Age | Commit message (Collapse) | Author | |
---|---|---|---|
2020-09-04 | Update VERSION to 13.1.11v13.1.1113-1-stable | GitLab Release Tools Bot | |
2020-09-04 | Update CHANGELOG.md for 13.1.11 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-09-03 | Merge branch 'zj-info-ref-fix-backport-13.1' into '13-1-stable' | Zeger-Jan van de Weg | |
Backport 13.1: Fix hanging info/refs cache when error occurs See merge request gitlab-org/gitaly!2517 | |||
2020-09-03 | Backport 13.1: Fix hanging info/refs cache when error occurs | Zeger-Jan van de Weg | |
2020-09-03 | Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stable | GitLab Release Tools Bot | |
2020-09-02 | Update VERSION to 13.1.10v13.1.10 | GitLab Release Tools Bot | |
2020-09-02 | Update CHANGELOG.md for 13.1.10 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-09-02 | Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stable | GitLab Release Tools Bot | |
2020-09-02 | Update VERSION filesv13.1.9 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-09-02 | Update CHANGELOG.md for 13.1.9 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-08-29 | Merge branch 'security-207-dont-expand-wiki-paths-13-1' into '13-1-stable' | GitLab Release Tools Bot | |
Don't expand filesystem paths of wiki pages See merge request gitlab-org/security/gitaly!14 | |||
2020-08-19 | Don't expand filesystem paths of wiki pages | Markus Koller | |
Paths starting with a `~` tilde character were getting expanded by the call to `File.expand_path` in `BlobEntry.normalize_dir`. This can cause an exception when the tilde is followed by an invalid username, which makes the whole wiki unusable. This overrides `BlobEntry.normalize_dir` so it doesn't expand tildes anymore, and in our case we also don't need to handle symlinks or Windows paths. | |||
2020-08-18 | Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stable | GitLab Release Tools Bot | |
2020-08-18 | Update VERSION to 13.1.8v13.1.8 | GitLab Release Tools Bot | |
2020-08-18 | Update CHANGELOG.md for 13.1.8 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-08-18 | Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stable | GitLab Release Tools Bot | |
2020-08-17 | Update VERSION to 13.1.7v13.1.7 | GitLab Release Tools Bot | |
2020-08-17 | Update CHANGELOG.md for 13.1.7 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-08-05 | Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stable | GitLab Release Tools Bot | |
2020-08-05 | Update VERSION to 13.1.6v13.1.6 | GitLab Release Tools Bot | |
2020-08-05 | Update CHANGELOG.md for 13.1.6 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-08-04 | Merge branch 'security-pks-create-from-url-creds-13.1' into '13-1-stable' | GitLab Release Tools Bot | |
Injection of `http.<url>.*` git config settings leading to SSRF See merge request gitlab-org/security/gitaly!10 | |||
2020-08-04 | repository: do not persist config when creating from URL | Patrick Steinhardt | |
When creating a new repository from URL, we currently execute the equivalent of `git clone -c $CFG1`. There's a slight gotcha here in that `git clone -c` will persist the configuration into the new repo's gitconfig file, while `git -c $CFG1 clone` does not persist the configuration to disk. There's two parts we're thus currently persisting to disk with one being "http.followRedirects" and the other one being "http.$URL.extraHeader". While the former one doesn't hurt much (but is not required to be persisted), the extra header is used to pass along credentials to the remote. As a result, we accidentally persist user credentials to disk in an unexpected way. Fix the issue by instead passing all configuration options as global configuration parameters to `git` instead of passing them to `git clone`. | |||
2020-07-23 | Update VERSION to 13.1.5v13.1.5 | GitLab Release Tools Bot | |
2020-07-23 | Update CHANGELOG.md for 13.1.5 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-07-17 | Merge branch 'jc-simplify-git-object-dir-handling-13-1' into '13-1-stable' | John Cai | |
Fix pre-receive hooks not working with symlinked paths (13-1-stable backport) See merge request gitlab-org/gitaly!2387 | |||
2020-07-16 | Merge branch 'jc-simplify-git-object-dir-handling' into 'master' | Sami Hiltunen | |
Fix pre-receive hooks not working with symlinked paths Closes gitlab#223839 See merge request gitlab-org/gitaly!2381 | |||
2020-07-09 | Update VERSION to 13.1.4v13.1.4 | GitLab Release Tools Bot | |
2020-07-09 | Update CHANGELOG.md for 13.1.4 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-07-08 | Merge branch 'jc-hotfix-add-gl-project-path' into 'master' | Pavlo Strokov | |
Add GL_PROJECT_PATH for custom hooks Closes #2902 See merge request gitlab-org/gitaly!2313 (cherry picked from commit 547bcbcd2c2aee8634af59666a1e9bbb9c26e549) 88ca6bcb Add GL_PROJECT_PATH for custom hooks | |||
2020-07-07 | Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stable | GitLab Release Tools Bot | |
2020-07-06 | Update VERSION to 13.1.3v13.1.3 | GitLab Release Tools Bot | |
2020-07-06 | Update CHANGELOG.md for 13.1.3 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-07-01 | Merge branch 'sh-http-proxy-fix-13-1' into '13-1-stable' | John Cai | |
Fix HTTP proxies not working in Gitaly hooks (13.1 stable) See merge request gitlab-org/gitaly!2337 | |||
2020-07-01 | Merge remote-tracking branch 'dev/13-1-stable' into 13-1-stable | GitLab Release Tools Bot | |
2020-07-01 | Merge branch 'sh-fix-issue-2913' into 'master' | Patrick Steinhardt | |
Fix HTTP proxies not working in Gitaly hooks Closes #2913 See merge request gitlab-org/gitaly!2325 | |||
2020-07-01 | Update VERSION to 13.1.2v13.1.2 | GitLab Release Tools Bot | |
2020-07-01 | Update CHANGELOG.md for 13.1.2 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-06-30 | Merge branch 'jc-add-hotfix-to-13-1-stable' into '13-1-stable' | John Cai | |
Add GL_PROJECT_PATH hotfix to 13-1-stable See merge request gitlab-org/gitaly!2324 | |||
2020-06-29 | Merge branch 'security-pks-worktree-race-13.1' into '13-1-stable' | Mayra Cabrera | |
worktree: Add random suffix to worktree paths to obstruct path traversal See merge request gitlab-org/security/gitaly!9 | |||
2020-06-29 | worktree: Add random suffix to worktree paths to obstruct path traversal | Patrick Steinhardt | |
Currently, worktree paths used for operations like rebase or squash that require access to checked-out files are generated deterministically by using an operation-specific prefix as well as the ID of the given operation. If given a path-traversal vulnerability, this makes it easy to use those worktree paths as an attack vector to read arbitrary files and directories. To improve our defense-in-depth mechanisms, this commit adds a random 16-digit hex suffix so that the resulting path is not deterministic. As we use blocks to manage worktrees, we know that the paths are not used outside of a given block anyway and can thus safely be changed. | |||
2020-06-25 | Merge branch 'jc-hotfix-add-gl-project-path' into 'master'jc-add-hotfix-to-13-1-stable | Pavlo Strokov | |
Add GL_PROJECT_PATH for custom hooks Closes #2902 See merge request gitlab-org/gitaly!2313 | |||
2020-06-23 | Update VERSION to 13.1.1v13.1.1 | GitLab Release Tools Bot | |
2020-06-23 | Update CHANGELOG.md for 13.1.1 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-06-19 | Update VERSION to 13.1.0v13.1.0 | GitLab Release Tools Bot | |
2020-06-19 | Update CHANGELOG.md for 13.1.0 | GitLab Release Tools Bot | |
[ci skip] | |||
2020-06-18 | Merge branch 'sk/2756-fix-temp-dir-cleanup' into 'master' | Paul Okstad | |
Fix hourly tmp folder cleanup See merge request gitlab-org/gitaly!2212 | |||
2020-06-18 | Fix hourly tmp folder cleanup | Sashi | |
2020-06-17 | Merge branch 'ps-dequeue-with-skip-in-progress' into 'master' | Zeger-Jan van de Weg | |
Replication not working on Praefect Closes #2801 See merge request gitlab-org/gitaly!2281 | |||
2020-06-17 | Replication not working on Praefect | Pavlo Strokov | |
Replications for different repositories on the same storage must be dequeued independently from each other. It is safe to run N replication jobs at the same time on the same storage for different repositories. 'in_progress' replications should not block other replication entries to be consumed from the queue. Closes: https://gitlab.com/gitlab-org/gitaly/-/issues/2801 |