Skip to content
Snippets Groups Projects
  1. Dec 21, 2024
  2. Dec 12, 2024
  3. Dec 06, 2024
  4. Dec 04, 2024
  5. Nov 29, 2024
  6. Nov 28, 2024
  7. Nov 25, 2024
  8. Nov 22, 2024
    • Eugenia Grieff's avatar
      Add Planner role · 382fea3b
      Eugenia Grieff authored
      Add a new static role that defines Product Manager abilities
      
      Add group policies for Planner role
      
      Add project policies for Planner role
      
      Add issue, epic and issuable policies
      
      Changelog: added
      Verified
      382fea3b
  9. Nov 19, 2024
  10. Nov 14, 2024
    • Radu Birsan's avatar
      Added API for Project Security Settings · ccfdaeaa
      Radu Birsan authored
      This API will allow users to request and update
      a project's security settings, specifically
      for pre_receive_secret_detection_enabled.
      New documentation and testing covering this
      change has been added. Note that only users
      with Maintainer+ role can update the value
      as this would turn on SPP for the project.
      Users with developer+ role can view the
      security settings.
      
      Changelog: added
      EE: true
      Verified
      ccfdaeaa
    • Phil Hughes's avatar
      Start a Duo Code Review when requesting a review from Code Review bot · 13c8973e
      Phil Hughes authored
      When the Duo Code Review bot is added as a reviewer this will start a new review
      the bots review status will get updated to `review_started` when it starts the review
      to then `reviewed` when the review has been finished.
      A new review can then be requested from the bot using the request a review feature.
      Verified
      13c8973e
  11. Nov 01, 2024
  12. Oct 29, 2024
    • Vasilii Iakliushin's avatar
      Optimize: custom ability verification · 01168462
      Vasilii Iakliushin authored
      Contributes to #482942
      
      **Problem**
      
      We use `Authz::CustomAbility.allowed?` to check custom abilities of the
      user. But for each ability we trigger two database requests to fetch
      the same project and namespace. That leads to N+1 problem.
      
      **Solution**
      
      1. Restructure `Authz::CustomAbility` to support caching.
      
      The code below won't trigger unnecessary database queries for each
      `allowed?` call.
      
      ```ruby
      ability = Authz::CustomAbility.new(user, project)
      ability.allowed?(:ability_1)
      ability.allowed?(:ability_2)
      ```
      
      2. Add caching level to the policy code
      
      `Authz::CustomAbility` record will be memoized and have access to
      permitted abilities to optimize the number of DB queries.
      
      Changelog: performance
      EE: true
      Verified
      01168462
  13. Oct 21, 2024
  14. Oct 18, 2024
  15. Oct 11, 2024
  16. Oct 10, 2024
  17. Oct 09, 2024
  18. Oct 08, 2024
  19. Oct 05, 2024
  20. Oct 04, 2024
  21. Oct 03, 2024
  22. Oct 02, 2024
  23. Sep 27, 2024
  24. Sep 18, 2024
  25. Sep 16, 2024
  26. Sep 10, 2024
    • Martin Čavoj's avatar
      Add setting for projects to access SPP repository to fetch PEP configs · 85f987f6
      Martin Čavoj authored
      This change adds a project setting that allows to grant repository
      access to SPP project for the linked projects.
      
      This is necessary because user may not have permission to the Security
      Policy Project where the linked Pipeline execution policy configuration
      is stored. In such case, the user is not able to run pipelines
      in projects where the PEP is enabled.
      
      Changelog: added
      EE: true
      Verified
      85f987f6
  27. Sep 05, 2024
  28. Sep 03, 2024
  29. Aug 29, 2024
  30. Aug 15, 2024
  31. Aug 14, 2024
  32. Aug 09, 2024
  33. Aug 06, 2024
  34. Aug 05, 2024
Loading