diff --git a/app/views/admin/projects/show.html.haml b/app/views/admin/projects/show.html.haml
index d734e60682a31fa1a1d88c559ce1bdd4d6dfa424..c638c32a654ca59db7ade68ee4171c8f7106715c 100644
--- a/app/views/admin/projects/show.html.haml
+++ b/app/views/admin/projects/show.html.haml
@@ -52,7 +52,7 @@
           %li
             %span.light fs:
             %strong
-              = @repository.path_to_repo
+              = @project.repository.path_to_repo
 
           %li
             %span.light Size
diff --git a/db/schema.rb b/db/schema.rb
index 9d1d7d9b823f548f6546b36243e9c042d16f4d08..11ae4815801c57a399d2c0df4a5911dba6da199a 100644
--- a/db/schema.rb
+++ b/db/schema.rb
@@ -11,7 +11,7 @@
 #
 # It's strongly recommended that you check this file into your version control system.
 
-ActiveRecord::Schema.define(version: 20160316204731) do
+ActiveRecord::Schema.define(version: 20160320204112) do
 
   # These are extensions that must be enabled in order to support this database
   enable_extension "plpgsql"
diff --git a/spec/controllers/groups/avatars_controller_spec.rb b/spec/controllers/groups/avatars_controller_spec.rb
index 3dac134a73180aa5c46546cb0f7f9d708bfb04e5..91d639218e59e263e378fb9ecca081ec5b23229d 100644
--- a/spec/controllers/groups/avatars_controller_spec.rb
+++ b/spec/controllers/groups/avatars_controller_spec.rb
@@ -2,9 +2,10 @@ require 'spec_helper'
 
 describe Groups::AvatarsController do
   let(:user)  { create(:user) }
-  let(:group) { create(:group, owner: user, avatar: fixture_file_upload(Rails.root + "spec/fixtures/dk.png", "image/png")) }
+  let(:group) { create(:group, avatar: fixture_file_upload(Rails.root + "spec/fixtures/dk.png", "image/png")) }
 
   before do
+    group.add_owner(user)
     sign_in(user)
   end
 
diff --git a/spec/controllers/namespaces_controller_spec.rb b/spec/controllers/namespaces_controller_spec.rb
index 41ae6063ae07fc71fe35f533aedff2677e4df535..27e9afe582e806f30d5147056e99bbe2e2d06ad0 100644
--- a/spec/controllers/namespaces_controller_spec.rb
+++ b/spec/controllers/namespaces_controller_spec.rb
@@ -18,10 +18,6 @@ describe NamespacesController do
       let!(:group)   { create(:group) }
 
       context "when the group is public" do
-        before do
-          group.update_attribute(:visibility_level, Group::PUBLIC)
-        end
-
         context "when not signed in" do
           it "redirects to the group's page" do
             get :show, id: group.path
@@ -44,10 +40,14 @@ describe NamespacesController do
       end
 
       context "when the group is private" do
+        before do
+          group.update_attribute(:visibility_level, Group::PRIVATE)
+        end
+
         context "when not signed in" do
-          it "does not redirect to the sign in page" do
+          it "redirects to the sign in page" do
             get :show, id: group.path
-            expect(response).not_to redirect_to(new_user_session_path)
+            expect(response).to redirect_to(new_user_session_path)
           end
         end
 
diff --git a/spec/controllers/uploads_controller_spec.rb b/spec/controllers/uploads_controller_spec.rb
index 0947744fc47281a6bac6d92169766484017dcd68..73858e6f0637de5c7127798abe757a9e4c42e601 100644
--- a/spec/controllers/uploads_controller_spec.rb
+++ b/spec/controllers/uploads_controller_spec.rb
@@ -129,10 +129,6 @@ describe UploadsController do
       let!(:group)   { create(:group, avatar: fixture_file_upload(Rails.root + "spec/fixtures/dk.png", "image/png")) }
 
       context "when the group is public" do
-        before do
-          group.update_attribute(:visibility_level, Gitlab::VisibilityLevel::PUBLIC)
-        end
-
         context "when not signed in" do
           it "responds with status 200" do
             get :show, model: "group", mounted_as: "avatar", id: group.id, filename: "image.png"
@@ -155,6 +151,10 @@ describe UploadsController do
       end
 
       context "when the group is private" do
+        before do
+          group.update_attribute(:visibility_level, Gitlab::VisibilityLevel::PRIVATE)
+        end
+
         context "when signed in" do
           before do
             sign_in(user)
@@ -162,7 +162,7 @@ describe UploadsController do
 
           context "when the user has access to the project" do
             before do
-              project.add_developer(user)
+              group.add_developer(user)
             end
 
             context "when the user is blocked" do
diff --git a/spec/models/group_spec.rb b/spec/models/group_spec.rb
index 0591aa089d8c2e67bec83211d4eef602dbf8c757..208922b5a8e00c07a263aaf22fad3c875f1b113a 100644
--- a/spec/models/group_spec.rb
+++ b/spec/models/group_spec.rb
@@ -59,18 +59,17 @@ describe Group, models: true do
   describe 'scopes' do
     let!(:private_group)  { create(:group, :private)  }
     let!(:internal_group) { create(:group, :internal) }
-    let!(:public_group)   { create(:group, :public) }
 
     describe 'public_only' do
       subject { described_class.public_only.to_a }
 
-      it{ is_expected.to eq([public_group]) }
+      it{ is_expected.to eq([group]) }
     end
 
     describe 'public_and_internal_only' do
       subject { described_class.public_and_internal_only.to_a }
 
-      it{ is_expected.to eq([public_group, internal_group]) }
+      it{ is_expected.to eq([group, internal_group]) }
     end
   end
 
diff --git a/spec/services/create_snippet_service_spec.rb b/spec/services/create_snippet_service_spec.rb
index c800dea04fa14786e748711070d6a86cb6c9903a..7a850066bf86b8e275cc360710f63e87e59190fb 100644
--- a/spec/services/create_snippet_service_spec.rb
+++ b/spec/services/create_snippet_service_spec.rb
@@ -23,7 +23,7 @@ describe CreateSnippetService, services: true do
       snippet = create_snippet(nil, @user, @opts)
       expect(snippet.errors.messages).to have_key(:visibility_level)
       expect(snippet.errors.messages[:visibility_level].first).to(
-        match('Public visibility has been restricted')
+        match('has been restricted')
       )
     end
 
diff --git a/spec/services/groups/update_service_spec.rb b/spec/services/groups/update_service_spec.rb
index 9d427ff2d90ee1b33a5f86ff34471368cdd12b87..7732482cdaa3b9055e8afd15cea4da5da57a311a 100644
--- a/spec/services/groups/update_service_spec.rb
+++ b/spec/services/groups/update_service_spec.rb
@@ -6,9 +6,8 @@ describe Groups::UpdateService, services: true do
   let!(:internal_group)   { create(:group, :internal) }
   let!(:public_group)     { create(:group, :public) }
 
-  describe "execute" do
+  describe "#execute" do
     context "project visibility_level validation" do
-
       context "public group with public projects" do
         let!(:service) { described_class.new(public_group, user, visibility_level: Gitlab::VisibilityLevel::INTERNAL ) }
 
@@ -18,33 +17,32 @@ describe Groups::UpdateService, services: true do
         end
 
         it "cant downgrade permission level" do
-          expect(service.execute).to be_falsy
           expect(public_group.errors.count).to eq(2)
         end
       end
 
       context "internal group with internal project" do
-          let!(:service) { described_class.new(internal_group, user, visibility_level: Gitlab::VisibilityLevel::PRIVATE ) }
-  
-          before do
-            internal_group.add_user(user, Gitlab::Access::MASTER)
-            create(:project, :internal, group: internal_group)
-          end
-  
-          it "cant downgrade permission level" do
-            expect(service.execute).to be_falsy
-            expect(internal_group.errors.count).to eq(2)
-          end
+        let!(:service) { described_class.new(internal_group, user, visibility_level: Gitlab::VisibilityLevel::PRIVATE ) }
+
+        before do
+          internal_group.add_user(user, Gitlab::Access::MASTER)
+          create(:project, :internal, group: internal_group)
+        end
+
+        it "cant downgrade permission level" do
+          expect(internal_group.errors.count).to eq(2)
         end
+      end
     end
   end
 
   context "unauthorized visibility_level validation" do
     let!(:service) { described_class.new(internal_group, user, visibility_level: 99 ) }
-    before { internal_group.add_user(user, Gitlab::Access::MASTER) }
+    before do
+      internal_group.add_user(user, Gitlab::Access::MASTER)
+    end
 
     it "does not change permission level" do
-      expect(service.execute).to be_falsy
       expect(internal_group.errors.count).to eq(1)
     end
   end
diff --git a/spec/services/update_snippet_service_spec.rb b/spec/services/update_snippet_service_spec.rb
index 48d114896d0ff5f8a33c21390053e0d43499f697..37c2e861362b6b65b661412f29371e751b1100ad 100644
--- a/spec/services/update_snippet_service_spec.rb
+++ b/spec/services/update_snippet_service_spec.rb
@@ -25,7 +25,7 @@ describe UpdateSnippetService, services: true do
       update_snippet(@project, @user, @snippet, @opts)
       expect(@snippet.errors.messages).to have_key(:visibility_level)
       expect(@snippet.errors.messages[:visibility_level].first).to(
-        match('Public visibility has been restricted')
+        match('has been restricted')
       )
       expect(@snippet.visibility_level).to eq(old_visibility)
     end