diff --git a/config/feature_flags/development/override_group_level_protected_environment_settings_permission.yml b/config/feature_flags/development/override_group_level_protected_environment_settings_permission.yml deleted file mode 100644 index 7e7789e2e8f94e86d50585d4c373b4abd829eaf0..0000000000000000000000000000000000000000 --- a/config/feature_flags/development/override_group_level_protected_environment_settings_permission.yml +++ /dev/null @@ -1,8 +0,0 @@ ---- -name: override_group_level_protected_environment_settings_permission -introduced_by_url: https://gitlab.com/gitlab-org/gitlab/-/merge_requests/92801 -rollout_issue_url: https://gitlab.com/gitlab-org/gitlab/-/issues/369875 -milestone: '15.3' -type: development -group: group::release -default_enabled: false diff --git a/ee/app/policies/ee/group_policy.rb b/ee/app/policies/ee/group_policy.rb index f78f895008f38876a1d611c27df57cc6ce1af2a3..bad03eee07431a9f0bae42edef873511908e703d 100644 --- a/ee/app/policies/ee/group_policy.rb +++ b/ee/app/policies/ee/group_policy.rb @@ -173,11 +173,6 @@ module GroupPolicy @user.banned_from_namespace?(root_namespace) end - condition(:admin_group_protected_environment_accessible) do - ::Feature.disabled?( - :override_group_level_protected_environment_settings_permission, @subject) - end - rule { ~public_group & ~can?(:owner_access) & user_banned_from_group }.policy do prevent :read_group end @@ -208,9 +203,6 @@ module GroupPolicy enable :admin_wiki end - rule { maintainer & ~admin_group_protected_environment_accessible } - .enable :admin_protected_environment - rule { auditor }.policy do enable :view_productivity_analytics enable :view_group_devops_adoption @@ -237,7 +229,7 @@ module GroupPolicy enable :owner_access end - rule { owner & admin_group_protected_environment_accessible } + rule { owner } .enable :admin_protected_environment rule { can?(:owner_access) }.policy do diff --git a/ee/spec/requests/api/protected_environments_spec.rb b/ee/spec/requests/api/protected_environments_spec.rb index 1ca1835d71d73c77996ab65b2454bea50c245b61..b1efcca6ff60880bba88de117e0c2d864e911295 100644 --- a/ee/spec/requests/api/protected_environments_spec.rb +++ b/ee/spec/requests/api/protected_environments_spec.rb @@ -404,14 +404,6 @@ it_behaves_like 'group-level request is disallowed for maintainer' - context 'when override_group_level_protected_environment_settings_permission feature flag is enabled' do - before do - stub_feature_flags(override_group_level_protected_environment_settings_permission: true) - end - - it_behaves_like 'group-level request is allowed for maintainer' - end - context 'when authenticated as a owner' do before do group.add_owner(user) @@ -437,14 +429,6 @@ it_behaves_like 'group-level request is disallowed for maintainer' - context 'when override_group_level_protected_environment_settings_permission feature flag is enabled' do - before do - stub_feature_flags(override_group_level_protected_environment_settings_permission: true) - end - - it_behaves_like 'group-level request is allowed for maintainer' - end - context 'when authenticated as a owner' do before do group.add_owner(user) @@ -495,17 +479,6 @@ let(:request) { post api_url, params: { name: 'staging' } } end - context 'when override_group_level_protected_environment_settings_permission feature flag is enabled' do - before do - stub_feature_flags(override_group_level_protected_environment_settings_permission: true) - end - - it_behaves_like 'group-level request is allowed for maintainer' do - let(:deployer) { create(:user).tap { |u| group.add_maintainer(u) } } - let(:request) { post api_url, params: { name: 'staging', deploy_access_levels: [{ user_id: deployer.id }] } } - end - end - context 'when authenticated as a owner' do before do group.add_owner(user) @@ -615,17 +588,6 @@ let(:request) { put api_url, params: { name: 'production' } } end - context 'when override_group_level_protected_environment_settings_permission feature flag is enabled' do - before do - stub_feature_flags(override_group_level_protected_environment_settings_permission: true) - end - - it_behaves_like 'group-level request is allowed for maintainer' do - let(:deployer) { create(:user).tap { |u| group.add_maintainer(u) } } - let(:request) { put api_url, params: { deploy_access_levels: [{ user_id: deployer.id }] } } - end - end - context 'when authenticated as a owner' do let_it_be(:deployer) { create(:user) } let_it_be(:shared_group) { create(:group) } @@ -706,14 +668,6 @@ it_behaves_like 'group-level request is disallowed for maintainer' - context 'when override_group_level_protected_environment_settings_permission feature flag is enabled' do - before do - stub_feature_flags(override_group_level_protected_environment_settings_permission: true) - end - - it_behaves_like 'group-level request is allowed for maintainer' - end - context 'when authenticated as a owner' do before do group.add_owner(user) diff --git a/ee/spec/requests/groups/protected_environments_controller_spec.rb b/ee/spec/requests/groups/protected_environments_controller_spec.rb index 8e66e1e15796ee36f192ae4ad6a563f384632474..922be0442b13e81dd48d7a331fdf95d3c7ee26c0 100644 --- a/ee/spec/requests/groups/protected_environments_controller_spec.rb +++ b/ee/spec/requests/groups/protected_environments_controller_spec.rb @@ -69,16 +69,6 @@ expect(response).to have_gitlab_http_status(:not_found) end - - context 'when override_group_level_protected_environment_settings_permission feature flag is enabled' do - before do - stub_feature_flags(override_group_level_protected_environment_settings_permission: true) - end - - it 'creates a new ProtectedEnvironment' do - expect { subject }.to change(ProtectedEnvironment, :count).by(1) - end - end end end @@ -131,18 +121,6 @@ expect(response).to have_gitlab_http_status(:not_found) end - - context 'when override_group_level_protected_environment_settings_permission feature flag is enabled' do - before do - stub_feature_flags(override_group_level_protected_environment_settings_permission: true) - end - - it 'updates the protected environment' do - subject - - expect(response).to have_gitlab_http_status(:ok) - end - end end end @@ -191,16 +169,6 @@ expect(response).to have_gitlab_http_status(:not_found) end - - context 'when override_group_level_protected_environment_settings_permission feature flag is enabled' do - before do - stub_feature_flags(override_group_level_protected_environment_settings_permission: true) - end - - it 'deletes the requested protected environment' do - expect { subject }.to change { ProtectedEnvironment.count }.from(1).to(0) - end - end end end end diff --git a/spec/spec_helper.rb b/spec/spec_helper.rb index 6f659b3a41ded5b6a1b41d44d92fed559d63bf4b..9f96162e6291ea81b5f2d4db6d318e1fa706e8d1 100644 --- a/spec/spec_helper.rb +++ b/spec/spec_helper.rb @@ -312,9 +312,6 @@ # See https://docs.gitlab.com/ee/development/feature_flags/#selectively-disable-by-actor stub_feature_flags(legacy_merge_request_state_check_for_merged_result_pipelines: false) - # Will be removed in https://gitlab.com/gitlab-org/gitlab/-/issues/369875 - stub_feature_flags(override_group_level_protected_environment_settings_permission: false) - allow(Gitlab::GitalyClient).to receive(:can_use_disk?).and_return(enable_rugged) else unstub_all_feature_flags