2019-10-24 20:06:14 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2016-12-15 14:30:35 -05:00
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-06-24 02:09:01 -04:00
|
|
|
RSpec.describe GroupPolicy do
|
2019-03-27 09:10:29 -04:00
|
|
|
include_context 'GroupPolicy context'
|
2017-04-06 17:09:58 -04:00
|
|
|
|
2019-10-06 05:06:13 -04:00
|
|
|
context 'public group with no user' do
|
2022-01-07 19:14:32 -05:00
|
|
|
let(:group) { create(:group, :public, :crm_enabled) }
|
2016-12-15 14:30:35 -05:00
|
|
|
let(:current_user) { nil }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2017-12-06 06:36:11 -05:00
|
|
|
expect_disallowed(:upload_file)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*reporter_permissions)
|
2017-09-13 16:32:58 -04:00
|
|
|
expect_disallowed(*developer_permissions)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect_disallowed(*maintainer_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*owner_permissions)
|
2017-11-27 15:26:50 -05:00
|
|
|
expect_disallowed(:read_namespace)
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-01-12 07:14:10 -05:00
|
|
|
context 'public group with user who is not a member' do
|
|
|
|
let(:group) { create(:group, :public, :crm_enabled) }
|
|
|
|
let(:current_user) { create(:user) }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
|
|
|
expect_disallowed(:upload_file)
|
|
|
|
expect_disallowed(*reporter_permissions)
|
|
|
|
expect_disallowed(*developer_permissions)
|
|
|
|
expect_disallowed(*maintainer_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
|
|
|
expect_disallowed(:read_namespace)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'private group that has been invited to a public project and with no user' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let(:project) { create(:project, :public, group: create(:group, :crm_enabled)) }
|
2019-02-11 06:53:58 -05:00
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
before do
|
2019-03-13 06:54:06 -04:00
|
|
|
create(:project_group_link, project: project, group: group)
|
2019-02-11 06:53:58 -05:00
|
|
|
end
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_disallowed(*public_permissions)
|
|
|
|
expect_disallowed(*reporter_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
|
|
|
end
|
2019-02-11 06:53:58 -05:00
|
|
|
end
|
|
|
|
|
2022-01-12 07:14:10 -05:00
|
|
|
context 'private group that has been invited to a public project and with a foreign user' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let(:project) { create(:project, :public, group: create(:group, :crm_enabled)) }
|
2019-02-11 06:53:58 -05:00
|
|
|
let(:current_user) { create(:user) }
|
|
|
|
|
|
|
|
before do
|
2019-03-13 06:54:06 -04:00
|
|
|
create(:project_group_link, project: project, group: group)
|
2019-02-11 06:53:58 -05:00
|
|
|
end
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_disallowed(*public_permissions)
|
|
|
|
expect_disallowed(*reporter_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
|
|
|
end
|
2019-02-11 06:53:58 -05:00
|
|
|
end
|
|
|
|
|
2018-04-23 12:12:26 -04:00
|
|
|
context 'has projects' do
|
|
|
|
let(:current_user) { create(:user) }
|
|
|
|
let(:project) { create(:project, namespace: group) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
project.add_developer(current_user)
|
|
|
|
end
|
|
|
|
|
2022-01-12 07:14:10 -05:00
|
|
|
it { expect_allowed(*(public_permissions - [:read_counts])) }
|
2018-04-23 12:12:26 -04:00
|
|
|
|
2019-07-24 05:20:54 -04:00
|
|
|
context 'in subgroups' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let(:subgroup) { create(:group, :private, :crm_enabled, parent: group) }
|
2018-04-23 12:12:26 -04:00
|
|
|
let(:project) { create(:project, namespace: subgroup) }
|
|
|
|
|
2022-01-12 07:14:10 -05:00
|
|
|
it { expect_allowed(*(public_permissions - [:read_counts])) }
|
2018-04-23 12:12:26 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-08-18 14:10:10 -04:00
|
|
|
shared_examples 'deploy token does not get confused with user' do
|
|
|
|
before do
|
|
|
|
deploy_token.update!(id: user_id)
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:deploy_token) { create(:deploy_token) }
|
|
|
|
let(:current_user) { deploy_token }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_disallowed(*public_permissions)
|
2020-08-18 14:10:10 -04:00
|
|
|
expect_disallowed(*guest_permissions)
|
|
|
|
expect_disallowed(*reporter_permissions)
|
|
|
|
expect_disallowed(*developer_permissions)
|
|
|
|
expect_disallowed(*maintainer_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-12-15 14:30:35 -05:00
|
|
|
context 'guests' do
|
|
|
|
let(:current_user) { guest }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2017-12-06 06:36:11 -05:00
|
|
|
expect_allowed(*guest_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*reporter_permissions)
|
2017-09-13 16:32:58 -04:00
|
|
|
expect_disallowed(*developer_permissions)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect_disallowed(*maintainer_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*owner_permissions)
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
2020-08-18 14:10:10 -04:00
|
|
|
|
|
|
|
it_behaves_like 'deploy token does not get confused with user' do
|
|
|
|
let(:user_id) { guest.id }
|
|
|
|
end
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2017-12-06 06:36:11 -05:00
|
|
|
expect_allowed(*guest_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_allowed(*reporter_permissions)
|
2017-09-13 16:32:58 -04:00
|
|
|
expect_disallowed(*developer_permissions)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect_disallowed(*maintainer_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*owner_permissions)
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
2020-08-18 14:10:10 -04:00
|
|
|
|
|
|
|
it_behaves_like 'deploy token does not get confused with user' do
|
|
|
|
let(:user_id) { reporter.id }
|
|
|
|
end
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2017-12-06 06:36:11 -05:00
|
|
|
expect_allowed(*guest_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_allowed(*reporter_permissions)
|
2017-09-13 16:32:58 -04:00
|
|
|
expect_allowed(*developer_permissions)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect_disallowed(*maintainer_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*owner_permissions)
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
2020-08-18 14:10:10 -04:00
|
|
|
|
|
|
|
it_behaves_like 'deploy token does not get confused with user' do
|
|
|
|
let(:user_id) { developer.id }
|
|
|
|
end
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
context 'maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
2016-12-15 14:30:35 -05:00
|
|
|
|
2019-06-30 17:40:23 -04:00
|
|
|
context 'with subgroup_creation level set to maintainer' do
|
2019-10-06 05:06:13 -04:00
|
|
|
before_all do
|
2020-07-29 08:09:45 -04:00
|
|
|
group.update!(subgroup_creation_level: ::Gitlab::Access::MAINTAINER_SUBGROUP_ACCESS)
|
2019-07-01 19:27:49 -04:00
|
|
|
end
|
2019-06-30 17:40:23 -04:00
|
|
|
|
2019-07-01 12:56:02 -04:00
|
|
|
it 'allows every maintainer permission plus creating subgroups' do
|
2019-06-30 17:40:23 -04:00
|
|
|
create_subgroup_permission = [:create_subgroup]
|
|
|
|
updated_maintainer_permissions =
|
|
|
|
maintainer_permissions + create_subgroup_permission
|
|
|
|
updated_owner_permissions =
|
|
|
|
owner_permissions - create_subgroup_permission
|
|
|
|
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2019-06-30 17:40:23 -04:00
|
|
|
expect_allowed(*guest_permissions)
|
|
|
|
expect_allowed(*reporter_permissions)
|
|
|
|
expect_allowed(*developer_permissions)
|
|
|
|
expect_allowed(*updated_maintainer_permissions)
|
|
|
|
expect_disallowed(*updated_owner_permissions)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with subgroup_creation_level set to owner' do
|
2019-07-01 12:56:02 -04:00
|
|
|
it 'allows every maintainer permission' do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2019-06-30 17:40:23 -04:00
|
|
|
expect_allowed(*guest_permissions)
|
|
|
|
expect_allowed(*reporter_permissions)
|
|
|
|
expect_allowed(*developer_permissions)
|
|
|
|
expect_allowed(*maintainer_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
|
|
|
end
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
2020-08-18 14:10:10 -04:00
|
|
|
|
|
|
|
it_behaves_like 'deploy token does not get confused with user' do
|
|
|
|
let(:user_id) { maintainer.id }
|
|
|
|
end
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2017-12-06 06:36:11 -05:00
|
|
|
expect_allowed(*guest_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_allowed(*reporter_permissions)
|
2017-09-13 16:32:58 -04:00
|
|
|
expect_allowed(*developer_permissions)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect_allowed(*maintainer_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_allowed(*owner_permissions)
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
2020-08-18 14:10:10 -04:00
|
|
|
|
|
|
|
it_behaves_like 'deploy token does not get confused with user' do
|
|
|
|
let(:user_id) { owner.id }
|
|
|
|
end
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'admin' do
|
|
|
|
let(:current_user) { admin }
|
|
|
|
|
2020-06-29 08:09:20 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_disallowed(*public_permissions)
|
2021-03-09 13:09:41 -05:00
|
|
|
expect_disallowed(*guest_permissions)
|
|
|
|
expect_disallowed(*reporter_permissions)
|
|
|
|
expect_disallowed(*developer_permissions)
|
|
|
|
expect_disallowed(*maintainer_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
2020-06-29 08:09:20 -04:00
|
|
|
|
|
|
|
context 'with admin mode', :enable_admin_mode do
|
2021-03-09 13:09:41 -05:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2021-03-09 13:09:41 -05:00
|
|
|
expect_allowed(*guest_permissions)
|
|
|
|
expect_allowed(*reporter_permissions)
|
|
|
|
expect_allowed(*developer_permissions)
|
|
|
|
expect_allowed(*maintainer_permissions)
|
|
|
|
expect_allowed(*owner_permissions)
|
|
|
|
expect_allowed(*admin_permissions)
|
|
|
|
end
|
2020-06-29 08:09:20 -04:00
|
|
|
end
|
2020-08-18 14:10:10 -04:00
|
|
|
|
|
|
|
it_behaves_like 'deploy token does not get confused with user' do
|
|
|
|
let(:user_id) { admin.id }
|
|
|
|
|
|
|
|
context 'with admin mode', :enable_admin_mode do
|
|
|
|
it { expect_disallowed(*admin_permissions) }
|
|
|
|
end
|
|
|
|
end
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|
2016-12-13 13:59:39 -05:00
|
|
|
|
2022-05-11 05:08:10 -04:00
|
|
|
context 'migration bot' do
|
|
|
|
let_it_be(:migration_bot) { User.migration_bot }
|
|
|
|
let_it_be(:current_user) { migration_bot }
|
|
|
|
|
|
|
|
it :aggregate_failures do
|
|
|
|
expect_allowed(:read_resource_access_tokens, :destroy_resource_access_tokens)
|
|
|
|
expect_disallowed(*guest_permissions)
|
|
|
|
expect_disallowed(*reporter_permissions)
|
|
|
|
expect_disallowed(*developer_permissions)
|
|
|
|
expect_disallowed(*maintainer_permissions)
|
|
|
|
expect_disallowed(*owner_permissions)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'deploy token does not get confused with user' do
|
|
|
|
let(:user_id) { migration_bot.id }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-07-24 05:20:54 -04:00
|
|
|
describe 'private nested group use the highest access level from the group and inherited permissions' do
|
2019-10-06 05:06:13 -04:00
|
|
|
let_it_be(:nested_group) do
|
2022-01-11 07:14:06 -05:00
|
|
|
create(:group, :private, :owner_subgroup_creation_only, :crm_enabled, parent: group)
|
2019-07-01 19:27:49 -04:00
|
|
|
end
|
2016-12-13 13:59:39 -05:00
|
|
|
|
2019-10-06 05:06:13 -04:00
|
|
|
before_all do
|
2017-06-02 10:13:10 -04:00
|
|
|
nested_group.add_guest(guest)
|
|
|
|
nested_group.add_guest(reporter)
|
|
|
|
nested_group.add_guest(developer)
|
2018-07-11 10:36:08 -04:00
|
|
|
nested_group.add_guest(maintainer)
|
2017-06-02 10:13:10 -04:00
|
|
|
|
2020-05-28 17:08:22 -04:00
|
|
|
group.owners.destroy_all # rubocop: disable Cop/DestroyAll
|
2017-06-02 10:13:10 -04:00
|
|
|
|
|
|
|
group.add_guest(owner)
|
|
|
|
nested_group.add_owner(owner)
|
|
|
|
end
|
|
|
|
|
2017-04-06 17:09:58 -04:00
|
|
|
subject { described_class.new(current_user, nested_group) }
|
2016-12-13 13:59:39 -05:00
|
|
|
|
|
|
|
context 'with no user' do
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_disallowed(*public_permissions)
|
2017-12-06 06:36:11 -05:00
|
|
|
expect_disallowed(*guest_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*reporter_permissions)
|
2017-09-13 16:32:58 -04:00
|
|
|
expect_disallowed(*developer_permissions)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect_disallowed(*maintainer_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*owner_permissions)
|
2016-12-13 13:59:39 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'guests' do
|
|
|
|
let(:current_user) { guest }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2017-12-06 06:36:11 -05:00
|
|
|
expect_allowed(*guest_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*reporter_permissions)
|
2017-09-13 16:32:58 -04:00
|
|
|
expect_disallowed(*developer_permissions)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect_disallowed(*maintainer_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*owner_permissions)
|
2016-12-13 13:59:39 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2017-12-06 06:36:11 -05:00
|
|
|
expect_allowed(*guest_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_allowed(*reporter_permissions)
|
2017-09-13 16:32:58 -04:00
|
|
|
expect_disallowed(*developer_permissions)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect_disallowed(*maintainer_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*owner_permissions)
|
2016-12-13 13:59:39 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2017-12-06 06:36:11 -05:00
|
|
|
expect_allowed(*guest_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_allowed(*reporter_permissions)
|
2017-09-13 16:32:58 -04:00
|
|
|
expect_allowed(*developer_permissions)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect_disallowed(*maintainer_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*owner_permissions)
|
2016-12-13 13:59:39 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
context 'maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
2016-12-13 13:59:39 -05:00
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2017-12-06 06:36:11 -05:00
|
|
|
expect_allowed(*guest_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_allowed(*reporter_permissions)
|
2017-09-13 16:32:58 -04:00
|
|
|
expect_allowed(*developer_permissions)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect_allowed(*maintainer_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_disallowed(*owner_permissions)
|
2016-12-13 13:59:39 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
2022-08-29 05:10:06 -04:00
|
|
|
specify do
|
2022-01-12 07:14:10 -05:00
|
|
|
expect_allowed(*public_permissions)
|
2017-12-06 06:36:11 -05:00
|
|
|
expect_allowed(*guest_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_allowed(*reporter_permissions)
|
2017-09-13 16:32:58 -04:00
|
|
|
expect_allowed(*developer_permissions)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect_allowed(*maintainer_permissions)
|
2017-04-06 17:09:58 -04:00
|
|
|
expect_allowed(*owner_permissions)
|
2016-12-13 13:59:39 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2017-09-01 21:00:46 -04:00
|
|
|
|
|
|
|
describe 'change_share_with_group_lock' do
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the current_user owns the group' do
|
|
|
|
let(:current_user) { owner }
|
2017-09-01 21:00:46 -04:00
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the group share_with_group_lock is enabled' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let(:group) { create(:group, :crm_enabled, share_with_group_lock: true, parent: parent) }
|
2017-09-01 21:00:46 -04:00
|
|
|
|
2019-10-06 05:06:13 -04:00
|
|
|
before do
|
|
|
|
group.add_owner(owner)
|
|
|
|
end
|
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the parent group share_with_group_lock is enabled' do
|
|
|
|
context 'when the group has a grandparent' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let(:parent) { create(:group, :crm_enabled, share_with_group_lock: true, parent: grandparent) }
|
2017-09-01 21:00:46 -04:00
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the grandparent share_with_group_lock is enabled' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let(:grandparent) { create(:group, :crm_enabled, share_with_group_lock: true) }
|
2017-09-06 02:05:25 -04:00
|
|
|
|
|
|
|
context 'when the current_user owns the parent' do
|
|
|
|
before do
|
|
|
|
parent.add_owner(current_user)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the current_user owns the grandparent' do
|
|
|
|
before do
|
|
|
|
grandparent.add_owner(current_user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { expect_allowed(:change_share_with_group_lock) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the current_user does not own the grandparent' do
|
|
|
|
it { expect_disallowed(:change_share_with_group_lock) }
|
|
|
|
end
|
2017-09-05 13:38:24 -04:00
|
|
|
end
|
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the current_user does not own the parent' do
|
|
|
|
it { expect_disallowed(:change_share_with_group_lock) }
|
|
|
|
end
|
2017-09-05 13:38:24 -04:00
|
|
|
end
|
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the grandparent share_with_group_lock is disabled' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let(:grandparent) { create(:group, :crm_enabled) }
|
2017-09-06 02:05:25 -04:00
|
|
|
|
|
|
|
context 'when the current_user owns the parent' do
|
|
|
|
before do
|
|
|
|
parent.add_owner(current_user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { expect_allowed(:change_share_with_group_lock) }
|
2017-09-05 13:38:24 -04:00
|
|
|
end
|
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the current_user does not own the parent' do
|
|
|
|
it { expect_disallowed(:change_share_with_group_lock) }
|
|
|
|
end
|
2017-09-05 13:38:24 -04:00
|
|
|
end
|
|
|
|
end
|
2017-09-01 21:00:46 -04:00
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the group does not have a grandparent' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let(:parent) { create(:group, :crm_enabled, share_with_group_lock: true) }
|
2017-09-05 13:38:24 -04:00
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the current_user owns the parent' do
|
|
|
|
before do
|
|
|
|
parent.add_owner(current_user)
|
|
|
|
end
|
2017-09-05 13:38:24 -04:00
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
it { expect_allowed(:change_share_with_group_lock) }
|
|
|
|
end
|
2017-09-05 13:38:24 -04:00
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the current_user does not own the parent' do
|
|
|
|
it { expect_disallowed(:change_share_with_group_lock) }
|
|
|
|
end
|
2017-09-05 13:38:24 -04:00
|
|
|
end
|
2017-09-01 21:00:46 -04:00
|
|
|
end
|
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the parent group share_with_group_lock is disabled' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let(:parent) { create(:group, :crm_enabled) }
|
2017-09-01 21:00:46 -04:00
|
|
|
|
|
|
|
it { expect_allowed(:change_share_with_group_lock) }
|
|
|
|
end
|
2017-09-06 02:05:25 -04:00
|
|
|
end
|
2017-09-01 21:00:46 -04:00
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the group share_with_group_lock is disabled' do
|
|
|
|
it { expect_allowed(:change_share_with_group_lock) }
|
2017-09-01 21:00:46 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
context 'when the current_user does not own the group' do
|
|
|
|
let(:current_user) { create(:user) }
|
2017-09-01 21:00:46 -04:00
|
|
|
|
2017-09-06 02:05:25 -04:00
|
|
|
it { expect_disallowed(:change_share_with_group_lock) }
|
2017-09-01 21:00:46 -04:00
|
|
|
end
|
|
|
|
end
|
2018-12-04 16:38:15 -05:00
|
|
|
|
2019-09-23 03:42:26 -04:00
|
|
|
context 'transfer_projects' do
|
|
|
|
shared_examples_for 'allowed to transfer projects' do
|
|
|
|
before do
|
2020-07-29 08:09:45 -04:00
|
|
|
group.update!(project_creation_level: project_creation_level)
|
2019-09-23 03:42:26 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:transfer_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
shared_examples_for 'not allowed to transfer projects' do
|
|
|
|
before do
|
2020-07-29 08:09:45 -04:00
|
|
|
group.update!(project_creation_level: project_creation_level)
|
2019-09-23 03:42:26 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:transfer_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it_behaves_like 'not allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::NO_ONE_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'not allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::MAINTAINER_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'not allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::DEVELOPER_MAINTAINER_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
|
|
|
it_behaves_like 'not allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::NO_ONE_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'not allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::MAINTAINER_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'not allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::DEVELOPER_MAINTAINER_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
it_behaves_like 'not allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::NO_ONE_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::MAINTAINER_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::DEVELOPER_MAINTAINER_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it_behaves_like 'not allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::NO_ONE_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::MAINTAINER_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'allowed to transfer projects' do
|
|
|
|
let(:project_creation_level) { ::Gitlab::Access::DEVELOPER_MAINTAINER_PROJECT_ACCESS }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-02-10 22:09:13 -05:00
|
|
|
context 'create_projects' do
|
2019-04-05 14:49:46 -04:00
|
|
|
context 'when group has no project creation level set' do
|
2019-10-06 05:06:13 -04:00
|
|
|
before_all do
|
2020-07-29 08:09:45 -04:00
|
|
|
group.update!(project_creation_level: nil)
|
2019-10-06 05:06:13 -04:00
|
|
|
end
|
2019-04-05 14:49:46 -04:00
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_projects) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when group has project creation level set to no one' do
|
2019-10-06 05:06:13 -04:00
|
|
|
before_all do
|
2020-07-29 08:09:45 -04:00
|
|
|
group.update!(project_creation_level: ::Gitlab::Access::NO_ONE_PROJECT_ACCESS)
|
2019-10-06 05:06:13 -04:00
|
|
|
end
|
2019-04-05 14:49:46 -04:00
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_projects) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when group has project creation level set to maintainer only' do
|
2019-10-06 05:06:13 -04:00
|
|
|
before_all do
|
2020-07-29 08:09:45 -04:00
|
|
|
group.update!(project_creation_level: ::Gitlab::Access::MAINTAINER_PROJECT_ACCESS)
|
2019-10-06 05:06:13 -04:00
|
|
|
end
|
2019-04-05 14:49:46 -04:00
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_projects) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when group has project creation level set to developers + maintainer' do
|
2019-10-06 05:06:13 -04:00
|
|
|
before_all do
|
2020-07-29 08:09:45 -04:00
|
|
|
group.update!(project_creation_level: ::Gitlab::Access::DEVELOPER_MAINTAINER_PROJECT_ACCESS)
|
2019-10-06 05:06:13 -04:00
|
|
|
end
|
2019-04-05 14:49:46 -04:00
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_projects) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_projects) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-02-10 22:09:13 -05:00
|
|
|
context 'create_subgroup' do
|
2019-06-26 00:59:10 -04:00
|
|
|
context 'when group has subgroup creation level set to owner' do
|
2019-10-06 05:06:13 -04:00
|
|
|
before_all do
|
2020-07-29 08:09:45 -04:00
|
|
|
group.update!(subgroup_creation_level: ::Gitlab::Access::OWNER_SUBGROUP_ACCESS)
|
2019-06-28 16:31:47 -04:00
|
|
|
end
|
2019-06-26 00:59:10 -04:00
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_subgroup) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_subgroup) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_subgroup) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_subgroup) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when group has subgroup creation level set to maintainer' do
|
2019-10-06 05:06:13 -04:00
|
|
|
before_all do
|
2020-07-29 08:09:45 -04:00
|
|
|
group.update!(subgroup_creation_level: ::Gitlab::Access::MAINTAINER_SUBGROUP_ACCESS)
|
2019-06-28 16:31:47 -04:00
|
|
|
end
|
2019-06-26 00:59:10 -04:00
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_subgroup) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_subgroup) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_subgroup) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_subgroup) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-12-04 16:38:15 -05:00
|
|
|
it_behaves_like 'clusterable policies' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let(:clusterable) { create(:group, :crm_enabled) }
|
2018-12-04 16:38:15 -05:00
|
|
|
let(:cluster) do
|
|
|
|
create(:cluster,
|
|
|
|
:provided_by_gcp,
|
|
|
|
:group,
|
|
|
|
groups: [clusterable])
|
|
|
|
end
|
|
|
|
end
|
2019-10-14 11:06:07 -04:00
|
|
|
|
|
|
|
describe 'update_max_artifacts_size' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let(:group) { create(:group, :public, :crm_enabled) }
|
2019-10-14 11:06:07 -04:00
|
|
|
|
|
|
|
context 'when no user' do
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
it { expect_disallowed(:update_max_artifacts_size) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'admin' do
|
|
|
|
let(:current_user) { admin }
|
|
|
|
|
2020-05-15 11:08:04 -04:00
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
|
|
it { expect_allowed(:update_max_artifacts_size) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin mode is enabled' do
|
|
|
|
it { expect_disallowed(:update_max_artifacts_size) }
|
|
|
|
end
|
2019-10-14 11:06:07 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
%w(guest reporter developer maintainer owner).each do |role|
|
|
|
|
context role do
|
|
|
|
let(:current_user) { send(role) }
|
|
|
|
|
|
|
|
it { expect_disallowed(:update_max_artifacts_size) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-06-19 14:08:39 -04:00
|
|
|
|
|
|
|
describe 'design activity' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let_it_be(:group) { create(:group, :public, :crm_enabled) }
|
2021-04-09 05:09:10 -04:00
|
|
|
|
2020-06-19 14:08:39 -04:00
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
subject { described_class.new(current_user, group) }
|
|
|
|
|
|
|
|
context 'when design management is not available' do
|
|
|
|
it { is_expected.not_to be_allowed(:read_design_activity) }
|
|
|
|
|
|
|
|
context 'even when there are projects in the group' do
|
|
|
|
before do
|
|
|
|
create_list(:project_group_link, 2, group: group)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.not_to be_allowed(:read_design_activity) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when design management is available globally' do
|
|
|
|
include DesignManagementTestHelpers
|
|
|
|
|
|
|
|
before do
|
|
|
|
enable_design_management
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'the group has no projects' do
|
|
|
|
it { is_expected.not_to be_allowed(:read_design_activity) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'the group has a project' do
|
|
|
|
let(:project) { create(:project, :public) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
create(:project_group_link, project: project, group: group)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:read_design_activity) }
|
|
|
|
|
|
|
|
context 'which does not have design management enabled' do
|
|
|
|
before do
|
2020-07-29 08:09:45 -04:00
|
|
|
project.update!(lfs_enabled: false)
|
2020-06-19 14:08:39 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.not_to be_allowed(:read_design_activity) }
|
|
|
|
|
|
|
|
context 'but another project does' do
|
|
|
|
before do
|
|
|
|
create(:project_group_link, project: create(:project, :public), group: group)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:read_design_activity) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-09-01 08:11:01 -04:00
|
|
|
|
|
|
|
describe 'create_jira_connect_subscription' do
|
|
|
|
context 'admin' do
|
|
|
|
let(:current_user) { admin }
|
|
|
|
|
2021-03-09 13:09:41 -05:00
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
|
|
it { is_expected.to be_allowed(:create_jira_connect_subscription) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin mode is disabled' do
|
|
|
|
it { is_expected.to be_disallowed(:create_jira_connect_subscription) }
|
|
|
|
end
|
2020-09-01 08:11:01 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'with owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_jira_connect_subscription) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_jira_connect_subscription) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_jira_connect_subscription) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with guest' do
|
|
|
|
let(:current_user) { guest }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_jira_connect_subscription) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with non member' do
|
|
|
|
let(:current_user) { create(:user) }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_jira_connect_subscription) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with anonymous' do
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:create_jira_connect_subscription) }
|
|
|
|
end
|
|
|
|
end
|
2020-09-25 14:09:46 -04:00
|
|
|
|
|
|
|
describe 'read_package' do
|
|
|
|
context 'admin' do
|
|
|
|
let(:current_user) { admin }
|
|
|
|
|
2021-03-09 13:09:41 -05:00
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
|
|
it { is_expected.to be_allowed(:read_package) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin mode is disabled' do
|
|
|
|
it { is_expected.to be_disallowed(:read_package) }
|
|
|
|
end
|
2020-09-25 14:09:46 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'with owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:read_package) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:read_package) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:read_package) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with guest' do
|
|
|
|
let(:current_user) { guest }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:read_package) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with non member' do
|
|
|
|
let(:current_user) { create(:user) }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:read_package) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with anonymous' do
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:read_package) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-09-11 14:10:42 -04:00
|
|
|
describe 'observability' do
|
|
|
|
using RSpec::Parameterized::TableSyntax
|
|
|
|
|
|
|
|
let(:allowed) { be_allowed(:read_observability) }
|
|
|
|
let(:disallowed) { be_disallowed(:read_observability) }
|
|
|
|
|
|
|
|
# rubocop:disable Layout/LineLength
|
|
|
|
where(:feature_enabled, :admin_matcher, :owner_matcher, :maintainer_matcher, :developer_matcher, :reporter_matcher, :guest_matcher, :non_member_matcher, :anonymous_matcher) do
|
|
|
|
false | ref(:disallowed) | ref(:disallowed) | ref(:disallowed) | ref(:disallowed) | ref(:disallowed) | ref(:disallowed) | ref(:disallowed) | ref(:disallowed)
|
|
|
|
true | ref(:allowed) | ref(:allowed) | ref(:allowed) | ref(:allowed) | ref(:disallowed) | ref(:disallowed) | ref(:disallowed) | ref(:disallowed)
|
|
|
|
end
|
|
|
|
# rubocop:enable Layout/LineLength
|
|
|
|
|
|
|
|
with_them do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(observability_group_tab: feature_enabled)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'admin', :enable_admin_mode do
|
|
|
|
let(:current_user) { admin }
|
|
|
|
|
|
|
|
it { is_expected.to admin_matcher }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to owner_matcher }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
it { is_expected.to maintainer_matcher }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
|
|
|
it { is_expected.to developer_matcher }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it { is_expected.to reporter_matcher }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with guest' do
|
|
|
|
let(:current_user) { guest }
|
|
|
|
|
|
|
|
it { is_expected.to guest_matcher }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with non member' do
|
|
|
|
let(:current_user) { create(:user) }
|
|
|
|
|
|
|
|
it { is_expected.to non_member_matcher }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with anonymous' do
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
it { is_expected.to anonymous_matcher }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-09-13 20:10:45 -04:00
|
|
|
describe 'dependency proxy' do
|
|
|
|
context 'feature disabled' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:read_dependency_proxy) }
|
|
|
|
it { is_expected.to be_disallowed(:admin_dependency_proxy) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'feature enabled' do
|
|
|
|
before do
|
|
|
|
stub_config(dependency_proxy: { enabled: true })
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
2022-05-10 23:07:57 -04:00
|
|
|
it { is_expected.to be_allowed(:read_dependency_proxy) }
|
2021-09-13 20:10:45 -04:00
|
|
|
it { is_expected.to be_disallowed(:admin_dependency_proxy) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
2022-05-10 23:07:57 -04:00
|
|
|
it { is_expected.to be_allowed(:read_dependency_proxy) }
|
|
|
|
it { is_expected.to be_disallowed(:admin_dependency_proxy) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:read_dependency_proxy) }
|
2021-09-13 20:10:45 -04:00
|
|
|
it { is_expected.to be_allowed(:admin_dependency_proxy) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-25 14:09:46 -04:00
|
|
|
context 'deploy token access' do
|
|
|
|
let!(:group_deploy_token) do
|
|
|
|
create(:group_deploy_token, group: group, deploy_token: deploy_token)
|
|
|
|
end
|
|
|
|
|
|
|
|
subject { described_class.new(deploy_token, group) }
|
|
|
|
|
|
|
|
context 'a deploy token with read_package_registry scope' do
|
|
|
|
let(:deploy_token) { create(:deploy_token, :group, read_package_registry: true) }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:read_package) }
|
|
|
|
it { is_expected.to be_allowed(:read_group) }
|
|
|
|
it { is_expected.to be_disallowed(:create_package) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'a deploy token with write_package_registry scope' do
|
|
|
|
let(:deploy_token) { create(:deploy_token, :group, write_package_registry: true) }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:create_package) }
|
2020-11-16 16:09:02 -05:00
|
|
|
it { is_expected.to be_allowed(:read_package) }
|
2020-09-25 14:09:46 -04:00
|
|
|
it { is_expected.to be_allowed(:read_group) }
|
|
|
|
it { is_expected.to be_disallowed(:destroy_package) }
|
|
|
|
end
|
2021-09-13 20:10:45 -04:00
|
|
|
|
|
|
|
context 'a deploy token with dependency proxy scopes' do
|
|
|
|
let_it_be(:deploy_token) { create(:deploy_token, :group, :dependency_proxy_scopes) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_config(dependency_proxy: { enabled: true })
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:read_dependency_proxy) }
|
|
|
|
it { is_expected.to be_disallowed(:admin_dependency_proxy) }
|
|
|
|
end
|
2020-09-25 14:09:46 -04:00
|
|
|
end
|
2020-09-30 14:09:52 -04:00
|
|
|
|
|
|
|
it_behaves_like 'Self-managed Core resource access tokens'
|
2020-11-10 10:09:14 -05:00
|
|
|
|
|
|
|
context 'support bot' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let_it_be(:group) { create(:group, :private, :crm_enabled) }
|
2020-11-10 10:09:14 -05:00
|
|
|
let_it_be(:current_user) { User.support_bot }
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(Gitlab::ServiceDesk).to receive(:supported?).and_return(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { expect_disallowed(:read_label) }
|
|
|
|
|
|
|
|
context 'when group hierarchy has a project with service desk enabled' do
|
2022-01-11 07:14:06 -05:00
|
|
|
let_it_be(:subgroup) { create(:group, :private, :crm_enabled, parent: group) }
|
2020-11-10 10:09:14 -05:00
|
|
|
let_it_be(:project) { create(:project, group: subgroup, service_desk_enabled: true) }
|
|
|
|
|
|
|
|
it { expect_allowed(:read_label) }
|
|
|
|
it { expect(described_class.new(current_user, subgroup)).to be_allowed(:read_label) }
|
|
|
|
end
|
|
|
|
end
|
2021-06-14 11:09:48 -04:00
|
|
|
|
2022-01-07 19:14:32 -05:00
|
|
|
context "project bots" do
|
|
|
|
let(:project_bot) { create(:user, :project_bot) }
|
|
|
|
let(:user) { create(:user) }
|
|
|
|
|
|
|
|
context "project_bot_access" do
|
|
|
|
context "when regular user and part of the group" do
|
|
|
|
let(:current_user) { user }
|
|
|
|
|
|
|
|
before do
|
|
|
|
group.add_developer(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.not_to be_allowed(:project_bot_access) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when project bot and not part of the project" do
|
|
|
|
let(:current_user) { project_bot }
|
|
|
|
|
|
|
|
it { is_expected.not_to be_allowed(:project_bot_access) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when project bot and part of the project" do
|
|
|
|
let(:current_user) { project_bot }
|
|
|
|
|
|
|
|
before do
|
|
|
|
group.add_developer(project_bot)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:project_bot_access) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with resource access tokens' do
|
|
|
|
let(:current_user) { project_bot }
|
|
|
|
|
|
|
|
before do
|
|
|
|
group.add_maintainer(project_bot)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.not_to be_allowed(:create_resource_access_tokens) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-06-14 11:09:48 -04:00
|
|
|
describe 'update_runners_registration_token' do
|
|
|
|
context 'admin' do
|
|
|
|
let(:current_user) { admin }
|
|
|
|
|
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
|
|
it { is_expected.to be_allowed(:update_runners_registration_token) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin mode is disabled' do
|
|
|
|
it { is_expected.to be_disallowed(:update_runners_registration_token) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:update_runners_registration_token) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
2021-10-14 14:13:40 -04:00
|
|
|
it { is_expected.to be_disallowed(:update_runners_registration_token) }
|
2021-06-14 11:09:48 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'with reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:update_runners_registration_token) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with guest' do
|
|
|
|
let(:current_user) { guest }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:update_runners_registration_token) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with non member' do
|
|
|
|
let(:current_user) { create(:user) }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:update_runners_registration_token) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with anonymous' do
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:update_runners_registration_token) }
|
|
|
|
end
|
|
|
|
end
|
2021-10-29 11:11:56 -04:00
|
|
|
|
2021-12-16 16:14:09 -05:00
|
|
|
describe 'register_group_runners' do
|
2022-02-23 10:14:44 -05:00
|
|
|
context 'admin' do
|
|
|
|
let(:current_user) { admin }
|
2021-12-16 16:14:09 -05:00
|
|
|
|
2022-02-23 10:14:44 -05:00
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
|
|
context 'with runner_registration_control FF disabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(runner_registration_control: false)
|
|
|
|
end
|
2021-12-16 16:14:09 -05:00
|
|
|
|
2022-02-23 10:14:44 -05:00
|
|
|
it { is_expected.to be_allowed(:register_group_runners) }
|
2021-12-16 16:14:09 -05:00
|
|
|
end
|
|
|
|
|
2022-02-23 10:14:44 -05:00
|
|
|
context 'with runner_registration_control FF enabled' do
|
2021-12-16 16:14:09 -05:00
|
|
|
before do
|
2022-02-23 10:14:44 -05:00
|
|
|
stub_feature_flags(runner_registration_control: true)
|
2021-12-16 16:14:09 -05:00
|
|
|
end
|
|
|
|
|
2022-02-23 10:14:44 -05:00
|
|
|
it { is_expected.to be_allowed(:register_group_runners) }
|
2021-12-16 16:14:09 -05:00
|
|
|
|
2022-02-23 10:14:44 -05:00
|
|
|
context 'with group runner registration disabled' do
|
|
|
|
before do
|
|
|
|
stub_application_setting(valid_runner_registrars: ['project'])
|
|
|
|
end
|
2021-12-16 16:14:09 -05:00
|
|
|
|
2022-02-23 10:14:44 -05:00
|
|
|
it { is_expected.to be_allowed(:register_group_runners) }
|
|
|
|
end
|
|
|
|
end
|
2021-12-16 16:14:09 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin mode is disabled' do
|
|
|
|
it { is_expected.to be_disallowed(:register_group_runners) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:register_group_runners) }
|
|
|
|
|
2022-02-23 10:14:44 -05:00
|
|
|
context 'with runner_registration_control FF disabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(runner_registration_control: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:register_group_runners) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with runner_registration_control FF enabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(runner_registration_control: true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:register_group_runners) }
|
|
|
|
|
|
|
|
context 'with group runner registration disabled' do
|
|
|
|
before do
|
|
|
|
stub_application_setting(valid_runner_registrars: ['project'])
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:register_group_runners) }
|
|
|
|
end
|
|
|
|
end
|
2021-12-16 16:14:09 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'with maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
2022-01-10 22:16:07 -05:00
|
|
|
it { is_expected.to be_disallowed(:register_group_runners) }
|
2021-12-16 16:14:09 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'with reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:register_group_runners) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with guest' do
|
|
|
|
let(:current_user) { guest }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:register_group_runners) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with non member' do
|
|
|
|
let(:current_user) { create(:user) }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:register_group_runners) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with anonymous' do
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:register_group_runners) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-09-23 14:12:59 -04:00
|
|
|
describe 'read_group_all_available_runners' do
|
|
|
|
context 'admin' do
|
|
|
|
let(:current_user) { admin }
|
|
|
|
|
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
|
|
context 'with runners_finder_all_available FF disabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(runners_finder_all_available: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
specify { is_expected.to be_disallowed(:read_group_all_available_runners) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with runners_finder_all_available FF enabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(runners_finder_all_available: [group])
|
|
|
|
end
|
|
|
|
|
|
|
|
specify { is_expected.to be_allowed(:read_group_all_available_runners) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin mode is disabled' do
|
|
|
|
specify { is_expected.to be_disallowed(:read_group_all_available_runners) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
context 'with runners_finder_all_available FF disabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(runners_finder_all_available: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
specify { is_expected.to be_disallowed(:read_group_all_available_runners) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with runners_finder_all_available FF enabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(runners_finder_all_available: [group])
|
|
|
|
end
|
|
|
|
|
|
|
|
specify { is_expected.to be_allowed(:read_group_all_available_runners) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with maintainer' do
|
|
|
|
let(:current_user) { maintainer }
|
|
|
|
|
|
|
|
specify { is_expected.to be_allowed(:read_group_all_available_runners) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with developer' do
|
|
|
|
let(:current_user) { developer }
|
|
|
|
|
|
|
|
specify { is_expected.to be_allowed(:read_group_all_available_runners) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with reporter' do
|
|
|
|
let(:current_user) { reporter }
|
|
|
|
|
|
|
|
specify { is_expected.to be_disallowed(:read_group_all_available_runners) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with guest' do
|
|
|
|
let(:current_user) { guest }
|
|
|
|
|
|
|
|
specify { is_expected.to be_disallowed(:read_group_all_available_runners) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with non member' do
|
|
|
|
let(:current_user) { create(:user) }
|
|
|
|
|
|
|
|
specify { is_expected.to be_disallowed(:read_group_all_available_runners) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with anonymous' do
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
specify { is_expected.to be_disallowed(:read_group_all_available_runners) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-05-10 11:09:19 -04:00
|
|
|
describe 'change_prevent_sharing_groups_outside_hierarchy' do
|
|
|
|
context 'with owner' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
|
|
|
it { is_expected.to be_allowed(:change_prevent_sharing_groups_outside_hierarchy) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with non-owner roles' do
|
|
|
|
where(role: %w[admin maintainer reporter developer guest])
|
|
|
|
|
|
|
|
with_them do
|
|
|
|
let(:current_user) { public_send role }
|
|
|
|
|
|
|
|
it { is_expected.to be_disallowed(:change_prevent_sharing_groups_outside_hierarchy) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-01-07 19:14:32 -05:00
|
|
|
context 'when crm_enabled is false' do
|
|
|
|
let(:current_user) { owner }
|
|
|
|
|
2022-01-19 16:14:54 -05:00
|
|
|
before_all do
|
|
|
|
group.crm_settings.enabled = false
|
|
|
|
group.crm_settings.save!
|
|
|
|
end
|
|
|
|
|
2022-01-07 19:14:32 -05:00
|
|
|
it { is_expected.to be_disallowed(:read_crm_contact) }
|
|
|
|
it { is_expected.to be_disallowed(:read_crm_organization) }
|
|
|
|
it { is_expected.to be_disallowed(:admin_crm_contact) }
|
|
|
|
it { is_expected.to be_disallowed(:admin_crm_organization) }
|
|
|
|
end
|
2022-08-03 08:11:38 -04:00
|
|
|
|
|
|
|
it_behaves_like 'checks timelog categories permissions' do
|
|
|
|
let(:group) { create(:group) }
|
|
|
|
let(:namespace) { group }
|
|
|
|
let(:users_container) { group }
|
|
|
|
|
|
|
|
subject { described_class.new(current_user, group) }
|
|
|
|
end
|
2016-12-15 14:30:35 -05:00
|
|
|
end
|