125 lines
4.6 KiB
Ruby
125 lines
4.6 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'spec_helper'
|
|
|
|
RSpec.describe 'Public Group access' do
|
|
include AccessMatchers
|
|
|
|
let(:group) { create(:group, :public) }
|
|
let(:project) { create(:project, :public, group: group) }
|
|
let(:project_guest) do
|
|
create(:user) do |user|
|
|
project.add_guest(user)
|
|
end
|
|
end
|
|
|
|
describe "Group should be public" do
|
|
describe '#public?' do
|
|
subject { group.public? }
|
|
|
|
it { is_expected.to be_truthy }
|
|
end
|
|
end
|
|
|
|
describe 'GET /groups/:path' do
|
|
subject { group_path(group) }
|
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
end
|
|
context 'when admin mode is disabled' do
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
end
|
|
it { is_expected.to be_allowed_for(:owner).of(group) }
|
|
it { is_expected.to be_allowed_for(:maintainer).of(group) }
|
|
it { is_expected.to be_allowed_for(:developer).of(group) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(group) }
|
|
it { is_expected.to be_allowed_for(:guest).of(group) }
|
|
it { is_expected.to be_allowed_for(project_guest) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe 'GET /groups/:path/-/issues' do
|
|
subject { issues_group_path(group) }
|
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
end
|
|
context 'when admin mode is disabled' do
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
end
|
|
it { is_expected.to be_allowed_for(:owner).of(group) }
|
|
it { is_expected.to be_allowed_for(:maintainer).of(group) }
|
|
it { is_expected.to be_allowed_for(:developer).of(group) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(group) }
|
|
it { is_expected.to be_allowed_for(:guest).of(group) }
|
|
it { is_expected.to be_allowed_for(project_guest) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe 'GET /groups/:path/-/merge_requests' do
|
|
let(:project) { create(:project, :public, :repository, group: group) }
|
|
|
|
subject { merge_requests_group_path(group) }
|
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
end
|
|
context 'when admin mode is disabled' do
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
end
|
|
it { is_expected.to be_allowed_for(:owner).of(group) }
|
|
it { is_expected.to be_allowed_for(:maintainer).of(group) }
|
|
it { is_expected.to be_allowed_for(:developer).of(group) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(group) }
|
|
it { is_expected.to be_allowed_for(:guest).of(group) }
|
|
it { is_expected.to be_allowed_for(project_guest) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe 'GET /groups/:path/-/group_members' do
|
|
subject { group_group_members_path(group) }
|
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
end
|
|
context 'when admin mode is disabled' do
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
end
|
|
it { is_expected.to be_allowed_for(:owner).of(group) }
|
|
it { is_expected.to be_allowed_for(:maintainer).of(group) }
|
|
it { is_expected.to be_allowed_for(:developer).of(group) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(group) }
|
|
it { is_expected.to be_allowed_for(:guest).of(group) }
|
|
it { is_expected.to be_allowed_for(project_guest) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe 'GET /groups/:path/-/edit' do
|
|
subject { edit_group_path(group) }
|
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
end
|
|
context 'when admin mode is disabled' do
|
|
it { is_expected.to be_denied_for(:admin) }
|
|
end
|
|
it { is_expected.to be_allowed_for(:owner).of(group) }
|
|
it { is_expected.to be_denied_for(:maintainer).of(group) }
|
|
it { is_expected.to be_denied_for(:developer).of(group) }
|
|
it { is_expected.to be_denied_for(:reporter).of(group) }
|
|
it { is_expected.to be_denied_for(:guest).of(group) }
|
|
it { is_expected.to be_denied_for(project_guest) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
end
|
|
end
|