summaryrefslogtreecommitdiff
path: root/spec/policies
Commit message (Collapse)AuthorAgeFilesLines
* Merge branch '39665-restrict-issue-reopen' into 'master'Sean McGivern2018-09-041-14/+28
|\ | | | | | | | | | | | | Restrict reopening locked issues for non authorized issue authors Closes #39665 See merge request gitlab-org/gitlab-ce!21299
| * Restrict reopening locked issues for issue authorsJarka Kadlecová2018-09-041-14/+28
| |
* | Merge branch 'fldubois/gitlab-ce-fix-api-group-createdat' into 'master'Rémy Coutable2018-08-282-0/+2
|\ \ | | | | | | | | | | | | | | | | | | Allow date parameters on Issues, Notes, and Discussions API for group owners Closes #40059 See merge request gitlab-org/gitlab-ce!21342
| * | Use policies to determine if attributes can be set in the APISean McGivern2018-08-222-0/+2
| | | | | | | | | | | | This is more idiomatic than checking membership explicitly.
* | | Merge branch 'issue_36138' into 'master'Sean McGivern2018-08-281-1/+1
|\ \ \ | |/ / |/| | | | | | | | | | | | | | Allow to delete group milestones Closes #36138 See merge request gitlab-org/gitlab-ce!21057
| * | Allow to delete group milestonesissue_36138Felipe Artur2018-08-061-1/+1
| | |
* | | Whitelist existing destroy_all offensesblacklist-destroy-allYorick Peterse2018-08-161-1/+1
| |/ |/| | | | | This whitelists all existing places where we use "destroy_all".
* | Revert "Merge branch 'bvl-instance-stats-default' into 'master'"revert-77c75d2bBob Van Landuyt2018-08-061-14/+2
| | | | | | This reverts merge request !21044
* | Hide instance statistics on new installationsBob Van Landuyt2018-08-061-2/+14
| | | | | | | | | | Making the migrations and the default do the right thing in the first place. This makes 20180806094307 a no-op.
* | Merge branch 'bvl-user-status-message-35463' into 'master'Rémy Coutable2018-08-011-0/+4
|\ \ | | | | | | | | | | | | | | | | | | Allow users to set a status Closes #35463 See merge request gitlab-org/gitlab-ce!20614
| * | Allow users to set a statusBob Van Landuyt2018-07-301-0/+4
| | | | | | | | | | | | | | | This can be done trough the API for the current user, or on the profile page.
* | | Spec instance statisticsBob Van Landuyt2018-07-271-0/+34
| |/ |/|
* | Revert "Merge branch '41416-making-instance-wide-data-tools-more-accessible' ↵Sean McGivern2018-07-271-34/+0
| | | | | | | | | | into 'master'" This reverts merge request !20679
* | Merge branch '41416-making-instance-wide-data-tools-more-accessible' into ↵Sean McGivern2018-07-271-0/+34
|\ \ | | | | | | | | | | | | | | | | | | | | | | | | 'master' Resolve "Making instance-wide data tools more accessible" Closes #41416 and #48507 See merge request gitlab-org/gitlab-ce!20679
| * | Spec instance statisticsBob Van Landuyt2018-07-271-0/+34
| |/
* | Rename the module and add a simple test to checkLin Jen-Shin2018-07-271-0/+13
|/ | | | if all methods are also presented in the user.
* Resolve "Rename the `Master` role to `Maintainer`" BackendMark Chao2018-07-1111-74/+74
|
* Support manually stopping any environment from the UIWinnie Hellmann2018-07-101-31/+75
|
* Create cross project group featuresBob Van Landuyt2018-07-061-1/+5
| | | | | This allows us to check specific abilities in views, while still enabling/disabling them at once.
* Operations and Kubernetes items are now omitted in the sidebar when ↵47631-operations-kubernetes-option-is-always-visible-when-repository-or-builds-are-disabledTiago Botelho2018-06-201-0/+38
| | | | repository or builds are disabled
* Rephrase "maintainer" to more precise "members who can merge to the target ↵42751-rename-mr-maintainer-pushMark Chao2018-06-013-3/+3
| | | | | | branch" "Maintainer" will be freed to be used for #42751
* Enable update_(build|pipeline) for maintainersJan Provaznik2018-05-153-1/+26
|
* Allows `access_(git|api)` to anonymous usersBob Van Landuyt2018-05-101-13/+39
| | | | | | | | | | | The `access_git` and `access_api` were currently never checked for anonymous users. And they would also be allowed access: An anonymous user can clone and pull from a public repo An anonymous user can request public information from the API So the policy didn't actually reflect what we were enforcing.
* Block access to API & git when terms are enforcedBob Van Landuyt2018-05-101-0/+64
| | | | | | When terms are enforced, but the user has not accepted the terms access to the API & git is rejected with a message directing the user to the web app to accept the terms.
* Enforces terms in the web applicationBob Van Landuyt2018-05-041-0/+2
| | | | | | | | | | | | | | | | | | | | This enforces the terms in the web application. These cases are specced: - Logging in: When terms are enforced, and a user logs in that has not accepted the terms, they are presented with the screen. They get directed to their customized root path afterwards. - Signing up: After signing up, the first screen the user is presented with the screen to accept the terms. After they accept they are directed to the dashboard. - While a session is active: - For a GET: The user will be directed to the terms page first, after they accept the terms, they will be directed to the page they were going to - For any other request: They are directed to the terms, after they accept the terms, they are directed back to the page they came from to retry the request. Any information entered would be persisted in localstorage and available on the page.
* Allow a user to accept/decline termsBob Van Landuyt2018-05-041-0/+50
| | | | | When a user accepts, we store this in the agreements to keep track of which terms they accepted. We also update the flag on the user.
* Make the user dropdown reusableBob Van Landuyt2018-05-041-5/+13
| | | | | | | We will reuse the the dropdown, but exclude some menu items based on permissions. So moving the menu to a partial, and adding checks for each menu item here.
* Fix users not seeing labels from private groups when being a member of a ↵Felipe Artur2018-04-231-2/+25
| | | | child project
* Prevent awarding emoji when a project is archivedBob Van Landuyt2018-04-112-1/+14
| | | | This prevents performing the requests, and disables all emoji reaction buttons
* Rename `create_merge_request` permissionsBob Van Landuyt2018-04-111-6/+7
| | | | | | | | | | So we can distinguish between the permissions on the source and the target project. - `create_merge_request_from` indicates a user can create a merge request with the project as a source_project - `create_merge_request_in` indicates a user can create a merge request with the project as a target_project
* Prevent new merge requests for archived projectsBob Van Landuyt2018-04-111-1/+16
| | | | | | | This prevents creating merge requests targeting archived projects. This could happen when a project was already forked, but then the source was archived.
* Update policies to make archived projects completely read-onlyDouwe Maan2018-04-101-2/+65
|
* Remove edit_note and update_note abilities in favor of admin_noteDouwe Maan2018-04-101-4/+0
|
* Rename delete_protected_branch ability to push_to_delete_protected_branch to ↵Douwe Maan2018-04-101-1/+1
| | | | prevent confusion with destroy_protected_branch
* Increase test suite around deploy tokens behaviorMayra Cabrera2018-04-061-1/+1
| | | | Also, fixes broken specs
* Include ProjectDeployTokensMayra Cabrera2018-04-061-1/+1
| | | | | | Also: - Changes scopes from serializer to use boolean columns - Fixes broken specs
* Support Deploy Tokens properly without hacking abilitiesKamil Trzciński2018-04-061-2/+2
|
* Addreses backend review suggestionsMayra Cabrera2018-04-061-0/+45
| | | | | | - Remove extra method for authorize_admin_project - Ensure project presence - Rename 'read_repo' to 'read_repository' to be more verbose
* Removes logic from Jwt and handle different scenarios on Gitlab::AuthMayra Cabrera2018-04-061-2/+2
| | | | | | | - When using 'read_repo' password and project are sent, so we used both of them to fetch for the token - When using 'read_registry' only the password is sent, so we only use that for fetching the token
* Fix N+1 in MergeRequestParserSean McGivern2018-04-051-6/+6
| | | | | | | | read_project can be prevented by a very expensive condition, which we want to avoid, while still not writing manual SQL queries. read_project_for_iids is used by read_issue_iid and read_merge_request_iid to satisfy both of those constraints, and allow the declarative policy runner to use its normal caching strategy.
* Revert exploratory branch restriction policyjej/add-protected-branch-policyJames Edwards-Jones2018-03-261-44/+6
|
* DestroyService for protected tags/branches used from controllerJames Edwards-Jones2018-03-261-1/+1
|
* Branch unprotection restriction starting pointJames Edwards-Jones2018-03-261-0/+60
| | | | Explored Policy framework to create something I can use as a starting point.
* Limit queries to a user-branch combinationBob Van Landuyt2018-03-071-1/+1
| | | | | The query becomes a lot simpler if we can check the branch name as well instead of having to load all branch names.
* Allow abilities on forks while MR is openBob Van Landuyt2018-03-071-0/+37
| | | | | | | | When an MR is created using `allow_maintainer_to_push`, we enable some abilities while the MR is open. This should allow every user with developer abilities on the target project, to push to the source project.
* Port `read_cross_project` ability from EEBob Van Landuyt2018-02-222-47/+49
|
* Merge branch ↵Douwe Maan2018-02-092-0/+2
| | | | | | 'security-10-4-25223-snippets-finder-doesnt-obey-feature-visibility' into 'security-10-4' [Port for security-10-4]: Makes SnippetFinder ensure feature visibility
* Merge branch '35285-user-interface-bugs-for-schedule-pipelines' into 'master'Rémy Coutable2018-02-011-0/+14
|\ | | | | | | | | | | | | Hide pipeline schedule 'take ownership' for current owner Closes #35285 See merge request gitlab-org/gitlab-ce!12986
| * Hide pipeline schedule 'take ownership' for current ownerMark Fletcher2018-02-011-0/+14
| |
* | Make user/author use project.creator in most factoriesRémy Coutable2018-01-311-1/+1
|/ | | | Signed-off-by: Rémy Coutable <remy@rymai.me>