require 'spec_helper'

describe "Private Project Access", feature: true  do
  let(:project) { create(:project) }

  let(:master)   { create(:user) }
  let(:guest)    { create(:user) }
  let(:reporter) { create(:user) }

  before do
    # full access
    project.team << [master, :master]

    # readonly
    project.team << [reporter, :reporter]
  end

  describe "Project should be private" do
    subject { project }

    its(:private?) { should be_true }
  end

  describe "GET /:project_path" do
    subject { project_path(project) }

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/tree/master" do
    subject { project_tree_path(project, project.repository.root_ref) }

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/commits/master" do
    subject { project_commits_path(project, project.repository.root_ref, limit: 1) }

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/commit/:sha" do
    subject { project_commit_path(project, project.repository.commit) }

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/compare" do
    subject { project_compare_index_path(project) }

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/team" do
    subject { project_team_index_path(project) }

    it { should be_allowed_for master }
    it { should be_denied_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/wall" do
    subject { project_wall_path(project) }

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/blob" do
    before do
      commit = project.repository.commit
      path = commit.tree.contents.select { |i| i.is_a?(Grit::Blob) }.first.name
      @blob_path = project_blob_path(project, File.join(commit.id, path))
    end

    it { @blob_path.should be_allowed_for master }
    it { @blob_path.should be_allowed_for reporter }
    it { @blob_path.should be_allowed_for :admin }
    it { @blob_path.should be_denied_for guest }
    it { @blob_path.should be_denied_for :user }
    it { @blob_path.should be_denied_for :visitor }
  end

  describe "GET /:project_path/edit" do
    subject { edit_project_path(project) }

    it { should be_allowed_for master }
    it { should be_denied_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/deploy_keys" do
    subject { project_deploy_keys_path(project) }

    it { should be_allowed_for master }
    it { should be_denied_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/issues" do
    subject { project_issues_path(project) }

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/snippets" do
    subject { project_snippets_path(project) }

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/merge_requests" do
    subject { project_merge_requests_path(project) }

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/branches/recent" do
    subject { recent_project_branches_path(project) }

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/branches" do
    subject { project_branches_path(project) }

    before do
      # Speed increase
      Project.any_instance.stub(:branches).and_return([])
    end

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/tags" do
    subject { project_tags_path(project) }

    before do
      # Speed increase
      Project.any_instance.stub(:tags).and_return([])
    end

    it { should be_allowed_for master }
    it { should be_allowed_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end

  describe "GET /:project_path/hooks" do
    subject { project_hooks_path(project) }

    it { should be_allowed_for master }
    it { should be_denied_for reporter }
    it { should be_allowed_for :admin }
    it { should be_denied_for guest }
    it { should be_denied_for :user }
    it { should be_denied_for :visitor }
  end
end