Provide ability to debug permissions using specs
What does this MR do and why?
- To my knowledge, there is no other way of programmatically knowing which permissions checks are called for a request.
- This approach inspired by !94135 (comment 1295929169)
- Also updates docs to explain usage
- And adds section on
ability_map
, which I used here: !113168 (merged) - Also adds an RSpec shared example for comparing policies, which I used here: !112762 (closed)
- Prep work for "consolidate permissions" epic: #389631 (closed)
Screenshots or screen recordings
Screenshots are required for UI changes, and strongly recommended for all other merge requests.
How to set up and validate locally
Numbered steps to set up and validate the change are strongly suggested.
MR acceptance checklist
This checklist encourages us to confirm any changes have been analyzed to reduce risks in quality, performance, reliability, security, and maintainability.
-
I have evaluated the MR acceptance checklist for this MR.
Edited by Jessie Young