Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-02-01Fix ReturnInVoidContext rubocop offenseSemyon Pupkov
2019-02-01Merge branch 'winh-position-helpers' into 'master'Clement Ho
Add CSS helper classes for positioning See merge request gitlab-org/gitlab-ce!24821
2019-02-01Merge branch 'qa-github-oauth-login-test-2' into 'master'Rémy Coutable
Add e2e QA test for logging in using Github OAuth See merge request gitlab-org/gitlab-ce!24817
2019-02-01Merge branch 'adriel-remove-d3-metrics-graph' into 'master'Phil Hughes
Remove d3 metrics graph See merge request gitlab-org/gitlab-ce!24647
2019-02-01Remove d3 metrics graphAdriel Santiago
2019-02-01Add e2e QA test for logging in using GitHub OAuthSanad Liaquat
Adds the test itself and the vendor page object model for GitHub login pages.
2019-02-01Merge branch 'patch-41' into 'master'Evan Read
The GitLab Pages IP address for GitLab.com changed from 52.167.214.135 to... See merge request gitlab-org/gitlab-ce!24797
2019-02-01Add CSS helper classes for positioningWinnie Hellmann
2019-02-01Merge branch 'docs-serverless-tmcli-update' into 'master'Evan Read
Docs serverless tmcli update See merge request gitlab-org/gitlab-ce!24689
2019-02-01Fix rendering of caution textEvan Read
2019-02-01Merge branch 'fix-rubocop-violations' into 'master'Stan Hu
Fix rubocop violations See merge request gitlab-org/gitlab-ce!24837
2019-02-01Merge branch 'fix/39759-new-project-icon-vertical-align' into 'master'Annabel Dunstone Gray
fix(settings): Adjusted vertical alignment of visibility icons Closes #39759 See merge request gitlab-org/gitlab-ce!24511
2019-02-01fix(settings): Adjusted vertical alignment of visibility iconsMartin Hobert
2019-01-31Fix rubocop violationsGabriel Mazetto
2019-01-31Update intro note and stepsdanielgruesso
2019-01-31Merge branch 'qa-ml-fix-create-wiki-spec' into 'master'Dan Davison
Fix flaky wiki create test Closes gitlab-org/quality/nightly#24 See merge request gitlab-org/gitlab-ce!24778
2019-01-31Fixed changelog for 11.7.2Yorick Peterse
This got merged up somewhere in the process of merging dev.gitlab.org and GitLab.com back together.
2019-01-31Update CHANGELOG.md for 11.6.8GitLab Release Tools Bot
[ci skip]
2019-01-31Fix requiring the rubyzip GemYorick Peterse
In commit 6fa5fd8515e0f2d5a6341134560021f353d84362 the `require: false` was removed to ensure the Gem was loaded at run time. Unfortunately, the `require` necessary for the rubyzip Gem is "zip" and not "rubyzip". As a result, Bundler would not require the Gem. This meant that we would still run into constant errors when referring to `Zip::File`.
2019-01-31Update CHANGELOG.md for 11.7.2GitLab Release Tools Bot
[ci skip]
2019-01-31Fix uninitialized constant with GitLab Pages deployStan Hu
pages:deploy step was failing with the following error: ``` unitialized constant SafeZip::Extract::Zip ``` Since license_finder already pulls in rubyzip, we can make it a required gem. We also use the scope operator to make the reference to Zip::File explicit.
2019-01-31Update CHANGELOG.md for 11.5.8GitLab Release Tools Bot
[ci skip]
2019-01-31Update CHANGELOG.md for 11.7.1GitLab Release Tools Bot
[ci skip]
2019-01-31Merge branch '56860-fix-spec-race-condition-upside-the-head' into 'master'Douglas Barbosa Alexandre
Fix a JS race in a spec Closes #56860 See merge request gitlab-org/gitlab-ce!24684
2019-01-31[master] Pipelines section is available to unauthorized usersKamil Trzciński
2019-01-31[master] Check access rights when creating/updating ProtectedRefsFrancisco Javier López
2019-01-31Add subresources removal to member destroy serviceJames Lopez
2019-01-31[master] Resolve "[Security] Stored XSS via KaTeX"Constance Okoghenun
2019-01-31Disable git v2 protocol temporarilyNick Thomas
2019-01-31Fix tree restorer visibility levelJames Lopez
2019-01-31Stop showing ci for guest usersSteve Azzopardi
When a user is a guest user, and the "Public Pipeline" is set to false inside of "Settings > CI/CD > General" the commit status in the project dashboard should not be shown.
2019-01-31Sent notification only to authorized usersJan Provaznik
When moving a project, it's possible that some users who had access to the project in old path can not access the project in the new path. Because `project_authorizations` records are updated asynchronously, when we send the notification about moved project the list of project team members contains old project members, we want to notify all these members except the old users who can not access the new location.
2019-01-31Use sanitized user status message for user popoverDennis Tang
2019-01-31Alias GitHub and BitBucket OAuth2 callback URLsStan Hu
To prevent an OAuth2 covert redirect vulnerability, this commit adds and uses an alias for the GitHub and BitBucket OAuth2 callback URLs to the following paths: GitHub: /users/auth/-/import/github Bitbucket: /users/auth/-/import/bitbucket This allows admins to put a more restrictive callback URL in the OAuth2 configuration settings. Instead of https://example.com, admins can now use: https://example.com/users/auth It's possible but not trivial to change Devise and OmniAuth to use a different prefix for callback URLs instead of /users/auth. For now, aliasing the import URLs under the /users/auth namespace should suffice. Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/56663
2019-01-31Verify that LFS upload requests are genuineNick Thomas
LFS uploads are handled in concert by workhorse and rails. In normal use, workhorse: * Authorizes the request with rails (upload_authorize) * Handles the upload of the file to a tempfile - disk or object storage * Validates the file size and contents * Hands off to rails to complete the upload (upload_finalize) In `upload_finalize`, the LFS object is linked to the project. As LFS objects are deduplicated across all projects, it may already exist. If not, the temporary file is copied to the correct place, and will be used by all future LFS objects with the same OID. Workhorse uses the Content-Type of the request to decide to follow this routine, as the URLs are ambiguous. If the Content-Type is anything but "application/octet-stream", the request is proxied directly to rails, on the assumption that this is a normal file edit request. If it's an actual LFS request with a different content-type, however, it is routed to the Rails `upload_finalize` action, which treats it as an LFS upload just as it would a workhorse-modified request. The outcome is that users can upload LFS objects that don't match the declared size or OID. They can also create links to LFS objects they don't really own, allowing them to read the contents of files if they know just the size or OID. We can close this hole by requiring requests to `upload_finalize` to be sourced from Workhorse. The mechanism to do this already exists.
2019-01-31Extract GitLab Pages using RubyZipKamil Trzciński
RubyZip allows us to perform strong validation of expanded paths where we do extract file. We introduce the following additional checks to extract routines: 1. None of path components can be symlinked, 2. We drop privileges support for directories, 3. Symlink source needs to point within the target directory, like `public/`, 4. The symlink source needs to exist ahead of time.
2019-01-31Add changelog entryKushal Pandya
2019-01-31Use `sanitize_name` to sanitize URL in user full nameKushal Pandya
2019-01-31Prevent comments by email when issue is lockedHeinrich Lee Yu
This changes the permission check so it uses the policy on Noteable instead of Project. This prevents bypassing of rules defined in Noteable for locked discussions and confidential issues. Also rechecks permissions when reply_to_discussion_id is provided since the discussion_id may be from a different noteable.
2019-01-31Add `sanitize_name` helper to sanitize URLs in user full nameKushal Pandya
2019-01-31Bump the CACHE_COMMONMARK_VERSIONBrett Walker
Since we needed to bump the version to 13 in the backports, and we know that an MR on master also bumped it to 13, bump to 14 to ensure that when a customer upgrades to the most recent release, the markdown gets recalcuated as necessary.
2019-01-31Show tooltip for malicious looking linksBrett Walker
Such as those with IDN homographs or embedded right-to-left (RTLO) characters. Autolinked hrefs should be escaped
2019-01-31Added validations to prevent LFS object forgeryFrancisco Javier López
2019-01-31Group Guests are no longer able to see merge requestsTiago Botelho
Group guests will only be displayed merge requests to projects they have a access level to, higher than Reporter. Visible projects will still display the merge requests to Guests
2019-01-31Fixed bug when external wiki is enabledFrancisco Javier López
When the external wiki is enabled, the internal wiki link is replaced by the external wiki url. But the internal wiki is still accessible. In this change the external wiki will have its own tab in the sidebar and only if the services are disabled the tab (and access rights) will not be displayed.
2019-01-31Fix private user email being visible in tag webhooksLuke Duncalfe
Fixes #54721
2019-01-31Add changelog for trigger token exposure fixGrzegorz Bizon
2019-01-31Fix subject in trigger presenter testsGrzegorz Bizon
2019-01-31Add some specs for trigger presenterGrzegorz Bizon
2019-01-31Present all pipeline triggers using trigger presenterGrzegorz Bizon