Commit ea779cc5abe9218193197d1c7b60d898dde47904
1 parent
bcdc7b5d
Exists in
master
and in
4 other branches
Public/Private projects security specs
Showing
3 changed files
with
469 additions
and
474 deletions
Show diff stats
... | ... | @@ -0,0 +1,218 @@ |
1 | +require 'spec_helper' | |
2 | + | |
3 | +describe "Private Project Access" do | |
4 | + let(:project) { create(:project_with_code) } | |
5 | + | |
6 | + let(:master) { create(:user) } | |
7 | + let(:guest) { create(:user) } | |
8 | + let(:reporter) { create(:user) } | |
9 | + | |
10 | + before do | |
11 | + # full access | |
12 | + project.team << [master, :master] | |
13 | + | |
14 | + # readonly | |
15 | + project.team << [reporter, :reporter] | |
16 | + end | |
17 | + | |
18 | + describe "GET /:project_path" do | |
19 | + subject { project_path(project) } | |
20 | + | |
21 | + it { should be_allowed_for master } | |
22 | + it { should be_allowed_for reporter } | |
23 | + it { should be_allowed_for :admin } | |
24 | + it { should be_denied_for guest } | |
25 | + it { should be_denied_for :user } | |
26 | + it { should be_denied_for :visitor } | |
27 | + end | |
28 | + | |
29 | + describe "GET /:project_path/tree/master" do | |
30 | + subject { project_tree_path(project, project.repository.root_ref) } | |
31 | + | |
32 | + it { should be_allowed_for master } | |
33 | + it { should be_allowed_for reporter } | |
34 | + it { should be_allowed_for :admin } | |
35 | + it { should be_denied_for guest } | |
36 | + it { should be_denied_for :user } | |
37 | + it { should be_denied_for :visitor } | |
38 | + end | |
39 | + | |
40 | + describe "GET /:project_path/commits/master" do | |
41 | + subject { project_commits_path(project, project.repository.root_ref, limit: 1) } | |
42 | + | |
43 | + it { should be_allowed_for master } | |
44 | + it { should be_allowed_for reporter } | |
45 | + it { should be_allowed_for :admin } | |
46 | + it { should be_denied_for guest } | |
47 | + it { should be_denied_for :user } | |
48 | + it { should be_denied_for :visitor } | |
49 | + end | |
50 | + | |
51 | + describe "GET /:project_path/commit/:sha" do | |
52 | + subject { project_commit_path(project, project.repository.commit) } | |
53 | + | |
54 | + it { should be_allowed_for master } | |
55 | + it { should be_allowed_for reporter } | |
56 | + it { should be_allowed_for :admin } | |
57 | + it { should be_denied_for guest } | |
58 | + it { should be_denied_for :user } | |
59 | + it { should be_denied_for :visitor } | |
60 | + end | |
61 | + | |
62 | + describe "GET /:project_path/compare" do | |
63 | + subject { project_compare_index_path(project) } | |
64 | + | |
65 | + it { should be_allowed_for master } | |
66 | + it { should be_allowed_for reporter } | |
67 | + it { should be_allowed_for :admin } | |
68 | + it { should be_denied_for guest } | |
69 | + it { should be_denied_for :user } | |
70 | + it { should be_denied_for :visitor } | |
71 | + end | |
72 | + | |
73 | + describe "GET /:project_path/team" do | |
74 | + subject { project_team_index_path(project) } | |
75 | + | |
76 | + it { should be_allowed_for master } | |
77 | + it { should be_denied_for reporter } | |
78 | + it { should be_allowed_for :admin } | |
79 | + it { should be_denied_for guest } | |
80 | + it { should be_denied_for :user } | |
81 | + it { should be_denied_for :visitor } | |
82 | + end | |
83 | + | |
84 | + describe "GET /:project_path/wall" do | |
85 | + subject { project_wall_path(project) } | |
86 | + | |
87 | + it { should be_allowed_for master } | |
88 | + it { should be_allowed_for reporter } | |
89 | + it { should be_allowed_for :admin } | |
90 | + it { should be_denied_for guest } | |
91 | + it { should be_denied_for :user } | |
92 | + it { should be_denied_for :visitor } | |
93 | + end | |
94 | + | |
95 | + describe "GET /:project_path/blob" do | |
96 | + before do | |
97 | + commit = project.repository.commit | |
98 | + path = commit.tree.contents.select { |i| i.is_a?(Grit::Blob) }.first.name | |
99 | + @blob_path = project_blob_path(project, File.join(commit.id, path)) | |
100 | + end | |
101 | + | |
102 | + it { @blob_path.should be_allowed_for master } | |
103 | + it { @blob_path.should be_allowed_for reporter } | |
104 | + it { @blob_path.should be_allowed_for :admin } | |
105 | + it { @blob_path.should be_denied_for guest } | |
106 | + it { @blob_path.should be_denied_for :user } | |
107 | + it { @blob_path.should be_denied_for :visitor } | |
108 | + end | |
109 | + | |
110 | + describe "GET /:project_path/edit" do | |
111 | + subject { edit_project_path(project) } | |
112 | + | |
113 | + it { should be_allowed_for master } | |
114 | + it { should be_denied_for reporter } | |
115 | + it { should be_allowed_for :admin } | |
116 | + it { should be_denied_for guest } | |
117 | + it { should be_denied_for :user } | |
118 | + it { should be_denied_for :visitor } | |
119 | + end | |
120 | + | |
121 | + describe "GET /:project_path/deploy_keys" do | |
122 | + subject { project_deploy_keys_path(project) } | |
123 | + | |
124 | + it { should be_allowed_for master } | |
125 | + it { should be_denied_for reporter } | |
126 | + it { should be_allowed_for :admin } | |
127 | + it { should be_denied_for guest } | |
128 | + it { should be_denied_for :user } | |
129 | + it { should be_denied_for :visitor } | |
130 | + end | |
131 | + | |
132 | + describe "GET /:project_path/issues" do | |
133 | + subject { project_issues_path(project) } | |
134 | + | |
135 | + it { should be_allowed_for master } | |
136 | + it { should be_allowed_for reporter } | |
137 | + it { should be_allowed_for :admin } | |
138 | + it { should be_denied_for guest } | |
139 | + it { should be_denied_for :user } | |
140 | + it { should be_denied_for :visitor } | |
141 | + end | |
142 | + | |
143 | + describe "GET /:project_path/snippets" do | |
144 | + subject { project_snippets_path(project) } | |
145 | + | |
146 | + it { should be_allowed_for master } | |
147 | + it { should be_allowed_for reporter } | |
148 | + it { should be_allowed_for :admin } | |
149 | + it { should be_denied_for guest } | |
150 | + it { should be_denied_for :user } | |
151 | + it { should be_denied_for :visitor } | |
152 | + end | |
153 | + | |
154 | + describe "GET /:project_path/merge_requests" do | |
155 | + subject { project_merge_requests_path(project) } | |
156 | + | |
157 | + it { should be_allowed_for master } | |
158 | + it { should be_allowed_for reporter } | |
159 | + it { should be_allowed_for :admin } | |
160 | + it { should be_denied_for guest } | |
161 | + it { should be_denied_for :user } | |
162 | + it { should be_denied_for :visitor } | |
163 | + end | |
164 | + | |
165 | + describe "GET /:project_path/branches/recent" do | |
166 | + subject { recent_project_branches_path(project) } | |
167 | + | |
168 | + it { should be_allowed_for master } | |
169 | + it { should be_allowed_for reporter } | |
170 | + it { should be_allowed_for :admin } | |
171 | + it { should be_denied_for guest } | |
172 | + it { should be_denied_for :user } | |
173 | + it { should be_denied_for :visitor } | |
174 | + end | |
175 | + | |
176 | + describe "GET /:project_path/branches" do | |
177 | + subject { project_branches_path(project) } | |
178 | + | |
179 | + before do | |
180 | + # Speed increase | |
181 | + Project.any_instance.stub(:branches).and_return([]) | |
182 | + end | |
183 | + | |
184 | + it { should be_allowed_for master } | |
185 | + it { should be_allowed_for reporter } | |
186 | + it { should be_allowed_for :admin } | |
187 | + it { should be_denied_for guest } | |
188 | + it { should be_denied_for :user } | |
189 | + it { should be_denied_for :visitor } | |
190 | + end | |
191 | + | |
192 | + describe "GET /:project_path/tags" do | |
193 | + subject { project_tags_path(project) } | |
194 | + | |
195 | + before do | |
196 | + # Speed increase | |
197 | + Project.any_instance.stub(:tags).and_return([]) | |
198 | + end | |
199 | + | |
200 | + it { should be_allowed_for master } | |
201 | + it { should be_allowed_for reporter } | |
202 | + it { should be_allowed_for :admin } | |
203 | + it { should be_denied_for guest } | |
204 | + it { should be_denied_for :user } | |
205 | + it { should be_denied_for :visitor } | |
206 | + end | |
207 | + | |
208 | + describe "GET /:project_path/hooks" do | |
209 | + subject { project_hooks_path(project) } | |
210 | + | |
211 | + it { should be_allowed_for master } | |
212 | + it { should be_denied_for reporter } | |
213 | + it { should be_allowed_for :admin } | |
214 | + it { should be_denied_for guest } | |
215 | + it { should be_denied_for :user } | |
216 | + it { should be_denied_for :visitor } | |
217 | + end | |
218 | +end | ... | ... |
... | ... | @@ -0,0 +1,251 @@ |
1 | +require 'spec_helper' | |
2 | + | |
3 | +describe "Public Project Access" do | |
4 | + let(:project) { create(:project_with_code) } | |
5 | + | |
6 | + let(:master) { create(:user) } | |
7 | + let(:guest) { create(:user) } | |
8 | + let(:reporter) { create(:user) } | |
9 | + | |
10 | + before do | |
11 | + # public project | |
12 | + project.public = true | |
13 | + project.save! | |
14 | + | |
15 | + # full access | |
16 | + project.team << [master, :master] | |
17 | + | |
18 | + # readonly | |
19 | + project.team << [reporter, :reporter] | |
20 | + | |
21 | + end | |
22 | + | |
23 | + describe "Project should be public" do | |
24 | + subject { project } | |
25 | + | |
26 | + its(:public?) { should be_true } | |
27 | + end | |
28 | + | |
29 | + describe "GET /:project_path" do | |
30 | + subject { project_path(project) } | |
31 | + | |
32 | + it { should be_allowed_for master } | |
33 | + it { should be_allowed_for reporter } | |
34 | + it { should be_allowed_for :admin } | |
35 | + it { should be_allowed_for guest } | |
36 | + it { should be_allowed_for :user } | |
37 | + it { should be_allowed_for :visitor } | |
38 | + end | |
39 | + | |
40 | + describe "GET /:project_path/tree/master" do | |
41 | + subject { project_tree_path(project, project.repository.root_ref) } | |
42 | + | |
43 | + it { should be_allowed_for master } | |
44 | + it { should be_allowed_for reporter } | |
45 | + it { should be_allowed_for :admin } | |
46 | + it { should be_allowed_for guest } | |
47 | + it { should be_allowed_for :user } | |
48 | + it { should be_allowed_for :visitor } | |
49 | + end | |
50 | + | |
51 | + describe "GET /:project_path/commits/master" do | |
52 | + subject { project_commits_path(project, project.repository.root_ref, limit: 1) } | |
53 | + | |
54 | + it { should be_allowed_for master } | |
55 | + it { should be_allowed_for reporter } | |
56 | + it { should be_allowed_for :admin } | |
57 | + it { should be_allowed_for guest } | |
58 | + it { should be_allowed_for :user } | |
59 | + it { should be_allowed_for :visitor } | |
60 | + end | |
61 | + | |
62 | + describe "GET /:project_path/commit/:sha" do | |
63 | + subject { project_commit_path(project, project.repository.commit) } | |
64 | + | |
65 | + it { should be_allowed_for master } | |
66 | + it { should be_allowed_for reporter } | |
67 | + it { should be_allowed_for :admin } | |
68 | + it { should be_allowed_for guest } | |
69 | + it { should be_allowed_for :user } | |
70 | + it { should be_allowed_for :visitor } | |
71 | + end | |
72 | + | |
73 | + describe "GET /:project_path/compare" do | |
74 | + subject { project_compare_index_path(project) } | |
75 | + | |
76 | + it { should be_allowed_for master } | |
77 | + it { should be_allowed_for reporter } | |
78 | + it { should be_allowed_for :admin } | |
79 | + it { should be_allowed_for guest } | |
80 | + it { should be_allowed_for :user } | |
81 | + it { should be_allowed_for :visitor } | |
82 | + end | |
83 | + | |
84 | + describe "GET /:project_path/team" do | |
85 | + subject { project_team_index_path(project) } | |
86 | + | |
87 | + it { should be_allowed_for master } | |
88 | + it { should be_denied_for reporter } | |
89 | + it { should be_allowed_for :admin } | |
90 | + it { should be_denied_for guest } | |
91 | + it { should be_denied_for :user } | |
92 | + it { should be_denied_for :visitor } | |
93 | + end | |
94 | + | |
95 | + describe "GET /:project_path/wall" do | |
96 | + subject { project_wall_path(project) } | |
97 | + | |
98 | + it { should be_allowed_for master } | |
99 | + it { should be_allowed_for reporter } | |
100 | + it { should be_allowed_for :admin } | |
101 | + it { should be_allowed_for guest } | |
102 | + it { should be_allowed_for :user } | |
103 | + it { should be_allowed_for :visitor } | |
104 | + end | |
105 | + | |
106 | + describe "GET /:project_path/blob" do | |
107 | + before do | |
108 | + commit = project.repository.commit | |
109 | + path = commit.tree.contents.select { |i| i.is_a?(Grit::Blob) }.first.name | |
110 | + @blob_path = project_blob_path(project, File.join(commit.id, path)) | |
111 | + end | |
112 | + | |
113 | + it { @blob_path.should be_allowed_for master } | |
114 | + it { @blob_path.should be_allowed_for reporter } | |
115 | + it { @blob_path.should be_allowed_for :admin } | |
116 | + it { @blob_path.should be_allowed_for guest } | |
117 | + it { @blob_path.should be_allowed_for :user } | |
118 | + it { @blob_path.should be_allowed_for :visitor } | |
119 | + end | |
120 | + | |
121 | + describe "GET /:project_path/edit" do | |
122 | + subject { edit_project_path(project) } | |
123 | + | |
124 | + it { should be_allowed_for master } | |
125 | + it { should be_denied_for reporter } | |
126 | + it { should be_allowed_for :admin } | |
127 | + it { should be_denied_for guest } | |
128 | + it { should be_denied_for :user } | |
129 | + it { should be_denied_for :visitor } | |
130 | + end | |
131 | + | |
132 | + describe "GET /:project_path/deploy_keys" do | |
133 | + subject { project_deploy_keys_path(project) } | |
134 | + | |
135 | + it { should be_allowed_for master } | |
136 | + it { should be_denied_for reporter } | |
137 | + it { should be_allowed_for :admin } | |
138 | + it { should be_denied_for guest } | |
139 | + it { should be_denied_for :user } | |
140 | + it { should be_denied_for :visitor } | |
141 | + end | |
142 | + | |
143 | + describe "GET /:project_path/issues" do | |
144 | + subject { project_issues_path(project) } | |
145 | + | |
146 | + it { should be_allowed_for master } | |
147 | + it { should be_allowed_for reporter } | |
148 | + it { should be_allowed_for :admin } | |
149 | + it { should be_allowed_for guest } | |
150 | + it { should be_allowed_for :user } | |
151 | + it { should be_allowed_for :visitor } | |
152 | + end | |
153 | + | |
154 | + describe "GET /:project_path/snippets" do | |
155 | + subject { project_snippets_path(project) } | |
156 | + | |
157 | + it { should be_allowed_for master } | |
158 | + it { should be_allowed_for reporter } | |
159 | + it { should be_allowed_for :admin } | |
160 | + it { should be_allowed_for guest } | |
161 | + it { should be_allowed_for :user } | |
162 | + it { should be_allowed_for :visitor } | |
163 | + end | |
164 | + | |
165 | + describe "GET /:project_path/snippets/new" do | |
166 | + subject { new_project_snippet_path(project) } | |
167 | + | |
168 | + it { should be_allowed_for master } | |
169 | + it { should be_allowed_for reporter } | |
170 | + it { should be_allowed_for :admin } | |
171 | + it { should be_denied_for guest } | |
172 | + it { should be_denied_for :user } | |
173 | + it { should be_denied_for :visitor } | |
174 | + end | |
175 | + | |
176 | + describe "GET /:project_path/merge_requests" do | |
177 | + subject { project_merge_requests_path(project) } | |
178 | + | |
179 | + it { should be_allowed_for master } | |
180 | + it { should be_allowed_for reporter } | |
181 | + it { should be_allowed_for :admin } | |
182 | + it { should be_allowed_for guest } | |
183 | + it { should be_allowed_for :user } | |
184 | + it { should be_allowed_for :visitor } | |
185 | + end | |
186 | + | |
187 | + describe "GET /:project_path/merge_requests/new" do | |
188 | + subject { new_project_merge_request_path(project) } | |
189 | + | |
190 | + it { should be_allowed_for master } | |
191 | + it { should be_denied_for reporter } | |
192 | + it { should be_allowed_for :admin } | |
193 | + it { should be_denied_for guest } | |
194 | + it { should be_denied_for :user } | |
195 | + it { should be_denied_for :visitor } | |
196 | + end | |
197 | + | |
198 | + describe "GET /:project_path/branches/recent" do | |
199 | + subject { recent_project_branches_path(project) } | |
200 | + | |
201 | + it { should be_allowed_for master } | |
202 | + it { should be_allowed_for reporter } | |
203 | + it { should be_allowed_for :admin } | |
204 | + it { should be_allowed_for guest } | |
205 | + it { should be_allowed_for :user } | |
206 | + it { should be_allowed_for :visitor } | |
207 | + end | |
208 | + | |
209 | + describe "GET /:project_path/branches" do | |
210 | + subject { project_branches_path(project) } | |
211 | + | |
212 | + before do | |
213 | + # Speed increase | |
214 | + Project.any_instance.stub(:branches).and_return([]) | |
215 | + end | |
216 | + | |
217 | + it { should be_allowed_for master } | |
218 | + it { should be_allowed_for reporter } | |
219 | + it { should be_allowed_for :admin } | |
220 | + it { should be_allowed_for guest } | |
221 | + it { should be_allowed_for :user } | |
222 | + it { should be_allowed_for :visitor } | |
223 | + end | |
224 | + | |
225 | + describe "GET /:project_path/tags" do | |
226 | + subject { project_tags_path(project) } | |
227 | + | |
228 | + before do | |
229 | + # Speed increase | |
230 | + Project.any_instance.stub(:tags).and_return([]) | |
231 | + end | |
232 | + | |
233 | + it { should be_allowed_for master } | |
234 | + it { should be_allowed_for reporter } | |
235 | + it { should be_allowed_for :admin } | |
236 | + it { should be_allowed_for guest } | |
237 | + it { should be_allowed_for :user } | |
238 | + it { should be_allowed_for :visitor } | |
239 | + end | |
240 | + | |
241 | + describe "GET /:project_path/hooks" do | |
242 | + subject { project_hooks_path(project) } | |
243 | + | |
244 | + it { should be_allowed_for master } | |
245 | + it { should be_denied_for reporter } | |
246 | + it { should be_allowed_for :admin } | |
247 | + it { should be_denied_for guest } | |
248 | + it { should be_denied_for :user } | |
249 | + it { should be_denied_for :visitor } | |
250 | + end | |
251 | +end | ... | ... |
spec/features/security/project_access_spec.rb
... | ... | @@ -1,474 +0,0 @@ |
1 | -require 'spec_helper' | |
2 | - | |
3 | -describe "Application access" do | |
4 | - describe "GET /" do | |
5 | - it { root_path.should be_allowed_for :admin } | |
6 | - it { root_path.should be_allowed_for :user } | |
7 | - it { root_path.should be_denied_for :visitor } | |
8 | - end | |
9 | - | |
10 | - describe "GET /projects/new" do | |
11 | - it { new_project_path.should be_allowed_for :admin } | |
12 | - it { new_project_path.should be_allowed_for :user } | |
13 | - it { new_project_path.should be_denied_for :visitor } | |
14 | - end | |
15 | - | |
16 | - describe "Project" do | |
17 | - let(:project) { create(:project_with_code) } | |
18 | - | |
19 | - let(:master) { create(:user) } | |
20 | - let(:guest) { create(:user) } | |
21 | - let(:reporter) { create(:user) } | |
22 | - | |
23 | - before do | |
24 | - # full access | |
25 | - project.team << [master, :master] | |
26 | - | |
27 | - # readonly | |
28 | - project.team << [reporter, :reporter] | |
29 | - end | |
30 | - | |
31 | - describe "GET /project_code" do | |
32 | - subject { project_path(project) } | |
33 | - | |
34 | - it { should be_allowed_for master } | |
35 | - it { should be_allowed_for reporter } | |
36 | - it { should be_allowed_for :admin } | |
37 | - it { should be_denied_for guest } | |
38 | - it { should be_denied_for :user } | |
39 | - it { should be_denied_for :visitor } | |
40 | - end | |
41 | - | |
42 | - describe "GET /project_code/tree/master" do | |
43 | - subject { project_tree_path(project, project.repository.root_ref) } | |
44 | - | |
45 | - it { should be_allowed_for master } | |
46 | - it { should be_allowed_for reporter } | |
47 | - it { should be_allowed_for :admin } | |
48 | - it { should be_denied_for guest } | |
49 | - it { should be_denied_for :user } | |
50 | - it { should be_denied_for :visitor } | |
51 | - end | |
52 | - | |
53 | - describe "GET /project_code/commits/master" do | |
54 | - subject { project_commits_path(project, project.repository.root_ref, limit: 1) } | |
55 | - | |
56 | - it { should be_allowed_for master } | |
57 | - it { should be_allowed_for reporter } | |
58 | - it { should be_allowed_for :admin } | |
59 | - it { should be_denied_for guest } | |
60 | - it { should be_denied_for :user } | |
61 | - it { should be_denied_for :visitor } | |
62 | - end | |
63 | - | |
64 | - describe "GET /project_code/commit/:sha" do | |
65 | - subject { project_commit_path(project, project.repository.commit) } | |
66 | - | |
67 | - it { should be_allowed_for master } | |
68 | - it { should be_allowed_for reporter } | |
69 | - it { should be_allowed_for :admin } | |
70 | - it { should be_denied_for guest } | |
71 | - it { should be_denied_for :user } | |
72 | - it { should be_denied_for :visitor } | |
73 | - end | |
74 | - | |
75 | - describe "GET /project_code/compare" do | |
76 | - subject { project_compare_index_path(project) } | |
77 | - | |
78 | - it { should be_allowed_for master } | |
79 | - it { should be_allowed_for reporter } | |
80 | - it { should be_allowed_for :admin } | |
81 | - it { should be_denied_for guest } | |
82 | - it { should be_denied_for :user } | |
83 | - it { should be_denied_for :visitor } | |
84 | - end | |
85 | - | |
86 | - describe "GET /project_code/team" do | |
87 | - subject { project_team_index_path(project) } | |
88 | - | |
89 | - it { should be_allowed_for master } | |
90 | - it { should be_allowed_for reporter } | |
91 | - it { should be_allowed_for :admin } | |
92 | - it { should be_denied_for guest } | |
93 | - it { should be_denied_for :user } | |
94 | - it { should be_denied_for :visitor } | |
95 | - end | |
96 | - | |
97 | - describe "GET /project_code/wall" do | |
98 | - subject { project_wall_path(project) } | |
99 | - | |
100 | - it { should be_allowed_for master } | |
101 | - it { should be_allowed_for reporter } | |
102 | - it { should be_allowed_for :admin } | |
103 | - it { should be_denied_for guest } | |
104 | - it { should be_denied_for :user } | |
105 | - it { should be_denied_for :visitor } | |
106 | - end | |
107 | - | |
108 | - describe "GET /project_code/blob" do | |
109 | - before do | |
110 | - commit = project.repository.commit | |
111 | - path = commit.tree.contents.select { |i| i.is_a?(Grit::Blob) }.first.name | |
112 | - @blob_path = project_blob_path(project, File.join(commit.id, path)) | |
113 | - end | |
114 | - | |
115 | - it { @blob_path.should be_allowed_for master } | |
116 | - it { @blob_path.should be_allowed_for reporter } | |
117 | - it { @blob_path.should be_allowed_for :admin } | |
118 | - it { @blob_path.should be_denied_for guest } | |
119 | - it { @blob_path.should be_denied_for :user } | |
120 | - it { @blob_path.should be_denied_for :visitor } | |
121 | - end | |
122 | - | |
123 | - describe "GET /project_code/edit" do | |
124 | - subject { edit_project_path(project) } | |
125 | - | |
126 | - it { should be_allowed_for master } | |
127 | - it { should be_denied_for reporter } | |
128 | - it { should be_allowed_for :admin } | |
129 | - it { should be_denied_for guest } | |
130 | - it { should be_denied_for :user } | |
131 | - it { should be_denied_for :visitor } | |
132 | - end | |
133 | - | |
134 | - describe "GET /project_code/deploy_keys" do | |
135 | - subject { project_deploy_keys_path(project) } | |
136 | - | |
137 | - it { should be_allowed_for master } | |
138 | - it { should be_denied_for reporter } | |
139 | - it { should be_allowed_for :admin } | |
140 | - it { should be_denied_for guest } | |
141 | - it { should be_denied_for :user } | |
142 | - it { should be_denied_for :visitor } | |
143 | - end | |
144 | - | |
145 | - describe "GET /project_code/issues" do | |
146 | - subject { project_issues_path(project) } | |
147 | - | |
148 | - it { should be_allowed_for master } | |
149 | - it { should be_allowed_for reporter } | |
150 | - it { should be_allowed_for :admin } | |
151 | - it { should be_denied_for guest } | |
152 | - it { should be_denied_for :user } | |
153 | - it { should be_denied_for :visitor } | |
154 | - end | |
155 | - | |
156 | - describe "GET /project_code/snippets" do | |
157 | - subject { project_snippets_path(project) } | |
158 | - | |
159 | - it { should be_allowed_for master } | |
160 | - it { should be_allowed_for reporter } | |
161 | - it { should be_allowed_for :admin } | |
162 | - it { should be_denied_for guest } | |
163 | - it { should be_denied_for :user } | |
164 | - it { should be_denied_for :visitor } | |
165 | - end | |
166 | - | |
167 | - describe "GET /project_code/merge_requests" do | |
168 | - subject { project_merge_requests_path(project) } | |
169 | - | |
170 | - it { should be_allowed_for master } | |
171 | - it { should be_allowed_for reporter } | |
172 | - it { should be_allowed_for :admin } | |
173 | - it { should be_denied_for guest } | |
174 | - it { should be_denied_for :user } | |
175 | - it { should be_denied_for :visitor } | |
176 | - end | |
177 | - | |
178 | - describe "GET /project_code/branches/recent" do | |
179 | - subject { recent_project_branches_path(project) } | |
180 | - | |
181 | - it { should be_allowed_for master } | |
182 | - it { should be_allowed_for reporter } | |
183 | - it { should be_allowed_for :admin } | |
184 | - it { should be_denied_for guest } | |
185 | - it { should be_denied_for :user } | |
186 | - it { should be_denied_for :visitor } | |
187 | - end | |
188 | - | |
189 | - describe "GET /project_code/branches" do | |
190 | - subject { project_branches_path(project) } | |
191 | - | |
192 | - before do | |
193 | - # Speed increase | |
194 | - Project.any_instance.stub(:branches).and_return([]) | |
195 | - end | |
196 | - | |
197 | - it { should be_allowed_for master } | |
198 | - it { should be_allowed_for reporter } | |
199 | - it { should be_allowed_for :admin } | |
200 | - it { should be_denied_for guest } | |
201 | - it { should be_denied_for :user } | |
202 | - it { should be_denied_for :visitor } | |
203 | - end | |
204 | - | |
205 | - describe "GET /project_code/tags" do | |
206 | - subject { project_tags_path(project) } | |
207 | - | |
208 | - before do | |
209 | - # Speed increase | |
210 | - Project.any_instance.stub(:tags).and_return([]) | |
211 | - end | |
212 | - | |
213 | - it { should be_allowed_for master } | |
214 | - it { should be_allowed_for reporter } | |
215 | - it { should be_allowed_for :admin } | |
216 | - it { should be_denied_for guest } | |
217 | - it { should be_denied_for :user } | |
218 | - it { should be_denied_for :visitor } | |
219 | - end | |
220 | - | |
221 | - describe "GET /project_code/hooks" do | |
222 | - subject { project_hooks_path(project) } | |
223 | - | |
224 | - it { should be_allowed_for master } | |
225 | - it { should be_allowed_for reporter } | |
226 | - it { should be_allowed_for :admin } | |
227 | - it { should be_denied_for guest } | |
228 | - it { should be_denied_for :user } | |
229 | - it { should be_denied_for :visitor } | |
230 | - end | |
231 | - end | |
232 | - | |
233 | - | |
234 | - describe "PublicProject" do | |
235 | - let(:project) { create(:project_with_code) } | |
236 | - | |
237 | - let(:master) { create(:user) } | |
238 | - let(:guest) { create(:user) } | |
239 | - let(:reporter) { create(:user) } | |
240 | - | |
241 | - let(:admin) { create(:user) } | |
242 | - | |
243 | - before do | |
244 | - # public project | |
245 | - project.public = true | |
246 | - project.save! | |
247 | - | |
248 | - # full access | |
249 | - project.team << [master, :master] | |
250 | - | |
251 | - # readonly | |
252 | - project.team << [reporter, :reporter] | |
253 | - | |
254 | - end | |
255 | - | |
256 | - describe "Project should be public" do | |
257 | - subject { project } | |
258 | - | |
259 | - its(:public?) { should be_true } | |
260 | - end | |
261 | - | |
262 | - describe "GET /project_code" do | |
263 | - subject { project_path(project) } | |
264 | - | |
265 | - it { should be_allowed_for master } | |
266 | - it { should be_allowed_for reporter } | |
267 | - it { should be_allowed_for admin } | |
268 | - it { should be_allowed_for guest } | |
269 | - it { should be_allowed_for :user } | |
270 | - it { should be_denied_for :visitor } | |
271 | - end | |
272 | - | |
273 | - describe "GET /project_code/tree/master" do | |
274 | - subject { project_tree_path(project, project.repository.root_ref) } | |
275 | - | |
276 | - it { should be_allowed_for master } | |
277 | - it { should be_allowed_for reporter } | |
278 | - it { should be_allowed_for :admin } | |
279 | - it { should be_allowed_for guest } | |
280 | - it { should be_allowed_for :user } | |
281 | - it { should be_denied_for :visitor } | |
282 | - end | |
283 | - | |
284 | - describe "GET /project_code/commits/master" do | |
285 | - subject { project_commits_path(project, project.repository.root_ref, limit: 1) } | |
286 | - | |
287 | - it { should be_allowed_for master } | |
288 | - it { should be_allowed_for reporter } | |
289 | - it { should be_allowed_for :admin } | |
290 | - it { should be_allowed_for guest } | |
291 | - it { should be_allowed_for :user } | |
292 | - it { should be_denied_for :visitor } | |
293 | - end | |
294 | - | |
295 | - describe "GET /project_code/commit/:sha" do | |
296 | - subject { project_commit_path(project, project.repository.commit) } | |
297 | - | |
298 | - it { should be_allowed_for master } | |
299 | - it { should be_allowed_for reporter } | |
300 | - it { should be_allowed_for :admin } | |
301 | - it { should be_allowed_for guest } | |
302 | - it { should be_allowed_for :user } | |
303 | - it { should be_denied_for :visitor } | |
304 | - end | |
305 | - | |
306 | - describe "GET /project_code/compare" do | |
307 | - subject { project_compare_index_path(project) } | |
308 | - | |
309 | - it { should be_allowed_for master } | |
310 | - it { should be_allowed_for reporter } | |
311 | - it { should be_allowed_for :admin } | |
312 | - it { should be_allowed_for guest } | |
313 | - it { should be_allowed_for :user } | |
314 | - it { should be_denied_for :visitor } | |
315 | - end | |
316 | - | |
317 | - describe "GET /project_code/team" do | |
318 | - subject { project_team_index_path(project) } | |
319 | - | |
320 | - it { should be_allowed_for master } | |
321 | - it { should be_allowed_for reporter } | |
322 | - it { should be_allowed_for :admin } | |
323 | - it { should be_allowed_for guest } | |
324 | - it { should be_allowed_for :user } | |
325 | - it { should be_denied_for :visitor } | |
326 | - end | |
327 | - | |
328 | - describe "GET /project_code/wall" do | |
329 | - subject { project_wall_path(project) } | |
330 | - | |
331 | - it { should be_allowed_for master } | |
332 | - it { should be_allowed_for reporter } | |
333 | - it { should be_allowed_for :admin } | |
334 | - it { should be_allowed_for guest } | |
335 | - it { should be_allowed_for :user } | |
336 | - it { should be_denied_for :visitor } | |
337 | - end | |
338 | - | |
339 | - describe "GET /project_code/blob" do | |
340 | - before do | |
341 | - commit = project.repository.commit | |
342 | - path = commit.tree.contents.select { |i| i.is_a?(Grit::Blob) }.first.name | |
343 | - @blob_path = project_blob_path(project, File.join(commit.id, path)) | |
344 | - end | |
345 | - | |
346 | - it { @blob_path.should be_allowed_for master } | |
347 | - it { @blob_path.should be_allowed_for reporter } | |
348 | - it { @blob_path.should be_allowed_for :admin } | |
349 | - it { @blob_path.should be_allowed_for guest } | |
350 | - it { @blob_path.should be_allowed_for :user } | |
351 | - it { @blob_path.should be_denied_for :visitor } | |
352 | - end | |
353 | - | |
354 | - describe "GET /project_code/edit" do | |
355 | - subject { edit_project_path(project) } | |
356 | - | |
357 | - it { should be_allowed_for master } | |
358 | - it { should be_denied_for reporter } | |
359 | - it { should be_allowed_for :admin } | |
360 | - it { should be_denied_for guest } | |
361 | - it { should be_denied_for :user } | |
362 | - it { should be_denied_for :visitor } | |
363 | - end | |
364 | - | |
365 | - describe "GET /project_code/deploy_keys" do | |
366 | - subject { project_deploy_keys_path(project) } | |
367 | - | |
368 | - it { should be_allowed_for master } | |
369 | - it { should be_denied_for reporter } | |
370 | - it { should be_allowed_for :admin } | |
371 | - it { should be_denied_for guest } | |
372 | - it { should be_denied_for :user } | |
373 | - it { should be_denied_for :visitor } | |
374 | - end | |
375 | - | |
376 | - describe "GET /project_code/issues" do | |
377 | - subject { project_issues_path(project) } | |
378 | - | |
379 | - it { should be_allowed_for master } | |
380 | - it { should be_allowed_for reporter } | |
381 | - it { should be_allowed_for :admin } | |
382 | - it { should be_allowed_for guest } | |
383 | - it { should be_allowed_for :user } | |
384 | - it { should be_denied_for :visitor } | |
385 | - end | |
386 | - | |
387 | - describe "GET /project_code/snippets" do | |
388 | - subject { project_snippets_path(project) } | |
389 | - | |
390 | - it { should be_allowed_for master } | |
391 | - it { should be_allowed_for reporter } | |
392 | - it { should be_allowed_for :admin } | |
393 | - it { should be_allowed_for guest } | |
394 | - it { should be_allowed_for :user } | |
395 | - it { should be_denied_for :visitor } | |
396 | - end | |
397 | - | |
398 | - describe "GET /project_code/snippets/new" do | |
399 | - subject { new_project_snippet_path(project) } | |
400 | - | |
401 | - it { should be_allowed_for master } | |
402 | - it { should be_allowed_for reporter } | |
403 | - it { should be_allowed_for :admin } | |
404 | - it { should be_denied_for guest } | |
405 | - it { should be_denied_for :user } | |
406 | - it { should be_denied_for :visitor } | |
407 | - end | |
408 | - | |
409 | - describe "GET /project_code/merge_requests" do | |
410 | - subject { project_merge_requests_path(project) } | |
411 | - | |
412 | - it { should be_allowed_for master } | |
413 | - it { should be_allowed_for reporter } | |
414 | - it { should be_allowed_for :admin } | |
415 | - it { should be_allowed_for guest } | |
416 | - it { should be_allowed_for :user } | |
417 | - it { should be_denied_for :visitor } | |
418 | - end | |
419 | - | |
420 | - describe "GET /project_code/branches/recent" do | |
421 | - subject { recent_project_branches_path(project) } | |
422 | - | |
423 | - it { should be_allowed_for master } | |
424 | - it { should be_allowed_for reporter } | |
425 | - it { should be_allowed_for :admin } | |
426 | - it { should be_allowed_for guest } | |
427 | - it { should be_allowed_for :user } | |
428 | - it { should be_denied_for :visitor } | |
429 | - end | |
430 | - | |
431 | - describe "GET /project_code/branches" do | |
432 | - subject { project_branches_path(project) } | |
433 | - | |
434 | - before do | |
435 | - # Speed increase | |
436 | - Project.any_instance.stub(:branches).and_return([]) | |
437 | - end | |
438 | - | |
439 | - it { should be_allowed_for master } | |
440 | - it { should be_allowed_for reporter } | |
441 | - it { should be_allowed_for :admin } | |
442 | - it { should be_allowed_for guest } | |
443 | - it { should be_allowed_for :user } | |
444 | - it { should be_denied_for :visitor } | |
445 | - end | |
446 | - | |
447 | - describe "GET /project_code/tags" do | |
448 | - subject { project_tags_path(project) } | |
449 | - | |
450 | - before do | |
451 | - # Speed increase | |
452 | - Project.any_instance.stub(:tags).and_return([]) | |
453 | - end | |
454 | - | |
455 | - it { should be_allowed_for master } | |
456 | - it { should be_allowed_for reporter } | |
457 | - it { should be_allowed_for :admin } | |
458 | - it { should be_allowed_for guest } | |
459 | - it { should be_allowed_for :user } | |
460 | - it { should be_denied_for :visitor } | |
461 | - end | |
462 | - | |
463 | - describe "GET /project_code/hooks" do | |
464 | - subject { project_hooks_path(project) } | |
465 | - | |
466 | - it { should be_allowed_for master } | |
467 | - it { should be_allowed_for reporter } | |
468 | - it { should be_allowed_for :admin } | |
469 | - it { should be_allowed_for guest } | |
470 | - it { should be_allowed_for :user } | |
471 | - it { should be_denied_for :visitor } | |
472 | - end | |
473 | - end | |
474 | -end |