Skip to content
GitLab
Next
Menu
Why GitLab
Pricing
Contact Sales
Explore
Why GitLab
Pricing
Contact Sales
Explore
Sign in
Get free trial
Primary navigation
Search or go to…
Project
GitLab FOSS
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Iterations
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Releases
Package Registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Privacy statement
Keyboard shortcuts
?
What's new
4
Snippets
Groups
Projects
Show more breadcrumbs
GitLab.org
GitLab FOSS
Commits
ac7ad422
Commit
ac7ad422
authored
7 years ago
by
Shinya Maeda
Browse files
Options
Downloads
Patches
Plain Diff
IMprove access_matchers
parent
043f1b82
No related branches found
No related tags found
1 merge request
!11846
Use authorize_update_pipeline_schedule in PipelineSchedulesController
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
spec/controllers/projects/pipeline_schedules_controller_spec.rb
+2
-1
2 additions, 1 deletion
...ontrollers/projects/pipeline_schedules_controller_spec.rb
spec/support/matchers/access_matchers_for_controller.rb
+22
-25
22 additions, 25 deletions
spec/support/matchers/access_matchers_for_controller.rb
with
24 additions
and
26 deletions
spec/controllers/projects/pipeline_schedules_controller_spec.rb
+
2
−
1
View file @
ac7ad422
...
...
@@ -127,7 +127,8 @@ def visit_pipelines_schedules
describe
'PUT update'
do
let
(
:action
)
do
proc
do
|
user
|
put
:update
,
namespace_id:
project
.
namespace
.
to_param
,
project_id:
project
,
id:
pipeline_schedule
.
id
put
:update
,
namespace_id:
project
.
namespace
.
to_param
,
project_id:
project
,
id:
pipeline_schedule
.
id
,
schedule:
{
description:
'a'
}
end
end
...
...
This diff is collapsed.
Click to expand it.
spec/support/matchers/access_matchers_for_controller.rb
+
22
−
25
View file @
ac7ad422
...
...
@@ -5,8 +5,8 @@ module AccessMatchersForController
extend
RSpec
::
Matchers
::
DSL
include
Warden
::
Test
::
Helpers
EXPECTED_STATUS_CODE_ALLOWED
=
[
200
,
302
].
freeze
EXPECTED_STATUS_CODE_DENIED
=
[
404
].
freeze
EXPECTED_STATUS_CODE_ALLOWED
=
[
200
,
201
,
302
].
freeze
EXPECTED_STATUS_CODE_DENIED
=
[
401
,
404
].
freeze
def
emulate_user
(
role
,
membership
=
nil
)
case
role
...
...
@@ -19,18 +19,13 @@ def emulate_user(role, membership = nil)
when
:external
user
=
create
(
:user
,
external:
true
)
sign_in
(
user
)
when
:visitor
# rubocop:disable Lint/EmptyWhen
# no-op
when
:visitor
user
=
nil
when
User
user
=
role
sign_in
(
user
)
when
*
Gitlab
::
Access
.
sym_options_with_owner
.
keys
# owner, master, developer, reporter, guest
raise
ArgumentError
,
"cannot emulate
#{
role
}
without membership parent"
unless
membership
if
role
==
:owner
&&
membership
.
owner
user
=
membership
.
owner
else
user
=
create
(
:user
)
membership
.
public_send
(
:"add_
#{
role
}
"
,
user
)
end
user
=
cerate_user_by_membership
(
role
,
membership
)
sign_in
(
user
)
else
raise
ArgumentError
,
"cannot emulate user
#{
role
}
"
...
...
@@ -39,6 +34,18 @@ def emulate_user(role, membership = nil)
user
end
def
cerate_user_by_membership
(
role
,
membership
=
nil
)
raise
ArgumentError
,
"cannot emulate
#{
role
}
without membership parent"
unless
membership
if
role
==
:owner
&&
membership
.
owner
user
=
membership
.
owner
else
user
=
create
(
:user
)
membership
.
public_send
(
:"add_
#{
role
}
"
,
user
)
end
user
end
def
description_for
(
role
,
type
,
expected
,
result
)
"be
#{
type
}
for
#{
role
}
."
\
" Expected:
#{
expected
.
join
(
','
)
}
Got:
#{
result
}
"
...
...
@@ -47,12 +54,7 @@ def description_for(role, type, expected, result)
matcher
:be_allowed_for
do
|
role
|
match
do
|
action
|
user
=
emulate_user
(
role
,
@membership
)
begin
action
.
call
(
user
)
rescue
# Ignore internal exceptions which will be caused in the controller
# In such cases, response.status will be 200.
end
action
.
call
(
user
)
EXPECTED_STATUS_CODE_ALLOWED
.
include?
(
response
.
status
)
end
...
...
@@ -68,12 +70,7 @@ def description_for(role, type, expected, result)
matcher
:be_denied_for
do
|
role
|
match
do
|
action
|
user
=
emulate_user
(
role
,
@membership
)
begin
action
.
call
(
user
)
rescue
# Ignore internal exceptions which will be caused in the controller
# In such cases, response.status will be 200.
end
action
.
call
(
user
)
EXPECTED_STATUS_CODE_DENIED
.
include?
(
response
.
status
)
end
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment