Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2023-07-19Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2021-04-24Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-12-01Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-11-20Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-06-24Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-06-24Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-06-16Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-06-15Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2020-05-18Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2019-10-21Add latest changes from gitlab-org/gitlab@masterGitLab Bot
2019-05-28Store Let's Encrypt private key in settingsVladimir Shushlin
Storing this key in secrets.yml was a bad idea, it would require users using HA setups to manually replicate secrets across nodes during update, it also needed support from omnibus package * Revert "Generate Let's Encrypt private key" This reverts commit 444959bfa0b79e827a2a1a7a314acac19390f976. * Add Let's Encrypt private key to settings as encrypted attribute * Generate Let's Encrypt private key in database migration
2019-05-09Generate Let's Encrypt private keyVladimir Shushlin
2019-05-05Run rubocop -a on CE filesStan Hu
2018-11-21Eliminate duplicated wordsTakuya Noguchi
Signed-off-by: Takuya Noguchi <takninnovationresearch@gmail.com>
2018-05-30Upgrade to Ruby 2.4.4Stan Hu
Fixes that make this work: * A change in Ruby (https://github.com/ruby/ruby/commit/ce635262f53b760284d56bb1027baebaaec175d1) requires passing in the exact required length for OpenSSL keys and IVs. * Ensure the secrets.yml is generated before any prepended modules are loaded. This is done by renaming the `secret_token.rb` initializer to `01_secret_token.rb`, which is a bit ugly but involves the least impact on other files.
2017-09-20Upgrade doorkeeper-openid_connectMarkus Koller
2017-07-27Remove superfluous lib: true, type: redis, service: true, models: true, ↵Rémy Coutable
services: true, no_db: true, api: true Signed-off-by: Rémy Coutable <remy@rymai.me>
2017-03-07Implement OpenID Connect identity providerMarkus Koller
2017-01-09Introduce "stub_env" test helper for safely stubbing environment variablesAdam Niedzielski
2016-08-03Give priority to environment variablesSean McGivern
If an environment variable exists for secret_key_base, use that - always. But don't save it to secrets.yml. Also ensure that we never write to secrets.yml if there's a non-blank value there.
2016-08-03Store all secret keys in secrets.ymlSean McGivern
Move the last secret from .secret to config/secrets.yml, and delete .secret if it exists.
2016-08-03Store OTP secret key in secrets.ymlSean McGivern
.secret stores the secret token used for both encrypting login cookies and for encrypting stored OTP secrets. We can't rotate this, because that would invalidate all existing OTP secrets. If the secret token is present in the .secret file or an environment variable, save it as otp_key_base in secrets.yml. Now .secret can be rotated without invalidating OTP secrets. If the secret token isn't present (initial setup), then just generate a separate otp_key_base and save in secrets.yml. Update the docs to reflect that secrets.yml needs to be retained past upgrades, but .secret doesn't.