summaryrefslogtreecommitdiff
path: root/spec
diff options
context:
space:
mode:
authorGitLab Release Tools Bot <robert+release-tools@gitlab.com>2019-04-25 10:39:00 +0000
committerGitLab Release Tools Bot <robert+release-tools@gitlab.com>2019-04-25 10:39:00 +0000
commit227083df2905d5e9437d5b1818aef024fa5b297e (patch)
tree93f7629d74e86134909ab65edf3bc27409855c55 /spec
parentc2c657982ec80ae4efd493e80082c43480da3fef (diff)
parent1cb51085792e9f3d8f66a91d737dd320bf8f0f56 (diff)
downloadgitlab-ce-227083df2905d5e9437d5b1818aef024fa5b297e.tar.gz
Merge branch 'security-pb-email-watchers-no-access-11-10' into '11-10-stable'
Stop sending emails to users who can't read commit See merge request gitlab/gitlabhq!3063
Diffstat (limited to 'spec')
-rw-r--r--spec/models/notification_recipient_spec.rb40
1 files changed, 36 insertions, 4 deletions
diff --git a/spec/models/notification_recipient_spec.rb b/spec/models/notification_recipient_spec.rb
index 3710f2be287..1b1ede6b14c 100644
--- a/spec/models/notification_recipient_spec.rb
+++ b/spec/models/notification_recipient_spec.rb
@@ -9,11 +9,43 @@ describe NotificationRecipient do
subject(:recipient) { described_class.new(user, :watch, target: target, project: project) }
- it 'denies access to a target when cross project access is denied' do
- allow(Ability).to receive(:allowed?).and_call_original
- expect(Ability).to receive(:allowed?).with(user, :read_cross_project, :global).and_return(false)
+ describe '#has_access?' do
+ before do
+ allow(user).to receive(:can?).and_call_original
+ end
+
+ context 'user cannot read cross project' do
+ it 'returns false' do
+ expect(user).to receive(:can?).with(:read_cross_project).and_return(false)
+ expect(recipient.has_access?).to eq false
+ end
+ end
+
+ context 'user cannot read build' do
+ let(:target) { build(:ci_pipeline) }
+
+ it 'returns false' do
+ expect(user).to receive(:can?).with(:read_build, target).and_return(false)
+ expect(recipient.has_access?).to eq false
+ end
+ end
- expect(recipient.has_access?).to be_falsy
+ context 'user cannot read commit' do
+ let(:target) { build(:commit) }
+
+ it 'returns false' do
+ expect(user).to receive(:can?).with(:read_commit, target).and_return(false)
+ expect(recipient.has_access?).to eq false
+ end
+ end
+
+ context 'target has no policy' do
+ let(:target) { double.as_null_object }
+
+ it 'returns true' do
+ expect(recipient.has_access?).to eq true
+ end
+ end
end
context '#notification_setting' do