Skip to content
Snippets Groups Projects
Commit 594d3e7a authored by Robert Speicher's avatar Robert Speicher
Browse files

Merge branch 'fix/ci-build-policy' into 'master'

Fix build access policies when pipelines are public

See merge request !8711
parents 6aec85ac d32953db
No related branches found
No related tags found
No related merge requests found
module Ci module Ci
class BuildPolicy < CommitStatusPolicy class BuildPolicy < CommitStatusPolicy
def rules def rules
can! :read_build if @subject.project.public_builds?
super super
   
# If we can't read build we should also not have that # If we can't read build we should also not have that
Loading
Loading
---
title: Improve build policy and access abilities
merge_request: 8711
author:
require 'spec_helper'
describe Ci::BuildPolicy, :models do
let(:user) { create(:user) }
let(:build) { create(:ci_build, pipeline: pipeline) }
let(:pipeline) { create(:ci_empty_pipeline, project: project) }
let(:policies) do
described_class.abilities(user, build).to_set
end
shared_context 'public pipelines disabled' do
before { project.update_attribute(:public_builds, false) }
end
describe '#rules' do
context 'when user does not have access to the project' do
let(:project) { create(:empty_project, :private) }
context 'when public builds are enabled' do
it 'does not include ability to read build' do
expect(policies).not_to include :read_build
end
end
context 'when public builds are disabled' do
include_context 'public pipelines disabled'
it 'does not include ability to read build' do
expect(policies).not_to include :read_build
end
end
end
context 'when anonymous user has access to the project' do
let(:project) { create(:empty_project, :public) }
context 'when public builds are enabled' do
it 'includes ability to read build' do
expect(policies).to include :read_build
end
end
context 'when public builds are disabled' do
include_context 'public pipelines disabled'
it 'does not include ability to read build' do
expect(policies).not_to include :read_build
end
end
end
context 'when team member has access to the project' do
let(:project) { create(:empty_project, :public) }
context 'team member is a guest' do
before { project.team << [user, :guest] }
context 'when public builds are enabled' do
it 'includes ability to read build' do
expect(policies).to include :read_build
end
end
context 'when public builds are disabled' do
include_context 'public pipelines disabled'
it 'does not include ability to read build' do
expect(policies).not_to include :read_build
end
end
end
context 'team member is a reporter' do
before { project.team << [user, :reporter] }
context 'when public builds are enabled' do
it 'includes ability to read build' do
expect(policies).to include :read_build
end
end
context 'when public builds are disabled' do
include_context 'public pipelines disabled'
it 'does not include ability to read build' do
expect(policies).to include :read_build
end
end
end
end
end
end
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment