diff options
author | GitLab Release Tools Bot <robert+release-tools@gitlab.com> | 2019-04-25 10:39:00 +0000 |
---|---|---|
committer | GitLab Release Tools Bot <robert+release-tools@gitlab.com> | 2019-04-25 10:39:00 +0000 |
commit | 227083df2905d5e9437d5b1818aef024fa5b297e (patch) | |
tree | 93f7629d74e86134909ab65edf3bc27409855c55 /spec | |
parent | c2c657982ec80ae4efd493e80082c43480da3fef (diff) | |
parent | 1cb51085792e9f3d8f66a91d737dd320bf8f0f56 (diff) | |
download | gitlab-ce-227083df2905d5e9437d5b1818aef024fa5b297e.tar.gz |
Merge branch 'security-pb-email-watchers-no-access-11-10' into '11-10-stable'
Stop sending emails to users who can't read commit
See merge request gitlab/gitlabhq!3063
Diffstat (limited to 'spec')
-rw-r--r-- | spec/models/notification_recipient_spec.rb | 40 |
1 files changed, 36 insertions, 4 deletions
diff --git a/spec/models/notification_recipient_spec.rb b/spec/models/notification_recipient_spec.rb index 3710f2be287..1b1ede6b14c 100644 --- a/spec/models/notification_recipient_spec.rb +++ b/spec/models/notification_recipient_spec.rb @@ -9,11 +9,43 @@ describe NotificationRecipient do subject(:recipient) { described_class.new(user, :watch, target: target, project: project) } - it 'denies access to a target when cross project access is denied' do - allow(Ability).to receive(:allowed?).and_call_original - expect(Ability).to receive(:allowed?).with(user, :read_cross_project, :global).and_return(false) + describe '#has_access?' do + before do + allow(user).to receive(:can?).and_call_original + end + + context 'user cannot read cross project' do + it 'returns false' do + expect(user).to receive(:can?).with(:read_cross_project).and_return(false) + expect(recipient.has_access?).to eq false + end + end + + context 'user cannot read build' do + let(:target) { build(:ci_pipeline) } + + it 'returns false' do + expect(user).to receive(:can?).with(:read_build, target).and_return(false) + expect(recipient.has_access?).to eq false + end + end - expect(recipient.has_access?).to be_falsy + context 'user cannot read commit' do + let(:target) { build(:commit) } + + it 'returns false' do + expect(user).to receive(:can?).with(:read_commit, target).and_return(false) + expect(recipient.has_access?).to eq false + end + end + + context 'target has no policy' do + let(:target) { double.as_null_object } + + it 'returns true' do + expect(recipient.has_access?).to eq true + end + end end context '#notification_setting' do |