Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2018-06-20Operations and Kubernetes items are now omitted in the sidebar when ↵Tiago Botelho
repository or builds are disabled
2018-06-06policyMark Chao
2018-06-01Rephrase "maintainer" to more precise "members who can merge to the target ↵Mark Chao
branch" "Maintainer" will be freed to be used for #42751
2018-05-16Refactor out duplication in runner_policy.rbDylan Griffith
2018-05-16Change policy list_runner_jobs -> read_runnerDylan Griffith
2018-05-16Rename User#ci_authorized_runners -> ci_owned_runnersDylan Griffith
2018-05-16Improve efficiency of authorized_runner policy queryDylan Griffith
2018-05-16Use can? policies for lib/api/runners.rbDylan Griffith
2018-05-15Enable update_(build|pipeline) for maintainersJan Provaznik
2018-05-10Allows `access_(git|api)` to anonymous usersBob Van Landuyt
The `access_git` and `access_api` were currently never checked for anonymous users. And they would also be allowed access: An anonymous user can clone and pull from a public repo An anonymous user can request public information from the API So the policy didn't actually reflect what we were enforcing.
2018-05-10Block access to API & git when terms are enforcedBob Van Landuyt
When terms are enforced, but the user has not accepted the terms access to the API & git is rejected with a message directing the user to the web app to accept the terms.
2018-05-07Adds remote mirror table migrationTiago Botelho
2018-05-04Enforces terms in the web applicationBob Van Landuyt
This enforces the terms in the web application. These cases are specced: - Logging in: When terms are enforced, and a user logs in that has not accepted the terms, they are presented with the screen. They get directed to their customized root path afterwards. - Signing up: After signing up, the first screen the user is presented with the screen to accept the terms. After they accept they are directed to the dashboard. - While a session is active: - For a GET: The user will be directed to the terms page first, after they accept the terms, they will be directed to the page they were going to - For any other request: They are directed to the terms, after they accept the terms, they are directed back to the page they came from to retry the request. Any information entered would be persisted in localstorage and available on the page.
2018-05-04Allow a user to accept/decline termsBob Van Landuyt
When a user accepts, we store this in the agreements to keep track of which terms they accepted. We also update the flag on the user.
2018-05-04Make the user dropdown reusableBob Van Landuyt
We will reuse the the dropdown, but exclude some menu items based on permissions. So moving the menu to a partial, and adding checks for each menu item here.
2018-04-23Fix users not seeing labels from private groups when being a member of a ↵Felipe Artur
child project
2018-04-11Prevent awarding emoji when a project is archivedBob Van Landuyt
This prevents performing the requests, and disables all emoji reaction buttons
2018-04-11Rename `create_merge_request` permissionsBob Van Landuyt
So we can distinguish between the permissions on the source and the target project. - `create_merge_request_from` indicates a user can create a merge request with the project as a source_project - `create_merge_request_in` indicates a user can create a merge request with the project as a target_project
2018-04-11Prevent new merge requests for archived projectsBob Van Landuyt
This prevents creating merge requests targeting archived projects. This could happen when a project was already forked, but then the source was archived.
2018-04-10Move `ProjectPolicy`-class methods into moduleBob Van Landuyt
That way the ProjectPolicy class can be extended with this module before we prepend the EE::ProjectPolicy. This makes the classmethods available for rules defined in the EE::ProjectPolicy.
2018-04-10Update policies to make archived projects completely read-onlyDouwe Maan
2018-04-10Remove edit_note and update_note abilities in favor of admin_noteDouwe Maan
2018-04-10Rename delete_protected_branch ability to push_to_delete_protected_branch to ↵Douwe Maan
prevent confusion with destroy_protected_branch
2018-04-07Support Deploy Tokens properly without hacking abilitiesKamil Trzciński
2018-04-07Addreses backend review suggestionsMayra Cabrera
- Remove extra method for authorize_admin_project - Ensure project presence - Rename 'read_repo' to 'read_repository' to be more verbose
2018-04-07Removes logic from Jwt and handle different scenarios on Gitlab::AuthMayra Cabrera
- When using 'read_repo' password and project are sent, so we used both of them to fetch for the token - When using 'read_registry' only the password is sent, so we only use that for fetching the token
2018-04-05Fix N+1 in MergeRequestParserSean McGivern
read_project can be prevented by a very expensive condition, which we want to avoid, while still not writing manual SQL queries. read_project_for_iids is used by read_issue_iid and read_merge_request_iid to satisfy both of those constraints, and allow the declarative policy runner to use its normal caching strategy.
2018-03-26Revert exploratory branch restriction policyJames Edwards-Jones
2018-03-26ProtectedBranchPolicy used from Controller for destroy/updateJames Edwards-Jones
2018-03-26Branch unprotection restriction starting pointJames Edwards-Jones
Explored Policy framework to create something I can use as a starting point.
2018-03-07Limit queries to a user-branch combinationBob Van Landuyt
The query becomes a lot simpler if we can check the branch name as well instead of having to load all branch names.
2018-03-07Allow maintainers to edit directly in a forkBob Van Landuyt
2018-03-07Allow abilities on forks while MR is openBob Van Landuyt
When an MR is created using `allow_maintainer_to_push`, we enable some abilities while the MR is open. This should allow every user with developer abilities on the target project, to push to the source project.
2018-03-03Bring one group board to CEFelipe Artur
2018-02-22Port `read_cross_project` ability from EEBob Van Landuyt
2018-02-09Merge branch ↵Douwe Maan
'security-10-4-25223-snippets-finder-doesnt-obey-feature-visibility' into 'security-10-4' [Port for security-10-4]: Makes SnippetFinder ensure feature visibility
2018-02-01Hide pipeline schedule 'take ownership' for current ownerMark Fletcher
2018-01-05Remove unused push_code_to_protected_branchesLin Jen-Shin
2018-01-04EE-BACKPORT group boardsFelipe Artur
2017-12-13Refactor common protected ref checkStan Hu
2017-12-13Fix conditions for checking pipeline schedule rulesStan Hu
2017-12-13Create a play_pipeline_schedule policy and use itStan Hu
2017-12-07Support uploads for groupsJarka Kadlecova
2017-11-23Introduce :read_namespace access policy for namespace and groupTomasz Maczukin
2017-11-07Merge branch 'master' into fix/sm/31771-do-not-allow-jobs-to-be-erased-newShinya Maeda
2017-11-06Add doc. Fix spec. Add erase_build in protected_ref ruleShinya Maeda
2017-11-06Do not allow jobs to be erasedShinya Maeda
2017-10-23This worksShinya Maeda
2017-10-06Merge branch ↵Kamil Trzciński
'feature/sm/35954-create-kubernetes-cluster-on-gke-from-k8s-service' into 'master' Create Kubernetes cluster on GKE from k8s service Closes #35954 See merge request gitlab-org/gitlab-ce!14470
2017-10-05Cluster can be read only by masterKamil Trzcinski