given action on given project' do
|
|
|
|
expect(actor).to receive(:can?).with(:push_code).and_return(false)
|
|
|
|
expect(subject.can?(:push_code)).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
2021-07-27 08:10:54 -04:00
|
|
|
end
|