Commit 4c499d01 authored by Avielle Wolfe's avatar Avielle Wolfe

Auditors can see project security dashboard

Aw yeah
parent f97ae34f
...@@ -188,6 +188,7 @@ module EE ...@@ -188,6 +188,7 @@ module EE
enable :read_environment enable :read_environment
enable :read_deployment enable :read_deployment
enable :read_pages enable :read_pages
enable :read_project_security_dashboard
end end
rule { auditor & ~guest }.policy do rule { auditor & ~guest }.policy do
......
...@@ -39,6 +39,7 @@ describe ProjectPolicy do ...@@ -39,6 +39,7 @@ describe ProjectPolicy do
read_pipeline read_build read_commit_status read_container_image read_pipeline read_build read_commit_status read_container_image
read_environment read_deployment read_merge_request read_pages read_environment read_deployment read_merge_request read_pages
create_merge_request_in award_emoji create_merge_request_in award_emoji
read_project_security_dashboard
read_vulnerability_feedback read_software_license_policy read_vulnerability_feedback read_software_license_policy
] ]
end end
...@@ -54,6 +55,10 @@ describe ProjectPolicy do ...@@ -54,6 +55,10 @@ describe ProjectPolicy do
context 'auditor' do context 'auditor' do
let(:current_user) { create(:user, :auditor) } let(:current_user) { create(:user, :auditor) }
before do
stub_licensed_features(security_dashboard: true, license_management: true)
end
context 'who is not a team member' do context 'who is not a team member' do
it do it do
is_expected.to be_disallowed(*developer_permissions) is_expected.to be_disallowed(*developer_permissions)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment