Skip to content
Snippets Groups Projects
Select Git revision
  • move-gl-dropdown
  • improve-table-pagination-spec
  • move-markdown-preview
  • winh-fix-merge-request-spec
  • master default
  • index-namespaces-lower-name
  • winh-single-karma-test
  • 10-3-stable
  • 36782-replace-team-user-role-with-add_role-user-in-specs
  • winh-modal-internal-state
  • tz-ide-file-icons
  • 38869-milestone-select
  • update-autodevops-template
  • jivl-activate-repo-cookie-preferences
  • qa-add-deploy-key
  • docs-move-article-ldap
  • 40780-choose-file
  • 22643-manual-job-page
  • refactor-cluster-show-page-conservative
  • dm-sidekiq-versioning
  • v10.4.0.pre
  • v10.3.0
  • v10.3.0-rc5
  • v10.3.0-rc4
  • v10.3.0-rc3
  • v10.3.0-rc2
  • v10.2.5
  • v10.3.0-rc1
  • v10.0.7
  • v10.1.5
  • v10.2.4
  • v10.2.3
  • v10.2.2
  • v10.2.1
  • v10.3.0.pre
  • v10.2.0
  • v10.2.0-rc4
  • v10.2.0-rc3
  • v10.1.4
  • v10.2.0-rc2
40 results

user_access.rb

Forked from GitLab.org / GitLab FOSS
Source project has a limited visibility.
  • Timothy Andrew's avatar
    828f6eb6
    Enforce "No One Can Push" during git operations. · 828f6eb6
    Timothy Andrew authored
    1. The crux of this change is in `UserAccess`, which looks through all
       the access levels, asking each if the user has access to push/merge
       for the current project.
    
    2. Update the `protected_branches` factory to create access levels as
       necessary.
    
    3. Fix and augment `user_access` and `git_access` specs.
    828f6eb6
    History
    Enforce "No One Can Push" during git operations.
    Timothy Andrew authored
    1. The crux of this change is in `UserAccess`, which looks through all
       the access levels, asking each if the user has access to push/merge
       for the current project.
    
    2. Update the `protected_branches` factory to create access levels as
       necessary.
    
    3. Fix and augment `user_access` and `git_access` specs.
blob_helper.rb NaN GiB