70 lines
1.8 KiB
Ruby
70 lines
1.8 KiB
Ruby
|
# frozen_string_literal: true
|
||
|
#
|
||
|
require 'spec_helper'
|
||
|
|
||
|
describe Constraints::AdminConstrainer, :do_not_mock_admin_mode do
|
||
|
let(:user) { create(:user) }
|
||
|
|
||
|
let(:session) { {} }
|
||
|
let(:env) { { 'warden' => double(:warden, authenticate?: true, user: user) } }
|
||
|
let(:request) { double(:request, session: session, env: env) }
|
||
|
|
||
|
around do |example|
|
||
|
Gitlab::Session.with_session(session) do
|
||
|
example.run
|
||
|
end
|
||
|
end
|
||
|
|
||
|
describe '#matches' do
|
||
|
context 'feature flag :user_mode_in_session is enabled' do
|
||
|
context 'when user is a regular user' do
|
||
|
it 'forbids access' do
|
||
|
expect(subject.matches?(request)).to be(false)
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'when user is an admin' do
|
||
|
let(:user) { create(:admin) }
|
||
|
|
||
|
context 'admin mode is disabled' do
|
||
|
it 'forbids access' do
|
||
|
expect(subject.matches?(request)).to be(false)
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'admin mode is enabled' do
|
||
|
before do
|
||
|
current_user_mode = Gitlab::Auth::CurrentUserMode.new(user)
|
||
|
current_user_mode.request_admin_mode!
|
||
|
current_user_mode.enable_admin_mode!(password: user.password)
|
||
|
end
|
||
|
|
||
|
it 'allows access' do
|
||
|
expect(subject.matches?(request)).to be(true)
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'feature flag :user_mode_in_session is disabled' do
|
||
|
before do
|
||
|
stub_feature_flags(user_mode_in_session: false)
|
||
|
end
|
||
|
|
||
|
context 'when user is a regular user' do
|
||
|
it 'forbids access' do
|
||
|
expect(subject.matches?(request)).to be(false)
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'when user is an admin' do
|
||
|
let(:user) { create(:admin) }
|
||
|
|
||
|
it 'allows access' do
|
||
|
expect(subject.matches?(request)).to be(true)
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
end
|