Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2018-02-06Validate User username only on Namespace, and bubble up appropriatelyDouwe Maan
2018-01-30Only new users get marked as externalTiago Botelho
2018-01-17Merge branch 'jej/fix-disabled-oauth-access-10-3' into 'security-10-3'Robert Speicher
[10.3] Prevent login with disabled OAuth providers See merge request gitlab/gitlabhq!2296 (cherry picked from commit 4936650427ffc88e6ee927aedbb2c724d24b094c) a0f9d222 Prevents login with disabled OAuth providers
2017-12-15Make sure user email is read only when synced with LDAPDouwe Maan
2017-11-17Changing OAuth lookup to be case insensitiveFrancisco Javier López
2017-11-06Reallow project paths ending in periodsDouwe Maan
2017-10-05Only add identities to a user if we find one in Gitlab::OAuth::User.Tiago Botelho
2017-10-02Merge branch '33493-attempt-to-link-saml-users-to-ldap-by-email' into 'master'Douwe Maan
Attempt to link saml users to ldap by email Closes #33493 See merge request gitlab-org/gitlab-ce!14216
2017-10-02Refactors SAML identity creation in gl_user.Tiago Botelho
2017-09-28refactor users update serviceJames Lopez
2017-09-28refactor services to match EE signatureJames Lopez
2017-09-25Attempt to link saml users to ldap by emailTiago Botelho
2017-09-14Don't force the encoding of the OAuth provider in ↵Rémy Coutable
Gitlab::OAuth::AuthHash#provider Some providers freeze their name (e.g. https://github.com/zquestz/omniauth-google-oauth2/blob/414c43ef3ffec37d473321f262e80f1e46dda89f/lib/omniauth/strategies/google_oauth2.rb#L1), so trying to modify the string would fail with a `can't modify frozen String` exception (see https://gitlab.com/gitlab-org/gitlab-ce/issues/37845#note_40308148). In this case, we can just stop trying to force the encoding of the provider name as they should always be in utf8 by default. Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-09-06Profile updates from providersAlexander Keramidas
2017-08-11Better categorize test coverage resultsRobert Speicher
Also marks a few things as uncovered, and removes an unused class.
2017-08-02Uniquify reserved word usernames on OAuth user creationRobin Bobbitt
2017-07-12Extract the finder portion of ldap_person so it can be overridden in EENick Thomas
2017-06-23refactor update user service not to do auth checksJames Lopez
2017-06-23use update service on ldap call and updated specs and serviceJames Lopez
2017-06-07Sync email address from specified omniauth providerRobin Bobbitt
2017-05-31Return nil when looking up config for unknown LDAP providerDouwe Maan
2017-04-25Fix OAuth, LDAP and SAML SSO when regular sign-ups are disabledDouwe Maan
2017-04-13Implement Users::BuildServicegeoandri
2017-03-27Implement new service for creating userGeorge Andrinopoulos
2017-03-01Enable and autocorrect the CustomErrorClass copSean McGivern
2017-02-23Fix OAuth/SAML user blocking behaviorDouwe Maan
2017-02-23Update rubocop and rubocop-rspec and regenerate .rubocop_todo.ymlDouwe Maan
2016-11-30Improve the `Gitlab::OAuth::User` error messageDrew Blessing
The error saving the user is logged to application.log. Previously, the entry had no context and was unusable - 'Error saving user: [Email address already taken]'. Adding the auth hash UID and email makes the error more helpful.
2016-11-11Omniauth auto link LDAP user falls back to find by DN when user cannot be ↵Drew Blessing
found by uid
2016-07-02Merge branch 'master' into dev-masterTomasz Maczukin
* master: (98 commits) Enable Style/EmptyLines cop, remove redundant ones Update CHANGELOG Cache results from jQuery selectors to retrieve namespace name Fix import button when import fail due the namespace already been taken Fix snippets comments not displayed Fix emoji paths in relative root configurations Exclude requesters from Project#members, Group#members and User#members Upgrade Thin from 1.6.1 to 1.7.0. Many squashed commits Cache autocomplete results Upgrade Sidekiq from 4.1.2 to 4.1.4. Upgrade seed-fu from 2.3.5 to 2.3.6 use has_many relationship with events Support creating a todo on issuables via API Expose target, filter by state as string Add todos API documentation and changelog Improve the request / withdraw access button Metrics for Rouge::Plugins::Redcarpet and Rouge::Formatters::HTMLGitlab Groundwork for Kerberos SPNEGO (EE feature) Update CHANGELOG 8.9.5 for runners related fixes ...
2016-06-29Fixed privilege escalation issue where manually set external users would be ↵Patricio Cano
reverted back to internal users if they logged in via OAuth and that provider was not in the `external_providers` list.
2016-06-29Enable Style/SpaceAfterComma Rubocop copGrzegorz Bizon
2016-06-23Fix subsequent SAML sign insDrew Blessing
2016-06-09Syntax fixes and better logging around the `ldap_person` method.Patricio Cano
2016-06-07Moved `find_or_create_ldap_user` method to parent class and added logging.Patricio Cano
2016-06-07Adjust the SAML control flow to allow LDAP identities to be added to an ↵Patricio Cano
existing SAML user.
2016-04-12Better control flow.Patricio Cano
2016-04-11Allow `external_providers` for Omniauth to be defined to mark these users as ↵Patricio Cano
external
2016-02-19Make new `allow_single_sign_on` feature backwards compatiblePatricio Cano
2016-02-19Decouple SAML authentication from the default Omniauth logicPatricio Cano
2016-02-19Revert "Merge branch 'saml-decoupling' into 'master' "Douwe Maan
This reverts commit c04e22fba8d130a58f498ff48127712d7dae17ee, reversing changes made to 0feab326d52222dc0ab5bd0a6b15dab297f44aa9.
2016-02-18Decouple SAML authentication from the default Omniauth logicPatricio Cano
2016-01-19Allow LDAP users to change their email if it was not set by the LDAP serverDouwe Maan
2016-01-15Fix signup for some OAuth providersSteffen Köhler
some OAuth providers (kerberos for example) only provide a username and an email, but no name. Therefore a signup fails because the name is empty. Best guess for the name is probably the username, therefore use it as name.
2015-12-22Fix identity and user retrieval when special characters are usedPatricio Cano
2015-12-15add CAS authentication supporttduehr
2015-12-11AuthHash should not parameterize email userCorey Hinshaw
2015-11-03Use proper labels for OAuth providersDouwe Maan
2015-09-09Shuffle config around a bitDouwe Maan
2015-09-08Allow configuration of LDAP attributes GitLab will use for the new user account.Douwe Maan