Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2018-04-18Resolve "Make a Rubocop that forbids returning from a block"🙈 jacopo beschi 🙉
2018-04-07Use proper auth_scope for deploy tokenKamil Trzciński
2018-04-07Increase test suite around deploy tokens behaviorMayra Cabrera
Also, fixes broken specs
2018-04-07Fixes broken schema and minor changesMayra Cabrera
2018-04-07Include ProjectDeployTokensMayra Cabrera
Also: - Changes scopes from serializer to use boolean columns - Fixes broken specs
2018-04-07Support Deploy Tokens properly without hacking abilitiesKamil Trzciński
2018-04-07Addreses backend review suggestionsMayra Cabrera
- Remove extra method for authorize_admin_project - Ensure project presence - Rename 'read_repo' to 'read_repository' to be more verbose
2018-04-07Removes logic from Jwt and handle different scenarios on Gitlab::AuthMayra Cabrera
- When using 'read_repo' password and project are sent, so we used both of them to fetch for the token - When using 'read_registry' only the password is sent, so we only use that for fetching the token
2018-04-07Implement 'read_repo' for DeployTokensMayra Cabrera
This will allow to download a repo using the token from the DeployToken
2018-03-27Fix LDAP login without user in DBHoratiu Eugen Vlad
2018-03-06Make oauth provider login genericHoratiu Eugen Vlad
2018-02-28Moved o_auth/saml/ldap modules under gitlab/authHoratiu Eugen Vlad
2018-02-02use Gitlab::UserSettings directly as a singleton instead of ↵Mario de la Ossa
including/extending it
2017-11-24Merge branch 'dm-fix-registry-with-sudo-token' into 'master'Sean McGivern
Fix pulling and pushing using a personal access token with the sudo scope Closes #40466 See merge request gitlab-org/gitlab-ce!15571
2017-11-23Fix pulling and pushing using a personal access token with the sudo scopeDouwe Maan
2017-11-23Allow password authentication to be disabled entirelyMarkus Koller
2017-11-08Fix Error 500 when pushing LFS objects with a write deploy keyStan Hu
2017-11-02Add sudo API scopeDouwe Maan
2017-11-02Consistently use PersonalAccessToken instead of PersonalTokenDouwe Maan
2017-09-18Clean up read_registry scope changesRobin Bobbitt
Closes #37789
2017-09-12Merge branch 'hide-read-registry-scope-when-registry-disabled' into 'master'Kamil Trzciński
Hide read_registry scope when registry is disabled on instance See merge request !13314
2017-09-01Merge branch '37202-revert-changes-to-signing-enabled' into 'master'Douwe Maan
Rollback changes made to signing_enabled. Closes #37202 See merge request !13956
2017-09-01Rollsback changes made to signing_enabled.Tiago Botelho
2017-08-31`current_application_settings` belongs on `Gitlab::CurrentSettings`Sean McGivern
The initializers including this were doing so at the top level, so every object loaded after them had a `current_application_settings` method. However, if someone had rack-attack enabled (which was loaded before these initializers), it would try to load the API, and fail, because `Gitlab::CurrentSettings` didn't have that method. To fix this: 1. Don't include `Gitlab::CurrentSettings` at the top level. We do not need `Object.new.current_application_settings` to work. 2. Make `Gitlab::CurrentSettings` explicitly `extend self`, as we already use it like that in several places. 3. Change the initializers to use that new form.
2017-08-22Hide read_registry scope when registry is disabled on instanceRobin Bobbitt
2017-08-14Whitelist or fix additional `Gitlab/PublicSend` cop violationsRobert Speicher
An upcoming update to rubocop-gitlab-security added additional violations.
2017-08-02Cleanup tests and add admin_container_image toLin Jen-Shin
full_authentication_abilities. This is fine because we're going to check with can?(..) anyway
2017-07-13Fixes needed when GitLab sign-in is not enabledRobin Bobbitt
When sign-in is disabled: - skip password expiration checks - prevent password reset requests - don’t show Password tab in User Settings - don’t allow login with username/password for Git over HTTP requests - render 404 on requests to Profiles::PasswordsController
2017-06-30`AccessTokenValidationService` accepts `String` or `API::Scope` scopes.Timothy Andrew
- There's no need to use `API::Scope` for scopes that don't have `if` conditions, such as in `lib/gitlab/auth.rb`.
2017-06-29Extract a `Gitlab::Scope` class.Timothy Andrew
- To represent an authorization scope, such as `api` or `read_user` - This is a better abstraction than the hash we were previously using.
2017-06-28Implement review comments from @DouweM for !12300.Timothy Andrew
- Use a struct for scopes, so we can call `scope.if` instead of `scope[:if]` - Refactor the "remove scopes whose :if condition returns false" logic to use a `select` rather than a `reject`.
2017-06-28Fix remaining spec failures for !12300.Timothy Andrew
1. Get the spec for `lib/gitlab/auth.rb` passing. - Make the `request` argument to `AccessTokenValidationService` optional - `auth.rb` doesn't need to pass in a request. - Pass in scopes in the format `[{ name: 'api' }]` rather than `['api']`, which is what `AccessTokenValidationService` now expects. 2. Get the spec for `API::V3::Users` passing 2. Get the spec for `AccessTokenValidationService` passing
2017-06-08Instruct user to use a personal access token for Git over HTTPRobin Bobbitt
If internal auth is disabled and LDAP is not configured on the instance, present the user with a message to create a personal access token if his Git over HTTP auth attempt fails.
2017-06-06Fix test failuresZ.J. van de Weg
2017-06-05Create read_registry scope with JWT authZ.J. van de Weg
This is the first commit doing mainly 3 things: 1. create a new scope and allow users to use it 2. Have the JWTController respond correctly on this 3. Updates documentation to suggest usage of PATs There is one gotcha, there will be no support for impersonation tokens, as this seems not needed. Fixes gitlab-org/gitlab-ce#19219
2017-05-21Avoid resource intensive login checks if password is not providedHoratiu Eugen Vlad
Fixes #32598
2017-04-13Allow OAuth clients to push codeTimothy Andrew
- We currently support fetching code with username = 'oauth2' and password = <access_token>. - Trying to _push_ code with the same credentials fails with an authentication error. - There's no reason this shouldn't be enabled, especially since we allow the OAuth client to create deploy keys with push access: https://docs.gitlab.com/ce/api/deploy_keys.html#add-deploy-key
2017-03-07Merge branch 'siemens/gitlab-ce-feature/openid-connect'Sean McGivern
2017-03-07Merge remote-tracking branch ↵Douwe Maan
'origin/personal_access_token_api_and_impersonation_token'
2017-03-07Require explicit scopes on personal access tokensMarkus Koller
Gitlab::Auth and API::APIGuard already check for at least one valid scope on personal access tokens, so if the scopes are empty the token will always fail validation.
2017-03-07Only use API scopes for personal access tokensMarkus Koller
2017-03-07Don't allow blocked users to authenticate through other meansMarkus Koller
Gitlab::Auth.find_with_user_password is currently used in these places: - resource_owner_from_credentials in config/initializers/doorkeeper.rb, which is used for the OAuth Resource Owner Password Credentials flow - the /session API call in lib/api/session.rb, which is used to reveal the user's current authentication_token In both cases users should only be authenticated if they're in the active state.
2017-03-07Implement OpenID Connect identity providerMarkus Koller
2017-03-06apply codestyle and implementation changes to the respective feature codeTiago Botelho
2017-03-06Remove unecessary calls to limit_user!, UniqueIps Middleware, and address MR ↵Pawel Chojnacki
review - cleanup formating in haml - clarify time window is in seconds - cleanup straneous chunks in db/schema - rename count_uniqe_ips to update_and_return_ips_count - other
2017-03-06Test various login scenarios if the limit gets enforcedPawel Chojnacki
2017-03-06Allow limiting logging in users from too many different IPs.Pawel Chojnacki
2017-03-01Enable and autocorrect the CustomErrorClass copSean McGivern
2017-03-01refactors finder and correlated codeTiago Botelho
2017-03-01applies relevant changes to the code and code structureTiago Botelho