Commit 97b5c6e0 authored by GitLab Bot's avatar GitLab Bot

Automatic merge of gitlab-org/gitlab-ce master

parents 4e7aebd3 c7f918aa
...@@ -124,8 +124,8 @@ class GroupsController < Groups::ApplicationController ...@@ -124,8 +124,8 @@ class GroupsController < Groups::ApplicationController
flash[:notice] = "Group '#{@group.name}' was successfully transferred." flash[:notice] = "Group '#{@group.name}' was successfully transferred."
redirect_to group_path(@group) redirect_to group_path(@group)
else else
flash.now[:alert] = service.error flash[:alert] = service.error
render :edit redirect_to edit_group_path(@group)
end end
end end
# rubocop: enable CodeReuse/ActiveRecord # rubocop: enable CodeReuse/ActiveRecord
......
---
title: Group transfer now properly redirects to edit on failure
merge_request: 26837
author:
type: fixed
...@@ -362,6 +362,10 @@ configuring a different storage driver. By default the GitLab Container Registry ...@@ -362,6 +362,10 @@ configuring a different storage driver. By default the GitLab Container Registry
is configured to use the filesystem driver, which makes use of [storage path](#container-registry-storage-path) is configured to use the filesystem driver, which makes use of [storage path](#container-registry-storage-path)
configuration. configuration.
NOTE: **Note:** Enabling a storage driver other than `filesystem` would mean
that your Docker client needs to be able to access the storage backend directly.
In that case, you must use an address that resolves and is accessible outside GitLab server.
The different supported drivers are: The different supported drivers are:
| Driver | Description | | Driver | Description |
...@@ -369,20 +373,16 @@ The different supported drivers are: ...@@ -369,20 +373,16 @@ The different supported drivers are:
| filesystem | Uses a path on the local filesystem | | filesystem | Uses a path on the local filesystem |
| azure | Microsoft Azure Blob Storage | | azure | Microsoft Azure Blob Storage |
| gcs | Google Cloud Storage | | gcs | Google Cloud Storage |
| s3 | Amazon Simple Storage Service | | s3 | Amazon Simple Storage Service. Be sure to configure your storage bucket with the correct [S3 Permission Scopes](https://docs.docker.com/registry/storage-drivers/s3/#s3-permission-scopes). |
| swift | OpenStack Swift Object Storage | | swift | OpenStack Swift Object Storage |
| oss | Aliyun OSS | | oss | Aliyun OSS |
Read more about the individual driver's config options in the Read more about the individual driver's config options in the
[Docker Registry docs][storage-config]. [Docker Registry docs][storage-config].
> **Warning** GitLab will not backup Docker images that are not stored on the CAUTION: **Warning:** GitLab will not backup Docker images that are not stored on the
filesystem. Remember to enable backups with your object storage provider if filesystem. Remember to enable backups with your object storage provider if
desired. desired.
>
> **Important** Enabling storage driver other than `filesystem` would mean
that your Docker client needs to be able to access the storage backend directly.
So you must use an address that resolves and is accessible outside GitLab server.
--- ---
......
...@@ -655,7 +655,7 @@ describe GroupsController do ...@@ -655,7 +655,7 @@ describe GroupsController do
end end
it 'should redirect to the current path' do it 'should redirect to the current path' do
expect(response).to render_template(:edit) expect(response).to redirect_to(edit_group_path(group))
end end
end end
......
...@@ -43,6 +43,7 @@ describe 'Issues > User uses quick actions', :js do ...@@ -43,6 +43,7 @@ describe 'Issues > User uses quick actions', :js do
describe 'issue-only commands' do describe 'issue-only commands' do
let(:user) { create(:user) } let(:user) { create(:user) }
let(:project) { create(:project, :public) } let(:project) { create(:project, :public) }
let(:issue) { create(:issue, project: project) }
before do before do
project.add_maintainer(user) project.add_maintainer(user)
...@@ -55,6 +56,8 @@ describe 'Issues > User uses quick actions', :js do ...@@ -55,6 +56,8 @@ describe 'Issues > User uses quick actions', :js do
wait_for_requests wait_for_requests
end end
it_behaves_like 'confidential quick action'
describe 'adding a due date from note' do describe 'adding a due date from note' do
let(:issue) { create(:issue, project: project) } let(:issue) { create(:issue, project: project) }
...@@ -211,42 +214,6 @@ describe 'Issues > User uses quick actions', :js do ...@@ -211,42 +214,6 @@ describe 'Issues > User uses quick actions', :js do
end end
end end
describe 'make issue confidential' do
let(:issue) { create(:issue, project: project) }
let(:original_issue) { create(:issue, project: project) }
context 'when the current user can update issues' do
it 'does not create a note, and marks the issue as confidential' do
add_note("/confidential")
expect(page).not_to have_content "/confidential"
expect(page).to have_content 'Commands applied'
expect(page).to have_content "made the issue confidential"
expect(issue.reload).to be_confidential
end
end
context 'when the current user cannot update the issue' do
let(:guest) { create(:user) }
before do
project.add_guest(guest)
gitlab_sign_out
sign_in(guest)
visit project_issue_path(project, issue)
end
it 'does not create a note, and does not mark the issue as confidential' do
add_note("/confidential")
expect(page).not_to have_content 'Commands applied'
expect(page).not_to have_content "made the issue confidential"
expect(issue.reload).not_to be_confidential
end
end
end
describe 'move the issue to another project' do describe 'move the issue to another project' do
let(:issue) { create(:issue, project: project) } let(:issue) { create(:issue, project: project) }
......
# frozen_string_literal: true # frozen_string_literal: true
shared_examples 'confidential quick action' do shared_examples 'confidential quick action' do
context 'when the current user can update issues' do
it 'does not create a note, and marks the issue as confidential' do
add_note('/confidential')
expect(page).not_to have_content '/confidential'
expect(page).to have_content 'Commands applied'
expect(page).to have_content 'made the issue confidential'
expect(issue.reload).to be_confidential
end
end
context 'when the current user cannot update the issue' do
let(:guest) { create(:user) }
before do
project.add_guest(guest)
gitlab_sign_out
sign_in(guest)
visit project_issue_path(project, issue)
end
it 'does not create a note, and does not mark the issue as confidential' do
add_note('/confidential')
expect(page).not_to have_content 'Commands applied'
expect(page).not_to have_content 'made the issue confidential'
expect(issue.reload).not_to be_confidential
end
end
end end
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment