Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Freeze string literals | Peter Leitzen | 2018-08-10 | 1 | -0/+2 |
| | | | | | See Danger's suggestions: https://gitlab.com/gitlab-org/gitlab-ee/merge_requests/6869#note_93730253 | ||||
* | Create empty Commits::UpdateService and wire it up | Peter Leitzen | 2018-08-10 | 1 | -0/+3 |
| | |||||
* | CE Port of Protected Environments backend | Mayra Cabrera | 2018-08-10 | 1 | -0/+1 |
| | |||||
* | Merge branch 'bvl-user-status-message-35463' into 'master' | Rémy Coutable | 2018-08-01 | 1 | -0/+1 |
|\ | | | | | | | | | | | | | Allow users to set a status Closes #35463 See merge request gitlab-org/gitlab-ce!20614 | ||||
| * | Allow users to set a status | Bob Van Landuyt | 2018-07-30 | 1 | -0/+1 |
| | | | | | | | | | | This can be done trough the API for the current user, or on the profile page. | ||||
* | | Spec instance statistics | Bob Van Landuyt | 2018-07-27 | 1 | -1/+3 |
| | | |||||
* | | Add read_instance_statistics global policy | Luke Bennett | 2018-07-27 | 1 | -0/+3 |
| | | |||||
* | | Revert "Merge branch '41416-making-instance-wide-data-tools-more-accessible' ↵ | Sean McGivern | 2018-07-27 | 1 | -5/+0 |
| | | | | | | | | | | into 'master'" This reverts merge request !20679 | ||||
* | | Merge branch '41416-making-instance-wide-data-tools-more-accessible' into ↵ | Sean McGivern | 2018-07-27 | 1 | -0/+5 |
|\ \ | | | | | | | | | | | | | | | | | | | | | | | | | 'master' Resolve "Making instance-wide data tools more accessible" Closes #41416 and #48507 See merge request gitlab-org/gitlab-ce!20679 | ||||
| * | | Spec instance statistics | Bob Van Landuyt | 2018-07-27 | 1 | -1/+3 |
| | | | |||||
| * | | Add read_instance_statistics global policy | Luke Bennett | 2018-07-26 | 1 | -0/+3 |
| |/ | |||||
* | | Rename the module and add a simple test to check | Lin Jen-Shin | 2018-07-27 | 1 | -1/+1 |
| | | | | | | | | if all methods are also presented in the user. | ||||
* | | Introduce PolicyCheckable for checking policiesce-7000-introduce-PolicyCheckable | Lin Jen-Shin | 2018-07-25 | 1 | -0/+36 |
|/ | |||||
* | Enable frozen string in presenters and policiesrepo-forks/gitlab-ce-frozen-string-enable-app-presenters | gfyoung | 2018-07-24 | 32 | -0/+64 |
| | | | | | | | | | Enable frozen string in: * app/presenters * app/policies Partially addresses #47424. | ||||
* | Add an option to have a private profile on GitLab | JX Terry | 2018-07-24 | 1 | -0/+6 |
| | |||||
* | Rename environments stop action method | Grzegorz Bizon | 2018-07-12 | 1 | -2/+3 |
| | | | | | This makes it more explicit that an environment is not a stop action, but instead is merely contains a stop action. | ||||
* | Resolve "Rename the `Master` role to `Maintainer`" Backend | Mark Chao | 2018-07-11 | 4 | -9/+9 |
| | |||||
* | Support manually stopping any environment from the UI | Winnie Hellmann | 2018-07-10 | 1 | -3/+7 |
| | |||||
* | Create cross project group features | Bob Van Landuyt | 2018-07-06 | 1 | -0/+13 |
| | | | | | This allows us to check specific abilities in views, while still enabling/disabling them at once. | ||||
* | Web Terminal Ci Build | Francisco Javier López | 2018-07-05 | 1 | -0/+6 |
| | |||||
* | Operations and Kubernetes items are now omitted in the sidebar when ↵47631-operations-kubernetes-option-is-always-visible-when-repository-or-builds-are-disabled | Tiago Botelho | 2018-06-20 | 1 | -0/+1 |
| | | | | repository or builds are disabled | ||||
* | policy | Mark Chao | 2018-06-06 | 1 | -1/+1 |
| | |||||
* | Rephrase "maintainer" to more precise "members who can merge to the target ↵42751-rename-mr-maintainer-push | Mark Chao | 2018-06-01 | 2 | -6/+6 |
| | | | | | | branch" "Maintainer" will be freed to be used for #42751 | ||||
* | Refactor out duplication in runner_policy.rb46010-allow-managing-group-runners-via-api | Dylan Griffith | 2018-05-16 | 1 | -4/+8 |
| | |||||
* | Change policy list_runner_jobs -> read_runner | Dylan Griffith | 2018-05-16 | 1 | -1/+0 |
| | |||||
* | Rename User#ci_authorized_runners -> ci_owned_runners | Dylan Griffith | 2018-05-16 | 1 | -6/+6 |
| | |||||
* | Improve efficiency of authorized_runner policy query | Dylan Griffith | 2018-05-16 | 1 | -1/+1 |
| | |||||
* | Use can? policies for lib/api/runners.rb | Dylan Griffith | 2018-05-16 | 1 | -4/+4 |
| | |||||
* | Enable update_(build|pipeline) for maintainers | Jan Provaznik | 2018-05-15 | 3 | -3/+18 |
| | |||||
* | Allows `access_(git|api)` to anonymous users | Bob Van Landuyt | 2018-05-10 | 1 | -6/+4 |
| | | | | | | | | | | | The `access_git` and `access_api` were currently never checked for anonymous users. And they would also be allowed access: An anonymous user can clone and pull from a public repo An anonymous user can request public information from the API So the policy didn't actually reflect what we were enforcing. | ||||
* | Block access to API & git when terms are enforced | Bob Van Landuyt | 2018-05-10 | 1 | -0/+9 |
| | | | | | | When terms are enforced, but the user has not accepted the terms access to the API & git is rejected with a message directing the user to the web app to accept the terms. | ||||
* | Adds remote mirror table migration | Tiago Botelho | 2018-05-07 | 1 | -0/+7 |
| | |||||
* | Enforces terms in the web application | Bob Van Landuyt | 2018-05-04 | 1 | -4/+2 |
| | | | | | | | | | | | | | | | | | | | | This enforces the terms in the web application. These cases are specced: - Logging in: When terms are enforced, and a user logs in that has not accepted the terms, they are presented with the screen. They get directed to their customized root path afterwards. - Signing up: After signing up, the first screen the user is presented with the screen to accept the terms. After they accept they are directed to the dashboard. - While a session is active: - For a GET: The user will be directed to the terms page first, after they accept the terms, they will be directed to the page they were going to - For any other request: They are directed to the terms, after they accept the terms, they are directed back to the page they came from to retry the request. Any information entered would be persisted in localstorage and available on the page. | ||||
* | Allow a user to accept/decline terms | Bob Van Landuyt | 2018-05-04 | 1 | -0/+30 |
| | | | | | When a user accepts, we store this in the agreements to keep track of which terms they accepted. We also update the flag on the user. | ||||
* | Make the user dropdown reusable | Bob Van Landuyt | 2018-05-04 | 1 | -2/+4 |
| | | | | | | | We will reuse the the dropdown, but exclude some menu items based on permissions. So moving the menu to a partial, and adding checks for each menu item here. | ||||
* | Fix users not seeing labels from private groups when being a member of a ↵ | Felipe Artur | 2018-04-23 | 1 | -2/+6 |
| | | | | child project | ||||
* | Prevent awarding emoji when a project is archived | Bob Van Landuyt | 2018-04-11 | 3 | -1/+5 |
| | | | | This prevents performing the requests, and disables all emoji reaction buttons | ||||
* | Rename `create_merge_request` permissions | Bob Van Landuyt | 2018-04-11 | 1 | -5/+6 |
| | | | | | | | | | | So we can distinguish between the permissions on the source and the target project. - `create_merge_request_from` indicates a user can create a merge request with the project as a source_project - `create_merge_request_in` indicates a user can create a merge request with the project as a target_project | ||||
* | Prevent new merge requests for archived projects | Bob Van Landuyt | 2018-04-11 | 1 | -0/+4 |
| | | | | | | | This prevents creating merge requests targeting archived projects. This could happen when a project was already forked, but then the source was archived. | ||||
* | Move `ProjectPolicy`-class methods into module | Bob Van Landuyt | 2018-04-10 | 2 | -16/+21 |
| | | | | | | That way the ProjectPolicy class can be extended with this module before we prepend the EE::ProjectPolicy. This makes the classmethods available for rules defined in the EE::ProjectPolicy. | ||||
* | Update policies to make archived projects completely read-only | Douwe Maan | 2018-04-10 | 4 | -44/+66 |
| | |||||
* | Remove edit_note and update_note abilities in favor of admin_note | Douwe Maan | 2018-04-10 | 2 | -7/+1 |
| | |||||
* | Rename delete_protected_branch ability to push_to_delete_protected_branch to ↵ | Douwe Maan | 2018-04-10 | 1 | -2/+2 |
| | | | | prevent confusion with destroy_protected_branch | ||||
* | Support Deploy Tokens properly without hacking abilities | Kamil Trzciński | 2018-04-06 | 1 | -2/+2 |
| | |||||
* | Addreses backend review suggestions | Mayra Cabrera | 2018-04-06 | 1 | -0/+11 |
| | | | | | | - Remove extra method for authorize_admin_project - Ensure project presence - Rename 'read_repo' to 'read_repository' to be more verbose | ||||
* | Removes logic from Jwt and handle different scenarios on Gitlab::Auth | Mayra Cabrera | 2018-04-06 | 1 | -3/+3 |
| | | | | | | | - When using 'read_repo' password and project are sent, so we used both of them to fetch for the token - When using 'read_registry' only the password is sent, so we only use that for fetching the token | ||||
* | Fix N+1 in MergeRequestParser | Sean McGivern | 2018-04-05 | 4 | -18/+34 |
| | | | | | | | | read_project can be prevented by a very expensive condition, which we want to avoid, while still not writing manual SQL queries. read_project_for_iids is used by read_issue_iid and read_merge_request_iid to satisfy both of those constraints, and allow the declarative policy runner to use its normal caching strategy. | ||||
* | Revert exploratory branch restriction policyjej/add-protected-branch-policy | James Edwards-Jones | 2018-03-26 | 1 | -10/+0 |
| | |||||
* | ProtectedBranchPolicy used from Controller for destroy/update | James Edwards-Jones | 2018-03-26 | 1 | -0/+4 |
| | |||||
* | Branch unprotection restriction starting point | James Edwards-Jones | 2018-03-26 | 1 | -0/+15 |
| | | | | Explored Policy framework to create something I can use as a starting point. |