diff --git a/app/serializers/lfs_file_lock_entity.rb b/app/serializers/lfs_file_lock_entity.rb index 787d201d0a1af99ca942eb9e62607e1ac486f300..dd109cba0155332a5ab9036dd656b296b81732f6 100644 --- a/app/serializers/lfs_file_lock_entity.rb +++ b/app/serializers/lfs_file_lock_entity.rb @@ -8,6 +8,6 @@ class LfsFileLockEntity < Grape::Entity expose(:created_at, as: :locked_at) { |entity| entity.created_at.to_fs(:iso8601) } expose :owner do - expose(:name) { |entity| entity.user&.name } + expose(:name) { |entity| entity.user&.username } end end diff --git a/ee/app/helpers/path_locks_helper.rb b/ee/app/helpers/path_locks_helper.rb index f9ade343c2c90e1f9a4497d793f94eb40d35f664..b3e6cdee55b85a1c10299cf48ee7357427bc8914 100644 --- a/ee/app/helpers/path_locks_helper.rb +++ b/ee/app/helpers/path_locks_helper.rb @@ -7,10 +7,10 @@ def can_unlock?(path_lock, current_user = @current_user) def text_label_for_lock(file_lock, path) if file_lock.path == path - "Locked by #{file_lock.user.name}" + "Locked by #{file_lock.user.username}" else # Nested lock - "#{file_lock.user.name} has a lock on \"#{file_lock.path}\"" + "#{file_lock.user.username} has a lock on \"#{file_lock.path}\"" end end end diff --git a/ee/spec/helpers/path_locks_helper_spec.rb b/ee/spec/helpers/path_locks_helper_spec.rb index cfa570d5478cce5fa54eed4c3f674d5c20b174eb..6055dbb78cfd923a5c23df78b7e28eedd55daceb 100644 --- a/ee/spec/helpers/path_locks_helper_spec.rb +++ b/ee/spec/helpers/path_locks_helper_spec.rb @@ -23,11 +23,11 @@ describe '#text_label_for_lock' do it "return correct string for non-nested locks" do - expect(text_label_for_lock(path_lock, 'app')).to eq('Locked by John') + expect(text_label_for_lock(path_lock, 'app')).to eq("Locked by #{user.username}") end it "return correct string for nested locks" do - expect(text_label_for_lock(path_lock, 'app/models')).to eq('John has a lock on "app"') + expect(text_label_for_lock(path_lock, 'app/models')).to eq("#{user.username} has a lock on \"app\"") end end end diff --git a/ee/spec/lib/gitlab/tree_summary_spec.rb b/ee/spec/lib/gitlab/tree_summary_spec.rb index abd1455fb2e880d1e3e4f0981d7f8657f5666da8..28a8044ad50c113cc9c46b7db3d376ab1036a58b 100644 --- a/ee/spec/lib/gitlab/tree_summary_spec.rb +++ b/ee/spec/lib/gitlab/tree_summary_spec.rb @@ -14,7 +14,7 @@ describe '#summarize (entries)' do it 'includes path locks in entries' do is_expected.to contain_exactly( - a_hash_including(file_name: 'a.txt', lock_label: "Locked by #{path_lock.user.name}") + a_hash_including(file_name: 'a.txt', lock_label: "Locked by #{path_lock.user.username}") ) end end diff --git a/lib/gitlab/checks/diff_check.rb b/lib/gitlab/checks/diff_check.rb index 1186b532baff83acfa973fa355c367834dcd351c..bce4f969284a86b517f2b5ea0b1dc4d9150735cd 100644 --- a/lib/gitlab/checks/diff_check.rb +++ b/lib/gitlab/checks/diff_check.rb @@ -74,7 +74,7 @@ def lfs_file_locks_validation lfs_lock = project.lfs_file_locks.where(path: paths).where.not(user_id: user_access.user.id).take if lfs_lock - return "The path '#{lfs_lock.path}' is locked in Git LFS by #{lfs_lock.user.name}" + return "The path '#{lfs_lock.path}' is locked in Git LFS by #{lfs_lock.user.username}" end end end diff --git a/spec/lib/gitlab/checks/diff_check_spec.rb b/spec/lib/gitlab/checks/diff_check_spec.rb index dd467537a4f7713a3ddc58660b48f8eb1b12b715..20c6ad8a6e899685c3947a329d8a1c396e7e3bf7 100644 --- a/spec/lib/gitlab/checks/diff_check_spec.rb +++ b/spec/lib/gitlab/checks/diff_check_spec.rb @@ -94,7 +94,7 @@ context 'when change is sent by a different user' do it 'raises an error if the user is not allowed to update the file' do - expect { subject.validate! }.to raise_error(Gitlab::GitAccess::ForbiddenError, "The path 'README' is locked in Git LFS by #{lock.user.name}") + expect { subject.validate! }.to raise_error(Gitlab::GitAccess::ForbiddenError, "The path 'README' is locked in Git LFS by #{lock.user.username}") end end @@ -148,7 +148,7 @@ end it "does raise an error" do - expect { subject.validate! }.to raise_error(Gitlab::GitAccess::ForbiddenError, "The path 'files/locked/baz.lfs' is locked in Git LFS by #{owner.name}") + expect { subject.validate! }.to raise_error(Gitlab::GitAccess::ForbiddenError, "The path 'files/locked/baz.lfs' is locked in Git LFS by #{owner.username}") end end end diff --git a/spec/serializers/lfs_file_lock_entity_spec.rb b/spec/serializers/lfs_file_lock_entity_spec.rb index 5869941c9201f1f38ce9d45cbecfdec9cdc52ecb..d0ff6fb60af0cf5514f3dae303f0110cc24e6b12 100644 --- a/spec/serializers/lfs_file_lock_entity_spec.rb +++ b/spec/serializers/lfs_file_lock_entity_spec.rb @@ -16,6 +16,6 @@ it 'exposes the owner info' do expect(subject).to include(:owner) - expect(subject[:owner][:name]).to eq(user.name) + expect(subject[:owner][:name]).to eq(user.username) end end