gitlab-org--gitlab-foss/lib
Dmitriy Zaporozhets 648f38cd98 Merge branch 'fix-restricted-visibility' into 'master'
Restricted visibility levels - bug fix and new feature

This allows admin users to override restricted visibility settings when creating and updating projects and snippets, and moves the restricted visibility configuration from gitlab.yml to the web UI.  See #1903.

## Move configuration location

I added a new section to the application settings page for restricted visibility levels.  Each level has a checkbox, styled with Bootstrap to look like a toggle button.  A checked box means that the level is restricted.  I added a glowing text shadow and changed the background color for checked buttons because the default styles made it hard to distinguish between checked and unchecked.  This image shows the new section with the "Public" box checked:

![restricted_visibility_settings](https://dev.gitlab.org/Okada/gitlabhq/uploads/629562e4313f89b795e81c3bb0f95893/restricted_visibility_settings.png)

## Allow admins to override

To allow admin users to override the restricted visibility levels, I had to remove the `visibility_level` validation from the `Project` class.  The model doesn't know about the `current_user`, which should determine whether the restrictions can be overridden.  We could use the creator in the validation, but that wouldn't work correctly for projects where a non-admin user is the creator and an admin tries to change the project to a restricted visibility level.

The `Project::UpdateService` and `Project::CreateService` classes already had code to determine whether the current user is allowed to use a given visibility level; now all visibility level validation is done in those classes.  Currently, when a non-admin tries to create or update a project using a restricted level, these classes silently set the visibility level to the global default (create) or the project's existing value (update).  I changed this behavior to be more like an Active Model validation, where using a restricted level causes the entire request to be rejected.

Project and personal snippets didn't have service classes, and restricted visibility levels weren't being enforced in the model or the controllers.  The UI disabled radio buttons for restricted levels, but that wouldn't be difficult to circumvent.  I created the `CreateSnippetService` and `UpdateSnippetService` classes to do the same restricted visibility check that the project classes do.  And since I was dealing with snippet visibility levels, I updated the API endpoints for project snippets to allow users to set and update the visibility level.

## TODO

* [x] Add more tests for restricted visibility functionality

cc @sytse @dzaporozhets

See merge request !1655
2015-03-16 17:49:46 +00:00
..
api Merge branch 'fix-restricted-visibility' into 'master' 2015-03-16 17:49:46 +00:00
assets
backup Revert "Fix broken access control and refactor avatar upload" 2015-02-19 08:57:35 -08:00
gitlab Merge branch 'fix-restricted-visibility' into 'master' 2015-03-16 17:49:46 +00:00
redcarpet/render Merge branch 'markdown-smb-link' into 'master' 2015-03-12 03:57:52 +00:00
support Fix typo 2015-03-14 10:22:06 +01:00
tasks Let the server fix unconfigured git 2015-03-16 16:28:20 +01:00
disable_email_interceptor.rb Add email interceptor to prevent mail sending if email sending is disabled. 2014-10-27 13:05:50 +01:00
email_validator.rb More rubocop rules enable 2015-02-02 21:31:03 -08:00
event_filter.rb Add parenthesis to function def with arguments. 2014-10-03 09:18:46 +02:00
extracts_path.rb Upgrade to Rails 4.1.9 2015-02-14 11:09:23 -07:00
file_size_validator.rb
gt_one_coercion.rb
repository_cache.rb Fix RepositoryCache backend attr_reader 2015-01-30 10:17:55 -05:00
static_model.rb
unfold_form.rb