Loading config/SCHEMA_VERSION +1 −1 Original line number Diff line number Diff line 8 9 config/graph.sql +1 −1 Original line number Diff line number Diff line -- SCHEMA_VERSION=8 [AUTOGENERATED — DO NOT EDIT MANUALLY] -- SCHEMA_VERSION=9 [AUTOGENERATED — DO NOT EDIT MANUALLY] -- Regenerate with: mise schema:generate:ddl CREATE TABLE IF NOT EXISTS checkpoint ( Loading config/graph_local.sql +1 −1 Original line number Diff line number Diff line -- SCHEMA_VERSION=8 [AUTOGENERATED — DO NOT EDIT MANUALLY] -- SCHEMA_VERSION=9 [AUTOGENERATED — DO NOT EDIT MANUALLY] -- Regenerate with: mise schema:generate:ddl:local CREATE TABLE IF NOT EXISTS gl_definition ( Loading config/ontology/nodes/core/user.yaml +14 −7 Original line number Diff line number Diff line Loading @@ -35,7 +35,8 @@ properties: source: email nullable: false like_allowed: false description: "Primary email address." admin_only: true description: "Primary email address. Gated by `read_user_email_address` in GitLab; surfaced here only to admins until per-cell authorization lands." name: type: string Loading @@ -47,13 +48,15 @@ properties: type: string source: first_name nullable: true description: "First name, if provided." admin_only: true description: "First name, if provided. Not exposed on any public GitLab user surface; admins only." last_name: type: string source: last_name nullable: true description: "Last name, if provided." admin_only: true description: "Last name, if provided. Not exposed on any public GitLab user surface; admins only." created_at: type: timestamp Loading @@ -65,7 +68,8 @@ properties: type: timestamp source: updated_at nullable: true description: "Timestamp when the user record was last updated." admin_only: true description: "Timestamp when the user record was last updated. Not exposed on any public GitLab user surface; admins only." state: type: enum Loading Loading @@ -98,7 +102,8 @@ properties: type: string source: preferred_language nullable: true description: "User's preferred UI language." admin_only: true description: "User's preferred UI language. Self-only on GitLab REST; admins only here until per-cell authorization lands." last_activity_on: type: date Loading @@ -110,7 +115,8 @@ properties: type: boolean source: private_profile nullable: false description: "Whether the user profile is private." admin_only: true description: "Whether the user profile is private. Self-only on GitLab REST; admins only here." is_admin: type: boolean Loading @@ -130,7 +136,8 @@ properties: type: boolean source: external nullable: false description: "Whether the user is marked as external." admin_only: true description: "Whether the user is marked as external. Self-only on GitLab REST and admin-only via UserWithAdmin; admins only here." user_type: type: enum Loading crates/integration-tests/tests/common/mod.rs +4 −0 Original line number Diff line number Diff line Loading @@ -11,6 +11,10 @@ pub fn test_security_context() -> SecurityContext { SecurityContext::new(1, vec!["1/".into()]).expect("valid security context") } pub fn admin_security_context() -> SecurityContext { test_security_context().with_role(true, None) } pub async fn compile_and_execute( ctx: &TestContext, json: &str, Loading Loading
config/graph.sql +1 −1 Original line number Diff line number Diff line -- SCHEMA_VERSION=8 [AUTOGENERATED — DO NOT EDIT MANUALLY] -- SCHEMA_VERSION=9 [AUTOGENERATED — DO NOT EDIT MANUALLY] -- Regenerate with: mise schema:generate:ddl CREATE TABLE IF NOT EXISTS checkpoint ( Loading
config/graph_local.sql +1 −1 Original line number Diff line number Diff line -- SCHEMA_VERSION=8 [AUTOGENERATED — DO NOT EDIT MANUALLY] -- SCHEMA_VERSION=9 [AUTOGENERATED — DO NOT EDIT MANUALLY] -- Regenerate with: mise schema:generate:ddl:local CREATE TABLE IF NOT EXISTS gl_definition ( Loading
config/ontology/nodes/core/user.yaml +14 −7 Original line number Diff line number Diff line Loading @@ -35,7 +35,8 @@ properties: source: email nullable: false like_allowed: false description: "Primary email address." admin_only: true description: "Primary email address. Gated by `read_user_email_address` in GitLab; surfaced here only to admins until per-cell authorization lands." name: type: string Loading @@ -47,13 +48,15 @@ properties: type: string source: first_name nullable: true description: "First name, if provided." admin_only: true description: "First name, if provided. Not exposed on any public GitLab user surface; admins only." last_name: type: string source: last_name nullable: true description: "Last name, if provided." admin_only: true description: "Last name, if provided. Not exposed on any public GitLab user surface; admins only." created_at: type: timestamp Loading @@ -65,7 +68,8 @@ properties: type: timestamp source: updated_at nullable: true description: "Timestamp when the user record was last updated." admin_only: true description: "Timestamp when the user record was last updated. Not exposed on any public GitLab user surface; admins only." state: type: enum Loading Loading @@ -98,7 +102,8 @@ properties: type: string source: preferred_language nullable: true description: "User's preferred UI language." admin_only: true description: "User's preferred UI language. Self-only on GitLab REST; admins only here until per-cell authorization lands." last_activity_on: type: date Loading @@ -110,7 +115,8 @@ properties: type: boolean source: private_profile nullable: false description: "Whether the user profile is private." admin_only: true description: "Whether the user profile is private. Self-only on GitLab REST; admins only here." is_admin: type: boolean Loading @@ -130,7 +136,8 @@ properties: type: boolean source: external nullable: false description: "Whether the user is marked as external." admin_only: true description: "Whether the user is marked as external. Self-only on GitLab REST and admin-only via UserWithAdmin; admins only here." user_type: type: enum Loading
crates/integration-tests/tests/common/mod.rs +4 −0 Original line number Diff line number Diff line Loading @@ -11,6 +11,10 @@ pub fn test_security_context() -> SecurityContext { SecurityContext::new(1, vec!["1/".into()]).expect("valid security context") } pub fn admin_security_context() -> SecurityContext { test_security_context().with_role(true, None) } pub async fn compile_and_execute( ctx: &TestContext, json: &str, Loading