541 lines
23 KiB
Ruby
541 lines
23 KiB
Ruby
require 'spec_helper'
|
|
|
|
describe "Public Project Access", feature: true do
|
|
include AccessMatchers
|
|
|
|
set(:project) { create(:project, :public) }
|
|
|
|
describe "Project should be public" do
|
|
describe '#public?' do
|
|
subject { project.public? }
|
|
it { is_expected.to be_truthy }
|
|
end
|
|
end
|
|
|
|
describe "GET /:project_path" do
|
|
subject { namespace_project_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/tree/master" do
|
|
subject { namespace_project_tree_path(project.namespace, project, project.repository.root_ref) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/commits/master" do
|
|
subject { namespace_project_commits_path(project.namespace, project, project.repository.root_ref, limit: 1) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/commit/:sha" do
|
|
subject { namespace_project_commit_path(project.namespace, project, project.repository.commit) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/compare" do
|
|
subject { namespace_project_compare_index_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/settings/members" do
|
|
subject { namespace_project_settings_members_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
end
|
|
|
|
describe "GET /:project_path/settings/ci_cd" do
|
|
subject { namespace_project_settings_ci_cd_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_denied_for(:developer).of(project) }
|
|
it { is_expected.to be_denied_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
end
|
|
|
|
describe "GET /:project_path/settings/repository" do
|
|
subject { namespace_project_settings_repository_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_denied_for(:developer).of(project) }
|
|
it { is_expected.to be_denied_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
end
|
|
|
|
describe "GET /:project_path/pipelines" do
|
|
subject { namespace_project_pipelines_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/pipelines/:id" do
|
|
let(:pipeline) { create(:ci_pipeline, project: project) }
|
|
subject { namespace_project_pipeline_path(project.namespace, project, pipeline) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/builds" do
|
|
subject { namespace_project_jobs_path(project.namespace, project) }
|
|
|
|
context "when allowed for public" do
|
|
before do
|
|
project.update(public_builds: true)
|
|
end
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
context "when disallowed for public" do
|
|
before do
|
|
project.update(public_builds: false)
|
|
end
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
end
|
|
|
|
describe "GET /:project_path/builds/:id" do
|
|
let(:pipeline) { create(:ci_pipeline, project: project) }
|
|
let(:build) { create(:ci_build, pipeline: pipeline) }
|
|
subject { namespace_project_job_path(project.namespace, project, build.id) }
|
|
|
|
context "when allowed for public" do
|
|
before do
|
|
project.update(public_builds: true)
|
|
end
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
context "when disallowed for public" do
|
|
before do
|
|
project.update(public_builds: false)
|
|
end
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
end
|
|
|
|
describe 'GET /:project_path/builds/:id/trace' do
|
|
let(:pipeline) { create(:ci_pipeline, project: project) }
|
|
let(:build) { create(:ci_build, pipeline: pipeline) }
|
|
subject { trace_namespace_project_job_path(project.namespace, project, build.id) }
|
|
|
|
context 'when allowed for public' do
|
|
before do
|
|
project.update(public_builds: true)
|
|
end
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
context 'when disallowed for public' do
|
|
before do
|
|
project.update(public_builds: false)
|
|
end
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
end
|
|
|
|
describe "GET /:project_path/pipeline_schedules" do
|
|
subject { namespace_project_pipeline_schedules_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/environments" do
|
|
subject { namespace_project_environments_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/environments/:id" do
|
|
let(:environment) { create(:environment, project: project) }
|
|
subject { namespace_project_environment_path(project.namespace, project, environment) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/environments/:id/deployments" do
|
|
let(:environment) { create(:environment, project: project) }
|
|
subject { namespace_project_environment_deployments_path(project.namespace, project, environment) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/environments/new" do
|
|
subject { new_namespace_project_environment_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_denied_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/blob" do
|
|
let(:commit) { project.repository.commit }
|
|
|
|
subject { namespace_project_blob_path(project.namespace, project, File.join(commit.id, '.gitignore')) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/edit" do
|
|
subject { edit_namespace_project_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_denied_for(:developer).of(project) }
|
|
it { is_expected.to be_denied_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/deploy_keys" do
|
|
subject { namespace_project_deploy_keys_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_denied_for(:developer).of(project) }
|
|
it { is_expected.to be_denied_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/issues" do
|
|
subject { namespace_project_issues_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/issues/:id/edit" do
|
|
let(:issue) { create(:issue, project: project) }
|
|
subject { edit_namespace_project_issue_path(project.namespace, project, issue) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/snippets" do
|
|
subject { namespace_project_snippets_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/snippets/new" do
|
|
subject { new_namespace_project_snippet_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/merge_requests" do
|
|
subject { namespace_project_merge_requests_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/merge_requests/new" do
|
|
subject { new_namespace_project_merge_request_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_denied_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/branches" do
|
|
subject { namespace_project_branches_path(project.namespace, project) }
|
|
|
|
before do
|
|
# Speed increase
|
|
allow_any_instance_of(Project).to receive(:branches).and_return([])
|
|
end
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/tags" do
|
|
subject { namespace_project_tags_path(project.namespace, project) }
|
|
|
|
before do
|
|
# Speed increase
|
|
allow_any_instance_of(Project).to receive(:tags).and_return([])
|
|
end
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/settings/integrations" do
|
|
subject { namespace_project_settings_integrations_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_denied_for(:developer).of(project) }
|
|
it { is_expected.to be_denied_for(:reporter).of(project) }
|
|
it { is_expected.to be_denied_for(:guest).of(project) }
|
|
it { is_expected.to be_denied_for(:user) }
|
|
it { is_expected.to be_denied_for(:external) }
|
|
it { is_expected.to be_denied_for(:visitor) }
|
|
end
|
|
|
|
describe "GET /:project_path/container_registry" do
|
|
let(:container_repository) { create(:container_repository) }
|
|
|
|
before do
|
|
stub_container_registry_tags(repository: :any, tags: ['latest'])
|
|
stub_container_registry_config(enabled: true)
|
|
project.container_repositories << container_repository
|
|
end
|
|
|
|
subject { namespace_project_container_registry_index_path(project.namespace, project) }
|
|
|
|
it { is_expected.to be_allowed_for(:admin) }
|
|
it { is_expected.to be_allowed_for(:owner).of(project) }
|
|
it { is_expected.to be_allowed_for(:master).of(project) }
|
|
it { is_expected.to be_allowed_for(:developer).of(project) }
|
|
it { is_expected.to be_allowed_for(:reporter).of(project) }
|
|
it { is_expected.to be_allowed_for(:guest).of(project) }
|
|
it { is_expected.to be_allowed_for(:user) }
|
|
it { is_expected.to be_allowed_for(:external) }
|
|
it { is_expected.to be_allowed_for(:visitor) }
|
|
end
|
|
end
|