summaryrefslogtreecommitdiff
path: root/spec/controllers/projects_controller_spec.rb
Commit message (Collapse)AuthorAgeFilesLines
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-01-301-0/+40
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-01-271-43/+43
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-01-071-0/+30
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-181-1/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-171-1/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-121-3/+3
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-051-59/+78
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-11-221-2/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-11-141-0/+24
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-11-081-1/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-11-071-1/+1
|
* Merge branch 'security-remove-leaky-401-responses-master' into 'master'GitLab Release Tools Bot2019-10-291-1/+1
|\ | | | | | | | | Private/internal repository enumeration via bruteforce on a vulnerable URL See merge request gitlab/gitlabhq!3454
| * Avoid #authenticate_user! in #route_not_foundKerri Miller2019-10-091-1/+1
| | | | | | | | | | | | | | | | | | | | | | This method, #route_not_found, is executed as the final fallback for unrecognized routes (as the name might imply.) We want to avoid `#authenticate_user!` when calling `#route_not_found`; `#authenticate_user!` can, depending on the request format, return a 401 instead of redirecting to a login page. This opens a subtle security exploit where anonymous users will receive a 401 response when attempting to access a private repo, while a recognized user will receive a 404, exposing the existence of the private, hidden repo.
* | Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-10-231-2/+2
|/
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-10-021-1/+1
|
* CE: Audit event for archiving and unarchiving projectsce-8631-archiving-a-project-should-create-an-audit-eventmanojmj2019-08-211-0/+96
|
* Cleanup usages of `JSON.parse` in specsPeter Leitzen2019-07-161-18/+11
| | | | Prefer `json_response` where applicable.
* Make Housekeeping button do a full garbage collectionsh-fix-issue-63349Stan Hu2019-07-031-0/+47
| | | | | | | | | | | | | | | Previously the Housekeeping button and API would use the counter of last pushes to determine whether to do a full garbage collection, or whether to do one of the less comprehensive tasks: a full repack, incremental pack, or ref pack. This was confusing behavior, since a project owner might have to click the button dozens of times before a full GC would be initiated. This commit forces a full GC each time this is initiated. Note that the `ExclusiveLease` in `HousekeepingService` prevents users from clicking on the button more than once a day. Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/63349
* Move specs to ce directoryissue-6568-single-codebase-spec-controllersMałgorzata Ksionek2019-06-031-0/+12
|
* Add some frozen string to spec/**/*.rbgfyoung2019-04-151-0/+2
| | | | | | | | | | Adds frozen string to the following: * spec/bin/**/*.rb * spec/config/**/*.rb * spec/controllers/**/*.rb xref https://gitlab.com/gitlab-org/gitlab-ce/issues/59758
* Move Contribution Analytics related spec in ↵Imre Farkas2019-04-091-0/+32
| | | | spec/features/groups/group_page_with_external_authorization_service_spec to EE
* Merge branch 'revert-3962b00b' into 'master'Andreas Brandl2019-04-051-32/+0
|\ | | | | | | | | Revert "Merge branch 'if-57131-external_auth_to_ce' into 'master'" See merge request gitlab-org/gitlab-ce!27051
| * Revert "Merge branch 'if-57131-external_auth_to_ce' into 'master'"Andreas Brandl2019-04-051-32/+0
| | | | | | This reverts merge request !26823
* | Enable FindCommit caching for project and commits pagesStan Hu2019-04-051-0/+4
|/ | | | | This reduces a handful of duplicate FindCommit calls while viewing the projects and commits pages.
* Move Contribution Analytics related spec in ↵Imre Farkas2019-04-051-0/+32
| | | | spec/features/groups/group_page_with_external_authorization_service_spec to EE
* Fixed test specsOswaldo Ferreira2019-04-041-0/+10
| | | | | - added suggestions to mock data - fixed props to be not required
* Refactor specs according to the code reviewMałgorzata Ksionek2019-03-261-1/+1
|
* Add cr remarksMałgorzata Ksionek2019-03-251-1/+1
|
* Disallow changing namespace of a project in update methodMałgorzata Ksionek2019-03-201-0/+17
|
* Enable the Layout/ExtraSpacing cop56392-enable-the-layout-extraspacing-copRémy Coutable2019-01-241-1/+1
| | | | Signed-off-by: Rémy Coutable <remy@rymai.me>
* Add ability to resolve project id into pathDmitriy Zaporozhets2019-01-221-0/+53
| | | | | | | | | By visiting `projects/:id` you will be redirected to project page with path in it. projects/123 => foo/bar Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
* Fix deprecation: Using positional arguments in integration testsJasper Maes2019-01-021-1/+1
|
* Project guests no longer are able to see refs pageTiago Botelho2018-12-191-4/+20
| | | | | | Adds download_code authorization check to ProjectsController#refs action, to prevent a project guest from seeing branch, tags and commits information
* Update specs to rails5 formatblackst0ne-convert-specs-rails5-styleblackst0ne2018-12-191-82/+117
| | | | | | | | | | Updates specs to use new rails5 format. The old format: `get :show, { some: params }, { some: headers }` The new format: `get :show, params: { some: params }, headers: { some: headers }`
* Allow public forks to be deduplicatedZeger-Jan van de Weg2018-12-071-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When a project is forked, the new repository used to be a deep copy of everything stored on disk by leveraging `git clone`. This works well, and makes isolation between repository easy. However, the clone is at the start 100% the same as the origin repository. And in the case of the objects in the object directory, this is almost always going to be a lot of duplication. Object Pools are a way to create a third repository that essentially only exists for its 'objects' subdirectory. This third repository's object directory will be set as alternate location for objects. This means that in the case an object is missing in the local repository, git will look in another location. This other location is the object pool repository. When Git performs garbage collection, it's smart enough to check the alternate location. When objects are duplicated, it will allow git to throw one copy away. This copy is on the local repository, where to pool remains as is. These pools have an origin location, which for now will always be a repository that itself is not a fork. When the root of a fork network is forked by a user, the fork still clones the full repository. Async, the pool repository will be created. Either one of these processes can be done earlier than the other. To handle this race condition, the Join ObjectPool operation is idempotent. Given its idempotent, we can schedule it twice, with the same effect. To accommodate the holding of state two migrations have been added. 1. Added a state column to the pool_repositories column. This column is managed by the state machine, allowing for hooks on transitions. 2. pool_repositories now has a source_project_id. This column in convenient to have for multiple reasons: it has a unique index allowing the database to handle race conditions when creating a new record. Also, it's nice to know who the host is. As that's a short link to the fork networks root. Object pools are only available for public project, which use hashed storage and when forking from the root of the fork network. (That is, the project being forked from itself isn't a fork) In this commit message I use both ObjectPool and Pool repositories, which are alike, but different from each other. ObjectPool refers to whatever is on the disk stored and managed by Gitaly. PoolRepository is the record in the database.
* Merge branch 'security-fix-pat-web-access' into 'master'Cindy Pallares2018-11-281-0/+22
| | | | | [master] Resolve "Personal access token with only `read_user` scope can be used to authenticate any web request" See merge request gitlab/gitlabhq!2583
* Refactor code to remove object storage flag from Import/ExportJames Lopez2018-09-061-30/+0
| | | | | | Updated docs, refactor import/export code Fix AvatarUploader path issue Fix project export upload webhook error
* Move badge settings to general settingsWinnie Hellmann2018-09-031-0/+13
|
* Resolve "Rename the `Master` role to `Maintainer`" BackendMark Chao2018-07-111-4/+4
|
* Updates from `rubocop -a`Lin Jen-Shin2018-07-091-2/+2
|
* Update Import/Export to use object storage (based on aa feature flag)James Lopez2018-07-061-9/+41
|
* Present state indication on GFM previewOswaldo Ferreira2018-07-051-1/+28
|
* Set flash error message only for current request when updating projectAram Visser2018-06-251-1/+1
|
* The json keys of ref switcher should not be translatedhiroponz/gitlab-ce-48100-fix-branch-not-shownHiroyuki Sato2018-06-201-0/+16
|
* Deny repository disk access in development and testJacob Vosmaer (GitLab)2018-06-141-3/+9
|
* Make all uses of `fixture_file_upload` use relative pathsRobert Speicher2018-06-071-2/+2
|
* Use hashed storage in the specs40744-hashed-storage-specsNick Thomas2018-02-071-38/+58
|
* Replace '.team << [user, role]' with 'add_role(user)' in specs36782-replace-team-user-role-with-add_role-user-in-specsblackst0ne2017-12-221-3/+3
|
* Merge branch '32878-merge-request-from-email' into 'master'Sean McGivern2017-12-051-4/+33
|\ | | | | | | | | | | | | Create merge request from email Closes #32878 See merge request gitlab-org/gitlab-ce!13817
| * Create merge request from emailJan Provaznik2017-12-051-4/+33
| | | | | | | | | | | | | | | | | | | | | | * new merge request can be created by sending an email to the specific email address (similar to creating issues by email) * for the first iteration, source branch must be specified in the mail subject, other merge request parameters can not be set yet * user should enable "Receive notifications about your own activity" in user settings to receive a notification about created merge request Part of #32878