Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Support uploaders for personal snippets comments12910-uploader-pers-snippet | Jarka Kadlecova | 2017-05-02 | 1 | -0/+141 |
| | |||||
* | Enable RSpec/FilePath copenable-spec-file-name-cop | Sean McGivern | 2017-04-26 | 2 | -279/+160 |
| | | | | | | - Ignore JS fixtures - Ignore qa directory - Rewrite concern specs to put concern name first | ||||
* | Merge branch 'siemens/gitlab-ce-fix/subgroup-hide-button' into 'master' | Rémy Coutable | 2017-04-12 | 1 | -1/+2 |
|\ | | | | | | | | | | | | | Hide new subgroup button if user has no permission to create one Closes #30139 See merge request !10627 | ||||
| * | Move permission to create subgroup into GroupPolicy | Dmitriy Zaporozhets | 2017-04-11 | 1 | -1/+2 |
| | | | | | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com> | ||||
* | | Use `:empty_project` where possible in policy specs | Robert Speicher | 2017-03-27 | 2 | -2/+2 |
|/ | |||||
* | spec the new behavior of .class_for | http://jneen.net/ | 2017-03-09 | 1 | -4/+6 |
| | | | | and more robustly spec the ancestor behavior | ||||
* | Improve pipeline triggers UI | Kamil Trzciński | 2017-03-07 | 1 | -0/+103 |
| | |||||
* | Don't allow deleting a ghost user. | Timothy Andrew | 2017-02-24 | 1 | -0/+37 |
| | | | | | | | | | | | | | | | - Add a `destroy_user` ability. This didn't exist before, and was implicit in other abilities (only admins could access the admin area, so only they could destroy all users; a user can only access their own account page, and so can destroy only themselves). - Grant this ability to admins, and when the current user is trying to destroy themselves. Disallow destroying ghost users in all cases. - Modify the `Users::DestroyService` to check this ability. Also check it in views to decide whether or not to show the "Delete User" button. - Add a short summary of the Ghost User to the bio. | ||||
* | More backport | Douwe Maan | 2017-02-06 | 2 | -32/+131 |
| | |||||
* | Fix build access policies when pipelines are public | Grzegorz Bizon | 2017-01-23 | 1 | -0/+93 |
| | |||||
* | More improvements to presenters23563-document-presenters | Rémy Coutable | 2017-01-18 | 1 | -2/+2 |
| | | | | Signed-off-by: Rémy Coutable <remy@rymai.me> | ||||
* | Handle presenters in BasePolicy | Rémy Coutable | 2017-01-18 | 1 | -0/+17 |
| | | | | Signed-off-by: Rémy Coutable <remy@rymai.me> | ||||
* | Include group parents into read access for project and group | Dmitriy Zaporozhets | 2016-12-26 | 1 | -0/+66 |
| | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com> | ||||
* | Add missing group policy specdz-add-group-policy-spec | Dmitriy Zaporozhets | 2016-12-15 | 1 | -0/+108 |
| | | | | Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com> | ||||
* | Update effected testszj-guest-reads-public-builds | Z.J. van de Weg | 2016-12-04 | 1 | -16/+16 |
| | |||||
* | Guests can read builds if those are public | Z.J. van de Weg | 2016-12-04 | 1 | -7/+29 |
| | | | | Fixes #18448 | ||||
* | Improve ProjectPolicy spec to check permissions when wiki is disabled | Douglas Barbosa Alexandre | 2016-11-30 | 1 | -2/+12 |
| | |||||
* | Added tests for IssuePolicy | Yorick Peterse | 2016-11-07 | 1 | -0/+119 |
| | |||||
* | Allow owners to fetch source code in CI buildsallow-owner-to-run-ci-builds | Kamil Trzcinski | 2016-11-01 | 1 | -0/+14 |
| | | | | Due to different way of handling owners of a project, they were not allowed to fetch CI sources for project. | ||||
* | Add specs for a user from a group link23872-members-of-group-that-has-project-access-getting-404-on-accessing-a-project-issue | Sean McGivern | 2016-10-28 | 1 | -0/+30 |
| | |||||
* | Fix project member access for group links | Sean McGivern | 2016-10-28 | 1 | -0/+163 |
| | | | | | | | | | | | | | | | | `ProjectTeam#find_member` doesn't take group links into account. It was used in two places: 1. An admin view - it can stay here. 2. `ProjectTeam#member?`, which is often used to decide if a user has access to view something. This second part broke confidential issues viewing. `IssuesFinder` ends up delegating to `Project#authorized_for_user?`, which does consider group links, so users with access to the project via a group link could see confidential issues on the index page. However, `IssuesPolicy` used `ProjectTeam#member?`, so the same user couldn't view the issue when going to it directly. | ||||
* | Make guests unable to view MRsguests_cant_see_mrs | Valery Sizov | 2016-10-11 | 1 | -2/+3 |
| | |||||
* | Improve project policy spec | Alejandro Rodríguez | 2016-10-06 | 1 | -16/+131 |
| | |||||
* | Test if issue authors can access private projects | Felipe Artur | 2016-09-20 | 1 | -0/+13 |
| | |||||
* | add project_policy_spec to replace .project_abilities spec | http://jneen.net/ | 2016-08-30 | 1 | -0/+36 |