Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2020-01-23 15:08:38 +0300
committerGitLab Bot <gitlab-bot@gitlab.com>2020-01-23 15:08:38 +0300
commit5ad0cf26551baff8f08af8562a8d45e6ec14d71a (patch)
tree57f1a6bad31bcd11efacd3fdfb9cc92f88fb6a86 /app/policies
parentf47c768fad17d4c876e96524f83f8306f071db66 (diff)
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'app/policies')
-rw-r--r--app/policies/global_policy.rb4
-rw-r--r--app/policies/personal_snippet_policy.rb15
-rw-r--r--app/policies/project_policy.rb14
-rw-r--r--app/policies/project_snippet_policy.rb37
4 files changed, 32 insertions, 38 deletions
diff --git a/app/policies/global_policy.rb b/app/policies/global_policy.rb
index f212bb06bc9..764d61a9e22 100644
--- a/app/policies/global_policy.rb
+++ b/app/policies/global_policy.rb
@@ -75,7 +75,7 @@ class GlobalPolicy < BasePolicy
rule { ~anonymous }.policy do
enable :read_instance_metadata
- enable :create_personal_snippet
+ enable :create_snippet
end
rule { admin }.policy do
@@ -83,7 +83,7 @@ class GlobalPolicy < BasePolicy
enable :update_custom_attribute
end
- rule { external_user }.prevent :create_personal_snippet
+ rule { external_user }.prevent :create_snippet
end
GlobalPolicy.prepend_if_ee('EE::GlobalPolicy')
diff --git a/app/policies/personal_snippet_policy.rb b/app/policies/personal_snippet_policy.rb
index c2fcf1a1010..bc60913563c 100644
--- a/app/policies/personal_snippet_policy.rb
+++ b/app/policies/personal_snippet_policy.rb
@@ -6,19 +6,19 @@ class PersonalSnippetPolicy < BasePolicy
condition(:internal_snippet, scope: :subject) { @subject.internal? }
rule { public_snippet }.policy do
- enable :read_personal_snippet
+ enable :read_snippet
enable :create_note
end
rule { is_author | admin }.policy do
- enable :read_personal_snippet
- enable :update_personal_snippet
- enable :admin_personal_snippet
+ enable :read_snippet
+ enable :update_snippet
+ enable :admin_snippet
enable :create_note
end
rule { internal_snippet & ~external_user }.policy do
- enable :read_personal_snippet
+ enable :read_snippet
enable :create_note
end
@@ -26,8 +26,5 @@ class PersonalSnippetPolicy < BasePolicy
rule { can?(:create_note) }.enable :award_emoji
- rule { can?(:read_all_resources) }.enable :read_personal_snippet
-
- # Aliasing the ability to ease GraphQL permissions check
- rule { can?(:read_personal_snippet) }.enable :read_snippet
+ rule { can?(:read_all_resources) }.enable :read_snippet
end
diff --git a/app/policies/project_policy.rb b/app/policies/project_policy.rb
index 2789152e175..bbcb3c637a9 100644
--- a/app/policies/project_policy.rb
+++ b/app/policies/project_policy.rb
@@ -9,7 +9,7 @@ class ProjectPolicy < BasePolicy
merge_request
label
milestone
- project_snippet
+ snippet
wiki
note
pipeline
@@ -185,7 +185,7 @@ class ProjectPolicy < BasePolicy
enable :read_issue
enable :read_label
enable :read_milestone
- enable :read_project_snippet
+ enable :read_snippet
enable :read_project_member
enable :read_note
enable :create_project
@@ -208,7 +208,7 @@ class ProjectPolicy < BasePolicy
enable :download_code
enable :read_statistics
enable :download_wiki_code
- enable :create_project_snippet
+ enable :create_snippet
enable :update_issue
enable :reopen_issue
enable :admin_issue
@@ -286,8 +286,8 @@ class ProjectPolicy < BasePolicy
rule { can?(:maintainer_access) }.policy do
enable :admin_board
enable :push_to_delete_protected_branch
- enable :update_project_snippet
- enable :admin_project_snippet
+ enable :update_snippet
+ enable :admin_snippet
enable :admin_project_member
enable :admin_note
enable :admin_wiki
@@ -352,7 +352,7 @@ class ProjectPolicy < BasePolicy
end
rule { snippets_disabled }.policy do
- prevent(*create_read_update_admin_destroy(:project_snippet))
+ prevent(*create_read_update_admin_destroy(:snippet))
end
rule { wiki_disabled }.policy do
@@ -405,7 +405,7 @@ class ProjectPolicy < BasePolicy
enable :read_wiki
enable :read_label
enable :read_milestone
- enable :read_project_snippet
+ enable :read_snippet
enable :read_project_member
enable :read_merge_request
enable :read_note
diff --git a/app/policies/project_snippet_policy.rb b/app/policies/project_snippet_policy.rb
index a9094fbd958..a38d9154102 100644
--- a/app/policies/project_snippet_policy.rb
+++ b/app/policies/project_snippet_policy.rb
@@ -14,44 +14,41 @@ class ProjectSnippetPolicy < BasePolicy
# We have to check both project feature visibility and a snippet visibility and take the stricter one
# This will be simplified - check https://gitlab.com/gitlab-org/gitlab-foss/issues/27573
rule { ~can?(:read_project) }.policy do
- prevent :read_project_snippet
- prevent :update_project_snippet
- prevent :admin_project_snippet
+ prevent :read_snippet
+ prevent :update_snippet
+ prevent :admin_snippet
end
- # we have to use this complicated prevent because the delegated project policy
- # is overly greedy in allowing :read_project_snippet, since it doesn't have any
- # information about the snippet. However, :read_project_snippet on the *project*
- # is used to hide/show various snippet-related controls, so we can't just move
- # all of the handling here.
+ # we have to use this complicated prevent because the delegated project
+ # policy is overly greedy in allowing :read_snippet, since it doesn't have
+ # any information about the snippet. However, :read_snippet on the *project*
+ # is used to hide/show various snippet-related controls, so we can't just
+ # move all of the handling here.
rule do
all?(private_snippet | (internal_snippet & external_user),
~project.guest,
~is_author,
~can?(:read_all_resources))
- end.prevent :read_project_snippet
+ end.prevent :read_snippet
rule { internal_snippet & ~is_author & ~admin }.policy do
- prevent :update_project_snippet
- prevent :admin_project_snippet
+ prevent :update_snippet
+ prevent :admin_snippet
end
- rule { public_snippet }.enable :read_project_snippet
+ rule { public_snippet }.enable :read_snippet
rule { is_author & ~project.reporter & ~admin }.policy do
- prevent :admin_project_snippet
+ prevent :admin_snippet
end
rule { is_author | admin }.policy do
- enable :read_project_snippet
- enable :update_project_snippet
- enable :admin_project_snippet
+ enable :read_snippet
+ enable :update_snippet
+ enable :admin_snippet
end
- rule { ~can?(:read_project_snippet) }.prevent :create_note
-
- # Aliasing the ability to ease GraphQL permissions check
- rule { can?(:read_project_snippet) }.enable :read_snippet
+ rule { ~can?(:read_snippet) }.prevent :create_note
end
ProjectSnippetPolicy.prepend_if_ee('EE::ProjectSnippetPolicy')