Commit 5ceab966 authored by Tyler Amos's avatar Tyler Amos

Rename field to actualRepositorySizeLimit

This name is more descriptive than existing name, actualSizeLimit.
parent e643f47b
......@@ -12920,7 +12920,7 @@ type Project {
"""
Size limit for the repository in bytes
"""
actualSizeLimit: Float
actualRepositorySizeLimit: Float
"""
A single Alert Management alert of the project
......
......@@ -38145,7 +38145,7 @@
"description": null,
"fields": [
{
"name": "actualSizeLimit",
"name": "actualRepositorySizeLimit",
"description": "Size limit for the repository in bytes",
"args": [
......@@ -1882,7 +1882,7 @@ Autogenerated return type of PipelineRetry.
| Field | Type | Description |
| ----- | ---- | ----------- |
| `actualSizeLimit` | Float | Size limit for the repository in bytes |
| `actualRepositorySizeLimit` | Float | Size limit for the repository in bytes |
| `alertManagementAlert` | AlertManagementAlert | A single Alert Management alert of the project |
| `alertManagementAlertStatusCounts` | AlertManagementAlertStatusCountsType | Counts of alerts by status for the project |
| `allowMergeOnSkippedPipeline` | Boolean | If `only_allow_merge_if_pipeline_succeeds` is true, indicates if merge requests of the project can also be merged with skipped jobs |
......
......@@ -26,7 +26,7 @@ query getStorageCounter($fullPath: ID!, $withExcessStorageData: Boolean = false)
webUrl
name
repositorySizeExcess @include(if: $withExcessStorageData)
actualSizeLimit @include(if: $withExcessStorageData)
actualRepositorySizeLimit @include(if: $withExcessStorageData)
statistics {
commitCount
storageSize
......
......@@ -120,10 +120,11 @@ module EE
null: true,
description: 'Size of repository that exceeds the limit in bytes'
field :actual_size_limit,
field :actual_repository_size_limit,
GraphQL::FLOAT_TYPE,
null: true,
description: 'Size limit for the repository in bytes'
description: 'Size limit for the repository in bytes',
resolve: -> (obj, _args, _ctx) { obj.actual_size_limit }
def self.sast_ci_configuration(project)
::Security::CiConfiguration::SastParserService.new(project).configuration
......
......@@ -17,7 +17,7 @@ RSpec.describe GitlabSchema.types['Project'] do
expected_fields = %w[
vulnerabilities sast_ci_configuration vulnerability_scanners requirement_states_count
vulnerability_severities_count packages compliance_frameworks vulnerabilities_count_by_day
security_dashboard_path iterations cluster_agents repository_size_excess actual_size_limit
security_dashboard_path iterations cluster_agents repository_size_excess actual_repository_size_limit
]
expect(described_class).to include_graphql_fields(*expected_fields)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment