Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-08-26Guard against deleted project feature entryStan Hu
In https://gitlab.com/gitlab-org/gitlab-ce/issues/66482, we see that a project's `project_feature` association may be lazily loaded and hence return `nil` if the entry is deleted if the `Project` is already loaded in memory. To ensure we don't fail hard when this happens, assume all features are disabled. We can fix this issue by eager loading the `project_feature` in https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/32169, but we shouldn't have to depend on that. Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/66482
2019-08-23Expose namespace storage statistics with GraphQLAlessio Caiazza
Root namespaces have storage statistics. This commit allows namespace owners to get those stats via GraphQL queries like the following one { namespace(fullPath: "a_namespace_path") { rootStorageStatistics { storageSize repositorySize lfsObjectsSize buildArtifactsSize packagesSize wikiSize } } }
2019-08-14Merge remote-tracking branch ↵John T Skarbek
'dev/security-2873-restrict-slash-commands-to-users-who-can-log-in'
2019-08-12Improve cluster policy spec coverageThong Kuah
2019-07-25Remove code related to object hierarchy in MySQLHeinrich Lee Yu
These are not required because MySQL is not supported anymore
2019-07-24Allowing all users to view historyAlex Kalderimis
This removes the create_wiki permission check from the history controller, allowing show and history to have the same level of permissions. Fixes https://gitlab.com/gitlab-org/gitlab-ce/issues/29528
2019-07-19Style rules; Revert some examplesFabio Papa
2019-07-19Add examples specing the setting to choose who can create subgroupsFabio Papa
This setting is at the group level only. The default is specified to be maintainers and owners. **Specs only**, all failing.
2019-07-19Fix some code style issuesFabio Papa
2019-07-19Add descriptions to examplesFabio Papa
2019-07-19Make subgroup_creation_level default to maintainer at SQL levelFabio Papa
- Migration updates existing groups to "owner", then sets default to "maintainer" so that new groups will default to that - Update spec examples
2019-07-19Style rules; Revert some examplesFabio Papa
2019-07-19Add examples specing the setting to choose who can create subgroupsFabio Papa
This setting is at the group level only. The default is specified to be maintainers and owners. **Specs only**, all failing.
2019-07-19Restrict slash commands to users who can log inHordur Freyr Yngvason
2019-07-15Allow use of legacy triggers with feature flagFabio Pitino
Keep feature flag disabled by default and turn off all functionality related to legacy triggers. * Block legacy triggers from creating pipeline * Highlight legacy triggers to be invalid via the UI * Make legacy triggers invalid in the model
2019-06-28Merge branch '62826-graphql-emoji-mutations' into 'master'Jan Provaznik
GraphQL mutations for add, remove and toggle emoji See merge request gitlab-org/gitlab-ce!29919
2019-06-28GraphQL mutations for add, remove and toggle emojiLuke Duncalfe
Adding new `AddAwardEmoji`, `RemoveAwardEmoji` and `ToggleAwardEmoji` GraphQL mutations. Adding new `#authorized_find_with_pre_checks!` and (unused, but for completeness `#authorized_find_with_post_checks!`) authorization methods. These allow us to perform an authorized find, and run our own additional checks before or after the authorization runs. https://gitlab.com/gitlab-org/gitlab-ce/issues/62826
2019-06-27Remove instance_clusters feature_flagThong Kuah
Now we have terminals for instance and group clusters we can remove the FF now. Deploying to instance clusters has been working without complaints too.
2019-06-19Add documentation and testsManoj MJ
This commit adds - feature specs - to test the ability of a user with "developer" permission to delete tags in repositories. - documentation
2019-06-17Allow Developer role to delete tags via container registry apiJason Goodman
This brings the API permissions in line with the UI permissions
2019-06-14Do not blindly expose public project statisticsMayra Cabrera
Add the missing check on GraphQL API for project statistics
2019-06-14Expose comments on Noteables in GraphQLBob Van Landuyt
This exposes `Note`s on Issues & MergeRequests using a `Types::Notes::NoteableType` in GraphQL. Exposing notes on a new type can be done by implementing the `NoteableType` interface on the type. The presented object should be a `Noteable`.
2019-06-12API issues - minor cleanup of permission checkJan Provaznik
Adds `set_issue_updated_at` similar to `set_issue_created_at` permission and cleans up the related permission check in issues API.
2019-05-06Check instance cluster feature at policy levelJames Fargher
Try to simplify feature flag checks by using policies
2019-05-06Allow projects to use instance level clustersJames Fargher
There are two cluster hierarchies one for the deployment platform and one for controllers. The main difference is that deployment platforms do not check user permissions and only return the first match.
2019-05-06Instance level kubernetes clusters adminJames Fargher
Instance level clusters were already mostly supported, this change adds admin area controllers for cluster CRUD
2019-05-03Allow guests users to access project releasesKrasimir Angelov
This is step one of resolving https://gitlab.com/gitlab-org/gitlab-ce/issues/56838. Here is what changed: - Revert the security fix from bdee9e8412d. - Do not leak repository information (tag name, commit) to guests in API responses. - Do not include links to source code in API responses for users that do not have download_code access. - Show Releases in sidebar for guests. - Do not display links to source code under Assets for users that do not have download_code access. GET ':id/releases/:tag_name' still do not allow guests to access releases. This is to prevent guessing tag existence.
2019-05-02Remove the `comment_personal_snippet` permissionSean McGivern
This is now entirely handled by `create_note`: 1. Project snippets prevent `create_note`. 2. Uploads already only support routing for personal snippets. This simplifies some policies and access checks, too!
2019-04-09Move Contribution Analytics related spec in ↵Imre Farkas
spec/features/groups/group_page_with_external_authorization_service_spec to EE
2019-04-09Add new permission model `read-pipeline-variable`Agustin Henze
Used to get the variables via the API endpoint `/projects/:id/pipelines/:pipeline_id/variables` Signed-off-by: Agustin Henze <tin@redhat.com>
2019-04-05Add part of needed codeGosia Ksionek
Add columns to store project creation settings Add project creation level column in groups and default project creation column in application settings Remove obsolete line from schema Update migration with project_creation_level column existence check Rename migrations to avoid conflicts Update migration methods Update migration method
2019-04-05Revert "Merge branch 'if-57131-external_auth_to_ce' into 'master'"Andreas Brandl
This reverts merge request !26823
2019-04-05Move Contribution Analytics related spec in ↵Imre Farkas
spec/features/groups/group_page_with_external_authorization_service_spec to EE
2019-04-04Add cr remarksGosia Ksionek
Chnage method used in model to make it more efficient database-wise Add additional spec
2019-04-02Merge branch 'master' of dev.gitlab.org:gitlab/gitlabhq into ↵John Jarvis
jarv/dev-to-gitlab-2019-04-02
2019-03-27[CE] Reduce the diff with EE in spec/policies/group_policy_spec.rbRémy Coutable
Signed-off-by: Rémy Coutable <remy@rymai.me>
2019-03-27Factorize policy helpers into PolicyHelpersRémy Coutable
Signed-off-by: Rémy Coutable <remy@rymai.me>
2019-03-27[CE] Reduce the diff with EE in spec/policies/project_policy_spec.rbRémy Coutable
Signed-off-by: Rémy Coutable <remy@rymai.me>
2019-03-27[CE] Reduce the diff with EE in spec/policies/namespace_policy_spec.rbRémy Coutable
Signed-off-by: Rémy Coutable <remy@rymai.me>
2019-03-26Disallow guest users from accessing ReleasesShinya Maeda
As they do not have a permission to read git tag
2019-03-19Move out link\unlink ability checks to a policyPavel Shutsin
We can extend the policy in EE for additional behavior
2019-03-13Add cr remarksMałgorzata Ksionek
2019-03-12Fix false positive specsMałgorzata Ksionek
2019-03-08Disallow reopening of locked merge requestsJan Beckmann
Fixes #56864
2019-03-06Allow protected branch creation via web and APIPatrick Bajao
This commit includes changes to add `UserAccess#can_create_branch?` which will check whether the user is allowed to create a branch even if it matches a protected branch. This is used in `Gitlab::Checks::BranchCheck` when the branch name matches a protected branch. A `push_to_create_protected_branch` ability in `ProjectPolicy` has been added to allow Developers and above to create protected branches.
2019-03-05Add metadata about the GitLab server to GraphQLNick Thomas
2019-03-05Resolve conflicts in group policyMałgorzata Ksionek
2019-03-05Add frozen_string_literal to new filesStan Hu
2019-03-05Resolve conflicts in spec/policies/group_policy_spec.rbStan Hu
2019-03-04Merge dev master into GitLab.com masterYorick Peterse