Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kazuhiko Shiozaki
gitlab-ce
Commits
3aa7132a
Commit
3aa7132a
authored
Sep 24, 2014
by
Dmitriy Zaporozhets
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Add GitAccess specs
parent
8d7ed7e5
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
180 additions
and
0 deletions
+180
-0
spec/lib/gitlab/git_access_spec.rb
spec/lib/gitlab/git_access_spec.rb
+180
-0
No files found.
spec/lib/gitlab/git_access_spec.rb
0 → 100644
View file @
3aa7132a
require
'spec_helper'
describe
Gitlab
::
GitAccess
do
let
(
:access
)
{
Gitlab
::
GitAccess
.
new
}
let
(
:project
)
{
create
(
:project
)
}
let
(
:user
)
{
create
(
:user
)
}
describe
'download_allowed?'
do
describe
'master permissions'
do
before
{
project
.
team
<<
[
user
,
:master
]
}
context
'pull code'
do
subject
{
access
.
download_allowed?
(
user
,
project
)
}
it
{
should
be_true
}
end
end
describe
'guest permissions'
do
before
{
project
.
team
<<
[
user
,
:guest
]
}
context
'pull code'
do
subject
{
access
.
download_allowed?
(
user
,
project
)
}
it
{
should
be_false
}
end
end
describe
'blocked user'
do
before
do
project
.
team
<<
[
user
,
:master
]
user
.
block
end
context
'pull code'
do
subject
{
access
.
download_allowed?
(
user
,
project
)
}
it
{
should
be_false
}
end
end
describe
'without acccess to project'
do
context
'pull code'
do
subject
{
access
.
download_allowed?
(
user
,
project
)
}
it
{
should
be_false
}
end
end
end
describe
'push_allowed?'
do
describe
'master permissions'
do
before
{
project
.
team
<<
[
user
,
:master
]
}
context
'push to new branch'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
new_branch_changes
)
}
it
{
should
be_true
}
end
context
'push to master branch'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
master_changes
)
}
it
{
should
be_true
}
end
context
'push to protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
master_changes
)
}
it
{
should
be_true
}
end
context
'remove protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
remove_master_changes
)
}
it
{
should
be_false
}
end
context
'push to existing tag'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
tag_changes
)
}
it
{
should
be_true
}
end
context
'push new tag'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
new_tag_changes
)
}
it
{
should
be_true
}
end
context
'push new tag and protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
[
new_tag_changes
,
master_changes
])
}
it
{
should
be_true
}
end
end
describe
'developer permissions'
do
before
{
project
.
team
<<
[
user
,
:developer
]
}
context
'push to new branch'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
new_branch_changes
)
}
it
{
should
be_true
}
end
context
'push to master branch'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
master_changes
)
}
it
{
should
be_true
}
end
context
'push to protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
master_changes
)
}
it
{
should
be_false
}
end
context
'remove protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
remove_master_changes
)
}
it
{
should
be_false
}
end
context
'push to existing tag'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
tag_changes
)
}
it
{
should
be_false
}
end
context
'push new tag'
do
subject
{
access
.
push_allowed?
(
user
,
project
,
new_tag_changes
)
}
it
{
should
be_true
}
end
context
'push new tag and protected branch'
do
before
{
protect_master
}
subject
{
access
.
push_allowed?
(
user
,
project
,
[
new_tag_changes
,
master_changes
])
}
it
{
should
be_false
}
end
end
end
describe
'forced_push?'
do
subject
{
access
.
forced_push?
(
project
,
'111111'
,
'222222'
)
}
it
{
should
be_false
}
end
def
new_branch_changes
'000000000 570e7b2ab refs/heads/wow'
end
def
master_changes
'6f6d7e7ed 570e7b2ab refs/heads/master'
end
def
remove_master_changes
'570e7b2ab 000000000 refs/heads/master'
end
def
tag_changes
'6f6d7e7ed 570e7b2ab refs/tags/v1.0.0'
end
def
new_tag_changes
'000000000 570e7b2ab refs/tags/v7.8.9'
end
def
protect_master
create
(
:protected_branch
,
name:
'master'
,
project:
project
)
end
end
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment